Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios

Size: px
Start display at page:

Download "Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios"

Transcription

1 1206 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 3, MARCH 2009 Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios Anh Tuan Hoang, Ying-Chang Liang, David Tung Chong Wong, Yonghong Zeng, and Rui Zhang Abstract This paper considers a scenario in which a secondary user (SU) opportunistically accesses a channel allocated to some primary network (PN) that switches between idle and active states in a time-slotted manner. At the beginning of each time slot, SU can choose to stay idle or to carry out spectrum sensing to detect the state of PN. If PN is detected to be idle, SU can carry out data transmission. Spectrum sensing consumes time and energy and introduces false alarms and mis-detections. The objective is to dynamically decide, for each time slot, whether SU should stay idle or carry out sensing, and if so, for how long, to maximize the expected reward. We formulate this as a partially observable Markov decision process and prove important properties of the optimal control policies. Heuristic control policies with low complexity and good performance are also proposed. Numerical results show the significant performance gain of our dynamic control approach for opportunistic spectrum access. Index Terms Cognitive radio, spectrum sensing, false alarms, mis-detections, energy constraint, POMDP. I. INTRODUCTION THE traditional approach of fixed radio spectrum allocation leads to under-utilization. It has been reported in recent studies by the US FCC that there are vast temporal and spatial variations in the usage of allocated spectrum [1]. This motivates the concepts of opportunistic spectrum access (OSA), which allows secondary cognitive radio (CR) systems to opportunistically exploit the under-utilized spectrum. We consider a secondary user (SU) making opportunistic use of a channel allocated to some primary network (PN). PN operates in a time-slotted manner and switches between idle and active states according to a stationary Markovian process. At the beginning of each time slot, SU needs to decide whether to stay idle or to carry out spectrum sensing to detect the state of PN. If SU chooses to carry out sensing, it needs to decide the duration of the sensing period and to meet a minimum detection probability. Subsequently, if spectrum sensing indicates that PN is idle, SU transmits data during the rest of the slot. There are important trade-offs when SU makes the above control decisions. By staying idle in a particular time slot, the user conserves energy, but suffers increase in delay and reduction in throughput. By carrying out spectrum sensing, SU consumes time and energy to acquire knowledge of the state of the primary network, and stands a chance to transmit data if PN is idle. Furthermore, when the required probability Manuscript received June ; revised as a transactions letter October ; accepted October The associate editor coordinating the review of this paper and approving it for publication was T. Hou. The authors are with the Institute for Infocomm Research, A STAR, 1 Fusionopolis Way, #21-01 Connexis, Singapore ( athoang, ycliang, wongtc, yhzeng, rzhang}@i2r.a-star.edu.sg). Digital Object Identifier /TWC /09$25.00 c 2009 IEEE of detection is fixed, increasing the sensing time reduces the probability of false alarm and therefore increases the probability of transmission for SU. However, increasing the sensing time also reduces the time available for transmission. For SU, given the delay cost associated with staying idle in a time slot, the energy costs associated with spectrum sensing and data transmission, and the throughput gain associated with a successful transmission, we consider the problem of finding an optimal policy which decides the idle and sensing modes, together with spectrum sensing time, to maximize the expected net reward. Here, the reward is defined as a function of delay and energy costs and throughput gain. We analyze this problem using the framework of partially observable Markov decision processes (POMDP) and prove important properties of the optimal policies. Heuristic control policies with low complexity and good performance are also proposed. Recent works on controlling spectrum-sensing in OSA systems can roughly be classified into two groups, i.e., those that focus on the control within each time slot, when the status of a primary network is more or less static [2] [4] and those that focus on the time dynamics of the control problem [5], [6]. In [2] [4], the control objective is to trade off between sensing accuracy and time available for communications, i.e., the longer the sensing duration, the lower the false alarm probability and the longer the sensing duration, the less time is available for communications. However, the dynamics of primary networks is not taken into account in [2] [4]. In [5], Zhao et al. consider a spectrum access scenario similar to ours and prove the important separation principle which decouples the sensing policy from spectrum access policy. However, in [5], energy consumption and sensing duration are not part of the control problem. The work in [6] does take into account the energy consumption but assume that spectrum sensing is perfect. This paper bridges the gap between the problems considered in [2] [4] and in [5], [6]. The rest of this paper is organized as follows. In Section II, we describe the system model and the control problem. Important properties of the optimal control policies are discussed in Section III. In Section IV, heuristic policies are proposed. Numerical results are presented in Section V. Finally, we conclude the paper in Section VI. II. SYSTEM MODEL A. Primary Network We assume that PN is either active or idle in each time slot of duration T and, from one time slot to the next, randomly switches states according to a stationary Markovian process. The process is specified by two parameters b and g, whereb is the probability that PN becomes active in the next time slot, given that it is idle in the current slot and g is the probability

2 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 3, MARCH Slots PU idle idle active idle active SU s trans. ack s quiet s quiet idle s trans. ack time out Fig. 1. Operations of a primary network and secondary user. PN switches between active and idle according to a Markovian process. SU must carry out spectrum sensing before transmitting in each time slot. Sensing can introduces false alarms (e.g. in slot 2) and mis-detections (e.g. in slot 5). that PN becomes idle in the next time slot, given that it is active in the now. The stationary probabilities of being idle and active for PN are π i = g/(b + g) and π a = b/(b + g), respectively. We further assume that μ =1 b g>0, i.e., the switching process contains positive memory [7]. B. Opportunistic Spectrum Access SU opportunistically accesses the channel by first synchronizing with the slot structure of PN and then carrying out the following mechanism (illustrated in Fig. 1). 1) Spectrum Sensing: If SU wishes to transmit in a particular slot, it first spends a duration τ to carry out spectrum sensing, i.e., a binary hypothesis test: H 0 : the primary network is idle, (1) versus H 1 : the primary network is active. Let θ denote the outcome of the above binary hypothesis test, where θ =0means H 0 is detected and θ =1otherwise. Associated with the spectrum sensing activity are probability of false alarm, i.e., mistaking H 0 for H 1, and probability of mis-detection, i.e., mistaking H 1 for H 0.ItisassumedthatSU must meet a fixed probability of detection P d. Then, the probability of false alarm is a function of the sensing time τ and is denoted by P fa (τ). The sensing duration τ must be within the interval [τ min,τ max ],where0 <τ min τ max <T.Itis assumed that for the given range of τ, 0 <P fa (τ) <P d < 1 and P fa (τ) is continuous, differentialbe, and decreasing in τ. 2) Data transmission: If the sensing outcome is θ =0,SU proceeds to transmit data in the rest of the time slot. Otherwise, it must stay quiet and wait until the next time slot to try again. 3) Acknowledgment: Even though θ = 0, this can be due to a mis-detection. Mis-detections result in collisions between primary and secondary transmissions. We assume that if SU transmission is carried out when the primary network is actually idle, a positive acknowledgment (ACK) is returned, otherwise, collisions can be detected based on ACK time out. C. POMDP Formulation Our control problem can be classified as a discrete-time POMDP with the following components. 1) Belief State: It is well known ( [8]) that for each POMDP, all information that is useful for making decisions can be encapsulated in the posterior distribution vector of the system states. In our control problem, at the beginning of each time slot, based on previous actions and observations, SU can calculate the probability that the primary network is idle in the time slot. We denote this probability by p and name it the belief state. After each time slot, depending on the action taken by SU and the corresponding outcome, p can be updated according to one of the following four cases. Case 1: SU stays idle and does not carry out spectrum sensing. Then, the next belief state, i.e., the probability that PN is idle in the next time slot is: L 1 (p) =p(1 b)+(1 p)g = p(1 b g)+g. (2) Case 2: SU senses the channel for the duration τ, obtains θ =1, i.e., PN is active, and therefore keeps quiet in the rest of the time slot. Using Bayes rule, the belief state in the next time slot is: L 2 (p, τ) = pp fa(τ)(1 b)+(1 p)p d g. (3) pp fa (τ)+(1 p)p d Case 3: SU senses the channel for the duration τ, obtains θ = 0, carries out transmission, and subsequently receives an ACK at the end of the slot. The ACK implies that PN is actually idle during the current time slot and therefore, the belief state in the next time slot is L 3 =1 b. Case 4: All the same as Case 3, except that an ACK is not received at the end of the slot. This implies that PN is active in the current time slot but is mis-detected by SU. Therefore, the belief state in the next time slot is L 4 = g. As can be noted, L 3 and L 4 do not depend on p and τ. However, to simplify the notation, we use L 1 (p, τ), L 3 (p, τ), L 4 (p, τ) interchangeable for L 1 (p), L 3, L 4. Also, letting Q i (p, τ), i =2, 3, 4 denote the probabilities that Case i above happens, we have: Q 2 (p, τ) =pp fa (τ)+(1 p)p d, Q 3 (p, τ) =p(1 P fa (τ)) Q 4 (p, τ) =(1 p)(1 P d ). 2) Properties of L i (p, τ): From (2) and the assumption that the state-transition matrix M has positive memory, i.e., 1 b g>0, it follows that L 1 (p) is increasing in p. From (3), L 2 (p, τ) p (4) = (1 b g)p dp fa (τ) [P d p(p d P fa (τ))] 2. (5) Furthermore, as 1 b g>0 and P d >P fa (τ) > 0, L2(p,τ ) p is positive and increasing in p. Therefore, L 2 (p, τ) is convex and increasing in p. It can also be easily verified that L 4 (p) L 2 (p, τ) L 3 (p) for all τ.

