IEICE TRANS. COMMUN., VOL.E95–B, NO.5 MAY 2012

1873

LETTER

Symbol Error Rate of Underlay Cognitive Relay Systems over Rayleigh Fading Channel Khuong HO VAN†a) , Nonmember and Vo Nguyen Quoc BAO††b) , Member

SUMMARY Underlay cognitive systems allow secondary users (SUs) to access the licensed band allocated to primary users (PUs) for better spectrum utilization with the power constraint imposed on SUs such that their operation does not harm the normal communication of PUs. This constraint, which limits the coverage range of SUs, can be offset by relaying techniques that take advantage of shorter range communication for lower path loss. Symbol error rate (SER) analysis of underlay cognitive relay systems over fading channel has not been reported in the literature. This paper fills this gap. The derived SER expressions are validated by simulations and show that underlay cognitive relay systems suffer a high error floor for any modulation level. key words: decode-and-forward, cognitive radio, underlay, Rayleigh fading channel

1.

Introduction

Many emerging wireless applications such as video calling, online high-definition video watching, high-speed Internet access through mobile devices, etc. require high transmission spectrum while spectrum resources are very scarce. Countering the perception of spectrum scarcity, the currently licensed spectrum is significantly under-utilized as shown in a recent survey of spectrum utilization made by the Federal Communications Commission [1]. Fortunately, the spectrum usage considerably varies in various time, frequency, and locations. As such, SUs can access the licensed band primarily allocated to PUs whenever PUs are quiescent, dramatically improving the spectrum utilization. In cognitive radio, SUs are generally allowed to use the licensed band unless their operation does not interfere with the normal communication of PUs in three modes: underlay, overlay, and interweave [2]. In the underlay mode, SUs are allowed to use the spectrum when the interference caused by SUs on PUs is within the range tolerated by PUs. In the overlay mode, SUs simultaneously share the same spectrum with PUs while maintaining or improving the transmission of PUs. In the interweave mode, SUs are only permitted to use the empty spectrum left by PUs. This paper considers the underlay mode for low implementation complexity since in order to constrain the interference not to exceed a Manuscript received September 19, 2011. Manuscript revised January 2, 2012. † The author is with HoChiMinh City University of Technology, Vietnam. †† The author is with Posts and Telecommunications Institute of Technology, Vietnam. a) E-mail: [email protected] b) E-mail: [email protected] DOI: 10.1587/transcom.E95.B.1873

certain level in this mode, SUs only need to limit their transmit power according to channel variation while the overlay mode requires the complicated signal processing and coding to reduce the interference on PUs, and the interweave mode demands the efficient and sophisticated spectrum sensing to detect the empty spectrum [3]. Since SUs need to limit their transmit power in the underlay mode, their transmission range is significantly reduced. Relaying techniques, which take advantage of shorter range communication for lower path loss can complement and overcome the above shortage of underlay cognitive systems. Indeed, a secondary source, instead of directly communicating a distant secondary destination with the high transmit power for reliable reception, can ask another SU in between them to relay its information. As such, the shorter communication range between the secondary source and the secondary relay, and between the secondary relay and the secondary destination apparently offers lower path loss for point-to-point communication, requiring lower transmit power (i.e., lower interference level) while still guaranteeing the same accurate data transmission. Among various relaying techniques, decode-and-forward (DF) and amplify-and-forward (AF) have been extensively investigated [4]. In DF, each relay decodes information from the source, re-encodes it, and then forwards it to the destination. In AF, each relay simply amplifies the received signal and forwards it to the destination. Due to its capability of regenerating noise-free relayed signals, DF is selected in this paper. The outage probability of underlay cognitive relay systems with DF was analyzed in [2], [5]. More specifically, [2] proposed a relay selection method and derived the outage probability of underlay cognitive relay systems, where a secondary transmitter is assisted by the selected secondary relay in its transmission to a secondary destination, and [5] extended single-carrier transmission in [2] into multi-carrier one. Since outage probability serves as a lower bound to the frame error rate for block fading environment, in which the channel is constant over a block and is independent from one block to another [6], outage probability analysis can provide an insight into the theoretic-information performance limit and motivate code design to reach such a limit. As another performance metric, SER shows the real (i.e., not a limit) system performance for a given target spectral efficiency (i.e., modulation level). However, few works on SER analysis of cognitive relay systems have been reported in [7], [8]. A common feature of these works is not to in-

c 2012 The Institute of Electronics, Information and Communication Engineers Copyright 

