Sensing Based Interference and Data Queue Back-pressure Approach for Cognitive Radio

6
Sensing based interference and data queue back-pressure approach for cognitive radio Kimmo Kansanen Institute of Electronics and Telecommunications Norwegian University of Science and Technology Trondheim NO-7491, Norway Email: [email protected] Abstract—The Lyapunov drift based back-pressure framework is applied to the cognitive radio context. A group of spatially distributed sensing units are utilized to monitor re-used spectrum. The sensing results for secondary user received power are utilized in virtual interference queues that, when stabilized, enforce spatially point-wise received power constraints, given in terms of a maximum allowed rate for exceeding an absolute received power level. A system stabilizing algorithm consisting of packet admission and transmit power control is applied to the problem. Numerical evaluations are utilized to characterize the system behavior in terms of fulfilling interference constraints, required transmitted energy per bit and queuing delay, when either a received power or an interference outage type virtual queue, and either water-filling type or binary ON-OFF power allocation is utilized. I. I NTRODUCTION Cognitive Radio (CR) appears promising as a fundamen- tal approach to design and build future radio networks. A significant amount of work has been invested in finding the fundamental limits governing such communications (e.g.[1], [2], [3]) and finding practical solutions. One of the significant challenges in cognitive radio networks is finding algorithms that tolerate dynamic system behavior and can deal with uncertainties of the environment. In this paper, an approach for secondary use of licensed spectrum is developed, that relies on sensing feedback to control interference levels in the system. The back pressure framework is utilized to deal with uncertainty over instantaneous channel states towards primary users, and data communication needs. Related work can be found in e.g. [4] where the authors utilize the back-pressure framework to solve a similar problem. In this paper, the joint problem of enforcing a received power constraint at the sensor nodes and of stabilizing the data queues at the secondary transmitters is considered. Online algorithms that do not depend on explicit knowledge of radio channel characteristics and secondary transmitter behavior are targeted. Using the back-pressure framework, the approach taken in [5] is closely followed, and extended to cover received power constraints. A level crossing type interference constraint is formulated and virtual queues are utilized to model the dynamic received interference in order to define a stabiliz- ing algorithm that then fulfills the interference constraints. Both optimal water-filling type power allocation and low- complexity ON-OFF binary allocation are considered. The paper is organized as follows. The system model is presented in Section II, and the cognitive radio related inter- ference constraints in Section III. The optimization framework is recapped for completeness and clarity in Section IV, and the resulting power control schemes in Section V with some performance bounds are given in Section VI. The interference outage queue is introduced in Section VII, followed by nu- merical evaluations in Section VIII. Vectors and matrices are denoted with bold lower case and bold capital letters, respectively. A scalar function with vector argument operates element-wise, producing a vector result. An all-ones vector is denoted by 1. II. SYSTEM MODEL An orthogonal multi access system is considered, with K secondary transmitter-receiver pairs that wish to oppor- tunistically re-use licensed spectrum. For interference control purposes, their transmissions are monitored by a network of J spatially distributed sensors. This network can either consist of fixed sensors that have been deployed in the area for that particular purpose, or of other secondary user units. Each sensor can provide an estimate of the instantaneous received amplitude on the desired frequency, and can furthermore separate primary and secondary user signals. In practice, this can be supported through the use of signal structures that aid signal separation and power estimation and corresponding matched filtering at the sensor. It is assumed the received primary user signal components after matched filtering and the receiver noise are complex Gaussian distributed. The matched filter output is then squared and averaged over a time window, essentially performing energy detection [6]. The system to be monitored has K transmitters. The trans- mission of user k experiences a propagation channel with a squared envelope c k between transmitter and the intended re- ceiver. The system uses time division multiple access (TDMA) between the users to let only one user transmit at a time. The j th sensor (of J ) receives at time t the transmission of user k over a propagation channel with squared envelope d j,k , so that the received squared matched filter output vector,

description

Sensing Based Interference and Data Queue Back-pressure Approach for Cognitive Radio