3 1208 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 3, MARCH ) Costs, Reward, and Control Objective: We assume that the energy cost of carrying out spectrum sensing for τ units of time is a continuous, non-negative and increasing function in τ and is denoted by c s (τ). Letr t and c t respectively be the gain in throughput and the energy cost, both are measured per unit of transmission time. It is reasonable to assume that r t >c t 0, otherwise, there is no justification for SU to carry out transmission. Note that SU can also choose to stay idle during a time slot to conserve energy. However, doing so negatively affect throughput and latency. We assume that, for SU, the cost of staying idle during each time slot is c i, c i 0. We assume that the slot duration T is much longer than ACK time/time-out so that this effect can be ignored. In a particular time slot, given that the probability of PN being idle is p and SU carries out sensing for τ units of time, the expected net gain for SU can be calculated as: G(p, τ) =p(1 P fa (τ))(t τ)(r t c t ) (6) (1 p)(1 P d )(T τ)c t c s (τ). It can be verified that G(p, τ) is continuous and increasing in p and G(p, τ) is also continuous in τ. To simplify the notation, we use τ =0to represent that SU chooses to stay idle. We then have the following expected reward when the sensing decision is set to τ. ci τ =0 R(p, τ) = (7) G(p, τ), τ min τ τ max. We are interested in the following problem. Definition 1: Let p n denote the probability that the primary network is idle during time slot n, select the sensing time τ n, τ n 0, [τ min,τ max ]}, to maximize the following discounted reward function E N 1 n=0 α n R(p n,τ n ) } p0 = p, (8) where 0 <α<1 is a discounting factor, and 1 N is the control horizon. In general, discounted reward is reasonable when SU values the reward obtained now more than what it can get in the future. Also, there is a close relationship between averagereward and discounted-reward problems, i.e., when α is closed enough to 1, then an optimal solution to the α-discounted problem is also optimal for an average-reward problem [8]. For the control problem in Definition 1, we can set p 0 = π i, where π i is definedinsectionii.a. III. STRUCTURE OF OPTIMAL POLICIES A. Monotonicity and Convexity of Value Functions When N<, letv N (p) denote the maximum achievable discounted reward function in Definition 1, V N (p) satisfies the following Bellman equation ( [8]): V N (p) = max c i + αv N 1 (L 1 (p)), G(p, τ)+α } (9) Q i (p, τ)v N 1 (L i (p, τ)), N > 1, where V 1 (p) = max ci, G(p, τ) }. (10) When N =, letv (p) denote the maximum achievable discounted reward function in Definition 1, V (p) satisfies the following Bellman equation ( [8]): V (p) = max c i + αv (L 1 (p)), G(p, τ)+α } Q i (p, τ)v (L i (p, τ)). (11) It can be shown ( [8]) that V N (p) and V (p) are continuous in p and lim n V n (p) =V (p). Proposition 1: V N (p) and V (p) are nondecreasing and convex in p. Due to limited space, we omit the proof. We note that the convexity and nondecreasing property of the value functions in the belief state is quite well-known in the POMDP literature [9], [10]. Remark 1: Proposition 1 states intuitively that, the higher the probability p that PN is idle at the beginning of the control process, the higher the maximum achievable expected reward V N (p) and V (p). Furthermore,asV N (p) and V (p) are convex, V N (p) and V (p) increase at least linearly in p. B. Properties of Optimal Policies Let us explore some useful structural properties of the optimal control policies. Letting G (p) = max G(p, τ), (12) as G(p, τ) is increasing in p, so is G (p). We state the following property of the optimal control policies. Proposition 2: Let p be the minimum value of p such that G (p ) > c i. If, in a particular time slot, the probability of PN being idle is p such that p p, then an optimal policy must carry out spectrum sensing in that time slot. Proof: Let us prove for the case when N < }. We have V 1 (p) = max τ [τmin,τ max] c i, G(p, τ) = max c i,g (p)}, whereg (p) G (p ) > c i, therefore, spectrum sensing should be carried out when N =1. For N > 1, equation (9) applied. Next, notice that Q i(p, τ) = 1 and Q i(p, τ)l i (p, τ) = L 1 (p). Then, as V N 1 (p) is convex, V N 1 (L 1 (p)) Q i (p, τ)v N 1 (L i (p, τ)), τ. (13) From (9) and (13), and the fact that G (p) G (p ) > c i, it is clear that the system should carry out spectrum sensing in the current time slot. The proof for N = is similar. Remark 2: Proposition 2 gives a sufficient condition on the value of p, i.e., p p, for carrying out spectrum sensing. However, this may not be a necessary condition. In general, the optimal policies for POMDP may not possess the thresholdbased structure in the belief state (see exceptions in [9], [10]).

