Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Roy D. Yates is active.

Publication


Featured researches published by Roy D. Yates.


vehicular technology conference | 1995

Integrated power control and base station assignment

Roy D. Yates; Ching-Yao Huang

In cellular wireless communication systems, transmitted power is regulated to provide each user an acceptable connection while limiting the interference seen by other users. Previous work has focused on maximizing the minimum carrier to interference ratio (CIR) or attaining a common CIR over all radio links. However, previous work has assumed the assignment of mobiles to base stations is known and fixed. In this work, we integrate power control and base station assignment. In the context of a CDMA system, we consider the minimization of the total transmitted uplink power subject to maintaining an individual target CIR for each mobile. This minimization occurs over the set of power vectors and base station assignments. We show that this problem has special structure and identify synchronous and asynchronous distributed algorithms that find the optimal power vector and base station assignment. >


IEEE Transactions on Information Theory | 2008

Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions

Ruoheng Liu; Ivana Maric; Predrag Spasojevic; Roy D. Yates

We study information-theoretic security for discrete memoryless interference and broadcast channels with independent confidential messages sent to two receivers. Confidential messages are transmitted to their respective receivers while ensuring mutual information-theoretic secrecy. That is, each receiver is kept in total ignorance with respect to the message intended for the other receiver. The secrecy level is measured by the equivocation rate at the eavesdropping receiver. In this paper, we present inner and outer bounds on secrecy capacity regions for these two communication systems. The derived outer bounds have an identical mutual information expression that applies to both channel models. The difference is in the input distributions over which the expression is optimized. The inner bound rate regions are achieved by random binning techniques. For the broadcast channel, a double-binning coding scheme allows for both joint encoding and preserving of confidentiality. Furthermore, we show that, for a special case of the interference channel, referred to as the switch channel, derived bounds meet. Finally, we describe several transmission schemes for Gaussian interference channels and derive their achievable rate regions while ensuring mutual information-theoretic secrecy. An encoding scheme in which transmitters dedicate some of their power to create artificial noise is proposed and shown to outperform both time-sharing and simple multiplexed transmission of the confidential messages.


Wireless Personal Communications | 1994

Constrained power control

Sudheer A. Grandhi; Jens Zander; Roy D. Yates

High system capacities can be achieved by controlling the transmitter power in multiuser radio systems. Power control with no constraint on the maximum power level has been studied extensively in earlier work [1–18]. Transmitter power is at a premium in radio systems such as cellular systems and PCS. There is a limit on the maximum transmitter power especially at the terminals (e.g. mobile units and handsets) since the power comes from a battery. In this paper we study power control that maximizes the minimum carrier to interference ratio (CIR), with a constraint on the maximum power. The optimal power vector solution lies on the boundary of the constrained power vector set and achieves a balance in the CIRs. Results indicate that the constraints do not induce any stability problems. A distributed scheme with favourable convergence properties and close to optimum performance is presented. Simulation results show that the algorithm tries to maximize the number of terminals served with CIR greater than or equal to the target CIR, while conserving power.


Wireless Networks | 1995

Minimizing the average cost of paging under delay constraints

Christopher Rose; Roy D. Yates

Efficient paging procedures help minimize the amount of bandwidth expended in locating a mobile unit. Given a probability distribution on user location, it is shown that the optimal paging strategy which minimizes the expected number of locations polledE[L] is to query each location sequentially in order of decreasing probability. However, since sequential search over many locations may impose unacceptable polling delay,D, optimal paging subject to delay constraints is considered. It is shown that substantial reductions inE[L] can be had even after moderate constraints are imposed on acceptableD (i.e.,D<-3).Since all methods of mobility management eventually reduce to considering a time-varying probability distribution on user location, this work should be applicable to a wide range of problems in the area. most notably those with additive cost structures.


IEEE Transactions on Information Theory | 2001

Iterative construction of optimum signature sequence sets in synchronous CDMA systems

Sennur Ulukus; Roy D. Yates

Optimum signature sequence sets that maximize the capacity of single-cell synchronous code division multiple access (CDMA) systems have been identified. Optimum signature sequences minimize the total squared correlation (TSC); they form a set of orthogonal sequences, if the number of users is less than or equal to the processing gain, and a set of Welch (1994) bound equality (WBE) sequences, otherwise. We present an algorithm where users update their transmitter signature sequences sequentially, in a distributed fashion, by using available receiver measurements. We show that each update decreases the TSC of the set, and produces better signature sequence sets progressively. We prove that the algorithm converges to a set of orthogonal signature sequences when the number of users is less than or equal to the processing gain. We observe and conjecture that the algorithm converges to a WBE set when the number of users is greater than the processing gain. At each step, the algorithm replaces one signature sequence from the set with the normalized minimum mean squared error (MMSE) receiver corresponding to that signature sequence. Since the MMSE filter can be obtained by a distributed algorithm for each user, the proposed algorithm is amenable to distributed implementation.


