Distributed Scheduling for Achieving Multi-User Diversity (Capacity of Opportunistic Scheduling in Heterogeneous Networks)
|
|
- Scot Emory Patrick
- 5 years ago
- Views:
Transcription
1 Distributed Scheduling for Achieving Multi-User Diversity (Capacity of Opportunistic Scheduling in Heterogeneous Networks) Sefi Kampeas, Ben-Gurion University Joint work with Asaf Cohen and Omer Gurewitz IL-Nets, May 2012
2 Outline 1 Introduction Objective Informal Definition and Related Work 2 Preliminaries Single User MIMO Capacity Gaussian Approximation 3 Point Process Approximation A Distributed Algorithm 4 Heterogeneous Users Expected Capacity QoS 5 Collision Avoidance Collision Avoidance Algorithm
3 Objective Problem: K non-uniform users. Each user is interested in gaining access to a shared medium.
4 Objective Problem: K non-uniform users. Each user is interested in gaining access to a shared medium.
5 Objective: Maximize resource utilization Whom should we give an access to? Under QoS constraints. Under fairness constraints.
6 Channel Model: y = Hx + n y C r is the received vector and r is the number of receiving antennas. x C t is the transmitted vector with total power constraint P, and t is the number of transmitting antennas. H C r t - complex Gaussian channel matrix, with i.i.d. entries, with independent real and imaginary parts, zero mean and variance 1/2. n C r - uncorrelated complex Gaussian noise, with independent real and imaginary parts, zero mean, variance 1. Base Station User H rxt User User User User User For non-uniform users, the channel matrix H of each user is drawn under a different distribution (e.g. mean and variance).
7 Channel Model: y = Hx + n y C r is the received vector and r is the number of receiving antennas. x C t is the transmitted vector with total power constraint P, and t is the number of transmitting antennas. H C r t - complex Gaussian channel matrix, with i.i.d. entries, with independent real and imaginary parts, zero mean and variance 1/2. n C r - uncorrelated complex Gaussian noise, with independent real and imaginary parts, zero mean, variance 1. Base Station User H rxt User User User User User For non-uniform users, the channel matrix H of each user is drawn under a different distribution (e.g. mean and variance).
8 Related Work: i.i.d. users Knopp & Humblet 95: Allocate more power when channel is good. Yoo & Goldsmith 06: ZFBF with user selection. Chen & Wang 06: Choose user with the maximal minimum eigenvalue of HH. Sharif & Hassibi 07: Scaling laws comparing maximal user scheduling to DPC. Choi & Andrews 08: Base station scheduling using EVT. Qin & Berry 03,06: Threshold-based. Qin & Berry, To & Choi 10: Splitting-based algorithms to reduce the channel contention. Main themes EVT/Order statistics; i.i.d. users/stations; Perfect CSI at transmitter; Collision detection in the splitting algorithms.
9 Outline Main Contribution A novel method to achieve expected capacity results under distributed, threshold-based scheduling algorithms. Approximation is based on the Poisson Point Process approximation. A simple method to reproduce existing results. Derive new expressions for the heterogeneous and QoS scenarios. Suggest and analyze a new variant of the splitting algorithm.
10 MIMO Capacity Approximation (Smith & Shafi 02) Assuming that the elements of H are i.i.d. zero-mean with finite moments. Gaussian approximation to the capacity is accurate for virtually all values of r and t. f c 14 m Ρ C log 2 1 Λ i i 1 m C Figure : Singe user MIMO capacity PDF: with m = 32 transmitting antennas and n = 128 receiving antennas vs. Gaussian Distribution with µ = 2 and σ = 0.03.
11 Extreme Value Theory Let x 1,..., x n be n i.i.d. random variables. Define M n = max i x i. If there exist a sequence of normalizing constants a n > 0 and b n such that as n, Pr(M n a n x + b n ) i.d. G(x) then G is of the generalized extreme value distribution type G(x) = exp { (1 + ξx) 1/ξ} If {x i } are Gaussian, Pr(M n a n x + b n ) e e x where a n = (2 log n) 1/2 b n = (2 log n) 1/2 1 2 (2 log n) 1/2 (log log n + log 4π).
12 Extreme Value Theory Let x 1,..., x n be n i.i.d. random variables. Define M n = max i x i. If there exist a sequence of normalizing constants a n > 0 and b n such that as n, Pr(M n a n x + b n ) i.d. G(x) then G is of the generalized extreme value distribution type G(x) = exp { (1 + ξx) 1/ξ} If {x i } are Gaussian, Pr(M n a n x + b n ) e e x where a n = (2 log n) 1/2 b n = (2 log n) 1/2 1 2 (2 log n) 1/2 (log log n + log 4π).
13 Extreme Value Theory Let x 1,..., x n be n i.i.d. random variables. Define M n = max i x i. If there exist a sequence of normalizing constants a n > 0 and b n such that as n, Pr(M n a n x + b n ) i.d. G(x) then G is of the generalized extreme value distribution type G(x) = exp { (1 + ξx) 1/ξ} If {x i } are Gaussian, Pr(M n a n x + b n ) e e x where a n = (2 log n) 1/2 b n = (2 log n) 1/2 1 2 (2 log n) 1/2 (log log n + log 4π).
14 Extreme Value Theory Let x 1,..., x n be n i.i.d. random variables. Define M n = max i x i. If there exist a sequence of normalizing constants a n > 0 and b n such that as n, Pr(M n a n x + b n ) i.d. G(x) then G is of the generalized extreme value distribution type G(x) = exp { (1 + ξx) 1/ξ} If {x i } are Gaussian, Pr(M n a n x + b n ) e e x where a n = (2 log n) 1/2 b n = (2 log n) 1/2 1 2 (2 log n) 1/2 (log log n + log 4π).
15 Max Capacity 50 f c Block Max Capacity Distribution C Figure : Maximal capacity PDF: maximum among 500 drawings which follow the Gaussian distribution, with µ = 2 and σ = The red line is the Gumbel density.
16 Extreme Value Theory - Application Capacities are approximately Gaussian. Assuming capacity follows normal distribution with µ and σ. If we schedule the best user in each time slot we get: [ ] ( ) E max C i = σ(2 log K) µ + O 1 i K log K With agreement with Choi & Andrews 08. Challenges What if the users are not identically distributed? Can we achieve this distributively?
