-
Leveraging Noisy Observations in Zero-Sum Games
Authors:
Emmanouil M Athanasakos,
Samir M Perlaza
Abstract:
This paper studies an instance of zero-sum games in which one player (the leader) commits to its opponent (the follower) to choose its actions by sampling a given probability measure (strategy). The actions of the leader are observed by the follower as the output of an arbitrary channel. In response to that, the follower chooses its action based on its current information, that is, the leader's co…
▽ More
This paper studies an instance of zero-sum games in which one player (the leader) commits to its opponent (the follower) to choose its actions by sampling a given probability measure (strategy). The actions of the leader are observed by the follower as the output of an arbitrary channel. In response to that, the follower chooses its action based on its current information, that is, the leader's commitment and the corresponding noisy observation of its action. Within this context, the equilibrium of the game with noisy action observability is shown to always exist and the necessary conditions for its uniqueness are identified. Interestingly, the noisy observations have important impact on the cardinality of the follower's set of best responses. Under particular conditions, such a set of best responses is proved to be a singleton almost surely. The proposed model captures any channel noise with a density with respect to the Lebesgue measure. As an example, the case in which the channel is described by a Gaussian probability measure is investigated.
△ Less
Submitted 5 February, 2024;
originally announced February 2024.
-
Equivalence of the Empirical Risk Minimization to Regularization on the Family of f-Divergences
Authors:
Francisco Daunas,
Iñaki Esnaola,
Samir M. Perlaza,
H. Vincent Poor
Abstract:
The solution to empirical risk minimization with $f$-divergence regularization (ERM-$f$DR) is presented under mild conditions on $f$. Under such conditions, the optimal measure is shown to be unique. Examples of the solution for particular choices of the function $f$ are presented. Previously known solutions to common regularization choices are obtained by leveraging the flexibility of the family…
▽ More
The solution to empirical risk minimization with $f$-divergence regularization (ERM-$f$DR) is presented under mild conditions on $f$. Under such conditions, the optimal measure is shown to be unique. Examples of the solution for particular choices of the function $f$ are presented. Previously known solutions to common regularization choices are obtained by leveraging the flexibility of the family of $f$-divergences. These include the unique solutions to empirical risk minimization with relative entropy regularization (Type-I and Type-II). The analysis of the solution unveils the following properties of $f$-divergences when used in the ERM-$f$DR problem: $i\bigl)$ $f$-divergence regularization forces the support of the solution to coincide with the support of the reference measure, which introduces a strong inductive bias that dominates the evidence provided by the training data; and $ii\bigl)$ any $f$-divergence regularization is equivalent to a different $f$-divergence regularization with an appropriate transformation of the empirical risk function.
△ Less
Submitted 1 February, 2024;
originally announced February 2024.
-
Generalization Analysis of Machine Learning Algorithms via the Worst-Case Data-Generating Probability Measure
Authors:
Xinying Zou,
Samir M. Perlaza,
Iñaki Esnaola,
Eitan Altman
Abstract:
In this paper, the worst-case probability measure over the data is introduced as a tool for characterizing the generalization capabilities of machine learning algorithms. More specifically, the worst-case probability measure is a Gibbs probability measure and the unique solution to the maximization of the expected loss under a relative entropy constraint with respect to a reference probability mea…
▽ More
In this paper, the worst-case probability measure over the data is introduced as a tool for characterizing the generalization capabilities of machine learning algorithms. More specifically, the worst-case probability measure is a Gibbs probability measure and the unique solution to the maximization of the expected loss under a relative entropy constraint with respect to a reference probability measure. Fundamental generalization metrics, such as the sensitivity of the expected loss, the sensitivity of the empirical risk, and the generalization gap are shown to have closed-form expressions involving the worst-case data-generating probability measure. Existing results for the Gibbs algorithm, such as characterizing the generalization gap as a sum of mutual information and lautum information, up to a constant factor, are recovered. A novel parallel is established between the worst-case data-generating probability measure and the Gibbs algorithm. Specifically, the Gibbs probability measure is identified as a fundamental commonality of the model space and the data space for machine learning algorithms.
△ Less
Submitted 19 December, 2023;
originally announced December 2023.
-
On the Validation of Gibbs Algorithms: Training Datasets, Test Datasets and their Aggregation
Authors:
Samir M. Perlaza,
Iñaki Esnaola,
Gaetan Bisson,
H. Vincent Poor
Abstract:
The dependence on training data of the Gibbs algorithm (GA) is analytically characterized. By adopting the expected empirical risk as the performance metric, the sensitivity of the GA is obtained in closed form. In this case, sensitivity is the performance difference with respect to an arbitrary alternative algorithm. This description enables the development of explicit expressions involving the t…
▽ More
The dependence on training data of the Gibbs algorithm (GA) is analytically characterized. By adopting the expected empirical risk as the performance metric, the sensitivity of the GA is obtained in closed form. In this case, sensitivity is the performance difference with respect to an arbitrary alternative algorithm. This description enables the development of explicit expressions involving the training errors and test errors of GAs trained with different datasets. Using these tools, dataset aggregation is studied and different figures of merit to evaluate the generalization capabilities of GAs are introduced. For particular sizes of such datasets and parameters of the GAs, a connection between Jeffrey's divergence, training and test errors is established.
△ Less
Submitted 21 June, 2023;
originally announced June 2023.
-
Analysis of the Relative Entropy Asymmetry in the Regularization of Empirical Risk Minimization
Authors:
Francisco Daunas,
Iñaki Esnaola,
Samir M. Perlaza,
H. Vincent Poor
Abstract:
The effect of the relative entropy asymmetry is analyzed in the empirical risk minimization with relative entropy regularization (ERM-RER) problem. A novel regularization is introduced, coined Type-II regularization, that allows for solutions to the ERM-RER problem with a support that extends outside the support of the reference measure. The solution to the new ERM-RER Type-II problem is analytica…
▽ More
The effect of the relative entropy asymmetry is analyzed in the empirical risk minimization with relative entropy regularization (ERM-RER) problem. A novel regularization is introduced, coined Type-II regularization, that allows for solutions to the ERM-RER problem with a support that extends outside the support of the reference measure. The solution to the new ERM-RER Type-II problem is analytically characterized in terms of the Radon-Nikodym derivative of the reference measure with respect to the solution. The analysis of the solution unveils the following properties of relative entropy when it acts as a regularizer in the ERM-RER problem: i) relative entropy forces the support of the Type-II solution to collapse into the support of the reference measure, which introduces a strong inductive bias that dominates the evidence provided by the training data; ii) Type-II regularization is equivalent to classical relative entropy regularization with an appropriate transformation of the empirical risk function. Closed-form expressions of the expected empirical risk as a function of the regularization parameters are provided.
△ Less
Submitted 12 June, 2023;
originally announced June 2023.
