diff --git "a/data_all_eng_slimpj/shuffled/split2/finalzzgewu" "b/data_all_eng_slimpj/shuffled/split2/finalzzgewu" new file mode 100644--- /dev/null +++ "b/data_all_eng_slimpj/shuffled/split2/finalzzgewu" @@ -0,0 +1,5 @@ +{"text":"\\section{Introduction}\n\nPhotonic crystals are periodically structured\ndielectric media possessing photonic band gaps:\nranges of frequency in which strong reflection\noccurs for all angles of incidence and all\npolarizations. They then behave as\nomnidirectional reflectors, free of\ndissipative losses. Since the initial predictions\nof Yablonovitch~\\cite{Yablo87} and John~\\cite{John87},\nphotonic crystals have been attracting a lot\nof attention and a wide variety of applications\nhave been suggested~\\cite{Dowling}.\n\nIn the one-dimensional case, a photonic crystal\nis nothing more than a periodic dielectric\nstructure. Bragg mirrors consisting of\nalternating low- and high-index layers\nconstitute, perhaps, the archetypical example~\\cite{Yeh88}.\nIn particular, quarter-wave stacks (at normal\nincidence) are the most thoroughly studied\nin connection with omnidirectional reflection\n(ODR)~\\cite{Fink98,Dowl98,Yablo98,Chig99,South99,Lekner00}.\n\nThe introduction of Fibonacci multilayers by\nKohmoto and coworkers~\\cite{KSI87} spurred the\ninterest for both possible optical\napplications~\\cite{Schw88} and theoretical\naspects of light transmission in aperiodic\nmedia~\\cite{Dulea90,Latge92,Liu97,Vasco98,Macia01}.\nIn fact, the possibility of obtaining ODR in\nquasiperiodic Fibonacci multilayers has been\nput forward recently~\\cite{Macia98,Cojo01,Lusk01,Peng02,Dong03}.\n\nUnderlying all these efforts a crucial\nquestion remains concerning whether\nquasiperiodic Fibonacci multilayers would\nachieve better performance than usual\nperiodic ones. To answer such a fundamental\nquestion one first needs to quantify the\nidea of ODR performance in a unique manner\nthat permits unambiguous comparison between\ndifferent structures. Only quite recently\na suitable figure of merit has been introduced:\nthe area under the transmittance curve as a\nfunction of the incidence angle~\\cite{Yonte04}.\nIn this paper, we resort to this concept of\narea to rank in a consistent way the ODR\ncharacteristics of these quasiperiodic systems.\n\n\\section{Quasiperiodic Fibonacci multilayers}\n\nA Fibonacci system is based on the recursive\nrelation $S_0 = \\{H \\}$, $S_1 = \\{ L \\} $ and\n$S_j = S_{j-1} S_{j-2}$ for $j \\ge 2$. Here $H$\nand $L$ are defined as being two dielectric layers\nwith refractive indices $(n_H, n_L)$ and thicknesses\n$(d_H, d_L)$, respectively. The material $H$ has a\nhigh refractive index while $L$ is of low refractive\nindex. The number of layers is given by $F_j$,\nwhere $F_j$ is a Fibonacci number obtained from\nthe recursive law $F_j = F_{j-1} + F_{j-2}$, with\n$F_0 = F_1 = 1$.\n\nIn order to properly compare the optical response\nof these systems we will rely on the transfer-matrix\ntechnique. The transfer matrix $\\mathsf{M}_j$ for the\nFibonacci system $S_j$ can be computed as~\\cite{KSI87}\n\\begin{eqnarray}\n& \\mathsf{M}_0 = \\mathsf{M}_H ,\n\\qquad\n\\mathsf{M}_1 = \\mathsf{M}_L , & \\nonumber \\\\\n& & \\\\\n& \\mathsf{M}_j = \\mathsf{M}_{j-1}\n\\mathsf{M}_{j-2} , \\qquad j \\ge 2 . &\n\\nonumber\n\\end{eqnarray}\nThe transfer matrix for the single layer $H$ is\n\\begin{equation}\n\\mathsf{M}_H =\n\\left (\n\\begin{array}{cc}\n\\cos \\beta_H & q_H \\sin \\beta_H \\\\\n\\displaystyle\n\\frac{1}{q_H} \\sin \\beta_H & \\cos \\beta_H\n\\end{array}\n\\right ) ,\n\\end{equation}\nand a analogous expression for $L$. Here $\\beta_H =\n(2 \\pi \/ \\lambda) n_H d_H \\cos \\theta_H$ is the layer\nphase thickness, $\\theta_H$ being the angle of\nrefraction, which is determined by Snell law.\nThe wavelength in vacuum of the incident\nradiation is $\\lambda$. The parameter $q_H$\ncan be written for each basic polarization\n($p$ or $s$) as\n\\begin{equation}\nq_H (p) = \\frac{n_H \\cos \\theta}{n \\cos \\theta_H} ,\n\\qquad\nq_H (s) = \\frac{n \\cos \\theta}{n_H \\cos \\theta_H} ,\n\\end{equation}\nwhere we have assumed that the layer is imbedded in a\nmedium of refractive index $n$. Henceforth $\\theta$\nwill denote the angle of incidence and, for simplicity,\nthe surrounding medium we will supposed to be air\n($n = 1$).\n\nLet us consider a $N$-period finite structure whose\nbasic cell is precisely the Fibonacci multilayer $S_j$.\nWe denote this system as $[S_j]^N$ and its overall transfer\nmatrix is\n\\begin{equation}\n\\mathsf{M}_j^{(N)} = (\\mathsf{M}_j)^N .\n\\end{equation}\nWhen the unit cell is $S_2$, the resulting multilayer\n$[S_2]^N$ is periodic. For $j > 2$, $[S_j]^N$ are\nquasiperiodic.\n\nThe transmittance $\\mathcal{T}_j^{(N)}$ is given\nin terms of the matrix $\\mathsf{M}_j^{(N)}$\nas~\\cite{KSI87}\n\\begin{equation}\n\\mathcal{T}_j^{(N)} =\n\\frac{4}{|| \\mathsf{M}_j^{(N)} ||^2 + 2} ,\n\\end{equation}\nwhere $|| \\mathsf{M}_j^{(N)} ||^2$ denotes the\nsum of the squares of the matrix elements.\n\nIn the theory of periodic systems it is well\nestablished that band gaps appear whenever\nthe trace of the basic period satisfies~\\cite{Yeh88}\n\\begin{equation}\n\\label{ODR}\n| \\mathop{\\mathrm{Tr}}\\nolimits ( \\mathsf{M}_j) | \\ge 2 .\n\\end{equation}\nThis should be worked out for both basic\npolarizations. The trace map is a powerful\ntool to investigate this condition, especially\nwhen the index $j$ is high~\\cite{KKT83}. In\nour context, it reads as\n\\begin{equation}\n\\mathop{\\mathrm{Tr}}\\nolimits ( \\mathsf{M}_{j+1}) = \\mathop{\\mathrm{Tr}}\\nolimits ( \\mathsf{M}_j)\n\\mathop{\\mathrm{Tr}}\\nolimits ( \\mathsf{M}_{j-1}) - \\mathop{\\mathrm{Tr}}\\nolimits ( \\mathsf{M}_{j-2}) .\n\\end{equation}\nThis simple recurrence relation allows us\nto compute easily the band gaps. We quote here\nthe first nontrivial cases, namely, the pure periodic\nsystem $S_2 = \\{ LH \\}$ and the first quasiperiodic\none $S_3 = \\{ LHL \\}$, respectively:\n\\begin{eqnarray}\n\\label{bands}\n& |\\cos \\beta_L \\cos \\beta_H -\n\\Lambda_{LH} \\\n\\sin \\beta_L \\sin \\beta_H | \\ge 1 , &\n\\nonumber \\\\\n& & \\\\\n& |\\cos ( 2 \\beta_L) \\cos \\beta_H -\n\\Lambda_{LH} \\\n\\sin (2 \\beta_L) \\sin \\beta_H | \\ge 1 . &\n\\nonumber\n\\end {eqnarray}\nThe function $\\Lambda_{LH}$ is\n\\begin{equation}\n\\Lambda_{LH} = \\frac{1}{2}\n\\left (\n\\frac{q_L}{q_H} +\n\\frac{q_H}{q_L}\n\\right ) ,\n\\end {equation}\nwhich is frequency independent but takes\ndifferent values for $p$ and $s$ polarizations.\nHowever, one can check that, irrespective of the\nangle of incidence, the following relation for both\nbasic polarizations holds:\n\\begin{equation}\n\\label{qps}\n\\frac{\\Lambda_{LH}(p)}{\\Lambda_{LH}(s)} \\le 1 .\n\\end{equation}\nDue to the restriction (\\ref{qps}),\nwhenever Eqs.~(\\ref{bands}) are fulfilled\nfor $p$ polarization, they are always\ntrue also for $s$ polarization. In\nconsequence, the $p$-polarization bands\nare more stringent than the corresponding\n$s$-polarization ones~\\cite{Dong03}.\n\n\\section{Assessing ODR from quasiperiodic multilayers}\n\nWe first investigate the range of layer thicknesses\nfor which ODR exists; that is, when condition~(\\ref{ODR})\nholds true for all the incidence angles. Although\nfor the simple periodic system $S_2$ analytic\napproximations are at hand, the general problem\nseems to be very involved and we content\nourselves with a numerical exploration.\n\nFor definiteness, we fix the refractive indices to\nthe values $n_L = 1.75$ and $n_H = 3.35$ at\n$\\lambda = 10 \\ \\mu$m. In Fig.~1 we have plotted\nthe zones of ODR for the basic periods $S_j$ (with\n$j=2, 3, 4, 5$) in terms of the adimensional thicknesses\n$n_L d_L\/\\lambda$ and $n_H d_H\/\\lambda$. Note that\nthe use of these adimensional variables not only\nsimplifies the presentation of the results, but,\nas dispersion can be neglected, the\nresults apply to more general situations.\n\n\\begin{figure}[h]\n\\centerline{\\includegraphics[height=6cm]{Figure1.eps}}\n\\caption{Regions where ODR (for $p$ polarization) occurs\nfor the Fibonacci systems $S_2 = \\{LH\\}$, $S_3 = \\{LHL\\}$,\n$S_4 =\\{LHLLH\\}$, and $S_5 = \\{LHLLHLHL\\}$. We have taken\n$n_L = 1.75$ and $n_H = 3.35$ at $\\lambda = 10 \\ \\mu$m.\nThe inset identifies the filled ellipses. The marked\npoints correspond to the minimum area for each one\nof the systems.}\n\\end{figure}\n\nThe contours of all these regions are approximately\nelliptical. For every allowed value of $n_L\nd_L\/\\lambda$ there are two values of $n_H d_H\/\n\\lambda$. This can be traced back to the\nexplicit form of Eqs.~(\\ref{bands}) for the band\ngaps. The ellipses for $S_2$ are the biggest, which\nconfirms that this simple system has the best range of\nODR in terms of $n d\/\\lambda$ variables. Note also\nthat the usual Bragg solution with layers of a\nquarter-wavelength thick at normal incidence,\nnamely\n\\begin{equation}\n\\label{lambda4}\nn_L d_L\/\\lambda = n_H d_H\/\\lambda = 1\/4 ,\n\\end{equation}\nworks for $S_2$, but not for the others.\n\nIt is worth stressing the fact that the regions of\nODR for $S_2$ and $S_3$ are disjoint. This increases\nthe difficulty of comparison between these systems.\nOn the contrary, all the quasiperiodic multilayers\nhave a significant region of common parameters.\nIn fact, from the system $S_6$ onwards, all the\nelliptic contours are essentially the same as for\nthe $S_5$.\n\nThese regions of ODR are not enough to fully\nquantify the performance of the multilayer. In\nRef.~\\cite{Yonte04} we have proposed that,\nonce the materials and the wavelength are fixed,\nthe area under the transmittance as a function\nof the angle of incidence $\\theta$\n\\begin{equation}\n\\label{area}\n\\mathcal{A}^{(N)}_j = \\int_0^{\\pi\/2}\n\\mathcal{T}^{(N)}_j (\\theta) \\ d \\theta ,\n\\end{equation}\nis an appropriate figure of merit for the\nstructure: the smaller this area, the better\nthe performance as ODR. In Fig.~2 we have\nplotted this area as a function of\n$n_L d_L\/\\lambda$ and $n_H d_H\/\\lambda$\nfor $S_2$. The area has been computed solely\nfor the points fulfilling the ODR condition,\nso the abrupt steps give the boundaries of ODR\nplotted in Fig.~1. However, this function\nvaries significantly in the ODR region.\n\n\\begin{figure}\n\\centering\n\\centerline{\\includegraphics[height=6cm]{Figure2.eps}}\n\\caption{Area under the transmittance curve,\ndefined in Eq.~(\\ref{area}), as a function of\n$n_L d_L \/\\lambda$ and $ n_H d_H\/ \\lambda$ for\nthe system $S_2$, with the same data as in Fig.~1.}\n\\end{figure}\n\nIn fact, for the present case the minimum of this\narea is reached at the point\n\\begin{equation}\nn_L d_L\/\\lambda = 0.34305 ,\n\\qquad\nn_H d_H\/\\lambda = 0.25416 .\n\\end{equation}\nWhile the value of $n_H d_H\/ \\lambda $ essentially\ncoincide with the quarter wavelength solution\n(\\ref{lambda4}), $n_L d_L\/ \\lambda $ differs\nmore than 30 \\% of that solution.\n\n\\begin{figure}[t]\n\\centering\n\\centerline{\\includegraphics[height=6cm]{Figure3.eps}}\n\\caption{Regions of ODR for the same Fibonacci\nmultilayers as in Fig.~1 in the plane $(n_L, n_H)$\nof refractive indices. The curves show the limit\nof ODR for each stack with the optimum thicknesses\nmarked in Fig.~1.}\n\\end{figure}\n\nIn Fig.~1 we have marked the points of minimum\narea for each one of the Fibonacci systems $S_j$.\nWe see the strong difference for the periodic and\nthe quasiperiodic systems. In fact, for the latter\n($S_j$ with $j \\ge 3$) we can summarize the results\nsaying that the optimum area is reached approximately\nat the values of the parameters\n\\begin{equation}\nn_L d_L\/\\lambda = 1\/8 ,\n\\qquad\nn_H d_H\/\\lambda = 1\/4 .\n\\end{equation}\nIn our view, this is a remarkable result: from the\nprinciple of minimum area, we have consistently derived\noptimum parameters for ODR, which differ a lot from\nthe usual solutions found in the literature.\n\n\n\nFor the thicknesses giving minimum area, we have\ncalculated the region in the $(n_L, n_H)$\nplane for which ODR occurs. In Fig.~3 we have\nplotted the boundary of such a region for\nthe same Fibonacci multilayers as before: above\nsuch curves we have the ODR region. It is again\nthe periodic system the first in fulfilling ODR:\nthe onset of the ODR curve is at $n_H \\simeq\n2.5$, in agreement with previous estimations~\\cite{Lekner00}.\n\n\nOf course, the optimum parameters for the system\n$S_j$ do not need to be optimum for $[S_j]^N$. To\nelucidate this question, we have computed numerically\nthe values of $n_L d_L \/\\lambda$ and $n_H d_H \/\\lambda$\nfor different systems containing up to 42 layers and\nfor the same indices as before. In Table 1 we have\nsummarized the corresponding data. We have included\nonly results for the five first periods $N=1, \\ldots, 5$,\nsince from $[S_j]^5$ onwards, all the thicknesses are\nfairly stable, while the area tends rapidly to 0,\nas one would expect from a band gap. We can conclude\nthat the optimum parameters do not depend strongly\non the number of layers.\n\n\\begin{figure}[h]\n\\centerline{\\includegraphics[height=6cm]{Figure4.EPS}}\n\\caption{Logarithm of the area computed for the systems\n$[S_j]^N$ as a function of the number of layers.}\n\\end{figure}\n\n\nFrom previous results for the case of Bragg mirrors,\nit is reasonable to assume that the transmittance of\n$[S_j]^N$ tends to zero exponentially with the number\nof layers. To test such an \\textit{ansatz}, we have plotted\nthe area (in a logarithmic scale) for all these systems.\nThe results are presented in Fig.~4. We think that a\nsimple glance at this figure is enough to decide on the\nperformance of the quasiperiodic systems as omnidirectional\nreflectors.\n\n\n\nIt is quite clear that all the quasiperiodic systems,\nirrespective of the index $j$, behave essentially in\nthe same way as far as ODR is concerned. All the points\nfor these systems fit into a straight line. On the\nother hand, the periodic system $S_2$ lies on another\nstraight line, but with a better slope. That is,\nfor a given number of layers of the system (and under\nthe hypothesis of optimum thicknesses), the system\n$[LH]^N$ offers better performance than any other.\n\n\n\\begin{table}\n\\caption{Optimum parameters for the systems $[S_j]^N$\nfor different basic periods $S_j$ and the number of\nperiods $N$ ranging from 1 to 5.}\n\\begin{center}\n\\begin{tabular}{cccccc}\n\\textbf{Basic} & \\textbf{Bandwidth} & $\\# $ \\textbf{Periods} &\n$\\mathbf{n_L d_L\/\\lambda}$ & $\\mathbf{n_H d_H\/\\lambda}$ &\n\\textbf{Area} \\\\\n\\hline\n\\ & \\ & 1 & 0.34305 & 0.25416 & 1.01660 \\\\\n\\ & \\ & 2 & 0.33807 & 0.22187 & 0.47147 \\\\\n$S_2$ & 0.217 & 3 & 0.30817 & 0.23429 & 0.17894 \\\\\n\\ & \\ & 4 & 0.29821 & 0.23926 & 0.06294 \\\\\n\\ & \\ & 5 & 0.29572 & 0.24422 & 0.02171 \\\\\n\\hline\n\\ & \\ & 1 & 0.11978 & 0.26906 & 1.07725 \\\\\n\\ & \\ & 2 & 0.12917 & 0.26657 & 0.47955 \\\\\n$S_3$ & 0.233 & 3 & 0.13319 & 0.26409 & 0.17693 \\\\\n\\ & \\ & 4 & 0.13587 & 0.26409 & 0.06092 \\\\\n\\ & \\ & 5 & 0.13722 & 0.26409 & 0.02055 \\\\\n\\hline\n\\ & \\ & 1 & 0.14795 & 0.25912 & 0.48632 \\\\\n\\ & \\ & 2 & 0.16538 & 0.25912 & 0.10423 \\\\\n$S_4$ & 0.195 & 3 & 0.16002 & 0.29389 & 0.01647 \\\\\n\\ & \\ & 4 & 0.16136 & 0.29389 & 0.00251 \\\\\n\\ & \\ & 5 & 0.16270 & 0.29389 & 0.00038 \\\\\n\\hline\n\\ & \\ & 1 & 0.14929 & 0.28396 & 0.24841 \\\\\n\\ & \\ & 2 & 0.15063 & 0.28396 & 0.01365 \\\\\n$S_5$ & 0.198 & 3 & 0.15331 & 0.28396 & 0.00073 \\\\\n\\ & \\ & 4 & 0.15197 & 0.28644 & 0.00004 \\\\\n\\ & \\ & 5 & 0.15331 & 0.28644 & 0.00002 \\\\\n\\hline\n\\end{tabular}\n\\end{center}\n\\end{table}\n\nOf course, one may think that the bandwidth of these\nsystems is different. Sometimes the bandwidth is\ndefined at normal incidence, and then it has been\nargued that quasiperiodic systems offer fundamental\nadvantages~\\cite{Lusk01}. If we denote by\n$\\lambda_{\\mathrm{short}}$ and $\\lambda_{\\mathrm{long}}$\nthe longer- and shorter-wavelength edges for given\nODR bands (of the basic period), it seems more\nappropriate to define the ODR bandwidth as~\\cite{South99}\n\\begin{equation}\nB = \\frac{\\lambda_{\\mathrm{long}} -\n\\lambda_{\\mathrm{short}}}{\\frac{1}{2}\n(\\lambda_{\\mathrm{long}} +\n\\lambda_{\\mathrm{short}})} .\n\\end{equation}\nNote that this is the appropriate definition in our case.\nObviously, the parameters chosen for the purpose of\ncomparison must be the ones giving minimum area; i. e.,\noptimum ODR behavior. In fact, we have numerically\nchecked that the parameters giving optimum area offer\nalso a good bandwidth. In Table 1 we have indicated\nthis parameter, confirming again that with the proper\ndefinition the periodic system is the best.\n\n\\section{Concluding remarks}\n\nIn summary, we have exploited the idea of minimum area\nto fully assess in a systematic way the performance of\nomnidirectional reflectors. Although quasiperiodic\nsystems has attracted a lot of interest due to their\nunusual physical properties, Bragg reflectors offer\nthe best performance, although not at a quarter-wavelength\nthick at normal incidence. We believe that the best\nfeature of our approach is that it provides a very\nclear thread to deal with omnidirectional reflection\nproperties in a systematic way. Our method is general\nand can be applied to any spectral region.\n\n","meta":{"redpajama_set_name":"RedPajamaArXiv"}} +{"text":"\\section{Introduction}\n\nIt is generally believed that metric type II solar radio bursts\nare excited by energetic electrons accelerated at coronal shocks\n(e.g., Wild, 1950; Dulk, 1985; Pick \\& Vilmer, 2008). Although\nextensive studies exist in the literature investigating the\nphysics of type IIs, the exact emission site and the associated\nshock properties remain controversial mainly due to a lack of\ndirect high-resolution imagings of the bursts. The focus of the\ndebate lies in whether type II shocks are driven by flare heating\nor coronal mass ejection (CME), (e.g., Wagner {\\&}\nMcQueen, 1983; Gosling, 1993; Gopalswamy et al., 1998; Cliver et\nal., 1999, 2005; Mancuso {\\&} Raymond, 2004; Cane\n{\\&} Erickson, 2005; Vr\\v snak {\\&} Cliver, 2008;\nMagdaleni\\' c et al., 2008; Pohjolainen et al., 2008a), and whether the radio\n\\textbf{bursts are generated at the shock nose or at the shock flank} (e.g. Reiner et al.,\n2003; Mancuso {\\&} Raymond, 2004; Cho et al., 2007, 2008, 2011;\nShen et al., 2013).\n\nRecently we have proposed that source properties including the\nemission site as well as the shock geometry can be inferred by\ncombining radio spectral data and solar imaging observations (Feng\net al., 2012; Kong et al., 2012). The main idea is to establish the physical\nconnection between certain morphological features of the type II spectrum (e.g., bump or\nbreak) and the specific eruptive processes as recorded by coronal\nimaging instruments (e.g., shocks crossing dense streamers).\nTheoretical basis of this idea stems from the plasma emission hypothesis of type II\ngeneration at coronal shocks, in which scenario the emission\nfrequencies and therefore the spectral shape is decided by the densities of\ncoronal structures along the shock path (Ginzburg \\& Zheleznyakov,\n1958).\n\nStreamers are the most prominent bright large-scale structures in\nthe corona. They are expected to have effects on the type II radio\nspectrum. Feng et al. (2012) and Kong et al. (2012) investigated\ntwo CME-streamer interaction events with accompanying type II\nradio bursts which occurred on November 1 2003 and March 27 2011. They\ndefined two special type II morphological features: spectral break\nand spectral bump. According to their studies, a spectral break is\nthe result of density decrease when a type II emission\nsource propagates from inside of a streamer to outside,\nand a spectral bump is produced when a type II source\npropagates across a streamer structure from one\nside to the other. Based on these analyses, Feng et al.\n(2012) and Kong et al. (2012) remarked that the emission site can\nbe pinpointed. Note that in some recent studies it has\nbeen pointed out that when a shock crosses other localized\ncoronal and solar wind structures, such as dense coronal loops\n(e.g., Pohjolainen et al., 2008b), pre-existing dense CME materials\nand corotating interaction regions\n(e.g., Knock {\\&} Cairns, 2005; Schmidt {\\&} Cairns, 2012;\nHillan et al., 2012), it may result in similar spectral shape changes.\n\nTo apply the above type II radio source diagnostic method to more\nevents, in this paper we examine another CME event which occurred\non December 31 2007. This event is associated with a multiple\ntype II radio burst (e.g., Robinson \\&\nSheridan 1982; Shanmugaraju et al., 2005), well observed by the\nimaging instruments on board\nthe Solar TErrestrial RElations Observatory (STEREO) A and B\n(SA and SB for short) spacecraft (Kaiser et al., 2008) as well as\nthe Solar and Heliospheric Observatory (SOHO) spacecraft. The\nevent was associated with a radio burst\ncontaining clear and rich signals including type III and type IV\nbursts, and several episodes of type IIs. Many authors have\ninvestigated different aspects of this event (Autunes et al.,\n2009; Gopalswamy et al., 2009; de Koning et al., 2009; Liu et al.,\n2009a, 2009b; Odstrcil \\& Pizzo, 2009; Dai et al., 2010; Lin et\nal., 2010; Moran et al., 2010; Cho et al., 2011; Rigozo et al.,\n2011). In particular, Liu et al. (2009a), Gopalswamy et al. (2009)\nand Cho et al. (2011) have discussed the origin of the type II\nbursts. Inspecting the radio dynamic spectrum of this event, we\nrecognize that spectral bumps, similar to that studied by Feng et\nal. (2012), are present on the type II spectrum. Considering the\nextensive interests in this event and the potential important role\nof spectral bump in revealing the type II origin, in this paper we\nre-examine this event. Different from all previous studies, we\nfocus on the type II spectral bump and discuss how this feature\ncan be used to shed new lights on the type II origin.\n\n\n\\section{General properties of the event and previous studies}\n\nIn Figures 1a-1c we present three sets of EUV and white light\nobservations of the CME from SA, SOHO, and SB. The angle between SA and SB was 44$^\\circ$ at the\ntime of this event. The superposed Inner Coronagraph (COR1) at $\\sim$\n01:00 UT and Extreme UltraViolet Imager (EUVI) at $\\sim$ 00:55 UT\nimages from SA and SB and the difference Large Angle and Spectrometric\nCoronagraph (LASCO) image together with the Extreme-ultraViolet Imaging\nTelescope (EIT) data from SOHO are shown. Black arrows denote the\neruption source active region (AR)10980, which is located at about E102S08,\nE58S08, and E81S08 as viewed from SA, SB, and SOHO\n(\\url{http:\/\/www.lmsal.com\/solarsoft\/}). So, the CME is\nseen as a near-limb event by all three spacecraft. This\ngreatly constrains the projection effect on the measurements of\nthe CME dynamics. The CME is first observed by COR1A and COR1B at\n00:55 UT and by LASCO C2 at 01:31 UT. The corresponding CME\nleading edges are located at 1.55, 1.65, and 4.80 R$_\\odot$,\nrespectively. A C8.3 flare is associated with the CME. According\nto the GOES observation, the X-ray flux starts to increase\nrapidly at 00:30 UT, and reaches its peak at 00:50 UT.\n\nAs clearly seen from the SA and SOHO observations,\nstreamers are present on both sides of the CME source.\n Figures 1d and 1e present the coronal magnetic field\nconfigurations from the potential-field source-surface model\n(PFSS; Schatten et al., 1969; Schrijver \\& Derosa 2003) based on\nthe magnetic field measurements with Michelson Doppler\nImager (MDI; Scherrer et al., 1995) for the Carrington Rotation\n2065. The magnetic configurations have been rotated to the view\nangles of SA and SB, respectively. Large-scale closed field lines,\ncorresponding to the white light streamers, can be seen on both\nsides of the active regions. The northern streamer is narrower and\nweaker than the southern one. This is consistent with the fact\nthat the northern streamer is a pseudo streamer (PS: Wang et al., 2007;\n Liu et al., 2009b) while the southern streamer is a typical helmet streamer (HS).\nFor a PS, the polarities of the open field enclosing\nthe streamer-like structure are the same, as seen from the PFSS\nresults. In Figure 1a, we delineate the\nestimated overall magnetic topologies of both streamers with cyan\nlines.\n\n\nSeveral additional features in Figures 1a-1c worth to be noted.\nFirst, as seen from the LASCO difference image, there is a diffuse\nstructure ahead of the bright CME front. Such a structure\nis usually regarded as the signature of shock sheath (Vourlidas\net al., 2003). Small white arrows point to different locations of\nthe sheath front. As a result of the asymmetric expansion of the\nCME, the stand-off distance varies significantly along the front.\nSecond, the PS is deflected\nsignificantly as shown from the obvious white-black difference structure,\neven in the absence of direct contact with\nthe bright ejecta. Streamer deflection without a CME\ncontact has been attributed to the CME-driven shock (e.g., Sheeley\net al., 2000). Finally, there is a concave-outward structure at\nthe CME front along the direction of the stalk of the southern\nstreamer, which is usually interpreted as a result of a CME\npropagating into denser and slower plasma sheet structure (see,\ne.g., Riley {\\&} Crokker, 2004; Odstrcil et al., 2004). This\nconcave-outward structure therefore indicates a very strong\ninteraction of the CME with this streamer.\nAs to be shown below, this observation is consistent with the SA\ndata.\n\nNow we turn our attention to the dynamic spectrum of the\nassociated radio burst, which was recorded by Learmonth (Kennewell \\&\nSteward 2003) and BIRS (Bruny Island Radio Spectrometer; Erickson\n1997) and shown in the left panel of Figure 2. An enlargement of\nthe spectrum in the square region is given in the right panel with\nthe y-axis on a linear scale. Several type II episodes are\nobserved. The first episode shows fundamental (F) and\nharmonic (H) branches with clear signatures of band\nsplitting on the H branch. It starts at $\\sim$ 00:53 UT and ends\nat $\\sim$ 01:20 UT lasting for about 30 minutes. The H branch\nspans from $>$ 100 MHz to 14 MHz.\n\nThe other two episodes are denoted by ``a'' (01:04 UT -\n01:10 UT, 85 MHz - 35 MHz) and ``b'' (01:11 UT - 01:14 UT, 57 MHz\n- 40 MHz) in Figure 2. These two emissions were regarded as\nthe fundamental and harmonic branches of a type II burst by\nGopalswamy et al. (2009) and Cho et al. (2011). However, with a\ncareful examination we conclude that this may not be the case. Note\nthat there are no temporally-overlapping emissions between ``a'' and ``b''.\nTherefore, to determine their frequency ratio we need to fit\nthe dynamic spectra to allow a\ndirect comparison of their frequencies. The fitting curve to ``a''\nfrom 01:08 UT - 01:11 UT \\textbf{is drawn by} the white solid line in\nFigure 2, using the 0.4$\\times$ Saito density model\n(Saito et al., 1977). \\textbf{The fitting gives a shock speed of\n550 km s$^{-1}$ (the reason of employing such a density model is\nexplained in the Appendix). Two white dashed lines with frequencies\n1.8 and 2 times larger than the fitted curve are also plotted.} It can be seen that the\nfrequency ratio between the emission denoted by ``b'' and the fitting to\n``a'' is less than $1.8$.\nThis excludes the possibility of ``b'' being the harmonic\ncounterpart of ``a'' (Nelson \\& Melrose, 1985; Mann et al., 1995, 1996).\nTherefore, we conclude that this multiple\ntype II event consists of three separate episodes of emissions.\n\\textbf{Since at metric wavelengths the harmonic emission is usually\nbrighter than the fundamental one (e.g., Cairns \\& Robinson, 1987), we\nregard ``a'' to be a harmonic-band emission.}\n\n\nAt $\\sim$ 01:00 UT the lower band of the H branch of the first episode\n($\\sim$ 48 MHz) become discontinuous. Shortly after this, the band rises up to\na higher frequency of $\\sim$ 52 MHz at 01:02 UT, then its frequency\ndecreases rapidly to $\\sim 37$ MHz at 01:05 UT. Such a\nnon-monotonic variation of frequencies has been referred to as type\nII spectral bump by Feng et al. (2012). Another bumping feature,\nsimilar in shape, but weaker in amplitude, is present on ``a''\nspanning from $\\sim$01:06:10 UT - $\\sim$01:07:40 UT around 60 MHz. The two\nbumps are indicated by white arrows in the figure. Their origin\nand physical implication are the focus of this study.\n\nBefore further discussion, we summarize relevant results from\nprevious studies on this type II event by Liu et al. (2009a),\nGopalswamy et al. (2009), and Cho et al. (2011).\n\nLiu et al. (2009a) focused on the driver of the first type II\nepisode. They used the 1.3$\\times$ Saito density model (Saito et al., 1977) with a shock\nspeed of 616 km s$^{-1}$ to fit the dynamic spectrum and deduce\nthe shock heights. The deduced heights were then compared to the\ndistance measurements of the CME front and the propagating streamer\nkink induced by the CME shock-streamer interaction. This\nestablished the physical connection between the metric and the\ndecametric-hectometric bursts. They concluded that this episode\nwas driven by the CME, rather than by the associated flare.\nGopalswamy et al. (2009) measured the height of the CME leading\nedge at the time of the onset of the first episode and concluded\nthat the type II is emitted at a few tenths of a solar radius\nabove the solar surface. Cho et al. (2011) examined the type II\nbursts as a multi-band event (e.g., Robinson \\& Sheridan 1982; Shanmugaraju et al., 2005).\nThey used a Newkirk density model (Newkirk, 1961) to convert the\nfrequencies of the two episodes into shock heights. They found\nthat the obtained two sets of shock heights were consistent with\nthe measured CME-nose heights and the interaction heights of the\nshock with the northern streamer, respectively. They then\nconcluded that the first episode was excited at the CME shock\nnose, and the second episode ``a'' excited at the interaction\nregion of the shock with the northern streamer.\n\nAll of the above authors agreed that the type II burst was excited\nby the CME-driven shock. None of them, however, discussed\nthe bumping features of the spectrum. As noted, these features\nprovide significant amount of information in diagnosing the origin\nof the type II radio burst. In particular, one may infer the location\nof the source and physical conditions for the generation of\ntype II radio bursts. We point out that features like these in\nradio spectra should be carefully examined in relevant CME\nstudies. We note that the back-extrapolation of the second\nepisode ``a'' maps to the onset of a cluster of type III bursts, which\nindicates a possible connection to the flare impulsive phase. Therefore,\na flare origin of this episode can not be ruled out completely. Nevertheless,\nwe only consider in this study the possibility that the type II emitting\nshock is driven by the CME.\n\n\\section{CME-shock profiles and origin of the type II spectral\nbumps}\n\nIn this section, we first introduce how we delineate the CME-shock\nprofiles from the EUVI and COR1 data so as to present a clear\npicture of how the shock evolves and interacts with the streamers.\nThen, we relate the deduced shock-streamer interactions to the\nobserved type II spectral bumps.\n\nCoronal shock profiles can be determined directly using EUV and white light\nimaging data. Observational signatures of a coronal shock include\ndiffuse sheath structure ahead of the bright CME ejecta (Vourlidas\net al., 2003), deflection and kink of streamer stalks and coronal\nrays as swept by the CME shock (e.g., Sheeley et al., 2000), and\nthe EUV propagating disturbance revealing the expanding shock front.\n\nIn our event, both the diffuse sheath structure and streamer deflection\/kink are\nobserved in the LASCO difference image at 01:32 UT. Since the streamers are\nbest seen by SA (see Figure 1), in Figure 3 we plot the eruption\nsequence between 00:55 UT-01:15 UT as observed by COR1 and EUVI of\nSA. The upper and middle panels are the COR1 running difference and\ndirect images, respectively. The EUVI 195\n{\\AA} difference and direct data are included when available.\nCorresponding animations can be viewed online.\n\nIn the upper panels of Figure 3, we use arrows of different color\nto point out various shock signatures. The resultant continuous\nshock profiles are plotted in the lower panels. The solid part of\nthe shock profiles is determined by recognizable shock signatures,\nand the dotted part represents the profile without a clear shock\nsignature and is derived by assuming a smooth shock\npropagation.\n\nAt 00:55 UT, a bright loop is observed by both EUVI\nand COR1. This is the first appearance of the CME in the COR1\nfield of view. None of the above shock signatures are present at\nthis moment mostly because the shock is still rather close to the\nbright ejecta at this very-early stage of the eruption. Note that\nthe shock is already formed since the corresponding\ntype II burst started earlier at 00:53 UT. We thus take the\nposition of the bright loop structure as the shock front location.\nFive minutes later (01:00 UT), the loop propagates outward with a\nfast lateral expansion. A diffuse sheath structure appears at the\nnortheastern quadrant as pointed by the upper arrows. No observable\nsheath structure is present in the southeastern quadrant partially\ndue to the asymmetric propagation of the CME. The obtained shock\nprofile for 01:00 UT is shown in Figure 3g.\n\nAt 01:05 UT, the diffuse sheath structure is well observed ahead\nof the ejecta in the northeastern quadrant. In addition, from the\nEUVI 195 {\\AA} data we can recognize the EUV fronts associated\nwith the eruption as indicated by the black arrows, which are\nconsistent with the deflection fronts of the EUV rays. We use these\nfeatures to determine the lower extension of the shock.\nThis allows us to plot a more complete shock envelope than at 01:00\nUT. In the southeastern quadrant of the difference image, a weak\nconcave-outward structure along the direction of the stalk of the\nsouthern streamer is discernible. The structure is more\nprominent in the subsequent COR1 data. It was also seen\nin LASCO, indicating a direct interaction between the CME and\nthe streamer, as mentioned.\n\nAt 01:10 UT and 01:15 UT, besides the diffuse sheath structure\n(see white arrows) a new shock signature appears along the\nnorthern streamer as indicated by the blue arrow. The streamer is\nstrongly deflected without a direct contact with the bright\nejecta, indicating a shock front propagating along this direction\n(e.g., Sheeley et al., 2000).\n\nAt each time step, we connect the front of the diffuse structure,\nthe front of the streamer deflection, and the concave\noutward-structure to obtain the full envelope of the CME-driven\nshock (see Figures 3i and 3j). The obtained shock envelopes are\nshown all-together in Figure 3k, where the circle represents the\nsolar limb on which the projected eruption source is plotted as\nthe plus sign. The magnetic configurations of the two streamers\nare copied from Figure 1a. Also included are the shock profiles as\ndetermined from the COR1A running difference images at 01:20 UT\nand 01:25 UT, as well as that given by LASCO C2 at 01:32 UT. Since\nthe angular separation between SOHO and SA is about 22 degrees,\nthe shock profiles seen from SOHO and SA should be similar.\n\\textbf{This allows us to estimate} the shock speeds along\ndifferent directions. For example, the average speeds in the time\nrange of 00:55 UT - 01:10 UT along four directions pointing from the\neruption source \\textbf{ (see arrows in Figure 3k) are estimated to 560, 620,\n760, and 1000 km s$^{-1}$, respectively. These values reveal} a very asymmetric\npropagation of the CME front. The blue dashed shock envelopes at\n01:04 UT, 01:06:10 UT, and 01:07:40 UT are given by interpolations\nbetween nearby shock profiles or extrapolations using the obtained\naverage shock speeds along relevant directions. Thus, Figure 3k presents a\nrelatively-complete description of the shock propagation from the\ninner to the outer corona and provides important clues to\nunderstanding the origin of type II spectral bumps.\n\nNote that the presence of a spectral bump requires a high\ndensity structure along the shock path according to the plasma\nhypothesis of type II radio bursts (Ginzburg \\& Zheleznyakov,\n1958; Feng et al., 2012). From the coronagraph data alone, both the\nnorthern and the southern streamers can be the candidate for the\ntwo spectral bumps. From Figures 2 and 3 it can be seen that the\nfirst bump ends at 01:04 UT, before the shock contacts the\nnorthern PS ($\\sim$01:05 UT). This rules out the possibility of\nthe PS accounting for this bump. \\textbf{Further evidence supporting\nthe hypothesis that this spectral bump is caused by the shock transit\nacross the southern streamer can be found by examining the radio-source\nheight. Assuming a 1$\\times$Saito density model (see the Appendix), we infer\nthat the radio-source at the onset ($\\sim$48 MHz) and the end (37 MHz) of the\ntype II bursts was located at 1.69 R$_{\\odot}$ and 1.83 R$_{\\odot}$, respectively.}\n The two heights are presented in Figure 3k with two black dotted arcs. \\textbf{The intersections\n of these arcs with the shock envelopes are indicated by small red ellipses},\n which are presumably the source locations of the corresponding type II episode at the onset and\nthe end of the bump.\n\n\\textbf{It can be seen that the two intersections are located at the opposite\nsides of the pre-disturbed southern streamer.} This strongly indicates that the shock\ntransit across this streamer causes the first spectral bump.\nIn addition, from the bump duration ($ \\tau \\sim$ 4 minutes) and\nthe estimated shock speed in this region ($ v \\sim$ 600 km s$^{-1}$,\nsee Figure 3k), one infers the width $ D \\sim \\tau v$ of the dense\nstructure to be 0.2 R$_\\odot$, in agreement with the\nwhite light data of the southern streamer. Based on these arguments,\nwe conclude that the first bump is caused by the shock transit\nacross the southern streamer.\n\nThe second bump starts at 01:06:10 UT and lasts for $\\sim$1.5\nminutes. Its beginning is coincident with the first interaction of the\nshock with the northern PS. As mentioned earlier, the\ncorresponding type II emission is regarded as the harmonic branch. To\nexamine the role of the PS in the formation of the\nspectral bump, we convert the frequencies at the beginning and end of\nthis bump to shock heights using the 0.4$\\times$ Saito model\n(which is appropriate to describe the density distribution near the\nPS, see the Appendix). \\textbf{The radio-source heights are found to\nbe 1.32 R$_\\odot$ and 1.38 R$_\\odot$ and we depict these height levels\nby two dashed arcs in Figure 3k. Their intersections with the shock envelopes\nat 1:06:10 UT and 1:07:40 UT, marked by small red ellipses, are found to be\nlocated at the two sides of the pre-disturbed PS. This is similar to the situation\nfor the first bump. In addition, the product }of the bump duration ($\\sim$1.5\nminutes) and the estimated shock speed ($\\sim$1000 km s$^{-1}$, see\nFigure 3k) agrees with the observed streamer width, and the\nfact that the PS is narrower in width and weaker in brightness (smaller in density) is also\nconsistent with the corresponding spectral bump being weaker in\namplitude and shorter in duration. We therefore conclude that the\nshock transit across the PS causes the second bump.\n\nIn summary, by combining the dynamic spectral and imaging data we\nare able to determine the physical origin of the\ntwo spectral bumps. It suggests that the two type II episodes are\nproduced separately at the two flanks of the same CME shock. From\nthe shock envelopes and the estimated coronal magnetic field\ntopologies from the PFSS model, one finds that the shock geometry\nat the two flanks are more perpendicular or oblique than\nquasi-parallel.\n\nLast, in Figure 2 we have presented the fitting curves\nwith the 1$\\times$ and 0.4$\\times$ Saito density models to the pre-bump\nspectra of the first and the second episodes. From the\nfittings we deduce the radio source speeds to be 530 km s$^{-1}$ for the first\nepisode and 650 km s$^{-1}$ for the second episode. Note\nthat in our event the \\textbf{radio source propagates} along a highly non-radial direction,\n so these speeds are representative of the radial components.\nThese values agree with the speed measurements deduced\nfrom the white light images as shown in Figure 3k, therefore providing a\nself-consistency check of the validity of the density model used\nfor the fittings.\n\n\\section{Discussion on the inferred source size of type II bursts}\n\nWe point out that observations of spectral bumps of type II radio burst\ncan be employed as a unique method to infer the\nsource size of the type II radio bursts. From the dynamic spectrum\nwe see that the type II emission lane is raised up as a whole\nwithin a relatively short interval. This implies that the size of\nthe radio source is smaller than the associated dense streamer\nstructure ($\\sim$ 0.1 - 0.3 R$_\\odot$). The short duration of the rising\npart also suggests that the source is compact in\nspatial extension. Due to the intermittency of the radio signals\nat the onset of the first type II bump, we are unable to determine\nthe exact time duration for the spectral elevation. However, one\ncan infer an upper limit of $\\sim 1$ minute. Then assuming the\nshock crosses the streamer with a speed of $\\sim$ 600-1000 km\ns$^{-1}$, we deduce that the spatial dimension of the radio source\nneeds to be smaller than 0.05-0.1 R$_\\odot$ at a fundamental frequency\nlevel of 20-30 MHz. Comparing to the very broad extension\nof the shock surface (easily $>$ 1 R$_\\odot$), the\ntype II source can be practically regarded as ``point-like''.\n\nEarlier data analyses of radioheliographs revealed that type II\nsources were restricted to discrete sectors of an arc around the\nflare center (Wild 1970; Wild \\& Smerd, 1972), and sometimes of\nlarge dimension ($\\sim$ 0.5 R$_\\odot$) (Kai \\& McLean 1968).\nIt is well known that the radio source size obtained by radio-heliographs tends to\nbe larger than the real value due to propagation and scattering of\nradiation from the source to the observer. Also, earlier radio\nimaging instruments such as the Culgoora and Clark Lake\nRadio-heliographs have an angular resolution of several\narcminutes at frequencies $<$ 100 MHz, which corresponds to a\nspatial resolution of a few tenths of a solar radius near the Sun.\nTherefore these instruments were not able to resolve the type II\nsource as small as that deduced from our study, although the\ndiscrete feature of the imaging observations agrees with our\nresult.\n\nThe suggestion that the type II source is compact implies that\nthe presence of shocks is only a necessary condition for the\ngeneration of type II bursts. Other strict physical conditions\nmust also be satisfied at the shock in order to create a\nnon-thermal distribution of electrons which is unstable to plasma\ninstabilities. For example, the radio-emitting shock front may be\nquasi-perpendicular, as revealed by our study. Early theoretical\nstudies have proposed that quasi-perpendicular shocks can\naccelerate electrons by the shock drift acceleration mechanism\n(Holman \\& Pesses 1983, Wu 1984). When the shock speed is\nsufficiently large or $\\theta_{Bn}$ (the angle between shock\nnormal and upstream magnetic field) is close to 90 degrees, some\nelectrons can be accelerated to non-thermal energy and excite\nplasma waves. However it is known that in this process both the\nfraction and achievable energy of the accelerated particles are\nlimited (e.g., Ball \\& Melrose 2001). Other effects, such as MHD\nturbulence, shock ripples and\/or magnetic\ncollapsing trap geometries (e.g., Decker, 1990; Zlobec et al., 1993;\nMagdaleni\\'{c} et al., 2002; Guo {\\&} Giacalone, 2010; Schmidt {\\&}\nCarins, 2012; Hillan et al., 2012) may be required to yield more\nefficient electron acceleration and radio emission. If\nindeed local structures, such as ripples or magnetic traps, play\nan important role in accelerating electrons, then it is understandable\nthat the radio-emitting region at the shock front is spatially confined.\n\nIn space weather studies, the frequency drift of type II burst is\noften employed as an important input to predict the shock arrival\ntime at Earth. However, if the type II burst is generated from a\nspecial discrete part of the shock flank, as inferred from our\nstudy, then the speeds obtained from the curve fitting to the\ndynamic spectrum may not be accurate. This should be taken into\nconsideration when using type II spectrum as inputs to drive space\nweather forecastings.\n\n\\section{Conclusions}\n\nIn this paper we investigated the physical origin of two bump\nfeatures on the dynamic spectrum of a multiple type II radio\nburst, which were associated with a CME event occurred on December\n31 2007. Combining radio spectral data and EUV\/white light imaging\nobservations, we found that the type II bumps are caused by the\nsource density variation when the CME shock propagates through\nnearby dense streamers. It is suggested that the two type II\nepisodes are generated separately at the two flanks of the\nCME-driven shock. It is further inferred that the type II signals\nare emitted from discrete spatially-confined sources at the CME-shock\nflank with the source spatial extension smaller than 0.05-0.1 R$_\\odot$\nat a fundamental frequency level of 20-30 MHz\nand the large-scale shock geometry is close to quasi-perpendicular and\/or\n oblique.\n\n\n","meta":{"redpajama_set_name":"RedPajamaArXiv"}} +{"text":"\\section{Introduction}\n\nLabeled transition systems constitute a widely used model of\nconcurrent computation. They model processes by explicitly\ndescribing their states and their transitions from state to state,\ntogether with the actions that produce these transitions. Several\nnotions of behavioral semantics have been proposed, with the aim\nto identify those states that afford the same observations\n\\cite{Gla01,Gla93}. For equational reasoning about processes, one\nneeds to find an axiomatization that is sound and\n\\emph{ground-complete} modulo the semantics under consideration,\nmeaning that all equivalent closed terms can be equated. Ideally,\nsuch an axiomatization is also \\emph{$\\omega$-complete}, meaning\nthat all equivalent \\emph{open} terms can be equated. If such a\nfinite axiomatization exists, it is said that there is a\n\\emph{finite basis} for the equational theory.\n\nFor concrete semantics, so in the absence of the silent action\n$\\tau$, the existence of finite bases is well-studied\n\\cite{Gro90,Gla01,CFLN07}, in the context of the process algebra\nBCCSP, containing the basic process algebraic operators from CCS\nand CSP\\@. However, for weak semantics, that take into account the\n$\\tau$, hardly anything is known on finite bases. In \\cite{Gla93},\nVan Glabbeek presented a spectrum of weak semantics. For several\nof the semantics in this spectrum, a sound and ground-complete\naxiomatization has been given, in the setting of the process\nalgebra BCCS (BCCSP extended by $\\tau$), see, e.g., \\cite{Gla97}.\nBut a finite basis has been given only for \\emph{weak}, \\emph{delay},\n$\\eta$- and \\emph{branching bisimulation} semantics \\cite{Mi89a,vG93a},\nand in case of an infinite alphabet of actions also for \\emph{weak\nimpossible futures} semantics \\cite{VM01}. The reason for this lack of\nresults on finite bases, apart from the inherent difficulties arising\nwith weak semantics, may be that it is usually not so straightforward\nto define a notion of unique normal form for \\emph{open} terms in a\n\\emph{weak} semantics. Here we will employ a saturation technique,\nin which normal forms are saturated with subterms.\n\nIn this paper, we focus on two closely related weak semantics,\nbased on failures and impossible futures. A \\emph{weak failure}\nconsists of a trace $a_1\\cdots a_n$ and a set $A$, both of\nconcrete actions. A state exhibits this weak failure pair if it\ncan perform the trace $a_1\\cdots a_n$ (possibly intertwined with\n$\\tau$'s) to a state that cannot perform any action in $A$ (even\nafter performing $\\tau$'s). In a \\emph{weak impossible future},\n$A$ can be a set of traces. Weak failures semantics plays an\nessential role for the process algebra CSP \\cite{BHR84}. For\nconvergent processes, it coincides with testing semantics\n\\cite{DeNHen84,RenVog07}, and thus is the coarsest congruence for\nthe CCS parallel composition that respects deadlock behavior.\nWeak impossible futures semantics \\cite{Vog92} is a natural\nvariant of possible futures semantics \\cite{RB81}. In \\cite{GV06}\nit is shown that weak impossible futures semantics, with an\nadditional root condition, is the coarsest congruence containing\nweak bisimilarity with explicit divergence that respects\ndeadlock\/livelock traces (or fair testing, or any liveness\nproperty under a global fairness assumption) and assigns unique\nsolutions to recursive equations.\n\nThe heart of our paper is a finite basis for the inequational theory\nof BCCS modulo the weak failures \\emph{preorder}. The axiomatization\nconsists of the standard axioms A1-4 for bisimulation, three extra\naxioms WF1-3 for failures semantics, and in case of a finite alphabet\n$A$, an extra axiom WF$_A$. The proof that A1-4 and WF1-3 are a finite\nbasis in case of an infinite alphabet is a sub-proof of the proof that\nA1-4, \\mbox{WF1-3} and WF$_A$ are a finite basis in case of a finite\nalphabet. Our proof has the same general structure as the beautiful\nproof for testing equivalences given in \\cite{DeNHen84} and further\ndeveloped in \\cite{Hen88}. Pivotal to this is the construction of\n``saturated'' sets of actions within a term \\cite{DeNHen84}. Since\nhere we want to obtain an $\\omega$-completeness result, we extend this\nnotion to variables. Moreover, to deal with $\\omega$-completeness, we\nadopt the same general proof structure as in the strong case\n\\cite{FN05}. In this sense, our proof strategy can be viewed as a\ncombination of the strategies proposed in \\cite{DeNHen84} and\n\\cite{FN05}. Furthermore, we apply an algorithm from\n\\cite{AFI07,FG07,CFG08b} to obtain a finite basis for BCCS modulo weak\nfailures \\emph{equivalence} for free.