Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels
|
|
- Stuart Allen
- 5 years ago
- Views:
Transcription
1 This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings Ipact of Iperfect Channel State Inforation on ARQ Schees over Rayleigh Fading Channels Le Cao, Pooi Yuen Ka and Meixia Tao, Dept. of Electrical & Coputer Engineering, National University of Singapore, Singapore 7576 Dept. of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, China 4 Eails: caole@nus.edu.sg; elekapy@nus.edu.sg; xtao@ieee.org Abstract With iperfect channel state inforation (CSI) acquired by channel estiation at the receiver, the perforances of autoatic-repeat-request (ARQ) systes are evaluated as a function of the accuracy of channel estiation. A link between network-layer perforances and physical-layer paraeters is therefore established. We study in particular the goodput and the accepted packet error rate as a function of the channel estiation ean square error (MSE) and the factors which affect the MSE. The results enable us to analyze the optiu allocation of energy for data transission and energy for pilot channel estiation so as to axiize the goodput. I. INTRODUCTION Forward error correction (FEC) together with autoaticrepeat-request (ARQ) for retransission is coonly used to ensure the integrity of data transission. This is especially iportant for wireless counication where a deep fade in the channel can cause a oentary burst of errors in reception. Thus, uch work has been done on the perforance of FEC- ARQ schees over fading channels [] [9]. However, all these works, by and large, assue an AWGN channel [], [] or a fading channel with perfect channel state inforation (CSI) at the receiver [3] [9]. In practice, the CSI available at the receiver is acquired via channel estiation. The accuracy of channel estiation is liited by the aount of signal energy devoted to channel estiation, the channel noise and the teporal variations in the channel fading process. This eans that in practice the receiver CSI is usually iperfect, and it is iportant to be able to assess the ipact of the channel estiation error on the perforance of an FEC-ARQ schee. In this paper, we will deonstrate that the accuracy of the receiver CSI plays a crucial role in deterining the perforance of an FEC-ARQ syste. The perforance etrics we consider here are throughput/goodput and accepted packet error rate (APER). The accuracy of the receiver CSI is easured by the ean square error (MSE) of the channel estiates. The precise dependence of goodput and APER on the MSE is quantified. The results enable us to show in particular that when the MSE of channel estiation is above a certain critical value, the goodput drops very rapidly while the APER increases very fast. Below this critical value, the goodput increases very slowly and the APER also decreases ore gently. These results underscore the iportance of the The support of Singapore MoE AcRF Tier Grant T6B is acknowledged. MSs a perforance paraeter, and leads to the following very iportant syste perforance optiization proble. We assue that each packet is transitted with a certain fixed aount of total energy. Using a pilot-sybol-assisted channel estiation schee, part of this total energy is assigned to pilot sybols for channel estiation while the reainder is used for data transission. The question then is: what is the optiu fraction of the total energy that should be devoted to the pilot sybols for channel estiation? In this paper, we focus on establishing a link between network-layer perforances and physical-layer paraeters rather than analyzing the perforances of different ARQ schees. For the sake of siplicity, the selective repeat (SR)-ARQ syste is considered over block Rayleigh fading channels. The iperfect CSI is acquired via iniu ean square error (MMSE) channel estiation by aking use of pilot sybols. Two syste paraeters: APER P nd goodput η g [3] respectively are investigated. An upper bound on P E and a lower bound on η g are obtained in closed-for which is a function of the MSE of channel estiation. Furtherore, the aount of total power used for channel estiation is obtained, which can axiize the goodput of the syste. II. SYSTEM DESCRIPTION When inforation is transitted using an ARQ schee, each inforation strea with bits is sent to an error detection encoder. After passing through a binary (n, ) systeatic block encoder and being prefixed by N H pilot bits, a packet of bits is produced. Each packet coprises data bits for inforation transission, (n ) parity-check bits for error detection and N H pilot bits for channel estiation. All the bits of each packet are assued to be transitted by binary phase shift keying (BPSK) odulation. If buffering at both the transitter and the receiver is allowed, an SR-ARQ protocol can be ipleented. The transitter sends a continuous strea of packets. For each received packet, the channel gain is estiated using the pilot sybols. The received signals are then deodulated with the estiated channel gain and checked by the error detection code. When the receiver detects an error in a received packet, a retransission request for that packet is sent back to the transitter. The feedback channel is assued to be error-free. In this case the transitter, after a round-trip delay, responds to a retransission request by resending the requested packet /9/$5. 9 IEEE
2 This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings It then returns to the point at which it previously stopped and resues transission of new packets. The round-trip delay is assued to be larger than the coherence tie of the channel. Hence, the block fading gain experienced by the retransitted packet is independent of the gains experienced in previous transission(s) of the sae packet, and they are identically distributed. The block fading channel is assued to be constant over the duration of a packet. The channel gain h is a coplex Gaussian rando variable where R{h} and I{h} are independently and identically distributed (i.i.d) real Gaussian rando variables with eans zero and variances σ /. The received signal over the kth bit interval, is r p [k] = E p p [k]h + N[k], k =,,N H, () r s [k] = E s s [k]h + N[k], k = N H +,,N H + n, where E p and E s are the energy per pilot sybol and the energy per data sybol, respectively, p [k] and s [k] are the transitted pilot and data sybols, respectively. Ter N[k] is the zero-ean coplex AWGN with power spectral density N.TheN H pilot sybols in each packet are used in a Wiener filter for generating the MMSE estiate ĥ of h. Since the channel is coplex Gaussian, the MMSE estiate ĥ is given by [, eq.