Application of Random Matrix Theory to Future Wireless ... · Application of Random Matrix Theory...
Transcript of Application of Random Matrix Theory to Future Wireless ... · Application of Random Matrix Theory...
Application of Random Matrix Theory to Future Wireless Networks
Romain Couillet1,2
1Alcatel-Lucent Chair on Flexible Radio, Supelec, Gif sur Yvette, FRANCE2ST-Ericsson, Sophia-Antipolis, FRANCE
PhD defenseSupelec, November 12th, 2010.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 1 / 39
Outline
1 Cognitive Radios
2 Exploration: Spectrum Hole Detection
3 Exploration: User Detection and Power Inference
4 Exploitation: Optimal Ergodic Rate
5 Perspectives and Conclusion
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 2 / 39
Cognitive Radios
Outline
1 Cognitive Radios
2 Exploration: Spectrum Hole Detection
3 Exploration: User Detection and Power Inference
4 Exploitation: Optimal Ergodic Rate
5 Perspectives and Conclusion
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 3 / 39
Cognitive Radios
General system model
Figure: Cognitive radio setting.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 4 / 39
Cognitive Radios
Exploration and Exploitation
Cognitive Radio Setting:The secondary network is entitled to reuse efficiently spectrum holes,
so to minimally interfere the primary network;so to maximise the throughput of secondary transmissions;with little or no feedback from the primary network, i.e. autonomously.
To this end, the secondary (or smart, cognitive) network mustlearn about the environment: this is the exploration phase.communicate within the secondary network: this is the exploitation phase.
Both scenarios are inherently multi-dimensional:efficient exploration requires large sensor networks;networks may be composed of multiple users with possibly multiple antennas.
We will discuss both exploration and exploitation phases as (possibly large) multivariate systems.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 5 / 39
Cognitive Radios
Exploration and Exploitation
Cognitive Radio Setting:The secondary network is entitled to reuse efficiently spectrum holes,
so to minimally interfere the primary network;so to maximise the throughput of secondary transmissions;with little or no feedback from the primary network, i.e. autonomously.
To this end, the secondary (or smart, cognitive) network mustlearn about the environment: this is the exploration phase.communicate within the secondary network: this is the exploitation phase.
Both scenarios are inherently multi-dimensional:efficient exploration requires large sensor networks;networks may be composed of multiple users with possibly multiple antennas.
We will discuss both exploration and exploitation phases as (possibly large) multivariate systems.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 5 / 39
Cognitive Radios
Exploration and Exploitation
Cognitive Radio Setting:The secondary network is entitled to reuse efficiently spectrum holes,
so to minimally interfere the primary network;so to maximise the throughput of secondary transmissions;with little or no feedback from the primary network, i.e. autonomously.
To this end, the secondary (or smart, cognitive) network mustlearn about the environment: this is the exploration phase.communicate within the secondary network: this is the exploitation phase.
Both scenarios are inherently multi-dimensional:efficient exploration requires large sensor networks;networks may be composed of multiple users with possibly multiple antennas.
We will discuss both exploration and exploitation phases as (possibly large) multivariate systems.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 5 / 39
Cognitive Radios
Exploration and Exploitation
Cognitive Radio Setting:The secondary network is entitled to reuse efficiently spectrum holes,
so to minimally interfere the primary network;so to maximise the throughput of secondary transmissions;with little or no feedback from the primary network, i.e. autonomously.
To this end, the secondary (or smart, cognitive) network mustlearn about the environment: this is the exploration phase.communicate within the secondary network: this is the exploitation phase.
Both scenarios are inherently multi-dimensional:efficient exploration requires large sensor networks;networks may be composed of multiple users with possibly multiple antennas.
We will discuss both exploration and exploitation phases as (possibly large) multivariate systems.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 5 / 39
Exploration: Spectrum Hole Detection
Outline
1 Cognitive Radios
2 Exploration: Spectrum Hole Detection
3 Exploration: User Detection and Power Inference
4 Exploitation: Optimal Ergodic Rate
5 Perspectives and Conclusion
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 6 / 39
Exploration: Spectrum Hole Detection
Formulation of the exploration problem
We assume the scenario of a cognitive radio made ofa primary network of K transmitters, equipped with n1, . . . , nK antennas;a secondary network in sensing mode, equipped of N collocated sensors.
At time m, the secondary network receives y(m) ∈ CN as
y(m) =KX
k=1
pPk Hk x(m)
k + σw(m)
Depending on prior information, the secondary network willtry to infer the presence of a signal (we will assume a unique transmitter)try to infer the transmit powers of the K transmitters.
This information allows for:
the detection of spectrum holes;
the evaluation of the optimal secondary coverage;
ideally, the elaboration of a ‘map’ of space-frequency resources.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 7 / 39
Exploration: Spectrum Hole Detection
Formulation of the exploration problem
We assume the scenario of a cognitive radio made ofa primary network of K transmitters, equipped with n1, . . . , nK antennas;a secondary network in sensing mode, equipped of N collocated sensors.
At time m, the secondary network receives y(m) ∈ CN as
y(m) =KX
k=1
pPk Hk x(m)
k + σw(m)
Depending on prior information, the secondary network willtry to infer the presence of a signal (we will assume a unique transmitter)try to infer the transmit powers of the K transmitters.
This information allows for:
the detection of spectrum holes;
the evaluation of the optimal secondary coverage;
ideally, the elaboration of a ‘map’ of space-frequency resources.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 7 / 39
Exploration: Spectrum Hole Detection
Formulation of the exploration problem
We assume the scenario of a cognitive radio made ofa primary network of K transmitters, equipped with n1, . . . , nK antennas;a secondary network in sensing mode, equipped of N collocated sensors.
At time m, the secondary network receives y(m) ∈ CN as
y(m) =KX
k=1
pPk Hk x(m)
k + σw(m)
Depending on prior information, the secondary network willtry to infer the presence of a signal (we will assume a unique transmitter)try to infer the transmit powers of the K transmitters.
This information allows for:
the detection of spectrum holes;
the evaluation of the optimal secondary coverage;
ideally, the elaboration of a ‘map’ of space-frequency resources.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 7 / 39
Exploration: Spectrum Hole Detection
Formulation of the exploration problem
We assume the scenario of a cognitive radio made ofa primary network of K transmitters, equipped with n1, . . . , nK antennas;a secondary network in sensing mode, equipped of N collocated sensors.
At time m, the secondary network receives y(m) ∈ CN as
y(m) =√
PHx(m) + σw(m)
Depending on prior information, the secondary network willtry to infer the presence of a signal (we will assume a unique transmitter)try to infer the transmit powers of the K transmitters.
This information allows for:
the detection of spectrum holes;
the evaluation of the optimal secondary coverage;
ideally, the elaboration of a ‘map’ of space-frequency resources.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 7 / 39
Exploration: Spectrum Hole Detection
Formulation of the exploration problem
We assume the scenario of a cognitive radio made ofa primary network of K transmitters, equipped with n1, . . . , nK antennas;a secondary network in sensing mode, equipped of N collocated sensors.
At time m, the secondary network receives y(m) ∈ CN as
y(m) =KX
k=1
pPk Hk x(m)
k + σw(m)
Depending on prior information, the secondary network willtry to infer the presence of a signal (we will assume a unique transmitter)try to infer the transmit powers of the K transmitters.
This information allows for:
the detection of spectrum holes;
the evaluation of the optimal secondary coverage;
ideally, the elaboration of a ‘map’ of space-frequency resources.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 7 / 39
Exploration: Spectrum Hole Detection
Formulation of the exploration problem
We assume the scenario of a cognitive radio made ofa primary network of K transmitters, equipped with n1, . . . , nK antennas;a secondary network in sensing mode, equipped of N collocated sensors.
At time m, the secondary network receives y(m) ∈ CN as
y(m) =KX
k=1
pPk Hk x(m)
k + σw(m)
Depending on prior information, the secondary network willtry to infer the presence of a signal (we will assume a unique transmitter)try to infer the transmit powers of the K transmitters.
This information allows for:
the detection of spectrum holes;
the evaluation of the optimal secondary coverage;
ideally, the elaboration of a ‘map’ of space-frequency resources.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 7 / 39
Exploration: Spectrum Hole Detection
Problem formulation
We consider the model
y(m) =
σw(m) , (H0)√
PHx(m) + σw(m) , (H1)
We wish to confront the hypotheses H0 and H1 given the data matrixY , [y(1), . . . , y(M)] ∈ CN×M .
We consider, in a Bayesian framework, the Neyman-Pearson test ratio
C(Y)∆=
PH1|Y,I(Y)
PH0|Y,I(Y)
with prior information I on H, x(m), σ, . . ..
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 8 / 39
Exploration: Spectrum Hole Detection
Problem formulation
We consider the model
y(m) =
σw(m) , (H0)√
PHx(m) + σw(m) , (H1)
We wish to confront the hypotheses H0 and H1 given the data matrixY , [y(1), . . . , y(M)] ∈ CN×M .