\n\nAt the end, we investigate the equational theory of BCCS modulo\nweak impossible futures semantics. This shows a remarkable\ndifference with weak failures semantics, in spite of the strong\nsimilarity between the definitions of these semantics (and between\ntheir ground-complete axiomatizations). As said, in case of an\ninfinite alphabet, BCCS modulo the weak impossible futures\npreorder has a finite basis \\cite{VM01}. However, we show that in\ncase of a finite alphabet, such a finite basis does not exist.\nMoreover, in case of weak impossible futures \\emph{equivalence},\nthere is no finite ground-complete axiomatization, regardless of the\ncardinality of the alphabet.\n\nA finite basis for the equational theory of BCCSP modulo\n(concrete) failures semantics was given in \\cite{FN05}. The\nequational theory of BCCSP modulo (concrete) impossible futures\nsemantics is studied in \\cite{CF08}. It is interesting to see that\nour results for weak semantics agree with their concrete\ncounterparts, with very similar proofs. This raises a challenging open\nquestion: can one establish a general theorem to link the\naxiomatizability (or nonaxiomatizability) of concrete and weak semantics?\n\nAn extended abstract of this paper appears as \\cite{CFG08}.\n\\newpage\n\n\\section{Preliminaries} \\label{sec2}\n\n${\\rm BCCS}(A)$ is a basic process algebra for expressing finite\nprocess behavior. Its signature consists of the constant $\\mathbf{0}$,\nthe binary operator $\\_+\\_$\\,, and unary prefix operators $\\tau\\_$\nand $a\\_$\\,, where $a$ is taken from a nonempty set $A$ of visible\nactions, called the \\emph{alphabet}, ranged over by $a,b,c$. We\nassume that $\\tau\\notin A$ and write $A_\\tau$ for $A\\cup\\{\\tau\\}$,\nranged over by $\\alpha,\\beta$.\n\\[ t::= 0 \\mid at \\mid \\tau t \\mid t+t \\mid x\\]\nClosed ${\\rm BCCS}(A)$ terms, ranged over by $p,q$, represent\nfinite process behaviors, where $\\mathbf{0}$ does not exhibit any\nbehavior, $p+q$ offers a choice between the behaviors of $p$ and\n$q$, and $\\alpha p$ executes action $\\alpha$ to transform into\n$p$. This intuition is captured by the transition rules below.\nThey give rise to $A_\\tau$-labeled transitions between closed BCCS terms.\n\\[\n \\frac{~}{\\alpha x\\mv{\\alpha}x}\n\\qquad\n \\frac{x\\mv{\\alpha}x'}{x+y\\mv \\alpha x'}\n\\qquad\n \\frac{y\\mv{\\alpha}y'}{x+y\\mv \\alpha y'}\n\\]\nWe assume a countably infinite set $V$ of variables; $x,y,z$\ndenote elements of $V$. Open BCCS terms, denoted by $t,u,v,w$, may\ncontain variables from $V$. Write $\\var(t)$ for the set of variables\noccurring in $t$.\nThe operational semantics is extended verbatim to open terms;\nvariables generate no transition.\nWe write $t\\Rightarrow u$ if there is a sequence of\n$\\tau$-transitions $t\\mv{\\tau}\\cdots\\mv{\\tau}u$; furthermore\n$t\\mv{\\alpha}$ denotes that there is a term $u$ with\n$t\\mv{\\alpha}u$, and likewise $t\\Rightarrow\\mv{\\alpha}$ denotes that\nthere are a terms $u,v$ with $t\\Rightarrow u \\mv{\\alpha} v$.\n\nThe \\emph{depth} of a term $t$, denoted by $|t|$, is the length of\nthe \\emph{longest} trace of $t$, not counting $\\tau$-transitions.\nIt is defined inductively as follows: $|\\mathbf{0}|=|x|=0$;\n$|at|=1+|t|$; $|\\tau t| = |t|$; $|t+u|=\\max\\{|t|, |u|\\}$.\n\nA (closed) substitution, ranged over by $\\sigma,\\rho$, maps variables\nin $V$ to (closed) terms. For open terms $t$ and $u$, and a\npreorder $\\sqsubseteq$ (or equivalence $\\equiv$) on closed terms, we\ndefine $t\\sqsubseteq u$ (or $t\\equiv u$) if $\\sigma(t)\\sqsubseteq\\sigma(u)$\n(resp.\\ $\\sigma(t)\\equiv\\sigma(u)$) for all closed substitutions\n$\\sigma$. Clearly, $t\\mv{a}t'$ implies that\n$\\sigma(t)\\mv{a}\\sigma(t')$ for all substitutions $\\sigma$.\n\nAn \\emph{axiomatization} is a collection of equations $t \\approx\nu$ or of inequations $t \\preccurlyeq u$. The (in)equations in an\naxiomatization $E$ are referred to as \\emph{axioms}. If $E$ is an\nequational axiomatization, we write $E\\vdash t\\approx u$ if the\nequation $t\\approx u$ is derivable from the axioms in $E$ using\nthe rules of equational logic (reflexivity, symmetry,\ntransitivity, substitution, and closure under BCCS contexts). For\nthe derivation of an inequation $t\\preccurlyeq u$ from an\ninequational axiomatization $E$, denoted by $E\\vdash t\\preccurlyeq\nu$, the rule for symmetry is omitted. We will also allow equations\n$t\\approx u$ in inequational axiomatizations, as an abbreviation\nof $t\\preccurlyeq u\\land u\\preccurlyeq t$.\n\nAn axiomatization $E$ is \\emph{sound} modulo a preorder $\\sqsubseteq$\n(or equivalence $\\equiv$) if for all terms $t,u$, from $E\\vdash\nt\\preccurlyeq u$ (or $E\\vdash t\\approx u$) it follows that\n$t\\sqsubseteq u$ (or $t\\equiv u$). $E$ is \\emph{ground-complete} for\n$\\sqsubseteq$ (or $\\equiv$) if $p\\sqsubseteq q$ (or $p\\equiv q$)\nimplies $E\\vdash p\\preccurlyeq q$ (or $E\\vdash p\\approx q$) for all\nclosed terms $p,q$. Moreover, $E$ is \\emph{$\\omega$-complete} if for\nall terms $t,u$ with $E\\vdash\\sigma(t)\\preccurlyeq\\sigma(u)$ (or\n$E\\vdash\\sigma(t)\\approx\\sigma(u)$) for all closed substitutions\n$\\sigma$, we have $E\\vdash t\\preccurlyeq u$ (or $E\\vdash t\\approx u$).\nWhen $E$ is $\\omega$-complete as well as ground-complete, it is\n\\emph{complete} for $\\sqsubseteq$ (or $\\equiv$) in the sense that\n$t\\sqsubseteq u$ (or $t\\equiv u$) implies $E\\vdash t\\preccurlyeq u$\n(or $E\\vdash t\\approx u$) for all terms $t,u$. The equational\ntheory of BCCS modulo a preorder $\\sqsubseteq$ (or equivalence\n$\\equiv$) is said to be \\emph{finitely based} if there exists a\nfinite, $\\omega$-complete axiomatization that is sound and\nground-complete for BCCS modulo $\\sqsubseteq$ (or $\\equiv$).\n\nA1-4 below are the core axioms for BCCS modulo bisimulation\nsemantics. We write $t=u$ if $\\mbox{A1-4}\\vdash t\\approx u$.\n{\\small\\[\n\\begin{array}{l@{\\qquad}rcl}\n{\\rm A}1&x+y &~\\approx~& y+x\\\\\n{\\rm A}2&(x+y)+z &~\\approx~& x+(y+z)\\\\\n{\\rm A}3&x+x &~\\approx~& x\\\\\n{\\rm A}4&x+\\mathbf{0} &~\\approx~& x\\\\\n\\end{array}\n\\]}%\nSummation $\\sum_{i\\in\\{1,\\ldots,n\\}}t_i$ denotes $t_1+\\cdots+t_n$,\nwhere summation over the empty set denotes $\\mathbf{0}$. As binding\nconvention, $\\_+\\_$ and summation bind weaker than $\\alpha\\_$\\,.\nFor every term $t$ there exists a finite set $\\{\\alpha_i t_i\\mid\ni\\in I\\}$ of terms and a finite set $Y$ of variables such that\n$t=\\sum_{i\\in I} \\alpha_i t_i + \\sum_{y\\in Y}y$. The $\\alpha_i\nt_i$ for $i\\in I$ and the $y\\in Y$ are called the \\emph{summands}\nof $t$. For a set of variables $Y$, we will often denote the term\n$\\sum_{y\\in Y}y$ by $Y$.\n\n\\begin{definition}[Initial actions]\\rm\nFor any term $t$, the set $\\mc{I}(t)$ of initial actions is\ndefined as $\\mc{I}(t)=\\{a\\in A\\mid t\\Rightarrow \\mv{a}\\}$.\n\\end{definition}\n\n\\begin{definition}[Weak failures]\\rm \\label{def:weak-failures}\n\\vspace{-1ex}\n\\begin{itemize}\n \\item A pair $(a_1\\cdots a_k,B)$, with $k\\geq 0$ and $B \\subseteq A$,\n is a \\emph{weak failure pair} of a process $p_0$ if there is a path\n $p_0\\Rightarrow \\mv{a_1} \\Rightarrow \\cdots \\Rightarrow \\mv{a_k} \\Rightarrow p_k$\n with $\\mc{I}(p_k) \\cap B = \\emptyset$.\n\n \\item Write $p\\leq_{\\rm WF} q$ if the weak failure pairs of $p$ are\n also weak failure pairs of $q$.\n\n \\item The \\emph{weak failures preorder} $\\sqsubseteq_{\\rm WF}$ is\n given by\\\\ $p\\sqsubseteq_{\\rm WF} q$ iff (1) $p\\leq_{\\rm WF} q$ and\n (2) $p\\mv{\\tau}$ implies that $q\\mv{\\tau}$.\n\n \\item \\emph{Weak failures equivalence} $\\equiv_{\\rm WF}$ is defined\n as $\\sqsubseteq_{\\rm WF} \\cap \\sqsubseteq_{\\rm WF}^{-1}$.\n\\end{itemize}\n\\end{definition}\nIt is well-known that $p\\leq_{\\rm WF} q$ is \\emph{not} a\n\\emph{precongruence} for BCCS: e.g., $\\tau\\mathbf{0}\\leq_{\\rm WF}\\mathbf{0}$\nbut $\\tau\\mathbf{0}+a\\mathbf{0} \\not\\leq_{\\rm WF} \\mathbf{0}+a\\mathbf{0}$. However,\n$\\sqsubseteq_{\\rm WF}$ is, meaning that $p_1\\sqsubseteq_{\\rm WF} q_1$\nand $p_2\\sqsubseteq_{\\rm WF} q_2$ implies $p_1+p_2\\sqsubseteq_{\\rm WF}\nq_1+q_2$ and $\\alpha p_1\\sqsubseteq_{\\rm WF} \\alpha q_1$ for\n$\\alpha\\in A_\\tau$. In fact, $\\sqsubseteq_{\\rm WF}$ is the coarsest\nprecongruence contained in $\\leq_{\\rm WF}$.\nLikewise, $\\equiv_{\\rm WF}$ is a \\emph{congruence} for BCCS.\n\n\\section{A Finite Basis for Weak Failures Semantics} \\label{sec3}\n\n\\subsection{Axioms for the Weak Failures Preorder}\n\nOn BCCS processes, the weak failures preorder as defined above\ncoincides with the inverse of the must-testing preorder of \\cite{DeNHen84}.\nA sound and ground-complete axiomatization of the must-testing preorder\npreorder has been given in \\cite{DeNHen84}, in terms of a language\nricher than BCCS\\@. After restriction to BCCS processes, and reversing\nthe axioms, it consists of A1-4 together with the axioms: {\\small\n$$\\begin{array}{l@{\\qquad}rcl}\n\\mbox{N1} & \\alpha x + \\alpha y &\\approx& \\alpha (\\tau x + \\tau y)\\\\\n\\mbox{N2} & \\tau(x+y) &\\preccurlyeq& x + \\tau y\\\\\n\\mbox{N3} & \\alpha x + \\tau(\\alpha y + z) &\\approx& \\tau(\\alpha x + \\alpha y + z)\\\\\n\\mbox{E1} & x &\\preccurlyeq& \\tau x + \\tau y\n\\end{array}$$}%\nHere we simplify this axiomatization to A1-4 and WF1-3 from Tab.~\\ref{tab1}.\nIn fact it is an easy exercise to derive WF1-3 from N1, N2 and E1,\nand N1, N2 and E1 from WF1-3. It is a little harder to check that N3\nis derivable from the other three axioms (cf.~Lem.~\\ref{lemma5}).\n\n\\begin{table}[t] \\center\n \\begin{tabular}{l@{\\qquad}rcl}\n WF1 & $a x+ay$ & $\\approx$ & $a(\\tau x+\\tau y)$\\\\\n WF2 & $\\tau(x+y)$ & $\\preccurlyeq$ & $\\tau x+ y$\\\\\n WF3 & $x$ & $\\preccurlyeq $ & $ \\tau x+ y$\\medskip\\\\\n\\end{tabular}\\caption{Axiomatization for the weak failures preorder} \\label{tab1}\n\\vspace{-5mm}\n\\end{table}\n\n\\begin{theorem} \\label{theo:ground-complete}\n\\mbox{\\rm A1-4+WF1-3} is sound and ground-complete for\n$\\mathrm{BCCS}(A)$ modulo $\\sqsubseteq_{\\rm WF}$.\n\\end{theorem}\nIn this section, we extend this ground-completeness result with\ntwo $\\omega$-completeness results. The first one says, in\ncombination with Theo.~\\ref{theo:ground-complete}, that as long\nas our alphabet of actions is infinite, the axioms A1-4+WF1-3\nconstitute a finite basis for the inequational theory of BCCS$(A)$\nmodulo $\\sqsubseteq_{\\rm WF}$.\n\n\\begin{theorem} \\label{theo:A-infinite}\nIf $|A|\\mathbin=\\infty$, then \\mbox{\\rm A1-4+WF1-3} is $\\omega$-complete for\n$\\mathrm{BCCS}(A)$ modulo $\\sqsubseteq_{\\rm WF}$.\n\\end{theorem}\nTo get a finite basis for the inequational theory of BCCS modulo\n$\\sqsubseteq_{\\rm WF}$ in case $|A|<\\infty$, we need to add the\nfollowing axiom:\n\\[\\mathrm{WF}_A\\qquad \\sum_{a\\in A} ax_a \\preccurlyeq \\sum_{a\\in A}a x_a +y\\]\nwhere the $x_a$ for $a\\in A$ and $y$ are distinct variables.\n\n\\begin{theorem} \\label{theo:A-finite}\nIf $|A|<\\infty$, then \\mbox{\\rm A1-4+WF1-3+WF}$_A$ is $\\omega$-complete for\n $\\mathrm{BCCS}(A)$ modulo $\\sqsubseteq_{\\rm WF}$.\n\\end{theorem}\nThe rest of this section up to Sec.~\\ref{sec:wfe} is devoted to the\nproofs of Theorems~\\ref{theo:ground-complete}--\\ref{theo:A-finite}.\nFor a start, the inequations in Tab.~\\ref{tab:D-eqs} can be derived\nfrom A1-4+WF1-3:\n\n\\vspace{-3mm}\n\\begin{table}\n\\begin{center}\n \\begin{tabular}{l@{\\qquad}rcl}\n D1 & $ \\tau (x+y)+x$ & $\\approx$ & $\\tau (x+y)$\\\\\n D2 & $\\tau(\\tau x+y)$ & $\\approx$ & $\\tau x+ y$\\\\\n D3 & $ ax + \\tau(ay+z)$ & $\\approx$ & $\\tau(a x+ a y+z)$\\\\\n D4 & $ \\tau x $ & $\\preccurlyeq$ & $\\tau x +y$\\\\\n D5 & $ \\sum_{i\\in I} a x_i $ & $\\approx$ & $a (\\sum_{i\\in I}\\tau\n x_i)\\mbox{ for finite nonempty index sets }I $\\\\\n D6 & $ \\tau x + y$ & $\\approx$ & $\\tau x + \\tau (x+y) $\\\\\n D7 & $ \\tau x + \\tau y$ & $\\approx$ & $\\tau x + \\tau (x+y) + \\tau y $\\\\\n D8 & $ \\tau x + \\tau (x+y+z)$ & $\\approx$ & $\\tau x + \\tau (x+y) + \\tau(x+y+z) $\\\\\n D9 & $ \\sum_{i\\in I}\\tau (at_i+y_i)$ & $\\approx$ & $\\sum_{i\\in I}\\tau (at + y_i)$\n for finite $I$, where $t = \\sum_{i\\in I} \\tau t_i$.\n\\end{tabular}\n\\end{center}\n\\caption{Derived inequations} \\label{tab:D-eqs}\n\\end{table}\n\\vspace{-7mm}\n\\begin{lemma} \\label{lemma5}\n \\mbox{\\rm D1-9} are derivable from \\mbox{\\rm A1-4+WF1-3}.\n\\end{lemma}\n\n\\begin{proof}\nWe shorten ``$\\mbox{A1-4+WF1-3} \\vdash$'' to ``$\\vdash$''.\\vspace{-1ex}\n\\begin{enumerate}\n \\item\n By WF3, $\\vdash x \\preccurlyeq \\tau x$, and thus $\\vdash\\tau x+x\\preccurlyeq\n \\tau x$. Moreover, by WF2,\\\\ $\\vdash\\tau (x+x) \\preccurlyeq \\tau x+x$,\n hence $\\vdash\\tau x\\preccurlyeq \\tau x+x$. In summary, $\\vdash\\tau x\\approx\n \\tau x+x$.\n\n So $\\vdash \\tau(x+y)\\approx \\tau(x+y)+x+y+x \\approx \\tau(x+y)+x$.\n\n \\medskip\n\n \\item\n By WF2, $\\vdash \\tau(x+\\tau x)\\preccurlyeq \\tau x+\\tau x = \\tau\n x$, so by D1, $\\vdash \\tau\\tau x\\preccurlyeq \\tau x$.\n Hence, by WF2, $\\vdash\\tau (\\tau x+y) \\preccurlyeq \\tau \\tau x+y \\preccurlyeq \\tau x+y$.\n\n Moreover, by WF3, $\\vdash\\tau x+y \\preccurlyeq \\tau(\\tau x+y)$.\n\n \\medskip\n\n \\item By WF3, $\\vdash y \\preccurlyeq \\tau y+\\tau x$. So by WF1, $\\vdash ay\\preccurlyeq a(\\tau x+\\tau y)\\approx ax+ay$. This implies $\\vdash \\tau(ay+z)\\preccurlyeq \\tau(ax+ay+z)$. Hence, by D1, $\\vdash ax+\\tau(ay+z)\\preccurlyeq ax+ \\tau(ax+ay+z) \\approx \\tau(ax+ay+z)$.\n\nMoreover, by WF2, $ \\vdash \\tau(a x+ a y+z) \\preccurlyeq ax +\n\\tau(ay+z)$.\n\n\\medskip\n \\item By WF3 and D2, $\\vdash \\tau x\\preccurlyeq \\tau\\tau x+y \\approx \\tau x+y$.\n \\medskip\n\n \\item By induction on $|I|$, using WF1 and D2.\n \\medskip\n\n \\item By D4 and D1, $\\vdash \\tau x+y \\preccurlyeq \\tau x+\\tau(x+y)+y \\approx \\tau x+\\tau(x+y)$.\n\n Moreover, by WF2, $\\vdash \\tau x+\\tau(x+y)\\preccurlyeq \\tau x+\\tau x+y=\\tau x+y$.\n \\medskip\n\n \\item By D4 in one direction; by D6 and D1 in the other.\n \\medskip\n\n \\item By D4 in one direction; by D6 and D1 in the other.\n \\medskip\n\n \\item By D1, $\\vdash \\sum_{i\\in I}\\tau (at_i+y_i) \\approx\n \\sum_{i\\in I}\\tau (at_i+y_i) +u$, where $u=\\sum_{i\\in I}at_i$.\n Thus, by repeated application of D3, $\\vdash \\sum_{i\\in I}\\tau (at_i+y_i) \\approx\n \\sum_{i\\in I}\\tau (at_i+u+y_i) = \\sum_{i\\in I}\\tau (u+y_i)$.\n By D5 we have $u=at$.\n\\qed\n\\end{enumerate}\n\\end{proof}\n\n\\subsection{Normal Forms}\n\nThe notion of a normal form, which is formulated in the following\ntwo definitions, will play a key role in the forthcoming proofs.\nFor any set $L\\subseteq A\\cup V$ of actions and variables let $A_L\n= L \\cap A$, the set of actions in $L$, and $V_L = L \\cap V$, the\nset of variables in $L$.\n\n\\begin{definition}[Saturated family]\\rm Suppose $\\mc{L}$ is a finite family of\nfinite sets of {actions} and {variables}. We say $\\mc{L}$ is\n\\emph{saturated} if it is nonempty and\n\\begin{itemize}\n \\item $L_1, L_2\\in \\mc{L}$ implies that $L_1\\cup L_2 \\in\n \\mc{L}$; and\n\n \\item $L_1, L_2\\in \\mc{L}$ and $L_1\\subseteq L_3 \\subseteq L_2$\n imply that $L_3\\in \\mc{L}$.\n\\end{itemize}\n\\end{definition}\n\n\\begin{definition}[Normal form]\\rm\n\\begin{list}{$\\bullet$}{\\leftmargin 18pt\n \\labelwidth\\leftmargini\\advance\\labelwidth-\\labelsep}\n \\item[(i)] A term $t$ is in $\\tau$ normal form if\\vspace{-6pt}\n \\[t = \\sum_{L\\in \\mc{L}}\\tau \\left(\\sum_{a \\in A_L} at_a+ V_L\\right)\\vspace{-3pt}\\]\nwhere the $t_a$ are in normal form and $\\mc{L}$ is a saturated\nfamily of sets of actions and variables. We write $L(t)$ for\n$\\bigcup_{L\\in\\mc{L}}L$; note that $L(t) \\in \\mc{L}$.\n\\medskip\n \\item[(ii)] $t$ is in action normal form if\n\\[t= \\sum_{a\\in A_L} at_a + V_L \\]\nwhere the $t_a$ are in normal form and $L\\subseteq A \\cup V$. We\nwrite $L(t)$ for $L$.\n\\medskip\n\\item[(iii)] $t$ is in normal form if it is either in $\\tau$\nnormal form or in action normal form.\\pagebreak[3]\n\\end{list}\n\\end{definition}\nNote that the definition of a normal form requires that for any $a\\in A$, if\n$t\\Rightarrow\\mv{a} t_1$ and $t\\Rightarrow\\mv{a} t_2$, then $t_1$ and $t_2$ are\nsyntactically identical.\n\nWe prove that every term can be equated to a normal form. We start\nwith an example.\n\n\\begin{example}\n Suppose $t= \\tau(at_1+\\tau(bt_2+ct_3)+x) +\\tau(at_4+\\tau x+\\tau y)+z$.\n Then $t$ can be equated to a $\\tau$ normal form with\n $\\mc{L}=\\{${\\small$\\{a,b,c, x\\},\\{a, x,y\\}, \\{a,b,c, x,y,z\\}$,\n $\\{a,b,c, x,y\\},\\hspace{-.6pt}\\{a,b,c, x,z\\},\\hspace{-.6pt}\n \\{a,b, x,y\\},\\hspace{-.5pt} \\{a,c, x,y\\},\\hspace{-.5pt}\n \\{a, x,y,z\\},\\hspace{-.6pt} \\{a,b, x,y,z\\},\\hspace{-.6pt}\n \\{a,c, x,y,z\\}$}$\\}$.\n We give a detailed derivation. By D2,\n \\[\n \\vdash t \\approx \\tau(at_1+bt_2+ct_3+x) +\\tau(at_4+ x+ y)+z\n \\]\n By D6,\n \\[\n \\vdash t \\approx \\tau(at_1+bt_2+ct_3+x) +\\tau(at_4+x+y)+\\tau(at_4+x+y+z)\n \\]\n Let $u_a = \\tau t_1+\\tau t_4$, $u_b=t_2$ and $u_c=t_3$. By D9,\n \\[\n \\vdash t \\approx \\tau(au_a+bu_b+cu_c+x)+\\tau(au_a+x+y)+\\tau(au_a+x+y+z)\n \\]\nBy induction, $u_a$ can be brought into a normal form $t_a$, and\nlikewise for $u_b$ and $u_v$. So\n \\[\n \\vdash t \\approx \\tau(tu_a+bt_b+ct_c+x)+\\tau(at_a+x+y)+\\tau(at_a+x+y+z)\n \\]\nBy D7,\n \\[\n \\vdash t \\approx \\begin{array}[t]{l}\n \\tau(at_a+bt_b+ct_c+x) +\\tau(at_a+x+y)\\\\\n +\\tau(at_a+x+y+z) + \\tau(at_a+bt_b+ct_c+x+y+z)\n \\end{array}\n \\]\nFinally, by D8,\n \\[\n \\vdash t \\begin{array}[t]{l@{}}\n \\approx \\begin{array}[t]{@{}l@{}} \\tau(at_a+bt_b+ct_c+x)\n +\\tau(at_a+x+y) +\\tau(at_a+x+y+z)\\\\\n + \\tau(at_a+bt_b+ct_c+x+y+z)\n + \\tau(at_a+bt_b+ct_c+x+y)\\\\\n + \\tau(at_a+bt_b+ct_c+x+z)\n + \\tau(at_a+bt_b+x+y)\n + \\tau(at_a+ct_c+x+y)\\\\\n + \\tau(at_a+bt_b+x+y+z)\n + \\tau(at_a+ct_c+x+y+z)\n \\end{array}\\\\\n = \\sum_{L\\in \\mc{L}}\\tau(\\sum_{a\\in A_L} a t_a + V_L)\n \\end{array}\n \\]\n\\end{example}\n\n\\begin{lemma} \\label{nf}\n For any term $t$, $\\mbox{\\rm A1-4+WF1-3} \\vdash t\\approx t'$ for some normal form $t'$.\n\\end{lemma}\n\n\\begin{proof}\nBy induction on $|t|$. We distinguish two cases.\n\\medskip\n\\begin{itemize}\n \\item $t\\,\\not\\!\\mv{\\tau}$. Let $t= \\sum_{i\\in I}a_i t_i+Y$. By D5,\n\\[\\vdash t\\approx \\sum_{a\\in \\mc{I}(t)} a(\\!\\!\\!\\!\\sum_{i\\in I, a_i=a}\\!\\!\\!\\!\\tau t_i)+Y~.\\]\nBy induction, for each $a\\in\\mc{I}(t)$,\n\\[\\vdash \\!\\!\\!\\!\\sum_{i\\in I,a_i=a}\\!\\!\\!\\! \\tau t_i\\approx t_a\\]\nfor some normal form $t_a$. So we are done.\n\\medskip\n \\item $t \\mv{\\tau}$. By D6, $t$ can be brought in the form\n $\\sum_{i\\in I}\\tau t_i$ with $I\\neq\\emptyset$, and using D2 one can\n even make sure that $t_i\\,\\not\\!\\mv{\\tau}$ for $i\\in I$.\n Using the first case in this proof, we obtain,\n for each $i\\in I$,\n\\[\n \\vdash t_i \\approx \\sum_{a\\in A_{L(i)}}a t_{a,i} + V_{L(i)}\n\\]\nfor some $L(i) \\subseteq A \\cup V$.\nThus\\vspace{-3pt}\n\\[\n\\vdash t \\approx \\sum_{i\\in I}\n\\tau \\left(\\sum_{a\\in A_{L(i)}}a t_{a,i} + V_{L(i)}\\right) ~.\n\\vspace{-3pt}\\]\nFor each $a\\in \\mc{I}(t)$, we define \\qquad\n$\\displaystyle u_a=\\!\\!\\!\\!\\sum_{i\\in I,~ a \\in A_{L(i)}}\\!\\!\\!\\! \\tau t_{a,i}~.$\\\\[1ex]\nThen $|u_a| < |t|$.\nBy induction, $\\vdash u_a \\approx t_a$ for some normal form $t_a$.\\\\\nDefine $\\mc{L} = \\{L(i) \\mid i \\in I\\}$.\nBy repeated application of D9 we obtain\\vspace{-3pt}\n\\[\n\\vdash t \\approx \\sum_{i\\in I} \\tau \\left( \\sum_{a\\in\n A_{L(i)}}\\!\\!a u_{a} + V_{L(i)}\\right)\n\\approx \\sum_{L\\in \\mc{L}}\\tau\\left( \\sum_{a\\in A_L}\\ at_a +V_L\\right)\n~.\\vspace{-3pt}\\]\nThe latter term has the required form, except that the family $\\mc{L}$\nneed not be saturated. However, it is straightforward to saturate\n$\\mc{L}$ by application of D7 and D8.\n\\qed\n\\end{itemize}\n\\end{proof}\n\n\\begin{lemma} \\label{essential}\n Suppose $t$ and $u$ are both in normal forms and $t\\sqsubseteq_{\\rm WF} u$.\n If $t\\Rightarrow \\mv{a}t_a$, then there exists a term $u_a$ such that $u\\Rightarrow\\mv{a} u_a$ and $t_a\\leq_{\\rm WF} u_a$.\n\\end{lemma}\n\n\\begin{proof}\n Suppose $t\\sqsubseteq_{\\rm WF} u$ and $t\\Rightarrow \\mv{a} t_a$.\n Let $\\sigma$ be the closed substitution given by $\\sigma(x)=\\mathbf{0}$ for\n all $x\\in V$. As $(a,\\emptyset)$ is a weak failure\n pair of $\\sigma(t)$ and $\\sigma(t)\\sqsubseteq_{\\rm WF} \\sigma(u)$, it\n is also a weak failure pair of $u$. Thus there\n exists a term $u_a$ such that\n \\raisebox{0pt}[0pt][0pt]{$u\\Rightarrow\\mv{a} u_a$}.\n By the definition of a normal form, this term is unique.\\hfill(*)\n\n We now show that $t_a \\leq_{\\rm WF} u_a$.\n Let $\\rho$ be a closed substitution.\n Consider a weak failure pair $(a_1\\cdots a_k,B)$ of $\\rho(t_a)$.\n Then $(aa_1\\cdots a_k,B)$ is a weak failure pair of\n $\\rho(t)$, and hence also of $\\rho(u)$. It suffices to conclude that\n $(a_1\\cdots a_k,B)$ is a weak failure pair of $\\rho(u_a)$.\n However, we can \\emph{not} conclude this directly, as\n possibly $u\\Rightarrow x+u'$ where\n $(a a_1\\cdots a_k,B)$ is a weak failure pair of $\\rho(x)$.\n To ascertain that nevertheless $(a_1\\cdots a_k,B)$ is a weak\n failure pair of $\\rho(u_a)$,\n we define a modification $\\rho'$ of $\\rho$ such that\n for all $\\ell\\leq k$ and for all terms $v$, $\\rho(v)$ and $\\rho'(v)$\n have the same weak failure pairs $(c_1\\cdots c_\\ell,B)$, while for all\n $x\\in V$, $(a a_1\\cdots a_k,B)$ is not a weak failure pair of $\\rho'(x)$.\n\n We obtain $\\rho'(x)$ from $\\rho(x)$ by replacing subterms $bp$ at\n depth $k$ by $\\mathbf{0}$ if $b\\not\\in B$ and by $bb\\mathbf{0}$ if $b\\in B$.\n That is,\n \\newcommand{\\chop}[1][]{\\mathit{chop}_{#1}}\n \\[\n \\rho'(x)=\\chop[k](\\rho(x))\n \\]\n with ${\\it chop}_m$ for all $m\\geq 0$ inductively defined by\n \\[ \\begin{array}{lcl}\n \\chop[m](\\mathbf{0}) &=& \\mathbf{0} \\\\\n \\chop[m](p+q) &=& \\chop[m](p)+\\chop[m](q) \\\\\n \\chop[m](\\tau p) &=& \\tau\\,\\chop[m](p)\\\\\n \\chop[0](bp) &=& \\left \\{ \\begin{array}{ll}\n \\mathbf{0} & \\mbox{if $b\\not\\in B$} \\\\\n bb\\mathbf{0} & \\mbox{if $b\\in B$}\n \\end{array} \\right. \\\\\n \\chop[m+1](bp) &=& b\\,\\chop[m](p)\n \\end{array}\n \\]\n We proceed to prove that $\\rho'$ has the desired properties\n mentioned above.\n\n \\begin{enumerate}\n \\renewcommand{\\theenumi}{\\Alph{enumi}}\n \\item \\label{rhomodA}\n For all $\\ell\\leq k$ and $c_1,\\ldots,c_\\ell\\in A$ and for all terms\n $v$, $\\rho(v)$ and\n $\\rho'(v)$ have the same weak failure pairs $(c_1\\cdots c_\\ell,B)$,\n\n The difference between $\\rho(v)$ and $\\rho'(v)$ only appears within\n subterms of depth $k$, that is for terms $p$ such that\n $\\rho(v)\\Rightarrow \\mv{c_1} \\Rightarrow \\cdots \\Rightarrow\n \\mv{c_k} \\Rightarrow p$ for certain $c_1,\\ldots,c_k \\in A$. Such a\n subterm $p$ of $\\rho(v)$ corresponds to a subterm $p'$ of\n $\\rho'(v)$---still satisfying $\\rho'(v)\\Rightarrow \\mv{c_1}\n \\Rightarrow \\cdots \\Rightarrow \\mv{c_k} \\Rightarrow p'$---in which\n certain subterms $bq$ are replaced by $\\mathbf{0}$ if $b\\not\\in B$ and by\n $bb\\mathbf{0}$ if $b\\in B$. For such corresponding subterms $p$ and $p'$\n we have $\\mc{I}(p)\\cap B=\\emptyset$ if and only if $\\mc{I}(p')\\cap\n B=\\emptyset$. From this the claim follows immediately.\n\n \\medskip\n\n \\item \\label{rhomodB}\n For all $x\\in V$,\n $(a a_1\\cdots a_k,B)$ is not a weak failure pair of $\\rho'(x)$.\n\n \\medskip\n\n To this end we show that for all closed terms $p$, $\\chop[m](p)$\n does not have any weak failure pair $(c_0\\cdots c_{m},B)$\n with $c_0,\\ldots,c_m\\in A$.\n We apply induction on $m$.\n\n \\smallskip\n\n \\noindent\n \\textit{Base case:} Since the summands of $\\chop[0](p)$, when\n skipping over initial $\\tau$-steps, are\n $bb\\mathbf{0}$ with $b\\in \\mc{I}(p)\\cap B$, $\\chop[0](p)$ does not\n have a weak failure pair $(c_0,B)$.\n\n \\smallskip\n\n \\noindent\n \\textit{Induction step:} Let $m>0$. By induction, for closed terms $q$,\n $\\chop[m-1](q)$ does not have weak failure pairs $(c_1\\cdots c_{m},B)$.\n Since the transitions of $\\chop[m](p)$ are\n $\\chop[m](p)\\mv{c}\\chop[m-1](q)$ for $p\\mv{c}q$, it\n follows that $\\chop[m](p)$ does not have weak failure pairs\n $(c_0\\cdots c_{m},B)$.\n \\end{enumerate}\n\n \\noindent\n Now, since $(a_1\\cdots a_k,B)$ is a weak failure pair of $\\rho(t_a)$,\n by property (\\ref{rhomodA}) it is also a weak failure pair of $\\rho'(t_a)$,\n Therefore $(a a_1\\cdots a_k,B)$ is a weak failure pair of $\\rho'(t)$,\n and hence also of $\\rho'(u)$.\n Since according to property (\\ref{rhomodB}) it is \\emph{not} the case that\n $u\\Rightarrow x+u'$ with $(a a_1\\cdots a_k,B)$ a weak failure pair\n of $\\rho'(x)$, it must be the case that $u\\Rightarrow \\mv{a}u''$ such\n that $(a_1\\cdots a_k,B)$ is a weak failure pair of $\\rho'(u'')$.\n By (*), $u''=u_a$.\n Again by property (\\ref{rhomodA}), $(a_1\\cdots a_k,B)$ is a\n weak failure pair of $\\rho(u_a)$.\n\\qed\n\\end{proof}\n\n\n\\subsection{$\\omega$-Completeness Proof}\n\nWe are now in a position to prove Theo.~\\ref{theo:A-infinite}\n($\\omega$-completeness in case of an infinite alphabet) and\nTheo.~\\ref{theo:A-finite} ($\\omega$-completeness in case of a\nfinite alphabet), along with Theo.~\\ref{theo:ground-complete}\n(ground completeness). We will prove these three theorems in one\ngo. Namely, in the proof, two cases are distinguished; only in the\nsecond case ($\\mc{I}(t)=A$), in which the $A$ is guaranteed to be\nfinite, will the axiom WF$_A$ play a role.\n\n\\begin{proof}\nLet $t\\sqsubseteq_{\\rm WF} u$. We need to show that $\\vdash\nt\\preccurlyeq u$. We apply induction on $|t|+|u|$. By\nLem.~\\ref{nf}, we can write $t$ and $u$ in normal form.\n\nWe first prove that $L(t)\\subseteq L(u)$. Suppose this is not the\ncase. Then there exists some $a\\in A_{L(t)}\\setminus A_{L(u)}$ or\nsome $x\\in V_{L(t)}\\setminus V_{L(u)}$. In the first case, let\n$\\sigma$ be the closed substitution with $\\sigma(z)=\\mathbf{0}$ for all\n$z\\in V$; we find that $(a,\\emptyset)$ is a weak failure pair of\n$\\sigma(t)$ but not of $\\sigma(u)$, which contradicts the fact that\n$\\sigma(t)\\sqsubseteq_{\\rm WF} \\sigma(u)$. In the second case, pick some\n$d>\\max\\{|t|,|u|\\}$, and consider the closed substitution\n$\\sigma(x)=a^d\\mathbf{0}$ and $\\sigma(z)=\\mathbf{0}$ for $z\\neq x$. Then\n$(a^d,\\emptyset)$ is weak failure pair of $\\sigma(t)$. However, it\ncan \\emph{not} be a weak failure pair of $\\sigma(u)$, again\ncontradicting $\\sigma(t)\\sqsubseteq_{\\rm WF} \\sigma(u)$.\n\nWe distinguish two cases, depending on whether $\\mc{I}(t)=A$ or\nnot.\n\n \\begin{enumerate}\n\n \\item $\\mc{I}(t) \\neq A$. We distinguish three cases.\nDue to the condition that $t\\mv{\\tau}$ implies $u\\mv{\\tau}$, it\ncannot be the case that $t$ is an action normal form and $u$ a\n$\\tau$ normal form.\n\n\\medskip\n \\begin{enumerate}\n\\item $t$ and $u$ are both action normal forms.\nSo $t= \\sum_{a\\in A_L} at_a + V_L$ and $u= \\sum_{a\\in A_M}\nau_a+V_M$. We show that $L(t)=L(u)$. Namely, pick $b\\in A\\setminus\nA_L$, and let $\\sigma$ be the closed substitution with\n$\\sigma(z)=\\mathbf{0}$ for any $z\\in V_L$, and $\\sigma(z)=b\\mathbf{0}$ for\n$z\\not\\in V_L$. As $(\\varepsilon,A\\setminus\\mc{I}(t))$ is a weak\nfailure pair of $t$, and\n hence of $u$, it must be that $L(u)\\subseteq L(t)$.\nTogether with $L(t)\\subseteq L(u)$ this gives $L(t)=L(u)$. By\nLem.~\\ref{essential}, for each $a\\in \\mc{I}(t)$, $t_a \\leq_{\\rm WF}\nu_a$, and thus clearly $t_a\\sqsubseteq_{\\rm WF} \\tau u_a$. By\ninduction, $\\vdash t_a\\preccurlyeq \\tau u_a$ and hence $\\vdash\nat_a\\preccurlyeq au_a$. It follows that\n\\[\\vdash t = \\sum_{a\\in A_L} at_a +V_L \\preccurlyeq \\sum_{a\\in A_L}\nau_a +V_L = \\sum_{a\\in A_M} au_a +V_M = u\\]\n\n\\item Both $t$ and $u$ are $\\tau$ normal forms:\n\\[ t= \\sum_{L\\in \\mc{L}}\\tau (\\sum_{a \\in A_L} at_a+ V_L)\\]\nand\n\\[ u = \\sum_{M\\in \\mc{M}}\\tau (\\sum_{a \\in A_M} au_a+ V_M)\\]\n\nBy Lem.~\\ref{essential}, for each $a\\in \\mc{I}(t)$, $t_a \\leq_{\\rm WF}\nu_a$, and thus clearly $t_a\\sqsubseteq_{\\rm WF} \\tau u_a$. By\ninduction, $\\vdash t_a\\preccurlyeq \\tau u_a$. By these\ninequalities, together with D4,\n\\begin{equation} \\label{eqnX}\n\\vdash t \\preccurlyeq \\sum_{L\\in \\mc{L}} \\tau(\\sum_{a\\in A_L} au_a\n+ V_L) + u\n\\end{equation}\n\n\\medskip\n\nWe now show that $\\mc{L}\\subseteq \\mc{M}$. Take any $L\\in \\mc{L}$,\npick $b\\in A \\setminus A_L$, and consider the closed substitution\n$\\sigma(z)=\\mathbf{0}$ for any $z\\in V_L$, and $\\sigma(z)=b\\mathbf{0}$ for\n$z\\not\\in V_L$. Since $\\sigma(t)\\mv{\\tau} \\sigma(\\sum_{a\\in L}at_a)$\nand $\\sigma(t)\\sqsubseteq_{\\rm WF} \\sigma(u)$, there exists an $M\\in\n\\mc{M}$ with $A_M\\subseteq A_L$ and $V_M \\subseteq V_L$. Since\nalso $L\\subseteq L(t) \\subseteq L(u)$, and $\\mc{M}$ is saturated,\nit follows that $L\\in\\mc{M}$. Hence, $\\mc{L} \\subseteq \\mc{M}$.\n\n\\medskip\n\nSince $\\mc{L} \\subseteq \\mc{M}$,\n\\begin{equation} \\label{eqnY}\n\\sum_{L\\in \\mc{L}}\\tau(\\sum_{a\\in A_L} au_a + V_L) + u = u\n\\end{equation}\nBy (\\ref{eqnX}) and (\\ref{eqnY}), $ \\vdash t\\preccurlyeq u$.\n\n\\medskip\n\n\\item $t$ is an action normal form and $u$ is a $\\tau$ normal\nform. Then $\\tau t \\sqsubseteq_{\\rm WF} u$. Note that $\\tau t$ is a\n$\\tau$ normal form, so according to the previous case,\n\\[\\vdash \\tau t \\preccurlyeq u\\]\nBy WF3,\n\\[\\vdash t\\preccurlyeq \\tau t \\preccurlyeq u \\]\n\n\\end{enumerate}\n\n \\medskip\n\n \\item $\\mc{I}(t)=A$. Note that in this case, $|A|<\\infty$. So, according to\nTheo.~\\ref{theo:A-finite}, axiom WF$_A$ is at our disposal. As\nbefore, we distinguish three cases.\n\\medskip\n \\begin{enumerate}\n \\item Both $t$ and $u$ are action normal forms. Since\n $L(t)\\subseteq L(u)$ we have\n $t= \\sum_{a\\in A} at_a +W$ and $u= \\sum_{a\\in A} au_a+X$ with $W\n \\subseteq X$. By WF$_A$,\n \\[ \\vdash \\sum_{a\\in A}a t_a \\preccurlyeq \\sum_{a\\in A}a t_a + u\\]\n By Lem.~\\ref{essential}, for each $a\\in A$, $t_a \\leq_{\\rm WF} u_a$, and\n thus clearly $t_a\\sqsubseteq_{\\rm WF} \\tau u_a$. By induction,\n $\\vdash t_a\\preccurlyeq \\tau u_a$. It follows, using $W\\subseteq X$, that\n \\[ \\vdash t=\\sum_{a\\in A}a t_a +W \\preccurlyeq \\sum_{a\\in A}a u_a + u + W=u\\]\n\n \\medskip\n\n \\item Both $t$ and $u$ are $\\tau$ normal forms.\n \\[t= \\sum_{L\\in \\mc{L}}\\tau (\\sum_{a \\in A_L} at_a+V_L)\\]\n and\n \\[ u = \\sum_{M\\in \\mc{M}}\\tau (\\sum_{a \\in A_M} au_a+V_M)\\]\n By D1 and WF$_A$ (clearly, in this case $A_{L(t)}=A$),\n \\begin{equation} \\label{eqPP}\n \\vdash t\\approx t+\\sum_{a\\in A}a t_a \\preccurlyeq t+\\sum_{a\\in A}a t_a+u\n \\end{equation}\n By Lem.~\\ref{essential}, for each $a\\in A$, $t_a \\leq_{\\rm WF} u_a$, and thus clearly\n $t_a\\sqsubseteq_{\\rm WF} \\tau u_a$. By induction, $\\vdash\n t_a\\preccurlyeq \\tau u_a$. By these inequalities, together with (\\ref{eqPP}),\n \\[\n \\vdash t \\preccurlyeq \\sum_{L\\in \\mc{L}}\\tau (\\sum_{a \\in A_L} au_a+V_L)\n + \\sum_{a\\in A}a u_a + u\n \\]\n So by D1,\n \\begin{equation} \\label{eqnQQ} \\vdash t \\preccurlyeq \\sum_{L\\in \\mc{L}}\n \\tau (\\sum_{a \\in A_L} au_a+V_L) + u\\end{equation}\n Now for $L\\in \\mc{L}$ with $A_L\\neq A$ we have $L \\in \\mc{M}$ using\n the same reasoning as in 1(b). For $L\\in \\mc{L}$ with $A_L=A$ we\n have $V_L \\subseteq V_{L(t)} \\subseteq V_{L(u)}$. By WF$_A$ we have\n \\begin{equation} \\label{eqnSS}\n \\vdash \\tau(\\sum_{a \\in A_L} au_a+V_L) \\preccurlyeq\n \\tau(\\sum_{a \\in A} au_a+V_{L(u)})\n \\end{equation}\n As the latter is a summand of $u$ we obtain $t\\preccurlyeq u$.\n\n\\medskip\n\n \\item $t$ is an action normal form and $u$ is a $\\tau$ normal\n form. This can be dealt with as in case 1(c).\n \\end{enumerate}\n \\end{enumerate}\n This completes the proof. \\qed\n\\end{proof}\n\n\\subsection{Weak Failures Equivalence} \\label{sec:wfe}\n\nIn \\cite{AFI07,FG07} an algorithm is presented which takes as\ninput a sound and ground-complete inequational axiomatization $E$\nfor BCCSP modulo a preorder $\\sqsubseteq$ which \\emph{includes the\nready simulation preorder} and is \\emph{initials\npreserving},\\footnote{meaning that $p\\sqsubseteq q$ implies that\n$I(p)\\subseteq I(q)$, where the set $I(p)$ of \\emph{strongly}\ninitial actions is $I(p) = \\{\\alpha \\in A_{\\tau} \\mid\np\\mv{\\alpha}\\}$} and generates as output an equational\naxiomatization $\\mc{A}(E)$ which is sound and ground-complete for\nBCCSP modulo the corresponding equivalence---its kernel: $\\sqsubseteq\n\\cap \\sqsubseteq^{-1}$. Moreover, if the\noriginal axiomatization $E$ is $\\omega$-complete, so is the\nresulting axiomatization. The axiomatization $\\mc{A}(E)$ generated\nby the algorithm from $E$ contains the axioms A1-4 for\nbisimulation equivalence and the axioms $\\beta(\\alpha x + z) +\n\\beta (\\alpha x + \\alpha y + z) \\approx\n \\beta (\\alpha x + \\alpha y + z)$ for $\\alpha,\\beta\\in A_\\tau$\nthat are valid in ready simulation semantics, together with the\nfollowing equations, for each inequational axiom $t \\preccurlyeq\nu$ in $E$:\n\\begin{itemize}\n\n\\item $ t + u \\approx u$; and\n\n\\item $\\alpha(t + x) + \\alpha(u + x) \\approx \\alpha(u + x)$ (for\neach $\\alpha\\in A_\\tau$, and some variable $x$ that does not occur\nin $t + u$).\n\\end{itemize}\nMoreover, if $E$ contains an equation (formally abbreviating two\ninequations), this equation is logically equivalent to the four\nequations in $\\mc{A}(E)$ that are derived from it, and hence can be\nincorporated in the equational axiomatization unmodified.\n\nRecently, we lifted this result to weak semantics\n\\cite{CFG08b}, which makes the aforementioned algorithm applicable\nto all 87 preorders surveyed in \\cite{Gla93} that are at least as\ncoarse as the ready simulation preorder. Namely, among others, we\nshow that\n\n\\begin{theorem}\\label{alg}\nLet $\\sqsubseteq$ be a weak initials preserving precongruence%\n\\footnote{meaning that $p\\sqsubseteq q$ implies that\n$\\mc{I}_{\\tau}(p)\\subseteq \\mc{I}_\\tau(q)$, where the set\n$\\mc{I}_\\tau(p)$ of \\emph{weak} initial actions is $\\mc{I}_\\tau(p)\n= \\{\\alpha \\in A_{\\tau} \\mid p\\Rightarrow\\mv{\\alpha}\\}$} that\ncontains the strong ready simulation preorder $\\sqsubseteq_{\\rm RS}$\nand satisfies T2 (the second $\\tau$-law of CCS: $\\tau x \\approx\n\\tau x + x$), and let $E$ be a sound and ground-complete\naxiomatization of $\\sqsubseteq$. Then $\\mc{A}(E)$ is a sound and\nground-complete axiomatization of the kernel of $\\sqsubseteq$.\nMoreover, if $E$ is $\\omega$-complete, then so is $\\mc{A}(E)$.\n\\end{theorem}\nIt is straightforward to check that weak failures meets the\nprerequisites of Theo.~\\ref{alg}, and thus we can run the\nalgorithm and obtain the axiomatization in Tab.~\\ref{tab-aux} for\nweak failures equivalence.\n\\begin{table}\n\\vspace{-5pt}\n\\begin{center}\n \\begin{tabular}{l@{\\qquad}rcl}\n WF1 & $ax+ay$ & $\\approx$ & $a(\\tau x+\\tau y)$\\\\\n WF2$^a$ & $\\tau(x+y)+\\tau x +y$ & $\\approx$ & $\\tau x+ y$\\\\\n WF2$^b$ & $\\alpha(\\tau(x+y)+z) + \\alpha (\\tau x+y +z) $ & $\\approx$ & $\\alpha(\\tau x+ y+z)$\\\\\n WF3$^a$ & $x+\\tau x+y$ & $\\approx $ & $ \\tau x+ y$\\\\\n WF3$^b$ & $\\alpha(x+z)+\\alpha(\\tau x+y+z)$ & $\\approx $ & $ \\alpha(\\tau x+ y+z)$\\\\\n RS & $\\beta(\\alpha x + z) + \\beta(\\alpha x + \\alpha y + z)$ & $\\approx $ &\n $\\beta(\\alpha x + \\alpha y + z)$\\\\\n WF$_A^{~~a}$ & $\\sum_{a\\in A} ax_a + \\sum_{a\\in A} ax_a + y$ & $\\approx $ &\n $\\sum_{a\\in A} ax_a + y$\\\\\n WF$_A^{~~b}$ & $\\beta(\\sum_{a\\in A} ax_a + z) + \\beta(\\sum_{a\\in A} ax_a + y+z)$ & $\\approx $ & $\\beta(\\sum_{a\\in A} ax_a + y+z)$\n\\end{tabular}\n\\end{center}\\caption{Axiomatization generated from the algorithm}\\label{tab-aux}\n\\vspace{-5mm}\n\\end{table}\n\\noindent After simplification and omission of redundant axioms,\nwe obtain the axiomatization in Tab.~\\ref{tab5}.\n\\begin{table}\n\\vspace{-5pt}\n\\begin{center}\n \\begin{tabular}{l@{\\qquad}rcl}\n WF1 & $ax+ay$ & $\\approx$ & $a(\\tau x+\\tau y)$\\\\\n WFE2 & $\\tau(x+y)+\\tau x$ & $\\approx$ & $\\tau x+ y$\\\\\n WFE3 & $ax+\\tau(ay+z)$ & $\\approx$ & $\\tau(a x+ a y+z)$\\\\\n WFE$_A$ & $\\tau(\\sum_{a\\in A} ax_a + z) + \\tau(\\sum_{a\\in A} ax_a + y+z)$\n & $\\approx $ & $\\tau(\\sum_{a\\in A} ax_a + y+z)$\n\\end{tabular}\n\\end{center}\n\\caption{Axiomatization for weak failures equivalence} \\label{tab5}\n\\vspace{-5mm}\n\\end{table}\n\n \\begin{lemma} \\label{lem:four}\n The axioms in \\emph{Tab.~\\ref{tab-aux}} are\n derivable from the axioms in\n \\emph{Tab.~\\ref{tab5}} together with A1-4.\n \\end{lemma}\n \\begin{proof}\n \n WF1 is unmodified. WF2$^a$ and WF3$^a$ can be trivially\n derived from WFE2. WF$_A^{~~a}$ is derivable using A3.\n\n To proceed, we have that WFE2$\\vdash \\tau\\tau x \\approx \\tau x$ (namely by\n substituting $\\tau x$ for $y$ and invoking D1) and hence also WFE2$\\vdash$D2\n (namely by substituting $\\tau x $ for $x$ in WFE2 and invoking D1);\n using D2, the instances of WF2$^b$ and WF3$^b$ with $\\alpha=\\tau$, as well as the\n instance of RS with $\\beta=\\alpha=\\tau$,\n are derivable from WFE2.\n\n The instances of WF2$^b$ and WF3$^b$ with $\\alpha\\neq\\tau$,\n are derivable from WF1 and the instances with $\\alpha=\\tau$;\n the same holds for the instances of RS and WF$_A^{~~b}$ with\n $\\beta\\neq\\tau$.\n\n Finally in the remaining instances of RS\n (with $\\beta=\\tau$ and $\\alpha=a\\in A$), we have WFE2$\\vdash \\tau(ax+z)+\\tau(ax+ay+z)\\approx\n \\tau(ax+z)+ay$,\n \n and thus it can be derived from WFE3. The instance of\n WF$_A^{~~b}$ with $\\beta=\\tau$ is exactly WFE$_A$. \\qed\n\n \n \\end{proof}\n\nThe axioms WF1, \\mbox{WFE2-3} already appeared in \\cite{Gla97}.\nA1-4+WF1+WFE2-3 is sound and ground-complete for BCCS modulo\n$\\equiv_{\\rm WF}$ (see also \\cite{Gla97,CFG08b}). By\nTheo.~\\ref{theo:A-infinite} and Theo.~\\ref{theo:A-finite}\n(together with Lem.~\\ref{lem:four}), we have:\n\n\\begin{corollary}\n If $|A|=\\infty$, then the axiomatization \\mbox{\\rm A1-4+WF1+WFE2-3} is\n $\\omega$-complete for $\\mathrm{BCCS}(A)$ modulo $\\equiv_{\\rm WF}$.\n\\end{corollary}\n\n\\begin{corollary}\n If $|A| <\\infty$, then the axiomatization \\mbox{\\rm A1-4+WF1+WFE2-3+WFE$_A$} is\n $\\omega$-complete for\n $\\mathrm{BCCS}(A)$ modulo $\\equiv_{\\rm WF}$.\n\\end{corollary}\n\n\\section{Weak Impossible Futures Semantics} \\label{sec6}\n\n\\emph{Weak impossible futures} semantics is closely related to\nweak failures semantics. Only, instead of the set of actions in\nthe second argument of a weak failure pair (see\nDef.~\\ref{def:weak-failures}), an impossible future pair contains\na set of \\emph{traces}.\n\n\\begin{definition}[Weak impossible futures]\\rm\\label{wif}\n\\vspace{-1ex}\n\\begin{itemize}\n \\item A sequence $a_1\\cdots a_k \\in A^*$, with $k\\geq 0$, is a\n \\emph{trace} of a process $p_0$ if there is a path\n $p_0\\Rightarrow \\mv{a_1} \\Rightarrow \\cdots \\Rightarrow \\mv{a_k} \\Rightarrow p_k$;\n it is a \\emph{completed trace} of $p_0$ if moreover $\\mathcal{I}(p_k)=\\emptyset$.\n Let $\\mc{T}(p)$ denote the set of traces of process $p$, and\n $\\mc{CT}(p)$ its set of completed traces.\n\n \\item A pair $(a_1\\cdots a_k,B)$, with $k\\geq 0$ and $B \\subseteq A^*$,\n is a \\emph{weak impossible future} of a process $p_0$ if there is a\n path $p_0\\Rightarrow \\mv{a_1} \\Rightarrow \\cdots \\Rightarrow \\mv{a_k} \\Rightarrow p_k$\n with $\\mc{T}(p_k) \\cap B = \\emptyset$.\n\n \\item The \\emph{weak impossible futures preorder} $\\sqsubseteq_{\\rm WIF}$ is\n given by $p\\sqsubseteq_{\\rm WIF} q$ iff (1) the weak impossible\n futures of $p$ are also weak impossible futures of $q$,\n (2) $\\mc{T}(p)=\\mc{T}(q)$ and\n (3) $p\\mv{\\tau}$ implies that $q\\mv{\\tau}$.\n\n \\item \\emph{Weak impossible futures equivalence} $\\equiv_{\\rm WIF}$ is defined\n as $\\sqsubseteq_{\\rm WIF} \\cap \\sqsubseteq_{\\rm WIF}^{-1}$.\n\\end{itemize}\n\\end{definition}\n$\\sqsubseteq_{\\rm WIF}$ is a precongruence, and $\\equiv_{\\rm WF}$ a\ncongruence, for BCCS \\cite{VM01}.\n The requirement (2) $\\mc{T}(p)=\\mc{T}(q)$ is necessary for this\n precongruence property. Without it we would have $\\tau a\\mathbf{0} \\sqsubseteq\n \\tau a\\mathbf{0} + b\\mathbf{0}$ but $c(\\tau a\\mathbf{0}) \\not\\sqsubseteq c(\\tau a\\mathbf{0} + b\\mathbf{0})$.\n\nA sound and ground-complete axiomatization for $\\sqsubseteq_{\\rm WIF}$\nis obtained by replacing axiom WF3 in Tab.~\\ref{tab1} by the\nfollowing axiom (cf.\\ \\cite{VM01}, where a slightly more\ncomplicated, but equivalent, axiomatization is given):\n\\[\n \\mbox{WIF3}~~~~ x ~\\preccurlyeq~ \\tau x\n\\]\nHowever, surprisingly, there is no finite sound and\nground-complete axiomatization for $\\equiv_{\\rm WIF}$.\nWe will show this in Sec.~\\ref{nonax}. A similar\ndifference between the impossible futures preorder and equivalence\nin the concrete case (so in the absence of $\\tau$) was found\nearlier in \\cite{CF08}. We note that, since weak impossible\nfutures semantics is not coarser than ready simulation semantics,\nthe algorithm from \\cite{AFI07,FG07,CFG08b} to generate an\naxiomatization for the equivalence from the one for the preorder,\ndoes not work in this case.\n\nIn Sec.~\\ref{sec:42} we establish that the sound and ground-complete\naxiomatization for BCCS modulo $\\sqsubseteq_{\\rm WIF}$ is\n$\\omega$-complete in case $|A|=\\infty$, and in Sec.~\\ref{sec:43} that\nthere is no such finite basis for the inequational theory of BCCS\nmodulo $\\sqsubseteq_{\\rm WIF}$ in case $|A|<\\infty$. Again, these\nresults correspond to (in)axiomatizability results for the impossible\nfutures preorder in the concrete case \\cite{CF08}, with very similar\nproofs.\n\n\\subsection{Nonexistence of an Axiomatization for Equivalence}\\label{nonax}\nWe now prove that for any (nonempty) $A$ there does \\emph{not} exist\nany finite, sound, ground-complete axiomatization for\n$\\mathrm{BCCS}(A)$ modulo $\\equiv_{\\rm WIF}$. The cornerstone for this\nnegative result is the following infinite family of closed equations,\nfor $m\\geq 0$:\n\\[ \\tau a^{2m}\\mathbf{0}+\\tau(a^m\\mathbf{0}+a^{2m}\\mathbf{0}) ~\\approx~ \\tau(a^m\\mathbf{0}+a^{2m}\\mathbf{0}) \\]\nIt is not hard to see that they are sound modulo $\\equiv_{\\rm WIF}$.\nWe start with a few lemmas.\n\n\\begin{lemma}\\label{res}\nIf $p\\sqsubseteq_{\\rm WIF} q$ then $\\mc{CT}(p) \\subseteq \\mc{CT}(q)$.\n\\end{lemma}\n\n\\begin{proof}\nA process $p$ has a completed trace $a_1 \\cdots a_k$ iff it has a weak\nimpossible future $(a_1 \\cdots a_k,A)$.\n\\qed\n\\end{proof}\n\n\\begin{lemma} \\label{newvariable}\nSuppose $t\\sqsubseteq_{\\rm WIF} u$. Then for any $t'$ with\n$t\\Rightarrow\\mv{\\tau} t'$ there is some $u'$ with\n$u\\Rightarrow\\mv{\\tau} u'$ such that $\\var(u')\\subseteq \\var(t')$.\n\\end{lemma}\n\n\\begin{proof}\nLet $t\\Rightarrow\\mv{\\tau} t'$. Fix some $m>|t|$, and consider\nthe closed substitution $\\rho$ defined by $\\rho(x)=\\mathbf{0}$ if\n$x\\in\\var(t')$ and $\\rho(x)=a^m\\mathbf{0}$ if $x\\not\\in\\var(t')$. Since\n$\\rho(t)\\Rightarrow\\rho(t')$ with $|\\rho(t')|=|t'| |u|$;\n\n \\item $\\mc{CT}(\\sigma(u)) \\subseteq \\{a^{m}, a^{2m}\\}$; and\n\n \\item there is a closed term $p'$ such that\n $\\sigma(t)\\Rightarrow\\mv{\\tau} p'$ and $\\mc{CT}(p') = \\{a^{2m}\\}$.\n\\vspace{-1ex}\n\\end{enumerate}\nThen there is a closed term $q'$ such that $\\sigma(u)\n\\Rightarrow\\mv{\\tau} q'$ and $\\mc{CT}(q') = \\{a^{2m}\\}$.\n\\end{lemma}\n\n\\begin{proof}\nAccording to proviso (4) of the lemma, we can distinguish two\ncases.\n\n\\begin{itemize}\n \\item There exists some $x\\in V$ such that $t \\Rightarrow t'$ with\n $t'=t''+x$ and $\\sigma(x)\\Rightarrow\\mv{\\tau} p'$ where $\\mc{CT}(p')=\\{a^{2m}\\}$.\n Consider the closed substitution $\\rho$ defined by $\\rho(x)=a^m\\mathbf{0}$\n and $\\rho(y)=\\mathbf{0}$ for any $y\\neq x$. Then $a^m \\in \\mc{CT}(\\rho(t))\n = \\mc{CT}(\\rho(u))$, using Lem.~\\ref{res}, and this is only\n possible if $u \\Rightarrow u'$ for some $u'=u''+x$. Hence\n $\\sigma(u)\\Rightarrow\\mv{\\tau} p'$.\n\n \\medskip\n\n \\item $t\\Rightarrow\\mv{\\tau} t'$ with $\\mc{CT}(\\sigma(t'))=\\{a^{2m}\\}$.\n Since $|t'|\\leq|t|=|u|m$,\n where $\\ensuremath{\\mathit{norm}}(p)$ denotes the length of the shortest completed trace of $p$.\n Since $t\\equiv_{\\rm WIF} u$, by Lem.~\\ref{newvariable},\n $u\\mathbin\\Rightarrow\\mv{u} u'$ with $\\var(u')\\subseteq \\var(t')$. Hence,\n for any $x\\mathbin\\in \\var(u')$, either $|\\sigma(x)|\\mathbin=0$\n or $\\ensuremath{\\mathit{norm}}(\\sigma(x))\\mathbin>m$. Since $|u'|\\mathbin \\max \\{ |u|\\mid t \\approx u \\in E\\}$;\n\n \\item $\\mc{CT}(q) \\subseteq \\{a^{m},a^{2m}\\}$; and\n\n \\item there is a closed term $p'$ such that $p\\Rightarrow\\mv{\\tau} p'$ and\n $\\mc{CT}(p') = \\{a^{2m}\\}$.\n\\vspace{-1ex}\n\\end{enumerate}\nThen there is a closed term $q'$ such that $q \\Rightarrow\\mv{\\tau} q'$ and\n$\\mc{CT}(q') = \\{a^{2m}\\}$.\n\\end{lemma}\n\n\\begin{proof}\n\nBy induction on the derivation of $E\\vdash p \\approx q$.\n\n\\begin{itemize}\n\n\\item Suppose $E\\vdash p\\approx q$ because $\\sigma(t)=p$ and\n$\\sigma(u)=q$ for some $t\\approx u\\in E$ or $u\\approx t\\in E$ and\nclosed substitution $\\sigma$. The claim then follows by Lem.~\\ref{key2}.\n\n\\medskip\n\n\\item Suppose $E\\vdash p\\approx q$ because $E\\vdash p\\approx r$ and\n$E\\vdash r\\approx q$ for some $r$. Since $r\\equiv_{\\rm WIF} q$, by\nproviso (3) of the lemma and Lem.~\\ref{res},\n$\\mc{CT}(r)\\subseteq \\{a^{m},a^{2m}\\}$. Since there is a $p'$\nsuch that $p\\Rightarrow\\mv{\\tau} p'$ with $\\mc{CT}(p') = \\{a^{2m}\\}$, by\ninduction, there is an $r'$ such that $r\\Rightarrow\\mv{\\tau} r'$ and\n$\\mc{CT}(r') = \\{a^{2m}\\}$. Hence, again by induction, there is a\n$q'$ such that $q\\Rightarrow\\mv{\\tau} q'$ and $\\mc{CT}(q') = \\{a^{2m}\\}$.\n\n\\medskip\n\n\\item Suppose $E\\vdash p\\approx q$ because $p=p_1+p_2$ and\n$q=q_1+q_2$ with $E\\vdash p_1\\approx q_1$ and $E\\vdash p_2\\approx\nq_2$. Since there is a $p'$ such that $p\\Rightarrow\\mv{\\tau} p'$ and\n$\\mc{CT}(p') = \\{a^{2m}\\}$, either $p_1\\Rightarrow \\mv{\\tau} p'$ or\n$p_2\\Rightarrow\\mv{\\tau} p'$. Assume, without loss of generality, that\n$p_1\\Rightarrow\\mv{\\tau} p'$. By induction, there is a $q'$ such that\n$q_1\\Rightarrow\\mv{\\tau} q'$ and $\\mc{CT}(q') = \\{a^{2m}\\}$.\nNow $q\\Rightarrow\\mv{\\tau} q'$.\n\n\\medskip\n\n\\item Suppose $E\\vdash p \\approx q$ because $p=cp_1$ and $q=cq_1$\nwith $c\\in A$ and $E\\vdash p_1\\approx q_1$. In this case, proviso (4)\nof the lemma can not be met.\n\n\\medskip\n\n\\item Suppose $E\\vdash p \\approx q$ because $p=\\tau p_1$ and $q=\\tau\nq_1$ with $E\\vdash p_1\\approx q_1$. By proviso (4) of the lemma,\neither $\\mc{CT}(p_1)=\\{a^{2m}\\}$ or there is a $p'$ such that\n$p_1\\Rightarrow\\mv{\\tau} p'$ and $\\mc{CT}(p') = \\{a^{2m}\\}$.\nIn the first case, $q \\Rightarrow\\mv{\\tau} q_1$ and $\\mc{CT}(q_1) = \\{a^{2m}\\}$\nby Lem.~\\ref{res}. In the second, by induction, there is a $q'$\nsuch that $q_1\\Rightarrow\\mv{\\tau} q'$ and $\\mc{CT}(q') = \\{a^{2m}\\}$.\nAgain $q\\Rightarrow\\mv{\\tau} q'$.\n\\qed\n\\end{itemize}\n\\end{proof}\n\n\\begin{theorem}\nThere is no finite, sound, ground-complete axiomatization for\n$\\mathrm{BCCS}(A)$ modulo $\\equiv_{\\rm WIF}$.\n\\end{theorem}\n\n\\begin{proof}\nLet $E$ be a finite axiomatization over $\\mathrm{BCCS}(A)$ that is\nsound modulo $\\equiv_{\\rm WIF}$. Let $m$ be greater than the depth\nof any term in $E$. Clearly, there is no term $r$ such that\n$\\tau(a^m\\mathbf{0}+a^{2m}\\mathbf{0}) \\Rightarrow\\mv{\\tau} r$ and\n$\\mc{CT}(r)=\\{a^{2m}\\}$. So according to Lem.~\\ref{key2cont}, the\nclosed equation $\\tau a^{2m}\\mathbf{0}+\\tau(a^m\\mathbf{0}+a^{2m}\\mathbf{0}) \\approx\n\\tau(a^m\\mathbf{0}+a^{2m}\\mathbf{0})$ cannot be derived from $E$. Nevertheless, it is\nvalid modulo $\\equiv_{\\rm WIF}$. \\qed\n\\end{proof}\n\nIn the same way as above, one can establish the nonderivability of\nthe equations $a^{2m+1}\\mathbf{0}+a(a^m\\mathbf{0}+a^{2m}\\mathbf{0}) ~\\approx~\na(a^m\\mathbf{0}+a^{2m}\\mathbf{0})$ from any given finite equational\naxiomatization sound for $\\equiv_{\\rm WIF}$. As these equations\nare valid modulo (strong) 2-nested simulation equivalence, this\nnegative result applies to all BCCS-congruences that are at least\nas fine as weak impossible futures equivalence and at least as\ncoarse as strong 2-nested simulation equivalence. Note that\nthe corresponding result of \\cite{AFGI04} can be inferred.\n\n\\subsection{A Finite Basis for Preorder if $|A|=\\infty$} \\label{sec:42}\n\n\nIn this section, we show that A1-4+WF1-2+WIF3 is $\\omega$-complete\nin case $|A|=\\infty$. Note that this result was originally\nobtained in \\cite{VM01}. However, our proof is much simpler.\nFirst, let us note that A1-4+WF1-2+WIF3 $\\vdash$ D1, D2, D5.\n\\begin{lemma}\n For any closed terms $p, q$, if $p\\sqsubseteq_{\\rm WIF} q$, then\n \\mbox{\\rm A1-4+WF1-2+WIF3} $\\vdash p\\preccurlyeq q$.\n\\end{lemma}\n\n\\begin{proof} Let $p\\sqsubseteq_{\\rm WIF} q$. We prove $\\vdash\n p\\preccurlyeq q$ by induction on $|p|+|q|$. We distinguish two\n cases:\n \\begin{itemize}\n \\item $q\\not\\!\\mv{\\tau}$. Then $p\\not\\!\\mv{\\tau}$ since $p\\sqsubseteq_{\\rm WIF} q$. Suppose\n $p=\\sum_{i\\in I}a_ip_i$ and $q=\\sum_{j\\in J}b_j q_j$. Clearly,\n we have $\\mc{I}(p)=\\mc{I}(q)$.\n By D5, we have\n \\[ \\vdash p\\approx \\sum_{a\\in \\mc{I}(p)} a(\\sum_{a_i=a, i\\in I}\\tau p_i)\\]\n and\n \\[ \\vdash q\\approx \\sum_{a\\in \\mc{I}(p)} a(\\sum_{b_j=a, j\\in J}\\tau q_j)\\]\n Since $p\\sqsubseteq_{\\rm WIF} q$, for each $a\\in \\mc{I}(p)$, the following relation holds:\n \\[ \\sum_{a_i=a, i\\in I}\\tau p_i \\sqsubseteq \\sum_{b_j=a, j\\in J} \\tau q_j\\]\n By induction,\n \\[ \\vdash \\sum_{a_i=a, i\\in I}\\tau p_i \\preccurlyeq \\sum_{b_j=a, j\\in J}\\tau q_j\\]\n and thus\n \\[ \\vdash a(\\sum_{a_i=a, i\\in I}\\tau p_i) \\preccurlyeq a(\\sum_{b_j=a, j\\in J}\\tau q_j)\\]\n Summing these up for $a\\in \\mc{I}(p)$, we obtain that\n \\[ \\vdash p\\preccurlyeq q\\]\n\n\\item $q\\mv{\\tau}$. By D2, we can write $ p\\approx\n\\sum_{i\\in I}\\alpha_ip_i$ and $q\\approx \\sum_{j\\in J} \\beta_jq_j$ such that\nfor each $\\alpha_i=\\tau$ (resp. $\\beta_j=\\tau$), $p_i\\not\\!\\mv{\\tau}$\n(resp. $q_j\\not\\!\\mv{\\tau}$).\nApplying D1, for each $i\\in I$ with $\\alpha_i=\\tau$, the summands of\n$p_i$ are also made summands of $p$, and likewise for $q$.