4 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 3, MARCH A natural question is, when sensing is carried out, how the optimal time τ would vary with p. Let F N (p, τ) =α Q i (p, τ)v N 1 (L i (p, τ)) (14) be the expected discounted future reward given the belief state in a particular time slot is p and sensing is carried out for a duration τ. Similarly, for infinite control horizon, define F (p, τ) =α Q i (p, τ)v (L i (p, τ)), τ min τ τ max. (15) The following statement highlights the effect of increasing the spectrum sensing time τ. Proposition 3: F N (p, τ) and F (p, τ) are nondecreasing in τ. Due to limited space, we omit the proof. Essentially, Proposition 3 makes concrete the intuition that the more sensing being carried out in the current time slot, the better the expected reward in the future time slots. This is because increasing the sensing time gives the secondary user more accurate knowledge of the state of the primary network, which in turn improves future control. To further study the effect of varying the sensing time, we need to make the following assumptions. A1: The probability of false alarm, i.e., P fa (τ), isconvex and decreasing in τ, τ min τ τ max. A2: The energy cost of sensing, i.e., c s (τ), is convex and increasing in τ. For assumption A1, the justification can be found in [2] while for A2, we give an example of energy detection. Energy detection comprises of three main steps, i.e., i) to take K samples of the signal; ii) to calculate the average power of the K samples; and iii) to compare the average power to a certain threshold. The complexity of the first and second steps is linear in K. Furthermore,K is linear in τ, soc s (τ) can be assumed linear in τ when energy detection is employed. It can be easily verified that, when P fa (τ) is convex and decreasing while c s (τ) is convex and increasing in τ, G(p, τ) is concave in τ. Now, as G(p, τ) is concave, continuous, and has a strictly decreasing first order derivative for all τ in [τ min,τ max ], there exists an unique maximum point for G(p, τ). Letting τ (p) = arg max G(p, τ), (16) τ min τ τ max the following proposition relates the optimal sensing time to τ (p). Proposition 4: Given assumptions A1 and A2, if at the beginning of a particular time slot, the probability of the primary network being idle is p and sensing is carried out, then the optimal sensing time τ opt is greater than or equal to τ (p). Proof: We prove for N =, the case when N < is similar. The proof is by contradiction. Suppose the optimal sensing time τ opt < τ (p). Due to the concavity of G(p, τ opt ) <G(p, τ (p)). Furthermore, from Proposition 3, we have F (p, τ opt ) F (p, τ (p)), therefore G(p, τ opt )+F (p, τ opt ) <G(p, τ (p)) + F (p, τ (p)), (17) which contradicts to the fact that τ opt is the optimal sensing time given p. This completes the proof. Remark 3: Proposition 4 states that when the probability of the primary network being idle is p and sensing is carried out, then the lower bound of the optimal sensing time is τ (p). It can also be further proved that the lower bound τ (p) is always monotonic in p. IV. HEURISTIC POLICIES Directly solving the POMDP described in Section III can be computational challenging. In this section, suboptimal control policies that can be obtained at lower complexity are discussed. A. Grid-based Approximation Grid-based approximation is a widely-used approach for approximating solutions to POMDPs. In this approach, the value function is approximated at a finite number of belief points on a grid, using standard value iteration algorithm [8]. The value function at belief points not belonging to the grid is subsequently evaluated using interpolation. In this paper, we employ the fixed-resolution, regular-grid approach proposed by Lovejoy [11]. B. Myopic Policy ζ m (.) Proposition 2 identifies the sufficient condition on the probability that PN is idle for sensing to be carried out. Furthermore, Proposition 4 gives the lower bound on the optimal sensing time. Based on these, we consider the myopic policy that set the sensing time in slot n as τ n = ζ m (p n ) where ζ m (p) =τ (p) if p p and ζ m (p) =0otherwise. Setting the sensing time τ = ζ m (p) myopically maximizes the instantaneous gain when the belief state is p. Note that while the grid-based policy mentioned above requires the use of value iteration, this myopic policy can be directly calculated. C. Static Policy ζ s (.) Consider a static spectrum access policy that always carries out sensing with a fixed sensing duration. Note that the stationary probability of the primary network being idle is π i = b b+g. We can calculate τ (π i ) = arg max G (π i,τ). τ min τ τ max Then, for every time slot, sensing is carried out for the duration of τ (π i ). We term this policy ζ s (.). D. Genie s Policy We are going to normalize the performance of different control policies to that of the following so called Genie s policy. Suppose that at the beginning of each time slot, a genie tells the secondary user exactly what the state of the primary network is. Then, the best action for the secondary user is to carry out transmission if the primary network is idle, and to stay idle if the primary network is active.

5 1210 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 3, MARCH μ=0.5 Normalized V(p) p (prob. of primary network being idle) Fig. 2. Normalized optimal reward function. Optimal reward function V (p) is convex and increasing in p. P d =10%, c i =0, s =1, c t =2, r t =3, and µ =0.9. The optimal reward function is normalized by the reward of Genie s Policy. V. NUMERICAL RESULTS AND DISCUSSION In this section, we present numerical results that illustrate our theoretical analysis. We focus on the infinite control horizon scenario, i.e., when N =. A. Model for Numerical Studies We assume that PN operates on a channel with bandwidth of B =6MHz. Time slot duration is T =10msecs. SU employs energy detection for spectrum sensing, with channel being oversampled at rate f s = 7/8B. Given the required probability of detection P d = 10%, the sensing SNR of γ = 15dB, and the sensing duraration τ, the probability of false alarm can be calculated by ( [2]): P fa (τ) =Q( 2γ +1Q 1 (P d )+ τf s γ), (18) where Q(.) is the complementary distribution function of a standard Gaussian variable. We assume that the sensing cost is linear in sensing time, i.e., c s (τ) =sτ, s>0. The memory of PN switching process, i.e., μ =1 b g, is varied from 0.1 to While doing so, we always set b = g =(1 μ)/2. B. Characteristics of Optimal Policies To obtain optimal solutions to our POMDP, we use the solver package provided by A. Cassandra [12]. 1) Optimal reward function is convex and nondecreasing: In Fig. 2, we plot the optimal reward function V (p) versus the initial belief state p. As stated in Proposition 1, V (p) is convex and nondecreasing in p. As can be seen, for high value of p, V (p) is close to a linear function. This can be explained by the fact that the optimal control action does not vary much for high value of p (refer to Figs. 3 and 4). 2) Optimal sensing time τ opt (p): In Figs. 3 and 4, we plot the sensing time versus the probability of PN being idle for different control policies, i.e., optimal, grid-based approximation, myopic, and static. It can be observed that there is a threshold value for the belief state p above which it τ/t Optimal Grid 0.02 ζ m (.) ζ s (.) p (prob. of primary network being idle) Fig. 3. Sensing times for different policies when the memory of primary user switching process is set to µ =0.5. P d =10%, c i =0, s =1, c t =2, r t =3. τ/t μ=0.9 Optimal Grid 0.02 ζ m (.) ζ s (.) p (prob. of primary network being idle) Fig. 4. Sensing times for different policies when the memory of primary user switching process is set to µ =0.9, P d =10%, c i = 1000, s =1, c t =2, r t =3. is optimal for the secondary user to carry out spectrum sensing and below which it is optimal to stay idle. In other words, the optimal sensing strategies tend to exhibit the threshold-based characteristic. From Fig. 3, it can also be observed that for a relatively low value of memory of PN switching process (μ =0.5), both the grid-based and myopic policies approximate the optimal sensing durations well. However, in Fig. 4, when the memory increases (μ = 0.9), while the grid-based policy is close to optimal, myopic policy is significantly different from the optimal policy for low value of p. This difference can be explained by the fact that the myopic policy only focuses on instantaneous gain and ignores future effects. As a result, it is not able to exploit the memory in PN states. Comparing Fig. 3 and 4, it is evident that when the memory of of the PN switching process increases, the optimal sensing time also increases. This is because the higher the memory,

