Abstract—A power allocation or scheduling problem is studied consider power allocation problems. In the context of MIMO re-
for a multiuser multiple-input multiple-output (MIMO) wireless lays, a power allocation problem is about the determination of
relay system where there is a non-regenerative relay between the source covariance matrix and the relay matrix to maximize
one access point and multiple users. Each node in the system is
equipped with multiple antennas. The purpose of this study is to a system performance. (Note that the two terms “power sched-
develop fast algorithms to compute the source covariance matrix uling” and “power allocation” are used interchangeably in many
(or matrices) and the relay transformation matrix to optimize cases in the literature, but the former stresses the computation
a system performance. We consider the minimization of power of the latter in advance.)
consumption subject to rate constraint and also the maximization For a single-user two-hop MIMO relay system, an optimal
of system throughput subject to power constraint. These problems
are nonconvex and apparently have no simple solutions. In this
structure of the relay matrix that maximizes the source-to-desti-
paper, a number of computational strategies are presented and nation mutual information was presented in [1] and [2], and an
their performances are investigated. Both uplink and downlink optimal structure for both the source covariance matrix and the
cases are considered. The use of multiple carriers is also discussed. relay matrix was established in [3]. The optimality of this struc-
Moreover, a generalized water-filling (GWF) algorithm is devel- ture, which is essentially a diagonalization or decoupling of the
oped to solve a special class of convex optimization problems. The
entire relay system into a set of parallel scalar sub-systems, is
GWF algorithm is used for two of the strategies shown in this
paper. recently established in [5] for a broader class of objective func-
tions known as Schur-convex or Schur-concave functions. Fur-
Index Terms—Convex optimization, generalized water filling,
medium access control, multiuser MIMO relays, network of
thermore, this elegant structure is also shown in [6] to be optimal
MIMO links, nonconvex optimization, space–time power alloca- for a multi-hop MIMO relay system of any number of hops.
tion, space–time power scheduling. For multiuser MIMO relay systems, however, the above men-
tioned property does not hold any more. Finding the source co-
variance matrix and the relay matrix to maximize a system per-
I. INTRODUCTION formance is generally a difficult task. Prior efforts on multiuser
TABLE I
SUMMARY OF POWER ALLOCATION ALGORITHMS FOR A MULTIUSER MIMO RELAY SYSTEM. THE SAMPLE RUN TIMES WERE BASED ON A
DESKTOP WITH 2.40-GHZ CPU, TWO USERS EACH WITH TWO ANTENNAS AND A RELAY WITH FOUR ANTENNAS
source and the relay, is the channel matrix between Here, the source covariance matrix is matched to the right sin-
the relay and the user , and are the zero-mean gular vectors of the channel matrix , the optimality of which
Gaussian noises at the relay and the users. Here, we assume for a single user relay system is shown in [3]. The relay matrix
that all the users are equipped with the same number of antennas. here is matched to the left singular vectors of and the unitary
The transmission from the source to the relay is assumed to be matrix of , which is adopted only heuristically without
orthogonal (in time and/or frequency) to the transmission from proof of optimality. As mentioned in [7], the matrix is also
the relay to all users. We also assume that the direct link between affected by column permutations of , which can be further
the source and any of the users is very weak and negligible. optimized. With the above structures of the precoder and
Note that if the actual numbers of antennas at the users, relay the relay matrix , (7) becomes
or source are different from what is described above, we can
always add imaginary dummy antennas to make up the number (9)
or . The effective or may have
where and . Note that each element of
zero rows or zero columns, which, however, do not affect the
represents a scalar stream of data. Since is lower triangular,
expressions of our results.
it is clear from the first term of (9) that the interference from
The signal received at the relay, the signal transmitted
stream to stream for is now absent. To remove the
from the relay, and the signal received by the user can be
interference from stream to stream for , we can use
expressed as follows:
the dirty paper coding (DPC) starting from the first stream that
corresponds to the first element of in (9). For the first stream,
(4) there is no interference from other streams and the conventional
(5) coding is applied. For the second stream, there is the interfer-
(6) ence from the first stream which is however known to the en-
coder. With DPC, the interference from the first stream to the
If has a covariance matrix , we can write second stream can be virtually eliminated. The same principle
where the noise term has the co- applies to the remaining streams. Then, with DPC, the effective
variance matrix equal to the identity matrix. So, provided that signal to noise ratio for the data stream is
the noise covariance matrices of and are known, we can
assume for convenience that they are the identity matrices. We SNR (10)
now define , and
. Then, using (6) for all , we have
where is the element of . Note that the use of
(7) DPC has removed the mutual interference between the elements
of . But the first term (the sum) in the denominator of (10) is due
This is an effective channel model between the source and all to the noise forwarded from the relay. The above interference
users. cancellation method based on the QR decomposition and the
DPC is known as zero-forcing dirty paper coding (ZFDPC) [14].
