2016
DOI: 10.1109/twc.2016.2604799
|View full text |Cite
|
Sign up to set email alerts
|

Poisson Hole Process: Theory and Applications to Wireless Networks

Abstract: Abstract-Interference field in wireless networks is often modeled by a homogeneous Poisson Point Process (PPP). While it is realistic in modeling the inherent node irregularity and provides meaningful first-order results, it falls short in modeling the effect of interference management techniques, which typically introduce some form of spatial interaction among active transmitters. In some applications, such as cognitive radio and device-to-device networks, this interaction may result in the formation of holes… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
113
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 111 publications
(115 citation statements)
references
References 25 publications
1
113
0
1
Order By: Relevance
“…For modeling inter-tier coupling, Poisson hole process (PHP) has been a preferred choice [27], [28], where the macro BSs (MBSs) are modeled as PPP and the SBSs are modeled as another PPP outside the exclusion discs (holes) centered at the MBS locations. Among these "beyond-PPP" spatial models of HetNets, the PCP has attracted significant interest because of its generality in modeling variety of user and BS configurations and its mathematical tractability [1], [29].…”
Section: A Background and Related Workmentioning
confidence: 99%
“…For modeling inter-tier coupling, Poisson hole process (PHP) has been a preferred choice [27], [28], where the macro BSs (MBSs) are modeled as PPP and the SBSs are modeled as another PPP outside the exclusion discs (holes) centered at the MBS locations. Among these "beyond-PPP" spatial models of HetNets, the PCP has attracted significant interest because of its generality in modeling variety of user and BS configurations and its mathematical tractability [1], [29].…”
Section: A Background and Related Workmentioning
confidence: 99%
“…When we set χ = 1, an intuitive interpretation for the proposed edge user model is as follows: any one of the users in the network is expected to be covered by, on average, one BS within the distance of D E , and therefore, for a given user, if therefore is no BS located within D E , the user will be referred to as an cell-edge user. According to the proposed edge user model above, the locations of the cell-edge users follow a poisson hole process (PHP) [35], [36]. To analyze the performance of the cell-edge users, we assume there is a typical cell-edge user located at the origin o, which leads to an exclusive ball region, i.e., B (o, D E ), for the BSs 3 .…”
Section: B Cell-edge User Modelmentioning
confidence: 99%
“…By plugging (53) and (52) into (45), we thus obtain the desired result in (17), and the proof is completed.…”
Section: Proof Of Theoremmentioning
confidence: 80%
“…Therefore, the location of TUs 3 becomes a poisson hole process (PHP). It should be noted that the PHP described here is also known as hole-1 process [17]. Thus, the location of the holes (i.e., condition on 1 ), 3 is simply a PPP with density λ 3 defined on R 2 / in [13], [14], [17].…”
Section: A System Architecturementioning
confidence: 99%
See 1 more Smart Citation