-
Empirical Risk Minimization with Relative Entropy Regularization
Authors:
Samir M. Perlaza,
Gaetan Bisson,
Iñaki Esnaola,
Alain Jean-Marie,
Stefano Rini
Abstract:
The empirical risk minimization (ERM) problem with relative entropy regularization (ERM-RER) is investigated under the assumption that the reference measure is a $σ$-finite measure, and not necessarily a probability measure. Under this assumption, which leads to a generalization of the ERM-RER problem allowing a larger degree of flexibility for incorporating prior knowledge, numerous relevant prop…
▽ More
The empirical risk minimization (ERM) problem with relative entropy regularization (ERM-RER) is investigated under the assumption that the reference measure is a $σ$-finite measure, and not necessarily a probability measure. Under this assumption, which leads to a generalization of the ERM-RER problem allowing a larger degree of flexibility for incorporating prior knowledge, numerous relevant properties are stated. Among these properties, the solution to this problem, if it exists, is shown to be a unique probability measure, mutually absolutely continuous with the reference measure. Such a solution exhibits a probably-approximately-correct guarantee for the ERM problem independently of whether the latter possesses a solution. For a fixed dataset and under a specific condition, the empirical risk is shown to be a sub-Gaussian random variable when the models are sampled from the solution to the ERM-RER problem. The generalization capabilities of the solution to the ERM-RER problem (the Gibbs algorithm) are studied via the sensitivity of the expected empirical risk to deviations from such a solution towards alternative probability measures. Finally, an interesting connection between sensitivity, generalization error, and lautum information is established.
△ Less
Submitted 8 April, 2024; v1 submitted 12 November, 2022;
originally announced November 2022.
-
Information-Energy Regions in the Finite Block-Length Regime with Finite Channel Inputs
Authors:
Sadaf Ul Zuhra,
Samir M. Perlaza,
H. Vincent Poor,
Mikael Skoglund
Abstract:
This paper characterizes the trade-offs between information and energy transmission over an additive white Gaussian noise channel in the finite block-length regime with finite sets of channel input symbols. These trade-offs are characterized using impossibility and achievability bounds on the information transmission rate, energy transmission rate, decoding error probability (DEP) and energy outag…
▽ More
This paper characterizes the trade-offs between information and energy transmission over an additive white Gaussian noise channel in the finite block-length regime with finite sets of channel input symbols. These trade-offs are characterized using impossibility and achievability bounds on the information transmission rate, energy transmission rate, decoding error probability (DEP) and energy outage probability (EOP) for a finite block-length code. Given a set of channel input symbols, the impossibility results identify the tuples of information rate, energy rate, DEP and EOP that cannot be achieved by any code using the given set of channel inputs. A novel method for constructing a family of codes that satisfy a target information rate, energy rate, DEP and EOP is also proposed. The achievability bounds identify the set of tuples of information rate, energy rate, DEP and EOP that can be simultaneously achieved by the constructed family of codes. The proposed construction matches the impossibility bounds for the information rate, energy rate, and the EOP. However, for a given information rate, energy rate and EOP, the achieved DEP is higher than the impossibility bound due to the choice of the decoding sets made during the code construction.
△ Less
Submitted 24 May, 2023; v1 submitted 10 November, 2022;
originally announced November 2022.
-
$2 \times 2$ Zero-Sum Games with Commitments and Noisy Observations
Authors:
Ke Sun,
Samir M. Perlaza,
Alain Jean-Marie
Abstract:
In this paper, $2\times2$ zero-sum games are studied under the following assumptions: $(1)$ One of the players (the leader) commits to choose its actions by sampling a given probability measure (strategy); $(2)$ The leader announces its action, which is observed by its opponent (the follower) through a binary channel; and $(3)$ the follower chooses its strategy based on the knowledge of the leader…
▽ More
In this paper, $2\times2$ zero-sum games are studied under the following assumptions: $(1)$ One of the players (the leader) commits to choose its actions by sampling a given probability measure (strategy); $(2)$ The leader announces its action, which is observed by its opponent (the follower) through a binary channel; and $(3)$ the follower chooses its strategy based on the knowledge of the leader's strategy and the noisy observation of the leader's action. Under these conditions, the equilibrium is shown to always exist. Interestingly, even subject to noise, observing the actions of the leader is shown to be either beneficial or immaterial for the follower. More specifically, the payoff at the equilibrium of this game is upper bounded by the payoff at the Stackelberg equilibrium (SE) in pure strategies; and lower bounded by the payoff at the Nash equilibrium, which is equivalent to the SE in mixed strategies.Finally, necessary and sufficient conditions for observing the payoff at equilibrium to be equal to its lower bound are presented. Sufficient conditions for the payoff at equilibrium to be equal to its upper bound are also presented.
△ Less
Submitted 11 May, 2023; v1 submitted 3 November, 2022;
originally announced November 2022.
-
FEAT: Fair Coordinated Iterative Water-Filling Algorithm
Authors:
Majed Haddad,
Piotr Wiecek,
Oussama Habachi,
Samir M. Perlaza,
Shahid M. Shah
Abstract:
In this paper, we consider a perfect coordinated water-filling game, where each user transmits solely on a given carrier. The main goal of the proposed algorithm (which we call FEAT) is to get close to the optimal, while kee** a decent level of fairness. The key idea within FEAT is to minimize the ratio between the best and the worst utilities of the users. This is done by ensuring that, at each…
▽ More
In this paper, we consider a perfect coordinated water-filling game, where each user transmits solely on a given carrier. The main goal of the proposed algorithm (which we call FEAT) is to get close to the optimal, while kee** a decent level of fairness. The key idea within FEAT is to minimize the ratio between the best and the worst utilities of the users. This is done by ensuring that, at each iteration (channel assignment), a user is satisfied with this assignment as long as he does not loose much more than other users in the system. It has been shown that FEAT outperforms most related algorithms in many aspects, especially in interference-limited systems. Indeed, with FEAT we can ensure a near-optimal, fair and energy efficient solution with low computational complexity. In terms of robustness, it turns out that the balance between being nearly globally optimal and good from individual point of view seems hard to sustain with a significant number of users. Also notice that, in this regard, global optimality gets less affected than the individual one, which offers hope that such an accurate water-filling algorithm can be designed around competition in interference-limited systems.
△ Less
Submitted 22 June, 2022; v1 submitted 21 June, 2022;
originally announced June 2022.
-
Achievable Information-Energy Region in the Finite Block-Length Regime with Finite Constellations
Authors:
Sadaf ul Zuhra,
Samir M. Perlaza,
H. Vincent Poor,
Eitan Altman
Abstract:
This paper characterizes an achievable information-energy region of simultaneous information and energy transmission over an additive white Gaussian noise channel. This analysis is performed in the finite block-length regime with finite constellations. More specifically, a method for constructing a family of codes is proposed and the set of achievable tuples of information rate, energy rate, decod…
▽ More
This paper characterizes an achievable information-energy region of simultaneous information and energy transmission over an additive white Gaussian noise channel. This analysis is performed in the finite block-length regime with finite constellations. More specifically, a method for constructing a family of codes is proposed and the set of achievable tuples of information rate, energy rate, decoding error probability (DEP) and energy outage probability (EOP) is characterized. Using existing converse results, it is shown that the construction is information rate, energy rate, and EOP optimal. The achieved DEP is, however, sub-optimal.
△ Less
Submitted 10 February, 2022;
originally announced February 2022.