We consider, in a Bayesian framework, the Neyman-Pearson test ratio
C(Y)∆=
PH1|Y,I(Y)
PH0|Y,I(Y)
with prior information I on H, x(m), σ, . . ..
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 8 / 39
Exploration: Spectrum Hole Detection
Problem formulation
We consider the model
y(m) =
σw(m) , (H0)√
PHx(m) + σw(m) , (H1)
We wish to confront the hypotheses H0 and H1 given the data matrixY , [y(1), . . . , y(M)] ∈ CN×M .
We consider, in a Bayesian framework, the Neyman-Pearson test ratio
C(Y)∆=
PH1|Y,I(Y)
PH0|Y,I(Y)
with prior information I on H, x(m), σ, . . ..
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 8 / 39
Exploration: Spectrum Hole Detection
A Bayesian framework for cognitive radios
We assume prior statistical and deterministic knowledge I on H, σ, P
Using the maximum entropy principle (MaxEnt), a prior P(H,σ,P)(H, σ, P) can be derived
PY|Hi ,I(Y) =
Z(H,σ,P)
PY|Hi ,I,H,σ,P(Y)P(H,σ,P)(H, σ, P)d(H, σ, P)
In the following,we derive the case P = 1, σ known and the knowledge about H conveys unitary invariance
E[tr HHH] known: this is what we assume here;E[HHH] = Q unknown but such that E[tr Q] is known;rank(HHH) known.
we compare alternative methods when P = 1 and σ are unknown.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 9 / 39
Exploration: Spectrum Hole Detection
A Bayesian framework for cognitive radios
We assume prior statistical and deterministic knowledge I on H, σ, P
Using the maximum entropy principle (MaxEnt), a prior P(H,σ,P)(H, σ, P) can be derived
PY|Hi ,I(Y) =
Z(H,σ,P)
PY|Hi ,I,H,σ,P(Y)P(H,σ,P)(H, σ, P)d(H, σ, P)
In the following,we derive the case P = 1, σ known and the knowledge about H conveys unitary invariance
E[tr HHH] known: this is what we assume here;E[HHH] = Q unknown but such that E[tr Q] is known;rank(HHH) known.
we compare alternative methods when P = 1 and σ are unknown.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 9 / 39
Exploration: Spectrum Hole Detection
A Bayesian framework for cognitive radios
We assume prior statistical and deterministic knowledge I on H, σ, P
Using the maximum entropy principle (MaxEnt), a prior P(H,σ,P)(H, σ, P) can be derived
PY|Hi ,I(Y) =
Z(H,σ,P)
PY|Hi ,I,H,σ,P(Y)P(H,σ,P)(H, σ, P)d(H, σ, P)
In the following,we derive the case P = 1, σ known and the knowledge about H conveys unitary invariance
E[tr HHH] known: this is what we assume here;E[HHH] = Q unknown but such that E[tr Q] is known;rank(HHH) known.
we compare alternative methods when P = 1 and σ are unknown.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 9 / 39
Exploration: Spectrum Hole Detection
Evaluation of PY|Hi ,I(Y)
by MaxEnt, X, W are standard Gaussian matrix with Xij , Wij ∼ CN (0, 1).Under H0:
Y = σW
PY|H0,I(Y) =1
(πσ2)NMe−
1σ2 tr YYH
.
Under H1:
Y =ˆ√
PH σIN˜ »X
W
–PY|H1
(Y) =
ZΣ≥0
PY|Σ,H1(Y,Σ)PΣ(Σ)dΣ
with Σ = E[y(1)y(1)H] = HHH + σ2IN .From unitary invariance of H, denoting Σ = UGUH, diag(G) = (g1, . . . , gn, σ2, . . . , σ2)
PY|H1(Y) =
ZU(N)×(σ2,∞)n
PY|UGUH,H1(Y, U, G)PU(U)P(g1,...,gn)(g1, . . . , gn)dUdg1 . . . dgn
wherePY|UGUH,H1
is Gaussian with zero mean and variance UGUH;
PU is a constant (dU is a Haar measure);
if H is Gaussian, P(g1−σ2,...,gn−σ2)
is the joint eigenvalue distribution of a central Wishart;
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 10 / 39
Exploration: Spectrum Hole Detection
Evaluation of PY|Hi ,I(Y)
by MaxEnt, X, W are standard Gaussian matrix with Xij , Wij ∼ CN (0, 1).Under H0:
Y = σW
PY|H0,I(Y) =1
(πσ2)NMe−
1σ2 tr YYH
.
Under H1:
Y =ˆ√
PH σIN˜ »X
W
–PY|H1
(Y) =
ZΣ≥0
PY|Σ,H1(Y,Σ)PΣ(Σ)dΣ
with Σ = E[y(1)y(1)H] = HHH + σ2IN .From unitary invariance of H, denoting Σ = UGUH, diag(G) = (g1, . . . , gn, σ2, . . . , σ2)
PY|H1(Y) =
ZU(N)×(σ2,∞)n
PY|UGUH,H1(Y, U, G)PU(U)P(g1,...,gn)(g1, . . . , gn)dUdg1 . . . dgn
wherePY|UGUH,H1
is Gaussian with zero mean and variance UGUH;
PU is a constant (dU is a Haar measure);
if H is Gaussian, P(g1−σ2,...,gn−σ2)
is the joint eigenvalue distribution of a central Wishart;
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 10 / 39
Exploration: Spectrum Hole Detection
Evaluation of PY|Hi ,I(Y)
by MaxEnt, X, W are standard Gaussian matrix with Xij , Wij ∼ CN (0, 1).Under H0:
Y = σW
PY|H0,I(Y) =1
(πσ2)NMe−
1σ2 tr YYH
.
Under H1:
Y =ˆ√
PH σIN˜ »X
W
–PY|H1
(Y) =
ZΣ≥0
PY|Σ,H1(Y,Σ)PΣ(Σ)dΣ
with Σ = E[y(1)y(1)H] = HHH + σ2IN .From unitary invariance of H, denoting Σ = UGUH, diag(G) = (g1, . . . , gn, σ2, . . . , σ2)
PY|H1(Y) =
ZU(N)×(σ2,∞)n
PY|UGUH,H1(Y, U, G)PU(U)P(g1,...,gn)(g1, . . . , gn)dUdg1 . . . dgn
wherePY|UGUH,H1
is Gaussian with zero mean and variance UGUH;
PU is a constant (dU is a Haar measure);
if H is Gaussian, P(g1−σ2,...,gn−σ2)
is the joint eigenvalue distribution of a central Wishart;
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 10 / 39
Exploration: Spectrum Hole Detection
Evaluation of PY|Hi ,I(Y)
by MaxEnt, X, W are standard Gaussian matrix with Xij , Wij ∼ CN (0, 1).Under H0:
Y = σW
PY|H0,I(Y) =1
(πσ2)NMe−
1σ2 tr YYH
.
Under H1:
Y =ˆ√
PH σIN˜ »X
W
–PY|H1
(Y) =
ZΣ≥0
PY|Σ,H1(Y,Σ)PΣ(Σ)dΣ
with Σ = E[y(1)y(1)H] = HHH + σ2IN .From unitary invariance of H, denoting Σ = UGUH, diag(G) = (g1, . . . , gn, σ2, . . . , σ2)
PY|H1(Y) =
ZU(N)×(σ2,∞)n
PY|UGUH,H1(Y, U, G)PU(U)P(g1,...,gn)(g1, . . . , gn)dUdg1 . . . dgn
wherePY|UGUH,H1
is Gaussian with zero mean and variance UGUH;
PU is a constant (dU is a Haar measure);
if H is Gaussian, P(g1−σ2,...,gn−σ2)
is the joint eigenvalue distribution of a central Wishart;
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 10 / 39
Exploration: Spectrum Hole Detection
Evaluation of PY|Hi ,I(Y)
by MaxEnt, X, W are standard Gaussian matrix with Xij , Wij ∼ CN (0, 1).Under H0:
Y = σW
PY|H0,I(Y) =1
(πσ2)NMe−
1σ2 tr YYH
.
Under H1:
Y =ˆ√
PH σIN˜ »X
W
–PY|H1
(Y) =
ZΣ≥0
PY|Σ,H1(Y,Σ)PΣ(Σ)dΣ
with Σ = E[y(1)y(1)H] = HHH + σ2IN .From unitary invariance of H, denoting Σ = UGUH, diag(G) = (g1, . . . , gn, σ2, . . . , σ2)
PY|H1(Y) =
ZU(N)×(σ2,∞)n
PY|UGUH,H1(Y, U, G)PU(U)P(g1,...,gn)(g1, . . . , gn)dUdg1 . . . dgn
wherePY|UGUH,H1
is Gaussian with zero mean and variance UGUH;
PU is a constant (dU is a Haar measure);
if H is Gaussian, P(g1−σ2,...,gn−σ2)
is the joint eigenvalue distribution of a central Wishart;
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 10 / 39
Exploration: Spectrum Hole Detection
Evaluation of PY|Hi ,I(Y)
by MaxEnt, X, W are standard Gaussian matrix with Xij , Wij ∼ CN (0, 1).Under H0:
Y = σW
PY|H0,I(Y) =1
(πσ2)NMe−
1σ2 tr YYH
.