(.)] ĥ = N H i= w[i]r p [i], () where w[i] = σ E p (N H σ E p + N ) is the ith filter coefficient and is the sae for all i, since the channel gain h is constant. The channel estiation MSE is [, eq.(.49)] [ E h ĥ ] = V σ =. (3) σ +N E p H N The estiate ĥ is a coplex Gaussian rando variable with ean zero and variance σ V [, eq.(.8)]. III. ACCEPTED PACKET ERROR RATE AND GOODPUT ANALYSIS There are two basic paraeters fro which we can evaluate the perforance of an ARQ protocol: reliability and throughput. The throughput follows fro [, eq.(5-8)] [5, eq.(7)] as η = ( P d ), (4) where P d is the probability of detected error or the probability of retransission. The rate of the error detecting code is R = /n. The effective rate of each packet is defined as R e = /( ) which takes account of the redundancy introduced by the error detecting code and the pilot sybols used for channel estiation. The probability P d can be obtained by [, (Exaple5-)]. P d = P e P ue, (5) where P e is the probability that a received packet contains one or ore bit errors, and P ue represents the probability of the received packet containing an undetectable error pattern. The probability P e depends on the channel error statistics whereas the probabilities P d and P ue depend on both the channel error statistics and the choice of the (n, ) error detecting code. We first evaluate the probability P e. Based on the optial channel estiation receiver structure obtained in [, eq.(7)], the conditional bit error probability conditioned on the MMSE estiate of channel gain ĥ, is given by [, Appendix III] p = erfc E s ĥ E s V. (6) + N The energy per inforation bit at the input of the error detection encoder is Eb B = E s /R. Conditioned on knowing the estiated channel gain ĥ, the channel is eoryless since the AWGN is independent fro sybol to sybol. Hence, the conditional probability that a received packet contains at least one error bit, can be written as P e = ( p) n. (7) By averaging (7) over the Gaussian rando variable ĥ, the packet error probability P e can be obtained as P e = ( ( p) n ) l= σ V e ĥ /(σ V ) d ĥ. (8) In Appendix I, we use the Chernoff bound to show that P e is tightly upper-bounded by P e (b +(j +)c), (9) j= where, b = σ V, c = E s E s V. () + N Next, we evaluate the probability of undetectable error P ue. For (n, ) linear codes, except for soe short linear codes, the weight distributions for any linear codes are still unknown. Consequently, it is considerably difficult to copute their P ue, but it is fairly easy to derive an upper bound for the enseble of all (n, ) linear codes. Conditioned on knowing the estiated channel gain ĥ, the upper bound on the undetectable error probability can be evaluated by [, eq.(3.4)] P ue (n ) [ ( p) n ]. () Taking the ean of () over ĥ, the undetectable error probability is upper-bounded as P ue (n ) [ ( p) n ] σ V e ĥ /(σ V ) d ĥ. () The last integral can be evaluated like that in (8), giving P ue (n ). (b +(j +)c) l= j= (3)
3 This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings The ratio between P ue and P e can then be upper bounded by the ratio of () to (8): P ue P e (n ). (4) We thus have P ue << P e, and therefore P d P e fro (5) when the nuber of parity-check bits n is larger than. The throughput is then lower bounded by η η L = ( P e ). (5) One can only evaluate a lower bound to right-hand side of (5) by using the upper bound on P e in (9). Another useful syste paraeter, the APER, which shows the reliability of the ARQ syste, is given by [, eq.(5-)] P E = P ue. (6) P d Using P d P e and substituting (3) and (9) into (6), P E is upper-bounded by P E (n ) ( Z), (7) Z where, (b +(j +)c). (8) l= j= The throughput is eaningful only when considered in conjunction with the reliability. Therefore, the goodput η g is defined as the ratio of the expected nuber of inforation bits correctly received per unit of tie to the total nuber of bits that can be transitted per unit of tie [3]. The goodput, which shows the proportion of the throughput consisting of correct packets, can be expressed as η g =( P E )η. (9) By substituting (6) and (4) into (9), the goodput can be obtained as η g = ( P e ). () The goodput can be considered as a lower bound on the throughput, since the η g in () is the sae as the η L in (5). Substituting (9) into (), we obtain the lower bound on η g as η g (b +(j +)c). () l= j= IV. POWER ALLOCATION BETWEEN PILOT AND DATA BITS Each packet is sent with a fixed total energy E T. When ore energy is devoted to channel estiation, the estiates of channel gains are ore accurate, leading to a saller error probability. However, this reduces the energy available for data transission and leads to a higher error probability. For this reason, there ust exist an optiu fraction ε of the total energy E T that should be devoted to channel estiation so as to axiize the lower bound on the goodput η g in (). All signalling essages are assued to be significantly shorter than the user data packets, and therefore transitted with negligible overall energy consuption. For a given total packet energy E T, the aount of total energy assigned to pilot sybols is εe T = N H E p while the reainder of total energy devoted to data transission equals ( ε)e T = ne s.we assue N H to be fixed for each packet. Thus an optiu ε will lead to an optiu E p and siilarly an optiu E s. Since N H is fixed, () shows that axiizing the goodput η g aounts to iniizing the packet error rate P e.usingthe lower bound (), the axiization proble now coes to ( c ) ε = arg ax ε f = b l= j= where b and c given in () can be rewritten as and c = b = σ Nσ N +εe T σ = +εγ εσ γ (b +(j +)c), () (3) ( + εγ)( ε)e T ( ε)e T σ + n(n + εe T σ ). (4) Here, γ = E T σ /N is defined as the total transit signal-tonoise ratio (SNR). The objective function f ( c b) is a onotonically increasing function of the variable c/b. Therefore, the optiization proble can be reduced to { c } { ε ε( ε)γ } = arg ax = arg ax. ε b ε γ( ε)+n( + εγ) (5) Setting the derivative of c/b with respective to ε equal to zero, and solving the resulting quadratic equation, we obtain the optial ε as ε = n + γ n + nγ + γ n + γn. (6) γ nγ The optial ε, which is in the range [, ], satisfies an equality shown in the following proposition. The proof is given in Appendix II. Proposition 4.: For a given n, the optial value of ε satisfies the following inequality for any γ. n n ε.5 (7) This proposition indicates that the optiu aount of energy devoted to channel estiation is always less than half of the total energy. On the other hand, at least a fraction of total energy (i.e. n n E T ) is necessary to be devoted to channel estiation. A sall aount of energy is assigned to channel estiation when a long code (i.e. large n )isused.thisis because the left-hand side of (7) can be reduced to / n when n is large.
