Joint and Competitive Caching Designs in Large-Scale Multi-Tier Wireless Multicasting Networks

Size: px
Start display at page:

Download "Joint and Competitive Caching Designs in Large-Scale Multi-Tier Wireless Multicasting Networks"

Transcription

1 Joint and Competitive Caching Designs in Large-Scale Multi-Tier Wireless Multicasting Networks Zitian Wang, Zhehan Cao, Ying Cui Shanghai Jiao Tong University, China Yang Yang Intel Deutschland GmbH, Germany Abstract Caching and multicasting are two promising methods to support massive content delivery in multi-tier wireless networks. In this paper, we consider a random caching and multicasting scheme with caching distributions in the two tiers as design parameters, to achieve efficient content dissemination in a two-tier large-scale cache-enabled wireless multicasting network. First, we derive tractable expressions for the successful transmission probabilities in the general region as well as the high SNR and high user density region, respectively, utilizing tools from stochastic geometry. Then, for the case of a single operator for the two tiers, we formulate the optimal joint caching design problem to maximize the successful transmission probability in the asymptotic region, which is nonconvex in general. By using the block successive approximate optimization technique, we develop an iterative algorithm, which is shown to coverage to a stationary point. Next, for the case of two different operators, one for each tier, we formulate the competitive caching design game where each tier maximizes its successful transmission probability in the asymptotic region. We show that the game has a unique Nash equilibrium NE) and develop an iterative algorithm, which is shown to converge to the NE under a mild condition. Finally, by numerical simulations, we show that the proposed designs achieve significant gains over existing schemes. Index Terms Cache, multicast, multi-tier wireless network, stochastic geometry, optimization, game theory, Nash equilibrium I. INTRODUCTION The rapid proliferation of smart mobile devices has triggered an unprecedented growth of the global mobile data traffic. Multi-tier wireless networks have been proposed as an

2 1 effective way to meet the dramatic traffic growth by deploying different tiers of point of attachments POAs), e.g., base stations BSs) or access points APs) together, to provide better time or frequency reuse. In general, there are two scenarios, depending on whether different tiers are managed by the same operator. One typical example for the scenario of the same operator is deploying short range small-bss together with traditional macro-bss, i.e., heterogeneous wireless networks Hetnets). One typical example for the scenario of different operators is deploying IEEE APs of different owners. To further reduce the load of the core network, caching at POAs in multi-tier wireless networks is recognized as a promising approach. A lot of literature considers optimal caching design in large-scale cache-enabled Hetnets for the case of the same operator. For example, in [1] and [2], the authors focus on the maximization of the probability that the signal-to-interference plus noise ratio SINR) of a typical user is above a threshold, which does not reflect the resource sharing among users. In a special case where all tiers have the same threshold, the problem is convex and the optimal solution is obtained [1], [2]. In the general case, the problem is nonconvex. [2] simplifies the nonconvex problem to a convex one and uses the optimal solution to the simplified convex problem as a sub-optimal solution to the original nonconvex problem. In addition, some works consider competitive caching design games among different POAs [3], [4]. For instance, in [3], the authors consider an Exact Potential Game among cache-enabled femto-bss, prove the existence of Nash equilibrium NE) and propose a convergent algorithm to obtain a NE. In [4], the authors consider a mean-field game among cache-enabled small-bss, and obtain the unique mean field equilibrium. On the other hand, enabling multicast service at POAs in multi-tier wireless networks is an efficient way to deliver popular contents to multiple requesters simultaneously by effectively utilizing the broadcast nature of the wireless medium. In our previous work [5], we consider analysis and optimization of a hybrid caching and multicasting design in a large-scale cache-enabled Hetnet. The hybrid design requires the files stored at macro-bss and pico-bss to be nonoverlapping and the files stored at all macro-bss to be identical. Thus, the spatial file diversity provided by the hybrid caching design is limited, which may cause network performance degradation at some system parameters. Note that [1] [4] do not consider multicasting. In summary, further studies are required to facilitate the design of practical cache-enabled

3 2 multi-tier wireless multicasting networks for massive content dissemination. In this paper, we consider a random caching and multicasting design with caching distributions in the two tiers as the design parameters to provide high spatial file diversity, utilizing tools from stochastic geometry. Our main contributions are summarized below. For the case of a single operator for the two tiers, we formulate the optimal joint caching design problem to maximize the successful transmission probability in the asymptotic region, which is a nonconvex problem in general. By using the block successive approximate optimization technique [6], we develop an iterative algorithm to obtain a stationary point. Specifically, by carefully choosing an approximation function, we obtain the closed-form optimal solution to the approximate optimization problem in each iteration. For the case of two different operators, one for each tier, we formulate the competitive caching design game where each tier maximizes its successful transmission probability in the asymptotic region. We show that the game has a unique NE and develop an iterative algorithm to obtain the NE. We also provide a convergence condition for the iterative algorithm, which holds in most practical scenarios. Finally, by numerical simulations, we show that the proposed designs achieve significant gains over existing schemes. A. Network Model and Performance Metric II. SYSTEM MODEL We consider a general large-scale two-tier downlink network consisting of two tiers of POAs, e.g., BSs or APs, as shown in Fig. 1. The two tiers can be managed by a single operator e.g., Hetnet with BSs being POAs) or by two different operators e.g., IEEE APs of two owners). 1 The locations of the POAs in tier 1 and tier 2 are spatially distributed as two independent homogeneous Poisson point processes PPPs) Φ 1 and Φ 2 with densities λ 1 and λ 2, respectively. The locations of the users are also distributed as an independent homogeneous PPP Φ u with density λ u. Each POA in the jth tier has one transmit antenna with transmission power P j, where j = 1, 2. For notational convenience, we define σ 1 P 1 P 2 and σ 2 P 2 P 1. Each user has one receive antenna. All POAs are operating on the same frequency band with a bandwidth W Hz). Consider a discrete-time system with time being slotted and 1 The network model we considered in this paper is similar to that in [5]. But here, we consider a random caching design which is more general and includes the hybrid caching design in [5] as a special case. In addition, different from [1], [2], we specify the random caching design by the caching probabilities of file combinations, so as to investigate the file load distribution and the impact of multicasting.

4 3 POA in Tier 1 cache K 1 = 3 POA in Tier 2 cache K 2 = 2 User Signal N = 8 Fig. 1. Network model. Each file n N corresponds to a Voronoi tessellation in the same color as the file), determined by the locations and transmission powers of all POAs storing this file. study one slot of the network. Both path loss and small-scale fading are considered: for path loss, a transmitted signal from any tier with distance D is attenuated by a factor D α, where α > 2 is the path loss exponent; for small-scale fading, Rayleigh fading channels are adopted [7]. Let N {1, 2,, N} denote the set of N files in the two-tier network. For ease of illustration, assume that all files have the same size. Each file is of certain popularity, which is assumed to be identical among all users. Each user randomly requests one file, which is file n N with probability a n 0, 1), where n N a n = 1. Thus, the file popularity distribution is given by a a n ) n N, which is assumed to be known apriori. In addition, without loss of generality w.l.o.g.), assume a 1 > a 2 >... > a N. The two-tier network consists of cache-enabled POAs. In the jth tier, each POA is equipped with a cache of size K j < N to store different popular files out of N. We say every K j different files form a combination. Thus, there are in total I j N K j ) different combinations, each with Kj different files. Let I j {1, 2,, I j } denote the set of I j combinations, and let N j,i denote the set of K j files contained in combination i of tier j. B. Caching To provide high spatial file diversity, we consider a random caching design where the caching distributions in the two tiers may be different, as illustrated in Fig. 1. The probability

5 4 that combination i I j is stored in each POA of tier j is p j,i, where 0 p j,i 1, i I j, p j,i = 1. 1) i I j A random caching design in tier j is specified by the caching distribution p j p j,i ) i Ij. Let I j,n denote the set of I j,n N 1 K j 1) combinations containing file n. Let T j,n i I j,n p j,i, n N 2) denote the probability that file n is stored at a POA in the jth tier. Therefore, the random caching design in the large-scale cache-enabled two-tier network is fully specified by the design parameters p 1, p 2 ). C. Multicasting Consider a user requesting file n. If file n is not stored in any tier, the user will not be served. Otherwise adopt the following user association rules: i) If file n is stored only in the jth tier, the user is associated with the nearest POA in the jth tier storing a combination i I j,n ; ii) If file n is stored in both tiers, the user is associated with the POA which stores file n and provides the maximum long-term average received power RP) among all the POAs) [1], [2]. We consider multicasting in the large-scale cache-enabled two-tier network. Consider a POA schedules to serve requests for k different files. Then, it transmits each of the k files only once to concurrently serve users requesting the same file, at a rate τ bit/second) and over 1 k of the total bandwidth W using frequency division multiple access FDMA). As a matter of fact, both multicast and unicast may happen with different probabilities). Without loss of generality, as in [5], we refer to this transmission as multicast. Note that, by avoiding transmitting the same file multiple times to multiple users, this content-centric multicast can improve the efficiency of the utilization of the wireless medium and reduce the load of the wireless network, compared to the traditional connection-based unicast [7]. From the above illustration, we can see that the design parameters p 1, p 2 ) affect the performance of the random caching and multicasting design. D. Performance Metric In this paper, we study w.l.o.g. the performance of a typical user u 0, which is located at the origin. Suppose u 0 requests file n. Let j 0 denote the index of the tier with which u 0 is

