Skip to main content Accessibility help
×
Hostname: page-component-84b7d79bbc-g5fl4 Total loading time: 0 Render date: 2024-07-29T20:30:31.153Z Has data issue: false hasContentIssue false

2 - Theoretical foundations

from Part I - Overview

Published online by Cambridge University Press:  05 December 2012

Preston Marshall
Affiliation:
University of Southern California
Get access

Summary

Introduction to theoretical considerations in wireless systems

This chapter is intended to provide a short summary of the relevant portions of each of the theories that are considered to be fundamental to the development of cognitive wireless systems. Some introductory material on radio-frequency (RF) propagation and device operating constraints is also provided for those not familiar with the relevant device and communications physics. Only those aspects of each area that are utilized in the analysis in the latter chapters are included, so this material should not be considered as even an introduction to any of the four areas. In most cases, the results are stated, and the reader is referred to the references, or further reading, for their derivation, or for a more comprehensive and complete development of each field of study.

Decision theory in cognitive wireless systems

Role of decision theory

One of the principles that we wish to introduce to wireless networking is that nodes have no absolute or mandatory requirement to perform any sensing, protocol reporting, or content-storage requirements. Instead of performing these operations automatically, they are considered to be performed only if the node can justify performing the operation on the basis of the likely performance benefits it achieves, or the performance risks it avoids. Information theory expresses the probabilistic considerations.

Decision-theory literature generally partitions into “normative,” which addresses how rational decisions should be made, and “descriptive,” which describes how humans actually make decisions.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2012

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

1 V., Cerf, S., Burleigh, A., Hooke, L., Torgerson, R., Durst, K., Scott, K., Fall, and H., Weiss, Delay-Tolerant Network Architecture, Internet Engineering Task Force Report IETF RFC 4838, April 2007.Google Scholar
2 G., Shafer, A Mathematical Theory of Evidence. Princeton, MA: Princeton University Press, 1976.Google Scholar
3 R. R., Yager, “Entropy and specificity in a mathematical theory of evidence,” International Journal of General Systems, vol. 9, pp. 249–260, 1983.Google Scholar
4 T., Inagaki, “Interdependence between safety-control policy and multiple-sensor schemes via Dempster–Shafer theory,” IEEE Transactions on Reliability, vol. 40, no. 2, pp. 182–188, 1991.Google Scholar
5 L., Zhang, “Representation, independence, and combination of evidence in the Dempster–Shafer theory. Advances in the Dempster–Shafer theory of evidence,” in Advances in the Dempster–Shafer Theory of Evidence, R. R., Yager, J., Kacprzyk, and M., Fedrizzi, eds. New York: John Wiley & Sons, 1994, pp. 51–69.Google Scholar
6 D., Dubois and H., Prade, “A set-theoretic view on belief functions: Logical operations and approximations by fuzzy sets,” International Journal of General Systems, vol. 12, pp. 193–226, 1986.Google Scholar
7 C. E., Shannon, “A mathematical theory of communication,” Bell System Technical Journal, vol. 27, pp. 379–423 and 623–656, July and Oct. 1948.Google Scholar
8 H., Beker and F., Piper, Cipher Systems: The Protection of Communications. New York: Wiley-Interscience, 1982.Google Scholar
9 N., Gershenfeld, The Physics of Information Technology. Cambridge: Cambridge University Press, 2000.Google Scholar
10 W., Leland, M., Taqqu, W., Willinger, and D., Wilson, “On the self-similar nature of Ethernet trafic (extended version),” IEEE/ACM Transactions on Networking, vol. 2, no. 1, pp. 1–15, Feb. 1994.Google Scholar
11 G. K., Zipf, The Psychobiology of Language. Boston, MA: Houghton-Mifflin, 1935.Google Scholar
12 G. K., Zipf, Human Behavior and the Principle of Least Effort. Cambridge, MA: Addison-Wesley, 1949.Google Scholar
13 U. L., Rhode and D. P., Newkirk, RF/Microwave Circuit Design for Wireless Applications. New York: John Wiley & Sons, 2000.Google Scholar
14 L., Luna, “NEXTEL interference debate rages on,” Mobile Radio Technology, Aug. 1, 2003.Google Scholar
15 United States Federal Communications Commission, “Comment deadlines established regarding the Lightsquared Technical Working Group report,” Technical Report DA 11-1133, June 2011.
16 National Space-Based Positioning, Navigation, and Timing Systems Engineering Forum (NPEF), “Assessment of LightSquared Terrestrial Broadband System Effects on GPS Receivers and GPS-dependent Applications,” 1 June 2011.
17 T. M., Cover and J. A., Thomas, Elements of Information Theory. New York: John Wiley & Sons, 1991.Google Scholar
18 N. N., Taleb, The Black Swan. London: Random House, 2007.Google Scholar
19 P., Gupta and P. R., Kumar, “The capacity of wireless networks,” IEEE Transactions on Information Theory, vol. IT-46, no. 2, pp. 388–404, March 2000.Google Scholar
20 D. J., MacKay, Information Theory, Inference, and Learning Algorithms. Cambridge: Cambridge University Press, 2003.Google Scholar
21 J. Y., Halpern, Reasoning about Uncertainty. Cambridge, MA: MIT Press, 2003.Google Scholar
22 R., Yager and L., Liu, eds., Classic Works of the Dempster–Shafer Theory of Belief Functions (Studies in Fuzziness and Soft Computing). Berlin: Springer, 2008.
23 L., Freeman, The Development of Social Network Analysis. Vancouver: Empirical Press, 2006.Google Scholar
24 A., Molisch, Wireless Communications. New York: Wiley-IEEE Press, 2005.Google Scholar
25 A., Goldsmith, Wireless Communications. Cambridge: Cambridge University Press, 2005.Google Scholar
26 S., Oh, “Exclusion principles and receiver boundaries on spectrum resources,” in 39th Telecomunications Po licy Research Conference, Sept. 23–25, 2011.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Theoretical foundations
  • Preston Marshall, University of Southern California
  • Book: Scalability, Density, and Decision Making in Cognitive Wireless Networks
  • Online publication: 05 December 2012
  • Chapter DOI: https://doi.org/10.1017/CBO9781139058599.003
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Theoretical foundations
  • Preston Marshall, University of Southern California
  • Book: Scalability, Density, and Decision Making in Cognitive Wireless Networks
  • Online publication: 05 December 2012
  • Chapter DOI: https://doi.org/10.1017/CBO9781139058599.003
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Theoretical foundations
  • Preston Marshall, University of Southern California
  • Book: Scalability, Density, and Decision Making in Cognitive Wireless Networks
  • Online publication: 05 December 2012
  • Chapter DOI: https://doi.org/10.1017/CBO9781139058599.003
Available formats
×