A. Maximization of Sum Rate Under Power Constraint and The problem of maximizing the sum rate of this downlink
ZFDPC (Algorithms 1–2) relay system under ZFDPC can now be formulated as
The problem of maximizing the sum rate for all users under
a power constraint for the downlink case was considered in [7] SNR (11)
where each user has a single antenna. The authors also assume
the use of zero-forcing dirty paper coding (ZFDPC) [14]. We (12)
now extend the approach in [7] to users with multiple antennas. (13)
Define the QR decomposition of the matrix as
, where is an unitary matrix (which is where the power constraint (12) is for the source, and the power
not the same in Section II) and is a lower trian- constraint (13) is for the relay. In [7], the problem (11) is solved
gular matrix. Define the SVD of the channel matrix as by a geometric programming under a high SNR approximation,
where which will be referred to as Algorithm 1. Note that a weighted
with descending diagonal elements, and and are unitary. sum rate can be used for all sum rate maximization algorithms.
We assume that the source precoder generates But for convenience, we choose the unit weights.
where contains i.i.d. symbols of unit variance and is Next, we present an algorithm without the high-SNR assump-
such that the source covariance matrix is tion, referred to as Algorithm 2. We will search for and
with . in an alternate fashion, where each cycle of the alternation is as
We also assume that the relay matrix is constructed as follows.
1) Source Optimization With Fixed : It is easy to verify
that with any fixed , the problem (11) is a special case of the
problem (1) shown in Section II, and hence the optimal can
(8) be found by the GWF algorithm.
2826 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 5, MAY 2010
2) Relay Optimization With Fixed : With any fixed , the We formulate the following problem:
optimal can be found by maximizing the following penalized
function of (11):
(19)
(20)
(21)
(25)
where and
(18)
In the absence of total power constraint, the maximum possible . One can verify
data rate for user is independent of for because of that if then .Therefore,
DPC. With any given set of the source covariance matrices
for , a complete design of the vector DPC to
achieve the rates in (18) can be made by following [17]. (26)
YU AND HUA: POWER ALLOCATION FOR A MIMO RELAY SYSTEM WITH MULTIPLE-ANTENNA USERS 2827
(28) where the second term is the barrier, and both and
are functions of . With the gradient , also
Our problem now is to minimize the total power consumption denoted by , the Armijo search algorithm for
subject to rate constraints: the optimal is where is the smallest integer such
that
(29) and , where
and . Note that the second condition
(30) is important to ensure that none of
the rate constraints is violated. In fact, for good convergence
where is a desired data rate for user in bits/s/Hz. To solve behavior, for both the source optimization and the relay opti-
this problem, we can search for the optimal relay matrix and mization, we need to keep strictly inside the
the optimal source covariance matrices in an alter- interior feasible region of the problem.
nate fashion, where each cycle of the alternation is shown below. The above algorithm for power minimization is referred to
1) Source Optimization With Fixed : We now assume a as Algorithm 4. Alternatively, we can solve the problem (29)
fixed and present an algorithm for computing the optimal by a joint gradient search similar to Algorithm 3, which will be
. We will use the property that is independent referred to as Algorithm 5.
of and is a concave function of , and is a
linear function of . It follows from (28) that
IV. MULTIUSER MIMO UPLINK RELAY
A multiuser MIMO uplink relay system is illustrated in Fig. 2,
(31)
where we denote by the channel matrix from user
to the relay, and by the channel matrix from the
where , and relay to the access point. Then, we write the received signal at
we have applied . Clearly, and are relay as
one-to-one mappings of each other. We now define
(36)
(32)
the access point, starting from user . This means that the in-
terference from user to user for is virtually absent, and
hence the achievable data rate for user is It should be clear now that with respect to alone, the problem
(40) is equivalent to the convex problem (1) which is solvable
by the GWF algorithm.
