3,910 research outputs found

    Distributed stochastic optimization via matrix exponential learning

    Get PDF
    In this paper, we investigate a distributed learning scheme for a broad class of stochastic optimization problems and games that arise in signal processing and wireless communications. The proposed algorithm relies on the method of matrix exponential learning (MXL) and only requires locally computable gradient observations that are possibly imperfect and/or obsolete. To analyze it, we introduce the notion of a stable Nash equilibrium and we show that the algorithm is globally convergent to such equilibria - or locally convergent when an equilibrium is only locally stable. We also derive an explicit linear bound for the algorithm's convergence speed, which remains valid under measurement errors and uncertainty of arbitrarily high variance. To validate our theoretical analysis, we test the algorithm in realistic multi-carrier/multiple-antenna wireless scenarios where several users seek to maximize their energy efficiency. Our results show that learning allows users to attain a net increase between 100% and 500% in energy efficiency, even under very high uncertainty.Comment: 31 pages, 3 figure

    Energy-Aware Competitive Power Allocation for Heterogeneous Networks Under QoS Constraints

    Get PDF
    This work proposes a distributed power allocation scheme for maximizing energy efficiency in the uplink of orthogonal frequency-division multiple access (OFDMA)-based heterogeneous networks (HetNets). The user equipment (UEs) in the network are modeled as rational agents that engage in a non-cooperative game where each UE allocates its available transmit power over the set of assigned subcarriers so as to maximize its individual utility (defined as the user's throughput per Watt of transmit power) subject to minimum-rate constraints. In this framework, the relevant solution concept is that of Debreu equilibrium, a generalization of Nash equilibrium which accounts for the case where an agent's set of possible actions depends on the actions of its opponents. Since the problem at hand might not be feasible, Debreu equilibria do not always exist. However, using techniques from fractional programming, we provide a characterization of equilibrial power allocation profiles when they do exist. In particular, Debreu equilibria are found to be the fixed points of a water-filling best response operator whose water level is a function of minimum rate constraints and circuit power. Moreover, we also describe a set of sufficient conditions for the existence and uniqueness of Debreu equilibria exploiting the contraction properties of the best response operator. This analysis provides the necessary tools to derive a power allocation scheme that steers the network to equilibrium in an iterative and distributed manner without the need for any centralized processing. Numerical simulations are then used to validate the analysis and assess the performance of the proposed algorithm as a function of the system parameters.Comment: 37 pages, 12 figures, to appear IEEE Trans. Wireless Commu

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Optimal Linear Precoding Strategies for Wideband Non-Cooperative Systems based on Game Theory-Part I: Nash Equilibria

    Full text link
    In this two-parts paper we propose a decentralized strategy, based on a game-theoretic formulation, to find out the optimal precoding/multiplexing matrices for a multipoint-to-multipoint communication system composed of a set of wideband links sharing the same physical resources, i.e., time and bandwidth. We assume, as optimality criterion, the achievement of a Nash equilibrium and consider two alternative optimization problems: 1) the competitive maximization of mutual information on each link, given constraints on the transmit power and on the spectral mask imposed by the radio spectrum regulatory bodies; and 2) the competitive maximization of the transmission rate, using finite order constellations, under the same constraints as above, plus a constraint on the average error probability. In Part I of the paper, we start by showing that the solution set of both noncooperative games is always nonempty and contains only pure strategies. Then, we prove that the optimal precoding/multiplexing scheme for both games leads to a channel diagonalizing structure, so that both matrix-valued problems can be recast in a simpler unified vector power control game, with no performance penalty. Thus, we study this simpler game and derive sufficient conditions ensuring the uniqueness of the Nash equilibrium. Interestingly, although derived under stronger constraints, incorporating for example spectral mask constraints, our uniqueness conditions have broader validity than previously known conditions. Finally, we assess the goodness of the proposed decentralized strategy by comparing its performance with the performance of a Pareto-optimal centralized scheme. To reach the Nash equilibria of the game, in Part II, we propose alternative distributed algorithms, along with their convergence conditions.Comment: Paper submitted to IEEE Transactions on Signal Processing, September 22, 2005. Revised March 14, 2007. Accepted June 5, 2007. To be published on IEEE Transactions on Signal Processing, 2007. To appear on IEEE Transactions on Signal Processing, 200

    (WP 2020-01) The Sea Battle Tomorrow: The Identity of Reflexive Economic Agents

    Get PDF
    This paper develops a conception of reflexive economic agents as an alternative to the standard utility conception, and explains individual identity in terms of how agents adjust to change in a self-organizing way, an idea developed from Herbert Simon. The paper distinguishes closed equilibrium and open process conceptions of the economy, and argues the former fails to explain time in a before-and-after sense in connection with Aristotle’s sea battle problem. A causal model is developed to represent the process conception, and a structure-agency understanding of the adjustment behavior of reflexive economic agents is illustrated using Merton’s self-fulfilling prophecy analysis. Simon’s account of how adjustment behavior has stopping points is then shown to underlie how agents’ identities are disrupted and then self-organized, and the identity analysis this involves is applied to the different identity models of Merton, Ross, Arthur, and Kirman. Finally, the self-organization idea is linked to the recent ‘preference purification’ debate in bounded rationality theory regarding the ‘inner rational agent trapped in an outer psychological shell,’ and it is argued that the behavior of self-organizing agents involves them taking positions toward their own individual identities
    • …
    corecore