簡易檢索 / 詳目顯示

研究生: 王淑賢
論文名稱: Distributed Channel-Aware Transmission Strategies for Cooperative and Cognitive Wireless Networks
應用於合作式與感知無線電網路之分散式通道感知傳輸技術
指導教授: 洪樂文
口試委員: 廖婉君
蘇炫榮
王蒞君
蔡育仁
洪樂文
學位類別: 博士
Doctor
系所名稱: 電機資訊學院 - 通訊工程研究所
Communications Engineering
論文出版年: 2013
畢業學年度: 101
語文別: 英文
論文頁數: 120
中文關鍵詞: 隨意存取網路合作式網路感知無線電網路具通道感知能力的傳輸策略具通道與頻譜感知能力的網路存取策略
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在這篇論文中我們針對分散式無線網路提出具通道或頻譜感知能力的傳輸機制,利用所提出的傳輸機制,使用者將根據自己的通道狀態或頻帶使用狀態來決定傳輸策略,將系統總流量最大化,藉由多重使用者多樣性(multiuser diversity)、合作式中繼(cooperative relaying)、與隨機地存取閒置頻帶來避免通道衰減(fading)與干擾(interference)的傷害。這些傳輸策略,傳統上是由網路中的中央控制者來決斷,但在本文中,我們將讓每位使用者分散式地根據自己所能獲取的資訊、利用通道與頻帶感知能力、以及合作式的傳輸方式來傳送資料。具體而言,我們首先考慮一個時槽式ALOHA網路,每位使用者自行丟擲銅板來決定是否要傳輸。為了使系統的總流量最大化,我們讓每位使用者根據自己到基地台的通道狀態來決定最佳的傳輸機率、速率與能量。若通道資訊有誤差,我們提出的傳輸機制將考量誤差的機率分布而設計,比起沒有考量通道資訊或是沒有考量通道資訊誤差時,我們的方法能有效地提升系統流量。在一個使用者能互相合作、轉傳資料的時槽式ALOHA網路中,我們也提出具通道感知能力的傳輸與合作伙伴選擇策略。相較於使用者間不合作的網路,合作式網路中的傳輸策略會同時考量使用者到基地台的通道狀態與使用者之間的通道狀態。這些傳輸策略也將被應用於感知無線電網路(cognitive radio network)中,此時傳輸策略的決斷將同時考慮通道資訊與頻帶的使用狀態,利用類似的概念來設計具通道與頻譜感知能力的通道存取技術,將感知無線電系統的總流量最大化。然而,感知無線電系統中的使用者將不再直接傳送自己的封包,而是在每個時槽的一開始先發送預約封包來競爭通道,利用通道資訊分裂演算法(splitting algorithm)來解析預約封包,當預約封包的碰撞被解析成功時,就可以讓通道狀態最好的使用者來傳送資料。最後,藉由大量的電腦模擬來展示這些傳輸策略與演算法的成效。


    Channel and/or sensing aware transmission policies for distributed
    wireless networks are proposed in this dissertation. In the proposed
    policies, users are allowed to make transmission decisions based on
    local channel state information (CSI) and/or spectrum occupancy
    information (SOI) to maximize the sum throughput of the system.
    These policies are able to overcome limitations due to fading and
    interference by allowing users to exploit multiuser diversity,
    request cooperative relaying from each other, and opportunistically
    access vacant spectrum. These techniques have been considered in the
    past but mostly from a centralized perspective, where a central
    controller is used to coordinate transmissions. This dissertation
    instead exploits the advantages of channel-aware, spectrum-aware,
    and cooperative transmissions in a decentralized fashion, allowing
    users to make independent transmission decisions based only on local
    information. Specifically, we first consider a slotted ALOHA network
    where each user determines whether to transmit or not according to a
    local coin toss. With the goal of maximizing the sum throughput of
    the network, we derive the optimal channel access policy which
    determines the transmission probability, rate, and power, by
    exploiting the uplink CSI. By assuming that the CSI is imperfect,
    the proposed policy is derived by taking into consideration the
    statistics of the channel estimation error. The throughput can be
    increased substantially compared to the case with no CSI or the case
    where error statistics are not taken into consideration. By allowing
    users to help by relaying each other's packets, channel-aware
    transmission control and partner selection policies are also derived
    for slotted ALOHA networks with cooperative users. In contrast to
    the policies derived for non-cooperative systems, the transmission
    control and partner selection are determined based on both the
    uplink and the inter-user CSI. These concepts can also be applied to
    cognitive radio environments where transmission decisions should not
    only be made based on the channel quality but also on the spectrum
    occupancy. Following similar concepts, a channel and sensing aware
    channel access policy is proposed to maximize the throughput of
    secondary users in cognitive radio systems. However, instead of
    allowing users to transmit their packets directly, a reservation
    period is employed at the beginning of each time slot for users to
    compete for transmission. In the reservation period, a channel-aware
    splitting algorithm is employed to resolve the collision among users
    and to schedule the user with the best channel quality to transmit
    if collision is resolved. The efficacy of the proposed transmission
    policies are demonstrated through extensive computer simulations.

