+ All Categories
Home > Documents > ADVANCES IN MULTIUSER DETECTION

ADVANCES IN MULTIUSER DETECTION

Date post: 14-Jan-2022
Category:
Upload: others
View: 5 times
Download: 0 times
Share this document with a friend
50
ADVANCES IN MULTIUSER DETECTION
Transcript
Page 1: ADVANCES IN MULTIUSER DETECTION

ADVANCES IN MULTIUSERDETECTION

Page 2: ADVANCES IN MULTIUSER DETECTION
Page 3: ADVANCES IN MULTIUSER DETECTION

ADVANCES IN MULTIUSERDETECTION

Michael L. Honig, Editor

A JOHN WILEY & SONS, INC., PUBLICATION

Page 4: ADVANCES IN MULTIUSER DETECTION

Copyright c©2006 by John Wiley & Sons, Inc. All rights reserved.

Published by John Wiley & Sons, Inc., Hoboken, New Jersey.Published simultaneously in Canada.

No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any formor by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except aspermitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the priorwritten permission of the Publisher, or authorization through payment ofthe appropriate per-copy fee tothe Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923,(978) 750-8400,fax (978) 646-8600, or on the web at www.copyright.com. Requests to the Publisher for permission shouldbe addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ07030, (201) 748-6011, fax (201) 748-6008.

Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts inpreparing this book, they make no representations or warranties with respect to theaccuracy orcompleteness of the contents of this book and specifically disclaim any implied warranties ofmerchantability or fitness for a particular purpose. No warranty may be created ore extended by salesrepresentatives or written sales materials. The advice and strategies contained herin maynot besuitable for your situation. You should consult with a professional where appropriate. Neither thepublisher nor author shall be liable for any loss of profit or any other commercial damages, includingbut not limited to special, incidental, consequential, or other damages.

For general information on our other products and services please contact our Customer CareDepartment with the U.S. at 877-762-2974, outside the U.S. at 317-572-3993 or fax 317-572-4002.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print,however, may not be available in electronic format.

Library of Congress Cataloging-in-Publication Data:

Advances in Multiuser DetectionPrinted in the United States of America.

10 9 8 7 6 5 4 3 2 1

Page 5: ADVANCES IN MULTIUSER DETECTION

CONTENTS

1 Interference Avoidance for CDMA Systems 1

1.1 Introduction 1

1.2 Interference Avoidance Basics 3

1.2.1 Greedy Interference Avoidance: the eigen-algorithm 5

1.2.2 MMSE Interference Avoidance 7

1.2.3 Other Algorithms for Interference Avoidance 10

1.3 Interference Avoidance over Time-Invariant Channels 11

1.3.1 Interference Avoidance with Diagonal Channel Matrices 12

1.3.2 Interference Avoidance with General Channel Matrices 14

1.4 Interference Avoidance in Fading Channels 17

1.4.1 Iterative Power and Sequence Optimization in Fading 20

1.5 Interference Avoidance in Asynchronous Systems 21

1.5.1 Interference Avoidance for User Capacity Maximization 22

1.5.2 Interference Avoidance for Sum Capacity Maximization 26

1.5.3 TSAC Reduction: Iterative Algorithms 29

1.6 Feedback Requirements for Interference Avoidance 30

1.6.1 Codeword Tracking for Interference Avoidance 31

1.6.2 Reduced-Rank Signatures 32

1.7 Recent Results on Interference Avoidance 33

1.7.1 Interference Avoidance and Power Control 33

v

Page 6: ADVANCES IN MULTIUSER DETECTION

vi CONTENTS

1.7.2 Adaptive Interference Avoidance Algorithms 35

1.8 Summary and Conclusions 37

References 40

Page 7: ADVANCES IN MULTIUSER DETECTION

CHAPTER 1

INTERFERENCE AVOIDANCE FOR CDMASYSTEMS

<text>—<author attribution>

1.1 INTRODUCTION

Though the success of cellular telephony heralds the wireless age, wireless networkingby the masses is a relatively new and exciting phenomenon with potentially even largerimpact on our society. Accelerating sales of wireless LANs (802.11) for home and smalloffice use, and even small business as a customer lure indicate that wireless connectivityis increasingly seen as an important, if not vital, part of modern life. In addition, thereis demand for other wireless networking technology geared toward different applicationssuch as wiring replacement (Bluetooth, HomeRF), paging networks, and wide area emailaccess (Blackberry). Furthermore, as wireless networks become more ubiquitous and lessexpensive, sensor/actuator networks, now primarily the commercial domain of burglar/firealarms and climate control, could become much more prevalent.

However, the increasing demand for various wireless services is tempered by simpleeconomics. Usable spectrum is scarce and therefore expensive. Thus, applications whichcannot be deployed almost full-blown with a predictably stable revenue base (i.e., cellularsystems) cannot usually afford spectrum licenses and must therefore share use of variousunlicensed bands – for example the Unlicensed National Information Infrastructure (UNII[9]) at 5 GHz and other unlicensed bands at 900 MHz and 2.4 GHz.

Advances in Multiuser Detection.By M. L. Honig, EditorISBN number c©2007 John Wiley & Sons, Inc.

1

Page 8: ADVANCES IN MULTIUSER DETECTION

2 INTERFERENCE AVOIDANCE FOR CDMA SYSTEMS

Unfortunately, shared spectrum use implies mutual interference between systems, oftenco-located, whose owners and/or traffic types and/or service objectives may be completelydifferent. Thus, the prospect of spending development dollars for equipment and serviceswhich may be rendered worthless by perfectly legal interference from another system hasan appropriately chilling effect on technology and servicedevelopment. This was clearlyarticulated by equipment manufacturers in meetings on unlicensed band technology [60,62].

Nonetheless, the success of in-home/small office wireless LAN products such as 802.11provides an existence proof for an incrementally developing wireless mass market. Inaddition, as microelectronic technology advances along with Moore’s law, it is becomingincreasingly economical to incorporate complex modulation, coding and protocols intoinexpensive devices. This immediately prompts the question of whether appropriate com-munications methods and algorithms will make it possible tolower the development costentry barrier for potential equipment manufacturers and service providers by conferringsome degree of immunity from crippling mutual interferencebetween systems. Thus, theultimate aim of unlicensed wireless system design is to provide robust methods and algo-rithms which promote peaceful and efficient coexistence.

Unfortunately, even the simplest problem of mutual interference – the “interferencechannel” – has defied complete solution for over fifty years [2,7,10,11,18]). This analyticgap hampers quantitative evaluation of modern wireless network alternatives, and promptsa search for heuristic approaches which can nudge wireless systems toward efficient use.Interference avoidance, loosely defined, is exactly such a heuristic.

The basic idea behind interference avoidance is to iteratively place signal energy in theleast occupied portion of a signal space until convergence.It has been shown that overa wide range of communications scenarios such iterative greedy interference avoidanceprovides maximum resource utilization for a variety of system metrics including Signal-to-Interference Ratio (SIR), sum capacity, or total squared correlation [3, 49, 61, 63, 73].Obviously, this notion of optimality under rational behavior (personal greed) is extremelyattractive in unlicensed bands which are the wireless equivalent of the “wild west” with nocentral authority to exercise control.

Though it has been shown that in the presence of non-adaptiveinterference (non-agileusers), interference avoidance by agile users is beneficialfor everyone [63], in general inter-ference avoidance is more an organizing principle than a panacea. Interference avoidancehas been developed almost exclusively for single receiver systems – that is, where all usersare decoded jointly. It clearly does not account for independently operated interferenceavoiding systems where information is not shared between receivers. In fact, if naivelyapplied to such multi-receiver scenarios, even simple convergence of various interferenceavoidance algorithms cannot be guaranteed.

Nonetheless, jointly decoded interference avoidance provides an obvious outer boundon performance and offers the possibility of circumventing“Tragedy of the Commons”type problems [5,6,41]. Furthermore, a performance comparison to the usual interferencechannel scenario is telling – joint decoding often achievesmuch higher sum capacity thanindependent decoding owing both to diversity and to the greater amount of usable energyincident on the distributed receiver [50, 52, 54]. That is, cooperative collection and com-bining of signals from all receivers on which transmitted energy is incident both increasesthe amount of signal energy captured and in addition confersa multiple receiver diversitybenefit as well. In short, the interference channel capacityregion is often a significantlysmaller subset of the joint collection/decoding capacity region.

These two benefits strongly motivate a system architecture where information is sharedamong receivers, even of otherwise independent systems. With increasingly available high

Page 9: ADVANCES IN MULTIUSER DETECTION

INTERFERENCE AVOIDANCE BASICS 3

bandwidth land line connections coupled to the cost of siting radio transceivers, they notionof a distributed transceiver facility on the uplink seems prudent and inevitable rather thanfar-fetched. And interference avoidance still provides some degree of autonomy sincemodulation waveforms need not be jointly chosen – users simply iterate greedy actions andan efficient operating point is reached automatically. All that is needed is a common sharedmeasurement of interference levels at the receiver(s).

In the following sections we will describe basic interference avoidance principles, dif-ferent types of interference avoidance algorithms and how such algorithms might be im-plemented. We then extend basic interference avoidance to cover a variety of typicalwireless scenarios including slowly fading channels, rapidly fading channels, MIMO chan-nels, asynchronous systems, power control and finally the dynamically changing subsets ofactive users sure to be a feature of real unlicensed wirelesssystems.

We will find that these extended versions of interference avoidance usually lead to mutu-ally water-filled spectra [52,87] for the mutually interfering users. This observation in someways brings us back on the original motivation of completelyindependent systems withcompletely independent receivers [8,12,50–53,55]. If interfering users are treated as noise,mutual waterfilling allows us to identify fixed points of greedy behavior and examine whenthey are near-optimal or strongly suboptimal. The design ofprocedures to move betweenor eradicate certain of these fixed points is beyond the scopeof this chapter. However,a number of interesting ideas have surfaced [8, 12, 55] that flow naturally from a generalinterference avoidance perspective.

We close the chapter with a summary of results and a selectionof open problems.

1.2 INTERFERENCE AVOIDANCE BASICS

We consider the uplink of a synchronous CDMA communication system withK usershaving signature waveformsSℓ(t)K

ℓ=1 of finite durationT and equal received power at acommon receiver (base station). Without loss of generalitywe assume unit received powerfor each user. The received signal is [78]

R(t) =

K∑

ℓ=1

bℓSℓ(t) + n(t), (1.1)

wherebℓ is the information symbol sent by userℓ with unit-energy signatureSℓ(t), andn(t)is an additive Gaussian noise process that corrupts the signal at the receiver. We assume thatall signals are representable in an arbitraryN -dimensional signal space, in which each user’ssignature waveformSℓ(t) is equivalent to anN -dimensional unit-norm codeword vectorsℓ

1 and Gaussian noise processn(t) is equivalent to the noise vectorn with correlationmatrix E[nn⊤] = W. The equivalent received signal vectorr at the base station is thengiven by the vector equation

r =K∑

ℓ=1

bℓsℓ + n = Sb + n, (1.2)

1For simplicity of exposition we have assumed unit energy codewords. However, it should be noted that all theresults we present hold even if unequal codeword energies|sk|

2= pk are assumed [63].

Page 10: ADVANCES IN MULTIUSER DETECTION

4 INTERFERENCE AVOIDANCE FOR CDMA SYSTEMS

whereb = [b1 · · · bℓ · · · bK ]⊤ contains the symbols sent by users1 throughK and

S =

| | |s1 · · · sℓ · · · sK

| | |

(1.3)

is anN × K matrix with unit norm columns that are the user codewordssℓ. The autocor-relation matrix of the received signal in equation (1.2) is

R = E[rr⊤] = SS⊤ + W. (1.4)

A unit norm receiver filter,ck, is used to estimate the symbol transmitted by a given userk. This estimate is computed as

bk = c⊤k r, (1.5)

so the signal-to-interference plus noise-ratio (SINR) foruserk becomes

γk =(c⊤k sk)2

K∑

ℓ=1,ℓ 6=k

(c⊤k sℓ)2 + E[(c⊤k n)2]

. (1.6)

Interference avoidance provides distributed algorithms by which individual users in-crease/maximize their SINR through adaptation of their codewords. We note that eventhough interference avoidance is an egocentric procedure of selfish codeword updates, itconverges to a socially optimal solution in which global system metrics like the informationtheoretic sum capacity or total squared correlation (TSC) are optimized. Sum capacity isexpressed as

Cs =1

2log(detR) − 1

2log(detW) (1.7)

and was used in the context of optimizing CDMA codewords in [17, 64, 79–81]. We notethat for fixed user power, sum capacity is upper bounded by thevalue corresponding to theoptimal CDMA codewords [79–81].

The total squared correlation (TSC), that is the sum of squared correlations of usercodewords, is expressed as

TSC=K∑

i=1

K∑

j=1

(s⊤i sj)2 = tr

[

(SS⊤)2]

(1.8)

and was used in the context of optimizing CDMA codewords in [25,26]. The TSC is lowerbounded, and its lower bound [85]

TSC≥ K2

N(1.9)

is achieved for the same optimal CDMA codewords that maximize sum capacity [64, 81],which are also referred to as Welch Bound Equality (WBE) sequences.

A more general expression of the TSC, called the general squared correlation (GSC), isused in the context of interference avoidance algorithms [48,63]. This is defined as

GSC= tr[

R2]

= tr[

(

SS⊤ + W)2]

. (1.10)

Page 11: ADVANCES IN MULTIUSER DETECTION

INTERFERENCE AVOIDANCE BASICS 5

In white noise, when the noise covariance is a scaled identity matrixW = σI, this is relatedto TSC by an additive constant:

GSC = tr[

(SS⊤)2]

+ σ2tr[

(I)2]

+ 2σtr[

(SS⊤)]

= tr[

(SS⊤)2]

+ σ2N + 2σK.(1.11)

The GSC is also lower bounded, and its lower bound is achievedfor generalized WBEsequences (GWBE)2 [80,81].

1.2.1 Greedy Interference Avoidance: the eigen-algorithm

Assuming simple matched filters at the receiver for all users, the SINR for userk in equation(1.6) is expressed as

γk =(s⊤k sk)2

K∑

ℓ=1,ℓ 6=k

(s⊤k sℓ)2 + E[(s⊤k n)2]

=1

s⊤k

K∑

ℓ=1,ℓ 6=k

sℓs⊤ℓ + E[nn⊤]

sk

. (1.12)

We define the autocorrelation matrix of the interference-plus-noise seen by userk as

Rk =

K∑

ℓ=1,ℓ 6=k

sℓs⊤ℓ + W = R − sks

⊤k , (1.13)

and rewrite equation (1.12) as

γk =1

s⊤k Rksk. (1.14)

Maximizing the SINRγk is equivalent to minimizing the inverse SINR

βk =1

γk= s⊤k Rksk. (1.15)

Note that for unit norm codewords, equation (1.15) represents the Rayleigh quotientfor matrix Rk, and recall from linear algebra [69, p. 348] that this is minimized by theeigenvector corresponding to the minimum eigenvalue of thegiven matrix3. Thus, theSINR for userk can be greedily maximized by having userk replace its current codewordsk with the minimum eigenvectorxk of the autocorrelation matrixRk of the interference-plus-noise seen by userk. We call this proceduregreedy interference avoidancesinceby replacing its current codeword with the minimum eigenvector of the interference-plus-noise correlation matrix, userk avoids interference by placing its transmitted energy inthat region of the signal space with minimum interference-plus-noise energy and greedilymaximizes SINR without paying attention to potentially negative effects this action mayhave on other users in the system. Applied iteratively by allusers in the system this procedure

2According to [80, 81], in a GWBE codeword ensemble oversized users – with input power constraints largerelative to the input power constraints of the other users – have orthogonal codewords that span the dimensions ofthe signal space with minimum noise energy, while non-oversized users have codewords that satisfy an aggergatewater filling solution over the remaining signal dimensions.3This is also referred to as the minimum eigenvector.

