Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Natasha Devroye is active.

Publication


Featured researches published by Natasha Devroye.


IEEE Signal Processing Magazine | 2008

Cognitive radio networks

Natasha Devroye; Mai Vu; Vahid Tarokh

In recent years, the development of intelligent, adaptive wireless devices called cognitive radios, together with the introduction of secondary spectrum licensing, has led to a new paradigm in communications: cognitive networks. Cognitive networks are wireless networks that consist of several types of users: often a primary user (the primary license-holder of a spectrum band) and secondary users (cognitive radios). These cognitive users employ their cognitive abilities to communicate without harming the primary users. The study of cognitive networks is relatively new and many questions are yet to be answered. In this article we highlight some of the recent information theoretic limits, models, and design of these promising networks.


IEEE Communications Magazine | 2006

Limits on communications in a cognitive radio channel

Natasha Devroye; Patrick Mitran; Vahid Tarokh

In this article we review FCC secondary markets initiatives and how smart wireless devices could be used to increase spectral efficiency. We survey the current proposals for cognitive radio deployment, and present a new, potentially more spectrally efficient model for a wireless channel employing cognitive radios; the cognitive radio channel. This channel models the simplest scenario in which a cognitive radio could be used and consists of a 2 Tx, 2 Rx wireless channel in which one transmitter knows the message of the other. We obtain fundamental limits on the communication possible over such a channel, and discuss future engineering and regulatory issues


IEEE Transactions on Wireless Communications | 2009

On the primary exclusive region of cognitive networks

Mai Vu; Natasha Devroye; Vahid Tarokh

In this paper, we consider a cognitive network in which a single primary transmitter communicates with primary receivers within an area of radius RO, called the primary exclusive region (PER). Inside this region, no cognitive users may transmit. Outside the PER, provided that the cognitive transmitters are at a minimal distance isinp from a primary receiver, they may transmit concurrently with the primary user. We determine bounds on the primary exclusive radius RO and the guard band isinp to guarantee an outage performance for the primary user. Specifically, for a desired rate CO and an outage probability beta, the probability that the primary users rate falls below CO is less than beta. This performance guarantee holds even with an arbitrarily large number of cognitive users uniformly distributed with constant density outside the primary exclusive region.


IEEE Transactions on Information Theory | 2011

Achievable Rate Regions and Performance Comparison of Half Duplex Bi-Directional Relaying Protocols

Sang Joon Kim; Natasha Devroye; Patrick Mitran; Vahid Tarokh

In a bi-directional relay channel, two nodes wish to exchange independent messages over a shared wireless half-duplex channel with the help of a relay. In this paper, we derive achievable rate regions for four new half-duplex protocols and compare these to four existing half-duplex protocols and outer bounds. In time, our protocols consist of either two or three phases. In the two phase protocols, both users simultaneously transmit during the first phase and the relay alone transmits during the second phase, while in the three phase protocol the two users sequentially transmit followed by a transmission from the relay. The relay may forward information in one of four manners; we outline existing amplify and forward (AF), decode and forward (DF), lattice based, and compress and forward (CF) relaying schemes and introduce the novel mixed forward scheme. The latter is a combination of CF in one direction and DF in the other. We derive achievable rate regions for the CF and Mixed relaying schemes for the two and three phase protocols. We provide a comprehensive treatment of eight possible half-duplex bi-directional relaying protocols in Gaussian noise, obtaining their relative performance under different SNR and relay geometries.