4 This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings 5 R=.9 R=.88 R=.84 5 R=.9 R=.88 R=.84 Lower Bound on Goodput η g R=.9 R=.88 R=.84 Lower Bound on Goodput η g /N =3 db /N =5 db R=.9 R=.88 R=.84 /N =5 db Noralized MSE (V /σ ) 5 3 Average SNR per Bit /N 4 Noralized MSE (V /σ ) Fig.. The APER versus the noralized MSnd /N. Fig.. The goodput versus the noralized MSnd the APER. V. NUMERICAL RESULTS Since the bounds on goodput and APER only depend on the values of n and and they are not influenced by specific code structures, different values of n and are chosen to deonstrate the perforances. The fixed total energy E T for each packet is ( + N H ), where represents the average energy per bit. The noralized channel estiation MSE V /σ depends on the energy ε E T devoted to pilot sybols rather than the value of N H. Without loss of generality, the nuber of pilot sybols is assued to be N H =5. In Fig. and Fig., the perforance bounds are plotted with the nuber of inforation bits = and with an equal power allocation E p = E B b = (i.e. ε = N H /(n + N H )). Fig. indicates that there exists a critical value for both V /σ and average SNR per bit /N that separates two different trends in the APER curves. In particular, when V /σ is above a critical value of around,theaper deteriorates very fast. Below this critical value, the APER decreases ore gently. The corresponding critical value of SNR /N is around db. Additionally, it can be seen that in order to achieve a certain APER requireent, greater channel estiation accuracy or higher /N is needed for a code with fewer parity-check bits. Fig. shows how the paraeter V /σ and the APER affect the goodput perforance. The values of noralized MSbove a critical value of around degrade the goodput perforance very rapidly. The goodput can be iproved by ore accurate channel estiation. However, decreasing the noralized MSE below a value of about 3 leads to diinishing increents in the goodput. Furtherore, in order to achieve a certain goodput requireent, greater channel estiation accuracy is needed for a code with ore parity-check bits. This is because using ore accurate channel estiation copensates for the higher packet error rate induced by a longer packet. The goodput versus the APER in Fig. shows that, for a lower-rate code, a saller APER is required to achieve desired goodput perforance. For afixedsnr /N, higher goodput is obtained by using a higher-rate code but at the expense of worse APER. The above discussion of channel estiation accuracy leads to the consideration of optiu power allocation between channel estiation and data transission to achieve the axiu goodput. The power allocation and the goodput iproveent achieved are shown in Fig. 3 and Fig. 4, respectively. The curves in Fig. 3 indicate that ε is a decreasing function of the total transit SNR γ but it converges to n n and.5 in the high and low SNR regions, respectively. For different codes, an iproveent of about.5 db to db can be observed in Fig. 4 for a given goodput. Less iproveent is achieved when a longer code is used. For a code with = and R =.84, a.5 db iproveent is obtained. VI. CONCLUSION With iperfect CSI, we have studied the effect of channel estiation error on the perforance of an SR-ARQ syste over block Rayleigh fading channels. Closed-for bounds on APER and goodput have quantified the perforance iproveent due to ore accurate CSI. A power allocation between pilot bits and inforation bits has been obtained for achieving axiu goodput. The percentage ε of total power assigned to pilot bits is a decreasing function of total transit SNR γ, but converges to.5 and n n in the low and high SNR regions, respectively. For the sake of siplicity, only the SR- ARQ schee without channel coding is considered as an exaple to deonstrate the effects of iperfect CSI. In our future work, ore advanced channel coding and ARQ schees will be considered to study the effects of iperfect CSI. APPENDIX I By using the Chernoff bound: erfc(x) <e x, an upper bound can be obtained as ( P e ) n e c ĥ e b ĥ d(b ĥ )= Z.