Page 12: ADVANCES IN MULTIUSER DETECTION

6 INTERFERENCE AVOIDANCE FOR CDMA SYSTEMS

1. Start with a randomly chosen codeword ensemble sℓKℓ=1.

2. For k = 1, . . . , K

(a) Compute the autocorrelation matrix Rk of the

interference-plus-noise seen by user k

(b) Find the minimum eigenvalue λ(k)N and associated

unit eigenvector xk of Rk.

(c) If user k’s codeword sk is not already a suitable

eigenvector of Rk, replace it by xk.

3. Repeat step 2 until a fixed point is reached.

Figure 1.1. The Eigen-Algorithm

definesthe eigen-algorithm for interference avoidance[63] which is formally presented inFigure 1.1. Numerically, a fixed point of the eigen-algorithm is defined with respect toa stopping criterion. That is, we say that a fixed point is reached when the differencebetween two consecutive values of the stopping criterion iswithin a specified toleranceǫ.The stopping criterion can be an individual one, like the codeword SINR or the Euclidiandistance between codewords and their corresponding replacements, or a global one likesum capacity or GSC. We note that in the case of individual stopping criteria all valuescorresponding to all codewords must be within the specified tolerance for the algorithm tostop.

Convergence of the eigen-algorithm to a fixed point is ensured by the fact that the algo-rithm monotonically increases sum capacity which is upper bounded, respectively mono-tonically decreases GSC which is lower bounded. We note firstfrom equation (1.13) that

R = Rk + sks⊤k . (1.16)

To show that sum capacityCs in equation (1.7) is monotonically increased by applicationof greedy interference avoidance, we will verify that

∆Cs=

1

2log det

(

Rk + xkx⊤k

)

− 1

2log det

(

Rk + sks⊤k

)

(1.17)

is non-negative. We note thatRk is always invertible due to the presence of the non-singularnoise covariance matrixW, and we can factor it out in equation (1.17) to obtain

∆Cs=

1

2det(

I + R− 1

2

k xkx⊤k R

− 12

k

)

− 1

2det(

I + R− 1

2

k sks⊤k R

− 12

k

)

. (1.18)

Since the matricesR− 1

2

k sks⊤k R

− 12

k andR− 1

2

k xkx⊤k R

− 12

k each have rank one, equation (1.18)further reduces to

∆Cs=

1

2(1 + x⊤

k R−1k xk) − 1

2(1 + s⊤k R−1

k sk) = x⊤k R−1

k xk − s⊤k R−1k sk. (1.19)

If xk is chosen as the minimum eigenvector ofRk, thenxk is also the maximum eigenvectorof R−1

k , and it follows that∆Cs≥ 0 from the properties of Rayleigh quotient [69, p. 348].

Thus, the eigen-algorithm monotonically increases sum capacity.

Page 13: ADVANCES IN MULTIUSER DETECTION

INTERFERENCE AVOIDANCE BASICS 7

To show that GSC in equation (1.10) is monotonically decreased by application of greedyinterference avoidance, we need to show that the difference

∆GSC = tr[

(Rk + sks⊤k )2]

− tr[

(Rk + xkx⊤k )2]

(1.20)

in GSC, before and after greedy interference avoidance is applied, is non-negative.After canceling similar terms and replacing the traces by the corresponding quadratic

forms, the GSC reduction becomes

∆GSC = 2(s⊤k Rksk − x⊤k Rkxk). (1.21)

Whenxk is chosen to be the minimum eigenvector ofRk, it follows that∆GSC ≥ 0 andthat the eigen-algorithm monotonically decreases GSC.

We note that in the context of the eigen-algorithm maximizing sum capacity and minimiz-ing GSC are equivalent procedures, although this may not be true in general. In particular,∆Cs

and∆GSC are not identical functions ofxk and there can be algorithms that monoton-ically improve one metric but yield fluctuations in the other. We also note that maximizingsum capacity and/or minimizing GSC imply optimizing the overall system performance,although they may not imply fairness to individual users in the system. More specifically,the codeword update of a given user maximizes its corresponding SINR, but may negativelyaffect other user(s) in the system whose SINRs may decrease after the update. Nevertheless,empirical studies [48] have shown that the minimum SINR is not decreased by codeword up-dates, and if the user with the worst SINR had an acceptable connection when the iterationsstarted, then usually no other user’s connection will be anyworse than this.

To summarize, the eigen-algorithm increases sum capacity and decreases GSC at eachstep. Since both sum capacity and GSC are bounded from above and below respectively,the eigen-algorithm must converge to a fixed point. However,such convergence may notimply convergence of the eigen-algorithm to extremal values of sum capacity and GSC,since it may get trapped in suboptimal fixed points. Nevertheless, it has been shown thatthere is only a finite number of suboptimal fixed points, whichcan always be escaped byusing various tactics [61]. This ensures convergence of theeigen-algorithm to a class ofGWBE codewords for which sum capacity is maximized, respectively GSC is minimized.

1.2.2 MMSE Interference Avoidance

An alternative interference avoidance procedure can be defined using the minimum meansquare error (MMSE) receiver filter as the codeword replacement vector. The MMSEreceiver filter for userk is obtained [37] by minimizing the mean squared error (MSE)between the filter output and the transmitted information symbol corresponding to userk

MSEk = E[(c⊤k r − bk)2] = c⊤k Rkck + (c⊤k sk − 1)2. (1.22)

The MMSE filter for userk is then

ck = arg minck

MSEk. (1.23)

Since MSEk is a quadratic function inck, the necessary and sufficient condition for optimalck is

∂ck(MSEk) = 0. (1.24)

Page 14: ADVANCES IN MULTIUSER DETECTION

8 INTERFERENCE AVOIDANCE FOR CDMA SYSTEMS

1. Start with a randomly chosen codeword ensemble sℓKℓ=1.

2. For k = 1, . . . , K

(a) Compute the normalized MMSE receiver filter ck for

user k using equation (1.28)

(b) Replace the user k codeword sk by ck

3. Repeat step 2 until a fixed point is reached.

Figure 1.2. The MMSE Algorithm

This implies2Rkck + 2sk(s⊤k ck − 1) = 0, (1.25)

and thusck = (Rk + sks

⊤k )−1sk = R−1sk. (1.26)

Using the matrix inversion lemma [24, p. 19] equation (1.26)can be rewritten as

ck =R−1

k sk

1 + s⊤k R−1k sk

. (1.27)

We note thatck in equation (1.26) does not have unit norm. With the appropriate normal-ization, we obtain

ck =R−1

k sk

(s⊤k R−2k sk)1/2

, (1.28)

the unit norm MMSE receiver filter for userk.We also note that the MMSE receiver filter maximizes the SINR [37] in equation (1.6).

Thus, when MMSE receiver filters are assumed, the SINR for user k can be maximized byhaving userk replace its codeword with the normalized MMSE receiver filter correspond-ing to sk. Therefore, this method was dubbed theMMSE updatein [73] and defines analternative interference avoidance procedure. Applied iteratively by all users in the systemthis procedure definesthe MMSE algorithm for interference avoidance, which is formallygiven in Figure 1.2.

As is the case with the eigen-algorithm, convergence of the MMSE algorithm to a fixedpoint is also defined with respect to a stopping criterion, and we will use the same globalcriteria as in the case of the eigen-algorithm: sum capacityand GSC.

To show the MMSE algorithm increases sum capacity we go back to equation (1.19) andreplacexk by the expression forck in equation (1.28). This yields the one-step increase

∆′Cs

=s⊤k R−3

k sk

s⊤k R−2k sk

− s⊤k R−1k sk (1.29)

in sum capacity for the MMSE update. In order to show that∆′Cs

is non-negative, werewritesk, in terms of the matrix of eigenvectorsΦ of R−1

k , assk = Φzk where

R−1k = ΦΛ−1Φ⊤. (1.30)

Page 15: ADVANCES IN MULTIUSER DETECTION

INTERFERENCE AVOIDANCE BASICS 9

The change in sum capacity becomes

∆′Cs

=z⊤k Λ−3zk

z⊤k Λ−2zk

− z⊤k Λ−1zk. (1.31)

Rearranging we have

∆′Cs

=z⊤k Λ−3zk − z⊤k Λ−2zkz

⊤k Λ−1zk

z⊤k Λ−2zk

, (1.32)

and factoring yields

∆′Cs

=z⊤k[

Λ−2(

I − zkz⊤k

)

Λ−1]

zk

z⊤k Λ−2zk

. (1.33)

SinceI−zkz⊤k is positive semi-definite andΛ is positive definite,∆′

Csmust be non-negative,

which implies that the MMSE update monotonically increasessum capacity.To show that GSC is monotonically decreased by application of the MMSE update, we

evaluate the GSC reduction∆GSC in (1.21) withxk replaced by the MMSE updateck. Inthis case, the reduction is GSC is

∆′GSC = 2(s⊤k Rksk − c⊤k Rkck) = 2s⊤k Rksk − 2

s⊤k R−1k sk

s⊤k R−2k sk

. (1.34)

The covariance matrixRk of the interference plus noise seen by userk is symmetric andpositive definite. Therefore it is invertible and sincesk is unit norm we can write

1 = ‖sk‖2 = s⊤k R−1/2k R

1/2k sk. (1.35)

Applying the Schwarz inequality [69, p. 147] we have

1 =(

s⊤k R−1/2k R

1/2k sk

)2

≤ ‖R−1/2k sk‖2‖R1/2

k sk‖2 (1.36)

=(

s⊤k R−1k sk

) (

s⊤k Rksk

)

. (1.37)

Furthermore, using the Schwarz inequality again, we obtain(

s⊤k R−1k sk

)2 ≤ ‖sk‖2‖R−1k sk‖2 = s⊤k R−2

k sk. (1.38)

Applying the inequality (1.37) to (1.34) yields

∆′GSC≥ 2s⊤k Rksk − 2

(s⊤k R−1k sk)2(skRksk)

s⊤k R−2k sk

(1.39)

= 2s⊤k Rksk

[

1 − (s⊤k R−1k sk)2

s⊤k R−2k sk

]

. (1.40)

It follows from (1.38) that∆′GSC ≥ 0, which proves that GSC is monotonically decreased

for the MMSE update as well.Thus, as it was the case with the eigen-algorithm, convergence of the MMSE algorithm

is guaranteed by the monotonic increase of sum capacity and decrease of GSC coupledto the upper and lower bounds, respectively, of sum capacityand GSC. And once again,convergence in these metricsdoes notguarantee convergence to extremal values of themetrics. Nevertheless, it has been shown that a noisy version of the MMSE update alwaysconverges to a class of codewords for which GSC is minimized [3]. These codewords formGWBE sets that correspond to maximum sum capacity as well.

Page 16: ADVANCES IN MULTIUSER DETECTION

10 INTERFERENCE AVOIDANCE FOR CDMA SYSTEMS

1.2.3 Other Algorithms for Interference Avoidance

In the previous sections we presented two different interference avoidance algorithms, bothof which increase sum capacity and decrease GSC at each step,and for which convergenceto the optimal point that maximizes sum capacity and minimizes GSC has been established.

A general class of interference avoidance algorithms can bedefined by any replacementprocedure for which the new codewordxk satisfies either

x⊤k R−1

k xk ≥ s⊤k R−1k sk (1.41)

orx⊤

k Rkxk ≤ s⊤k Rksk. (1.42)

Any such procedure will result in a convergent algorithm when iterated over all users since iteither increases sum capacity as equation (1.41) does, or decreases GSC as equation (1.42)does. We note that only convergence to a fixed point is guaranteed for such procedures,but not to the optimal fixed point. Among the many choices thatsatisfy equations (1.41)and (1.42) one choice is useful from a practical perspective: to adjust the current codewordincrementally in either the direction of the optimal codeword, or in such a way that sumcapacity is increased or GSC is decreased. We now introduce two such procedures:laggedinterference avoidanceandgradient descent interference avoidance.

Lagged interference avoidance is the more obvious of these incremental procedures andcorresponds to the codeword update equation

sk(t + 1) =αsk(t) + mβxk(t)

‖αsk(t) + mβxk(t)‖ , (1.43)

whereα, β ∈ R+, m = sgn[s⊤k (t)xk(t)], andxk(t) is the minimum eigenvector ofRk(t),

the interference-plus-noise covariance seen by userk at time stept. To ensure that code-words change incrementally we require|α| ≫ |β|, and we explicitly include a time indext to emphasize the incremental nature of the process. It can beeasily shown that thislagged interference avoidance procedure monotonically increases sum capacity as well asdecreases GSC [48,68].

The second procedure for interference avoidance with incremental codeword adaptationis based on a gradient descent technique. More precisely, inthis case we would like toreduce the expressions⊤k Rksk with each iteration, while maintaining unit norm codewordsand excluding the trivial casesk = 0. Using the Rayleigh quotient

ρk =s⊤k Rksk

s⊤k sk(1.44)

and taking its gradient with respect to the codeword componentsskj we obtain

∇ρk =2[s⊤k skRksk − (s⊤k Rksk)sk]

(s⊤k sk)2(1.45)

such that the iterationsk(t+1) = sk(t)−µ∇ρk(t) with µ a suitably small constant, wouldincrease the SINR. Since we require unit norm codewords, we normalize the codeword as

sk(t + 1) =sk(t) − µ∇ρk(t)

‖sk(t) − µ∇ρk(t)‖ . (1.46)

Page 17: ADVANCES IN MULTIUSER DETECTION

INTERFERENCE AVOIDANCE OVER TIME-INVARIANT CHANNELS 11

l

l

( )

( )l

( )l

( )

l

l

( )l

l

l( )

l to

Serial

Parallel(frame)

symbols

( )l ( )lms

mΣUser x (t) =

sK

bm

b

b1

bm

K

sm

s1

Figure 1.3. Multicode CDMA scenario for sending frames of data symbols. Each symbol in userℓ’s frame is assigned a distinct codeword and the resulting CDMA symbolxℓ is a superposition ofall codewords scaled by their corresponding data symbols.

This iteration decreasess⊤k Rksk while maintaining a unit normsk. In addition, this iterationalso monotonically decreases the GSC [48,68]. We note that gradient descent interferenceavoidance does not explicitly require calculation of the minimum eigenvector which is adistinct computational advantage. However, as with any incremental method, convergencewill proceed more slowly than if the optimal codeword were chosen straight away at eachstep [48,68].

1.3 INTERFERENCE AVOIDANCE OVER TIME-INVARIANT CHANNELS

Interference avoidance algorithms were introduced in Section 1.2 in a basic CDMA scenarioin which individual users are assigned a single codeword fortransmission, and communi-cation channels are characterized by an ideal response withonly additive Gaussian noisecorrupting the received signal at the base station receiver. In this section we extend applica-tion of interference avoidance to more general scenarios inwhich users are assigned multiplecodewords for transmission, and communication channels are no longer ideal [42,43].

Specifically, in this section we consider the uplink of a synchronous CDMA systemwith K users in which each user sends frames of data symbols using a multicode CDMAapproach as described schematically in Figure 1.3. Each symbol in a given user’s frame isassigned a distinctN -dimensional codeword such that the CDMA symbol transmitted bythe user is

xℓ =

Kℓ∑

m=1

b(ℓ)m s(ℓ)

m = Sℓbℓ, ℓ = 1, . . . ,K, (1.47)

wherebℓ = [b(ℓ)1 · · · b

(ℓ)Kℓ

]⊤ is the vector containing the data symbols in userℓ’s frame, and

Sℓ =[

s(ℓ)1 · · · s

(ℓ)m · · · s

(ℓ)Kℓ

]

is theN ×Kℓ codeword matrix corresponding to userℓ whose

columnss(ℓ)m , m = 1, . . . ,Kℓ, are the codewords assigned to each of theKℓ symbols in

userℓ’s frame.