6 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 3, MARCH Normalized reward Optimal Grid (20 points) Grid (10 points) ζ m (.) ζ s (.) 10 point grid approximation 20 point grid approximation μ (memory of primary network switching process) Fig. 5. Normalized rewards achieved by different control policies. The rewards achieved by different policies are normalized by that of the Genie s Policy. c i =1000, c s =1, c t =2, r t =3. the slower the change in status of the primary network and therefore, the more useful the sensing activity for predicting the future state of the primary network. Also, in Fig. 4, when the cost of staying idle is increased to c i = 1000, sensingis carried out given smaller value of probability that PN is idle. C. Performance Comparison In Fig. 5, we plot the expected reward versus the memory μ of PN switching process for optimal, grid-based, myopic, and static policies, normalized to that of Genie s policy. As can be seen, the performance of the optimal, grid-based and myopic polices all improves with increase in memory μ. This is because the higher the memory, the more slowly PN switches state, which implies the more useful sensing activities for future control. On the other hand, the performance of the static policy (ζ s (.)) does not change with μ. This is because when μ is varied, we always keeps the stationary probability of PN being active or idle unchanged (π i =0.5) sothatin every time slot, ζ s (.) always carries out sensing for a fixed duration. It is also important to note that, at relatively high value of μ, both grid-based and myopic policies, which employ our approach of dynamically controlling the sensing/channelaccess operation of SU, achieve significant performance gain compared to the static policy. It can be observed that for the low range of memory, the performance of both grid-based and myopic policies are close to that of the optimal policy. On the other hand, for higher value of memory, i.e., when PN switches state more slowly, only grid-based policy can approximate the performance of the optimal policy. The explanation for this is the same as for the difference in the sensing time in Figs. 3 and 4. In particular, for low memory, both myopic and grid-based policies can approximate the optimal decisions well. However, for high value of memory, only grid-based policy has decisions close to optimal. It is also evident that the performance of a 10- point grid-based approximation is very close to optimal, i.e., grid-based approximation can be employed without loss of performance in our POMDP problem. VI. CONCLUSION In this paper, we study spectrum-sensing policies that take into account the dynamics of the primary networks and determine the spectrum sensing duration in order to optimize secondary users performance. As such, this paper bridges the gap between the two groups of existing spectrum-sensing/control literature that either focus on adapting to the dynamics of the primary networks or on optimizing the spectrum-sensing duration, but not on both. We present theoretical analysis and numerical results to highlight the effectiveness of our control approach. REFERENCES [1] FCC, Spectrum policy task force report, FCC , Nov [2] Y. C. Liang, Y. H. Zeng, E. Peh, and A. T. Hoang, Sensing-throughput tradeoff for cognitive radio networks, IEEE Trans. Wireless Commun., vol. 7, no. 4, pp , Apr [3] A. Ghasemi and E. Sousa, Optimization of spectrum sensing for opportunistic spectrum access in cognitive radio networks, in Proc. 4th IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, USA, Jan [4] Y. Pei, A. T. Hoang, and Y.-C. Liang, Sensing-throughput tradeoff in cognitive radio networks: How frequently should spectrum sensing be carried out? in Proc. 18th IEEE PIMRC, Athens, Greece, Sept [5] Q. Zhao, L. Tong, A. Swami, and Y. Chen, Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: a pomdp framework, IEEE J. Select. Areas Commun., vol. 25, no. 3, pp , Apr [6] A. T. Hoang and Y.-C. Liang, Adaptive scheduling of spectrum sensing periods in cognitive radio networks, in Proc. 50th IEEE Global Telecommunications Conference (Globecom), Washington DC, USA, Nov [7] M. Mushkin and I. Bar-David, Capacity and coding for the Gilbert- Elliott channels, IEEE Trans. Inform. Theory, vol. 35, no. 6, pp , Nov [8] D. P. Bertsekas, Dynamic Programming and Optimal Control, 2nd ed., vols. 1 and 2. Athena Scientific, [9] S. C. Albright, Structural results for partially observable markov decision processes, Operations Research, vol. 27, no. 5, pp , Sept./Oct [10] W. S. Lovejoy, Some monotonicity results for partially observable markov decision processes, Operations Research, vol. 35, no. 5, pp , Sept./Oct [11] W. Lovejoy, Computationally feasible bounds for partially observed markov decision processes, Operations Research, vol. 39, no. 1, pp , Jan./Feb [12] A. R. Cassandra, Tony s pomdp page, website edu/research/ai/pomdp/.

Dynamic spectrum access with learning for cognitive radio

Dynamic spectrum access with learning for cognitive radio 1 Dynamic spectrum access with learning for cognitive radio Jayakrishnan Unnikrishnan and Venugopal V. Veeravalli Department of Electrical and Computer Engineering, and Coordinated Science Laboratory University

More information

On the Optimality of Myopic Sensing. in Multi-channel Opportunistic Access: the Case of Sensing Multiple Channels

On the Optimality of Myopic Sensing. in Multi-channel Opportunistic Access: the Case of Sensing Multiple Channels On the Optimality of Myopic Sensing 1 in Multi-channel Opportunistic Access: the Case of Sensing Multiple Channels Kehao Wang, Lin Chen arxiv:1103.1784v1 [cs.it] 9 Mar 2011 Abstract Recent works ([1],

More information

STRUCTURE AND OPTIMALITY OF MYOPIC SENSING FOR OPPORTUNISTIC SPECTRUM ACCESS

STRUCTURE AND OPTIMALITY OF MYOPIC SENSING FOR OPPORTUNISTIC SPECTRUM ACCESS STRUCTURE AND OPTIMALITY OF MYOPIC SENSING FOR OPPORTUNISTIC SPECTRUM ACCESS Qing Zhao University of California Davis, CA 95616 qzhao@ece.ucdavis.edu Bhaskar Krishnamachari University of Southern California

More information

OPPORTUNISTIC Spectrum Access (OSA) is emerging

OPPORTUNISTIC Spectrum Access (OSA) is emerging Optimal and Low-complexity Algorithms for Dynamic Spectrum Access in Centralized Cognitive Radio Networks with Fading Channels Mario Bkassiny, Sudharman K. Jayaweera, Yang Li Dept. of Electrical and Computer

More information

Performance of Round Robin Policies for Dynamic Multichannel Access

Performance of Round Robin Policies for Dynamic Multichannel Access Performance of Round Robin Policies for Dynamic Multichannel Access Changmian Wang, Bhaskar Krishnamachari, Qing Zhao and Geir E. Øien Norwegian University of Science and Technology, Norway, {changmia,

More information

arxiv:cs/ v1 [cs.ni] 27 Feb 2007

arxiv:cs/ v1 [cs.ni] 27 Feb 2007 Joint Design and Separation Principle for Opportunistic Spectrum Access in the Presence of Sensing Errors Yunxia Chen, Qing Zhao, and Ananthram Swami Abstract arxiv:cs/0702158v1 [cs.ni] 27 Feb 2007 We

More information

Optimal Power Allocation for Cognitive Radio under Primary User s Outage Loss Constraint

Optimal Power Allocation for Cognitive Radio under Primary User s Outage Loss Constraint This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 29 proceedings Optimal Power Allocation for Cognitive Radio

More information

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New

More information

Cognitive Spectrum Access Control Based on Intrinsic Primary ARQ Information

Cognitive Spectrum Access Control Based on Intrinsic Primary ARQ Information Cognitive Spectrum Access Control Based on Intrinsic Primary ARQ Information Fabio E. Lapiccirella, Zhi Ding and Xin Liu Electrical and Computer Engineering University of California, Davis, California

More information

Bayesian Congestion Control over a Markovian Network Bandwidth Process

Bayesian Congestion Control over a Markovian Network Bandwidth Process Bayesian Congestion Control over a Markovian Network Bandwidth Process Parisa Mansourifard 1/30 Bayesian Congestion Control over a Markovian Network Bandwidth Process Parisa Mansourifard (USC) Joint work

More information

Distributed Reinforcement Learning Based MAC Protocols for Autonomous Cognitive Secondary Users

Distributed Reinforcement Learning Based MAC Protocols for Autonomous Cognitive Secondary Users Distributed Reinforcement Learning Based MAC Protocols for Autonomous Cognitive Secondary Users Mario Bkassiny and Sudharman K. Jayaweera Dept. of Electrical and Computer Engineering University of New