IEEE Transactions on Information Theory | 2007

Capacity of Interference Channels With Partial Transmitter Cooperation

Ivana Maric; Roy D. Yates; Gerhard Kramer

Capacity regions are established for several two-sender, two-receiver channels with partial transmitter cooperation. First, the capacity regions are determined for compound multiple-access channels (MACs) with common information and compound MACs with conferencing. Next, two interference channel models are considered: an interference channel with common information (ICCI) and an interference channel with unidirectional cooperation (ICUC) in which the message sent by one of the encoders is known to the other encoder. The capacity regions of both of these channels are determined when there is strong interference, i.e., the interference is such that both receivers can decode all messages with no rate penalty. The resulting capacity regions coincide with the capacity region of the compound MAC with common information.


IEEE Transactions on Communications | 1998

Stochastic power control for cellular radio systems

Sennur Ulukus; Roy D. Yates

For wireless communication systems, iterative power control algorithms have been proposed to minimize the transmitter power while maintaining reliable communication between mobiles and base stations. To derive deterministic convergence results, these algorithms require perfect measurements of one or more of the following parameters: (1) the mobiles signal-to-interference ratio (SIR) at the receiver; (2) the interference experienced by the mobile; and (3) the bit-error rate. However, these quantities are often difficult to measure and deterministic convergence results neglect the effect of stochastic measurements. We develop distributed iterative power control algorithms that use readily available measurements. Two classes of power control algorithms are proposed. Since the measurements are random, the proposed algorithms evolve stochastically and we define the convergence in terms of the mean-squared error (MSE) of the power vector from the optimal power vector that is the solution of a feasible deterministic power control problem. For the first class of power control algorithms using fixed step size sequences, we obtain finite lower and upper bounds for the MSE by appropriate selection of the step size. We also show that these bounds go to zero, implying convergence in the MSE sense, as the step size goes to zero. For the second class of power control algorithms, which are based on the stochastic approximations method and use time-varying step size sequences, we prove that the MSE goes to zero. Both classes of algorithms are distributed in the sense that each user needs only to know its own channel gain to its assigned base station and its own matched filter output at its assigned base station to update its power.


vehicular technology conference | 1997

INFOSTATIONS: a new system model for data and messaging services

David J. Goodman; J. Borras; Narayan B. Mandayam; Roy D. Yates

We analyze a new wireless system concept called Infostations, that can provide isolated pockets of high bandwidth connectivity for future data and messaging services. The intermittent connectivity available to mobile terminals using a network of Infostations raises new issues in protocol design at several layers. This paper describes the challenges of Infostation protocol design. It also presents a mathematical analysis of Infostation information transfer focusing on the optimum combination of transmission rate and coverage area.


IEEE Personal Communications | 2000

The Infostations challenge: balancing cost and ubiquity in delivering wireless data

R.H. Frenkiel; B.R. Badrinath; J. Borres; Roy D. Yates

Infostations provide a new way to look at the problem of providing high-data-rate wireless access. By allowing delayed message delivery, we can lift the constraint on ubiquitous coverage inherited from voice cellular systems. The reduction of coverage results in significant capacity gains, showing the possibility for low-cost broadband wireless data services. We give an overview of ongoing research on the Infostation concept.


IEEE Transactions on Wireless Communications | 2002

Wireless systems and interference avoidance

Christopher Rose; Sennur Ulukus; Roy D. Yates

Motivated by the emergence of programmable radios, we seek to understand a new class of communication system where pairs of transmitters and receivers can adapt their modulation/demodulation method in the presence of interference to achieve better performance. Using signal to interference ratio as a metric and a general signal space approach, we present a class of iterative distributed algorithms for synchronous systems which results in an ensemble of optimal waveforms for multiple users connected to a common receiver (or colocated independent receivers). That is, the waveform ensemble meets the Welch (1974) bound with equality and, therefore, achieves minimum average interference over the ensemble of signature waveforms. We derive fixed points for a number of scenarios, provide examples, look at ensemble stability under user addition and deletion as well as provide a simplistic comparison to synchronous code-division multiple-access. We close with suggestions for future work.

Collaboration


Dive into the Roy D. Yates's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Aylin Yener

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mohammad Saquib

University of Texas at Dallas

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge