sdprosolutions.com · 1 yung-shun wang,student member, ieee, y.-w. peter hong,senior member, ieee,...

15
1 Yung-Shun Wang, Student Member, IEEE, Y.-W. Peter Hong, Senior Member, IEEE, and Wen-Tsuen Chen, Fellow, IEEE Abstract—This work proposes a dynamic precoding and power allocation policy for mutually cooperative device-to-device (D2D) transmitter-receiver pairs that underlay a cellular system in the uplink. The cooperative transmission consists of two phases: a data-sharing phase (i.e., phase 1) and a joint transmission phase (i.e, phase 2). Multicast precoders are used in phase 1 and coordinated block-diagonalization precoders are considered in phase 2. The precoders are jointly designed to maximize the long-term utility of the D2D users subject to long-term individual power and rate-gain constraints, and an instantaneous interference constraint at the base-station. The long-term ob- jective and constraints allow cooperating users to adapt their resources more flexibly over time, but increases the complexity of the design. By adopting the Lyapunov optimization framework and by constructing virtual queues to record the temporal evolution of the system states, the long-term utility maximization problem can be decoupled into a series of short-term weighted- rate-minus-energy-penalty (WRMEP) optimization problems that can be solved efficiently. A low-complexity algorithm is further proposed for solving the WRMEP problem when multicasting in the data-sharing phase is performed by a spatially white input. Theoretical performance guarantees and a bound on the virtual queue backlogs are also derived. I. I NTRODUCTION Device-to-device (D2D) communication has been proposed as a promising technique for improving the spectrum utiliza- tion of next generation cellular systems [1], [2]. This is done by allowing nearby devices to communicate directly with each other without relaying information through the cellular base- station (BS). As the number of user devices increases, the amount of data that need to be offloaded to D2D transmissions will inevitably increase and, thus, the system must be able to accommodate a larger number of simultaneously active D2D links. However, without cooperation among these D2D pairs, the overall system performance will eventually be limited by the interference that they cause to each other as well as to the cellular system. In the literature on D2D communications, interference management [3], resource allocation [4], power control [5], [6], and transmission mode selection [7], [8] methods were proposed to reduce the interference in D2D underlaid cellular systems. In [3]–[8], only one D2D pair was assumed to be The authors are with the Institute of Communications Engineering, Na- tional Tsing Hua University, Hsinchu, Taiwan (Emails: {[email protected]; ywhong@ee; wtchen@cs}.nthu.edu.tw). Y.-W. P. Hong is also with MOST Joint Research Center for AI Technology and AII Vista Healthcare. This work was supported in part by Ministry of Science and Technology, Taiwan, under grant MOST 107-2634-F-007-005. active at a time or orthogonal resources were allocated to difference D2D pairs, and, thus, the focus was on reducing the interference between D2D and cellular transmissions. More recently, in [9]–[11], cases with multiple transmitting D2D pairs were examined with further consideration on the inter- pair interference. Specifically, in [9] and [10], both the inter- pair interference and the interference towards the cellular transmission were considered by imposing a transmit power constraint on the D2D transmitters; in [11], the issues of in- terference and energy-awareness were analyzed for ultra-dense D2D networks using a mean field game framework. However, these works do not exploit the advantages of cooperation. With cooperation, users will be able to better reduce interference and increase spatial spectrum utilization and, thus, allow more D2D pairs to be simultaneously active. User cooperation was studied extensively in wireless com- munications since the seminal works in [12]–[14]. Many different scenarios were considered depending on the number of sources, relays, and destinations, and also on whether or not there exists dedicated relays (or sources temporarily acting as relays to help forward the information of others) [15]. Most of these works considered the use of a two-phase transmission scheme, where the source(s) first transmits information to the relay(s) in phase 1, and then the relay(s) forwards the information to the destination(s) in phase 2. The works that are most related to ours are those that consider multiple sources and multiple destinations, such as those in [16]–[24]. In [16]–[21], sources and destinations were served by dedicated relays that do not have their own data to transmit and, thus, allocate all of their resources to the forwarding of signals from the sources to the destinations. In this case, the relays can form a distributed antenna array and adopt distributed beamforming or space-time coding schemes to exploit the available spatial degrees of freedom. Moreover, in [22]–[24], sources were instead mutually cooperative and took turns acting temporarily as relays for one another. No dedicated relays were assumed to exist in these works. Space-time coding was adopted in these works to exploit the cooperative diversity gains. Furthermore, in the context of D2D networks, studies on user cooperation were examined more recently in [25]–[29], where interference against the cellular system was further taken into consideration. However, all of the above cooperative transmission schemes assume instantaneous (or short-term) power constraints, which limits the adaptability of the system over time, and do not consider fairness or performance guarantees among sources. Dynamic Transmission Policy for Multi-Pair Cooperative Device-to-Device Communication with Block-Diagonalization Precoding

Upload: others

Post on 14-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: sdprosolutions.com · 1 Yung-Shun Wang,Student Member, IEEE, Y.-W. Peter Hong,Senior Member, IEEE, and Wen-Tsuen Chen, Fellow, IEEE Abstract—This work proposes a dynamic precoding

1

Yung-Shun Wang,Student Member, IEEE,Y.-W. Peter Hong,Senior Member, IEEE,and Wen-TsuenChen,Fellow, IEEE

Abstract—This work proposes a dynamic precoding and powerallocation policy for mutually cooperative device-to-device (D2D)transmitter-receiver pairs that underlay a cellular system in theuplink. The cooperative transmission consists of two phases:a data-sharing phase (i.e., phase 1) and a joint transmissionphase (i.e, phase2). Multicast precoders are used in phase1and coordinated block-diagonalization precoders are consideredin phase 2. The precoders are jointly designed to maximizethe long-term utility of the D2D users subject to long-termindividual power and rate-gain constraints, and an instantaneousinterference constraint at the base-station. The long-term ob-jective and constraints allow cooperating users to adapt theirresources more flexibly over time, but increases the complexityof the design. By adopting the Lyapunov optimization frameworkand by constructing virtual queues to record the temporalevolution of the system states, the long-term utility maximizationproblem can be decoupled into a series of short-termweighted-rate-minus-energy-penalty (WRMEP) optimization problems thatcan be solved efficiently. A low-complexity algorithm is furtherproposed for solving the WRMEP problem when multicasting inthe data-sharing phase is performed by a spatially white input.Theoretical performance guarantees and a bound on the virtualqueue backlogs are also derived.

I. I NTRODUCTION

Device-to-device (D2D) communication has been proposedas a promising technique for improving the spectrum utiliza-tion of next generation cellular systems [1], [2]. This is doneby allowing nearby devices to communicate directly with eachother without relaying information through the cellular base-station (BS). As the number of user devices increases, theamount of data that need to be offloaded to D2D transmissionswill inevitably increase and, thus, the system must be able toaccommodate a larger number of simultaneously active D2Dlinks. However, without cooperation among these D2D pairs,the overall system performance will eventually be limited bythe interference that they cause to each other as well as to thecellular system.

In the literature on D2D communications, interferencemanagement [3], resource allocation [4], power control [5],[6], and transmission mode selection [7], [8] methods wereproposed to reduce the interference in D2D underlaid cellularsystems. In [3]–[8], only one D2D pair was assumed to be

The authors are with the Institute of Communications Engineering, Na-tional Tsing Hua University, Hsinchu, Taiwan (Emails:[email protected];ywhong@ee; [email protected]). Y.-W. P. Hong is also with MOSTJoint Research Center for AI Technology and AII Vista Healthcare.

This work was supported in part by Ministry of Science and Technology,Taiwan, under grant MOST 107-2634-F-007-005.

active at a time or orthogonal resources were allocated todifference D2D pairs, and, thus, the focus was on reducing theinterference between D2D and cellular transmissions. Morerecently, in [9]–[11], cases with multiple transmitting D2Dpairs were examined with further consideration on the inter-pair interference. Specifically, in [9] and [10], both the inter-pair interference and the interference towards the cellulartransmission were considered by imposing a transmit powerconstraint on the D2D transmitters; in [11], the issues of in-terference and energy-awareness were analyzed for ultra-denseD2D networks using a mean field game framework. However,these works do not exploit the advantages of cooperation. Withcooperation, users will be able to better reduce interferenceand increase spatial spectrum utilization and, thus, allow moreD2D pairs to be simultaneously active.

User cooperation was studied extensively in wireless com-munications since the seminal works in [12]–[14]. Manydifferent scenarios were considered depending on the numberof sources, relays, and destinations, and also on whether or notthere exists dedicated relays (or sources temporarily acting asrelays to help forward the information of others) [15]. Mostof these works considered the use of a two-phase transmissionscheme, where the source(s) first transmits information tothe relay(s) in phase1, and then the relay(s) forwards theinformation to the destination(s) in phase2. The works that aremost related to ours are those that consider multiple sourcesand multiple destinations, such as those in [16]–[24]. In[16]–[21], sources and destinations were served by dedicatedrelays that do not have their own data to transmit and, thus,allocate all of their resources to the forwarding of signalsfrom the sources to the destinations. In this case, the relayscan form a distributed antenna array and adopt distributedbeamforming or space-time coding schemes to exploit theavailable spatial degrees of freedom. Moreover, in [22]–[24],sources were instead mutually cooperative and took turnsacting temporarily as relays for one another. No dedicatedrelays were assumed to exist in these works. Space-timecoding was adopted in these works to exploit the cooperativediversity gains. Furthermore, in the context of D2D networks,studies on user cooperation were examined more recently in[25]–[29], where interference against the cellular system wasfurther taken into consideration. However, all of the abovecooperative transmission schemes assume instantaneous (orshort-term) power constraints, which limits the adaptabilityof the system over time, and do not consider fairness orperformance guarantees among sources.

Dynamic Transmission Policy for Multi-PairCooperative Device-to-Device Communication

with Block-Diagonalization Precoding

IT 8.1
Typewritten text
IEEE Transactions on Wireless Communications Volume: 18 , Issue: 6 , June 2019
Page 2: sdprosolutions.com · 1 Yung-Shun Wang,Student Member, IEEE, Y.-W. Peter Hong,Senior Member, IEEE, and Wen-Tsuen Chen, Fellow, IEEE Abstract—This work proposes a dynamic precoding

2

The main objective of this work is to propose a cooperativetransmission scheme for D2D users that not only takes intoconsideration short-term interference temperature constraintsat the BS, but also long-term power constraints and cooperativeperformance guarantees. Cooperation allows multiple D2Dpairs to transmit simultaneously in the uplink frame of thecellular system without causing significant interference to eachother as well as to the BS. Here, we adopt a two-phase co-operative transmission scheme that consists of adata-sharingtransmissionin phase1 and acooperative joint transmissioninphase2. Specifically, in phase1, D2D transmitters (DTs) taketurns broadcasting their data to other DTs using physical layermulticasting techniques. In phase2, the DTs cooperativelytransmit their data to their respective D2D receivers (DR)using coordinated multi-user precoding. Here, we assumethat the DTs are located close to each other (e.g., within acertain hot spot [29]–[32]) so that the data-sharing in phase1 can be done efficiently, and adopt the coordinated block-diagonalization (BD) precoding scheme [33]–[35] in phase2to ensure that inter-pair interference is eliminated.

The proposed cooperative D2D transmission scheme isformulated as a long-term precoder design problem, wherethe objective is to maximize the long-term utility subject tolong-term individual power and rate-gain constraints as wellas instantaneous constraints on the interference power at BS.This is different from most works in the literature that consideronly short-term constraints on the power and the target rate.Long-term constraints allow cooperative users to allocate theirresources more flexibly over time and among users. That is,some users may be favored over other users at a certain time,but not at others. In particular, the long-term individual powerconstraint is used to limit the transmit power of each device;the long-term rate-gain constraint is used to ensure that eachD2D pair achieves a larger rate through cooperation; and theshort-term interference constraint limits the interference thatthe D2D transmission may cause on the cellular system. Byadopting the Lyapunov optimization framework [36]–[43], weare able to decouple the long-term design problem into a seriesof short-term subproblems, one for each time slot. To do so, weconstruct virtual data, rate-gain, and energy queues to recordthe system states and to enable separate optimization in eachtime slot based on these states. The effectiveness of the Lya-punov optimization framework [36], [37] in solving variousissues in wireless networks was demonstrated in studies on,e.g., energy efficiency [38]–[40], downlink scheduling [41],and energy management in energy harvesting devices [42],[43]. In particular, given the queue states and the channel stateinformation (CSI) of each time slot, we propose the maximum-weighted-rate-minus-energy-penalty (Max-WRMEP) policy todetermine the BD cooperative precoders in each time slot.A low-complexity implementation is then proposed for thecase where spatially white input is used for the multicastingin phase1. Theoretical performance guarantees and a boundon the virtual queue backlogs are also derived. Our maincontributions can be summarized as follows:

• the modelling of long-term optimization problems forcooperative networks, which provides better flexibility for

resource-sharing over time and among users;• the decoupling of the long-term optimization problem

into practical short-term subproblems that can be solvedefficiently;

• the proposition of a low-complexity scheme that utilizesspatially white input in phase1.