6 5 SINR n,0 = q jp j, p j ) = n N D α j 0,l 0,0 h j 0,l 0,0 2 l Φ j0 \l 0 D α j 0,l,0 h j 0,l,0 2 + l Φ j0 D α a na j,np j, p j )Pr h j 0,l,0 j0,l,0 2 P j0 P j0 + N 0 [ W K j,n,0 log SINR n,0) τ. 3) P j0 ] j0 = j. 4) associated, and let j 0 denote the other tier. Let l 0 Φ j0 denote the index of the serving POA of u 0. We denote D j,l,0 and h d j,l,0 CN 0, 1) as the distance and the small-scale channel between POA l Φ j and u 0, respectively. We assume the complex additive white Gaussian noise of power N 0 evaluated over the entire frequency band) at u 0. When u 0 requests file n and file n is transmitted by POA l 0, the SINR of u 0 is given by 3) [5] at the top of this page. When T j,n > 0, let K j,n,0 {1,, K j } denote the number of different cached files requested by the users associated with POA l 0 Φ j. Note that K j,n,0 is a discrete random variable, whose probability mass function p.m.f.) depends on a, λ u and the design parameters p 1, p 2 ). The file can be decoded correctly at u 0 if the channel capacity between POA l 0 and u 0 is greater than or equal to τ. Requesters are mostly concerned about whether their desired files can be successfully received. Therefore, we adopt the probability that a randomly requested file by u 0 is successfully transmitted, referred to as the successful transmission probability, as the network performance metric [5]. Let A j,n p j, p j ) denote the probability that u 0 requesting file n is associated with tier j. By total probability theorem, the successful transmission probability under the considered scheme is q p 1, p 2 ) = q 1 p 1, p 2 ) + q 2 p 2, p 1 ), 5) where q j p j, p j ) is given by 4) at the top of this page and represents the probability that a randomly requested file by u 0 is successfully transmitted from a POA in tier j, also referred to as the successful transmission probability of tier j. III. PERFORMANCE ANALYSIS A. Performance Analysis in General Region In this subsection, we analyze the successful transmission probability qp 1, p 2 ) in the general region. The user association probability A j,n p j, p j ) and the cumulative distribution

7 6 ω j,n,k p j, p j ) i I j,n p j,i f j,k x, y) 2πλ j 0 X {S N j,i, n : S =k 1} m X 1 b j,m) m N j,i, n \X d exp πλ j θ 1,k x + θ 2,j,k y + θ 3,j,k ) d 2) exp b j,m. 6) ) 2 kτ W 1 d α N 0 P j ) dd. 7) θ 1,k = 2 ) 2 kτ 2 α W 1 B 2 α α, 1 2 ) kτ, 2 W 2 B α α, 1 2 ) ) ) α θ 2,j,k = 2λ ) j σ ) 2 αλ j 2 kτ α W 1 B 2 j α, 1 2 ) kτ, 2 W 2 B α α, 1 2 ) ) + λ j α σ 2 α λ. 9) j j θ 3,j,k = 2 α 2 kτ W ) 2 α 2 1 B α, 1 2 ) + 2λ ) j σ ) 2 α αλ j 2 kτ α W 2 1 B j α, 1 2 ). 10) α function c.d.f.) of SINR n,0 can be found in [1], [2]. In this paper, we analyze the p.m.f. of file load K j,n,0 by generalizing the method in [5], [7]. As in [5], [7], the dependence of the p.m.f. of K j,n,0 and the c.d.f. of SINR n,0 is ignored. Then, based on A j,n p j, p j ), c.d.f. of SINR n,0 and p.m.f. of K j,n,0, we can derive q p 1, p 2 ). Theorem 1 Performance): The successful transmission probability is q p 1, p 2 ) = q 1 p 1, p 2 )+ q 2 p 2, p 1 ), where q j p j, p j ) = n N a Kj n k=1 ω j,n,kp j, p j )f j,k T j,n, T j,n ). Here, ω j,n,k p j, p j ) is given by 6) at the top of this page with b j,m given by b j,m 1 + a ) 3.5 mλ u  j,m T j,m, T j,m ), 11) 3.5λ j  j,m T j,m, T j,m ) λ j Pj ) 2 α λ j T j,m + λ j T j,m P j 12) and N j,i, n N j,i \ {n}, and f j,k T j,n, T j,n ) is given by 7) with θ 1,k, θ 2,j,k and θ 3,j,k given by 8), 9) and 10) at the top of this page. B x, y, z) 1 z ux 1 1 u) y 1 du and Bx, y) 1 0 ux 1 1 u) y 1 du denote the complementary incomplete Beta function and the Beta function, respectively. Proof: Please refer to Appendix A. From Theorem 1, we can see that the impacts of the physical layer parameters α, W, λ 1, λ 2, λ u, manner. P 1 N 0, P 2 N 0 and the design parameters p 1, p 2 ) on qp 1, p 2 ) are coupled in a complex

8 7 B. Performance Analysis in Asymptotic Region Note that the gain of multicasting over unicasting increases with user density [5]. In this subsection, to obtain design insights into caching and multicasting, we analyze the asymptotic successful transmission probability in the high SNR and high user density region. Let P 1 N 0 and P 2 N 0 while fixing the power ratio, i.e., σ 1 σ 2 ). In addition, when λ u, K j,n,0 K j in distribution. From Theorem 1, we have the following corollary. Corollary 1 Asymptotic Performance): When P N 0 and λ u, 2 where qp 1, p 2 ) = q 1, T 1, T 2 ) + q 2, T 2, T 1 ) q T 1, T 2 ), 13) q j, T j, T j ) = n N a n T j,n θ 1,Kj T j,n + θ 2,j,Kj T j,n + θ 3,j,Kj. 14) Here, T j,n is given by 2), and θ 1,k, θ 2,j,k and θ 3,j,k are given by 8), 9) and 10). Proof: Please refer to Appendix B. Note that the asymptotic successful transmission probability in Corollary 1 and the performance metric in [1], [2] have different meanings, although they share similar forms. From Corollary 1, we can see that in the high SNR and high user density region, the impact of the physical layer parameters α, W, λ j and σ j, captured by θ 1,j, θ 2,j,Kj and θ 3,j,Kj, and the impact of the design parameters p 1, p 2 ) on q T 1, T 2 ) can be easily separated. In most practical cases, θ 1,K1, θ 1,K2 > 0. Thus, we consider θ 1,K1, θ 1,K2 > 0 in the rest of the paper. Fig. 2 verifies Theorem 1 and Corollary 1, and demonstrates the accuracy of the approximation adopted. Fig. 2 also indicates that q T 1, T 2 ) provides a simple and good approximation P for q p 1, p 2 ) in the high SNR e.g., N 0 λ u ). 120 db) and the high user density region e.g., In the asymptotic region, from [5], we know that the constraints on p 1, p 2 ) in 1) and 2) can be equivalently rewritten as T 1, T 2 ) T 1 T 2, where T j is defined as T j T j 0 T j,n 1, n N, T j,n = K j. 15) n N 2 Note that when λ u corresponding to the full file load case), q j and q become functions of T 1 and T 2 instead of p 1 and p 2.

9 8 Successful Transmission Probability Asympt Monte Carlo Analytical Transmission SNR P/N0dB) Fig. 2. Successful transmission probability versus SNR P N 0 and user density λ u. N = 10, K 1 = 3, K 2 = 2, p 1,i = ) for all i = 1, 2,, ) 10 3, p2,i = ) for all i = 1, 2,, ) 10 2, λ1 = , λ 2 = , P 1 = P, P 2 = P, α = 4, W = , τ = n and a n = γ with γ = 1. n N n γ To obtain design insights into caching in large-scale multi-tier wireless multicasting networks, in Section IV and Section V, we focus on the joint and competitive caching designs in the asymptotic region, respectively. IV. JOINT CACHING DESIGN In this section, we consider the case that the two tiers of POAs are managed by a single operator, e.g., as in a Hetnet. We first formulate the optimal joint caching design problem to maximize the successful transmission probability in the asymptotic region. Then, we develop an algorithm to obtain a stationary point. A. Optimization Problem Formulation In this subsection, we formulate the optimal joint caching design problem to maximize the successful transmission probability q T 1, T 2 ) by optimizing the caching distributions of the two tiers, i.e., T 1, T 2 ). Problem 1 Joint Caching Design): q max T 1,T 2 q T 1, T 2 ) 16) s.t. T j T j,

10 9 where q T 1, T 2 ) is given by 13) and T j is given by 15). Problem 1 maximizes a differentiable nonconcave in general) function over a convex set, and it is thus nonconvex in general. Note that Problem 1 and Problem 0 in [2] are mathematically equivalent, although this paper and [2] have different scopes. In the following subsection, we propose an efficient algorithm to solve Problem 1. In contrast, [2] simplifies the nonconvex problem to a convex one, and uses the optimal solution to the simplified problem as a sub-optimal solution to the original problem, which does not provide performance guarantee. B. Algorithm Design We can obtain a stationary point of Problem 1 using the gradient projection method GPM) with a diminishing stepsize. However, the rate of convergence of GPM is strongly dependent on the choices of stepsize. If it is chosen improperly, it may take a large number of iterations for GPM to meet some convergence criterion. To address this problem, in this subsection we propose an iterative algorithm to obtain a stationary point of Problem 1 more efficiently. Note that a stationary point is a point that satisfies the necessary optimality conditions of a nonconvex optimization problem, and it is the classic goal in the design of iterative algorithms for nonconvex optimization problems. This algorithm is based on the block successive upperbound minimization algorithm originally proposed in [6]. It alternatively updates T 1 and T 2 by maximizing an approximate function of q T 1, T 2 ), which is successively refined so that eventually the iterative algorithm can converge to a stationary point of Problem 1. Specifically, at iteration t, we update the caching distribution of the jth tier by maximizing the approximate function of q T 1, T 2 ) given the caching distribution of the jth tier, and fix the caching distribution of the jth tier. For notational convenience, we define q T j, T j ), j = 1, q T j, T j ) 17) q T j, T j ), j = 2. At iteration t, choose g j T j, T 1 t), T 2 t)) to be an approximate function of q T j, T j t)), where g j T j, T 1 t), T 2 t)) is given by 18) at the top of the next page. Note that the first concave component function of q T j, T j t)), i.e., q j, T j, T j t)) is left unchanged, and only the second nonconcave actually convex) component function, i.e., q j, T j t), T j ) is linearized at T j = T j t). This choice of approximate function is beneficial