17 Extreme Value Theory - Application Capacities are approximately Gaussian. Assuming capacity follows normal distribution with µ and σ. If we schedule the best user in each time slot we get: [ ] ( ) E max C i = σ(2 log K) µ + O 1 i K log K With agreement with Choi & Andrews 08. Challenges What if the users are not identically distributed? Can we achieve this distributively?
18 Outline 1 Introduction Objective Informal Definition and Related Work 2 Preliminaries Single User MIMO Capacity Gaussian Approximation 3 Point Process Approximation A Distributed Algorithm 4 Heterogeneous Users Expected Capacity QoS 5 Collision Avoidance Collision Avoidance Algorithm
19 A Threshold Based Distributed Algorithm Set a high threshold u, such that only a small fraction of the user will pass. Each user estimates his channel capacity. Only a user with capacity greater than threshold can transmit. Definition: unutilized slot Slot is unutilized if it idle or collision occurred. Alg. Properties Completely Distributed. Does not require channel reports.
20 A Threshold Based Distributed Algorithm Set a high threshold u, such that only a small fraction of the user will pass. Each user estimates his channel capacity. Only a user with capacity greater than threshold can transmit. Definition: unutilized slot Slot is unutilized if it idle or collision occurred. Alg. Properties Completely Distributed. Does not require channel reports.
21 A Threshold Based Distributed Algorithm Set a high threshold u, such that only a small fraction of the user will pass. Each user estimates his channel capacity. Only a user with capacity greater than threshold can transmit. Definition: unutilized slot Slot is unutilized if it idle or collision occurred. Alg. Properties Completely Distributed. Does not require channel reports.
22 Threshold Algorithm Performance Proposition The expected capacity of the above algorithm is C av = Pr (utilized slot) E[C C > u] where u is a high threshold such that a small fraction of the users will exceed it. u can be computed by ierfc. We should then find optimal threshold u. Point process motivation When threshold is high, exceedances are rare. We wish to examine these rare occurrences. Point process is an elegant way to model rare events.
23 Threshold Algorithm Performance Proposition The expected capacity of the above algorithm is C av = Pr (utilized slot) E[C C > u] where u is a high threshold such that a small fraction of the users will exceed it. u can be computed by ierfc. We should then find optimal threshold u. Point process motivation When threshold is high, exceedances are rare. We wish to examine these rare occurrences. Point process is an elegant way to model rare events.
24 Point Process Approximation x 1,..., x n is a sequence of i.i.d. random variables with distribution function F (x). max i {x 1,..., x n } is converging to G, with normalizing constants a n and b n. We construct a sequence of point processes Definition (Point Process) P n = {( i n, x ) } i b n, i = 1, 2,..., n, P n [0, 1] R a n Only large points of the process are retained in the limit process, whereas all points x i = o(b n ) can be normalized to same floor value b l.
25 Point Process Approximation x 1,..., x n is a sequence of i.i.d. random variables with distribution function F (x). max i {x 1,..., x n } is converging to G, with normalizing constants a n and b n. We construct a sequence of point processes Definition (Point Process) P n = {( i n, x ) } i b n, i = 1, 2,..., n, P n [0, 1] R a n Only large points of the process are retained in the limit process, whereas all points x i = o(b n ) can be normalized to same floor value b l.
26 Point Process Approximation x 1,..., x n is a sequence of i.i.d. random variables with distribution function F (x). max i {x 1,..., x n } is converging to G, with normalizing constants a n and b n. We construct a sequence of point processes Definition (Point Process) P n = {( i n, x ) } i b n, i = 1, 2,..., n, P n [0, 1] R a n Only large points of the process are retained in the limit process, whereas all points x i = o(b n ) can be normalized to same floor value b l.
27 Point Process Approximation x 1,..., x n is a sequence of i.i.d. random variables with distribution function F (x). max i {x 1,..., x n } is converging to G, with normalizing constants a n and b n. We construct a sequence of point processes Definition (Point Process) P n = {( i n, x ) } i b n, i = 1, 2,..., n, P n [0, 1] R a n Only large points of the process are retained in the limit process, whereas all points x i = o(b n ) can be normalized to same floor value b l.
28 Point Process Approximation Pn t t Theorem (Kallenberg 83) P n P, a non-homogeneous Poisson process, λ(t, x) = (1 + ξx) 1 ξ 1 +, Λ(B) = b B λ(b)db is the expected number of points in the set B.
29 Point Process Approximation Pn t t Theorem (Kallenberg 83) P n P, a non-homogeneous Poisson process, λ(t, x) = (1 + ξx) 1 ξ 1 +, Λ(B) = b B λ(b)db is the expected number of points in the set B.
30 Point Process Approximation Pn t t Theorem (Kallenberg 83) P n P, a non-homogeneous Poisson process, λ(t, x) = (1 + ξx) 1 ξ 1 +, Λ(B) = b B λ(b)db is the expected number of points in the set B.
31 Point Process Approximation Pn t Point Process for Gaussian Distribution B t Theorem (Kallenberg 83) P n P, a non-homogeneous Poisson process, λ(t, x) = (1 + ξx) 1 ξ 1 +, Λ(B) = b B λ(b)db is the expected number of points in the set B.
32 Usage - Threshold Arrival Rate With B v = [0, 1] (v, ), we have Λ(B v ) = (1 + ξv) 1/ξ + This gives the average exceedance rate over the threshold, that is, the number of exceedances is Poisson with parameter Λ(B v ). Inter arrival time is exponential with parameter 1 Λ(B v ).
33 Usage - Threshold Arrival Rate With B v = [0, 1] (v, ), we have Λ(B v ) = (1 + ξv) 1/ξ + This gives the average exceedance rate over the threshold, that is, the number of exceedances is Poisson with parameter Λ(B v ). Inter arrival time is exponential with parameter 1 Λ(B v ).
34 Usage - Threshold Arrival Rate With B v = [0, 1] (v, ), we have Λ(B v ) = (1 + ξv) 1/ξ + This gives the average exceedance rate over the threshold, that is, the number of exceedances is Poisson with parameter Λ(B v ). Inter arrival time is exponential with parameter 1 Λ(B v ).
