Optimal CDMA Signatures: A Finite-Step Approach

Joel A. Tropp Inderjit. S. Dhillon Robert W. Heath Jr. Inst. for Comp. Engr. and Sci. (ICES) Dept. of Comp. Sci. Dept. of Elect. and Comp. Engr. The University of Texas at Austin The University of Texas at Austin The University of Texas at Austin 1 University Station C0200 1 University Station C0500 1 University Station C0803 Austin, TX 78712 Austin, TX 78712 Austin, TX 78712-1084 USA [email protected] [email protected] [email protected]

Abstract— A description of optimal sequences for direct-spread II. BACKGROUND code division multiple access is a byproduct of recent character- izations of the sum capacity. This papers restates the sequence A. Synchronous DS-CDMA design problem as an inverse singular value problem and shows Consider the uplink of an S-CDMA system with N users that it can be solved with finite-step algorithms from and a processing gain of d. Assume that N>d, since the anal- analysis. Relevant algorithms are reviewed and a new one-sided ysis of the other case is straightforward. Define a d×N matrix construction is proposed that obtains the sequences directly def instead of computing the of the optimal signatures. whose columns are the signatures: S = s1 s2 ... sN . Let S ∗ to denote the (conjugate) transpose of S. Note that ∗ (S S)nn =1for each n =1,...,N. Assume that user n has I. INTRODUCTION an average power wn and collect them in the def The problem of sequence sequences to maximize the sum W =diag(w1,w2,...,wN ). It is often more convenient to capacity of symbol-synchronous direct-spread code division absorb the power constraints into the signatures, so we also def 1/2 multiple access system (henceforth S-CDMA) has received define the weighted signature matrix X = SW . Denote the significant attention in the information theory community over n-th column of X as xn. For each n, one has the relationship the last decade, e.g. [1]–[7]. Despite this work, the algorithms ∗ 2 (X X )nn = xn = wn. (1) proposed to find optimal signatures have not exploited the 2 observation that the signature design problem can be character- Finally, let Σ denote the of the noise. ized as an inverse singular value problem [8]. Thus researchers Viswanath and Anantharam have proven in [5] that, for have been unable to exploit the wealth of algorithms developed real signatures, the sum capacity of the S-CDMA channel per in the matrix theory community during the past two decades degree of freedom is given by the expression (in the complex [9], [10]. case, the sum capacity differs by a constant factor) In this paper we present the signature design problem from 1 −1 ∗ a new perspective: as the solution to an inverse singular value Csum = max log det(Id + Σ SWS ). (2) d S problem. In short, optimal sequences are intimately connected 2 to matrices that satisfy certain conditions on their column The basic sequence design problem is to produce a signature norms and singular spectrum; these constraints are determined matrix S that solves the optimization problem (2). Various by the user power requirements and the noise covariance. This specializations have been considered with equal user powers, matrix analysis point-of-view allows us to leverage existing white noise, unequal user powers, and colored noise. We will algorithms for solving inverse singular value problems to show how each of these cases results in an inverse singular develop numerically stable, finite algorithms for solving the value problem. sequence design problem. Unlike iterative algorithms, e.g. [4], [7], [11], convergence is not an issue for finite-step algorithms B. A Sum Capacity Bound since they are guaranteed to solve the stated problem. In [1], Rupf and Massey produced an upper bound on the The specific contributions of this paper are two-fold. First sum capacity under white noise with variance σ2: we present a summary of relevant finite-step algorithms from 1 Tr W matrix analysis that will be useful for researchers working Csum ≤ log 1+ 2 σ2 d (3) in sequence design. We focus on the algorithms by Bendel- Mickey [9], Chan-Li [10] and Davies-Higham [12]. Second, where Tr (·) indicates the trace operator. They also established we present a new one-sided, finite algorithm that produces a necessary and sufficient condition on the signatures for the signature sequences directly instead of computing their equality to be attained in the bound (3): Gram matrix. This method has very modest time and space ∗ ∗ Tr W requirements in comparison with the other techniques we dis- XX = SWS = Id. d (4) cuss. Throughout we focus on the case of complex signatures exclusively because it subsumes the real case without any A matrix X that satisfies (4) is known as a tight frame [13] additional difficulty of argument. or a general Welch-Bound-Equality sequence (gWBE) [2]. A condition equivalent to (4) is that The key result of [2] is a complete characterization of Tr W the sum capacity of the S-CDMA channel under white X ∗X = P d (5) noise. Viswanath and Anantharam demonstrate that oversized users—those whose power constraints are too large relative P where the matrix represents an orthogonal projector from to the others for the majorization condition to hold—must CN d onto a subspace of dimension . Recall that an orthogonal receive their own orthogonal channels to maximize the sum P2 = P projector is an idempotent, . That is, capacity of the system, and they provide a simple method of P = P∗ and . An orthogonal projector is also characterized as determining which users are oversized. The other users share a Hermitian matrix whose nonzero eigenvalues are identically the remaining dimensions equitably. equal to one. In light of equation (1), the problem of con- Suppose that there are m