-
Empirical Risk Minimization with Relative Entropy Regularization: Optimality and Sensitivity Analysis
Authors:
Samir M. Perlaza,
Gaetan Bisson,
Iñaki Esnaola,
Alain Jean-Marie,
Stefano Rini
Abstract:
The optimality and sensitivity of the empirical risk minimization problem with relative entropy regularization (ERM-RER) are investigated for the case in which the reference is a sigma-finite measure instead of a probability measure. This generalization allows for a larger degree of flexibility in the incorporation of prior knowledge over the set of models. In this setting, the interplay of the re…
▽ More
The optimality and sensitivity of the empirical risk minimization problem with relative entropy regularization (ERM-RER) are investigated for the case in which the reference is a sigma-finite measure instead of a probability measure. This generalization allows for a larger degree of flexibility in the incorporation of prior knowledge over the set of models. In this setting, the interplay of the regularization parameter, the reference measure, the risk function, and the empirical risk induced by the solution of the ERM-RER problem is characterized. This characterization yields necessary and sufficient conditions for the existence of a regularization parameter that achieves an arbitrarily small empirical risk with arbitrarily high probability. The sensitivity of the expected empirical risk to deviations from the solution of the ERM-RER problem is studied. The sensitivity is then used to provide upper and lower bounds on the expected empirical risk. Moreover, it is shown that the expectation of the sensitivity is upper bounded, up to a constant factor, by the square root of the lautum information between the models and the datasets.
△ Less
Submitted 12 November, 2022; v1 submitted 9 February, 2022;
originally announced February 2022.
-
Simultaneous Information and Energy Transmission with Finite Constellations
Authors:
Sadaf ul Zuhra,
Samir M. Perlaza,
Eitan Altman
Abstract:
In this paper, the fundamental limits on the rates at which information and energy can be simultaneously transmitted over an additive white Gaussian noise channel are studied under the following assumptions: $(a)$ the channel is memoryless; $(b)$ the number of channel input symbols (constellation size) and block length are finite; and $(c)$ the decoding error probability (DEP) and the energy outag…
▽ More
In this paper, the fundamental limits on the rates at which information and energy can be simultaneously transmitted over an additive white Gaussian noise channel are studied under the following assumptions: $(a)$ the channel is memoryless; $(b)$ the number of channel input symbols (constellation size) and block length are finite; and $(c)$ the decoding error probability (DEP) and the energy outage probability (EOP) are bounded away from zero. In particular, it is shown that the limits on the maximum information and energy transmission rates; and the minimum DEP and EOP, are essentially set by the type induced by the code used to perform the transmission. That is, the empirical frequency with which each channel input symbol appears in the codewords. Using this observation, guidelines for optimal constellation design for simultaneous energy and information transmission are presented.
△ Less
Submitted 5 October, 2021;
originally announced October 2021.
-
An Upper Bound on the Error Induced by Saddlepoint Approximations -- Applications to Information Theory
Authors:
Dadja Anade,
Jean-Marie Gorce,
Philippe Mary,
Samir Perlaza
Abstract:
This paper introduces an upper bound on the absolute difference between: (a) the cumulative distribution function (CDF) of the sum of a finite number of independent and identically distributed random variables with finite absolute third moment; and (b) a saddlepoint approximation of such CDF. This upper bound, which is particularly precise in the regime of large deviations, is used to study the de…
▽ More
This paper introduces an upper bound on the absolute difference between: (a) the cumulative distribution function (CDF) of the sum of a finite number of independent and identically distributed random variables with finite absolute third moment; and (b) a saddlepoint approximation of such CDF. This upper bound, which is particularly precise in the regime of large deviations, is used to study the dependence testing (DT) bound and the meta converse (MC) bound on the decoding error probability (DEP) in point-to-point memoryless channels. Often, these bounds cannot be analytically calculated and thus lower and upper bounds become particularly useful. Within this context, the main results include, respectively, new upper and lower bounds on the DT and MC bounds. A numerical experimentation of these bounds is presented in the case of the binary symmetric channel, the additive white Gaussian noise channel, and the additive symmetric $α$-stable noise channel.
△ Less
Submitted 15 July, 2020; v1 submitted 10 July, 2020;
originally announced July 2020.
-
Approximate Nash Region of the Gaussian Interference Channel with Noisy Output Feedback
Authors:
Victor Quintero,
Samir M. Perlaza,
Jean-Marie Gorce,
H. Vincent Poor
Abstract:
In this paper, an achievable $η$-Nash equilibrium ($η$-NE) region for the two-user Gaussian interference channel with noisy channel-output feedback is presented for all $η\geqslant 1$. This result is obtained in the scenario in which each transmitter-receiver pair chooses its own transmit-receive configuration in order to maximize its own individual information transmission rate. At an $η$-NE, any…
▽ More
In this paper, an achievable $η$-Nash equilibrium ($η$-NE) region for the two-user Gaussian interference channel with noisy channel-output feedback is presented for all $η\geqslant 1$. This result is obtained in the scenario in which each transmitter-receiver pair chooses its own transmit-receive configuration in order to maximize its own individual information transmission rate. At an $η$-NE, any unilateral deviation by either of the pairs does not increase the corresponding individual rate by more than $η$ bits per channel use.
△ Less
Submitted 18 September, 2018;
originally announced September 2018.
-
Stealth Attacks on the Smart Grid
Authors:
Ke Sun,
Iñaki Esnaola,
Samir M. Perlaza,
H. Vincent Poor
Abstract:
Random attacks that jointly minimize the amount of information acquired by the operator about the state of the grid and the probability of attack detection are presented. The attacks minimize the information acquired by the operator by minimizing the mutual information between the observations and the state variables describing the grid. Simultaneously, the attacker aims to minimize the probabilit…
▽ More
Random attacks that jointly minimize the amount of information acquired by the operator about the state of the grid and the probability of attack detection are presented. The attacks minimize the information acquired by the operator by minimizing the mutual information between the observations and the state variables describing the grid. Simultaneously, the attacker aims to minimize the probability of attack detection by minimizing the Kullback-Leibler (KL) divergence between the distribution when the attack is present and the distribution under normal operation. The resulting cost function is the weighted sum of the mutual information and the KL divergence mentioned above. The tradeoff between the probability of attack detection and the reduction of mutual information is governed by the weighting parameter on the KL divergence term in the cost function. The probability of attack detection is evaluated as a function of the weighting parameter. A sufficient condition on the weighting parameter is given for achieving an arbitrarily small probability of attack detection. The attack performance is numerically assessed on the IEEE 30-Bus and 118-Bus test systems.
△ Less
Submitted 7 April, 2020; v1 submitted 13 August, 2018;
originally announced August 2018.
-
Information-Theoretic Attacks in the Smart Grid
Authors:
Ke Sun,
Inaki Esnaola,
Samir M. Perlaza,
H. Vincent Poor
Abstract:
Gaussian random attacks that jointly minimize the amount of information obtained by the operator from the grid and the probability of attack detection are presented. The construction of the attack is posed as an optimization problem with a utility function that captures two effects: firstly, minimizing the mutual information between the measurements and the state variables; secondly, minimizing th…
▽ More
Gaussian random attacks that jointly minimize the amount of information obtained by the operator from the grid and the probability of attack detection are presented. The construction of the attack is posed as an optimization problem with a utility function that captures two effects: firstly, minimizing the mutual information between the measurements and the state variables; secondly, minimizing the probability of attack detection via the Kullback-Leibler divergence between the distribution of the measurements with an attack and the distribution of the measurements without an attack. Additionally, a lower bound on the utility function achieved by the attacks constructed with imperfect knowledge of the second order statistics of the state variables is obtained. The performance of the attack construction using the sample covariance matrix of the state variables is numerically evaluated. The above results are tested in the IEEE 30-Bus test system.