2) Relay Optimization With Fixed Sources: If
are fixed, then the problem (40) with respect to alone is
similar to a problem solved in [3], the solution of which is
stated below. Define the SVD of as where
(39) with descending diagonal order, and
where . the EVD of as where
with descending diagonal order.
A. Maximization of Sum Rate Under Power Constraint Then, the optimal structure of is given by
(Algorithms 6–7)
The problem of maximizing the sum rate from all users under (44)
power constraints is formulated as shown in (40)–(42) at the
bottom of the page. where which are to be deter-
Note that the sum rate of the uplink case is independent of mined. With (44), the problem (40) becomes
the order of SIC, which is unlike the sum rate of the downlink
case with DPC. To solve this problem, we can optimize each
of in a cyclic fashion. The basic components in
each cycle are shown below.
1) Source Optimization With Fixed Relay and Other Sources: (45)
If all , but , are fixed, we can define
and
Then, by the KKT method [15], we have
(46)
(40)
(41)
(42)
(43)
YU AND HUA: POWER ALLOCATION FOR A MIMO RELAY SYSTEM WITH MULTIPLE-ANTENNA USERS 2829
Fig. 3. Comparison of downlink Algorithms 1–3: Averaged sum rate versus Fig. 4. Comparison of downlink Algorithms 4–5: Averaged total power con-
power constraint at relay. Algorithm 2-A is Algorithm 2 using the best out of sumption versus individual rate constraint. The curve on the top is for the iden-
20 random initializations. Algorithm 2-B is Algorithm 2 using the results from tity relay matrix.
Algorithm 1 as initializations.
summed over the two users for carrier 1 and carrier 2, respec-
tively. The total power for the two carriers used for the first curve
is twice that for each carrier used for the other curves. The power
per carrier is the same for all curves. We see that there is an im-
provement of the sum rate by using joint multi-carrier power
allocation, which is expected. However, the improvement is not
large. It is known that the distribution of the singular values of a
matrix of i.i.d random variables hardens (becomes invariant) as
the dimension of the matrix increases [19]. Hence, if the number
of antennas at each node becomes large, the improvement from
the joint multi-carrier power allocation is expected to disappear.
VII. CONCLUSION
In this paper, we have developed several computational
strategies for a multiuser MIMO relay system where each node
may be equipped with multiple antennas. The complexities of
Fig. 6. Comparison of uplink Algorithms 8–9: Averaged total power consump-
tion versus individual rate constraint. The curve on the top is for the identity these algorithms are about the same, but their performances
relay matrix. can be very much different. Although the central problem is
nonconvex, the joint gradient search for the relay matrix and
the source covariance matrices, with multiple random initial-
izations, has consistently yielded the best result. The use of
logarithmic barrier functions, which is a key approach of the
interior-point optimization methods, has been very effective
for constrained optimizations. But for one case, the cyclic
(or alternating) search for the relay matrix and the source
covariance matrices yielded results similar to those by the
joint gradient search. The GWF algorithm shown in this paper
is a faster alternative to the CVX algorithm (or package) to
solve the convex problem (1). In applications with practical
coding methods, the rate-versus-power model of each link may
need to be revised with simple penalty factors while the power
allocation algorithms shown in this paper are still applicable.
This paper has shown that fast algorithms for power allocation
are very important to achieve the full potentials of MIMO relay
Fig. 7. An example of joint multi-carrier power allocation for downlink multi- systems with multiple-antenna users.
user MIMO relay system where K=2N=2M=4, , and M =2 .
Algorithm 3 was applied with 20 random initializations. The rates shown are
based on a single channel realization for each of the two carriers.
APPENDIX I
PROOF OF THEOREM 1
For any (i.e., positive semi-definite), we can write
Fig. 6 compares the averaged total power consumption re- where is a full column rank matrix. With respect
quired by the uplink Algorithms 8–9 versus a common data rate to , we can write the following Lagrangian function of (1):
of all users. Also shown in this figure is a curve based on the
identify relay matrix, i.e., , while the source covariance
matrices of all users are optimized by the source optimization
subroutine in Algorithm 8. In this case, the joint gradient search (61)
by Algorithm 9 yields better results than the cyclic search by
Algorithm 8.
