Skip to content

Advertisement

  • Research Article
  • Open Access

A Bayesian Game-Theoretic Approach for Distributed Resource Allocation in Fading Multiple Access Channels

EURASIP Journal on Wireless Communications and Networking20102010:391684

https://doi.org/10.1155/2010/391684

  • Received: 31 August 2009
  • Accepted: 13 March 2010
  • Published:

Abstract

A Bayesian game-theoretic model is developed to design and analyze the resource allocation problem in -user fading multiple access channels (MACs), where the users are assumed to selfishly maximize their average achievable rates with incomplete information about the fading channel gains. In such a game-theoretic study, the central question is whether a Bayesian equilibrium exists, and if so, whether the network operates efficiently at the equilibrium point. We prove that there exists exactly one Bayesian equilibrium in our game. Furthermore, we study the network sum-rate maximization problem by assuming that the users coordinate according to a symmetric strategy profile. This result also serves as an upper bound for the Bayesian equilibrium. Finally, simulation results are provided to show the network efficiency at the unique Bayesian equilibrium and to compare it with other strategies.

Keywords

  • Channel State Information
  • Channel Gain
  • Ergodic Capacity
  • Multiple Access Channel
  • Bayesian Game

1. Introduction

The fading multiple access channel (MAC) is a basic wireless channel model that allows several transmitters connected to the same receiver to transmit over it and share its capacity. The capacity region of the fading MAC and the optimal resource allocation algorithms have been characterized and well studied in many pioneering works with different information assumptions [14]. However, in order to achieve the full capacity region, it usually requires a central computing resource (a scheduler with comprehensive knowledge of the network information) to globally allocate the system resources. This process is centralized, since it involves feedback and overhead communication whose load scales linearly with the number of transmitters in the network. In addition, with the fast evolution of wireless techniques, this centralized network infrastructure begins to expose its weakness in many aspects, for example, slow reconfiguration against varying environment, increased computational complexity, and so forth. This is especially crucial for femto-cell networks where it is quite difficult to centralize the information due to a limited capacity backhaul. Moreover, the high density of base stations would increase the cost of centralizing the information.

In recent years, increased research interest has been given to self-organizing wireless networks in which mobile devices allocate resources in a decentralized manner [5]. Tools from game theory [6] have been widely applied to study the resource allocation and power control problems in fading MAC [7], as well as many other types of channels, such as orthogonal frequency division multiplexing (OFDM) [8], multiple input and multiple output (MIMO) channels [9, 10], and interference channels [11]. Typically, the game-theoretic models used in these previous works assume that the knowledge, for example, channel state information (CSI), about other devices is available to all devices. However, this assumption is hardly met in practice. In practical wireless scenarios, mobile devices can have local information but can barely access to global information on the network status.

A static noncooperative game has been introduced in the context of the two-user fading MAC, known as "waterfilling game" [7]. By assuming that users compete with transmission rates as utility and transmit powers as moves, the authors show that there exists a unique Nash equilibrium [12] which corresponds to the maximum sum-rate point of the capacity region. This claim is somewhat surprising, since the Nash equilibrium is in general inefficient compared to the Pareto optimality. However, their results rely on the fact that both transmitters have complete knowledge of the CSI, and in particular, perfect CSI of all transmitters in the network. As we previously pointed out, this assumption is rarely realistic in practice.

Thus, this power allocation game needs to be reconstructed with some realistic assumptions made about the knowledge level of mobile devices. Under this consideration, it is of great interest to investigate scenarios in which devices have "incomplete information" about their components, for example, a device is aware of its own channel gain, but unaware of the channel gains of other devices. In game theory, a strategic game with incomplete information is called a "Bayesian game." Over the last ten years, Bayesian game-theoretic tools have been used to design distributed resource allocation strategies only in a few contexts, for example, CDMA networks [13, 14], multicarrier interference networks [15]. The primary motivation of this paper is therefore to investigate how Bayesian games can be applied to study the resource allocation problems in the fading MAC. In some sense, this study can help to design a self-organizing femto-cell network where different frequency bands or subcarriers are used for the femto-cell coverage, for example, different femto-cells operate on different frequency bands to avoid interference.