More information

Power Allocation over Two Identical Gilbert-Elliott Channels

Power Allocation over Two Identical Gilbert-Elliott Channels Power Allocation over Two Identical Gilbert-Elliott Channels Junhua Tang School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University, China Email: junhuatang@sjtu.edu.cn Parisa

More information

Optimality of Myopic Sensing in Multi-Channel Opportunistic Access

Optimality of Myopic Sensing in Multi-Channel Opportunistic Access Optimality of Myopic Sensing in Multi-Channel Opportunistic Access Tara Javidi, Bhasar Krishnamachari, Qing Zhao, Mingyan Liu tara@ece.ucsd.edu, brishna@usc.edu, qzhao@ece.ucdavis.edu, mingyan@eecs.umich.edu

More information

Optimal Sensing-Transmission Structure for Dynamic Spectrum Access

Optimal Sensing-Transmission Structure for Dynamic Spectrum Access Optimal Sensing-Transmission Structure for Dynamic Spectrum Access Senhua Huang, Xin Liu, and Zhi Ding University of California, Davis, CA 9566, USA Abstract In cognitive wireless networks where secondary

More information

Algorithms for Dynamic Spectrum Access with Learning for Cognitive Radio

Algorithms for Dynamic Spectrum Access with Learning for Cognitive Radio Algorithms for Dynamic Spectrum Access with Learning for Cognitive Radio Jayakrishnan Unnikrishnan, Student Member, IEEE, and Venugopal V. Veeravalli, Fellow, IEEE 1 arxiv:0807.2677v2 [cs.ni] 21 Nov 2008

More information

Channel Allocation Using Pricing in Satellite Networks

Channel Allocation Using Pricing in Satellite Networks Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract

More information

Bayesian Congestion Control over a Markovian Network Bandwidth Process: A multiperiod Newsvendor Problem

Bayesian Congestion Control over a Markovian Network Bandwidth Process: A multiperiod Newsvendor Problem Bayesian Congestion Control over a Markovian Network Bandwidth Process: A multiperiod Newsvendor Problem Parisa Mansourifard 1/37 Bayesian Congestion Control over a Markovian Network Bandwidth Process:

More information

Optimality of Myopic Sensing in Multi-Channel Opportunistic Access

Optimality of Myopic Sensing in Multi-Channel Opportunistic Access Optimality of Myopic Sensing in Multi-Channel Opportunistic Access Tara Javidi, Bhasar Krishnamachari,QingZhao, Mingyan Liu tara@ece.ucsd.edu, brishna@usc.edu, qzhao@ece.ucdavis.edu, mingyan@eecs.umich.edu

More information

Opportunistic Channel-Aware Spectrum Access for Cognitive Radio Networks with Interleaved Transmission and Sensing

Opportunistic Channel-Aware Spectrum Access for Cognitive Radio Networks with Interleaved Transmission and Sensing 1 Opportunistic Channel-Aware Spectrum Access for Cognitive Radio Networks with Interleaved Transmission and Sensing Sheu-Sheu Tan, James Zeidler, and Bhaskar Rao Department of Electrical and Computer

More information

Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback

Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback IEEE INFOCOM Workshop On Cognitive & Cooperative Networks Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback Chao Wang, Zhaoyang Zhang, Xiaoming Chen, Yuen Chau. Dept.of

More information

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland Morning Session Capacity-based Power Control Şennur Ulukuş Department of Electrical and Computer Engineering University of Maryland So Far, We Learned... Power control with SIR-based QoS guarantees Suitable

More information

Multiple-Level Power Allocation Strategy for

Multiple-Level Power Allocation Strategy for Multiple-Level Power Allocation Strategy for 1 Secondary Users in Cognitive Radio Networks Zhong Chen, Feifei Gao, Zhenwei Zhang, James C. F. Li, and Ming Lei arxiv:137.158v2 [cs.i] 12 Dec 213 Abstract

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

Novel spectrum sensing schemes for Cognitive Radio Networks

Novel spectrum sensing schemes for Cognitive Radio Networks Novel spectrum sensing schemes for Cognitive Radio Networks Cantabria University Santander, May, 2015 Supélec, SCEE Rennes, France 1 The Advanced Signal Processing Group http://gtas.unican.es The Advanced

More information

A Restless Bandit With No Observable States for Recommendation Systems and Communication Link Scheduling

A Restless Bandit With No Observable States for Recommendation Systems and Communication Link Scheduling 2015 IEEE 54th Annual Conference on Decision and Control (CDC) December 15-18, 2015 Osaka, Japan A Restless Bandit With No Observable States for Recommendation Systems and Communication Link Scheduling

More information

MARKOV DECISION PROCESSES (MDP) AND REINFORCEMENT LEARNING (RL) Versione originale delle slide fornita dal Prof. Francesco Lo Presti

MARKOV DECISION PROCESSES (MDP) AND REINFORCEMENT LEARNING (RL) Versione originale delle slide fornita dal Prof. Francesco Lo Presti 1 MARKOV DECISION PROCESSES (MDP) AND REINFORCEMENT LEARNING (RL) Versione originale delle slide fornita dal Prof. Francesco Lo Presti Historical background 2 Original motivation: animal learning Early

More information

Maximizing System Throughput by Cooperative Sensing in Cognitive Radio Networks

Maximizing System Throughput by Cooperative Sensing in Cognitive Radio Networks Maximizing System Throughput by Cooperative Sensing in Cognitive Radio Networks Shuang Li, Student Member, IEEE, Zizhan Zheng, Member, IEEE, Eylem Ekici, Senior Member, IEEE, and Ness Shroff, Fellow, IEEE

More information

Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints

Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints Chunhua Sun, Wei Zhang, and haled Ben Letaief, Fellow, IEEE Department of Electronic and Computer Engineering The Hong ong

More information

This is the Pre-Published Version

This is the Pre-Published Version Copyright 2013 IEEE. Reprinted from "Sun, X. & Tsang, D.H.K. (2013). Energy-efficient cooperative sensing scheduling for multi-band cognitive radio networks. IEEE Transactions on Wireless Communications,

More information

Algorithms for Dynamic Spectrum Access with Learning for Cognitive Radio

Algorithms for Dynamic Spectrum Access with Learning for Cognitive Radio Algorithms for Dynamic Spectrum Access with Learning for Cognitive Radio Jayakrishnan Unnikrishnan, Student Member, IEEE, and Venugopal V. Veeravalli, Fellow, IEEE 1 arxiv:0807.2677v4 [cs.ni] 6 Feb 2010

More information

Cooperative Spectrum Prediction for Improved Efficiency of Cognitive Radio Networks

Cooperative Spectrum Prediction for Improved Efficiency of Cognitive Radio Networks Cooperative Spectrum Prediction for Improved Efficiency of Cognitive Radio Networks by Nagwa Shaghluf B.S., Tripoli University, Tripoli, Libya, 2009 A Thesis Submitted in Partial Fulfillment of the Requirements

More information

Online Learning to Optimize Transmission over an Unknown Gilbert-Elliott Channel

Online Learning to Optimize Transmission over an Unknown Gilbert-Elliott Channel Online Learning to Optimize Transmission over an Unknown Gilbert-Elliott Channel Yanting Wu Dept. of Electrical Engineering University of Southern California Email: yantingw@usc.edu Bhaskar Krishnamachari

More information

Interference Reduction In Cognitive Networks via Scheduling

Interference Reduction In Cognitive Networks via Scheduling 1 Interference Reduction In Cognitive Networks via Scheduling Patrick Mitran, Member, IEEE Abstract In this letter, we first define a cognitive network to be useful if at least one node can be scheduled