Page 18: ADVANCES IN MULTIUSER DETECTION

12 INTERFERENCE AVOIDANCE FOR CDMA SYSTEMS

The channel between a given userℓ and the base station is described by the channelmatrix Hℓ which incorporates propagation effects like attenuation and/or multipath. Thedimension of the channel matrixHℓ and the values of its elements are determined by specifictime and/or frequency domain representation of the channelemployed. For example, in thecase of DS-CDMA systems with multipathHℓ is anN ×N circulant matrix containing thecoefficients of the discrete-time channel impulse response[43, 58], while for multicarrier(MC) CDMA systemsHℓ is aN × N diagonal matrix containing the channel frequencygains along the main diagonal [42, 43]. We assume that all channels are time-invariant,and that each user knows its corresponding channel matrix, which is fixed. The case oftime-varying fading channels is discussed in Section 1.4.

For this multicode CDMA scenario with non-ideal user channels the received signalvector at the base station is then expressed as

r =

K∑

ℓ=1

HℓSℓbℓ + n, (1.48)

wheren is the additive Gaussian noise vector that corrupts the received signal at the basestation receiver, with the same covariance matrixE[nn⊤] = W as in previous sections.Assuming that symbols in a given user’s frame are uncorrelated with unit energy such thatE[bℓb

⊤ℓ ] = IKℓ

, the covariance matrix of the received signal in equation (1.48) is

R = E[rr⊤] =K∑

ℓ=1

HℓSℓS⊤ℓ H⊤

ℓ + W (1.49)

1.3.1 Interference Avoidance with Diagonal Channel Matrices

Application of greedy interference avoidance for multicode CDMA systems with diagonalchannel matrices extends in a straightforward way. We startby rewriting the received signalin equation (1.48) from the perspective of a given userk as

r = HkSkbk +K∑

ℓ=1,ℓ 6=k

HℓSℓbℓ + n (1.50)

in which the first term is the desired signal corresponding touserk while the rest representsinterference coming from other users and noise. We note thatall the Hℓ matrices areassumed invertible, although some of their elements may be of O(ε). Nevertheless, asdiscussed in [48, 49] this does not restrict application of greedy interference avoidancesince those dimensions corresponding to very small gains will be completely avoided.

>From the perspective of userk, interference avoidance must now be applied to opti-mizing its codewords in the presence of combined noise and interference from other users.In order to do this we define an equivalent “inverse-channel”observation for userk bypre-multiplying with the corresponding inverse channel matrix H−1

k in equation (1.50) toobtain

rk = Skbk + H−1k

ℓ 6=k

HℓSℓbℓ + n

. (1.51)

The covariance matrix of the inverse-channel received signal rk is

R(k) = SkS⊤k + H−1

k

ℓ 6=k

HℓSℓS⊤ℓ Hℓ + W

H−1k (1.52)

Page 19: ADVANCES IN MULTIUSER DETECTION

INTERFERENCE AVOIDANCE OVER TIME-INVARIANT CHANNELS 13

1. Start with a randomly chosen codeword ensemble

specified by the user codeword matrices S1, . . . ,SK

2. For each user k = 1 . . . K,

(a) Define the ‘‘inverse-channel observation’’ for user

k as in equation (1.51).

(b) Adjust user k’s codewords sequentially such that

the codeword corresponding to symbol m is replaced

by the minimum eigenvector of matrix R(k)m in

equation (1.54).

(c) Repeat step (b) iteratively for each user until

a fixed point is reached for which further

modification of codewords will bring no additional

improvement.

(d) If a suboptimal point is reached use escape methods

[61] and repeat steps (b)-(c).

3. Repeat step 2 iteratively for each user until a fixed

point is reached for which further modification of

codewords will bring no additional improvement.

Figure 1.4. The Multiuser Eigen-Algorithm for Dispersive Channels

and is related to the original received signal covariance matrix in equation (1.49) by

R(k) = H−1k RH−1

k . (1.53)

Based on the inverse-channel observation, the greedy interference avoidance for userk consists of replacing codewordm of userk, s(k)

m , with the minimum eigenvector of thecorresponding interference-plus-noise covariance matrix under channelk inversion whichis given by

R(k)m = R(k) − s(k)

m s(k)⊤

m . (1.54)

Application of greedy interference avoidance in this multiuser/multicode CDMA contextalso monotonically increases sum capacity [48, 49], as it was the case in the basic CDMAscenario discussed in Section 1.2. We note that in this case sum capacity is given byan expression identical to that in equation (1.7), but in which R has the more complexexpression of equation (1.49).

Numerous interference avoidance algorithms can be formulated based on repeated ap-plication of the greedy interference avoidance procedure.These are defined by the variousways in which user codewords are selected for replacement. For example, one algorithmcould be defined by replacement at a given step of one codewordof a given user, followedby replacement of a randomly selected codeword of a randomlyselected user. Alternatively,at a given step of the algorithm, one could replace the codeword which will yield the max-imum increase in sum capacity. We note that, regardless of the order in which codewordsare selected for update, convergence of all such algorithmsto a fixed point is guaranteed bythe monotonic increase in sum capacity implied by greedy interference avoidance, alongwith the fact that sum capacity is an upper bounded measure. With respect to this measure,

Page 20: ADVANCES IN MULTIUSER DETECTION

14 INTERFERENCE AVOIDANCE FOR CDMA SYSTEMS

1. Start with a randomly chosen codeword ensemble

specified by the user codeword matrices S1, . . . ,SK

2. Define the ‘‘inverse-channel observations’’ for all

users k as in equation (1.51)

3. Identify the codeword s(k)m whose replacement will

maximally increase sum capacity. If no codeword will

increase sum capacity, and suboptimal maxima escape

methods [61] are ineffective for improvement, then

STOP. Otherwise,

(a) adjust s(k)m by replacing it with the minimum

eigenvector of matrix R(k)m in equation (1.54)

(b) Return to step 2

Figure 1.5. The Maximum Capacity Increase Algorithm for Interference Avoidance

the optimal point with maximum sum capacity corresponds to simultaneous water filling byall users in their respective signal spaces, provided that users’ transmit covariance matricesare allowed to span the entire transmit signal space [87]. Inthe multicode CDMA frame-work this requirement translates to the requirementKℓ ≥ N that the number of codewordsassigned for transmission to any given userℓ be equal to or larger than the dimensionN ofthe signal space.

Empirically it was observed that when users have at least as many codewords as signalspace dimensions, algorithms based on repeated application of greedy interference avoid-ance with random initializations and various codeword updates yield an optimal codewordensemble that corresponds to simultaneous water filling by all users in their inverted channelproblems. An analytical proof of this result in general, forany possible order of codewordupdates is not available, although it has been proved for some specific cases [48,49]. Oneof these cases consists of updating all codewords of a given user sequentially until con-vergence to a fixed point is reached, and then iterating for all users in the system. This isan extension of the eigen-algorithm in Section 1.2.1 to the multiuser/multicode scenario,and represents an instance of the “iterative water filling” procedure in [87]. We summarizethis algorithm in Figure 1.4. An alternative algorithm based on greedy interference avoid-ance, which is not iterative water filling, but for which convergence to a simultaneous waterfilling solution was also proved [48, 49] is presented in Figure 1.5. We note that, whilethis alternative algorithm may not seem attractive from a practical implementation point ofview due to the extra complexity required for finding that codeword in the ensemble whichimplies maximum increase in sum capacity, it is important from a theoretical perspectivesince, even though it isnot a water filling procedure, it still converges to a simultaneouslywater-filled solution.

1.3.2 Interference Avoidance with General Channel Matrices

In the previous section, we presented the extension of interference avoidance to channelscharacterized by diagonal matrices, which is applicable tomulticarrier CDMA systems.In this section we discuss how application of greedy interference avoidance generalizes to

Page 21: ADVANCES IN MULTIUSER DETECTION

INTERFERENCE AVOIDANCE OVER TIME-INVARIANT CHANNELS 15

any type of channel matrices. To ensure utmost generality wewill approach the consideredsystem from a very general perspective and assume that different users reside in differentsignal spaces, with different dimensions and potential overlap among them, and all beingsubspaces of the receiver signal space. Each user’s signal space as well as the receiver signalspace are of finite dimension, and are implied by a finite signaling interval T and finitebandwidthsWℓ for each userℓ, respectively andW (which includes allWℓ correspondingto all users) for the receiver [30]. We denote byNℓ the dimension of userℓ’s signal space,and byN , N ≥ Nℓ for all ℓ, the dimension of the receiver signal space.

The transmitted signal by userℓ is expressed by the same equation (1.47) but in whichuserℓ’s codeword matrixSℓ is of dimensionsNℓ × Kℓ in this case. The received signalvector at the base station will be expressed in this case by the same equation (1.48) but inwhich channel matricesHℓ can be anyN × Nℓ matrices.

In order to apply greedy interference avoidance in this casewe start again by rewriting thereceived signal in equation (1.48) from the perspective of agiven userk as in equation (1.50)

r = HkSkbk + zk, (1.55)

wherezk denotes the interference-plus-noise seen by userk. That is,

zk =K∑

ℓ=1,ℓ 6=k

HℓSℓbℓ + n, (1.56)

which has covariance matrix

Zk = E[zkz⊤k ] =

K∑

ℓ=1,ℓ 6=k

HℓSℓS⊤ℓ H⊤

ℓ + W. (1.57)

SinceZk is symmetric, it can be diagonalized as

Zk = Ek∆kE⊤k . (1.58)

Furthermore, becauseZk is a positive definite covariance matrix, we can define the whiten-ing transformation

Tk = ∆−1/2k E⊤

k . (1.59)

In transformed coordinates, equation (1.55) is equivalentto

r = Tkr = TkHkSkbk + Tkzk = HkSkbk + wk, (1.60)

whereHk = TkHk is the channel matrix seen by userk in the new coordinates andwk =Tkzk is the equivalent “white noise” with covariance matrixE[wkw

⊤k ] = TkZkT

⊤k = I,

the identity matrix. We note that the received signal covariance matrix in the transformedcoordinates is related to the original signal covariance matrix by

R = E[rr⊤] = TkRT⊤k . (1.61)

We now apply the singular value decomposition (SVD) [69, p. 442] to the transformedchannel matrix corresponding to userk, yielding

Hk = UkDkV⊤k , (1.62)

Page 22: ADVANCES IN MULTIUSER DETECTION

16 INTERFERENCE AVOIDANCE FOR CDMA SYSTEMS

TheN × N matrix Uk has as columns the eigenvectors ofHkH⊤k , theNk × Nk matrix

Vk has as columns the eigenvectors ofH⊤k Hk, and theN × Nk matrix Dk contains the

singular values ofHk on the main diagonal and zero elsewhere. We note that becauseTk

is invertible, the rank ofHk will be equal to that ofHk. Without loss of generality weassume thatHk has full rank4 Nk, so that the singular value matrixDk can be partitionedas

Dk =

[

Dk

0

]

(1.63)

with Dk anNk × Nk diagonal matrix containing the non-zero singular values along thediagonal and zeros in the rest. The left inverse ofDk is defined as

D†k =

[

D−1k 0

]

, (1.64)

withD

†kDk = INk

. (1.65)

Returning to equation (1.60) in which the SVD for transformed channel matrixHk hasbeen applied, we have

r = UkDkV⊤k Skbk + wk. (1.66)

We pre-multiply byU⊤k to obtain

rk = U⊤k r = DkV

⊤k Skbk + U⊤

k wk (1.67)

and defineSk = V⊤k Sk and wk = U⊤

k wk. Note that because bothUk andVk areorthogonal matrices they preserve norms of vectors. Thus, columns ofSk are also unitnorm as were the columns ofSk. Also, because the equivalent noise termwk is white, thenwk will remain white with the same covariance matrix equal to the identity matrix. Withthese additional definitions, we have

rk = DkSkbk + wk. (1.68)

At this point we define an equivalent observation for userk by pre-multiplying with the leftinverse ofDk to obtain

rk = D†krk = Skbk + zk, (1.69)

with tildezk = D†kwk. For the equivalent observation equation (1.69) application of greedy

interference avoidance consists of replacing codewordm of userk by the minimum eigen-vector of the corresponding interference-plus-noise covariance matrix in the transformedproblem

R(k)m = SkS

⊤k − s(k)

m s(k)⊤m + D−2

k . (1.70)

We note that, similar to the diagonal channel matrices case,application of greedy inter-ference avoidance in this general scenario also monotonically increases sum capacity andreaches a fixed point [48]. In addition, when users have at least as many codewords as signalspace dimensions, repeated application of greedy interference avoidance with various code-word replacement procedures with respect to codewords/users yields a simultaneous waterfilling solution for all users in their respective signal spaces, which identical to that in [87]

4This is not a restriction since ifHk is not full rank then in some dimensions the userk signal space will havezero projection on the output space. Therefore we can redefine a reduced codeword matrixSk which uses onlydimensions with nonzero projections on the output space.

Page 23: ADVANCES IN MULTIUSER DETECTION

INTERFERENCE AVOIDANCE IN FADING CHANNELS 17

and corresponds to maximum sum capacity. This is just like inthe case of diagonal channelmatrices, and similar algorithms for interference avoidance can be defined in this case aswell. However, due to the very general framework used in thiscase these algorithms willbe applicable to a wide variety of wireless scenarios. We note the special case of multiusersystems with multiple transmit and receive antennas which is discussed in [45,47].

1.4 INTERFERENCE AVOIDANCE IN FADING CHANNELS

An important characteristic of wireless communication systems is the unavoidable presenceof fading, caused by the nature of the wireless communication channel. To maximize theoverall network capacity, one should exploit the variations in the channel fade levels whileallocating the available resources. In this section, the objective of resource allocationis to maximize the information theoretic ergodic (expected) sum capacity. We considerallocating both powers and the signature sequences of the users as functions of the channelstate information (CSI) in order to achieve this objective.The presentation in this sectionis based on the work published in [28].

In the presence of fading and AWGN, the received signal vectoris given by [78],

r =K∑

i=1

pihibisi + n, (1.71)

wheresi = [si1, · · · , siN ]⊤, pi, hi, bi are the unit energy signature sequence, transmit

power, channel gain and information symbol, respectively,of useri, andn is a zero-meanGaussian random vector with covarianceσ2IN . The information symbolbi is assumed tohave unit energy, i.e.,E[b2

i ] = 1. We assume that the receiver and all of the transmittershave perfect knowledge of the channel states of all users represented as a vectorh =

[h1, · · · , hK ]⊤.