Under H1:
Y =ˆ√
PH σIN˜ »X
W
–PY|H1
(Y) =
ZΣ≥0
PY|Σ,H1(Y,Σ)PΣ(Σ)dΣ
with Σ = E[y(1)y(1)H] = HHH + σ2IN .From unitary invariance of H, denoting Σ = UGUH, diag(G) = (g1, . . . , gn, σ2, . . . , σ2)
PY|H1(Y) =
ZU(N)×(σ2,∞)n
PY|UGUH,H1(Y, U, G)PU(U)P(g1,...,gn)(g1, . . . , gn)dUdg1 . . . dgn
wherePY|UGUH,H1
is Gaussian with zero mean and variance UGUH;
PU is a constant (dU is a Haar measure);
if H is Gaussian, P(g1−σ2,...,gn−σ2)
is the joint eigenvalue distribution of a central Wishart;
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 10 / 39
Exploration: Spectrum Hole Detection
Evaluation of PY|Hi ,I(Y)
by MaxEnt, X, W are standard Gaussian matrix with Xij , Wij ∼ CN (0, 1).Under H0:
Y = σW
PY|H0,I(Y) =1
(πσ2)NMe−
1σ2 tr YYH
.
Under H1:
Y =ˆ√
PH σIN˜ »X
W
–PY|H1
(Y) =
ZΣ≥0
PY|Σ,H1(Y,Σ)PΣ(Σ)dΣ
with Σ = E[y(1)y(1)H] = HHH + σ2IN .From unitary invariance of H, denoting Σ = UGUH, diag(G) = (g1, . . . , gn, σ2, . . . , σ2)
PY|H1(Y) =
ZU(N)×(σ2,∞)n
PY|UGUH,H1(Y, U, G)PU(U)P(g1,...,gn)(g1, . . . , gn)dUdg1 . . . dgn
wherePY|UGUH,H1
is Gaussian with zero mean and variance UGUH;
PU is a constant (dU is a Haar measure);
if H is Gaussian, P(g1−σ2,...,gn−σ2)
is the joint eigenvalue distribution of a central Wishart;
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 10 / 39
Exploration: Spectrum Hole Detection
Result in the Gaussian case, n = 1
R. Couillet, M. Debbah, “A Bayesian Framework for Collaborative Multi-Source Signal Sensing”,IEEE Transactions on Signal Processing, vol. 58, no. 10, pp. 5186-5195, 2010.
Theorem (Neyman-Pearson test)
The ratio C(Y) when the receiver knows n = 1, P = 1, E[ 1N tr HHH] = 1 and σ2, reads
C(Y) =1N
NXl=1
σ2(N+M−1)eσ2+λlσ2QN
i=1i 6=l
(λl − λi )JN−M−1(σ
2, λl )
with λ1, . . . , λN the eigenvalues of YYH and where
Jk (x , y) ,Z +∞
xtk e−t− y
t dt .
non trivial dependency on λ1, . . . , λN
contrary to energy detector,P
i λi is not a sufficient statistic;
integration over σ2 (or P when P 6= 1) is difficult.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 11 / 39
Exploration: Spectrum Hole Detection
Result in the Gaussian case, n = 1
R. Couillet, M. Debbah, “A Bayesian Framework for Collaborative Multi-Source Signal Sensing”,IEEE Transactions on Signal Processing, vol. 58, no. 10, pp. 5186-5195, 2010.
Theorem (Neyman-Pearson test)
The ratio C(Y) when the receiver knows n = 1, P = 1, E[ 1N tr HHH] = 1 and σ2, reads
C(Y) =1N
NXl=1
σ2(N+M−1)eσ2+λlσ2QN
i=1i 6=l
(λl − λi )JN−M−1(σ
2, λl )
with λ1, . . . , λN the eigenvalues of YYH and where
Jk (x , y) ,Z +∞
xtk e−t− y
t dt .
non trivial dependency on λ1, . . . , λN
contrary to energy detector,P
i λi is not a sufficient statistic;
integration over σ2 (or P when P 6= 1) is difficult.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 11 / 39
Exploration: Spectrum Hole Detection
Result in the Gaussian case, n = 1
R. Couillet, M. Debbah, “A Bayesian Framework for Collaborative Multi-Source Signal Sensing”,IEEE Transactions on Signal Processing, vol. 58, no. 10, pp. 5186-5195, 2010.
Theorem (Neyman-Pearson test)
The ratio C(Y) when the receiver knows n = 1, P = 1, E[ 1N tr HHH] = 1 and σ2, reads
C(Y) =1N
NXl=1
σ2(N+M−1)eσ2+λlσ2QN
i=1i 6=l
(λl − λi )JN−M−1(σ
2, λl )
with λ1, . . . , λN the eigenvalues of YYH and where
Jk (x , y) ,Z +∞
xtk e−t− y
t dt .
non trivial dependency on λ1, . . . , λN
contrary to energy detector,P
i λi is not a sufficient statistic;
integration over σ2 (or P when P 6= 1) is difficult.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 11 / 39
Exploration: Spectrum Hole Detection
Comparison to energy detector
1 · 10−3 5 · 10−3 1 · 10−2 2 · 10−20.2
0.25
0.3
0.35
0.4
0.45
0.5
0.55
0.6
0.65
False alarm rate
Cor
rect
dete
ctio
nra
te
Energy detector
Neyman-Pearson test
Figure: ROC curve for single-source detection, K = 1, N = 4, M = 8, SNR = −3 dB, FAR range of practicalinterest, with signal power E = 0 dBm, either known or unknown at the receiver.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 12 / 39
Exploration: Spectrum Hole Detection
Comparison to energy detector
1 · 10−3 5 · 10−3 1 · 10−2 2 · 10−20.2
0.25
0.3
0.35
0.4
0.45
0.5
0.55
0.6
0.65
False alarm rate
Cor
rect
dete
ctio
nra
te
Energy detector
Neyman-Pearson test
Neyman-Pearson test (E unknown)
Figure: ROC curve for single-source detection, K = 1, N = 4, M = 8, SNR = −3 dB, FAR range of practicalinterest, with signal power E = 0 dBm, either known or unknown at the receiver.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 12 / 39
Exploration: Spectrum Hole Detection
Unknown power and noise variances
Bayesian approaches:
PY|Hi ,I(Y) =
ZR2
+
PY|Hi ,σ,P(Y)P(σ,P)(σ, P)d(σ, P)
limited by computational complexity (two-dimension numerical integration);inconsistence in MaxEnt uninformative priors on σ, P.
non-parametric GLRT approach:
CGLRT(Y)∆=
supH,σ PY|H1(Y)
supσ PY|H0(Y)
CGLRT(Y) expresses as a monotonic function of maxi λi1NP
i λi;
excludes prior information on H, σ, P.
ad-hoc methods, such as conditioning number:
Ccond(Y) ,maxi λi
mini λi
based on large random matrix considerations: underH0, as N/M → c
maxi λi
mini λi
a.s.−→(1 +
√c)2
(1−√
c)2
totally empirical.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 13 / 39
Exploration: Spectrum Hole Detection
Unknown power and noise variances
Bayesian approaches:
PY|Hi ,I(Y) =
ZR2
+
PY|Hi ,σ,P(Y)P(σ,P)(σ, P)d(σ, P)
limited by computational complexity (two-dimension numerical integration);inconsistence in MaxEnt uninformative priors on σ, P.
non-parametric GLRT approach:
CGLRT(Y)∆=
supH,σ PY|H1(Y)
supσ PY|H0(Y)
CGLRT(Y) expresses as a monotonic function of maxi λi1NP
i λi;
excludes prior information on H, σ, P.
ad-hoc methods, such as conditioning number:
Ccond(Y) ,maxi λi
mini λi
based on large random matrix considerations: underH0, as N/M → c
maxi λi
mini λi
a.s.−→(1 +
√c)2
(1−√
c)2
totally empirical.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 13 / 39
Exploration: Spectrum Hole Detection
Unknown power and noise variances
Bayesian approaches:
PY|Hi ,I(Y) =
ZR2
+
PY|Hi ,σ,P(Y)P(σ,P)(σ, P)d(σ, P)
limited by computational complexity (two-dimension numerical integration);inconsistence in MaxEnt uninformative priors on σ, P.
non-parametric GLRT approach:
CGLRT(Y)∆=
supH,σ PY|H1(Y)
supσ PY|H0(Y)
CGLRT(Y) expresses as a monotonic function of maxi λi1NP
i λi;
excludes prior information on H, σ, P.
ad-hoc methods, such as conditioning number:
Ccond(Y) ,maxi λi
mini λi
based on large random matrix considerations: underH0, as N/M → c
maxi λi
mini λi
a.s.−→(1 +
√c)2
(1−√
c)2
totally empirical.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 13 / 39
Exploration: Spectrum Hole Detection
Performance comparison for unknown σ2, P
1 · 10−3 5 · 10−3 1 · 10−2 2 · 10−20
0.1
0.2
0.3
0.4
0.5
0.6
0.7
False alarm rate
Cor
rect
dete
ctio
nra
te
Neyman-Pearson, Jeffreys prior
Neyman-Pearson, uniform prior
Conditioning number test
GLRT
Figure: ROC curve for a priori unknown σ2 of the Neyman-Pearson test, conditioning number method and GLRT,K = 1, N = 4, M = 8, SNR = 0 dB. For the Neyman-Pearson test, both uniform and Jeffreys prior, withexponent β = 1, are provided.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 14 / 39
Exploration: User Detection and Power Inference
Outline
1 Cognitive Radios
2 Exploration: Spectrum Hole Detection
3 Exploration: User Detection and Power Inference
4 Exploitation: Optimal Ergodic Rate
5 Perspectives and Conclusion
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 15 / 39
Exploration: User Detection and Power Inference
Problem Statement
We now consider the model
y(m) =KX
k=1
pPk Hk x(m)
k + σw(m)
and wish to infer P1, . . . , PK .