    Abstract i Contents iii 1 Introduction 1 1.1 Background andMotivation . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.2 Summary of Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2 Related Works 11 2.1 Channel-Aware Transmission in Random Access Systems . . . . . . . . . . . 12 2.2 Channel-Aware Transmission and Partner Selection in Cooperative Systems . 14 2.3 Channel and/or Sensing Aware Channel Access in Cognitive Radio Systems 15 3 Channel-Aware Transmission in Slotted ALOHA Networks 18 3.1 Channel-Aware Transmission Control in Single-Carrier Systems . . . . . . . 21 3.2 Channel-Aware Transmission and Power Control in Multi-Carrier Systems . 22 3.3 Performance Comparisons and Simulations . . . . . . . . . . . . . . . . . . . 28 4 Channel-Aware Transmission and Partner Selection in Cooperative Slotted ALOHA Networks 33 4.1 Channel-Aware Transmission and Partner Selection Policies for Two-User Cooperative Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 4.1.1 Throughput Evaluation for the Two-User Case . . . . . . . . . . . . . 37 4.1.2 Optimal Transmission Control for Cooperative Systems with Two Users 40 4.1.3 Delay Analysis for Two-User Cooperative Systems . . . . . . . . . . . 42 4.2 Channel-Aware Transmission and Partner Selection Policies for Cooperative Networks with Arbitrary Number of User . . . . . . . . . . . . . . . . . . . . 43 4.3 Channel-Aware Transmission and Partner Selection with Imperfect Channel Awareness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 4.4 Performance Comparisons and Simulations . . . . . . . . . . . . . . . . . . . 51 5 Channel and Sensing Aware Channel Access in Cognitive Radio Networks 62 5.1 Primary Network and Secondary Network . . . . . . . . . . . . . . . . . . . 62 5.2 Channel-Aware Splitting Algorithmfor CRNs with Single Channel . . . . . . 69 5.3 Channel and Sensing Aware Channel Access (CSCA) Policy for Multi-Channel CRNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 5.4 Low-Complexity CSCA Policy . . . . . . . . . . . . . . . . . . . . . . . . . . 80 5.5 Optimized Channel-Aware Splitting Algorithm . . . . . . . . . . . . . . . . . 82 5.6 CSCA Policy for Non-Identical Secondary Users . . . . . . . . . . . . . . . . 83 5.7 Performance Comparisons and Simulations . . . . . . . . . . . . . . . . . . . 87 6 Conclusion 96 7 Appendix 98 7.1 Proof of Proposition 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 7.1.1 Optimal Transmission Rate . . . . . . . . . . . . . . . . . . . . . . . 98 7.1.2 Optimal Transmission Probability . . . . . . . . . . . . . . . . . . . . 99 7.2 Proof of Lemma 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 7.3 Proof of Lemma 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 7.4 Proof of Proposition 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 7.5 Proof of Proposition 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 7.6 Proof of Proposition 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 7.7 Derivation of the Centralized Channel-Aware Transmission Control and Partner Selection Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107

    [1] R. Knopp and P. A. Humblet, “Information capacity and power control in single-cell
    multiuser communications,” in Proceedings of the IEEE International Conference on
    Communications (ICC), Jun. 1995.