IEEE Transactions on Information Theory | 2011

Cognitive Networks Achieve Throughput Scaling of a Homogeneous Network

Sang Woon Jeon; Natasha Devroye; Mai Vu; Sae-Young Chung; Vahid Tarokh

Two distinct, but overlapping, networks that operate at the same time, space, and frequency is considered. The first network consists of n randomly distributed primary users, which form an ad hoc network. The second network again consists of m randomly distributed ad hoc secondary users or cognitive users. The primary users have priority access to the spectrum and do not need to change their communication protocol in the presence of the secondary users. The secondary users, however, need to adjust their protocol based on knowledge about the locations of the primary users to bring little loss to the primary networks throughput. By introducing preservation regions around primary receivers, a modified multihop routing protocol is proposed for the cognitive users. Assuming m=nβ with β >; 1, it is shown that the secondary network achieves almost the same throughput scaling law as a stand-alone network while the primary network throughput is subject to only a vanishingly small fractional loss. Specifically, the primary network achieves the sum throughput of order n1/2 and, for any δ >; 0, the secondary network achieves the sum throughput of order m1/2-δ with an arbitrarily small fraction of outage. Thus, almost all secondary source-destination pairs can communicate at a rate of order m-1/2-δ.


IEEE Transactions on Information Theory | 2012

Inner and Outer Bounds for the Gaussian Cognitive Interference Channel and New Capacity Results

Stefano Rini; Daniela Tuninetti; Natasha Devroye

The capacity of the Gaussian cognitive interference channel, a variation of the classical two-user interference channel where one of the transmitters (referred to as cognitive) has knowledge of both messages, is known in several parameter regimes but remains unknown in general. This paper provides a comparative overview of this channel model as it proceeds through the following contributions. First, several outer bounds are presented: (a) a new outer bound based on the idea of a broadcast channel with degraded message sets, and (b) an outer bound obtained by transforming the channel into channels with known capacity. Next, a compact Fourier-Motzkin eliminated version of the largest known inner bound derived for the discrete memoryless cognitive interference channel is presented and specialized to the Gaussian noise case, where several simplified schemes with jointly Gaussian input are evaluated in closed form and later used to prove a number of results. These include a new set of capacity results for: (a) the “primary decodes cognitive” regime, a subset of the “strong interference” regime that is not included in the “very strong interference” regime for which capacity was known, and (b) the “S-channel in strong interference” in which the primary transmitter does not interfere with the cognitive receiver and the primary receiver experiences strong interference. Next, for a general Gaussian channel the capacity is determined to within one bit/s/Hz and to within a factor two regardless of the channel parameters, thus establishing rate performance guarantees at high and low SNR, respectively. The paper concludes with numerical evaluations and comparisons of the various simplified achievable rate regions and outer bounds in parameter regimes where capacity is unknown, leading to further insight on the capacity region.


international conference on cognitive radio oriented wireless networks and communications | 2007

Scaling Laws of Cognitive Networks

Mai Vu; Natasha Devroye; Masoud Sharif; Vahid Tarokh

Opportunistic secondary spectrum usage has the potential to dramatically increase spectral efficiency and rates of a network of secondary cognitive users. In this work we consider a cognitive network: n pairs of cognitive transmitter and receiver wish to communicate simultaneously in the presence of a single primary transmitter-receiver link. We assume each cognitive transmitter-receiver pair communicates in a realistic single-hop fashion, as cognitive links are likely to be highly localized in space. We first show that under an outage constraint on the primary links capacity, provided that the density of the cognitive users is constant, the sum-rate of the n cognitive links scales linearly with n as n ¿ ¿. This scaling is in contrast to the sum-rate scaling of ¿n seen in multi-hop ad-hoc networks. We then explore the optimal radius of the primary exclusive region: the region in which no secondary cognitive users may transmit, such that the outage constraint on the primary user is satisfied. We obtain bounds that help the design of this primary exclusive region, outside of which cognitive radios may freely transmit.