For a given set of signature sequences and a fixed set of channel gains,h, the sumcapacityCs(h, p,S) is [76],

Cs(h, p,S) =1

2log det

(

IN + σ−2K∑

i=1

hipisis⊤i

)

, (1.72)

wherepi is the average power of useri, p = [p1, · · · , pK ], andS = [s1, · · · , sK ]. Inthe presence of fading, if the channel state is modeled as a random vector, the quantityCs(h, p,S) is random as well, and the ergodic sum capacity is found as theexpected valueof Cs(h, p,S). Instead of keeping the transmit power of useri fixed to pi as in (1.72),we can choose the transmit powers of the userspi(h), i = 1, · · · ,K, as a function of thechannel stateh with the aim of maximizing the ergodic sum capacity of the system subjectto average transmit power constraints for all users. Similarly, we can choose the signaturesequencesS to be a function of the channel state as well; let us denote it by S(h) to showthe dependence on the channel state. Therefore our problem is to solve for the jointlyoptimum transmit powers and signature sequences as functions of the channel state in orderto maximize the ergodic sum capacity of the system in the presence of fading. The problemcan be stated as the maximization of the ergodic sum capacity

Eh

[

1

2log det

(

IN + σ−2K∑

i=1

hipi(h)si(h)si(h)⊤

)]

(1.73)

Page 24: ADVANCES IN MULTIUSER DETECTION

18 INTERFERENCE AVOIDANCE FOR CDMA SYSTEMS

subject to average power constraints for all users

Eh [pi(h)] ≤ pi, i = 1, · · · ,K, (1.74)

over the powersp(h) and signature sequencesS(h), at all channel statesh.In order to jointly optimize the powers and the signature sequences, we first fix the power

distributions of all users over all fading states,p(h). Then, the corresponding optimalsignature sequence set at every channel state will consist of a combination of orthogonaland GWBE sequences [79]. This is due to the fact that, the signature sequences at a fadingstateh can be chosen independently of the signature sequences at any other state, sinceonce the powers are fixed, there are no constraints relatingS(h) to S(h) for h 6= h. Sincethe optimum signature sequences at each channel state depend only on powersp(h) andthe channel stateh, we can express the capacity at each channel state only as a function ofthe powers, and optimize the ergodic capacity in terms of thepower allocations of all users.

First consider the case whenK ≤ N . For any fixed channel state, the optimal choiceof signature sequences for a given power control policyp(h) is an orthogonal set [64,79].Then, our problem is equivalent to solvingK independent Goldsmith-Varaiya problems[13] (see also [27]), the solution to which is a single user waterfilling for each user. Moreprecisely, the optimal solutionp∗(h) is the unique solution satisfying the Karush-Kuhn-Tucker (KKT) conditions, and is given by,

p∗i (h) =

(

1

λi− σ2

hi

)+

, i = 1, · · · ,K, (1.75)

whereλi is solved by applying (1.75) to (1.74).WhenK > N , it has been shown in [79], for a non-fading channel, that given the power

constraints of all users, one can group the users into two setsL andL, of oversized and non-oversized users, respectively. Usersi ∈ L are assigned orthogonal sequences, and usersi ∈ L are assigned GWBE sequences. For a channel with fading, at a certain channel stateh, and for a certain arbitrary power distribution of users which assigns powersp1, · · · , pK

to channel stateh, let us define the matrixD = diag(p1h1, · · · , pKhK), and defineµi tobe the eigenvalues of the matrixSDS⊤. Then the signature sequences that maximize thesum capacity for any fixedh satisfy [73],

SDS⊤si = µisi, i = 1, · · · ,K, (1.76)

with repetitions of some of theµi (since there are onlyN eigenvalues ofSDS⊤), wherethe optimalµis are given by [79],

µi(h) =

j∈L(h) pjhj

N − |L(h)| , i ∈ L(h)

pihi, i ∈ L(h)

(1.77)

Using the optimum eigenvalue assignment in (1.77) at each channel state, using (1.73),the signature-sequence-optimized sum capacity can be expressed as

Eh

1

2

i∈L(h)

log

(

1 +pi(h)hi

σ2

)

+1

2(N − |L(h)|) log

(

1 +

i∈L(h) pi(h)hi

σ2(N − |L(h)|)

)

.

(1.78)Next, we need to solve for the optimum power distributionspi(h), i = 1, · · · ,K and the

number of oversized users at each channel stateL(h). To this end, we will first determine

Page 25: ADVANCES IN MULTIUSER DETECTION

INTERFERENCE AVOIDANCE IN FADING CHANNELS 19

the number of users who transmit with nonzero powers at any given channel state. For agiven channel stateh, let the set of users that will transmit with non-zero powersbeK(h).Then, we will prove that, for power control policies that maximize (1.78), the number ofusers inK(h) cannot exceedN .

First, we note that the function in (1.78) is concave, and themaximization (1.78) issubject to the affine set of average power constraints (1.74). Therefore, a power vectorp∗(h) achieves the global optimum of the maximization problem if and only if it satisfiesthe KKT conditions. Then, writing the KKT conditions for theobjective function in (1.78),it is easy to show that

hi

µi(h) + σ2≤ λi, (1.79)

whereµi(h) is given by (1.77), and equality holds ifpi(h) > 0. Now, let us assumethat the number of non-zero components inp∗(h) is |K(h)| > N , for a givenh. Then,some users must share some of the available dimensions, i.e., not all users can be madeorthogonal to each other. In fact, we can find at mostN − 1 sequences that are orthogonalto all other sequences in the system, or equivalently, at least |K(h)| − N + 1 users willhave the sameµi(h) =

j∈L(h) hjpj/(N − |L(h)|). Then, substituting this into (1.79),we gethi/λi = hj/λj for i 6= j, i, j ∈ K(h) for at least|K(h)| − N + 1 users. Notethat as the channel fading is assumed to be a continuous random variable, this event haszero probability, and at most one user with GWBE sequences (one with highesthi/λi

ratio, as in [29]) may transmit, with probability 1. But thiscontradicts the assumptionthat |K(h)| > N , which establishes our desired result, i.e.,|K(h)| ≤ N almost surely.This result may be viewed as a generalization of [29] to a vector channel with a unit rankconstraint on the covariance matrices of the inputs; [29] showed that in scalar MAC (i.e.,whenN = 1), at most one user may transmit at a channel state with probability 1.

An important implication of this result is that, since the optimal power allocation dictatesthat at mostN users transmit with positive powers at any given channel state, orthogonalsequences should be assigned to those users that are transmitting with positive powers. Thatis, although we allowed for allocating GWBE sequences to someof the users, the solutionimplies that there is at most one such user, and the problem reduces to the orthogonal case.The optimal power allocation is again single user waterfilling, similar to the solution givenin (1.75), i.e.,

p∗i (h) =

1/λi − σ2/hi, i ∈ K(h),

0, otherwise.(1.80)

Here, one needs to be careful about the transmit regions. Unlike the case where the actualnumber of users isK ≤ N , the users in the setK(h) change withh; thus a channeladaptive allocation of the orthogonal sequences is necessary. Our convention is that weassign a sequence from an orthogonal set to a user, wherever its power is positive.

To specify the optimal power allocation completely, let us defineγi = hi/λi. Then, theprobability thatγi = γj , for i 6= j is zero. Therefore, we can always find a unique orderstatisticsγ[i]K

i=1 such thatγ[1] > · · · > γ[K], for each givenh. Let us now placeσ2 inthat ordering, assuming that at least one of theγ[i]s is larger thanσ2. Defineγ[K+1] = 0.Then, for somen ∈ 1, · · · ,K, let

γ[1] ≥ · · · ≥ γ[n] > σ2 ≥ γ[n+1] ≥ · · · ≥ γ[K+1], (1.81)

where the equalities are included for the sake of consistency of the indices, and do not affectthe solution (note the strict inequality just beforeσ2).

Page 26: ADVANCES IN MULTIUSER DETECTION

20 INTERFERENCE AVOIDANCE FOR CDMA SYSTEMS

First, letn ≤ N . Then, we see that (1.80) gives positive powers for alln users, and thusall n users with highestγis will transmit with the non-zero powers given in (1.80). Whenn > N , there are more thanN users satisfying the positivity constraintsγi > σ2. However,we know from our derivation that only the user with the highest γi from the set we intendto assign GWBE sequences may transmit. Therefore, a total ofN users with the highestγis transmit at this channel state.

Finally, we can summarize the jointly optimal power and signature sequence allocationpolicy as

p∗i (h) =

1/λi − σ2/hi, i ∈ Ω,

0, otherwise,(1.82)

s∗i (h)⊤s∗j (h) = 0, i, j ∈ Ω, i 6= j, (1.83)

Ω =

i ≤ min(K,N)|γ[i] > σ2

. (1.84)

1.4.1 Iterative Power and Sequence Optimization in Fading

We found in the previous section that the optimal power control strategy is a waterfillingover some favorable channel states for each user. However, in order to obtain the optimalpower levels one should also compute the Lagrange multipliersλi, from the average powerconstraints. It turns out that the power allocation of each user still depends in a complicatedfashion to those of the other users through theseλi. In this section we provide an iterativemethod to obtain the jointly optimal power and signature sequence allocation, and hencetheλi.

In [27], we have shown that for fixed signature sequencesS, the optimal single-userupdate that maximizes the sum capacity as a function ofpk(h) is given by

pk(h,S) =

(

1

λk− 1

hks⊤k A−1

k sk

)+

, (1.85)

where theinterference covariance matrixAk is defined as

Ak = σ2IN +∑

i6=k

hipi(h)sis⊤i = σ2I + SDS⊤ − hkpk(h)sks

⊤k . (1.86)

We can find and fix the optimal signature sequences at each state for a given powerallocation using results of [79]. Then, plugging these sequences in (1.86), multiplying bothsides by the optimal signature sequences∗k, and noting that the signature sequences thatmaximize the sum capacity for a fixed set of power constraintssatisfy (1.76), we obtain

Aks∗k = (σ2 + µk − hkpk)s∗k, (1.87)

where theµk are given by (1.77). Therefore,

s∗⊤k A−1k s∗k =

1

σ2 + µk − hkpk. (1.88)

This shows that we can represent the base level for the waterfilling in (1.85) as a functionof the power levels in the previous iteration. Substitutingthis in (1.85), we get the optimalpower allocation at then + 1st step,pn+1

k (h) for userk, with optimal sequences and fixed

Page 27: ADVANCES IN MULTIUSER DETECTION

INTERFERENCE AVOIDANCE IN ASYNCHRONOUS SYSTEMS 21

powerspi(h)i6=k from the previous iteration

pn+1k (h) =

(

1

λn+1k

− σ2 + µnk (h) − hkpn

k (h)

hk

)+

, (1.89)

where we usepn+11 (h), · · · , pn+1

k−1(h), pnk (h), · · · , pn

K(h) to computeµnk (h). Combining

this with (1.77) gives us the power update at each step. It is easy to observe that, once theeigenvaluesµn

k (h) are determined using the power levels from the previous iteration, we canuse (1.89) to solve forkth user’s power by waterfilling. Note that, the Lagrange multiplierλn+1

k is chosen to satisfy the average power constraint of userk at each iteration, and canbe obtained by plugging (1.89) into the constraint in (1.74). The waterfilling algorithmautomatically obtains the value ofλn+1

k as it is the inverse of the “water level.”The proposed algorithm may be interpreted in two ways. First, it may be seen as an

iteration from a set of powers to another set of powers as given by (1.89). Therefore, onemay run this algorithm starting with an arbitrary power distribution, to obtain the capacitymaximizing power distribution when the algorithm converges. The signature sequencesmay then be assigned to the users after the algorithm converges: at each channel state, theusers that have non-zero powers (there will be at mostN such users) are assigned signaturesequences from an orthogonal set. Second, the algorithm maybe seen as an iteration frompowers to signature sequences, and then back to powers again. Specifically, for a given setof powers, the optimal sequences may be found using (1.76) and (1.77), i.e., as in [79];corresponding to these sequences, base levels for the waterfilling in (1.85) can be computedusing (1.87) and (1.88), and new powers may be found using (1.85) as in [27].

1.5 INTERFERENCE AVOIDANCE IN ASYNCHRONOUS SYSTEMS

We will formulate the problem of designing optimum signature sequences in asynchronousCDMA systems from two different angles as in the synchronouscase: First, we will find theoptimum signature sequences that maximize the user capacity when we constrain ourselvesto one-shot matched filter receviers. We will observe, somewhat similar in spirit to thesynchronous case, that if we usedM -shot optimum linear filtering, i.e.,M -shot MMSEfilters, with the identified optimum signature signatures, such complicated filters wouldreduce to one-shot matched filters. Therefore, we will conclude that there is no loss inconstraining ourselves to matched filters. This approach, which we present in Section 1.5.1,is based on our work published in [74]. Secondly, we will find the optimum signaturesequences that maximize the information theoretic sum capacity. In this case, the entirereceived signal is observed over the entire time axis and theoptimum receivers are used. Theoptimum signature sequences that maximize the informationtheoretic sum capacity turn outto be the same as those that maximize the user capacity. We present this approach, which isbased on our work published in [36], in Section 1.5.2. The optimum signature sequences inthe asynchronous case minimize a quantity called the total squared asynchronous correlation(TSAC). The existence of the optimum signature sequences that minimize the TSAC forarbitrary user delay profiles and powers has been shown through an explicit constructionalgorithm in [36]. We will not discuss that construction algorithm here, however, wewill present iterative asynchronous interference avoidance algorithms that are based ondecreasing the TSAC at every iteration by the update of a single user’s signature sequence,in Section 1.5.3.

Page 28: ADVANCES IN MULTIUSER DETECTION

22 INTERFERENCE AVOIDANCE FOR CDMA SYSTEMS

1.5.1 Interference Avoidance for User Capacity Maximization

We consider a single-cell symbol-asynchronous (but chip-synchronous) CDMA systemwith K users and processing gainN . The received signal in thenth symbol interval of userk is given as (see Figure 1.6.),

rk(n) =√

pkbk(n)sk +∑

l 6=k

√pl

(

bl(n)T dkl

L sl + bl(n + 1)T dkl

R sl

)

+ nk, (1.90)

wherepk, bk(n) and sk are the received power,nth transmitted symbol and signaturesequence of userk, respectively, andnk is a zero-mean Gaussian random vector withE[nkn

⊤k ] = σ2IN . The signature sequences of all users are of unit energy, i.e., s⊤k sk = 1,

for all k. For usersk andl, dkl represents the relative time delay of userl with respect to thetime delay of userk. That is,dkl = dl − dk, wheredk anddl are the time delays of usersk andl, respectively. SymbolsT d

R andT dL denote the operations of shifting, to right and

left, respectively, of a vector byd andN − d chips (components). For both operators, thevacated positions in the vector are filled with zeros. That is, for a vectorx = [x1, · · · , xN ]⊤

and integerd ≥ 0, we define

T dLx = [xN−d+1, · · · , xN , 0N−d]⊤ and T d

Rx = [0d, x1, · · · , xN−d]⊤, (1.91)

where0d denotesd consecutive zeros.We will use one-shot matched filters as the receivers. The decision statistics for thekth

user in thenth symbol interval isyk(n) = s⊤k rk(n), where we do assume that the matchedfilter receiver of each user is perfectly aligned with the symbol interval of the user. Sinces⊤k sk = 1, the SIR of thekth user is then given by

SIRk =pk

l 6=k Aklpl + σ2, (1.92)

where we define theK × K matrixA with the entries

Akl =

(s⊤k T dkl

L sl)2 + (s⊤k T dkl

R sl)2, k 6= l,

0, k = l.(1.93)

The common SIR targetβ is said to be feasible iff one can find non-negative powerspkKk=1

such that SIRk ≥ β for all k, which can be written in an equivalent matrix form as

p ≥ β(

Ap + σ21)

, (1.94)

where1 is the vector of all ones. It is well-known that if the common SIR targetβ is feasible,then the optimum power vector, i.e., the componentwise smallest feasible power vector, isfound by solving (1.94) with equality [86]. Furthermore, the power control problem isfeasible iff [66]

β <1

ρA, (1.95)

whereρA is the largest (also called the Perron-Frobenius) eigenvalue of the symmetricnon-negative matrixA. We define the matrixR = A + I so thatRkk = (s⊤k sk)2 = 1 andR represents the squared asynchronous cross correlations ofthe signature sequences. ThePerron-Frobenius eigenvalue ofR satisfiesρR = ρA + 1, and the feasibility condition in(1.95) can also be expressed as

β <1

ρR − 1. (1.96)

Page 29: ADVANCES IN MULTIUSER DETECTION

INTERFERENCE AVOIDANCE IN ASYNCHRONOUS SYSTEMS 23

k

l

user

user

RkldT sl

LkldT sl

Figure 1.6. Asynchronous interference calculation.