△ Less
Submitted 25 August, 2017;
originally announced August 2017.
-
Nash Region of the Linear Deterministic Interference Channel with Noisy Output Feedback
Authors:
Victor Quintero,
Samir M. Perlaza,
Jean-Marie Gorce,
H. Vincent Poor
Abstract:
In this paper, the $η$-Nash equilibrium ($η$-NE) region of the two-user linear deterministic interference channel (IC) with noisy channel-output feedback is characterized for all $η> 0$. The $η$-NE region, a subset of the capacity region, contains the set of all achievable information rate pairs that are stable in the sense of an $η$-NE. More specifically, given an $η$-NE coding scheme, there does…
▽ More
In this paper, the $η$-Nash equilibrium ($η$-NE) region of the two-user linear deterministic interference channel (IC) with noisy channel-output feedback is characterized for all $η> 0$. The $η$-NE region, a subset of the capacity region, contains the set of all achievable information rate pairs that are stable in the sense of an $η$-NE. More specifically, given an $η$-NE coding scheme, there does not exist an alternative coding scheme for either transmitter-receiver pair that increases the individual rate by more than $η$ bits per channel use. Existing results such as the $η$-NE region of the linear deterministic IC without feedback and with perfect output feedback are obtained as particular cases of the result presented in this paper.
△ Less
Submitted 11 May, 2017;
originally announced May 2017.
-
Approximate Capacity Region of the Two-User Gaussian Interference Channel with Noisy Channel-Output Feedback
Authors:
Victor Quintero,
Samir M. Perlaza,
Iñaki Esnaola,
Jean-Marie Gorce
Abstract:
In this paper, the capacity region of the linear deterministic interference channel with noisy channel-output feedback (LD-IC-NF) is fully characterized. The proof of achievability is based on random coding arguments and rate splitting; block-Markov superposition coding; and backward decoding. The proof of converse reuses some of the existing outer bounds and includes new ones obtained using genie…
▽ More
In this paper, the capacity region of the linear deterministic interference channel with noisy channel-output feedback (LD-IC-NF) is fully characterized. The proof of achievability is based on random coding arguments and rate splitting; block-Markov superposition coding; and backward decoding. The proof of converse reuses some of the existing outer bounds and includes new ones obtained using genie-aided models. Following the insight gained from the analysis of the LD-IC-NF, an achievability region and a converse region for the two-user Gaussian interference channel with noisy channel-output feedback (GIC-NF) are presented. Finally, the achievability region and the converse region are proven to approximate the capacity region of the G-IC-NF to within 4.4 bits.
△ Less
Submitted 19 May, 2018; v1 submitted 15 November, 2016;
originally announced November 2016.
-
Noisy Channel-Output Feedback Capacity of the Linear Deterministic Interference Channel
Authors:
Victor Quintero,
Samir M. Perlaza,
Jean-Marie Gorce
Abstract:
In this technical report, the capacity region of the two-user linear deterministic (LD) interference channel with noisy output feedback (IC-NOF) is fully characterized. This result allows the identification of several asymmetric scenarios in which implementing channel-output feedback in only one of the transmitter-receiver pairs is as beneficial as implementing it in both links, in terms of achiev…
▽ More
In this technical report, the capacity region of the two-user linear deterministic (LD) interference channel with noisy output feedback (IC-NOF) is fully characterized. This result allows the identification of several asymmetric scenarios in which implementing channel-output feedback in only one of the transmitter-receiver pairs is as beneficial as implementing it in both links, in terms of achievable individual rate and sum-rate improvements w.r.t. the case without feedback. In other scenarios, the use of channel-output feedback in any of the transmitter-receiver pairs benefits only one of the two pairs in terms of achievable individual rate improvements or simply, it turns out to be useless, i.e., the capacity regions with and without feedback turn out to be identical even in the full absence of noise in the feedback links.
△ Less
Submitted 15 November, 2016; v1 submitted 31 August, 2016;
originally announced August 2016.
-
Approximate Capacity of the Two-User Gaussian Interference Channel with Noisy Channel-Output Feedback
Authors:
Victor Quintero,
Samir M. Perlaza,
Iñaki Esnaola,
Jean-Marie Gorce
Abstract:
In this research report, an achievability region and a converse region for the two-user Gaussian interference channel with noisy channel-output feedback (G-IC-NOF) are presented. The achievability region is obtained using a random coding argument and three well-known techniques: rate splitting, superposition coding and backward decoding. The converse region is obtained using some of the existing p…
▽ More
In this research report, an achievability region and a converse region for the two-user Gaussian interference channel with noisy channel-output feedback (G-IC-NOF) are presented. The achievability region is obtained using a random coding argument and three well-known techniques: rate splitting, superposition coding and backward decoding. The converse region is obtained using some of the existing perfect-output feedback outer-bounds as well as a set of new outer-bounds that are obtained by using genie-aided models of the original G-IC-NOF. Finally, it is shown that the achievability region and the converse region approximate the capacity region of the G-IC-NOF to within a constant gap in bits per channel use.
△ Less
Submitted 15 November, 2016; v1 submitted 31 August, 2016;
originally announced August 2016.
-
Decentralized Simultaneous Information and Energy Transmission in K-User Multiple Access Channels
Authors:
Selma Belhadj Amor,
Samir M. Perlaza,
H. Vincent Poor
Abstract:
In this paper, the fundamental limits of decentralized simultaneous information and energy transmission in the $K$-user Gaussian multiple access channel (G-MAC), with an arbitrary $K \geqslant 2$ and one non-colocated energy harvester (EH), are fully characterized.
The objective of the transmitters is twofold. First, they aim to reliably communicate their message indices to the receiver; and sec…
▽ More
In this paper, the fundamental limits of decentralized simultaneous information and energy transmission in the $K$-user Gaussian multiple access channel (G-MAC), with an arbitrary $K \geqslant 2$ and one non-colocated energy harvester (EH), are fully characterized.
The objective of the transmitters is twofold. First, they aim to reliably communicate their message indices to the receiver; and second, to harvest energy at the EH at a rate not less than a minimum rate requirement $b$. The information rates $R_1,\dots,R_K$, in bits per channel use, are measured at the receiver and the energy rate $B$ is measured at an EH.
Stability is considered in the sense of an $η$-Nash equilibrium ($η$-NE), with $η> 0$.
The main result is a full characterization of the $η$-NE information-energy region, i.e., the set of information-energy rate tuples $(R_1,\dots,R_K,B)$ that are achievable and stable in the G-MAC when:
$(a)$ all the transmitters autonomously and independently tune their own transmit configurations seeking to maximize their own information transmission rates $R_1,\dots, R_K$; and
$(b)$ all the transmitters jointly guarantee an energy transmission rate $B$ at the EH, such that $B \geqslant b$.
Therefore, any rate tuple outside the $η$-NE region is not stable as there always exists at least one transmitter able to increase by at least $η$ bits per channel use its own information transmission rate by updating its own transmit configuration.
△ Less
Submitted 26 September, 2017; v1 submitted 14 June, 2016;
originally announced June 2016.
