Optimizing Media Access Strategy for Competing Cognitive Radio Networks Y. Gwon, S. Dastangoo, H. T. Kung
|
|
- Lindsey Holt
- 5 years ago
- Views:
Transcription
1 Optimizing Media Access Strategy for Competing Cognitive Radio Networks Y. Gwon, S. Dastangoo, H. T. Kung December 12, 2013 Presented at IEEE GLOBECOM 2013, Atlanta, GA
2 Outline Introduction Competing Cognitive Radio Network (CCRN) Basic definitions Spectrum model Channel activity matrix, outcome, reward CCRN Multi-armed Bandit (MAB) formulation Existing solutions Our approach Numerical evaluation Conclusion
3 Introduction Mobile networks under competition Tactical setting Ally vs. Enemy Dynamic, open spectrum resource Nodes are cognitive radios Comm nodes & jammers Opportunistic channel access Strategic use of jamming Ally Radio Network Multi-channel open spectrum Intra-network cooperation Jam Jam Jam Collision Network-wide competition Enemy Radio Network
4 Competing Cognitive Radio Network (CCRN) Ally vs. Enemy networks compete Each CCRN has C comm nodes and J jammers CCRN actions a A and a E are composite a A = {a A,comm, a A,jam }, a E = {a E,comm, a E,jam } Actions determine outcome a A a E Ω Outcome maps to CCRN reward R: f(ω) R CCRN strategy Determines new action given sensing results x, set of previous actions and outcomes : x t,{a 1,...,at 1 },{Ω 1,...,Ωt 1 } a t σ t opt = arg min σ Γ t =min{e[ σ M i=1 t r j (i) ] E Rσ t } j=1
5 Spectrum Model Partitioned in time and frequency N non-overlapping channels under competition Tx opportunity <f i, B i,t,t> Each Tx opportunity used as Control or data Frequency T N channels f i B i t Time
6 Channel Activity Matrix, Outcome, Reward (1/2) Example: consider Ally and Enemy CCRNs, each with 2 comm nodes and 2 jammers Ally uses channel 10 for control, Enemy channel 1 At time t, actions are the following a A t = {a A,comm = [7 3], a A,jam = [1 5]} a A,comm = [7 3] means Ally comm node 1 transmits at channel 7, and comm node 2 at channel 3 a E t = {a E,comm = [3 5], a E,jam = [10 9]} How to compute CCRN rewards? Channel Activity Matrix
7 Channel Activity Matrix, Outcome, Reward (2/2) Blue Force Red Force Reward Outcome Comm Jammer Comm Jammer BF RF Tx BF comm Tx success +1 0 Jam Tx BF jamming success +1 0 Tx Tx BF & RF comms collide 0 0 Jam Jam BF & RF jammers both jam 0 0 Tx Jam BF misjamming 0 0 Tx Jam RF jamming success 0 +1
8 CCRN Multi-armed Bandit (MAB) Formulation MAB Problems Originated by Thompson 1933 Address sequential reward sampling and resource allocation Find many applications in WWW today Goal: find optimal strategy to maximize Cumulative reward R t = (j=1 to t) r(j) over t Lai & Robbins 1985 Introduced concept of regret Γ Minimizing Γ is equivalent to maximizing R, but mathematically more convenient Provided qualification for optimal strategy Optimal action should be chosen exponentially more often than others asymptotically Proposed asymptotically optimal algorithm (L&R 85) for stochastic MAB problem Comm Node Jammer?? Radio channels
9 Existing Solution: L&R 85 Appeared in Lai & Robbins 1985 as asymptotically optimal allocation rules Keeps track of reward history for all accessed channels Compute two candidate channels Candidate 1: channel with highest mean reward This is point estimation Candidate 2: round robin selection This is different from random selection Compute Kullback-Leibler (KL) divergence between two candidates KL divergence serves test statistic to choose between two candidate channels Test if KL divergence is approaching in log t
10 Existing Solution: UCB UCB Upper Confidence Bound L&R 85 is nontrivial and difficult Due to complexity in computing KL divergence empirically UCB maintains easily computable indexes to estimate each channel s reward Index for i th channel: g i = i + Δ i i average reward for i th channel Δ i sqrt(log t/t i ) t = current time index, reflecting how long CCRN has operated T i = total number of times accessing i th channel so far Choose channel with highest index value
11 Existing Solution: Thompson Sampling Old probability matching heuristic Revamped in contemporary machine learning literature Full proof remains open problem in theoretical computer science Algorithmically very simple Draw i th channel reward r i θ i Best channel i * = arg max i r i Observe actual reward and update θ i Thompson Sampling is Bayesian!