    [2] P. Viswanath, D. N. C. Tse, and R. Laroia, “Opportunistic beamforming using dumb
    antennas,” IEEE Transactions on Information Theory, vol. 48, no. 6, pp. 1277 –1294,
    Jun. 2002.
    [3] S. Adireddy and L. Tong, “Exploiting decentralized channel state information for random
    access,” IEEE Transactions on Information Theory, vol. 51, no. 2, pp. 537–561,
    Feb. 2005.
    [4] X. Qin and R. A. Berry, “Distributed approaches for exploiting multiuser diversity
    in wireless networks,” IEEE Transactions on Information Theory, vol. 52, no. 2, pp.
    392–413, Feb. 2006.
    [5] Y. Cho, C.-S. Hwang, and F. A. Tobagi, “Design of robust random access protocols for
    wireless networks using game theoretic models,” in Proceedings of IEEE INFOCOM,
    Apr. 2008, pp. 1750 –1758.
    [6] S.-H. Wang and Y.-W. P. Hong, “Transmission control with imperfect CSI in channelaware
    slotted ALOHA networks,” IEEE Transactions on Wireless Communications,
    vol. 8, no. 10, pp. 5214–5224, Oct. 2009.
    [7] Y. Zhu and Z. Niu, “A channel-aware adaptive control to the MAC protocol in rate
    adaptive wireless LANs,” Wireless Communications and Mobile Computing, vol. 5, no. 8,
    pp. 983–994, Dec. 2005.
    [8] C.-S. Hwang, K. Seong, and J. M. Cioffi, “Opportunistic p-persistent CSMA in wireless
    networks,” in Proceedings of IEEE International Conference on Communications (ICC),
    vol. 1, Jun. 2006, pp. 183 –188.
    [9] J.-G. Choi and S. Bahk, “Channel aware MAC scheme based on CSMA/CA,” in Proceedings
    of IEEE Vehicular Technology Conference, vol. 3, May 2004, pp. 1559 – 1563.
    [10] N. Abramson, “The ALOHA system - another alternative for computer communications,”
    in Proceedings of Fall Joint Computer Conference, AFIPS, vol. 44, Montvale,
    NJ, 1970.
    [11] A. Sendonaris, E. Erkip, and B. Aazhang, “User Cooperation Diversity–Part I: System
    Description” and “User Cooperation Diversity–Part II: Implementation Aspects and
    Performance Analysis,” IEEE Transactions on Communications, vol. 51, no. 11, Nov.
    2003.
    [12] J. Laneman, D. Tse, and G. Wornell, “Cooperative diversity in wireless networks: Efficient
    protocols and outage behavior,” IEEE Transactions on Information Theory,
    vol. 50, no. 12, pp. 3062–3080, Dec. 2004.
    [13] Y.-W. P. Hong, W. J. Huang, and C. C. J. Kuo, Eds., Cooperative Communications
    and Networking: Technologies and System Design. Springer, 2010.
    [14] M. Janani, A. Hedayat, T. E. Hunter, and A. Nosratinia, “Coded cooperation in wireless
    communications: Space-time transmission and iterative decoding,” IEEE Transactions
    on Signal Processing, vol. 52, no. 2, pp. 362–371, Feb. 2004.
    [15] C.-K. Lin and Y.-W. P. Hong, “On the finite-user stability region of slotted ALOHA
    with cooperative users,” in Proceedings of IEEE International Conference on Communications
    (ICC), 2008.
    [16] Y.-W. Hong, C.-K. Lin, and S.-H. Wang, “On the stability region of finite-user slotted
    ALOHA with cooperative relays,” in Proceedings of the International Symposium on
    Information Theory (ISIT), 2007.
    [17] Y.-W. P. Hong, C.-K. Lin, and S.-H. Wang, “Exploiting cooperative advantages in
    slotted ALOHA random access networks,” IEEE Transactions on Information Theory,
    vol. 56, no. 8, pp. 3828–3846, Aug. 2010.
    [18] M. S. Gokturk, O. Ercetin, and O. Gurbuz, “Throughput analysis of ALOHA with
    cooperative diversity,” IEEE Communications Letters, vol. 12, no. 6, pp. 468–470, Jun.