That is, for a single cell CDMA system, the range of common achievable SIR values isdetermined only by the Perron-Frobenius eigenvalue of the squared asynchronous crosscorrelation matrixR which depends only on the signature sequences of the users and theirrelative time delays. For a given signature sequence setskK

k=1 and a set of time delaysdkK

k=1, the supremum of common achievable SIR targets equals1/(ρR − 1). Our aim isto choose the signature sequences of the users, for any givenset of time delays, such thatthe common achievable SIR is maximized. Therefore, we seek the signature sequence setthat maximizes1/(ρR − 1), or, equivalently, minimizesρR.

We note that it is hard to characterize the dependence ofρR on individual signaturesequences. Instead, our approach is to tie the Perron-Frobenius eigenvalue ofR, ρR, toanother parameter ofR which can be related to the signature sequences in a more direct way.By this approach we will be able to characterize the optimum signature sequences in a closedform expression in addition to being able to devise an iterative and distributed signaturesequence update algorithm that will construct progressively better signature sequence sets.To this end, we start our derivation with the following bounds on the Perron-Frobeniuseigenvalue ofR in terms of its row-sums [66]

mink

K∑

l=1

Rkl ≤ ρR ≤ maxk

K∑

l=1

Rkl. (1.97)

Similar bounds that can be obtained using column-sums ofR are identical to (1.97) sinceRis symmetric. We also have the following bound from a simple application of the Rayleighquotient [69]

1

K

K∑

k=1

K∑

l=1

Rkl ≤ ρR, (1.98)

which is equivalent to(1⊤R1)/(1⊤1) ≤ ρR. Combining (1.97) and (1.98) and the factthat the minimum row-sum lower bounds the average of the row-sums yields

mink

K∑

l=1

Rkl ≤1

K

K∑

k=1

K∑

l=1

Rkl ≤ ρR ≤ maxk

K∑

l=1

Rkl. (1.99)

Page 30: ADVANCES IN MULTIUSER DETECTION

24 INTERFERENCE AVOIDANCE FOR CDMA SYSTEMS

We define the total squared asynchronous correlation (TSAC)as

TSAC =

K∑

k=1

K∑

l=1

Rkl. (1.100)

Note that the TSAC is equal to the sum of the entries of the asynchronous squared correlationmatrixR. Since we want to minimizeρR, and sinceρR is lower bounded by TSAC/K, it isreasonable to try to minimize the TSAC over the space of all possible signature sequences.Although it is not clear thatρR decreases as TSAC decreases, we will show that the signaturesequence sets that achieve a particular lower bound on TSAC are precisely those thatminimizeρR.

Next, our aim is to prove two facts: that TSAC is lower boundedby K2/N , just asin the Welch bound (1.9) for the synchronous case, and secondly, that when the signaturesequences achieve this lower bound, the squared asynchronous correlation (SAC) “seen”by each users is the same (the uniformly good property). These are Theorems 3 and 4 in[74]; however, we will present here a much simpler development for their proofs.

In the sequel, we will concentrate on a time duration which isequal to one symbol interval,i.e.,N chip intervals. However, this symbol interval is not assumed to be time aligned toany particular user’s symbol period. This symbol interval is depicted in Figure 1.7., whereeach box represents a chip interval. For each user, the whiteand gray chips in Figure 1.7.correspond to symbols with time stampsn andn + 1 of that user. In particular, for userk,the white chips on the left represent the lastdk chips in the signaturesk used to transmitsymboln, and the gray chips on the right are the firstN − dk chips ofsk used to transmitsymboln+1. We will call the gray chips preceeded bydk zeros the “left signatures” of theusers and the white chips followed byN − dk + 1 zeros the “right signatures”. We denotethe left signature of userk by sL

k and the right signature of userk by sRk . We define two

N × K matrices,SL andSR that contain all the left signatures and the right signatures,respectively.

With this new representation, we can obtain a more concise expression for the squaredasynchronous cross correlation termsAkl in (1.93). As in (1.93), the interference a pair ofusers create to each other has two components: these two components can be expressed ascorrelations of two vectors restricted to two sets of chip indices. For usersk andl, let Lkl

denote the set of chip indices for which usersk andl transmit symbols with different timestamps. In terms of Figure 1.7.,Lkl is the set of columns (chip indices) for which rows(users)k andl have different colors (e.g., white and gray). With this new representation,Rkl = Akl + 1 can be expressed as

Rkl =([

S⊤LSL

]

kl+[

S⊤RSR

]

kl

)2+([

S⊤LSR

]

kl+[

S⊤RSL

]

kl

)2. (1.101)

Page 31: ADVANCES IN MULTIUSER DETECTION

INTERFERENCE AVOIDANCE IN ASYNCHRONOUS SYSTEMS 25

user l

user m

L kl L

L km

lm

user k

Figure 1.7. Asynchronous system representation.

Therefore, using (1.100) and (1.101), the TSAC can be expressed in terms ofSL andSR as

TSAC = tr[

SLS⊤LSLS⊤

L

]

+ 2tr[

SLS⊤RSRS⊤

L

]

+ tr[

SRS⊤RSRS⊤

R

]

+ 2tr[

SLS⊤LSRS⊤

R

]

(1.102)

≥ tr[

SLS⊤LSLS⊤

L

]

+ 2tr[

SLS⊤LSRS⊤

R

]

+ tr[

SRS⊤RSRS⊤

R

]

(1.103)

= tr[

(

SLS⊤L + SRS⊤

R

) (

SLS⊤L + SRS⊤

R

)⊤]

(1.104)

≥ 1

N

(

tr[

SLS⊤L + SRS⊤

R

])2(1.105)

=1

N

(

tr[

(SL + SR) (SL + SR)⊤])2

(1.106)

=K2

N, (1.107)

where, in getting (1.102), we used the fact thatS⊤LSR is strictly lower triangular andS⊤

RSL isstrictly upper triangular; (1.103) follows because we ignored non-negative term2tr

[

UU⊤]

whereU = SLS⊤R; (1.105) follows because tr

[

VV⊤]

≥ 1N (tr [V])

2 for positive semi-

definite, square, symmetricV, which is true because∑N

i=1 λ2i ≥ 1

N

(

∑Ni=1 λi

)2

, for

non-negativeλi, i = 1, . . . , N ; and (1.106) follows because tr[

S⊤LSR

]

= 0 since, bydefinition,

[

S⊤LSR

]

ii= 0 for all i, as the left and right signatures, for each user, do not

overlap; and finally, (1.107) follows becauseSL +SR has columns whose norms are equalto 1, since, these columns correspond to the rotated (in time) versions of the signaturesequences, which are all unit-norm.

Therefore, we have proved that

TSAC =

K∑

k=1

K∑

l=1

Rkl ≥K2

N. (1.108)

We first note that the lower bound on the TSAC is exactly the same as the lower bound on theTSC. Secondly, we observe that in order for the lower bound onthe TSAC to be achieved,

Page 32: ADVANCES IN MULTIUSER DETECTION

26 INTERFERENCE AVOIDANCE FOR CDMA SYSTEMS

we need both inequalities in (1.103) and (1.105) to be satisfied with equality. This happenswhenU is equal to zero, andV is a multiple of identity matrix, i.e., allλi are equal. Thatis, the lower bound on the TSAC is achieved iff

SLS⊤R = 0, (1.109)

SLS⊤L + SRS⊤

R =K

N.IN (1.110)

These are exactly the same conditions as in Theorem 3 in [74].Finally, we note that if thesignature sequences are such that the lower bound on the TSACis achieved, then

K∑

l=1

Rkl =K

N, k = 1, · · · ,K. (1.111)

This is the asynchronous version of the “uniformly good property” that was proved for thesynronous case [38]. This property means that if the signature sequences achieve the lowerbound on the TSAC, then all users “see” the same amount of interference from each other.

We recall that our aim is to minimizeρR in order to maximize the achievable SIR,β.Note that (1.108) combined with (1.99) says that

ρR ≥ K

N. (1.112)

Since our aim is to minimizeρR, we note that we cannot do better than to choose signaturesequences that achieve (1.112) with equality. Meanwhile, (1.111) says that when the sig-nature sequences can be chosen such that the TSAC lower boundis achieved with equality,then all of the row-sums equalK/N . By (1.99), the row-sums sandwichρR, and so (1.112)is satisfied with equality, yielding the lowest possibleρR: ρR = K/N . Therefore, using(1.96), the bound on the common achievable SIR target in thisasynchronous case is

β <1

K/N − 1, (1.113)

which is the same as the bound in the synchronous case, which can also be written in termsof an upper bound on the number of users that can be supported at SIR levelβ as [81]

K

N< 1 +

1

β. (1.114)

In conclusion, we observe that the optimum signature sequences minimize the TSAC,and therefore, satisfy the conditions in (1.109) and (1.110). In addition, we observe that theuser capacity of the asynchronous system is the same as the user capacity of the synchronoussystem, that is, there is no loss in capacity due to asynchrony when the signature sequencesare chosen optimally.

1.5.2 Interference Avoidance for Sum Capacity Maximization

Consider the firstM symbol durations. The chip matched filter output of the receiver canbe denoted by anMN × 1 real-valued column vectory that satisfies the system model

y =

K∑

k=1

Skxk + n. (1.115)

Page 33: ADVANCES IN MULTIUSER DETECTION

INTERFERENCE AVOIDANCE IN ASYNCHRONOUS SYSTEMS 27

Herey =[

y(1)⊤,y(2)⊤, . . . ,y(M)⊤]⊤

, wherey(m) is the chip-matched filter outputvector of themth symbol duration;xk = [ xk(1) xk(2) . . . xk(M) ]⊤ is the sourcesymbol vector of userk; n is the Gaussian noise with zero mean and covariance matrixE[nn⊤] = σ2IMN ; andSk is the signature matrix of userk, which is given by

Sk =

sLk 0

. . . 0

sRk sL

k 0.. .

0.. .

. . . 0

. . . 0 sRk sL

k

. (1.116)

The average power of the normalized source signal of thekth user is restricted to

tr(

E[

xkx⊤k

])

≤ MPk, (1.117)

wherePk is the average power per symbol of userk. GivenJ as an arbitrary group of users,the mutual informationI(xk∈J ;y|xk 6∈J) is given by [76]

I(xk∈J ;y|xk 6∈J) ≤ 1

2log det

(

IMN +∑

k∈J

SkE[xkx⊤k ]S⊤

k

σ2

)

, (1.118)

with equality if the signals of usersk ∈ J are Gaussian.Assume that the user delay profile is known to both the transmitters and the receiver.

The capacity region of the system is given by the convex closure, over independent randomvectorsxk satisfying (1.117), of the union of the following heptagons.

limM→∞

J⊂1,2,...,K

(R1, . . . , RK) : 0 ≤∑

k∈J

Rk ≤ 1

MI(xk∈J ;y|xk 6∈J)

. (1.119)

Suppose that the signature sequences are given. In the situation when user signals aresymbol synchronous, it is shown in [77] that the rate constraints are maximized if thesource signals have white power spectra, i.e.,E[xkx⊤

k ] = PkIM , for all k. However,in the symbol asynchronous case, in general, there is no unique power spectrum that canmaximize the rate upper bounds in (1.119) simultaneously [77].

Combining (1.118) and (1.119), the sum capacity per symbol of the system satisfies

Cs ≤ limM→∞

maxtr(E[xkx⊤

k ])≤MPk

1

2Mlog det

(

IMN +

K∑

k=1

SkE[xkx⊤k ]S⊤

k

σ2

)

, (1.120)

where equality holds when the input signals are stationary Gaussian.Define the block circulant signature matrix of userk by

Sk =

sLk 0

. .. 0 sRk

sRk sL

k 0. . . 0

0. ..

. ... . .

.. .. . .

. ... ..

. . . 0

0. .. 0 sR

k sLk

. (1.121)

Page 34: ADVANCES IN MULTIUSER DETECTION

28 INTERFERENCE AVOIDANCE FOR CDMA SYSTEMS

Then for any set of usersJ , the two matrices

k∈J

SkE[xkx⊤k ]S

k and∑

k∈J

SkE[xkx⊤k ]S⊤

k

are asymptotically equivalent [16,36]. Consequently, we can replace the signature matriceswith their circulant versions, and rewrite the sum capacityin (1.120) as

Cs ≤ limM→∞

maxtr(E[xkx⊤

k ])≤MPk

1

2Mlog det

(

IMN +

K∑

k=1

SkE[xkx⊤k ]S

k

σ2

)

. (1.122)

Note that all circulant matrices of the same dimension have the identical eigenvector set.Define theM × 1 vectorqm and theM × M Fourier transform matrixQM as

qm =[

1 ej2π(m−1)

M . . . ej2π(m−1)(M−1)

M

]H

, (1.123)

QM =1√M

[ q1 q2 . . . qM ], (1.124)

where the superscriptH denotes the conjugate transpose. Denote themth component ofvectorqn byqnm. According to [16] and [83], we can decompose the block circulant matrixSk as

Sk =

q11IN. .. qM1IN

.. .. ..

. . .

q1MIN. .. qMMIN

Φ∗kQH

M , (1.125)

where the superscript∗ denotes the conjugate operation;Φk is a block diagonal matrix,defined as

Φk =

φk1 0. . . 0

0 φk2

. . .. . .

. ... . .

. . .. . .

0. . . 0 φkM

, (1.126)

andφkm in equation (1.126) is anN × 1 column vector given by

φkm = sLk + sR

k e−j2π(m−1)

M . (1.127)

Substituting (1.125) into (1.122), we obtain

IMN +K∑

k=1

SkE[xkx⊤k ]S

k

σ2

=

IMN +K∑

k=1

Φ∗kQH

ME[xkx⊤k ]QMΦ⊤

k

σ2

≤∣

IMN +K∑

k=1

Φ∗kP kΦ

⊤k

σ2

, (1.128)

whereP k is anM × M diagonal matrix, whose diagonal entries are equal to those ofQH

ME[xkx⊤k ]QM . The last inequality in (1.128) is due to the generalized Hadamard

Page 35: ADVANCES IN MULTIUSER DETECTION

INTERFERENCE AVOIDANCE IN ASYNCHRONOUS SYSTEMS 29

inequality [4,77], which indicates that the determinant ofa positive-definite matrix is upper-bounded by the product of the determinants of its diagonal blocks.

Denote themth diagonal entry ofP k bypkm. Since equation (1.128) holds with equalitywhenQH

ME[xkx⊤k ]QM is diagonal, substituting (1.128) into (1.122), we obtain

Cs ≤ limM→∞

maxP

M

m=1 pkm≤MPk

1

2M

M∑

m=1

log det

(

IN +K∑

k=1

φ∗kmpkmφ⊤

km

σ2

)

. (1.129)

When the signature sequences of the users are given, the sum capacity can be found bysolving (1.129) with an iterative water filling algorithm [77], whose convergence is studiedin [87]. It can be seen that, given an arbitrary signature setand user delay profile, the sumcapacity is usuallynotachieved by input signals with white spectra (i.e.,P k = PkIM ).