12 Our Solution Key idea: Thompson Sampling + Extreme Value Theory Set up Bayesian conjugate prior on extreme value distribution Why? We want to act on best M out of total N channels Ranked channel rewards r (1) > r (2) >... > r (M) > r (M+1) >... > r (N) Distribution of best M channel rewards (blue) follows Extreme Value Theory There are only three possible extreme value distributions: Frechet, Gumbel, and Weibull Reward = total bits successfully transmitted or jammed Our reward must be finite Weibull is the only finite-ended EVT distribution Given Weibull likelihood, Bayesian inference suggests Inverse-gamma prior
13 Recapitulation: Algorithmic Comparison Our algorithm works Draw θ i Inverse-gamma(a i, b i ) Compute r i = Weibull(θ i ) Access M channels with largest r i s Observe actual channel rewards and update a i, b i Algorithm Class Computational Method Complexity L&R Deterministic Point Estimation High UCB Deterministic Indexing Low Thompson Sampling Randomized Heuristic Medium Proposed Randomized Bayesian Medium
14 Numerical Evaluation Wrote custom simulator in MATLAB 10-channel spectrum (N = 10) Two CCRNs: Ally vs. Enemy Each CCRN has fixed J = 2 jammers, varying C = 2,4,8 comm nodes At each time slot, all comm nodes transmit with probability 0.5 and jammers jam with probability 1 Simulation duration = 1,000 time slots Algorithmic matchups 1. L&R 85 (Ally) vs. Static (Enemy) 2. UCB (Ally) vs. Static (Enemy) 3. Thompson Sampling (Ally) vs. Static (Enemy) 4. Our algorithm (Ally) vs. Static (Enemy) 5. L&R 85 (Ally) vs. Random (Enemy) 6. UCB (Ally) vs. Random (Enemy) 7. Thompson Sampling (Ally) vs. Random (Enemy) 8. Our algorithm (Ally) vs. Random (Enemy) Tested scenarios 1. All algorithmic matchups in centralized control 2. All algorithmic matchups in distributed control
15 Result under Centralized Control Against Static Against Random Average reward per channel Static L&R-M UCB-M Z Our algorithm Average reward per channel Random L&R-M UCB-M Z Our algorithm Number of comm nodes Number of comm nodes
16 Result under Distributed Control Against Static Against Random Average reward per channel Static L&R-M UCB-M Z Our algorithm Average reward per channel Random L&R-M UCB-M Z Our algorithm Number of comm nodes Number of comm nodes
17 Conclusion Competing Cognitive Radio Networks Strategize combined comm and jamming node actions to cope with hostile opponents Look for optimal strategy under MAB framework Our MAB-based solution is state-agnostic Overcomes traditional Markovian formulation plagued by computational complexity in tracking states Formulated MAB framework for CCRN and proposed new algorithm that outperforms existing algorithms From Lai & Robbins s asymptotically optimal rules to UCB indexing and Thompson Sampling heuristic We re extending current study for both CCRNs using MAB algorithms
Optimizing Media Access Strategy for Competing Cognitive Radio Networks
Optimizing Media Access Strategy for Competing Cognitive Radio Networks The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters. Citation
More informationFast Online Learning of Antijamming and Jamming Strategies
Fast Online Learning of Antijamming and Jamming Strategies Y. Gwon, S. Dastangoo, C. Fossa, H. T. Kung December 9, 2015 Presented at the 58 th IEEE Global Communications Conference, San Diego, CA This
More informationFast Online Learning of Antijamming and Jamming Strategies
Fast Online Learning of Antijamming and Jamming Strategies Youngjune Gwon MIT Lincoln Laboratory gyj@ll.mit.edu Siamak Dastangoo MIT Lincoln Laboratory sia@ll.mit.edu Carl Fossa MIT Lincoln Laboratory
More informationA Multi Armed Bandit Formulation of Cognitive Spectrum Access
000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050
More informationAlmost Optimal Dynamically-Ordered Multi-Channel Accessing for Cognitive Networks
Almost Optimal Dynamically-Ordered Multi-Channel Accessing for Cognitive Networks Bowen Li, Panlong Yang, Xiang-Yang Li, Shaojie Tang, Yunhao Liu, Qihui Wu Institute of Communication Engineering, PLAUST
More informationLearning via Delayed Knowledge A Case of Jamming. SaiDhiraj Amuru and R. Michael Buehrer
Learning via Delayed Knowledge A Case of Jamming SaiDhiraj Amuru and R. Michael Buehrer 1 Why do we need an Intelligent Jammer? Dynamic environment conditions in electronic warfare scenarios failure of
