{"id":"https://openalex.org/W2159082569","doi":"https://doi.org/10.1109/isit.2005.1523578","title":"Memory-based opportunistic multi-user beamforming","display_name":"Memory-based opportunistic multi-user beamforming","publication_year":2005,"publication_date":"2005-01-01","ids":{"openalex":"https://openalex.org/W2159082569","doi":"https://doi.org/10.1109/isit.2005.1523578","mag":"2159082569"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2005.1523578","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2005.1523578","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088602155","display_name":"Marios Kountouris","orcid":"https://orcid.org/0000-0003-1143-080X"},"institutions":[{"id":"https://openalex.org/I19370010","display_name":"Orange (France)","ror":"https://ror.org/035j0tq82","country_code":"FR","type":"company","lineage":["https://openalex.org/I19370010"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"M. Kountouris","raw_affiliation_strings":["France Telecom Research and Development Technology, France"],"affiliations":[{"raw_affiliation_string":"France Telecom Research and Development Technology, France","institution_ids":["https://openalex.org/I19370010"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021728919","display_name":"David Gesbert","orcid":"https://orcid.org/0000-0002-4806-704X"},"institutions":[{"id":"https://openalex.org/I1902872","display_name":"EURECOM","ror":"https://ror.org/00sse7z02","country_code":"FR","type":"education","lineage":["https://openalex.org/I1902872","https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"D. Gesbert","raw_affiliation_strings":["Eurecom Institute, France"],"affiliations":[{"raw_affiliation_string":"Eurecom Institute, France","institution_ids":["https://openalex.org/I1902872"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5088602155"],"corresponding_institution_ids":["https://openalex.org/I19370010"],"apc_list":null,"apc_paid":null,"fwci":8.1809,"has_fulltext":false,"cited_by_count":100,"citation_normalized_percentile":{"value":0.97824997,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11409","display_name":"Advanced Wireless Network Optimization","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/beamforming","display_name":"Beamforming","score":0.8051886558532715},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7537068128585815},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.720596432685852},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.7151472568511963},{"id":"https://openalex.org/keywords/telecommunications-link","display_name":"Telecommunications link","score":0.6558316946029663},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6521098613739014},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.6152677536010742},{"id":"https://openalex.org/keywords/unitary-state","display_name":"Unitary state","score":0.5153160095214844},{"id":"https://openalex.org/keywords/asymptotically-optimal-algorithm","display_name":"Asymptotically optimal algorithm","score":0.5020549297332764},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4493532180786133},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4267718195915222},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3832129240036011},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2877908945083618},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.2227821946144104},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.2191680669784546},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.21159416437149048},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.19690868258476257}],"concepts":[{"id":"https://openalex.org/C54197355","wikidata":"https://www.wikidata.org/wiki/Q5782992","display_name":"Beamforming","level":2,"score":0.8051886558532715},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7537068128585815},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.720596432685852},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.7151472568511963},{"id":"https://openalex.org/C138660444","wikidata":"https://www.wikidata.org/wiki/Q5607897","display_name":"Telecommunications link","level":2,"score":0.6558316946029663},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6521098613739014},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.6152677536010742},{"id":"https://openalex.org/C67820243","wikidata":"https://www.wikidata.org/wiki/Q179164","display_name":"Unitary state","level":2,"score":0.5153160095214844},{"id":"https://openalex.org/C181789720","wikidata":"https://www.wikidata.org/wiki/Q4812191","display_name":"Asymptotically optimal algorithm","level":2,"score":0.5020549297332764},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4493532180786133},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4267718195915222},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3832129240036011},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2877908945083618},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.2227821946144104},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2191680669784546},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.21159416437149048},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.19690868258476257},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2005.1523578","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2005.1523578","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2083962008","https://openalex.org/W2106177032","https://openalex.org/W2109002317","https://openalex.org/W2127647164","https://openalex.org/W2131629655","https://openalex.org/W2142134616","https://openalex.org/W2145403270","https://openalex.org/W2151795416","https://openalex.org/W2158116199","https://openalex.org/W2161410889","https://openalex.org/W2161872841","https://openalex.org/W2168124888","https://openalex.org/W2169581160","https://openalex.org/W4239651601","https://openalex.org/W6679491336"],"related_works":["https://openalex.org/W2016672139","https://openalex.org/W2093169852","https://openalex.org/W2344456696","https://openalex.org/W2983348339","https://openalex.org/W2542923267","https://openalex.org/W3190774574","https://openalex.org/W3092731089","https://openalex.org/W2939966692","https://openalex.org/W2535681753","https://openalex.org/W2159082569"],"abstract_inverted_index":{"A":[0],"scheme":[1,11,74],"exploiting":[2,92],"memory":[3,93],"in":[4,17,24,47,94,127],"opportunistic":[5],"multiuser":[6],"beamforming":[7],"is":[8,54,63,75],"proposed.":[9],"The":[10],"builds":[12],"on":[13,34],"recent":[14],"advances":[15],"realized":[16],"M.":[18,48],"Sharif":[19,49],"and":[20,31,44,50],"B.":[21,51],"Hassibi,":[22,52],"2005,":[23],"the":[25,42,57,83,95,100,128],"area":[26],"of":[27,59,70,82,109],"multi-user":[28],"downlink":[29],"preceding":[30,43],"scheduling":[32,45],"based":[33],"partial":[35],"transmitter":[36,96],"channel":[37],"state":[38],"information":[39],"(CSIT).":[40],"Although":[41],"done":[46],"2005":[53],"optimal":[55],"within":[56],"set":[58],"unitary":[60],"precoders,":[61],"it":[62],"only":[64],"so":[65],"asymptotically":[66],"for":[67,104,111],"large":[68],"number":[69,108],"users.":[71],"Secondly,":[72],"this":[73,86],"unable":[76],"to":[77,98,102,122],"exploit":[78],"potential":[79],"time":[80,112],"correlation":[81],"channel.":[84],"In":[85],"paper,":[87],"we":[88],"show":[89],"(1)":[90],"that":[91],"allows":[97],"fill":[99],"gap":[101],"optimality":[103],"fixed":[105],"(even":[106],"low)":[107],"users":[110],"correlated":[113],"channels,":[114],"(2)":[115],"how":[116],"such":[117],"schemes":[118],"can":[119],"be":[120],"extended":[121],"take":[123],"fairness":[124],"into":[125],"account":[126],"proportional":[129],"fair":[130],"sense":[131]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":12},{"year":2014,"cited_by_count":7},{"year":2013,"cited_by_count":13},{"year":2012,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