5 This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings R=.83, = R=.9, = R=.5, =5. R=.84, = Average SNR per Bit /N Average SNR per Bit /N ε * ε * Lower Bound on Goodput Fig. 3. The value of ε versus average SNR per bit /N.9 ε=n.8 H /(n+n H ) ε=ε *.7 R=.9, =.6 R=.84, =.5.4 R=.83, =5.3 R=.5, =5.. Note that when l =,ter l j= APPENDIX II (n j)c (b+(j+)c) is defined to be. The optial value ε is a onotonically decreasing function of γ, which can be shown as follows. By changing to the variable x = γ n, (6) becoes ε = +x +x + nx + nx. (3) x nx By taking the first derivative of ε with respective to x and siplifying, the derivative can be arranged to be dε dx ( (n ) +x + nx + nx (nx + x +) ) = +x + nx + nx (x nx). By applying the inequality of arithetic and geoetric eans, the inequality dε /dx is true because of the relationship +x + nx + nx = ( + x)(nx +) +nx + x. Using the onotonically decreasing property of ε, the upper and lower liits of ε can be seen to be li x ε (x) ε li ε (x). (3) x The lower liit can be shown to be +x x li + x + nx + n = n x n n. By applying L Hospital rule, the upper liit is obtained as.5( + n +nx)( + nx + nx + x) li x n =.5 Fig Average SNR per Bit /N The lower bound on the goodput achieved by different values of ε Using integration by parts with u =( ) n and dv = e c ĥ de b ĥ, [uv vdu] can be expressed as ( ) n + nc ( e c ĥ ) n e ĥ (b+c) d ĥ (8) Continuing the integration by parts with u =( e c ĥ ) n and dv = e ĥ (b+c) d ĥ, and perforing the siilar process till the last integral, ter Z coes to ) n + nc ( ) n nc(n )c + ( + Hence, we can get ( ) n (b + c) (b + c)(b +c) nc(n )c c (b + c)(b +c) (b + nc). (9) l= j= (b +(j +)c). (3) REFERENCES [] S. B. Wicker, Error Control Syste for Digital Counication and Storage, st ed. Upper Saddle River,New Jersey: Prentice-Hall, 995. [] S. Lin and D. J. Costello, Error control coding. Englewood Cliffs, NJ: Prentice-Hall, 4. [3] D. Qiao, S. Choi, and K. G. Shin, Goodput Analysis and Link Adaptation for IEEE 8.a Wireless LANs, IEEE Tansaction on Mobile Coputing, vol.,. [4] J. Yun and M. Kavehrad, Markov Error structure for Throughput Analysis of Adaptive Modulation Systes Cobined with ARQ over Correlated Fading Channels, IEEE Transaction on Vehicular Technology, vol. 54, 5. [5] Y. Zhou and J. Wang, Optiu subpacket transission for hybrid ARQ systes, IEEE Transaction on Counications, May 6. [6] J.-F. T. Cheng, Coding Perforance of Hybrid ARQ Schees, IEEE Transactions on Counications, vol. 54, no. 6, 6. [7] H.-C. Yang and S. Sasankan, Analysis of Channel-Adaptive Packet Transission Over Fading Channels With Transit Buffer Manageent, IEEE Transactions on Vehicular Technology, vol. 57, no., 8. [8] A. Steiner and S. S. (Shitz), Multi-Layer Broadcasting Hybrid-ARQ Strategies for Block Fading Channels, IEEE Transactions on Wireless Counications, vol. 7, no. 7, 8. [9] C. Pientel and R. L. Siqueira, Analysis of the Go-Back-N Protocol on Finite-State Markov Rician Fading Channels, IEEE Transactions on Wireless Counications, vol. 57, no. 4, 8. [] S. Haykin, Adaptive Filter Theory, 4th ed. Upper Saddle River,New Jersey: Prentice-Hall,. [] P. Y. Ka, Optial Detection of Digital Data Over the Nonselective Rayleigh Fading Channel with Diversity Reception, IEEE Transactions on Counications, vol. 39, no., pp. 4 9, Feb 99.
On Constant Power Water-filling
On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives
More informationSPECTRUM sensing is a core concept of cognitive radio
World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile
More informationNon-Parametric Non-Line-of-Sight Identification 1
Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,
More informationRateless Codes for MIMO Channels
Rateless Codes for MIMO Channels Marya Modir Shanechi Dept EECS, MIT Cabridge, MA Eail: shanechi@itedu Uri Erez Tel Aviv University Raat Aviv, Israel Eail: uri@engtauacil Gregory W Wornell Dept EECS, MIT
More informationA Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay
A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer
More informationSecret-Key Sharing Based on Layered Broadcast Coding over Fading Channels
Secret-Key Sharing Based on Layered Broadcast Coding over Fading Channels Xiaojun Tang WINLAB, Rutgers University Ruoheng Liu Princeton University Predrag Spasojević WINLAB, Rutgers University H. Vincent
More informationThe Transactional Nature of Quantum Information
The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.
More informationOptimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks
1 Optial Resource Allocation in Multicast Device-to-Device Counications Underlaying LTE Networks Hadi Meshgi 1, Dongei Zhao 1 and Rong Zheng 2 1 Departent of Electrical and Coputer Engineering, McMaster
More informationError Exponents in Asynchronous Communication
IEEE International Syposiu on Inforation Theory Proceedings Error Exponents in Asynchronous Counication Da Wang EECS Dept., MIT Cabridge, MA, USA Eail: dawang@it.edu Venkat Chandar Lincoln Laboratory,
More informationEnergy Efficient Predictive Resource Allocation for VoD and Real-time Services
Energy Efficient Predictive Resource Allocation for VoD and Real-tie Services Changyang She and Chenyang Yang 1 arxiv:1707.01673v1 [cs.it] 6 Jul 2017 Abstract This paper studies how to exploit the predicted
More informationThis model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.
CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when
More informationConvolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder
Convolutional Codes Lecture Notes 8: Trellis Codes In this lecture we discuss construction of signals via a trellis. That is, signals are constructed by labeling the branches of an infinite trellis with
More informationFinite-State Markov Modeling of Flat Fading Channels
International Telecounications Syposiu ITS, Natal, Brazil Finite-State Markov Modeling of Flat Fading Channels Cecilio Pientel, Tiago Falk and Luciano Lisbôa Counications Research Group - CODEC Departent
More informationWarning System of Dangerous Chemical Gas in Factory Based on Wireless Sensor Network
565 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 59, 07 Guest Editors: Zhuo Yang, Junie Ba, Jing Pan Copyright 07, AIDIC Servizi S.r.l. ISBN 978-88-95608-49-5; ISSN 83-96 The Italian Association
More informationPower-Controlled Feedback and Training for Two-way MIMO Channels
1 Power-Controlled Feedback and Training for Two-way MIMO Channels Vaneet Aggarwal, and Ashutosh Sabharwal, Senior Meber, IEEE arxiv:0901188v3 [csit] 9 Jan 010 Abstract Most counication systes use soe
More informationA Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair
Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving
More informationOptimal Jamming Over Additive Noise: Vector Source-Channel Case
Fifty-first Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 2-3, 2013 Optial Jaing Over Additive Noise: Vector Source-Channel Case Erah Akyol and Kenneth Rose Abstract This paper
More informationMSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE
Proceeding of the ASME 9 International Manufacturing Science and Engineering Conference MSEC9 October 4-7, 9, West Lafayette, Indiana, USA MSEC9-8466 MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL
More information2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,
2 IEEE. Personal use of this aterial is peritted. Perission fro IEEE ust be obtained for all other uses, in any current or future edia, including reprinting/republishing this aterial for advertising or
More informationFixed-to-Variable Length Distribution Matching
Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de
More informationCompression and Predictive Distributions for Large Alphabet i.i.d and Markov models
2014 IEEE International Syposiu on Inforation Theory Copression and Predictive Distributions for Large Alphabet i.i.d and Markov odels Xiao Yang Departent of Statistics Yale University New Haven, CT, 06511
More informationFeature Extraction Techniques
Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that
More informationOn the Design of MIMO-NOMA Downlink and Uplink Transmission
On the Design of MIMO-NOMA Downlink and Uplink Transission Zhiguo Ding, Meber, IEEE, Robert Schober, Fellow, IEEE, and H. Vincent Poor, Fellow, IEEE Abstract In this paper, a novel MIMO-NOMA fraework for
More informationVulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links
Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp
More informationSystem Performance of Interference Alignment under TDD Mode with Limited Backhaul Capacity
Syste Perforance of Interference Alignent under TDD Mode with Liited Bachaul Capacity Matha Deghel, Mohaad Assaad and Mérouane Debbah Departent of Telecounications SUPELEC, Gif-sur-Yvette, France Matheatical
More informationFundamentals of Image Compression
Fundaentals of Iage Copression Iage Copression reduce the size of iage data file while retaining necessary inforation Original uncopressed Iage Copression (encoding) 01101 Decopression (decoding) Copressed
More informationIntelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines
Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes
More informationLow-complexity, Low-memory EMS algorithm for non-binary LDPC codes
Low-coplexity, Low-eory EMS algorith for non-binary LDPC codes Adrian Voicila,David Declercq, François Verdier ETIS ENSEA/CP/CNRS MR-85 954 Cergy-Pontoise, (France) Marc Fossorier Dept. Electrical Engineering
More informationSparse beamforming in peer-to-peer relay networks Yunshan Hou a, Zhijuan Qi b, Jianhua Chenc
3rd International Conference on Machinery, Materials and Inforation echnology Applications (ICMMIA 015) Sparse beaforing in peer-to-peer relay networs Yunshan ou a, Zhijuan Qi b, Jianhua Chenc College
More information4920 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 12, DECEMBER 2015
4920 IEEE TRASACTIOS O COMMUICATIOS, VOL. 63, O. 12, DECEMBER 2015 Energy Efficient Coordinated Beaforing for Multicell Syste: Duality-Based Algorith Design and Massive MIMO Transition Shiwen He, Meber,
More informationExperimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis
City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna
More informationBlock designs and statistics
Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent
More information4196 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 64, NO. 10, OCTOBER 2016
4196 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 64, NO. 10, OCTOBER 2016 Linear Precoding ain for Large MIMO Configurations With QAM and Reduced Coplexity Thoas Ketseoglou, Senior Meber, IEEE, and Ender
More informationContent Caching and Delivery in Wireless Radio Access Networks
Content Caching and Delivery in Wireless Radio Access Networks Meixia Tao, Deniz Gündüz, Fan Xu, and Joan S. Pujol Roig Abstract arxiv:904.07599v [cs.it] 6 Apr 209 Today s obile data traffic is doinated
More informationWhen Short Runs Beat Long Runs
When Short Runs Beat Long Runs Sean Luke George Mason University http://www.cs.gu.edu/ sean/ Abstract What will yield the best results: doing one run n generations long or doing runs n/ generations long
More informationFast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials
Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter
More informationDevice-to-Device Collaboration through Distributed Storage
Device-to-Device Collaboration through Distributed Storage Negin Golrezaei, Student Meber, IEEE, Alexandros G Diakis, Meber, IEEE, Andreas F Molisch, Fellow, IEEE Dept of Electrical Eng University of Southern
More informationOutline. Digital Communications. Lecture 12 Performance over Fading Channels and Diversity Techniques. Flat-Flat Fading. Intuition
Digital Counications Lecture 2 Perforance over Fading Channels and Diversity Techniques Pierluigi SALVO ROSSI Outline Noncoherent/Coherent Detection 2 Channel Estiation Departent of Industrial and Inforation
More informationNonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy
Storage Capacity and Dynaics of Nononotonic Networks Bruno Crespi a and Ignazio Lazzizzera b a. IRST, I-38050 Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I-38050 Povo (Trento) Italy INFN Gruppo
More informationDesign of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding
IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas
More informationWitsenhausen s counterexample as Assisted Interference Suppression
Witsenhausen s counterexaple as Assisted Interference Suppression Pulkit Grover and Anant Sahai Wireless Foundations, epartent of EECS University of California at Berkeley, CA-947, USA {pulkit, sahai}@eecs.berkeley.edu
More informationSymbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm
Acta Polytechnica Hungarica Vol., No., 04 Sybolic Analysis as Universal Tool for Deriving Properties of Non-linear Algoriths Case study of EM Algorith Vladiir Mladenović, Miroslav Lutovac, Dana Porrat
More informationInspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information
Cite as: Straub D. (2014). Value of inforation analysis with structural reliability ethods. Structural Safety, 49: 75-86. Value of Inforation Analysis with Structural Reliability Methods Daniel Straub
More informationDistributed Subgradient Methods for Multi-agent Optimization
1 Distributed Subgradient Methods for Multi-agent Optiization Angelia Nedić and Asuan Ozdaglar October 29, 2007 Abstract We study a distributed coputation odel for optiizing a su of convex objective functions
More informationPattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition
Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lesson 1 4 October 2017 Outline Learning and Evaluation for Pattern Recognition Notation...2 1. The Pattern Recognition
More informationProbability Distributions
Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples
More informationInteractive Markov Models of Evolutionary Algorithms
Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary
More informationA Simple Regression Problem
A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where
More informationANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER
IEPC 003-0034 ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER A. Bober, M. Guelan Asher Space Research Institute, Technion-Israel Institute of Technology, 3000 Haifa, Israel
More informationEstimation of ADC Nonlinearities from the Measurement in Input Voltage Intervals
Estiation of ADC Nonlinearities fro the Measureent in Input Voltage Intervals M. Godla, L. Michaeli, 3 J. Šaliga, 4 R. Palenčár,,3 Deptartent of Electronics and Multiedia Counications, FEI TU of Košice,
More informationAnalyzing Simulation Results
Analyzing Siulation Results Dr. John Mellor-Cruey Departent of Coputer Science Rice University johnc@cs.rice.edu COMP 528 Lecture 20 31 March 2005 Topics for Today Model verification Model validation Transient
More informationUplink Transmission Design with Massive Machine Type Devices in Tactile Internet
Uplink Transission Design wi Massive Machine Type Devices in Tactile Internet Changyang She and Chenyang Yang School of Electronics and Inforation Engineering, Beihang University, Beijing, China Eail:
More informationOn Conditions for Linearity of Optimal Estimation
On Conditions for Linearity of Optial Estiation Erah Akyol, Kuar Viswanatha and Kenneth Rose {eakyol, kuar, rose}@ece.ucsb.edu Departent of Electrical and Coputer Engineering University of California at
More informationDetection and Estimation Theory
ESE 54 Detection and Estiation Theory Joseph A. O Sullivan Sauel C. Sachs Professor Electronic Systes and Signals Research Laboratory Electrical and Systes Engineering Washington University 11 Urbauer
More informationOn the Analysis of the Quantum-inspired Evolutionary Algorithm with a Single Individual
6 IEEE Congress on Evolutionary Coputation Sheraton Vancouver Wall Centre Hotel, Vancouver, BC, Canada July 16-1, 6 On the Analysis of the Quantu-inspired Evolutionary Algorith with a Single Individual
More informationMulti-Scale/Multi-Resolution: Wavelet Transform
Multi-Scale/Multi-Resolution: Wavelet Transfor Proble with Fourier Fourier analysis -- breaks down a signal into constituent sinusoids of different frequencies. A serious drawback in transforing to the
More informationTopic 5a Introduction to Curve Fitting & Linear Regression
/7/08 Course Instructor Dr. Rayond C. Rup Oice: A 337 Phone: (95) 747 6958 E ail: rcrup@utep.edu opic 5a Introduction to Curve Fitting & Linear Regression EE 4386/530 Coputational ethods in EE Outline
More informationUpper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels
ISIT7, Nice, France, June 4 June 9, 7 Upper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels Ahed A. Farid and Steve Hranilovic Dept. Electrical and Coputer Engineering McMaster
More informationCompressive Sensing Over Networks
Forty-Eighth Annual Allerton Conference Allerton House, UIUC, Illinois, USA Septeber 29 - October, 200 Copressive Sensing Over Networks Soheil Feizi MIT Eail: sfeizi@it.edu Muriel Médard MIT Eail: edard@it.edu
More informationarxiv: v3 [cs.ds] 22 Mar 2016