-
Fundamental Limits of Simultaneous Energy and Information Transmission
Authors:
Selma Belhadj Amor,
Samir M. Perlaza
Abstract:
In this paper, existing results regarding the fundamental limits of simultaneous energy and information transmission in wireless networks are reviewed. In point-to-point channels, the fundamental limits on the information rate given a minimum energy rate constraint are fully characterized by the notion of information-energy capacity function introduced by Varshney in 2008. In a centralized multi-u…
▽ More
In this paper, existing results regarding the fundamental limits of simultaneous energy and information transmission in wireless networks are reviewed. In point-to-point channels, the fundamental limits on the information rate given a minimum energy rate constraint are fully characterized by the notion of information-energy capacity function introduced by Varshney in 2008. In a centralized multi-user channel, the fundamental limits on the information rates given a minimum energy rate constraint are described by the notion of information-energy capacity region introduced by Fouladgar and Simeone in 2012. Alternatively, in a decentralized multi-user channel, the authors have recently introduced the notion of information-energy Nash region to describe these fundamental limits. All these fundamental limits reveal the intrinsic trade-off between the two conflicting tasks of information and energy transmission.
△ Less
Submitted 12 April, 2016;
originally announced April 2016.
-
Approximate Capacity of the Gaussian Interference Channel with Noisy Channel-Output Feedback
Authors:
Victor Quintero,
Samir M. Perlaza,
Iñaki Esnaola,
Jean-Marie Gorce
Abstract:
In this paper, an achievability region and a converse region for the two-user Gaussian interference channel with noisy channel-output feedback (G-IC-NOF) are presented. The achievability region is obtained using a random coding argument and three well-known techniques: rate splitting, superposition coding and backward decoding. The converse region is obtained using some of the existing perfect-out…
▽ More
In this paper, an achievability region and a converse region for the two-user Gaussian interference channel with noisy channel-output feedback (G-IC-NOF) are presented. The achievability region is obtained using a random coding argument and three well-known techniques: rate splitting, superposition coding and backward decoding. The converse region is obtained using some of the existing perfect-output feedback outer-bounds as well as a set of new outer-bounds that are obtained by using genie-aided models of the original G-IC-NOF. Finally, it is shown that the achievability region and the converse region approximate the capacity region of the G-IC-NOF to within a constant gap in bits per channel use.
△ Less
Submitted 14 November, 2016; v1 submitted 24 March, 2016;
originally announced March 2016.
-
Feedback Enhances Simultaneous Wireless Information and Energy Transmission in Multiple Access Channels
Authors:
Selma Belhadj Amor,
Samir M. Perlaza,
Ioannis Krikidis,
H. Vincent Poor
Abstract:
In this report, the fundamental limits of simultaneous information and energy transmission in the two-user Gaussian multiple access channel (G-MAC) with and without feedback are fully characterized. More specifically, all the achievable information and energy transmission rates (in bits per channel use and energy-units per channel use, respectively) are identified. Furthermore, the fundamental lim…
▽ More
In this report, the fundamental limits of simultaneous information and energy transmission in the two-user Gaussian multiple access channel (G-MAC) with and without feedback are fully characterized. More specifically, all the achievable information and energy transmission rates (in bits per channel use and energy-units per channel use, respectively) are identified. Furthermore, the fundamental limits on the individual and sum- rates given a minimum energy rate ensured at an energy harvester are also characterized. In the case without feedback, an achievability scheme based on power-splitting and successive interference cancellation is shown to be optimal. Alternatively, in the case with feedback (G-MAC-F), a simple yet optimal achievability scheme based on power-splitting and Ozarow's capacity achieving scheme is presented. Finally, the energy transmission enhancement induced by the use of feedback is quantified. Feedback can at most double the energy transmission rate at high SNRs when the information transmission sum-rate is kept fixed at the sum-capacity of the G-MAC, but it has no effect at very low SNRs.
△ Less
Submitted 13 March, 2017; v1 submitted 4 December, 2015;
originally announced December 2015.
-
Noisy Channel-Output Feedback Capacity of the Linear Deterministic Interference Channel
Authors:
Victor Quintero,
Samir M. Perlaza,
Jean-Marie Gorce
Abstract:
In this paper, the capacity region of the two-user linear deterministic (LD) interference channel with noisy output feedback (IC-NOF) is fully characterized. This result allows the identification of several asymmetric scenarios in which imple- menting channel-output feedback in only one of the transmitter- receiver pairs is as beneficial as implementing it in both links, in terms of achievable ind…
▽ More
In this paper, the capacity region of the two-user linear deterministic (LD) interference channel with noisy output feedback (IC-NOF) is fully characterized. This result allows the identification of several asymmetric scenarios in which imple- menting channel-output feedback in only one of the transmitter- receiver pairs is as beneficial as implementing it in both links, in terms of achievable individual rate and sum-rate improvements w.r.t. the case without feedback. In other scenarios, the use of channel-output feedback in any of the transmitter-receiver pairs benefits only one of the two pairs in terms of achievable individual rate improvements or simply, it turns out to be useless, i.e., the capacity regions with and without feedback turn out to be identical even in the full absence of noise in the feedback links.
△ Less
Submitted 27 January, 2016; v1 submitted 16 February, 2015;
originally announced February 2015.
-
Power Allocation Strategies in Energy Harvesting Wireless Cooperative Networks
Authors:
Zhiguo Ding,
Samir M. Perlaza,
Inaki Esnaola,
H. Vincent Poor
Abstract:
In this paper, a wireless cooperative network is considered, in which multiple source-destination pairs communicate with each other via an energy harvesting relay. The focus of this paper is on the relay's strategies to distribute the harvested energy among the multiple users and their impact on the system performance. Specifically, a non-cooperative strategy is to use the energy harvested from th…
▽ More
In this paper, a wireless cooperative network is considered, in which multiple source-destination pairs communicate with each other via an energy harvesting relay. The focus of this paper is on the relay's strategies to distribute the harvested energy among the multiple users and their impact on the system performance. Specifically, a non-cooperative strategy is to use the energy harvested from the i-th source as the relay transmission power to the i-th destination, to which asymptotic results show that its outage performance decays as logSNR over SNR. A faster decaying rate, 1 over SNR, can be achieved by the two centralized strategies proposed this the paper, where the water filling based one can achieve optimal performance with respect to several criteria, with a price of high complexity. An auction based power allocation scheme is also proposed to achieve a better tradeoff between the system performance and complexity. Simulation results are provided to confirm the accuracy of the developed analytical results and facilitate a better performance comparison.
△ Less
Submitted 15 July, 2013; v1 submitted 5 July, 2013;
originally announced July 2013.
