Escolar Documentos
Profissional Documentos
Cultura Documentos
2, FEBRUARY 2015
921
I. I NTRODUCTION
1536-1276 2014 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
922
LIOU et al.: GROUP PARTITION AND DYNAMIC RATE ADAPTATION FOR D2D COMMUNICATIONS
W log2 1+
k
(t)
Pi (t)gi,j
,
k (t)
2 +P k (t)hkj (t)+ u:uI k (t) Pu (t)gu,j
j
i:iT
i Sjk (t),
Ri (t)
W log2 1+
k
i:iT Pi (t)gi,j (t)
,
k (t)
2 +P k (t)hkj (t)+ u:uI k (t) Pu (t)gu,j
j
T Sjk (t).
(1)
923
C
k=1
i:iS k (t)
Ri (t)
subject to
S k (t) {1, 2, . . . , Ns }, 1 k C,
S (t) S (t) = , 1 < C,
Dk (t) = S k (t) , 1 k C,
P k (t) hk0 (t)
k
R (t) W log2 1 + 2
,
k (t)
+ u:uS k (t) Pu (t) gu,0
1 k C,
Ri (t)
k
(t)
Pi (t)gi,j
,
1+ 2
k (t)
+P k (t)hkj (t)+ u:uI k (t) Pu (t)gu,j
W log2
Ri (t)
W log2 1+
k
i:iT Pi (t)gi,j (t)
k
u:uIjk (t) Pu (t)gu,j (t)
Ri (t) = 0, i
S(t).
(3)
924
P gj,Dj (t)
P g
(t)
i
W log2 1 + 2 +Pi,D
1
+
,
2 +P g
g
(t)
(t)
j,Di
i,Dj
Ts (t) =
if Di
= Dj ,
, if Di = Dj .
W log 1 +
2
2
(5)
Since log2 (1 + x) is a concave function of x, based on
Jensens inequality [4], for an arbitrary random variable X,
E[log2 (1 + X)] log2 (1 + E[X]). Therefore,
1
P gi,Di (t)
E
W log2 1 +
2
2
P gj,Dj (t)
+ W log2 1 +
2
P mj,Dj
1
P mi,Di
W log2 1+
+W
log
1+
.
2
2
2
2
To (t) =
W log2 1 +
2
2
P gj,Dj (t)
+ W log2 1 +
. (4)
2
Let Ts (t) be the throughput per channel in time slot t when
the two source devices share the same channel. If Di = Dj , the
(6)
Define To the approximated average throughput per channel
in a time slot when the two source devices use two orthogonal
channels as follows.
P mj,Dj
1
P mi,Di
+W log2 1+
. (7)
To = W log2 1+
2
2
2
Similarly, define Ts the approximated average throughput per
channel in a time slot when the two source devices share the
same channel as follows.
P mj,Dj
P mi,Di
W
log
1
+
1
+
2
2 +P mj,Di
2 +P mi,Dj ,
Ts =
if Di
= Dj , (8)
P (mi,Di +mj,Dj )
, if Di = Dj .
W log2 1 +
2
To reduce the computational complexity, we propose partitioning devices at time zero based on the value of (To , Ts ) rather
than partitioning devices every time slot based on the value of
(To (t), Ts (t)).
If To > Ts , it is better for source device i and source device
j to transmit data via orthogonal channels. In this case, source
device i and source device j are seen as two conflicting devices.
Therefore, i, j V and (i, j) E. Otherwise, (i, j)
E (and
i, j
V ). In [5], it has been proved that if Di = Dj , Ts > To .
Thus, it is more efficient for two source devices with the same
destination to share a channel rather than use two orthogonal
channels. In this paper, all sources to the same destination use
the same channel.