With Y = [y(1), . . . , y(M)], this can be rewritten
Y =KX
k=1
pPk Hk Xk + σW =
ˆpP1H1 · · ·
pPK HK
˜| {z },HP
12
264X1...
XK
375| {z }
,X
+σW =hHP
12 σIN
i »XW
–.
If H, (XT WT) are unitarily invariant, Y is unitarily invariant.
Most information about P1, . . . , PK is contained in the eigenvalues of BN , 1M YYH.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 16 / 39
Exploration: User Detection and Power Inference
Problem Statement
We now consider the model
y(m) =KX
k=1
pPk Hk x(m)
k + σw(m)
and wish to infer P1, . . . , PK .
With Y = [y(1), . . . , y(M)], this can be rewritten
Y =KX
k=1
pPk Hk Xk + σW =
ˆpP1H1 · · ·
pPK HK
˜| {z },HP
12
264X1...
XK
375| {z }
,X
+σW =hHP
12 σIN
i »XW
–.
If H, (XT WT) are unitarily invariant, Y is unitarily invariant.
Most information about P1, . . . , PK is contained in the eigenvalues of BN , 1M YYH.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 16 / 39
Exploration: User Detection and Power Inference
Problem Statement
We now consider the model
y(m) =KX
k=1
pPk Hk x(m)
k + σw(m)
and wish to infer P1, . . . , PK .
With Y = [y(1), . . . , y(M)], this can be rewritten
Y =KX
k=1
pPk Hk Xk + σW =
ˆpP1H1 · · ·
pPK HK
˜| {z },HP
12
264X1...
XK
375| {z }
,X
+σW =hHP
12 σIN
i »XW
–.
If H, (XT WT) are unitarily invariant, Y is unitarily invariant.
Most information about P1, . . . , PK is contained in the eigenvalues of BN , 1M YYH.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 16 / 39
Exploration: User Detection and Power Inference
Problem Statement
We now consider the model
y(m) =KX
k=1
pPk Hk x(m)
k + σw(m)
and wish to infer P1, . . . , PK .
With Y = [y(1), . . . , y(M)], this can be rewritten
Y =KX
k=1
pPk Hk Xk + σW =
ˆpP1H1 · · ·
pPK HK
˜| {z },HP
12
264X1...
XK
375| {z }
,X
+σW =hHP
12 σIN
i »XW
–.
If H, (XT WT) are unitarily invariant, Y is unitarily invariant.
Most information about P1, . . . , PK is contained in the eigenvalues of BN , 1M YYH.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 16 / 39
Exploration: User Detection and Power Inference
Problem Statement
We now consider the model
y(m) =KX
k=1
pPk Hk x(m)
k + σw(m)
and wish to infer P1, . . . , PK .
With Y = [y(1), . . . , y(M)], this can be rewritten
Y =KX
k=1
pPk Hk Xk + σW =
ˆpP1H1 · · ·
pPK HK
˜| {z },HP
12
264X1...
XK
375| {z }
,X
+σW =hHP
12 σIN
i »XW
–.
If H, (XT WT) are unitarily invariant, Y is unitarily invariant.
Most information about P1, . . . , PK is contained in the eigenvalues of BN , 1M YYH.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 16 / 39
Exploration: User Detection and Power Inference
Problem Statement
We now consider the model
y(m) =KX
k=1
pPk Hk x(m)
k + σw(m)
and wish to infer P1, . . . , PK .
With Y = [y(1), . . . , y(M)], this can be rewritten
Y =KX
k=1
pPk Hk Xk + σW =
ˆpP1H1 · · ·
pPK HK
˜| {z },HP
12
264X1...
XK
375| {z }
,X
+σW =hHP
12 σIN
i »XW
–.
If H, (XT WT) are unitarily invariant, Y is unitarily invariant.
Most information about P1, . . . , PK is contained in the eigenvalues of BN , 1M YYH.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 16 / 39
Exploration: User Detection and Power Inference
From small to large system analysis
0.1 1 3 100
0.025
0.05
0.075
0.1
Eigenvalues of YYH
Den
sity
Eigenvalues of BN = 1M YYH
The classical approach requires to evaluate PP1,...,PK |Y
assuming Gaussian parameters, this is similar to previous calculus
leads to a sum of two-dimensional integrals
prohibitively expensive to evaluate even for small N, nk , M
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 17 / 39
Exploration: User Detection and Power Inference
From small to large system analysis
0.1 1 3 100
0.025
0.05
0.075
0.1
Eigenvalues of YYH
Den
sity
Eigenvalues of BN = 1M YYH
Limiting spectrum of BN
Assuming dimensions N, nk , M grow large, large dimensional random matrix theory providesa link between:
the “observation”: the limiting spectral distribution (l.s.d.) of BN ;the “hidden parameters”: the powers P1, . . . , PK , i.e. the l.s.d. of P.
consistent estimators of the hidden parameters.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 17 / 39
Exploration: User Detection and Power Inference
Limiting spectrum of the sample covariance matrix
Definition. The Stieltjes transform mF (z), of a distribution function F is defined as
mF (z) =
Z1
ω − zdF (ω).
Knowing the Stieltjes transform of F is equivalent to knowing F (similar to Fourier transform).
for simplicity, consider the sample covariance matrix model
Y∆=T
12 X ∈ CN×n, BN =
1n
YYH ∈ CN×N , BN =1n
YHY ∈ Cn×n
where T ∈ CN×N has eigenvalues t1, . . . , tK , tk with multiplicity Nk and X ∈ CN×n is i.i.d. zeromean, variance 1.
If F T ⇒ T , then mFBN (z) = mBN (z)a.s.−→ mF (z) such that
mT`−1/mF (z)
´= −zmF (z)mF (z)
with mF (z) = cmF (z) + (c − 1) 1z and N/n → c.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 18 / 39
Exploration: User Detection and Power Inference
Limiting spectrum of the sample covariance matrix
Definition. The Stieltjes transform mF (z), of a distribution function F is defined as
mF (z) =
Z1
ω − zdF (ω).
Knowing the Stieltjes transform of F is equivalent to knowing F (similar to Fourier transform).
for simplicity, consider the sample covariance matrix model
Y∆=T
12 X ∈ CN×n, BN =
1n
YYH ∈ CN×N , BN =1n
YHY ∈ Cn×n
where T ∈ CN×N has eigenvalues t1, . . . , tK , tk with multiplicity Nk and X ∈ CN×n is i.i.d. zeromean, variance 1.
If F T ⇒ T , then mFBN (z) = mBN (z)a.s.−→ mF (z) such that
mT`−1/mF (z)
´= −zmF (z)mF (z)
with mF (z) = cmF (z) + (c − 1) 1z and N/n → c.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 18 / 39
Exploration: User Detection and Power Inference
Limiting spectrum of the sample covariance matrix
Definition. The Stieltjes transform mF (z), of a distribution function F is defined as
mF (z) =
Z1
ω − zdF (ω).
Knowing the Stieltjes transform of F is equivalent to knowing F (similar to Fourier transform).
for simplicity, consider the sample covariance matrix model
Y∆=T
12 X ∈ CN×n, BN =
1n
YYH ∈ CN×N , BN =1n
YHY ∈ Cn×n
where T ∈ CN×N has eigenvalues t1, . . . , tK , tk with multiplicity Nk and X ∈ CN×n is i.i.d. zeromean, variance 1.
If F T ⇒ T , then mFBN (z) = mBN (z)a.s.−→ mF (z) such that
mT`−1/mF (z)
´= −zmF (z)mF (z)
with mF (z) = cmF (z) + (c − 1) 1z and N/n → c.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 18 / 39
Exploration: User Detection and Power Inference
Complex integration
From Cauchy integral formula, denoting Ck a contour enclosing only tk ,
tk =1
2πi
ICk
ω
ω − tkdω =
12πi
ICk
1Nk
KXj=1
Njω
ω − tjdω =
N2πiNk
ICk
ωmT (ω)dω.