    2008.
    [19] R. Samano-Robles and A. Gameiro, “A slotted ALOHA protocol with cooperative diversity,”
    in Proceedings of the 4th Annual International Conference on Wireless Internet,
    2008.
    [20] J. M. Shea, T. F. Wong, and W.-H. Wong, “Cooperative diversity slotted aloha,” Wireless
    Networking, vol. 13, no. 3, pp. 361–369, Jun. 2007.
    [21] Y.-H. Chiang and K.-C. Chen, “Optimal cooperative ALOHA multiple access in fading
    channels,” IEEE Communications Letters, vol. 14, no. 8, pp. 779–781, Aug. 2010.
    [22] A. A. El-Sherif and K. J. R. Liu, “Cooperation in random access networks: Protocol
    design and performance analysis,” IEEE Journal on Selected Areas in Communications,
    vol. 30, no. 9, pp. 1694 –1702, Oct. 2012.
    [23] M. Levorato, A. Munari, and M. Zorzi, “On the effectiveness of cooperation in carrier
    sense-based ad hoc networks,” in IEEE Communications Society Conference on Sensor,
    Mesh and Ad Hoc Communications and Networks (SECON), Jun. 2009, pp. 1 –9.
    [24] Y.-W. Hong, C.-K. Lin, and S.-H. Wang, “On the stability of two-user slotted ALOHA
    with channel-aware and cooperative users,” in Proceedings of the IEEE Workshop on
    Wireless Networks: Communication, Cooperation and Competition (WNC3), 2007.
    [25] S. Vakil and B. Liang, “Decentralized multiuser diversity with cooperative relaying in
    wireless sensor networks,” in Proceedings of the 4th Annual IEEE Communications Society
    Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON),
    Jun. 2007, pp. 560–569.
    [26] ——, “Multiuser diversity and cooperative relaying in wireless networks with short-term
    power constraint,” in Proceedings of the 24th Biennial Symposium on Communications,
    Jun. 2008, pp. 166–169.
    [27] S.-H. Wang, A.-D. Lin, and Y.-W. P. Hong, “Channel-aware transmission control for
    cooperative random access networks,” in Proceedings of 2010 IEEE 71st Vehicular Technology
    Conference (VTC 2010-Spring), May 2010.
    [28] “Spectrum policy task force report,” Federal Communications Commision, Report Et
    docket No. 02-135, November 2002.
    [29] J. Mitola and G. Maguire, “Cognitive radio: making software radios more personal,”
    IEEE Personal Communications, vol. 6, no. 4, pp. 13 –18, Aug. 1999.
    [30] S. Haykin, “Cognitive radio: brain-empowered wireless communications,” IEEE Journal
    on Selected Areas in Communications, vol. 23, no. 2, pp. 201–220, Feb. 2005.
    [31] S. Srinivasa and S. A. Jafar, “The throughput potential of cognitive radio: A theoretical
    perspective,” in Proceedings of the Fortieth Asilomar Conference on Signals, Systems
    and Computers (ACSSC), Nov. 2006, pp. 221–225.
    [32] A. Goldsmith, S. A. Jafar, I. Maric, and S. Srinivasa, “Breaking spectrum gridlock
    with cognitive radios: An information theoretic perspective,” Proceedings of the IEEE,
    vol. 97, no. 5, pp. 894 –914, May 2009.
    [33] A. G. Marques, L. M. Lopez-Ramos, G. B. Giannakis, and J. Ramos, “Resource allocation
    for interweave and underlay cognitive radios under probability-of-interference
    constraints,” IEEE Journal on Selected Areas in Communications, vol. 30, no. 11, 2012.
    [34] Q. Zhao and B. M. Sadler, “A survey of dynamic spectrum access,” IEEE Signal Processing
    Magazine, vol. 24, no. 3, pp. 79 –89, May 2007.
    [35] M. G. Khoshkholgh, K. Navaie, and H. Yanikomeroglu, “Access strategies for spectrum
    sharing in fading environment: Overlay, underlay, and mixed,” IEEE Transactions on
    Mobile Computing, vol. 9, no. 12, pp. 1780 –1793, Dec. 2010.
