2014
DOI: 10.1017/cbo9781139088466
|View full text |Cite
|
Sign up to set email alerts
|

Applied Optimization Methods for Wireless Networks

Abstract: Written in a unique style, this book is a valuable resource for faculty, graduate students, and researchers in the communications and networking area whose work interfaces with optimization. It teaches you how various optimization methods can be applied to solve complex problems in wireless networks. Each chapter reviews a specific optimization method and then demonstrates how to apply the theory in practice through a detailed case study taken from state-of-the-art research. You will learn various tips and ste… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 71 publications
(38 citation statements)
references
References 140 publications
0
38
0
Order By: Relevance
“…In particular, for a hotspot comprising M ANs serving K UEs, M K searches will be required, rendering the procedure impractical for network dimensions encountered in typical 3GPP-based small-cell cluster setups, involving tens of nodes. In the following two sections, we address the FDMA and SDMA user association problems by proposing two plausible exact reformulations, motivated by reformulation-linearisation concepts answered in applied optimisation [23,24].…”
Section: Problem Statement and Optimisation Modellingmentioning
confidence: 99%
“…In particular, for a hotspot comprising M ANs serving K UEs, M K searches will be required, rendering the procedure impractical for network dimensions encountered in typical 3GPP-based small-cell cluster setups, involving tens of nodes. In the following two sections, we address the FDMA and SDMA user association problems by proposing two plausible exact reformulations, motivated by reformulation-linearisation concepts answered in applied optimisation [23,24].…”
Section: Problem Statement and Optimisation Modellingmentioning
confidence: 99%
“…Therefore, a sensor barrier is usually formed by several connected sensors across the entire target region, which may feature a trip-wire-like structure to detect any potential crossings by intruders. An approximation algorithm that intelligently divides the search space into subareas, which are represented by "fictitious cost point" [154]. A near-optimal solution is obtained, where NL is guaranteed to be at least (1−ε) of the optimal NL provided that ε>0 and can be arbitrarily small.…”
Section: E Coverage Connectivity and Optimal Deploymentmentioning
confidence: 99%
“…Although there already exist algorithms (e.g., Branch-and-Bound and sequential fixing [9]) and commercial optimization solvers (e.g., IBM CPLEX [10]) that can be used to solve the problem in Fig. 3, these algorithms/solvers are limited to the centralized environment.…”
Section: Problem Statementmentioning
confidence: 99%