Let Nc be the total number of colors required for coloring
the vertices of G so that adjacent vertices are colored with
different colors. Given the conflict graph, we could use the
sequential coloring algorithm [32] to find out Nc . Fig. 1 shows
LIOU et al.: GROUP PARTITION AND DYNAMIC RATE ADAPTATION FOR D2D COMMUNICATIONS
Fig. 1.
k:1kC
j:j(Vk {i})
log2 1+
P
2 +P
j:j(Vk )
= arg min
max mi,Dj .
k:1kC j:jVk
(10)
925
log2 1+
P
2 +P
l:lVki Sj
l:lVki(Vki Sj )
ml,j
l:lVk Sj
ml,j
ml,j
l:lVk(Vk Sj )
ml,j
.
(9)
subject to
S k (t) Vk ,
Dk (t) = S k (t) ,
R (t) W log2
k
P k (t) hk0 (t)
,
1+ 2
k (t)
+ u:uS k (t) Pu (t) gu,0
926
Ri (t)
k
(t)
Pi (t)gi,j
,
1+ 2
k (t)
+P k (t)hkj (t)+ u:uI k (t) Pu (t)gu,j
W log2
i:iT
Ri (t)
W log2 1+
k
i:iT Pi (t)gi,j (t)
2 +P k (t)hkj (t)+
k
u:uIjk (t) Pu (t)gu,j (t)
P k hk (t)
(11)
The third constraint is used to ensure that UE k could successfully use channel k to transmit data to the BS in time slot t.
The above problem is an integer-linear programming problem,
which is NP-hard in general. In the worst case, there are 2|Vk |
feasible solutions for S k (t). For each fixed value of S k (t),
the above optimization problem becomes a linear programming
problem. In principle, a linear programming problem can be
solved by the simplex algorithm or the interior-point algorithms
[31]. However, for each fixed value of S k (t), the corresponding
k
linear programming problem has j:jDk (t) 2|Sj (t)| 1 constraints. Therefore, when the total number of source devices is
large, it is impractical to find an optimal solution for the integerlinear programming problem in (11).
Rk then
2: if W log2 1 + 20
3: // UE k transmits data in time slot t.
4: Set P k (t) = P k and Rk (t) = Rk .
5: else
6: Set P k (t) = 0 and Rk (t) = 0.
7: end if
8: repeat
9: Obtain (v , j ) by Equation (13) or Equation (14).
10: if v > k,t (k (t)) then
11:
Add j to k (t).
12: end if
13: until v k,t (k (t))
14: Set S k (t) = k (t).
15: if Rk (t) == Rk then
16:
Rk (t) W log2 1 +
2 +
P k hk
0 (t)
k (t)
P g,0
k
:S (t)
17: end if
P k hk
0 (t)
2
k
LIOU et al.: GROUP PARTITION AND DYNAMIC RATE ADAPTATION FOR D2D COMMUNICATIONS
=W
log2
1+
i:i(X)
:XSi
2 +
k
P g,i
(t)
:XSi
k (t)
P g,i
(12)
When the source-based approximation algorithm is used,
the iterative algorithm first solves the following optimization
problem.
max k,t k (t) {j}
927
subject to
iSjk (t)
j Vk (t),
P gi,j (t)
iS k (t)
j
2 +jk (t)
1+
log2
log2 1 +
k (t)
P gi,j
.
(15)
2 +jk (t)
Rk (t) W log2
1+
P (t)
k
hk0 (t)
:k (t){j}
.
k (t)
P g,0
(13)
Note that the last constraint is used to assure that UE k could
successfully transmit data to the base station with rate Rk (t).
Let v be the optimal value and j be an optimal solution for
the above optimization problem. When the above optimization
problem is infeasible, v = . If v k,t (k (t)), the first
phase terminates. Otherwise, the integer j is added into the set
k (t) and the iterative algorithm continues.
Similarly, when the destination-based approximation algorithm is used, the iterative algorithm first solves the following
optimization problem.
max k,t k (t) j
subject to
j Vk k (t) ,
Rk (t) W log2
.