In this paper, we introduce a Bayesian game-theoretic model to design and analyze the resource allocation problem in a fading MAC, where users are assumed to selfishly maximize their ergodic capacity with incomplete information about the fading channel gains. In such a game-theoretic study, the central question is whether a Bayesian equilibrium exists, and if so, whether the network operates efficiently at the equilibrium point. We prove that there exists exactly one Bayesian equilibrium in our game. Furthermore, we study the network sum-rate maximization problem by assuming that all users coordinate to an optimization-based symmetric strategy. This centralized strategy is important when the fading processes for all users are relatively stationary and the global system structure is fixed for a long period of time. This result also serves as an upper bound for the unique Bayesian equilibrium.

The paper is organized in the following form: In Section 2, we introduce the system model and state important assumptions. In Section 3, the -user MAC is formulated as a static Bayesian game. In Section 4, we characterize the Bayesian equilibrium set. In Section 5, we give a special discussion on the optimal symmetric strategy. Some numerical results are provided to show the efficiency of the Bayesian equilibrium in Section 6. Finally, we close with some concluding remarks in Section 7.

2. System Model and Assumptions

2.1. System Model

We consider the uplink of a single-cell network where users are simultaneously sending information to one base station. This corresponds to a fading MAC, in which the users are the transmitters and the base station is the receiver. The signal received at the base station can be mathematically expressed as
(1)
where and are the input signal and fading channel gain of user , and is a zero-mean white Gaussian noise with variance . The input signal can be further written as
(2)

where and are the transmitted power and data of user at time .

In this study, we consider the wireless transmission in fast fading environments, that is, the coherence time of the channel is small relative to the delay constraint of the application. When the receiver can perfectly track the channel but the transmitters have no such information, the codewords cannot be chosen as a function of the state of the channel but the decoding can make use of such information. When the fading process is assumed to be stationary and ergodic within the considered interval of signal transmission, the channel capacity in a fast fading channel corresponds to the notion of ergodic capacity, that is,
(3)

where is a vector of channel gain variables. Note that in (3) we assume that the receiver applies a single-user decoding and there is not sophisticated successive decoding to be used. An intuitive understanding of this result can be obtained by viewing capacities in terms of time averages of mutual information [16]. Although the study of multiuser decoding is important, which may involve Stackelberg games, fairness concepts, and generalized Nash games, it is not provided in this study. The interested readers are referred to [17] for this topic.

2.2. Assumption of Finite Channel States

Before introducing our game model, we need to clarify a prior assumption for this section.

Assumption 1. We assume that each user's channel gain is i.i.d. from two discrete values: and with probability and , respectively. Without loss of generality, we assume .

On the one hand, our assumption is closely related to the way how feedback information is signalled to the transmitters. In order to get the channel information at the transmitter side, the base station is required to feedback an estimate of to user   at a given precision. Since in digital communications, any information is represented by a finite number of bits (e.g., bits), channels gains are mapped into a set that contains a finite number of states ( states).

On the other hand, this is a necessary assumption for analytical tractability, since in principle the functional strategic form of a player can be quite complex with both actions and states being continuous (or infinite). To avoid this problem, in [15] the authors successfully modelled a multicarrier Gaussian interference channel as a Bayesian game with discrete (or finite) actions and continuous states. Inspired from [15], we also model the fading MAC as a Bayesian game under the assumption of continuous actions and discrete states.

3. Game Formulation

We model the -user fading MAC as a Bayesian game, in which users do not have complete information. In a -user MAC, to have "complete information" means that, at each time , the channel gain realizations are known at all the transmitters, denoted by . Any other condition corresponds to a situation of incomplete information. In this paper, the "incomplete information" particularly refers to a situation where each only knows its own channel gain realization , but does not know the channel gains of other transmitters . We will denote by the channel gain variable of user , whose distribution is assumed to be stationary and ergodic in this section.