35 Usage - Unutilized slot probability Unutilized slot probability Probabilities of idle time and collision can be easily computed. Idle slot Collision slot
36 Usage - Unutilized slot probability Unutilized slot probability Probabilities of idle time and collision can be easily computed. Idle slot Pn t B Point Process for Gaussian Distribution Collision slot t
37 Usage - Unutilized slot probability Unutilized slot probability Probabilities of idle time and collision can be easily computed. Idle slot Collision slot Pn t B Point Process for Gaussian Distribution Pn t B Point Process for Gaussian Distribution t t
38 Usage - Tail Distribution Set u n (v) = a n v + b n, we have Pr (x i > a n x + u n (v) x i > u n (v)) = Pr(P n (t) > x + v P n (t) > v) Pr(P(t) > x + v P(t) > v) Note that Pr(P(t) > x + v P(t) > v) = Λ(Bx+v ) Λ(B v ), As a result, in the Gaussian case, Pr(x u n (v) y x u n (v) > 0) = 1 e y an Conditional capacity is approximately exponential Expected capacity is calculated easily. Future use: Exponential mini-slots above the threshold result in uniform probability.
39 Usage - Tail Distribution Set u n (v) = a n v + b n, we have Pr (x i > a n x + u n (v) x i > u n (v)) = Pr(P n (t) > x + v P n (t) > v) Pr(P(t) > x + v P(t) > v) Note that Pr(P(t) > x + v P(t) > v) = Λ(Bx+v ) Λ(B v ), As a result, in the Gaussian case, Pr(x u n (v) y x u n (v) > 0) = 1 e y an Conditional capacity is approximately exponential Expected capacity is calculated easily. Future use: Exponential mini-slots above the threshold result in uniform probability.
40 Simulation - Tail Distribution f y Capacity Distribution given C threshold y Figure : PDF of Gaussian tail observation out of that exceeded a threshold 3.5, 1 Φ(3.5) of the observations. Green is from a direct analysis (Tylor series), Red is the previous approximation.
41 Summary Corollary The expected capacity obtained by setting a threshold u, such that k strongest users out of K users exceeds u on average, following E[C C > u] = (u + a K + o(a K )) Proposition For a threshold u, such that k strongest users out of K users exceed u on average: Pr ( utilized slot ) = ke k
42 Outline 1 Introduction Objective Informal Definition and Related Work 2 Preliminaries Single User MIMO Capacity Gaussian Approximation 3 Point Process Approximation A Distributed Algorithm 4 Heterogeneous Users Expected Capacity QoS 5 Collision Avoidance Collision Avoidance Algorithm
43 Setting In most systems, users are not i.i.d. - different users may experience different channel distribution. Moreover, users probabilities to access the channel may be changed due to QoS constraints. Straightforward application of the EVT theorem will not hold. In our model: Users may have difference expectation and variance (can be generalized to completely different distributions). Users may have pre-defined channel access probabilities. Using the point process approach, expected system capacity can be calculated.
44 Setting In most systems, users are not i.i.d. - different users may experience different channel distribution. Moreover, users probabilities to access the channel may be changed due to QoS constraints. Straightforward application of the EVT theorem will not hold. In our model: Users may have difference expectation and variance (can be generalized to completely different distributions). Users may have pre-defined channel access probabilities. Using the point process approach, expected system capacity can be calculated.
45 Main Result Theorem The expected capacity when working in single user in each slot in a non-uniform environment follows ( ) K Cav nu (u) = Λe Λ Λ i B[0,1/K] [u, ) (u + σ i a K + o(a K )) Λ where and i=1 ( ) u (σ 1 i b K +µ i ) Λ i B[0,1/K] [u, ) = K e σ i a K, Λ = K Λ i (B [0,1/K] [u, ) ), i=1 u is a threshold greater than zero that we set for all users.
46 Proof Sketch Similar to the uniform case: C nu av (u) = (1 Pr(unutilized slot)) E[C C > u] We now look at K independent drawings from the same user. We have Λ i (B [0,1/K] [up, )) = 1 u (σ i b K +µ i ) K e σ i a K Hence for all users, although non-uniform, the threshold exeedance rate is Λ = 1 u (σ i b K +µ i ) K K i=1 e σ i a K. Idle and collision probabilities can be calculated from ( K ) Pr N i = k i=1 = exp { Λ } Λk k!
47 Proof Sketch Similar to the uniform case: C nu av (u) = (1 Pr(unutilized slot)) E[C C > u] We now look at K independent drawings from the same user. We have Λ i (B [0,1/K] [up, )) = 1 u (σ i b K +µ i ) K e σ i a K Hence for all users, although non-uniform, the threshold exeedance rate is Λ = 1 u (σ i b K +µ i ) K K i=1 e σ i a K. Idle and collision probabilities can be calculated from ( K ) Pr N i = k i=1 { } Λk = exp Λ k! Pn t
48 Proof Sketch Similar to the uniform case: C nu av (u) = (1 Pr(unutilized slot)) E[C C > u] We now look at K independent drawings from the same user. We have Λ i (B [0,1/K] [up, )) = 1 u (σ i b K +µ i ) K e σ i a K Hence for all users, although non-uniform, the threshold exeedance rate is Λ = 1 u (σ i b K +µ i ) K K i=1 e σ i a K. Idle and collision probabilities can be calculated from ( K ) Pr N i = k i=1 { } Λk = exp Λ k! Pn t
49 Proof Sketch Similar to the uniform case: C nu av (u) = (1 Pr(unutilized slot)) E[C C > u] We now look at K independent drawings from the same user. We have Λ i (B [0,1/K] [up, )) = 1 u (σ i b K +µ i ) K e σ i a K Hence for all users, although non-uniform, the threshold exeedance rate is Λ = 1 u (σ i b K +µ i ) K K i=1 e σ i a K. Idle and collision probabilities can be calculated from ( K ) Pr N i = k i=1 { } Λk = exp Λ k! Pn t B
50 Proof Sketch - Cont. As a result, we have Claim The probability of unutilized slot for non-uniform users follows { } Pr( utilized slot ) = Λ exp Λ. For the conditional expected capacity, we have Claim Given that a single arrival to the threshold occurred, then the expected capacity for non-uniform users follows E[C C > u, K N i = 1] = i=1 K i=1 ( ) Λ i B[0,1/K] [up, ) (u + σ i a K + o(a K )). Λ
51 Proof Sketch - Cont. As a result, we have Claim The probability of unutilized slot for non-uniform users follows { } Pr( utilized slot ) = Λ exp Λ. For the conditional expected capacity, we have Claim Given that a single arrival to the threshold occurred, then the expected capacity for non-uniform users follows E[C C > u, K N i = 1] = i=1 K i=1 ( ) Λ i B[0,1/K] [up, ) (u + σ i a K + o(a K )). Λ
52 Simulation Results Cav nuc u u Figure : Expected capacity v.s. threshold u. Blue - Gaussian users follow σ i U[0.03, 3] and µ i U[ 2 1, 2 + 1]. Red - all with the same channel as the strongest. Black - all with the same channel as the mean user.