Without loss of generality and to simplify the presentation, let us assume from thispoint on, in this section that the user powers are all equal,Pk = P . The case of arbitraryuser powers was treated in [36] with appropriate definition of oversized users, etc., as in thesynchronous case [81]. SinceSk is replaced bySk, ∀k, we can view theK-userM -symbolasynchronous system as anMK-user symbol synchronous system. Therefore, we can seethat an upper bound on the sum capacity is [81]

Cs ≤ N

2log

(

1 +KP

Nσ2

)

. (1.130)

Now, using the definition in (1.126) and choosingpkm = P , which satisfies the powerconstraint, we can develop an equivalent representation for the term inside thelog detexpression in (1.129),

K∑

k=1

φ∗kmpkmφ⊤

km = P

K∑

k=1

(

sLk + sR

k ej2π(m−1)

M

)(

sLk + sR

k e−j2π(m−1)

M

)⊤

= P(

SLS⊤L + SRS⊤

R

)

+ Pe−j2π(m−1)

M SLS⊤R

+ Pej2π(m−1)

M SRS⊤L . (1.131)

Now, we can see that the conditions in (1.109)-(1.110) are necessary and sufficient in orderto achieve the upper bound in (1.130) on the sum capacity.

In conclusion, we observe that the optimum signature sequences that maximize theinformation theoretic sum capacity are the same as those that maximize the user capacity(as in the synchronous case), and therefore, that there is noloss in capacity due to asynchronywhen the signature sequences are chosen optimally.

1.5.3 TSAC Reduction: Iterative Algorithms

Following the closed-form expressions for the signature sequence sets maximizing theinformation theoretic sum capacity [64, 79] and user capacity [81], references [72, 73]introduced the iterative adaptation of signature sequences for synchronous CDMA systems.Since the optimum signature sequences minimize the TSC in the synchronous case, thealgorithms in [63, 72, 73] were designed to decrease (more precisely, not to increase) theTSC at each iterative step. Here, we will design algorithms which decrease the TSAC ateach iteration. To this end, we first separate the terms that depend on the signature sequence

Page 36: ADVANCES IN MULTIUSER DETECTION

30 INTERFERENCE AVOIDANCE FOR CDMA SYSTEMS

of thekth user in the TSAC. From the TSAC definition (1.100), the definition of R = A+I,and the fact thatA in (1.93) is symmetric, we can write

TSAC = (s⊤k sk)2 + 2s⊤k Bksk + γk, (1.132)

whereγk =∑

i6=k

j 6=k Rij denotes the squared asynchronous correlation terms that do

not depend onsk and where in terms ofskl = T dkl

L sl andskl = T dkl

R sl, the left and rightsignatures of thelth asynchronous user with respect to thekth user,

Bk =∑

l 6=k

(

skls⊤kl + skls

⊤kl

)

. (1.133)

In order to minimize the TSAC, we are looking for updates of the signature sequence ofthekth user fromsk to someck that is guaranteed to decrease (not to increase) the TSAC.Let us denote the TSAC after thesk → ck update asTSAC. Then,

TSAC = (c⊤k ck)2 + 2c⊤k Bkck + γk. (1.134)

Restricting the new (updated) signature sequence of thekth user to be of unit energy aswell, i.e.,c⊤k ck = 1, we note thatTSAC≤ TSAC iff

c⊤k Bkck ≤ s⊤k Bksk. (1.135)

Although there are many possiblesk → ck updates that would guarantee that (1.135) holds,we will propose two of them here. The two similar updates usedin the synchronous CDMAcontext were given in [72,73] and in [63]. We call the first update theasynchronous MMSEupdatewhich we define as

ck =

(

Bk + a2IN

)−1sk

[

s⊤k (Bk + a2IN )−2

sk

]1/2(1.136)

and we call the second update theasynchronous eigen-updatewhich we define as thenormalized eigenvector ofBk corresponding to its smallest eigenvalue. Note that, in theasynchronous MMSE update, the new signature sequence of user k, ck, is the normalizedone-shot MMSE receiver filter for that user when the signature sequences of all other usersare fixed. Similar to the synchronous MMSE update [72, 73], the new signature sequencecan be obtained using an adaptive [1, 37, 39, 59] or a blind [20] implementation of theone-shot MMSE filter.

One can also devise algorithms as in [75], where both the signature sequences and thereceiver filters are updated in an on-line fashion. The proofthat the asynchronous eigenupdate decreases the TSAC follows from the Rayleigh quotient applied to the matrixBk

[69]. The proof that the asynchronous MMSE update decreasesthe TSAC can be carriedout in a very similar fashion to the proof that the MMSE updatedecreases the TSC [72,73].

1.6 FEEDBACK REQUIREMENTS FOR INTERFERENCE AVOIDANCE

In distributed implementations of interference avoidancemethods, user codewords andcorresponding receiver filters are adapted iteratively using feedback information receivedfrom the base station in order to improve performance. As a consequence, for practical

Page 37: ADVANCES IN MULTIUSER DETECTION

FEEDBACK REQUIREMENTS FOR INTERFERENCE AVOIDANCE 31

implementation one must consider the feedback channel between the base station receiver,which has the information required for codeword adaptation, and the transmitter whichuses this information to perform the actual codeword adaptation. Ideally, with unlimitedfeedback capacity, the transmitter and receiver have access to the same information, but inpractice only limited feedback is available [31,40,65].

In particular, compact representation of codewords is extremely important for systemswhich employ interference avoidance since as opposed to current CDMA systems whereuniform-amplitude codeword chips are used, interference avoidance employs real-valued“chips” – real-valued coefficients for a set of orthonormal basis functions of the signal spaceused by the transmitter and receiver.

In numerical studies [44] it was found that optimal codewordensembles can be repre-sented using approximately 4 bits per dimension per codeword on average. Thus, describinga codeword with 128 real-valued ’chips’ would require 512 bits. If codewords are computedat the receiver and fed back, this seems a reasonably large feedback burden considering thata single codeword probably conveys relatively few bits. Of course, this still may be ac-ceptable if codewords need not be changed very frequently orthe downlink channel fromreceiver to transmitter is very large relative to the uplinkmultiple access channel.

Nonetheless, developing parsimonious codeword representations or ways of deliveringthe minimum information necessary for codeword construction at the transmitter is animportant part of producing practical interference avoidance methods. In what follows wedescribe two approaches, both empirical and therefore not completely satisfying, but bothseeming to offer significant reductions in the amount of codeword feedback necessary.

1.6.1 Codeword Tracking for Interference Avoidance

Early work [44] implicitly assumes that codewords are in effect made from whole cloth,and then fed back to the transmitter. That is, codewords are derived anew during eachiteration of the algorithm and are completely unrelated to previous codewords. In a slowlyvarying environment, however, theentropy rateassociated with each codeword may bemuch less than the implicit entropy of, say, 512 bits per update postulated above for a 128-chip codeword. The direct approach of quantifying codewordupdate entropy rates seemsdifficult. In addition, the aggregate codeword feedback rate must necessarily scale linearlywith the number of codewords which must be fed back. This can be particularly onerousfor overloaded (more users than signal dimensions) systems.

More recent work on CDMA codeword adaptation with feedback [65] considers feedbacklimited toB bits in the context of a large system limit where the number ofusersK, signaldimensionsN , and feedback bitsB tend to infinity with fixed ratios of the system loadK/Nand feedback bits per codeword elementB/N , and studies the performance of randomvector quantization scheme in which codebook entries are independent and isotropicallydistributed.

One alternative to codeword feedback is interference covariance feedback. This is grosslyinefficient when the signal space dimension is large and the number of users small. That is,the number of entries in the covariance matrix goes as the number of signal dimensionsNsquared, so if onlyK ≪ N codewords need be fed back, it may be simpler to simply feedback the codewords themselves. However, as the number of users approaches and exceedsthe number of signal space dimensions, covariance matrix feedback becomes much moreattractive.

Furthermore, covariance feedback offers a simple means to quantify the necessaryamount of feedback information. Specifically, the codewordupdates themselves are de-

Page 38: ADVANCES IN MULTIUSER DETECTION

32 INTERFERENCE AVOIDANCE FOR CDMA SYSTEMS

pendent on interference covariance matrix feedback. Thus,we can via the informationprocessing theorem [11] obtain a bound on the necessary feedback level relatively simply.

In [67] a noisy covariance feedback channel was considered and its capacity calculated.Thus, the rate at which update information could be delivered to the transmitter was limited.By adjusting the noise level on the feedback channel and noting its effect on performance, theupper bound on the amount of information necessary to produce nearly optimal transmittedcodewords was found to be on the order of 1 bit per dimension. This is a significant reductionfrom 4 bits per dimension codeword quantization results.

More careful analytic treatment of covariance feedback performance should be the sub-ject of future work.

1.6.2 Reduced-Rank Signatures

Another approach to reducing the amount of codeword feedback information is to in effectdirectly quantize the codeword space in a sort of principal component approach wherethe codeword dimensions along which the most improvement will be had are identifiedand fed back. That is, one might identify small set of codeword subspacesand feed backinformation only about these principal directions.

Paraphrasing from [56, 58], one might constrain theN × 1 signature to lie in aD-dimensional subspaceSD, whereD < N . That is, the signature for userk is

sk = Fkck, (1.137)

whereFk isN×D and the columns spanSD, andck is theD×1 vector of combining coef-ficients. Each matrixFk is chosen differently for each user, so that the associated signatureslie in different subspaces. Optimizingsk with respect to equation (1.137) is termedreduced-rank signature optimization. This is analogous to reduced-rank, or subspace, techniques,which have been considered for receiver optimization [14,15,21–23,84].

The combining coefficientsck are estimated at the receiver, individually quantized, andtransmitted back to the transmitter. The parameterD has an intuitively pleasing interpre-tation: D = 1 corresponds to conventional power control, andD = N corresponds tofull signature adaptation. AsD increases, the degrees of freedom for avoiding interferenceincrease; however, there are more coefficients to quantize.In the presence of fixed inter-ference the optimized reduced-rank signature is the projection of the full-rank optimizedsignature onto the subspace spanned by the columns ofFk [58].

In the absence ofa priori information about where the signatures for the interfererslie in ℜN , we can select the columns ofFk to be isotropic. Another possibility, whichsimplifies the computation of the optimized signatures, is to choose the first column ofFk as a signature with i.i.d. elements, and generate the remaining columns with differentorthogonal masks so thatF⊤

k Fk = I. (For example, the columns might be nonoverlappingsegments of a randomly chosen signature [58].)

The performance of the optimized signature (i.e., with unlimited feedback bits) canbe estimated by a large system analysis in which(D,K,N) → ∞ with fixed D/N andK/N [58]. (A large system analysis of reduced-rank receivers with random signatures ispresented in [23].) Results presented in [65] indicate thatthere is a criticalD < N , whichoffers a significant improvement in performance relative totakingD = N . Reduced-ranksignature adaptation can also be applied to multi-code CDMA. In that case, power and ratecan be allocated among the optimized reduced-rank signatures for a particular user [57].

Page 39: ADVANCES IN MULTIUSER DETECTION

RECENT RESULTS ON INTERFERENCE AVOIDANCE 33

1.7 RECENT RESULTS ON INTERFERENCE AVOIDANCE

1.7.1 Interference Avoidance and Power Control

The uplink CDMA system considered in Section 1.2 assumed that all users have equalreceived power at the base station, and in this case interference avoidance algorithms yielda WBE codeword ensemble which implies uniform SINR for all users [63, 73, 79]. Thealgorithms extend in a straightforward manner to a system inwhich users are received withdifferent powers at the base station. In this case the received signal at the base station isgiven by

r =K∑

ℓ=1

bℓ√

pℓsℓ + n = SP1/2b + n (1.138)

with P = diag(p1, p2, . . . , pK) containing received powers for all users.When matched filters are used at the receiver for all users, theSINR for a given userk

becomes

γk =(√

pks⊤k sk)2

K∑

ℓ=1,ℓ 6=k

(s⊤k sℓ√

pℓ)2 + E[(s⊤k n)2]

=pk

s⊤k Rksk, (1.139)

with the correlation matrix of the interference-plus-noise seen by userk being expressed inthis case as

Rk =

K∑

ℓ=1,ℓ 6=k

pℓsℓs⊤ℓ + W = R − pksks

⊤k . (1.140)

where

R = SPS⊤ + W (1.141)

is the correlation matrix of the received signalr in equation (1.138).In order to maximize userk’s SINR through codeword adaptation one may still replace

the current codeword of userk with the minimum eigenvector ofRk. Thus, when userpowers are assumed fixed, greedy interference avoidance andthe eigen-algorithm in Sec-tion 1.2.1 apply with no changes, and in that case the algorithm yields an ensemble ofGWBE codewords with eventual oversized users [63, 80, 81]. Oversized users have largepowers relative to the other users in the system and get exclusive use of signal dimensionswith minimum noise energy. We note that users achieve maximum possible SINRs corre-sponding to their powers and cross-correlations of GWBE codewords. We also note thatby allowing users to change their power in addition to their codeword we provide an extradegree of freedom and allow more flexibility to users in achieving SINRs that match moreclosely their quality of service requirements.

In this section we present an algorithm that combines codeword adaptation throughgreedy interference avoidance with a power control mechanism in a two-stage codewordand power update. In the first stage the algorithm decreases the effective interference seenby a given userk through greedy interference avoidance, by replacing its current codewordwith the minimum eigenvector ofRk. If, after the first stage, the SINR of the given user isbelow a specified target SINR, then in the second stage the given user increases its powerattempting to meet the specified target. The new user power isthe minimum between thevalue that matches the specified target SINR and the maximum allowed user powerpmax

k .

Page 40: ADVANCES IN MULTIUSER DETECTION

34 INTERFERENCE AVOIDANCE FOR CDMA SYSTEMS

1. Start with a random set of user codewords and powers

specified by matrices S and P respectively.

2. Specify a set of desired target SINRs γ∗1 , . . . , γ∗Ksatisfying the condition in equation (1.142)

3. For each user k = 1, . . . , K,

(a) Compute Rk using equation (1.140) and determine

the minimum eigenvalue λk and eigenvector xk

(b) Minimize the effective interference for user k by

replacing its current codeword sk with the minimum

eigenvector xk of Rk

(c) If user k’s SINR after codeword replacement is

below the specified target γ∗k, increase user k

power to meet the target SINR:

pk = minpmaxk , γ

kλk.

Otherwise, leave pk unchanged.

4. Repeat step 3 until a fixed point is reached.

Figure 1.8. The Eigen-Algorithm with Power Control

We note that the target SINRsγ∗1 , . . . , γ∗

k , . . . , γ∗Kmust satisfy the admissibility condition

K∑

k=1

γ∗k

1 + γ∗k

< N (1.142)

in order for a valid codeword and power allocation to exist [80,81]. We present the algorithmformally in Figure 1.8. Convergence of the eigen-algorithmwith power control to a fixedpoint is defined with respect to sum capacityCs, which is given by the expression inequation (1.7) but withR in equation (1.141), and which is upper bounded by the sumcapacity of theK-user Gaussian multiple access channel with the corresponding powerconstraints on total user power and noise [64,79]. Following the same line of reasoning asin equations (1.17) – (1.19) in Section 1.2, we obtain thatCs is monotonically increasedby the eigen-algorithm with power control, and because it isupper bounded the algorithmwill always reach a fixed point. Among all fixed points of the eigen-algorithm with powercontrol, an optimal fixed point corresponds to a GWBE codewordensemble with eventualoversized users [80,81].

We note that although an analytical convergence proof of theeigen-algorithm with powercontrol to optimal GWBE codeword ensembles is not available,extensive simulations haveshown that this is reached when the algorithm is initializedwith random user codewords[46], provided that the specified target SINRs are admissible as defined by equation (1.142).This is consistent with empirical observations made on the eigen-algorithm which show thatwith random codeword initialization this always convergesto a GWBE codeword ensemble[61,63].