11 10 ) g j Tj, T 1t), T ) ) ) 2t) q j, T j, T j t) + q j, T j t), T jt) + q j, T j t), T jt) Tj,n T ) j,nt) T j,n n N ) ) = q j, T j, T j t) + q j, T j t), T jt) a nθ 2,j,Kj T j,n t) T j,n T ) j,nt) ) 2. n N θ 1,Kj T j,n t) + θ 2,j,Kj T j,nt) + θ 3,j,Kj 18) g j Tjt), T 1 t), T 2 t) ) ) = q T j t), T j t), T 1t), T ) 2t) T 1 T 2. 19) g j Tj, T 1 t), T 2 t) ) ) q T j, T j t), T j T j, T 1 t), T 2 t) ) T 1 T 2. 20) g j ) ) Tj, T 1 t), T 2 t) ; d j Tj = q T j, T j ; d, d j with T jt) + d j T j. =Tj t) Tj =Tj t),t j =T j t) 21) from several aspects. Firstly, it can guarantee the convergence of the algorithm to a stationary point of Problem 1, which will be seen in Theorem 2. Secondly, the partial concavity of the original objective function is preserved as much as possible, and the resulting algorithm typically converges much faster than GPM, where all component functions are linearized and no partial concavity is exploited. Thirdly, it yields a closed-form optimal solution to the optimization problem at each iteration, which will be explained in Lemma 1. Specifically, g j T j, T 1 t), T 2 t)) is strictly concave on T j for any given T 1 t), T 2 t) ) T 1 T 2, and satisfies 3 19), 20) and 21) shown at the top of this page), where d = d j, 0) when j = 1, and d = 0, d j ) when j = 2. The conditions in 19) and 20) imply that g j T j, T 1 t), T 2 t)) is a tight lower bound of q T j, T j t)). The condition in 21) guarantees that the first order behavior of g j T j, T 1 t), T 2 t)) is the same as q T j, T j t)) locally. At each iteration t, we update the caching distribution of the jth tier given the caching distribution of the jth tier by solving the following problem, where j = t + 1) mod 2) + 1, and fix the caching distribution of the jth tier. Problem 2 Optimization at Iteration t): For tier j = t + 1) mod 2) + 1, we have T j t + 1) = argmax T j g j Tj, T 1 t), T 2 t) ) s.t. T j T j, 3 Note that the directional derivative of function r : D R, where D is a convex set, at point x in direction d is defined by r rx+δd) rx) x; d) lim inf. In addition, in 21), the directional derivative g δ 0 δ jt j, T 1t), T 2t); d j) is only with respect to T j. 20) is hold since q j, T j, T j) is a convex function of T j for any given T j T j.

12 11 Algorithm 1 Stationary Point of Problem 1 Based on BSUM 1: Initialize t = 1 and choose any T j1) T j e.g., T j,n1) = K j N 2: Compute j = t + 1) mod 2) : For all n N, compute T j,nt + 1) according to Lemma 1. 4: For all n N, set T j,n t + 1) = T j,n t). 5: Set t = t + 1 and go to Step 2. for all n N ), j = 1, 2. T j,nt + 1) = min 1 θ 1,Kj νj + a nθ 2,j,Kj T j,n t) + θ 3,j,Kj ) a nθ 2,j,Kj T j,n t) θ 1,Kj Tj,n t)+θ2,j,kj T j,n t)+θ3,j,kj ) 2 θ2,j,k j T j,n t) + θ3,j,k j θ 1,Kj +, 1, n N. 22) where g j Tj, T 1 t), T 2 t) ) is given by 18). Problem 2 is a convex optimization problem and Slater s condition is satisfied, implying that strong duality holds. Using KKT conditions, we can obtain the closed-form optimal solution to Problem 2. Lemma 1 Optimal Solution to Problem 2): The optimal solution to Problem 2 is given by 22) at the top of this page, where [x] + max{x, 0} and νj is the Lagrange multiplier that satisfies n N T j,nt + 1) = K j. Note that νj can be efficiently obtained by using bisection search. The details are summarized in Algorithm 1. Based on the conditions in 19), 20) and 21), we show the convergence of Algorithm 1. Theorem 2 Convergence of Algorithm 1): The sequence { q T 1 t), T 2 t)) } generated by Algorithm 1 is convergent, and every limit point of { T 1 t), T 2 t)) } is a stationary point of Problem 1. Proof: Please refer to Appendix C. Different from GPM, Algorithm 1 does not rely on a stepsize. Thus, Algorithm 1 may have more robust convergence performance than GPM, as we shall illustrate later in Fig. 3. V. COMPETITIVE CACHING DESIGN In this section, we study the scenario that the two tiers of POAs are managed by two different operators, e.g., IEEE APs of two owners. The two different operators have

13 12 T j,n = min 1 θ 1,Kj anθ2,j,k T + j j,n θ3,j,k ) j ν j θ2,j,k j T j,n + θ3,j,k j θ 1,Kj +, 1, n N, j = 1, 2. 24) their own interests and thus cannot be jointly managed. Besides, one operator may be sacrificed in order to achieve the maximum total utility. Therefore, we propose a game theoretic approach and adopt the NE as a desirable outcome. We first formulate the competitive caching design for the two different operators within the framework of game theory. Then, we characterize a NE of the game and develop an algorithm to obtain a NE. A. Game Formulation In this subsection, we formulate the competitive caching design for two different operators within the framework of game theory. We consider a strategic noncooperative game, where the two operators are the players. The utility function of player j is the successful transmission probability for tier j, i.e., q j, T j, T j ). Each tier j competes against the other tier j by choosing its caching distribution T j i.e., strategy or action) in the set of admissible strategies T j to maximize its utility function, i.e., q j, T j, T j ). Problem 3 Competitive Caching Game): For all j = 1, 2, we have max T j q j, T j, T j ) s.t. T j T j, where q j, T j, T j ) is given by 14) and T j is given by 15). Let G denote the game. A solution, i.e., a NE, of game G is defined as follows. Definition 1 Nash Equilibrium of Game G): A pure) strategy profile T 1, T 2) T 1 T 2 is a NE of game G if q j, T j, T j ) q j, T j, T j ), T j T j, j = 1, 2. 23) B. Algorithm Design In this subsection, we first characterize a NE of game G. Lemma 2 NE of Game G): Game G has a unique NE which is given by 24) at the top of this page, where ν j is the Lagrange multiplier that satisties n N T j,n = K j.

14 13 Algorithm 2 Nash Equilibrium of Game G 1: Initialize t = 1 and choose any T j1) T j e.g., T j,n1) = K j N 2: Compute j = t + 1) mod 2) + 1. ) 3: Compute T jt + 1) = argmax q j, T j, T j t). T j T j 4: Set T j t + 1) = T j t). 5: Set t = t + 1 and go to Step 2. for all n N ), j = 1, 2. Proof: Please refer to Appendix D. Then, we develop an iterative algorithm to obtain the NE of game G. It alternatively updates T 1 while T 2 is fixed and T 2 while T 1 is fixed by solving the following problem at each iteration t. Problem 4 Optimization at Iteration t): For player j = t + 1) mod 2) + 1, we have T j t + 1) = argmax T j q j, T j, T j t)) s.t. T j T j. The optimal solution to Problem 4 has the same form as 24) except that T j,n and T j,n are replaced by T j,n t + 1) and T j,n t), respectively. Based on the optimal solution to Problem 4, at iteration t, we update the strategy of player j = t + 1) mod 2) + 1, and fix the strategy of player j. The details for obtaining the NE of game G is summarized in Algorithm 2. Next, we provide a convergence condition for Algorithm 2. Theorem 3 Convergence of Algorithm 2): If max 1, 1 θ 1,K 1 max 1, 1 θ 1,K 2 < 4, θ 3,1,K1 θ 3,2,K2 where θ 1,k, θ 2,j,k and θ 3,j,k are given by 8), 9) and 10), Algorithm 2 converges to the unique NE of game G for all T j 1) T j, j = 1, 2, i.e., T 1 t), T 2 t)) T 1, T 2) as t, where T 1, T 2) is given by Lemma 2. Proof: Please refer to Appendix E. Note that the convergence condition given in Theorem 3 can be easily satisfied in most cases we are interested in, which will be shown in Fig. 3. VI. NUMERICAL RESULTS In the simulation, we choose W = , τ = , N = 500, α = 4, λ 1 = , λ 2 = , and P 1 P 2 = 16dB. We assume that the popularity follows

15 14 Zipf distribution, i.e., a n = n γ n N n γ, where γ is the Zipf exponent. First, we show the convergence and complexity of the proposed algorithms. Fig. 3 illustrates the successful transmission probability versus the number of iterations. From Fig. 3, we can observe that the rate of convergence of GPM is strongly dependent on the choices of stepsize ɛt). In addition, Algorithm 1 and Algorithm 2 have more robust convergence performance than GPM, as they do not rely on a stepsize. Fig. 4 illustrates the computing time versus the cache size K j and the Zipf exponent γ. From Fig. 4, we can observe that the computing times of all the algorithms do not change much with the K j or γ, and the computing times of the proposed algorithms are shorter than that of Algorithm 2 in [5] which is to obtain an asymptotically optimal hybrid caching design. These observations demonstrate the advantage of the proposed algorithms. Next, we compare the successful transmission probabilities of the proposed joint and competitive caching designs with those of three baselines. Baseline 1 most popular) refers to the design in which each POA in tier j stores the K j most popular files. Baseline 2 i.i.d. file popularity) refers to the design in which each POA in tier j randomly stores K j files, in an i.i.d. manner with file n being selected with probability a n. Baseline 3 hybrid caching) refers to the hybrid caching design obtained by Algrithm 2 in [5] which is a feasible solution to Problem 1). The three baseline schemes also adopt the same multicasting scheme as in our design. Fig. 5 illustrates the successful transmission probability versus the cache size K j and the Zipf exponent γ, respectively. From Fig. 5, we can observe that as K j and γ increases, the successful transmission probability of each scheme increases. We can also observe that the two proposed designs outperform all the three baseline schemes. In addition, we can see that when K j is large or γ is large, the two proposed designs reduce to the most popular caching design. When K j is small or γ is small, the two proposed designs perform similarly as the hybrid caching design. These observations show that the two proposed designs can well adapt to the changes of the system parameters and can wisely utilize storage resources. VII. CONCLUSION In this paper, we considered a random caching and multicasting scheme in a two-tier large-scale cache-enabled wireless multicasting network, operated by a single operator or two different operators. First, we formulated the optimal joint caching design problem in the asymptotic region. We develop an iterative algorithm, which is shown to coverage to a