Transcript of Sensing Based Interference and Data Queue Back-pressure Approach for Cognitive Radio

  • Sensing based interference and data queueback-pressure approach for cognitive radio

    Kimmo Kansanen

    Institute of Electronics and TelecommunicationsNorwegian University of Science and Technology

    Trondheim NO-7491, NorwayEmail: [email protected]

    AbstractThe Lyapunov drift based back-pressure frameworkis applied to the cognitive radio context. A group of spatiallydistributed sensing units are utilized to monitor re-used spectrum.The sensing results for secondary user received power are utilizedin virtual interference queues that, when stabilized, enforcespatially point-wise received power constraints, given in termsof a maximum allowed rate for exceeding an absolute receivedpower level. A system stabilizing algorithm consisting of packetadmission and transmit power control is applied to the problem.Numerical evaluations are utilized to characterize the systembehavior in terms of fulfilling interference constraints, requiredtransmitted energy per bit and queuing delay, when either areceived power or an interference outage type virtual queue, andeither water-filling type or binary ON-OFF power allocation isutilized.

    I. INTRODUCTION

    Cognitive Radio (CR) appears promising as a fundamen-tal approach to design and build future radio networks. Asignificant amount of work has been invested in finding thefundamental limits governing such communications (e.g.[1],[2], [3]) and finding practical solutions. One of the significantchallenges in cognitive radio networks is finding algorithmsthat tolerate dynamic system behavior and can deal withuncertainties of the environment. In this paper, an approachfor secondary use of licensed spectrum is developed, thatrelies on sensing feedback to control interference levels in thesystem. The back pressure framework is utilized to deal withuncertainty over instantaneous channel states towards primaryusers, and data communication needs. Related work can befound in e.g. [4] where the authors utilize the back-pressureframework to solve a similar problem.

    In this paper, the joint problem of enforcing a receivedpower constraint at the sensor nodes and of stabilizing thedata queues at the secondary transmitters is considered. Onlinealgorithms that do not depend on explicit knowledge of radiochannel characteristics and secondary transmitter behavior aretargeted. Using the back-pressure framework, the approachtaken in [5] is closely followed, and extended to cover receivedpower constraints. A level crossing type interference constraintis formulated and virtual queues are utilized to model thedynamic received interference in order to define a stabiliz-ing algorithm that then fulfills the interference constraints.

    Both optimal water-filling type power allocation and low-complexity ON-OFF binary allocation are considered.

    The paper is organized as follows. The system model ispresented in Section II, and the cognitive radio related inter-ference constraints in Section III. The optimization frameworkis recapped for completeness and clarity in Section IV, andthe resulting power control schemes in Section V with someperformance bounds are given in Section VI. The interferenceoutage queue is introduced in Section VII, followed by nu-merical evaluations in Section VIII.

    Vectors and matrices are denoted with bold lower case andbold capital letters, respectively. A scalar function with vectorargument operates element-wise, producing a vector result. Anall-ones vector is denoted by 1.

    II. SYSTEM MODEL

    An orthogonal multi access system is considered, withK secondary transmitter-receiver pairs that wish to oppor-tunistically re-use licensed spectrum. For interference controlpurposes, their transmissions are monitored by a network of Jspatially distributed sensors. This network can either consistof fixed sensors that have been deployed in the area for thatparticular purpose, or of other secondary user units. Eachsensor can provide an estimate of the instantaneous receivedamplitude on the desired frequency, and can furthermoreseparate primary and secondary user signals. In practice, thiscan be supported through the use of signal structures thataid signal separation and power estimation and correspondingmatched filtering at the sensor.

    It is assumed the received primary user signal componentsafter matched filtering and the receiver noise are complexGaussian distributed. The matched filter output is then squaredand averaged over a time window, essentially performingenergy detection [6].

    The system to be monitored has K transmitters. The trans-mission of user k experiences a propagation channel with asquared envelope ck between transmitter and the intended re-ceiver. The system uses time division multiple access (TDMA)between the users to let only one user transmit at a time.