In such a communication system, the natural object of each user is to maximize its ergodic capacity subject to an average power constraint, that is,
(4)

where and are transmit power strategy and average power constraint of user , respectively. Under the assumption that each user has incomplete information about the channel gains, user 's strategy is defined as a function of its own channel gain , that is, . Note that (4) implies that user should know at least the statistics of other users' channels.

For a given set of power strategies , , the single-user maximization problem (4) is a convex optimization problem [18]. Via Lagrangian duality, the solution is given by the following equation:
(5)

where the dual variable is chosen such that the power constraint in (4) is satisfied with equality. However, the solution of (5) depends on which user does not know, and the same holds for all other users. Thus, in order to obtain the optimal power allocation, each user must adjust its power level based on the guess of all other users' strategies. Now, given the following game model, each user is able to adjust its strategy according to the belief it has about the strategy of the other user.

The -player MAC Bayesian game can be completely characterized as
(6)
  1. (i)

    Player set: .

     
  2. (ii)

    Type set: (" " stands for the Cartesian product) where . A player's type is defined as its channel gain, that is, .

     
  3. (iii)

    Action set: where . A player's action is defined as its transmit power, that is, .

     
  4. (iv)

    Probability set: where , we have and .

     
  5. (v)

    Payoff function set: where is chosen as player 's achievable rate

     
(7)

In games of incomplete information, a player's type represents any kind of private information that is relevant to its decision making. In our context, the fading channel gain is naturally considered as the type of user , since its decision (in terms of power) can only rely on . Note that this is a continuous game (a continuous game extends the notion of a discrete game (where players choose from a finite set of pure strategies), it allows players to choose a strategy from a continuous pure strategy set) with discrete states, since each player's action can take any value satisfying the constraint and the channel state is finite .

4. Bayesian Equilibrium

4.1. Definition of Bayesian Equilibrium

What we can expect from the outcome of a Bayesian game if every selfish and rational (rational player means a player chooses the best response given its information) participant starts to play the game? Generally speaking, the process of such players' behaviors usually results in a Bayesian equilibrium, which represents a common solution concept for Bayesian games. In many cases, it represents a "stable" result of learning and evolution of all participants. Therefore, it is important to characterize such an equilibrium point, since it concerns the performance prediction of a distributed system.

Now, let denote the strategy profile where all players play except player who plays , we can then describe player 's payoff as
(8)

Definition 2 (Bayesian equilibrium).

The strategy profile is a (pure strategy) Bayesian equilibrium, if for all , and for all and
(9)

where we define .

From this definition, it is clear that at the Bayesian equilibrium no player can benefit from changing its strategy while the other players keep theirs unchanged. Note that in a strategic-form game with complete information each player chooses a concrete action, whereas in a Bayesian game each player faces the problem of choosing a set or collection of actions (power strategy ), one for each type (channel gain ) it may encounter. It is also worth to mention that the action set of each player is independent of the type set, that is, the actions available to user are the same for all types.

4.2. Characterization of the Bayesian Equilibrium Set

It is well known that, in general, an equilibrium point does not necessarily exist [6]. Therefore, our primary interest in this paper is to investigate the existence and uniqueness of a Bayesian equilibrium in . We now state our main result.

Theorem 3.

There exists a unique Bayesian equilibrium in the -user game .

Proof.

It is easy to prove the existence part, since the strategy space is convex, compact, and nonempty for each ; the payoff function is continuous in both and ; is concave in for any [6].

In order to prove the uniqueness part, we should rely on a sufficient condition given in [19]: a non-cooperative game has a unique equilibrium, if the nonnegative weighted sum of the payoff functions is diagonally strictly concave. We firstly give the definition.

Definition 4 (diagonally strictly concave).

A weighted nonnegative sum function is called diagonally strictly concave for any vector and fixed vector , if for any two different vectors , we have
(10)
where is called pseudogradient of , defined as
(11)

We start with the following lemma.

Lemma 5.