ieee sarnoff symposium | 2008

Comparison of bi-directional relaying protocols

Sang Joon Kim; Natasha Devroye; Patrick Mitran; Vahid Tarokh

In a bi-directional relay channel, two nodes wish to exchange independent messages over a shared wireless channel with the help of a relay. In this paper, we derive achievable rate regions for four new half-duplex protocols and compare these to four existing half-duplex protocols and outer bounds. In time, our protocols consist of either two or three phases. In the two phase protocols, both users simultaneously transmit during the first phase and the relay alone transmits during the second phase, while in the three phase protocol the two users sequentially transmit followed by a transmission from the relay. The relay may forward information in one of four manners; we outline existing Amplify and Forward (AF) and Decode and Forward (DF) relaying schemes and introduce novel Compress and Forward (CF), and Mixed Forward schemes. We derive achievable rate regions for the CF and Mixed relaying schemes for the two and three phase protocols. Finally, we provide a comprehensive treatment of 8 possible half-duplex bi-directional relaying protocols in Gaussian noise, obtaining their respective achievable rate regions, outer bounds, and their relative performance under different SNR and relay geometries.


IEEE Transactions on Information Theory | 2011

Improved Capacity Scaling in Wireless Networks With Infrastructure

Won Yong Shin; Sang Woon Jeon; Natasha Devroye; Mai Vu; Sae-Young Chung; Yong Hoon Lee; Vahid Tarokh

This paper analyzes the impact and benefits of infrastructure support in improving the throughput scaling in networks of n randomly located wireless nodes. The infrastructure uses multiantenna base stations (BSs), in which the number of BSs and the number of antennas at each BS can scale at arbitrary rates relative to n. Under the model, capacity scaling laws are analyzed for both dense and extended networks. Two BS-based routing schemes are first introduced in this study: an infrastructure-supported single-hop (ISH) routing protocol with multiple-access uplink and broadcast downlink and an infrastructure-supported multihop (IMH) routing protocol. Then, their achievable throughput scalings are analyzed. These schemes are compared against two conventional schemes without BSs: the multihop (MH) transmission and hierarchical cooperation (HC) schemes. It is shown that a linear throughput scaling is achieved in dense networks, as in the case without help of BSs. In contrast, the proposed BS-based routing schemes can, under realistic network conditions, improve the throughput scaling significantly in extended networks. The gain comes from the following advantages of these BS-based protocols. First, more nodes can transmit simultaneously in the proposed scheme than in the MH scheme if the number of BSs and the number of antennas are large enough. Second, by improving the long-distance signal-to-noise ratio (SNR), the received signal power can be larger than that of the HC, enabling a better throughput scaling under extended networks. Furthermore, by deriving the corresponding information-theoretic cut-set upper bounds, it is shown under extended networks that a combination of four schemes IMH, ISH, MH, and HC is order-optimal in all operating regimes.


IEEE Transactions on Wireless Communications | 2010

Stability analysis for cognitive radio with multi-access primary transmission

Ioannis Krikidis; Natasha Devroye; John S. Thompson

This letter analyzes the impact, from a network-layer perspective, of having a single cognitive radio transmitter-receiver pair share the spectrum with multiple primary users wishing to communicate to a single receiver in a multi-access channel (MAC). In contrast to previous work which assumes a time division multi-access strategy, here, we assume the set of primary users simultaneously access the channel to deliver their packets to a common destination. We derive the symmetric stable throughput regions, consisting of maximal arrival rates for primary and secondary (or cognitive radio) users under two investigated protocols. The first protocol is a conventional MAC scheme where the primary and secondary nodes operate independenly. The second protocol corresponds to a multi-access relay channel (MARC) which exploits user cooperation between primary and secondary nodes. We prove that cooperation is beneficial in the considered MARC as it enables higher throughputs for both primary and secondary users.

Collaboration


Dive into the Natasha Devroye's collaboration.

Top Co-Authors

Avatar

Daniela Tuninetti

University of Illinois at Chicago

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Stefano Rini

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Pawan Setlur

University of Illinois at Chicago

View shared research outputs
Top Co-Authors

Avatar

Zhiyu Cheng

University of Illinois at Chicago

View shared research outputs
Top Co-Authors

Avatar

Yiwei Song

University of Illinois at Chicago

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Diana Maamari

University of Illinois at Chicago

View shared research outputs
Researchain Logo
Decentralizing Knowledge