IEICE TRANS. COMMUN., VOL.E95–B, NO.5 MAY 2012

1874

vestigate the power constraint of the secondary transmitters (i.e., source and relay), which is strictly required in the underlay cognitive relay systems. In this paper, we derive SER expressions for such systems. The offered expressions are in the form of single integrals, which are straightforwardly computed via numerical methods, or approximated in the form of the exponential integral function, an integral part of most computation programs. These expressions are validated by simulations and show that underlay cognitive relay systems suffer a high error floor for any modulation level. Therefore, it is implicitly inferred that underlay cognitive relay systems may not be a good candidate for improving spectrum utilization and coverage extension.

transmit power is imposed by two constraints: interference constraint, Pt ≤ IT /|htP |2 , and maximum transmit power constraint, Pt ≤ Pm , where IT is the maximum interference level that PU still operates reliably and Pm is the maximum transmit power. In other words, Pt ≤ min(IT /|htP |2 , Pm ). Consequently, the actual transmit power can be lower than the maximum one (i.e., when IT /|htP |2 ≤ Pm ), resulting in the coverage range of the secondary transmitter in underlay cognitive systems less than that in other ones (e.g., interweave cognitive systems). Due to DF, the effective received signal-to-noise ratio (SNR) at the secondary destination is given by [2], [10]

2.

where γtr = Pt |htr |2 /N0 = min(IT /|htP |2 , Pm )|htr |2 /N0 is the SNR of the t − r link. The minimum in (3) is due to the fact that the channel capacity of the system is limited by the worst link. The average SER of BPSK and square M-QAM with M = 4k (k = 1, 2, . . .) modulation schemes††† are expressed, respectively, as [11]  ∞   Q 2γ fγDF (γ) dγ, Pe,BPSK = (4) 0  ∞ √  Pe,M−QAM = 4K Q gγ fγDF (γ)dγ 0  ∞ √  2 Q2 gγ fγDF (γ)dγ, (5) − 4K

System Model and SER Derivation

The underlay cognitive relay system model under consideration is depicted in Fig. 1, where a secondary relay R assists the transmission of a secondary source S to a secondary destination D, and both S and R use the same spectrum as a primary user P. The direct communication between S and D is bypassed, which may be reasonable in scenarios, where S and D are too far apart or their communication link is blocked due to severe shadowing and fading. Assume the channel between any pair of transmitter and receiver experiences independent block frequency-flat Rayleigh fading (i.e., frequency-flat fading is invariant during one phase but independently changed from one to another) and is known only at the receivers. Therefore, the channel coefficient between the transmitter t ∈ {S, R} and the receiver r ∈ {R, D, P}  is htr ∼ CN 0, λ1tr = dtr−α † , where dtr is the distance between the two terminals and α is the path-loss exponent [9]. A relaying time interval consists of two phases. In the first phase, S transmits a modulated symbol xS . R demodulates the received signal from S and re-modulates the demodulated symbol as xR †† before forwarding to D in the second phase. The signals received at R and D can be expressed as  (1) yS R = PS hS R xS + nS R ,  yRD = PR hRD xR + nRD , (2) where ytr denotes a signal received at the node r from the node t, ntr ∼ CN(0, N0 ) is additive white Gaussian noise at node r, and Pt is the transmit power of the node t. In the underlay cognitive relay systems, the SU t’s

γDF ≈ min(γS R , γRD ),

(3)

0

where fγDF (γ) is the probability density function (PDF) of √ γDF , K = 1 − 1/ M, and g = 3/(M − 1). We now derive fγDF (γ) to have explicit expressions for (4) and (5). The cumulative distribution function (CDF) of utr = N0 γtr = min(IT /|htP |2 , Pm )|htr |2 can be borrowed from [2, Eq. (8)] ⎛ ⎞ ⎜⎜⎜ ue− κtrPλmtr IT ⎟⎟⎟ λtr u ⎜ Futr (u) = ⎜⎜⎝ − 1⎟⎟⎟⎠ e− Pm + 1, (6) u + κtr IT Δ

where κtr = λtP /λtr . Hence, the derivative of Futr (u) results in the PDF of utr as ⎛ ⎞ κtr λtr IT κtr λtr IT λtr u ⎟⎟⎟ λtr u κtr IT e− Pm e− Pm λtr ⎜⎜⎜⎜ ue− Pm ⎜⎜⎝ − −1⎟⎟⎟⎠ e− Pm . (7) futr (u) = 2 Pm u+κtr IT (u+κtr IT ) Since uS R and uRD are statistically independent, the PDF of μDF = min(uS R , uRD ) can be expressed as [12, p.195] fμDF (μ) = fuS R (μ) + fuRD (μ) − fuS R (μ)FuRD (μ) − FuS R (μ) fuRD (μ).