The weighted nonnegative sum of the average payoffs in is diagonally strictly concave for , where is a positive scalar, is a vector whose every entry is .

Proof.

Write the weighted nonnegative sum of the average payoffs as
(12)
where is the transmit power vector and is a nonnegative vector assigning weights to the average payoffs , respectively. Similar to (11), we let be the pseudogradient of . Now, we define
(13)
the transmit power of player when its channel gain is . Since we have shown from the Lagrangian that, at the equilibrium, the power constraint is satisfied with equality, that is, , we can write , as the transmit power when its channel gain is . Therefore, it is easy to find that the average payoff can be actually transformed into a weighted sum-log function as follows:
(14)
where represents the index for different jointly probability events, represents the corresponding probability for event that are related to the probabilities , and and represent some positive and nonzero real numbers that are related to the channel gains . Note that the following conditions hold for all :
(15)
Now, we can write the pseudogradient as
(16)
where the function is defined as
(17)
To check the diagonally strictly concave condition (10), we let be two different vectors satisfying the power constraint, and define
(18)
where and are defined as
(19)

Since are assumed to be two different vectors, we must have . Now, we can draw a conclusion from the equation above: . This is because: the first part for all , since and for all ; the second part for all , and there exists at least one nonzero term , due to and for all . Therefore, the summation of all the products of the first and the second terms must be positive. From Definition 4, the sum-payoff function satisfies the condition of diagonally strictly concave. This completes the proof of this lemma.

Since our sum-payoff function given in (12) is diagonally strictly concave, the uniqueness of Bayesian equilibrium in our game follows directly from [19, Theorem ].

5. Optimal Symmetric Strategies

The Bayesian game-theoretic approach provides us a better understanding of the wireless resource competition existing in the fading MAC when every mobile device acts as a selfish and rational decision maker (this means a device always chooses the best response given its information). The advantage of this model is that it mathematically captures the behavior of selfish wireless entities in strategic situations, which can automatically lead to the convergence of system performance. The introduced Bayesian game-theoretic framework fits very well the concept of self-organizing networks, where the intelligence and decision making is distributed. Such a scheme has apparent benefits in terms of operational complexity and feedback load.

However, from the global system performance perspective, it is usually inefficient to give complete "freedom" to mobile devices and let them take decisions without any policy control over the network. It is very interesting to note that a similar situation happens in the market economy, where consumers can be modeled as players to complete for the market resources. In the famous literature The Wealth of Nations, Adam Smith (a Scottish moral philosopher, pioneer of political economy, and father of modern economics) expounded how rational self-interest and competition can lead to economic prosperity and well-being through macroeconomic adjustments. For example, all states today have some form of macroeconomic control over the market that removes the free and unrestricted direction of resources from consumers and prices such as tariffs and corporate subsidies.

In particular, wireless service providers would like to design an appropriate policy to efficiently manage the system resource so that the global network performance can be optimized or enhanced to a certain theoretical limit, for example, Shannon capacity or capacity region [20]. Apparently, a centralized scheduler with comprehensive knowledge of the network status can globally optimize the resource utility. However, this approach usually involves sophisticated optimization techniques and a feedback load that grows with the number of wireless devices in the network. Thus, the optimization-based centralized decision has to be frequently updated as long as the wireless environment varies, or the system structure changes, for example, a user joins or exits the network.

In this section, we consider that the channel statistics (fading processes) for all wireless devices are jointly stationary for a relatively long period of signal transmission, and the global system structure remains unchanged. In addition, we neglect the problem of computational complexity at the scheduler and the impact of feedback load to the useful data transmission rate. In this case, the network service provider would strictly prefer to use a centralized approach, that is, a scheduler assigns some globally optimal strategies to the wireless devices, guiding them how to react under all kinds of different situations. Based on the Bayesian game settings, we provide a special discussion on the optimal symmetric strategy design. Note that this result can be treated as a theoretical upperbound for the performance measurement of Bayesian equilibrium.

We now introduce a necessary assumption.

Assumption.

