2016
DOI: 10.1109/twc.2016.2561273
|View full text |Cite
|
Sign up to set email alerts
|

Energy-Efficient Packet Scheduling With Finite Blocklength Codes: Convexity Analysis and Efficient Algorithms

Abstract: This paper considers an energy-efficient packet scheduling problem over quasi-static block fading channels. The goal is to minimize the total energy for transmitting a sequence of data packets under the first-in-first-out rule and strict delay constraints. Conventionally, such design problem is studied under the assumption that the packet transmission rate can be characterized by the classical Shannon capacity formula, which, however, may provide inaccurate energy consumption estimation, especially when the co… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
79
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 121 publications
(79 citation statements)
references
References 32 publications
(139 reference statements)
0
79
0
Order By: Relevance
“…As is shown in [6], F m > 0 and F x > 0 always hold with m > 0 and x > 0 respectively. Thus the monotonicity of E(m) = m k Γ k (m k ) can be verified by…”
Section: Appendix a Proof Of Lemmamentioning
confidence: 75%
See 1 more Smart Citation
“…As is shown in [6], F m > 0 and F x > 0 always hold with m > 0 and x > 0 respectively. Thus the monotonicity of E(m) = m k Γ k (m k ) can be verified by…”
Section: Appendix a Proof Of Lemmamentioning
confidence: 75%
“…Note that (4b) with k = 1 corresponds to (2), and (4b) with k = 2 corresponds to (3). Constraints (4c) represents the minimum blocklength constraint for (4b) holding true [5] [6] (typicallym = 100), while (4d) and (4e) are the transmission power constraints.…”
Section: System Model and Problem Formulationsmentioning
confidence: 99%
“…Let E ⋆ (S m ) be the minimum average energy going to the state S m . According to (12), it is easy to prove that…”
Section: Low Complexity Algorithm With Dynamic Programmingmentioning
confidence: 99%
“…Similar to H2H communications, ensuring short queueing delay is also necessary for URLLC, where queueing delay requirement should be characterized by the queueing delay bound and its violation probability. Considering that packets are randomly generated and the service rate of a wireless link could be random, queueing delay has been considered in single-user scenarios [11][12][13] and multi-user scenarios [14], where achievable rate in finite blocklength regime was applied in their analyses. A packet scheduling policy was proposed under strict delay bound constraint on queueing delay in [11], which cannot be satisfied with probability one due to channel fading.…”
Section: Introductionmentioning
confidence: 99%
“…A packet scheduling policy was proposed under strict delay bound constraint on queueing delay in [11], which cannot be satisfied with probability one due to channel fading. To show when the delay bound can be satisfied, a feasible condition was obtained, but delay bound violation probability can not be derived under the framework in [11]. To analyze queueing delay bound violation probability, network calculus was applied to obtain an upper bound of the delay violation probability in [12].…”
Section: Introductionmentioning
confidence: 99%