-
Perfect Output Feedback in the Two-User Decentralized Interference Channel
Authors:
Samir M. Perlaza,
Ravi Tandon,
H. Vincent Poor,
Zhu Han
Abstract:
In this paper, the $η$-Nash equilibrium ($η$-NE) region of the two-user Gaussian interference channel (IC) with perfect output feedback is approximated to within $1$ bit/s/Hz and $η$ arbitrarily close to $1$ bit/s/Hz. The relevance of the $η$-NE region is that it provides the set of rate-pairs that are achievable and stable in the IC when both transmitter-receiver pairs autonomously tune their own…
▽ More
In this paper, the $η$-Nash equilibrium ($η$-NE) region of the two-user Gaussian interference channel (IC) with perfect output feedback is approximated to within $1$ bit/s/Hz and $η$ arbitrarily close to $1$ bit/s/Hz. The relevance of the $η$-NE region is that it provides the set of rate-pairs that are achievable and stable in the IC when both transmitter-receiver pairs autonomously tune their own transmit-receive configurations seeking an $η$-optimal individual transmission rate. Therefore, any rate tuple outside the $η$-NE region is not stable as there always exists one link able to increase by at least $η$ bits/s/Hz its own transmission rate by updating its own transmit-receive configuration. The main insights that arise from this work are: $(i)$ The $η$-NE region achieved with feedback is larger than or equal to the $η$-NE region without feedback. More importantly, for each rate pair achievable at an $η$-NE without feedback, there exists at least one rate pair achievable at an $η$-NE with feedback that is weakly Pareto superior. $(ii)$ There always exists an $η$-NE transmit-receive configuration that achieves a rate pair that is at most $1$ bit/s/Hz per user away from the outer bound of the capacity region.
△ Less
Submitted 9 August, 2015; v1 submitted 12 June, 2013;
originally announced June 2013.
-
Small Cell Deployments: Recent Advances and Research Challenges
Authors:
Zubin Bharucha,
Emilio Calvanese,
Jiming Chen,
Xiaoli Chu,
Afef Feki,
Antonio De Domenico,
Ana Galindo-Serrano,
Weisi Guo,
Raymond Kwan,
Jimin Liu,
David López-Pérez,
Massod Maqbool,
Ying Peng,
Samir Perlaza,
Guillaume de la Roche,
Serkan Uygungelen,
Alvaro Valcarce,
Jie Zhang
Abstract:
This paper summarizes the outcomes of the 5th International Workshop on Femtocells held at King's College London, UK, on the 13th and 14th of February, 2012.The workshop hosted cutting-edge presentations about the latest advances and research challenges in small cell roll-outs and heterogeneous cellular networks. This paper provides some cutting edge information on the developments of Self-Organiz…
▽ More
This paper summarizes the outcomes of the 5th International Workshop on Femtocells held at King's College London, UK, on the 13th and 14th of February, 2012.The workshop hosted cutting-edge presentations about the latest advances and research challenges in small cell roll-outs and heterogeneous cellular networks. This paper provides some cutting edge information on the developments of Self-Organizing Networks (SON) for small cell deployments, as well as related standardization supports on issues such as carrier aggregation (CA), Multiple-Input-Multiple-Output (MIMO) techniques, and enhanced Inter-Cell Interference Coordination (eICIC), etc. Furthermore, some recent efforts on issues such as energy-saving as well as Machine Learning (ML) techniques on resource allocation and multi-cell cooperation are described. Finally, current developments on simulation tools and small cell deployment scenarios are presented. These topics collectively represent the current trends in small cell deployments.
△ Less
Submitted 2 November, 2012;
originally announced November 2012.
-
Distributed Power Allocation with SINR Constraints Using Trial and Error Learning
Authors:
Luca Rose,
Samir M. Perlaza,
Mérouane Debbah,
Christophe J. Le Martret
Abstract:
In this paper, we address the problem of global transmit power minimization in a self-congiguring network where radio devices are subject to operate at a minimum signal to interference plus noise ratio (SINR) level. We model the network as a parallel Gaussian interference channel and we introduce a fully decentralized algorithm (based on trial and error) able to statistically achieve a congigurati…
▽ More
In this paper, we address the problem of global transmit power minimization in a self-congiguring network where radio devices are subject to operate at a minimum signal to interference plus noise ratio (SINR) level. We model the network as a parallel Gaussian interference channel and we introduce a fully decentralized algorithm (based on trial and error) able to statistically achieve a congiguration where the performance demands are met. Contrary to existing solutions, our algorithm requires only local information and can learn stable and efficient working points by using only one bit feedback. We model the network under two different game theoretical frameworks: normal form and satisfaction form. We show that the converging points correspond to equilibrium points, namely Nash and satisfaction equilibrium. Similarly, we provide sufficient conditions for the algorithm to converge in both formulations. Moreover, we provide analytical results to estimate the algorithm's performance, as a function of the network parameters. Finally, numerical results are provided to validate our theoretical conclusions. Keywords: Learning, power control, trial and error, Nash equilibrium, spectrum sharing.
△ Less
Submitted 28 February, 2012;
originally announced February 2012.
-
Equilibria of Channel Selection Games in Parallel Multiple Access Channel
Authors:
Samir M. Perlaza,
Samson Lasaulce,
Mérouane Debbah
Abstract:
In this paper, we study the decentralized parallel multiple access channel (MAC) when transmitters selfishly maximize their individual spectral efficiency by selecting a single channel to transmit. More specifically, we investigate the set of Nash equilibria (NE) of decentralized networks comprising several transmitters communicating with a single receiver that implements single user decoding. Thi…
▽ More
In this paper, we study the decentralized parallel multiple access channel (MAC) when transmitters selfishly maximize their individual spectral efficiency by selecting a single channel to transmit. More specifically, we investigate the set of Nash equilibria (NE) of decentralized networks comprising several transmitters communicating with a single receiver that implements single user decoding. This scenario is modeled as a one-shot game where the players (the transmitters) have discrete action sets (the channels). We show that the corresponding game has always at least one NE in pure strategies, but, depending on certain parameters, the game might possess several NE. We provide an upper bound for the maximum number of NE as a function of the number of transmitters and available channels. The main contribution of this paper is a mathematical proof of the existence of a Braess-type paradox. In particular, it is shown that under the assumption of a fully loaded network, when transmitters are allowed to use all the available channels, the corresponding sum spectral efficiency achieved at the NE is lower or equal than the sum spectral efficiency achieved when transmitters can use only one channel. A formal proof of this observation is provided in the case of small networks. For general scenarios, we provide numerical examples that show that the same effect holds as long as the network is kept fully loaded. We conclude the paper by considering the case of successive interference cancellation at the receiver. In this context, we show that the power allocation vectors at the NE are capacity maximizers. Finally, simulations are presented to verify our theoretical results.
△ Less
Submitted 8 December, 2011;
originally announced December 2011.
-
Quality-Of-Service Provisioning in Decentralized Networks: A Satisfaction Equilibrium Approach
Authors:
Samir M. Perlaza,
Hamidou Tembiné,
Samson Lasaulce,
Mérouane Debbah
Abstract:
This paper introduces a particular game formulation and its corresponding notion of equilibrium, namely the satisfaction form (SF) and the satisfaction equilibrium (SE). A game in SF models the case where players are uniquely interested in the satisfaction of some individual performance constraints, instead of individual performance optimization. Under this formulation, the notion of equilibrium c…
▽ More
This paper introduces a particular game formulation and its corresponding notion of equilibrium, namely the satisfaction form (SF) and the satisfaction equilibrium (SE). A game in SF models the case where players are uniquely interested in the satisfaction of some individual performance constraints, instead of individual performance optimization. Under this formulation, the notion of equilibrium corresponds to the situation where all players can simultaneously satisfy their individual constraints. The notion of SE, models the problem of QoS provisioning in decentralized self-configuring networks. Here, radio devices are satisfied if they are able to provide the requested QoS. Within this framework, the concept of SE is formalized for both pure and mixed strategies considering finite sets of players and actions. In both cases, sufficient conditions for the existence and uniqueness of the SE are presented. When multiple SE exist, we introduce the idea of effort or cost of satisfaction and we propose a refinement of the SE, namely the efficient SE (ESE). At the ESE, all players adopt the action which requires the lowest effort for satisfaction. A learning method that allows radio devices to achieve a SE in pure strategies in finite time and requiring only one-bit feedback is also presented. Finally, a power control game in the interference channel is used to highlight the advantages of modeling QoS problems following the notion of SE rather than other equilibrium concepts, e.g., generalized Nash equilibrium.