    [36] A. G. Marques, X. Wang, and G. B. Giannakis, “Dynamic resource management for
    cognitive radios using limited-rate feedback,” IEEE Transactions on Signal Processing,
    vol. 57, no. 9, pp. 3651–3666, Sep. 2009.
    [37] M. H. Cheung, V. Wong, and R. Schober, “SINR-based random access for cognitive
    radio: Distributed algorithm and coalitional game,” IEEE Transactions on Wireless
    Communications, vol. 10, no. 11, pp. 3887–3897, Nov. 2011.
    [38] X. Qin and R. Berry, “Opportunistic splitting algorithms for wireless networks,” in
    Proceedings of the 23th Annual Joint Conference of the IEEE Computer and Communications
    Societies, vol. 3, Mar. 2004, pp. 1662–1672.
    [39] S. Gunawardena and W. Zhuang, “Capacity analysis and call admission control in distributed
    cognitive radio networks,” IEEE Transactions on Wireless Communications,
    vol. 10, no. 9, pp. 3110–3120, Sep. 2011.
    [40] A. El-Sherif and K. Liu, “Joint design of spectrum sensing and channel access in cognitive
    radio networks,” IEEE Transactions on Wireless Communications, vol. 10, no. 6,
    pp. 1743 –1753, Jun. 2011.
    [41] H. Huang and V. K. N. Lau, “Delay-sensitive distributed power and transmission threshold
    control for s-ALOHA network with finite state markov fading channels,” IEEE
    Transactions on Wireless Communications, vol. 8, no. 11, pp. 5632–5638, Nov. 2009.
    [42] K. Balachandran, S. R. Kadaba, and S. Nanda, “Channel quality estimation and rate
    adaptation for cellular mobile radio,” IEEE Journal on Selected Areas in Communications,
    vol. 17, no. 7, pp. 1244–1256, Jul. 1999.
    [43] I. Menache and N. Shimkin, “Rate-based equilibria in collision channels with fading,”
    IEEE Journal on Selected Areas in Communications, vol. 26, no. 7, pp. 1070 –1077,
    Sep. 2008.
    [44] Y. Jin, G. Kesidis, and J. W. Jang, “A channel aware MAC protocol in an ALOHA
    network with selfish users,” IEEE Journal on Selected Areas in Communications, vol. 30,
    no. 1, pp. 128 –137, Jan. 2012.
    [45] S.-H. Wang and Y.-W. P. Hong, “Transmission control with imperfect CSI in channelaware
    slotted ALOHA networks,” in Proceedings of IEEE International Conference on
    Communications (ICC), 2009.
    [46] F.-T. Hsu and H.-J. Su, “Random access game in fading channels with capture: Equilibria
    and braess-like paradoxes,” IEEE Transactions on Signal Processing, vol. 59, no. 3,
    pp. 1158 –1169, Mar. 2011.
    [47] M. H. Ngo, V. Krishnamurthy, and L. Tong, “Optimal channel-aware ALOHA protocol
    for random access inWLANs with multipacket reception and decentralized channel state
    information,” IEEE Transactions on Signal Processing, vol. 56, no. 6, pp. 2575–2588,
    Jun. 2008.
    [48] B. Rong and A. Ephremides, “Protocol-level cooperation in wireless networks: Stable
    throughput and delay analysis,” in Proceedings of International Symposium on Modeling
    and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOPT), Jun. 2009, pp.
    1 –10.
    [49] A. Bletsas, A. Khisti, D. P. Reed, and A.Lippman, “A simple cooperative diversity
    method based on network path selection,” IEEE Journal on Selected Areas in Communications,
    vol. 24, no. 3, pp. 659–672, Mar. 2006.
    [50] Y.-W. Hong, W.-J. Huang, F.-H. Chiu, and C.-C. J. Kuo, “Cooperative communications
    in resource-constrained wireless networks,” IEEE Signal Processing Magazine, vol. 24,
    no. 3, pp. 47–57, May 2007.
    [51] A. S. Ibrahim, A. K. Sadek, W. Su, and K. J. R. Liu, “Cooperative communications with
    relay-selection: when to cooperate and whom to cooperate with?” IEEE Transactions
    on Wireless Communications, vol. 7, no. 7, pp. 2814–2827, Jul. 2008.