After the variable change ω = −1/mF (z),
tk =NNk
12πi
ICF,k
zmF (z)m′
F (z)
m2F (z)
dz,
When the system dimensions are large,
mF (z) ' mBN (z)∆=
1N
NXk=1
1λk − z
, with (λ1, . . . , λN) = eig(BN) = eig(YYH).
Dominated convergence arguments then show
tk − tka.s.−→ 0 with tk =
NNk
12πi
ICF,k
zmBN (z)m′
BN(z)
m2BN
(z)dz =
nNk
Xm∈Nk
(λm − µm)
with Nk the indexes of cluster k and µ1 < . . . < µN are the ordered eigenvalues of the matrixdiag(λ)− 1
n
√λ√
λT, λ = (λ1, . . . , λN)T.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 19 / 39
Exploration: User Detection and Power Inference
Complex integration
From Cauchy integral formula, denoting Ck a contour enclosing only tk ,
tk =1
2πi
ICk
ω
ω − tkdω =
12πi
ICk
1Nk
KXj=1
Njω
ω − tjdω =
N2πiNk
ICk
ωmT (ω)dω.
After the variable change ω = −1/mF (z),
tk =NNk
12πi
ICF,k
zmF (z)m′
F (z)
m2F (z)
dz,
When the system dimensions are large,
mF (z) ' mBN (z)∆=
1N
NXk=1
1λk − z
, with (λ1, . . . , λN) = eig(BN) = eig(YYH).
Dominated convergence arguments then show
tk − tka.s.−→ 0 with tk =
NNk
12πi
ICF,k
zmBN (z)m′
BN(z)
m2BN
(z)dz =
nNk
Xm∈Nk
(λm − µm)
with Nk the indexes of cluster k and µ1 < . . . < µN are the ordered eigenvalues of the matrixdiag(λ)− 1
n
√λ√
λT, λ = (λ1, . . . , λN)T.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 19 / 39
Exploration: User Detection and Power Inference
Complex integration
From Cauchy integral formula, denoting Ck a contour enclosing only tk ,
tk =1
2πi
ICk
ω
ω − tkdω =
12πi
ICk
1Nk
KXj=1
Njω
ω − tjdω =
N2πiNk
ICk
ωmT (ω)dω.
After the variable change ω = −1/mF (z),
tk =NNk
12πi
ICF,k
zmF (z)m′
F (z)
m2F (z)
dz,
When the system dimensions are large,
mF (z) ' mBN (z)∆=
1N
NXk=1
1λk − z
, with (λ1, . . . , λN) = eig(BN) = eig(YYH).
Dominated convergence arguments then show
tk − tka.s.−→ 0 with tk =
NNk
12πi
ICF,k
zmBN (z)m′
BN(z)
m2BN
(z)dz =
nNk
Xm∈Nk
(λm − µm)
with Nk the indexes of cluster k and µ1 < . . . < µN are the ordered eigenvalues of the matrixdiag(λ)− 1
n
√λ√
λT, λ = (λ1, . . . , λN)T.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 19 / 39
Exploration: User Detection and Power Inference
Complex integration
From Cauchy integral formula, denoting Ck a contour enclosing only tk ,
tk =1
2πi
ICk
ω
ω − tkdω =
12πi
ICk
1Nk
KXj=1
Njω
ω − tjdω =
N2πiNk
ICk
ωmT (ω)dω.
After the variable change ω = −1/mF (z),
tk =NNk
12πi
ICF,k
zmF (z)m′
F (z)
m2F (z)
dz,
When the system dimensions are large,
mF (z) ' mBN (z)∆=
1N
NXk=1
1λk − z
, with (λ1, . . . , λN) = eig(BN) = eig(YYH).
Dominated convergence arguments then show
tk − tka.s.−→ 0 with tk =
NNk
12πi
ICF,k
zmBN (z)m′
BN(z)
m2BN
(z)dz =
nNk
Xm∈Nk
(λm − µm)
with Nk the indexes of cluster k and µ1 < . . . < µN are the ordered eigenvalues of the matrixdiag(λ)− 1
n
√λ√
λT, λ = (λ1, . . . , λN)T.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 19 / 39
Exploration: User Detection and Power Inference
Complex integration
From Cauchy integral formula, denoting Ck a contour enclosing only tk ,
tk =1
2πi
ICk
ω
ω − tkdω =
12πi
ICk
1Nk
KXj=1
Njω
ω − tjdω =
N2πiNk
ICk
ωmT (ω)dω.
After the variable change ω = −1/mF (z),
tk =NNk
12πi
ICF,k
zmF (z)m′
F (z)
m2F (z)
dz,
When the system dimensions are large,
mF (z) ' mBN (z)∆=
1N
NXk=1
1λk − z
, with (λ1, . . . , λN) = eig(BN) = eig(YYH).
Dominated convergence arguments then show
tk − tka.s.−→ 0 with tk =
NNk
12πi
ICF,k
zmBN (z)m′
BN(z)
m2BN
(z)dz =
nNk
Xm∈Nk
(λm − µm)
with Nk the indexes of cluster k and µ1 < . . . < µN are the ordered eigenvalues of the matrixdiag(λ)− 1
n
√λ√
λT, λ = (λ1, . . . , λN)T.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 19 / 39
Exploration: User Detection and Power Inference
Complex integration
From Cauchy integral formula, denoting Ck a contour enclosing only tk ,
tk =1
2πi
ICk
ω
ω − tkdω =
12πi
ICk
1Nk
KXj=1
Njω
ω − tjdω =
N2πiNk
ICk
ωmT (ω)dω.
After the variable change ω = −1/mF (z),
tk =NNk
12πi
ICF,k
zmF (z)m′
F (z)
m2F (z)
dz,
When the system dimensions are large,
mF (z) ' mBN (z)∆=
1N
NXk=1
1λk − z
, with (λ1, . . . , λN) = eig(BN) = eig(YYH).
Dominated convergence arguments then show
tk − tka.s.−→ 0 with tk =
NNk
12πi
ICF,k
zmBN (z)m′
BN(z)
m2BN
(z)dz =
nNk
Xm∈Nk
(λm − µm)
with Nk the indexes of cluster k and µ1 < . . . < µN are the ordered eigenvalues of the matrixdiag(λ)− 1
n
√λ√
λT, λ = (λ1, . . . , λN)T.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 19 / 39
Exploration: User Detection and Power Inference
Complex integration
From Cauchy integral formula, denoting Ck a contour enclosing only tk ,
tk =1
2πi
ICk
ω
ω − tkdω =
12πi
ICk
1Nk
KXj=1
Njω
ω − tjdω =
N2πiNk
ICk
ωmT (ω)dω.
After the variable change ω = −1/mF (z),
tk =NNk
12πi
ICF,k
zmF (z)m′
F (z)
m2F (z)
dz,
When the system dimensions are large,
mF (z) ' mBN (z)∆=
1N
NXk=1
1λk − z
, with (λ1, . . . , λN) = eig(BN) = eig(YYH).
Dominated convergence arguments then show
tk − tka.s.−→ 0 with tk =
NNk
12πi
ICF,k
zmBN (z)m′
BN(z)
m2BN
(z)dz =
nNk
Xm∈Nk
(λm − µm)
with Nk the indexes of cluster k and µ1 < . . . < µN are the ordered eigenvalues of the matrixdiag(λ)− 1
n
√λ√
λT, λ = (λ1, . . . , λN)T.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 19 / 39
Exploration: User Detection and Power Inference
Application to the current model
R. Couillet, J. W. Silverstein, Z. Bai, M. Debbah, “Eigen-Inference for Energy Estimation of MultipleSources,” to appear in IEEE Transactions on Information Theory, 2010.
Extending Y with zeros, our model is a “double sample covariance matrix”
Y|{z}(N+n)×M
=
"HP
12 σIN
0 0
#| {z }(N+n)×(N+n)
»XW
–| {z }
(N+n)×M
.
Limiting distribution of 1M YYH
Theorem (l.s.d. of BN )
Let BN = 1M YYH with eigenvalues λ1, . . . , λN . Denote mBN
(z)∆= 1
MPM
k=11
λk−z , with λi = 0 fori > N. Then, for M/N → c, N/nk → ck , N/n → c0, for any z ∈ C+,
mBN(z)
a.s.−→ mF (z)
with mF (z) the unique solution in C+ of
1mF (z)
= −σ2 +1
f (z)
»c0 − 1
c0+ mP
„−
1f (z)
«–, with f (z) = (c − 1)mF (z)− czmF (z)2.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 20 / 39
Exploration: User Detection and Power Inference
Application to the current model (2)
R. Couillet, J. W. Silverstein, Z. Bai, M. Debbah, “Eigen-Inference for Energy Estimation of MultipleSources,” to appear in IEEE Trans. on Inf. Theory, 2010.
estimator calculus
Theorem (Estimator of P1, . . . , PK )
Let BN ∈ CN×N be defined as in Theorem 2, and λ = (λ1, . . . , λN), λ1 < . . . < λN . Assume thatasymptotic cluster separability condition is fulfilled for some k. Then, as N, n, M →∞,
Pk − Pka.s.−→ 0,
where
Pk =NM
nk (M − N)
Xi∈Nk
(ηi − µi )
with Nk the set indexing the eigenvalues in cluster k of F , η1 < . . . < ηN the eigenvalues ofdiag(λ)− 1
N
√λ√
λT
and µ1 < . . . < µN the eigenvalues of diag(λ)− 1M
√λ√
λT.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 21 / 39
Exploration: User Detection and Power Inference
Remarks
solution is computationally simple, explicit, and the final formula compact.cluster separability condition is fundamental. This requires
for all other parameters fixed, the Pk cannot be too close top one another: source separation problem.for all other parameters fixed, σ2 must be kept low: low SNR undecidability problem.for all other parameters fixed, M/N cannot be too low: sample deficiency issue (not such an issuethough).for all other parameters fixed, N/n cannot be too low: diversity issue.
exact spectrum separability is an essential ingredient (known for very few models to this day).