More information

Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks

Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks Communications and Networ, 2010, 2, 87-92 doi:10.4236/cn.2010.22014 Published Online May 2010 (http://www.scirp.org/journal/cn Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless

More information

OFDMA Downlink Resource Allocation using Limited Cross-Layer Feedback. Prof. Phil Schniter

OFDMA Downlink Resource Allocation using Limited Cross-Layer Feedback. Prof. Phil Schniter OFDMA Downlink Resource Allocation using Limited Cross-Layer Feedback Prof. Phil Schniter T. H. E OHIO STATE UNIVERSITY Joint work with Mr. Rohit Aggarwal, Dr. Mohamad Assaad, Dr. C. Emre Koksal September

More information

Optimal Power Control in Decentralized Gaussian Multiple Access Channels

Optimal Power Control in Decentralized Gaussian Multiple Access Channels 1 Optimal Power Control in Decentralized Gaussian Multiple Access Channels Kamal Singh Department of Electrical Engineering Indian Institute of Technology Bombay. arxiv:1711.08272v1 [eess.sp] 21 Nov 2017

More information

arxiv: v3 [cs.lg] 4 Oct 2011

arxiv: v3 [cs.lg] 4 Oct 2011 Reinforcement learning based sensing policy optimization for energy efficient cognitive radio networks Jan Oksanen a,, Jarmo Lundén a,b,1, Visa Koivunen a a Aalto University School of Electrical Engineering,

More information

Prediction Based Cognitive Spectrum Access 1

Prediction Based Cognitive Spectrum Access 1 Prediction Based Cognitive Spectrum Access 1 Boris Oklander Department of Electrical Engineering Technion Israel Institute of Technology Haifa, Israel oklander@tx.technion.ac.il Moshe Sidi Department of

More information

Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting

Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting 1 Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting Dusit Niyato 1, Ping Wang 1, and Dong In Kim 2 1 School of Computer Engineering, Nanyang Technological University

More information

Analysis of opportunistic spectrum access in cognitive radio networks using hidden Markov model with state prediction

Analysis of opportunistic spectrum access in cognitive radio networks using hidden Markov model with state prediction Wang and Adriman EURASIP Journal onwireless Communications and Networking (2015) 2015:10 DOI 10.1186/s13638-014-0238-5 RESEARCH Open Access Analysis of opportunistic spectrum access in cognitive radio

More information

Sequential Opportunistic Spectrum Access with Imperfect Channel Sensing

Sequential Opportunistic Spectrum Access with Imperfect Channel Sensing Sequential Opportunistic Spectrum Access with Imperfect Channel Sensing Tao Shu and Marwan Krunz Department of Computer Science and Engineering Oakland University, Rochester, MI Department of Electrical

More information

WIRELESS COMMUNICATIONS AND COGNITIVE RADIO TRANSMISSIONS UNDER QUALITY OF SERVICE CONSTRAINTS AND CHANNEL UNCERTAINTY

WIRELESS COMMUNICATIONS AND COGNITIVE RADIO TRANSMISSIONS UNDER QUALITY OF SERVICE CONSTRAINTS AND CHANNEL UNCERTAINTY University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Theses, Dissertations, and Student Research from Electrical & Computer Engineering Electrical & Computer Engineering, Department

More information

Maximizing System Throughput Using Cooperative Sensing in Multi-Channel Cognitive Radio Networks

Maximizing System Throughput Using Cooperative Sensing in Multi-Channel Cognitive Radio Networks !"#$%&'''%()*+,-,*.,%)*%/,.0#0)*%*2%()*$-)3 /,.,45,-%"67"89%:6":;%?009%@AB Maximizing System Throughput Using Cooperative Sensing in Multi-Channel Cognitive Radio Networks Shuang Li, Zizhan Zheng,

More information

Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal

Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal Matthew Johnston, Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cambridge,

More information

4888 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY 2016

4888 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY 2016 4888 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY 2016 Online Power Control Optimization for Wireless Transmission With Energy Harvesting and Storage Fatemeh Amirnavaei, Student Member,

More information

A State Action Frequency Approach to Throughput Maximization over Uncertain Wireless Channels

A State Action Frequency Approach to Throughput Maximization over Uncertain Wireless Channels A State Action Frequency Approach to Throughput Maximization over Uncertain Wireless Channels Krishna Jagannathan, Shie Mannor, Ishai Menache, Eytan Modiano Abstract We consider scheduling over a wireless

More information

Retrospective Spectrum Access Protocol: A Completely Uncoupled Learning Algorithm for Cognitive Networks

Retrospective Spectrum Access Protocol: A Completely Uncoupled Learning Algorithm for Cognitive Networks Retrospective Spectrum Access Protocol: A Completely Uncoupled Learning Algorithm for Cognitive Networks Marceau Coupechoux, Stefano Iellamo, Lin Chen + TELECOM ParisTech (INFRES/RMS) and CNRS LTCI + University

More information

Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security

Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security Edmond Nurellari The University of Leeds, UK School of Electronic and Electrical

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information

Online Learning with Randomized Feedback Graphs for Optimal PUE Attacks in Cognitive Radio Networks

Online Learning with Randomized Feedback Graphs for Optimal PUE Attacks in Cognitive Radio Networks 1 Online Learning with Randomized Feedback Graphs for Optimal PUE Attacks in Cognitive Radio Networks Monireh Dabaghchian, Amir Alipour-Fanid, Kai Zeng, Qingsi Wang, Peter Auer arxiv:1709.10128v3 [cs.ni]

More information

Wireless Channel Selection with Restless Bandits

Wireless Channel Selection with Restless Bandits Wireless Channel Selection with Restless Bandits Julia Kuhn and Yoni Nazarathy Abstract Wireless devices are often able to communicate on several alternative channels; for example, cellular phones may

More information

Optimal Harvest-or-Transmit Strategy for Energy Harvesting Underlay Cognitive Radio Network

Optimal Harvest-or-Transmit Strategy for Energy Harvesting Underlay Cognitive Radio Network Optimal Harvest-or-Transmit Strategy for Energy Harvesting Underlay Cognitive Radio Network Kalpant Pathak and Adrish Banerjee Department of Electrical Engineering, Indian Institute of Technology Kanpur,

More information

2176 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 4, APRIL 2014

2176 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 4, APRIL 2014 2176 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 4, APRIL 2014 Multi-Channel Sensing and Access Game: Bayesian Social Learning with Negative Network Externality Chunxiao Jiang, Member, IEEE,

More information

Artificial Intelligence & Sequential Decision Problems

Artificial Intelligence & Sequential Decision Problems Artificial Intelligence & Sequential Decision Problems (CIV6540 - Machine Learning for Civil Engineers) Professor: James-A. Goulet Département des génies civil, géologique et des mines Chapter 15 Goulet

More information

Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems. Technical Report: TR-CSE June 2010

Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems. Technical Report: TR-CSE June 2010 Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems Technical Report: TR-CSE-010-30 June 010 Manuj Sharma, Anirudha Sahoo Department of Computer Science

More information

Optimal power-delay trade-offs in fading channels: small delay asymptotics

Optimal power-delay trade-offs in fading channels: small delay asymptotics Optimal power-delay trade-offs in fading channels: small delay asymptotics Randall A. Berry Dept. of EECS, Northwestern University 45 Sheridan Rd., Evanston IL 6008 Email: rberry@ece.northwestern.edu Abstract

More information

Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems. Technical Report: TR-CSE March 2010

Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems. Technical Report: TR-CSE March 2010 Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems Technical Report: TR-CSE-010-6 March 010 Manuj Sharma, Anirudha Sahoo Department of Computer Science