\\hfill (*)\n\n\\medskip\n\nFor each $i\\in I$ with $\\alpha_i=\\tau$ we have $p\\mv{\\tau} p_i$. Since\n$p\\sqsubseteq_{\\rm WIF}q$ and no $q_j$ with $\\beta_j=\\tau$ contains a\n$\\tau$-summand, either $\\mc{T}(q)\\subseteq\\mc{T}(p_i)$ or there exists\n\\raisebox{0pt}[0pt][0pt]{$q\\mv{\\tau}q_j$} such that $\\mc{T}(q_j)\\subseteq \\mc{T}(p_i)$.\nSince \\raisebox{0pt}[0pt][0pt]{$q\\mv{\\tau}$}, in either case there exists some $j_i\\in J$ such\nthat $b_{j_i}=\\tau$ and $\\mc{T}(q_{j_i})\\subseteq \\mc{T}(p_i)$. It follows that\n \\[ p_i \\sqsubseteq_{\\rm WIF} p_i + q_{j_i}\\]\nSince $p_i \\not\\!\\mv{\\tau}$ and $q_{j_i} \\not\\!\\mv{\\tau}$, by the previous\ncase,\n \\[ \\vdash p_i \\preccurlyeq p_i + q_{j_i}\\]\nHence by WF2,\n\\[ \\vdash \\tau p_i \\preccurlyeq \\tau (p_i + q_{j_i}) \\preccurlyeq p_i\n+\\tau q_{j_i} \\]\nand thus\n\\[ \\vdash p= \\sum_{\\alpha_i=\\tau} \\tau p_i + \\sum_{a\\in \\mc{I}(p)}\\sum_{\\alpha_i=a, i\\in I} ap_i\n\\preccurlyeq \\sum_{\\alpha_i=\\tau} (p_i +\\tau q_{j_i}) + \\sum_{a\\in\n\\mc{I}(p)}\\sum_{\\alpha_i=a, i\\in I} ap_i\\]\nBy (*),\n\\[\\vdash \\sum_{\\alpha_i=\\tau} p_i + \\sum_{a\\in\n\\mc{I}(p)}\\sum_{\\alpha_i=a, i\\in I} ap_i \\approx \\sum_{a\\in\n\\mc{I}(p)}\\sum_{\\alpha_i=a, i\\in I} ap_i \\]\nSince $p\\sqsubseteq_{\\rm WIF} q$, $\\mc{I}(p)=\\mc{I}(q)$.\nUsing (*), it is easy to see that for each $a\\in \\mc{I}(p)$,\n\\[ \\sum_{\\alpha_i=a, i\\in I} ap_i \\sqsubseteq_{\\rm WIF} \\sum_{\\beta_j=a,j\\in J} aq_j\\]\nSo by the previous case,\n\\[ \\vdash \\sum_{\\alpha_i=a, i\\in I} ap_i \\preccurlyeq \\sum_{\\beta_j=a,j\\in J} aq_j\\]\nIt follows that\n\\[ \\vdash p \\preccurlyeq \\sum_{\\alpha_i=\\tau} \\tau q_{j_i} + \\sum_{a\\in\n\\mc{I}(p)}\\sum_{\\alpha_i=a, i\\in I} ap_i \\preccurlyeq \\sum_{\\alpha_i=\\tau}\n\\tau q_j + \\sum_{a\\in \\mc{I}(p)}\\sum_{\\beta_j=a,j\\in J} aq_j\\]\nBy WIF3,\n\\[\\vdash \\sum_{\\alpha_i=\\tau} \\tau q_j + \\sum_{a\\in\n\\mc{I}(p)}\\sum_{\\beta_j=a,j\\in J} aq_j \\preccurlyeq q \\]\nHence \\hfill $\\vdash p \\preccurlyeq q$\\hfill\\mbox{} \\qed\n \\end{itemize}\n\\end{proof}\nWith this ground-completeness result at hand, it is\nstraightforward to apply the \\emph{inverted substitution}\ntechnique of Groote \\cite{Gro90} to derive (see also \\cite{CF08}):\n\\begin{theorem}\nIf $|A|=\\infty$, then \\mbox{\\rm A1-4+WF1-2+WIF3} is $\\omega$-complete\nfor $\\mathrm{BCCS}(A)$ modulo $\\sqsubseteq_{\\rm WIF}$.\n\\end{theorem}\n\\begin{proof}\nGiven an inequational axiomatization $E$ and open terms $t,u$ such\nthat $E \\vdash \\sigma(t) \\preccurlyeq \\sigma(u)$ for all closed\nsubstitutions $\\sigma$, the technique of inverted substitutions is a\nmethod to prove $E \\vdash t \\preccurlyeq u$. It does so by means of a\nclosed substitution $\\rho$ encoding open terms into closed terms, and\nan decoding operation $R$ that turns closed terms back into\nopen terms. By assumption we have $E \\vdash \\rho(t) \\preccurlyeq\n\\rho(u)$. The pair $(\\rho,R)$ should be chosen in such a way that, in\nessence, applying $R$ to all terms occurring in a proof of $\\rho(t)\n\\preccurlyeq \\rho(u)$ yields a proof of $t \\preccurlyeq u$. As\nobserved in \\cite{Gro90}, this technique is applicable when three\nconditions are met, one of which being that $R(\\rho(t))=t$ and\n$R(\\rho(u))=u$. In fact, \\cite{Gro90} dealt with equational logic\nonly, but the very same reasoning applies to inequational logic.\n\nHere we use the same pair $(\\rho,R)$ that was used by Groote to obtain\nmost of the applications of the technique in \\cite{Gro90}---it could\nbe called the \\emph{default} (inverted) substitution. It is obtained\nby selecting for each variable $x\\in V$ an action $a_x\\in A$, not\noccurring in $t$ or $u$. This is possible because $|A|=\\infty$. Now\nthe default substitution $\\rho$ is given by $\\rho(x)=a_x\\mathbf{0}$ and the\ndefault inverted substitution $R$ replaces any maximal subterm of the\nform $a_x p$ into the variable $x$. Groote showed that with this\nparticular (inverted) substitution, 2 out of his 3 conditions are\nalways met, and the third one simply says that for each axiom $t\n\\preccurlyeq u$ in $E$ we should have that $E \\vdash R(t) \\preccurlyeq\nR(u)$. This condition is clearly met for the axioms A1-4+WF1-2+WIF3,\nand hence this axiomatization is $\\omega$-complete.\\qed\n\\end{proof}\nNote that we could have used the same method to obtain\nTheo.~\\ref{theo:A-infinite}, but not Theo.~\\ref{theo:A-finite}.\n\n\\subsection{Nonexistence of a Finite Basis for Preorder if\n$|A|<\\infty$} \\label{sec:43}\n\n\\subsubsection{$1< |A| <\\infty$.}\nWe prove that the inequational theory of $\\mathrm{BCCS}(A)$ modulo\n$\\sqsubseteq_{\\rm WIF}$ does \\emph{not} have a finite basis in case of\na finite alphabet with at least two elements.\nThe cornerstone for this negative result is the following\ninfinite family of inequations, for $m\\geq 0$:\n\\[\\tau(a^mx) + \\Phi_m ~\\preccurlyeq~ \\Phi_m \\]\nwith\n\\[\\Phi_m ~=~ \\tau(a^mx+x) + \\sum_{b\\in A} \\tau(a^mx+a^mb\\mathbf{0})\\]\nIt is not hard to see that these inequations are sound modulo\n$\\sqsubseteq_{\\rm WIF}$. Namely, given a closed substitution $\\rho$,\nwe have $\\mc{T}(\\rho(\\tau(a^mx))) \\subseteq \\mc{T}(\\rho(\\Phi_m))$ and\n$\\rho(\\Phi_m)\\mv{\\tau}$.\nTo argue that $\\rho(\\tau(a^mx) + \\Phi_m)$ and $\\rho(\\Phi_m)$ have the\nsame impossible futures, we only need to consider the\ntransition $\\rho(\\tau(a^mx)+\\Phi_m)\\mv{\\tau}a^m\\rho(x)$ (all other\ncases being trivial). If\n$\\rho(x)=\\mathbf{0}$, then $\\rho(\\Phi_m)\\mv{\\tau}a^m\\mathbf{0} + \\mathbf{0}$ generates\nthe same impossible futures $(\\varepsilon,B)$. If, on the other hand,\n$b\\mathbin\\in\\mc{I}(\\rho(x))$ for some $b\\mathbin\\in A$, then\n$\\mc{T}(a^m\\rho(x)+a^mb\\mathbf{0})=\\mc{T}(a^m\\rho(x))$, so\n$\\rho(\\Phi_m)\\mv{\\tau} a^m\\rho(x)+a^mb\\mathbf{0}$ generates the same\nimpossible futures $(\\varepsilon,B)$.\n\nWe have already defined the traces and completed traces of closed\nterms. Now we extend these definitions to open terms by allowing\n(completed) traces of the form $a_1 \\cdots a_k x \\in A^\\ast V$.\nWe do this by treating each variable occurrence $x$ in a term as if it\nwere a subterm $x\\mathbf{0}$ with $x$ a visible action, and then apply\nDef.~\\ref{wif}. Under this convention,\n$\\mc{CT}(\\Phi_m) =\\{a^{m}x, x, a^{m}b \\mid b\\mathbin\\in A\\}$.\nWe write $\\mc{T}_V(t)$ for the set of traces of $t$ that end in a\nvariable, and $\\mc{T}_A(t)$ for ones that end in an action.\n\n\\begin{observation}\\label{traces-substitution}\nLet $m>|t|$ or $a_m \\in V$.\nThen $a_1\\cdots a_m \\in \\mc{T}(\\sigma(t))$ iff there is a $k < m$\nand $y\\mathbin\\in V$ such that $a_1\\cdots a_k y \\in \\mc{T}_V(t)$ and\n$a_{k+1} \\cdots a_m \\in \\mc{T}(\\sigma(y))$.\n\\end{observation}\n\n\\begin{lemma}\\label{trace-preservation}\nIf $|A|>1$ and $t \\sqsubseteq_{\\rm WIF} u$ then\n$\\mc{T}_A(t)= \\mc{T}_A(u)$ and $\\mc{T}_V(t)= \\mc{T}_V(u)$.\n\\end{lemma}\n\n\\begin{proof}\nLet $\\sigma$ be the closed substitution defined by\n$\\sigma(x)\\mathbin=\\mathbf{0}$ for all $x\\mathbin\\in V$. Then\n$t\\sqsubseteq_{\\rm WIF} u$ implies $\\sigma(t)\\sqsubseteq_{\\rm WIF}\n\\sigma(u)$ and hence $\\mc{T}_A(t)=\\mc{T}(\\sigma(t))=\n\\mc{T}(\\sigma(u))=\\mc{T}_A(u)$ by Def.~\\ref{wif}.\n\nFor the second statement fix distinct actions $a,b\\mathbin\\in A$ and\nan injection $\\ulcorner \\cdot \\urcorner: V \\rightarrow\n\\mathbb{Z}_{>0}$ (which exists because $V$ is countable). Let\n$m=|u|+1=|t|+1$. Define the closed substitution $\\rho$ by\n$\\rho(z)=a^{\\ulcorner\\! z\\!\\urcorner{\\cdot}m}b\\mathbf{0}$ for all $z\\in V$.\nAgain, by Def.~\\ref{wif}, $t\\sqsubseteq_{\\rm WIF} u$ implies\n$\\mc{T}(\\rho(t))= \\mc{T}(\\rho(u))$. By Obs.~\\ref{traces-substitution},\nfor all terms $v$ we have $a_1\\cdots a_k y \\in \\mc{T}_V(v)$ iff $a_1\\cdots a_k\na^{\\ulcorner\\! y\\!\\urcorner{\\cdot}m}b \\in \\mc{T}(\\rho(v))$ with\n$k\\mathbin1$. Suppose $t\\sqsubseteq_{\\rm WIF} u$ and $t\\Rightarrow\\mv{\\tau} t'$.\nThen there is a term $u'$ such that $u\\Rightarrow\\mv{\\tau} u'$ and\n$\\mc{T}_V(u')\\subseteq \\mc{T}_V(t')$.\n\\end{lemma}\n\n\\begin{proof}\nDefine $\\rho$ exactly as in the previous proof. Since\n$\\rho(t)\\Rightarrow\\rho(t')$ and $t\\sqsubseteq_{\\rm WIF} u$ there must\nbe a $u'$ with $\\rho(u) \\Rightarrow q$ and $\\mc{T}(q)\\subseteq\n\\mc{T}(\\rho(t'))$. Since $\\rho(x)$ is $\\tau$-free for $x\\in V$ it must\nbe that $q=\\rho(u')$ for some term $u'$ with $u \\Rightarrow u'$.\nGiven the relationship between $\\mc{T}_V(v)$ and $\\mc{T}(\\rho(v))$ for\nterms $v$ observed in the previous proof, it follows that\n$\\mc{T}_V(u')\\subseteq\\mc{T}_V(t')$. In case $u \\Rightarrow\\mv{\\tau}\nu'$ we are done, so assume $u'=u$. Let $\\sigma$ be the substitution\nwith $\\sigma(x)=\\mathbf{0}$ for all $x\\in V$. Since $\\sigma(t) \\mv{\\tau}$\nand $t \\sqsubseteq_{\\rm WIF} u$ we have $\\sigma(u)\\mv{\\tau}$, so $u\n\\mv{\\tau} u''$ for some $u''$. Now $\\mc{T}_V(u'') \\subseteq \\mc{T}_V(u) =\n\\mc{T}_V(u') \\subseteq \\mc{T}_V(t')$.\n\\qed\n\\end{proof}\n\n\\begin{lemma} \\label{no-traces1}\n Let $|A|>1$. Assume that, for some terms $t,u$, substitution\n $\\sigma$, action $a$ and integer $m$:\n \\begin{enumerate}\\vspace{-1ex}\n \\item $t \\sqsubseteq_{\\rm WIF} u$;\n\n \\item $m \\geq |u|$; and\n\n \\item $\\sigma(t)\\Rightarrow\\mv{\\tau} \\hat t$ for a term $\\hat t$ without\n traces $ax$ for $x\\mathbin\\in V$ or $a^mb$ for $b\\mathbin\\in A$.\n\\vspace{-1ex}\\end{enumerate}\nThen $\\sigma(u)\\Rightarrow\\mv{\\tau} \\hat u$ for a term $\\hat u$ without\n traces $ax$ for $x\\mathbin\\in V$ or $a^mb$ for $b\\mathbin\\in A$.\n\\end{lemma}\n\\begin{proof}\nBased on proviso (3) there are two cases to consider.\\vspace{-1ex}\n\\begin{itemize}\n\\item $y \\in \\mc{T}_V(t)$ for some $y\\mathbin\\in V$ and\n $\\sigma(y)\\Rightarrow\\mv{\\tau} \\hat t$.\n In that case $y \\mathbin\\in \\mc{T}_V(u)$ by\n Lem.~\\ref{trace-preservation}, so $\\sigma(u)\\Rightarrow\\mv{\\tau} \\hat t$.\n\\item $t \\Rightarrow\\mv{\\tau} t'$ for some term $t'$ such that $\\hat t\n = \\sigma(t)$. By Lem.~\\ref{newvariable3} there is a term $u'$ with\n $u\\Rightarrow\\mv{\\tau} u'$ and $\\mc{T}_V(u')\\subseteq \\mc{T}_V(t')$.\n Take $\\hat u = \\sigma(u')$. Clearly $\\sigma(u)\\Rightarrow\\mv{\\tau}\n \\sigma(u')$. Suppose $\\sigma(u')$ would have a trace $a^mb$. Then,\n by Obs.~\\ref{traces-substitution}, there is a $k \\leq m$ and\n $y\\mathbin\\in V$ such that $a^k y \\in \\mc{T}_V(u')$ and\n $a^{m-k}b \\in \\mc{T}(\\sigma(y))$. Since $\\mc{T}_V(u')\\subseteq\n \\mc{T}_V(t')$ we have $a^mb \\in \\mc{T}(\\sigma(t'))$, which is a\n contradiction. The case $ax \\in \\mc{T}(\\sigma(u))$ is dealt with in\n the same way.\\qed\n\\end{itemize}\n\\end{proof}\n\n\\begin{lemma} \\label{no-traces2}\n Let $|A|>1$ and let $E$ be an axiomatization sound for\n $\\sqsubseteq_{\\rm WIF}$. Assume that, for some terms $v,w$, action\n $a$ and integer $m$:\n \\begin{enumerate}\\vspace{-1ex}\n \\item $E\\vdash v \\preccurlyeq w$;\n\n \\item $m \\geq \\max \\{|u| \\mid t \\preccurlyeq u \\in E\\}$; and\n\n \\item $v\\Rightarrow\\mv{\\tau} \\hat v$ for a term $\\hat v$ without\n traces $ax$ for $x\\mathbin\\in V$ or $a^mb$ for $b\\mathbin\\in A$.\n\\vspace{-1ex}\\end{enumerate}\nThen $w\\Rightarrow\\mv{\\tau} \\hat w$ for a term $\\hat w$ without\n traces $ax$ for $x\\mathbin\\in V$ or $a^mb$ for $b\\mathbin\\in A$.\n\\end{lemma}\n\n\\begin{proof}\nBy induction on the derivation of $E\\vdash v \\preccurlyeq w$.\n\\begin{itemize}\n\n\\item Suppose $E\\vdash v\\preccurlyeq w$ because $\\sigma(t)=v$ and\n$\\sigma(u)=w$ for some $t\\preccurlyeq u\\in E$ and substitution\n$\\sigma$. The claim then follows by Lem.~\\ref{no-traces1}.\n\n\\medskip\n\n\\item Suppose $E\\vdash v\\preccurlyeq w$ because $E\\vdash v\\preccurlyeq u$\nand $E\\vdash u\\preccurlyeq w$ for some $u$. By induction, $u\n\\Rightarrow\\mv{\\tau} \\hat u$ for a term $\\hat u$ without traces $ax$ or\n$a^mb$. Hence, again by induction, \\mbox{$w\\Rightarrow\\mv{\\tau} \\hat w$}\nfor a term $\\hat w$ without traces $ax$ or $a^mb$.\n\n\\medskip\n\n\\item Suppose $E\\vdash v\\preccurlyeq w$ because $v=v_1+v_2$ and\n$w=w_1+w_2$ with $E\\vdash v_1 \\preccurlyeq w_1$ and $E\\vdash\nv_2\\preccurlyeq w_2$. Since $v \\Rightarrow\\mv{\\tau} \\hat v$, either\n$v_1 \\Rightarrow\\mv{\\tau} \\hat v$ or $v_2 \\Rightarrow\\mv{\\tau} \\hat v$.\nAssume, without loss of generality, that $v_1 \\Rightarrow\\mv{\\tau} \\hat v$.\nBy induction, $w_1 \\Rightarrow\\mv{\\tau} \\hat w$ for a term $\\hat w$ without\ntraces $ax$ or $a^mb$. Now $w \\Rightarrow\\mv{\\tau} \\hat w$.\n\n\\medskip\n\n\\item Suppose $E\\vdash v \\preccurlyeq w$ because $v=cv_1$ and $w=cw_1$ with\n$c\\in A$ and $E\\vdash v_1\\approx w_1$. In this case, proviso (3) of\nthe lemma can not be met.\n\n\\medskip\n\n\\item Suppose $E\\vdash v \\preccurlyeq w$ because $v=\\tau v_1$ and\n$w=\\tau w_1$ with $E\\vdash v_1\\approx w_1$. Then either $v_1=\\hat\nv$ or $v_1 \\Rightarrow\\mv{\\tau} \\hat v$. In the first case, $w_1$\nhas no traces $ax$ or $a^{m}b$ by Lem.~\\ref{trace-preservation}\nand proviso (3) of the lemma; hence $w$ has no such traces either.\nIn the second case, by induction, $w_1\\Rightarrow\\mv{\\tau} \\hat w$\nfor a term $\\hat w$ without traces $ax$ or $a^mb$. Again\n$w\\Rightarrow\\mv{\\tau} \\hat w$. \\qed\n\\end{itemize}\n\\end{proof}\n\n\\begin{theorem} \\label{thm:alphabetn}\nIf $1<|A|<\\infty$, then the inequational theory of $\\mathrm{BCCS}(A)$\nmodulo $\\sqsubseteq_{\\rm WIF}$ does not have a finite basis.\n\\end{theorem}\n\n\\begin{proof}\nLet $E$ be a finite axiomatization over $\\mathrm{BCCS}(A)$ that is\nsound modulo $\\sqsubseteq_{\\rm WIF}$. Let $m$ be greater than the\ndepth of any term in $E$. According to Lem.~\\ref{no-traces2}, the\ninequation $\\tau(a^mx) + \\Phi_m \\preccurlyeq \\Phi_m$ cannot be derived\nfrom $E$. Yet it is sound modulo $\\sqsubseteq_{\\rm WIF}$.\n\\qed\n\\end{proof}\n\n\n\\subsubsection{$|A|=1$.} We prove that the inequational theory of\n$\\mathrm{BCCS}(A)$ modulo $\\sqsubseteq_{\\rm WIF}$ does \\emph{not} have\na finite basis in case of a singleton alphabet. The cornerstone\nfor this negative result is the following infinite family of\ninequations, for $m\\geq 0$:\n\\[ a^m x ~\\preccurlyeq~ a^m x + x\\]\nIf $|A|=1$, then these inequations are clearly sound modulo\n$\\sqsubseteq_{\\rm WIF}$. Note that given a closed substitution\n$\\rho$, $\\mc{T}(\\rho(x))\\subseteq \\mc{T}(\\rho(a^m x))$.\n\n\\begin{lemma}\\label{trace-preservation2}\nIf $t \\sqsubseteq_{\\rm WIF} u$ then\n$\\mc{T}_V(t) \\subseteq \\mc{T}_V(u)$.\n\\end{lemma}\n\n\\begin{proof}\nFix $a\\in A$ and an injection $\\ulcorner \\cdot \\urcorner: V\n\\rightarrow \\mathbb{Z}_{>0}$. Let $m=|u|+1$. Define the closed\nsubstitution $\\rho$ by $\\rho(z)=a^{\\ulcorner\\!\nz\\!\\urcorner{\\cdot}m}\\mathbf{0}$ for all $z\\in V$. By Lem.~\\ref{res},\n$\\mc{CT}(\\rho(t)) \\subseteq \\mc{CT}(\\rho(u))$. Now suppose\n$a_1\\cdots a_k y \\in \\mc{T}_V(t)$. Then $a_1\\cdots a_k a^{\\ulcorner\\!\ny\\!\\urcorner{\\cdot}m} \\in \\mc{CT}(\\rho(t)) \\subseteq\n\\mc{CT}(\\rho(u))$ and $k|u|$; and\n\n \\item $x \\in \\mc{T}_V(\\sigma(u))$ and\n $a^k x \\not\\in \\mc{T}_V(\\sigma(u))$ for $1\\leq k |u|=|t|$, and $y\\in \\mc{T}_V(u)$ implies\n$a^m \\in \\mc{T}(\\rho(u)) = \\mc{T}(\\rho(t))$, so by\nObs.~\\ref{traces-substitution} there is some $k < m$ and\n$z\\mathbin\\in V$ such that $a^k z \\in \\mc{T}_V(t)$ and $a^{m-k}\n\\in \\mc{T}(\\rho(z))$. As $k \\max \\{ |u| \\mid t \\preccurlyeq u \\in E\\}$; and\n\n \\item $x \\in \\mc{T}_V(w)$ and\n $a^k x \\not\\in \\mc{T}_V(w)$ for $1\\leq k < m$.\n\\vspace{-1ex}\\end{enumerate}\nThen $x \\in \\mc{T}_V(v)$ and\n$a^k x \\not\\in \\mc{T}_V(v)$ for $1\\leq k < m$.\n\\end{lemma}\n\n\\begin{proof}\nBy induction on the derivation of $E\\vdash v \\preccurlyeq w$.\n\\begin{itemize}\n\n\\item Suppose $E\\vdash v\\preccurlyeq w$ because $\\sigma(t)=v$ and\n$\\sigma(u)=w$ for some $t\\preccurlyeq u\\in E$ and substitution\n$\\sigma$. The claim then follows by Lem.~\\ref{1}.\n\n\\medskip\n\n\\item Suppose $E\\vdash v\\preccurlyeq w$ because $E\\vdash v\\preccurlyeq\nu$ and $E\\vdash u\\preccurlyeq w$ for some $u$. By induction, $x \\in\n\\mc{T}_V(u)$ and $a^k x \\not\\in \\mc{T}_V(u)$ for $1\\leq k < m$.\nHence, again by induction, $x \\in \\mc{T}_V(v)$ and\n$a^k x \\not\\in \\mc{T}_V(v)$ for $1\\leq k < m$.\n\n\\medskip\n\n\\item Suppose $E\\vdash v\\preccurlyeq w$ because $v=v_1+v_2$ and\n$w=w_1+w_2$ with $E\\vdash v_1 \\preccurlyeq w_1$ and $E\\vdash\nv_2\\preccurlyeq w_2$. Since $x \\in \\mc{T}_V(w)$, either $x \\in\n\\mc{T}_V(w_1)$ or $x \\in \\mc{T}_V(w_2)$. Assume, without loss of\ngenerality, that $x \\in \\mc{T}_V(w_1)$. Since $a^k x \\not\\in\n\\mc{T}_V(w)$ for $1\\leq k < m$, surely $a^k x \\not\\in \\mc{T}_V(w_1)$\nfor $1\\leq k < m$. By induction, $x \\in \\mc{T}_V(v_1)$, and hence $x\n\\in \\mc{T}_V(v)$. For $1\\leq k < m$ we have $a^k x \\not\\in\n\\mc{T}_V(w)$ and hence $a^k x \\not\\in \\mc{T}_V(v)$, by\nLem.~\\ref{trace-preservation2}.\n\n\\medskip\n\n\\item Suppose $E\\vdash v \\preccurlyeq w$ because $v=cv_1$ and $w=cw_1$ with\n$c\\in A$ and $E\\vdash v_1\\approx w_1$. In this case, proviso (3) of\nthe lemma can not be met.\n\n\\medskip\n\n\\item Suppose $E\\vdash v \\preccurlyeq w$ because $v=\\tau v_1$ and\n$w=\\tau w_1$ with $E\\vdash v_1\\approx w_1$. Then, by proviso (3) of\nthe lemma, $x \\in \\mc{T}_V(w_1)$ and $a^k x \\not\\in \\mc{T}_V(w_1)$ for\n$1\\leq k < m$. By induction, $x \\in \\mc{T}_V(v_1)$ and $a^k x \\not\\in\n\\mc{T}_V(v_1)$ for $1\\leq k < m$. Hence $x \\in \\mc{T}_V(v)$ and $a^k\nx \\not\\in \\mc{T}_V(v)$ for $1\\leq k < m$. \\qed\n\\end{itemize}\n\n\\end{proof}\n\n\\begin{theorem}\\label{thm:alphabet1}\nIf $|A|=1$, then the inequational theory of $\\mathrm{BCCS}(A)$\nmodulo $\\sqsubseteq_{\\rm WIF}$ does not have a finite basis.\n\\end{theorem}\n\n\\begin{proof}\nLet $E$ be a finite axiomatization over $\\mathrm{BCCS}(A)$ that is\nsound modulo $\\sqsubseteq_{\\rm WIF}$. Let $m$ be greater than the\ndepth of any term in $E$. According to Lem.~\\ref{lemmaalphabet1}, the\ninequation $a^mx \\preccurlyeq a^m x + x$ cannot be derived\nfrom $E$. Yet, since $|A|=1$, it is sound modulo $\\sqsubseteq_{\\rm WIF}$.\n\\qed\n\\end{proof}\nTo conclude this subsection, we have\n\n\\begin{theorem}\nIf $|A|<\\infty$, then the inequational theory of $\\mathrm{BCCS}(A)$\nmodulo $\\sqsubseteq_{\\rm WIF}$ does not have a finite basis.\n\\end{theorem}\nConcluding, in spite of the close resemblance between weak\nfailures and weak impossible futures semantics, there is a\nstriking difference between their axiomatizability properties.\n\n\n","meta":{"redpajama_set_name":"RedPajamaArXiv"}} +{"text":"\\section{Introduction}\n\\subsubsection*{Classical backround}\nThe quantization of systems with constraints is of considerable importance in a variety of applications. \nLet $\\{p_j,q^j\\}$, $1\\leq j\\leq J$, denote a set of dynamical variables, $\\{\\lambda^a\\}$, $1\\leq a\\leq A\\leq 2J$, a set of Lagrange multipliers, and $\\{\\phi_a(p,q)\\}$ a set of constraints. Then the dynamics of a constrained system may be summarized in the form of an action principle by means of the classical action (summation implied)\n \\bn I={\\textstyle{\\int}}[p_j{\\dot q}^j-H(p,q)-\\lambda^a\\phi_a(p,q)]\\,dt\\;. \\en\n The resultant equations that arise from the action read\n \\bn &&{\\dot q}^j=\\frac{\\partial H(p,q)}{\\partial p_j}+\\lambda^a\\frac{\\partial\\phi_a(p,q)}{\\partial p_j}\\equiv\\{q^j,H\\}+\\lambda^a\\{q^j,\\phi_a\\}\\;,\\nonumber\\\\\n &&{\\dot p}_j=-\\frac{\\partial H(p,q)}{\\partial q^j}-\\lambda^a\\frac{\\partial\\phi_a(p,q)}{\\partial q^j}\\equiv\\{p_j,H\\}+\\lambda^a\\{p_j,\\phi_a\\}\\;,\\nonumber\\\\\n &&\\phi_a(p,q)=0\\;, \\en\nwhere $\\{\\cdot,\\cdot\\}$ denotes the Poisson bracket. The set of conditions $\\{\\phi_a(p,q)=0\\}$ define the {\\it constraint hypersurface}. If the constraints satisfy \n\\bn &&\\{\\phi_a(p,q),\\phi_b(p,q)\\}=c_{ab}^{\\;\\;\\;\\;c}\\,\\phi_c(p,q)\\;,\\\\\n &&\\{\\phi_a(p,q),H(p,q)\\}=h_a^{\\;\\;b}\\,\\phi_b(p,q)\\;, \\en\nthen we are dealing with a system of first-class constraints. If the coefficients $c_{ab}^{\\;\\;\\;\\;c}$ and $h_a^{\\;\\;b}$ are constants, then it is a closed system of first-class constraints; if they are suitable functions of the variables $p,q$, then it is called an open first-class constraint system. If one or both of the conditions in (3) or (4) fails, then the constraints are said to be second class. \n\nFor first-class constraints it is sufficient to impose the constraints at the initial time inasmuch as the equations of motion will ensure that the constraints are fulfilled at all future times. Such an initial imposition of the constraints is called an {\\it initial value equation}. Furthermore, the Lagrange multipliers are not determined by the equations of motion; rather they must be specified (a choice of ``gauge'') in order for a solution of the dynamical equations to be given. For second-class constraints, on the other hand, the Lagrange multipliers are determined by the equations of motion in such a way that the constraints are satisfied for all time. \n\nIn the remainder of this section we review standard quantization procedures for systems with closed first-class constraints, both of the operator and path integral variety, pointing out some problems in each approach. In the following two sections we develop our coherent state approach, first for closed first-class constraints, and second for general constraints, i.e., open first-class constraints as well as second-class constraints \\cite{kla}.\n\nDue to space limitations, we are only able to offer here a few examples; the reader may consult \\cite{kla} for a discussion of additional examples.\n\\subsubsection*{Standard operator quantization}\nFor a system of closed first-class constraints we assume (with $\\hbar=1$) that \n\\bn &&[\\Phi_a(P,Q),\\Phi_b(P,Q)]=ic_{ab}^{\\;\\;\\;\\;c}\\,\\Phi_c(P,Q)\\;,\\\\\n &&[\\Phi_a(P,Q),{\\cal H}(P,Q)]=ih_a^{\\;\\;b}\\,\\Phi_b(P,Q)\\;, \\en\nwhere $\\Phi_a$ and ${\\cal H}$ denote self-adjoint constraint and Hamiltonian operators, respectively. Following Dirac \\cite{dir}, we adopt the quantization prescription given by\n \\bn i{\\dot W}(P,Q)=[W(P,Q),{\\cal H}(P,Q)] \\en\nwhere $W$ denotes any function of the kinematical operators $\\{Q^j\\}$ and $\\{P_j\\}$ which are taken as a self-adjoint, irreducible representation of the commutation rules $[Q^j,P_k]=i\\delta^j_k\\one$, with all other commutators vanishing. The equations of motion hold for all time $t$, say $0_{\\rm phys}=0 \\en\nto select the physical Hilbert space are imposed only at time $t=0$ as the analog of the initial value equation; the quantum equations of motion ensure that the constraint conditions are fulfilled for all time.\n\nThe procedure of Dirac has potential difficulties if zero lies in the continuous spectrum of the constraint operators for in that case there are no normalizable solutions of the constraint condition. We face the same problem, of course, and our resolution is discussed in detail in Ref.~\\cite{kla}.\n\\subsubsection*{Standard path integral quantization}\nFaddeev \\cite{fad} has given a path integral formulation in the case of closed first-class constraint systems as follows. The formal path integral\n \\bn &&\\int\\exp\\{i{\\textstyle{\\int}}_0^T[p_j{\\dot q}^j-H(p,q)-\\lambda^a\\phi_a(p,q)]\\,dt\\}\\,{\\cal D} p\\,{\\cal D} q\\,{\\cal D}\\lambda \\nonumber\\\\\n &&\\hskip1.5cm=\\int\\exp\\{i{\\textstyle{\\int}}_0^T[p_j{\\dot q}^j-H(p,q)]\\,dt\\}\\,\\delta\\{\\phi(p,q)\\}\\,{\\cal D} p\\,{\\cal D} q \\en\nmay well encounter divergences in the remaining integrals. Therefore, subsidiary conditions in the form $\\chi^a(p,q)=0$, $1\\leq a\\leq A$, are imposed picking out (ideally) one gauge equivalent point per gauge orbit, and in addition a factor (in the form of a determinant) is introduced to formally preserve canonical covariance. The result is the path integral \n \\bn \\int\\exp\\{i{\\textstyle{\\int}}_0^T[p_j{\\dot q}^j-H(p,q)]\\,dt\\}\\,\\delta\\{\\chi(p,q)\\} \\det(\\{\\chi^a,\\phi_b\\})\\delta\\{\\phi(p,q)\\}\\,{\\cal D} p\\,{\\cal D} q\\,. \\en\nThis result may also be expressed as\n \\bn \\int\\exp\\{i{\\textstyle{\\int}}_0^T[p^*_j{\\dot q}^{*j}-H^*(p^*,q^*)]\\,dt\\}\\,{\\cal D} p^*\\,{\\cal D} q^*\\;, \\en\nnamely, as a path integral\nover a reduced phase space in which the $\\delta$-functionals have been used to eliminate $2A$ integration variables. \n\nThe final expression generally involves curvilinear phase-space coordinates for which the definition of the path integral is typically ill defined. Additionally, in the form (10), the Faddeev-Popov determinant often suffers from ambiguities connected with inadmissible gauge fixing conditions \\cite{gri}. Thus this widely used prescription is not without its difficulties.\n\\section{Coherent State Path Integral}\nCanonical coherent states may be defined by the relation\n \\bn |p,q\\>\\equiv e^{-iq^jP_j}\\,e^{ip_jQ^j}\\,|0\\>\\;, \\en\nwhere $|0\\>$ traditionally denotes a normalized, unit frequency, harmonic oscillator ground state. Here $\\{Q^j\\}$ and $\\{P_j\\}$, $1\\leq j\\leq J$, denote an irreducible set of self-adjoint operators satisfying the Heisenberg commutation relations. The coherent states admit a resolution of unity in the form\n \\bn \\one={\\textstyle{\\int}}\\,|p,q\\>\\=\\ \\; \\en\nwhich is related to the normal-ordered form as shown. If $\\cal H$ denotes the quantum Hamiltonian, then we shall adopt $H(p,q)$ as the classical Hamiltonian. We also note that an important one-form is given by\n$i\\=p_j\\,dq^j$. \n\nUsing these quantities, the coherent state path integral for the time-dependent Hamiltonian ${\\cal H}(P,Q)+\\lambda^a(t)\\Phi_a(P,Q)$ is readily given by\n\\bn &&\\\\nonumber\\\\\n&&\\hskip.6cm=\\lim_{\\epsilon\\ra0}\\int\\prod_{l=0}^N\\\\prod_{l=1}^N\\,d\\mu(p_l,q_l)\\nonumber\\\\\n&&\\hskip.6cm=\n \\int\\exp\\{i{\\textstyle{\\int}}[i\\-\\]\\,dt\\}\\,{\\cal D}\\mu(p,q)\\nonumber\\\\\n&&\\hskip.6cm= {\\cal M}\\int\\exp\\{i{\\textstyle{\\int}}[p_j{\\dot q}^j-H(p,q)-\\lambda^a\\phi_a(p,q)]\\,dt\\}\\,{\\cal D} p\\,{\\cal D} q \\;. \\en\nIn the second line we have set $p_{N+1},q_{N+1}=p'',q''$ and $p_0,q_0=p',q'$, and repeatedly inserted the resolution of unity; in the third and fourth lines we have formally interchanged the continuum limit and the integrations, and written for the integrand the form it assumes for continuous and differential paths ($\\cal M$ denotes a formal normalization constant). The result evidently depends on the chosen form of the functions $\\{\\lambda^a(t)\\}$. \n\\subsubsection*{Enforcing the quantum constraints}\nLet us next introduce the quantum analog of the initial value equation. For simplicity we assume that the constraint operators form a compact group; the case of a noncompact group is dealt with in \\cite{kla}. In that case \n \\bn {\\rm E}\\hskip-.55em{\\rm I}\\,\\equiv{\\textstyle{\\int}} e^{-i\\xi^a\\Phi_a(P,Q)}\\,\\delta\\xi \\en\ndefines a {\\it projection operator} onto the subspace for which $\\Phi_a=0$ provided that $\\delta\\xi$ denotes the normalized, ${\\textstyle{\\int}}\\delta\\xi=1$, group invariant measure. Based on (5) and (6) it follows that\n \\bn && \\hskip1.5cm e^{-i\\tau^a\\Phi_a}{\\rm E}\\hskip-.55em{\\rm I}\\,={\\rm E}\\hskip-.55em{\\rm I}\\,\\;, \\\\\n && e^{-i{\\cal H}T}{\\rm E}\\hskip-.55em{\\rm I}\\,={\\rm E}\\hskip-.55em{\\rm I}\\,e^{-i{\\cal H}T}{\\rm E}\\hskip-.55em{\\rm I}\\,={\\rm E}\\hskip-.55em{\\rm I}\\,e^{-i({\\rm E}\\hskip-.55em{\\rm I}\\,{\\cal H}{\\rm E}\\hskip-.55em{\\rm I}\\,)T}{\\rm E}\\hskip-.55em{\\rm I}\\,\\;. \\en\nWe now project the propagator (15) onto the quantum constraint subspace \nwhich leads to the following set of relations\n \\bn &&\\hskip-1cm\\int\\\\<{\\overline p}',{\\overline q}'|{\\rm E}\\hskip-.55em{\\rm I}\\,|p',q'\\>\\,d\\mu({\\overline p}',{\\overline q}')\\nonumber\\\\\n&&=\\\\nonumber\\\\\n&&=\\lim\\,\\\\nonumber\\\\\n&&=\\\\nonumber\\\\\n&&=\\\\;, \\en\nwhere $\\tau^a$ incorporates the functions $\\lambda^a$ as well as the structure parameters $c_{ab}^{\\;\\;\\;\\;c}$ and $h_a^{\\;\\;b}$.\nAlternatively, this expression has the formal path integral representation\n \\bn \\int\\exp\\{i{\\textstyle{\\int}}[p_j{\\dot q}^j-H(p,q)-\\lambda^a\\phi_a(p,q)]\\,dt-i\\xi^a\\phi_a(p',q')\\}\\,{\\cal D}\\mu(p,q)\\,\\delta\\xi\\;. \\en\nOn comparing (19) and (20) we observe that {\\it after projection onto the quantum constraint subspace the propagator is entirely independent of the choice of the Lagrange mutiplier functions. In other words, the projected propagator is gauge invariant.} \n\nWe may also express the physical (projected) propagator in a more general form, namely,\n\\bn &&\\hskip-1cm\\int\\exp\\{i{\\textstyle{\\int}}[p_j{\\dot q}^j-H(p,q)-\\lambda^a\\phi_a(p,q)]\\,dt\\}\\,{\\cal D}\\mu(p,q)\\,{\\cal D} C(\\lambda)\\nonumber\\\\\n&&\\hskip.1cm=\\ \\en \nprovided that ${\\textstyle{\\int}}{\\cal D} C(\\lambda)=1$ and that such an average over the functions $\\{\\lambda^a\\}$ introduces (at least) one factor ${\\rm E}\\hskip-.55em{\\rm I}\\,$. \n\n\\section{Application to General Constraints}\n\\subsubsection*{Classical considerations}\nWhen dealing with a general constraint situation it will typically happen that the self-consistency of the equations of motion will determine some or all of the Lagrange multipliers in order for the system to remain on the classical constraint hypersurface. For example, if the Hamiltonian attempts to force points initially lying on the constraint hypersurface to leave that hypersurface, then the Lagrange multipliers must supply the necessary forces for the system to remain on the constraint hypersurface. \n\\subsubsection*{Quantum considerations}\nAs in the previous section we let ${\\rm E}\\hskip-.55em{\\rm I}\\,$ denote the projection operator onto the quantum constraint subspace. Motivated by the classical comments given above we consider the quantity\n\\bn \\lim\\,\\ \\en\nwhere the limit, as usual, is for $\\epsilon\\ra0$. The physics behind this expression is as follows. Reading from right to left we first impose the quantum initial value equation, and then propagate for a small amount of time ($\\epsilon$). Next we recognize that the system may have left the quantum constraint subspace, and so we project it back onto that subspace, and so on over and over. In the limit that $\\epsilon\\ra0$ the system remains within the quantum constraint subspace and (22) actually leads to\n \\bn \\\\;, \\en\nwhich clearly illustrates temporal evolution entirely within the quantum constraint subspace. If we assume that ${\\rm E}\\hskip-.55em{\\rm I}\\,{\\cal H}{\\rm E}\\hskip-.55em{\\rm I}\\,$ is a self-adjoint operator, then we conclude that (23) describes a unitary time evolution within the quantum constraint subspace. \n\nThe expression (22) may be developed in two additional ways. First, we repeatedly insert the resolution of unity in such a way that (22) becomes\n \\bn \\lim\\,\\int\\prod_{l=0}^N\\\\prod_{l=1}^Nd\\mu(p_l,q_l)\\;. \\en\nWe wish to turn this expression into a formal path integral, but the procedure used previously relied on the use of unit vectors, and the vectors ${\\rm E}\\hskip-.55em{\\rm I}\\,|p,q\\>$ are generally not unit vectors. Thus let us rescale the factors in the integrand introducing \\bn |p,q\\>\\!\\>\\equiv{\\rm E}\\hskip-.55em{\\rm I}\\,|p,q\\>\/\\|{\\rm E}\\hskip-.55em{\\rm I}\\,|p,q\\>\\| \n \\en which are unit vectors. If we let $M''=\\|{\\rm E}\\hskip-.55em{\\rm I}\\,|p'',q''\\>\\|$, $M'=\\|{\\rm E}\\hskip-.55em{\\rm I}\\,|p',q'\\>\\|$, and observe that $\\|{\\rm E}\\hskip-.55em{\\rm I}\\,|p,q\\>\\|^2=\\$, it follows that (24) may be rewritten as\n \\bn M''M'\\lim\\,\\int\\prod_{l=0}^N\\<\\!\\\\!\\>\\prod_{l=1}^N\\\\,d\\mu(p_l,q_l)\\;. \\en\nThis expression is represented by the formal path integral\n\\bn M''M'\\int\\exp\\{i{\\textstyle{\\int}}[i\\<\\!\\\\!\\>-\\<\\!\\\\!\\>]\\,dt\\}\\,{\\cal D}_E\\mu(p,q)\\;, \\en\nwhere the new formal measure for the path integral is defined in an evident fashion from its lattice prescription. We can also reexpress this formal path integral in terms of the original bra and ket vectors in the form \n \\bn &&\\hskip-1cm M''M'\\int\\exp\\{i{\\textstyle{\\int}}[i\\\/\\\\nonumber\\\\\n &&\\hskip2.3cm-\\\/\\]\\,dt\\}\\,{\\cal D}_E\\mu(p,q)\\;.\\en\nThis last relation concludes our second route of calculation beginning with (22).\n\nThe third relation we wish to derive uses an integral representation for the projection operator ${\\rm E}\\hskip-.55em{\\rm I}\\,$ generally given by\n \\bn {\\rm E}\\hskip-.55em{\\rm I}\\,={\\textstyle{\\int}} e^{-i\\xi^a\\Phi_a(P,Q)}\\,f(\\xi)\\,\\delta\\xi \\en\nfor a suitable function $f$. Thus we rewrite (22) in the form\n\\bn &&\\hskip-1.5cm\\lim\\int\\\\nonumber\\\\\n&&\\hskip2cm \\times\\,f(\\epsilon\\lambda_{N})\\cdots f(\\epsilon\\lambda_0)\\,\\delta\\epsilon\\lambda_{N}\\cdots\\delta\\epsilon\\lambda_0\\;. \\en\nNext we insert the coherent-state resolution of unity at appropriate places to find that (30) may also be given by\n \\bn &&\\hskip-1.5cm\\lim\\int\\\\prod_{l=0}^{N-1}\\\\nonumber\\\\ &&\\times [\\prod_{l=1}^{N}d\\mu(p_l,q_l)\\,f(\\epsilon\\lambda_l)\\,\\delta\\epsilon\\lambda_l]\\,f(\\epsilon\\lambda_0)\\,\\delta\\epsilon\\lambda_0\\;. \\en\nFollowing the normal pattern, this last expression may readily be turned into a formal coherent-state path integral given by\n\\bn \\int\\exp\\{i{\\textstyle{\\int}}[p_j{\\dot q}^j-H(p,q)-\\lambda^a\\phi_a(p,q)]\\,dt\\}\\,{\\cal D}\\mu(p,q){\\cal D} E(\\lambda)\\;, \\en\nwhere $E(\\lambda)$ is a measure designed so as to insert the projection operator ${\\rm E}\\hskip-.55em{\\rm I}\\,$ at every time slice. Unlike the case of the first-class constraints, we observe that the measure on the Lagrange multipliers is fixed. This usage of the Lagrange multipliers to ensure that the quantum system remains within the quantum constraint subspace is similar to their usage in the classical theory to ensure that the system remains on the classical constraint hypersurface. Thus it is not surprising that a fixed integration measure emerges for the Lagrange multipliers. On the other hand, it is also possible to use the measure $E(\\lambda)$ in the case of closed {\\it first}-class constraints as well; this would be just one of the acceptable choices for the measure $C(\\lambda)$ designed to put at least one projection operator ${\\rm E}\\hskip-.55em{\\rm I}\\,$ into the propagator.\n\nIn summary, we have established the equality of the three expressions\n\\bn &&\\hskip-1cm\\\\nonumber\\\\\n&&=M''M'\\int\\exp\\{i{\\textstyle{\\int}}[i\\\/\\\\nonumber\\\\\n &&\\hskip2.3cm-\\\/\\]\\,dt\\}\\,{\\cal D}_E\\mu(p,q)\\nonumber\\\\\n&&= \\int\\exp\\{i{\\textstyle{\\int}}[p_j{\\dot q}^j-H(p,q)-\\lambda^a\\phi_a(p,q)]\\,dt\\}\\,{\\cal D}\\mu(p,q){\\cal D} E(\\lambda)\\;. \\en\nThis concludes our derivation of path integral formulas for general constraints. Observe that we have not introduced any $\\delta$-functionals, nor, in the middle expression, reduced the number of integration variables or the limits of integration in any way even though in that expression the integral over the Lagrange multipliers has been effected. \n\\section{Examples}\n\\subsubsection*{First-class constraint}\nConsider the system with two degrees of freedom, a single constraint, and a vanishing Hamiltonian characterized by the action\n \\bn I={\\textstyle{\\int}}[\\textstyle{\\frac{1}{2}}(p_1{\\dot q}_1-q_1{\\dot p}_1+p_2{\\dot q}_2-q_2{\\dot p}_2)-\\lambda(q_2p_1-p_2q_1)]\\,dt\\;, \\en\nwhere for notational convenience we have lowered the index on the $q$ variables.\nNote that we have chosen a different form for the kinematic part of the action which amounts to a change of phase for the coherent states. It follows in this case that\n \\bn &&{\\cal M}\\int\\exp\\{i{\\textstyle{\\int}}[\\textstyle{\\frac{1}{2}}(p_1{\\dot q}_1-q_1{\\dot p}_1+p_2{\\dot q}_2-q_2{\\dot p}_2)-\\lambda(q_2p_1-p_2q_1)]\\,dt\\}\\,{\\cal D} p\\,{\\cal D} q\\,{\\cal D} C(\\lambda)\\nonumber\\\\\n&&\\hskip2cm=\\\\;, \\en\nwhere\n \\bn {\\rm E}\\hskip-.55em{\\rm I}\\,=(2\\pi)^{-1}\\int_0^{2\\pi}e^{-i\\xi(Q_2P_1-P_2Q_1)}\\,d\\xi={\\rm E}\\hskip-.55em{\\rm I}\\,(L_3=0)\\;. \\en\nBased on the fact that\n \\bn \\=\\exp(-\\textstyle{\\frac{1}{2}}|z''_1|^2-\\textstyle{\\frac{1}{2}}|z''_2|^2+z''^*_1z'_1+z''^*_2z'_2-\\textstyle{\\frac{1}{2}}|z'_1|^2-\\textstyle{\\frac{1}{2}}|z'_2|^2)\\;, \\en\nwhere $z'_1\\equiv(q'_1+ip'_1)\/\\sqrt{2}$, etc., it is straightforward to show that\n \\bn &&\\ =\\exp(-\\textstyle{\\frac{1}{2}}|z''_1|^2-\\textstyle{\\frac{1}{2}}|z''_2|^2-\\textstyle{\\frac{1}{2}}|z'_1|^2-\\textstyle{\\frac{1}{2}}|z'_2|^2)\\nonumber\\\\\n &&\\hskip3.3cm\\times I_0(\\sqrt{(z''^{*2}_1+z''^{*2}_2)(z'^2_1+z'^2_2)}\\,)\\;,\\en\nwith $I_0$ a standard Bessel function. We emphasize again that although the Hilbert space has been reduced by the introduction of ${\\rm E}\\hskip-.55em{\\rm I}\\,$, the reproducing kernel (38) leads to a reproducing kernel Hilbert space with an inner product having the same number of integration variables and domain of integration as in the unconstrained case.\n\\subsubsection*{Second-class constraint}\nConsider the two degree of freedom system determined by\n\\bn I={\\textstyle{\\int}}[p{\\dot q}+r{\\dot s}-H(p,q,r,s)-\\lambda_1r-\\lambda_2s]\\,dt\\;, \\en\nwhere we have called the variables of the second degree of freedom $r,s$, and $H$ is not specified further. The coherent states satisfy $|p,q,r,s\\>=|p,q\\>\\otimes|r,s\\>$, which will be useful. We adopt (28) as our formal path integral in the present case, and choose \\cite{kla}\n \\bn &&{\\rm E}\\hskip-.55em{\\rm I}\\,={\\textstyle{\\int}} e^{-i(\\xi_1R+\\xi_2S)}\\,e^{-(\\xi_1^2+\\xi_2^2)\/4}\\,d\\xi_1d\\xi_2\/2\\pi\\nonumber\\\\ &&\\hskip.4cm=|r=0,s=0\\>\\\\<0_2| \\en\nwhich is a projection operator onto a coherent state for the second (constrained) degree of freedom only. With this choice it follows that\n \\bn &&i\\\/\\\\nonumber\\\\\n&&\\hskip2cm=i\\-\\Im(d\/dt)\\ln[\\<0_2|r,s\\>]\\nonumber\\\\\n&&\\hskip2cm=p{\\dot q}-\\Im(d\/dt)\\ln[\\<0_2|r,s\\>]\\;, \\en\nand \n\\bn &&\\hskip-1cm\\\/\\\\nonumber\\\\ &&\\hskip1cm=\\=H(p,q,0,0)\\;. \\en\nConsequently, for this example, (28) becomes\n \\bn {\\cal M}\\int\\exp\\{i{\\textstyle{\\int}}[p{\\dot q}-H(p,q,0,0)]\\,dt\\}\\,{\\cal D} p\\,{\\cal D} q\n\\;\\times\\;\\\\<0_2|r',s'\\>\\;, \\en\nwhere we have used the fact that at every time slice\n \\bn {\\textstyle{\\int}}\\\\,dr\\,ds\/(2\\pi)={\\textstyle{\\int}}|\\<0_2|r,s\\>|^2\\,dr\\,ds\/(2\\pi)=1\\;. \\en\n\nObserve that in this path integral quantization no variables have been eliminated nor has any domain of integration been reduced; moreover, the operators $R$ and $S$ have remained unchanged. The result in (43) is clearly a product of two distinct factors. The first factor describes the true dynamics as if we had solved for the classical constraints and substituted $r=0$ and $s=0$ in the classical action from the very beginning, while the second factor characterizes a one-dimensional Hilbert space for the second degree of freedom. Thus we can also drop the second factor completely as well as all the integrations over $r$ and $s$ and still retain the same physics. In this manner we recover the standard result without the use of Dirac brackets or having to eliminate the second-class constraints from the theory initially.\n\n\\section*{Acknowledgements}\nJ. Govaerts is thanked for his continued interest in this work.\n Some aspects of a coherent state quantization procedure that emphasizes projection operators for systems with closed first-class constraints have been anticipated by Shabanov \\cite{sha}. Thanks are expressed to S. Shabanov for bringing this work to the author's attention. Projection operators for closed first-class constraints also appear in the text of Henneaux and Teitelboim \\cite{hen}.\n","meta":{"redpajama_set_name":"RedPajamaArXiv"}} +{"text":"\\section{Introduction}\n\\label{section:introduction}\n\n\\IEEEPARstart{F}{uture} wireless systems require fundamental and crisp understanding of design principles and control mechanisms to efficiently manage network resources. Resource allocation policies lie at the heart of wireless communication networks, since they aim at guaranteeing the required Quality of Service (QoS) at the user level, while ensuring efficient and optimized operation at the network level to maximize operators' revenue.\nResource allocation management in wireless communications may include a wide spectrum of network functionalities, such as scheduling, transmission rate control, power control, bandwidth reservation, call admission control, transmitter assignment, and handover \\cite{Stanczak2009,Lee2014b,Ahmed2005}. \nIn this survey, a resource allocation policy is defined by the following components: \\textit{i}) a multiple access technique and a scheduling component that distributes resources among users subject to individual QoS requirements; \\textit{ii}) a signaling strategy that allows simultaneous transmission of independent data streams to the scheduled users; and \\textit{iii}) rate allocation and power control that guarantee QoS and harness potential interference. \nFig.~\\ref{fig:mu-mimo-layered-tasks} illustrates these components and the interconnection between them. The figure highlights the fact that each function of the resource allocation strategy can be performed in either optimal or suboptimal way, which is elaborated upon below.\n\n\nThe multiple access schemes can be classified as orthogonal or non-orthogonal. The former is a conventional scheme that assigns radio resources, e.g., code, sub-carrier, or time slot, to one user per transmission interval. The main characteristic of orthogonal multiple access schemes is their reliability, since there is no need to deal with co-resource interference. The resource allocation policy can optimize with reasonable complexity several performance metrics, such as throughput, fairness, and QoS \\cite{Asadi2013}. The multiplexing gain, i.e., the number of scheduled users, is limited by the number of available radio resources in the system. \nIn non-orthogonal multiple access, a set of users concurrently superimpose their transmissions over the same radio resource, and potentially interfere with each other. \nIn this scheme the co-resource interference can be mitigated by signal processing and transmission techniques implemented at the transmitter and\/or receiver sides. Such techniques exploit different resource domains, e.g., power, code, or spatial domain, and a combination of them are envisaged to cope with the high data rate demands and system efficiency expected in the next generation of wireless networks \\cite{Li2014a,Dai2015}.\n\n\nHereinafter, we focus on multiple access schemes based on multi-antenna transceivers operating at the spatial domain, i.e., multiple-input multiple-output (MIMO). MIMO communication, where a multi-antenna base station (BS) or access point (AP) transmits one or many data streams to one or multiple user equipments simultaneously, is a key technology to provide high throughput in broadband wireless communication systems. MIMO systems have evolved from a fundamental research concept to real-world deployment, and they have been integrated in state-of-the-art wireless network standards \\cite{Li2010,Jones2015,Kim2015}, e.g., IEEE 802.11n, 802.11ac WLAN, 802.16e (Mobile WiMAX), 802.16m (WiMAX), 802.20 (MBWA), 802.22 (WRAN), 3GPP long-term evolution (LTE) and LTE-Advanced (E-UTRA). \nResource allocation is particularly challenging in wireless communication systems mainly due to the wireless medium variability and channel randomness, which renders the overall performance location-dependent and time-varying \\cite{Wang2007}. \nNevertheless, high spectral efficiency and multiplexing gains can be attained in MIMO systems since multiple data streams can be conveyed to independent users. By exploiting the spatial degrees of freedom (DoF) offered by multiple antennas we can avoid system resource wastage \\cite{Ajib2005}. Multiuser (MU) MIMO systems have been extensively investigated over the last years from both theoretical and practical perspective. In a recent evolution of MU-MIMO technology, known as massive MIMO or large-scale MIMO \\cite{Lu2014,Zheng2015}, few hundreds of antennas are employed at the BS to send simultaneously different data streams to tens of users. Massive MIMO has been identified as one of the promising air interface technologies to address the massive capacity requirement required demanded by 5G networks \\cite{Andrews2014,Boccardi2014}. \n\n\n\\begin{figure}[t!]\n\t\\centering\n\t\\includegraphics[width=0.9\\linewidth]{figure1.pdf}\\\\\n\t\\caption{Components of the resource allocation policy in MU-MIMO systems} \n\t\\label{fig:mu-mimo-layered-tasks}\n\\end{figure}\n\n\nThe downlink transmission is particularly challenging in MU-MIMO scenarios because the geographic location of the receivers is random and joint detection cannot be performed. The main goal is to convey independent data streams to a set of properly selected users, attaining spatial multiplexing gain offered by MU-MIMO. However, determining such a users set is a very challenging task, which depends on all elements of the resource allocation strategy, e.g., individual QoS requirements, signaling schemes, rate allocation and power control strategies implemented at the transmitter. \nMIMO systems allow for a plethora of mighty signal processing techniques that enhance the system performance by exploiting a multi-dimensional pool of resources. This pool is composed of resources with different nature, e.g., signal spaces, transmission powers, time slots, sub-carriers, codes, and users. Efficient allocation designs over such a large set of resources implies that a tradeoff between optimality and feasibility. On the one hand, optimality can be reached by solving optimization problems over a set of integer and continuous variables, which may be a thoroughly complex task. Feasibility, on the other hand, implies that suboptimal resource allocation takes place by relaxing and reformulating optimization problems whose solutions can be found by practical and reliable algorithms. \n\n\n \n\n\n\n\n{\\color{black}{ \n\n\\subsection{Contributions of the Survey} \n\\label{section:introduction:contributions}\n\n\t\t\nThere exists a very rich literature on MIMO communications, and this paper complements it by providing a classification of different aspects of MU-MIMO systems and resource allocation schemes. Users with independent channels provide a new sort of diversity to enhance the overall performance. However, in contrast to systems where each user accesses a dedicated (orthogonal) resource \\cite{Wang2007,Asadi2013,Capozzi2013,Li2014}, in MU-MIMO systems the additional diversity is realized when several users access the same resource simultaneously. \n\nAccounting for multiple antennas at both ends of the radio link allows spatial steering of independent signals using precoding schemes, which results in the coexistence of many data streams conveyed to the concurrent users. Some of the main contributions of this survey are the description and classification of linear and non-linear precoding schemes, considering the amount of channel information available at the transmitter, the network scenario (e.g. single-cell or multi-cell), and the antenna settings. Each precoding scheme relies on different characteristics of the MU-MIMO channels to fully exploit the spatial domain. The paper provides a comprehensive classification of metrics that quantify the spatial compatibility, which can be used to select users and improve the precoding performance.\n\nThe spectral efficiency, error rates, fairness, and QoS are common criteria to assess performance in the MU-MIMO literature. Optimizing each one of these metrics requires specific problem and constrains formulations. The type of precoding, antenna configuration, and upper layer demands can be taken into account to design robust resource allocation algorithms, i.e. cross layer designs. Other contributions of this paper are the description and classification of different optimization criteria and general constraints used to characterize MU-MIMO system. The proposed classification incorporates the antenna configuration, the amount of channel information available at the transmitter, and upper layer requirements. \n\nEarly surveys on MU-MIMO have pointed out that resource allocation can be opportunistically enhanced by tracking the instantaneous channel fluctuations for scenarios with a single transmitter \\cite{Ajib2005,Gesbert2007a}. However, in recent years, a large number of techniques have been developed for very diverse and heterogeneous MIMO scenarios. The paper presents a classification of state-of-the-art scheduling algorithms for MU-MIMO scenarios for single and multiple transmitter scenarios. We consider the channel state information, the objective functions optimized by the scheduler, the degree of cooperation\/coordination between transmitters, and the power allocation techniques. \n\nThe goal of this survey is not to describe in detail the theory behind precoding design, rate allocation, power control or user scheduling, but rather to use their fundamental principles to get insight on the interplay among them. Our aim is to describe state-of-the-art processing techniques for MU-MIMO, point out practical challenges, and present general guidelines to design efficient resource allocation algorithms. The material favors broad intuition over detailed mathematical formulations, which are left to the references. Although the list of references is certainly not intended to be exhaustive, the cited works and the references therein may serve as a starting point for readers aiming to go beyond a tutorial.\n\n}}\n\n\n\n\n\n\\subsection{Organization} \n\\label{section:introduction:organization}\n\n\nThe paper is organized as follows.\nIn Section~\\ref{section:preliminaries} we present the basic ideas behind MIMO wireless communications, introduce MU-MIMO systems, and discuss the main challenges.\nIn Section~\\ref{section:system-set-ups} we introduce the most commonly studied MU-MIMO channel and system models, their characteristics and conventional assumptions.\nSection~\\ref{section:precoding} is devoted to signal design and precoding schemes under different conditions of channel information. \nIn Section~\\ref{section:metrics-spatial-compatibility} we introduce the most common metrics of spatial compatibility, which are used to categorize users and reduce the scheduling complexity.