(8)

Due to γDF = μDF /N0 , the PDF of γDF is fγDF (γ) = †

Fig. 1

System model.

h ∼ CN(m, v) denotes a m-mean circular symmetric complex Gaussian random variable with variance v. †† E{|xt |2 } = 1 with t ∈ {S , R}, where E{·} is the expectation. ††† The average SER of other modulation schemes such as MPSK can be derived in the same approach.

LETTER

1875

N0 fμDF (N0 γ). After careful manipulation, we obtain   L B C E −Hγ fγDF (γ) = e + A+ , (9) + + γ+G γ+J (γ+G)2 (γ+J)2 where ρS R =

λS R Pm /N0 ,

ρRD =

λRD Pm /N0 ,

and

H = ρS R + ρRD , κRD κS R ,Q = , W= κS R − κRD κS R − κRD G = κS R IT /N0 , J = κRD IT /N0 ,   A = H e−(GρS R+JρRD) −e−GρS R − e−JρRD +1 ,   B = (GρS R + JρRD ) e−GρS R 1 − We−JρRD ,   C = (GρS R + JρRD ) e−JρRD 1 + Qe−GρS R ,   E = Ge−GρS R 1 − We−JρRD ,   L = Je−JρRD 1 + Qe−GρS R . Inserting (9) into (4) and (5) results in Pe,BPSK = Ag0B (H, 2)+Bg1B (G, H, 2)+Cg1B (J, H, 2) + Eg2B (G, H, 2)+Lg2B (J, H, 2), (10) Pe,M−QAM = Ag0M (H, g, K)+Bg1M (G, H, g, K) + Cg1M (J, H, g, K) + Eg2M (G, H, g, K) + Lg2M (J, H, g, K) , (11) where g0B , g1B , g2B are shown with the help of [13, Eq. (3.310)], [13, Eq. (3.352.4)] and [13, Eq. (3.353.3)] as follows:  ∞   e−bx Q βx dx (12a) g0B (b, β) = 0   2 1 3 ≈ + , (12b) 4 3 (2b + β) 3b + 2β  ∞ 1 −bx    e Q βx dx (13a) g1B (a, b, β) = x+a 0   ⎡    ⎤ β ⎥⎥⎥ −a b + β2 1 ⎢⎢⎢⎢ 13 ea b+ 2 Ei ⎥⎥⎥ ,     ≈ − ⎢⎢⎣ (13b) 2β 4 +ea b+ 3 Ei −a b + 2β ⎦ 3  ∞   1 e−bx Q βx dx (14a) g2B (a, b, β) = 2 0 (x + a) ⎡  ⎤   β    β  β ⎥⎥⎥ 1 ⎢⎢⎢⎢ 13 b + 2 ea b+ 2 Ei −a b+ 2 ≈ ⎢⎢⎣  2β  a b+2β   2β  4 ⎥⎥⎥⎦ , (14b) 4 + b+ e 3 Ei −a b+ + 3

3

3a

and g0M , g1M and g2M are shown at the top of the next page. Here the exponential integral function Ei(x) is defined ∞ e−t in [13, Eq. (8.211)] as Ei(x) = − ∫−x t dt, which is a built-in function in most computation softwares (e.g., Matlab). In order (12a)–(17a) by (12b)–(17b), we apply    √ toapproximate 1 1 − β2 x − 2β x 3 +e in [14, Eq. (14)]† . It is noted Q βx ≈ 4 3 e that single integrals in (12a)–(17a) can be numerically evaluated. SER obtained from (12a)–(17a) is called Numerical 1 and from (12b)–(17b) is called Numerical 2.

Fig. 2

3.

Variation of transmit power of S over time (α = 3).