    The jth sensor (of J) receives at time t the transmissionof user k over a propagation channel with squared envelopedj,k, so that the received squared matched filter output vector,

  • containing the samples at all sensors, is given by

    z(t) = D(t)p(t) + n(t), (1)

    where p(t) denotes the transmit power vector at time t, andn(t) denotes the squared matched filter output noise term attime t, with unknown distribution but known average. Thelatter is due to the fact that the sensor does not attempt toestimate the statistics of the received primary signals. Thechannel dj,k has the expected value E [dk] = dk.

    The notation z(t) = [z1(t), . . . zJ(t)]T, p(t) =[p1(t), . . . pK(t)]

    T and [D(t)]j,k = dj,k is used. The ithcolumn of a matrix D is denoted by di. For simplicity, itis assumed that zk(t) < z0k,k, t, i.e. the interference hasbounded amplitude. Note, that the channel matrix D canmodel, unchanged, both orthogonal and non-orthogonal accessmethods provided that each user transmits once per timeinstant.

    For convenience, a time slotted model is assumed, wherethe current system state is observed at time t, schedulingand resource allocation is performed, after which every usertransmits on their given time slot. The system model caneasily be modified to cover the case where system stateis continuously updated without major changes to the mainresults.

    III. INTERFERENCE CONSTRAINTS

    Two types of interference constraints are considered inthis paper. The soft interference constraint requires that theexpected received power at the primary receiver is below alimit such that the element-wise inequality

    IE [z(t)] zav (2)

    holds. The interference outage constraint requires that theinstantaneous received power at the primary receiver exceedsa pre-defined threshold with a small enough probability

    P (zj(t) > zth) < Pth j, (3)

    where typically the parameters zth and Pth are specific to theprimary system considered.

    Note, that one can use the soft interference constraint tofulfill also the interference outage constraint. For a given Pthand zth, the admissible zav can be upper bounded by firstnoting that

    Pthzth IE [z(t)]

    always holds due to the Markov inequality. Then, if zav is setsuch that

    zav = 1Pthzth,

    and apply a strategy that fulfills the soft constraint (2), theinterference outage constraint (3) will be fulfilled regardlessof the distribution of z(t).

    IV. LYAPUNOV BASED OPTIMIZATION

    The soft interference constraint is considered first, and Jinterference queues are set up at the sensors as

    x(t) = [x(t 1) zav]+ + z(t). (4)Intuitively, the interference queue represents the cumulativedeviation of the received power process z(t) from the desiredaverage power zth. If the interference queue can be stabilized,it will imply that the soft interference constraint is fulfilled.More strictly, if the channel matrix G denotes the channelsbetween the considered secondary transmitters and a set ofprimary receivers such that IE [G] < IE [D] holds element-wise, it follows that [5, Lemma 3]

    limt sup

    1

    t

    t=0

    IE {G(t)p(t)}

    < limt sup

    1

    t

    t=0

    IE {D(t)p(t)} zav. (5)

    Or, in other words, if we find a set of receivers (sensors) whoseaverage channel state (IE {D}) dominates that of the primaryreceivers (IE {G}), we can fulfill the interference constraintsin the latter. Physically speaking sensors placed betweenthe secondary transmitters and primary receivers would bemost straightforward given the radio propagation environmentbehaves smoothly enough.

    Each user holds a data queue, which has the related arrivalprocess ak(t) and transmissions rk(t), so that the vector ofdata queues behaves as

    q(t) = [q(t 1) r(t)]+ + a(t). (6)The arrival process and the transmitted rate are assumed to beupper bounded by a0, and r0, respectively.