The remainder of this paper is organized as follows. InSection II, we introduce the system model and the problem for-mulation. In Section III, we propose the Max-WRMEP policythat converts the long-term optimization problem into a seriesof short-term subproblems that depend only on the queue andchannel states at that time. A low-complexity alternative isthen proposed in Section IV. Finally, we provide numericalsimulations in Section V to demonstrate the effectiveness ofthe proposed scheme, and conclude in Section VI.

II. SYSTEM MODEL

Let us consider a cooperative D2D network that consists ofK multi-antenna D2D transmitter and receiver pairs, denotedby the index setK = 1, 2, . . . ,K, as illustrated in Fig.1. The transmitter and the receiver of thek-th D2D pairis denoted by DTk and DR k, respectively. The numberof transmit and receive antennas at each DT and DR areNt and Nr, respectively.1 Moreover, we assume that thereexists a concurrent uplink transmission between a cellular user(CU) and the BS. The D2D and cellular transmissions aresimultaneously active and, thus, may cause interference to eachother. The number of CU and BS antennas areNc andNb,respectively.

Let us consider a time-slotted system with slot durationnormalized to1. The transmission in each time slot is dividedinto two phases: adata-sharingphase (i.e., phase1) and ajoint transmissionphase (i.e., phase2). In phase1, the trans-mitters take turns broadcasting their information to all othertransmitters and, in phase2, the transmitters together form adistributed antenna array to cooperatively transmit their data tothe respective DRs. The portion of time allocated to each userin phase1 is η1 and that allocated to the joint transmission inphase2 is η2. Hence, we haveKη1+η2 = 1. Here, we assumethat all D2D pairs participate in the cooperative transmissionin each time slot. In particular, to ensure that cooperation isadvantageous, we assume that the DTs are located close toeach other, forming a cluster within a certain hot spot, sothat data-sharing in phase1 can be done efficiently. Similarsettings have also been considered in [29]–[32]. The problemof determining who can or should join the cooperation (i.e.,issues of admission control and partner selection) can bothbe studied on top of our proposed cooperative transmissionscheme, but are beyond the scope of this paper.

A. Two Phase Cooperation and Constraints

Specifically, in phase1 of time slot t, DT k transmits thesignal

x(1)k [t] = W

(1)k [t]s

(1)k [t] (1)

1The number of transmit and receive antennas need not be the same for allD2D pairs, but is assumed to be the same here for ease of exposition.

IT 8.1
Typewritten text
IEEE Transactions on Wireless Communications Volume: 18 , Issue: 6 , June 2019
Page 3: sdprosolutions.com · 1 Yung-Shun Wang,Student Member, IEEE, Y.-W. Peter Hong,Senior Member, IEEE, and Wen-Tsuen Chen, Fellow, IEEE Abstract—This work proposes a dynamic precoding

3

à

à

(a) Direct D2D transmissions.

à

à

(b) Cooperative D2D transmissions.

Fig. 1. Illustration of D2D networks without and with cooperation.

to all other DTs for data sharing, wheres(1)k [t] ∈ CNt×1

is the information-bearing signal andW(1)k [t] ∈ CNt×Nt is

the multicast precoding matrix. We assume that the Gaus-sian codebook is used for transmission [13], [35], [41], andthus, the entries ofs(1)k [t] are independent and identicallydistributed (i.i.d.) Gaussian with zero mean and unit variance,i.e.,s(1)k [t] ∼ CN (0, INt

).2 The received signal at DTℓ duringthe multicast transmission by DTk, for k 6= ℓ, is

y(1)k,ℓ [t] = Gk,ℓ[t]W

(1)k [t]s

(1)k [t] +Gc,ℓ[t]x

(1)c [t] + n

(1)ℓ [t], (2)

where x(1)c [t] ∼ CN (0,Qc[t]) is the signal transmit-

ted by CU during phase1, Gk,ℓ[t] ∈ CNt×Nt is thechannel matrix between DTk and DT ℓ, Gc,ℓ[t] ∈CNt×Nc is the channel matrix between CU and DTℓ, andn(1)ℓ [t] ∼ CN (0, σ2

nINt) is the additive white Gaussian

noise (AWGN). The interference plus noise covariance ma-trix at DT ℓ is Gc,ℓ[t]Qc[t]G

Hc,ℓ[t] + σ2

nINt

3. By choosing

the noise whitening matrix asΥ(1)ℓ [t] ∈ C

Nt×Nt such that((Υ

(1)ℓ [t])HΥ

(1)ℓ [t])−1 = Gc,ℓ[t]Qc[t]G

Hc,ℓ[t]+σ2

nINt[44], the

equivalent received signal at DTℓ after noise-whitening is

y(1)k,ℓ [t] = Υ

(1)ℓ [t]y

(1)k,ℓ [t] = Gk,ℓ[t]W

(1)k [t]s

(1)k [t] + n

(1)ℓ [t],

2The Shannon capacity formulae in (3) and (9) are based on the use ofthe Gaussian codebook. The code rates achievable under this assumption canserve as an upper bound to that of practical systems where finite alphabetcodebooks are often adopted.

3To compute the noise whitening matrix, it is necessary for DTℓ toobtain knowledge of the channel matrix between itself and CU (and, thus,the interference plus noise covariance matrix). This channel matrix can beestimated by having DTℓ overhear the pilot signal emitted by CU during itstransmission to the BS. The noise whitening matrix at DRk can be computedsimilarly.

whereGk,ℓ[t] , Υ(1)ℓ [t]Gk,ℓ[t] is the effective channel matrix

andn(1)ℓ [t] , Υ

(1)ℓ [t](Gc,ℓ[t]x

(1)c [t]+n

(1)ℓ [t])∼ CN (0, INt

) isthe effective noise. Therefore, to ensure that all other DTs cansuccessfully decode in phase1, the transmission rateRk[t] ofDT k must satisfy

Rk[t] ≤ minℓ 6=k

η1 log2

∣INt

+ Gk,ℓ[t]Q(1)k [t]GH

k,ℓ[t]∣

∣, (3)

whereQ(1)k [t] , W

(1)k [t](W

(1)k [t])H is the input covariance

matrix of DT k in phase1.In phase2, DTs transmit cooperatively to their respective

DRs using joint multiuser transmit precoding. Lets(2)k [t] ∈

CM×1 be the data signal intended for DRk, where Mis the number of transmitted data streams due to spatialmultiplexing, and letW(2)

ℓ,k[t] ∈ CNt×M be the precoding

matrix employed by DTℓ to transmits(2)k [t]. By collecting theprecoding matrices from all DTs into a joint precoding matrixW

(2)k [t] = [W

(2)1,k[t]

H , . . . ,W(2)K,k[t]

H ]H , ∀k, and by lettingHk[t] = [H1,k[t], . . . ,HK,k[t]], whereHℓ,k[t] ∈ CNr×Nt isthe channel matrix between DTℓ and DRk, the received signalat DR k can be written as

y(2)k [t] =Hk[t]W

(2)k [t]s

(2)k [t] +

ℓ 6=k

Hk[t]W(2)ℓ [t]s

(2)ℓ [t]

+Hc,k[t]x(2)c [t] + n

(2)k [t], (4)

whereHc,k[t] ∈ CNr×Nc is the channel matrix between CUand DR k, x(2)

c [t] ∼ CN (0,Qc[t]) is the signal transmittedby CU during phase2, andn

(2)k [t] ∼ CN (0, σ2

nINr) is the

AWGN. Similarly, by choosing the noise whitening matrixas Υ

(2)k [t] ∈ CNr×Nr such that ((Υ(2)

k [t])HΥ(2)k [t])−1 =

Hc,k[t]Qc[t]HHc,k[t] + σ2

nINr, the equivalent received signal

at DR k after noise-whitening is

y(2)k [t]

=Υ(2)k [t]y

(2)k [t] (5)

=Hk[t]W(2)k [t]s

(2)k [t]+

ℓ 6=k

Hk[t]W(2)ℓ [t]s

(2)ℓ [t]+n

(2)k [t] (6)

where Hk[t] , Υ(2)k [t]Hk[t] is the effective channel matrix

and n(2)k [t] , Υ

(2)k [t](Hc,k[t]x

(2)c [t] + n

(2)k [t])∼ CN (0, INr

)is the effective noise. We assume throughout this work thatall channel gains are bounded.

To eliminate interference among D2D pairs, we adopt theblock diagonalization (BD) precoding technique [34], [35],where the precoding matricesW(2)

k [t], for k = 1, . . . ,K, arechosen such that

Hℓ[t]W(2)k [t] = 0, ∀ℓ 6= k. (7)

By letting Q(2)k [t] , W

(2)k [t](W

(2)k [t])H be theKNt ×KNt

joint covariance matrix for the signal intended for DRk, theconstraint in (7) can be written equivalently as

Hℓ[t]Q(2)k [t]HH

ℓ [t] = 0, ∀ℓ 6= k. (8)

Notice that it is necessary to haveNt ≥ Nr in orderfor the above condition to hold. To ensure that the joint

IT 8.1
Typewritten text
IEEE Transactions on Wireless Communications Volume: 18 , Issue: 6 , June 2019
Page 4: sdprosolutions.com · 1 Yung-Shun Wang,Student Member, IEEE, Y.-W. Peter Hong,Senior Member, IEEE, and Wen-Tsuen Chen, Fellow, IEEE Abstract—This work proposes a dynamic precoding

4

transmission from the DTs to DRk in phase2 is successful,the transmission rateRk[t] must also satisfy

Rk[t] ≤ η2 log2

∣INr

+ Hk[t]Q(2)k [t]HH

k [t]∣

∣. (9)

Consequently, by (3) and (9), the transmission rateRk[t] ofthe k-th D2D pair in time-slott must satisfy

Rk[t] ≤ min

minℓ 6=k

η1 log2

∣INt

+ Gk,ℓ[t]Q(1)k [t]GH

k,ℓ[t]∣

∣,

η2 log2

∣INr

+ Hk[t]Q(2)k [t]HH

k [t]∣

. (10)

Furthermore, to limit the interference that each D2D trans-mission may cause on the cellular system, we further imposean instantaneousinterference temperature (IT)constraint onthe expected interference power from each D2D pair. By as-suming that the DTs know only the expected channel statisticstowards BS, the IT constraints are given by [45]

E[

η1tr(Gk,b[t]Q(1)k [t]GH

k,b[t]) + η2tr(Gb[t]Q(2)k [t]GH

b [t])]

= η1tr(CGk,bQ

(1)k [t]) + η2tr(CGb

Q(2)k [t]) ≤ ITk, (11)

for all k, whereGk,b[t] ∈ CNb×Nt is the channel matrixbetween DTk and the BS,Gb[t] , [G1,b[t], . . . , GK,b[t]],and CGk,b

, E[GHk,b[t]Gk,b[t]] and CGb

, E[GHb [t]Gb[t]]

are the channel covariance matrices known at the DTs. Here,we assume thatCGk,b

andCGbare full rank, which occurs

whenNb ≥ KNt and the channel coefficients are independentwith positive variances. In this case, the IT constraint in (11)imposes a constraint on the maximum transmission rate in eachphase. A feasible BD cooperative precoding scheme for thek-th D2D pair refers toQ(1)

k [t],Q(2)k [t], Rk[t] that satisfies

Q(1)k [t] 0, Q

(2)k [t] 0, Rk[t] ≥ 0 as well as (8), (10),

and (11). Let us denote the set of all feasible BD cooperativeprecoding scheme for thek-th D2D pair by Γ(H[t], ITk),whereH[t] is the set of all channel states at timet.

It is worthwhile to note that cooperation may not always beadvantageous since additional overhead is required for DTsto share their own data with other DTs in phase1. Thisholds for almost all cooperative transmission schemes [12]–[15] even in the two-user case. However, without cooperation,each D2D pair is allocated only1/K portion of time for directtransmission between the corresponding DT and DR. Hence,cooperation can be beneficial if the DTs are sufficiently closeto each other such thatη1 (i.e., the data-sharing overhead)can be made small, in which case,η2 = 1 − Kη1 (i.e.,the portion of time used to jointly serve all DRs in thecooperative case) can be greater than1/K. In this work,we assume that the issues of admission control and partnerselection have already been resolved, and focus on the designof cooperative transmission schemes that can fully exploitthe available cooperative advantages. Here, we assume thatperfect CSI is available at all nodes for precoding and receiverprocessing, but later examine the impact of CSI acquisition andchannel estimation imperfections through simulations.