Illustrative Results

For illustration purpose, we randomly select user coordinates: P at (0.7, 0.5), S at (0, 0), R at (0.6, 0.2), and D at (1, 0). To have an insight into the variation of transmit power in underlay cognitive relay systems, Fig. 2 shows an exam  ple of PNS0 = N10 min |hSITP |2 , Pm = min NIT0 |h 1 |2 , PNm0 (i.e., SP the ratio of the transmit power of S to the noise variance) versus time index (i.e., the time that hS P is generated) for specific values of PNm0 = 20 dB and NIT0 = 15 dB. It is seen that the transmit  power is varied over time and limited to IT , Pm |hS P |2

min

. For instance, at the time index = 1, we see

|hS P | = −0.435 dB and thus, PNS0 = min (15 + 0.435, 20) = 15.435 dB. Then, the interference that the primary user suffers is PNS0 (dB) + |hS P |2 ( dB) = 15 dB ≤ NIT0 . As another instance, at the time index = 7, we have |hS P |2 = −6.489 dB and PNS0 = min (15 + 6.489, 20) = 20 dB. Then, the interference that the primary user suffers is PNS0 (dB) + |hS P |2 (dB) = 20 dB − 6.489 dB = 13.511 dB ≤ NIT0 . Generally, since Pm IT 2 N0 = 20 dB and N0 = 15 dB, if |hS P | < −5 dB, then PS PS IT 1 N0 = 20 dB. Otherwise, N0 = N0 |hS P |2 . Figure 3 compares simulated and numerical results for different modulation levels and α = 3. Pm /N0 varies from 0 dB to 30 dB while IT /N0 is fixed at 15 dB. It is seen that both analytical results (Numerical 1 and 2) are well matched with simulated ones, especially Numerical 1, for any modulation level (BPSK, 4-QAM, 16-QAM) under consideration. Additionally, the results show that underlay cognitive relay systems quickly reach a high error floor. This implicitly means that the improved spectrum utilization and coverage extension, which these systems achieve can not tolerate the SER performance degradation. In other words, underlay cognitive relay systems seem not to be a good candidate for enhancing spectrum utilization and coverage extension. The error floor comes from the fact that the transmit power is limited by the minimum of the maximum interference level, IT , and the maximum transmit power, Pm . As 2



√ erfc(z) = 2Q( 2z).

IEICE TRANS. COMMUN., VOL.E95–B, NO.5 MAY 2012

1876 



g0M (b, β, K) = 4K

  e−bx Q( βx)dx − 4K 2

0

≈ 4Kg0B (b, β)− 



 e−bx Q2 ( βx)dx

0

2

(15a)



4 K 1 3 + , + 4 9 (b + β) 3b + 4β 6b + 7β

(15b)

 ∞ 1 −bx    1 −bx 2    e Q βx dx − 4K 2 e Q βx dx x + a x + a 0 0    4β K2   a b+ 3 1 a(b+β) ≈ 4Kg1B (a, b, β) + Ei (−a (b + β))+e Ei −a b + 9e 4

g1M (a, b, β, K) = 4K

 g2M (a, b, β, K) = 4K 0





1 (x + a)

e−bx Q 2

≈ 4Kg2B (a, b, β) −

Fig. 3

Fig. 4

K2  4

   βx dx − 4K 2



0

1 (x + a)

b+β a(b+β) Ei (−a (b + β)) + 9 e

2

e−bx Q2

 b+

4β 3



e



  4β a b+ 3

7β    a b+ 6 Ei −a b + + 23 e

7β 6





,

(16b) (17a)

  Ei −a b +

Fig. 5

4β 3



+

  7β    6b+7β a b+ 6 e Ei −a b + 7β + 16 9 6 9a



.

(17b)

SER versus α (Pm /N0 = 40 dB, IT /N0 = 15 dB).

ment and Numerical 1 is more accurate than Numerical 2. Additionally, the SER performance is improved with respect to the increase in IT . This is obvious since IT imposes a constraint on the transmit power and the higher IT , the higher the transmit power, eventually enhancing communication reliability. Figure 5 demonstrates the impact of the path loss on the SER performance with Pm /N0 = 40 dB and IT /N0 = 15 dB. Typical values of the path loss exponent α = 2, . . . , 5 are illustrated. This figure shows a good agreement between numerical and simulated results. Additionally, the performance of underlay cognitive relay systems is degraded as α increases. This is because the distance between any pair of transmitter and receiver under consideration is less than 1. Therefore, the higher α, the higher the path loss and the lower the performance. 4.

such, when Pm exceeds a certain value (e.g., around 15 dB in Fig. 3), the transmit power is completely controlled by IT , resulting in the same SER for any increase in Pm . Figure 4 investigates the effect of IT on the SER performance with α = 3. We fix Pm /N0 at 40 dB. Similarly to Fig. 3, numerical and simulated results are in good agree-

4β 3



 βx dx

SER versus Pm /N0 (IT /N0 = 15 dB).