0.1 1 3 100
0.025
0.05
0.075
0.1
Eigenvalues of YYH
Den
sity
Eigenvalues of BN = 1M YYH
Limiting spectrum of BN
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 22 / 39
Exploration: User Detection and Power Inference
Remarks
solution is computationally simple, explicit, and the final formula compact.cluster separability condition is fundamental. This requires
for all other parameters fixed, the Pk cannot be too close top one another: source separation problem.for all other parameters fixed, σ2 must be kept low: low SNR undecidability problem.for all other parameters fixed, M/N cannot be too low: sample deficiency issue (not such an issuethough).for all other parameters fixed, N/n cannot be too low: diversity issue.
exact spectrum separability is an essential ingredient (known for very few models to this day).
0.1 1 3 100
0.025
0.05
0.075
0.1
Eigenvalues of YYH
Den
sity
Eigenvalues of BN = 1M YYH
Limiting spectrum of BN
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 22 / 39
Exploration: User Detection and Power Inference
Simulations
116
14
10
5
10
15
20
25
Cluster means
Den
sity
116
14
10
5
10
15
Estimated PkD
ensi
ty
Figure: Histogram of the cluster-mean approach and of Pk for k ∈ {1, 2, 3}, P1 = 1/16, P2 = 1/4, P3 = 1,n1 = n2 = n3 = 4 antennas per user, N = 24 sensors, M = 128 samples and SNR = 20 dB.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 23 / 39
Exploration: User Detection and Power Inference
Performance comparison
−5 0 5 10 15 20 25 30−20
−15
−10
−5
0
SNR [dB]
Nor
mal
ized
mea
nsq
uare
erro
r[dB
]
Stieltjes transform estimator
Moment estimator
Cluster average estimator
Figure: Normalized mean square error of largest estimated power P3, P1 = 1/16, P2 = 1/4, P3 = 1,n1 = n2 = n3 = 4 ,N = 24, M = 128. Comparison between classical, moment and Stieltjes transformapproaches.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 24 / 39
Exploitation: Optimal Ergodic Rate
Outline
1 Cognitive Radios
2 Exploration: Spectrum Hole Detection
3 Exploration: User Detection and Power Inference
4 Exploitation: Optimal Ergodic Rate
5 Perspectives and Conclusion
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 25 / 39
Exploitation: Optimal Ergodic Rate
Problem statement
We assume, from the exploration phase, that power Qf can be transmitted in bandwidth Bf .The exploitation phase consists in optimally using these power resources.We consider the uplink scenario of
an N-antenna base station;K users equipped with n1, . . . , nK antennas;
Kronecker channels at all pairs Hk,f = R12k,f Xk,f T
12k,f ∈ CN×nk at frequency Bf ;
colored noise with covariance Σ.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 26 / 39
Exploitation: Optimal Ergodic Rate
Problem statement
We assume, from the exploration phase, that power Qf can be transmitted in bandwidth Bf .The exploitation phase consists in optimally using these power resources.We consider the uplink scenario of
an N-antenna base station;K users equipped with n1, . . . , nK antennas;
Kronecker channels at all pairs Hk,f = R12k,f Xk,f T
12k,f ∈ CN×nk at frequency Bf ;
colored noise with covariance Σ.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 26 / 39
Exploitation: Optimal Ergodic Rate
Problem statement
We assume, from the exploration phase, that power Qf can be transmitted in bandwidth Bf .The exploitation phase consists in optimally using these power resources.We consider the uplink scenario of
an N-antenna base station;K users equipped with n1, . . . , nK antennas;
Kronecker channels at all pairs Hk,f = R12k,f Xk,f T
12k,f ∈ CN×nk at frequency Bf ;
colored noise with covariance Σ.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 26 / 39
Exploitation: Optimal Ergodic Rate
Maximizing ergodic sum rate
Due to mobility, we wish to optimize the uplink ergodic sum rate (per antenna),
I(P1,1, . . . , PK ,F ) ,1N
FXf=1
|Bf |Pf ′ |Bf ′ |
E
24log det
0@IN +KX
k=1
Σ− 1
2f Hk,f Pk,f HH
k,f Σ− 1
2f
1A35 .
Determine the sum rate maximizing precoders P?k,f
(P?1,1, . . . , P?
K ,F ) = arg max{Pk,f }PK
k=1 tr Pk,f≤Qf
I(P1,1, . . . , PK ,F ).
Simplifying assumptions:Problem can be treated for each f independently. We then assume F = 1.Taking Σ = σ2IN does not restrict generality.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 27 / 39
Exploitation: Optimal Ergodic Rate
Maximizing ergodic sum rate
Due to mobility, we wish to optimize the uplink ergodic sum rate (per antenna),
I(P1,1, . . . , PK ,F ) ,1N
FXf=1
|Bf |Pf ′ |Bf ′ |
E
24log det
0@IN +KX
k=1
Σ− 1
2f Hk,f Pk,f HH
k,f Σ− 1
2f
1A35 .
Determine the sum rate maximizing precoders P?k,f
(P?1,1, . . . , P?
K ,F ) = arg max{Pk,f }PK
k=1 tr Pk,f≤Qf
I(P1,1, . . . , PK ,F ).
Simplifying assumptions:Problem can be treated for each f independently. We then assume F = 1.Taking Σ = σ2IN does not restrict generality.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 27 / 39
Exploitation: Optimal Ergodic Rate
Maximizing ergodic sum rate
Due to mobility, we wish to optimize the uplink ergodic sum rate (per antenna),
I(P1,1, . . . , PK ,F ) ,1N
FXf=1
|Bf |Pf ′ |Bf ′ |
E
24log det
0@IN +KX
k=1
Σ− 1
2f Hk,f Pk,f HH
k,f Σ− 1
2f
1A35 .
Determine the sum rate maximizing precoders P?k,f
(P?1,1, . . . , P?
K ,F ) = arg max{Pk,f }PK
k=1 tr Pk,f≤Qf
I(P1,1, . . . , PK ,F ).
Simplifying assumptions:Problem can be treated for each f independently. We then assume F = 1.Taking Σ = σ2IN does not restrict generality.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 27 / 39
Exploitation: Optimal Ergodic Rate
Deterministic Equivalents of the Sum Rate
The stochastic character of Hk,f makes things difficult.
We instead find a deterministic approximation I◦(P1, . . . , PK ) for I(P1, . . . , PK ) such that
I◦(P1, . . . , PK )− I(P1, . . . , PK ) → 0
as N, n1, . . . , nK →∞, and denote
(P◦1 , . . . , P◦K ) = arg max{Pk}
I◦(P1, . . . , PK ).
We can showI(P?
1 , . . . , P?K )− I(P◦1 , . . . , P◦K ) → 0.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 28 / 39
Exploitation: Optimal Ergodic Rate
Deterministic Equivalents of the Sum Rate
The stochastic character of Hk,f makes things difficult.
We instead find a deterministic approximation I◦(P1, . . . , PK ) for I(P1, . . . , PK ) such that
I◦(P1, . . . , PK )− I(P1, . . . , PK ) → 0
as N, n1, . . . , nK →∞, and denote
(P◦1 , . . . , P◦K ) = arg max{Pk}
I◦(P1, . . . , PK ).
We can showI(P?
1 , . . . , P?K )− I(P◦1 , . . . , P◦K ) → 0.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 28 / 39
Exploitation: Optimal Ergodic Rate
Deterministic Equivalents: Strategy
With BN ,PK
k=1 Hk Pk HHk (Hk = R
12k Xk T
12k ), notice that
I(P1, . . . , PK ) = E»
1N
log det„
IN +1σ2
BN
«–= E
»Z ∞
σ2
„1ω−
1N
tr (BN + ωIN)−1«
dω
–= E
»Z ∞
σ2
„1ω−mBN (−ω)
«dω
–.
It suffices to find a deterministic equivalent for mBN (z).
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 29 / 39
Exploitation: Optimal Ergodic Rate
Deterministic Equivalents: Strategy
With BN ,PK
k=1 Hk Pk HHk (Hk = R
12k Xk T
12k ), notice that
I(P1, . . . , PK ) = E»
1N
log det„
IN +1σ2
BN
«–= E
»Z ∞
σ2
„1ω−
1N
tr (BN + ωIN)−1«
dω
–= E
»Z ∞
σ2
„1ω−mBN (−ω)
«dω
–.