53 Weighted Users (E.g., QoS) Employing QoS constraints is simply reflected in the exceedance probability of each user. Given probability vector p R K 1, each user sets a threshold. Lemma (Expected Capacity with QoS) C GOS av where = Λ ( p) ( p) Λ e K i=1 ( ) Λ (p i ) i B [0,1/K] [upi, ) Λ ( p) (σ i [ b1/pi a 1/pi log log (1 p i ) + a K ] + µi + o(a 1/pi ) ) Λ (p i ) i (B [0,1/K] [upi, )) = 1 b K +b 1/pi K e a K Λ ( p) = K i=1 ( log(1 p i )) a 1/p i Λ (p i ) i (B [0,1/K] [upi, ))
54 Outline 1 Introduction Objective Informal Definition and Related Work 2 Preliminaries Single User MIMO Capacity Gaussian Approximation 3 Point Process Approximation A Distributed Algorithm 4 Heterogeneous Users Expected Capacity QoS 5 Collision Avoidance Collision Avoidance Algorithm
55 Collision Avoidance If a collision occur, the whole slot is LOST! First, minimize the idle slot probability, Pr(idle) = e k. Next, cope with the resulted collision probability. Minimize idle probability Idle slot probability goes to zero when setting k = log K Pr(idle slot) e log K = 1/K 0.
56 Collision Avoidance If a collision occur, the whole slot is LOST! First, minimize the idle slot probability, Pr(idle) = e k. Next, cope with the resulted collision probability. Minimize idle probability Idle slot probability goes to zero when setting k = log K Pr(idle slot) e log K = 1/K 0.
57 Collision Avoidance - cont. How to deal with log K users on average? Rate users by the distance they reached from the threshold. The set of values above the threshold is divided to l bins (mini slots). A user which passed the threshold checks in which bin he lies. If the bin index is i, it waits i 1 mini-slots and checks the channel. To achieve uniform distribution over the bins, set the bins boundaries by the exponential limit distribution.
58 Collision Avoidance - cont. How to deal with log K users on average? Rate users by the distance they reached from the threshold. The set of values above the threshold is divided to l bins (mini slots). A user which passed the threshold checks in which bin he lies. If the bin index is i, it waits i 1 mini-slots and checks the channel. To achieve uniform distribution over the bins, set the bins boundaries by the exponential limit distribution.
59 Collision Avoidance - cont. How to deal with log K users on average? Rate users by the distance they reached from the threshold. The set of values above the threshold is divided to l bins (mini slots). A user which passed the threshold checks in which bin he lies. If the bin index is i, it waits i 1 mini-slots and checks the channel. To achieve uniform distribution over the bins, set the bins boundaries by the exponential limit distribution.
60 Collision Avoidance - cont. How to deal with log K users on average? Rate users by the distance they reached from the threshold. The set of values above the threshold is divided to l bins (mini slots). A user which passed the threshold checks in which bin he lies. If the bin index is i, it waits i 1 mini-slots and checks the channel. To achieve uniform distribution over the bins, set the bins boundaries by the exponential limit distribution.
61 Collision Avoidance - cont. How to deal with log K users on average? Rate users by the distance they reached from the threshold. The set of values above the threshold is divided to l bins (mini slots). A user which passed the threshold checks in which bin he lies. If the bin index is i, it waits i 1 mini-slots and checks the channel. To achieve uniform distribution over the bins, set the bins boundaries by the exponential limit distribution. P i
62 Alg. performance E C K Figure : Expected capacity v.s. the total number of users K. Bottom line represents the expected capacity for K users with CA, setting threshold that on average log K users pass threshold, placing them into ( log K ) 2 bins. Top line represents the optimal centralized scheme
63 Conclusions A simple way to reproduce existing results. Point process approximation is an elegant way to analyze threshold-based distributed scheduling systems. Using this approach, heterogeneous networks and QoS constraints, previously intractable, can now be handled. Enhanced splitting algorithms, not requiring collision detection, can also be analyzed - see full version on the arxiv. Thank You!
64 Conclusions A simple way to reproduce existing results. Point process approximation is an elegant way to analyze threshold-based distributed scheduling systems. Using this approach, heterogeneous networks and QoS constraints, previously intractable, can now be handled. Enhanced splitting algorithms, not requiring collision detection, can also be analyzed - see full version on the arxiv. Thank You!