P k hk
0 (t)
k (t)
P g,0
k
Then,
Ri (t) = jk (t)W
i:iSjk (t)
log2
1+
iSjk (t)
= W log2
1+
iSjk (t)
k
(t)
P gi,j
2 + jk (t)
k
P gi,j
(t)
2 + jk (t)
.
(17)
Namely, the sum rate for source devices that transmit data to
destination device j through channel k in time slot t reaches the
upper bound of the sum rate for a multiple access channel [4].
However, (17) does not imply (1) in general.
VI. P ROPERTIES OF THE P ROPOSED A LGORITHM
(14)
W log2 1 +
g
i,j
Ri (t) = jk (t)W log2 1 + 2
.
(16)
+ jk (t)
:S (t)
928
k
Suppose that the base station knows the values of g,j
(t)s,
k
k
Sj (t) {i} but does not know the value of gi,j . In this
k
case, based on (15), jk (t) is approximated by
i,j
(t), which is
defined as follows.
k
i,j
(t)
= log2
1+
log2
P mki,j +
:Sjk (t){i}
k
P g,j
(t)
2 + jk (t)
1+
P mki,j
2 + jk (t)
log2
1+
Sjk (t){i}
k
(t)
P g,j
2 + jk (t)
1
(18)
Note that the above equation is very similar to (15) except that
k
gi,j
(t) is replaced by mki,j .
k
k
Define f (gi,j
(t)) = jk (t)
i,j
(t). Note that jk (t) dek
k
k
pends on gi,j (t) but
i,j (t) is independent of gi,j
(t). If
k
f (gi,j (t)) < 0, destination device j fails to receive any data
k
from source devices with indexes in Sjk (t). If f (gi,j
(t)) 0
k
and |Sj (t)| = 2, based on Theorem 1, two source devices
with indexes in Sjk (t) successfully transmit data to destination
device j through channel k in time slot t.
Consider the case in which Sjk (t) = {i+ , i }, the value of
k
gi+ ,j (t) is known, and the value of gik ,j (t) is unknown. To
analyze the function f in this case, for each fixed positive real
number a, define the function a (b) as follows.
a (b) =
Define + =
s(gik ,j (t)) =
gik ,j (t).
ln(1 + a + b)
, b [0, ).
ln(1 + a + b + ab)
P gik
+ ,j
(t)
2 +jk (t)
P gik ,j (t)
2 +jk (t)
(19)
Based on (15),
jk (t) = + s gik ,j (t) .
(20)
(21)
Thus,
f gik ,j (t) = jk (t)
ik ,j (t)
= + s gik ,j (t) + s mki ,j .
(22)
It was conjectured that if gik ,j (t) > mki ,j , f (gik ,j (t)) > 0,
since the unknown channel gain is underestimated. It is clear
that f (mki ,j ) = 0. Then, it is conjectured that the function f
has only one positive root. However, the conjectures are incorrect. It is possible that the function f have two positive roots and
f (gik ,j (t)) < 0 even when gik ,j (t) > mki ,j . The following
theorem contains a sufficient condition for the function f to
have two positive roots.
Theorem 2: If Sjk (t) = {i+ , i }, the value of gik+ ,j (t) is
known, the value of gik ,j (t) is unknown, and + (mki ,j ) >
minx:x0 + (x), then there exists a positive real number b
(0, ) such that (b) = 0 and the function f has two or more
positive roots.
Proof: See Appendix.
When the condition of Theorem 2 is satisfied, f (x) is not a
monotonic function of x.