    The system performance is optimized using the Lyapunovtechnique introduced in [5], where the quadratic Lyapunovfunction was shown to provide an asymptotically optimalenergy allocation. Since the focus is secondary spectrum usesystems that are best effort by nature, the suboptimal delay-energy behavior provided by the quadratic Lyapunov functionis of less importance. Thus, the quadratic Lyapunov functionwill be utilized as

    L (x(t),q(t)) = qT(t)q(t) + xT(t)x(t). (7)

    Next, the expected Lyapunov drift is computed, which is thenoptimized over all rate allocation strategies. The resultingalgorithm stabilizes the data and interference queues and seeksto maximize the weighted average expected throughput of theusers

    Kk=1 kRk, where k > 0,k are arbitrary positive

    weighting factors that reflect priorities between users, and

    Rk = limt

    t1=0

    IE {ak()}

    represents the long-term expected data rate admitted into thequeue.

  • The conditional Lyapunov drift for time t is defined as

    (x(t),q(t)) =

    IE {L (x(t+ 1),q(t+ 1)) L (x(t),q(t)) |x(t),q(t)} . (8)For the sake of brevity, the time index will be dropped in thefollowing. By replacing the queue definitions for time instantst, t + 1 to (8), the development in [5] can be followed. Thealgorithm uses an arbitrary tuning parameter V > 0. First, thedrift expression is expanded and an upper bound is found as

    (x(t),q(t))

    IE{

    rTr + aTa + zavTzav + (Dp)

    TDpq,x}

    2xTzav + V TIE {a|q,x}+ (2q V )T IE {a|q,x}

    2IE{qTr xTDp|q,x} . (9)This can further be simplified as

    (x(t),q(t))

    rT0 r0 + aT0 a0 + zavTzav + IE{

    pTDTDpq,x}

    2xTzav + V TIE {a|q,x}+ (2q V )T IE {a|q,x}

    2IE{qTr xTDp|q,x} . (10)Loosely speaking, a finite upper bound of the drift expression(10) guarantees stability of all queues [7]. To optimize thesystem, the last two lines of (10) can be minimized byadmission control and transmit power control, respectively.The remaining of the terms can be bounded or are negative,and can be neglected, even though this produces a possiblyworse performing algorithm than directly optimizing the fulldrift expression. The admission control admits new arrivalsinto the data queue if qk V k/2, and the transmit powercontrol seeks to find a power vector p minimising the last line,in other words finding

    p = arg maxp

    {IE{qTr xTDp|q,x}} . (11)

    The constant V controls the maximum buffer length, andthe user priority constants k control the desired averagethroughputs between users. Next, the problem of finding thesolution to (11) in problem context is considered.

    V. TRANSMIT POWER CONTROL

    In the cognitive radio context, protection of the primaryusers from excessive interference is the ultimate objective,but one which is at the absence of channel state informationbetween secondary transmitters and primary receivers, infea-sible. The proposed solution utilizes third party observers,sensors, as a replacement for providing an estimate of theinterference experienced by the primary users. However, dueto the spatial decorrelation of radio channels, a sensor canonly provide an estimate of the received power that is basedon the macroscopic propagation phenomena that correlate over

    larger distances. The resulting estimate corresponds, thus, tothe local received power averaged over short-term statisticalmultipath fading. Thus, the uncertainty within (11) is over thechannel short term fluctuation. The modified optimization forthe average channel state is then

    p = arg maxp

    {qTr xTDp} , (12)

    where D = IE {D}. In the following the resulting allocationin the case where the transmitter has a peak power constraintwill be shown, and the secondary receiver is assumed to haveknowledge of instantaneous receiver noise and interferencedue to primary user transmissions. Note that the algorithmsprovide user power allocation while channel allocation isassumed fixed such that each user has an assigned time slotto transmit.