Opportunistic Scheduling in Heterogeneous Networks: Distributed Algorithms and System Capacity
Opportunistic Scheduling in Heterogeneous Networks: Distributed Algorithms and System Capacity arxiv:202.09v2 [cs.it] 5 Feb 202 Dor-Joseph ampeas, Asaf Cohen and Omer Gurewitz Department of Communication
More informationOpportunistic Scheduling in Heterogeneous Networks: Distributed Algorithms and System Capacity
Opportunistic Scheduling in Heterogeneous Networks: Distributed Algorithms and System Capacity arxiv:1202.0119v4 [cs.it] 16 Jul 2012 Joseph ampeas, Asaf Cohen and Omer Gurewitz Department of Communication
More informationMorning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland
Morning Session Capacity-based Power Control Şennur Ulukuş Department of Electrical and Computer Engineering University of Maryland So Far, We Learned... Power control with SIR-based QoS guarantees Suitable
More informationChapter 4: Continuous channel and its capacity
meghdadi@ensil.unilim.fr Reference : Elements of Information Theory by Cover and Thomas Continuous random variable Gaussian multivariate random variable AWGN Band limited channel Parallel channels Flat
More informationUSING multiple antennas has been shown to increase the
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 1, JANUARY 2007 11 A Comparison of Time-Sharing, DPC, and Beamforming for MIMO Broadcast Channels With Many Users Masoud Sharif, Member, IEEE, and Babak
More informationOn the Throughput of Proportional Fair Scheduling with Opportunistic Beamforming for Continuous Fading States
On the hroughput of Proportional Fair Scheduling with Opportunistic Beamforming for Continuous Fading States Andreas Senst, Peter Schulz-Rittich, Gerd Ascheid, and Heinrich Meyr Institute for Integrated
More informationLarge System Analysis of Projection Based Algorithms for the MIMO Broadcast Channel
Large System Analysis of Projection Based Algorithms for the MIMO Broadcast Channel Christian Guthy and Wolfgang Utschick Associate Institute for Signal Processing, Technische Universität München Joint
More informationA Hilbert Space for Random Processes
Gaussian Basics Random Processes Filtering of Random Processes Signal Space Concepts A Hilbert Space for Random Processes I A vector space for random processes X t that is analogous to L 2 (a, b) is of
More informationSpace-Time Coding for Multi-Antenna Systems
Space-Time Coding for Multi-Antenna Systems ECE 559VV Class Project Sreekanth Annapureddy vannapu2@uiuc.edu Dec 3rd 2007 MIMO: Diversity vs Multiplexing Multiplexing Diversity Pictures taken from lectures
More information7 Continuous Variables
7 Continuous Variables 7.1 Distribution function With continuous variables we can again define a probability distribution but instead of specifying Pr(X j) we specify Pr(X < u) since Pr(u < X < u + δ)
More informationMinimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading
Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading Yakun Sun and Michael L. Honig Department of ECE orthwestern University Evanston, IL 60208 Abstract We consider
More informationNOMA: Principles and Recent Results
NOMA: Principles and Recent Results Jinho Choi School of EECS GIST September 2017 (VTC-Fall 2017) 1 / 46 Abstract: Non-orthogonal multiple access (NOMA) becomes a key technology in 5G as it can improve
More informationDiversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT. ECE 559 Presentation Hoa Pham Dec 3, 2007
Diversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT ECE 559 Presentation Hoa Pham Dec 3, 2007 Introduction MIMO systems provide two types of gains Diversity Gain: each path from a transmitter
More informationOptimal Power Allocation for Cognitive Radio under Primary User s Outage Loss Constraint
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 29 proceedings Optimal Power Allocation for Cognitive Radio
More informationLecture 7 MIMO Communica2ons
Wireless Communications Lecture 7 MIMO Communica2ons Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Fall 2014 1 Outline MIMO Communications (Chapter 10
More informationApproximately achieving the feedback interference channel capacity with point-to-point codes
Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used
More informationOn the Design of Scalar Feedback Techniques for MIMO Broadcast Scheduling
On the Design of Scalar Feedback Techniques for MIMO Broadcast Scheduling Ruben de Francisco and Dirk T.M. Slock Eurecom Institute Sophia-Antipolis, France Email: {defranci, slock}@eurecom.fr Abstract
More informationPower Controlled FCFS Splitting Algorithm for Wireless Networks
Power Controlled FCFS Splitting Algorithm for Wireless Networks Ashutosh Deepak Gore Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology - Bombay COMNET Workshop, July
More informationOptimal Transmit Strategies in MIMO Ricean Channels with MMSE Receiver
Optimal Transmit Strategies in MIMO Ricean Channels with MMSE Receiver E. A. Jorswieck 1, A. Sezgin 1, H. Boche 1 and E. Costa 2 1 Fraunhofer Institute for Telecommunications, Heinrich-Hertz-Institut 2
More informationDirty Paper Coding vs. TDMA for MIMO Broadcast Channels
TO APPEAR IEEE INTERNATIONAL CONFERENCE ON COUNICATIONS, JUNE 004 1 Dirty Paper Coding vs. TDA for IO Broadcast Channels Nihar Jindal & Andrea Goldsmith Dept. of Electrical Engineering, Stanford University
More informationHIERARCHICAL MODELS IN EXTREME VALUE THEORY
HIERARCHICAL MODELS IN EXTREME VALUE THEORY Richard L. Smith Department of Statistics and Operations Research, University of North Carolina, Chapel Hill and Statistical and Applied Mathematical Sciences
More informationCell throughput analysis of the Proportional Fair scheduler in the single cell environment
Cell throughput analysis of the Proportional Fair scheduler in the single cell environment Jin-Ghoo Choi and Seawoong Bahk IEEE Trans on Vehicular Tech, Mar 2007 *** Presented by: Anh H. Nguyen February
More informationMulti-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems
Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User
More information4888 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY 2016
4888 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY 2016 Online Power Control Optimization for Wireless Transmission With Energy Harvesting and Storage Fatemeh Amirnavaei, Student Member,
More informationWideband Fading Channel Capacity with Training and Partial Feedback
Wideband Fading Channel Capacity with Training and Partial Feedback Manish Agarwal, Michael L. Honig ECE Department, Northwestern University 145 Sheridan Road, Evanston, IL 6008 USA {m-agarwal,mh}@northwestern.edu
More informationIN this paper we consider a problem of allocating bandwidth
Resource Allocation Under Uncertainty Using the Maximum Entropy Principle Mathias Johansson, Member, IEEE, and Mikael Sternad Senior Member, IEEE Abstract In this paper we formulate and solve a problem
More informationLecture 5: Antenna Diversity and MIMO Capacity Theoretical Foundations of Wireless Communications 1. Overview. CommTh/EES/KTH
: Antenna Diversity and Theoretical Foundations of Wireless Communications Wednesday, May 4, 206 9:00-2:00, Conference Room SIP Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication
More informationThe exponential distribution and the Poisson process
The exponential distribution and the Poisson process 1-1 Exponential Distribution: Basic Facts PDF f(t) = { λe λt, t 0 0, t < 0 CDF Pr{T t) = 0 t λe λu du = 1 e λt (t 0) Mean E[T] = 1 λ Variance Var[T]
More informationA Conditional Approach to Modeling Multivariate Extremes
A Approach to ing Multivariate Extremes By Heffernan & Tawn Department of Statistics Purdue University s April 30, 2014 Outline s s Multivariate Extremes s A central aim of multivariate extremes is trying
More informationOverview of Extreme Value Theory. Dr. Sawsan Hilal space
Overview of Extreme Value Theory Dr. Sawsan Hilal space Maths Department - University of Bahrain space November 2010 Outline Part-1: Univariate Extremes Motivation Threshold Exceedances Part-2: Bivariate
More informationErgodic and Outage Capacity of Narrowband MIMO Gaussian Channels
Ergodic and Outage Capacity of Narrowband MIMO Gaussian Channels Yang Wen Liang Department of Electrical and Computer Engineering The University of British Columbia April 19th, 005 Outline of Presentation
More informationSOLUTIONS TO ECE 6603 ASSIGNMENT NO. 6
SOLUTIONS TO ECE 6603 ASSIGNMENT NO. 6 PROBLEM 6.. Consider a real-valued channel of the form r = a h + a h + n, which is a special case of the MIMO channel considered in class but with only two inputs.
