2011
DOI: 10.1109/tit.2011.2112030
|View full text |Cite
|
Sign up to set email alerts
|

Randomized Resource Allocation in Decentralized Wireless Networks

Abstract: In this paper, we consider a decentralized wireless communication network with a fixed number u of frequency sub-bands to be shared among N transmitter-receiver pairs. It is assumed that the number of active users is a random variable with a given probability mass function. Moreover, users are unaware of each other's codebooks and hence, no multiuser detection is possible. We propose a randomized Frequency Hopping (FH) scheme in which each transmitter randomly hops over a subset of u sub-bands from transmissio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 76 publications
0
10
0
Order By: Relevance
“…Authors in [22] consider a decentralized network of several users sharing a finite number of unlicensed frequency sub-bands. Each user randomly selects a subset of the sub-bands in order to transmit a number of symbols in its Gaussian codeword.…”
Section: B Contributionsmentioning
confidence: 99%
See 2 more Smart Citations
“…Authors in [22] consider a decentralized network of several users sharing a finite number of unlicensed frequency sub-bands. Each user randomly selects a subset of the sub-bands in order to transmit a number of symbols in its Gaussian codeword.…”
Section: B Contributionsmentioning
confidence: 99%
“…This procedure is repeated independently from transmission slot to transmission slot. The analysis presented in [22] applies to a scenario where the number of interfering users remains unchanged. The current paper is in a sense an extension of the randomized resource allocation proposed in [22] to a decentralized network where the number of interferers is variable during the communication period of interest.…”
Section: B Contributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Following the randomized resource allocation scenarios proposed in [4], we adopt a strategy where each user trans mits its Gaussian signal with a probability of () and quits transmitting with a probability of 1 -() independently from transmission slot to transmission slot. We call this scheme the randomized masking strategy with activity factor ().…”
Section: B Our Contributionmentioning
confidence: 99%
“…Assuming limT ---+ oo TAT (a) exists, we let lim TAT (a) = a T ---+ oo (4) for which necessarily a ::::; a ::::; � as assumed before. If a = a, there is no overlap between the codewords of the users.…”
Section: T ---+ Oomentioning
confidence: 99%