16 Successful Transmission Probability Alg. 1 proposed) Alg. 2 proposed) GPM c=1000) GPM c=100) Number of Iterations Fig. 3. is ɛt) = Successful transmission probability versus number of iterations at K 2 = 35, K 1 = 55, stepsize for GPM c 2+t we choose the same initial point for all the algorithms shown in Fig Alg. 1 proposed) Alg. 2 proposed) Alg. 2 in [5] GPM Alg. 1 proposed) Alg. 2 proposed) Alg. 2 in [5] GPM Computing times) Computing times) Cache Size K2 a) cache size K 2 K 1 ) at γ = 0.55, K 1 = K Zipf Exponent γ b) Zipf exponent γ at K 2 = 35, K 1 = 55. Fig. 4. Computing time versus the cache size or Zipf exponent γ at stepsize for GPM is ɛt) = c 2+t For GPM, each point corresponds to the minimum computing time by choosing the optimal parameter c {500, 1000, 1500, 2000, 2500}. stationary point. Next, we formulated the competitive caching design game in the asymptotic region, obtained the unique NE of the game and developed an iterative algorithm, which is shown to converge to the NE under a mild condition. Finally, by numerical simulations, we showed that the two proposed designs achieve significant gains over existing schemes.

17 16 Successful Transmission Probility joint caching proposed) competitive caching proposed) most popular i.i.d file popularity hybrid caching Successful Transmission Probility joint caching proposed) competitive caching proposed) most popular i.i.d file popularity hybrid caching Cache Size K2 a) cache size K 2 K 1 ) at γ = 0.55, K 1 = K Zipf Exponent γ b) Zipf exponent γ at K 2 = 35, K 1 = 55. Fig. 5. Successful transmission probability versus the cache size or Zipf exponent γ. APPENDIX A: PROOF OF THEOREM 1 By [1] and [2], the user association probability A j,n p j, p j ) and the conditional c.d.f. of SINR n,0 are provided in the following result. Result 1 User Association Probability and Conditional c.d.f. of SINR n,0 ): The user association probability A j,n p j, p j ) is given by A j,n p j, p j ) = λ j T j,n Pj ) 2 α λ j T j,n + λ j T j,n P j and the conditional c.d.f. of SINR n,0 is given by [ ) ] Pr SINR n,0 2 kτ W 1 j 0 = j where ÂT j,n, T j,n ) is given by 12). A j,n T j,n, T j,n ), 25) = f j,kt j,n, T j,n ) ÂT j,n, T j,n ), 26) It remains to show the conditional p.m.f. of K j,n,0 in the following lemma. Lemma 3 Conditional p.m.f. of K j,n,0 ): The conditional p.m.f. of K j,n,0 given j 0 = j is given by Pr [ K j,n,0 = k j0 = j] = p j,i T j,n i I j,n X {S N j,i, n : S =k 1} m X where k = 1,, K j, and b j,m is given by 11). 1 bj,m ) m N j,i, n \X b j,m, 27)

18 17 Proof: When typical user u 0 requests file n N, let random variable Y j,m,n,i {0, 1} denote whether file m N j,i \ {n} is requested by the users associated with serving BS l 0 of tier j when BS l 0 contains combination i I j,n. When u 0 requests file n N and serving BS l 0 contains combination i I j,n, we have K j,n,0 = 1 + m N j,i, n Y j,m,n,i. Thus, we have Pr [ ] K j,n,0 = k BS l 0 tier j contains combination i I j,n = 1 Pr[Y j,m,n,i = 0]) Pr[Y j,m,n,i = 0], k = 1,, K j. X {S N j,i, n : S =k 1} m X m N j,i, n \X The probability that BS l 0 of tier j contains combination i I j,n is p j,i T j,n. Thus, we have Pr [ K j,n,0 = k ] = i I j,n 28) p j,i T j,n Pr [ K j,n,0 = k BS l 0 of tier j contains combination i I j,n ], k = 1,, Kj. It remains to calculate Pr[Y j,m,n,i = 0]. The p.m.f. of Y j,m,n,i depends on the p.d.f. of the size of the Voronoi cell of BS l 0 of tier j w.r.t. file m N j,i, n when BS l 0 contains combination i I j,n, which is unknown. We approximate this p.d.f. based on the known result of the p.d.f. of the size of the Voronoi cell to which a randomly chosen user belongs [8, Lemma 3]. Thus, we have 4 Pr[Y j,m,n,i = 0] = 1 + ) a m λ u A j,m T j,m, T j,m 3.5T j,m λ j 3.5 = b j,m. 29) Based on Result 1 and Lemma 3, we can derive the successful transmission probability q p 1, p 2 ) according to 4) and show Theorem 1. APPENDIX B: PROOF OF COROLLARY 1 ) When P 1 N 0 and P 2 N 0, we have exp 2 kτ W 1 ) exp 2 kτ W 1 d α N 0 P 1 ) 1 and d α N 0 P 2 ) 1. When λ u, we have K j,n,0 K j in distribution. Noting that d exp cd 2) dd = 1, we can solve integrals in 7). Thus, we can prove 0 2c Corollary 1. ) ) 4 Note that  j,m T j,m, T j,m = A j,m T j,m,t j,m T j,m.

19 18 APPENDIX C: PROOF OF THEOREM 2 We show that the conditions in Theorem 2 a) of [6] hold. i) By noting that 19), 20) and 21) hold and g j Tj, T 1 t), T 2 t) ) is continuous, we know that Assumption 2 in [6] is satisfied. ii) Since g j Tj, T 1 t), T 2 t) ) is strictly concave on T j for any given T 1 t), T 2 t) ) T 1 T 2, Problem 2 has a unique solution for any given T 1 t), T 2 t) ) T 1 T 2. iii) For all d d 1, d 2 ) satisfying q T1, T 2 ; d 1, 0) ) 0 and q T1, T 2 ; 0, d 2 ) ) 0, d j R N, j = 1, 2, we have T 1, T 2 ; d ) = q q T 1, T 2 ), d = q T 1, T 2 ), d 1, 0) + q T 1, T 2 ), 0, d 2 ) = q T1, T 2 ; d 1, 0) ) + q T1, T 2 ; 0, d 2 ) ) 0. 30) Thus, q T 1, T 2 ) is regular at any point in T 1 T 2 [6]. Therefore, by Theorem 2 a) in [6], we can prove Theorem 2. APPENDIX D: PROOF OF LEMMA 2 First, we use Proposition 20.3 in [9] to prove the existence of NE of game G. It is obvious that for all j = 1, 2, the set of admissible strategies T j is nonempty, compact and convex, and the utility function q j, T j, T j ) is a continuous function of T 1, T 2 ). Since q j, T j, T j ) is strictly concave on T j for any given T j T j, then q j, T j, T j ) is quasi-concave on T j for any given T j T j. Thus, by Proposition 20.3 in [9], we know that there exists at least one NE of game G. Next, we prove the uniqueness of NE by Theorem 2 in [10]. By the first order strict concavity condition, we know that a strictly concave function must be diagonally strictly concave [10]. Thus, by Theorem 2 in [10], we know that there exists a unique NE of game G. Last, we characterize T 1, T 2). By Definition 1, we know that for all j = 1, 2, T j = argmax q j, T j, T ), 31) j T j s.t. T j T j. 32) Since q j, T j, T j ) is strictly concave on T j for any given T j T j, this optimization problem is convex and Slater s condition is satisfied, implying that strong duality holds. Using KKT conditions, we can solve the problem and show Lemma 2.