\nSection~\\ref{section:performance-uf} presents a classification of optimization criteria and describes the usual constraints considered in MU-MIMO systems. \nIn Section~\\ref{section:algorithms} we propose a classification of the several techniques to address the user scheduling problem. The specific characteristics, limitations and use cases for each technique are discussed. \nSection~\\ref{section:algorithms:selection-partial-csit} is focused on scheduling algorithms with partial channel information at the transmitter. We categorize the existing approaches and present guidelines to minimize complexity and improve efficiency.\nIn Section~\\ref{section:power-allocation} we present the most common power allocation schemes and discuss their role in MU-MIMO systems.\nFinally, we conclude the paper in Section~\\ref{section:remarks}.\nThe reader can find a list of technical terms and abbreviations summarized in Table~\\ref{table:abbreviations}.\n\n\nWe adopt the following notation: matrices and vectors are set in upper and lower boldface, respectively. $(\\cdot)^{T}$, $(\\cdot)^{H}$, $|\\cdot|$, $\\|\\cdot\\|_{p}$ denote the transpose, the Hermitian transpose, the absolute value, and the $p$-norm, respectively. $rank(\\mathbf{A})$, $null(\\mathbf{A})$ denote the rank and null space of matrix $\\mathbf{A}$. $Span(\\mathbf{A})$ and $Span(\\mathbf{A})^{\\perp}$ denote the subspace and orthogonal subspace spanned by the columns of matrix $\\mathbf{A}$. Calligraphic letters, e.g. $\\mathcal{G}$, denote sets, and $|\\mathcal{G}|$ denotes cardinality. $\\mathbb{R}_{+}$ is the set of nonnegative real numbers and $\\mathbb{C}^{N \\times M}$ is the space of $N \\times M$ matrices. $\\mathcal{CN}(\\mathbf{a},\\mathbf{A})$ is the complex Gaussian distribution with mean $\\mathbf{a}$ and covariance matrix $\\mathbf{A}$. $\\mathbb{E}[\\cdot]$ denotes expectation. \n\n\n\n\n\n\n\n\\section{Preliminaries}\n\\label{section:preliminaries}\n\n\n\n\\subsection{Multiple Antenna Systems}\n\\label{section:introduction:mimo-systems}\n\nA MIMO system employs multiple antennas at the transmitter ($M$) and receiver ($N$) sides to improve communication performance.\nThe seminal works \\cite{Foschini1998,Telatar1999} provide a mathematical motivation behind multiple antenna processing and communications. Theoretical analysis has shown that the spectral efficiency, i.e., the amount of error-free bits per second per Hertz (bps\/Hz), follows the scaling low $\\min(M,N)$, without increasing the power or bandwidth requirements.\nThe signal processing techniques in multi-antenna systems can be classified as \\textit{spatial diversity techniques} and \\textit{spatial multiplexing techniques} \\cite{Mietzner2009}. \n\n\nSpatial diversity techniques (see \\cite{Mietzner2009} and references therein), provide transmission reliability and minimize error rates. This is attained by transforming a fading wireless channel into an additive white Gaussian noise (AWGN)-like channel, i.e., one can mitigate signal degradation due to fading \\cite{Ajib2005}. The probability that multiple statistically independent channels experience simultaneously deep fading gets very low as the number of independent paths increases. The spatial diversity techniques can be applied at both transmission and reception sides of the link. Transmit diversity schemes include space diversity, polarization diversity, time diversity, frequency diversity, and angle diversity. Examples of receive diversity schemes are selection combining, maximum ratio combining (MRC), and equal gain combining \\cite{Tse2005,Goldsmith2005}.\n\n\n\n\\subsection{Multiuser MIMO}\n\\label{section:introduction:mu-mimo}\nThis paper focuses on spatial multiplexing techniques, which exploit the DoF provided by MIMO. Spatial multiplexing is tightly related to multiuser communications and smart antennas processing \\cite{Tse2005}. In multiuser systems, spatial multiplexing gains can be attained by steering signals toward specific receivers, such that the power to intended users is boosted. Simultaneously, co-channel interference to unintended users can be partially or completely suppressed. \n\n\nIn MU-MIMO systems, the available resources (power, bandwidth, antennas, codes, or time slots) must be assigned among $K$ active users.\nThere are two kinds of multiuser channels: the downlink channel, also known as \\textit{broadcast channel} ({BC}), where a single transmitter sends different messages to many receivers; and the uplink channel, also called \\textit{multiple access channel} ({MAC}), where many transmitters communicate with a single receiver.\nThere are several \\textit{explicit} differences between {BC} and {MAC}. In the former, the transmitted signal is a combination of the signals intended for all co-scheduled users, subject to total transmit power, $P$, constraints. In contrast, in the {MAC} channel, the signal from the $k$-th user is affected by other co-scheduled users, subject to individual power constraints, i.e. $P_k$, \\cite{Tse2005}. \nThere exists an \\textit{implicit} connection between BC and MAC, known as \\textit{duality}, which establishes the relationship between the capacity regions of both access channels \\cite{Tse2005,Goldsmith2005}. The BC-MAC duality has been fundamental to define optimal policies for power allocation, signaling, and QoS guaranteeing in MU-MIMO systems, see \\cite{Schubert2004,Schubert2006,Yu2006a,Chiang2008}.\nThe capacity regions include operative point where transmission to multiple users do not interfere with each other. Every transmission is performed over orthogonal signaling dimensions, which is a signal separation called duplexing \\cite{Goldsmith2005}. This operation is performed by allocating communications across different time slots, known as time-division-duplex ({TDD}), or across separated frequency bands, known as frequency-division-duplex ({FDD}).\n\n\n\nIn the literature of {MU-MIMO}, two types of diversity are studied: \\textit{spatial multiplexing diversity} and \\textit{multiuser diversity} ({MUDiv}). The former is a consequence of the independent fading across MIMO links of different users. This means that independent data streams can be transmitted over parallel spatial channels, increasing the system capacity \\cite{Zheng2003}. The latter arises when users that are geographically far apart have channels that fade independently at any point in time. Such independent fading processes can be exploited so that users with specific channel conditions are simultaneously scheduled \\cite{Viswanath2002}. \nThere are two modes of transmission in MIMO systems, see Fig.~\\ref{fig:su-mu-mimo}: single user (SU) and multiuser (MU) mode. The SU-MIMO mode improves the performance of a single user, allocating one or many data streams in the same radio resource. In the MU-MIMO mode, different data streams are sent to different users such that a performance metric is optimized, e.g., the average sum rate.\n\n\\begin{figure}[t!]\n\t\\centering\n\t\\includegraphics[width=0.98\\linewidth]{figure2.pdf}\\\\\n\t\\caption{(a) Single-user (SU) and (b) Multi-user (MU) MIMO modes}\n\t\\label{fig:su-mu-mimo}\n\\end{figure}\n\nSelecting between SU- or MU-MIMO transmission modes depends on the accuracy of the channel state information at the transmitter (CSIT), the amount of allowed interference, the target rate per user, the number of user, the signal-to-noise ratio (SNR) regime, and the achievable capacity in each mode \\cite{Tang2010}.\nNonetheless, by assuming sufficient CSIT knowledge, MU-MIMO processing techniques provide several performance gains \\cite{Gesbert2007a}: multiple antennas attain diversity gain, which improves bit error rates ({BER}); directivity gains realized by {MUDiv}, since the spatial signatures of the users are uncorrelated, which mitigates inter-user interference (IUI); immunity to propagation limitations in SU-MIMO, such as rank loss or antenna correlation; and multiplexing gains that scale, at most, with the minimum number of deployed antennas. \n\n\n\\begin{figure*}[th!]\n\t\\centering\n\t\\includegraphics[width=0.98\\linewidth]{figure3.pdf}\\\\\n\t\\caption{Processing blocks and input signals in a MU-MIMO scenario. A transmitter with $M$ antennas serves $K$ multiple antenna receivers.} \n\t\\label{fig:system-processing-blocks}\n\\end{figure*} \n\n\\subsection{The need of User Scheduling}\n\\label{section:introduction:user-selection}\n\n\nIn {MU-MIMO} {BC} systems, the overall performance depends on how efficiently the resource allocation algorithms manage the hyper-dimensional pool of resources (carriers, time slots, codes, power, antennas, users, etc.). \nConsider a system with a transmitter equipped with $M$ antennas, and let $\\bar{\\mathcal{K}}=\\{1,2,3, \\ldots, K\\}$ be the set of all active users, illustrated in Fig.~\\ref{fig:system-processing-blocks}. To qualitatively determine the objectives of scheduling, we provide the following definitions: \n\n\\begin{definition}\\label{defn:quality-of-service}\n\t\\textit{Quality of Service}. We say that QoS defines a set of prescribed network-\/user-based performance targets (e.g., peak rates, error rates, average delays, or queue stability), that can be measured, improved, and guaranteed for a specific upper layer application. \n\\end{definition}\n\n\\begin{definition}\\label{defn:user_scheduling}\n\t\\textit{User scheduling}. We say that a set of radio resources (e.g. time slot, codes, sub-channels, powers, etc.), has been assigned to a group of scheduled users, $\\mathcal{K} \\subseteq \\bar{\\mathcal{K}}$, so that a global performance metric is optimized subject to power and QoS constraints. Moreover, each user $k \\in \\mathcal{K}$, achieves non-zero rate with successful information reception.\n\\end{definition}\n\nConsider that each user $k \\in \\bar{\\mathcal{K}}$, is equipped with $N_k$ antennas. By having more receive than transmit antennas ($M< \\sum_{k} N_k$), one can solve a selection problem to achieve MUDiv gains in fading fluctuating channels \\cite{Ajib2005,Sharif2005,Sharif2007,Gesbert2007a,Yang2011}. A fundamental task in resource management is to select a subset of users $\\mathcal{K} \\subseteq \\bar{\\mathcal{K}}$, and assign resource to it, so that a given performance metric is optimized.\nFor the sake of illustration, consider a single-transmitter scenario, and let us formulate a general user scheduling problem for a single resource (sub-carrier, time slot, or code) as follows:\n\n\\begin{IEEEeqnarray}{rrCl}\n\t& {\\text{maximize}} & \\quad & \\sum_{k =1 }^{K} \\xi_{\\pi(k)} U_{\\pi(k)} \\label{eq:general-combinatorial-problem:cost-function} \\\\\n\t& \\text{subject to} && \\sum_{k =1}^{K} \\xi_{k} p_{k} \\leq P \\IEEEyessubnumber \\label{eq:general-combinatorial-problem:total-power}\\\\\n\t&&& 0 \\leq \\xi_{k} p_{k} \\leq P_{k} \\ \\ \\ \\forall k \\in \\bar{\\mathcal{K}} \\IEEEyessubnumber \\label{eq:general-combinatorial-problem:individual-power} \\\\\n\t& & & \\sum_{k =1}^{K} \\xi_{k} \\leq c_{p} \\IEEEyessubnumber \\label{eq:general-combinatorial-problem:set-cardinality} \\\\\n\t&&& \\xi_{k} \\in \\{0, 1\\} \\ \\ \\ \\forall k \\in \\bar{\\mathcal{K}} \\IEEEyessubnumber \\label{eq:general-combinatorial-problem:binary-vars}\n\\end{IEEEeqnarray}\n\nOur goal is to maximize the sum of the utility functions, $U_{\\pi(k)}$, $\\forall k$, which depends on several parameters: the multiuser MIMO channel, $\\mathbf{H}_{k}$, the allocated power, $p_{k}$, the individual data queues, $q_{k}$, and the encoding order, $\\pi(\\cdot)$. The QoS requirements can be included in the definition of $U_{\\pi(k)}$, as individual weights [cf. Section~\\ref{section:performance-uf}]. Equations (\\ref{eq:general-combinatorial-problem:total-power}) and (\\ref{eq:general-combinatorial-problem:individual-power}) define total and individual power constraints, which are set according to the scenario [cf. Section~\\ref{section:system-set-ups}]. The term $\\xi_{\\pi(k)}$ is a binary variable with value equal to 1 if the $\\pi(k)$-th user is scheduled and 0 otherwise. The set of selected user is given by $\\mathcal{K} = \\{ k \\in \\bar{\\mathcal{K}}: \\xi_{k} = 1 \\}$. \nThe system operates in MU-MIMO mode if $1 < |\\mathcal{K}| \\leq c_{p}$, where $c_{p}$ in (\\ref{eq:general-combinatorial-problem:set-cardinality}) denotes the maximum number of users or transmitted data streams, that can be sent over $M$ antennas. If the solution of (\\ref{eq:general-combinatorial-problem:cost-function}) only exists for $|\\mathcal{K}|=1$, the system operates in SU-MIMO mode. In such a case, the optimization problem can be formulated to attain MUDiv, multiplexing (high rate), and diversity (high reliability) gains, see \\cite{Tse2005,Heath2005,Chen2006}.\nDepending on the CSIT, the type of signaling design and coding applied to the data, theoretical analysis show that the number of users with optimal nonzero power is upper bounded\\footnote{The upper bound is tight for small values of $M$ and it becomes loose as the number of transmit antennas grow large. Numerical results comparing the upper bound of $|\\mathcal{K}|$ for several coding techniques can be found in \\cite{Boccardi2006}. } as $|\\mathcal{K}| \\leq c_p \\leq M^2$, \\cite{Yu2006a}. \nIn practical systems, multiplexing gain can be scaled up to $|\\mathcal{K}| \\leq M$, by means of linear signal processing [cf. Section~\\ref{section:precoding:linear}]. \n\n\n\nThe mathematical formulation in (\\ref{eq:general-combinatorial-problem:cost-function}) resembles a knapsack or subset-sum problem \\cite{Rondeau2009,Williamson2010}, which is known to be non-polynomial time complete (NP-C). Although the users are fixed items that must be chosen to construct $\\mathcal{K}$, their associated utility functions change according to the channel conditions and the resource allocation of the co-selected users. This implies that the optimization variables are, in general, globally coupled.\nFinding the optimal set $\\mathcal{K}$, is a combinatorial problem due to the binary variables $\\xi_{k}$, and the encoding order $\\pi(\\cdot)$. Moreover, depending on $U_{k}$, problem (\\ref{eq:general-combinatorial-problem:cost-function}) might deal with non-convex functions on the multiple parameters, e.g. $K$, $M$, $N_k$, etc. The feasibility of (\\ref{eq:general-combinatorial-problem:cost-function}) relies on the constraints and processing, e.g. the precoding schemes, the power allocation, the CSIT accuracy, \\cite{Gesbert2007a}, [cf. Section~\\ref{section:performance-uf}]. The scheduling problem can be solved optimally by exhaustively searching (ExS) over all possible set sizes and user permutations. However, the computational complexity of ExS is prohibitively high, even for small values of $K$ \\cite{Ajib2005}. Furthermore, problem (\\ref{eq:general-combinatorial-problem:cost-function}) can be modified to include additional dimensions, such as multiple carriers for OFDMA systems (e.g. \\cite{Chan2007,Moretti2013}) or codes for CDMA systems (e.g. \\cite{Driouch2012}).\n\n\n\n\\subsection{The need of CSI availability} \n\\label{section:introduction:needof-csit}\n\nChannel knowledge at the transmitter can be modeled taking into account instantaneous or statistical information, e.g. variance, covariance, angles of arrival\/departure, and dominant path in line-of-sight \\cite{Vu2007}. \nThere are two main strategies used to obtain CSI, reciprocity and feedback, which provide different feedback requirements and robustness to CSI errors. The former, known as open-loop feedback, uses uplink channel information to define the downlink channel in the next transmission interval. It is suitable for TDD since transmit directions are in identical frequencies, and the channel can be reversed. The latter, known as closed-loop feedback, requires sending the downlink channel to the transmitter using dedicated pilots, and is commonly used in FDD. \nThe majority of the papers reviewed in Section~\\ref{section:algorithms} assume closed-loop with full or limited channel feedback, and we refer the reader to \\cite{Love2008,Vu2007,Kobayashi2011} and references therein for further discussion on CSI acquisition and its impact on system performance.\n\n\n\nTo perform multiple antenna processing, interference mitigation, user scheduling, efficient power allocation, and to profit from MUDiv, knowledge of CSIT is compulsory. The complete lack of CSIT reduces the multiplexing gain to one, and cannot use MUDiv for boosting the achievable capacity \\cite{Jafar2005, Sharif2005,Hassibi2007}. In such scenarios, the optimum resource allocation and transmission schemes are performed over orthogonal dimensions \\cite{Koutsopoulos2008}. \nIn the literature of MU-MIMO, a large number of works assume full CSI (error-free), at both the receiver (CSIR) and transmitter (CSIT) sides. \nIn practical systems, a strong downlink pilot channel, provided by the transmitter, is available to the users, hence the CSIR estimation error is negligible relative to that of the CSIT \\cite{Lau2009}. For simplicity, it is widely assumed that CSIR is perfectly known at the mobile terminals. \n{\\color{black}{\nIn cellular MU-MIMO systems, channel estimation relies on having orthogonal pilots allocated to different users. The orthogonality is guaranteed for the users within the same cell, but not for those scattered across different cells. The number of BS antennas and bandwidth constraints may not allow orthogonal pilots for each user in the system, resulting in pilot contamination \\cite{Marzetta2010}. Under universal frequency reuse, the pilots can be drastically polluted by users at adjacent cells, when the serving BS performs channel estimation \\cite{Elijah2016}.\n}}\n\n\n\nAchieving full CSIT (ideal noiseless and delay-free feedback) is highly challenging in practice. Feeding back the CSI requires rates that grow rapidly with the transmit power and the number of antennas \\cite{Jindal2006}. However, by assuming full CSIT, it is possible to derive upper bounds on the performance of different signal processing techniques and scheduling algorithms. The information-theoretic and numerical results using full CSIT provide useful insights regarding the system performance bounds (e.g., \\cite{Caire2003,Weingarten2006,Sharif2007}). Resource allocation strategies that optimize spectral efficiency, fairness, power consumption, and error probability can be designed to characterize optimal operating points \\cite{Schubert2006,Bjornson2013,Chiang2008}. Analytical results for full CSIT reveal the role of each parameter in the system, e.g., number of deployed transmit and receive antennas, number of active users, SNR regime, etc. \n\nIf channel knowledge is obtained via partial (rate-limited) feedback, the information available at the transmitter has finite resolution, resulting in quantization errors. \\textit{Partial CSIT} is comprised of two quantities: channel quality information (CQI) and channel direction information (CDI) \\cite{Gesbert2007a}. The CQI measures the achievable SINR, the channel magnitude, or any other function of the link quality. The CDI is the quantized version of the original channel direction, which is determined using codebooks [cf. Section~\\ref{section:precoding:partial-csit}]. The transmitter uses both indicators for scheduling [cf. Section~\\ref{section:algorithms:selection-partial-csit}], and the CQI is particularly used for power control, link adaptation, and interference management \\cite{Huang2012a}. The CSI feedback interval highly depends on the users' mobility,\\footnote{The authors in \\cite{Kobayashi2007a} showed that mobility defines the best reliable transmission strategy for capacity maximization, i.e., space-time coding or space division multiplexing. The results in \\cite{Zhang2011} defined acceptable mobility ranges for MU-MIMO scenarios.} and even for short-range communications (e.g., WiFi), immediate feedback is needed to achieve and maintain good performance \\cite{Jones2015}.\nBy considering high mobility and limited feedback rates, one cannot rely on instantaneous or full CSI. In such cases, the transmitters perform resource allocation based on \\textit{statistical} CSI, which vary over larger time scales than the instantaneous CSI. The statistics for the downlink and uplink are reciprocal in both FDD and TDD, which can be used to perform resource allocation, see \\cite{Gao2009} and references therein.\nTable~\\ref{tab:channel-information} summarizes the different types of CSIT in MU-MIMO systems, and the antenna configuration at the receivers. Partial CSIT refers to quantized channel information, which will be elaborated upon Sections \\ref{section:precoding:partial-csit} and \\ref{section:algorithms:selection-partial-csit}.\n\n\n\\begin{table}[t!] \\scriptsize\n\t\\renewcommand{\\arraystretch}{1.3}\t\n\t\\caption{Summary of the Type of CSI at the Transmitter for MISO ($N=1$) and MIMO ($N>1$) Configurations}\n\t\\label{tab:channel-information\n\t\\centering\n\t\\begin{tabularx}{0.48\\textwidth}{l *{2}{>{\\centering\\arraybackslash}X} }\n\t\t\\toprule\n\t\t& \\textbf{MISO} & \\textbf{MIMO} \\\\\n\t\t\\midrule\n\t\t\\textbf{Full CSIT} & \\cite{Dimic2005, Huang2013, Tu2003, Wang2008a, Yoo2006, Jiang2006, Dai2009, Lee2014, Huang2012b, Razi2010, Mao2012, Bjornson2014, Shi2012, Maciel2010, Chung2010, Driouch2012, Yoo2005a, Christopoulos2013, Xia2009, Matskani2008, Lau2005a, Cottatellucci2006, Wang2015, Yang2011, Koutsopoulos2008, Kobayashi2007, Boccardi2006, Destounis2015, Zhang2007b, Swannack2004, Tsai2008, Shirani-Mehr2011, Hammarwall2007, Seifi2011, Castaneda2015, Huh2012, Jang2011, Park2014, Ku2015, Song2008, Tu2003, Maciel2010,Bogale2015,Liu2015a} & \\cite{Bayesteh2008, Shen2006, Wang2010, Bayesteh2008, Ko2012, Elliott2009, Chan2007, Tran2010, Wang2010a, Nam2014a, Torabzadeh2010, Souihli2010, Moretti2013, Zhang2009, Cui2011a, Yu2013, Park2010, Lossow2013, Jagannathan2007, Chen2007a, Fuchs2007, Tejera2006, Zhang2005a, Wang2006, Chen2008, Sigdel2009a, Yi2011, Sun2010, Tran2012, Elliott2012, Hei2009, Lim2009, Cheng2014, Aniba2007} \\\\\n\t\t\\midrule\n\t\t\\textbf{Statistical} & \\cite{Liu2014a, Nam2014, Lee2014, Adhikary2013, Adhikary2013a, Stridh2006a,Kountouris2006,Kountouris2006b, Hammarwall2008,Hammarwall2008a, Dartmann2013,YiXu2014,Lee2014c,Liu2015a} & \\cite{Raghavan2007,Fuchs2007, Wang2006, Rico-Alvarino2014, Fan2014,Gao2009} \\\\\n\t\t\\midrule\n\t\t\\textbf{Outdated} & \\cite{Liu2014a,Driouch2012, Lau2009, Kobayashi2007,Kobayashi2007a, Tang2010, Shirani-Mehr2010, Zhang2011,Liu2015a} & \\cite{Wang2006} \\\\\n\t\t\\midrule\n\t\t\\textbf{Correlated} & \\cite{Kountouris2006b,Xu2009a,Weich2006,Gao2009, Raghavan2015,Liu2014a,Liu2015a} & \\cite{Schellmann2010,Chen2007a,Raghavan2007,Weich2006,Tran2012,Wang2006,Chen2008,Xu2009a,Bjornson2009a,Bjornson2010a,Godana2013a,Rao2013} \\\\\n\t\t\\midrule\n\t\t\\textbf{Partial CSIT} & \\cite{ Moon2013, Xia2009, Wagner2008,Yang2011,Jindal2006, Zorba2008, Conte2010, Tang2010, Huang2009a, Vicario2008, Yoo2007, Kountouris2007, Kountouris2008, Dai2008, Kountouris2006, Zhang2011, Ravindran2012, Kountouris2006a, Wang2007a, Choi2007c, Sohn2010, Kountouris2008a, Kountouris2005a, Kountouris2005, Xu2010, Khoshnevis2013, Simon2011, Zakhour2007, Huang2012a, Huang2007} & \\cite{Raghavan2007,Chae2008, Chen2013, Trivellato2008, Jindal2008, Nam2014a, VanRensburg2009, Hosein2009, Schellmann2010,Min2013, Sohn2012, Zhang2007a, Fan2014, Wang2012d} \\\\\n\t\t\\bottomrule\n\t\\end{tabularx}%\n\\end{table}%\n \n\n\n\n{\\color{black}{\n\\section{MU-MIMO Channel and System Models}\\label{section:system-set-ups}\n}}\n\nThe signal processing and scheduling algorithms described in the following sections have been developed and studied for single-hop MU-MIMO scenarios. We have classified the scenarios in two groups, see Fig.~\\ref{fig:generic-deployments}: single transmitter and multiple transmitters scenarios.\n\n\n\nThe implemented resource allocation strategies, user scheduling, and signal processing techniques depend on the number of coordinated transmitters, the number of antennas ($M$ and $N$), the number of users ($K$), the SNR regime, and the CSIT accuracy. The system optimization relies on close-loop (e.g. \\cite{Vu2007, Mietzner2009}) or open-loop (e.g. \\cite{Destounis2015}) feedback, to achieve spatial multiplexing gains, multiuser diversity gains, and to combat interference.\nIn cellular systems, there are two main sources of interference \\cite{Andrews2005}: other active devices in the same co-channel and same cell, i.e., intra-cell or IUI; and from transmissions in other cells, i.e., inter-cell interference (ICI). The techniques to mitigate IUI and ICI depend on the type of scenario and the optimization criterion. There exist a number of scenarios where the interference cannot be reduced, see \\cite{Jindal2006,Lozano2013}, whose characteristics are described in the following definition: \n\n\n\\begin{definition}\\label{defn:interference-limited-system}\n\t\\textit{Interference-limited system}. An MU-MIMO system is said to be interference limited if the performance metric saturates (ceiling effect) with the transmit SNR. This might occur due to CSIT inaccuracy, highly correlated multiuser channels (IUI), and irreducible ICI.\n\\end{definition}\n\n\\begin{figure}[b!]\n\t\\centering\n\t\\includegraphics[width=0.98\\linewidth]{figure4.pdf}\\\\\n\t\\caption{Classification of MU-MIMO Scenarios and two examples of commercial technologies} \\label{fig:generic-deployments}\n\\end{figure}\t\n\n\n\n\n\n\\subsection{Scenarios with a single transmitter}\n\\label{section:system-set-ups:single-cell-scenarios} \n\nThe objective of MU-MIMO processing is to accommodate many users per resource. Therefore, resource allocation strategies are commonly analyzed at the basic resource unit, e.g., code, single-carrier, time-slot, or frequency-time resource block. This can be done regardless the global system model (single-carrier, OFDM, or CDMA), since the same resource allocation strategy is applied over all resources, e.g., \\cite{Lau2006,Fuchs2007,Koutsopoulos2008,Vicario2008,Tsai2008,Conte2010, Driouch2012, Huang2013, Cheng2014, Fan2014,Bogale2016a}. We adopt a signal model using the most general approach in the reviewed references. \nConsider a scenario where the transmitter is equipped with $M$ antennas, and $K$ active users are equipped with $N$ antennas. Let $\\mathbf{H}_{k} \\in \\mathbb{C}^{N \\times M}$, be the discrete-time complex baseband MIMO channel of the $k$-th user for a given carrier. The received signal can be expressed as:\n\n\\begin{equation}\\label{eq:received_signal}\n\\mathbf{y}_{k} = \\mathbf{H}_{k}\\mathbf{x} + \\mathbf{n}_{k} \n\\end{equation}\nwhere $\\mathbf{x} \\in \\mathbb{C}^{M \\times 1}$, is the joint transmitted signal for all users.\nThe MIMO channel is usually assumed to be ergodic, i.e., it evolves over time and frequency in an independent and identically distributed (i.i.d.) manner. The channel is commonly modeled as \\textit{Rayleigh fading}, which is suitable for non line-of-sight communications. The complete spatial statistics can be described by the second-order moments of the channel \\cite{Raghavan2015}. Define the channel covariance matrix as $\\mathbf{\\Sigma}_{k} = \\mathbb{E}[\\mathbf{H}_{k}^{H} \\mathbf{H}_{k}]$, which depends on the antenna configuration, propagation environment, scattering conditions and mobility. The channel can be decomposed as $\\mathbf{H}_{k} = \\sqrt{\\mathbf{\\Sigma}_{k}} \\mathbf{H}_{iid}$, where $\\mathbf{H}_{iid}$ has i.i.d. entries with distribution $\\mathcal{CN}(0,1)$. \t\n\n\nAssuming spatially uncorrelated Rayleigh fading channels, i.e., $\\mathbf{\\Sigma}_{k} = \\gamma \\mathbf{I}$, $\\forall k$ and some $\\gamma > 0$, is the most common practice in the literature \\cite{Biglieri1998}. Physically, this implies rich scattering environments with sufficient antenna spacing at both ends of the radio link \\cite{Foschini1998}. Under these conditions, the fading paths between the multi-antenna transmitter and receiver become independent. The MU-MIMO channels are modeled as narrow band, experiencing frequency-flat (constant) fading, where there is no inter-symbol interference \\cite{Mietzner2009}. A common simplification used in OFDM broadband systems, is to assume multiple flat-fading sub-channels \\cite{Lau2006,Wang2007}. The received signal per sub-channel can be modeled as (\\ref{eq:received_signal}), avoiding frequency selectivity \\cite{Ho2009}. More realistic channel models for broadband MIMO systems and their performance analysis were proposed in \\cite{Couillet2011}.\nThe Rayleigh model can be thought as a particular case of the asymmetric \\textit{Ricean fading} channel model. In this case, the entries of $\\mathbf{H}_{iid}$ have non-zero mean and there exists a dominant line-of-sight (LoS) component that increases the average SNR \\cite{Goldsmith2005}. \n{\\color{black}{Such a model is less common in MU-MIMO systems operating at microwave (i.e., sub-6 GHz bands), since the channels become more static and the benefits of MUDiv vanish with the magnitude of the LoS paths \\cite{Hammarwall2008a}.\nIn recent years, wireless communication over the millimeter wave (mmWave) frequency range (30-300 GHz) has proved to be a feasible and reliable technology with a central role to play in 5G \\cite{Rappaport2014,Heath2016,Bogale2016}. The mmWave technology rely on directional antennas to overcome propagation loss, penetration loss, and rain fading. High directivity implies that Ricean fading channels can be used to characterize both LoS and non-LoS components present in the mmWave channels \\cite{Bai2015,Shokri-Ghadikolaei2015,Kutty2016,Bogale2016}. \t\t\n}}\t\t\n\n\n\n\nSeveral authors model the MIMO channel such that the correlation at transmit and receive antennas is distinguishable, and $\\mathbf{\\Sigma}_{k} \\neq \\gamma \\mathbf{I}$, $\\forall k$, see references in Table~\\ref{tab:channel-information}. There are two approaches to model and analyze performance under MIMO correlation, the \\textit{jointly correlated model} \\cite{Weich2006,Gao2009} and the simplified \\textit{Kronecker model} \\cite{Jorswieck2006,Hanlen2012}. The former assumes separability between transmit and receive eigen-directions, and characterizes their mutual dependence. The latter assumes complete correlation separability between the transmitter and receiver arrays, see \\cite{Shiu2000,Raghavan2010,Bjornson2010a,Hanlen2012} and references therein.\\footnote{Experimental results in \\cite{Czink2009} and theoretical analysis in \\cite{Raghavan2010} have shown that the conventional Kronecker model may not be well suited for MU-MIMO scenarios resulting in misleading estimates for the capacity of realistic scattering environments. This occurs due to the sparsity of correlated channel matrices, and the fact that the parameters of the Kronecker model change with time and position. The model can be used in scenarios with particular conditions on the local scattering at the transmitter and receiver sides \\cite{Jorswieck2006}.} We refer to \\cite{Couillet2011} for a comprehensive analysis of Rayleigh and Rician correlated MU-MIMO channels. Note that in some MIMO propagation scenarios with uncorrelated antennas, the MIMO capacity can be low as compared to the SISO one due to the \\textit{keyhole} or \\textit{pinhole} effect. This is related to environments where rich scattering around the transmitter and receiver leads to low correlation of the signals, while other\npropagation effects, like diffraction or waveguiding, lead to a rank reduction of the transfer function matrix \\cite{Keyhole2002,Keyhole2006}.\n\n\nThe MIMO channels $\\mathbf{H}_{k} \\ \\forall k$, may also include large-scale fading effects due to shadowing and path loss \\cite{Goldsmith2005,Tse2005}. Depending on the type of access technique (OFDMA, CDMA, or TDMA), the channel model can take into account multi-path components, correlation, Doppler spread, and angular properties \\cite{Koutsopoulos2008}. Another common assumption to avoid frequency dependency (particularly in low mobility scenarios), is to account for \\textit{block-fading channels} \\cite{Biglieri1998}. This means that the CSI is constant (within a coherence time duration) for a block of consecutive channel uses before changing independently for the next block.\n\nThe noise $\\mathbf{n}_{k} \\sim \\mathcal{CN}(\\mathbf{0}, \\mathbf{I}_{N})$, is usually modeled by i.i.d. normalized entries according to a circular normal (complex) Gaussian distribution with zero mean and unit variance \\cite{Love2008}. \nThe transmitted signal, $\\mathbf{x}$, can be defined according to the encoding applied over the user data, the number of spatial streams per user, and the power allocation. If linear precoding is used [cf. Section~\\ref{section:precoding}], the transmitted signal is defined as\n\n\\begin{equation}\\label{eq:transmitted_signal}\n\\mathbf{x} = \\sum_{k=1}^{K} \\mathbf{W}_{k}\\mathbf{d}_{k} \n\\end{equation}\nwhere $\\mathbf{W}_{k} \\in \\mathbb{C}^{M \\times d_k}$, is the precoding matrix, $\\mathbf{d}_{k} \\sim \\mathcal{CN}(\\mathbf{0}, \\mathbf{I}_{d_k})$ is the data signal, and $d_k$ is the number of multiplexed data streams of user $k$.\nIn single-transmitter MU-MIMO scenarios with signal models defined by (\\ref{eq:received_signal}) and (\\ref{eq:transmitted_signal}), the ICI is negligible or assumed to be part of the additive background noise. Therefore, IUI is the main performance limiting factor, which can be addressed by precoding the user data, [cf. Section~\\ref{section:precoding}]. \n\n\nThe active users might experience similar average long-term channel gains (large-scale fading or path loss) and SNR regimes. For some practical cellular systems, assuming homogeneous users is valid if open-loop power control is used to compensate for cell-interior and cell-edge path losses. Therefore, the resultant effective multiuser channels have quasi-identical variances \\cite{Huang2012a,Destounis2015}. The user distribution affects the fading statistics of $\\mathbf{H}_k$ $\\forall k$, and the general design of resource allocation algorithms \\cite{Jorswieck2006}.\n\n\nA possible single-transmitter MU-MIMO scenario arises in satellite communications. However, due to the characteristics of the satellite channels, marginal MIMO gains can be realized. The absence of scatterers in the satellite vicinity yields a Rician-type channel with a strong line-of-sight component, turning off the capabilities of MIMO processing. Due to the large coverage area in satellite communications, the users have heterogeneous long-term channel gains, which directly affects the resource allocation decisions. Regardless of the limited literature about MU-MIMO satellite communications, recent works show promising results and discussions about how intensive frequency reuse, user scheduling, and multibeam signal processing will be implemented in next generation broadband satellite systems \\cite{Arapoglou2011,Zorba2008,Cottatellucci2006}.\n\n\n\n\n\n\n\\subsection{Scenarios with multiple transmitters}\n\\label{section:system-set-ups:multi-cell-scenarios}\n\nIn this scenarios, the channel models and assumptions aforementioned are applied. Yet, some additional considerations are made so that signaling and connections between network entities can be modeled. \nDeploying several transmitters across a geographic area can provide reliable communication for heterogeneous mobile terminals (different path losses or SNR regimes relative to each transmitter). This kind of infra-structure based systems include cellular and wireless local area networks (WLAN). \nThe resource allocation and access control can be performed based on CSI and knowledge of the interference structure \\cite{Osseiran2011}. If the transmitters are allowed to cooperate, e.g., through a central processing unit (CU), IUI can be mitigated using CSIT for signal design [cf. Sections~\\ref{section:introduction:needof-csit} and \\ref{section:precoding}]. Global knowledge or estimation of the interference can be used to avoid poor spectral efficiency or inaccurate assignment of radio resources. \n\n\nThis paper focuses on scenarios where roaming (mobility) and reuse of resources are central management tasks. The premise behind cellular communications, is to exploit the power falloff with distance of signal propagation to reuse the same channel at spatially-separated locations. This means that the serving area is divided in non overlapping cells. Any cell site within a neighborhood cannot use the same frequency channel, which makes the same reused frequency channels sufficiently far apart \\cite{Gesbert2010,Nguyen2014}. \nIn traditional cellular systems, a given user belongs to only one cell at a time and resource allocation is performed unilaterally by its serving {BS} (non-cooperative approach in Fig.~\\ref{fig:generic-deployments}). \nEach transmitter serves its own set of users, transmission parameters are adjusted in a selfish manner by measuring ICI (simple interference-awareness), and there is no information exchange between BSs \\cite{Nguyen2014}.\nIf frequency reuse is employed, the {BS} can make autonomous resource allocation decisions and be sure that no uncoordinated {ICI} appears within the cell \\cite{Bjornson2013}. However, in many practical systems, universal frequency reuse is applied, which means that neighboring cells can access the same frequencies and time-slots simultaneously. This might increase the ICI and potentially degrade performance \\cite{Dahlman2013}. \nThe mitigation of {ICI} is a fundamental problem since the transmit strategy chosen by one {BS} will affect the reception quality of the users served by adjacent {BS}s. \n\n\nA cluster of BSs can coordinate the resource allocation, scheduling decisions, and ICI mitigation techniques (cooperative approach in Fig.~\\ref{fig:generic-deployments}). Dynamic clustering is an ongoing research topic (see \\cite{Gesbert2010,Bjornson2013,Nguyen2014,Li2014} and references therein), which promises to meet the requirements established in the third generation partnership project ({3GPP}) standards \\cite{Dahlman2013}.\nDifferent forms of {ICI} control have been proposed over the last years. Extensions of space multiple access techniques for multi-cell systems have received several names, \\textit{coordinated multi-point} ({CoMP}) \\cite{Marsch2011,Lee2012a,Dahlman2013}, \\textit{network {MIMO}} \\cite{Zhang2009}, or \\textit{joint signal transmission\/processing} ({JT}) \\cite{Nguyen2014}. These techniques exploit the spatial dimensions, serving multiple users (specially cell edge users \\cite{Bjornson2013}), while mitigating {ICI} of clustered {BS}s.\\footnote{Theoretical analysis in \\cite{Lozano2013} shows that in the high {SNR} regime, the achievable system capacity is fundamentally interference-limited due to the out-of-cluster interference. This occurs regardless the level of coordination and cooperation between clustered BSs. However, coordinated scheduling and user clustering can provide means to improve spectral efficiency and mitigate interference at high SNR.} \nFor these approaches, a cluster can be treated as a super cell, for which mathematical models from the single-cell scenario can be applied straightforwardly, e.g. \\cite{Liu2011,Khoshnevis2013,Marsch2011}. \n\n\nIf user data is shared among {BS}s, the use of \\textit{proactive} interference mitigation within a cluster can take place. This implies that coordinated BSs do not separately design their physical (PHY) and media access control layer parameters. Instead, the BSs coordinate their coding and decoding, exploiting knowledge of global data and {CSI} \\cite{Gesbert2010}. However, to guarantee large performance gains for these systems, several conditions must be met \\cite{Bjornson2013,Nguyen2014}: global {CSI} and data sharing availability, which scales up requirements for channel estimation, backhaul capacity, and cooperation; coherent joint transmission and accurate synchronization; and centralized resource allocation algorithms, which may be infeasible in terms of computation load and scalability.\n\n\nThere is another approach of multi-cell cooperation, coined as \\textit{coordinated scheduling} (CS) with \\textit{coordinated beamforming} ({CBF}), which is a form of coordinated transmission for interference mitigation \\cite{Dahlman2013,Nguyen2014}. CS\/CBF refers to the partial or total sharing of {CSI} between {BS}s to estimate spatial signaling, power allocation, and scheduling without sharing data or performing signal-level synchronization \\cite{Gesbert2010}. {CBF} implies that each {BS} has a disjoint set of users to serve, but selects transmit strategies jointly with all other {BS}s to reduce {ICI}. In this approach, exchange of user data is not necessary, but control information and {CSI} can be exchanged to simultaneously transmit to a particular set of users \\cite{Lee2012a}.\nCBF is more suitable than JT for practical implementations, since it requires less information exchange. Nevertheless, CSI acquisition, control signaling, and coordinated scheduling are challenging tasks due to limited feedback bandwidth and finite capacity backhaul \\cite{Li2014}.\n\n\n\n\\subsection{Commercial Deployments}\n\\label{section:system-set-ups:practical-deployments}\n\nThis paper covers two wireless technologies, whose specifications already support MU-MIMO communications: LTE-Advanced for cellular networks and IEEE 802.11ac for wireless local area networks (WLAN). \n\n\n$\\bullet$ \\textit{LTE-Advanced}: This is the 3GPP cellular system standard for 4G and beyond communications \\cite{Dahlman2013}. Several capabilities have been added to the LTE standard to increase capacity demands and integrated a large number of features in the access network. Among these attributes, the ones related to MIMO processing are the most relevant in the context of this paper: enhanced downlink MIMO, multi-point and coordinated transmission schemes, and multi-antenna enhancements. Due to the fact that LTE is a cellular technology, most of the studied deployments in the literature lie in the category of multiple transmitters scenarios, see Fig.~\\ref{fig:generic-deployments}. \n\n\nMU-MIMO communication has been incorporated in LTE with the following maximum values: four users in MU-MIMO configuration, two layers (spatial streams) per user, four simultaneous layers, and robust CSI tracking. Practical antenna deployments at the transmitter use dual-polarized arrays, and the expected number of co-scheduled users for such configurations will be two for most cases \\cite{Lim2013,Fan2014}. LTE provides a mechanism to improve performance by switching between MU or SU-MIMO mode on a per sub-frame basis, based on CSI, traffic type, and data loads. The goal of dynamic mode switching is to balance the spectral efficiency of cell edge and average cell users. This can be achieved, for instance, by using transmit diversity for users at the cell edge, or implementing spatial multiplexing for cell center users \\cite{Liu2012}. \n\n\t\n$\\bullet$ \\textit{IEEE 802.11ac}: This WLAN standard supports multiuser downlink transmission, and the number of simultaneous data streams is limited by the number of antennas at the transmitter. In MU-MIMO mode, it is possible to simultaneously transmit up to 8 independent data streams and up to 4 users \\cite{Kim2015,Jones2015}. Spatial multiplexing is achieved using different modulation and coding schemes per stream. MU-MIMO transmission prevents the user equipment with less antennas to limit the achievable capacity of other multiple antenna users, which generates rate gains for all receivers. A unique \\textit{compressed explicit feedback} protocol, based on channel sounding sequences, guarantees interoperability and is used to estimate CSI and define the steering matrices (beamforming). Other methods for channel estimation are described in \\cite{Liao2016} and references therein. \nCompared to cellular networks, WLANs usually have fewer users moving at lower speeds, the APs are less powerful that the BSs and the network topology is ad hoc. Although multiple APs could be deployed, most of the works in the literature focus on MU-MIMO systems with a single transmitter.\n{\\color{black}{Nonetheless, joint transmission from several APs to different mobile users is feasible in WLANs, which requires coordinated power control, distributed CSI tracking, as well as synchronization in time, frequency, and phase. The authors in \\cite{Hamed2016} have shown that distributed MIMO can be achieved by enhancing the physical layer for coordinated transmission, and by implementing time-critical functions for the media access control layer.\nIt is likely that in the next generation of 802.11 standard, coordination schemes between APs will be adopted to enable MU-MIMO communications \\cite{Liao2016}.\n}}\n\n\n\\section{MU-MIMO Precoding}\n\\label{section:precoding}\n\nThe spatial dimension provided by the multi-antenna transceivers can be used to create independent channelization schemes. In this way, the transmitter serves different users simultaneously over the same time slot and frequency band, which is known as space-division multiple access (SDMA) \\cite{Godara2002Ch18, Tse2005, Gesbert2007a, Mietzner2009}.\nThe spatial steering of independent signals consists of manipulating their amplitude and phases (the concept of \\textit{beamforming} in classic array signal processing), in order to add them up constructively in desired directions and destructively in the undesired ones \\cite{Mietzner2009,Bjornson2013}. By jointly encoding all (co-resource) signals using channel information, it is possible to increase the signal-to-interference-plus-noise ratio (SINR) at the intended receiver and mitigate interference for non-intended receivers.\n\nIn the literature of MU-MIMO systems, the term beamforming refers to the signal steering by means of beams to achieve SDMA. The term \\textit{precoding} is used to denote the scaling and rotation of the set of beams, so that, their power and spatial properties are modified according to a specific goal. Hereinafter, we use the term precoding\\footnote{Some authors denote as precoding all processing techniques over the transmitted signals, which achieve multiplexing or diversity gains, i.e., both space-time coding and beamforming \\cite{Shirani-Mehr2010}.} to describe the signal processing (i.e., beam vector\/matrix computation, scaling, rotation, and projection), applied to the independent signals prior to transmission. \nIn this section we describe the most common precoding techniques used in MU-MIMO scenarios, and their characteristics according to CSIT. Table~\\ref{tab:precoding} summarizes the precoding schemes used in the surveyed literature, as well as their associated methods for user selection, which will be elaborated upon in the following sections. \nAn important performance metric determined by the precoders $\\mathbf{W}_{k}$, $\\forall k$, related to the delivered energy through the MU-MIMO channels, is provided in the following definition. \n\n\n\n\\begin{definition}\\label{defn:effective_channel_gains}\n\t\\textit{Effective channel gain}. It is the magnitude of the channel projected onto its associated precoding weight. Let $\\mathbf{H}_{k}^{(eff)} = \\mathbf{H}_{k} \\mathbf{W}_{k}$, be the \\textit{effective channel} after spatial steering, thus, the effective channel gain is given by: \\textit{i}) $|\\mathbf{H}_{k}^{(eff)}|^2$ for MISO scenarios; \\textit{ii}) for MIMO scenarios, it is given by a function of the eigenvalues of $\\mathbf{H}_{k}^{(eff)}$: $\\det \\left( \\mathbf{H}_{k}^{(eff)}( \\mathbf{H}_{k}^{(eff)} )^ {H} \\right)$ or $\\| \\mathbf{H}_{k}^{(eff)}\\|_{F}^{2}$.\n\\end{definition}\n \n\n\n\\begin{table*}[t] \\scriptsize\n\t\\renewcommand{\\arraystretch}{1.3}\t\n\t\\caption{Precoding Schemes and their associated Scheduling Methods}\n\t\\label{tab:precoding\n\t\\centering\t\t\n\t\\begin{tabularx}{\\textwidth}{ *{6}{>{\\centering\\arraybackslash}X} } \n\t\t\\toprule\t\n\t\t\\textbf{Method} & \\textbf{Utility-based} & \\textbf{CSI-Mapping} & \\textbf{Metaheuristic}\\newline \\textbf{(stochastic)} & \\textbf{Classic}\\newline \\textbf{Optimization}& \\textbf{Exhaustive} \\textbf{Search} \\\\\n\t\t\\midrule\n\t\t\\textbf{DPC} & \\cite{Boccardi2006} & - & \\cite{Elliott2009} & - & - \\\\\t\t\n\t\t\\midrule\n\t\t\\textbf{THP} & \\cite{Boccardi2006} & - & - & - & - \\\\\n\t\t\\midrule\n\t\t\\textbf{VP} & \\cite{Boccardi2006} & \\cite{Razi2010} & - & - & - \\\\\n\t\t\\midrule\n\t\t\\textbf{MRT} & \\cite{Moon2013, Zhang2011} & \\cite{Wang2015} & \\cite{Bjornson2014} & - & - \\\\\n\t\t\\midrule\n\t\t\\textbf{ZFBF} & \\cite{Dimic2005, Moon2013, Huang2013, Wang2008a, Huang2012b, Zhang2005a, Lau2005a, Chan2007, Conte2010, Chae2008, Kountouris2007, Shirani-Mehr2010, Zhang2011, Ravindran2012, Jindal2008, Boccardi2006, Tsai2008, Huh2012, Park2010, Lossow2013,Hammarwall2008,YiXu2014,Bogale2015} & \\cite{Wang2008a, Yoo2006, Nam2014, Bayesteh2008, Adhikary2013, Adhikary2013a, Wang2010, Mao2012, Shi2012, Maciel2010, Zhang2005a, Chung2010, Driouch2012, Yoo2005a, Wang2006, Sun2010, Wang2015, Yang2011, Conte2010, Huang2012a, Chae2008, Yoo2007, Kountouris2007, Dai2008, Kountouris2006a, Wang2007a, Trivellato2008, Min2013, Sohn2010, Souihli2010, Swannack2004, Shirani-Mehr2011, Xu2010, Sohn2012, Khoshnevis2013, Castaneda2015, Jang2011,Hammarwall2008,Lee2014c,Liu2015a} & \\cite{Bjornson2014, Lau2005a, Cottatellucci2006} & \\cite{Chan2007} & \\cite{Chan2007, Zakhour2007, Destounis2015, Swannack2004,Bogale2015} \\\\\n\t\t\\midrule\n\t\t\\textbf{ZFDP} & \\cite{Dimic2005, Tran2010} & \\cite{Tu2003, Jiang2006, Dai2009, Tejera2006, Sigdel2009a, Sun2010} & - & - & - \\\\\n\t\t\\midrule\n\t\t\\textbf{SZF} & - & \\cite{Zorba2008} & \\cite{Elliott2012} & - & - \\\\\n\t\t\\midrule\n\t\t\\textbf{CIZF} & - & \\cite{Christopoulos2013} & - & - & - \\\\\n\t\t\\midrule\n\t\t\\textbf{BD} & \\cite{Shen2006, Chen2007a, Chen2008, Ko2012, Tran2012, Lim2009, Cheng2014, Rico-Alvarino2014, Zhang2009,YiXu2014} & \\cite{Nam2014, Shen2006, Lee2014, Adhikary2013, Adhikary2013a, Chen2007a, Fuchs2007, Wang2006, Sigdel2009a, Yi2011, Lim2009, Wang2010a, Nam2014a} & \\cite{Hei2009} & \\cite{Chan2007, Moretti2013} & - \\\\\n\t\t\\midrule\n\t\t\\textbf{MMSE\/SLNR} & \\cite{Zhang2011, Torabzadeh2010, Cui2011a, Seifi2011,Liu2014a} & \\cite{Zorba2008, Lau2009, Kountouris2005a,Kountouris2006b}, \\cite{Xia2009, Castaneda2015}, \\cite{Adhikary2013} & \\cite{Cottatellucci2006} & - & - \\\\\n\t\t\\midrule\n\t\t\\textbf{Adaptive} & \\cite{Koutsopoulos2008, Kobayashi2007, Boccardi2006, Hammarwall2007, Dartmann2013, Yu2013} & \\cite{Zhang2007b} & - & \\cite{Stridh2006a, Matskani2008, Ku2015, Song2008} & - \\\\\n\t\t\\midrule\n\t\t\\textbf{Codebook-based} & \\cite{Fan2014, Wang2012d, Tang2010, Vicario2008, Kountouris2006, Ravindran2012} & \\cite{Kountouris2006b,Lee2014, Yang2011, Huang2009a, Kountouris2008, Chen2013, Zhang2007a, Choi2007c, Kountouris2008a, Kountouris2005a, Kountouris2005, Huang2007, VanRensburg2009, Hosein2009, Schellmann2010, Simon2011,Xu2009a}& - & - & - \\\\\n\t\t\\bottomrule\n\t\\end{tabularx}%\n\\end{table*}%\n\n\n\n\n\n\\subsection{Non-linear Precoding with full CSIT}\n\\label{section:precoding:non-linear}\n\nFrom an information-theoretic perspective, the optimal transmit strategy for the MU-MIMO BC is \\textit{dirty paper coding} ({DPC}) \\cite{Costa1983}, and theoretical results showed that such strategy achieves the entire BC capacity region \\cite{Caire2003,Weingarten2006}. The principle behind this optimum coding technique is that the transmitter knows the interference for each user. Therefore, interference can be pre-subtracted (from the information theoretical standpoint) before transmission, which yields the capacity of an interference free channel. DPC is a non-linear process that requires successive encoding and decoding, whose performance depends on the particular sequential order $\\pi(\\cdot)$ assigned to the co-scheduled users \\cite{Caire2006}. Although the implementation complexity of DPC for practical systems is prohibitively high, it establishes the fundamental capacity limits for MU-MIMO broadcast channels \\cite{Weingarten2006,Hassibi2007}. \n\nSuboptimal yet more practical non-linear precoding schemes have been proposed as an alternative to DPC \\cite{Boccardi2006}. The error rate and interference can be minimized at the symbol level by the Tomlinson-Harashima precoding (THP),\\footnote{The application of THP in MU-MIMO has been of particular interest in recent research on multibeam satellite communications \\cite{Arapoglou2011}.} which is not limited by the number of transmit or receive antennas \\cite{Tse2005}. By modifying or perturbing the characteristics of the transmitted signal, the power consumption can be minimized (compared to traditional channel inversion filtering), using the non-linear vector perturbation (VP) scheme \\cite{Hochwald2005, Kurve2009}. This technique requires a multidimensional integer-lattice least squares optimization, whose solution can be found by several approaches.\n\n\n\\subsection{Linear Precoding with full CSIT}\n\\label{section:precoding:linear}\n\nLinear precoding is a generalization of traditional SDMA \\cite{Gesbert2007a}, which matches the signal on both ends of the radio link. This is attained by decoupling the input data into orthogonal spatial beams and allocating power according to CSIT \\cite{Vu2007}. The precoders weights are vectors or matrices jointly designed at the transmitter, according to several parameters: the type of CSIT, the coding order, the performance metric (e.g., mean-square error (MSE), error probability, power consumption, or achievable SNR), and the system constraints (e.g., power and QoS). \nThe optimal precoder technique (linear filtering in the spatial domain), would be able to balance between signal power maximization and interference power minimization \\cite{Larsson2008,Jorswieck2008}. Precoding design subject to general constraints can be performed using standard optimization techniques (see \\cite{Hong2012} for a comprehensive survey) or by heuristic approaches, e.g., maximizing the signal-to-leakage-plus-noise ration (SLNR\\footnote{SLNR is also known in the literature as the transmit Wiener filter, transmit MMSE beamforming, or virtual SINR beamforming \\cite{Bjornson2014b}. }) \\cite{Sadek2007, Bjornson2013}.\nHowever, determining the optimal precoders is an NP-hard problem for many performance metrics \\cite{Liu2011,Weeraddana2012}, whose evaluation is performed by computationally demanding algorithms \\cite{Schubert2004,Christensen2008,Godara2002Ch18}. Therefore, many works in the literature focus on more suboptimal, yet practical, schemes that can achieve spatial multiplexing gains with low computational complexity. \nA large number of linear precoding techniques have been developed, for which having more transmit than receive antennas, i.e., $M\\geq N$, is a condition required in most cases. There are some particular precoding schemes (e.g. SLNR) that can be implemented if $M < N$, but the system becomes interference limited in the moderate and high signal-to-noise (SNR) regimes, [cf. Definition~\\ref{defn:interference-limited-system}]. Therefore, power control and recursive adaptation of the precoders are mandatory to operate in those SNR regimes \\cite{Sadek2007}. \n\n\nIn a MISO antenna configuration, the matched filter or maximum ratio transmission (MRT) precoding maximizes the signal power at the intended users. This is performed by projecting the data symbol onto the beamforming vector given by the spatial direction of the intended channel \\cite{Bjornson2013}. A similar precoding scheme for MIMO scenarios is the singular value decomposition (SVD) beamforming \\cite{Tse2005}, which uses the eigenvectors of the channel as beamforming weights.\nThe zero-forcing beamforming\\footnote{Precoding based on ZFBF obtains a multiplexing gain of $M$ and can asymptotically achieve the DPC performance when $K \\rightarrow \\infty$ \\cite{Yoo2006}.} (ZFBF) \\cite{Caire2003}, also known as channel inversion precoding \\cite{Peel2005}, completely suppresses IUI in MISO scenarios. This technique is based on prefiltering the transmit signal vector by means of the Moore-Penrose inverse \\cite{Gentle2007}. An extension of ZFBF for MIMO scenarios is the block diagonalization (BD) precoding, where multiple data streams can be transmitted per user \\cite{Spencer2004a}. \n\n\nIn MISO scenarios, the regularized channel inversion (often coined as MMSE precoding) enhances ZF, taking into account the noise variance to improve performance in the low SNR regime \\cite{Peel2005}. An extension of MMSE for the general MIMO scenario is the regularized BD \\cite{Stankovic2008}.\nZero-forcing dirty paper (ZFDP) coding \\cite{Caire2003}, is a technique designed for MISO settings. For a given user $k$, ZFDP suppresses the interference coming from the next encoded users $\\{k+1,\\ldots,K\\}$, combining QR decomposition \\cite{Gentle2007} and DPC. Extensions of ZFDP for the MIMO scenarios were defined in \\cite{Dabbagh2007,Spencer2004a} (an iterative SVD method), and \\cite{Sun2010} (combining ZF, DPC, and eigen-beamforming). Successive zero-forcing (SZF) was proposed in \\cite{Dabbagh2007}, for MIMO settings. SZF partially suppresses IUI, by encoding users similar to ZFDP, but DPC is not applied in the encoding process.\nThe generalization of precoding schemes based on ZF for multiple antenna receivers is not trivial. This is because applying MISO decompositions methods to the MIMO channel is equivalent to treating each receive antenna as an independent user. This process does not completely exploit the multiplexing and diversity gains of MIMO systems \\cite{Dabbagh2007}.\n\n\nThe aforementioned precoding schemes can be classified as user-level precoders, i.e., independent codewords intended to different users are transmitted simultaneously. There is another class of precoding schemes, where simultaneous transmitted symbols are addressed to different users \\cite{Alodeh2015}. This class of symbol-level precoding, e.g. constructive interference zero forcing (CIZF) precoding \\cite{Masouros2009,Alodeh2015}, has been developed for MISO settings. CIZF constructively correlates the interference among the spatial streams, rather than decorrelating them completely as in the case of user-level precoding schemes. \n\n\n\n\\subsection{Precoding with partial CSIT}\n\\label{section:precoding:partial-csit}\n\nIn the literature of limited feedback systems, CSIT acquisition relies on {\\color{black}{collections of predefined codewords (vector or matrix weights) or codebooks,}} that are known a priori at the transmitter and receiver sides. The codewords can be deterministic or randomly constructed, which defines the type of signal processing applied to achieve spatial multiplexing and interference mitigation \\cite{Love2008}:\n\n\n$\\bullet$ \\textit{Channel quantization and precoding}: The codebook $\\mathcal{C} = \\{ \\mathbf{c}_{1}, \\ldots, \\mathbf{c}_{b}, \\ldots, \\mathbf{c}_{2^B} \\}$, is used by user $k$ to quantize its channel direction with $B$ bits. This means that each user feeds back the index $b$, of the most co-linear codeword to its channel, [cf. Section~\\ref{section:metrics-spatial-compatibility:spatial-clustering}]. \nThis is illustrated in Fig.~\\ref{fig:hyperslab_cones}, where the user $k$ would report the index $b$, related to the cone where $\\mathbf{H}_{k}$ has been clustered. The precoding weights are usually computed using ZFBF over the quantized channels. Due to quantization errors, the signals cannot be perfectly orthogonalized, and the sum-rate reaches a ceiling as the SNR regime increases \\cite{Jindal2006}. In other words, resource allocation is performed over non-orthogonal spatial directions.\n\nThe optimal codebook design has not been fully solved in the literature. However, if the channel is assumed to have spatially i.i.d. entries, ($\\mathbf{\\Sigma}_{k} = \\mathbf{I}$, and homogeneous long-term channel gains, $\\forall k$), off-line designs of $\\mathcal{C}$ can be realized using different approaches, e.g., the Grassmannian design \\cite{Love2003}, random vector quantization (VQ) \\cite{Jindal2006}, quantization cell approximation (QCA) \\cite{Mukkavilli2003}, and other techniques described in \\cite{Love2008,Trivellato2008}. This sort of isotropically distributed codebooks achieve acceptable performance, since they mirror the statistical properties of the eigen-directions of $\\mathbf{H}_{k}$, $\\forall k$. For correlated channels ($\\mathbf{\\Sigma}_{k} \\neq \\mathbf{I}$), non-uniform or skewed codebooks must be constructed, taking into account the statistical characteristics of the dominant eigen-directions of $\\mathbf{\\Sigma}_{k}$, $\\forall k$, see \\cite{Raghavan2007,Rao2013,Godana2013a,Raghavan2015}.\n\n\n\n$\\bullet$ \\textit{Random beamforming (RBF)} \\cite{Sharif2005}: The available precoding vectors, $\\mathcal{F} = \\{ \\mathbf{f}_{1}, \\ldots, \\mathbf{f}_{b}, \\ldots, \\mathbf{f}_{2^B} \\}$, are constructed at the transmitter according to a known distribution,\\footnote{The goal is to generate $2^B$ codewords that are i.i.d., according to the stationary distribution of the unquantized beamforming vector \\cite{Love2008}.} or by methods that yield random orthonormal basis in $\\mathbb{C}^{M \\times 1}$, \\cite{Choi2007c}. The transmitter sends pilot symbols to different user through the beams in $\\mathcal{F}$, and each user feeds back the index $b$, of its best beam [cf. Section~\\ref{section:algorithms:selection-partial-csit}]. RBF is an extension of the opportunistic beamforming scheme in \\cite{Viswanath2002}, and attempts to sustain multiuser diversity over fading channels with partial CSIT. Random changes of amplitude and phase at each transmit antenna result in channels experiencing accelerated fluctuations, which enhances the MIMO processing gains. This approach is only effective when the number of users is large,\\footnote{RBF asymptotically achieves the performance of downlink MIMO systems with full CSIT as $K \\rightarrow \\infty$. However, it does not achieve the full multiplexing gain at high SNR \\cite{Hassibi2007}, and suffers from large quantization error as $M$ grows \\cite{Kim2005a}.} $K \\gg M$, and the number of antennas at the transmitter $M$ is moderate \\cite{Choi2007c}. In some scenarios the performance can be enhanced by power control, or employing statistical channel information to compensate poor MUDiv. \n\n\n\nWe hasten to say that defining the optimum $B$, either for $\\mathcal{C}$ or $\\mathcal{F}$, is not a trivial optimization problem. In practice, only a tradeoff between feed back load and performance should be sought. Under mild conditions, $B$ can be minimized for certain codebook designs while guaranteeing diversity gains \\cite{Castanheira2014a}. Large codebooks provide accurate CSIT at a price of factors, large feedback signaling overhead and memory requirements at the receiver, which increase exponentially with $B$ \\cite{Wang2007a}. \n\n\n\n\n\n\n\n\\subsection{Precoding in Multiple Transmitters Scenarios}\n\\label{section:precoding:multiple-transmitters}\n\nRecent research work have focused on transmission cooperation and coordination in multi-cellular and heterogeneous networks. The signal processing techniques performed at the transmitters depend on several aspects \\cite{Gesbert2010,Nguyen2014}: shared or non-shared user data; global or local CSIT; full or partial CSI; level of synchronization; per-transmitter power, backhaul, and delay constraints; full or limited coordination; heterogeneous SNR regime across the receivers; and the number of clustered transmitters.\n\nIn multi-cell scenarios, assuming full CSIT and shared user data across the transmitter, the precoders can be computed by techniques described in Section~\\ref{section:precoding:linear}. However, the power should be constrained on a per-transmitter basis, instead of global power allocation as in single-transmitter scenarios \\cite{Silva2013}.\nThe precoding design can be oriented to optimize different objective functions, e.g. power minimization or sum-rate maximization. Optimizing such functions deals, in general, with non-convex problems, whose solutions are non-linear precoders \\cite{Nguyen2014}. Precoding weights designed for common utility functions, e.g. weighted-sum-rate maximization or mean-square-error (MSE) minimization, can be realized via standard optimization techniques and sophisticated high-performance algorithms, see \\cite{Hong2012,Kaviani2012} and references therein. \n\nHowever, a more pragmatic approach for MU-MIMO, is given by linear precoding schemes (e.g. ZFBF, SLNR, or BD), which can be extended for multi-cell systems and providing reliable and low-complexity solutions \\cite{Zhang2009,Bjornson2010}. In \\textit{network MIMO} scenarios, multi-cell BD precoding can remove ICI for the clustered cells using centralized processing at a central controller (full coordination) \\cite{Zhang2009}.\nIn MISO multi-cell scenarios, linear precoding can be performed in a distributed fashion or with partial coordination. There are two fundamental schemes \\cite{Bjornson2013}: MRT (a competitive or egoistic scheme) and inter-cell interference cancellation (ICIC is a cooperative or altruistic scheme). For the MRT scheme, the transmitters ignore the ICI that they cause to unintended receivers in their vicinity. The goal is to maximize the received signal power of local users (effective in non-cooperative systems). The ICIC is a ZF-based scheme, which means that the transmitters design their precoders so that no interference is cause to non-intended receivers (effective in cooperative systems). The design of ICIC\/ZF precoding is subject to constraints in the number of transmit and receive antennas, and its effectiveness highly depends on the CSIT across the transmitters. A close-to-optimal\\footnote{The optimal precoding design maximizes the received signal powers at low SNRs, minimizes the interference leakage at high SNRs, and balances between these conflicting goals at moderate SNRs.} distributed precoding scheme (for an arbitrary SNR), is attained by balancing MRT and ICIC, whose mathematical formulation is discussed in \\cite{Bjornson2013,Bjornson2014b}.\nIf the system operates under a limited feedback constraint, the CSIT is acquired using the principles described in Section~\\ref{section:precoding:partial-csit}. Precoding design extensions from single to multi-cell scenarios are not straightforward. For instance, in multi-cell cooperative systems, the codebooks sizes may significantly increase \\cite{Gesbert2010}, and depending on the delay tolerance and codebook granularity, the clustered transmitters should switch between MRT and ICIC schemes \\cite{Godana2013}.\n\n\nSeveral multi-cell CBF designs attempt to suppress IUI and ICI simultaneously with minimum coordination or control signaling between transmitters. These schemes rely on instantaneous or statistical CSI, and can be classified as \\cite{Zheng2015}: \\textit{hierarchical} and \\textit{coupled} precoders. The hierarchical approach is implemented in systems where each transmitter suppresses ICI using ZF. This is attained through the sequential construction of outer and inner precoders that reduce ICI and IUI, respectively. The ICI cancellation is achieved by aligning interference subspaces at the receivers, whilst the IUI is suppressed at the transmitters using linear precoding and local CSI, e.g., \\cite{Adhikary2013,Suh2011,Liu2014a,YiXu2014,Ferrand2014,Chen2014}.\nThe coupled or nested-structure approach, is implemented in interference limited system, [cf. Definition~\\ref{defn:interference-limited-system}]. The precoding design (beamforming weights and power allocation) optimizes an objective function subject to a set of QoS constraints, [cf. Section~\\ref{section:performance-uf}]. This kind of optimization problems has been extensively studied in the literature, covering power allocation \\cite{Chiang2008} and beamforming design \\cite{Hong2012}. \nUnder certain conditions, two specific problem formulations admit global optimal solutions via standard optimization in multi-cellular scenarios \\cite{Boyd2004,Stanczak2009,Tan2012}: \n\\textit{i) power minimization subject to individual SINR constraints}. The CBF approach in \\cite{Zakhour2013} mitigates ICI by iteratively adjusting beamforming weights and transmit powers according to the experienced interference per user.\n\\textit{ii) the maximization of minimum SINR subject to power constraints}. The authors in \\cite{Huang2013b} tackled this problem using the Perron-Frobenius theory \\cite{Stanczak2009,Chiang2008}. The joint beamforming and power allocation design is reformulated as an eigenvalue-eigenvector optimization problem, whose optimal solution can be found by geometrically-fast convergent algorithms. \n\n \n\n\n\n\\subsection{Precoding in LTE-Advanced}\n\\label{section:precoding:lte-advanced}\n\nIn the LTE specification, CSI acquisition is called \\textit{implicit feedback} and relies on the following parameters \\cite{Li2010,Liu2012}: rank indicator (RI), which defines the number of data streams recommended for SU-MIMO transmission; precoding matrix index (PMI), which is the index of the best precoding matrix in the codebook; and channel quality indicator (CQI), which contains information of the channel quality corresponding to the reported RI and PMI \\cite{Dahlman2013}. The RI and PMI indexes provide the CDI of the MIMO channels, while the CQI indicates the strength of the corresponding spatial direction. \nThe precoding matrices are defined at the BSs using different approaches \\cite{Li2014,Lim2013}: codebook-based precoding or non-codebook-based precoding (arbitrary precoder selection based on RI). The standard also supports a dual codebook structure in MU-MIMO mode. This increases codebook granularity, suppresses IUI more efficiently, and enhances the overall performance. The idea is that one codebook tracks the wideband and long-term channel characteristics, while the other tracks the frequency-selective and short-term channel variations \\cite{Lim2013}. In this way, the transmitter has more flexibility and accuracy when designing the precoding matrix. \nAnother supported scheme is the \\textit{Per Unitary basis stream User and Rate Control} (PU2RC), which allows multiple orthonormal bases per codebook, increasing quantization granularity \\cite{Huang2009a, Tang2010}. Although PU2RC uses deterministic codebooks, random codebooks can be used to simplify theoretical analysis, e.g. \\cite{Sharif2005,Jindal2006,Huang2009a,Tang2010}. The optimum number of bases in the codebook depends on the number of active users $K$, and should be optimized to maximize MUDiv and multiplexing gains \\cite{Huang2009a}.\n\n\nLTE standard supports interference mitigation based on linear precoding schemes, such as SLNR and ZFBF with quantized channels \\cite{Lee2012a}. The precoders can be dynamically recalculated after each CSI update, i.e., tracking channel variations. Linear precoding based on quantized channels outperforms codebook-based precoding (RBF or PU2RC), when then number of active users is small, i.e., \\textit{sparse networks}, $K \\approx M$ \\cite{Gesbert2007a}. The reverse holds as MUDiv increases, $K \\gg M$, \\cite{Huang2009a}. \n \n\n\n\\subsection{Precoding in 802.11ac}\n\\label{section:precoding:208_11ac} \n\n{\\color{black}{\nSounding frames (null data packet) for MU-MIMO beamforming were introduced in 802.11n for channel estimation purposes. The transmitter sends known symbol patters from each antenna, allowing the receiver to sequentially construct the channel matrix, which is compressed and sent back to the transmitter \\cite{Rico-Alvarino2014}. The method employed to calculate the steering matrix is implementation and vendor specific relying on explicit CSI feedback, and is not defined by the 802.11ac standard \\cite{Bejarano2013,Arubanetworks2014,Liao2016}.}} \nOne popular technique to construct the steering or precoding matrix is through SVD precoding \\cite{Rico-Alvarino2014,Kim2015}. Since knowledge of CSIT is mandatory and feedback rates are limited, the receivers represent their estimated precoding matrix with orthogonal columns using Givens rotations \\cite{Gentle2007}. Then, the set of calculated parameters (angles) at the receivers are adjusted, quantized, and fed back to the transmitter. In general, the final precoding matrix calculated by the transmitter will be different from the weights reported by the users due to the orthogonalization process \\cite{Kim2015}.\n\nAnother practical approach is to compute the steering matrix using linear precoding schemes, e.g. ZFBF or MMSE \\cite{Jones2015}. In \\cite{Cheng2014}, the authors used BD and regularized BD with geometric-mean decomposition for a MU-MIMO scenario. The designs' goal is to balance the achievable SNR across the users, meeting the requirements of the standard. If the number of transmit antennas is larger than the total number of receive antennas, the additional DoF can be used to efficiently nullify inter-stream interference \\cite{Jones2015}. \n\n\n\n{\\color{black}{\n\t\t\n\\subsection{Discussion and Future Directions}\n\\label{section:precoding:massive-mimo} \n\nThe objective of precoding is to achieve spatial multiplexing, enhance link reliability and improve coverage in MIMO systems. Every physically realizable precoding design depends on the objective function, the CSIT accuracy, the number of transmitters involved, and more recently, the hardware characteristics \\cite{Bjornson2014c,Kutty2016,Heath2016}. The schemes described in previous subsections can be classified as \\textit{full digital precoders}, where the signal processing happens in the baseband at sub-6 GHz bands. However, these schemes cannot be directly implemented in state-of-the-art transceiver architectures with many antenna elements, neither upon higher frequency bands, i.e., mmWave \\cite{Heath2016}.\n\n\nMassive MIMO \\cite{Lu2014} differentiates itself from classical MU-MIMO by the fact that the number of antennas at the transmitter is larger compared to the number of served users. In conventional digital precoding, [cf. Section~\\ref{section:precoding:linear}], each antenna element requires a radio frequency (RF) chain, i.e., signal mixer and analog-to-digital converter (ADC). In massive MIMO, although the number of antennas and RF chains is much larger than in conventional MU-MIMO, hundreds of low-cost amplifiers with low output power are used to replace the high power amplifier used in the latter. In order to keep the hardware cost and the circuit power consumption low, cost-effective and power-efficient hardware components are employed, e.g. low resolution ADC. And yet, this results in hardware impairments, especially low resolution quantization, that may affect the system performance. However, recent results and implementations show that the effect of hardware impairments, similarly to the effect of noise and interference, is averaged out due to the excess number of antennas \\cite{Bjornson2014c}. Furthermore, the effect of quantization and AD conversion with very low number of bits can be taken into account in the precoding and signal design, providing schemes with promising spectral efficiency performance. In TDD massive MIMO, the major limiting factors were considered to be pilot contamination and channel reciprocity\/calibration. However, both issues are now well studied and understood, and efficient transceiver designs compensating for pilot contamination and imperfect calibration are available. The major bottleneck for practical implementations of TDD-based massive MIMO remains the amount of training required. High peak rates have been demonstrated in downlink massive MIMO (in TDD and sub-6 GHz bands) with linear and non-linear precoding by several companies. Nevertheless, the amount of uplink training required can reduce the net throughput by at least half. A major challenge for massive MIMO is its successful deployment in FDD systems, in which CSI should be obtained by feedback. Efficient approaches for channel representation and CSI quantization and compression are necessary for viable implementations. Codebook-based approaches would require a relatively high number of bits for channel quantization and feedback, which not only will reduce the net throughput but also is not supported by current standards. Various new approaches for precoding and feedback in FDD massive MIMO are expected in the near future. \n\nThe current trend of using frequencies above 6 GHz for broadband wireless communications put an extra stress to massive MIMO systems. Current MIMO transceiver architectures may not be cost-effective and realistic in mmWave frequencies due to extremely high cost and power consumption. Different transceiver architectures have been recently proposed to address the hardware limitations. These new schemes require the joint optimization of precoding weights in the digital and analog domains, the so called \\textit{hybrid precoding} \\cite{Ayach2014,Gao2015,Kutty2016,Heath2016}. In the digital domain, the low-dimensional precoding weights are computed using microprocessors. In the analog domain the RF precoders are implemented by phase shifters and variable gain amplifiers \\cite{Bogale2015}. \nThe main goal of hybrid precoding schemes is to achieve the performance of full digital precoders, but with a reduced number of RF chains \\cite{Sohrabi2016}. The performance gap between the full digital and hybrid precoders depends on the spatial load at the transmitter, i.e., the ratio between the number of active data streams over the number of RF chains, $M_{RF}$, \\cite{Bogale2016a}. Notice that the number of co-scheduled users per resource is limited by $M_{RF}$ in hybrid transceiver architectures, [cf. Section~\\ref{section:algorithms:aggregated-utility:massive-mimo}]. \nThe optimal design of hybrid precoders has not been fully understood, and due to the power and amplitude constraints the sum-rate optimization problem becomes non-convex \\cite{Gao2016}. Therefore, ongoing research is focused on designing sub-optimal, yet efficient and practical, architectures that improve the joint performance of digital and analog precoders \\cite{Sohrabi2016,Yu2016,Kutty2016,Bogale2016a,Heath2016}. Although hybrid precoding provides a compromise between system performance and hardware complexity, it still remains challenging to implement reliable and cost-effect analog beamforming schemes at mmWave. Despite the complexity reduction using hybrid precoding, the performance gains using fully digital beamforming remain attractive. Hardware complexity may not be the major issue with digital beamforming at mmWave; significant challenges will arise in signal compression and CPRI protocols \\cite{DelaOliva2016}, which will require innovative solutions.\n}}\n\n\n\n\n\\section{Spatial Compatibility Metrics}\n\\label{section:metrics-spatial-compatibility}\n\nLet $\\mathcal{K} \\subseteq \\bar{\\mathcal{K}}$ and $\\mathcal{K}' \\subseteq \\bar{\\mathcal{K}}$ be two sets of user with at least one non-common user, where $\\mathbf{H}(\\mathcal{K})= \\{\\mathbf{H}_{i}\\}_{i \\in \\mathcal{K}}$ and $\\mathbf{H}(\\mathcal{K}')=\\{\\mathbf{H}_{j}\\}_{j \\in \\mathcal{K}'}$ are their associated channels. A metric for spatial compatibility is a function of the CSIT that maps the spatial properties of the multiuser MIMO channels to a positive scalar value quantifying how efficiently such channels can be separated in space \\cite{Maciel2010}, i.e., $f(\\mathbf{H}(\\mathcal{K})):\\mathbb{C}^{ |\\mathcal{K}|N \\times M} \\mapsto \\mathbb{R}_{+}$. \nConsider the two subsets $\\mathcal{K}$ and $\\mathcal{K}'$, a metric of spatial compatibility can be used to estimate the achievable performance of their associated multiuser channels, e.g., having $f(\\mathbf{H}(\\mathcal{K})) > f(\\mathbf{H}(\\mathcal{K}'))$ may imply that $\\mathcal{K}$ is the set that achieves the maximum capacity. The mapping function $f(\\cdot)$ can be used for scheduling purposes, depending on its definition and other system parameters (e.g. SNR regime and $M$), which will be discussed in Section~\\ref{section:algorithms:aggregated-utility:csi-mapping}. \nBelow we provide two definitions related to the design of user scheduling policies. \n\n\n\\begin{definition}\\label{defn:compatible_set_of_users}\n\t\\textit{Spatially compatible users}. A feasible set of users $\\mathcal{K}$, is spatially compatible if the multiuser MIMO channels, $\\mathbf{H}(\\mathcal{K})$, can be separated in the spatial domain by means of beamforming\/precoding.\n\\end{definition}\n\n\\begin{definition}\\label{defn:user_grouping}\n\t\\textit{User grouping}. It is the task of forming a subset of users $\\mathcal{K}$, according a compatibility criterion, e.g. spatial separability in Definition~\\ref{defn:compatible_set_of_users}, to maximize the resource allocation and scheduling efficiency. \n\\end{definition}\n\n{\\color{black}{\n\t\t\nUser grouping can be the initial step in a MU-MIMO scheduling algorithm since the characteristics of the joint channels dictate the transmission reliability and the resource allocation feasibility [cf. Definition~\\ref{defn:resource_feasibility}]. \nIn MU-MIMO scenarios, there exists a correspondence between the precoding capability to reduce IUI and the user grouping technique. The performance achieved by a precoder scheme is determined by the characteristics of the selected multiuser channels, i.e., providing \\textit{spatially compatible users} to the precoding processing block (see Fig.~\\ref{fig:system-processing-blocks}), is fundamental to guarantee high attainable SINRs at the receivers. \nIt is worth mentioning that the vast majority of scheduling algorithms in the literature focuses on constructing sets of users with orthogonal or semi-orthogonal MIMO channels. Yet, for some particular signal designs, the best scheduling strategy is to group users whose channels are parallel or semi-parallel, see \\cite{Jang2011,Christopoulos2013}. This can also be the case in scheduling for non-orthogonal multiple access (NOMA)-MIMO schemes \\cite{Liu2015,Dai2015}, where the notion of spatial compatibility may be revised.\nThe spatial compatibility metrics are used in the MU-MIMO literature to pair users and optimize the performance of a particular utility function. They are also used to quantize the channels in systems with limited feedback rates. \n\n}}\n\n\\subsection{Null Space Projection}\n\\label{section:metrics-spatial-compatibility:projection-spaces}\n\nOne of the objectives of MU-MIMO technology is to multiplex independent data streams to different users, which implies that only a subset of the transmitted data symbols are useful for each co-scheduled user. In such a scenario, a fundamental problem is to mitigate IUI, i.e., suppress the information intended to other receivers. There exist several signal processing techniques that can achieve such a goal, e.g., linear precoding or interference alignment. The effectiveness of such techniques rely upon the characteristics of the subspaces spanned by the MIMO channels, i.e, IUI is a function of the overlapped interference subspaces \\cite{Jafar2011}.\n\nConsider a set of user $\\mathcal{K}$ with $K$ users, let $\\tilde{\\mathbf{H}}_{k} = [\\mathbf{H}_{1}^{T}, \\ldots, \\mathbf{H}_{k-1}^{T}, \\mathbf{H}_{k+1}^{T},\\ldots, \\mathbf{H}_{K}^{T}]^{T}$, be the aggregated interference matrix of the user $k$ such that $M>\\max_{k} \\ \\text{rank}(\\tilde{\\mathbf{H}}_{k})$, which is a necessary condition to suppress IUI \\cite{Wang2006}. Define $\\mathcal{V}_{k} = \\text{Span}(\\tilde{\\mathbf{H}}_{k})$, as the subspace spanned by the channels of the subset of users $\\mathcal{K} \\setminus \\{k\\}$, and let $\\mathcal{V}_{k}^{\\perp} = \\text{Span}(\\tilde{\\mathbf{H}}_{k})^{\\perp}$, be its orthogonal complement subspace. \nIn other words, $\\mathcal{V}_{k}^{\\perp}$ spans the null space of $\\tilde{\\mathbf{H}}_{k}$, i.e., $null(\\tilde{\\mathbf{H}}_{k}) = \\{\\mathbf{x} \\in \\mathbb{C}^{M \\times 1} : \\tilde{\\mathbf{H}}_{k} \\mathbf{x} = \\mathbf{0} \\}$.\nThe channel of the $k$-th user can be expressed as the sum of two vectors $\\mathbf{H}_{k} = \\mathbf{H}_{k}^{(\\parallel)} + \\mathbf{H}_{k}^{(\\perp)}$, each one representing the projection of $\\mathbf{H}_{k}$ onto the subspaces $\\mathcal{V}_{k}$ and $\\mathcal{V}_{k}^{\\perp}$ respectively, as illustrated in Fig.~\\ref{fig:space-projections}. \n\n\nFor all user-level ZF-based precoding schemes described in Section~\\ref{section:precoding:linear}, $\\mathcal{V}_{k}^{\\perp} = \\bigcup_{i=1, i \\neq k}^{K} \\text{Span}(\\mathbf{H}_{i})^{\\perp}$, i.e., $\\mathcal{V}_{k}^{\\perp}$ contains all overlapped interference subspaces of channel $\\mathbf{H}_{k}$. The component $\\mathbf{H}_{k}^{(\\parallel)}$ is related to the signal degradation of the user $k$ due to channel correlation, whereas $\\mathbf{H}_{k}^{(\\perp)}$ defines the \\textit{zero-forcing direction}, i.e. the spatial direction that is free of IUI. The squared magnitude of $\\mathbf{H}_{k}^{(\\perp)}$ is known as the null space projection (NSP), and directly computes the effective channel gain obtained by ZF precoding \\cite{Caire2003}. \n\n\n\n\\begin{figure}[t!]\n\t\\centering\n\t\\includegraphics[width=0.9\\linewidth]{figure5.pdf}\\\\\n\t\\caption{Decomposition of the channel $\\mathbf{H}_{k}$ given by its projection onto the subspaces $\\mathcal{V}_{k}$ and $\\mathcal{V}_{k}^{\\perp}$.}\n\t\\label{fig:space-projections}\n\\end{figure}\n\n\nA common approach in the literature is to define the mapping $f(\\mathbf{H}(\\mathcal{K}))$ as a function of the exact or approximated \\textit{effective channel gains} [cf. Definition~\\ref{defn:effective_channel_gains}]. In other words, the spatial compatibility metric has to consider the precoding scheme, the SNR regime, and the available spatial DoF. Analytical results in \\cite{Lau2006,Chan2007,Shi2012} have shown that the set of users $\\mathcal{K}$ that maximizes the product of their effective channel gains\\footnote{Some works in the literature (e.g. \\cite{Swannack2004,Zakhour2007,Castaneda2014b}) optimize the sum of effective channel gains instead of their product, which yields similar performance for the high SNR and large number of users, i.e. $K \\gg M$.} is also the set that maximizes the sum-rate in the high SNR regime. The NSP has been extensively used for user grouping and scheduling purposes whenever ZF-based precoding is implemented [cf. Section~\\ref{section:algorithms:aggregated-utility}]. Note that a set of spatially compatible users would have large NSP components, which means that their associated channels are semi-orthogonal. \n\nThe computation of NSP for the general MU-MIMO scenario where $\\mathbf{H}_{k} \\in \\mathbb{C}^{N_k \\times M}$ $\\forall k$, can be performed by several approaches, namely SVD \\cite{Golub1996,Gentle2007,Yanai2011,Wang2010,Tran2010}, orthogonal projection matrix \\cite{Golub1996,Yanai2011,Fuchs2007,Caire2003}, Gram-Schmidt orthogonalization (GSO) \\cite{Golub1996,Gentle2007,Yoo2006,Sigdel2009a,Shen2006}, QR decomposition \\cite{Tran2012}, products of the partial correlation coefficients \\cite{Yanai2011,Castaneda2014b}, and ratio of determinants \\cite{Castaneda2014b,Razi2010}. \nSeveral works find sets of spatially compatible users by computing an approximation of the NSP (e.g. \\cite{Fuchs2007,Bjornson2013,Cheng2014,Castaneda2015,Xu2010,Bayesteh2008,Hammarwall2008}), which yields efficient scheduling designs that require low computational complexity.\nMoreover, recent works (\\cite{Manolakos2015} and references therein), have proposed efficient methods to compute and track null spaces for a set of co-scheduled users, which is fundamental to mitigate IUI for ZF-based precoding in single and multiple transmitter scenarios.\n\n\n\\subsection{Spatial Clustering}\n\\label{section:metrics-spatial-compatibility:spatial-clustering}\n\n{\\color{black}{\nSpatial clustering refers to the association of a channel matrix to a spatial subspace. This technique has been used in the literature to perform user\/channel grouping or scheduling in compliance with the precoding scheme and CSIT availability. In feedback limited scenarios, spatial clustering is also used to quantize the channel or precoder weights [cf. Section~\\ref{section:precoding:partial-csit}]. \nLet $\\measuredangle(\\mathbf{H}_{i},\\mathbf{H}_{j})$ denote the angle between i.i.d. channels $\\mathbf{H}_{i},\\mathbf{H}_{j} \\in \\mathbb{C}^{1 \\times M}$, and define the normalized inner product, also known as \\textit{coefficient of correlation}, as \\cite{Gentle2007}:\n}}\n\n\\begin{equation}\\label{eq:coefficient_correlation}\n\\cos (\\measuredangle(\\mathbf{H}_{i},\\mathbf{H}_{j})) = \\frac{|\\mathbf{H}_{i}\\mathbf{H}_{j}^{H}|}{ \\| \\mathbf{H}_{i} \\| \\| \\mathbf{H}_{j} \\|},\n\\end{equation}\nwhere $\\cos(\\measuredangle(\\mathbf{H}_{i},\\mathbf{H}_{j})) \\in [0, 1]$, and $\\measuredangle(\\mathbf{H}_{i},\\mathbf{H}_{j}) = \\frac{\\pi}{2}$, implies that the channels are spatially uncorrelated or orthogonal.\nThe coefficient of correlation indicates how efficiently the transmitter can serve user $i$ without affecting user $j$, and vice versa. For particular MU-MISO scenarios, in which the set of scheduled users is subject to the cardinality constraint $|\\mathcal{K}|=2$, the NSP is a function of $\\sin^2 (\\measuredangle(\\mathbf{H}_{i},\\mathbf{H}_{j}))$, which can be evaluated from (\\ref{eq:coefficient_correlation}) simplifying the user pairing and scheduling design \\cite{Yang2011}. Several works focused on sum-rate analysis (e.g., \\cite{Lu2009,Yang2011,Wang2015}) limit the cardinality to $|\\mathcal{K}|=2$ for simplicity and tractability. Other works analyzed scenarios with more practical constraints and considered two or four users, which are common values of $K$ in standardized systems, see \\cite{Kountouris2008,Lim2013,Jones2015}. \nThe metric (\\ref{eq:coefficient_correlation}) has been extensively used to define policies for user grouping. In MU-MIMO systems a set of user $\\mathcal{K}$ is called $\\epsilon$-orthogonal if $\\cos (\\measuredangle(\\mathbf{H}_{i},\\mathbf{H}_{j})) < \\epsilon$ for every $i \\neq j$ with $i,j \\in \\mathcal{K}$ \\cite{Swannack2004,Yoo2005a,Bayesteh2008}. The users can be grouped into disjoint sets according to a desired threshold $\\epsilon$, and the semi-orthogonal sets can be scheduled over independent carriers (e.g. \\cite{Zhang2005a,Chung2010,Driouch2012}), codes (e.g. \\cite{Driouch2012}), or time slots (e.g. \\cite{Yoo2006}). \nThe optimum value of $\\epsilon$ depends on the deployment parameters ($K$ and $M$) and is usually calculated through simulations, since for $M>2$ it is very hard or impossible to find the optimal $\\epsilon$ in closed-form. Nevertheless, there exist closed-form expressions to compute the ergodic capacity as a function of $\\epsilon$ for MU-MISO scenarios where the transmitter has two antennas $M=2$ and the users have homogeneous \\cite[Ch. 7]{Yang2011} or heterogeneous \\cite{Wang2015} large-scale fading gains.\n\n\n\n{\\color{black}{\nConsider that a codebook, $\\mathcal{F}$, is used to define the CDI of the MIMO channels, i.e., assume partial CSIT, [cf. Section~\\ref{section:precoding:partial-csit}]. In such a scenario, spatial clustering can be performed for a given parameter $\\theta$ and the codeword $\\mathbf{f}_{i} \\in \\mathbb{C}^{1 \\times M}$. Define the hyperslab $\\mathfrak{F}_{i}(\\theta)$ as \\cite{Lee2014}:\n\\begin{equation}\\nonumber\n\t\\mathfrak{F}_{i}(\\theta) =\\left\\{ \\mathbf{H}_{k} \\in \\mathbb{C}^{1 \\times M}, k \\in \\mathcal{K}: \\cos (\\measuredangle(\\mathbf{H}_{k},\\mathbf{f}_{i})) \\leq \\cos(\\theta) \\right\\}.\t\\label{eq:hyperslab}\n\\end{equation}\t\t\nThe hyperslab defines a vector subspace whose elements attain a spatial correlation not greater than $\\cos(\\theta)$, w.r.t. the codeword $\\mathbf{f}_{i}$, as illustrated in Fig.~\\ref{fig:hyperslab_cones}. The parameter $\\cos(\\theta)$ is set to guarantee a target $\\epsilon$-orthogonality. \n}}\nThe generalization of the hyperslab clustering\\footnote{Some authors (e.g., \\cite{Swannack2004,Lau2009}) define $\\mathfrak{F}_{i}(\\theta)$ as a function of two parameters, $\\theta$ and the minimum acceptable channel magnitude. In this way only sets of spatially compatible and strong channels can be constructed.} for MIMO settings is straightforward, i.e. $\\mathbf{H}_{k} \\in \\mathbb{C}^{N_{k} \\times M}$, $\\mathbf{f}_{i} \\in \\mathbb{C}^{M \\times M}$, and the coefficient of correlation between matrices can be defined as in \\cite{Sigdel2009a,Tran2012}. \nThe parameter $\\phi$ shown in Fig.~\\ref{fig:hyperslab_cones} can be adjusted to fix the maximum co-linearity between cones \\cite{Wang2012d}. \n\nSeveral scheduling algorithms based on spatial clustering (e.g., \\cite{Wang2006,Razi2010,Yoo2006,Kountouris2007,Wang2008a,Lau2009,Lu2009,Sun2010,Sohn2010,Mao2012,Tran2012,Min2013,Lee2014}), can achieve MUDiv gains and improve the overall performance by adjusting the parameter $\\theta$ (or threshold $\\epsilon$) according to the number of competing users \\cite{Yoo2006}, the SNR regime, the large-scale fading gain, and the precoding scheme \\cite{Wang2015}. \nIn \\cite{Lau2009}, it was shown that the optimal cardinality of the user set grouped based on spatial clustering is a function of $K$, $\\theta$, and $M$.\nThe statistical properties of (\\ref{eq:coefficient_correlation}) have been extensively studied in the literature cf. \\cite{Mukkavilli2003,Swannack2004,Yoo2006,Jindal2006,Au-Yeung2007,Zhang2007b,Jagannathan2007}, and such properties depend on the type of CSIT (full or partial), the MIMO channel distribution, and the system parameters (e.g. $M$ and $B$). \n\n\\begin{figure}[t!]\n\t\\centering\n\t\\includegraphics[width=0.8\\linewidth]{figure6.pdf}\\\\\n\t\\caption{The channels $\\{\\mathbf{H}_{j}\\}_{j=1}^{K}$ can be clustered within cones given a set $\\mathcal{F} = \\{\\mathbf{f}_{1},\\mathbf{f}_{2},\\mathbf{f}_{3}\\}$ formed either by orthonormal basis or codebook words. }\n\t\\label{fig:hyperslab_cones}\n\\end{figure}\n\n\n\n\\subsection{Compatibility between Subspaces}\n\\label{section:metrics-spatial-compatibility:other-metrics}\n\n{\\color{black}{\nIn heterogeneous MU-MIMO scenarios where each user is equipped with $N_{k}$ antennas $\\forall k$, the signal spaces span several dimension and mutual interference between user can be measured either in the angular or in the subspace domains \\cite{Wang2006,Yi2011}. Moreover, metric (\\ref{eq:coefficient_correlation}) cannot be used directly in heterogeneous MU-MIMO scenarios to measure spatial correlation between channels of different dimensions, thus, several alternative metrics have been proposed in the literature.}}\nConsider a set of users $\\mathcal{K}$ and its MU-MIMO channel $\\mathbf{H}(\\mathcal{K})$; the spatial compatibility can be measured as a function of the corresponding eigenvalues:\n\\begin{enumerate\n\t\n\t\\item The \\textit{orthogonality defect} \\cite{Bayesteh2008} is a metric derived from Hadamard's inequality \\cite{Cover2006} that measures how close a basis is to orthogonal. It quantifies the energy degradation of the channel matrix due to the correlation between all its column vectors. User grouping algorithms based on this metric have been developed for homogeneous MIMO systems, e.g. \\cite{Tran2010,Castaneda2014b}. \n\t\n\t\\item The determinant geometrically represents the volume of the parallelepiped defined by the column vectors of the channel matrix. Larger determinant values implies that the column vectors of a matrix are more orthogonal \\cite{Gentle2007}. The \\textit{matrix volume ratio} used in \\cite{Wang2010a,Castaneda2015} measures the volume reduction of $\\mathbf{H}(\\mathcal{K})$ w.r.t. $\\mathbf{H}(\\mathcal{K} + \\{k'\\})$, where $k' \\notin \\mathcal{K}$ is a candidate user attempting to be grouped. Different approximations of such a metric can be done using the arithmetic-geometric mean inequality over the squared singular values of $\\mathbf{H}(\\mathcal{K})$, e.g., \\cite{Xu2009a,Castaneda2014b}.\n\t\n\t\\item The \\textit{geometrical angle} (see \\cite{Yi2011,Nam2014a} and references therein), is a metric similar to the matrix volume ratio that measures the spatial compatibility as a function of the all possible correlation coefficients [cf. (\\ref{eq:coefficient_correlation})] between the basis of two subspaces. It can be computed from the eigenvalues of two MIMO matrices $\\mathbf{H}_{i} \\in \\mathbb{C}^{N_{i} \\times M}$, $\\mathbf{H}_{j} \\in \\mathbb{C}^{N_{j} \\times M}$, whose subspaces have different dimensions, i.e., $N_{i} \\neq N_{j}$.\n\t\n\t\\item If the elements of a multiuser channel matrix are highly correlated, the matrix is said to be ill-conditioned, i.e., it is close to singular and cannot be inverted. In numerical analysis, the \\textit{condition number} \\cite{Gentle2007} quantifies whether a matrix is well- or ill-conditioned, and is computed as the ratio between the maximum and minimum eigenvalues. This metric is used to measure how the eigenvalues of $\\mathbf{H}(\\mathcal{K})$ spread out due to spatial correlation. The ratio between the condition numbers of two MIMO channels can be used to quantify their spatial distance and compatibility \\cite{Czink2009}. \n\\end{enumerate}\t\n\nFor a given user $k \\in \\mathcal{K}$, the spatial compatibility between $\\mathbf{H}_{k}$ and $\\tilde{\\mathbf{H}}_{k}$, can be measured by a function of $\\theta_{\\mathcal{V}_{k}\\mathbf{H}_{k}}$, which is the angle between $\\mathcal{V}_{k}$ and $\\text{Span}(\\mathbf{H}_{k})$, see Fig.~\\ref{fig:space-projections}. The following metrics assess the spatial compatibility based on geometrical properties of the multiuser channels:\n\\begin{enumerate\n\t%\n\t\\item The \\textit{principal angle between subspaces} \\cite{Wang2006,Yi2011,Nam2014a} measures the relative orientation of the basis of $\\mathcal{V}_{\\mathbf{H}_{k}} = \\text{Span}(\\mathbf{H}_{k})$ regarding the basis of $\\mathcal{V}_{\\tilde{\\mathbf{H}}_{k}} = \\text{Span}(\\tilde{\\mathbf{H}}_{k})$. Given the bases of $\\mathcal{V}_{\\mathbf{H}_{k}}$ and $\\mathcal{V}_{\\tilde{\\mathbf{H}}_{k}}$, the principal angle is associated with the largest coefficient of correlation [cf. (\\ref{eq:coefficient_correlation})] between the bases of both subspaces.\n\n\t\\item The \\textit{chordal distance} is extensively used in limited feedback systems for codebook design \\cite{Barg2002,Love2003}, user grouping and scheduling \\cite{Chae2008,Yi2011,Ko2012,YiXu2014}. This metric can be computed either from the principal angles between subspaces or from the projection matrices of $\\mathcal{V}_{\\mathbf{H}_{k}}$ and $\\mathcal{V}_{\\tilde{\\mathbf{H}}_{k}}$ in heterogeneous MU-MIMO scenarios, i.e., $N_{i} \\neq N_{j}$ $\\forall i, j \\in \\mathcal{K}$ with $i \\neq j$. \n\t%\n\t\\item The \\textit{subspace collinearity} \\cite{Czink2009,Yi2011} quantifies how similar the subspaces spanned by two channel matrices are, following the rationale behind (\\ref{eq:coefficient_correlation}). Given $\\mathbf{H}_{i}, \\mathbf{H}_{j} \\in \\mathbb{C}^{N \\times M}$ the subspace collinearity of the matrices compares the singular values and the spatial alignment of their associated singular vectors. \n\t%\n\t\\item Other metrics measuring the distance between subspaces are the \\textit{weighted likelihood similarity measure}, the \\textit{subspace projection measure}, and the \\textit{Fubini-Study similarity metric}. These metrics have been recently propounded in \\cite{YiXu2014} and used for user grouping based on statistical CSI, i.e., $\\mathbf{\\Sigma}_{k} \\ \\forall k$.\t\n\t%\n\\end{enumerate}\n\n\n{\\color{black}{\t\t\n\\subsection{Discussion}\n\\label{section:metrics-spatial-compatibility:discussion}\n\nIt is worth mentioning that neither the principal angles, nor the chordal distance can fully measure spatial compatibility in heterogeneous MU-MIMO scenarios. This is due to the fact that these metrics take into account the smallest dimension between two subspaces, potentially neglecting useful spatial correlation information \\cite{Yi2011}. Moreover, metrics that only evaluate the spatial separation between hyperplanes or the eigenvalue dispersion of $\\mathbf{H}(\\mathcal{K})$ neglect the degradation of the MIMO channel magnitude due to the interference subspace. Such metrics fail at maximizing the capacity since they do not evaluate or approximate the effective channel gain \\cite{Ko2012}. As the number of active users grows, the set of users that maximizes a given spatial compatibility metric may diverge from the set that maximizes the capacity, either in their elements, cardinalities, or both \\cite{Yi2011,Castaneda2014b}.\n\n \nAuthors in \\cite{Wang2010a} pointed out that user grouping should be a function of the spatial correlation between $\\mathbf{H}_{k}$ and $\\tilde{\\mathbf{H}}_{k}$, and also consider the inner correlation of each multi-antenna user, i.e., the magnitudes of the eigenvectors of $\\mathbf{H}_{k}$ $\\forall k$.