We now analyze the overall computational complexity of the
proposed approach. Consider a graph G = (V, E). Let deg(v)
be the degree of vertex v, v V . For each vertex v, it takes
deg(v) steps to collect the colors that have been used by its
neighbors and at most |V | more stepsto find an appropriate
color. According to graph theory [32], vV deg(v) = 2|E|
|V |(|V |1)
< |V |2 . Recall that N is the total number of devices
2
in the network. Thus, there are at most N vertices in the
conflict graph and the computational complexity of the group
partition based on the sequential coloring algorithm is at most
O(N 2 + N N ) = O(N 2 ). The computational complexity of
the first phase of the fast approximation algorithm is upper
bounded by O(N 3 ). The computational complexity of the second phase of the fast approximation algorithm is upper bounded
by O(N 2 ). Therefore, the overall computational complexity is
upper bounded by O(N 3 ).
VII. S IMULATION S ETUP AND R ESULTS
In this section, we show simulation setup and results. To
obtain discrete event simulation [33] results, we wrote C++
programs that could call MATLAB for solving linear programming problems. The service region is a 20 by 20 square. We
randomly create 10 networks. In a network, the BS is deployed
at the center of the service region. Regarding the total number
of UEs in the network, we study two cases. In the first case,
there are no UEs in the network. The case corresponds to the
case in which an UE and a device use orthogonal channels. In
the second case, there are C UEs in the network and different
UEs use distinct channels. Each UE is randomly deployed 3
units away from the BS. Source devices are randomly deployed
in the service region. A source device is associated with a
destination device. There are two classes of destination devices.
A destination device in the first class is associated with a
source device, while a destination device in the second class
is associated with two or more source devices. The distance
between a source device and the corresponding destination
device is a random variable that is uniformly distributed in
[0, 3]. In this section, P = 1, 2 = 0.01, and W = 10 (MHz).
Unless explicitly stated, a communication link between a source
device and a destination device is a Rayleigh fading channel.
In addition, for each link, channel gains at distinct time slots
are independent and identically distributed random variables.
The mean channel gain of each link is the reciprocal of the
LIOU et al.: GROUP PARTITION AND DYNAMIC RATE ADAPTATION FOR D2D COMMUNICATIONS
929
Fig. 2. The performance of the global optimal algorithm and the proposed
approximation algorithm in small networks.
Fig. 3. The performance of the local optimal algorithm and the proposed
approximation algorithm in small networks.
In Fig. 3, we show the network throughput of the local optimal algorithm, the greedy algorithm, and the sourcebased approximation algorithm. The network throughput of the
destination-based approximation algorithm is almost identical
to that of the source-based approximation algorithm and is
not shown due to limit of space. We study the case when the
network contains 13 source devices and 10 destination devices.
Seven destination devices belong to the first class, while three
destination devices belong to the second class. A destination
device in the first class is associated with one source device,
while a destination device in the second class is associated
with two source devices. The network throughput of the sourcebased approximation algorithm is very close to that of the local
optimal algorithm. When there are UEs in the network, on average, the network throughput of the approximation algorithm
could be 20% larger than that of the greedy algorithm.
We also study the case when the total number of source devices in the network is either 25 or 50. Five destination devices
belong to the second class. In addition, a destination device in
second class is associated with three source devices. In Fig. 4,
we show the network throughput for the two approximation
algorithms and the greedy algorithm, when there is no UE.
Regardless of the total number of source devices in the network, the approximation algorithms are superior to the greedy
algorithm. The throughput of the source-based approximation
algorithm is almost identical to that of the destination-based approximation algorithm. Furthermore, when there are 25 source
devices, the throughput of the source-based approximation
algorithm could be 1.77 times larger than that of the greedy
algorithm. When there are 50 source devices, the throughput of
the source-based approximation algorithm could be 2.42 times
larger than that of the greedy algorithm.
In Fig. 5, we show the network throughput for the approximation algorithms and the greedy algorithm, when there are five
UEs and the total number of source devices is either 25 or 50.
The throughput difference between the two approximation algorithms is negligible. When there are 25 source devices, the
930
Fig. 6. The network throughput, when some of the channel gains are
unknown.