    [52] A. Nosratinia and T. E. Hunter, “Grouping and partner selection in cooperative wireless
    networks,” IEEE Journal on Selected Areas in Communications, vol. 25, no. 2, pp. 369
    –378, Feb. 2007.
    [53] Y. Li, Q. Yin, W. Xu, and H.-M. Wang, “On the design of relay selection strategies in
    regenerative cooperative networks with outdated CSI,” IEEE Transactions on Wireless
    Communications, vol. 10, no. 9, pp. 3086–3097, Sep. 2011.
    [54] W.-J. Huang, Y.-W. P. Hong, and C. C. J. Kuo, “Lifetime maximization for amplifyand-
    forward cooperative networks,” IEEE Transactions on Wireless Communications,
    vol. 7, no. 5, pp. 1800–1805, May 2008.
    [55] P. Castiglione, S. Savazzi, M. Nicoli, and G. Matz, “Partner selection in cooperative
    networks: Efficiency vs fairness in ricean fading channels,” in Proceedings of the 4th International
    Symposium on Communications, Control and Signal Processing (ISCCSP),
    Mar. 2010, pp. 1 –5.
    [56] Q. Zhao, S. Geirhofer, L. Tong, and B. M. Sadler, “Opportunistic spectrum access via
    periodic channel sensing,” IEEE Transactions on Signal Processing, vol. 56, no. 2, pp.
    785 –796, Feb. 2008.
    [57] Y. Chen, Q. Zhao, and A. Swami, “Joint design and separation principle for opportunistic
    spectrum access in the presence of sensing errors,” IEEE Transactions on Information
    Theory, vol. 54, no. 5, pp. 2053 –2071, May 2008.
    [58] S. Ahmad, M. Liu, T. Javidi, Q. Zhao, and B. Krishnamachari, “Optimality of myopic
    sensing in multichannel opportunistic access,” IEEE Transactions on Information
    Theory, vol. 55, no. 9, pp. 4040–4050, Sep. 2009.
    [59] K. Liu, Q. Zhao, and B. Krishnamachari, “Dynamic multichannel access with imperfect
    channel state detection,” IEEE Transactions on Signal Processing, vol. 58, no. 5, pp.
    2795 –2808, May 2010.
    [60] L. Keqin, Q. Zhao, and Y. Chen, “Distributed sensing and access in cognitive radio
    networks,” in IEEE 10th International Symposium on Spread Spectrum Techniques and
    Applications, Aug. 2008, pp. 23–27.
    [61] L. Lai, H. E. Gamal, H. Jiang, and H. V. Poor, “Cognitive medium access: Exploration,
    exploitation, and competition,” IEEE Transactions on Mobile Computing, vol. 10, no. 2,
    pp. 239–253, Feb. 2011.
    [62] H. Su and X. Zhang, “Cross-layer based opportunistic MAC protocols for QoS provisionings
    over cognitive radio wireless networks,” IEEE Journal on Selected Areas in
    Communications, vol. 26, no. 1, pp. 118–129, Jan. 2008.
    [63] Y. Lu and A. Duel-Hallen, “CSI-aided mac with multiuser diversity for cognitive radio
    networks,” in Proceedings of CoRR., 2011.
    [64] S.-H.Wang and Y.-W. P. Hong, “Channel-aware reservation-based mac protocol for cognitive
    radio networks,” in Proceedings of Asia Pacific Signal and Information Processing
    Association Annual Summit and Conference (APSIPA ASC), 2009.
    [65] S.-H. Wang, C.-Y. Hsu, and Y.-W. P. Hong, “Channel and sensing aware channel access
    policy for multi-channel cognitive radio networks,” in Proceedings of IEEE International
    Conference on Acoustics, Speech and Signal Processing (ICASSP), Mar. 2012, pp. 3141–
    3144.
    [66] R. Wang, V. K. N. Lau, L. Lv, and B. Chen, “Joint cross-layer scheduling and spectrum
    sensing for OFDMA cognitive radio systems,” IEEE Transactions on Wireless
    Communication, vol. 8, no. 5, pp. 2410–2416, May 2009.