Page 41: ADVANCES IN MULTIUSER DETECTION

RECENT RESULTS ON INTERFERENCE AVOIDANCE 35

1.7.2 Adaptive Interference Avoidance Algorithms

Interference avoidance algorithms presented so far are static in the number of users and donot allow variable target SINRs. Each time these change the algorithms must be reiteratedin order to determine a new optimal solution for the new number of users and/or targetSINRs. Other algorithms for codeword adaptation for uplinkCDMA systems [17, 25, 26,70, 71, 79–81] have the same characteristic, and are not adaptable to changing numbersof active users/target SINRs in the system. In order to overcome this limitation, recentresearch [19] proposes using Grassmannian signatures in dynamic systems with variablenumber of users. These are designed to support a maximum number of active users in thesystem subject to a given interference level, and have the nice property that interferenceamong users does not change when less users are active in the system. As noted in [19]the disadvantage associated with equiangular Grassmannian signatures is that they may notexist for any desired system configuration specified by a given number of users and signalspace dimensions.

Recently, an alternative approach to dealing with variablenumber of active users and/ortarget SINRs in the uplink of a CDMA system has been proposed.This uses an adap-tive algorithm with incremental updates similar to the onesproposed for joint incrementalcodeword and power adaptation based on interference avoidance [32, 33]. The algorithmmoves the system incrementally from an optimal configuration with a given number ofactive users and/or target SINRs, to a new optimal configuration with a different numberof active users/target SINRs [34]. The transition between the two optimal configurationsis based on an adaptive interference avoidance procedure: when a change in the systemstatus occurs this translates to a change of the SINR of active users, which will employ agreedy gradient-based technique to optimize their corresponding spectral efficiency subjectto constraints on the SINR. The spectral efficiency functionused in deriving the adaptiveinterference avoidance algorithm is expressed in terms of the user SINR as

ηk = ln(1 + γk) [nats/s/Hz], k = 1, . . . ,K. (1.143)

This expression corresponds to the spectral efficiency of a single-user bandlimited AWGNchannel [82], and is a reasonable optimization criterion for individual users in the systemwho have access only to their corresponding SINR, with no knowledge of the other userSINRs. When replacing the expression ofγk from equation (1.139) we write userk’sspectral efficiency as a function of its codeword and power

ηk = ln

(

1 +pk

s⊤k Rksk

)

[nats/s/Hz], k = 1, . . . ,K. (1.144)

In the adaptive interference avoidance algorithm each userk will perform joint codewordand power adaptation to maximize its corresponding spectral efficiency subject to targetSINR constraintγk = γ∗

k and to unit norm constraint on codewordss⊤k sk = 1. Thus, theequations of the codeword and power updates for the adaptivealgorithm are obtained fromsolving the constrained optimization problem

maxsk,pk

ηk subject to

pk

s⊤k Rksk= γ∗

k

s⊤k sk = 1

(1.145)

Page 42: ADVANCES IN MULTIUSER DETECTION

36 INTERFERENCE AVOIDANCE FOR CDMA SYSTEMS

We define the Lagrange multipliersλk andξk associated with userk constraints in (1.145)such that the userk Lagrangian function is

Lk(sk, pk, λk, ξk)

= ηk(sk, pk) + λk(γk − γ∗k) + ξk(s⊤k sk − 1) (1.146)

= ln

[

1 +pk

s⊤k Rksk

]

+ λk

[

pk

s⊤k Rksk− γ∗

k

]

+ ξk(s⊤k sk − 1). (1.147)

The necessary conditions for maximizing the Lagrangian in equation (1.147) are obtainedby taking its partial derivatives with respect to the corresponding variables. Equating thepartial derivative of the Lagrangian with respect to the codewordsk to zero, we obtain aneigenvalue/eigenvector equation corresponding to matrixRk. That is,

∂Lk

∂sk= 0 =⇒ Rksk = νksk, (1.148)

whereνk is expressed in terms of the Lagrange multipliers, as well asuser powerpk andcodewordsk. We note that the exact expression ofνk is not relevant, and that for anyeigenvector ofRk we have that∂Lk/∂sk = 0 which satisfies the necessary conditionin equation (1.148). A good choice for userk’s codeword that satisfies the necessarycondition in equation (1.148) is the minimum eigenvectorxk of Rk: for given powerpk this maximizes userk’s SINR and implicitly its spectral efficiency, by minimizing theeffective interference that corrupts userk’s signal at the receiver. This choice defines thegreedy interference avoidance procedure, and may generatea sudden change in the user’scodeword as the minimum eigenvector may be far away in signalspace from the currentcodeword employed by the user for transmission. If the receiver does not get immediatefeedback on the new codeword, tracking sudden changes may generate errors at the receiversince it is not realistic to assume that the corresponding matched filter receiver changesinstantaneously to the new user codeword.

A more desirable approach for an adaptive algorithm is to change the user codeword insmall increments as suggested in Section 1.2.3, with a corresponding incremental changeof the receiver filter. This way the receiver is capable of following codeword changes, andcan continue to detect transmitted symbols correctly. We will therefore use an incrementalupdate that adapts the codeword in the direction of the minimum eigenvectorxk defined by

sk(i + 1) =sk(i) + mβxk(i)

‖sk(i) + mβxk(i)‖ , (1.149)

wherem = sgn(s⊤k xk), andβ is a parameter that limits how far in terms of Euclidiandistance the updated codeword can be from the old codeword. This is an incrementalinterference avoidance codeword update, which for given power pk implies an increase inuserk’s SINR [68], and implicitly in its spectral efficiency. We note that since the updatein equation (1.149) always generates new codewords that have unit norm, the value of theLagrange multiplierξ is irrelevant, and does not need to be obtained from the associatednecessary condition for maximum∂Lk/∂ξk = 0.

User power will be adapted incrementally as well, to avoid sudden changes in the system.Since the Lagrangian is a concave function of user power, incremental adaptation in thedirection of the corresponding gradient provides maximum increase in the spectral efficiencyand implies the power update equation

pk(i + 1) = pk(i) + µp∂Lk

∂pk

sk=sk(i+1)

(1.150)

Page 43: ADVANCES IN MULTIUSER DETECTION

SUMMARY AND CONCLUSIONS 37

where0 < µp < 1, and∂Lk/∂pk, after the user codeword has been updated as specifiedby equation (1.149), is

∂Lk

∂pk

sk=sk(i+1)

=1

sk(i + 1)⊤Rk(i)sk(i + 1) + pk(i)

+λk(i)

sk(i + 1)⊤Rk(i)sk(i + 1). (1.151)

The Lagrange multiplierλk(i) is adapted incrementally as well. Given the constantµλ > 0,

λk(i) = −µλ∂Lk

∂λk

sk=sk(i+1)

(1.152)

= −µλ

[

pk(i)

sk(i + 1)⊤Rk(i)sk(i + 1)− γ∗

k

]

. (1.153)

We note that the LagrangianLk is a linear function ofλk with slope determined by∂Lk/∂λk,and is increased by movingλk in the corresponding direction indicated by the slope. Thisimplies that the update in equation (1.153) is essentially asteepest ascent gradient up-date. We also note that this term acts as an extra correction factor in the power updateequation (1.150), having more or less influence depending onhow close the SINR

γk(i) =pk(i)

sk(i + 1)⊤Rk(i)sk(i + 1)(1.154)

after codeword adaptation is to the target SINRγ∗k .

The adaptive interference avoidance algorithm consists oftwo distinct stages performedsequentially by active users in the system: one in which users adapt incrementally thecodeword, followed by incremental adaptation of their power. The algorithm is distributed,and may be run independently by active users to adapt to changes in the system configurationas reflected by changes of their SINRs and corresponding spectral efficiencies. We note thata change in the system configuration may occur as a result of various events like for exampleadmitting new active users into the system, dropping idle/inactive users, or changing thetarget SINRs of active users. The algorithm is formally given in Figure 1.9.

Convergence of this algorithm was investigated using a game-theoretic framework in[35]. In addition, extensive simulations have shown that the algorithm reaches a GWBEensemble of codewords and powers for users [80,81], for which the sum of allocated powersamong all valid power allocations for the given target SINRsis minimum. This optimalconfiguration is reached within a specified tolerance, provided that the target SINRs ofactive users satisfy the admissibility condition in equation (1.142). The tolerance and speedof convergence of the algorithm can be adjusted through parametersµλ, µp, β, andǫ as isthe case in general with gradient-based algorithms.

1.8 SUMMARY AND CONCLUSIONS

In the previous sections we have explored the concept of iterative interference avoidance forwireless systems. An emphasis was placed on unlicensed systems, but the basic conceptsapply to any communications medium where efficient multipleaccess is an issue. Thedriving force behind (and surprise of) interference avoidance is personal greed by individualusers – rather than leading to system collapse, greediness leads to optimally efficient use

Page 44: ADVANCES IN MULTIUSER DETECTION

38 INTERFERENCE AVOIDANCE FOR CDMA SYSTEMS

Initial Data:

• Codeword matrix S, power matrix P, target SINRs

γ∗1 , . . . , γ∗K.

• Noise covariance matrix W

• Constants µp, µλ, β, and tolerance ǫ.

Triggering Events:

• The SINR of an active user differs from the target

SINR.

• New users are admitted: their codewords, powers, and

target SINRs are added to the system by augmenting the

corresponding matrices and increasing K.

• Inactive users are dropped: their codewords, powers,

and target SINRs are removed from the system, and K is

decreased.

Admissibility check:

• IF the admissibility condition (1.142) is satisfied,

GO TO Adaptation Stage; ELSE STOP: the system became

infeasible.

Adaptation Stage:

1. IF change in spectral efficiency is bigger than ǫ

for any user GO TO Step 2, ELSE STOP: an optimal

configuration has been reached.

2. FOR each user k = 1, . . . , K, DO

(a) Compute current Rk(i) using equation (1.140) and

determine its minimum eigenvector xk(i).

(b) Replace the current codeword sk(i) using codeword

update equation (1.149).

(c) Update user k’s Lagrange multiplier using

equation (1.153).

(d) Update user k’s power using equation (1.150).

3. GO TO Step 1.

Figure 1.9. Adaptive Interference Avoidance Algorithm

of the shared resource. This is a fortuitous result, especially in an unlicensed environment.We have also seen that interference avoidance is robust under the usual wireless system“impairments” such as frequency/space selective channels, fading channels, asynchronoususers and a dynamic palette of users entering and leaving thesystem.

The current major obstacle to implementation of distributed interference avoidance isthe amount of information which must be fed back to transmitters for codeword adaptation.Individual codeword feedback can be onerous owing to the number of degrees of freedomper codeword so various work-arounds have been proposed including global covariancefeedback and reduced rank methods.

Page 45: ADVANCES IN MULTIUSER DETECTION

SUMMARY AND CONCLUSIONS 39

However, depending on the application, the issue could alsobe moot. That is, in wirelesssystems, the downlink (to the mobile) and uplink (from the mobile) can often be grosslyasymmetric with the downlink being much much faster than themultiple access uplink.In this case, codeword computation at a common receiver and downlink dispersal to userswould be relatively simple and iterative interference avoidance might one of many potentialoptimal codeword computation algorithms used.

Another interesting observation regarding the potential utility of distributed interferenceavoidance is that the high cost of siting for wireless antennas has caused carriers to co-locateequipment. Taking this trend farther, one could even imagine, as the cost of computing hard-ware plummets with Moore’s Law but the cost of specialized antenna/front-end hardwareincreases, co-location of equipment leading to an even moreintimate receiver co-locationwhere carriers share the cost of expensive multi-antenna, mixed-circuit front end transceiverhardware. Multiple “commodity” (and proprietary) backendprocessing units could thenbe attached to compose and decode the necessary waveforms. In such a scenario, implic-itly competitive and certainly administratively decoupled, one could imagine what mightbe called “interference avoidance in a box” whereby different carriers would adjust theirwaveforms to avoid one another on the common transceiver hardware, but without explicitsoftware coordination. That is, all would have access to thefront end receiver signals (andhence covariance information) so that the issue over-the-air feedback bandwidth becomesunimportant. However, the lack of shared/coordinated algorithms across carriers wouldmake iterative avoidance of interference extremely important.

Regardless of what the future holds, the mechanics of iterative interference avoidancemethods have been studied and the basic idea behind the various forms of the algorithm –greed – seems to stand up to analytic scrutiny as a means to achieve better performance. Wefind this result particularly interesting in light of the fact that optimality is an “emergent”property where no individual user is seeking to maximize itscapacity through waterfilling– at least not directly since a single codeword simplycannotwaterfill across a multidi-mensional space. The robustness of the result suggests we dowell to examine other jointoptimization problems in communications from this sort of “mole’s eye view.”

Page 46: ADVANCES IN MULTIUSER DETECTION

40 INTERFERENCE AVOIDANCE FOR CDMA SYSTEMS

REFERENCES

1. M. Abdulrahman, A. U. H. Sheikh, and D. D. Falconer. Decision feedback equalization forCDMA in indoor wireless communications.IEEE Journal on Selected Areas in Communications,12(4):698–706, May 1994.

2. R. Ahlswede. The capacity region of a channel with two senders and two receivers.Annals ofprobability, 2:805–814, 1974.

3. P. Anigstein and V. Anantharam. Ensuring Convergence of the MMSEIteration for InterferenceAvoidance to the Global Optimum.IEEE Transactions on Information Theory, 49(4):873–885,April 2003.

4. R. Bellman.Introduction to Matrix Analysis. New York: McGraw-Hill, 1960.

5. Y. Benkler. Overcoming Agoraphobia: Building the Commons of the Digitally NetworkedEnvironment.Harvard Journal of Law and Technology, 11:287, 1998.

6. T. J. Brennan. The spectrum as a commons: tomorrow’s vision, not today’s prescription.Journalof Law and Economics, 41(2):791–803, 1998.

7. A.B. Carleial. Interference Channels.IEEE Transaction on Information Theory, 24(1):60–70,January 1978.

8. N. Clemens and C. Rose. Intelligent Power Allocation Strategies in an Unlicensed Spectrum.In Proceedings First IEEE International Symposium on New Frontiers in Dynamic SpectrumAccess Networks – DySPAN 2005, pages 37–42, Baltimore, MD, 2005.

9. Federal Communications Commission. FCC Report and Order 97-5:Amendment of the com-mission’s rules to provide for operation of unlicensed NII devices in the 5GHz frequency range.ET Docket No. 96-102, 1997.

10. M. Costa. On the Gaussian Interference Channel.IEEE Transactions on Information Theory,31(5):607–615, September 1985.

11. T. M. Cover and J. A. Thomas.Elements of Information Theory. Wiley-Interscience, 1991.

12. R. Etkin, A. Parehk, and D. Tse. Spectrum Sharing for UnlicensedBands. IEEE Journal onSelected Areas in Communications, 25(3):517–528, April 2007.

13. A. J. Goldsmith and P. P. Varaiya. Capacity of fading channels with channel side information.IEEE Transactions on Information Theory, 43(6):1986–1992, November 1997.

14. J. S. Goldstein and I. S. Reed. Reduced-rank adaptive filtering.IEEE Transactions on SignalProcessing, 45(2):492–496, Feb 1997.

15. J. S. Goldstein, I. S. Reed, and L. L. Scharf. A multistage representation of the Wiener filterbased on orthogonal projections.IEEE Transactions on Information Theory, 44(7):2943–2959,November 1998.

16. R. Gray. On the asymptotic eigenvalue distribution of toeplitz matrices.IEEE Transactions onInformation Theory, IT-18(6):725–730, November 1972.