20 19 APPENDIX E: PROOF OF THEOREM 3 We prove the convergence of Algorithm 2 by verifying the conditions in Theorem 1 of [11]. i) It can be easily seen that for all j = 1, 2, q j, T j, T j ) is strictly concave on T j for any given T j T j and is second order Fréchet differentiable [12]. ii) By the discussion of optimal solution to Problem 4 in Section V-B, we know that there exists an optimal solution to Problem 4 for any given T j t) T j. iii) To guarantee the convergence of Algorithm 2, it remains to show that 2 q T j, T 2 j, T j j )) 1 2 T j T q j, T j, T j j ) 2 q T 2 j, T j, T j )) 1 2 T T j j j q j, T j, T j ) T j =T j t+2),t j =T j t+1) T j =T j t),t j =T j t+1) = ζ < 1 33) 2 holds for any T j t) T j and t + 1) mod 2) + 1 = j. Here, 2 denotes the spectral norm [12]. By Corollary 1, we have 2 q T j, T 2 j, T j j )) 1 2 T j T q j, T j, T j j ) 2 q T 2 j, T j, T j )) 1 2 T T j j j q j, T j, T j ) T j =T j t+2),t j =T j t+1) T j =T j t),t =T t+1) j j 2 ) a) = diag θ 2,j,Kj θ 2,j,Kj θ 1,Kj T j,n t + 2) θ 1,Kj T j,n t + 1) 1 1 4θ 1,Kj θ 1,Kj θ 2,j,Kj T j,n t + 1) + θ 3,j,Kj θ 2,j,Kj T j,n t) + θ 3,j,Kj ) b) θ 2,j,Kj θ 2,j,Kj θ 1,Kj T j,n t + 2) θ 1,Kj T j,n t + 1) = max 1 1 n N 4θ 1,Kj θ 1,Kj θ 2,j,Kj T j,n t + 1) + θ 3,j,Kj θ 2,j,Kj T j,n t) + θ 3,j,Kj c) 1 4 max n N 1 θ 1,Kj T j,n t + 2) θ 2,j,Kj T j,n t + 1) + θ 3,j,Kj max n N 1 θ 1,Kj T j,n t + 1) θ 2,j,Kj T j,n t) + θ 3,j,Kj d) 1 4 max 1, 1 θ 1,K j θ 3,j,Kj max 1, 1 θ 1,Kj θ < 1, 34) 3,j,Kj where a) is obtained by the definition of second order derivative, b) is obtained by the definition of spectral norm, c) is obtained based on the formula max x ny n max x n max y n, 35) n N n N n N n N 2

21 20 where x n, y n R for all n N, and by noting that θ 2,j,K j θ 2,j,Kj 4θ 1,Kj θ 1,Kj to 1 θ 1,K j θ 3,j,Kj 1 θ 1,K j θ 3,j,Kj 1 1 Therefore, by Theorem 1 of [6], we can prove Theorem 3. = 1, and d) is obtained due 4 θ 1,Kj T j,n t + 2) θ 2,j,Kj T j,n t + 1) + θ 3,j,Kj 1, 36) θ 1,Kj T j,n t + 1) θ 2,j,Kj T j,n t) + θ 3,j,Kj 1. 37) REFERENCES [1] K. Li, C. Yang, Z. Chen, and M. Tao, Optimization and analysis of probabilistic caching in n-tier heterogeneous networks, arxiv preprint arxiv: , [2] J. Wen, K. Huang, S. Yang, and V. O. Li, Cache-enabled heterogeneous cellular networks: Optimal tier-level content placement, arxiv preprint arxiv: , [3] Y. Tan, Y. Yuan, T. Yang, Y. Xu, and B. Hu, Femtocaching in wireless video networks: Distributed framework based on exact potential game, in Communications in China ICCC), 2016 IEEE/CIC International Conference on. IEEE, 2016, pp [4] H. Kim, J. Park, M. Bennis, S.-L. Kim, and M. Debbah, Ultra-dense edge caching under spatio-temporal demand and network dynamics, arxiv preprint arxiv: , [5] Y. Cui and D. Jiang, Analysis and optimization of caching and multicasting in large-scale cache-enabled heterogeneous wireless networks, IEEE Trans. Wireless Commun., vol. 16, no. 1, pp , [6] M. Razaviyayn, M. Hong, and Z.-Q. Luo, A unified convergence analysis of block successive minimization methods for nonsmooth optimization, SIAM Journal on Optimization, vol. 23, no. 2, pp , [7] S. Singh, H. S. Dhillon, and J. G. Andrews, Offloading in heterogeneous networks: modeling, analysis, and design insights, IEEE Trans. Wireless Commun., vol. 12, no. 5, pp , March [8] S. M. Yu and S.-L. Kim, Downlink capacity and base station density in cellular networks, in Modeling Optimization in Mobile, Ad Hoc Wireless Networks WiOpt), th International Symposium on, May 2013, pp [9] M. J. Osborne and A. Rubinstein, A course in game theory. MIT press, [10] J. B. Rosen, Existence and uniqueness of equilibrium points for concave n-person games, Econometrica: Journal of the Econometric Society, pp , [11] S. Li and T. Başar, Distributed algorithms for the computation of noncooperative equilibria, Automatica, vol. 23, no. 4, pp , [12] D. G. Luenberger, Optimization by vector space methods. John Wiley & Sons, 1969.

Joint and Competitive Caching Designs in Large-Scale Multi-Tier Wireless Multicasting Networks

Joint and Competitive Caching Designs in Large-Scale Multi-Tier Wireless Multicasting Networks Joint and Competitive Caching Designs in Large-Scale Multi-Tier Wireless Multicasting Networks Zitian Wang, Zhehan Cao, Ying Cui Shanghai Jiao Tong University, China Yang Yang Intel Deutschland GmbH, Germany

More information

Analysis and Optimization of Caching and Multicasting for Multi-Quality Videos in Large-Scale Wireless Networks

Analysis and Optimization of Caching and Multicasting for Multi-Quality Videos in Large-Scale Wireless Networks Analysis and Optimization of Caching and Multicasting for Multi-Quality Videos in Large-Scale Wireless Networks Dongdong Jiang, Student Member, IEEE and Ying Cui, Member, IEEE Abstract Efficient dissemination

More information

Stochastic Content-Centric Multicast Scheduling for Cache-Enabled Heterogeneous Cellular Networks

Stochastic Content-Centric Multicast Scheduling for Cache-Enabled Heterogeneous Cellular Networks 1 Stochastic Content-Centric Multicast Scheduling for Cache-Enabled Heterogeneous Cellular Networks Bo Zhou, Ying Cui, Member, IEEE, and Meixia Tao, Senior Member, IEEE Abstract Caching at small base stations

More information

Average Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations

Average Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations Average Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations Rui Wang, Jun Zhang, S.H. Song and K. B. Letaief, Fellow, IEEE Dept. of ECE, The Hong Kong University of Science

More information

Cache-Enabled Heterogeneous Cellular Networks: Optimal Tier- Level Content Placement. Title. Wen, W; Huang, K; Yang, S.; Li, VOK

Cache-Enabled Heterogeneous Cellular Networks: Optimal Tier- Level Content Placement. Title. Wen, W; Huang, K; Yang, S.; Li, VOK Title Cache-Enabled Heterogeneous Cellular Networks: Optimal Tier- Level Content Placement Author(s) Wen, W; Huang, K; Yang, S.; Li, VOK Citation IEEE Transactions on Wireless Communications, 2017, v.

More information

Call Completion Probability in Heterogeneous Networks with Energy Harvesting Base Stations

Call Completion Probability in Heterogeneous Networks with Energy Harvesting Base Stations Call Completion Probability in Heterogeneous Networks with Energy Harvesting Base Stations Craig Wang, Salman Durrani, Jing Guo and Xiangyun (Sean) Zhou Research School of Engineering, The Australian National

More information

Applications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012

Applications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012 Applications of Robust Optimization in Signal Processing: Beamforg and Power Control Fall 2012 Instructor: Farid Alizadeh Scribe: Shunqiao Sun 12/09/2012 1 Overview In this presentation, we study the applications

More information

Caching Policy Toward Maximal Success Probability and Area Spectral Efficiency of Cache-enabled HetNets

Caching Policy Toward Maximal Success Probability and Area Spectral Efficiency of Cache-enabled HetNets 1 Caching Policy Toward Maximal Success Probability and Area Spectral Efficiency of Cache-enabled HetNets Dong Liu and Chenyang Yang Abstract In this paper, we investigate the optimal caching policy respectively

More information

User Association with Unequal User Priorities in Heterogeneous Cellular Networks

User Association with Unequal User Priorities in Heterogeneous Cellular Networks User Association with Unequal User Priorities in Heterogeneous Cellular Networks Youjia Chen, Jun Li, Member, IEEE, Zihuai Lin, Senior Member, IEEE, Guoqiang Mao, Senior Member, IEEE, and Branka Vucetic,

More information

Energy-Efficient Resource Allocation for Multi-User Mobile Edge Computing

Energy-Efficient Resource Allocation for Multi-User Mobile Edge Computing Energy-Efficient Resource Allocation for Multi-User Mobile Edge Computing Junfeng Guo, Zhaozhe Song, Ying Cui Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, P. R. China

More information

PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS. Pratik Patil, Binbin Dai, and Wei Yu

PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS. Pratik Patil, Binbin Dai, and Wei Yu PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS Pratik Patil, Binbin Dai, and Wei Yu Department of Electrical and Computer Engineering University of Toronto,

More information

Optimal Geographical Caching in Heterogeneous Cellular Networks

Optimal Geographical Caching in Heterogeneous Cellular Networks 1 Optimal Geographical Caching in Heterogeneous Cellular Networks Berksan Serbetci, and Jasper Goseling arxiv:1710.09626v2 [cs.ni] 22 Nov 2018 Abstract We investigate optimal geographical caching in heterogeneous

More information

Resource Management and Interference Control in Distributed Multi-Tier and D2D Systems. Ali Ramezani-Kebrya

Resource Management and Interference Control in Distributed Multi-Tier and D2D Systems. Ali Ramezani-Kebrya Resource Management and Interference Control in Distributed Multi-Tier and D2D Systems by Ali Ramezani-Kebrya A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy

More information

Optimization in Wireless Communication

Optimization in Wireless Communication Zhi-Quan (Tom) Luo Department of Electrical and Computer Engineering University of Minnesota 200 Union Street SE Minneapolis, MN 55455 2007 NSF Workshop Challenges Optimization problems from wireless applications

More information

Optimal Power Control in Decentralized Gaussian Multiple Access Channels

Optimal Power Control in Decentralized Gaussian Multiple Access Channels 1 Optimal Power Control in Decentralized Gaussian Multiple Access Channels Kamal Singh Department of Electrical Engineering Indian Institute of Technology Bombay. arxiv:1711.08272v1 [eess.sp] 21 Nov 2017

More information

Machine-Type Communication with Random Access and Data Aggregation: A Stochastic Geometry Approach

Machine-Type Communication with Random Access and Data Aggregation: A Stochastic Geometry Approach Machine-Type Communication with Random Access and Data Aggregation: A Stochastic Geometry Approach Jing Guo, Salman Durrani, Xiangyun Zhou, and Halim Yanikomeroglu Research School of Engineering, The Australian