    [67] R. Zhang, S. Cui, and Y.-C. Liang, “On ergodic sum capacity of fading cognitive
    multiple-access and broadcast channels,” IEEE Transactions on Information Theory,
    vol. 55, no. 11, pp. 5161–5178, Nov. 2009.
    [68] Y. He and S. Dey, “Throughput maximization in cognitive radio under peak interference
    constraints with limited feedback,” IEEE Transactions on Vehicular Technology, vol. 61,
    no. 3, pp. 1287–1305, Mar. 2012.
    [69] A. Tajer and X. Wang, “Multiuser diversity gain in cognitive networks,” IEEE/ACM
    Transactions on Networking, vol. 18, no. 6, pp. 1766–1779, Dec. 2010.
    [70] J.-P. Hong and W. Choi, “Capacity scaling law by multiuser diversity in cognitive
    radio systems,” in Proceedings of IEEE International Symposium on Information Theory
    (ISIT), 2010, pp. 2088–2092.
    [71] R. Zhang and Y.-C. Liang, “Investigation on multiuser diversity in spectrum sharing
    based cognitive radio networks,” IEEE Communications Letters, vol. 14, no. 2, pp.
    133–135, Feb. 2010.
    [72] Y. Li and A. Nosratinia, “Hybrid opportunistic scheduling in cognitive radio networks,”
    IEEE Transactions on Wireless Communications, vol. 11, no. 1, pp. 328–337, Jan. 2012.
    [73] X. Tang, M.-S. Alouini, and A. J. Goldsmith, “Effect of channel estimation error on MQAM
    BER performance in rayleigh fading,” IEEE Transactions on Communications,
    vol. 47, no. 12, pp. 1856 –1864, Dec. 1999.
    [74] T. Yoo and A. Goldsmith, “Capacity of fading mimo channels with channel estimation
    error,” in Proceedings of IEEE International Conference on Communications (ICC),
    vol. 2, Jun. 2004, pp. 808–813.
    [75] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge University Press,
    2004.
    [76] R. Loynes, “The stability of a queue with non-independent inter-arrival and service
    times,” Proceedings of the Cambridge Philosophical Society, vol. 58, pp. 497–520, 1962.
    [77] M. S.Bazaraa, H. D. Sherali, and C. M. Shetty, Nonlinear Programming: Theory and
    Algorithms. John Wiley & Sons, Inc., 2005.
    [78] M. Sidi and A. Segall, “Two interfering queues in packet-radio networks,” IEEE Transactions
    on Communications, vol. 31, no. 1, pp. 123 – 129, Jan. 1983.
    [79] W. Szpankowski, “Stability conditions for some distributed systems: Buffered random
    access systems,” Advances in Applied Probability, vol. 26, no. 2, pp. 498–515, Jun. 1994.
    [80] D. Cabric, S. M. Mishra, and R. W. Brodersen, “Implementation issues in spectrum
    sensing for cognitive radios,” in Conference Record of the 38th Asilomar Conference on
    Signals, Systems and Computers, vol. 1, Nov. 2004, pp. 772–776.
    [81] S. M. Mishra, A. Sahai, and R. W. Brodersen, “Cooperative sensing among cognitive
    radios,” in Proceedings of IEEE International Conference on Communications (ICC),
    vol. 4, Jun. 2006, pp. 1658–1663.
    [82] J. Unnikrishnan and V. V. Veeravalli, “Cooperative sensing for primary detection in
    cognitive radio,” IEEE Journal of Selected Topics in Signal Processing, vol. 2, no. 1,
    pp. 18–27, Feb. 2008.
    [83] F. P. Kelly, A. Maulloo, and D. Tan, “Rate control for communication networks: Shadow
    prices, proportional fairness and stability,” Journal of the Operational Research Society,
    vol. 49, no. 3, pp. 237–252, Mar. 1998.
    [84] Z. Shen, J. G. Andrews, and B. L. Evans, “Adaptive resource allocation in multiuser
    OFDM systems with proportional rate constraints,” IEEE Transactions on Wireless
    Communications, vol. 4, no. 6, pp. 2726–2737, Nov. 2005.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE