Energy efficiency in multiaccess fading channels under QoS constraints

  • Deli Qiao*
  • , Mustafa Cenk Gursoy
  • , Senem Velipasalar
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

In this paper, transmission over multiaccess fading channels under QoS constraints is studied in the low power regime. QoS constraints are imposed as limitations on the buffer violation probability. The effective capacity, which characterizes the maximum constant arrival rates in the presence of such statistical QoS constraints, is employed as the performance metric. The minimum received bit energy levels and wideband slope regions are characterized for different transmission and reception strategies, namely time-division multiple-access (TDMA), superposition coding with fixed decoding order, and superposition coding with variable decoding order. It is shown that the minimum received bit energies achieved by these different strategies are the same and independent of the QoS constraints. When wideband slope regions are considered, the suboptimality of TDMA with respect to superposition schemes is shown. For the case of superposition coding, it is proven that varying the decoding order at the receiver with the fading realizations does not enlarge the wideband slope region.

Original languageEnglish
Title of host publication2012 IEEE International Conference on Communications, ICC 2012
Pages2318-2322
Number of pages5
DOIs
StatePublished - 2012
Externally publishedYes
Event2012 IEEE International Conference on Communications, ICC 2012 - Ottawa, ON, Canada
Duration: 10 Jun 201215 Jun 2012

Publication series

NameIEEE International Conference on Communications
ISSN (Print)1550-3607

Conference

Conference2012 IEEE International Conference on Communications, ICC 2012
Country/TerritoryCanada
CityOttawa, ON
Period10/06/1215/06/12

Fingerprint

Dive into the research topics of 'Energy efficiency in multiaccess fading channels under QoS constraints'. Together they form a unique fingerprint.

Cite this