More informationJamming-resistant Multi-radio Multi-channel Opportunistic Spectrum Access in Cognitive Radio Networks
Jamming-resistant Multi-radio Multi-channel Opportunistic Spectrum Access in Cognitive Radio Networks 1 Qian Wang, Hai Su, Kui Ren, and Kai Xing Department of ECE, Illinois Institute of Technology, Email:
More informationJamming Bandits. arxiv: v1 [cs.it] 13 Nov 2014 I. INTRODUCTION
Jamming Bandits 1 SaiDhiraj Amuru, Cem Tekin, Mihaela van der Schaar, R. Michael Buehrer Bradley Department of Electrical and Computer Engineering, Virginia Tech Department of Electrical Engineering, UCLA
More informationCognitive Radio Technology using Multi Armed Bandit Access Scheme in WSN
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p-ISSN: 2278-8735 PP 41-46 www.iosrjournals.org Cognitive Radio Technology using Multi Armed Bandit Access Scheme
More informationDistributed Learning and Stable Orthogonalization in Ad-Hoc Networks with Heterogeneous Channels
1 Distributed Learning and Stable Orthogonalization in Ad-Hoc Networks with Heterogeneous Channels Sumit J. Darak and Manjesh K. Hanawal arxiv:181.11651v1 [cs.ni] Dec 018 Abstract Next generation networks
More informationEMERGENCY circumstances such as accidents, natural. Pure-Exploration Bandits for Channel Selection in Mission-Critical Wireless Communications
1 Pure-Exploration Bandits for Channel Selection in Mission-Critical Wireless Communications Yuan Xue, Student Member, IEEE, Pan Zhou, Member, IEEE, Shiwen Mao, Senior Member, IEEE, Dapeng Wu, Fellow,
More informationA Thompson Sampling Approach to Channel Exploration-Exploitation Problem in Multihop Cognitive Radio Networks
A Thompson Sampling Approach to Channel Exploration-Exploitation Problem in Multihop Cognitive Radio Networks Viktor Toldov, Laurent Clavier, Valeria Loscrí, Nathalie Mitton To cite this version: Viktor
More informationWireless Network Security Spring 2012
Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #8 Interference and Jamming Announcements Homework #1 is due today Questions? Not everyone has signed up for a Survey These are required,
More informationImperfect Monitoring in Multi-agent Opportunistic Channel Access
Imperfect Monitoring in Multi-agent Opportunistic Channel Access Ji Wang Thesis submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of the requirements
More informationOptimization Techniques for Alphabet-Constrained Signal Design
Optimization Techniques for Alphabet-Constrained Signal Design Mojtaba Soltanalian Department of Electrical Engineering California Institute of Technology Stanford EE- ISL Mar. 2015 Optimization Techniques
More informationEfficiency and detectability of random reactive jamming in wireless networks
Efficiency and detectability of random reactive jamming in wireless networks Ni An, Steven Weber Modeling & Analysis of Networks Laboratory Drexel University Department of Electrical and Computer Engineering
More informationCognitive Radios Games: Overview and Perspectives
Cognitive Radios Games: Overview and Yezekael Hayel University of Avignon, France Supélec 06/18/07 1 / 39 Summary 1 Introduction 2 3 4 5 2 / 39 Summary Introduction Cognitive Radio Technologies Game Theory
More informationResource Allocation in Energy-constrained Cooperative Wireless Networks
Resource Allocation in Energy-constrained Cooperative Wireless Networks Lin Dai City University of Hong ong Jun. 4, 2011 1 Outline Resource Allocation in Wireless Networks Tradeoff between Fairness and
More informationChannel Sensing Order in Multi-user Cognitive Radio Networks
2012 IEEE International Symposium on Dynamic Spectrum Access Networks Channel Sensing Order in Multi-user Cognitive Radio Networks Jie Zhao and Xin Wang Department of Electrical and Computer Engineering
More informationOpportunistic Spectrum Access with Channel Switching Cost for Cognitive Radio Networks
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 211 proceedings Opportunistic Spectrum Access with Channel
More informationDynamic Spectrum Access in Cognitive Radio Networks. Xiaoying Gan 09/17/2009
Dynamic Spectrum Access in Cognitive Radio Networks Xiaoying Gan xgan@ucsd.edu 09/17/2009 Outline Introduction Cognitive Radio Framework MAC sensing Spectrum Occupancy Model Sensing policy Access policy