\nAccording to \\cite{Vu2007,Jorswieck2006,Godana2013a}, the precoding performance is primarily affected by the correlation between transmit antennas, whereas receive antenna correlation has marginal or no impact on the precoding design. Nonetheless, the effects of receive antenna correlation has not been fully studied in the user selection literature and conclusions are usually drawn based on specific correlation models. \nThe knowledge of statistical CSI, i.e., $\\mathbb{E}[\\mathbf{H}_{k}^{H} \\mathbf{H}_{k}]$, may be assumed in scenarios with practical constraints such as limited feedback rates [cf. Section~\\ref{section:precoding:partial-csit}]. If the transmitter has knowledge of statistical CSI, the dominant eigen-directions of the channel covariance matrix ($\\mathbf{\\Sigma}_{k}$, $\\forall k$) can be used as metrics to identify compatible users, e.g., \\cite{Kountouris2006b,Hammarwall2008,Gao2009,Li2016,YiXu2014,Adhikary2013a,Nam2014}. Spatial clustering based on $\\mathbf{\\Sigma}_{k}$, $\\forall k$, has been recently proposed to identify users with similar channel statistics in massive MIMO settings, see \\cite{YiXu2014,Nam2014,Zheng2015}. \n\n}}\n\n\n\n\n\\section{System Optimization Criteria}\n\\label{section:performance-uf}\n\n\n\n\\begin{table*}[t!] \\scriptsize\n\t\\renewcommand{\\arraystretch}{1.3}\t\n\t\\caption{Summary of System Optimization Criteria for Scheduling in MISO ($N=1$) and MIMO ($N>1$) configurations with full ($B=\\infty$) and partial ($B<\\infty$) CSIT. QoS refers to SINR, BER, or Queue Stability requirements}\n\t\\label{tab:optimization-criteria\n\t\\centering\t\t\n\t\\begin{tabularx}{\\textwidth}{l *{5}{>{\\centering\\arraybackslash}X} } \n\t\t\\toprule\t\t\n\t\t& \\textbf{Sum Rate} & \\textbf{Fairness} & \\textbf{WSR} & \\textbf{QoS} & \\textbf{Round Robin} \\\\\n\t\t\\midrule\n\t\t\\textbf{MISO}, $B=\\infty$ & \\cite{Dimic2005, Huang2013, Tu2003, Wang2008a, Yoo2006, Jiang2006, Dai2009, Lee2014, Adhikary2013, Huang2012b, Razi2010, Mao2012, Bjornson2014, Shi2012, Maciel2010, Driouch2012, Yoo2005a, Christopoulos2013, Xia2009, Lau2005a, Cottatellucci2006, Wang2015, Yang2011, Boccardi2006, Zhang2007b, Dartmann2013, Castaneda2015, Jang2011, Park2014, Ku2015,YiXu2014,Bogale2015,Lee2014c} & \\cite{Moon2013, Yoo2006, Maciel2010, Driouch2012, Christopoulos2013, Lau2005a, Lee2014, Dartmann2013, Seifi2011,YiXu2014,Liu2015a} & \\cite{Jagannathan2007, Hammarwall2007, Huh2012,Hammarwall2008,Liu2014a} & \\cite{Jagannathan2007, Maciel2010, Chung2010, Stridh2006a, Matskani2008, Koutsopoulos2008, Destounis2015, Swannack2004, Tsai2008, Shirani-Mehr2011, Song2008, Chung2010, Koutsopoulos2008,Christopoulos2013,Kountouris2006b} & \\cite{Yoo2006, Cottatellucci2006, Lee2014, Dartmann2013, Jang2011,Liu2015a} \\\\\n\t\t\\midrule\n\t\t\\textbf{MISO}, $B<\\infty$ & \\cite{Jindal2006, Wagner2008, Nam2014, Lee2014, Adhikary2013, Adhikary2013a, Maciel2010, Xia2009, Zorba2008, Yang2011, Zakhour2007, Tang2010, Huang2009a, Vicario2008, Yoo2007, Kountouris2007, Kountouris2008, Dai2008, Kountouris2006, Zhang2011, Ravindran2012, Kountouris2006a, Wang2007a, Choi2007c, Min2013, Sohn2010, Kountouris2005a, Huang2007, Sohn2012, Khoshnevis2013,Xu2009a} & \\cite{Moon2013, Adhikary2013a, Wagner2008, Zorba2008, Lee2014, Huang2012a, Shirani-Mehr2010, Kountouris2008a, Kountouris2005, Xu2010, Khoshnevis2013,Xu2009a} & \\cite{Conte2010, Shirani-Mehr2010, Kobayashi2007} & \\cite{Huang2012a, Shirani-Mehr2010, Simon2011,Tang2010,Lau2009,Kountouris2006b} & \\cite{Lee2014, Zhang2011,Simon2011} \\\\\n\t\t\\midrule\n\t\t\\textbf{MIMO}, $B=\\infty$ & \\cite{Bayesteh2008, Shen2006, Wang2010, Bayesteh2008, Ko2012, Elliott2009, Chan2007, Tran2010, Wang2010a, Nam2014a, Zhang2009, Park2010, Lossow2013,Fuchs2007, Tejera2006, Wang2006, Chen2008, Sigdel2009a, Yi2011, Sun2010, Tran2012, Elliott2012, Hei2009, Lim2009, Cheng2014} & \\cite{Elliott2009, Nam2014a, Torabzadeh2010, Cui2011a, Yu2013,Fuchs2007, Sigdel2009a, Cheng2014, Aniba2007} & \\cite{Tran2012} & \\cite{Souihli2010, Moretti2013,Zhang2005a, Aniba2007,Chen2007a} & \\cite{Wang2010, Bayesteh2008, Chan2007,Fuchs2007} \\\\\n\t\t\\midrule\n\t\t\\textbf{MIMO}, $B<\\infty$ & \\cite{Sharif2005, Chae2008, Trivellato2008, Jindal2008, Nam2014a,Fuchs2007, Wang2006, Rico-Alvarino2014, Wang2012d, Zhang2007a} & \\cite{Fan2014, Nam2014a, VanRensburg2009, Hosein2009,Fuchs2007, Rico-Alvarino2014} & \\cite{Schellmann2010} & \\cite{Chen2013,Zhang2005a,Rico-Alvarino2014} & \\cite{Fuchs2007,Jindal2008} \\\\\n\t\t\\bottomrule\n\t\\end{tabularx}%\n\\end{table*}%\n\n\nThe optimization criteria determines the optimal resource allocation strategy \\cite{Jorswieck2006}, and can be classified in two groups according to the objective function and constraints \\cite{Lau2006}. \\textit{i}) \\textit{PHY layer} based criteria, where a objective function, $U(\\cdot)$, must be optimized and channel information is the only input to the resource allocation algorithms. \\textit{ii}) \\textit{Cross layer} based criteria, where optimization of $U(\\cdot)$, takes into account QoS requirements (defined by upper layers) and channel information, see Fig.~\\ref{fig:system-processing-blocks}.\nThis section presents an overview and classification of the objective functions (criteria), and their associated constraints in the MU-MIMO literature. A summary of the content and general organization of this section are presented in Fig.~\\ref{fig:utility-functions-and-constraints} and Table~\\ref{tab:optimization-criteria}.\nTwo relevant concepts in multiuser system optimization are defined below.\n\n{\\color{black}{\n\\begin{definition}\\label{defn:resource_feasibility}\n\t\\textit{Resource allocation feasibility}. For given a set of users $\\mathcal{K}$, a resource allocation strategy is called feasible if it fulfills all individual and global constraints (e.g. power and QoS), implementing precoding, power control, or a combination of both.\n\\end{definition}\n\n\\begin{definition}\\label{defn:feasible_set_of_users}\n\t\\textit{Feasible set of users}. Given the set of all competing users $\\bar{\\mathcal{K}}$, the subset $\\mathcal{K} \\subseteq \\bar{\\mathcal{K}}$, is called feasible if there exist precoding weights and powers, $\\forall k \\in \\mathcal{K}$, such that $U(\\cdot)$ has a solution meeting individual QoS and power constraints.\n\\end{definition} \n\n}}\n\n\n\\begin{figure}[t!]\n\t\\centering\n\t\\includegraphics[width=0.98\\linewidth]{figure7.pdf}\\\\\n\t\\caption{Utility Functions and constraints for PHY layer and cross layer based optimization in MU-MIMO systems} \n\t\\label{fig:utility-functions-and-constraints}\n\\end{figure}\n\n\n\\subsection{Weighted Sum Rate (WSR) Maximization}\n\\label{section:performance-uf:weighted-sum-rate}\n\n\n\nThe system optimization is achieved by maximizing the sum of individual utility functions, $U_{k}(\\cdot)$, $\\forall k \\in \\mathcal{K}$, subject to a set of power constraints and set cardinality ($|\\mathcal{K}|$). \nGlobal optimization based on concave and differentiable utility functions is desirable, since efficient numerical methods can be applied to guarantee optimality. A common family of functions studied in the literature is defined by the $\\alpha$\\textit{-fair} utility function \\cite{Kelly1997,Mo2000,Hong2012}, which can be used to characterize the objective of the resource allocation strategies.\n\nThe $\\alpha$\\textit{-fair} function is mathematically expressed as \\cite{Mo2000}:\n\n\\begin{subnumcases}{ U\\left( \\{{R}_{k}\\}_{k=1}^{K} \\right) =}\n\\sum_{k=1}^{K} \\log({R}_k), & \\text{if $\\alpha=1$} \\label{eq:alpha-fair-utility-function-1}\n\\\\\n\\sum_{k=1}^{K} \\frac{ ({R}_k)^{1-\\alpha} }{ 1-\\alpha }, & \\text{otherwise} \\label{eq:alpha-fair-utility-function-2} \n\\end{subnumcases}\nwhere ${R}_k$ denotes the achievable transmission rate of the $k$-th user. \nChanging the values of $\\alpha$ yields different priorities to the users, and can be used to define performance tradeoffs (e.g. throughput-fairness). For instance, $\\alpha = 1$, yields maximum fairness, $\\alpha = 0$, generates the sum-rate utility, and $\\alpha \\rightarrow \\infty$ defines the minimum-rate function. These functions are, in general, non-concave,\\footnote{For instance, non-concave utility functions may arise in the context of real-time applications with hard QoS constraints \\cite{Utschick2012}.} and several methods have been developed to optimize them subject to power and QoS constraints, see \\cite{Hong2012} for an in-depth review. \n\n\nA more common formulation of the weighted sum rate in MU-MIMO scenarios is given by the following expression: \n\n\\begin{equation}\\label{eq:weighted-sum-rate-function}\nU\\left( \\{{R}_{k}\\}_{k=1}^{K} \\right) = \\sum_{k=1}^{K} \\omega_{k} {R}_{k}\n\\end{equation}\nwhere $\\omega_{k}$ is a non-negative time-varying weight, which defines the priority of the $k$-th user. This expression is related to the $\\alpha$-fair function, e.g. if $\\omega_{k}=1$, then (\\ref{eq:weighted-sum-rate-function}) converges to (\\ref{eq:alpha-fair-utility-function-2}) with $\\alpha = 0$. The dynamic adaptation of $\\omega_{k}$ can provide different levels of fairness (temporal, utilitarian, rate-proportional, fair-queuing, etc.) over the resource allocation at the \\textit{user level} \\cite{Lau2005}. \n\n\nAnother approach to provide fairness is defining $U\\left( \\{{R}_{k}\\}_{k=1}^{K} \\right)$ as a function of the rates' statistics. For instance, one might use the cumulative distribution function (CDF) of ${R}_{k}$ $\\forall k$, which can be empirically estimated at the transmitter \\cite{Park2005,Kountouris2008a}. \nFairness at the \\textit{system level} is another optimization criterion, measured over the average rates, transmit powers, time-slots, or any other allocated resource. Different metrics to quantify fairness can be found in the literature of resource allocation \\cite{HuaizhouShi2014}. For a single resource, one can use the Gini index \\cite{Bartolome2006}, Jain's index \\cite{Jain1984}, or other fairness measures in \\cite{Lan2010} and reference therein. Generalized fairness metrics over multiple resources allocated simultaneously were defined in \\cite{Joe-Wong2013,HuaizhouShi2014} and references therein.\nThe weights in (\\ref{eq:weighted-sum-rate-function}) might be determined by upper layer requirements, such as buffer sizes, traffic\/service priority, packet loads, or any other QoS-related metric. The individual weights affect the scheduling decisions, and can be used to improve precoding design \\cite{Park2012a}.\n\n\n\nA special case of (\\ref{eq:weighted-sum-rate-function}) is given by setting $\\omega_{k}=1$ $\\forall k$, which represents the sum rate. This criterion defines the maximum amount of error-free information successfully received by a set of co-scheduled users, regardless of fairness \\cite{Goldsmith2005}. \nThe resource allocation strategies are usually assessed in terms of sum rate, since it quantifies the effectiveness of an algorithm and simplifies scheduling rules. However, maximizing the sum rate in scenarios where the users have heterogeneous SNRs might be very inefficient, since users with poor channel conditions would experience starvation \\cite{Yoo2006,Jagannathan2007}. A classical solution to such a problem is assigning the weights $\\omega_{k} \\ \\forall k$, according to a fairness criterion.\nThe works listed under the \\textit{fairness} category in Table~\\ref{tab:optimization-criteria}, optimize the long-term proportional fairness, extending the original idea from \\cite{Chaponniere2002,Viswanath2002} to MU-MIMO scenarios. \n\n\nRound robin is a channel-unaware scheduling method, that allocates the same amount of time to all competing users. It is the simplest form of fair resource-access, but neglects MUDiv, the amount of occupied resources, and QoS requirements \\cite{Capozzi2013,Lee2014b}. Equal opportunity for resource sharing may not mean equal distribution of resources, which results in wastage, redundant allocation, or resource starvation \\cite{HuaizhouShi2014}. Nonetheless, round robin might be useful in ultra dense heterogeneous networks, where transitions from non-LoS to strong LoS channels alter the performance of conventional resource allocation strategies \\cite{Lopez-Perez2015}. The works listed under the round robin category in Table~\\ref{tab:optimization-criteria}, use the method as a benchmark to assess MUDiv gains in MU-MIMO systems.\nIt is worth mentioning that in the reviewed literature, the system performance is assessed over a large number of channel realizations. For example, using the average sum rate per channel use, also called spectral efficiency, measured in bit\/s\/Hz. Other common performance metrics are \\cite{Feng2013}: the \\textit{throughput} or average rates achieved for packet transmission with practical modulations and realistic coding schemes; and the \\textit{goodput}, which is the total average rate successfully delivered to the scheduled users, including layer 2 overheads and packet retransmission due to physical errors \\cite{Capozzi2013}.\n\n\n\\subsection{WSR with QoS Optimization}\n\\label{section:performance-uf:wsr-with-qos}\n\nThe WSR optimization problem can incorporate different types of QoS requirements. The QoS defines a network- or user-based objective [cf. Definition~\\ref{defn:quality-of-service}], and the weights $\\omega_{k} \\ \\forall k$, establish priorities according to the service provided to each user.\nTaking into account QoS requirements reduces the flexibility of the resource allocation strategies. For instance, in the case of opportunistic transmission, achieving a target QoS reduces the value of CSIT, i.e., the channel conditions have to be weighted by requirements coming from the upper layers \\cite{Gesbert2007a}. System optimization considering QoS has a broader scope and once information from upper layers is considered, a more complex cross-layer optimization problem arises.\n\nThe QoS is defined according to the system model, which might include individual traffic characteristics or SINR requirements. Satisfying QoS requirements can be realized at different time granularities: each user must achieve a prescribed performance metric, e.g. instantaneous SINR or data rate \\cite{Schubert2006}; or a network performance metric must reach a stable behavior over time, e.g. attaining finite buffer sizes \\cite{Kobayashi2007}. Below, we provide a classification of the optimization criteria subject to QoS constraints in MU-MIMO scenarios.\n\n\n\n\\subsubsection{Target SINR and Error Rates}\n\\label{section:performance-uf:qos:target-rates}\n\nThe QoS can be guaranteed as long as individual SINR requirements are met, which also satisfies target error and peak rates. The QoS can be defined by a monotonic and bijective function of the SINR: one example is the bit error rate (BER), given a particular modulation and coding scheme (MCS) \\cite{Tsai2008,Chung2010}; another example is the Shannon capacity \\cite{Schubert2006}. \nDifferent tradeoffs between global and individual performance are achieved under SINR constraints: maximizing the WSR \\cite{Weeraddana2012}, max-min weighted SINR \\cite{Schubert2004,Bartolome2006,Cai2011,Tan2012,Stanczak2009}, sum power minimization \\cite{Schubert2004,Schubert2006,Zhang2007b,Hong2012}, and other hybrid formulations, see \\cite{Hong2012} and references therein. \n\nIt is worth noticing that in systems with SINR requirements, it is usually assumed that for each channel realization, a set of compatible users $\\mathcal{K}$ has been previously selected. The system optimization is realized by power allocation and precoder design \\cite{Weeraddana2012}. This means that $\\mathcal{K}$ must be a feasible set of users [cf. Definition~\\ref{defn:feasible_set_of_users}], and user scheduling is required only if the constraints associated with $\\mathcal{K}$ are infeasible \\cite{Stanczak2009,Hong2012}. In that case, it is necessary to relax the initial conditions taking one of the following actions: \n\n\\begin{enumerate\n\t\\item Reducing the number of selected users applying \\textit{admission control} \\cite{Ahmed2005,Stridh2006a,Bartolome2006} or \\textit{user removal} schemes \\cite{Koutsopoulos2008,Mahdavi2010, Maciel2010,Castaneda2013}. These procedures are implemented in systems where the achievable SINRs take any positive real value, e.g. \\cite{Schubert2004,Caire2006,Zhang2007b,Cai2011,Tan2012}. The removal process can be thought as a form of scheduling, used to generate a feasible set of users [cf. Definition~\\ref{defn:feasible_set_of_users}]. By identifying users with unfeasible constraints, one can drop them temporarily (according to priorities), or re-schedule them over orthogonal resources (e.g. other carriers or time slots) \\cite{Wang2007}.\n\t\\item By relaxing the individual QoS requirements $\\forall k \\in \\mathcal{K}$, one can achieve resource allocation feasibility [cf. Definition~\\ref{defn:resource_feasibility}]. For instance, consider homogeneous target rates, then all scheduled users can be balanced to a common SINR \\cite{Koutsopoulos2008}. For heterogeneous QoS, one can iterate over different SINR levels per user (e.g. provided a set of MCSs), so that link adaptation can take place, see \\cite{Weeraddana2012,Castaneda2013,Destounis2015,Bartolome2006}. \n\\end{enumerate}\n\nCross-layer algorithms subject to rate constraints can be designed so that $\\mathcal{K}$ and its associated resources are jointly optimized. Analytical results in \\cite{Lau2009} show that under mild conditions, there exists, with probability one, a feasible set of users $\\mathcal{K}$ that can be found though low-complexity algorithms [cf. Section~\\ref{section:algorithms:aggregated-utility}]. \n\nThe transmission errors (bit, frame, symbol, packet) are usually due to noisy channels and inaccurate CSIT. For the former factor, the errors occur due to the effect of non-ideal channel coding and finite blocklength channel coding. The error rates can be reduced by implementing stronger channel codes and longer blocklengths.\\footnote{In practice, for reasonable block length (e.g. 8 kbits) and strong coding (e.g. LDPC), the Shannon capacity can be approached to within 0.05 dB for a target FER of 10$^{\u22123}$ \\cite{Lau2005a,Tse2005,Lau2009}.} The error rates also occur due to CSI quantization (limited feedback), estimation errors, delays (channel outage), and distortion during the feedback \\cite{Shirani-Mehr2010,Zhang2011,Kobayashi2011}. Therefore, IUI cannot be fully suppressed by precoding techniques [cf. Definition~\\ref{defn:interference-limited-system}], which degrades the achievable SINRs and BER figures. Nonetheless, multi-antenna receivers can implement efficient processing techniques to increase their SINRs and combat quantization errors, e.g., quantization-based combining (QBC) \\cite{Jindal2008}. Under partial CSIT conditions, any practical rate adaptation scheme achieves performance between the worst-case outage rate and the ideal-case, where the achievable rate equals the mutual information \\cite{Shirani-Mehr2010}.\n\n\n\n\\subsubsection{Queue Stability in MU-MIMO Scenarios}\n\\label{section:performance-uf:qos:queue-delay-stability}\n\nA network-based optimization requires cross-layer algorithms taking as inputs the queue state information (QSI), CSIT, and their inter-dependence \\cite{Swannack2004}. There exist a rich literature on optimization subject to queue or packet delay constraints, specially for systems with orthogonal resource allocation (e.g. one user per time-slot or sub-carrier), see \\cite{Wang2007,Capozzi2013,Asadi2013} for an in-depth overview. \nAccording to the QSI relevance, MU-MIMO systems fall in two categories \\cite{Lau2006,Kobayashi2007}:\n\n\\begin{enumerate\n\t\\item \\textit{Systems with infinite backlogs}: \n\t%\n\tIn this scenario, the transmitter is assumed to always have data to send and infinite buffer capacity. In other words, the transmitter fully knows the intended data for each user. The objective of the resource allocation strategies is, in general, to maximize the WSR [cf. Section~\\ref{section:performance-uf:weighted-sum-rate}]. The weight $\\omega_{k}$ of the $k$-th user is used to reach a desired throughput-fairness tradeoff, instead of expressing the urgency of data flows. Thus, it can be assumed that the queues are balanced and users cannot be discriminated based on them \\cite{Swannack2004}. The service provided is delay-insensitive, and the traffic is managed so that the scheduled users attain non-zero rates \\cite{Souihli2010}. MU-MIMO systems without QSI information fall into this category.\n\t%\n\t\\item \\textit{Systems with bursty traffic and limited buffer size}: \n\t%\n\tIn these systems, packet data models with stochastic traffic arrivals are considered. The performance assessment is analyzed from the delaying and queuing perspectives. The WSR maximization attempts to balance between opportunistic channel access and urgency of data flows. The resource allocation algorithm must guarantee finite average buffer occupancy, i.e., \\textit{stability of the queues lengths} for all users \\cite{Caire2006,Chen2013}. It is worth mentioning that by Little's theorem \\cite{Lau2006,Wang2007,Chen2013}, achieving stability in the average queues is equivalent to minimize the average packet delay in the steady state.\\footnote{For systems with queue or delay requirements, a channel\/QoS-aware scheduling algorithm must be supported by admission control mechanisms in order to guarantee feasibility \\cite{Capozzi2013}.} The system model might consider different sources of delay, e.g., buffer congestion or destination unavailability (outage delay), which define the type of scheduling policy to be implemented \\cite{Souihli2010}. The choice of the system model and problem formulation depend on the desired tradeoff between tractability and accuracy in each particular scenario \\cite{Lau2006}.\n\\end{enumerate}\n\n\nIn MU-MIMO systems where queue stability is optimized, the scheduling algorithm has to guarantee that the average queue lengths of all users are bounded. Simultaneously, the available CSIT should be opportunistically exploited for throughput maximization \\cite{Caire2006}. \nThis goal can be achieved by establishing queue-based WSR as the optimization criterion. The weights $\\omega_{k}$ in (\\ref{eq:weighted-sum-rate-function}) can be defined according to the system requirements: considering the packet queue length or packet departure rates at each scheduling interval \\cite{Swannack2004,Shirani-Mehr2010,Huang2012a,Chen2013,Destounis2015}; considering fairness with heterogeneous traffic rates \\cite{Torabzadeh2010,Tan2012}; or considering service-oriented requirements, e.g., BER, delay tolerance, and packet dropping ratio for real- or non-real-time services \\cite{Chung2010,Souihli2010,Tsai2008}. \nThe queue lengths not only define the priority or urgency of the traffic, but they can also define the encoding order, $\\pi(\\cdot)$ in (\\ref{eq:general-combinatorial-problem:cost-function}), see \\cite{Swannack2004,Caire2006,Destounis2015}. In general, queue lengths are not symmetric or balanced, which means that the WSR optimization is dominated by the QSI, rather than by the CSIT \\cite{Swannack2004,Huang2012a}. \n\n\n\nThe characteristics of the MU-MIMO system model and the set of constraints define the resource allocation strategy that achieves stability. Several factors may affect the performance under QoS constraints: CSIT accuracy \\cite{Huang2012a,Chen2013}, CSIT statistics \\cite{Shirani-Mehr2010}, and the number of resources used for channel estimation \\cite{Destounis2015}; the spatial compatibility between co-scheduled user and the SNR regime \\cite{Swannack2004}; the user priority based on the type of service \\cite{Tsai2008,Chung2010}; or the number of simultaneous spatial streams \\cite{Souihli2010}.\nThe overall optimization can also consider delays due to packet losses and retransmissions. This is supported by ACK\/NAK (handshake) signaling exchange in the upper layers. Such a protocol is used for automatic repeat request (ARQ), to convey an error-free logical channel to the application layers \\cite{Love2008}. Works in \\cite{Shirani-Mehr2010,Shirani-Mehr2011} and references therein, discuss algorithms to solve the WSR with queue constraints taking into account ARQ protocols. We refer the reader to \\cite{Lau2006,Georgiadis2006} for a comprehensive texts on cross-layer design under queue and delay constraints. \n\n\n\n{\\color{black}{\n\n\\subsection{Discussion and Future Directions}\n\\label{section:performance-uf:discussion}\n\nThe sum-rate maximization is the main criterion to assess conventional cellular system, specially in scenarios with scarce and expensive radio resources, e.g., crowded sub-6 GHz bands. Conventional cellular planning usually considers few high-power transmitters that provide high spectrum efficiency, at expense of other performance metrics, such as energy efficiency (EE) \\cite{Tombaz2011}. 5G mobile communications will include dense deployments, operating at higher frequencies, i.e., mmWave, and with very heterogeneous radio resources per base station \\cite{Andrews2014,Baldemair2015,Nguyen2015a}.\nThe criteria presented in Sections~\\ref{section:performance-uf:weighted-sum-rate} and \\ref{section:performance-uf:wsr-with-qos} are used to define single objective functions subject to a set of constraints. However, 5G networks will require the simultaneous optimization of multiple criteria: peak data rates, traffic and user load across the network, fairness, quality of service and experience, EE, etc. These multiple objectives are usually coupled in a conflicting manner, such that optimization of one objective degrades the other objectives. \n\n\nOne approach to find a tradeoff between objectives is by deriving an explicit expression that can be used as a single objective function. For instance, EE has been jointly optimized with peak rates, WSR, or load balance in heterogeneous networks, see \\cite{Li2015,Yang2015a,Liu2016,Nguyen2015a} and references therein. Fundamental tradeoffs among EE and delay, sum rate, bandwidth and deployment cost have been derived in \\cite{Chen2011d}. Balancing fairness and spectral efficiency is a well known problem strived for wireless communications \\cite{HuaizhouShi2014}, and several works have formulated its joint optimization as a single objective function, e.g., \\cite{HoTingCheng2008,Sediq2013,BinSediq2014}. To illustrate several conflicting objectives, consider that allocating resources to users with strong channels can satisfy QoS requirements and improve EE. However, it might also incur in unfair resource distribution across users and unbalanced load among BSs. Now assume that all users have equally good channels, and transmitting low traffic loads to all users increases the coverage area, but this might be very energy inefficient. Unconstrained EE maximization may result in operating points with low spectral efficiency per user \\cite{Bjornson2016a}. \n\n\nAnother approach for the joint optimization of multiple objectives, is to sample the solution space and chose the operative point that satisfies a predefined tradeoff. A mathematical framework to address multi-objective optimization problems for wireless communications has been proposed in \\cite{Bjornson2013,Bjornson2014a}. The solution space of such kind of mathematical problems, generally, does not have a unique point that can optimally satisfy all objectives. The main challenges are to characterize and understand efficient operating points within the solution space, so that the objectives are balanced.\nAuthors in \\cite{Bjornson2014a} provide an example of this approach by jointly optimizing individual peak rates, average area rates, and EE for a massive MIMO setting. Numerical results illustrate the conflicting nature of the objectives: the average area rates increases with the number of served users; the individual peak rates can be increased when the power is split among few users; and high EE is attained if the rate per user is small. \n\n\nTechniques such as multi-objective optimization \\cite{Bjornson2014a} and metaheuristic optimization [cf. Section~\\ref{section:algorithms:bio-inspired}], sample the solution space to find close-to-optimal solutions. However, the former is constructed from a mathematical framework, which characterizes the solution space, in particular, the desirable operative points.\nWe foresee that multi-objective optimization techniques will play a primal role towards 5G, as the overall network optimization become more complex. Those techniques can provide guidelines for network design, simplify parametrization, and assess compounded optimization criteria for heterogeneous networks. The network designer must establish resource allocation strategies to conciliate conflicted objectives, keeping in mind that the ultimate goals are user experience, satisfaction, and operators' interest \\cite{Sharifian2016}. \n}}\n\n\n\n\n\n\\section{MU-MIMO Scheduling}\n\\label{section:algorithms}\n\n\\begin{table*}[t] \\scriptsize\n\t\\renewcommand{\\arraystretch}{1.3}\t\n\t\\caption{User Scheduling Methods for MISO ($N=1$) and MIMO ($N>1$) configurations, and full ($B=\\infty$) and partial ($B<\\infty$) CSIT}\n\t\\label{tab:algorithms\n\t\\centering\t\t\n\t\\begin{tabularx}{\\textwidth}{ *{6}{>{\\centering\\arraybackslash}X} } \n\t\t\\toprule\t\n\t\t\\textbf{Method} & \\textbf{Utility-based} & \\textbf{CSI-Mapping} & \\textbf{Metaheuristic}\\newline \\textbf{(stochastic)} & \\textbf{Classic}\\newline \\textbf{Optimization}& \\textbf{Exhaustive}\\newline \\textbf{Search} \\\\\n\t\t\\midrule\n\t\t\\textbf{MISO}, $B=\\infty$ & \\cite{Dimic2005, Moon2013, Huang2013, Wang2008a, Huang2012b, Maciel2010, Driouch2012, Lau2005a, Koutsopoulos2008, Kobayashi2007,Liu2014a,YiXu2014,Bogale2015} & \\cite{Tu2003, Wang2008a, Yoo2006, Jiang2006, Dai2009, Lee2014, Adhikary2013, Adhikary2013a, Razi2010, Mao2012, Shi2012, Maciel2010, Chung2010, Driouch2012, Yoo2005a, Christopoulos2013, Wang2015, Yang2011, Zhang2007b, Swannack2004, Shirani-Mehr2011, Castaneda2015, Jang2011,Kountouris2006b,Lee2014c,Liu2015a} & \\cite{Bjornson2014, Stridh2006a, Lau2005a, Cottatellucci2006, Wang2015, Zhang2007b, Park2014} & \\cite{Maciel2010, Stridh2006a, Matskani2008, Ku2015, Song2008} & \\cite{Lau2005a, Destounis2015, Swannack2004} \\\\\n\t\t\\midrule\n\t\t\\textbf{MISO}, $B<\\infty$ & \\cite{Xia2009, Conte2010, Tang2010, Vicario2008, Kountouris2007, Kountouris2006, Shirani-Mehr2010, Zhang2011, Ravindran2012,Hammarwall2008} & \\cite{Nam2014, Lee2014, Adhikary2013, Adhikary2013a, Xia2009, Zorba2008, Yang2011, Conte2010, Zakhour2007, Huang2009a, Lau2009, Huang2012a, Yoo2007, Kountouris2007, Kountouris2008, Dai2008, Ravindran2012, Kountouris2006a, Wang2007a, Choi2007c, Min2013, Sohn2010, Kountouris2008a, Kountouris2005a,Kountouris2006b, Kountouris2005, Huang2007, Xu2010, Sohn2012, Khoshnevis2013, Simon2011, Wagner2008,Xu2009a,Hammarwall2008} & \\cite{Nam2014, Zhang2011} & - & \\cite{Zakhour2007} \\\\\n\t\t\\midrule\n\t\t\\textbf{MIMO}, $B=\\infty$ & \\cite{Shen2006, Ko2012, Chan2007, Tran2010, Torabzadeh2010, Zhang2009, Cui2011a, Yu2013, Park2010, Lossow2013,Chen2007a, Fuchs2007, Zhang2005a, Chen2008, Tran2012, Lim2009, Cheng2014} & \\cite{Bayesteh2008, Shen2006, Wang2010, Ko2012, Tran2010, Wang2010a, Nam2014a, Souihli2010, Jagannathan2007, Chen2007a, Fuchs2007, Tejera2006, Zhang2005a, Wang2006, Sigdel2009a, Yi2011, Sun2010, Tran2012, Lim2009, Cheng2014, Aniba2007} & \\cite{Elliott2009,Elliott2012, Hei2009} & \\cite{Chan2007, Moretti2013} & \\cite{Chan2007, Gesbert2007a} \\\\\n\t\t\\midrule\n\t\t\\textbf{MIMO}, $B<\\infty$ & \\cite{Chae2008, Jindal2008,Rico-Alvarino2014, Fan2014, Wang2012d} & \\cite{Chae2008, Chen2013, Trivellato2008, Nam2014a, VanRensburg2009, Hosein2009, Schellmann2010, Sharif2005,Zhang2007a} & - & \\cite{Fan2014} & - \\\\\n\t\t\\bottomrule\n\t\\end{tabularx}%\n\\end{table*}%\n\n\nResource allocation can be performed over orthogonal radio resources \\cite{Capozzi2013,Asadi2013}, where the allocation decisions are made using individual estimates of BER, SINR, or rate. Scheduling the best user per resource is performed by low-complexity algorithms that do not depend on full CSIT. For instance, a sorting-based algorithm at the transmitter can schedule users based on the CQI. In contrast, the scheduling algorithms for MU-MIMO systems attempt to allocate resources in a non-orthogonal fashion. The users cannot compute their achievable BER or rates since those metrics depend on the CSIT, powers, and precoders assigned to other co-scheduled users. \n\n\nTo illustrate the scheduling in problem (\\ref{eq:general-combinatorial-problem:cost-function}), consider a MU-MIMO system with a single transmitter equipped with $M$ antennas, and $K$ competing users, each equipped with $N$ antennas. Assuming that linear precoding is implemented [cf. Section~\\ref{section:precoding:linear}], the maximum number of co-scheduled users per resource is given by $K_{\\max} =\\lfloor M\/N \\rfloor$. \nDefine $\\hat{\\mathcal{K}}^{(ss)} = \\{ \\mathcal{K} \\subseteq \\{1,2, \\ldots, K\\}: 1 \\leq |\\mathcal{K}| \\leq K_{\\max} \\}$ as the \\textit{search space} set containing all possible user groups with limited cardinality.\\footnote{$\\hat{\\mathcal{K}}^{(ss)}$ contains the sets of cardinality one, i.e., SU-MIMO configuration. Efficient scheduling rules must dynamically switch between SU- and MU-MIMO configurations \\cite{Chen2008,Ho2009,Sigdel2009a,Schellmann2010,Liu2012,Fan2014}.} The optimal set, $\\mathcal{K}^{\\star}$, that solves (\\ref{eq:general-combinatorial-problem:cost-function}) lies in a search space of size $|\\hat{\\mathcal{K}}^{(ss)}| = \\sum_{m=1}^{K_{\\max}} {K \\choose m}$. The set $\\mathcal{K}^{\\star}$ can be found by brute-force exhaustive search over $\\hat{\\mathcal{K}}^{(ss)}$, which is computationally prohibitive if $K \\gg K_{\\max}$. \nThe search space, and in turn the complexity of the problem, varies according to the system model and constraints: the values of $M$ and $N$, the number of streams per user, individual QoS or power constraints, the set of MCSs, etc. \n\n\n\\begin{figure}[t!]\n\t\\centering\n\t\\includegraphics[width=0.98\\linewidth]{figure8.pdf}\\\\\n\t\\caption{Classification of the User Scheduling Algorithms for MU-MIMO}\n\t\\label{fig:algorithm_calssification}\n\\end{figure}\n\nBy plugging the utility function $U(\\cdot)$, [cf. Section~\\ref{section:performance-uf}], into (\\ref{eq:general-combinatorial-problem:cost-function}), we obtain a mathematical formulation of the MU-MIMO resource allocation problem. \nThe optimal scheduling rule that solves (\\ref{eq:general-combinatorial-problem:cost-function}) in a feasible and efficient way is still an open problem. A number of algorithms have been proposed in the literature to circumvent the high complexity of finding $\\mathcal{K}^{\\star}$, and its associated resource allocation. \nA sub-discipline of optimization theory, known as heuristic search \\cite{Williamson2010}, provides solutions (approximation algorithms) to a category of discrete problems. Such problems cannot be solved any other way or whose solutions take a very long time to be computed (e.g. NP-hard problems). User scheduling falls in such a problem category, and the common approach in the literature is to design suboptimal heuristic algorithms that balance complexity and performance. The optimal solution, $\\mathcal{K}^{\\star}$, is usually computed for benchmarking in simple MU-MIMO scenarios. \n\nIn this section, we provide a classification of the most common scheduling algorithms in the literature of MU-MIMO. Table~\\ref{tab:algorithms} and Fig.~\\ref{fig:algorithm_calssification} show the scheduling algorithms classification, the scenarios in which they are applied, and the methodology they follow. Most algorithms operate at the single resource level, i.e., considering optimization over one sub-carrier or time-slot. Extensions to scenarios with multiple carriers or codes are straightforward, e.g., \\cite{Chung2010, Driouch2012, Tsai2008, Park2014,Conte2010, Khoshnevis2013,Elliott2009, Chan2007, Yu2013,Schellmann2010, Lossow2013,Fuchs2007, Tejera2006, Zhang2005a, Cheng2014}. \n\n\n\n\n\n\\subsection{Aggregated Utility Based Selection}\n\\label{section:algorithms:aggregated-utility}\n\nLet us reformulate (\\ref{eq:general-combinatorial-problem:cost-function}) as a multiuser WSR maximization problem as follows\n\n\\begin{equation} \\label{eq:inner-outer-problem}\n\t\\underbrace{ \\underset{ \\mathcal{K} \\subseteq \\bar{\\mathcal{K}}: |\\mathcal{K}| \\leq c_p }{\\max} \\ \\\n\t\\underbrace{ \\underset{ \\mathbf{W}, \\mathbf{P}, \\pi }{\\max} \\ \\ \\sum_{k \\in \\mathcal{K}} \\omega_{k} \\log_{2} \\left( 1+ \\text{SINR}_{k} \\right) }_\\text{Inner problem: $R(\\mathcal{K})$} }_\\text{Outer problem}\n\\end{equation}\nwhere $\\mathbf{W}$ and $\\mathbf{P}$ summarize the precoding weights and the powers assigned to the users in $\\mathcal{K}$, and $\\pi$ defines an encoding order. \nThe formulation in (\\ref{eq:inner-outer-problem}) illustrates the fact that the resource allocation problem can be decomposed into different subproblems, which are related to different network layers. Furthermore, under specific system settings and constraints the subproblems can be decoupled. \n\nThe weights $\\omega_{k}$, $\\forall k \\in \\mathcal{K}$, can be defined according to the service or application delivered to the users, [cf. Section~\\ref{section:performance-uf:wsr-with-qos}]. The inner problem in (\\ref{eq:inner-outer-problem}) attempts to maximize the WSR for a given set $\\mathcal{K}$. Finding a solution requires joint admission control, precoding design, and power control, e.g. \\cite{Stridh2006a, Matskani2008, Liu2011, Hong2012}. A solution to the inner problem exists when the multiuser channel associated with $\\mathcal{K}$, has specific spatial dimension defined by the precoding scheme. The channel dimensions must be guaranteed by the solution of the outer problem. If linear precoding schemes are implemented, [cf. Section~\\ref{section:precoding:linear}], the original problem can be relaxed: the cardinality of $\\mathcal{K}$ is upper bounded by $K_{\\max}$; the encoding order $\\pi$ can be omitted since it does not affect the precoding performance; and power allocation can be computed via convex optimization or by heuristic algorithms [cf. Section~\\ref{section:power-allocation}]. \nFinding a solution to the combinatorial outer problem implies that the scheduler accomplishes several goals: it exploits MUDiv to maximize multiplexing gains; and it finds the multiuser channel with the best set of spatially compatible users [cf. Definition~\\ref{defn:compatible_set_of_users}].\nProblem (\\ref{eq:inner-outer-problem}) might include constraints over several discrete parameter sets, such as $\\mathcal{K}$, the encoding orders, MCSs, spatial streams per user, etc. The complexity of the combinatorial problem grows exponentially with each discrete set size \\cite{Koutsopoulos2008}.\n\n\n\nDue to the hardness of problem (\\ref{eq:inner-outer-problem}), one common approach is to find suboptimal solutions through heuristic \\textit{greedy opportunistic algorithms}. Given a fixed precoding structure and CSIT, the set $\\mathcal{K}$ is constructed by a sequence of decisions. Every newly selected user finds a locally maximum for an objective function. The optimized utility $U(\\cdot)$ can be defined by the WSR (direct approach) or by a metric of spatial compatibility (indirect approach). The greedy scheduling rule requires low computational complexity and is easy to implement. However, it does not guarantee neither performance nor convergence to the optimal solution \\cite{Williamson2010}.\n\n\n\\subsubsection{Direct Approach}\n\\label{section:algorithms:aggregated-utility:objective-function}\n\nThe seminal works \\cite{Dimic2005,Shen2006} proposed a simple construction of $\\mathcal{K}$, by iteratively selecting users as long as the aggregated objective function improves its value. \nIn \\cite{Dimic2005}, a greedy user selection (GUS) based on sum-rate maximization was proposed. First, the user with the highest rate is selected, and the following selected user will maximize the total sum-rate. This method was improved in \\cite{Wang2008a}, using sequential water-filling to eliminate users with zero transmit power after selection and power allocation. The algorithms in \\cite{Dimic2005,Wang2008a} might be computational demanding because calculation of the precoders and power allocation is required each iteration. Furthermore, in the case of imperfect CSI, the above algorithms fail to determine the optimal number of selected users. \nA generic structure of this kind of user selection is presented in Algorithm~\\ref{alg:algorithms:direct-approach}. In this approach, the transmitter must have channel information so that every iteration the precoders $\\mathbf{W}_k$, $\\forall k \\in \\mathcal{K}$, are recalculated to solve the inner problem in (\\ref{eq:inner-outer-problem}). If linear precoder schemes are implemented, the maximum number of iterations is at most $K_{\\max}$. \nSince the transmitter knows the precoders and the transmit powers, the achievable rates, SINR, or BERs are known each iteration, allowing the scheduler to identify when it is worth adding more users to $\\mathcal{K}$.\n\n\nThis approach is particularly effective if there are no constraints on the cardinality of $\\mathcal{K}$, or if the network is sparse, i.e., $|\\batchmode\\mathcal{K}|\\approx M$ \\cite{Gesbert2007a}. For instance, if ZF-based precoding is used, the multiplexing gain is not maximized at the low SNR regime, i.e., the total number of scheduled users must be strictly less than $K_{\\max}$. In the high SNR regime, multiplexing gains can be maximized if full CSIT is available \\cite{Caire2003}, otherwise the system may become interference limited [cf. Definition~\\ref{defn:interference-limited-system}].\nSeveral works have modified the structure of Algorithm~\\ref{alg:algorithms:direct-approach} to reduce complexity and improve performance, see \\cite{Lau2005a,Jiang2006,Hammarwall2007,Chen2008,Wang2008a,Lim2009,Tran2010,Yi2011,Sigdel2009a,Tran2012,Adhikary2013a}. The works \\cite{Dimic2005,Hammarwall2007,Wang2008a,Huang2013} showed that the solution space can be shrunk at each iteration, reducing the computational complexity. Based on the characteristics of the powers that solve the inner problem in (\\ref{eq:inner-outer-problem}), the scheduler defines a reduced set of candidate users, $\\mathcal{K}^{temp}$, for the next iteration. \n\n\nNonetheless, such methods also exhibit the flaw of not being able to identify the optimal cardinality, $|\\mathcal{K}|$. As such, there are redundant users in the selected user subset, i.e., users that can be deleted from the selected user subset to yield a performance increase. This is an inherent flaw of any greedy incremental algorithm, due to the non-iterative cumulative user selection procedure. In \\cite{Huang2012b,Huang2013}, it is proposed to add the \\textit{delete} and \\textit{swap} operations as means to tackle the redundant user issue. However, this approach increases the complexity, even as compared to GUS, as it involves matrix inversions, projections, and an iterative procedure. Moreover, its performance is sensitive to CSI inaccuracies due to the increased error in the projection operation using imperfect CSI, and it does not necessarily find the best user subset in the imperfect CSI case.\n\n\n\\begin{algorithm}[t!] \\small\n\t\\begin{algorithmic}[1]\n\t\t\\STATE Set $\\mathcal{K}^{temp} = \\bar{\\mathcal{K}}$, select the user $k$ with the strongest channel, update $\\mathcal{K} = \\{k\\}$, calculate precoders and powers, compute the achievable rate $R(\\mathcal{K})$ in (\\ref{eq:inner-outer-problem}).\n\t\t\\STATE Find the user $i \\in \\mathcal{K}^{temp} \\setminus \\mathcal{K}$ that maximizes $R(\\mathcal{K} + \\{i\\})$.\n\t\t\\STATE\tIf $|\\mathcal{K} + \\{i\\}| \\leq K_{\\max}$ and $R(\\mathcal{K} + \\{i\\}) > R(\\mathcal{K})$, then update $\\mathcal{K} = \\mathcal{K} + \\{i\\}$, modify $\\mathcal{K}^{temp}$, and go back to step 2.\\\\ Otherwise go to step 4.\t\n\t\t\\STATE Compute final precoders, powers, and WSR for $\\mathcal{K}$.\n\t\\end{algorithmic}\n\t\\caption{Utility-Based Scheduling (Direct)}\n\t\\label{alg:algorithms:direct-approach}\n\\end{algorithm}\n\n\n\\subsubsection{Indirect Approach}\n\\label{section:algorithms:aggregated-utility:csi-mapping}\n\nIn this approach, the inner and outer problems in (\\ref{eq:inner-outer-problem}) are decoupled. To illustrate the structure of the resource allocation strategy, let us reformulate (\\ref{eq:inner-outer-problem}) as two problems that must be solved sequentially:\n\n\\begin{subnumcases}{} \n\t\\mathcal{K}^{map} = \\underset{ \\mathcal{K} \\subseteq \\bar{\\mathcal{K}}: |\\mathcal{K}| \\leq K_{\\max} }{ \\arg \\max} \\ f(\\mathbf{H}(\\mathcal{K})) & \\label{eq:csi-mapping-problem-1} \n\t\\\\\n\t\\underset{ \\mathbf{W}, \\mathbf{P}, \\pi }{\\max} \\ \\ \\sum_{k \\in \\mathcal{K}^{map}} \\omega_{k} \\log_{2} \\left( 1+ \\text{SINR}_{k} \\right) & \\label{eq:csi-mapping-problem-2}\n\\end{subnumcases}\n\nEquation (\\ref{eq:csi-mapping-problem-1}) describes a combinatorial user grouping problem, where $f(\\mathbf{H}(\\mathcal{K}))$ is a metric of spatial compatibility, [cf. Section~\\ref{section:metrics-spatial-compatibility}]. The user grouping is an NP-C problem, whose solution is found via ExS \\cite{Maciel2010}. Observe that finding a solution to problem (\\ref{eq:csi-mapping-problem-1}) does not require the computation of the precoders and powers. Instead, it depends on CSIT, algebraic operations defined by a given mapping function $f(\\mathbf{H}(\\mathcal{K}))$, and an iterative procedure. It is worth noting that (\\ref{eq:csi-mapping-problem-1}) may include the weights $\\omega_{k}$ to cope with QoS or fairness requirements, see \\cite{Yoo2006}. \nIn contrast, provided the set $\\mathcal{K}^{map}$, problem (\\ref{eq:csi-mapping-problem-2}) is tractable and can be solved efficiently via convex optimization \\cite{Lau2005a,Caire2003,Godara2002Ch18,Schubert2004}. \n\n\nEarly works on MU-MIMO systems (e.g. \\cite{Caire2003,Tu2003,Swannack2004}) pointed out that under certain conditions of the weights, $\\omega_{k}$, and SNR regime, the objective function of the inner problem in (\\ref{eq:inner-outer-problem}), is dominated by the geometry of the multiuser channel $\\mathbf{H}(\\mathcal{K})$.\nThe rational behind the reformulation in (\\ref{eq:csi-mapping-problem-1})-(\\ref{eq:csi-mapping-problem-2}), is that scheduling a set of spatially compatible users [cf. Definition~\\ref{defn:compatible_set_of_users}], is crucial to suppress IUI. Refining the power allocation and precoding weights in (\\ref{eq:csi-mapping-problem-2}) requires less computational effort than solving the combinatorial problem (\\ref{eq:csi-mapping-problem-1}).\nA generic structure of this scheduling algorithms is presented in Algorithm~\\ref{alg:algorithms:indirect-approach}.\n\n\n\nThe complexity of finding a solution to problem (\\ref{eq:csi-mapping-problem-1}) can be simplified under certain conditions. Assuming that ZF-based precoding schemes are used, results in \\cite{Caire2003,Lau2006} establish that the optimal admitted set of users achieves full multiplexing gains, i.e., $|\\mathcal{K}|=K_{\\max}$, if the system operates in the high SNR regime. Therefore, the cardinality constraint in (\\ref{eq:csi-mapping-problem-1}) is given by $|\\mathcal{K}| = K_{\\max}$, which shrinks the search space size. A common approach in the literature is to assume that $K_{\\max}$ users can be co-scheduled when solving problem (\\ref{eq:csi-mapping-problem-1}), and refining the set $\\mathcal{K}$ when solving problem (\\ref{eq:csi-mapping-problem-2}).\n\n \n\nThe majority of the works that have proposed algorithms to solve problem (\\ref{eq:csi-mapping-problem-1}), e.g. \\cite{Tu2003, Jiang2006, Dai2009, Tejera2006,Yoo2006, Nam2014, Bayesteh2008,Mao2012,Maciel2010}, use ZF precoding for the second problem (\\ref{eq:csi-mapping-problem-2}). Consequently, the NSP is the metric of spatial compatibility that maximizes the sum-rate for the set of selected users $\\mathcal{K}$, [cf. Section~\\ref{section:metrics-spatial-compatibility:projection-spaces}].\nA considerable amount of research has been focused on reducing the complexity of the NSP computation, e.g., by reusing previous NSP calculations at each iteration, implementing efficient multiuser channel decompositions, or computing approximations of the NSP. The methods highly depend on $M$, $N$, the CSIT accuracy, and the system model. \n\n\nDifferent works have proposed a search space reduction per iteration, recalculating and reducing the number of competing users so that spatial compatibility is preserved. A common approach is to preselect a group of candidate users, $\\mathcal{K}^{temp}$ in Algorithm~\\ref{alg:algorithms:indirect-approach}, based on spatial clustering [cf. Section~\\ref{section:metrics-spatial-compatibility:spatial-clustering}]. The candidate users at the next iteration will exhibit channel directions fulfilling an $\\epsilon$-orthogonality criterion. This approach, coined as semi-orthogonal user selection (SUS), was originally proposed by Yoo and Goldsmith \\cite{Yoo2006,Yoo2005a}. Several variations of this technique can be found in the literature, see \\cite{Wang2008a,Lau2009,Sun2010,Razi2010,Sohn2010,Mao2012,Driouch2012,Tran2012,Min2013,Lee2014c}.\nOnce that $\\mathcal{K}$ has been constructed, it may be necessary to modify it, so that problem (\\ref{eq:csi-mapping-problem-2}) yields the maximum WSR. A common approach to refine $\\mathcal{K}$, is to apply user removal techniques [cf. Section~\\ref{section:performance-uf:wsr-with-qos}]. This might be necessary if: the selected channels lacks spatial compatibility; the system operates in extreme SNR regimes; or if the constraints related to $\\mathcal{K}$ turn problem (\\ref{eq:csi-mapping-problem-2}) infeasible \\cite{Lim2009,Maciel2010}. If linear precoding and water-filling are used to solve (\\ref{eq:csi-mapping-problem-2}), the set $\\mathcal{K}$ can be refined by dropping users that do not achieve a target rate or whose allocated power is zero. \n\n\nAuthors in \\cite{Fuchs2007} pointed out that regardless of the number of deployed antennas, it is more efficient to schedule users so that $|\\mathcal{K}| < K_{\\max}$. This means that the scheduler must seek a tradeoff between maximizing spatial multiplexing gains, and optimizing the WSR for a small set of spatially compatible users. To solve this cardinality problem, some algorithms, e.g. \\cite{Fuchs2007,Maciel2010,Ko2012,Cheng2014}, maximize the WSR by comparing the solution of (\\ref{eq:csi-mapping-problem-2}) for multiple sets that solve (\\ref{eq:csi-mapping-problem-1}). This is performed by sequentially constructing groups of spatially compatible users with different cardinalities, and then selecting the best group based on the achievable WSR. \n\n\nFor the general heterogeneous MU-MIMO scenario, $M\\geq N_k > 1$, $\\forall k$, the function $f(\\mathbf{H}(\\mathcal{K}))$ in problem (\\ref{eq:csi-mapping-problem-1}) can be defined by a metric of subspace compatibility [cf. Section~\\ref{section:metrics-spatial-compatibility:other-metrics}]. The user grouping procedure using such a metric can operate in a greedy fashion, as in Algorithm~\\ref{alg:algorithms:indirect-approach}, but every scheduler design depends on the system model.