A Shifting Bloo Filter Fraewor for Set Queries arxiv:1510.03019v3 [cs.ds] Mar 01 ABSTRACT Tong Yang Peing University, China yangtongeail@gail.co Yuanun Zhong Nanjing University, China un@sail.nju.edu.cn
More informationPartition-Based Distribution Matching
MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.erl.co Partition-Based Distribution Matching Fehenberger, T.; Millar, D.S.; Koike-Akino, T.; Kojia, K.; Parsons, K. TR2018-023 January 2018 Abstract
More informationMachine Learning Basics: Estimators, Bias and Variance
Machine Learning Basics: Estiators, Bias and Variance Sargur N. srihari@cedar.buffalo.edu This is part of lecture slides on Deep Learning: http://www.cedar.buffalo.edu/~srihari/cse676 1 Topics in Basics
More informationASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical
IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul
More informationProc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES
Proc. of the IEEE/OES Seventh Working Conference on Current Measureent Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Belinda Lipa Codar Ocean Sensors 15 La Sandra Way, Portola Valley, CA 98 blipa@pogo.co
More informationMULTIAGENT Resource Allocation (MARA) is the
EDIC RESEARCH PROPOSAL 1 Designing Negotiation Protocols for Utility Maxiization in Multiagent Resource Allocation Tri Kurniawan Wijaya LSIR, I&C, EPFL Abstract Resource allocation is one of the ain concerns
More informationGeneral Properties of Radiation Detectors Supplements
Phys. 649: Nuclear Techniques Physics Departent Yarouk University Chapter 4: General Properties of Radiation Detectors Suppleents Dr. Nidal M. Ershaidat Overview Phys. 649: Nuclear Techniques Physics Departent
More informationDistributed Lossy Averaging
Distribute Lossy Averaging Han-I Su Departent of Electrical Engineering Stanfor University Stanfor, CA 94305, USA Eail: hanisu@stanforeu Abbas El Gaal Departent of Electrical Engineering Stanfor University
More informationControlled Flooding Search with Delay Constraints
Controlled Flooding Search with Delay Constraints Nicholas B. Chang and Mingyan Liu Departent of Electrical Engineering and Coputer Science University of Michigan, Ann Arbor, MI 4809-222 Eail: {changn,ingyan}@eecs.uich.edu
More informationAdaptation to the Primary User CSI in Cognitive Radio Sensing and Access
Adaptation to e Priary User CSI in Cognitive Radio Sensing and Access Yuan Lu, Alexandra Duel-Hallen Departent of Electrical and Coputer Engineering Nor Carolina State University Raleigh, NC, 2766 {ylu8,
More informationPULSE-TRAIN BASED TIME-DELAY ESTIMATION IMPROVES RESILIENCY TO NOISE
PULSE-TRAIN BASED TIME-DELAY ESTIMATION IMPROVES RESILIENCY TO NOISE 1 Nicola Neretti, 1 Nathan Intrator and 1,2 Leon N Cooper 1 Institute for Brain and Neural Systes, Brown University, Providence RI 02912.
More informationAchievable Rates for Shaped Bit-Metric Decoding
Achievable Rates for Shaped Bit-Metric Decoding Georg Böcherer, Meber, IEEE Abstract arxiv:40.8075v6 [cs.it] 8 May 06 A new achievable rate for bit-etric decoding (BMD) is derived using rando coding arguents.
More informationE0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis
E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds
More informationRobust Scheduling and Resource Allocation in the Downlink of Spatially Correlated MIMO-OFDMA Wireless Systems With Imperfect CSIT
Edinburgh esearch Explorer obust Scheduling and esource Allocation in the Downlink of Spatially Correlated MIMO-OFDMA Wireless Systes With Iperfect CSIT Citation for published version: Feenias, G, iera-palou,
More informationECS455: Chapter 5 OFDM
ECS455: Chapter 5 OFDM 5.4 Cyclic Prefix (CP) 1 Dr.Prapun Suksopong prapun.co/ecs455 Office Hours: BKD 3601-7 Tuesday 9:30-10:30 Friday 14:00-16:00 Three steps towards odern OFDM 1. Mitigate Multipath
More informationDistributed Inference with M-ary Quantized Data in the Presence of Byzantine Attacks
Distributed Inference with -ary Quantized Data in the Presence of Byzantine Attacks V Srira Siddhardh Sid) Nadendla, Student eber, IEEE, Yunghsiang S Han, Fellow, IEEE, and Praod K Varshney, Fellow, IEEE
More informationSharp Time Data Tradeoffs for Linear Inverse Problems
Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used
More informationAntenna Saturation Effects on MIMO Capacity
Antenna Saturation Effects on MIMO Capacity T S Pollock, T D Abhayapala, and R A Kennedy National ICT Australia Research School of Inforation Sciences and Engineering The Australian National University,
More informationFinite Horizon Throughput Maximization and Sensing Optimization in Wireless Powered Devices over Fading Channels
Finite Horizon Throughput Maxiization and Sensing Optiization in Wireless Powered Devices over Fading Channels Mehdi Salehi Heydar Abad, Ozgur Ercetin arxiv:1804.01834v2 [cs.it] 9 Sep 2018 Abstract Wireless
More informationarxiv: v1 [cs.ds] 3 Feb 2014
arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/
More informationTEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES
TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES S. E. Ahed, R. J. Tokins and A. I. Volodin Departent of Matheatics and Statistics University of Regina Regina,
More informationOptimal nonlinear Bayesian experimental design: an application to amplitude versus offset experiments
Geophys. J. Int. (23) 155, 411 421 Optial nonlinear Bayesian experiental design: an application to aplitude versus offset experients Jojanneke van den Berg, 1, Andrew Curtis 2,3 and Jeannot Trapert 1 1
More informationMatrix Inversion-Less Signal Detection Using SOR Method for Uplink Large-Scale MIMO Systems
Matrix Inversion-Less Signal Detection Using SOR Method for Uplin Large-Scale MIMO Systes Xinyu Gao, Linglong Dai, Yuting Hu, Zhongxu Wang, and Zhaocheng Wang Tsinghua National Laboratory for Inforation
More informationThe accelerated expansion of the universe is explained by quantum field theory.