SER versus IT /N0 (Pm /N0 = 40 dB).

(16a) 

Conclusion

This paper derives the SER of underlay cognitive relay systems. Simulation results are well matched with numerical ones. Various results demonstrate that underlay cognitive relay systems suffer a high error floor for a certain maximum interference level, implying that they may not be suit-

LETTER

1877

able for improving spectrum utilization and coverage range, and obtain better SER performance for higher maximum interference levels. Acknowledgment This research was supported by the Vietnam’s National Foundation for Science and Technology Development (NAFOSTED) (No. 102.99-2010.10). References [1] FCC, “Spectrum policy task force report,” ET Docket 02-155, no.11, 2002. [2] J. Lee, H. Wang, J.G. Andrews, and D. Hong, “Outage probability of cognitive relay networks with interference constraints,” IEEE Trans. Wirel. Commun., vol.10, no.2, pp.390–395, 2011. [3] A. Goldsmith, S.A. Jafar, I. Maric, and S. Srinivasa, “Breaking spectrum gridlock with cognitive radios: An information theoretic perspective,” Proc. IEEE, vol.97, no.5, pp.894–914, 2009. [4] J.N. Laneman, D.N.C. Tse, and G.W. Wornell, “Cooperative diversity in wireless networks: Efficient protocols and outage behavior,” IEEE Trans. Inf. Theory, vol.50, no.12, pp.3062–3080, 2004. [5] N. Golrezaei, P. Mansourifard, and M. Nasiri-Kenari, “Multi-carrier

based cooperative cognitive network,” IEEE VTC, pp.1–5, 2011. [6] L. Ozarow, S. Shamai, and A. Wyner, “Information theoretic considerations for cellular mobile radio,” IEEE Trans. Veh. Technol., vol.43, no.2, pp.359–378, 1994. [7] S.I. Hussain, M.M. Abdallah, M.S. Alouini, M. Hasna, and K. Qaraqe, “Performance analysis of selective cooperation in underlay cognitive networks over rayleigh channels,” IEEE SPAWC 2011, pp.116–120, 2011. [8] T. Do and B. Mark, “Cooperative communication with regenerative relays for cognitive radio networks,” IEEE CISS, pp.1–6, 2010. [9] N. Ahmed, M. Khojastepour, and B. Aazhang, “Outage minimization and optimal power control for the fading relay channel,” IEEE Inf. Theory Workshop, pp.458–462, 2004. [10] T. Nadkar, V. Thumar, U. Desai, and S. Merchant, “Optimum bit loading for cognitive relaying,” IEEE WCNC 2010, pp.1–6, 2010. [11] M.K. Simon and M.S. Alouini, Digital communication over fading channels, 2nd ed., Wiley series in telecommunications and signal processing, John Wiley & Sons, Hoboken, N.J., 2005. [12] A. Papoulis and S.U. Pillai, Probability, random variables, and stochastic processes, 4th ed., McGraw-Hill, Boston, 2002. [13] I.S. Gradshteyn, I.M. Ryzhik, A. Jeffrey, and D. Zwillinger, Table of integrals, series and products, 7th ed., Elsevier, Amsterdam, 2007. [14] M. Chiani, D. Dardari, and M.K. Simon, “New exponential bounds and approximations for the computation of error probability in fading channels,” IEEE Trans. Wirel. Commun., vol.2, no.4, pp.840– 845, 2003.

Relaying with Selection Combining

idea is that relay terminals in a rnulti-user network effectively form a virtual multiple-input multiple-output (MIMO) channel to assist the source-destination ...

315KB Sizes 1 Downloads 235 Views

Recommend Documents

Relaying with Selection Combining
protocol offers remarkable diversity advantage over direct trans- mission as well as .... We consider a wireless relay network consisting of one source. K relays ...

Incremental Relaying with Partial Relay Selection - Semantic Scholar
May 5, 2010 - fer from one disadvantage—a loss in spectral efficiency as multiple orthogonal ... We consider a wireless relay network consisting of one source (S), N relays .... communication link whose equivalent SNR is written as fol- lows: .....