Mobile devices are designed to use the same power strategies, that is, they send the same power if their observations on the channel states are symmetric. In addition, we assume that the mobile devices have the same average power constraint, that is, .

5.1. Two Channel States

For simplicity of our presentation, We first consider the scenario of two users with two channel states. In fact, the analysis of multiuser MAC can be extended in a similar way. According to Assumption 6, we define
(20)
and we have . Write user 's average payoff as (Without loss of generality, we consider user in the following context, since the problem is symmetric for user )
(21)
Now, is transformed into a function of , write it as . To maximize the average achievable rate, user needs to solve the following optimization problem, as mentioned in (4)
(22)

Under Assumption 6, it can be shown that (due to the symmetric property) this single-user maximization problem is equivalent to the multiuser sum average rate maximization problem, that is, , which is our object in this section.

But unfortunately, may not be a convex function [18], so the single-user problem may not be a convex optimization problem. It can be further verified that is convex under some special conditions, depending on all the parameters , and . Here, we will not discuss all the convex cases, but only focus on the high SNR regime (meaning that the noise can be omitted compared to the signal strength). In this case, we have
(23)
This function is strict convex. To be more precise, it is decreasing on and increasing on , and the solution is given by
(24)

Note that in this setting the choice of the optimal symmetric strategy is to concentrate the full available power on a single channel state. The selection of the channel state on which to transmit depends not only on the channel conditions but also on the probability of the channel states. This result implies that, in the high SNR regime, the optimal symmetric power strategy is to transmit information in an "opportunistic" way. For a better understanding of the "opportunistic" transmission, the interested reads are referred to [2].

5.2. Multiple Channel States

In this subsection, we discuss the extension to arbitrary ( ) channel states. Note that the result of this subsection can also be applied to the case of two channel states.

Assumption.

Each user's channel gain has positive states, which are with probability , respectively (Without loss of generality, ), and we have .

Based on Assumption 6, we define , as the transmit power when a user's channel gain is . As previously mentioned, our object in this part is to maximize the sum ergodic capacity of the system, that is, . Under the symmetric assumption, this sum-ergodic-capacity maximization problem is equivalent to the following single-user maximization problem
(25)
where is now defined as . This optimization problem is difficult, since the objective function is again nonconvex in . However, we can consider a relaxation of the optimization by introducing a lower bound [21]
(26)
where and are chosen specified as
(27)

we say that the lower bound (26) is tight with equality at a chosen value .

Let us consider the lower bound (denoted as ) by using the relaxation (26) to the objective function in  (25)
(28)
which is still nonconvex, and so it is not concave in . However, with a logarithmic change of the following variables and constants: and , we can turn the geometric programming [18] associated with the objective function (28) into the following problem:
(29)
where is defined as
(30)
Now, it is easy to verify that the lower bound is concave in the transformed set , since the log-sum-exp function is convex. The constraints of the optimization problem are such that Slater's condition is satisfied [18]. So, the Karush-Kuhn-Tucker (KKT) condition of the optimization is sufficient and necessary for the optimality. Given the following Lagrangian dual function (denoted by ):
(31)
the KKT conditions are
(32)

where , and is a dual variable associated with the power constraint in (29).

Define , the equivalent KKT conditions can be simply written as a quadratic equation
(33)
where the parameters are expressed as
(34)
Note that and are functions of , we can write them as and . Since , the solution to the KKT conditions can only be one of the roots to the quadratic equation, that is,
(35)

where is chosen such that . Thus, for some fixed value of , we can directly apply (35) to maximize the lower bound (28). Then, it is natural to improve the bound periodically. Based on the discussion above, we propose the following algorithm, namely Lower Bound Tightening (LBT) algorithm

The algorithm convergence can be easily proved, since the objective is monotonically increasing at each iteration. However, the global optimum is not always guaranteed, due to the nonconvex property.

6. Numerical Results

In this section, numerical results are presented to validate our theoretical claims. For Figures 1 and 2, the network parameters are chosen as and .
Figure 1
Figure 1

The uniqueness of Bayesian equilibrium. (a) , (b) .

Figure 2
Figure 2

Average network sum-rate. (a) , (b) .

First, we show the existence and uniqueness of Bayesian equilibrium in the scenario of two-user fading MAC. In Figure 1(a), we assume the channel gains are ; in Figure 1(b), we assume . On both and axis, and represent the power allocated by user and user when the channel gain is . The curves and represent the best-response functions of user and user , respectively. As expected, the Bayesian equilibrium is unique in both cases, that is, (0.6,0.6) and (0.5,0.5).

Second, we investigate the efficiency of Bayesian equilibrium from the viewpoint of global average network performance. The axis, SNR is defined as the ratio between the power constraint and the noise variance . In Figure 2(a), again, we assume ; in Figure 2(b), we assume . The curve "Pareto" represents the Nash equilibrium in the waterfilling game, in which users have complete information. This gives the upper bound for our Bayesian equilibrium, since it is also the Pareto optimal solution [7]. The curve "Uniform" represents the time-domain uniform power allocation. Since this is the strategy when users have no information about the channel gains, it corresponds obviously to a lower bound. The curve "Symmetric" represents the optimal symmetric strategy presented in Section 5. This can be treated as a weaker upper bound (inferior to the Pareto optimality) for the Bayesian equilibrium. From the slopes of these curves, we can clearly observe the inefficiency of the Bayesian equilibrium, especially in the high SNR regime. This can be explained as follows: in our game , users with incomplete information improve the global network performance (comparing to the scenario in which the users have no information), however, it does not improve the performance slope.

Finally, we show the convergence behavior of the lower bound tightening (LBT) algorithm. In Figure 3, we choose the parameters as . The sum capacity versus the SNR are plotted for five iterations. The upper bound is achieved by exhaustive search. As expected, one can easily observe the convergence behavior. In the low SNR regime, we can find that the algorithm converges to the local instead of the global maximum. However, we also find that the performance of the local optimum is improved while the SNR is increasing.
Figure 3
Figure 3

The convergence of the lower bound tightening (LBT) algorithm.

7. Conclusion

We presented a Bayesian game-theoretic framework for distributed resource allocation in fading MAC, where users are assumed to have only information about their own channel gains. By introducing the assumption of finite channel states, we successfully found a analytical way to characterize the Bayesian equilibrium set. First, we proved the existence and uniqueness. Second, the inefficiency was shown from numerical results. Furthermore, we analyzed the optimal symmetric power strategy based on the practical concerns of resource allocation design. Future extension is considered to improve the efficiency of Bayesian equilibrium through pricing or cooperative game-theoretic approaches.

Algorithm 1: Lower Bound Tightening (LBT).

Initialize   ; ; , for ,

repeat

  repeat

    

    for   to   do

       update using  (34)

      

    end for

  until  

  for   to and to   do

   

  end for

  

until converge

Authors’ Affiliations

(1)
Motorola Labs, Parc Les Algorithmes, 91193 Gif sur Yvette, France
(2)
Alcatel-Lucent Chair on Flexible Radio, 3 Rue Joliot-Curie, 91192 Gif sur Yvette, France
(3)
INRIA, 2004 Route des Lucioles, 06902 Sophia Antipolis, France

