29,163 research outputs found
From Spectrum Pooling to Space Pooling: Opportunistic Interference Alignment in MIMO Cognitive Networks
We describe a non-cooperative interference alignment (IA) technique which
allows an opportunistic multiple input multiple output (MIMO) link (secondary)
to harmlessly coexist with another MIMO link (primary) in the same frequency
band. Assuming perfect channel knowledge at the primary receiver and
transmitter, capacity is achieved by transmiting along the spatial directions
(SD) associated with the singular values of its channel matrix using a
water-filling power allocation (PA) scheme. Often, power limitations lead the
primary transmitter to leave some of its SD unused. Here, it is shown that the
opportunistic link can transmit its own data if it is possible to align the
interference produced on the primary link with such unused SDs. We provide both
a processing scheme to perform IA and a PA scheme which maximizes the
transmission rate of the opportunistic link. The asymptotes of the achievable
transmission rates of the opportunistic link are obtained in the regime of
large numbers of antennas. Using this result, it is shown that depending on the
signal-to-noise ratio and the number of transmit and receive antennas of the
primary and opportunistic links, both systems can achieve transmission rates of
the same order.Comment: Submitted to IEEE Trans. in Signal Processing. Revised on 23-11-0
Informed Network Coding for Minimum Decoding Delay
Network coding is a highly efficient data dissemination mechanism for
wireless networks. Since network coded information can only be recovered after
delivering a sufficient number of coded packets, the resulting decoding delay
can become problematic for delay-sensitive applications such as real-time media
streaming. Motivated by this observation, we consider several algorithms that
minimize the decoding delay and analyze their performance by means of
simulation. The algorithms differ both in the required information about the
state of the neighbors' buffers and in the way this knowledge is used to decide
which packets to combine through coding operations. Our results show that a
greedy algorithm, whose encodings maximize the number of nodes at which a coded
packet is immediately decodable significantly outperforms existing network
coding protocols.Comment: Proc. of the IEEE International Conference on Mobile Ad-hoc and
Sensor Systems (IEEE MASS 2008), Atlanta, USA, September 200
Using protocol analysis to explore the creative requirements engineering process
Protocol analysis is an empirical method applied by researchers in cognitive psychology and behavioural analysis. Protocol analysis can be used to collect, document and analyse thought processes by an individual problem solver. In general, research subjects are asked to think aloud when performing a given task. Their verbal reports are transcribed and represent a sequence of their thoughts and cognitive activities. These verbal reports are analysed to identify relevant segments of cognitive behaviours by the research subjects. The analysis results may be cross-examined (or validated through retrospective interviews with the research subjects). This paper offers a critical analysis of this research method, its approaches to data collection and analysis, strengths and limitations, and discusses its use in information systems research. The aim is to explore the use of protocol analysis in studying the creative requirements engineering process.<br /
Exploiting Spatial Interference Alignment and Opportunistic Scheduling in the Downlink of Interference Limited Systems
In this paper we analyze the performance of single stream and multi-stream
spatial multiplexing (SM) systems employing opportunistic scheduling in the
presence of interference. In the proposed downlink framework, every active user
reports the post-processing signal-to-interference-plus-noise-power-ratio
(post-SINR) or the receiver specific mutual information (MI) to its own
transmitter using a feedback channel. The combination of scheduling and
multi-antenna receiver processing leads to substantial interference suppression
gain. Specifically, we show that opportunistic scheduling exploits spatial
interference alignment (SIA) property inherent to a multi-user system for
effective interference mitigation. We obtain bounds for the outage probability
and the sum outage capacity for single stream and multi stream SM employing
real or complex encoding for a symmetric interference channel model.
The techniques considered in this paper are optimal in different operating
regimes. We show that the sum outage capacity can be maximized by reducing the
SM rate to a value less than the maximum allowed value. The optimum SM rate
depends on the number of interferers and the number of available active users.
In particular, we show that the generalized multi-user SM (MU SM) method
employing real-valued encoding provides a performance that is either
comparable, or significantly higher than that of MU SM employing complex
encoding. A combination of analysis and simulation is used to describe the
trade-off between the multiplexing rate and sum outage capacity for different
antenna configurations
Cooperative Organizational Strategies: A Neo-Institutional Digest
This paper describes the neo-institutional approaches of transaction cost economics, agency theory, and property rights analysis and summarizes efforts by economists to apply these concepts to cooperatives. Several problems intrinsic to the cooperative organizational form and its property rights structure are reviewed. These problems have been hypothesized to affect the comparative economic efficiency of cooperative firms and have led to the development of life cycle models seeking to explain the formation, growth, and eventual decline of cooperatives as markets evolve. In this context, statistical analyses of the comparative efficiency of cooperatives and ex post studies of cooperative conversions are surveyed.Agribusiness,
- …