More informationCMU-Q Lecture 20:
CMU-Q 15-381 Lecture 20: Game Theory I Teacher: Gianni A. Di Caro ICE-CREAM WARS http://youtu.be/jilgxenbk_8 2 GAME THEORY Game theory is the formal study of conflict and cooperation in (rational) multi-agent
More informationLearning Temporal-Spatial Spectrum Reuse
1 Learning Temporal-Spatial Spectrum Reuse Yi Zhang, Student Member, IEEE, Wee Peng Tay, Senior Member, IEEE, Kwok Hung Li, Senior Member, IEEE, Moez Esseghir, Member, IEEE and Dominique Gaïti, Member,
More informationDecentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework
Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework Qing Zhao, Lang Tong, Anathram Swami, and Yunxia Chen EE360 Presentation: Kun Yi Stanford University
More informationDistributed Learning under Imperfect Sensing in Cognitive Radio Networks
TECHNICAL REPORT TR-10-01, UC DAVIS, JUNE, 2010. 1 Distributed Learning under Imperfect Sensing in Cognitive Radio Networks Keqin Liu, Qing Zhao, Bhaskar Krishnamachari University of California, Davis,
More informationAn Adaptive Multichannel Protocol for Large scale Machine-to-Machine (M2M) Networks
1 An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (MM) Networks Chen-Yu Hsu, Chi-Hsien Yen, and Chun-Ting Chou Department of Electrical Engineering National Taiwan University {b989117,
More informationSPECTRUM resources are scarce and fixed spectrum allocation
Hedonic Coalition Formation Game for Cooperative Spectrum Sensing and Channel Access in Cognitive Radio Networks Xiaolei Hao, Man Hon Cheung, Vincent W.S. Wong, Senior Member, IEEE, and Victor C.M. Leung,
More informationDetection of Obscured Targets: Signal Processing
Detection of Obscured Targets: Signal Processing James McClellan and Waymond R. Scott, Jr. School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta, GA 30332-0250 jim.mcclellan@ece.gatech.edu
More informationAdaptation in a Channel Access Game with Private Monitoring
Adaptation in a Channel Access Game with Private Monitoring Zaheer Khan, Janne Lehtomäki, Luiz A. DaSilva, Matti Latva-aho and Markku Juntti Centre for Wireless Communications CWC University of Oulu, Oulu,
More informationSecondary User Monitoring in Unslotted Cognitive Radio Networks with Unknown Models
Secondary User Monitoring in Unslotted Cognitive Radio Networks with Unknown Models Shanhe Yi 1,KaiZeng 2, and Jing Xu 1 1 Department of Electronics and Information Engineering Huazhong University of Science
More informationTracking of Real-Valued Markovian Random Processes with Asymmetric Cost and Observation
Tracking of Real-Valued Markovian Random Processes with Asymmetric Cost and Observation Parisa Mansourifard Joint work with: Prof. Bhaskar Krishnamachari (USC) and Prof. Tara Javidi (UCSD) Ming Hsieh Department
More informationAdaptive Channel Allocation Spectrum Etiquette for Cognitive Radio Networks
Adaptive Channel Allocation Spectrum Etiquette for Cognitive Radio Networks arxiv:cs/6219v1 [cs.gt] 7 Feb 26 Nie Nie and Cristina Comaniciu Department of Electrical and Computer Engineering Stevens Institute
More informationMIMO Radar and Communication Spectrum Sharing with Clutter Mitigation
MIMO Radar and Communication Spectrum Sharing with Clutter Mitigation Bo Li and Athina Petropulu Department of Electrical and Computer Engineering Rutgers, The State University of New Jersey Work supported
More informationLearning State Selection for Reconfigurable Antennas: A Multi-Armed Bandit Approach
IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, VOL. 62, NO. 3, MARCH 2014 1027 Learning State Selection for Reconfigurable Antennas: A Multi-Armed Bandit Approach Nikhil Gulati, Member, IEEE, and Kapil
More information/13/$ IEEE
A Game-Theoretical Anti-Jamming Scheme for Cognitive Radio Networks Changlong Chen and Min Song, University of Toledo ChunSheng Xin, Old Dominion University Jonathan Backens, Old Dominion University Abstract
More informationChapter 12. Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks
Chapter 12 Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks 1 Outline CR network (CRN) properties Mathematical models at multiple layers Case study 2 Traditional Radio vs CR Traditional