More information

Massive MIMO for Maximum Spectral Efficiency Mérouane Debbah

Massive MIMO for Maximum Spectral Efficiency Mérouane Debbah Security Level: Massive MIMO for Maximum Spectral Efficiency Mérouane Debbah www.huawei.com Mathematical and Algorithmic Sciences Lab HUAWEI TECHNOLOGIES CO., LTD. Before 2010 Random Matrices and MIMO

More information

Game Theoretic Approach to Power Control in Cellular CDMA

Game Theoretic Approach to Power Control in Cellular CDMA Game Theoretic Approach to Power Control in Cellular CDMA Sarma Gunturi Texas Instruments(India) Bangalore - 56 7, INDIA Email : gssarma@ticom Fernando Paganini Electrical Engineering Department University

More information

Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels

Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels Jung Hoon Lee and Huaiyu Dai Department of Electrical and Computer Engineering, North Carolina State University,

More information

Gibbsian On-Line Distributed Content Caching Strategy for Cellular Networks

Gibbsian On-Line Distributed Content Caching Strategy for Cellular Networks Gibbsian On-Line Distributed Content Caching Strategy for Cellular Networks Arpan Chattopadhyay, Bartłomiej Błaszczyszyn, H. Paul Keeler arxiv:1610.02318v2 [cs.ni] 6 Nov 2017 Abstract In this paper, we

More information

Mobile Network Energy Efficiency Optimization in MIMO Multi-Cell Systems

Mobile Network Energy Efficiency Optimization in MIMO Multi-Cell Systems 1 Mobile Network Energy Efficiency Optimization in MIMO Multi-Cell Systems Yang Yang and Dario Sabella Intel Deutschland GmbH, Neubiberg 85579, Germany. Emails: yang1.yang@intel.com, dario.sabella@intel.com

More information

Outage and Capacity of Heterogeneous Cellular Networks with Intra-tier Dependence

Outage and Capacity of Heterogeneous Cellular Networks with Intra-tier Dependence Outage and Capacity of Heterogeneous Cellular Networks with Intra-tier Dependence Na Deng, Wuyang Zhou Dept. of Electronic Engineering and Information Science University of Science and Technology of China

More information

THE dramatically increased mobile traffic can easily lead

THE dramatically increased mobile traffic can easily lead IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 34, NO. 12, DECEMBER 2016 3127 Dynamic Base Station Operation in Large-Scale Green Cellular Networks Yue Ling Che, Member, IEEE, Lingjie Duan, Member,

More information

ECE Optimization for wireless networks Final. minimize f o (x) s.t. Ax = b,

ECE Optimization for wireless networks Final. minimize f o (x) s.t. Ax = b, ECE 788 - Optimization for wireless networks Final Please provide clear and complete answers. PART I: Questions - Q.. Discuss an iterative algorithm that converges to the solution of the problem minimize

More information

6.254 : Game Theory with Engineering Applications Lecture 7: Supermodular Games

6.254 : Game Theory with Engineering Applications Lecture 7: Supermodular Games 6.254 : Game Theory with Engineering Applications Lecture 7: Asu Ozdaglar MIT February 25, 2010 1 Introduction Outline Uniqueness of a Pure Nash Equilibrium for Continuous Games Reading: Rosen J.B., Existence

More information

Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems

Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems 2382 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL 59, NO 5, MAY 2011 Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems Holger Boche, Fellow, IEEE,

More information

NOMA: An Information Theoretic Perspective

NOMA: An Information Theoretic Perspective NOMA: An Information Theoretic Perspective Peng Xu, Zhiguo Ding, Member, IEEE, Xuchu Dai and H. Vincent Poor, Fellow, IEEE arxiv:54.775v2 cs.it] 2 May 25 Abstract In this letter, the performance of non-orthogonal

More information

Analysis of Urban Millimeter Wave Microcellular Networks

Analysis of Urban Millimeter Wave Microcellular Networks Analysis of Urban Millimeter Wave Microcellular Networks Yuyang Wang, KiranVenugopal, Andreas F. Molisch, and Robert W. Heath Jr. The University of Texas at Austin University of Southern California TheUT

More information

Revisiting Frequency Reuse towards Supporting Ultra-Reliable Ubiquitous-Rate Communication

Revisiting Frequency Reuse towards Supporting Ultra-Reliable Ubiquitous-Rate Communication The 7 International Workshop on Spatial Stochastic Models for Wireless Networks SpaSWiN Revisiting Frequency Reuse towards Supporting Ultra-Reliable Ubiquitous-Rate Communication Jihong Park, Dong Min

More information

Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks

Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks Marco Moretti, Andrea Abrardo Dipartimento di Ingegneria dell Informazione, University of Pisa, Italy

More information

Dynamic Spectrum Leasing with Two Sellers

Dynamic Spectrum Leasing with Two Sellers Dynamic Spectrum Leasing with Two Sellers Rongfei Fan, Member, IEEE, Wen Chen, Hai Jiang, Senior Member, IEEE, Jianping An, Member, IEEE, Kai Yang, Member, IEEE, and Chengwen Xing, Member, IEEE arxiv:62.05702v

More information

A Tractable Approach to Uplink Spectral Efficiency of Two-Tier Massive MIMO Cellular HetNets

A Tractable Approach to Uplink Spectral Efficiency of Two-Tier Massive MIMO Cellular HetNets A Tractable Approach to Uplink Spectral Efficiency of Two-Tier Massive MIMO Cellular etnets Liu, W, Jin, S, Wen, C-K, Matthaiou, M, & You, X 06 A Tractable Approach to Uplink Spectral Efficiency of Two-Tier

More information

Exploiting Mobility in Cache-Assisted D2D Networks: Performance Analysis and Optimization

Exploiting Mobility in Cache-Assisted D2D Networks: Performance Analysis and Optimization 1 Exploiting Mobility in Cache-Assisted D2D Networks: Performance Analysis and Optimization Rui Wang, Jun Zhang, Senior Member, IEEE, S.H. Song, Member, IEEE, and arxiv:1806.04069v1 [cs.it] 11 Jun 2018

More information

Channel Allocation Using Pricing in Satellite Networks

Channel Allocation Using Pricing in Satellite Networks Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract

More information

Game Theoretic Solutions for Precoding Strategies over the Interference Channel

Game Theoretic Solutions for Precoding Strategies over the Interference Channel Game Theoretic Solutions for Precoding Strategies over the Interference Channel Jie Gao, Sergiy A. Vorobyov, and Hai Jiang Department of Electrical & Computer Engineering, University of Alberta, Canada

More information

DOWNLINK transmit beamforming has recently received

DOWNLINK transmit beamforming has recently received 4254 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 8, AUGUST 2010 A Dual Perspective on Separable Semidefinite Programming With Applications to Optimal Downlink Beamforming Yongwei Huang, Member,

More information

Optimal Power Allocation for Parallel Gaussian Broadcast Channels with Independent and Common Information

Optimal Power Allocation for Parallel Gaussian Broadcast Channels with Independent and Common Information SUBMIED O IEEE INERNAIONAL SYMPOSIUM ON INFORMAION HEORY, DE. 23 1 Optimal Power Allocation for Parallel Gaussian Broadcast hannels with Independent and ommon Information Nihar Jindal and Andrea Goldsmith

More information

Green Heterogeneous Networks through Dynamic Small-Cell Operation

Green Heterogeneous Networks through Dynamic Small-Cell Operation Green Heterogeneous Networks through Dynamic Small-Cell Operation Shijie Cai, Yueling Che, Member, IEEE, Lingjie Duan, Member, IEEE, Jing Wang, Member, IEEE, Shidong Zhou, Member, IEEE, and Rui Zhang,

More information

MULTI-INPUT multi-output (MIMO) channels, usually

MULTI-INPUT multi-output (MIMO) channels, usually 3086 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 57, NO. 8, AUGUST 2009 Worst-Case Robust MIMO Transmission With Imperfect Channel Knowledge Jiaheng Wang, Student Member, IEEE, and Daniel P. Palomar,

More information

AN EXTERNALITY BASED DECENTRALIZED OPTIMAL POWER ALLOCATION SCHEME FOR WIRELESS MESH NETWORKS

AN EXTERNALITY BASED DECENTRALIZED OPTIMAL POWER ALLOCATION SCHEME FOR WIRELESS MESH NETWORKS AN EXTERNALITY BASED DECENTRALIZED OPTIMAL POWER ALLOCATION SCHEME FOR WIRELESS MESH NETWORKS Shruti Sharma and Demos Teneketzis Department of Electrical Engineering and Computer Science University of

More information

Uplink Performance Analysis of Dense Cellular Networks with LoS and NLoS Transmissions

Uplink Performance Analysis of Dense Cellular Networks with LoS and NLoS Transmissions Uplink Performance Analysis of Dense Cellular Networks with LoS and os ransmissions ian Ding, Ming Ding, Guoqiang Mao, Zihuai Lin, David López-Pérez School of Computing and Communications, he University

More information

Information Theory Meets Game Theory on The Interference Channel

Information Theory Meets Game Theory on The Interference Channel Information Theory Meets Game Theory on The Interference Channel Randall A. Berry Dept. of EECS Northwestern University e-mail: rberry@eecs.northwestern.edu David N. C. Tse Wireless Foundations University

More information

Energy-Efficient Resource Allocation for

Energy-Efficient Resource Allocation for Energy-Efficient Resource Allocation for 1 Wireless Powered Communication Networks Qingqing Wu, Student Member, IEEE, Meixia Tao, Senior Member, IEEE, arxiv:1511.05539v1 [cs.it] 17 Nov 2015 Derrick Wing

More information

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS The 8th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 7) STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS Ka-Hung

More information

NOMA: Principles and Recent Results

NOMA: Principles and Recent Results NOMA: Principles and Recent Results Jinho Choi School of EECS GIST September 2017 (VTC-Fall 2017) 1 / 46 Abstract: Non-orthogonal multiple access (NOMA) becomes a key technology in 5G as it can improve