△ Less
Submitted 7 December, 2011;
originally announced December 2011.
-
Electrical Vehicles in the Smart Grid: A Mean Field Game Analysis
Authors:
Romain Couillet,
Samir Medina Perlaza,
Hamidou Tembine,
Merouane Debbah
Abstract:
In this article, we investigate the competitive interaction between electrical vehicles or hybrid oil-electricity vehicles in a Cournot market consisting of electricity transactions to or from an underlying electricity distribution network. We provide a mean field game formulation for this competition, and introduce the set of fundamental differential equations ruling the behavior of the vehicles…
▽ More
In this article, we investigate the competitive interaction between electrical vehicles or hybrid oil-electricity vehicles in a Cournot market consisting of electricity transactions to or from an underlying electricity distribution network. We provide a mean field game formulation for this competition, and introduce the set of fundamental differential equations ruling the behavior of the vehicles at the feedback Nash equilibrium, referred here to as the mean field equilibrium. This framework allows for a consistent analysis of the evolution of the price of electricity as well as of the instantaneous electricity demand in the power grid. Simulations precisely quantify those parameters and suggest that significant reduction of the daily electricity peak demand can be achieved by appropriate electricity pricing.
△ Less
Submitted 11 December, 2011; v1 submitted 8 October, 2011;
originally announced October 2011.
-
Learning Equilibria with Partial Information in Decentralized Wireless Networks
Authors:
Luca Rose,
Samir M. Perlaza,
Samson Lasaulce,
Mérouane Debbah
Abstract:
In this article, a survey of several important equilibrium concepts for decentralized networks is presented. The term decentralized is used here to refer to scenarios where decisions (e.g., choosing a power allocation policy) are taken autonomously by devices interacting with each other (e.g., through mutual interference). The iterative long-term interaction is characterized by stable points of th…
▽ More
In this article, a survey of several important equilibrium concepts for decentralized networks is presented. The term decentralized is used here to refer to scenarios where decisions (e.g., choosing a power allocation policy) are taken autonomously by devices interacting with each other (e.g., through mutual interference). The iterative long-term interaction is characterized by stable points of the wireless network called equilibria. The interest in these equilibria stems from the relevance of network stability and the fact that they can be achieved by letting radio devices to repeatedly interact over time. To achieve these equilibria, several learning techniques, namely, the best response dynamics, fictitious play, smoothed fictitious play, reinforcement learning algorithms, and regret matching, are discussed in terms of information requirements and convergence properties. Most of the notions introduced here, for both equilibria and learning schemes, are illustrated by a simple case study, namely, an interference channel with two transmitter-receiver pairs.
△ Less
Submitted 14 June, 2011;
originally announced June 2011.
-
On the Nash Equilibria in Decentralized Parallel Interference Channels
Authors:
Luca Rose,
Samir M. Perlaza,
Mérouane Debbah
Abstract:
In this paper, the 2-dimensional decentralized parallel interference channel (IC) with 2 transmitter-receiver pairs is modelled as a non-cooperative static game. Each transmitter is assumed to be a fully rational entity with complete information on the game, aiming to maximize its own individual spectral efficiency by tuning its own power allocation (PA) vector. Two scenarios are analysed. First,…
▽ More
In this paper, the 2-dimensional decentralized parallel interference channel (IC) with 2 transmitter-receiver pairs is modelled as a non-cooperative static game. Each transmitter is assumed to be a fully rational entity with complete information on the game, aiming to maximize its own individual spectral efficiency by tuning its own power allocation (PA) vector. Two scenarios are analysed. First, we consider that transmitters can split their transmit power between both dimensions (PA game). Second, we consider that each transmitter is limited to use only one dimension (channel selection CS game). In the first scenario, the game might have either one or three NE in pure strategies (PS). However, two or infinitely many NE in PS might also be observed with zero probability. In the second scenario, there always exists either one or two NE in PS. We show that in both games there always exists a non-zero probability of observing more than one NE. More interestingly, using Monte-Carlo simulations, we show that the highest and lowest network spectral efficiency at any of the NE in the CS game are always higher than the ones in the PA.
△ Less
Submitted 14 June, 2011;
originally announced June 2011.
-
On the Fictitious Play and Channel Selection Games
Authors:
S. M. Perlaza,
H. Tembine,
S. Lasaulce,
V. Quintero-Florez
Abstract:
Considering the interaction through mutual interference of the different radio devices, the channel selection (CS) problem in decentralized parallel multiple access channels can be modeled by strategic-form games. Here, we show that the CS problem is a potential game (PG) and thus the fictitious play (FP) converges to a Nash equilibrium (NE) either in pure or mixed strategies. Using a 2-player 2-c…
▽ More
Considering the interaction through mutual interference of the different radio devices, the channel selection (CS) problem in decentralized parallel multiple access channels can be modeled by strategic-form games. Here, we show that the CS problem is a potential game (PG) and thus the fictitious play (FP) converges to a Nash equilibrium (NE) either in pure or mixed strategies. Using a 2-player 2-channel game, it is shown that convergence in mixed strategies might lead to cycles of action profiles which lead to individual spectral efficiencies (SE) which are worse than the SE at the worst NE in mixed and pure strategies. Finally, exploiting the fact that the CS problem is a PG and an aggregation game, we present a method to implement FP with local information and minimum feedback.
△ Less
Submitted 25 September, 2010;
originally announced September 2010.
-
Satisfaction Equilibrium: A General Framework for QoS Provisioning in Self-Configuring Networks
Authors:
Samir M. Perlaza,
Hamidou Tembine,
Samson Lasaulce,
Merouane Debbah
Abstract:
This paper is concerned with the concept of equilibrium and quality of service (QoS) provisioning in self-configuring wireless networks with non-cooperative radio devices (RD). In contrast with the Nash equilibrium (NE), where RDs are interested in selfishly maximizing its QoS, we present a concept of equilibrium, named satisfaction equilibrium (SE), where RDs are interested only in guaranteing a…
▽ More
This paper is concerned with the concept of equilibrium and quality of service (QoS) provisioning in self-configuring wireless networks with non-cooperative radio devices (RD). In contrast with the Nash equilibrium (NE), where RDs are interested in selfishly maximizing its QoS, we present a concept of equilibrium, named satisfaction equilibrium (SE), where RDs are interested only in guaranteing a minimum QoS. We provide the conditions for the existence and the uniqueness of the SE. Later, in order to provide an equilibrium selection framework for the SE, we introduce the concept of effort or cost of satisfaction, for instance, in terms of transmit power levels, constellation sizes, etc. Using the idea of effort, the set of efficient SE (ESE) is defined. At the ESE, transmitters satisfy their minimum QoS incurring in the lowest effort. We prove that contrary to the (generalized) NE, at least one ESE always exists whenever the network is able to simultaneously support the individual QoS requests. Finally, we provide a fully decentralized algorithm to allow self-configuring networks to converge to one of the SE relying only on local information.
