2007 10th Canadian Workshop on Information Theory (CWIT) 2007
DOI: 10.1109/cwit.2007.375727
|View full text |Cite
|
Sign up to set email alerts
|

Throughput and Fairness maximization in Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2007
2007
2012
2012

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 17 publications
0
10
0
Order By: Relevance
“…Congruent to what is done in [8], it can be argued that (4) can be upper bounded as P r{S } ≤ n i=1 P r{S i = 0}, thus we arrive at the following…”
Section: Theoremmentioning
confidence: 99%
“…Congruent to what is done in [8], it can be argued that (4) can be upper bounded as P r{S } ≤ n i=1 P r{S i = 0}, thus we arrive at the following…”
Section: Theoremmentioning
confidence: 99%
“…For round-robin scheduling, it is clear that D 1, K = K. For opportunistic single-user scheduling, the average scheduling delay scales as K ln K, while for the orthogonal OBF, it scales as K ln K/N t [1]. Based on the probabilistic arguments similar to [22,Theorem 3], the following theorem shows the average scheduling delay of non-orthogonal OBF with N > N t transmit beams.…”
Section: B Average Scheduling Delaymentioning
confidence: 99%
“…Substituting the above upper-bound and lower-bounds in (9), after some manipulations Lemma 1 is proved. (for the detailed proof the reader is referred to [24]). …”
Section: Lemma 1 Definingmentioning
confidence: 99%
“…Finally, the theorem is proved by deriving a lower-bound on the achievable sum-rate based on the threshold level given in (4), which is performed in Lemma 4. For the proof of the lemmas, the reader is referred to [24].…”
Section: Theorem 1 Using the Proposed Algorithm For The Values Ofmentioning
confidence: 99%
See 1 more Smart Citation