More informationEnergy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California
Energy Optimal Control for Time Varying Wireless Networks Michael J. Neely University of Southern California http://www-rcf.usc.edu/~mjneely Part 1: A single wireless downlink (L links) L 2 1 S={Totally
More informationMulti-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems
Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User
More informationTransmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters 1
2005 Conference on Information Sciences and Systems, The Johns Hopkins University, March 6 8, 2005 Transmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters Alkan
More informationECE 564/645 - Digital Communications, Spring 2018 Homework #2 Due: March 19 (In Lecture)
ECE 564/645 - Digital Communications, Spring 018 Homework # Due: March 19 (In Lecture) 1. Consider a binary communication system over a 1-dimensional vector channel where message m 1 is sent by signaling
More informationOptimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters
Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Alkan Soysal Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland,
More informationAverage Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations
Average Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations Rui Wang, Jun Zhang, S.H. Song and K. B. Letaief, Fellow, IEEE Dept. of ECE, The Hong Kong University of Science
More informationELEG 5633 Detection and Estimation Signal Detection: Deterministic Signals
ELEG 5633 Detection and Estimation Signal Detection: Deterministic Signals Jingxian Wu Department of Electrical Engineering University of Arkansas Outline Matched Filter Generalized Matched Filter Signal
More informationExponential Distribution and Poisson Process
Exponential Distribution and Poisson Process Stochastic Processes - Lecture Notes Fatih Cavdur to accompany Introduction to Probability Models by Sheldon M. Ross Fall 215 Outline Introduction Exponential
More informationSecure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel
Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu
More informationOn the Capacity of MIMO Rician Broadcast Channels
On the Capacity of IO Rician Broadcast Channels Alireza Bayesteh Email: alireza@shannon2.uwaterloo.ca Kamyar oshksar Email: kmoshksa@shannon2.uwaterloo.ca Amir K. Khani Email: khani@shannon2.uwaterloo.ca
More informationPoint Process Control
Point Process Control The following note is based on Chapters I, II and VII in Brémaud s book Point Processes and Queues (1981). 1 Basic Definitions Consider some probability space (Ω, F, P). A real-valued
More informationDiversity Multiplexing Tradeoff in Multiple Antenna Multiple Access Channels with Partial CSIT
1 Diversity Multiplexing Tradeoff in Multiple Antenna Multiple Access Channels with artial CSIT Kaushi Josiam, Dinesh Rajan and Mandyam Srinath, Department of Electrical Engineering, Southern Methodist
More informationTrust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems
Introduction Main Results Simulation Conclusions Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems Mojtaba Vaezi joint work with H. Inaltekin, W. Shin, H. V. Poor, and
More informationMultiaccess Communication
Information Networks p. 1 Multiaccess Communication Satellite systems, radio networks (WLAN), Ethernet segment The received signal is the sum of attenuated transmitted signals from a set of other nodes,
More informationLimited Feedback in Wireless Communication Systems
Limited Feedback in Wireless Communication Systems - Summary of An Overview of Limited Feedback in Wireless Communication Systems Gwanmo Ku May 14, 17, and 21, 2013 Outline Transmitter Ant. 1 Channel N
More informationHalf-Duplex Gaussian Relay Networks with Interference Processing Relays
Half-Duplex Gaussian Relay Networks with Interference Processing Relays Bama Muthuramalingam Srikrishna Bhashyam Andrew Thangaraj Department of Electrical Engineering Indian Institute of Technology Madras
More informationOptimal Power Control in Decentralized Gaussian Multiple Access Channels
1 Optimal Power Control in Decentralized Gaussian Multiple Access Channels Kamal Singh Department of Electrical Engineering Indian Institute of Technology Bombay. arxiv:1711.08272v1 [eess.sp] 21 Nov 2017
More informationNOMA: An Information Theoretic Perspective
NOMA: An Information Theoretic Perspective Peng Xu, Zhiguo Ding, Member, IEEE, Xuchu Dai and H. Vincent Poor, Fellow, IEEE arxiv:54.775v2 cs.it] 2 May 25 Abstract In this letter, the performance of non-orthogonal
More informationThe Timing Capacity of Single-Server Queues with Multiple Flows
The Timing Capacity of Single-Server Queues with Multiple Flows Xin Liu and R. Srikant Coordinated Science Laboratory University of Illinois at Urbana Champaign March 14, 2003 Timing Channel Information
More informationChapter 5. Elementary Performance Analysis
Chapter 5 Elementary Performance Analysis 1 5.0 2 5.1 Ref: Mischa Schwartz Telecommunication Networks Addison-Wesley publishing company 1988 3 4 p t T m T P(k)= 5 6 5.2 : arrived rate : service rate 7
More informationInteractive Interference Alignment
Interactive Interference Alignment Quan Geng, Sreeram annan, and Pramod Viswanath Coordinated Science Laboratory and Dept. of ECE University of Illinois, Urbana-Champaign, IL 61801 Email: {geng5, kannan1,
More informationThe Optimality of Beamforming: A Unified View
The Optimality of Beamforming: A Unified View Sudhir Srinivasa and Syed Ali Jafar Electrical Engineering and Computer Science University of California Irvine, Irvine, CA 92697-2625 Email: sudhirs@uciedu,
More informationAn Analysis of the Preemptive Repeat Queueing Discipline
An Analysis of the Preemptive Repeat Queueing Discipline Tony Field August 3, 26 Abstract An analysis of two variants of preemptive repeat or preemptive repeat queueing discipline is presented: one in
More informationThe Water-Filling Game in Fading Multiple Access Channels
The Water-Filling Game in Fading Multiple Access Channels Lifeng Lai and Hesham El Gamal arxiv:cs/05203v [cs.it] 3 Dec 2005 February, 2008 Abstract We adopt a game theoretic approach for the design and
More informationOn the Capacity of Distributed Antenna Systems Lin Dai
On the apacity of Distributed Antenna Systems Lin Dai ity University of Hong Kong JWIT 03 ellular Networs () Base Station (BS) Growing demand for high data rate Multiple antennas at the BS side JWIT 03
More informationrequests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1
Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet
More informationDiversity Combining Techniques
Diversity Combining Techniques When the required signal is a combination of several plane waves (multipath), the total signal amplitude may experience deep fades (Rayleigh fading), over time or space.