△ Less
Submitted 29 July, 2010;
originally announced July 2010.
-
On the Base Station Selection and Base Station Sharing in Self-Configuring Networks
Authors:
S. M. Perlaza,
E. V. Belmega,
S. Lasaulce,
M. Debbah
Abstract:
We model the interaction of several radio devices aiming to obtain wireless connectivity by using a set of base stations (BS) as a non-cooperative game. Each radio device aims to maximize its own spectral efficiency (SE) in two different scenarios: First, we let each player to use a unique BS (BS selection) and second, we let them to simultaneously use several BSs (BS Sharing). In both cases, we…
▽ More
We model the interaction of several radio devices aiming to obtain wireless connectivity by using a set of base stations (BS) as a non-cooperative game. Each radio device aims to maximize its own spectral efficiency (SE) in two different scenarios: First, we let each player to use a unique BS (BS selection) and second, we let them to simultaneously use several BSs (BS Sharing). In both cases, we show that the resulting game is an exact potential game. We found that the BS selection game posses multiple Nash equilibria (NE) while the BS sharing game posses a unique one. We provide fully decentralized algorithms which always converge to a NE in both games. We analyze the price of anarchy and the price of stability for the case of BS selection. Finally, we observed that depending on the number of transmitters, the BS selection technique might provide a better global performance (network spectral efficiency) than BS sharing, which suggests the existence of a Braess type paradox.
△ Less
Submitted 12 August, 2009;
originally announced August 2009.
-
From Spectrum Pooling to Space Pooling: Opportunistic Interference Alignment in MIMO Cognitive Networks
Authors:
S. M. Perlaza,
N. Fawaz,
S. Lasaulce,
M. Debbah
Abstract:
We describe a non-cooperative interference alignment (IA) technique which allows an opportunistic multiple input multiple output (MIMO) link (secondary) to harmlessly coexist with another MIMO link (primary) in the same frequency band. Assuming perfect channel knowledge at the primary receiver and transmitter, capacity is achieved by transmiting along the spatial directions (SD) associated with…
▽ More
We describe a non-cooperative interference alignment (IA) technique which allows an opportunistic multiple input multiple output (MIMO) link (secondary) to harmlessly coexist with another MIMO link (primary) in the same frequency band. Assuming perfect channel knowledge at the primary receiver and transmitter, capacity is achieved by transmiting along the spatial directions (SD) associated with the singular values of its channel matrix using a water-filling power allocation (PA) scheme. Often, power limitations lead the primary transmitter to leave some of its SD unused. Here, it is shown that the opportunistic link can transmit its own data if it is possible to align the interference produced on the primary link with such unused SDs. We provide both a processing scheme to perform IA and a PA scheme which maximizes the transmission rate of the opportunistic link. The asymptotes of the achievable transmission rates of the opportunistic link are obtained in the regime of large numbers of antennas. Using this result, it is shown that depending on the signal-to-noise ratio and the number of transmit and receive antennas of the primary and opportunistic links, both systems can achieve transmission rates of the same order.
△ Less
Submitted 24 December, 2009; v1 submitted 7 July, 2009;
originally announced July 2009.
-
On the Benefits of Bandwidth Limiting in Decentralized Vector Multiple Access Channels
Authors:
Samir M. Perlaza,
Merouane Debbah,
Samson Lasaulce,
Hanna Bogucka
Abstract:
We study the network spectral efficiency of decentralized vector multiple access channels (MACs) when the number of accessible dimensions per transmitter is strategically limited. Considering each dimension as a frequency band, we call this limiting process bandwidth limiting (BL). Assuming that each transmitter maximizes its own data rate by water-filling over the available frequency bands, we…
▽ More
We study the network spectral efficiency of decentralized vector multiple access channels (MACs) when the number of accessible dimensions per transmitter is strategically limited. Considering each dimension as a frequency band, we call this limiting process bandwidth limiting (BL). Assuming that each transmitter maximizes its own data rate by water-filling over the available frequency bands, we consider two scenarios. In the first scenario, transmitters use non-intersecting sets of bands (spectral resource partition), and in the second one, they freely exploit all the available frequency bands (spectral resource sharing). In the latter case, successive interference cancelation (SIC) is used. We show the existence of an optimal number of dimensions that a transmitter must use in order to maximize the network performance measured in terms of spectral efficiency. We provide a closed form expression for the optimal number of accessible bands in the first scenario. Such an optimum point, depends on the number of active transmitters, the number of available frequency bands and the different signal-to-noise ratios. In the second scenario, we show that BL does not bring a significant improvement on the network spectral efficiency, when all transmitters use the same BL policy. For both scenarios, we provide simulation results to validate our conclusions.
△ Less
Submitted 16 May, 2009;
originally announced May 2009.
-
Opportunistic Interference Alignment in MIMO Interference Channels
Authors:
Samir Medina Perlaza,
Merouane Debbah,
Samson Lasaulce,
Jean-Marie Chaufray
Abstract:
We present two interference alignment techniques such that an opportunistic point-to-point multiple input multiple output (MIMO) link can reuse, without generating any additional interference, the same frequency band of a similar pre-existing primary link. In this scenario, we exploit the fact that under power constraints, although each radio maximizes independently its rate by water-filling on…
▽ More
We present two interference alignment techniques such that an opportunistic point-to-point multiple input multiple output (MIMO) link can reuse, without generating any additional interference, the same frequency band of a similar pre-existing primary link. In this scenario, we exploit the fact that under power constraints, although each radio maximizes independently its rate by water-filling on their channel transfer matrix singular values, frequently, not all of them are used. Therefore, by aligning the interference of the opportunistic radio it is possible to transmit at a significant rate while insuring zero-interference on the pre-existing link. We propose a linear pre-coder for a perfect interference alignment and a power allocation scheme which maximizes the individual data rate of the secondary link. Our numerical results show that significant data rates are achieved even for a reduced number of antennas.
△ Less
Submitted 24 June, 2008; v1 submitted 23 June, 2008;
originally announced June 2008.
-
A Game Theoretic Framework for Decentralized Power Allocation in IDMA Systems
Authors:
Samir Medina Perlaza,
Laura Cottatellucci,
Merouane Debbah
Abstract:
In this contribution we present a decentralized power allocation algorithm for the uplink interleave division multiple access (IDMA) channel. Within the proposed optimal strategy for power allocation, each user aims at selfishly maximizing its own utility function. An iterative chip by chip (CBC) decoder at the receiver and a rational selfish behavior of all the users according to a classical ga…
▽ More
In this contribution we present a decentralized power allocation algorithm for the uplink interleave division multiple access (IDMA) channel. Within the proposed optimal strategy for power allocation, each user aims at selfishly maximizing its own utility function. An iterative chip by chip (CBC) decoder at the receiver and a rational selfish behavior of all the users according to a classical game-theoretical framework are the underlying assumptions of this work. This approach leads to a power allocation based on a channel inversion policy where the optimal power level is set locally at each terminal based on the knowledge of its own channel realization, the noise level at the receiver and the number of active users in the network.
△ Less
Submitted 23 June, 2008; v1 submitted 9 March, 2008;
originally announced March 2008.