LIOU et al.: GROUP PARTITION AND DYNAMIC RATE ADAPTATION FOR D2D COMMUNICATIONS
(7, 7), (7, 7), and (7, 7), respectively. Destination device
i is randomly deployed in circle i mod C. In addition, each
source device associated with destination device i is randomly
deployed in circle i mod C. When each destination device is
associated with a unique source device, on average, the network
throughput of the proposed graph coloring approach is 58.79%
larger than that of the modulo approach. When each of the first
5 destination devices has 3 sources and each of the remaining
destination devices has only one source, on average, the network throughput of the proposed graph coloring approach is
10.87% larger than that of the modulo approach. We also study
the performance of the two group partition when source devices
are randomly deployed according to the first paragraph of the
section. When there are 50 source devices in the network, on
average, the network throughput of the graph coloring approach
is 7.9% larger than that of the modulo approach. Due to the limit
of space, the corresponding figure is not included.
In terms of network throughput, partitioning based on both
network topology and instantaneous channel gains is expected
to outperform the graph coloring approach in which the locations of devices are not known/used. On the other hand,
the proposed graph coloring approach does not require any
localization techniques and does not have to collect information
on the locations of devices.
VIII. D ISCUSSIONS
We now outline an implementation of the proposed approach
in cellular networks. When Orthogonal Frequency Division
Multiplexing (OFDM) is used at the physical layer, a channel
is composed of adjacent subcarriers. In addition, a subcarrier
belongs to only one channel. A time slot is composed of two
parts: the control sub-slot and the data sub-slot. The control
sub-slot consists of four phases. Consider time slot t. In the
first phase of the control sub-slot, there are Ns time intervals
for channel estimation. At the ith channel estimation time
interval, source device i broadcasts pilot signals for channel
estimation through C orthogonal channels and each destination
1
2
C
(t), gi,j
(t), . . . , gi,j
(t)). It is
device j estimates the value of (gi,j
assumed that channel estimation is perfect in the paper. The impacts of channel estimation errors on the network performance
are beyond the scope of this paper. More details on channel
estimation in MIMO-OFDM wireless communication systems
can be found in [34]. In the second phase of the control sub-slot,
there are Nd time intervals for feedback. At the jth feedback
k
(t)s
time interval, destination device j sends the values of gi,j
to the base station. Although it is possible to use an appropriate
random multiple access scheme instead in the second phase,
random multiple access is beyond the scope of this paper. The
base station could collect the values of hkj (t)s through a similar
procedure. In the third phase of the control sub-slot, to optimize
the network throughput (at time slot t), the base station uses
the proposed approach to approximately solve the optimization
problem in (3). In the fourth phase of the control sub-slot,
the base station broadcasts its decision. In particular, the base
station sends the value of (Pi (t), Ri (t)) to source device i. In
the data sub-slot, each source device i transmits data with power
Pi (t) and rate Ri (t).
931
Fig. 8. Network throughput when there are long-lived and short-lived D2D
sessions.
IX. C ONCLUSION
In this paper, we have proposed using group partition and
dynamic rate adaptation for scalable throughput optimization of
capacity-region-aware device-to-device communications. We
have adopted network information theory that allows a receiving device to simultaneously decode distinct packets from multiple transmitting devices, as long as the vector of transmitting
932
k
P gm,j
(t)
2 +jk (t)
> 0 and
k
P gn,j
(t)
2 +jk (t)
> 0. In addition,
P g k
(t)+P g k (t)
m,j
n,j
<
log2 1 +
2 +jk (t)
k
k
P gm,j (t)
P gn,j (t)
1 + 2 +
and therefore
k (t)
2 + k (t)
Thus,
j
jk (t) < 1.