More informationCompressed Sensing for Multiple Access
Compressed Sensing for Multiple Access Xiaodai Dong Wireless Signal Processing & Networking Workshop: Emerging Wireless Technologies, Tohoku University, Sendai, Japan Oct. 28, 2013 Outline Background Existing
More informationSequential Multi-Channel Access Game in Distributed Cognitive Radio Networks
Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Chunxiao Jiang, Yan Chen, and K. J. Ray Liu Department of Electrical and Computer Engineering, University of Maryland, College
More informationOn Optimality of Myopic Policy for Restless Multi-Armed Bandit Problem: An Axiomatic Approach Kehao Wang and Lin Chen
300 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 60, NO. 1, JANUARY 2012 On Optimality of Myopic Policy for Restless Multi-Armed Bandit Problem: An Axiomatic Approach Kehao Wang and Lin Chen Abstract Due
More informationThe Game-Theoretic Approach to Machine Learning and Adaptation
The Game-Theoretic Approach to Machine Learning and Adaptation Nicolò Cesa-Bianchi Università degli Studi di Milano Nicolò Cesa-Bianchi (Univ. di Milano) Game-Theoretic Approach 1 / 25 Machine Learning
More informationLECTURE 26: GAME THEORY 1
15-382 COLLECTIVE INTELLIGENCE S18 LECTURE 26: GAME THEORY 1 INSTRUCTOR: GIANNI A. DI CARO ICE-CREAM WARS http://youtu.be/jilgxenbk_8 2 GAME THEORY Game theory is the formal study of conflict and cooperation
More informationCS-E4800 Artificial Intelligence
CS-E4800 Artificial Intelligence Jussi Rintanen Department of Computer Science Aalto University March 9, 2017 Difficulties in Rational Collective Behavior Individual utility in conflict with collective
More informationSimple, Optimal, Fast, and Robust Wireless Random Medium Access Control
Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Jianwei Huang Department of Information Engineering The Chinese University of Hong Kong KAIST-CUHK Workshop July 2009 J. Huang (CUHK)
More informationChapter 3 Convolutional Codes and Trellis Coded Modulation
Chapter 3 Convolutional Codes and Trellis Coded Modulation 3. Encoder Structure and Trellis Representation 3. Systematic Convolutional Codes 3.3 Viterbi Decoding Algorithm 3.4 BCJR Decoding Algorithm 3.5
More informationDice Games and Stochastic Dynamic Programming
Dice Games and Stochastic Dynamic Programming Henk Tijms Dept. of Econometrics and Operations Research Vrije University, Amsterdam, The Netherlands Revised December 5, 2007 (to appear in the jubilee issue
More informationEstimating the Transmission Probability in Wireless Networks with Configuration Models
Estimating the Transmission Probability in Wireless Networks with Configuration Models Paola Bermolen niversidad de la República - ruguay Joint work with: Matthieu Jonckheere (BA), Federico Larroca (delar)
More informationCOGNITIVE Radio (CR) [1] has been widely studied. Tradeoff between Spoofing and Jamming a Cognitive Radio
Tradeoff between Spoofing and Jamming a Cognitive Radio Qihang Peng, Pamela C. Cosman, and Laurence B. Milstein School of Comm. and Info. Engineering, University of Electronic Science and Technology of
More information16 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 30, NO. 1, JANUARY 2012
6 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 3, NO., JANUARY 22 Towards Optimal Adaptive UFH-Based Anti-Jamming Wireless Communication Qian Wang, Student Member, IEEE, Ping Xu, Student Member,
More informationOPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS
9th European Signal Processing Conference (EUSIPCO 0) Barcelona, Spain, August 9 - September, 0 OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS Sachin Shetty, Kodzo Agbedanu,
More informationHarmonized Q-Learning for Radio Resource Management in LTE Based Networks
ITU Kaleidoscope 2013 Building Sustainable Communities Harmonized Q-Learning for Radio Resource Management in LTE Based Networks Dr. Dhananjay Kumar M.E., M.Tech., Ph.D. Department of Information Technology
More informationTTIC 31230, Fundamentals of Deep Learning David McAllester, April AlphaZero
TTIC 31230, Fundamentals of Deep Learning David McAllester, April 2017 AlphaZero 1 AlphaGo Fan (October 2015) AlphaGo Defeats Fan Hui, European Go Champion. 2 AlphaGo Lee (March 2016) 3 AlphaGo Zero vs.