References

  1. Cheng RS, Verdú S: Gaussian multiaccess channels with ISI. Capacity region and multiuser water-filling. IEEE Transactions on Information Theory 1993, 39(3):773-785. 10.1109/18.256487MATHView ArticleGoogle Scholar
  2. Knopp R, Humblet PA: Information capacity and power control in single-cell multiuser communications. Proceedings of IEEE International Conference on Communications (ICC '95), June 1995, Seattle, Wash, USA 1: 331-335.View ArticleGoogle Scholar
  3. Goldsmith AJ, Varaiya PP: Capacity of fading channels with channel side information. IEEE Transactions on Information Theory 1997, 43(6):1986-1992. 10.1109/18.641562MATHMathSciNetView ArticleGoogle Scholar
  4. Tse DNC, Hanly SV: Multiaccess fading channels—part I: polymatroid structure, optimal resource allocation and throughput capacities. IEEE Transactions on Information Theory 1998, 44(7):2796-2815. 10.1109/18.737513MATHMathSciNetView ArticleGoogle Scholar
  5. Debbah M: Mobile flexible networks: the challenges ahead. Proceedings of the International Conference on Advanced Technologies for Communications (ATC '08), October 2008, Hanoi, Vietnam 3-7.Google Scholar
  6. Fudenberg D, Tirole J: Game Theory. MIT Press, Cambridge, Mass, USA; 1991.Google Scholar
  7. Lai L, El Gamal H: The water-filling game in fading multiple-access channels. IEEE Transactions on Information Theory 2008, 54(5):2110-2122.MATHMathSciNetView ArticleGoogle Scholar
  8. He G, Beta S, Debbah M: Game-theoretic deployment design of small-cell OFDM networks. Proceedings of the 3rd ICST/ACM International Workshop on Game Theory in Communication Networks, October 2009Google Scholar
  9. Lasaulce S, Debbah M, Altman E: Methodologies for analyzing equilibria in wireless games: a look at pure, mixed, and correlated equilibria. IEEE Signal Processing Magazine 2009, 26(5):41-52.View ArticleGoogle Scholar
  10. Belmega E-V, Lasaulce S, Debbah M: Power allocation games for mimo multiple access channels with coordination. IEEE Transactions on Wireless Communications 2009, 8(6):3182-3192.View ArticleGoogle Scholar
  11. Altman E, Debbah M, Silva A: Game theoretic approach for routing in Dense ad-hoc networks. Proceedings of the Stochastic Networks Workshop, July 2007, Edinburg, UKGoogle Scholar
  12. Nash JF: Equilibrium points in N-person games. Proceedings of the National Academy of Sciences of the United States Of America 1950, 36(1):48-49. 10.1073/pnas.36.1.48MATHMathSciNetView ArticleGoogle Scholar
  13. Heikkinen T: A minmax game of power control in a wireless network under incomplete information. Tech. Rep. 99-43, DIMACS, August 1999.Google Scholar
  14. Jean CASt, Jabbari B: Bayesian game-theoretic modeling of transmit power determination in a self-organizing CDMA wireless network. Proceedings of the 60th IEEE Vehicular Technology Conference (VTC '04), 2004 5: 3496-3500.Google Scholar
  15. Adlakha S, Johari R, Goldsmith A: Competition in wireless systems via Bayesian interference games. http://arxiv.org/abs/0709.0516
  16. Gallager R: An inequality on the capacity region of multiaccess fading channels. In Communications and Cryptography: Two Sides of One Tapestry. Kluwer Academic Publishers, Boston, Mass, USA; 1994:129-139.View ArticleGoogle Scholar
  17. Altman E, Avrachenkov K, Cottatellucci L, Debbah M, He G, Suarez A: Operating point selection in multiple access rate regions. Proceedings of the 21st International Teletraffic Congress (ITC '09), June 2009, Paris, FranceGoogle Scholar
  18. Boyd S, Vandenberghe L: Convex Optimization. Cambridge University Press, Cambridge, UK; 2004.MATHView ArticleGoogle Scholar
  19. Rosen JB: Existence and uniqueness of equilibrium points for concave N-person games. Econometrica 1965, 33: 520-534. 10.2307/1911749MATHMathSciNetView ArticleGoogle Scholar
  20. Cover TM, Thomas JA: Elements of Information Theory. Wiley, New York, NY, USA; 1991.MATHView ArticleGoogle Scholar
  21. Papandriopoulos J, Evans JS: Low-complexity distributed algorithms for spectrum balancing in multi-user DSL networks. Proceedings of IEEE International Conference on Communications (ICC '06), June 2006 7: 3270-3275.Google Scholar

Copyright

© Gaoning He et al. 2010

This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Advertisement