More information

Markovian Decision Process (MDP): theory and applications to wireless networks

Markovian Decision Process (MDP): theory and applications to wireless networks Markovian Decision Process (MDP): theory and applications to wireless networks Philippe Ciblat Joint work with I. Fawaz, N. Ksairi, C. Le Martret, M. Sarkiss Outline Examples MDP Applications A few examples

More information

Exploiting Channel Memory for Joint Estimation and Scheduling in Downlink Networks

Exploiting Channel Memory for Joint Estimation and Scheduling in Downlink Networks Exploiting Channel Memory for Joint Estimation and Scheduling in Downlink Networks Wenzhuo Ouyang, Sugumar Murugesan, Atilla Eryilmaz, Ness B. Shroff Department of Electrical and Computer Engineering The

More information

Optimal Power Allocation for Fading Channels in Cognitive Radio Networks: Ergodic Capacity and Outage Capacity

Optimal Power Allocation for Fading Channels in Cognitive Radio Networks: Ergodic Capacity and Outage Capacity 1 Optimal Power Allocation for Fading Channels in Cognitive Radio Networks: Ergodic Capacity and Outage Capacity Xin ang, Student Member, IEEE, Ying-Chang Liang, Senior Member, IEEE, arxiv:88.3689v2 [cs.it]

More information

Random Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering,

Random Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering, Random Access Game Medium Access Control Design for Wireless Networks 1 Sandip Chakraborty Department of Computer Science and Engineering, INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR October 22, 2016 1 Chen

More information

WIRELESS systems often operate in dynamic environments

WIRELESS systems often operate in dynamic environments IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 9, NOVEMBER 2012 3931 Structure-Aware Stochastic Control for Transmission Scheduling Fangwen Fu and Mihaela van der Schaar, Fellow, IEEE Abstract

More information

Cooperation Stimulation in Cooperative Communications: An Indirect Reciprocity Game

Cooperation Stimulation in Cooperative Communications: An Indirect Reciprocity Game IEEE ICC 202 - Wireless Networks Symposium Cooperation Stimulation in Cooperative Communications: An Indirect Reciprocity Game Yang Gao, Yan Chen and K. J. Ray Liu Department of Electrical and Computer

More information

ADAPTIVE CLUSTERING ALGORITHM FOR COOPERATIVE SPECTRUM SENSING IN MOBILE ENVIRONMENTS. Jesus Perez and Ignacio Santamaria

ADAPTIVE CLUSTERING ALGORITHM FOR COOPERATIVE SPECTRUM SENSING IN MOBILE ENVIRONMENTS. Jesus Perez and Ignacio Santamaria ADAPTIVE CLUSTERING ALGORITHM FOR COOPERATIVE SPECTRUM SENSING IN MOBILE ENVIRONMENTS Jesus Perez and Ignacio Santamaria Advanced Signal Processing Group, University of Cantabria, Spain, https://gtas.unican.es/

More information

Exploiting Channel Memory for Joint Estimation and Scheduling in Downlink Networks A Whittle s Indexability Analysis

Exploiting Channel Memory for Joint Estimation and Scheduling in Downlink Networks A Whittle s Indexability Analysis 1 Exploiting Channel Memory for Joint Estimation and Scheduling in Downlink Networks A Whittle s Indexability Analysis Wenzhuo Ouyang, Sugumar Murugesan, Atilla Eryilmaz, Ness B Shroff Abstract We address

More information

Game Theoretic Approach to Power Control in Cellular CDMA

Game Theoretic Approach to Power Control in Cellular CDMA Game Theoretic Approach to Power Control in Cellular CDMA Sarma Gunturi Texas Instruments(India) Bangalore - 56 7, INDIA Email : gssarma@ticom Fernando Paganini Electrical Engineering Department University

More information

6196 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 9, SEPTEMBER 2011

6196 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 9, SEPTEMBER 2011 6196 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 9, SEPTEMBER 2011 On the Structure of Real-Time Encoding and Decoding Functions in a Multiterminal Communication System Ashutosh Nayyar, Student

More information

Optimal Control of Partiality Observable Markov. Processes over a Finite Horizon

Optimal Control of Partiality Observable Markov. Processes over a Finite Horizon Optimal Control of Partiality Observable Markov Processes over a Finite Horizon Report by Jalal Arabneydi 04/11/2012 Taken from Control of Partiality Observable Markov Processes over a finite Horizon by

More information

Reliable Cooperative Sensing in Cognitive Networks

Reliable Cooperative Sensing in Cognitive Networks Reliable Cooperative Sensing in Cognitive Networks (Invited Paper) Mai Abdelhakim, Jian Ren, and Tongtong Li Department of Electrical & Computer Engineering, Michigan State University, East Lansing, MI

More information

IN conventional spectrum management, most of the spectrum

IN conventional spectrum management, most of the spectrum 2164 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 60, NO. 5, JUNE 2011 A Two-Level AC Protocol Strategy for Opportunistic Spectrum Access in Cognitive Radio Networks Qian Chen, Student ember, IEEE,

More information

NOMA: Principles and Recent Results

NOMA: Principles and Recent Results NOMA: Principles and Recent Results Jinho Choi School of EECS GIST September 2017 (VTC-Fall 2017) 1 / 46 Abstract: Non-orthogonal multiple access (NOMA) becomes a key technology in 5G as it can improve

More information

An Improved Blind Spectrum Sensing Algorithm Based on QR Decomposition and SVM

An Improved Blind Spectrum Sensing Algorithm Based on QR Decomposition and SVM An Improved Blind Spectrum Sensing Algorithm Based on QR Decomposition and SVM Yaqin Chen 1,(&), Xiaojun Jing 1,, Wenting Liu 1,, and Jia Li 3 1 School of Information and Communication Engineering, Beijing

More information

ABSTRACT CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS. Title of dissertation: Anthony A. Fanous, Doctor of Philosophy, 2013

ABSTRACT CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS. Title of dissertation: Anthony A. Fanous, Doctor of Philosophy, 2013 ABSTRACT Title of dissertation: CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS Anthony A. Fanous, Doctor of Philosophy, 2013 Dissertation directed by: Professor Anthony Ephremides Department of Electrical

More information

Adaptive Distributed Algorithms for Optimal Random Access Channels

Adaptive Distributed Algorithms for Optimal Random Access Channels Forty-Eighth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 29 - October, 2 Adaptive Distributed Algorithms for Optimal Random Access Channels Yichuan Hu and Alejandro Ribeiro

More information

Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters

Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Alkan Soysal Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland,

More information

Stochastic Content-Centric Multicast Scheduling for Cache-Enabled Heterogeneous Cellular Networks

Stochastic Content-Centric Multicast Scheduling for Cache-Enabled Heterogeneous Cellular Networks 1 Stochastic Content-Centric Multicast Scheduling for Cache-Enabled Heterogeneous Cellular Networks Bo Zhou, Ying Cui, Member, IEEE, and Meixia Tao, Senior Member, IEEE Abstract Caching at small base stations

More information

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,

More information

ABSTRACT WIRELESS COMMUNICATIONS. criterion. Therefore, it is imperative to design advanced transmission schemes to

ABSTRACT WIRELESS COMMUNICATIONS. criterion. Therefore, it is imperative to design advanced transmission schemes to ABSTRACT Title of dissertation: DELAY MINIMIZATION IN ENERGY CONSTRAINED WIRELESS COMMUNICATIONS Jing Yang, Doctor of Philosophy, 2010 Dissertation directed by: Professor Şennur Ulukuş Department of Electrical

More information

Multi-Armed Bandit: Learning in Dynamic Systems with Unknown Models

Multi-Armed Bandit: Learning in Dynamic Systems with Unknown Models c Qing Zhao, UC Davis. Talk at Xidian Univ., September, 2011. 1 Multi-Armed Bandit: Learning in Dynamic Systems with Unknown Models Qing Zhao Department of Electrical and Computer Engineering University

