2008 IEEE International Conference on Communications 2008
DOI: 10.1109/icc.2008.478
|View full text |Cite
|
Sign up to set email alerts
|

A Dynamic Resource Allocation Scheme for Guaranteed Bit Rate Services in OFDMA Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
76
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 43 publications
(76 citation statements)
references
References 3 publications
0
76
0
Order By: Relevance
“…SIMULATION RESULTS In this section, we compare the performance of the uniformly-distributed random assignment sequences in [4], with that of the cyclic sequences generated by the greedy algorithm, and the exhaustive search in [5] at different relative loads K N ; i.e., the ratio of the currently assigned RBs to the total number of RBs in the system. For the scheme in [5] and the one proposed herein, the cyclic sequences are generated by using the MCG structure.…”
Section: Computational Complexity Of the Greedy Algorithmmentioning
confidence: 99%
See 3 more Smart Citations
“…SIMULATION RESULTS In this section, we compare the performance of the uniformly-distributed random assignment sequences in [4], with that of the cyclic sequences generated by the greedy algorithm, and the exhaustive search in [5] at different relative loads K N ; i.e., the ratio of the currently assigned RBs to the total number of RBs in the system. For the scheme in [5] and the one proposed herein, the cyclic sequences are generated by using the MCG structure.…”
Section: Computational Complexity Of the Greedy Algorithmmentioning
confidence: 99%
“…For example, for a system with N = 40 RBs at a relative load, K N = 90%, the average number of hits of the random assignment scheme in [4] and the cyclically-generated sequences obtained by exhaustive search, and the greedy Average number of hits…”
Section: Computational Complexity Of the Greedy Algorithmmentioning
confidence: 99%
See 2 more Smart Citations
“…For example, a hybrid of centralized and distributed algorithms for subcarrier (i.e., channel) assignment to maximize the overall throughput is proposed in [9]. This scheme has been extended to include power allocation by [10]. Paper [11] studies three adaptive schemes for subcarrier (channel) allocation by means of cross-layer techniques for the purpose of throughput enhancement.…”
Section: Introductionmentioning
confidence: 99%