17. T. Guess. Optimal Sequences for CDMA with Decision-Feedback Receivers.IEEE Transactionson Information Theory, 49(4):886–900, April 2003.

18. T. S. Han and K. Kobayashi. A new achievable Rate Region for the interference channel.IEEETransaction on Information Theory, 27(1):49 – 60, January 1981.

19. R. W. Heath Jr., J. A. Tropp, I. Dhillon, and T. Strohmer. Construction of Equiangular Signa-

tures for Synchronous CDMA Systems. InProceedings8th IEEE International Symposium onSpread Spectrum Techniques and Applications – ISSSTA’04, volume 1, pages 708–712, Sydney,Australia, August 2004.

20. M. Honig, U. Madhow, and S. Verdu. Blind adaptive multiuser detection.IEEE Transactions onInformation Theory, 41(4):944–960, July 1995.

Page 47: ADVANCES IN MULTIUSER DETECTION

REFERENCES 41

21. M. L. Honig. A Comparison of Subspace Adaptive Filtering Techniques for DS-CDMA In-terference Suppression. InProceedings 1997 IEEE Military Communications Conference –MILCOM’97, volume 2, pages 836–840, Monterey, CA, November 1997.

22. M. L. Honig and J. S. Goldstein. Adaptive Reduced-Rank Interference Suppression Based on theMulti-Stage Wiener Filter.IEEE Transactions on Communications, 50(6):986–994, June 2002.

23. M. L. Honig and W. Xiao. Performance of Reduced-Rank Linear Interference Suppression.IEEE Transactions on Information Theory, 47(5):1928–1946, July 2001.

24. R. A. Horn and C. A. Johnson.Matrix Analysis. Cambridge University Press, Cambridge, UnitedKingdom, 1985.

25. G. N. Karystinos and D. A. Pados. New Bounds on the Total Squared Correlation and OptimumDesign of DS-CDMA Binary Signature Sets.IEEE Transactions on Communications, 51(1):48– 51, January 2003.

26. G. N. Karystinos and D. A. Pados. The Maximum Squared Correlation, Sum Capacity, and TotalAsymptotic Efficiency of Minimum Total Squared Correlation Binary Signature Sets. IEEETransactions on Information Theory, 51(1):351–354, January 2005.

27. O. Kaya and S. Ulukus. Optimum power control for CDMA with deterministic sequences infading channels.IEEE Transactions on Information Theory, 50(10):2449–2458, October 2004.

28. O. Kaya and S. Ulukus. Ergodic sum capacity maximization for CDMA:Optimum resourceallocation.IEEE Transactions on Information Theory, 51(5):1831–1836, May 2005.

29. R. Knopp and P. A. Humblet. Information Capacity and Power Control in Single-Cell MultiuserCommunications. InProceedings 1995 IEEE International Conference on Communications –ICC’95, volume 1, pages 331–335, Seattle, WA, June 1995.

30. H. J. Landau and H. O. Pollack. Prolate Spheroidal Wave Functions, Fourier Analysis andUncertainty – III: The Dimension of the Space of Essentially Time- and Band-Limited Signals.The Bell System Technical Journal, 41(4):1295–1335, July 1962.

31. D. J. Love, R. W. Heath Jr., W. Santipach, and M. L. Honig. What Is the Value of Limited Feedbackfor MIMO Channels?IEEE Communications Magazine, 42(10):54–59, October 2004.

32. C. Lacatus and D. C. Popescu. Interference Avoidance With Incremental Power Updates forUplink CDMA Systems. InProceedings 2006 IEEE Wireless Communications and NetworkingConference – WCNC 2006, volume 4, pages 1842–1847, Las Vegas, NV, April 2006.

33. C. Lacatus and D. C. Popescu. Joint Incremental Codeword and Power Adaptation in CDMASystems. InProceedings 2006 IEEE Region 5 Technology and Science Conference, pages 185–189, San Antonio, TX, April 2006.

34. C. Lacatus and D. C. Popescu. Adaptive Interference Avoidance for Dynamic Wireless Systems.In 2007 IEEE Consumer Communications and Networking Conference – CCNC’07, Las Vegas,NV, January 2007.

35. C. Lacatus and D. C. Popescu. Adaptive Interference Avoidance for Dynamic Wireless Systems:A Game-Theoretic Approach.IEEE Journal on Selected Topics in Signal Processing, 1(1), June2007. Special issue on adaptive waveform design for agile sensing and communications. Toappear.

36. J. Luo, S. Ulukus, and A. Ephremides. Optimal sequences and sum capacity of symbol asyn-chronous CDMA systems.IEEE Transactions on Information Theory, 51(8):2760–2769, August2005.

37. U. Madhow and M. L. Honig. MMSE Interference Suppression forDirect-Sequence Spread-Spectrum CDMA.IEEE Transactions on Communications, 42(12):3178–3188, December 1994.

38. J. L . Massey and T. Mittelholzer. Welch’s bound and sequence setsfor code-division multiple-access systems. In R. Capocelli, A. De Santis, and U. Vaccaro, editors, Sequences II: Methodsin Communication, Security and Computer Science. Springer-Verlag, 1991.

Page 48: ADVANCES IN MULTIUSER DETECTION

42 INTERFERENCE AVOIDANCE FOR CDMA SYSTEMS

39. S. L. Miller. An adaptive direct-sequence code-division multiple-access receiver for multiuserinterference rejection.IEEE Transactions on Communications, 43(2/3/4):1746–1755, Febru-ary/March/April 1995.

40. K. K. Mukkavilli, A Sabharwal, E. Erkip, and B. Aazhang. On Beamforming with Finite RateFeedback in Multiple Antenna Systems.IEEE Transactions on Information Theory, 49(10):2562–2579, October 2003.

41. E. Ostrom.Governing the Commons: The Evolution of Institutions for Collective Action. Cam-bridge University Press, Cambridge, 1990.

42. M. J. M. Peacock, I. B. Collings, and M. L. Honig. Asymptotic Analysis of MMSE MultiuserReceivers for Multisignature Multicarrier CDMA in Rayleigh Fading.IEEE Transactions onCommunications, 52(6):964–972, June 2004.

43. M. J. M. Peacock, I. B. Collings, and M. L. Honig. Asymptotic Spectral Efficiency of MultiuserMultisignature CDMA in Frequency-Selective Channels.IEEE Transactions on InformationTheory, 52(3):1113–1129, March 2006.

44. D. C. Popescu and C. Rose. Codeword Quantization for Interference Avoidance. InProceedings2000 IEEE International Conference on Acoustics, Speech, and Signal Processing – ICASSP2000, volume 6, pages 3670 – 3673, Istanbul, Turkey, June 2000.

45. D. C. Popescu and C. Rose. Interference Avoidance and Multiuser MIMO Systems.InternationalJournal of Satellite Communications and Networking, 21(1):143–161, January 2003. Invitedpaper for special issue on interference suppression techniques forsatellite systems.

46. D. C. Popescu and C. Rose. Interference Avoidance and PowerControl for Uplink CDMA Sys-

tems. InProceedings58th IEEE Vehicular Technology Conference – VTC 2003 Fall, volume 3,pages 1473–1477, Orlando, FL, October 2003.

47. D. C. Popescu and C. Rose. Multiuser MIMO Systems and Interference Avoidance. InPro-ceedings 2003 IEEE International Conference on Acoustics, Speech,and Signal Processing –ICASSP 2003, volume 4, pages IV–828 – IV–831, Hong Kong, P. R. China, April 2003. Invitedpaper.

48. D. C. Popescu and C. Rose.Interference Avoidance Methods for Wireless Systems. KluwerAcademic Publishers, New York, NY, 2004.

49. D. C. Popescu and C. Rose. Codeword Optimzation for Uplink CDMA Dispersive Channels.IEEE Transactions on Wireless Communications, 4(4):1563–1574, July 2005.

50. O. Popescu.Interference Avoidance for Wireless Systems with Multiple Receivers. PhD thesis,Rutgers University, Department of Electrical and Computer Engineering, 2004. Thesis Director:Prof. C. Rose. Available online athttp://www.winlab.rutgers.edu/~otilia/thesis.pdf.

51. O. Popescu, D. C. Popescu, and C. Rose. Greedy Interference Avoidance in Non-Collaborative

Multi-Base Wireless Systems. InProceedings39thConference on Information Sciences andSystems – CISS’05, The Johns Hopkins University, Baltimore, MD, March 2005.

52. O. Popescu, D. C. Popescu, and C. Rose. Simultaneous Water Fillingin Mutually InterferingSystems.IEEE Transactions on Wireless Communications, 6(3):1102–1113, March 2007.

53. O. Popescu and C. Rose. Water Filling May Not Good Neighbors Make. In Proceedings 2003IEEE Global Telecommunications Conference - GLOBECOM ’03, volume 3, pages 1766–1770,San Francisco, CA, December 2003.

54. O. Popescu and C. Rose. Sum Capacity and TSC Bounds in Collaborative Multi-Base WirelessSystems.IEEE Transactions on Information Theory, 50(10):2433–2438, October 2004.

55. O. Popescu, C. Rose, and D. C. Popescu. Strong Interferenceand Spectrum Warfare. InPro-

ceedings38th Conference on Information Sciences and Systems – CISS 2004, pages 83 – 88,Princeton, NJ, March 2004.

Page 49: ADVANCES IN MULTIUSER DETECTION

REFERENCES 43

56. G. Rajappan and M. L. Honig. Multi-dimensional amplitude control forDS-CDMA. InProceed-

ings49th IEEE Vehicular Technology Conference – VTC’99 Spring, volume 2, pages 1256–1260,Houston, TX, May 1999.

57. G. Rajappan and M. L. Honig. Spreading Code Adaptation for DS-CDMA with Multipath. InProceedings21st Century Military Communications Conference – MILCOM 2000, volume 2,pages 1164–1168, Los Angeles, CA, October 2000.

58. G. S. Rajappan and M. L. Honig. Signature Sequence Adaptation forDS-CDMA with Multipath.IEEE Journal on Selected Areas in Communications, 20(2):384–395, February 2002.

59. P. B. Rapajic and B. S. Vucetic. Adaptive receiver structures forasynchronous CDMA systems.IEEE Journal on Selected Areas in Communications, 12(4):685–697, May 1994.

60. C. Rose. WINLAB Focus’99 on Radio Networks for Everything. Available on linehttp://www.winlab.rutgers.edu/pub/symposiums/Focus~99/Index.html/focus99, May 1999. NewBrunswick, NJ.

61. C. Rose. CDMA Codeword Optimization: Interference Avoidance and Convergence Via ClassWarfare.IEEE Transactions on Information Theory, 47(6):2368–2382, September 2001.

62. C. Rose and A. T. Ogielski. WINLAB Focus’98 on the U-NII. Available on linehttp://www.winlab.rutgers.edu/pub/symposiums/foc-org/Index.html, June 1998. Long Branch,NJ.

63. C. Rose, S. Ulukus, and R. Yates. Wireless Systems and Interference Avoidance.IEEE Trans-actions on Wireless Communications, 1(3):415–428, July 2002.

64. M. Rupf and J. L. Massey. Optimum Sequence Multisets for Synchronous Code-DivisionMultiple-Access Channels.IEEE Transactions on Information Theory, 40(4):1226–1266, July1994.

65. W. Santipach and M. L. Honig. Signature Optimization for CDMA with LimitedFeedback.IEEE Transactions on Information Theory, 51(10):3475–3492, October 2005.

66. E. Seneta.Non-negative Matrices and Markov Chains. Springer Verlag, 1981. 2nd edition.

67. J. Singh and C. Rose. Codeword Adaptation and Tracking for Distributed Interference Avoidance.In WINLAB Technical Memorandum, volume 231, Piscataway, NJ, March 2003.

68. J. Singh and C. Rose. Distributed Incremental Interference Avoidance. InProceedings 2003IEEE Global Telecommunications Conference – Globecom 2003, volume 1, pages 415–419, SanFrancisco, CA, December 2003.

69. G. Strang.Linear Algebra and Its Applications. Harcourt Brace Jovanovich College Publishers,San Diego, CA, 1988.

70. J. A. Tropp, I. S. Dhillon, and R. W. Heath. Finite-Step Algorithms forConstructing OptimalCDMA Signature Sequences.IEEE Transactions on Information Theory, 50(11):2916–2921,November 2004.

71. J. A. Tropp, I. S. Dhillon, R. W. Heath, and T. Strohmer. DesigningStructured Tight Frames ViaAn Alternating Projection Method.IEEE Transactions on Information Theory, 51(1):188–209,January 2005.

72. S. Ulukus.Power Control, Multiuser Detection and Interference Avoidance in CDMA Systems.PhD thesis, Rutgers University, Department of Electrical and ComputerEngineering, 1998.Available athttp://www.ece.umd.edu/~ulukus.

73. S. Ulukus and R. Yates. Iterative Construction of Optimum Signature Sequence Sets in Syn-chronous CDMA Systems.IEEE Transactions on Information Theory, 47(5):1989–1998, July2001.

74. S. Ulukus and R. D. Yates. User capacity of asynchronous CDMA systems with matched fil-ter receivers and optimum signature sequences.IEEE Transactions on Information Theory,50(5):903–909, May 2004.

Page 50: ADVANCES IN MULTIUSER DETECTION

44 INTERFERENCE AVOIDANCE FOR CDMA SYSTEMS

75. S. Ulukus and A. Yener. Iterative transmitter and receiver optimization for CDMA networks.IEEE Transactions on Wireless Communications, 3(6):1879–1884, November 2004.

76. S. Verdu. Capacity region of Gaussian CDMA channels: The symbol-synchronous case. In24thAllerton Conference on Communication, Control and Computing, pages 1025–1034, Monticello,IL, October 1986.

77. S. Verdu. The capacity region of the symbol-asynchronous gaussian multiple-access channel.IEEE Transactions on Information Theory, 35(4):733–751, July 1989.

78. S. Verdu. Multiuser Detection. Cambridge University Press, Cambridge, United Kingdom,1998.

79. P. Viswanath and V. Anantharam. Optimal Sequences and Sum Capacity of Synchronous CDMASystems.IEEE Transactions on Information Theory, 45(6):1984–1991, September 1999.

80. P. Viswanath and V. Anantharam. Optimal Sequences for CDMA Under Colored Noise: ASchur-Saddle Function Property.IEEE Transactions on Information Theory, 48(6):1295–1318,June 2002.

81. P. Viswanath, V. Anantharam, and D. Tse. Optimal Sequences, Power Control and Capacity ofSpread Spectrum Systems with Multiuser Linear Receivers.IEEE Transactions on InformationTheory, 45(6):1968–1983, September 1999.

82. P. Viswanath and D.N.C. Tse. Sum Capacity of the Vector Gaussian Broadcast Channel andUplink-Downlink Duality. IEEE Transactions on Information Theory, 49(8):1912–1921, August2003.

83. A. Viterbi and J. Omura.Principles of Digital Communication and Coding. New York: McGraw-Hill, 1979.

84. X. Wang and H. V. Poor. Blind Multiuser Detection: A Subspace Approach. IEEE Transactionson Information Theory, 44(2):677–690, March 1998.

85. L. R. Welch. Lower Bounds on the Maximum Cross Correlation of Signals. IEEE Transactionson Information Theory, IT-20(3):397–399, May 1974.

86. R. D. Yates. A framework for uplink power control in cellular radio systems.IEEE Journal onSelected Areas in Communications, 13(7):1341–1347, September 1995.

87. W. Yu, W. Rhee, S. Boyd, and J. M. Cioffi. Iterative Water-Filling for Gaussian Vector Multiple-Access Channels.IEEE Transactions on Information Theory, 50(1):145–152, January 2004.


Recommended