3) Since
0 < jk (t) < 1,
i Sjk (t),
Ri (t) =
k
k
P gi,j (t)
P gi,j
(t)
k
j (t) log2 1 + 2 +k (t) < log2 1 + 2 +k (t) .
j
A PPENDIX
For the convenience of readers, we list key variables as
follows.
hk0 (t)
the channel gain from cellular UE k to the base
station in time slot t.
k
(t)
the gain of channel k from source device i to the
gi,0
base station in time slot t.
the channel gain from cellular UE k to destinahkj (t)
tion device j in time slot t.
k
(t)
the gain of channel k from source device i to
gi,j
destination device j in time slot t.
the transmission power of cellular user equipP k (t)
ment k in time slot t.
the transmission power of source device i in
Pi (t)
time slot t.
the data transmission rate of cellular user equipRk (t)
ment k in time slot t.
the data transmission rate of source device i in
Ri (t)
time slot t.
S k (t)/Sjk (t) the set composed of the indexes of source devices that use channel k to transmit data (to
destination device j) in time slot t.
the set composed of the indexes of destination
Dk (t)
devices that use channel k to receive data in time
slot t.
the set composed of the indexes of source deIjk (t)
vices that use channel k but do not want to
transmit data to destination device j in time
slot t.
Theorem 1: If |Sjk (t)| = 2 and the values of Ri (t)s, i
k
Sj (t), are determined by (15) and (16), both source devices
with indexes in Sjk (t) successfully use channel k to transmit
data to destination device j in time slot t.
Proof:
1) Since |Sjk (t)| = 2, without loss of essential generality, it
is assumed that Sjk (t) = {m, n}. Then, according to (15),
jk (t) =
k
k
P gm,j
(t)+P gn,j
(t)
k
2
+j (t)
k
k (t)
P gm,j
(t)
P gn,j
2 +jk (t)
2 +jk (t)
log2 1 +
log2 1 +
1+
.
Ri (t)
= jk (t)
i:iSjk (t)
log2
1+
i:iSjk (t)
= log2
1+
i:iSjk (t)
k
(t)
P gi,j
2 + jk (t)
k
P gi,j
(t)
2 + jk (t)
.
ln(1 + a + b)
b ln(1 + a + b + ab)
= lim
= lim
ln(1 + a + b)
ln(1 + a) + ln(1 + b)
ln(1 + a)
ln(1 + b)
= lim
+ lim
b ln(1 + a + b)
b ln(1 + a + b)
1
= 1.
3) a (b) = {(1+b) ln(1 + a)[(1 + a + b) ln(1 + a + b)
(1 + b) ln(1 + b)]} {(1 + b)(1 + a + b) ln2 ((1 +
a)(1 + b))}1 .
LIOU et al.: GROUP PARTITION AND DYNAMIC RATE ADAPTATION FOR D2D COMMUNICATIONS
1
4) Define c = (1+b)(1+a+b) ln
2 ((1+a)(1+b)) . Then, c > 0.
Define 1 (b) = (1 + b) ln(1 + a). In addition, define
2 (b) = (1 + a + b) ln(1 + a + b) (1 + b) ln(1 + b).
Furthermore, define (b) = 1 (b) 2 (b). Then, a (b) =
c [1 (b)2 (b)] = c(b). In addition, 1 (0) = ln(1 +
a) and 2 (0) = (1 + a) ln(1 + a). Thus, 1 (0)2 (0) <
0 and a (0) <0.
5) Define = ln(1 + a) 1. Then, > 0. Since
limb 1+a+b
1+b = 1, there exists b1 (0, ) such that
1+a+b
1+b
ln(1+a+b)
ln(1+b) = 1,
ln(1+a+b)
ln(1+b) < 1 + ,
1 + b+
ln(1 + b+ )
ln(1 + a)
1 + a + b+
ln(1 + a + b+ )
> (1 + )1 (1 + )1 (1 + )2
= 1.
Thus, (b+ ) = 1 (b+ ) 2 (b+ ) > 0. Since (0) <
0, (b+ ) > 0, and (b) is a continuous function of b,
based on the intermediate value theorem for continuous
functions, there exists a positive real number b (0, b+ )
such that (b) = 0.