    It is reasonable to assume that a relatively good estimate ofD is available, and the optimization (12) used as

    p = arg maxp

    {qTr yTp} , (13)

    where y = DTx. The power-rate function of each user isapproximated with the Shannon capacity of their channels as

    rk(pk) = log

    (1 +

    pkckN0 + Ik

    ), (14)

    where N0 and Ik denote the power spectral density of re-ceiver noise and the received primary signal power densityat the secondary receiver, respectively.Since the secondaryusers utilize orthogonal channel access amongst themselves,the optimization problem (13) can be solved separately foreach user, and the optimal allocation for each user as per

    pk = min

    (Pmax,

    [qkyk N0 + Ik

    ck

    ]+), (15)

    where Pmax is the peak power constraint. Note that while theoptimization problem separates in terms of power allocation,global knowledge of the interference queue vector x(t) isstill required to compute y. Also note, that if users wereto transmit simultaneously, the power-rate functions of userswould depend on the full vector of allocated powers p(t) (c.f.[8]).

    A simplified allocation method can be found by approx-imating the power-rate function (14) for rk 0, whererk(pk) pkck/ (N0 + Ik), and the optimization becomes

    pk = arg maxpk{qkckpk/ (N0 + Ik) ykpk} , (16)

    subject to pk > 0. Then, the corresponding allocation becomesthe binary

    pk =

    {Pmax

    ykqk< ckN0+Ik

    0 ykqk >ck

    N0+Ik

    . (17)

    This last algorithm allows a simple interpretation: when theinterference queue normalized with the data queue is smallerthan the channel SNR, positive power is allocated.

  • VI. BOUNDS

    A. Minimum expected energy

    The average rate achieved by the users is given by

    Ck (pk) = IE

    {log2

    (1 +

    pkckN0 + Ik

    )}. (18)

    Given that ck and Ik are ergodic random processes, there is aminimum average transmit power that guarantees stability ofthe queues, even without the admission protocol, such that

    Ck (IE {pk}) , IE {Ck(pk)} > IE {ak} .In other words, the mean arrival rate vector is strictly interiorto the channel capacity region. The required average powerallocation results in a feasible solution for our system if, inaddition,

    IE {Gp} < IE {Dp} = IE {z} < zth (19)0 < pk < Pmax k. (20)

    From the above, it would be expected that when the systemtuning parameter V grows, the system energy should reducetowards the minimum. In practice, and since an admissionprotocol is utilized, one can measure the average energyrequired to transmit one bit of information, and thus removethe effect of packet dropping to the throughput.

    B. Guarantees

    A few simple upper bounds on the queue states q(t) andx(t) can be developed by using the following observations.Whenever

    qkyk

    (V

    2+ a0

    )sup(ck)

    N0. (22)

    VII. INTERFERENCE OUTAGE QUEUE

    Note that

    P (zj(t) > zth) < Pth

    1 (zj(t) > zth) dP (zj < z) < Pth.

    In other words, a counter queue can be set up for theinterference outage event. If this queue is then stabilized, theinterference outage constraint is fulfilled. The counter queues

    o(t+ 1) = [o(t) Pth]+ + 1 (z > zth) (23)

    are then set up. Here, the transmission is the constant valueof Pth, and the arrival is the event that the current measuredreceived power exceeds the threshold value. The indicatorfunction 1 (a) is one whenever condition a is true, zerootherwise. When stabilized, the configuration of the virtualqueue will guarantee that

    limt sup

    1

    t

    t=0

    IE {1 (z(t) zth)} < Pth,

    which, for an ergodic z(t), simply equals

    P (z(t) zth) < Pth.It is possible then apply the interference outage approachin the above framework, essentially by replacing x with oin (12) (17), and the power arrival process z(t) with thecorresponding complementary outage event 1(z < zth). Sincethe modification to the algorithm is straightforward, the detailsare omitted. The resulting power optimization to be performedis given by

    p = arg maxp

    {qTr xTP (z > zth)