More informationDelay-Sensitive Packet Scheduling in Wireless Networks
Delay-Sensitive Packet Scheduling in Wireless Networks Peijuan iu, Randall Berry, Michael. Honig ECE Department, Northwestern University 2145 Sheridan Road, Evanston, I 60208 USA fpeijuan,rberry,mhg@ece.nwu.edu
More informationSecure Multiuser MISO Communication Systems with Quantized Feedback
Secure Multiuser MISO Communication Systems with Quantized Feedback Berna Özbek*, Özgecan Özdoğan*, Güneş Karabulut Kurt** *Department of Electrical and Electronics Engineering Izmir Institute of Technology,Turkey
More informationGeneralized MMSE Beamforming for Downlink MIMO Systems
Generalized MMSE Beamforming for Downlin MIMO Systems youngjoo Lee, Illsoo Sohn, Donghyun Kim, and Kwang Bo Lee School of Electrical Engineering and INMC, Seoul National University (SNU, Seoul, Korea.
More informationRandom Matrix Theory Lecture 1 Introduction, Ensembles and Basic Laws. Symeon Chatzinotas February 11, 2013 Luxembourg
Random Matrix Theory Lecture 1 Introduction, Ensembles and Basic Laws Symeon Chatzinotas February 11, 2013 Luxembourg Outline 1. Random Matrix Theory 1. Definition 2. Applications 3. Asymptotics 2. Ensembles
More informationK User Interference Channel with Backhaul
1 K User Interference Channel with Backhaul Cooperation: DoF vs. Backhaul Load Trade Off Borna Kananian,, Mohammad A. Maddah-Ali,, Babak H. Khalaj, Department of Electrical Engineering, Sharif University
More informationChapter 2: Random Variables
ECE54: Stochastic Signals and Systems Fall 28 Lecture 2 - September 3, 28 Dr. Salim El Rouayheb Scribe: Peiwen Tian, Lu Liu, Ghadir Ayache Chapter 2: Random Variables Example. Tossing a fair coin twice:
More informationLecture 8: MIMO Architectures (II) Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH
MIMO : MIMO Theoretical Foundations of Wireless Communications 1 Wednesday, May 25, 2016 09:15-12:00, SIP 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication 1 / 20 Overview MIMO
More informationAnswers to selected exercises
Answers to selected exercises A First Course in Stochastic Models, Henk C. Tijms 1.1 ( ) 1.2 (a) Let waiting time if passengers already arrived,. Then,, (b) { (c) Long-run fraction for is (d) Let waiting
More informationApproximate Capacity of Fast Fading Interference Channels with no CSIT
Approximate Capacity of Fast Fading Interference Channels with no CSIT Joyson Sebastian, Can Karakus, Suhas Diggavi Abstract We develop a characterization of fading models, which assigns a number called
More informationExtreme Value Analysis and Spatial Extremes
Extreme Value Analysis and Department of Statistics Purdue University 11/07/2013 Outline Motivation 1 Motivation 2 Extreme Value Theorem and 3 Bayesian Hierarchical Models Copula Models Max-stable Models
More informationCommunications and Signal Processing Spring 2017 MSE Exam
Communications and Signal Processing Spring 2017 MSE Exam Please obtain your Test ID from the following table. You must write your Test ID and name on each of the pages of this exam. A page with missing
More informationOnline Power Control Optimization for Wireless Transmission with Energy Harvesting and Storage
Online Power Control Optimization for Wireless Transmission with Energy Harvesting and Storage Fatemeh Amirnavaei, Student Member, IEEE and Min Dong, Senior Member, IEEE arxiv:606.046v2 [cs.it] 26 Feb
More informationEfficient Nonlinear Optimizations of Queuing Systems
Efficient Nonlinear Optimizations of Queuing Systems Mung Chiang, Arak Sutivong, and Stephen Boyd Electrical Engineering Department, Stanford University, CA 9435 Abstract We present a systematic treatment
More informationFlat Rayleigh fading. Assume a single tap model with G 0,m = G m. Assume G m is circ. symmetric Gaussian with E[ G m 2 ]=1.
Flat Rayleigh fading Assume a single tap model with G 0,m = G m. Assume G m is circ. symmetric Gaussian with E[ G m 2 ]=1. The magnitude is Rayleigh with f Gm ( g ) =2 g exp{ g 2 } ; g 0 f( g ) g R(G m
More informationTransmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback
IEEE INFOCOM Workshop On Cognitive & Cooperative Networks Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback Chao Wang, Zhaoyang Zhang, Xiaoming Chen, Yuen Chau. Dept.of
More informationMedium Access Control and Power Optimizations for Sensor Networks with Linear Receivers
Medium Access Control and Power Optimizations for Sensor Networks with Linear Receivers Wenjun Li and Huaiyu Dai Department of Electrical and Computer Engineering North Carolina State University Raleigh,
More informationExploiting Quantized Channel Norm Feedback Through Conditional Statistics in Arbitrarily Correlated MIMO Systems
Exploiting Quantized Channel Norm Feedback Through Conditional Statistics in Arbitrarily Correlated MIMO Systems IEEE TRANSACTIONS ON SIGNAL PROCESSING Volume 57, Issue 10, Pages 4027-4041, October 2009.