Finally, Fig. 7 illustrates an effect of joint multi-carrier power The gradient of with respect to can be found by using
allocation. Here, the relay system is for downlink, there are two , and
users , each user has two antennas , there other basic tools [18]. The result is
are four antennas at the relay node and four antennas at the ac-
cess point , and there are two carriers . For
each of the two carriers, an independent channel realization was
made. The first top curve is the sum rate over two users and two
carriers, which was obtained by the joint multi-carrier power al-
location. The second top curve is the sum rate over two users and
two carriers, which was obtained by two separate single-carrier (62)
power allocations. The bottom two curves are the sum rates each
2832 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 5, MAY 2010
Then, the complete K.K.T. conditions [15] of the problem (1) to Example 2.24 in [15], that . Then, as long as
with respect to can be written as and , we have that (68) implies
, (63) implies (72) and vice versa. On the other hand, if
does not hold, then does not hold because
of (68). Therefore, if and only if , (63)–(66) are
(63) equivalent to (68)–(72).
Next, we construct an optimal structure of based on (63).
(64) Since and is nonsingular, (63) is
(65) equivalent to (73), shown at the bottom of the page. Define the
(66) SVD of as
where . (74)
Although the problem (1) with respect to is not convex,
we now show that the generalized KKT conditions [15] of the
where and are square unitary matrices, (square) and
problem (1) with respect to , which is convex, are equiv-
(possibly nonsquare) are diagonal, all the diagonal elements of
alent to (63)–(66). Consider as in (61) with replaced
are larger than one, and all the diagonal elements of are
by . It follows that
less than or equal to one. We now assume that
where is nonsingular. Then, (73) is equivalent to (75), shown
(67) at the bottom of the next page, where for and we used the
matrix inverse lemma. We see that since ,
the above solution for , and hence the corresponding , is a
We define a vector operator for a complex conjugate symmetric
valid solution.
matrix as follows:
The above solution of has the same span as .A
simple observation of the above analysis also suggests that as
long as the span of belongs to that of , a matrix ex-
ists such that satisfies (73) where is a sub-
Here, stacks up all elements from , and matrix (selected columns) of . On the other hand, if the span
stacks up all elements from . Assume of contains a vector from , i.e., where
. Then, . Now, based on (5.95) in [15], has a column vector from , then there does not exist
we have the following sufficient generalized KKT conditions: such a matrix for to satisfy (73), or equivalently the corre-
sponding “solution” would be nonpositive semi-definite
which contradicts to the fundamental nature of . There-
(68) fore, the highest rank solution of to satisfy (73) is given by
(69) where . Equivalently, the
(70) highest rank solution of to satisfy (73) is given by
(71)
(72)
(76)
where , . Also,
, and is in the dual cone of , i.e.,
where , the inverse of a zero (squared singular
. The term in
value) would be treated as positive infinity, and
(68) is due to the constraint , for which we have used
applies on each diagonal element of itself.
.
With (76) and (67), one can verify that
Note that for any two complex conjugate symmetric and
positive semi-definite matrices and , the following
equations are equivalent:
(73)
YU AND HUA: POWER ALLOCATION FOR A MIMO RELAY SYSTEM WITH MULTIPLE-ANTENNA USERS 2833
Note that the th diagonal element of the diagonal matrix be- logarithmic barrier terms:
tween and in (77), denoted by , is
(79)
if
(78)
if
where we use to stress that is a function of . Note that
where is the diagonal element of . If we did not use
the first two terms in (79) equal to , which we want to
the highest rank solution for as in (76), then there would be
maximize subject to . For each choice of , we can apply
a associated with a and hence (77)
the Newton’s method [15] to find the optimal , i.e.,
would not hold and hence the corresponding from (68) would
not belong to .
With the optimal given in (76), which is a function of (80)
, the remaining problem is to find the optimal .
Since the effective KKT equations for are the same for both where denotes the iteration index and the scalar is deter-
(63)–(66) and (68)–(72), the optimal can be found by using mined by the backtracking line search. Upon convergence for
either the dual problem of (1) with respect to or the dual each , we can increase by a factor and continue a new
problem of (1) with respect to . Choosing the former, we can cycle of the Newton’s search. The above process continues until
find the optimal by solving (3). The dual problem of (1) with is smaller than a pre-specified number .
respect to is the same as (3) except for the additional term The computation of the gradient vector and the
which is however maximized to zero by for any Hessian matrix is straightforward although the
. detailed expressions are lengthy. Since depends on the
The proof of the theorem is completed. In the next section, we eigenvalue decomposition of and the compu-
show how to find the optimal in more details. For the primal tation of also needs the eigenvalue
problem (1), has real elements. (Even under the con- decomposition of , we need to use the first-order
straint , has free real-part elements, and second-order differentials of eigenvalues and eigenvectors.