    }, (24)

    while the admission protocol utilized above can be used as is.The difficulty of directly maximizing (24) lies within ex-

    pressing and optimizing the transmit power wrt. the probabil-ities P (z > zth). One possible approach for this would be toperform e.g. a maximum entropy derivation for the distributionof the channels dj,k given the known mean channel gain. Thiswould result the assumed distribution of the received powerat the sensors to be that of a sum of exponentially distributedrandom variables. The interference outage probabilities wouldthen be possible to express in closed form with the help ofcharacteristic functions and residue calculus. The resultingoptimization thereafter would, however, be non-trivial. Forthe sake of developing simple algorithms, the probabilitiesP (z > zth) are approximated using the Markov inequalityonce again. The resulting optimization is then given by

    p = arg maxp

    {qTr xTI1zth Dp

    }, (25)

    where Izth denotes a diagonal matrix with the vector zth on itsdiagonal. Denoting

    yT = xTI1zth D,

    the resulting power allocation corresponding to the rate func-tion (14) can be expressed as

    pk = min

    (Pmax,

    [qkyk N0 + Ik

    ck

    ]+). (26)

    Equivalently, the binary allocation corresponding to the linearapproximation is given by

    pk =

    {Pmax

    ykqk< ckN0+Ik

    0 ykqk >ck

    N0+Ik

    . (27)

    While the interference outage queue approach also usesan approximation for the outage probability, it has one clear

  • 100 101 1020

    2

    4

    6

    8

    10

    12

    14

    16

    18

    V

    Ener

    gy

    Power queue, real alloc.Power queue, binary alloc.Counter queue, real alloc.Counter queue, binary alloc.Constraint

    Fig. 1. Transmitted energy per bit

    advantage over the previous approach. The interference queueupdate at the fusion centre requires the communication of onebit, on the average rate corresponding to the outage probability.If this is combined with the binary power allocation strategy,the communication requirements between network units re-main low per scheduling cycle.

    VIII. NUMERICAL EXAMPLES

    The behavior of the control strategy is tested in a smallsymmetric case with K = 2, J = 2, and the channels arenormalized such that IE {di,j} = IE {ci} = 1. The arrivalprocess is assumed to be a Bernoulli process with arrivalprobability p = 0.1, while each packet for both users has size0.5 bits. The interference outage threshold to is set to 5 forboth sensors and the outage probability to 0.01. It is assumedthe receiver noise at the sensor is low enough to be negligible,an eventual non-negligible noise variance can be taken intoaccount in the interference threshold. The total interferenceand noise at the secondary receiver is assumed to have unitvariance. The behavior of the system using all combinationsof the allocation strategies given by (15), denoted as realallocation, and (17), denoted as binary allocation, andinterference queuing using the interference queue (4), denotedas power queue, and interference outage queue (23), denotedas counter queue.

    Figure 1 portraits the energy required per bit for the differentstrategies. As a rule, the binary allocation strategies require ahigher energy for small delays but behave more similarly toreal allocation when average delay is allowed to be higher.No allocation strategy matches, however, the performance ofthe real valued allocation with the interference power queue,which approaches the limiting performance of the system asexpected. These results suggest that quantized informationexchange may be needed to close the gap to optimal allocationwhile maintaining low control signaling overhead.

    Figure 2 presents the delay behavior of the system interms of average queuing delay. The delay for real allocation

    100 101 102

    100

    101

    102

    V

    Delay

    Power queue, real alloc.Power queue, binary alloc.Counter queue, real alloc.Counter queue, binary alloc.

    Fig. 2. Average delay

    saturates quickly, which shows the offered load is supportablewith the power allocation in question. The delay of the binaryallocation schemes, however, grows with the allowed buffersize. This means the binary strategies cannot support theload and need to operate at close to full buffers and droppackets occasionally. These observations are supported by thedropping statistics, which confirm that with the simulationparameters as above, the dropping rate of the real allocationschemes vanish while the dropping rates of the binary schemesremain high even at V = 100.

    Figure 3 shows the interference outage occurrence ratesachieved by the strategies. All strategies are able to fulfillthe interference outage constraint. However, the strategiesusing the power queue (4) and use the Markov inequality tofulfill the outage constraint behave clearly sub-optimally. TheMarkov inequality is very loose and results in a pessimisticstrategy. The methods employing the counter queue providea tighter fit to the constraint, and interestingly enough, thebinary allocation performs tightly to the constraint.

    To explain the constraint tightness, Figure 4 presents anevaluation of the real valued allocation with the counter queuewith several different average arrival rates, given in terms oftotal arrivals in the system. It is clear that all tested ratesbeyond 1 bit/s/Hz cannot be stabilized without the packetadmission protocol that limits the queue size, and the averagedelay of packets grow with the buffer size. Figure 5 shows howthis coincides with the algorithm reaching closer to the allowedinterference constraint. This behavior, where the interferenceconstraint is tight when the system is pushed to the capacitylimit appears identical to the binary allocation behavior shownin Figures 2 and 3.

    IX. CONCLUSIONS

    The back-pressure framework is able to guarantee the ful-fillment of interference constraints, and given optimal real-valued power allocation approach the minimum transmittedenergy per bit. While the simple ON-OFF binary power

  • 100 101 1020

    0.002

    0.004

    0.006

    0.008

    0.01

    0.012

    V

    Inte

    rfere

    nce

    Outa

    ge

    Power queue, real alloc.Power queue, binary alloc.Counter queue, real alloc.Counter queue, binary alloc.Constraint

    Fig. 3. Interference outage rate

    100 101 102

    100

    101

    102

    V

    Delay

    1 bits/s/Hz1.5 bits/s/Hz2 bits/s/Hz2.5 bits/s/Hz

    Fig. 4. Delay behavior of real valued allocation

    allocation schemes do not perform as well as their water-filling type counterparts, they show promise when higherdelays are allowed. The direct conversion of an interferenceoutage constraint to an average interference constraint withthe Markov inequality results in a loose design that can beimproved upon. The tested algorithms perform tightly with theconstraint only when arrivals are unsupportable on the channel.

    100 101 1026

    6.5

    7

    7.5

    8

    8.5

    9

    9.5

    10

    10.5x 103

    V

    Inte

    rfere

    nce

    Outa

    ge

    1 bits/s/Hz1.5 bits/s/Hz2 bits/s/Hz2.5 bits/s/HzConstraint

    Fig. 5. Interference outage behavior of real valued allocation

    ACKNOWLEDGMENTS

    The author would like to thank the anonymous reviewers fortheir thoughtful and precise comments that helped to improvethe manuscript and focus further work.

    The research leading to these results has received fundingfrom the European Communitys Seventh Framework Pro-gramme (FP7/2007-2013) under grant agreement n 216076.

    REFERENCES[1] N. Devroye, P. Mitran, and V. Tarokh, Achievable rates in cognitive radio

    channels, IEEE Transactions on Information Theory, vol. 52, no. 5, pp.18131827, May 2006.

    [2] M. Gastpar, On capacity under receive and spatial spectrum-sharingconstraints, IEEE Transactions on Information Theory, vol. 53, no. 2,pp. 471487, Feb 2007.

    [3] A. Jovicic and P. Viswanath, Cognitive radio: An information-theoreticperspective, IEEE Transactions on Information Theory, vol. 55, no. 9,pp. 39453958, Sept. 2009.

    [4] R. Urgaonkar and M. Neely, Opportunistic scheduling with reliabilityguarantees in cognitive radio networks, IEEE Transactions on MobileComputing, vol. 8, no. 6, pp. 766777, Jun. 2009.

    [5] M. J. Neely, Energy optimal control for time varying wireless networks,IEEE Transactions on Information Theory, vol. 52, no. 7, pp. 118, July2006.

    [6] H. Urkowitz, Energy detection of unknown deterministic signals, Pro-ceedings of the IEEE, vol. 55, no. 4, pp. 523531, Apr 1967.

    [7] M. J. Neely, Dynamic power allocation and routing for satellite andwireless networks with time varying channels, Ph.D. dissertation, MIT,2003.

    [8] P. Chaporkar, K. Kansanen, and R. Muller, Power optimal schedulingfor guaranteed throughput in multi-access fading channels, in IEEEInternational Symposium on Information Theory, Nice, France, June2007, pp. 29612965.