6) Recall
that
f (gik ,j (t)) = + (s(gik ,j (t)))
+ (s(mki ,j )). Since + (b) is a continuous function
of b, + (b) (0, 1], b [0, ), + (0) = 1 =
limb + (b) and there exists b (0, ) such
that + (b ) < 1, minx:x0 + (x) exists. Define
b = arg minx:x0 + (x). Note that b (0, ).
since
+ (b ) < + (mki ,j ) <
If
mki ,j < b ,
limb + (b), based on the intermediate value theorem
for continuous functions, there exists a positive real
number r (b , ) such that + (r) = + (mki ,j )
and therefore f (r) = f (mki ,j ) = 0. On the other hand,
if mki ,j > b , since + (b ) < + (mki ,j ) < + (0),
there exists a positive real number r (0, b ) such that
+ (r) = + (mki ,j ) and therefore f (r) = 0. Thus,
both mki ,j and r are roots of the function f . Namely, the
function f has two or more positive roots.
7) Based on 5 and 6, we have completed the proof.
933
R EFERENCES
[1] X. Lin, J. G. Andrews, A. Ghosh, and R. Ratasuk, An overview of 3GPP
device-to-device proximity services, IEEE Commun. Mag., vol. 52, no. 4,
pp. 4048, May 2014.
[2] D. Feng et al., Device-to-device communications in cellular networks,
IEEE Commun. Mag., vol. 52, no. 4, pp. 4955, May 2014.
[3] M. N. Tehrani, M. Uysal, and H. Yanikomeroglu, Device-to-device communication in 5G cellular networks: Challenges, solutions, future directions, IEEE Commun. Mag., vol. 52, no. 5, pp. 8692, May 2014.
[4] T. M. Cover and J. A. Thomas, Elements of Information Theory, 2nd ed.
Hoboken, NJ, USA: Wiley, 2006.
[5] Y.-S. Liou, R.-H. Gau, and C.-J. Chang, Group partition for capacityregion-aware device-to-device communications, in Proc. IEEE WCNC,
Apr. 2014, pp. 17081713.
[6] C.-H. Yu, K. Doppler, C. B. Ribeiro, and O. Tirkkonen, Resource sharing optimization for device-to-device communication underlaying cellular
networks, IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 27522763,
Aug. 2011.
[7] L. B. Le, Fair resource allocation for device-to-device communications
in wireless cellular networks, in Proc. IEEE GLOBECOM, Dec. 2012,
pp. 54515456.
[8] D. Feng et al., Device-to-device communications underlaying cellular networks, IEEE Trans. Commun., vol. 61, no. 8, pp. 35413551,
Aug. 2013.
[9] L. Lei, Y. Zhang, X. Shen, C. Lin, and Z. Zhong, Performance analysis of device-to-device communications with dynamic interference using
stochastic Petri nets, IEEE Trans. Wireless Commun., vol. 12, no. 12,
pp. 61216141, Dec. 2013.
[10] Y. Chai, Q. Du, and P. Ren, Partial timefrequency resource allocation
for device-to-device communications underlaying, in Proc. IEEE ICC,
Jun. 2013, pp. 60556059.
[11] D. H. Lee, K. W. Choi, W. S. Jeon, and D. G. Jeong, Resource allocation scheme for device-to-device communication for maximizing spatial
reuse, in Proc. IEEE WCNC, Apr. 2013, pp. 112117.
[12] R. Zhang, X. Cheng, L. Yang, and B. Jiao, Interference-aware graph
based resource sharing for device-to-device communications underlaying
cellular networks, in Proc. IEEE WCNC, Apr. 2013, pp. 140145.
[13] B. Kaufman, J. Lilleberg, and B. Aazhang, Spectrum sharing scheme
between cellular users and ad-hoc device-to-device users, IEEE Trans.
Wireless Commun., vol. 12, no. 3, pp. 10381049, Mar. 2013.