The accelerated expansion of the universe is explained by quantu field theory. Abstract. Forulas describing interactions, in fact, use the liiting speed of inforation transfer, and not the speed of light.
More informationARTICLE IN PRESS. Murat Hüsnü Sazlı a,,canişık b. Syracuse, NY 13244, USA
S1051-200406)00002-9/FLA AID:621 Vol ) [+odel] P1 1-7) YDSPR:3SC+ v 153 Prn:13/02/2006; 15:33 ydspr621 by:laurynas p 1 Digital Signal Processing ) wwwelsevierco/locate/dsp Neural network ipleentation of
More informationRandomized Accuracy-Aware Program Transformations For Efficient Approximate Computations
Randoized Accuracy-Aware Progra Transforations For Efficient Approxiate Coputations Zeyuan Allen Zhu Sasa Misailovic Jonathan A. Kelner Martin Rinard MIT CSAIL zeyuan@csail.it.edu isailo@it.edu kelner@it.edu
More informationMinimum Rates Scheduling for MIMO OFDM Broadcast Channels
IEEE Ninth International Syposiu on Spread Spectru Techniques and Applications Miniu Rates Scheduling for MIMO OFDM Broadcast Channels Gerhard Wunder and Thoas Michel Fraunhofer Geran-Sino Mobile Counications
More informationDepartment of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China
6th International Conference on Machinery, Materials, Environent, Biotechnology and Coputer (MMEBC 06) Solving Multi-Sensor Multi-Target Assignent Proble Based on Copositive Cobat Efficiency and QPSO Algorith
More informationDistributed Power Control in Full Duplex Wireless Networks
Distributed Power Control in Full Duplex Wireless Networks Yu Wang and Shiwen Mao Departent of Electrical and Coputer Engineering, Auburn University, Auburn, AL 36849-5201 Eail: yzw0049@tigerail.auburn.edu,
More informationFairness via priority scheduling
Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation
More information2.9 Feedback and Feedforward Control
2.9 Feedback and Feedforward Control M. F. HORDESKI (985) B. G. LIPTÁK (995) F. G. SHINSKEY (970, 2005) Feedback control is the action of oving a anipulated variable in response to a deviation or error
More informationControlled Flooding Search with Delay Constraints
Controlled Flooding Search with Delay Constraints Nicholas B. Chang and Mingyan Liu Departent of Electrical Engineering and Coputer Science University of Michigan, Ann Arbor, MI 48109-2122 Eail: {changn,ingyan}@eecs.uich.edu
More informationModified Systematic Sampling in the Presence of Linear Trend
Modified Systeatic Sapling in the Presence of Linear Trend Zaheen Khan, and Javid Shabbir Keywords: Abstract A new systeatic sapling design called Modified Systeatic Sapling (MSS, proposed by ] is ore
More informationUpper bound on false alarm rate for landmine detection and classification using syntactic pattern recognition
Upper bound on false alar rate for landine detection and classification using syntactic pattern recognition Ahed O. Nasif, Brian L. Mark, Kenneth J. Hintz, and Nathalia Peixoto Dept. of Electrical and
More informationRandomized Recovery for Boolean Compressed Sensing
Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch
More informationThe Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks
The Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks Mingyue Ji, Student Meber, IEEE, Giuseppe Caire, Fellow, IEEE, and Andreas F. Molisch, Fellow, IEEE arxiv:3.637v [cs.it] 8 Jul 05 The
More informationConstruction of One-Bit Transmit-Signal Vectors for Downlink MU-MISO Systems with PSK Signaling
1 Construction of One-Bit Transit-Signal Vectors for Downlink MU-MISO Systes with PSK Signaling Gyu-Jeong Park and Song-Na Hong Ajou University, Suwon, Korea, eail: {net2616, snhong}@ajou.ac.kr and quantized
More informationPrinciples of Optimal Control Spring 2008
MIT OpenCourseWare http://ocw.it.edu 16.323 Principles of Optial Control Spring 2008 For inforation about citing these aterials or our Ters of Use, visit: http://ocw.it.edu/ters. 16.323 Lecture 10 Singular
More informationA Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science
A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest
More informationarxiv: v1 [math.nt] 14 Sep 2014
ROTATION REMAINDERS P. JAMESON GRABER, WASHINGTON AND LEE UNIVERSITY 08 arxiv:1409.411v1 [ath.nt] 14 Sep 014 Abstract. We study properties of an array of nubers, called the triangle, in which each row
More informationAn Extension to the Tactical Planning Model for a Job Shop: Continuous-Time Control
An Extension to the Tactical Planning Model for a Job Shop: Continuous-Tie Control Chee Chong. Teo, Rohit Bhatnagar, and Stephen C. Graves Singapore-MIT Alliance, Nanyang Technological Univ., and Massachusetts
More information