free imaginary-part elements, and hence total The basic formulas for these differentials can be found in [18].
free real elements.) For the dual problem (3), there are real The detailed expressions of the gradient and the Hessian are
variables in . If , it is reasonable to expect the dual omitted to save space.
problem to be less costly to solve. To avoid possible numerical problems in computing the
differentials of eigenvectors when there are multiple identical
APPENDIX II eigenvalues, we added a small random perturbation matrix
COMPUTATION OF THE DUAL PROBLEM IN THEOREM 1 to in our program, which proved to be very
Since the dual problem is convex, we can follow the interior- effective. A complete Matlab script of the GWF algorithm is
point method [15] and define the following dual function with available at http://www.ee.ucr.edu/-yhua/GWF.pdf.
(75)
2834 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 5, MAY 2010
APPENDIX III
for the outer loop. We noticed that for each , the inner loop
A COMPARISON OF GWF AND CVX
converged after about eight iterations.
At the convergence, the following results from the GWF al-
To show a comparison of our GWF algorithm with CVX in gorithm and the CVX algorithm were obtained: see the second
[13], we ran both algorithms on a desktop with 2.40-GHz CPU. equation at the top of the page.
We chose , , , and used the complex These two matrices agree with each other very well. Both
Gaussian distribution with zero mean and unit variance to ran- GWF and CVX achieve the same value of capacity 2.6139 in
domly choose each element in the following matrices: see the bits/s/Hz (i.e., in (1)). But GWF took 3.40 seconds while
first equation at the top of the page. CVX took 14.94 seconds. GWF is about four times faster than
For the GWF algorithm, the initial elements of CVX. Note that the dimension of used here is larger than that
were randomly chosen between zero and . We chose used for Algorithms 2 and 6 shown in Table I.
as the stopping crite- Fig. 8 shows how of the GWF converged to the optimal
rion for the inner loop (for fixed ). We also chose and as the outer iterations continued. We see that approaches to
, and finally as the stopping criterion zero, which means that the second power constraint is satisfied
YU AND HUA: POWER ALLOCATION FOR A MIMO RELAY SYSTEM WITH MULTIPLE-ANTENNA USERS 2835
automatically while the first power constraint is active. Fig. 9 [17] S.-C. Lin and H.-J. Su, “Practical vector dirty paper coding for MIMO
illustrates the capacity as function of the barrier constant . Gaussian broadcast channels,” IEEE J. Sel. Areas Commun., vol. 25,
pp. 1345–1357, Sep. 2007.
[18] J. Magnus and H. Neudecker, Matrix Differential Calculus With Appli-
REFERENCES cations in Statistics and Econometrics. New York: Wiley, 1999.
[19] R. Wegmann, “The asymptotic eigenvalue-distribution for a certain
[1] X. Tang and Y. Hua, “Optimal design of non-regenerative MIMO wire- class of random matrices,” J. Math. Anal. Appl., vol. 56, pp. 113–132,
less relay,” IEEE Tans. Wireless Commun., vol. 6, pp. 1398–1407, Apr. 1976.
2007.
[2] O. Munoz-Medina, J. Vidal, and A. Agustin, “Linear transceiver design Yuan Yu received the B.E. degree in automation
in nonregenerative relays with channel state information,” IEEE Trans. from Nankai University, Tianjin, China, in 2002,
Signal Process., vol. 55, no. 6, pp. 2593–2604, Jun. 2007. the M.S. in automatic control from the Institute of
[3] Z. Fang, Y. Hua, and J. Koshy, “Joint source and relay optimization Automation, Chinese Academy of Sciences, Beijing,
for a non-regenerative MIMO relay,” presented at the IEEE Workshop China, in 2005, and the Ph.D. degree in electrical
Sensor Array Multi-Channel Processing, Waltham, MA, Jul. 2006. engineering from the University of California River-
[4] Y. Fan and J. Thompson, “MIMO configurations for relay channels: side, in 2009.
Theory and practice,” IEEE Tans. Wireless Commun., vol. 6, pp. His research interests include cooperative wireless
1774–1786, May 2007. communications, wireless multi-hop networks, and
[5] Y. Rong, X. Tang, and Y. Hua, “A unified framework for optimizing multiuser MIMO communication systems.
linear non-regenerative multicarrier MIMO relay communication sys-
tems,” IEEE Trans. Signal Process., vol. 57, no. 12, pp. 4837–4852,
Dec. 2009.
[6] Y. Rong and Y. Hua, “Optimality of diagonalization of multi-hop
MIMO relays,” IEEE Tans. Wireless Commun., vol. 8, no. 12, pp. Yingbo Hua (S’86–M’88–SM’92–F’02) received
6068–6077, 2009. the B.S. degree in control engineering from Nanjing
[7] C. Chae, T. Tang, R. Heath, and S. Cho, “MIMO relaying with linear Institute of Technology (the predecessor of Southeast
processing for multiuser transmission in fixed relay networks,” IEEE University), Nanjing, China, in February 1982, and
Trans. Signal Process., vol. 56, no. 2, pp. 727–738, Feb. 2008. the M.S. and Ph.D. degrees in electrical engineering
[8] L. Weng and R. Murch, “Multi-user MIMO relay system with self-in- from Syracuse University, Syracuse, NY, in 1983
terference cancellation,” in Proc. IEEE Wireless Communications Net- and 1988, respectively.
working Conf. (WCNC), 2007, pp. 958–962. From 1988 to 1989, he was a Research Fellow
[9] S. Jafar, K. Gomadam, and C. Huang, “Duality and rate optimization at Syracuse, consulting for Syracuse Research
for multiple access and broadcast channels with amplify-and-forward Company, NY, and Aeritalia Company, Italy. He
relays,” IEEE Trans. Inf. Theory, vol. 53, pp. 3350–3370, Oct. 2007. was Lecturer from February 1990 to 1992, Senior
[10] W. Zhang and U. Mitra, “Channel-adaptive frequency-domain relay Lecturer from 1993 to 1995, and Reader and Associate Professor from 1996
processing in multicarrier multihop transmission,” presented at the Int.. to 2001 with the University of Melbourne, Australia. He served as a Visiting
Conf. Acoustics, Speech, Signal Processing (ICASSP), Las Vegas, NV, Professor with the Hong Kong University of Science and Technology from
Apr. 2008. 1999 to 2000, and consulted for Microsoft Research Company, WA, in summer
[11] S. Berger, M. Kuhn, A. Wittneben, T. Unger, and A. Klein, “Recent 2000. Since February 2001, he has been Professor of Electrical Engineering
advances in amplify-and-forward two-hop relaying,” IEEE Commun. with the University of California, Riverside. He is an author/coauthor of
Mag., pp. 50–56, Jul. 2009. numerous articles in journals, conference proceedings, and books, which span
[12] S. Vishwanath, M. Jindal, and A. Goldsmith, “Duality, achievable rates the fields of sensor array signal processing, channel and system identification,
and sum-rate capacity of Gaussian MIMO broadcast channels,” IEEE wireless communications and networking, and distributed computations in
Trans. Inf. Theory, vol. 49, pp. 2658–2668, Oct. 2003. sensor networks. He is a co-editor of Signal Processing Advances in Wireless
[13] M. Grant and S. Boyd, CVX: Matlab Software for Disciplined Convex and Mobile Communications, (Prentice-Hall, 2001) and High-Resolution and
Programming, 2008 [Online]. Available: http://stanford.edu/boyd/cvx Robust Signal Processing (Marcel Dekker, 2003).
[14] H. Weingarten, Y. Steinberg, and S. Shamai, “The capacity region of Dr. Hua has served on the Editorial Boards for the IEEE TRANSACTIONS ON
the Gaussian multiple-input multiple-output broadcast channel,” IEEE SIGNAL PROCESSING, the IEEE SIGNAL PROCESSING LETTERS, the IEEE Signal
Trans. Inf. Theory, vol. 52, pp. 3936–3964, Sep. 2006. Processing Magazine, and Signal Processing (EURASIP). He also served on the
[15] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, IEEE SPS Technical Committees for Underwater Acoustic Signal Processing,
U.K.: Cambridge Univ. Press, 2004. Sensor Array and Multi-channel Signal Processing, and Signal Processing for
[16] D. Bertsekas, Nonlinear Programming, 2nd ed. Singapore: Athena Communications and Networking, and on numerous international conference
Scientific, 1995. organization committees.