More informationUCSD ECE250 Handout #27 Prof. Young-Han Kim Friday, June 8, Practice Final Examination (Winter 2017)
UCSD ECE250 Handout #27 Prof. Young-Han Kim Friday, June 8, 208 Practice Final Examination (Winter 207) There are 6 problems, each problem with multiple parts. Your answer should be as clear and readable
More informationRandom Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering,
Random Access Game Medium Access Control Design for Wireless Networks 1 Sandip Chakraborty Department of Computer Science and Engineering, INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR October 22, 2016 1 Chen
More informationINVERSE EIGENVALUE STATISTICS FOR RAYLEIGH AND RICIAN MIMO CHANNELS
INVERSE EIGENVALUE STATISTICS FOR RAYLEIGH AND RICIAN MIMO CHANNELS E. Jorswieck, G. Wunder, V. Jungnickel, T. Haustein Abstract Recently reclaimed importance of the empirical distribution function of
More informationExploiting Partial Channel Knowledge at the Transmitter in MISO and MIMO Wireless
Exploiting Partial Channel Knowledge at the Transmitter in MISO and MIMO Wireless SPAWC 2003 Rome, Italy June 18, 2003 E. Yoon, M. Vu and Arogyaswami Paulraj Stanford University Page 1 Outline Introduction
More informationMFM Practitioner Module: Quantitiative Risk Management. John Dodson. October 14, 2015
MFM Practitioner Module: Quantitiative Risk Management October 14, 2015 The n-block maxima 1 is a random variable defined as M n max (X 1,..., X n ) for i.i.d. random variables X i with distribution function
More informationLECTURE 18. Lecture outline Gaussian channels: parallel colored noise inter-symbol interference general case: multiple inputs and outputs
LECTURE 18 Last time: White Gaussian noise Bandlimited WGN Additive White Gaussian Noise (AWGN) channel Capacity of AWGN channel Application: DS-CDMA systems Spreading Coding theorem Lecture outline Gaussian
More informationChannel Allocation Using Pricing in Satellite Networks
Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract
More informationThe Effect of Channel State Information on Optimum Energy Allocation and Energy Efficiency of Cooperative Wireless Transmission Systems
The Effect of Channel State Information on Optimum Energy Allocation and Energy Efficiency of Cooperative Wireless Transmission Systems Jie Yang and D.R. Brown III Worcester Polytechnic Institute Department
More informationOptimization and Simulation
Optimization and Simulation Simulating events: the Michel Bierlaire Transport and Mobility Laboratory School of Architecture, Civil and Environmental Engineering Ecole Polytechnique Fédérale de Lausanne
More informationOnline Interval Coloring and Variants
Online Interval Coloring and Variants Leah Epstein 1, and Meital Levy 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. Email: lea@math.haifa.ac.il School of Computer Science, Tel-Aviv
More informationA Probability Review
A Probability Review Outline: A probability review Shorthand notation: RV stands for random variable EE 527, Detection and Estimation Theory, # 0b 1 A Probability Review Reading: Go over handouts 2 5 in
More information672 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 57, NO. 2, FEBRUARY We only include here some relevant references that focus on the complex
672 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 57, NO. 2, FEBRUARY 2009 Ordered Eigenvalues of a General Class of Hermitian Rom Matrices With Application to the Performance Analysis of MIMO Systems Luis
More informationECE Homework Set 2
1 Solve these problems after Lecture #4: Homework Set 2 1. Two dice are tossed; let X be the sum of the numbers appearing. a. Graph the CDF, FX(x), and the pdf, fx(x). b. Use the CDF to find: Pr(7 X 9).
More informationTheorem 2.1 (Caratheodory). A (countably additive) probability measure on a field has an extension. n=1
Chapter 2 Probability measures 1. Existence Theorem 2.1 (Caratheodory). A (countably additive) probability measure on a field has an extension to the generated σ-field Proof of Theorem 2.1. Let F 0 be
More informationFinal Solutions Fri, June 8
EE178: Probabilistic Systems Analysis, Spring 2018 Final Solutions Fri, June 8 1. Small problems (62 points) (a) (8 points) Let X 1, X 2,..., X n be independent random variables uniformly distributed on
More informationECE 4400:693 - Information Theory
ECE 4400:693 - Information Theory Dr. Nghi Tran Lecture 8: Differential Entropy Dr. Nghi Tran (ECE-University of Akron) ECE 4400:693 Lecture 1 / 43 Outline 1 Review: Entropy of discrete RVs 2 Differential
More informationPerhaps the simplest way of modeling two (discrete) random variables is by means of a joint PMF, defined as follows.
Chapter 5 Two Random Variables In a practical engineering problem, there is almost always causal relationship between different events. Some relationships are determined by physical laws, e.g., voltage
More informationMultiple Antennas in Wireless Communications
Multiple Antennas in Wireless Communications Luca Sanguinetti Department of Information Engineering Pisa University luca.sanguinetti@iet.unipi.it April, 2009 Luca Sanguinetti (IET) MIMO April, 2009 1 /
More informationOptimal power-delay trade-offs in fading channels: small delay asymptotics
Optimal power-delay trade-offs in fading channels: small delay asymptotics Randall A. Berry Dept. of EECS, Northwestern University 45 Sheridan Rd., Evanston IL 6008 Email: rberry@ece.northwestern.edu Abstract
More informationOptimal Power Allocation over Parallel Gaussian Broadcast Channels
Optimal Power Allocation over Parallel Gaussian Broadcast Channels David N.C. Tse Dept. of Electrical Engineering and Computer Sciences University of California at Berkeley email: dtse@eecs.berkeley.edu
More informationQuiz 2 Date: Monday, November 21, 2016
10-704 Information Processing and Learning Fall 2016 Quiz 2 Date: Monday, November 21, 2016 Name: Andrew ID: Department: Guidelines: 1. PLEASE DO NOT TURN THIS PAGE UNTIL INSTRUCTED. 2. Write your name,
More informationMultiple Antennas for MIMO Communications - Basic Theory
Multiple Antennas for MIMO Communications - Basic Theory 1 Introduction The multiple-input multiple-output (MIMO) technology (Fig. 1) is a breakthrough in wireless communication system design. It uses
More informationTitle. Author(s)Tsai, Shang-Ho. Issue Date Doc URL. Type. Note. File Information. Equal Gain Beamforming in Rayleigh Fading Channels
Title Equal Gain Beamforming in Rayleigh Fading Channels Author(s)Tsai, Shang-Ho Proceedings : APSIPA ASC 29 : Asia-Pacific Signal Citationand Conference: 688-691 Issue Date 29-1-4 Doc URL http://hdl.handle.net/2115/39789
More information