[14] J. Wang, D. Zhu, C. Zhao, J. C. F. Li, and M. Lei, Resource sharing of
underlaying device-to-device and uplink Cellular communications, IEEE
Commun. Lett., vol. 17, no. 6, pp. 11481151, Jun. 2013.
[15] G. Fodor, D. D. Penda, M. Belleschi, M. Johansson, and A. Abrardo,
A comparative study of power control approaches for device-to-device
communications, in Proc. IEEE ICC, Jun. 2013, pp. 60086013.
[16] H. Min, W. Seo, J. Lee, S. Park, and D. Hong, Reliability improvement
using receive mode selection in the device-to-device uplink period underlaying cellular networks, IEEE Trans. Wireless Commun., vol. 10, no. 2,
pp. 413418, Feb. 2011.
[17] H. Min, J. Lee, S. Park, and D. Hong, Capacity enhancement using an
interference limited area for device-to-device uplink underlaying cellular
networks, IEEE Trans. Wireless Commun., vol. 10, no. 12, pp. 3995
4000, Dec. 2011.
[18] P. Bao and G. Yu, An interference management strategy for device-todevice underlaying cellular networks with partial location information,
in Proc. IEEE PIMRC, Sep. 2012, pp. 465470.
[19] M. C. Erturk, S. Mukherjee, H. Ishii, and H. Arslan, Distributions of
transmit power and SINR in device-to-device networks, IEEE Commun.
Lett., vol. 17, no. 2, pp. 273276, Feb. 2013.
[20] C. Xu et al., Efficiency resource allocation for device-to-device underlay
communication systems: A reverse iterative combinatorial auction based
approach, IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 348358,
Sep. 2013.
[21] R. Zhang, L. Song, Z. Han, X. Cheng, and B. Jiao, Distributed resource
allocation for device-to-device communications underlaying cellular networks, in Proc. IEEE ICC, Jun. 2013, pp. 18891893.
[22] F. Wang et al., Energy-aware resource allocation for device-to-device
underlay communication, in Proc. IEEE ICC, Jun. 2013, pp. 60766080.
[23] F. Wang, L. Song, Z. Han, Q. Zhao, and X. Wang, Joint scheduling
and resource allocation for device-to-device underlay communication,
in Proc. IEEE WCNC, Apr. 2013, pp. 134139.
[24] S. Hakola, T. Chen, J. Lehtomaki, and T. Koskela, Device-to-device
(D2D) communication in cellular networkPerformance analysis of optimum and practical communication mode selection, in Proc. IEEE
WCNC, Apr. 2010, pp. 16.
934
Yi-Shing Liou received the B.S. degree in industrial technology education from National Kaohsiung
Normal University, Kaohsiung, Taiwan, in 2006, the
M.S. degree in applied electronics technology from
National Taiwan Normal University, Taipei, Taiwan,
in 2009, and the Ph.D. degree in communications
engineering from National Chiao Tung University,
Hsinchu, Taiwan, in 2014. He is currently with
the Department of Electrical Engineering, National
Chiao Tung University. His research interests include cross-layer medium access control in wireless
networks, device-to-device communications in cellular networks, and access
network selection in heterogeneous networks.
Rung-Hung Gau received the B.S. degree in electrical engineering from National Taiwan University,
Taipei, Taiwan, in 1994, the M.S. degree in electrical engineering from the University of California at
Los Angeles, Los Angeles, CA, USA, in 1997, and
the Ph.D. degree in electrical and computer engineering from Cornell University, Ithaca, NY, USA,
in 2001. He is currently a Professor with the Department of Electrical Engineering, National Chiao Tung
University, Hsinchu, Taiwan. His research interests
include cross-layer design for medium access control
in wireless networks, device-to-device communications in cellular networks,
machine-to-machine communications/Internet of Things, mobility management, multicast flow control, and stochastic processes and queueing theory with
applications to communications networks.