More information

Distributed Joint Offloading Decision and Resource Allocation for Multi-User Mobile Edge Computing: A Game Theory Approach

Distributed Joint Offloading Decision and Resource Allocation for Multi-User Mobile Edge Computing: A Game Theory Approach Distributed Joint Offloading Decision and Resource Allocation for Multi-User Mobile Edge Computing: A Game Theory Approach Ning Li, Student Member, IEEE, Jose-Fernan Martinez-Ortega, Gregorio Rubio Abstract-

More information

Success Probability and Area Spectral Efficiency in Multiuser MIMO HetNets

Success Probability and Area Spectral Efficiency in Multiuser MIMO HetNets Success Probability and Area Spectral Efficiency in Multiuser MIMO HetNets Chang Li, Student Member, IEEE, Jun Zhang, Senior Member, IEEE, Jeffrey G. Andrews Fellow, IEEE, and Khaled B. Letaief, Fellow,

More information

Pricing and Resource Allocation via Game Theory for a Small-Cell Video Caching System

Pricing and Resource Allocation via Game Theory for a Small-Cell Video Caching System IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, ACCEPTED FOR PUBLICATION Pricing and Resource Allocation via Game Theory for a Small-Cell Video Caching System Jun Li, Member, IEEE, He Henry Chen, Member,

More information

Ressource Allocation Schemes for D2D Communications

Ressource Allocation Schemes for D2D Communications 1 / 24 Ressource Allocation Schemes for D2D Communications Mohamad Assaad Laboratoire des Signaux et Systèmes (L2S), CentraleSupélec, Gif sur Yvette, France. Indo-french Workshop on D2D Communications

More information

Sum-Rate Capacity of Poisson MIMO Multiple-Access Channels

Sum-Rate Capacity of Poisson MIMO Multiple-Access Channels 1 Sum-Rate Capacity of Poisson MIMO Multiple-Access Channels Ain-ul-Aisha, Lifeng Lai, Yingbin Liang and Shlomo Shamai (Shitz Abstract In this paper, we analyze the sum-rate capacity of two-user Poisson

More information

Two-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems

Two-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems Two-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems Behrouz Khoshnevis and Wei Yu Department of Electrical and Computer Engineering University of Toronto, Toronto, Ontario,

More information

Signaling Design of Two-Way MIMO Full-Duplex Channel: Optimality Under Imperfect Transmit Front-End Chain

Signaling Design of Two-Way MIMO Full-Duplex Channel: Optimality Under Imperfect Transmit Front-End Chain DRAFT 1 Signaling Design of Two-Way MIMO Full-Duplex Channel: Optimality Under Imperfect Transmit Front-End Chain Shuqiao Jia and Behnaam Aazhang, arxiv:1506.00330v1 [cs.it] 1 Jun 2015 Abstract We derive

More information

Coded Caching for Multi-level Popularity and Access

Coded Caching for Multi-level Popularity and Access Coded Caching for Multi-level Popularity and Access Jad Hachem, Student Member, IEEE, Nikhil Karamchandani, Member, IEEE, and Suhas Diggavi, Fellow, IEEE Abstract arxiv:4046563v2 [csit] 3 Dec 205 To address

More information

Front Inform Technol Electron Eng

Front Inform Technol Electron Eng Interference coordination in full-duplex HetNet with large-scale antenna arrays Zhao-yang ZHANG, Wei LYU Zhejiang University Key words: Massive MIMO; Full-duplex; Small cell; Wireless backhaul; Distributed

More information

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,

More information

4888 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY 2016

4888 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY 2016 4888 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY 2016 Online Power Control Optimization for Wireless Transmission With Energy Harvesting and Storage Fatemeh Amirnavaei, Student Member,

More information

Under sum power constraint, the capacity of MIMO channels

Under sum power constraint, the capacity of MIMO channels IEEE TRANSACTIONS ON COMMUNICATIONS, VOL 6, NO 9, SEPTEMBER 22 242 Iterative Mode-Dropping for the Sum Capacity of MIMO-MAC with Per-Antenna Power Constraint Yang Zhu and Mai Vu Abstract We propose an

More information

Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks

Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks Syracuse University SURFACE Dissertations - ALL SURFACE June 2017 Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks Yi Li Syracuse University Follow this and additional works

More information

Optimal Linear Precoding Strategies for Wideband Non-Cooperative Systems based on Game Theory-Part II: Algorithms

Optimal Linear Precoding Strategies for Wideband Non-Cooperative Systems based on Game Theory-Part II: Algorithms Optimal Linear Precoding Strategies for Wideband Non-Cooperative Systems based on Game Theory-Part II: Algorithms Gesualdo Scutari 1, Daniel P. Palomar 2, and Sergio Barbarossa 1 E-mail: {scutari,sergio}@infocom.uniroma1.it,

More information

Cell throughput analysis of the Proportional Fair scheduler in the single cell environment

Cell throughput analysis of the Proportional Fair scheduler in the single cell environment Cell throughput analysis of the Proportional Fair scheduler in the single cell environment Jin-Ghoo Choi and Seawoong Bahk IEEE Trans on Vehicular Tech, Mar 2007 *** Presented by: Anh H. Nguyen February

More information

Node-based Distributed Optimal Control of Wireless Networks

Node-based Distributed Optimal Control of Wireless Networks Node-based Distributed Optimal Control of Wireless Networks CISS March 2006 Edmund M. Yeh Department of Electrical Engineering Yale University Joint work with Yufang Xi Main Results Unified framework for

More information

Optimal Power Allocation With Statistical QoS Provisioning for D2D and Cellular Communications Over Underlaying Wireless Networks

Optimal Power Allocation With Statistical QoS Provisioning for D2D and Cellular Communications Over Underlaying Wireless Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, ACCEPTED AND TO APPEAR IN 05 Optimal Power Allocation With Statistical QoS Provisioning for DD and Cellular Communications Over Underlaying Wireless Networks

More information

Uniqueness of Generalized Equilibrium for Box Constrained Problems and Applications

Uniqueness of Generalized Equilibrium for Box Constrained Problems and Applications Uniqueness of Generalized Equilibrium for Box Constrained Problems and Applications Alp Simsek Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology Asuman E.

More information

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels TO APPEAR IEEE INTERNATIONAL CONFERENCE ON COUNICATIONS, JUNE 004 1 Dirty Paper Coding vs. TDA for IO Broadcast Channels Nihar Jindal & Andrea Goldsmith Dept. of Electrical Engineering, Stanford University

More information

Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University

Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Joint work with Jinbei Zhang (SJTU), Chih-Chun Wang (Purdue) and Xinbing Wang (SJTU)

More information

Capacity and Scheduling in Small-Cell HetNets

Capacity and Scheduling in Small-Cell HetNets Capacity and Scheduling in Small-Cell HetNets Stephen Hanly Macquarie University North Ryde, NSW 2109 Joint Work with Sem Borst, Chunshan Liu and Phil Whiting Tuesday, January 13, 2015 Hanly Capacity and

More information

Optimal Resource Allocation for Multi-User MEC with Arbitrary Task Arrival Times and Deadlines

Optimal Resource Allocation for Multi-User MEC with Arbitrary Task Arrival Times and Deadlines Optimal Resource Allocation for Multi-User MEC with Arbitrary Task Arrival Times and Deadlines Xinyun Wang, Ying Cui, Zhi Liu, Junfeng Guo, Mingyu Yang Abstract In this paper, we would like to investigate

More information

Cognitive Hierarchy Theory for Distributed Resource Allocation in the Internet of Things

Cognitive Hierarchy Theory for Distributed Resource Allocation in the Internet of Things 1 Cognitive Hierarchy Theory for Distributed Resource Allocation in the Internet of Things Nof Abuzainab, Walid Saad, Senior Member, IEEE, Choong Seong Hong, Senior Member, IEEE, and H. Vincent Poor, Life

More information

Asymptotics and Meta-Distribution of the Signal-to-Interference Ratio in Wireless Networks

Asymptotics and Meta-Distribution of the Signal-to-Interference Ratio in Wireless Networks Asymptotics and Meta-Distribution of the Signal-to-Interference Ratio in Wireless Networks Part II Martin Haenggi University of Notre Dame, IN, USA EPFL, Switzerland 25 Simons Conference on Networks and

More information

Autonomous Uplink Intercell Interference Coordination in OFDMA-based Wireless Systems

Autonomous Uplink Intercell Interference Coordination in OFDMA-based Wireless Systems Autonomous Uplink Intercell Interference Coordination in OFDMA-based Wireless Systems Department of Electronics and Communications Engineering, Egypt WiOpt 11th Intl. Symposium on Modeling and Optimization

More information

Policy Optimization for Content Push via. Energy Harvesting Small Cells in Heterogeneous Networks

Policy Optimization for Content Push via. Energy Harvesting Small Cells in Heterogeneous Networks Policy Optimization for Content Push via 1 Energy Harvesting Small Cells in Heterogeneous Networks arxiv:1611.02380v1 [cs.it] 8 Nov 2016 Jie Gong Member, IEEE, Sheng Zhou Member, IEEE, Zhenyu Zhou Member,

More information

SIR Distribution and Scheduling Gain of Normalized SNR Scheduling in Poisson Networks

SIR Distribution and Scheduling Gain of Normalized SNR Scheduling in Poisson Networks SIR Distribution and Scheduling Gain of Normalized SNR Scheduling in Poisson Networs Koji Yamamoto Graduate School of Informatics, Kyoto University Yoshida-honmachi, Sayo-u, Kyoto, 66-85 Japan yamamot@i.yoto-u.ac.jp

More information

Joint Downlink Base Station Association and Power Control for Max-Min Fairness: Computation and Complexity

Joint Downlink Base Station Association and Power Control for Max-Min Fairness: Computation and Complexity Industrial and Manufacturing Systems Engineering Publications Industrial and Manufacturing Systems Engineering 2015 Joint Downlin Base Station Association and Power Control for Max-Min Fairness: Computation

More information

Power Control in Multi-Carrier CDMA Systems

Power Control in Multi-Carrier CDMA Systems A Game-Theoretic Approach to Energy-Efficient ower Control in Multi-Carrier CDMA Systems Farhad Meshkati, Student Member, IEEE, Mung Chiang, Member, IEEE, H. Vincent oor, Fellow, IEEE, and Stuart C. Schwartz,

More information

Multiuser Downlink Beamforming: Rank-Constrained SDP

Multiuser Downlink Beamforming: Rank-Constrained SDP Multiuser Downlink Beamforming: Rank-Constrained SDP Daniel P. Palomar Hong Kong University of Science and Technology (HKUST) ELEC5470 - Convex Optimization Fall 2018-19, HKUST, Hong Kong Outline of Lecture

More information

Optimization of Multistatic Cloud Radar with Multiple-Access Wireless Backhaul

Optimization of Multistatic Cloud Radar with Multiple-Access Wireless Backhaul 1 Optimization of Multistatic Cloud Radar with Multiple-Access Wireless Backhaul Seongah Jeong, Osvaldo Simeone, Alexander Haimovich, Joonhyuk Kang Department of Electrical Engineering, KAIST, Daejeon,

More information

Coverage and Area Spectral Efficiency of Clustered Device-to-Device Networks

Coverage and Area Spectral Efficiency of Clustered Device-to-Device Networks Coverage and Area Spectral Efficiency of Clustered Device-to-Device Networks Mehrnaz Afshang, Harpreet S. Dhillon, and Peter Han Joo Chong Abstract This paper develops a new spatial model for deviceto-device

More information

Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence

Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence Tim Holliday, Nick Bambos, Peter Glynn, Andrea Goldsmith Stanford University Abstract This paper presents a new

More information

Markov decision processes with threshold-based piecewise-linear optimal policies

Markov decision processes with threshold-based piecewise-linear optimal policies 1/31 Markov decision processes with threshold-based piecewise-linear optimal policies T. Erseghe, A. Zanella, C. Codemo Dept. of Information Engineering, University of Padova, Italy Padova, June 2, 213

More information

L interférence dans les réseaux non filaires

L interférence dans les réseaux non filaires L interférence dans les réseaux non filaires Du contrôle de puissance au codage et alignement Jean-Claude Belfiore Télécom ParisTech 7 mars 2013 Séminaire Comelec Parts Part 1 Part 2 Part 3 Part 4 Part

More information

The Economics of Video Websites with Membership-Advertising Mode in Wireless Networks

The Economics of Video Websites with Membership-Advertising Mode in Wireless Networks 1 The Economics of Video Websites with Membership-Advertising Mode in Wireless Networs Qing Zhou Student Member, IEEE, Nan Liu Member, IEEE arxiv:1806.11342v1 [cs.ni] 29 Jun 2018 Abstract The popularization

More information

Energy-Efficient Resource Allocation for Cache-Assisted Mobile Edge Computing

Energy-Efficient Resource Allocation for Cache-Assisted Mobile Edge Computing Energy-Efficient Resource Allocation for Cache-Assisted Mobile Edge Computing Ying Cui, Wen He, Chun Ni, Chengjun Guo Department of Electronic Engineering Shanghai Jiao Tong University, China Zhi Liu Department

More information

Competitive Scheduling in Wireless Collision Channels with Correlated Channel State

Competitive Scheduling in Wireless Collision Channels with Correlated Channel State Competitive Scheduling in Wireless Collision Channels with Correlated Channel State Utku Ozan Candogan, Ishai Menache, Asuman Ozdaglar and Pablo A. Parrilo Abstract We consider a wireless collision channel,

More information

USING multiple antennas has been shown to increase the

USING multiple antennas has been shown to increase the IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 1, JANUARY 2007 11 A Comparison of Time-Sharing, DPC, and Beamforming for MIMO Broadcast Channels With Many Users Masoud Sharif, Member, IEEE, and Babak

More information

Channel Hardening and Favorable Propagation in Cell-Free Massive MIMO with Stochastic Geometry

Channel Hardening and Favorable Propagation in Cell-Free Massive MIMO with Stochastic Geometry Channel Hardening and Favorable Propagation in Cell-Free Massive MIMO with Stochastic Geometry Zheng Chen and Emil Björnson arxiv:7.395v [cs.it] Oct 27 Abstract Cell-Free CF Massive MIMO is an alternative

More information

Minimax Problems. Daniel P. Palomar. Hong Kong University of Science and Technolgy (HKUST)

Minimax Problems. Daniel P. Palomar. Hong Kong University of Science and Technolgy (HKUST) Mini Problems Daniel P. Palomar Hong Kong University of Science and Technolgy (HKUST) ELEC547 - Convex Optimization Fall 2009-10, HKUST, Hong Kong Outline of Lecture Introduction Matrix games Bilinear

More information

THE IC-BASED DETECTION ALGORITHM IN THE UPLINK LARGE-SCALE MIMO SYSTEM. Received November 2016; revised March 2017

THE IC-BASED DETECTION ALGORITHM IN THE UPLINK LARGE-SCALE MIMO SYSTEM. Received November 2016; revised March 2017 International Journal of Innovative Computing, Information and Control ICIC International c 017 ISSN 1349-4198 Volume 13, Number 4, August 017 pp. 1399 1406 THE IC-BASED DETECTION ALGORITHM IN THE UPLINK

More information

Cache-Enabled Opportunistic Cooperative MIMO for Video Streaming in Wireless Systems

Cache-Enabled Opportunistic Cooperative MIMO for Video Streaming in Wireless Systems Cache-Enabled Opportunistic Cooperative MIMO for Video Streaming in Wireless Systems An Liu, Member IEEE, and Vincent Lau, Fellow IEEE, Department of Electronic and Computer Engineering, Hong Kong University

More information

This is a repository copy of HetNets with Random DTX Scheme: Local Delay and Energy Efficiency.

This is a repository copy of HetNets with Random DTX Scheme: Local Delay and Energy Efficiency. This is a repository copy of HetNets with Random DTX Scheme: Local Delay and Energy Efficiency. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/979/ Version: Accepted Version

More information

A Novel Iterative Convex Approximation Method

A Novel Iterative Convex Approximation Method 1 A Novel Iterative Convex Approximation Method Yang Yang and Marius Pesavento Abstract In this paper, we propose a novel iterative convex approximation algorithm to efficiently compute stationary points

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 1. WIRELESS data traffic is expected to increase exponen- 35

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 1. WIRELESS data traffic is expected to increase exponen- 35 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 1 AQ:1 1 AQ:2 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Pricing and Resource Allocation via Game Theory for a Small-Cell

More information

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,

More information

Distributed Spectrum Access with Spatial Reuse

Distributed Spectrum Access with Spatial Reuse Distributed Spectrum Access with Spatial Reuse Xu Chen and Jianwei Huang Abstract Efficient distributed spectrum sharing mechanism is crucial for improving the spectrum utilization. The spatial arxiv:1209.5130v1

More information

Stochastic Content-Centric Multicast Scheduling for Cache-Enabled Heterogeneous Cellular Networks

Stochastic Content-Centric Multicast Scheduling for Cache-Enabled Heterogeneous Cellular Networks 1 Stochastic Content-Centric Multicast Scheduling for Cache-Enabled Heterogeneous Cellular Networks Bo Zhou, Ying Cui, Member, IEEE, and Meixia Tao, Senior Member, IEEE arxiv:1509.06611v3 [cs.it] 17 Jun

More information

A New SLNR-based Linear Precoding for. Downlink Multi-User Multi-Stream MIMO Systems

A New SLNR-based Linear Precoding for. Downlink Multi-User Multi-Stream MIMO Systems A New SLNR-based Linear Precoding for 1 Downlin Multi-User Multi-Stream MIMO Systems arxiv:1008.0730v1 [cs.it] 4 Aug 2010 Peng Cheng, Meixia Tao and Wenjun Zhang Abstract Signal-to-leaage-and-noise ratio

More information

Coverage and Rate Analysis for Massive MIMO-enabled Heterogeneous Networks with Millimeter wave Small Cells

Coverage and Rate Analysis for Massive MIMO-enabled Heterogeneous Networks with Millimeter wave Small Cells Coverage and Rate Analysis for Massive MIMO-enabled Heterogeneous etworks with Millimeter wave Small Cells Anum Umer, Syed Ali Hassan, Haris Pervaiz, Qiang i and eila Musavian School of Electrical Engineering

More information

Open Loop Optimal Control of Base Station Activation for Green Networks

Open Loop Optimal Control of Base Station Activation for Green Networks Open Loop Optimal Control of Base Station Activation for Green etworks Sreenath Ramanath, Veeraruna Kavitha,2 and Eitan Altman IRIA, Sophia-Antipolis, France, 2 Universite d Avignon, Avignon, France Abstract

More information

Modeling and Analysis of Ergodic Capacity in Network MIMO Systems

Modeling and Analysis of Ergodic Capacity in Network MIMO Systems Modeling and Analysis of Ergodic Capacity in Network MIMO Systems Kianoush Hosseini, Wei Yu, and Raviraj S. Adve The Edward S. Rogers Sr. Department of Electrical and Computer Engineering University of

More information

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer

More information

Energy Cooperation and Traffic Management in Cellular Networks with Renewable Energy

Energy Cooperation and Traffic Management in Cellular Networks with Renewable Energy Energy Cooperation and Traffic Management in Cellular Networks with Renewable Energy Hyun-Suk Lee Dept. of Electrical and Electronic Eng., Yonsei University, Seoul, Korea Jang-Won Lee Dept. of Electrical

More information