More information

Partially Observable Markov Decision Processes (POMDPs)

Partially Observable Markov Decision Processes (POMDPs) Partially Observable Markov Decision Processes (POMDPs) Geoff Hollinger Sequential Decision Making in Robotics Spring, 2011 *Some media from Reid Simmons, Trey Smith, Tony Cassandra, Michael Littman, and

More information

Sum-Rate Capacity of Poisson MIMO Multiple-Access Channels

Sum-Rate Capacity of Poisson MIMO Multiple-Access Channels 1 Sum-Rate Capacity of Poisson MIMO Multiple-Access Channels Ain-ul-Aisha, Lifeng Lai, Yingbin Liang and Shlomo Shamai (Shitz Abstract In this paper, we analyze the sum-rate capacity of two-user Poisson

More information

Multi-channel Opportunistic Access: A Case of Restless Bandits with Multiple Plays

Multi-channel Opportunistic Access: A Case of Restless Bandits with Multiple Plays Multi-channel Opportunistic Access: A Case of Restless Bandits with Multiple Plays Sahand Haji Ali Ahmad, Mingyan Liu Abstract This paper considers the following stochastic control problem that arises

More information

Elements of Reinforcement Learning

Elements of Reinforcement Learning Elements of Reinforcement Learning Policy: way learning algorithm behaves (mapping from state to action) Reward function: Mapping of state action pair to reward or cost Value function: long term reward,

More information

Throughput-efficient Sequential Channel Sensing and Probing in Cognitive Radio Networks Under Sensing Errors

Throughput-efficient Sequential Channel Sensing and Probing in Cognitive Radio Networks Under Sensing Errors Throughput-efficient Sequential hannel Sensing and Probing in ognitive Radio Networks Under Sensing Errors Tao Shu and Marwan Krunz Department of Electrical and omputer Engineering, University of Arizona

More information

Optimal and Suboptimal Policies for Opportunistic Spectrum Access: A Resource Allocation Approach

Optimal and Suboptimal Policies for Opportunistic Spectrum Access: A Resource Allocation Approach Optimal and Suboptimal Policies for Opportunistic Spectrum Access: A Resource Allocation Approach by Sahand Haji Ali Ahmad A dissertation submitted in partial fulfillment of the requirements for the degree

More information

Optimal Sleeping Mechanism for Multiple Servers with MMPP-Based Bursty Traffic Arrival

Optimal Sleeping Mechanism for Multiple Servers with MMPP-Based Bursty Traffic Arrival 1 Optimal Sleeping Mechanism for Multiple Servers with MMPP-Based Bursty Traffic Arrival Zhiyuan Jiang, Bhaskar Krishnamachari, Sheng Zhou, arxiv:1711.07912v1 [cs.it] 21 Nov 2017 Zhisheng Niu, Fellow,

More information

Optimal Transmission Strategies for Dynamic Spectrum Access in Cognitive Radio Networks. Senhua Huang, Xin Liu, and Zhi Ding

Optimal Transmission Strategies for Dynamic Spectrum Access in Cognitive Radio Networks. Senhua Huang, Xin Liu, and Zhi Ding 1 Optimal Transmission Strategies for Dynamic Spectrum Access in Cognitive Radio Networks Senhua Huang, Xin Liu, and Zhi Ding Abstract Cognitive radio offers a promising technology to mitigate spectrum

More information

Opportunistic Cooperation in Cognitive Femtocell Networks

Opportunistic Cooperation in Cognitive Femtocell Networks 1 Opportunistic Cooperation in Cognitive Femtocell Networks Rahul Urgaonkar, Member, IEEE, and Michael J. Neely, Senior Member, IEEE Abstract We investigate opportunistic cooperation between secondary

More information

Competitive Scheduling in Wireless Collision Channels with Correlated Channel State

Competitive Scheduling in Wireless Collision Channels with Correlated Channel State Competitive Scheduling in Wireless Collision Channels with Correlated Channel State Utku Ozan Candogan, Ishai Menache, Asuman Ozdaglar and Pablo A. Parrilo Abstract We consider a wireless collision channel,

More information

NOWADAYS the demand to wireless bandwidth is growing

NOWADAYS the demand to wireless bandwidth is growing 1 Online Learning with Randomized Feedback Graphs for Optimal PUE Attacks in Cognitive Radio Networks Monireh Dabaghchian, Student Member, IEEE, Amir Alipour-Fanid, Student Member, IEEE, Kai Zeng, Member,

More information

DETERMINING the information theoretic capacity of

DETERMINING the information theoretic capacity of IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 7, JULY 007 369 Transactions Letters Outage Capacity and Optimal Power Allocation for Multiple Time-Scale Parallel Fading Channels Subhrakanti

More information

Maximum Eigenvalue Detection: Theory and Application

Maximum Eigenvalue Detection: Theory and Application This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the ICC 008 proceedings Maximum Eigenvalue Detection: Theory and Application

More information

Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications

Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications Ibrahim Fawaz 1,2, Philippe Ciblat 2, and Mireille Sarkiss 1 1 LIST, CEA, Communicating Systems Laboratory,

More information

Decentralized Sequential Change Detection Using Physical Layer Fusion

Decentralized Sequential Change Detection Using Physical Layer Fusion Decentralized Sequential Change Detection Using hysical Layer Fusion Leena Zacharias ECE Department Indian Institute of Science Bangalore, India Email: zleena@ece.iisc.ernet.in ajesh Sundaresan ECE Department

More information

Markov decision processes with threshold-based piecewise-linear optimal policies

Markov decision processes with threshold-based piecewise-linear optimal policies 1/31 Markov decision processes with threshold-based piecewise-linear optimal policies T. Erseghe, A. Zanella, C. Codemo Dept. of Information Engineering, University of Padova, Italy Padova, June 2, 213

More information

Exploiting Channel Memory for Joint Estimation and Scheduling in Downlink Networks

Exploiting Channel Memory for Joint Estimation and Scheduling in Downlink Networks 1 Exploiting Channel Memory for Joint Estimation and Scheduling in Downlink Networks Wenzhuo Ouyang, Sugumar Murugesan, Atilla Eryilmaz, Ness B. Shroff arxiv:1009.3959v6 [cs.ni] 7 Dec 2011 Abstract We

More information

Optimal Decentralized Control of Coupled Subsystems With Control Sharing

Optimal Decentralized Control of Coupled Subsystems With Control Sharing IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 58, NO. 9, SEPTEMBER 2013 2377 Optimal Decentralized Control of Coupled Subsystems With Control Sharing Aditya Mahajan, Member, IEEE Abstract Subsystems that

More information

Optimal Sensing and Transmission in Energy Harvesting Sensor Networks

Optimal Sensing and Transmission in Energy Harvesting Sensor Networks University of Arkansas, Fayetteville ScholarWorks@UARK Theses and Dissertations 2-206 Optimal Sensing and Transmission in Energy Harvesting Sensor Networks Xianwen Wu University of Arkansas, Fayetteville

More information

Can Decentralized Status Update Achieve Universally Near-Optimal Age-of-Information in Wireless Multiaccess Channels?

Can Decentralized Status Update Achieve Universally Near-Optimal Age-of-Information in Wireless Multiaccess Channels? Can Decentralized Status Update Achieve Universally Near-Optimal Age-of-Information in Wireless Multiaccess Channels? Zhiyuan Jiang, Bhaskar Krishnamachari, Sheng Zhou, Zhisheng Niu, Fellow, IEEE {zhiyuan,

More information