It suffices to find a deterministic equivalent for mBN (z).
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 29 / 39
Exploitation: Optimal Ergodic Rate
Final Results
R. Couillet, M. Debbah and J. W. Silverstein, “A Deterministic Equivalent for the Analysis ofCorrelated MIMO Multiple Access Channels”, to appear in IEEE Transactions on InformationTheory, arXiv Preprint 0906.3667.
Theorem (Deterministic equivalent of the Stieltjes transform)
Under some mild conditions on the Rk and Tk matrices, as N, n1, . . . , nK →∞
mBN (z)−mN(z)a.s.−→ 0
where
mN(z) =1N
tr
0@−z
24 KXk=1
ek (z)Rk + IN
351A−1
and {ei (z)}, i ∈ {1, . . . , K}, form the unique solution to
ei (z) =1ni
tr Ri
0@−z
24 KXk=1
ek (z)Rk + IN
351A−1
ei (z) =1ni
tr T12i Pi T
12i
„−z
»ei (z)T
12i Pi T
12i + Ini
–«−1
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 30 / 39
Exploitation: Optimal Ergodic Rate
Final results (2)
R. Couillet, M. Debbah and J. W. Silverstein, “A Deterministic Equivalent for the Analysis ofCorrelated MIMO Multiple Access Channels”, to appear in IEEE Transactions on InformationTheory, arXiv Preprint 0906.3667.
Theorem (Deterministic equivalents of the sum rate)
Under similar conditions, with I(P1, . . . , PK ) = 1N E log det
“IN + 1
σ2 BN
”and z = −σ2,
I(P1, . . . , PK )− I◦(P1, . . . , PK ) → 0
where
I◦(P1, . . . , PK ) =1N
log
˛˛IN +
KXk=1
ek Rk
˛˛ +
KXk=1
1N
log˛Ink + ek T
12k Pk T
12k
˛− σ2
KXk=1
nk
Nek ek .
It remains to maximize I◦(P1, . . . , PK ) over P1, . . . , PK withP
k tr Pk ≤ Q.This is obtained by iterative waterfilling
Pk and Tk have the same eigenspaceswith eig(P◦k ) = (p◦k,1, . . . , p◦k,nk
)
p◦k,i =
µ−
1e◦k tk,i
!+
, e◦k = ek (P◦1 , . . . , P◦K ), µ set to satisfyX
k
tr Pk = Q.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 31 / 39
Exploitation: Optimal Ergodic Rate
Final results (2)
R. Couillet, M. Debbah and J. W. Silverstein, “A Deterministic Equivalent for the Analysis ofCorrelated MIMO Multiple Access Channels”, to appear in IEEE Transactions on InformationTheory, arXiv Preprint 0906.3667.
Theorem (Deterministic equivalents of the sum rate)
Under similar conditions, with I(P1, . . . , PK ) = 1N E log det
“IN + 1
σ2 BN
”and z = −σ2,
I(P1, . . . , PK )− I◦(P1, . . . , PK ) → 0
where
I◦(P1, . . . , PK ) =1N
log
˛˛IN +
KXk=1
ek Rk
˛˛ +
KXk=1
1N
log˛Ink + ek T
12k Pk T
12k
˛− σ2
KXk=1
nk
Nek ek .
It remains to maximize I◦(P1, . . . , PK ) over P1, . . . , PK withP
k tr Pk ≤ Q.This is obtained by iterative waterfilling
Pk and Tk have the same eigenspaceswith eig(P◦k ) = (p◦k,1, . . . , p◦k,nk
)
p◦k,i =
µ−
1e◦k tk,i
!+
, e◦k = ek (P◦1 , . . . , P◦K ), µ set to satisfyX
k
tr Pk = Q.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 31 / 39
Exploitation: Optimal Ergodic Rate
Final results (2)
R. Couillet, M. Debbah and J. W. Silverstein, “A Deterministic Equivalent for the Analysis ofCorrelated MIMO Multiple Access Channels”, to appear in IEEE Transactions on InformationTheory, arXiv Preprint 0906.3667.
Theorem (Deterministic equivalents of the sum rate)
Under similar conditions, with I(P1, . . . , PK ) = 1N E log det
“IN + 1
σ2 BN
”and z = −σ2,
I(P1, . . . , PK )− I◦(P1, . . . , PK ) → 0
where
I◦(P1, . . . , PK ) =1N
log
˛˛IN +
KXk=1
ek Rk
˛˛ +
KXk=1
1N
log˛Ink + ek T
12k Pk T
12k
˛− σ2
KXk=1
nk
Nek ek .
It remains to maximize I◦(P1, . . . , PK ) over P1, . . . , PK withP
k tr Pk ≤ Q.This is obtained by iterative waterfilling
Pk and Tk have the same eigenspaceswith eig(P◦k ) = (p◦k,1, . . . , p◦k,nk
)
p◦k,i =
µ−
1e◦k tk,i
!+
, e◦k = ek (P◦1 , . . . , P◦K ), µ set to satisfyX
k
tr Pk = Q.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 31 / 39
Exploitation: Optimal Ergodic Rate
Simulation results
−15 −10 −5 0 5 10 15 200
2
4
6
8
10
12
SNR [dB]
Ach
ieva
ble
rate
Sim., uni.
Det. eq., uni.
Sim., opt.
Det. eq., opt.
Figure: Ergodic MAC sum rate for an N = 4 antenna receiver and K = 4 single-antenna transmitters under sumpower constraint. Every user transmit signal has different correlation patterns at the receiver, and different pathlosses. Deterministic equivalents (det. eq.) against simulation (sim.), with uniform (uni.) or optimal (opt.) powerallocation.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 32 / 39
Perspectives and Conclusion
Outline
1 Cognitive Radios
2 Exploration: Spectrum Hole Detection
3 Exploration: User Detection and Power Inference
4 Exploitation: Optimal Ergodic Rate
5 Perspectives and Conclusion
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 33 / 39
Perspectives and Conclusion
The road ahead
signal sensing:optimal hypothesis tests require symmetry, are often computationally prohibitive;situations with more side information demand simpler tests, based on eigen-structure;more realistic scenarios with cooperation will demand a further improvement of such tests.
statistical inference:many methods have been proposed recently (moments, direct inversion, Stieltjes transform . . . )
Stieltjes transform approach seems the most powerful;Stieltjes transform approach suffers when separability is lost;estimating number of sources remains.
test performance must be better evaluated;there is room for extension to more realistic/involved models.
overlaid communications:capacity evaluation in multi-dimensional networks is progressing fast;optimal feedback and cooperation needs to be developed with similar random matrix tools.
Future cognitive radio communications with
open-access communications,
secondary networks coordination,
will demand
a characterization of what information to share,
a merger between random matrix theory and game theory,
a stronger effort on graph-oriented random matrix theory.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 34 / 39
Perspectives and Conclusion
The road ahead
signal sensing:optimal hypothesis tests require symmetry, are often computationally prohibitive;situations with more side information demand simpler tests, based on eigen-structure;more realistic scenarios with cooperation will demand a further improvement of such tests.
statistical inference:many methods have been proposed recently (moments, direct inversion, Stieltjes transform . . . )
Stieltjes transform approach seems the most powerful;Stieltjes transform approach suffers when separability is lost;estimating number of sources remains.
test performance must be better evaluated;there is room for extension to more realistic/involved models.
overlaid communications:capacity evaluation in multi-dimensional networks is progressing fast;optimal feedback and cooperation needs to be developed with similar random matrix tools.
Future cognitive radio communications with
open-access communications,
secondary networks coordination,
will demand
a characterization of what information to share,
a merger between random matrix theory and game theory,
a stronger effort on graph-oriented random matrix theory.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 34 / 39
Perspectives and Conclusion
The road ahead
signal sensing:optimal hypothesis tests require symmetry, are often computationally prohibitive;situations with more side information demand simpler tests, based on eigen-structure;more realistic scenarios with cooperation will demand a further improvement of such tests.
statistical inference:many methods have been proposed recently (moments, direct inversion, Stieltjes transform . . . )
Stieltjes transform approach seems the most powerful;Stieltjes transform approach suffers when separability is lost;estimating number of sources remains.
test performance must be better evaluated;there is room for extension to more realistic/involved models.
overlaid communications:capacity evaluation in multi-dimensional networks is progressing fast;optimal feedback and cooperation needs to be developed with similar random matrix tools.
Future cognitive radio communications with
open-access communications,
secondary networks coordination,
will demand
a characterization of what information to share,
a merger between random matrix theory and game theory,
a stronger effort on graph-oriented random matrix theory.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 34 / 39
Perspectives and Conclusion
The road ahead
signal sensing:optimal hypothesis tests require symmetry, are often computationally prohibitive;situations with more side information demand simpler tests, based on eigen-structure;more realistic scenarios with cooperation will demand a further improvement of such tests.
statistical inference:many methods have been proposed recently (moments, direct inversion, Stieltjes transform . . . )
Stieltjes transform approach seems the most powerful;Stieltjes transform approach suffers when separability is lost;estimating number of sources remains.
test performance must be better evaluated;there is room for extension to more realistic/involved models.
overlaid communications:capacity evaluation in multi-dimensional networks is progressing fast;optimal feedback and cooperation needs to be developed with similar random matrix tools.
Future cognitive radio communications with
open-access communications,
secondary networks coordination,
will demand
a characterization of what information to share,
a merger between random matrix theory and game theory,
a stronger effort on graph-oriented random matrix theory.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 34 / 39
Perspectives and Conclusion
List of Publications (1)
Publications in Journals: (7 accepted / 2 submitted)R. Couillet, J. Hoydis, M. Debbah, “A deterministic equivalent approach to the performance analysisof isometric random precoded systems,” submitted to IEEE Transactions on Information Theory, arXivPreprint XXXX.XXXX.S. Wagner, R. Couillet, M. Debbah, D. T. M. Slock, “Large System Analysis of Linear Precoding inMISO Broadcast Channels with Limited Feedback”, submitted to IEEE Transactions on InformationTheory, arXiv Preprint 0906.3682.R. Couillet, J. W. Silverstein, Z. Bai, M. Debbah, “Eigen-Inference for Energy Estimation of MultipleSources”, to appear in IEEE Transactions on Information Theory, arXiv Preprint 1001.3934.R. Couillet, M. Debbah, J. W. Silverstein, “A Deterministic Equivalent for the Analysis of CorrelatedMIMO Multiple Access Channels”, to appear in IEEE Transactions on Information Theory, arXivPreprint 0906.3667.R. Couillet, M. Debbah, “A Bayesian Framework for Collaborative Multi-Source Signal Sensing”, IEEETransactions on Signal Processing, vol. 58, no. 10, pp. 5186-5195, 2010, arXiv Preprint 0811.0764.R. Couillet, A. Ancora, M. Debbah, “Bayesian Foundations of Channel Estimation for CognitiveRadios”, Advances in Electronics and Telecommunications, vol. 1, no. 1, pp. 41-49, 2010.R. Couillet, M. Debbah, “Le telephone du futur : plus intelligent pour une exploitation optimale desfrequences” Revue de l’Electricite et de l’Electronique, no. 6, pp. 71-83, 2010.R. Couillet, M. Debbah, “Mathematical foundations of cognitive radios”, Journal ofTelecommunications and Information Technologies, no. 4, 2009.R. Couillet, M. Debbah, “Outage performance of flexible OFDM schemes in packet-switchedtransmissions”, Eurasip Journal on Advances on Signal Processing, Volume 2009, Article ID 698417,2009.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 35 / 39
Perspectives and Conclusion
List of Publications (2)Publications in International Conferences: (16 accepted / 3 submitted)
A. Kammoun, R. Couillet, J. Najim, M. Debbah, “A G-estimator for rate adaption in cognitive radios,” submitted to IEEE Dynamic SpectrumAccess Networks, Aachen, Germany, 2011.J. Yao, R. Couillet, J. Najim, E. Moulines, M. Debbah, “CLT for eigen-inference methods in cognitive radios,” submitted to IEEE InternationalConference on Acoustics, Speech and Signal Processing, Prague, Czech Republic, 2011.J. Hoydis, R. Couillet, M. Debbah, “Deterministic Equivalents for the Performance Analysis of Isometric Random Precoded Systems,”submitted to IEEE International Conference on Communications, Kyoto, Japan, 2011.J. Hoydis, J. Najim, R. Couillet, M. Debbah, “Fluctuations of the Mutual Information in Large Distributed Antenna Systems with ColoredNoise,” Forty-Eighth Annual Allerton Conference on Communication, Control, and Computing, Allerton, IL, USA, 2010.R. Couillet, H. V. Poor, M. Debbah, “Self-organized spectrum sharing in large MIMO multiple-access channels,” IEEE InternationalSymposium on Information Theory, Austin TX, USA, 2010.R. Couillet, J. W. Silverstein, M. Debbah, “Eigen-inference for multi-source power estimation,” IEEE International Symposium on InformationTheory, Austin TX, USA, 2010.S. Wagner, R. Couillet, D. T. M. Slock, M. Debbah, “Optimal Training in Large TDD Multi-user Downlink Systems under Zero-forcing andRegularized Zero-forcing Precoding,” submitted to IEEE Global Communication Conference, Miami, 2010.S. Wagner, R. Couillet, D. T. M. Slock, M. Debbah, “Large System Analysis of Zero-Forcing Precoding in MISO Broadcast Channels withLimited Feedback” IEEE International Workshop on Signal Processing Advances for Wireless Communications, Marrakech, Morocco, 2010.R. Couillet, M. Debbah, “Information theoretic approach to synchronization: the OFDM carrier frequency offset example”, AdvancedInternational Conference on Telecommunications, Barcelona, Spain, 2010.R. Couillet, M. Debbah, “Uplink capacity of self-organizing clustered orthogonal CDMA networks in flat fading channels” IEEE InformationTheory Workshop Fall’09, Taormina, Sicily, 2009.R. Couillet, M. Debbah, J. W. Silverstein, “Asymptotic Capacity of Multi-User MIMO Communications” IEEE Information Theory WorkshopFall’09, Taormina, Sicily, 2009.R. Couillet, M. Debbah, J. W. Silverstein, “Rate region of correlated MIMO multiple access channel and broadcast channel” IEEE Workshopon Statistical Signal Processing, Cardiff, Wales, UK, 2009.R. Couillet, M. Debbah, “Mathematical foundations of cognitive radios” U.R.S.I.’09, Warsaw, Poland, 2009.R. Couillet, M. Debbah, “A maximum entropy approach to OFDM channel estimation”, IEEE International Workshop on Signal ProcessingAdvances for Wireless Communications, Perugia, Italy, 2009.R. Couillet, M. Debbah, “Bayesian inference for multiple antenna cognitive receivers”, IEEE Wireless Communications & NetworkingConference, Budapest, Hungary, 2009.R. Couillet, M. Debbah, “Flexible OFDM schemes for bursty transmissions”, IEEE Wireless Communications & Networking Conference,Budapest, Hungary, 2009.R. Couillet, S. Wagner, M. Debbah, “Asymptotic Analysis of Correlated Multi-Antenna Broadcast Channels”, IEEE Wireless Communications& Networking Conference, Budapest, Hungary, 2009.R. Couillet, S. Wagner, M. Debbah, A. Silva, “The Space Frontier: Physical Limits of Multiple Antenna Information Transfer”, ValueTools,Inter-Perf Workshop, Athens, Greece, 2008. BEST STUDENT PAPER AWARD
R. Couillet, M. Debbah, “Free deconvolution for OFDM multicell SNR detection”, IEEE Personal, Indoor and Mobile Radio Communications
Symposium, Cognitive Radio Workshop, Cannes, France, 2008.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 36 / 39
Perspectives and Conclusion
List of Publications (3)
Patents: (4 owned by ST-Ericsson)R. Couillet, M. Debbah, Application no. 08368028.0 “Process and apparatus for performing initialcarrier frequency offset in an OFDM communication system”R. Couillet, M. Debbah, Application no. 08368023.1 “Method for short-time OFDM transmission andapparatus for performing flexible OFDM modulation”R. Couillet, S. Wagner, Application no. 09368025.4 “Precoding process for a transmitter of aMU-MIMO communication system”R. Couillet, Application no. 09368030.4 “Process for estimating the channel in an OFDMcommunication system, and receiver for doing the same”
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 37 / 39
Perspectives and Conclusion
List of Publications (4)
Books and book chapters: (1 book / 2 book chapters)Random Matrix Methods for Wireless Communications [book]Theoretical random matrix tools (finite dimensional analysis, limiting spectral laws, free probability,deterministic equivalents, statistical inference) and applications to wireless communications(SU-MIMO, MU-MIMO, CDMA, detection, estimation, channel modelling).
Authors: R. Couillet and M. DebbahPublisher: Cambridge University PressYear: 2011 (to appear)
Mathematical Foundations for Signal Processing, Communications and Networking [bookchapter XX]Chapter “Random matrix theory” on reminders of random matrix theory and especially statisticalinference methods.
Chapter authors: R. Couillet and M. DebbahPublisher: CRC Press, Taylor & and Francis GroupYear: 2011 (to appear)
Orthogonal Frequency Division Multiple Access Fundamentals and Applications [book chapter13]Chapter “Fundamentals of OFDMA Synchronization” on theoretical considerations and applicationtools for time offset and frequency offset regulation in OFDM and OFDMA systems.
Chapter authors: R. Couillet and M. DebbahPublisher: Auerbach Publications, CRC Press, Taylor & and Francis GroupISBN: 978-1-4200-8824-3Year: 2010
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 38 / 39
Perspectives and Conclusion
Thank you for your attention.
R. Couillet (Supelec, ST-Ericsson) Random Matrix Theory for Future Wireless Networks 12/11/2010 39 / 39