B. Problem Formulation

When cooperation is employed to improve the overallsystem performance, D2D pairs expend their resources to

aid the transmission of others (as well as serve their owntransmissions). Hence, it is often difficult to ensure that allD2D pairs gain instantaneously in each time slot due tocooperation (as compared to transmitting non-cooperativelyby themselves). Here, we instead determine a BD-based trans-mission policy (i.e., a sequence of BD cooperative precodingschemesQ(1)

k [t],Q(2)k [t], Rk[t], ∀k∞t=1 over time) that max-

imizes the long-term utility subject to long-term individualpower and rate-gain constraints at all D2D pairs. In ourcase, the cooperative advantages are ensured in the long-terminstead of in each time slot, which provides more flexibility inthe resource allocation. These constraints are detailed in thefollowing.

• Long-Term Individual Power Constraint: The long-termindividual power constraint for DTk is given by

Pk , limT→∞

1

T

T∑

t=1

E[Pk[t]] ≤ Pk,avg, (12)

where

Pk[t] , η1tr(Q(1)k [t]) + η2

K∑

ℓ=1

tr(ΘkQ(2)ℓ [t]) (13)

is the transmit power of DTk in time slot t, andΘk isa KNt × KNt diagonal matrix withΘkj,j = 1, forj = Nt(k−1)+1, . . . , Ntk, andΘkj,j = 0, otherwise.Different from conventional per-time-slot power con-straints, long-term individual power constraints provideDTs with more flexibility to distribute their power overtime (e.g., allocate more power to time slots with morefavorable channel conditions and vice versa). Since theslot duration is normalized to1, the transmission powercoincides with the energy consumption in each time slot.

• Long-Term Rate-Gain Constraint: Long-term rate-gainconstraints ensure that all D2D pairs eventually achievelarger rates through cooperation. In particular, for the casewithout cooperation, we assume that each D2D pair isallocated1/K of the total slot duration for transmission.In this case, an achievable rate for thek-th D2D pair inthe non-cooperative case is given by

1

Klog2

∣INr

+ Hk,k[t]Qnck [t]HH

k,k[t]∣

∣(14)

where Qnck [t] is the input covariance matrix at

DT k, Υnck [t] ∈ C

Nr×Nr is chosen such that((Υnc

k [t])HΥnck [t])−1=Hc,k[t]Qc[t]H

Hc,k[t]+σ2

nINr, and

Hk,k[t],Υnck [t]Hk,k[t]. Then, the maximum achievable

rate for thek-th D2D pair in the non-cooperative case isgiven by

Rnck [t], max

Qnck

[t]∈Qnc

1

Klog2

∣INr

+Hk,k[t]Qnck [t]HH

k,k[t]∣

∣,

(15)

where the maximization is performed over the set ofprecoding matrices satisfying both power and IT con-straints, i.e.,Qnc , Qnc

k [t] : tr(Qnck [t])/K ≤

Pk, tr(CGk,bQnc

k [t])/K ≤ ITk. Note that (15) is convexand, thus, can be solved efficiently using general purpose

IT 8.1
Typewritten text
IEEE Transactions on Wireless Communications Volume: 18 , Issue: 6 , June 2019
Page 5: sdprosolutions.com · 1 Yung-Shun Wang,Student Member, IEEE, Y.-W. Peter Hong,Senior Member, IEEE, and Wen-Tsuen Chen, Fellow, IEEE Abstract—This work proposes a dynamic precoding

5

solvers, e.g. CVX [46]. Hence, the long-term rate-gainconstraint for thek-th D2D pair is given by

Rk , limT→∞

1

T

T∑

t=1

E[Rk[t]]

≥ limT→∞

1

T

T∑

t=1

E[Rnck [t]] , Rnc

k . (16)

Let Ω(R) be the long-term utility, whereΩ(·) is a concave,continuous, and entry-wise non-decreasing function andR ,

[R1, . . . , RK ] is the vector of long-term average transmissionrates of the D2D pairs. For example, the utility functionΩ(·)can be defined asΩ(R) =

∑Kk=1 log Rk for proportional

fairness optimization or asΩ(R) =∑K

k=1 Rk for sum ratemaximization. Then, the problem is formulated as

maxQ

(1)k

[t],Q(2)k

[t],Rk[t],∀k,t

Ω(R) (17a)

subject to Q(1)k [t],Q

(2)k [t], Rk[t] ∈ Γ(H[t], ITk), (17b)

Pk ≤ Pk,avg, ∀k, (17c)

Rk ≥ Rnck , ∀k, t. (17d)

Let us denote the optimal objective value of this problemas ωopt, i.e., ωopt , Ω(R∗) with R∗ being the solution to(17). This problem is difficult to solve in practice since itgenerally requires noncausal CSI. However, a near-optimalpolicy can be obtained by adopting dynamic control andLyapunov optimization techniques [36], [37] as we showin the following sections. It is worthwhile to note that theCSI between DTs and DRs, and also that between all D2Dusers and the active uplink CU are required to compute theprecoders. This can be done by having DTs and DRs estimatethe channel matrices locally using pilot signals emitted byDTs and CU, and forward their local estimates to the nodeperforming the computation. This node can be either BS (inthe centralized case [5]–[8]) or DTs themselves. More efficientfeedback mechanisms, e.g., [47]–[49], can also be developedto reduce the overhead in practice. In this work, we assumethat perfect CSI is available at all nodes, and examine thegains that can be achieved under this ideal scenario. Theimpact of the CSI acquisition overhead and channel estimationimperfections will be further evaluated through simulations inSection V.

Remark 1. It is worthwhile to note that the optimizationproblem in (17) may not always be feasible due to the rate-gain and IT constraints. To ensure that these constraints canbe satisfied, the DTs should be sufficiently close to each othersuch that the overhead required for data-sharing is tolerableand should be sufficiently far from BS so that the transmitpower is not overly constrained by the IT constraint. Theseissues are related to studies of admission control [50], [51]and partner selection [52], [53], which are beyond the scopeof this article.

III. D YNAMIC BD-BASED TRANSMISSION POLICY FOR

COOPERATIVE D2D PAIRS

In this section, we solve the problem in (17) using theLyapunov optimization approach [36], [37]. This approach

leads to a solution in which the choice of the precodingscheme in each time slot, e.g.,Q(1)

k [t],Q(2)k [t], Rk[t] for

all k at time t, depends only on its current CSI and systemstates (and not on those of other time slots). The resultingoptimization problem in each time slot can also be decoupledinto K subproblems that can be solved in parallel at the DTs.The solution that is obtained, albeit suboptimal in general, canbe made arbitrarily close toωopt with an appropriate choice ofparameters. In particular, this is done by constructing virtualdata, rate-gain, and energy queues to record the system state,and by showing the equivalence between the stability of thesequeues and the feasibility of the long-term constraints.

Specifically, to adopt the Lyapunov optimization technique,we introduce auxiliary variablesAk[t], for all k and t, andmodify the problem in (17) as

maxQ

(1)k

[t],Q(2)k

[t],Rk[t],Ak[t],∀k,t

Ω(A) (18a)

subject to (17b), (17c), (17d), (18b)

Rk ≥ Ak, ∀k, (18c)

0 ≤ Ak[t] ≤ Ak,max, ∀k, t, (18d)

where Ω(A) , limT→∞1T

∑Tt=1 E[Ω(A[t])] and A[t] ,

[A1[t], . . . , AK [t]]. The constraints of the original problem areincluded above and, thus, are also satisfied by the solutionof the modified problem. LetQ(1)∗

k [t],Q(2)∗k [t], R∗

k[t], A∗k[t],

∀k and∀t, be the solution of the modified problem in (18). Itfollows that

Ω(R∗) ≥ Ω(A∗) ≥ Ω(A∗) ≥ ωopt(Amax), (19)

where A∗ , limT→∞1T

∑Tt=1 E[A

∗[t]], and ωopt(Amax)

(with Amax , [A1,max, . . . , AK,max]) is the optimal objectivevalue corresponding to the original problem in (17) withadditional constraints0 ≤ Rk ≤ Ak,max, for all k. The firstinequality follows from (18c) and the fact thatΩ(·) is non-decreasing; the second inequality follows from the concavityof Ω(·); and the last inequality holds since,Ak[t] = Rk ∈[0, Ak,max], for all k and t, yields a feasible policy for (18)(see also [36, Chapter 5]). This shows that the optimal ratesobtained from the modified problem can achieve at least asgood an objective value asωopt(Amax).

To solve the modified problem in (18), we first transformits long-term constraints (namely, (17c), (17d), and (18c)) intoqueue-stability problems for virtually constructed data queues,rate-gain queues, and energy queues. The data queue recordsthe amount of data in the transmission buffer, the rate-gainqueue records the amount of service that each user should beprovided in order to achieve a rate advantage over the non-cooperative case, and the energy queue records the amount ofenergy that each user has consumed in excess to its long-termpower constraint.

Let Dk[t] be the size of the virtual data queue of thek-th D2D pair at the beginning of slott, and letAk[t] (where0 ≤ Ak[t] ≤ Ak,max) andRk[t] be its arrival and departurein slot t. By letting D[t] , [D1[t], . . . , DK [t]] and R[t] ,[R1[t], . . . , RK [t]], the evolution of theK data queues can bewritten as

D[t+ 1] = (D[t]−R[t])+ +A[t], (20)

IT 8.1
Typewritten text
IEEE Transactions on Wireless Communications Volume: 18 , Issue: 6 , June 2019
Page 6: sdprosolutions.com · 1 Yung-Shun Wang,Student Member, IEEE, Y.-W. Peter Hong,Senior Member, IEEE, and Wen-Tsuen Chen, Fellow, IEEE Abstract—This work proposes a dynamic precoding

6

where (x)+ = [max0, x1, . . . ,max0, xn] for x ,

[x1, . . . , xn]. Moreover, letOk[t] be the size of the rate-gainqueue of DTk at the beginning of slott. Here, the arrival inslot t is the non-cooperative rateRnc

k [t] and the departure isthe cooperative rateRk[t]. The queue evolution can be writtenas

O[t+ 1] = (O[t]−R[t])+ +Rnc[t], (21)

where O[t] , [O1[t], . . . , OK [t]] and Rnc[t] ,

[Rnc1 [t], . . . , Rnc

K [t]]. The queue sizeOk[t] can be viewedas the credit that thek-th D2D pair earned by sharing itsresources to the cooperative transmission of other DTs’ data.The k-th D2D pair is likely to take on a larger share of thecooperative resources (i.e., transmit its own data at a higherrate) whenOk[t] is larger, and vice versa. Finally, letEk[t]be the size of thek-th virtual energy queue at the beginningof slot t. The arrival at timet is the transmit powerPk[t], andthe departure isPk,avg, which is constant for allt. By lettingE[t] , [E1[t], . . . , EK [t]], Pavg , [P1,avg, . . . ,PK,avg] andP[t] , [P1[t], . . . , PK [t]], the queue evolution can be writtenas

E[t+ 1] = (E[t]−Pavg)+ +P[t]. (22)

Here,Ek[t] can be interpreted as the amount of energy usedby DT k that is in excess to its per time slot budgetPk,avg.

Definition 1 ( [36]). For any k, the queueDk[t]∞t=1 (and,similarly, for Ok[t]∞t=1 andEk[t]∞t=1) is strongly stable if

lim supT→∞

1

T

T∑

t=1

E[Dk[t]] <∞, (23)

and is mean-rate stable if

limT→∞

E[Dk[T ]]

T= 0. (24)

Note that strong stability ensures that the queue-lengthsare bounded, and implies mean-rate stability as long as thedifference between the expected departure and arrival in eachtime slot is bounded [36, Theorem 2.8], which is satisfied inour case. On the other hand, mean-rate stability of the virtualqueues implies that the long-term constraints in (17c), (17d),and (18c) are satisfied [36, Theorem 2.5]. Hence, a feasiblesolution for (18) is a BD-based transmission policy thatensures mean-rate stability of the virtual queues while having0 ≤ Ak[t] ≤ Ak,max, for all k andt. The proposedmaximum-weighted-rate-minus-energy-penalty (Max-WRMEP)transmis-sion policy, to be described in the following, achieves thistask.Max-WRMEP Policy (at time slot t):

(i) Virtual Data Arrival A[t]: The virtual arrival A[t]at time t is obtained as the solution of the followingoptimization problem:

maxA[t]:0≤Ak[t]≤Ak,max,∀k

V Ω(A[t])−K∑

k=1

Dk[t]Ak[t], (25)

whereV > 0 is some predefined constant.(ii) BD Cooperative Precoding SchemeQ(1)

k [t],Q(2)k [t], Rk[t], ∀k: For each k, the BD

cooperative precoding scheme at timet is obtained asthe solution of the following optimization problem:

maxQ

(1)k

[t],Q(2)k

[t],Rk[t]

(Dk[t]+Ok[t])Rk[t]−η1tr(Ek[t]Q(1)k [t])

−η2tr(Θ[t]Q(2)k [t]) (26a)

subject toQ(1)k [t],Q

(2)k [t], Rk[t]∈Γ(H[t], ITk), (26b)

whereΘ[t] ,∑K

ℓ=1Eℓ[t]Θℓ. This problem can be solvedin parallel for theK D2D pairs.

(iii) Updates of QueuesD[t], O[t], and E[t]: The virtualqueues are updated according to (20), (21) and (22), usingthe solutions obtained in the previous steps.

Notice that the original problem in (17) involves the opti-mization of a long-term utility function under long-term powerand rate-gain constraints, which generally requires noncausalCSI and joint optimization of parameters over multiple timeslots. The proposed Max-WRMEP policy instead determinesthe BD cooperative precoding on a slot-by-slot and user-by-user basis, which makes the problem more tractable in prac-tice. Specifically, in (i), the virtual data arrivals are determinedby exploiting the tradeoff between maximizing the objectivefunction Ω(·) and reducing the backlogDk[t]. In particular,whenΩ(R) is chosen to be the average sum rate, i.e.Ω(R) ,∑K

k=1 Rk, the virtual data arrival is given byAk[t] = Ak,max,if V ≥ Dk[t], andAk[t] = 0, otherwise; and whenΩ(R) ,∑K

k=1 log(Rk), we haveAk[t] = min(V/Dk[t], Ak,max). In(ii), the input covariance matrices and rates are determinedbased on the queue states at that time. Here, more power isexpended to increase the effective rate of thek-th D2D pairif the data queue backlogDk[t] and/or the credit accumulatedthrough cooperationOk[t] is larger, whereas less power is usedif the violation of the energy budget (i.e.,Ek[t]) is too large.The queues are then updated in (iii).

In addition, let us consider a special class of stationary ran-domized policies, calledH-only transmission policies, wherethe transmission control actions in each time slot depend onlyon the channel stateH[t] at that time. It is defined formallyas follows.

Definition 2. An H-only transmission policy is a policy thatchooses, at each time slott, the control actionsAk[t] ∈[0, Ak,max] and Q(1)

k [t],Q(2)k [t], Rk[t] ∈ Γ(H[t], ITk), ∀k,

based only on the set of channel statesH[t] at that time.

We know from [36, Theorem 4.5] that, if (17) is feasible,then there exists anH-only transmission policy that performsarbitrarily close to the optimal solution. This policy is usedto show the optimality of our proposed Max-WRMEP trans-mission policy and the corresponding queue-length bounds asstated in the following theorems.

Theorem 1. Suppose that the problem in(17) is feasible.Then, under the proposed Max-WRMEP policy, the long-term constraints(17c), (17d), and (18c) are satisfied, and theresulting long-term average utility yields

lim infT→∞

Ω

(

1

T

T∑

t=1

E[R[t]]

)

≥ ωopt(Amax)−C

V. (27)

IT 8.1
Typewritten text
IEEE Transactions on Wireless Communications Volume: 18 , Issue: 6 , June 2019
Page 7: sdprosolutions.com · 1 Yung-Shun Wang,Student Member, IEEE, Y.-W. Peter Hong,Senior Member, IEEE, and Wen-Tsuen Chen, Fellow, IEEE Abstract—This work proposes a dynamic precoding

7

whereC is a positive constant specified in Appendix A.

The proof follows similar procedures as in [36], [37] and isgiven in Appendix A. Recall thatωopt(Amax) is the optimalobjective value of the problem in (17) with additional con-straints0 ≤ Rk ≤ Ak,max, for all k. Hence, Theorem 1 impliesthat, for Ak,max sufficiently large (or, more specifically, forAk,max ≥ Ropt

k , whereRoptk [t], ∀t, is the rate solution to the

original problem in (17)), the proposed Max-WRMEP policycan achieve a utility that is arbitrarily close to the optimalvalueωopt by settingV to be sufficiently large. In Theorem1, we have shown the mean-rate stability of the virtual queuesand the feasibility of the proposed policy. In the following,we further show the strong stability and boundedness of thevirtual queues.

Theorem 2. Suppose that, for anyǫ > 0, thereexists an H-only transmission policy (as per Defini-tion 2) with actions Ak(H[t]) ∈ [0, Ak,max], andQ(1)

k (H[t]),Q(2)k (H[t]), Rk(H[t]) ∈ Γ(H[t], ITk), for all k

and t, such that

E[Ak(H[t])−Rk(H[t])] ≤ −ǫ, (28)

E[Rnck [t]−Rk(H[t])] ≤ −ǫ, (29)

E[Pk(H[t])− Pk,avg] ≤ −ǫ, (30)

for all k and t, where Pk(H[t]) , η1tr(Q(1)k (H[t])) +

η2∑K

ℓ=1 tr(ΘkQ(2)ℓ (H[t])) is the transmit power. Then, the

queuesDk[t]∞t=1, Ok[t]∞t=1 andEk[t]∞t=1, for all k, arestrongly stable and are bounded as

lim supT→∞

1

T

T∑

t=1

K∑

k=1

(

E[Dk[t]] + E[Ok[t]] + E[Ek[t]])

≤ C + V (Ω(A) − ωǫ)

ǫ, (31)

whereωǫ , E[Ω(A(H[t]))] and C is the positive constantgiven in Theorem 1.

The proof is given in Appendix B. Theorem 2 shows that,if there exists a policy within the interior of the set of feasiblepolicies, then the queues are strongly stable with a bound onthe average queue length given in (31). This bound illustratesthe dependence of the average queue length onV , ǫ and thedifference betweenΩ(A) andωǫ. From the above theorems,we can see that, by choosingV to be sufficiently large, theutility value of the proposed policy can be made arbitrarilyclose to the optimal value, albeit at the cost of an increasedaverage queue length. The queue length affects the time thatis required for the time-averaged utility to become stable andapproach its limiting value. Also, if the performance of theproposed policy, i.e.,Ω(A), is close to that of anH-only policywith largeǫ, then the average queue length will be small. If theH-only policy obtains a solution that is close to the boundaryof the set of feasible policies (i.e., smallǫ), the upper boundof the average queue length becomes large and more timewould be required to achieve a stable time-averaged utilityvalue. Even though the theorems were obtained followingstandard procedures in Lyapunov optimization theory [36],

[37], they are necessary to establish the optimality of theproposed scheme and its performance bounds.

IV. M AXIMUM WRMEP PRECODING WITH SPATIALLY

WHITE MULTICAST INPUT

The Max-WRMEP policy proposed in the previous sectionallows the virtual data arrivals and the BD cooperative pre-coder in each time slot to be determined based only on thecurrent channel and queue states. However, the precoders inboth phases still require solving the optimization problem in(26) correctly. This is can be done using standard numericaloptimization toolboxes, such as CVX [46], which can beinefficient when the problem size is large. In this section, wefirst derive the optimal structure of the BD cooperative precod-ing matrix, and then propose a low-complexity approximatesolution that utilizes spatially white multicast input in phase1. Further analysis on the Lagrange multipliers in the lattercase leads to a more efficient iterative algorithm for solvingthe cooperative precoder in phase2.

Specifically, letH−k[t] , [HH1 [t], . . . , HH

k−1[t], HHk+1[t],

. . . , HHK [t]]H be the collection of effective channels asso-

ciated with all DRs other than DRk and let H−k[t] =Uk[t][Σk[t] 0][Vk[t] Vk[t]]

H be the singular value decompo-sition (SVD) of H−k[t], whereUk[t] ∈ C(K−1)Nr×(K−1)Nr

and [Vk[t] Vk[t]] ∈ CKNt×KNt are unitary matrices,and Σk[t] ∈ C(K−1)Nr×(K−1)Nr is a diagonal matrix ofsingular values. Here,Vk[t] ∈ CKNt×M ′

and Vk[t] ∈CKNt×KNt−M ′

, whereM ′ , KNt − (K − 1)Nr. It wasshown in [35] that, to satisfy the BD constraints in (8), thetransmit covariance matrixQ(2)

k [t] in phase2 must take on thefollowing structure

Q(2)k [t] = Vk[t]Q

(2)k [t]VH

k [t], (32)

for all k and t, whereQ(2)k [t] ∈ CM ′×M ′

is a positive semi-definite matrix. This implies that, to satisfy the BD constraint,the transmit signal for DRk should lie in the null space ofH−k[t]. By the optimal structure in (32), the phase-2 rateconstraint in (9) for thek-th D2D pair can be written as

Rk[t] ≤ η2 log2

∣INr

+ Hk[t]Vk[t]Q(2)k [t]VH

k [t]HHk [t]

∣(33)

whereHk[t]Vk[t] is the projection of the effective channel ma-trix Hk[t] onto the null space ofH−k[t]. In this case,Q(2)

k [t]is the transmit covariance matrix of the signal transmittedover the effective interference-free channelHk[t]Vk[t]. Noticethat KNt − (K − 1)Nr is the maximum number of paralleldata streams that can be transmitted while satisfying the BDconstraint and, thus, we choose the number of transmitted datastreamsM equal toM ′. Then, the optimization problem in(26) for finding the BD cooperative precoding scheme can be

IT 8.1
Typewritten text
IEEE Transactions on Wireless Communications Volume: 18 , Issue: 6 , June 2019
Page 8: sdprosolutions.com · 1 Yung-Shun Wang,Student Member, IEEE, Y.-W. Peter Hong,Senior Member, IEEE, and Wen-Tsuen Chen, Fellow, IEEE Abstract—This work proposes a dynamic precoding

8

written as

maxQ

(1)k

[t],Q(2)k

[t],Rk[t]

(Dk[t] +Ok[t])Rk[t]− η1tr(Ek[t]Q(1)k [t])

− η2tr(Θk[t]Q(2)k [t]) (34a)

subject to

Rk[t]≤η1log2

∣INt

+Gk,ℓ[t]Q(1)k [t]GH

k,ℓ[t]∣

∣, ∀ℓ 6= k, (34b)

Rk[t]≤η2log2

∣INr

+Hk[t]Vk[t]Q(2)k [t]VH

k [t]HHk [t]

∣, (34c)

η1tr(CGk,bQ

(1)k [t]) + η2tr(CGk,b

[t]Q(2)k [t]) ≤ ITk, (34d)

Q(1)k [t] 0, Q

(2)k [t] 0, Rk[t] ≥ 0, (34e)

for k = 1, . . . ,K, where Θk[t] , VHk [t]Θ[t]Vk[t], and

CGk,b[t] , VH

k [t]CGbVk[t]. This problem is convex and

can be solved by off-the-shelf solvers such as CVX [46].However, these general purpose solvers do not further exploitthe structure of this problem and the computational complexityrequired may increase with the number of D2D pairs.

To reduce the complexity of the design, we propose to adopta spatially white input for multicasting in phase1, whereQ

(1)k = αkINt

, for all k. This has been commonly adoptedin the literature on physical layer multicasting, e.g., in [54],to reduce the complexity of the precoder design and the CSIrequirement, and is known to perform well when the numberof users is large or sufficiently spread out. In this case, theLagrangian function can be written as

L(Rk, αk, Q(2)k , λk,ℓℓ 6=k, µk, δk)

= (Dk +Ok)Rk − η1EkNtαk − η2tr(

ΘkQ(2)k

)

−∑

ℓ 6=k

λk,ℓ

(

Rk − η1 log2

∣INt

+αkGk,ℓGHk,ℓ

)

− µk

(

Rk − η2 log2

∣INr

+ HkVkQ(2)k VH

k HHk

)

− δk

(

η1αktr(

CGk,b

)

+ η2tr(

CGk,bQ

(2)k

)

− ITk

)

, (35)

whereλk,ℓℓ 6=k, µk, and δk are the non-negative Lagrangemultipliers. The Lagrange dual function is given by

u(λk,ℓℓ 6=k, µk, δk) =

maxRk≥0,αk≥0,Q

(2)k

0

L(Rk, αk, Q(2)k , λk,ℓℓ 6=k, µk, δk) (36)

and the dual optimization problem can be written as

minλk,ℓ≥0,∀ℓ 6=k,µk≥0,δk≥0

u(λk,ℓℓ 6=k, µk, δk). (37)

By the stationarity condition with respect toRk, the optimalsolution must satisfy

Dk +Ok =∑

ℓ 6=k

λk,ℓ + µk. (38)

If Dk + Ok − µk = 0 (i.e., if λk,ℓ = 0 for all ℓ 6= k) at theoptimal point, the value ofαk that maximizes the Lagrangianfunction, regardless of the value of other parameters, is zero. Inthis case, the optimal rateRk is 0 and, thus, thek-th D2D pairremains silent. Otherwise, ifDk+Ok−µk > 0, we can defineλ′k,ℓ ,

λk,ℓ

Dk+Ok−µk, for all ℓ 6= k, such thatλ′

k,ℓ ≥ 0, for all

ℓ 6= k, and∑

ℓ 6=k λ′k,ℓ = 1. By the complementary slackness

condition, we know thatλk,ℓ > 0 (and, thus,λ′k,ℓ > 0) only

if

log2

∣INt

+ αkGk,ℓGHk,ℓ

∣≤ log2

∣INt

+ αkGk,ℓ′GHk,ℓ′

∣(39)

for all ℓ′ 6= k. Hence, we have∑

ℓ 6=k

λk,ℓ log2

∣INt

+ αkGk,ℓGHk,ℓ

= (Dk +Ok − µk)∑

ℓ 6=k

λ′k,ℓ log2

∣INt

+ αkGk,ℓGHk,ℓ

∣(40)

= (Dk +Ok − µk)minℓ 6=k

log2

∣INt

+ αkGk,ℓGHk,ℓ

∣. (41)

By (38) and (41), the dual optimization problem can bereformulated as

minµk≥0,δk≥0

maxαk≥0,Q

(2)k

0

η1

(Dk +Ok − µk)minℓ 6=k

log2

∣INt

+ αkGk,ℓGHk,ℓ

− [EkNt + δktr(

CGk,b

)

]αk

+ η2

µk log2

∣INr

+ HkVkQ(2)k VH

k HHk

− tr[(

Θk + δkCGk,b

)

Q(2)k

]

+ δkITk. (42)

It is interesting to observe that, at the optimal point, (34c)must be satisfied with equality since otherwise, we can alwayschooseRk to be larger or chooseQ(2)

k to be smaller to furtherincrease the objective value, which contradicts with the factthat the point is optimal. By the same argument, (34b) mustalso be satisfied with equality for someℓ. This implies that

η1 minℓ 6=k

log2

∣INt

+ αkGk,ℓGHk,ℓ

− η2 log2

∣INr

+ HkVkQ(2)k VH

k HHk

∣= 0 (43)

at the optimal point. Moreover, by the complementary slack-ness condition onδk, we also know that, at the optimal point,δk > 0 only if the IT constraint is active, i.e.,

η1αktr(

CGk,b

)

+ η2tr(

CGk,bQ

(2)k

)

− ITk = 0. (44)

Notice that the left-hand-side of (43) is weighted by−µk

in (42) and, thus, the maximization overαk and Q(2)k in

(42) must yield solutions that cause the left-hand-side of(43) to be non-increasing with respect toµk. Similarly, thesesolutions must also cause the left-hand-side of (44) to benon-increasing with respect toδk. Hence, when the IT con-straint is active (i.e., whenδk > 0), the optimalµk andδk can be found by employing a two-dimensional bisectionsearch [55] aiming towards findingµk ∈ [0, Dk + Ok] andδk ∈ [0, δk,up] that satisfies (43) and (44), whereδk,up ,

Dk+Ok

tr(CGk,b) ln 2 maxℓ 6=k tr(Gk,ℓG

Hk,ℓ) − EkNt

tr(CGk,b) . Notice that,

when δk = δk,up, the objective function in (42) is non-increasing with respect toαk ≥ 0 regardless of the choiceof µk andQ(2)

k . On the other hand, when the IT constraint is

IT 8.1
Typewritten text
IEEE Transactions on Wireless Communications Volume: 18 , Issue: 6 , June 2019
Page 9: sdprosolutions.com · 1 Yung-Shun Wang,Student Member, IEEE, Y.-W. Peter Hong,Senior Member, IEEE, and Wen-Tsuen Chen, Fellow, IEEE Abstract—This work proposes a dynamic precoding

9

inactive, the problem reduces to a one-dimensional bisectionsearch overµk ∈ [0, Dk +Ok].

In each iteration of the bisection search, whereµk and δkare given, the optimal transmit powerαk in phase1 can befound by solving the following optimization problem:

maxαk≥0

(Dk +Ok − µk)minℓ 6=k

log2

∣INt

+ αkGk,ℓGHk,ℓ

−[

EkNt+δktr(CGk,b)]

αk

= maxαk≥0

(Dk +Ok − µk)minℓ 6=k

Nt∑

n=1

log2

(

1 + αkς2k,ℓ,n

)

−[

EkNt + δktr(CGk,b)]

αk

, (45)

whereςk,ℓ,nNt

n=1 are the singular values ofGk,ℓ. The optimalαk can be found by simple convex optimization procedures forsingle parameter optimization [56]. For example, we can adoptthe bisection line search overαk ∈ [0, αk,up], whereαk,up canbe chosen such that an upper bound of the derivative at thispoint is 0, i.e.,

(Dk +Ok − µk)Nt

αk,up ln 2− [EkNt + δktr(CGk,b

)] = 0. (46)

In this case, we have

αk,up ,(Dk +Ok − µk)Nt

[EkNt + δktr(CGk,b)] ln 2

. (47)

Moreover, the optimalQ(2)k can be found by solving the

following optimization problem:

maxQ

(2)k

0

µk log2

∣INr

+ HkVkQ(2)k VH

k HHk

− tr[

(Θk + δkCGk,b)Q

(2)k

]

. (48)

Notice that the optimalδk must be positive to makeΘk +δkCGk,b

full rank (if Θk is not) since, otherwise, (48) could

become unbounded by takingQ(2)k = βkvv

H with βk →∞,wherev is the eigenvector corresponding to the zero eigen-value ofΘk. By letting Q

(2)k , (Θk + δkCGk,b

)12 Q

(2)k (Θk +

δkCGk,b)

H2 , the problem in (48) can be written as

maxQ

(2)k

0

µk log2

∣INr

+ HkQ(2)k HH

k

∣− tr

(

Q(2)k

)

(49)

whereHk , HkVk(Θk+δkCGk,b)−

12 . Let Hk = UkΣkV

Hk

be the SVD ofHk, whereΣk = diagσk,1, . . . , σk,M ′, Uk

is anNr ×M ′ semi-unitary matrix, andVk is anM ′ ×M ′

unitary matrix. By Hadamard’s inequality [57], the optimalQ

(2)k must take on the form

Q(2)k = VkBkV

Hk , (50)

whereBk = diag(βk,1, . . . , βk,M ′). In this case, the optimiza-tion problem further reduces to the following form:

maxβk,m≥0,∀m

µk

M ′

m=1

log2

(

1 + βk,mσ2k,m

)

−M ′

m=1

βk,m. (51)

Algorithm 1 BD Cooperative Precoding with Spatially WhiteMulticast Input- Set δk,low ← 0 and δk,up ←

Dk+Ok

tr(CGk,b) ln 2 maxℓ 6=k tr(Gk,ℓG

Hk,ℓ)− EkNt

tr(CGk,b) .

- If rank(Θk) = M ′, then setδk ← 0. Else, setδk ← (δk,low+δk,up)/2.while δk,up − δk,low > ǫ

- Setµk,low ← 0, µk,up ← Dk +Ok, andµk ← (µk,low +µk,up)/2.while µk,up − µk,low > ǫ

- Compute the singular valuesσk,mM′

m=1 of Hk.- Computeβk,m ←

(

µk

ln 2 − 1σ2k,m

)+, for all m, and

Rk,2 ← η2∑M ′

m=1 log2(1 + σ2k,mβk,m).

- Computeαk by solving (45) with the bisection linesearch overαk ∈ [0, αk,up], whereαk,up is defined in(47).

- ComputeRk,1 ← η1 minℓ 6=k

∣INt

+ αkGk,ℓGHk,ℓ

∣.

- Setµk,low ← µk, if Rk,1 > Rk,2, and setµk,up ← µk,otherwise. Updateµk ← µk,low+µk,up

2 .

end while- Set δk,low ← δk, if η1αktr

(

CGk,b

)

+ η2tr(

CGk,bQ

(2)k

)

≥ITk, and setδk,up ← δk, otherwise. Updateδk ← (δk,low +δk,up)/2.end while

The solution is given by

βk,m =

(

µk

ln 2− 1

σ2k,m

)+

, (52)

for m = 1, . . . ,M ′. It is necessary to note that the so-lution depends onδk through the values ofσ2

k,m, ∀m,since δk is embedded inHk. By summarizing the above,the optimal solution forQ(2)

k is given by Q(2)k = (Θk +

δkCGk,b)−

12 VkBkV

Hk (Θk + δkCGk,b

)−H2 . The optimal rate

is then given by

Rk = min

minℓ 6=k

η1 log2

∣INt

+ αkGk,ℓGHk,ℓ

∣,

η2 log2

∣INr

+ HkVkQ(2)k VH

k HHk

. (53)

The proposed BD cooperative precoding scheme with spa-tially white multicast input is summarized in Algorithm 1.Specifically, in Algorithm 1, we first check whether or notΘk, i.e., if rank(Θk) = M ′. If so, then the solution ofµk,αk, andβk,mM

m=1 are computed forδk = 0. If the solutionin this case yieldsη1αktr

(

CGk,b

)

+ η2tr(

CGk,bQ

(2)k

)

<ITk, then we are done. If not, then the algorithm con-tinues with the bisection search overδk between the ini-tial lower and upper boundsδk,low = 0 and δk,up =

Dk+Ok

tr(CGk,b) ln 2 maxℓ 6=k tr(Gk,ℓG

Hk,ℓ)− EkNt

tr(CGk,b) .

V. NUMERICAL COMPARISON

In this section, we evaluate the performance of the proposedMax-WRMEP policy through computer simulations. Notice

IT 8.1
Typewritten text
IEEE Transactions on Wireless Communications Volume: 18 , Issue: 6 , June 2019
Page 10: sdprosolutions.com · 1 Yung-Shun Wang,Student Member, IEEE, Y.-W. Peter Hong,Senior Member, IEEE, and Wen-Tsuen Chen, Fellow, IEEE Abstract—This work proposes a dynamic precoding

10

0 200 400 600 800 1000 1200 1400 1600 1800 20000

2

4

6

8

10

12

14

Amax

= 100, V = 2.5*107

Amax

= 10, V = 2.5*107

Amax

= 100, V = 1.5*107

Amax

= 10, V = 1.5*107

Average Rate Without Cooperation

Fig. 2. Convergence of the average sum rate over time.

that cooperative D2D transmission is suitable for cases wherethe DTs are located close to each other, e.g., within a certainhot spot [29]–[32]. To focus on such a scenario, we assumein these experiments that the DTs are distributed according toa uniform distribution within a circular hot spot of radiusd1meters centered at location(−150,−150) and the DRs arealso uniformly distributed within a ring distanced betweend2 and d3 meters from the center of the hot spot. The BSis located at the origin and the active cell user is locatedrandomly according to a uniform distribution within a circulararea of radiusR0 = 300 meters. The center of the hot spot(−150,−150) is only chosen so that it is more or less inthe middle between the center and the edge of the cell. Thenumber of transmit antennas at each DT and that at the CU,i.e., Nt and Nc, are both equal to3, and the number ofreceive antennas at each DR and that at BS areNr = 3and Nb = 3K, respectively, whereK is number of D2Dpairs. The entries inGk,ℓ are assumed to be i.i.d.CN (0, d−2

k,ℓ),where dk,ℓ is the distance between nodesk and ℓ. Thestatistics of other channel matrices are given similarly. Theresults are averaged over20 different user locations and104

channel realizations per location. Moreover,Qc[t] is chosento maximize the point-to-point transmission rate between CUand BS in the absence of D2D interference under the transmitpower constraintPCU = tr(Qc[t]) = 24 dBm. The noisepower is σ2

n = −110 dBm at all nodes. The IT constraintis set asITk =

√10PCU300

−2/K, for all k, so that a targetSINR of−5 dB can be achieved by cell edge users [58].