More informationAdversarial Search. CS 486/686: Introduction to Artificial Intelligence
Adversarial Search CS 486/686: Introduction to Artificial Intelligence 1 Introduction So far we have only been concerned with a single agent Today, we introduce an adversary! 2 Outline Games Minimax search
More informationarxiv: v1 [cs.ni] 26 Nov 2015
1 Value of Information Aware Opportunistic Duty Cycling in Solar Harvesting Sensor Networks Jianhui Zhang College of Computer Science and Technology, Hangzhou Dianzi University, 310018 China. Email: jhzhang@ieee.org
More informationResource Allocation Challenges in Future Wireless Networks
Resource Allocation Challenges in Future Wireless Networks Mohamad Assaad Dept of Telecommunications, Supelec - France Mar. 2014 Outline 1 General Introduction 2 Fully Decentralized Allocation 3 Future
More informationLearning-based hybrid TDMA-CSMA MAC protocol for virtualized WLANs
Loughborough University Institutional Repository Learning-based hybrid TDMA-CSMA MAC protocol for virtualized 802.11 WLANs This item was submitted to Loughborough University's Institutional Repository
More informationResource Management in QoS-Aware Wireless Cellular Networks
Resource Management in QoS-Aware Wireless Cellular Networks Zhi Zhang Dept. of Electrical and Computer Engineering Colorado State University April 24, 2009 Zhi Zhang (ECE CSU) Resource Management in Wireless
More informationComputational Complexity of Multiuser. Receivers in DS-CDMA Systems. Syed Rizvi. Department of Electrical & Computer Engineering
Computational Complexity of Multiuser Receivers in DS-CDMA Systems Digital Signal Processing (DSP)-I Fall 2004 By Syed Rizvi Department of Electrical & Computer Engineering Old Dominion University Outline
More informationTowards Strategic Kriegspiel Play with Opponent Modeling
Towards Strategic Kriegspiel Play with Opponent Modeling Antonio Del Giudice and Piotr Gmytrasiewicz Department of Computer Science, University of Illinois at Chicago Chicago, IL, 60607-7053, USA E-mail:
More informationImprovement of the LPWAN AMI backhaul s latency thanks to reinforcement learning algorithms
Bonnefoi et al. EURASIP Journal on Wireless Communications and Networking 2018) 2018:34 https://doi.org/10.1186/s13638-018-1044-2 RESEARCH Open Access Improvement of the LPWAN AMI backhaul s latency thanks
More informationLow-Complexity Approaches to Spectrum Opportunity Tracking
Low-Complexity Approaches to Spectrum Opportunity Tracking (Invited Paper) Qing Zhao University of California Davis, CA 95616 Email: qzhao@ece.ucdavis.edu Bhaskar Krishnamachari University of Southern
More informationINTERVENTION FRAMEWORK FOR COUNTERACTING COLLUSION IN SPECTRUM LEASING SYSTEMS
14 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP) INTERVENTION FRAMEWORK FOR COUNTERACTING COLLUSION IN SPECTRUM LEASING SYSTEMS Juan J. Alcaraz Universidad Politecnica
More information3D-Assisted Image Feature Synthesis for Novel Views of an Object
3D-Assisted Image Feature Synthesis for Novel Views of an Object Hao Su* Fan Wang* Li Yi Leonidas Guibas * Equal contribution View-agnostic Image Retrieval Retrieval using AlexNet features Query Cross-view
More informationBandit Algorithms Continued: UCB1
Bandit Algorithms Continued: UCB1 Noel Welsh 09 November 2010 Noel Welsh () Bandit Algorithms Continued: UCB1 09 November 2010 1 / 18 Annoucements Lab is busy Wednesday afternoon from 13:00 to 15:00 (Some)
More informationOPPORTUNISTIC spectrum access (OSA), first envisioned
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 5, MAY 2008 2053 Joint Design and Separation Principle for Opportunistic Spectrum Access in the Presence of Sensing Errors Yunxia Chen, Student Member,
More informationMonte Carlo Tree Search and AlphaGo. Suraj Nair, Peter Kundzicz, Kevin An, Vansh Kumar
Monte Carlo Tree Search and AlphaGo Suraj Nair, Peter Kundzicz, Kevin An, Vansh Kumar Zero-Sum Games and AI A player s utility gain or loss is exactly balanced by the combined gain or loss of opponents:
More informationAlternation in the repeated Battle of the Sexes
Alternation in the repeated Battle of the Sexes Aaron Andalman & Charles Kemp 9.29, Spring 2004 MIT Abstract Traditional game-theoretic models consider only stage-game strategies. Alternation in the repeated
More informationPerformance Analysis of Multiuser MIMO Systems with Scheduling and Antenna Selection
Performance Analysis of Multiuser MIMO Systems with Scheduling and Antenna Selection Mohammad Torabi Wessam Ajib David Haccoun Dept. of Electrical Engineering Dept. of Computer Science Dept. of Electrical
More informationChannel Sensing Order in Multi-user Cognitive Radio Networks
Channel Sensing Order in Multi-user Cognitive Radio Networks Jie Zhao and Xin Wang Department of Electrical and Computer Engineering State University of New York at Stony Brook Stony Brook, New York 11794
More informationMultiple Antennas. Mats Bengtsson, Björn Ottersten. Basic Transmission Schemes 1 September 8, Presentation Outline
Multiple Antennas Capacity and Basic Transmission Schemes Mats Bengtsson, Björn Ottersten Basic Transmission Schemes 1 September 8, 2005 Presentation Outline Channel capacity Some fine details and misconceptions
More informationCS 387: GAME AI BOARD GAMES
CS 387: GAME AI BOARD GAMES 5/28/2015 Instructor: Santiago Ontañón santi@cs.drexel.edu Class website: https://www.cs.drexel.edu/~santi/teaching/2015/cs387/intro.html Reminders Check BBVista site for the
More informationAdversarial Search. CS 486/686: Introduction to Artificial Intelligence
Adversarial Search CS 486/686: Introduction to Artificial Intelligence 1 AccessAbility Services Volunteer Notetaker Required Interested? Complete an online application using your WATIAM: https://york.accessiblelearning.com/uwaterloo/
More informationImproved Directional Perturbation Algorithm for Collaborative Beamforming
American Journal of Networks and Communications 2017; 6(4): 62-66 http://www.sciencepublishinggroup.com/j/ajnc doi: 10.11648/j.ajnc.20170604.11 ISSN: 2326-893X (Print); ISSN: 2326-8964 (Online) Improved
More informationCapacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (TO APPEAR) Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks SubodhaGunawardena, Student Member, IEEE, and Weihua Zhuang,
More informationControl issues in cognitive networks. Marko Höyhtyä and Tao Chen CWC-VTT-Gigaseminar 4th December 2008
Control issues in cognitive networks Marko Höyhtyä and Tao Chen CWC-VTT-Gigaseminar 4th December 2008 Outline Cognitive wireless networks Cognitive mesh Topology control Frequency selection Power control
More informationProject: IEEE P Working Group for Wireless Personal Area Networks N
Project: IEEE P82.15 Working Group for Wireless Personal Area Networks N (WPANs( WPANs) Title: [UWB Channel Model for Indoor Residential Environment] Date Submitted: [2 September, 24] Source: [Chia-Chin
More informationGame Theory. Department of Electronics EL-766 Spring Hasan Mahmood
Game Theory Department of Electronics EL-766 Spring 2011 Hasan Mahmood Email: hasannj@yahoo.com Course Information Part I: Introduction to Game Theory Introduction to game theory, games with perfect information,
More informationComputing Elo Ratings of Move Patterns. Game of Go
in the Game of Go Presented by Markus Enzenberger. Go Seminar, University of Alberta. May 6, 2007 Outline Introduction Minorization-Maximization / Bradley-Terry Models Experiments in the Game of Go Usage
More informationGame theory attempts to mathematically. capture behavior in strategic situations, or. games, in which an individual s success in
Game Theory Game theory attempts to mathematically capture behavior in strategic situations, or games, in which an individual s success in making choices depends on the choices of others. A game Γ consists
More informationPower Minimization for Multi-Cell OFDM Networks Using Distributed Non-cooperative Game Approach
Power Minimization for Multi-Cell OFDM Networks Using Distributed Non-cooperative Game Approach Zhu Han, Zhu Ji, and K. J. Ray Liu Electrical and Computer Engineering Department, University of Maryland,
More informationTRIAL-BASED HEURISTIC TREE SEARCH FOR FINITE HORIZON MDPS. Thomas Keller and Malte Helmert Presented by: Ryan Berryhill
TRIAL-BASED HEURISTIC TREE SEARCH FOR FINITE HORIZON MDPS Thomas Keller and Malte Helmert Presented by: Ryan Berryhill Outline Motivation Background THTS framework THTS algorithms Results Motivation Advances
More informationSet 4: Game-Playing. ICS 271 Fall 2017 Kalev Kask
Set 4: Game-Playing ICS 271 Fall 2017 Kalev Kask Overview Computer programs that play 2-player games game-playing as search with the complication of an opponent General principles of game-playing and search
More informationCoherent and Non-Coherent UWB Communications
Coherent and Non-Coherent UWB Communications José A. López-Salcedo Advisor: Prof. Gregori Vázquez Ph.D. Dissertation Signal Processing for Communications Group Department of Signal Theory and Communications
More informationAdaptive Wireless. Communications. gl CAMBRIDGE UNIVERSITY PRESS. MIMO Channels and Networks SIDDHARTAN GOVJNDASAMY DANIEL W.
Adaptive Wireless Communications MIMO Channels and Networks DANIEL W. BLISS Arizona State University SIDDHARTAN GOVJNDASAMY Franklin W. Olin College of Engineering, Massachusetts gl CAMBRIDGE UNIVERSITY
More informationMATHEMATICAL MODELS Vol. I - Measurements in Mathematical Modeling and Data Processing - William Moran and Barbara La Scala
MEASUREMENTS IN MATEMATICAL MODELING AND DATA PROCESSING William Moran and University of Melbourne, Australia Keywords detection theory, estimation theory, signal processing, hypothesis testing Contents.
More informationA Novel Cognitive Anti-jamming Stochastic Game
A Novel Cognitive Anti-jamming Stochastic Game Mohamed Aref and Sudharman K. Jayaweera Communication and Information Sciences Laboratory (CISL) ECE, University of New Mexico, Albuquerque, NM and Bluecom
More informationIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1
TRANSACTIONS ON WIRELESS COMMUNICATIONS Online Sequential Channel Accessing Control: A Double Exploration vs. Exploitation Problem Panlong Yang, Member,, Bowen Li, Student Member,, Jinlong Wang, Xiang-Yang
More informationDistributed and Coordinated Spectrum Access Methods for Heterogeneous Channel Bonding
Distributed and Coordinated Spectrum Access Methods for Heterogeneous Channel Bonding 1 Zaheer Khan, Janne Lehtomäki, Simon Scott, Zhu Han, Marwan Krunz, and Alan Marshall Abstract Channel bonding (CB)
More informationPolicy Teaching. Through Reward Function Learning. Haoqi Zhang, David Parkes, and Yiling Chen
Policy Teaching Through Reward Function Learning Haoqi Zhang, David Parkes, and Yiling Chen School of Engineering and Applied Sciences Harvard University ACM EC 2009 Haoqi Zhang (Harvard University) Policy
More informationOverview. Cognitive Radio: Definitions. Cognitive Radio. Multidimensional Spectrum Awareness: Radio Space
Overview A Survey of Spectrum Sensing Algorithms for Cognitive Radio Applications Tevfik Yucek and Huseyin Arslan Cognitive Radio Multidimensional Spectrum Awareness Challenges Spectrum Sensing Methods
More informationThe world s first collaborative machine-intelligence competition to overcome spectrum scarcity
The world s first collaborative machine-intelligence competition to overcome spectrum scarcity Paul Tilghman Program Manager, DARPA/MTO 8/11/16 1 This slide intentionally left blank 2 This slide intentionally
More informationA Distributed Opportunistic Access Scheme for OFDMA Systems
A Distributed Opportunistic Access Scheme for OFDMA Systems Dandan Wang Richardson, Tx 7508 Email: dxw05000@utdallas.edu Hlaing Minn Richardson, Tx 7508 Email: hlaing.minn@utdallas.edu Naofal Al-Dhahir
More informationRandomized Channel Access Reduces Network Local Delay
Randomized Channel Access Reduces Network Local Delay Wenyi Zhang USTC Joint work with Yi Zhong (Ph.D. student) and Martin Haenggi (Notre Dame) 2013 Joint HK/TW Workshop on ITC CUHK, January 19, 2013 Acknowledgement
More informationA Non-parametric Multi-stage Learning Framework for Cognitive Spectrum Access in IoT Networks
1 A Non-parametric Multi-stage Learning Framework for Cognitive Spectrum Access in IoT Networks Thulasi Tholeti Vishnu Raj Sheetal Kalyani arxiv:1804.11135v1 [cs.it] 30 Apr 2018 Department of Electrical
More informationAnavilhanas Natural Reserve (about 4000 Km 2 )
Anavilhanas Natural Reserve (about 4000 Km 2 ) A control room receives this alarm signal: what to do? adversarial patrolling with spatially uncertain alarm signals Nicola Basilico, Giuseppe De Nittis,
More informationMIMO-aware Cooperative Cognitive Radio Networks. Hang Liu
MIMO-aware Cooperative Cognitive Radio Networks Hang Liu Outline Motivation and Industrial Relevance Project Objectives Approach and Previous Results Future Work Outcome and Impact [2] Motivation & Relevance
More informationInternet of Things Cognitive Radio Technologies
Internet of Things Cognitive Radio Technologies Torino, 29 aprile 2010 Roberto GARELLO, Politecnico di Torino, Italy Speaker: Roberto GARELLO, Ph.D. Associate Professor in Communication Engineering Dipartimento
More informationDynamic Subcarrier, Bit and Power Allocation in OFDMA-Based Relay Networks
Dynamic Subcarrier, Bit and Power Allocation in OFDMA-Based Relay Networs Christian Müller*, Anja Klein*, Fran Wegner**, Martin Kuipers**, Bernhard Raaf** *Communications Engineering Lab, Technische Universität
More informationAn Adaptive Multichannel Protocol for Large-Scale Machine-to-Machine (M2M) Networks
An Adaptive Multichannel Protocol for Large-Scale Machine-to-Machine (MM) Networks Chen-Yu Hsu, Chi-Hsien Yen, and Chun-Ting Chou Department of Electrical Engineering National Taiwan University Intel-NTU
More informationRicean Parameter Estimation Using Phase Information in Low SNR Environments
Ricean Parameter Estimation Using Phase Information in Low SNR Environments Andrew N. Morabito, Student Member, IEEE, Donald B. Percival, John D. Sahr, Senior Member, IEEE, Zac M.P. Berkowitz, and Laura
More informationSignal Recovery from Random Measurements
Signal Recovery from Random Measurements Joel A. Tropp Anna C. Gilbert {jtropp annacg}@umich.edu Department of Mathematics The University of Michigan 1 The Signal Recovery Problem Let s be an m-sparse
More information