Incremental Relaying with Partial Relay Selection - Semantic Scholar
May 5, 2010 - 2. System Model. We consider a wireless relay network consisting of one ..... schemes, the advantage of IRPRS schemes is the improve-. Fig. 2.

Outage Probability of Selection Relaying Networks with ...
Email: [email protected], [email protected]. Vo Nguyen Quoc Bao. Wireless Communication ... incremental relaying, decode-and-forward, Rayleigh fading, out- age probability. I. INTRODUCTION. It is well ... ing techniques at relays, including

Effect of Cooperative and Selection Relaying ...
Abstract: In this paper, we investigate the effect of cooperative and selection relaying schemes on multiuser diversity in downlink cel- lular systems with fixed relay stations (RSs). Each mobile station. (MS) is either directly connected to a base s

Exact outage probability of cognitive AF relaying with ...
Foundation for Science and Technology Development (NAFOSTED). (No. ... V.N.Q. Bao (Posts and Telecommunications Institute of Technology,. Vietnam).

Exact outage probability of cognitive AF relaying with ...
harmful interference on PUs, the transmit power at SU-Tx Ps is set at. Ps = Ip/|hs,p|2, where Ip is the maximum tolerable interference power at PU and hs,p is the ...

Zero-Forcing-Based Two-Phase Relaying with Multiple Mobile Stations
where hk is an (N × tk)-dimensional channel matrix or a vector between the kth MS and the BS. Here, tk denotes the number of data streams that is allocated to ...

Combining Crypto with Biometrics Effectively
a repeatable binary string from biometrics opens new possible applications, where a strong binding is .... diversity: A user may wish separate keys for her bank.

Buffer-Aided Two-Way Relaying with Lattice Codes - IEEE Xplore
relaying with lattice codes to improve the sum-rate in asymmetric SNR two-way relay channels (TWRCs). Specifically, the relay can store some amount of data.

Zero-Forcing-Based Two-Phase Relaying with Multiple ...
†Institute for Information Technology Convergence. Korea Advanced Institute of Science and Technology, Daejeon, Korea. Email: [email protected].

On Uplink Virtual MIMO with Device Relaying Cooperation ...
autonomously punish malicious MTs, the malicious MTs cannot gain by defecting from relaying other MTs' data. Index Terms—5G cellular network, virtual MIMO, ...

Two-Way Relaying with Multiple Antennas using ...
and-forward relaying using physical layer network coding. So far, the design of the relay .... Computer simulations are used to compare the performance of the ...

Cognitive Amplify-and-Forward Relaying with Best ...
community with the aim to alleviate the spectrum scarcity problem and, at the same time, to support the fast growing demand for wireless applications. ... This research was supported by Vietnam's National Foundation for Science and Technology Develop

EXPERIMENTING WITH EQUILIBRIUM SELECTION IN ...
sis typically requires some criterion for equilibrium selection.1 In principle, just ... the 2014 ESA meetings, the 2015 Conference on Social Dilemmas, the 2015 ..... Trigger-strategies where both players punish using MDD (which we call ..... idea by

Search with Adverse Selection
The counterpart of many bidders is small sampling cost .... Definition: An “Undefeated”Equilibrium is such that the high quality seller receives at least the pooling ...

Search with Adverse Selection
–how close the equilibrium prices are to the full information prices–when the search ... total surplus and the informativenss of the signal technology available to the ..... of course the case in which the informativeness of the signals is bounde

MARKET SELECTION WITH LEARNING AND ...
classical sense), the agent with the lowest degree of habit-formation will dominate. .... ket represented by a state price density (Mt)t∈[0,∞), is given by cit = e ρi γi.

Combining STRONG with Screening Designs for Large ...
Apr 20, 2012 - averaged waiting time); ω refers to the stochastic effect of the system, .... We call the new framework STRONG-S, where “S” denote screening ...

Range Aggregation with Set Selection
“find the minimum price of 5-star hotels with free parking and a gym whose .... such pairs, such that the storage of all intersection counts ...... free, internet,. 3.

Search with Adverse Selection
information aggregation by the price –how close the equilibrium prices are to the full information ... This limit is not monotone in the informativeness of the signal technology. .... associate the payoff (−ns) with quitting after sampling n sell