In Figs. 2 and 3, the convergence of the proposed algorithmis shown in terms of the average sum rate and the averagetransmit power for the case where DTs are equally spacedon the boundary of a circle with radius1.5m centered at(−150,−150), DRs are35m away from the center (alignedwith their corresponding DTs), and CU is placed at(200, 0).The long-term average transmit power constraintPk,avg isset as5 dBm. Recall from (58) and (59) that the proposedLyapunov optimization method aims to minimize an upperbound of the drift minus theV -weighted objective value.Hence, a larger utility (i.e., sum rate) is achieved with a largerchoice ofV . This is also shown explicitly in Theorem 1. Infact, whenV is large, less emphasis is put on minimizing the

0 200 400 600 800 1000 1200 1400 1600 1800 20000

0.5

1

1.5

2

2.5

3

3.5

Long-term Power Constraint

Amax

= 100, V = 2.5*107

Amax

= 10, V = 2.5*107

Amax

= 100, V = 1.5*107

Amax

= 10, V = 1.5*107

Fig. 3. Convergence of the average transmit power over time

-5 0 5 10 150

2

4

6

8

10

12

14

16

18Max-WRMEP Policy, d = 1Max-WRMEP Policy, d = 3Max-WRMEP Policy, d = 5Max-WRMEP with SWI, d = 1Max-WRMEP with SWI, d = 3Max-WRMEP with SWI, d = 5No Cooperation, d = 1No Cooperation, d = 3No Cooperation, d = 5

1

1

1

1

1

1

1

1

1

Fig. 4. Average sum rate comparison for different values ofd1 with K = 4,d2 = 30, andd3 = 40.

drift and, thus, the average transmit power (i.e., the arrival intothe virtual energy queue) will be larger. This results in a largerbacklog for other queues as well, as indicated in Theorem2. We can also see that a larger utility can be achieved bychoosingAmax to be larger since, in this case, the additionalconstraint on the data arrival is loosened and, thus, the solutionbecomes closer to that of the original problem in (17).

In Figs. 4 and 5, the average sum rate of the proposedMax-WRMEP with spatially white input (Max-WRMEP withSWI) is compared to that of the case with no cooperation fordifferent choices ofd1 andd2, respectively. Specifically, in Fig.4, we show the average sum rate versus the average transmitpower constraint per DT for the case withK = 4, d2 = 30,d3 = 40, and different values ofd1. The proposed Max-WRMEP policy with optimized multicast input in problem(34), which is solved numerically by CVX, is also shownfor comparison. Due to higher computational complexity, theresults obtained from CVX are only averaged over20 differentuser locations and5000 channel realizations per location. Wecan observe that the average sum rate is larger whend1is smaller (i.e., when the phase1 transmission rate can behigher). Notice that the average sum rate for the case withno cooperation is not significantly affected by the choice ofd1 since there is no need for data exchange among DTs. Wecan also see that the low-complexity Max-WRMEP with SWI

IT 8.1
Typewritten text
IEEE Transactions on Wireless Communications Volume: 18 , Issue: 6 , June 2019
Page 11: sdprosolutions.com · 1 Yung-Shun Wang,Student Member, IEEE, Y.-W. Peter Hong,Senior Member, IEEE, and Wen-Tsuen Chen, Fellow, IEEE Abstract—This work proposes a dynamic precoding

11

-5 0 5 10 150

2

4

6

8

10

12

14

16

18

Max-WRMEP with SWI, d = 10Max-WRMEP with SWI, d = 20Max-WRMEP with SWI, d = 30No Cooperation, d = 10No Cooperation, d = 20No Cooperation, d = 30

2

2

2

2

2

2

Fig. 5. Average sum rate comparison for different values ofd2 with K = 4,d1 = 3, andd3 = d2 + 10.

-5 0 5 10 150

2

4

6

8

10

12

14

16

18

Max-WRMEP with SWI, 5 PairsMax-WRMEP with SWI, 4 PairsMax-WRMEP with SWI, 3 PairsNo Cooperation, 5 PairsNo Cooperation, 4 PairsNo Cooperation, 3 Pairs

Fig. 6. Average sum rate comparison for differentK, with d1 = 3, d2 = 30,andd3 = 40.

policy performs close to the optimal Max-WRMEP policysolved by CVX. Similarly, in Fig. 5, we show the average sumrate versus the average transmit power constraint per DT forthe case withK = 4, d1 = 3, and different values ofd2 (and,thus,d3, which is set asd2 + 10). In this case, larger averagesum rates are also observed for smaller values ofd2. In bothfigures, we can see that, even though the average sum ratesincrease withPk,avg, they eventually saturate (forPk,avg ≥ 10dBm) due to the IT constraint.

In Fig. 6, we show the average sum rate versus the averagetransmit power constraint per DT for the case withd1 = 3,d2 = 30, d3 = 40, and different values ofK. We can seethat, for both cases with and without cooperation, the averagesum rate increases monotonically withPk,avg, but saturatesearlier whenK is larger since the total interference that canbe allowed at the BS is fixed. For the case without cooperation,this effect causes the case withK = 3 to outperform the casewith K = 4, K = 5 for Pk,avg that is sufficiently large.

Up to this point, we have focused on the ideal scenariowhere perfect CSI is available for the computation of theprecoding matrices. In particular, the CSI required for thiscomputation can be denoted byCSI1 toCSI5, as defined at thebottom of Fig. 7. In practice, the channel acquisition procedurerequires non-negligible overhead for pilot signalling and CSIfeedback. For example, by considering the case where the

CSI1: CSI4:

CSI2: CSI5:

CSI3:

DTs to BS:

CSI1, CSI3

DRs to BS:

CSI2, CSI4

BS to DTs:

precodersData TransmissionBS-based

Approach

Data TransmissionDT-based

Approach

No

Cooperation

DTs to DTs:

CSI1, CSI3, CSI5

DRs to DTs:

CSI2, CSI4

Data Transmission

1077 channel use173 channel use

1110 channel use140 channel use

1214 channel use36

DRs to DTs:

CSI2, CSI4

DTs send

pilots

Fig. 7. Example of frame structure for channel acquisition.

computation is performed at BS (i.e., the BS-based approach),the required CSI can be acquired as follows4:

Step 1: DTs take turns emitting their respective pilot sym-bols to other DTs, DRs, and BS. (This enables DTs toestimateCSI3, DRs to estimateCSI4, and BS to estimateCSI5).

Step 2: DTs take turns broadcasting their local estimates ofCSI1 andCSI3 to BS.

Step 3: DRs take turns broadcasting their local estimates ofCSI2 andCSI4 to BS.

Step 4: BS computes and broadcasts the precoders

W(1)k [t] andW(2)

k [t] to DTs.Note that one can also consider the DT-based approach

where the computation is performed directly at DTs. In thiscase, Step 4 can be avoided since the precoders are computeddirectly at the DTs. In the conventionalnon-cooperativecase,CSI1, CSI2, part of CSI4 (i.e., the intra-pair channels), andCSI5 are also required at the DTs to compute their respec-tive precoding matrices. Hence, onlyCSI3 and the inter-pairchannels inCSI4 are additional requirements for cooperation.The frame structure for the abovementioned CSI acquisitionprocedure is illustrated in Fig. 7.

Let us consider the case withK = 4 D2D pairs,Nt =Nr = Nc = 3 antennas at each DT, DR and CU, andNb =KNt = 12 antennas at BS. We assume that each complexvalue is quantized into32 bits (i.e.,16 bits each for the real andthe imaginary parts). By approximating the transmission ratebetween nodesa and b, for a, b ∈ BS,DT,DR, asRa,b =Nt log(1 + Pa/(d

2a,bσ

2n)), and by setting the transmit powers

as PDT = PDR = 24 dBm andPBS = 40 dBm, and thedistances asdDR,BS = dDT,BS + 30 = 250 m anddDT,DR =dDT,DT + 40 = 50 m (i.e., the maximum distances betweendifferent types of nodes in our experiments), the total numberof channel uses required for channel acquisition and feedbackis 173 for the BS-based approach and140 for the DT-basedapproach. By considering a channel with bandwidthW = 1MHz and coherence timeTc = 2.5 ms (i.e., the case with usermobility equal to64 km/hr [59]), the overhead occupies13.8and 11.2 percent of the coherence interval of1250 channeluses respectively for the BS-based and DT-based approaches.

In Fig. 8, we show the impact of the channel acquisitionoverhead as well as the channel estimation imperfections for

4Note that DTs’ estimate ofCSI1 andCSI5 and DRs’ estimate ofCSI2can be obtained by overhearing the pilot signals emitted by CU and BS inthe uplink and downlink frames. Hence, they are assumed to be available attheir respective locations and, thus, are not considered explicitly in the D2Dchannel acquisition procedure described here.

IT 8.1
Typewritten text
IEEE Transactions on Wireless Communications Volume: 18 , Issue: 6 , June 2019
Page 12: sdprosolutions.com · 1 Yung-Shun Wang,Student Member, IEEE, Y.-W. Peter Hong,Senior Member, IEEE, and Wen-Tsuen Chen, Fellow, IEEE Abstract—This work proposes a dynamic precoding

12

-5 0 5 10 150

2

4

6

8

10

12

14

16

Max-WRMEP with SWI, No Exchange Overhead, Perfect CSIMax-WRMEP with SWI, No Exchange Overhead, P = 10 dBmMax-WRMEP with SWI, DT-based Approach, Perfect CSIMax-WRMEP with SWI, DT-based Approach, P = 10 dBmMax-WRMEP with SWI, BS-based Approach, Perfect CSIMax-WRMEP with SWI, BS-based Approach, P = 10 dBmNo Cooperation, No Exchange Overhead, Perfect CSINo Cooperation, with CSI Exchange Overhead, P = 10 dBm

E

E

E

E

Fig. 8. Average sum rate in the presence of channel acquisition overhead andimperfect CSI forK = 4, d1 = 3, d2 = 20, and d3 = 30. The MMSEestimator with pilot powerPE = 10 dBm is adopted here when channelestimation is considered.

the case whereK = 4, d1 = 3 m, d2 = 20 m, andd3 = 30 m. Here, we assume that the estimated channelmatricesGℓ,k[t] andHℓ,k[t], for all ℓ, k, are used to computethe precoding matrices, and adopt the rate expressions in [60],[61], where the channel estimation error plus interferenceis treated as Gaussian noise. We can see that the proposedscheme still outperforms the non-cooperation case even whentaking into account the overhead required for CSI acquisitionand feedback, and the impact of imperfect CSI.

VI. CONCLUSION

In this paper, a dynamic cooperative transmission policywas proposed for multiple underlaying D2D pairs using Lya-punov optimization. The proposed policy employs a two-phase transmission scheme that consists of adata-sharingtransmissionin phase1 and acooperative joint transmissionin phase2. The transmit precoders in both phases were jointlydesigned with the goal of maximizing the sum utility ofthe average transmission rates subject to long-term individ-ual power constraints, long-term rate-gain constraints, andinstantaneous IT constraints. By adopting the framework ofLyapunov optimization, virtual data, rate-gain, and energyqueues were constructed to record the temporal states of thesystem. By doing so, the long-term cooperative precodingproblems were reduced to solving a series of short-termweighted-rate-minus-energy-penalty (WRMEP)maximizationsubproblems. A low-complexity cooperative precoding schemewas proposed by assuming spatially white multicast inputin phase1. Theoretical performance guarantees and boundson the virtual queue backlogs were also derived. Finally, theeffectiveness of the proposed policies was evaluated throughcomputer simulations. In addition to the cooperative transmis-sion scheme proposed in this work, the problem of determiningwho can or should join the cooperative group of D2D pairs(i.e., issues of admission control and partner selection) can alsobe studied on top of our proposed cooperative transmissionscheme. Moreover, the framework can also be extended tocases with multiple cooperative groups of D2D pairs, in whichcase, the interference coordination among different cooperative

groups and the group association problem should be furtherexamined.

APPENDIX APROOF OFTHEOREM 1

Let S[t] , D[t],O[t],E[t] be the state of the virtualqueues at timet and let the Lyapunov function be definedas

L(S[t]) , 1

2

K∑

k=1

D2k[t] +

1

2

K∑

k=1

O2k[t] +

1

2

K∑

k=1

E2k[t]. (54)

Its one-slot conditional Lyapunov drift is then given by∆(S[t]) , E

[

L(S[t+ 1])− L(S[t]) | S[t]]

.First, by taking the square on both sides of (20), we have

D2k[t+ 1]≤(Dk[t]−Rk[t])

2+A2k[t]+2Ak[t](Dk[t]−Rk[t])

+

≤D2k[t]+R2

k[t]−2Dk[t]Rk[t]+A2k[t]+2Ak[t]Dk[t].

It follows that D2k[t + 1] − D2

k[t] ≤ R2k[t] + A2

k[t] −2Dk[t](Rk[t]−Ak[t]). By summing overk and by taking thecondition expectation givenS[t], we get

1

2E

[ K∑

k=1

D2k[t+ 1]−

K∑

k=1

D2k[t]

S[t]]

≤ 1

2

K∑

k=1

E

[

R2k[t] +A2

k[t]∣

∣S[t]

]

−K∑

k=1

Dk[t]E[

Rk[t]−Ak[t]∣

∣S[t]

]

. (55)

Notice thatAk[t] ≤ Ak,max and that, due to the IT constrainton the transmit power and by the boundedness assumption onthe channel gains, the ratesRk[t] are bounded as well. Let usdenote the bound on the transmission rate byRk,max[t], whichmay depend on the channel state at that time. Hence, the firstterm in (55) can be bounded as

1

2

K∑

k=1

E

[

R2k[t] +A2

k[t]∣

∣S[t]

]

≤ 1

2

K∑

k=1

E

[

R2k,max[t]

]

+1

2

K∑

k=1

A2k,max , C1, (56)

where C1 is a bounded constant sinceRk,max[t]∞t=1 isstationary. It follows that

1

2E

[ K∑

k=1

D2k[t+ 1]−

K∑

k=1

D2k[t]

S[t]]

≤ C1 −K∑

k=1

Dk[t]E[

Rk[t]−Ak[t]∣

∣S[t]

]

. (57)

Similarly, we have12E[∑K

k=1 O2k[t+1]−∑K

k=1 O2k[t]∣

∣S[t]]

≤C2−

∑Kk=1 Ok[t]E

[

Rk[t]−Rnck [t]

∣S[t]]

and 12E[∑K

k=1 E2k [t+

1] − ∑Kk=1 E

2k[t]∣

∣S[t]]

≤ C3 −∑K

k=1 Ek[t]E[

Pk,avg −Pk[t]

∣S[t]]

, whereC2 andC3 are bounded constants.

IT 8.1
Typewritten text
IEEE Transactions on Wireless Communications Volume: 18 , Issue: 6 , June 2019
Page 13: sdprosolutions.com · 1 Yung-Shun Wang,Student Member, IEEE, Y.-W. Peter Hong,Senior Member, IEEE, and Wen-Tsuen Chen, Fellow, IEEE Abstract—This work proposes a dynamic precoding

13

It thus follows from the definition of the Lyapunov drift andthe inequalities above that

∆(S[t]) − V E[

Ω(A[t])∣

∣S[t]]

− C

≤K∑

k=1

E

[

Dk[t]Ak[t] +Ok[t]Rnck [t]− Ek[t]Pk,avg

∣S[t]

]

−K∑

k=1

E

[

Dk[t]Rk[t] +Ok[t]Rk[t]− Ek[t]Pk[t]∣

∣S[t]

]

− V E[

Ω(A[t])∣

∣S[t]]

, (58)

where C , C1 + C2 + C3. Here, an additional termV E[

Ω(A[t])∣

∣S[t]]

is subtracted from both sides of the inequal-ity. By substitutingPk[t] with that in (13) and by rearrangingthe terms, the right-hand-side can be written as

− E

[

VΩ(A[t]) −K∑

k=1

Dk[t]Ak[t]∣

∣S[t]

]

−K∑

k=1

E

[

(Dk[t] +Ok[t])Rk[t]− η1tr(Ek[t]Q(1)k [t])

− η2tr(

K∑

ℓ=1

Eℓ[t]ΘℓQ(2)k [t]

)∣

∣S[t]

]

+

K∑

k=1

E

[

Ok[t]Rnck [t]− Ek[t]Pk,avg

∣S[t]

]

, (59)

which is minimized by (25) and (26) of the proposed Max-WRMEP policy. Hence, for any other alternative policy thatyields arrival A′

k[t], ∀k such that0 ≤ A′k[t] ≤ Ak,max,

for all k, transmission ratesR′k[t], ∀k, and transmit powers

P ′k[t], ∀k, it holds that

∆(S[t]) − V E[

Ω(A[t])∣

∣S[t]]

− C

≤K∑

k=1

E

[

Dk[t]A′k[t] +Ok[t]R

nck [t]− Ek[t]Pk,avg

∣S[t]

]

−K∑

k=1

E

[

Dk[t]R′k[t] +Ok[t]R

′k[t]− Ek[t]P

′k[t]∣

∣S[t]

]

− V E

[

Ω(A′[t])|S[t]]

, (60)

whereA′[t] = [A′1[t], . . . , A

′K [t]].

Note that the feasibility of (17) in the premise of the theoremimplies the feasibility of (18). Therefore, by [36, Theorem4.5], we know that, for anyδ > 0 there exists anH-onlypolicy (as per Definition 2) withAk(H[t]) ∈ [0, Ak,max],∀k, and Q(1)

k (H[t]),Q(2)k (H[t]), Rk(H[t]) ∈ Γ(H[t], ITk),

∀k, t, such that

− E[Ω(A′[t])] ≤ −ωopt(Amax) + δ, (61)

E[A′k[t]−R′

k[t]] ≤ δ, ∀k, (62)

E[Rnck [t]−R′

k[t]] ≤ δ, ∀k, (63)

E[P ′k[t]− Pk,avg] ≤ δ, ∀k. (64)

By plugging the above inequalities into (60) and by takingδ → 0, we have

∆(S[t])− V E[

Ω(A[t])∣

∣S[t]]

≤ C − V ωopt(Amax). (65)

Then, by taking the expectation, summing overt, and rear-ranging the terms, we have

1

T

T∑

t=1

E[

Ω(A[t])]

≥ ωopt(Amax)−C

V− E

[

L(S[1])]

V T.

Therefore, withL(S[1]) < ∞, it follows from Jensen’sinequality that

lim infT→∞

Ω

(

1

T

T∑

t=1

E[A[t]]

)

≥ ωopt(Amax)−C

V. (66)

Also, by rearranging (65) and by the fact thatE[

Ω(A[t])∣

∣S[t]]

≤ Ω(Amax), we have

∆(S[t]) ≤ C + V (Ω(Amax)− ωopt(Amax)). (67)

Hence, by [36, Theorem 4.1], we know that all queues aremean rate stable which implies that the long-term constraintsin (17c), (17d), and (18c) are achieved. The bound in (27) thusfollows from (18c), (66), and the fact thatΩ(·) is continuousand entry-wise non-decreasing.

APPENDIX BPROOF OFTHEOREM 2

By plugging the inequalities in (28)-(30) into (60), we have

∆(S[t]) − V E[

Ω(A[t])∣

∣S[t]]

− C

≤K∑

k=1

E[Dk[t](Ak(H[t])−Rk(H[t]))∣

∣S[t]]

+

K∑

k=1

E[Ok[t](Rnck [t]−Rk(H[t]))

∣S[t]]

+

K∑

k=1

E[Ek[t](Pk(H[t])−Pk,avg)∣

∣S[t]]−V E[Ω(A(H[t]))]

≤ −ǫK∑

k=1

E[

(Dk[t]+Ok[t]+Ek[t])∣

∣S[t]]

−V ωǫ. (68)

By taking the expectation, the time average overt, and byrearranging the terms, we get

ǫ1

T

T∑

t=1

E[

K∑

k=1

(Dk[t] +Ok[t] + Ek[t])]

− C

≤ V1

T

T∑

t=1

E[

Ω(A[t])]

− V ωǫ +E[

L(S[1])]

T. (69)

Then, by taking the limit on both sides and dividing byǫ, weobtain

lim supT→∞

1

T

T∑

t=1

K∑

k=1

(

E[Dk[t]] + E[Ok[t]] + E[Ek[t]])

≤ C + V (Ω(A) − ωǫ)

ǫ. (70)

It thus follows by Definition 1 that the queuesDk[t]∞t=1,Ok[t]∞t=1 andEk[t]∞t=1, for all k, are strongly stable.

IT 8.1
Typewritten text
IEEE Transactions on Wireless Communications Volume: 18 , Issue: 6 , June 2019
Page 14: sdprosolutions.com · 1 Yung-Shun Wang,Student Member, IEEE, Y.-W. Peter Hong,Senior Member, IEEE, and Wen-Tsuen Chen, Fellow, IEEE Abstract—This work proposes a dynamic precoding

14

REFERENCES

[1] A. Asadi, Q. Wang, and V. Mancuso, “A survey on device-to-devicecommunication in cellular networks,”IEEE Commun. Surveys Tuts.,vol. 16, pp. 1801–1819, Fourthquarter 2014.

[2] K. Doppler, M. Rinne, C. Wijting, C. B. Ribeiro, and K. Hugl, “Device-to-device communication as an underlay to LTE-advanced networks,”IEEE Commun. Mag., vol. 47, pp. 42–49, Dec. 2009.

[3] P. Janis, V. Koivunen, C. B. Ribeiro, K. Doppler, and K. Hugl,“Interference-avoiding MIMO schemes for device-to-device radio un-derlaying cellular networks,” inProc. of IEEE PIMRC, pp. 2385–2389,Sept. 2009.

[4] H. Min, J. Lee, S. Park, and D. Hong, “Capacity enhancement using aninterference limited area for device-to-device uplink underlaying cellularnetworks,”IEEE Trans. Wireless Commun., vol. 10, pp. 3995–4000, Dec.2011.

[5] C. Yu, K. Doppler, C. B. Ribeiro, and O. Tirkkonen, “Resource sharingoptimization for device-to-device communication underlaying cellularnetworks,” IEEE Trans. Wireless Commun., vol. 10, pp. 2752–2763,Aug. 2011.

[6] A. Ramezani-Kebrya, M. Dong, B. Liang, G. Boudreau, and S. H. Seyed-mehdi, “Joint power optimization for device-to-device communicationin cellular networks with interference control,”IEEE Trans. WirelessCommun., vol. 16, pp. 5131–5146, Aug. 2017.

[7] G. Yu, L. Xu, D. Feng, R. Yin, G. Y. Li, and Y. Jiang, “Joint modeselection and resource allocation for device-to-device communications,”IEEE Trans. Commun., vol. 62, pp. 3814–3824, Nov. 2014.

[8] Y. Huang, A. A. Nasir, S. Durrani, and X. Zhou, “Mode selection,resource allocation, and power control for D2D-enabled two-tier cellularnetwork,” IEEE Trans. Commun., vol. 64, pp. 3534–3547, Aug. 2016.

[9] S. Shalmashi, G. Miao, and S. B. Slimane, “Interference managementfor multiple device-to-device communications underlaying cellular net-works,” in Proc. of IEEE PIMRC, pp. 223–227, Sept. 2013.

[10] S. Shalmashi, G. Miao, Z. Han, and S. B. Slimane, “Interferenceconstrained device-to-device communications,” inProc. of IEEE ICC,pp. 5245–5250, June 2014.

[11] C. Yang, J. Li, P. Semasinghe, E. Hossain, S. M. Perlaza, and Z. Han,“Distributed interference and energy-aware power control for ultra-denseD2D networks: a mean field game,”IEEE Trans. Wireless Commun.,vol. 16, pp. 1205–1217, Feb. 2017.

[12] A. Sendonaris, E. Erkip, and B. Aazhang, “User cooperation diversity.part i. system description,”IEEE Trans. Commun., vol. 51, pp. 1927–1938, Nov. 2003.

[13] J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversityin wireless networks: efficient protocols and outage behavior,”IEEETrans. Inf. Theory, vol. 50, pp. 3062–3080, Dec. 2004.

[14] A. Scaglione and Y.-W. Hong, “Opportunistic large arrays: coopera-tive transmission in wireless multihop ad hoc networks to reach fardistances,”IEEE Trans. Signal Process., vol. 51, pp. 2082–2092, Aug.2003.

[15] Y.-W. P. Hong, W.-J. Huang, and C.-C. J. Kuo,Cooperative communi-cations and networking: technologies and system design. Springer US,2010.

[16] S. Fazeli-Dehkordy, S. Shahbazpanahi, and S. Gazor, “Multiple peer-to-peer communications using a network of relays,”IEEE Trans. Sig.Process., vol. 57, pp. 3053–3062, Aug. 2009.

[17] N. Bornhorst, M. Pesavento, and A. B. Gershman, “Distributed beam-forming for multi-group multicasting relay networks,”IEEE Trans. Sig.Process., vol. 60, pp. 221–232, Jan. 2012.

[18] Y. Cheng and M. Pesavento, “Joint optimization of source powerallocation and distributed relay beamforming in multiuser peer-to-peerrelay networks,”IEEE Trans. Sig. Process., vol. 60, pp. 2962–2973, June2012.

[19] A. Ramezani-Kebrya, M. Dong, B. Liang, G. Boudreau, and R. Cas-selman, “Per-relay power minimization for multi-user multi-channel co-operative relay beamforming,”IEEE Trans. Wireless Commun., vol. 15,pp. 3187–3198, May 2016.

[20] L. Wei, G. Wu, and R. Q. Hu, “Multi-pair device-to-device communica-tions with space-time analog network coding,” inProc. of IEEE WCNC,pp. 920–925, Mar. 2015.

[21] W. Xing, C. Wang, P. Wang, and F. Liu, “Energy efficiency in multi-source network-coded device-to-device cooperative communications,” inProc. of IEEE ICUWB, pp. 1–4, Oct. 2016.

[22] G. S. Rajan and B. S. Rajan, “A non-orthogonal cooperative multipleaccess (NCMA) protocol and low ML decoding complexity codes,” inProc. of IEEE WCNC, pp. 885–890, Mar. 2007.

[23] A. Ribeiro, R. Wang, and G. B. Giannakis, “Multi-source coopera-tion with full-diversity spectral-efficiency and controllable-complexity,”IEEE J. Sel. Areas Commun., vol. 25, pp. 415–425, Feb. 2007.

[24] Z. Gao, H. Lai, and K. J. R. Liu, “Differential space-time network codingfor multi-source cooperative communications,”IEEE Trans. Commun.,vol. 59, pp. 3146–3157, Nov. 2011.

[25] L. Wang, T. Peng, Y. Yang, and W. Wang, “Interference constrainedrelay selection of D2D communication for relay purpose underlayingcellular networks,” inProc. of WiCOM, pp. 1–5, Sept. 2012.

[26] Y. Cao, T. Jiang, and C. Wang, “Cooperative device-to-device com-munications in cellular networks,”IEEE Wireless Commun., vol. 22,pp. 124–129, June 2015.

[27] Q. Sun, L. Tian, Y. Zhou, J. Shi, and X. Wang, “Energy efficientincentive resource allocation in D2D cooperative communications,” inProc. of IEEE ICC, pp. 2632–2637, June 2015.

[28] C. Karakus and S. Diggavi, “Enhancing multiuser MIMO through op-portunistic D2D cooperation,”IEEE Trans. Wireless Commun., vol. 16,pp. 5616–5629, Sept. 2017.

[29] B. Zhou, H. Hu, S. Huang, and H. Chen, “Intracluster device-to-devicerelay algorithm with optimal resource utilization,”IEEE Trans. Veh.Technol., vol. 62, pp. 2315–2326, June 2013.

[30] A. Adhikary, H. S. Dhillon, and G. Caire, “Massive-MIMO meetsHetNet: Interference coordination through spatial blanking,”IEEE J.Sel. Areas Commun., vol. 33, pp. 1171–1186, June 2015.

[31] I. A. Hemadeh, M. El-Hajjar, S. Won, and L. Hanzo, “Layered multi-group steered space-time shift-keying for millimeter-wave communica-tions,” IEEE Access, vol. 4, pp. 3708–3718, 2016.

[32] Z. Chang, Y. Hu, Y. Chen, and B. Zeng, “Cluster-oriented device-to-device multimedia communications: joint power, bandwidth, and linkselection optimization,”IEEE Trans. Veh. Technol., vol. 67, pp. 1570–1581, Feb. 2018.

[33] D. Gesbert, S. Hanly, H. Huang, S. S. Shitz, O. Simeone, and W. Yu,“Multi-cell MIMO cooperative networks: a new look at interference,”IEEE J. Sel. Areas Commun., vol. 28, pp. 1380–1408, Dec. 2010.

[34] J. Zhang, R. Chen, J. G. Andrews, A. Ghosh, and R. W. Heath, “Net-worked MIMO with clustered linear precoding,”IEEE Trans. WirelessCommun., vol. 8, pp. 1910–1921, Apr. 2009.

[35] R. Zhang, “Cooperative multi-cell block diagonalization with per-base-station power constraints,”IEEE J. Sel. Areas Commun., vol. 28,pp. 1435–1445, Dec. 2010.

[36] M. J. Neely,Stochastic network optimization with application to com-munication and queueing systems. Morgan and Claypool, 2010.

[37] L. Georgiadis, M. J. Neely, and L. Tassiulas, “Resource allocation andcross-layer control in wireless networks,”Found. Trends Netw., vol. 1,pp. 1–144, Apr. 2006.

[38] M. J. Neely, “Energy optimal control for time-varying wireless net-works,” IEEE Trans. Inf. Theory, vol. 52, pp. 2915–2934, July 2006.

[39] K. Ronasi, B. Niu, V. W. S. Wong, S. Gopalakrishnan, and R. Schober,“Throughput-efficient scheduling and interference alignment for MIMOwireless systems,”IEEE Trans. Wireless Commun., vol. 13, pp. 1779–1789, Apr. 2014.

[40] S. Lakshminarayana, M. Assaad, and M. Debbah, “Transmit power min-imization in small cell networks under time average QoS constraints,”IEEE J. Sel. Areas Commun., vol. 33, pp. 2087–2103, Oct. 2015.

[41] H. Shirani-Mehr, G. Caire, and M. J. Neely, “MIMO downlink schedul-ing with non-perfect channel state knowledge,”IEEE Trans. Commun.,vol. 58, pp. 2055–2066, July 2010.

[42] M. Gatzianas, L. Georgiadis, and L. Tassiulas, “Control of wirelessnetworks with rechargeable batteries [transactions papers],”IEEE Trans.Wireless Commun., vol. 9, pp. 581–593, Feb. 2010.

[43] Y. Mao, J. Zhang, and K. B. Letaief, “A Lyapunov optimization approachfor green cellular networks with hybrid energy supplies,”IEEE J. Sel.Areas Commun., vol. 33, pp. 2463–2477, Dec. 2015.

[44] S. Shim, J. S. Kwak, R. W. Heath, and J. G. Andrews, “Blockdiagonalization for multi-user MIMO with other-cell interference,”IEEETrans. Wireless Commun., vol. 7, pp. 2671–2681, July 2008.

[45] S. Kim and G. B. Giannakis, “Optimal resource allocation for MIMOad hoc cognitive radio networks,”IEEE Trans. Inf. Theory, vol. 57,pp. 3117–3131, May 2011.

[46] I. CVX Research, “CVX: Matlab software for disciplined convexprogramming, version 2.0 beta.,” 2012.

[47] H. Yoon, S. Park, and S. Choi, “Efficient feedback mechanism andrate adaptation for LTE-based D2D communication,” inProc. of IEEEWoWMoM, pp. 1–9, June 2017.

[48] F. Alavi, N. M. Yamchi, M. R. Javan, and K. Cumanan, “Limitedfeedback scheme for device-to-device communications in 5G cellular

IT 8.1
Typewritten text
IEEE Transactions on Wireless Communications Volume: 18 , Issue: 6 , June 2019
Page 15: sdprosolutions.com · 1 Yung-Shun Wang,Student Member, IEEE, Y.-W. Peter Hong,Senior Member, IEEE, and Wen-Tsuen Chen, Fellow, IEEE Abstract—This work proposes a dynamic precoding

15

networks with reliability and cellular secrecy outage constraints,”IEEETrans. Veh. Technol., vol. 66, pp. 8072–8085, Sept. 2017.

[49] R. AliHemmati, B. Liang, M. Dong, G. Boudreau, and S. H. Seyed-mehdi, “Long-term power allocation for multi-channel device-to-devicecommunication based on limited feedback information,” inProc. ofAsilomar Conf. on Signals, Syst. and Comput., pp. 729–733, Nov. 2016.

[50] Y. Li, T. Jiang, M. Sheng, and Y. Zhu, “QoS-aware admission controland resource allocation in underlay device-to-device spectrum-sharingnetworks,” IEEE J. Sel. Areas Commun., vol. 34, pp. 2874–2886, Nov.2016.

[51] X. Gong, S. A. Vorobyov, and C. Tellambura, “Joint bandwidth andpower allocation with admission control in wireless multi-user networkswith and without relaying,”IEEE Trans. Sig. Process., vol. 59, pp. 1801–1813, Apr. 2011.

[52] L. Wang and G. L. Stuber, “Pairing for resource sharing in cellulardevice-to-device underlays,”IEEE Network, vol. 30, pp. 122–128, Mar.2016.

[53] A. Nosratinia and T. E. Hunter, “Grouping and partner selection incooperative wireless networks,”IEEE J. Sel. Areas Commun., vol. 25,pp. 369–378, Feb. 2007.

[54] N. Jindal and Z. Luo, “Capacity limits of multiple antenna multicast,”in Proc. of IEEE ISIT, pp. 1841–1845, July 2006.

[55] G. R. Wood, “The bisection method in higher dimensions,”Math.Program., vol. 55, pp. 319–337, June 1992.

[56] S. Boyd and L. Vandenberghe,Convex optimization. Cambridge Uni-versity Press, 2004.

[57] E. Telatar, “Capacity of multi-antenna Gaussian channels,”Eur. Trans.Telecommun., vol. 10, no. 6, pp. 585–595, 1999.

[58] A. Simonsson and A. Furuskar, “Uplink power control in LTE - overviewand performance, subtitle: principles and benefits of utilizing rather thancompensating for SINR variations,” inProc. of IEEE VTC, pp. 1–5, Sept.2008.

[59] D. Tse and P. Viswanath,Fundamentals of Wireless Communication.Cambridge University Press, 2005.

[60] B. Hassibi and B. M. Hochwald, “How much training is needed inmultiple-antenna wireless links?,”IEEE Trans. Inf. Theory, vol. 49,pp. 951–963, April 2003.

[61] T. Yoo and A. Goldsmith, “Capacity and power allocation for fadingMIMO channels with channel estimation error,”IEEE Trans. Inf. Theory,vol. 52, pp. 2203–2214, May 2006.

Yung-Shun Wang received the B.S. degree in elec-trical engineering, and the M.S. and Ph.D. degreesin communications engineering from National TsingHua University, Hsinchu, Taiwan, in 2008, 2010and 2019, respectively. He is currently a Postdoc-toral Researcher with National Tsing Hua Univer-sity, Hsinchu, Taiwan. His research interests includecooperative communications, signal processing forwireless networks, and machine learning for com-munications. He received the Best Paper Awardfrom Asia Pacific Signal and Information Processing

Association, Annual Summit and Conference in 2013.

Y.-W. Peter Hong (S’01 - M’05 - SM’13) receivedthe B.S. degree in electrical engineering from Na-tional Taiwan University, Taipei, Taiwan, in 1999,and the Ph.D. degree in electrical engineering fromCornell University, Ithaca, NY, USA, in 2005. Hejoined the Institute of Communications Engineeringand the Department of Electrical Engineering atNational Tsing Hua University, Hsinchu, Taiwan,in 2005, where he is currently a Full Professor.He also currently serves as the Director of theInstitute of Communications Engineering, and the

Associate Vice President of Research and Development at National TsingHua University. His research interests include machine learning for wirelesscommunications, physical layer security, distributed signal processing for IoTand sensor networks, and big data analytics.

Dr. Hong received the IEEE ComSoc Asia-Pacific Outstanding YoungResearcher Award in 2010, the Y. Z. Hsu Scientific Paper Award in 2011, theNational Science Council Wu Ta-You Memorial Award in 2011, the ChineseInstitute of Electrical Engineering Outstanding Young Electrical EngineerAward in 2012, the Best Paper Award from the Asia-Pacific Signal andInformation Processing Association Annual Summit and Conference (APSIPAASC) in 2013, and the Ministry of Science and Technology OutstandingResearch Award in 2019. He served as an Associate Editor of IEEE TRANS-ACTIONS ON SIGNAL PROCESSING and IEEE TRANSACTIONS ONINFORMATION FORENSICS AND SECURITY, and is currently an Editorof IEEE TRANSACTIONS ON COMMUNICATIONS. He was chair of theIEEE ComSoc Taipei Chapter in 2017-2018, and is currently co-chair of theInformation Services Committee of the IEEE ComSoc Asia-Pacific Board.

Wen-Tsuen Chen(M’87 - SM’90 - F’94) receivedhis B.S. degree in nuclear engineering from Na-tional Tsing Hua University, Taiwan, and M.S. andPh.D. degrees in electrical engineering and com-puter sciences both from University of California,Berkeley, in 1970, 1973, and 1976, respectively. Hehas been with the Department of Computer Scienceof National Tsing Hua University since 1976 andserved as Chairman of the Department, Dean ofCollege of Electrical Engineering and ComputerScience, and the President of National Tsing Hua

University. In March 2012, he joined the Academia Sinica, Taiwan as aDistinguished Research Fellow of the Institute of Information Science untilJune 2018. Currently he is Sun Yun-suan Chair Professor of National TsingHua University. His research interests include computer networks, wirelesssensor networks, mobile computing, and parallel computing.

Dr. Chen received numerous awards for his academic accomplishments incomputer networking and parallel processing, including Outstanding ResearchAward of the National Science Council, Academic Award in Engineeringfrom the Ministry of Education, Technical Achievement Award and TaylorL. Booth Education Award of the IEEE Computer Society, and is currentlya lifelong National Chair of the Ministry of Education, Taiwan. Dr. Chen isthe Founding General Chair of the IEEE International Conference on Paralleland Distributed Systems and the General Chair of the 2000 IEEE InternationalConference on Distributed Computing Systems among others. He is a Fellowof the Chinese Technology Management Association.

IT 8.1
Typewritten text
IEEE Transactions on Wireless Communications Volume: 18 , Issue: 6 , June 2019