\nIt is worth pointing out that in heterogeneous systems, maximizing spatial compatibility is not enough to guarantee WSR maximization. Multidimensional metrics measure the potentially achievable spatial separability but not the effective channel gain per spatial dimension, [cf. Definition~\\ref{defn:effective_channel_gains}]. Efficient user selection algorithms in scenarios with heterogeneous users should not only consider spatial compatibility, but also an estimation of the achievable WSR, SINRs, or effective channel gains \\cite{Yi2011}.\nMoreover, dynamic allocation of the number of data streams per user must be included in the scheduler, to take into account CSIT accuracy and fulfill QoS constraints. Users with small signal spaces experience less IUI, and results in \\cite{Bjornson2013a} show that under certain conditions, transforming a MIMO channel into an equivalent MISO channel can improve spatial separability at the expense of multiplexing gain.\n\n\n\nThe reliability of scheduling based on metrics of spatial compatibility is highly sensitive to CSIT accuracy. Most of the works in the literature (e.g. \\cite{Bayesteh2008, Shen2006, Wang2010, Ko2012, Tran2010}), perform scheduling by evaluating a form of spatial correlation between MIMO channels of different user. However, the correlation between antennas at each receiver is usually not taken into account. Such a correlation may affect the achievable SINR, depending on the signal processing at the receiver, e.g., receive ZF processing \\cite{Wang2010}, or receive combining \\cite{Jindal2008,Bjornson2013a}.\n\nThe inner correlation of the channel $\\mathbf{H}_{k}$ of the $k$-th user can be measured by its rank or by the magnitude (dispersion) of its eigenvalues \\cite{Tejera2006}. Transmitting multiple spatial streams per user cannot be reliable, specially for high inner correlation. A common approach to simplify the scheduling designs is by limiting the number of streams per user, e.g., using only the strongest eigenvector per selected user \\cite{Bayesteh2008,Bjornson2013a, Wang2010}. For each channel $\\mathbf{H}_{k}$, there exists a dominant spatial direction that can be selected for transmission without creating severe IUI, or performance degradation after precoding. In this way, problem (\\ref{eq:csi-mapping-problem-1}) can be solved based on antenna or eigen-direction selection, e.g., \\cite{Chen2007a,Chen2008,Bayesteh2008,Lim2009,Sun2010,Ko2012,Wang2010}.\n \n\n\\begin{algorithm}[t!] \\small\n\t\\begin{algorithmic}[1]\n\t\t\\STATE Set $\\mathcal{K}^{temp} = \\bar{\\mathcal{K}}$, select the user $k$ with the strongest channel, update $\\mathcal{K} = \\{k\\}$.\n\t\t\\STATE Find the user $i \\in \\mathcal{K}^{temp} \\setminus \\mathcal{K}$ that maximizes $f(\\mathbf{H}(\\mathcal{K}+\\{i\\}))$.\n\t\t\\STATE\tIf $|\\mathcal{K} + \\{i\\}| \\leq K_{\\max}$, then update $\\mathcal{K} = \\mathcal{K} + \\{i\\}$, preselect users in $\\mathcal{K}^{temp}$, and go back to step 2.\\\\ Otherwise go to step 4.\t\n\t\t\\STATE Perform operations to refine $\\mathcal{K}$.\n\t\t\\STATE Compute precoders and powers to solve (\\ref{eq:csi-mapping-problem-2}) for $\\mathcal{K}$.\n\t\\end{algorithmic}\n\t\\caption{CSI-Mapping-Based Scheduling (Indirect)}\n\t\\label{alg:algorithms:indirect-approach}\n\\end{algorithm}\n\n\n\n\\subsection{Metaheuristic Algorithms}\n\\label{section:algorithms:bio-inspired}\n\nSeveral works in the literature address problem (\\ref{eq:inner-outer-problem}) using stochastic optimization methods, which find close to optimal solutions to complex and non-convex mixed problems. These non-traditional or metaheuristic methods are an alternative to classical programming techniques \\cite{Rao2009,Williamson2010}. The mathematical proof of convergence to the optimal solution cannot be demonstrated, and analytical results or performance analysis cannot be derived. However, these methods may find a close to optimal solution with high probability, without the need of computing derivatives or satisfying convexity requirements (as in standard optimization techniques). \nThe principle behind metaheuristic methods is the following: a set of feasible solutions is iteratively combined and modified until some convergence criterion is met. The term stochastic comes from the fact that initial conditions are generally chosen randomly. For each iteration, the internal parameters change according to dynamic probability functions or even randomly. \nThe algorithms designed under this approach are based on certain characteristics and behavior of natural phenomena, e.g., swarm of insects, genetics, biological or molecular systems \\cite{Rao2009,Zhang2014b}. \nIn the context of MU-MIMO systems, two techniques have been used to solve the user scheduling problem: genetic algorithms (GA) and particle swarm optimization (PSO) algorithms.\n\n\nGA are bio-inspired or evolutionary algorithms, that can solve multiple objective optimization problems with many mixed continuous-discrete variables, and poorly behaved non-convex solution spaces. Unlikely standard optimization methods that rely on a single starting point (e.g. algorithms sensitive to initial conditions \\cite{Hammarwall2007}), GA start with a set of points (population). These points increase the argument domain of the optimized function and avoid local optimal problems due to the evaluation of the solution space \\cite{Rao2009}.\nGA encode potential solutions to the optimization problem in data structures called chromosomes. Due to the binary nature of the variables $\\xi_{k}$ in problem (\\ref{eq:general-combinatorial-problem:cost-function}), the chromosomes can be represented as binary strings containing valid configurations of the variables $\\xi_{k}$, [cf. (\\ref{eq:general-combinatorial-problem:set-cardinality})]. A set of chromosomes is referred to as a population, and at each iteration, the chromosomes combine, exchange critical information, mutate, and eventually evolve toward the optimal solution \\cite{Lau2005a}.\nPractical application of GA to solve the WSR maximization problem (\\ref{eq:inner-outer-problem}) have been proposed for different precoding schemes: ZFBF \\cite{Lau2005a,Lau2006}, ZFDP \\cite{Elliott2012}, and DPC \\cite{Elliott2009}. \nRecall that given a set $\\mathcal{K}$, the performance of DPC is sensitive to a given user order $\\pi$ selected out of $|\\mathcal{K}|!$ valid orders. The works \\cite{Tu2003,Tejera2006} have proposed heuristic algorithms to define $\\pi$. Since the chromosome structure contains different optimization variables, it can include not only the set of selected users but can also the order in which the users are encoded for ZFDP \\cite{Elliott2012} and DPC \\cite{Elliott2009}. \n\n\n\nPSO are behavior-inspired algorithms that mimic the distributed behavior of social organisms (particles). The particles use their own intelligence (based on an individual utility function) and the swarm intelligence (global utility function), to discover good directions that can be followed and verified by the swarm. \nPSO initially defines the swarm as a set of particles randomly sampled from the search space. Each particle has two associated parameters that define how fast it can move toward the optimal solution: position and velocity. In this approach, each particle wanders around in the search space to collect information about the achievable utility function at different locations. This means that the particle looks for the configuration that steers toward the global maximum or the average direction of the swarm. The particles exchange information regarding the best directions, and adjust their positions and velocities accordingly until the swarm converge to the same solution \\cite{Rao2009}. \nAuthors in \\cite{Hei2009} designed PSO algorithms to solve problem (\\ref{eq:inner-outer-problem}) using BD precoding. Such an optimization uses the utility function, $U(\\cdot)$, of the direct and indirect approaches described in Section~\\ref{section:algorithms:aggregated-utility}. The PSO approach can define the swarm direction using the function $R(\\mathcal{K})$ in the inner problem (\\ref{eq:inner-outer-problem}), or the mapping function $f(\\mathbf{H}(\\mathcal{K}))$ in (\\ref{eq:csi-mapping-problem-1}). This illustrates the fact that the computational complexity of metaheuristic algorithms depends on the optimized objective function. \n\n\n\nAlgorithm~\\ref{alg:algorithms:metaheuristic} shows a sketch of the steps used to solve problem (\\ref{eq:inner-outer-problem}) following the GA or PSO approaches. The constants $K_{smp}$ and $K_{best}$ are arbitrarily defined to limit the overall computational complexity and to speed up convergence. The convergence criterion can be defined by the maximum number of iterations or a performance threshold. The details of the operations required to generate new chromosomes or particles, [Step 3 in Algorithm~\\ref{alg:algorithms:metaheuristic}], can be found in the reference aforementioned. The robustness of GA and PSO lies in the fact that the best solutions are systematically combined, and the algorithms have reasonable immunity from getting stuck in local minimums. \n\nMetaheuristic algorithms are efficient techniques for problems where the desired solution does not need to be computed in short time scales. Although bio-inspired algorithms have been used to optimize resource allocation in wireless networks, e.g. \\cite{Rondeau2009,Sampaio2013,Lee2014b,Zhang2014b}, they seem to have limited application in practical MU-MIMO systems. This is because the channel conditions, rate demands, and even the number of competing users may change very rapidly over time. Metaheuristic algorithms require centralized processing and the convergence time remains a critical issue \\cite{Lee2014b}. They might suffer from a high computational cost because the objective function is evaluated for each member of the population (swarm). Nevertheless, these methods can provide performance benchmarks to assess other suboptimal, yet practical, resource allocation algorithms.\n\n\n\\begin{algorithm}[t!] \\small\n\t\\begin{algorithmic}[1]\n\t\t\\STATE For the $i=1$ iteration, extract $K_{smp}$ elements (chromosomes or particles) from the search space $\\hat{\\mathcal{K}}^{(smp)}(i) = \\{\\mathcal{K}_{i,1}, \\ldots, \\mathcal{K}_{i,K_{smp}}\\} \\subset \\hat{\\mathcal{K}}^{(ss)}$. \n\t\t\\STATE For the $i$-th iteration, evaluate the objective function for each element in $\\hat{\\mathcal{K}}^{(smp)}(i)$, select the $K_{best}$ elements with the largest objective function, and discard the other bad elements.\n\t\t\\STATE Perform operations over the remaining elements to generate an improved population\/swarm, $\\hat{\\mathcal{K}}^{(smp)}(i+1)$, for iteration $i+1$. \n\t\t\\STATE If convergence criterion is met, then compute precoders and powers for the solution set.\\\\ Otherwise go to step 2.\n\t\\end{algorithmic}\n\t\\caption{Metaheuristic Optimization}\n\t\\label{alg:algorithms:metaheuristic}\n\\end{algorithm}\n\n\n\n\\subsection{Classical Optimization}\n\\label{section:algorithms:classical-optimization}\n\n\nClassical optimization techniques \\cite{Rao2009,Boyd2004}, have been used for several resource allocation problems in MU-MIMO systems, e.g., WSR maximization, sum power minimization, max-min SINR, and other objective functions, see \\cite{Bjornson2013,Hong2012,Utschick2012,Stanczak2009,Athanasiou2015,Bethanabhotla2016} and references therein. Numerous works have included user scheduling for the optimization of the WSR \\cite{Chan2007}, sum power minimization \\cite{Matskani2008,Ho2009,Moretti2013}, or some metrics of spatial compatibility \\cite{Maciel2010,Castaneda2014}. A large number of optimization problems in MU-MIMO systems are non-convex or non-polynomial time solvable, depending on the system models and constraints \\cite{Hong2012}. Due to the high complexity of the resource allocation problem, the conventional optimization solutions must relax the original problem, approximate non-convex constraints in an iterative fashion, or change the domain of the optimization, sacrificing optimality for the sake of tractability. Nevertheless, by employing a fixed structure for the precoders, the original problem can be simplified, and efficient resource allocation can be performed.\n\n\n\nAuthors in \\cite{Chan2007} presented different approaches to solve (\\ref{eq:general-combinatorial-problem:cost-function}) in a OFDMA MU-MIMO scenario. The mathematical formulation renders the combinatorial problem into a convex problem. By analyzing the entire search space, the proposed algorithms perform channel assignment and signal space selection, i.e., the algorithm defines the scheduled users per carrier and the number of spatial streams per user. Such a reformulation of (\\ref{eq:general-combinatorial-problem:cost-function}) yields algorithms that decouple the channel assignment in the OFDMA system, i.e., the global optimization is attained by solving problem (\\ref{eq:inner-outer-problem}) per sub-carrier. Furthermore, the objective function of the inner problem in (\\ref{eq:inner-outer-problem}) is defined in terms of rates and powers, which optimizes the total capacity and power consumption. \nFor classical programming techniques, the set of constraints might turn the problem infeasible. The resource allocation algorithms proposed in \\cite{Chan2007} identify the assignment sets for which time sharing is the best resource allocation strategy. As discussed in Section~\\ref{section:performance-uf:wsr-with-qos}, admission control or user removal techniques can be implemented as a form of scheduling to guarantee feasibility.\n\n\n\nAuthors in \\cite{Moretti2013} have reformulated the user scheduling problem in multi-carrier scenarios as an extension of problems (\\ref{eq:csi-mapping-problem-1}) and (\\ref{eq:csi-mapping-problem-2}). A close to optimal solution can be found by a sequence of convex and linear programming optimizations. To reduce complexity of the combinatorial problem (\\ref{eq:csi-mapping-problem-1}), the mapping function $f(\\mathbf{H}(\\mathcal{K}))$ is defined as the magnitude of the MIMO channels, and a close to optimal scheduling sequence is designed based on that metric. According to \\cite{Ho2009,Moretti2013}, the generalization of (\\ref{eq:csi-mapping-problem-2}) for OFDMA systems yields a non-convex problem, but quasi-optimal solutions can be attained by applying the classical dual decomposition method. \nThe works \\cite{Moretti2013,Maciel2010} have modeled the user scheduling problem in OFDMA systems as a channel assignment problem, which can be solved by efficient algorithms that run in strong polynomial time \\cite{Burkard2009}. \n\n\n\nA novel reformulation of the WSR maximization problem, (\\ref{eq:inner-outer-problem}), as a semi-definite program in \\cite{Ku2015}, sheds some light on non-explicit convex properties of the joint precoding design, power allocation, and users selection problem. The reformulation requires semi-define relaxation, and the solution is found by combining convex optimization and sub-gradient projection methods. \nAnother approach in \\cite{Song2008} extends the max-min fair rate allocation problem in \\cite{Schubert2004,Tan2012,Cai2011,Schubert2006} so that joint optimization of precoding, power allocation, and user selection was attained. The problem was formulated as the difference of convex functions and solved by the branch and bound (BB) technique, which is a method used to solve mixed-integer programming problems \\cite{Rao2009}. \nThe approach in \\cite{Song2008} yields an interference limited systems [cf. Definition~\\ref{defn:interference-limited-system}], i.e., it is allowed that $|\\mathcal{K}|\\geq M$, which highly increases the search space and computational complexity. Notice that even if the search space is constrained so that $|\\mathcal{K}|\\leq M$, there are $2^K -1$ possible user schedules in a MISO configuration that will be enumerated by the BB technique. \n\n\nAs discussed in Section~\\ref{section:performance-uf}, admission control is a form of user selection that may be required to guarantee feasibility. In \\cite{Matskani2008}, the joint sum power minimization and maximization of $|\\mathcal{K}|$ was formulated as a second-order cone program (SOCP). The set $\\mathcal{K}$ is refined iteratively by dropping the user with the largest gap to its target SINR,\\footnote{See \\cite{Mahdavi2010} for optimal and suboptimal user removal algorithms for QoS and power constrained systems.} (i.e. the most infeasible user), and optimal precoders and powers are found by the SOCP optimization. \nAlthough the approaches in \\cite{Song2008,Matskani2008,Ku2015} provide suboptimal solutions due to the relaxation of non-convex problems, they show that joint optimization of the three variable sets $\\mathcal{K}$, $\\mathbf{P}$, and $\\mathbf{W}$ in (\\ref{eq:inner-outer-problem}), is feasible through convex optimization. \n\n\nOther classical optimization methods have been used in the single-carrier MISO scenario with ZF precoding. \nQuadratic optimization was used in \\cite{Maciel2010} to solve problem (\\ref{eq:csi-mapping-problem-1}), by optimizing a heuristic function $f(\\mathbf{H}(\\mathcal{K}))$ that linearly combines channel magnitudes and spatial correlation of the MIMO channels.\nIn \\cite{Castaneda2014}, a heuristic objective function that approximates the NSP has been proposed, and the set $\\mathcal{K}$ was found via integer programming. \nThe authors in \\cite{Chen2013} jointly addressed scheduling and WSR maximization subject to QoS constraints using geometric programming. However, similar to the approach in \\cite{Chan2007}, the optimization in \\cite{Chen2013} iterates over all solutions of the search space, which limits its application for practical scenarios.\n\n\n\nOther works model the resource allocation problem (\\ref{eq:csi-mapping-problem-1}), as mathematical problems that have been extensively studied \\cite{Korte2006,Burkard2009}: the minimum set cover problem from graph theory (e.g., \\cite{Yoo2005a,Driouch2012}); and the sum assignment problem (e.g., \\cite{Aniba2007,Castaneda2013b,Dartmann2013,Wang2011b}). The modeling used in these approaches requires the calculation of weights or costs values associated with every possible subset in the solution space, i.e., $\\{ \\forall \\mathcal{K} \\subseteq \\bar{\\mathcal{K}} : |\\mathcal{K}| \\leq c_p \\}$, where $c_p$ depends on the system parameters. The solutions of such general problems can be found by heuristic algorithms.\nDue to the exponentially increasing complexity on $M$, $N$, and $K$, the algorithms based on classical optimization are suitable for offline implementation, benchmarking, and to assess other suboptimal heuristic resource allocation strategies for relatively small values of $K$ \\cite{Utschick2012,Hong2012}. \n\n\n\\subsection{Scheduling in Multi-Cell Scenarios}\n\\label{section:algorithms:multi-cell-selection-classification}\n\n\nIn Section~\\ref{section:system-set-ups:multi-cell-scenarios}, we have described the types of transmission schemes in multi-cellular scenarios. Different levels of coordination are required to improve and maintain the performance of users geographically spread within the coverage area. For users located at the cell edge, the simultaneous transmission from different clustered BSs can boost their throughputs (e.g. CoMP \\cite{Marsch2011}), whereas users close to their BS do not require interaction with adjacent BSs.\nIn full signal-level coordinated systems (e.g., Network MIMO or JT), the global user data and CSI knowledge enables a CU to perform CS using the approaches described in Section~\\ref{section:algorithms:aggregated-utility} and Section~\\ref{section:algorithms:selection-partial-csit}. \nAssuming partial coordination, the CS\/CBF can offer flexibility, scalability, and viability, since centralized or distributed algorithms can be implemented with limited signaling overhead and using local CSIT.\nThe minimum level of cooperation between transmitters can be attained through orthogonal resource allocation. For instance, in LTE systems a technique known as \\textit{dynamic point blanking}, prevents transmission at a certain time-frequency resource to reduce interference over such a resource used at a neighboring transmission point \\cite{Dahlman2013,Lopez-Perez2015}.\n\n\n\nThe optimization of CS and CBF can be done based on the methodologies described in Section~\\ref{section:algorithms:aggregated-utility}, i.e., the two problems can be addressed either independently or jointly. If CS and CBF are decoupled, CS can be tackled by processing shared information related to statistical CSI or performance metrics extracted from local CSI [cf. Section~\\ref{section:metrics-spatial-compatibility}]. The CBF optimization can be solved by optimal or heuristic techniques for precoding design and power allocation, see \\cite{Bjornson2013} for a comprehensive review. \nA joint optimization of CS and CBF requires iterative calculation of the precoders and selected users, since both optimization spaces are coupled \\cite{Li2014,Ku2015}. Efficient scheduling rules must determine the set of users that maximizes the performance, and generates less interference to neighboring cells. \nThe following classification presents some existing methods to implement CS and CBF in multi-cell networks \\cite{Pateromichelakis2013,Li2014}.\n\n\n\\subsubsection{Joint CS-CBF}\n\\label{section:algorithms:multi-cell-selection-classification:join-cs-cbf}\n\n\nIn full coordinated multi-cellular systems, a cluster of BSs defines a super-cell or virtual distributed antenna system with per-BS power constraints. Full coordination allows different transmission strategies: \\textit{i}) all clustered BSs send data to all the users in $\\mathcal{K}$; \\textit{ii}) some BSs jointly serve a subset of $\\mathcal{K}$; \\textit{iii}) each BS serves a set of users associated to it; or \\textit{iv}) each BS performs single transmission (ST) and serves only one user per scheduling interval, which is known as the interference channel model (IFC), see \\cite{Cover2006,Jorswieck2008,Larsson2008,Bjornson2013}. The fist and second strategies are exclusive of fully coordinated systems since payload data is shared among BSs. The other strategies are also implemented for distributed CS\/CBF. Recent works have extended these transmission schemes to heterogeneous networks, e.g., \\cite{Lossow2013,Park2014,Ku2015}. \n\nAccounting for global CSIT provides flexibility to the CS\/CBF design, and several ICI cancellation techniques can be applied. Using classical optimization, the authors in \\cite{Ku2015} solved the joint CS\/CBF optimization, formulated as an extension of problem (\\ref{eq:inner-outer-problem}) for heterogeneous networks. \nThe authors in \\cite{Zhang2009,Huh2012} addressed the CS by iteratively evaluating the precoders and powers, following the methodology described in Section~\\ref{section:algorithms:aggregated-utility:objective-function}. \nThe approach in \\cite{Park2010} tackled the CBF problem using interference alignment \\cite{Jafar2011}, whereas the CS was sequentially solved in a greedy fashion. A dynamic transmission switching between ST and JT was presented in \\cite{Park2014}, where a centralized CS exploited individual rate statistics (CDF scheduling). \nIn \\cite{Marsch2011}, problem (\\ref{eq:csi-mapping-problem-1}) was solved using metrics of spatial compatibility (NSP-based user selection), and a centralized resource allocation solved problem (\\ref{eq:csi-mapping-problem-2}), [cf. Section~\\ref{section:algorithms:aggregated-utility:csi-mapping}]. \nPractical CS schemes were proposed in \\cite{Lossow2013} for heterogeneous cellular systems, where macro and small cells coordinate scheduling decisions using an the approach described in Section~\\ref{section:algorithms:aggregated-utility:objective-function}. The CBF was optimized using linear precoding and dynamic SU\/MU-MIMO switching \\cite{Schellmann2010}. \n\n\t\n\\subsubsection{CS with cyclic CBF}\n\\label{section:algorithms:multi-cell-selection-classification:cs-cyclic-cbf}\t\t\n\n\nGiven a pool of precoding weights, each BS picks a different subset for transmission every scheduling interval, and switches them periodically, in a temporal beam-reuse fashion \\cite{VanRensburg2009,Hosein2009}. This method requires minimum coordination and uses information regarding the allocated beams per BS and the interference environment. This allows practical scheduling and mitigates the flashlight effect (changes of the active beams at neighboring transmitters). Another approach in \\cite{Dartmann2013}, performs user scheduling by solving a series of assignment problems heuristically, and the precoding weights are optimized every iteration. \n\n\n\\subsubsection{Sequential CS-CBF}\n\\label{section:algorithms:multi-cell-selection-classification:sequential-cs-cbf}\n\t \t\n\nThe clustered BSs jointly select users and assign resources in a sequential fashion. The first BS selects its users and broadcast its decision, then the second BS selects its user based on the decision made by the first BS and so on, see \\cite{Cui2011a,Wang2011b,Hossain2011,Dartmann2013,Moon2013}. The user selection per BS can be done using the approaches presented in Section~\\ref{section:algorithms:aggregated-utility}, and the scheduling order of the cells can be assigned according to interference levels or using the round robin approach. \nThe CS can be performed based on interference constraints as in \\cite{Seifi2011}. The BSs schedule their users and perform resource allocation sequentially, so that the ICI generated to previously selected users is below a threshold. If the interference cannot be mitigated as desired, the interfering BSs remain silent during the scheduling interval, which is a low-complexity dynamic clustering strategy. \n\t\t\n\n\\subsubsection{Decoupled CS-CBF}\n\\label{section:algorithms:multi-cell-selection-classification:decoupled-cs-cbf}\n\t\nA distributed optimization policy interconnects clustered BSs through a CU or master BS, limiting the message exchange to local CSI and scheduling control signaling \\cite{Bjornson2013}. \nProblem (\\ref{eq:inner-outer-problem}) has three optimization variable sets, namely, $\\mathcal{K}$, $\\mathbf{W}$, and $\\mathbf{P}$, and their joint optimization is difficult to solve optimally and distributively. Still, authors in \\cite{Chiang2008} proposed an iterative approach that decouples and optimizes some optimization variables, while the others remain fixed. \nYu \\textit{et.al} in \\cite{Yu2013} have followed such an approach and developed a strategy to tackle (\\ref{eq:inner-outer-problem}) in a semi-distributed manner, demanding limited communication between BSs and the CU: fix the first two set of variables and optimize the third set, then fix the second and third sets and optimize the first one, and so on until convergence. The BSs jointly update parameters associated with all variable sets in an semi-distributed fashion. By fixing the set of users and precoder weights, the power allocation can be performed based on the information shared between BSs, see \\cite{Stridh2006a,Chiang2008,Stanczak2009}. By fixing the precoders and powers, the user scheduling can be performed using the approaches described in Sections~\\ref{section:algorithms:aggregated-utility}. By fixing the set of users and power allocation, the precoder weights can be computed using distributed algorithms, see \\cite{Bjornson2013}. \t\nA semi-distributed CS was proposed in \\cite{Castaneda2015}, where the users are selected using an approximation of the NSP [cf. Section~\\ref{section:metrics-spatial-compatibility:projection-spaces}], and the CBF is computed with local CSI. A similar approach was proposed in \\cite{Jang2011}, where the BSs dedicate spatial DoF to cancel ICI for some selected users at neighboring cells. This approach performs semi-distributed spatial clustering for CS [cf. Section~\\ref{section:metrics-spatial-compatibility:spatial-clustering}], and distributed linear precoding for CBF. \n\t\n\n\n\n\n\n \n\n\n{\\color{black}{\n\n\n\\begin{figure*}[t!]\n\t\\centering\n\t\\includegraphics[width=0.98\\linewidth]{figure9.pdf}\\\\\n\t\\caption{Average sum rate vs SNR vs the number of users ($K$), for $M=8$ (left plot) and $M=64$ (right plot).} \n\t\\label{fig:k-vs-snr}\n\\end{figure*} \n\n\\subsection{Scheduling for Massive MIMO}\n\\label{section:algorithms:aggregated-utility:massive-mimo}\n\n\nMassive or large-scale MIMO has been widely envisaged as a key transmission technology for next generation of wireless communication, 5G \\cite{Andrews2014,Zheng2015}. In massive MIMO systems, the BS is equipped with a large number of antennas (few hundreds) and serve multiple users (normally few tens). The excess amount of antennas enables focusing the transmission and reception of signal energy into smaller regions of space. Joint optimization over the spatial and multi-user domains can provide significant gains in throughput and EE \\cite{Marzetta2010, Yang2013b, Rusek2013, Zheng2015}.\n\n\n\nIn conventional MU-MIMO systems, the number of co-scheduled users $K$ is usually larger than the number of BS antennas $M$. In contrast, in massive MIMO systems the transmit antennas outnumber the active users ($M\\gg K$), which reduces the signal processing complexity and achieves large peak rates. However, the promising performance improvements come at the expense of hardware complexity. Due to cost and power consumption, practical transceiver architectures have a different number of RF chains ($M_{RF}$) compared to the number of antennas $M$, [cf. Section~\\ref{section:precoding:massive-mimo}]. If every antenna has its own RF chain, i.e. $M_{RF} = M$, digital beamforming, [cf. Section~\\ref{section:precoding:linear}], can allocate the whole spectrum to each active user \\cite{Bjornson2016}. In practice, the total number of simultaneous users is constrained by the number of RF chains at the base stations \\cite{Bogale2015,Shokri-Ghadikolaei2015,Bogale2016}. When the number of antennas is larger than the number of RF chains and users, i.e., $M\\gg K \\geq M_{RF}$, the system performance can be boosted from the diverse path losses and shadow fading conditions of different users. \n\n\nThe channel hardening effect in massive MIMO removes frequency selectivity, and avoids complex scheduling and power control designs \\cite{Bjornson2016}. As $M \\rightarrow \\infty$, the MIMO channels become spatially uncorrelated, user separability (in the sense of Definition~\\ref{defn:compatible_set_of_users}) plays a minor role in the scheduling decisions and the performance optimization relies on the channel magnitudes, see \\cite{Zhang2007b,Bjornson2009a,Liu2015a,Hong2015}. If sum-rate is the ultimate metric to be optimized, a highly efficient scheduler only needs to assign resources to the users with the largest channel magnitudes. \n\n\nMost of the scheduling designs for massive MIMO are based on the greedy approaches presented in Section~\\ref{section:algorithms:aggregated-utility}, e.g. \\cite{Huh2012,Adhikary2013,Nam2014,YiXu2014,Lee2014c,Bogale2015,Bogale2016a}. In these works is common to assume clusters of users sharing similar slow fading characteristics. Approaches such as the \\textit{Joint Spatial Division and Multiplexing} (JSDM) \\cite{Adhikary2013,Nam2014} first partition cell users into groups with distinguishable linear subspace spanned by the dominant eigenvectors of the group's channel covariance matrix. The transmit beamforming design is performed in two stages: a pre-beamforming that separates groups by filtering the dominant eigenvectors of each group's channel covariance matrix, followed by precoding for separating the users within a group based on the effective channel. \n\n\nThe user clustering in \\cite{Adhikary2013,Nam2014} can be implemented using spatial subspace compatibility metrics [cf. Section~\\ref{section:metrics-spatial-compatibility:other-metrics}]. It is worth noticing that such a grouping process might be necessary to eliminate pilot contamination, by allocating identical pilot sequences to groups of users with similar channel characteristics \\cite{Elijah2016}. The overlap between user clusters and their sizes are features dictated by two factors, the number of RF chains, $M_{RF}$, and the number of geographically co-located uses \\cite{Shokri-Ghadikolaei2015}. The principle of the two-stage beamforming technique used by JSDM can be applied to multi-cell systems, where each cluster of users is associated to one BS, and the outer precoders are used to cancel ICI \\cite{Liu2014a}. Note that widely used scheduling algorithms in small-scale MU-MIMO, e.g. SUS \\cite{Yoo2006}, result in extremely high complexity (of the order of $O(M^3K))$ in the large antenna regime \\cite{Lee2014c,Hong2015}. In contrast, low-complexity scheduling algorithms may attain acceptable performance with full digital beamforming in certain scenarios \\cite{Hong2015,Bai2014,Liu2015a}. However, further research must be done to design efficient scheduling rules for heterogeneous networks using hybrid precoding [cf. Section~\\ref{section:precoding:massive-mimo}].\n\n\nA process closely related to scheduling is user association, whose mathematical formulation resembles problem (\\ref{eq:general-combinatorial-problem:cost-function}). Matching a user to a particular transmitter, so that the association optimizes an objective function [cf. Section~\\ref{section:performance-uf}], is a complex combinatorial assignment problem \\cite{Liu2016}. Ongoing research on this topic have covered cellular (e.g. \\cite{Bethanabhotla2016}) and WLAN (e.g. \\cite{Athanasiou2015}) systems, but literature on heterogeneous networks is still limited \\cite{Liu2016}. \nHeuristic and simple association rules employed in current cellular networks, e.g. the max-RSS (received signal strength) or the biased-received-power based criteria, cannot include all system constraints neither fully exploit massive MIMO. In heterogeneous networks, one must consider per-base-station load and power constraints, per-user QoS constraints, and different number of antennas per transmitter. Construction of efficient rules for user association for future heterogeneous 5G networks is an emerging research topic, which must consider channel conditions, load balancing, and EE \\cite{Liu2016}. \nRecent results in \\cite{Li2015} show that user association to a single BS is optimal most of the times, which can simplify the association rules and algorithms. However, in dense scenarios where the coverage range per transmitter is limited (e.g., due to power constraints), multiple user-base station associations can reduce handover and waste of resources in the backhaul network \\cite{Shokri-Ghadikolaei2015,Bogale2016}. \n\n\n\\begin{figure}[t!]\n\t\\centering\n\t\\includegraphics[width=.98\\linewidth]{figure10.pdf}\\\\\n\t\\caption{Average sum rate vs number of antennas ($M$) vs SNR, and fixed number of active users, $K=128$.} \n\t\\label{fig:m-vs-snr}\n\\end{figure}\n\n \n\n}}\n\n\n\n\n\n{\\color{black}{\n\n\n\\subsection{Discussion and Future Directions}\n\\label{section:algorithms:discussion}\t\n\n\nTo analyze the performance of the scheduling schemes described in Section~\\ref{section:algorithms:aggregated-utility}, we consider uniformly distributed users deployed within a single cell with radius 250 m. The users have heterogeneous channel conditions, the path loss exponent is 3.5, and the log-normal shadow-fading has 8 dB in standard deviation. For the direct selection [cf. Algorithm~\\ref{alg:algorithms:direct-approach}], the utility function is the sum rate, in the indirect selection [cf. Algorithm~\\ref{alg:algorithms:indirect-approach}], the mapping function is the NSP, and the Max-RSS selects the users with larger channel gains. It is assumed full CSIT at the BS, the precoding scheme is full digital ZFBF (i.e. $M_{RF}=M$), and water-filling is used for power allocation. \n\n\nThe average achievable sum rate is shown in Fig.~\\ref{fig:k-vs-snr}, for a MISO configuration with $N=1$, $M \\in \\{8, 64\\}$, a cell edge SNR in the range $[0,20]$ dB, and several number of users, $K \\in [8, 128]$.\nFor $M=8$ (left-plot), we have a conventional MU-MIMO scenario with $K \\geq M$, $|\\mathcal{K}| \\leq M$, and the performance gap between the direct and indirect selection vanishes as $K$ increases. The Max-RSS selection partially exploits the MUDiv by only considering the channel magnitudes, which results in a considerable performance gap as $K$ grows.\nFor $M=64$ (right plot), we can divide the users ($K$) axis in two regions. For $K\\leq 32$, the system operates in the massive MIMO region, where there are enough spatial resources to allocate one stream per active user. Notice that as $K$ approaches $M$, e.g. $K=32$, the direct selection overcomes the other methods specially in the low SNR regime. For $K=64$, the indirect and Max-RSS methods attempt to allocate resources to $M$ users, whereas the direct selection optimizes its objective function regardless the attainable multiplexing gain. This result shows that even if $M$ is large, the performance metric is optimized when $|\\mathcal{K}| < M$, see \\cite{Bjornson2016}. It is worth noticing that for $M=64$ and $K=128$, the performance gap between the direct and indirect selection decreases, but the latter approach might require less computational processing. This illustrates the fact that each selection method provides different performance-complexity tradeoffs, depending on the parameters $M$, $N$, $K$, and the SNR regime. \nFig.~\\ref{fig:m-vs-snr} compares the performance of the selection methods with fixed $K=128$, and different values of $M$. The performance gap between the direct and indirect selection is small for $M\\leq 32$, where the MUDiv is rich. The Max-RSS selection might be an efficient alternative, if $M$ is large and the number of co-scheduled users is small, i.e., $M \\gg |\\mathcal{K}|$. \n\n\nScheduling in massive MIMO systems has not attracted the same attention as in conventional MU-MIMO systems because the excess number of antennas, additional DoF in the scheduling procedure, and the channel hardening effect result in marginal scheduling gains. However, in real-world massive MIMO systems with imperfect CSI, errors in the channel estimation and calibration, there will be some remaining interference among users, especially using linear precoding. The system will inevitably become interference-limited and the sum-rate may saturate (ceiling effect) at high SNR if the CSI and estimation accuracies do not improve accordingly. In this case, it is crucial to select the right number of users to serve, independently of spatial compatibility and channel correlation metrics. Conventional user selection algorithms [cf. Section~\\ref{section:algorithms:aggregated-utility}], may fail to serve the optimal number of users, even if the selected users have good spatial characteristics. \nIn other words, in massive MIMO systems, it is more important to identify the optimal number of users to serve rather than a set of users with certain channel characteristics \\cite{Bjornson2016}. Even random or max-RSS user selection will perform well if they select the right amount of users.\n\n\nThe overhead due to channel estimation is proportional to the number of transmit antennas $M$. Thus, massive MIMO is more adequate for TDD operation, and its implementation in FDD mode is still an open problem \\cite{YiXu2014,Bjornson2016}. Although uplink and downlink scheduling are independent tasks with different traffic loads and access techniques \\cite{Abu-Ali2013}, the CSI necessary to optimize the downlink transmission is estimated via uplink pilots (channel reciprocity).\\footnote{Experimental work for distributed MIMO \\cite{Hamed2016}, presented a channel reciprocity protocol that can achieve the performance of explicit channel feedback for mobile users, which is critical for massive MIMO settings.} Thus, further research is necessary to understand the relationship between uplink and downlink scheduling and their associated resource allocation for TDD-based massive MIMO. \n \n\n}}\n\n\n\n\n\n\n\n\\section{MU-MIMO Scheduling with partial CSIT}\n\\label{section:algorithms:selection-partial-csit}\n\nIn MU-MIMO systems with partial CSIT, resource allocation algorithms can multiplex up to $M$ users accounting for the feedback of one scalar (CQI) and one index (CDI) \\cite{Sharif2005}, [cf. Section~\\ref{section:introduction:needof-csit}]. The feedback information load is proportional to the number of deployed users and antennas, but scheduling usually requires rough quantization resolution in the CQI to differentiate between high and low rate users \\cite{Gesbert2004}. The CDI plays a more relevant role to achieve spatial multiplexing, thus, it requires a higher quantization granularity.\nUser scheduling requires two main steps: \\textit{i}) the transmitter sends pilots for CSI acquisition, the users quantize their channels and feed back the CQI and CDI; \\textit{ii}) subsets of users and beams are selected for data transmission based on a particular performance metric \\cite{Wagner2008}.\nAs discussed in Section~\\ref{section:precoding:partial-csit}, there are two approaches to acquire channel information using codebooks, i.e., quantizing either the channel, or the precoder that better fits the channel. In the following, we classified different scheduling approaches, based on the type of quantization.\n\n\n\\subsection{Scheduling using quantized channels}\n\\label{section:algorithms:selection-partial-csit:qunatized-csi}\n\nFor the sake of exposition, assume a MISO scenario ($N=1$), linear precoding, and equal power allocation ($\\rho=P_k = P\/M$, $\\forall k$). The $\\text{CQI}_{k}$ of the $k$-th user can be given by its SINR defined as \\cite{Jindal2006}:\n\n\\begin{equation}\\label{eq:pcsit_sinr_user_k}\n\\text{SINR}_{k} = \\frac{ \\rho \\| \\mathbf{H}_{k} \\|^{2} | \\hat{\\mathbf{c}}_{k} \\mathbf{W}_{k} |^{2} }\n{ 1 + \\rho \\| \\mathbf{H}_{k} \\|^{2} \\sum_{j\\neq k} | \\hat{\\mathbf{c}}_{k}\\mathbf{W}_{j} |^{2} }, \n\\end{equation}\nwhere $\\{\\mathbf{W}_{i}\\}_{i=1}^{M}$, are the precoding vectors extracted from the CDIs (e.g. using the ZFBF). $\\hat{\\mathbf{c}}_{k}$ is the actual quantized unit-norm channel or $\\text{CDI}_{k}$ given by\n\\begin{equation}\\label{eq:pcsit_channel_quantization_best_beam_user_k}\n\\hat{\\mathbf{c}}_{k} = \\underset{\\mathbf{c}_{b} \\in \\mathcal{C}}{ \\arg \\max} \\ \\ \\cos (\\measuredangle(\\mathbf{H}_{k},\\mathbf{c}_{b})),\n\\end{equation}\nwhere $\\mathcal{C}=\\{ \\mathbf{c}_{1}, \\ldots, \\mathbf{c}_{b}, \\ldots, \\mathbf{c}_{2^B} \\}$ is a predefined codebook, [cf. Section~\\ref{section:precoding:partial-csit}]. The $k$-th user determines its CDI using (\\ref{eq:pcsit_channel_quantization_best_beam_user_k}), according to a minimum distance criterion, see \\cite{Mukkavilli2003} for MISO or \\cite{Love2003,Chae2008} for MIMO setting. The solution of (\\ref{eq:pcsit_channel_quantization_best_beam_user_k}) has the following geometrical interpretation: the user $k$ selects the most co-linear or correlated codeword to its channel, which is equivalent to find the cone containing $\\mathbf{H}_{k}$, as illustrated in Fig.~\\ref{fig:hyperslab_cones}. \nNotice that the $\\text{SINR}_{k}$ takes into account channel magnitudes, quantization errors of the CDI, and the spatial compatibility of channel $\\mathbf{H}_{k}$ regarding $\\mathcal{C}$. However, to compute the precoders $\\{\\mathbf{W}_{i}\\}_{i=1}^{M}$, it is necessary to know a priory $\\mathcal{K}$, and the associated CDIs $\\{\\hat{\\mathbf{c}}_{i}\\}_{i=1}^{|\\mathcal{K}|}$, which results in a chicken-and-egg problem. Therefore, the exact value of (\\ref{eq:pcsit_sinr_user_k}) is unknown at the transmitter or receiver sides. Several works have proposed different ways to approximate (\\ref{eq:pcsit_sinr_user_k}), mainly by its upper\/lower bounds or expected value, cf. \\cite{Kountouris2007,Yoo2007,Trivellato2008,Conte2010,Xu2010,Ravindran2012,Sohn2012,Wang2013a,Huang2009a}. If the transmitter has statistical CSI knowledge, the formulation of (\\ref{eq:pcsit_sinr_user_k}) must take into account the covariance matrices, $\\mathbf{\\Sigma}_{k}$, $\\forall k$, to have a more accurate estimate of the interference powers \\cite{Hammarwall2008a}.\n\n\nThe CQI can also be given by the channel magnitude, i.e., $\\|\\mathbf{H}_{k}\\|^2$, but this measure ignores the valuable information contained in the codebook (spatial compatibility), and neglects quantization errors. The number of competing users, the feedback load, and scheduling complexity can be reduced by setting thresholds to the CQIs. This means that only users with strong channels will be considered for scheduling \\cite{Conte2010,Min2013}. Multiplexing and MUDiv gains are realized by carefully tuning the threshold according to statistics (e.g. \\cite{Xu2010}) or numerical characterization (e.g., \\cite{Yoo2007,Sohn2010,Min2013}) of the CQI, for a set of fixed parameters $B$, $M$, $K$, and $\\epsilon$, [cf. Section~\\ref{section:metrics-spatial-compatibility:spatial-clustering}]. \nIn some scenarios where the maximum number of spatial streams per user is at most one, each receiver uses either a weight vector \\cite{Trivellato2008} or a combining technique \\cite{Jindal2008,Bjornson2013a,Schellmann2010} to transform its MIMO channel matrix into an \\textit{effective} MISO channel vector.\n\n\n\nDifferent approaches to reduce feedback load and compute the CQI and CDI can be implemented (e.g. \\cite{Wang2013a}). \nIn general, the CQI requires less bits than the CDI, but an optimized bit allocation must take into account the SNR regime, the number of competing users $K$ \\cite{Xu2010,Yoo2007}, and practical quantization levels (e.g. MCSs) \\cite{Vicario2008}, [cf. Section~\\ref{section:algorithms:selection-partial-csit:two-stage-feedback}].\nAssume that the CQI and CDI are fed back by all competing users, so that the quantized channels can be reconstructed at the transmitter. Resource allocation can be performed using the methods described in Section~\\ref{section:algorithms} or by low-complexity approaches based on antenna selection, e.g. \\cite{Khoshnevis2013,Castaneda2015}. \nZF precoding is the most common technique used in scenarios with quantized channels, hence, scheduling based on metrics of spatial compatibility [cf. Section~\\ref{section:metrics-spatial-compatibility}], can be directly applied, e.g., \\cite{Yoo2007, Kountouris2007,Wang2007a,Chae2008}. The user selection for the general MIMO scenario can be performed by computing effective MISO channels or by treating each receive antenna as a virtual user \\cite{Xu2010}. \nIt is worth mentioning that ZF becomes interference-limited in the high SNR regime with fixed $B$. However, if $K$ or $B$ scale with the SNR, the achievable rates can be improved and the quantization errors can be mitigated \\cite{Jindal2006,Yoo2007}. \n\n\n\nA common approach to combat IUI (generated by quantization errors), is by reducing the multiplexing gain. Finding the optimal number of data streams is an optimization problem that depends on the system parameters, e.g. SNR regime, mobility, $K$, $B$, and $M$, see \\cite{Wang2007a,Dai2008,Kountouris2012,Zhang2011}. If $K \\approx M$, it is likely to have a codebook with limited granularity (fixed $B$) yielding irreducible IUI. In such a case, the subset of selected users $\\mathcal{K}$, must have cardinality strictly less than $M$, and their CDIs must have high resolution. In that way, the precoding performance can be improved and additional spatial DoF can be used to cancel interference out \\cite{Ravindran2012}. The results in \\cite{Wang2007a,Dai2008,Zhang2011} show that, the number of selected users highly depends on $B$, whose optimal value is a function of the SNR regime. For extreme values of the SNR (very low or high), the optimal transmission schemes are TDMA or SU-MIMO, which completely avoid IUI caused by inaccurate CSIT. \nExperimental results in \\cite{Jones2015} show that selecting about $\\frac{3}{4}$ of the total available beams maximizes performance in different MU-MIMO WLAN configurations.\n\n\n\nIt is worth noting that the SNR regime plays an important role in the scheduling rule design. Authors in \\cite{Huang2009a} suggested the following guidelines to improve performance: \n\\begin{enumerate\n\t\\item In the high SNR regime with fixed codebook size $2^B$, the system becomes interference limited [cf. Definition~\\ref{defn:interference-limited-system}]. The scheduling rules should prioritize users whose fed back channels reduce the quantization error, i.e., the CDI and the available spatial DoF defined the attainable performance. Results in \\cite{Yoo2007} show that the error quantization can be mitigated either in the large user regime ($K \\rightarrow \\infty$), or the high resolution regime ($B \\rightarrow \\infty$). \n\t\\item If the variance of the noise and the IUI are comparable, both the CQI and CDI should be taken into account for user selection.\n\t\\item In the low SNR regime, the system is noise limited and the scheduling rules should prioritize the CQI, since the CDI or error quantization play a negligible role.\n\\end{enumerate}\n\nThese guidelines for scheduling design can be applied to MU-MIMO scenarios with full CSIT, and they have been extended to multi-cellular cooperative systems in \\cite{Castaneda2015}.\n\n\n\n\\subsection{Scheduling using RBF}\n\\label{section:algorithms:selection-partial-csit:rbf}\n\nChannel information acquisition based on RBF uses a codebook $\\mathcal{F} = \\{ \\mathbf{f}_{1}, \\ldots, \\mathbf{f}_{b}, \\ldots, \\mathbf{f}_{2^B} \\}$, to define the precoders and provide high flexibility for scheduling, [cf. Section~\\ref{section:precoding:partial-csit}]. In contrast to the methods described in Section~\\ref{section:algorithms}, where the precoders are unknown before user selection, the approach using RBF can efficiently compute a performance metric that includes the effective channel gain and interference due to quantization errors. However, the accuracy of the quantized channel information is limited by the basis (RBF) or bases (PU2RC) that comprise the codebook \\cite{Sharif2005}.\nIn general, user scheduling is performed by joint user selection and precoding allocation, and the overall complexity depends on the parameters $M$, $B$, and $K$. \nThe set $\\mathcal{K}$ that solves problem (\\ref{eq:inner-outer-problem}), can be found as illustrated in Phase 1 of Fig.~\\ref{fig:beam_selection}, which is based on the algorithm proposed in \\cite{Sharif2005} assuming that $K>M$ and $M\\geq N$.\n\n\n$\\bullet$ \\textit{Training Phase}: The precoding vectors in $\\mathcal{F}$ can be generated according to a known distribution and chosen randomly. The transmitter sends pilots on all the spatial beams $\\mathbf{f}_{m}, \\forall m \\in \\{1, \\ldots, 2^B\\}$, so that all users can estimate their channels. The codebook design can be simplified by defining codewords as the orthonormal basis of $\\mathbb{R}^{M \\times 1}$, as is \\cite{Zhang2007a}. For this codebook design, antenna selection is implicitly performed at the receiver side. This means that each receive antenna is treated as an individual user, which can reduce scheduling complexity and feedback load.\nAnother approach to construct $\\mathcal{F}$, is by eigen-codebook design \\cite{Kountouris2006,Jindal2008}. Each user computes eigen-decomposition of its covariance matrix $\\mathbf{\\Sigma}_{k}$, $\\forall k$, and feeds back the eigenvector associated to its maximum eigenvalue. This approach requires extra feedback load, but can provide flexibility to the scheduler.\nThe quantization granularity of $\\mathcal{F}$ can be enhanced if the codebook comprises multiple bases, as in PU2RC \\cite{Ravindran2012}.\n\n\n$\\bullet$ \\textit{CSI Feedback}: The users compute a CQI metric per beam, and report their largest CQI to the transmitter. The \\textit{effective SINR} of the $k$-th user in the $m$-th beam can be defined as \\cite{Sharif2005}:\n\n\\begin{equation}\\label{eq:pcsit_rbf_sinr_user_k}\n\\text{SINR}_{k,m} = \\frac{ \\rho | \\mathbf{H}_{k} \\mathbf{f}_{m} |^{2} }\n{ 1 + \\rho \\sum_{n\\neq m} | \\mathbf{H}_{k}\\mathbf{f}_{n} |^{2} },\n\\end{equation}\nand the index of the best precoder is given by\n\\begin{equation}\\label{eq:pcsit_rbf_best_beam_user_k}\ni_{k} = \\underset{m \\in \\mathcal{B}}{\\arg \\max} \\ \\ \\text{SINR}_{k,m}\n\\end{equation}\nwhere $\\mathcal{B} \\subseteq \\{1,\\ldots,2^B\\}$, is an index subset of active codewords defined by the transmitter so that $|\\mathcal{B}| \\leq M$. The user designates its CDI$_{k}=i_{k}$ and CQI$_{k}=Q(\\text{SINR}_{k,i_{k}})$ with $i_k \\in \\mathcal{B}$, and $Q(\\cdot)$ is a quantization function, see \\cite{Zhang2007a,Vicario2008} and discussion in Section~\\ref{section:algorithms:selection-partial-csit:two-stage-feedback}. \nFor $N>1$, evaluating (\\ref{eq:pcsit_rbf_sinr_user_k}) and (\\ref{eq:pcsit_rbf_best_beam_user_k}) can be performed in different ways \\cite{Schellmann2010}: using receiver combining techniques, e.g. MRC, if one beam is assigned per user; or equalization techniques, e.g. MMSE \\cite{Tse2005}, when multiple beams are assigned per user.\nThe CQI computation is not limited to the achievable SINR or peak rate, e.g., it can be computed from sufficient statistics of the channel conditions and past CQIs \\cite{Wagner2008}. For instance, authors in \\cite{Simon2011} defined the CQI as an estimation of the minimum power required to achieve a target SINR. In \\cite{Kountouris2008a}, the CQI is defined as a function of the current and previous channel conditions, which is an approach similar to the CDF-based scheduling \\cite{Nguyen2015}. This probabilistic method uses the channel or rate distributions\\footnote{Observe that the nature of the objective function modifies the statistics of the CQI. For instance, if we want to maximize the sum rate, then users that experience better channel conditions are more likely to be selected \\cite{Bjornson2009a}.} to schedule the users that are more likely to achieve high performance \\cite{Kountouris2008a}.\n\n\n\nOne can preselect the competing users based on a performance threshold, which reduces feedback and scheduling complexity. Accounting for i.i.d. channels allows to simplify the threshold design, since the channel directions follow a uniform distributions \\cite{Huang2007}.\nThe $k$-th user feeds back information only if its associated CQI is above a predefined threshold, $\\gamma_{th}$, a scheme called \\textit{selective multiuser diversity}, see \\cite{Gesbert2004,Sharif2005,Huang2007,Zhang2007a,Kountouris2008a,Xu2010}. \nAn extension of such a method is the multi-threshold selection, where the scheduling rule also takes into account the MCSs supported over each link, e.g. \\cite{Vicario2008,Tang2010}. If the system optimization involves queue stability constraints, other thresholds based on QSI can be imposed on top of $\\gamma_{th}$, provided that the users have knowledge of their respective queue lengths \\cite{Chen2013,Destounis2015}.\n\n\nPreselection can be performed in the spatial domain [cf. Section~\\ref{section:metrics-spatial-compatibility:spatial-clustering}], where the users meet a constrained in the quantization error. The set of competing users can be defined as $\\{k \\in \\bar{\\mathcal{K}}: \\cos (\\measuredangle(\\mathbf{H}_{k},\\mathbf{f}_{i_{k}})) < \\epsilon\\}$, for a predefined threshold $\\epsilon$, see \\cite{Huang2007,Kountouris2008a}.\nIn the large user regime ($K \\rightarrow \\infty$) with fixed $M$ and $N$, the MUDiv\\footnote{Numerical analysis of capacity versus the number of users $K$, for both full and partial CSIT, e.g. \\cite{Yoo2006,Shen2006,Yi2011,Nam2014a,Ko2012,Lee2014,Tran2010, Choi2007c,Kobayashi2007,Park2010,Huang2009a}, show diminishing returns of MUDiv over i.i.d. Rayleigh fading channels, i.e., the capacity gain flattens as $K\\rightarrow \\infty$, see \\cite{Viswanath2002,Hassibi2007}.} scales as $\\log(\\log(KN))$ \\cite{Sharif2007}, which suggests that preselection based on channel statistics, long-term throughput, or even randomly (e.g., \\cite{Huh2012}), can reduce the feedback load and achieve MUDiv gains. \n\n\n$\\bullet$ \\textit{User Selection}: The transmitter must find the set of users that maximizes the performance metric, e.g. WSR. There are several scheduling approaches, e.g., treating each receive antenna as a single user, assigning at most one beam per user, or allocating multiple beams per user. \nThe simplest selection is assigning the $m$-th beam to user $k_m$, which is defined as\n\\begin{equation}\\label{eq:pcsit_rbf_best_user_per_beam}\nk_{m} = \\underset{k \\in \\bar{\\mathcal{K}} \\ : \\ \\text{CDI}_{k} = m }{\\arg \\max} \\ \\ \\text{CQI}_{k} \n\\end{equation}\nIf the quantization granularity of the function $Q(\\cdot)$ is low, it may happen that (\\ref{eq:pcsit_rbf_best_user_per_beam}) accepts more than one solution, in which case $k_{m}$ can be chosen randomly among the best user for beam $m$ \\cite{Zhang2007a}. \nIf the elements of $\\mathbf{H}_{k}$ are i.i.d., each selected user cannot achieve maximum SINR for more than two beams on one antenna provided that $K > M$. This is a valuable design guideline that allows to reduce scheduling complexity \\cite{Sharif2005,Chen2013}. Analytical results in \\cite{Hassibi2007} show that $M$ must be scaled proportional to $\\log(K)$, so that user starvation is avoided.\nOnce that the set $\\mathcal{K} = \\{k_{m}\\}_{m=1}^{M}$ has been found, power allocation and link adaptation can be performed. \n\t\n\n\n\nOwing to the fact that the quantization granularity is fixed and bounded ($B < \\infty$), the precoders $\\mathbf{f}_{m} \\in \\mathcal{F}$ cannot fully separate users in the spatial domain. Hence, IUI is unavoidable and particularly harmful in high SNR. Moreover, in the sparse user regime, $K \\approx M$, RBF cannot benefit from MUDiv and performs poorly. Several user scheduling algorithms have been proposed in \\cite{Lee2016} to handle sparsity and limited MUDiv over mmWave channels.\nThe optimum number of beams that maximizes the WSR is a function of the number of competing users and the SNR regime \\cite{Wagner2008,Kim2005a,KountourisThesis}. Analytical results establish that for RBF with fixed $K$, and extreme values of the SNR regime, the optimal number of active beams is one\\footnote{These results are equivalent for the case where channel are quantized in Section~\\ref{section:algorithms:selection-partial-csit:qunatized-csi}, see e.g., \\cite{Wang2007a,Dai2008,Zhang2011}.} \\cite{Wagner2008,KountourisThesis}.\nDepending on the channel conditions and the system constraints, user scheduling might yield a dynamic switching between TDMA (time-sharing) and MU-MIMO transmission. This can take place if IUI is very high, or if the individual rate or power constraints are violated \\cite{Kountouris2005a,Kountouris2008}. \nTherefore, efficient operation in an arbitrary SNR requires a reduced number of scheduled users and active beams, i.e., $|\\mathcal{B}| < M$. Analytical results in \\cite{Wagner2008} show that $|\\mathcal{K}| = M$ can be attained if $K \\rightarrow \\infty$ for a fixed $B$. \nIn general, the optimal set of selected users is such that $|\\mathcal{K}| B_2$, and the fraction of bits dedicated for CDI scales proportionally to $\\log(B_t)\/B_t$, see \\cite{Khoshnevis2013}.\n\n\n\nIf $K \\approx M$, larger values of $B_1$ are required to circumvent the lack of MUDiv and properly identify strong users. However, in the high SNR regime is more beneficial to have $B_1 < B_2$, since quantization errors in the CDI are the main performance-limiting factor \\cite{Zhang2011,Ravindran2012}.\nMUDiv clearly affects the optimal partition of $B$. Numerical results in \\cite{Kobayashi2011} show the effects of $K$ over the feedback rates, and the interdependence between MUDiv and $B_2$.\nAccounting for link adaptation, $B_1$ must be chosen so that the CQI fully exploits the granularity of the available MCSs, either for channel quantization \\cite{Trivellato2008} or RBF \\cite{Vicario2008}. \nThe value of $B_1$ depends on the type of metric that defines the CQI. For example, the SINR and the achievable rate are real numbers, whereas other metrics might already be defined as integer numbers, see \\cite{Kountouris2008a}. \n\n\n\n\nIn the second feedback phase in Fig.~\\ref{fig:two-phase-feedback}, each user in $\\mathcal{K}$ uses $B_2$ bits to report its CDI. This mean knowledge of refined channel information at the transmitter, e.g., more accurate spatial directions or effective channel gains.\nIf the system is constrained in the total feedback bandwidth, $|\\mathcal{K}|B_2$, heterogeneous and dynamically allocated bits can be used to quantize the CDI. By assigning different number of bits per user, i.e., $B_{2(k)}$, $\\forall k \\in \\mathcal{K}$, efficiency at the CDI feedback phase can be achieved \\cite{Sohn2012}. The dynamic assignment of $B_{2(k)}$ is more effective in scenarios where the users have heterogeneous average long-term channel gains. The bit allocation rules might consider the following guidelines \\cite{Xu2009,Sohn2012,Khoshnevis2013}:\n\n\\begin{enumerate\n\t\\item for high SNR users, large values of $B_{2(k)}$ reduce quantization errors and mitigate IUI. This is particularly important in scenarios where the CDI is used to compute the precoder weights (e.g., MMSE \\cite{Kountouris2005a} or ZFBF \\cite{Xu2010,Khoshnevis2013}), [cf. Section~\\ref{section:algorithms:selection-partial-csit:qunatized-csi}]. \n\t\\item for low SNR users, the performance is noise limited, i.e., the noise variance is larger than the interference, and the value of $B_{2(k)}$ is relatively less important to optimize performance. \n\t\\item dynamic assignment of $B_{2(k)}$ can be extended to sequential transmissions with error correction mechanisms (e.g. ARQ \\cite{Xu2009}). Such an assignment can be used to further refine $\\mathcal{K}$, by temporarily dropping users retransmitting the same packet multiple times.\n\t\\item in multiple-transmitter scenarios, the level of coordination and transmission scheme [cf. Section~\\ref{section:algorithms:multi-cell-selection-classification}], define the methodology to assign the value of $B_{2(k)}$ at each transmitter \\cite{Khoshnevis2013}. \n\\end{enumerate}\n\n\n\nResults in \\cite{Sohn2012} suggest that grouping users based on their locations or long-term channel gains (e.g., \\cite{Ho2009,Nam2014,Moretti2013}), yields a more efficient assignment of the feedback bandwidth and simplify the user grouping. \nAnother parameter to be considered when defining $B_1$ and $B_2$, is the time used for hand-shaking between feedback phases. The total time used for training and data transmission must be kept below the coherence time of the channel, so that the impact of delayed\/outdated CSI is minimized \\cite{Kountouris2008,Sohn2012}. Otherwise, increasing $B_2$ would not be enough to achieve MIMO gains \\cite{Zhang2011}. \nAnalytical results in \\cite{Ravindran2012} show that for multi-basis codebooks (e.g., PU2RC), large values of $B_2$ usually do not provide considerable capacity gains, and the overall performance is highly sensitive to MUDiv. A design rule to bear in mind is that the accuracy of the CSIT is more valuable than MUDiv in practical MU-MIMO scenarios \\cite{Ravindran2012,Xu2010}. \n\n\n\\begin{figure}[t!]\n\t\\centering\n\t\\includegraphics[width=0.8\\linewidth]{figure12.pdf}\\\\\n\t\\caption{Two-stage feedback MU-MIMO scheduling}\n\t\\label{fig:two-phase-feedback}\n\\end{figure}\n\n\n\n\n\\subsection{Implementation in Cellular Scenarios}\n\\label{section:algorithms:multi-cell-selection-classification:discussion}\n\n\nThe scheduling algorithms for MU-MIMO in LTE-Advanced rely on quantized CSI: \\textit{i}) the RI\/PMI metrics contain information regarding the SU-MIMO channel (due to backward compatibility\\footnote{The limitations due to PMI feedback in SU-MIMO mode can be overcome for certain scenarios by means of efficient estimations of the CDI\/CQI. One can take into account spatial compatibility between the MIMO channels and the codebooks, i.e., estimating the effective channel gains \\cite{Wang2013a}.}) projected onto the subspace defined by the codebook; \\textit{ii}) the CQI metric indicates the energy of the projection, and it might include ICI and noise \\cite{Liu2012}. Since the aggregated multiuser channel can be constructed by concatenating the users PMI metrics, and the CQIs are known at the transmitter, the scheduling algorithms described in the subsections above can be directly used in cellular scenarios. \n\n\nIn general, the scheduling algorithms in LTE-Advanced are proprietary and implementation-specific and there is no standardized procedure to define them \\cite{Liu2012}. It is worth noting that the amount of available CSIT defines the transmission mode (SU- or MU-MIMO), and the scheduling decisions. Practical scheduling rules with switching mode can be defined by evaluating the achievable performance of SU-MIMO and MU-MIMO (with multi-rank transmission) modes, and simply choosing the one with better performance \\cite{Tang2010,Wang2012d,Fan2014}. However, robust switching between these modes still requires research to guarantee adaptability to changes in channel and traffic conditions, as well as viable computational complexity and scalability \\cite{Li2014}.\n\nAuthors in \\cite{Wang2012d}, highlight the fact that for known precoding matrices at the transmitter, it is possible to generate look-up-tables (LUTs) that contain information regarding spatial compatibility and potential interference. Resource allocation based on LUTs could be used to significantly reduce the complexity of the scheduling algorithms. There are several factors that must be considered for CS\/CBF design in cellular systems \\cite{Zhang2009,Huh2012,Marzetta2010,Marsch2011,Gesbert2010,Bjornson2013}: dynamically determining whether or not coordination is required, switching between JT and CS\/CBF, optimizing cluster formation and sizing, and scalability issues. The resource allocation strategies must also include constraints on backhaul bandwidth, CSI acquisition, latency, QoS, mobility, and synchronization. \n\n\n\n\\subsection{Implementation in WLAN Scenarios}\n\\label{section:algorithms:wlan-selection}\n\nIn the IEEE 802.11ac standard, MU-MIMO transmission consists of two tasks \\cite{Aboul-Magd2013}: \\textit{i}) to identify the users that belong to the transmission set, which is implementation-specific and might depend on priority weights or traffic related parameters [cf. Section~\\ref{section:performance-uf}]; \\textit{ii}) the assignment of a Group ID for each set of co-scheduled users, and the downlink transmission signaling. For a given time instance, the AP constructs a Group ID assignment table. The number of rows is defined by the available number of ID groups, and the columns are given by the number of associated users. The condition to have a proper Group ID, is to have different users assigned to each one of the available stream positions. \nSelecting the proper Group ID and its associated scheduled users is equivalent to a coloring problem over a two dimensional array, whose optimal solution can be found by ExS. A heuristic algorithm was proposed in \\cite{Aboul-Magd2013}, where the positions of the users in a particular Group ID are determined according to the probability of occurrence. \nThe Group ID selection and success allocation probability can be improved by modeling the discrete searching process as a linear sum assignment problem, for which there exist reliable polynomial-time algorithms \\cite{Burkard2009}.\n\n \n\nFor the general MU-MIMO scenario, a selected user can receive more than one data stream, and all of them must use the same MCS \\cite{Arubanetworks2014}. The authors in \\cite{Cheng2014} proposed a user selection algorithm inspired by \\cite{Fuchs2007}, originally designed for cellular scenarios. The scheme applied BD with geometric-mean decomposition to guarantee equal MCS allocation over all spatial streams assigned to a single user. That work highlights the need of careful stream allocation per selected user, where the best number of streams is not necessarily equal to rank of the channel.\nAnother approach to guarantee maximum sum rate with joint link adaptation (MCS selection), BD, and user\/stream selection was proposed in \\cite{Rico-Alvarino2014}. The authors extended the scheduling algorithm in \\cite{Shen2006}, originally designed for cellular scenarios, to WLANs with partial CSIT. The link adaptation is performed by a machine learning classifier that provides robustness to CSI inaccuracy. Numerical results suggest that estimation of the IUI is required to allocate MCS more efficiently. \n{\\color{black}{The next generation of 802.11 standard will define the conditions and methods for user grouping\/association \\cite{Liao2016}. A critical open problem is to build scheduling algorithms to balance overhead, fairness and individual priorities.}}\n\n\n\\subsection{Scheduling Complexity}\n\\label{section:algorithms:complexity}\n\nThe scheduling complexity can be classified in two types \\cite{Lee2014b}: implementation complexity and computational complexity. The former, refers to the amount of signaling overhead and information exchanged among different network entities. The latter refers to the processing time required to execute a certain algorithm at the transmitter or CU. \nThe implementation complexity is assumed to be reduced whenever the channel information is quantized [cf. Section~\\ref{section:precoding:partial-csit}]. This type of complexity can be estimated as a function of the system parameters $K$, $B$, $N$, $M$, and the number of clustered transmitters. Nevertheless, to the best of our knowledge, there is no published work or reference framework that analyze the complexity in a fundamental and general way, at least for the MU-MIMO systems considered here. Most research in the field of limited CSI feedback has focused on the following issues related to complexity \\cite{Gesbert2007a,Marsch2011}: \\textit{i}) reducing the number of parameters to be quantized, e.g., bits to quantize the CQI and CDI; \\textit{ii}) reducing the required quantized feedback resolution; and \\textit{iii}) constraining the signaling and message exchange within a cluster, and minimizing the overall coordination.\n\n\n\nIn the MU-MIMO literature, most works focus on the computational complexity required to select users, to extract the precoders, and to perform power allocation. There are several metrics to estimate the computational complexity: \\textit{i}) number of real or complex operations. \\textit{ii}) number of flops, where a flop is defined as a floating point operation \\cite{Shen2006}, e.g., a real addition, multiplication, or division. \\textit{iii}) using the big-Oh notation, ${O}(\\cdot)$, which is proportional to the term that dominates the number of elementary operations needed to execute an algorithm \\cite{Moretti2013}. \\textit{iv}) other metrics, such as the number of vector\/matrix operations, the number of iterations needed for convergence, or results based on simulations and execution time.\nTherefore, there is no unified approach to characterize the computational complexity for scheduling algorithms, but the aforementioned metrics, summarized in Table~\\ref{tab:complexity}, provide a coarse assessment of the computational load order. \n\nWe hasten to say that another sort of complexity analysis can be performed for MU-MIMO systems, in which precoders and powers are jointly optimized for a fixed set of users $\\mathcal{K}$, [cf. Section~\\ref{section:performance-uf:wsr-with-qos}]. The resource allocation problem only involves $\\mathbf{W}$, $\\mathbf{P}$, and is formulated as the optimization of a certain system-level utility function, $U(\\cdot)$, [cf. Section~\\ref{section:performance-uf:weighted-sum-rate}], subject to resource budget constraints, see \\cite{Hong2012} and references therein. In these cases, the set of scheduled users is not optimized, and the complexity is normally defined as a function of $M$, $N$, and the characteristics of $U(\\cdot)$, e.g., convexity or non-convexity. \n\n\n\\begin{table}[t!]\n\t\\renewcommand{\\arraystretch}{1.3}\t\n\t\\caption{Summary of Computational Complexity Metrics for MU-MIMO Scheduling Algorithms}\n\t\\label{tab:complexity\n\t\\centering\n\t\\begin{tabularx}{0.48\\textwidth}{l X}\n\t\t\\toprule\n\t\t\\bfseries\tMetric & \\bfseries\tReferences \\\\\n\t\t\\midrule\t\n\t\tFlop-based & \\cite{Shen2006, Chen2008, Tran2010, Dai2009, Mao2012, Ko2012, Tran2012, Nam2014a, Elliott2012, Hei2009} \\\\\n\t\t\\midrule\n\t\tReal\/complex Operations & \\cite{Huang2013, Dimic2005, Huang2012b, Chen2007a, Wang2010, Conte2010, Wang2008a, Maciel2010, Mao2012, Shi2012} \\\\\n\t\t\\midrule\n\t\t${O}(\\cdot)$ & \\cite{Shen2006, Moon2013, Lim2009, Dartmann2013, Xia2009, Sohn2012, Aniba2007, Chan2007, Moretti2013,Wagner2008,Liu2014a,YiXu2014,Liu2015a} \\\\\n\t\t\\midrule\n\t\tOther Metrics & \\cite{Cheng2014, Vicario2008, Tsai2008, Park2010, Yoo2006, Razi2010, Wang2010, Fuchs2007, Bayesteh2008, Chung2010, Driouch2012, Yoo2005a, Sigdel2009a, Yi2011, Xia2009, Castaneda2015, Stridh2006a, Matskani2008, Moretti2013, Elliott2009, Lau2005a,Liu2014a} \\\\\n\t\t\\bottomrule\t\n\t\\end{tabularx}%\n\\end{table}%\n\n\n\n\n\n{\\color{black}{\n\t\t\n\\subsection{Discussion}\n\\label{section:algorithms:selection-partial-csit:discussion}\t\n\n\nThe two approaches in Section~\\ref{section:algorithms:selection-partial-csit:qunatized-csi} and \\ref{section:algorithms:selection-partial-csit:rbf} are used in scenarios where the transmitters have different capabilities and constraints. The former approach is applied when the transmitter can compute linear precoding using the quantized channels [cf. Section~\\ref{section:precoding:linear}]. The latter approach is used when the precoders are predefined and cannot be modified based on the instantaneous CSI. The bit allocation for the CQI and CDI, described in Section~\\ref{section:algorithms:selection-partial-csit:two-stage-feedback}, can be used to analyze both approaches, channel quantization and RBF. \nPractical resource allocation algorithms work with partial CSI, whose computational complexity depends on the codebook resolution, the number of deployed antennas and active users. On the one hand, high codebook resolution improves peak rates and reduces IUI, but it is a bottleneck for the uplink in FDD mode. On the other hand, dynamic channel-based codebook designs speed up the resource allocation, reduce user-pairing complexity, and mitigate interference \\cite{Li2014}. \nThe CQI and CDI reports can be optimized to enhance centralize or distribute resource allocation, and they are also functions of the operative wide band and feedback periodicity \\cite{Ku2014}. The main issue related to CSI feedback is to find a good trade-off between signaling overhead and accurate channel quality estimation. Enhanced scheduling algorithms for multiuser systems will depend on the type of CSI available at the BSs (e.g. channel quantization or RBF), the deployment configuration, and more complex decision-making rules that can maximize the overall throughput \\cite{Capozzi2013}.\n\n\nIn practical massive MIMO scenarios, hybrid precoding will be used for MU-MIMO communication, whose performance will depend on the number of RF chains at the transmitter and the accuracy of the fed back CSI. Moreover, the type of transceiver architecture and precoding scheme must be defined according to the objective function (e.g. sum-rate or EE) and the user sparsity \\cite{Gao2016}. Further research is needed to understand the joint optimization of bit and stream allocation using hybrid precoding, taking into account hardware resolution and channel estimation accuracy \\cite{Kutty2016}. \n\n\n\t\n}}\n\n\n\n\n\n\n\\section{Power Allocation}\n\\label{section:power-allocation}\n\n\nThe optimal power allocation $\\mathbf{P}$ in (\\ref{eq:inner-outer-problem}) depends on the CSIT availability, the type of precoding scheme implemented at the transmitter, the individual user priorities, and the objective function. Accounting for full CSIT in single-transmitter scenarios, the optimal power allocation is usually known in analytical closed-form for several performance metrics, e.g., BER, SINR, WSR, or fairness \\cite{Bartolome2006,Vu2007}. \nAssuming that $\\mathcal{K}$ is fixed, and linear precoding is implemented at the transmitter, a network-centric power control algorithm finds the optimal $\\mathbf{P}$ for WSR maximization through convex optimization, i.e., using the water-filling principle, see \\cite{Palomar2005,Cover2006,Boyd2004}. The linear precoding decouples the signals into orthogonal spatial directions mitigating the IUI, and water-filling allocates powers according to the effective channel gains [cf. Definition~\\ref{defn:effective_channel_gains}]. \n\nIn scenarios with a fixed feasible set of users $\\mathcal{K}$, [cf. Definition~\\ref{defn:feasible_set_of_users}], and assuming that $\\mathbf{W}$ is coupled with $\\mathbf{P}$, the power allocation may involve, for example, a WSR maximization with rate control, sum power minimization with individual SINR constraints, or a max-min SINR problem, see \\cite{Schubert2004,Tan2012,Koutsopoulos2008,Bjornson2013}. For this kind of problems, power control algorithms are designed based on optimization theory (see \\cite{Hong2012,Bjornson2013}), and the Perron-Frobenius theory\\footnote{The Perron-Frobenius theory is a fundamental tool to solve congestion control problems and optimize interference limited systems [cf. Definition~\\ref{defn:interference-limited-system}], such as wireless sensor or multi-hop networks \\cite{Stanczak2009}.} for non-negative matrices (see \\cite{Stanczak2009,Chiang2008}). \nIn contrast to WSR maximization, where water-filling assigns more power to stronger channels, other objective functions require to allocate powers in a different way. For instance, balancing the power over all users so that weak users are assigned more power to improve their error rates \\cite{Cheng2014}, assigning powers according to target SINRs \\cite{Chung2010,Tsai2008,Simon2011,Stridh2006a,Matskani2008,Ku2015}, or considering queue stability constraints \\cite{Huang2012a}. Some works model $\\mathbf{W}$ so that the power is absorbed into it, and optimizing the directions and magnitudes of the precoder weights implicitly performs power control, e.g., \\cite{Dartmann2013,Zhang2007b}. \nThe interested reader is referred to \\cite{Chiang2008} for a comprehensive survey on theory and algorithms for joint optimization of $\\mathbf{W}$ and $\\mathbf{P}$. \n\nEqual power allocation (EPA) is a suboptimal strategy used to simplify the evaluation of the utility function $U(\\cdot)$, especially when the transmitter does not have full CSI knowledge \\cite{Jindal2006}. In certain scenarios, EPA allows a more tractable system performance analysis or derivation of statistics based on $K$, $M$, $N$, or $B$, which generally yields closed-form expressions. Assuming full CSIT, if the WSR maximization problem [cf. Section~\\ref{section:performance-uf:weighted-sum-rate}] is optimized using ZF-based or BD-based precoding schemes, the EPA (directly proportional to the individual weights $\\omega_{k}$, $\\forall k \\in \\mathcal{K}$), asymptotically achieves the performance of the optimal water-filling power allocation at high SNR \\cite{Lee2007}. \t\nThe authors in \\cite{Song2008} discussed the secondary role of power allocation when optimizing problem (\\ref{eq:inner-outer-problem}). The paper suggested that more efforts should to be taken to find $\\mathcal{K}$ and the corresponding $\\mathbf{W}$, which may justify the adoption of EPA under specific SNR conditions.\n\n\n\nIn systems with partial CSIT, power allocation requires numerical methods that depend on the optimized performance metric \\cite{Vu2007}. Consider a practical scenario where $B$ is finite and fixed, and $\\mathcal{K}$ has been found by one of the methods described in Section~\\ref{section:algorithms:selection-partial-csit}. In such a scenario, the system is limited by interference [cf. Definition~\\ref{defn:interference-limited-system}], at the moderate and high SNR regimes, since the interference components in the denominator of (\\ref{eq:pcsit_sinr_user_k}) and (\\ref{eq:pcsit_rbf_sinr_user_k}) are non-zero. Therefore, one of the main objectives of power control is to perform interference management. However, to compute the optimal $\\mathbf{P}$ for WSR maximization, the transmitter must have knowledge of all interference components for all users. This results in non-convex optimization problems, for which efficient algorithms (depending on the operating SNR regime) can provide suboptimal solutions \\cite{Kountouris2008}. Moreover, global knowledge of the interference components at the transmitter may not be attainable in limited feedback systems (e.g. only CQIs are known), and adopting EPA is a common practice in the reviewed MU-MIMO literature. \n\n\n\n\\begin{table*}[t] \\scriptsize\n\t\\renewcommand{\\arraystretch}{1.3}\t\n\t\\caption{Scheduling Approaches and their associated Power Allocation Methods}\n\t\\label{tab:power-allocation\n\t\\centering\t\t\n\t\\begin{tabularx}{\\textwidth}{l *{3}{>{\\centering\\arraybackslash}X} } \n\t\t\\toprule\n\t\t\\textbf{Method} & \\textbf{EPA} & \\textbf{Water-filling} & \\textbf{Adaptive} \\\\\n\t\t\\midrule\n\t\t\\textbf{Utility-based} & \\cite{Moon2013, Chen2007a, Chen2008, Xia2009, Rico-Alvarino2014, Fan2014, Wang2015, Tang2010, Vicario2008, Chae2008, Kountouris2007, Kountouris2006, Shirani-Mehr2010, Zhang2011, Ravindran2012, Jindal2008, Torabzadeh2010, Cui2011a, Seifi2011, Park2010, Wang2012d, Lossow2013,Hammarwall2008,YiXu2014,Bogale2015} & \\cite{Dimic2005, Huang2013, Wang2008a, Shen2006, Huang2012b, Chen2008, Ko2012, Tran2012, Chan2007, Lim2009, Tran2010, Boccardi2006, Huh2012,Bogale2015} & \\cite{Zhang2005a, Cheng2014, Koutsopoulos2008, Kobayashi2007, Tsai2008, Hammarwall2007, Dartmann2013, Zhang2009, Yu2013,Liu2014a} \\\\\n\t\t\\midrule\n\t\t\\textbf{CSI-Mapping} & \\cite{Kountouris2006b,Nam2014, Jiang2006, Bayesteh2008, Adhikary2013, Adhikary2013a, Chen2007a, Wang2010, Fuchs2007, Bayesteh2008, Wang2006, Xia2009, Lim2009, Tran2010, Zorba2008, Cheng2014, Yang2011, Zakhour2007, Huang2009a, Chae2008, Yoo2007, Kountouris2007, Kountouris2008, Chen2013, Zhang2007a, Kountouris2006a, Wang2007a, Trivellato2008, Choi2007c, Min2013, Sohn2010, Nam2014a, Kountouris2008a, Kountouris2005, Huang2007, Xu2010, Sohn2012, Khoshnevis2013, VanRensburg2009, Hosein2009, Castaneda2015, Jang2011, Schellmann2010, Aniba2007, Christopoulos2013,Wagner2008,Xu2009a,Liu2015a} & \\cite{Tu2003, Yoo2006, Shen2006, Dai2009, Lee2014, Wang2010, Mao2012, Shi2012, Fuchs2007, Tejera2006, Maciel2010, Driouch2012, Yoo2005a, Wang2006, Sigdel2009a, Yi2011, Sun2010, Lau2009, Kountouris2008, Wang2010a, Souihli2010, Swannack2004, Shirani-Mehr2011, Kountouris2005a,Lee2014c} & \\cite{Jagannathan2007, Razi2010, Zhang2005a, Chung2010, Christopoulos2013, Huang2012a, Kountouris2008, Zhang2007b, Simon2011} \\\\\n\t\t\\midrule\n\t\t\\textbf{Metaheuristic (stochastic)} & \\cite{Wang2015, Zhang2011, Park2014} & \\cite{Elliott2012, Elliott2009, Lau2005a, Hei2009} & \\cite{Bjornson2014, Cottatellucci2006} \\\\\n\t\t\\midrule\n\t\t\\textbf{Classic Optimization} & \\cite{Maciel2010} & \\cite{Chan2007, Moretti2013} & \\cite{Stridh2006a, Matskani2008, Ku2015, Song2008} \\\\\n\t\t\\midrule\n\t\t\\textbf{Exhaustive Search} & \\cite{Zakhour2007, Destounis2015} & \\cite{Chan2007,Swannack2004} & - \\\\\n\t\t\\bottomrule\n\t\\end{tabularx}%\n\\end{table*}%\n\n\n \nIn multi-transmitter scenarios, the level of coordination, the availability of user data and CSIT, and the precoding scheme determine the best power allocation policy. In full coordinated scenarios, all transmitters belong to the same infrastructure, and a CU determines the power allocation across the cluster. Assuming global CSIT, a fixed set $\\mathcal{K}$, and linear precoding schemes, the power allocation that optimizes a global performance metric subject to per-transmitter power constraints can be realized numerically or through water-filling, see \\cite{Zhang2009,Huh2012}. \nFor scenarios with partial coordination between transmitters, assuming that $\\mathcal{K}$ is globally known, the power allocation depends on the precoding schemes computed from local CSI and individual priorities $\\omega_{k}$, $\\forall k \\in \\mathcal{K}$, known by each transmitter, see \\cite{Jorswieck2008,Park2012a,Bjornson2010}.\n\n\nTable~\\ref{tab:power-allocation} summarizes the reviewed scheduling methods and their associated power allocation strategies: EPA, water-filling, and adaptive methods. The references listed under the \\textit{adaptive} category depend on the particular objective function and system constraints, see Tables \\ref{tab:precoding} and \\ref{tab:optimization-criteria}. Those references jointly optimize $\\mathbf{P}$ and $\\mathbf{W}$ via conventional optimization methods \\cite{Boyd2004} and iterative algorithms. \n\n\n\n\n\n\n\n\n\n{\\color{black}{ \n\\subsection{Summary and Future Directions}\n\\label{section:power-allocation:ee}\n\n\nPower allocation is a dynamic process that compensates instantaneous channel variations to maintain or adjust the peak rates \\cite{Dahlman2013}. In MU-MIMO scenarios, power control is required to optimize an objective function, mitigate interference, and satisfy system constraints. Several problem formulations deal with convex objectives and linear constraints, for which water-filling can compute the optimal power allocation. Alternatively, EPA simplifies the optimization by transforming $\\mathbf{P}$ into a constant vector, which becomes close-to-optimal for ZF at high SNR. In multi-cell scenarios, power allocation requires exchange of control messages to mitigate ICI. The amount of signaling overhead depends on the type cooperation and coordination between transmitters, and the coordinated signaling (centralized or distributed). Results in \\cite{Hamed2016} show that hardware calibration and distributed power allocation are critical to achieve joint transmission in MU-MIMO settings. \n\n\nRecently, energy consumption has become a central concern in academia and industry \\cite{Tombaz2011,Feng2013}. One of the objectives of 5G is to enhance EE by orders of magnitude \\cite{Andrews2014}, tanking into account power consumption at the access (transmit and circuitry power) and core (backhaul) networks. EE depends on the particular network planning and objective function [cf. Section~\\ref{section:performance-uf}]. For instance, in dense heterogeneous networks the distance between transmitters and receivers determine EE \\cite{Feng2013}. Dense deployments can provide high EE, but the number of transmitter per serving area should be carefully planned to avoid ICI and waste of resources due to handovers \\cite{Shokri-Ghadikolaei2015}. \nThe EE is expressed as a benefit-cost ratio and measured in bits per Joule \\cite{Feng2013,Bjornson2016a}. Complementary metrics such as Gflops per Watt (to calculate the typical computational efficiency \\cite{Bjornson2014a}) can be used to assess the power consumption per processing block at the transceivers, or to evaluate the EE of a particular algorithm. \n}}\n\n\n\n\n\n\n\n\n\n\n\\section{Final Remarks}\n\\label{section:remarks}\n\n\nThere are many challenges to be solved for resource management in MU-MIMO systems. Identify and standardize the best practices to group and schedule users is fundamental to profit from MUDiv. This is tightly related to affordable-complexity algorithm design to efficiently manage the allocation of multiple users, carriers, time slots, antennas, and transmitters. One of the main requirements to obtain MUDiv and multiplexing gains is knowledge of the CSI. In practical systems, this is challenging because the feedback load rapidly increases with $K$ and $M$. Multiple transmit antennas require additional pilot overhead proportional to $M$, if the users need to learn the complete MIMO channel \\cite{Vu2007}. Further research is required to completely understand performance bounds advance transmission schemes, e.g., dynamic SU-\/MU-MIMO switching and multi-\/single-stream allocation.\nThe viability of user scheduling and simultaneous transmission in multi-cell deployments must be further investigated. Several topics must be included in future studies: synchronization issues in MU-MIMO, metrics for user grouping in HetNets, scheduling signaling load, coordinated power control, latency and delay due to scheduling, mobility, the impact of realistic traffic models, backhaul constraints, and semi-distributed control algorithms. The scheduling policies for the next generation of wireless technologies must balance between the high cost of CSI acquisition and the benefits of cooperative transmission.\n\n\nThe current performance of MU-MIMO processing is still limited in 4G cellular communication systems. This is because user terminals do not perform interference estimation, and in all cases only CSI feedback for the SU-MIMO mode (SU-RI, PMI, and CQI) is employed \\cite{Li2014}. Most of the reviewed works assume continuous power control, but LTE only supports discrete power control in the downlink, through a user-specific data-to-pilot-power offset parameter \\cite{Dahlman2013}. These facts must be considered to properly assess current and emerging NOMA schemes in multiuser scenarios, as well as their limitations, see \\cite{Li2014a,Liu2015,Dai2015}. Resource management rule have a fundamental role to play in future generations of wireless networks, where new and evolving technologies such as mmWave and massive MIMO have already been considered \\cite{Kim2014,Nam2015,Zheng2015,Kutty2016}. Such rule will require novel precoding designs and an assertive usage of the multiuser dimension to provide substantial spectral efficiency, energy efficiency and user satisfaction.\n\n\n\n{\\color{black}{\n\n\n\\subsection{Heterogeneous Networks}\nCurrent cellular networks are facing immense challenges to cope with the ever increasing demand for throughput and coverage owing to the growing amount of mobile traffic. Network densification through\ndeployment of heterogeneous infrastructure, e.g., pico BSs and small cells, is envisioned as a\npromising solution to improve area spectral efficiency and network coverage. Nevertheless, heterogeneous networks and small cell deployments will bring significant challenges and new problems in resource allocation and scheduling for MU-MIMO system. First, network densification reduces MUDiv, since few users are associated to the closest BSs \\cite{Lopez-Perez2015}. This can reduce the net throughput and may challenge precoding techniques with imperfect CSI that rely on MUDiv to compensate for the imperfections. Furthermore, the selection metrics may need to change in HetNets as scheduling may be used not for boosting the received signal exploiting MUDiv but for serving users with low ICI. Moreover, putting a large number of antennas in small cells is not envisioned mainly due to excess cost and processing capabilities, thus the promising gains of massive MIMO may not be realized in HetNets. The same applies for cooperative and network MU-MIMO schemes (e.g. CoMP) among small cells, which may require additional signaling and communication among small cells. Access network architectures enhanced with distributed antennas \\cite{Tolstrup2015} can complement small cells and increase system throughput, but only if large backhaul capacity is available \\cite{Ngo2016}. The existence of signaling interfaces (e.g. X2 in LTE) seem to be sufficient for current deployments, but changes may be required for more advanced coordinated MIMO techniques and joint resource allocation. \nNetwork densification will result in major challenges in indoor coverage and services, for which the channel models used in existing MU-MIMO literature may not be relevant. \n\n \n\n\n\\subsection{Massive MIMO and Millimeter Waves}\n\nMassive MIMO and mmWave technologies have a fundamental role to play in 5G \\cite{Boccardi2014,Andrews2014}, but there are many challenges and open problems. More research is needed to enable FDD mode with acceptable overhead and mitigation of pilot contamination, which will speed up the standardization and commercial adoption of massive MIMO technology. \nOperating in wideband channels at mmWaves will require efficient hybrid precoding and fast beam adaptation. Low-resolution and cost effective transceiver architectures must be designed to cope with these goals, which will bring new techniques to calibrate the antenna array, define the most efficient array geometry, estimate CSI, and mitigate hardware impairments \\cite{Puglielli2016,Hamed2016}. \nAlthough massive MIMO and mmWave will be implemented in cellular networks \\cite{Shokri-Ghadikolaei2015}, currently, they are jointly applied for indoor short-range \\cite{Kutty2016} and outdoor point-to-point applications \\cite{Taori2015,Bogale2016}. Signal processing and medium access techniques for massive MIMO may provide a cost-effective alternative to dense HetNets \\cite{Lopez-Perez2015}, and full understanding of how these technologies complement each other is matter of future research \\cite{Bjornson2016a}. \n\n\n\n\nInitially, synchronous massive MIMO systems have been implemented with capabilities for joint signal processing \\cite{Vieira2014}. However, coordinated per-user allocation and time-synchronous transmission may be hard to achieve in cellular systems \\cite{Bjornson2015a}. Therefore, further research is needed to design, prototype, and assess distributed and asynchronous massive MIMO systems, specially in challenging high mobility scenarios. \nAdditionally, the data buses and interfaces at the transmitters must be scaled orders of magnitude to support the traffic generated by many concurrent users. Research on intermittent user activity (bursty traffic) has been presented in \\cite{Bjornson2015a}, but more work is needed to optimize resource allocation for users with heterogeneous data rate requirements and services. These challenges will demand enhanced physical and media access control layer interactions, in order to support fast user\/channel tracking and dynamic resource allocation.\n\n\n\n}}\n\n\n\n\n \n\n\n\n\n\\subsection{Summary of Asymptotic Analysis and Scaling Laws}\n\\label{section:remarks:analytical-results}\n\n\n\n\n\n\n\n\\begin{table*}[t] \\scriptsize\n\t\\renewcommand{\\arraystretch}{1.3}\t\n\t\\caption{Asymptotic Regimes in Multiuser Systems for MISO and MIMO configurations, with full ($B=\\infty$) and partial ($B<\\infty$) CSIT}\n\t\\label{tab:analytical-results\n\t\\centering\t\t\n\t\\begin{tabularx}{\\textwidth}{l *{4}{>{\\centering\\arraybackslash}X} } \n\t\t\\toprule\n\t\t\\textbf{Parameter} & \\textbf{MISO}, $B=\\infty$ & \\textbf{MISO}, $B<\\infty$ & \\textbf{MIMO}, $B=\\infty$ & \\textbf{MIMO}, $B<\\infty$ \\\\\n\t\t\\midrule\n\t\t\\textbf{Capacity} & \\cite{Wang2015, Yang2011, Sohn2010,Lee2007} & \\cite{Jindal2006, Yang2011, Huang2009a, Vicario2008, Al-naffouri2009, Zhang2011, Min2013, Sohn2010, Au-Yeung2007, Kountouris2008a, Huang2007} & \\cite{Sharif2007, Hassibi2007, Lee2007} & \\cite{Sharif2007, Al-naffouri2009} \\\\\n\t\t\\midrule\n\t\t\\textbf{Queues} & \\cite{Chung2010, Lau2006, Destounis2015} & \\cite{Huang2012a, Shirani-Mehr2010} & \\cite{Hassibi2007} & \\cite{Chen2013} \\\\\n\t\t\\midrule\n\t\t\\textbf{High SNR} & \\cite{Caire2003,Lee2007} & \\cite{Jindal2006, Xia2009, Wagner2008, Conte2010, Tang2010, Huang2009a, Vicario2008, Zhang2011, Yoo2007, Kountouris2008a} & \\cite{Wang2010, Lim2009, Tran2010, Hassibi2007,Lee2007}, \\cite{Chen2008, Sun2010, Tran2012} & \\cite{Vu2007} \\\\\n\t\t\\midrule\n\t\t\\textbf{Low SNR} & \\cite{Caire2003} & \\cite{Wagner2008, Huang2009a, Vicario2008, Zhang2011, Kountouris2008a} & \\cite{Wang2010, Tran2010} \\cite{Sun2010} & \\cite{Vu2007} \\\\\n\t\t\\midrule\n\t\t\\textbf{Large} $K$ & \\cite{Viswanath2002,Wang2008a, Yoo2006, Jiang2006, Lee2014, Bjornson2014, Yoo2005a, Sohn2010, Huh2012, Jang2011,Lee2014c}, \\cite{Jagannathan2007} & \\cite{Wagner2008, Nam2014, Xia2009, Tang2010, Huang2009a, Lau2009, Yoo2007, Kountouris2007, Dai2008, Huang2007, Xu2010} & \\cite{Sharif2007, Bayesteh2008, Tran2010, Hassibi2007}, \\cite{Sun2010, Tran2012} & \\cite{Al-naffouri2009, Trivellato2008}, \\cite{Sharif2005} \\\\\n\t\t\\midrule\n\t\t\\textbf{Large} $M$ & \\cite{Huang2012b, Bjornson2014, Huh2012,Ngo2016} & \\cite{Nam2014, Adhikary2013, Adhikary2013a, Lau2009, Dai2008} & \\cite{Tran2010}, \\cite{ Chen2007a} & \\cite{Sharif2005} \\\\\n\t\t\\midrule\n\t\t\\textbf{Bits} $B_1$, $B_2$ & \\cite{Zakhour2007} & \\cite{Jindal2006, Xia2009, Wagner2008, Huang2012a, Vicario2008, Yoo2007, Dai2008, Zhang2011, Ravindran2012, Kountouris2006a, Min2013, Sohn2010, Au-Yeung2007, Kountouris2008a, Khoshnevis2013} & - & \\cite{Trivellato2008, Jindal2008}, \\cite{Zhang2007a} \\\\ \n\t\t\\bottomrule\t\n\t\\end{tabularx}%\n\\end{table*}%\n\n\n\n\n\n\\begin{table*}[t!]\\scriptsize\n\t\\centering\n\t\\caption{Abbreviations}\n\t\\label{table:abbreviations}\n\t\\begin{tabular}{@{}llllllll@{}}\n\t\t\\toprule\n\t\t\\textbf{3GPP} & \\begin{tabular}[c]{@{}l@{}}3rd Generation Partnership\\\\ Project\\end{tabular} & & \\textbf{FDD} & Frequency-division-duplex & & \\textbf{PMI} & Precoding matrix index \\\\\n\t\t\\textbf{ADC} & Analog-to-digital converter & & \\textbf{GA} & Genetic algorithms & & \\textbf{QoS} & Quality of service \\\\\n\t\t\\textbf{AP} & Access point & & \\textbf{GUS} & Greedy user selection & & \\textbf{QCA} & Quantization cell approximation \\\\\n\t\t\\textbf{ACK\/NACK} & Acknowledgement handshake & & \\textbf{HetNet} & Heterogeneous network & & \\textbf{QSI} & Queue state information \\\\\n\t\t\\textbf{AWGN} & Additive white Gaussian noise & & \\textbf{ICI} & Inter-cell interference & & \\textbf{RF} & Radio frequency \\\\\n\t\t\\textbf{ARQ} & Automatic repeat request & & \\textbf{IFC} & Interference channel & & \\textbf{RBF} & Random beamforming \\\\\n\t\t\\textbf{BS} & Base station & & \\textbf{IUI} & Inter-user interference & & \\textbf{RI} & Rank indicator \\\\\n\t\t\\textbf{BER} & Bit error rate & & \\textbf{JT} & Joint signal transmission\/processing & & \\textbf{RSS} & Received signal strength \\\\\n\t\t\\textbf{BD} & Block diagonalization & & \\textbf{LoS} & Line-of-sight & & \\textbf{SUS} & Semi-orthogonal user selection \\\\\n\t\t\\textbf{BB} & Branch and bound & & \\textbf{LTE} & Long term evolution & & \\textbf{SLNR} & Signal to leakage plus noise ratio \\\\\n\t\t\\textbf{BC} & Broadcast channel & & \\textbf{MRT} & Maximum ratio transmission & & \\textbf{SNR} & Signal-to-noise ratio \\\\\n\t\t\\textbf{CU} & Central processing unit & & \\textbf{MSE} & Mean-square-error & & \\textbf{ST} & Single transmission \\\\\n\t\t\\textbf{CDI} & Channel direction information & & \\textbf{MMSE} & Minimum MSE filter & & \\textbf{SU-MIMO} & Single user MIMO \\\\\n\t\t\\textbf{CQI} & Channel quality information & & \\textbf{MCS} & Modulation and coding scheme & & \\textbf{SISO} & Single-input single-output \\\\\n\t\t\\textbf{CSI} & Channel state information & & \\textbf{MAC} & Multiple access channel & & \\textbf{SDV} & Singular value decomposition \\\\\n\t\t\\textbf{CDMA} & Code division multiple access & & \\textbf{MIMO} & Multiple-input multiple-output & & \\textbf{SDMA} & Space-division multiple access \\\\\n\t\t\\textbf{CIZF} & Constructive interference ZF & & \\textbf{MISO} & Multiple-input single-output & & \\textbf{SZF} & Successive ZF \\\\\n\t\t\\textbf{CBF} & Coordinated beamforming & & \\textbf{MUDiv} & Multiuser diversity & & \\textbf{TDMA} & Time division multiple access \\\\\n\t\t\\textbf{CoMP} & Coordinated multi-point & & \\textbf{MU-MIMO} & Multiuser MIMO & & \\textbf{TDD} & Time-division-duplex \\\\\n\t\t\\textbf{CS} & Coordinated scheduling & & \\textbf{NOMA} & Non-orthogonal multiple access & & \\textbf{THP} & Tomlinson-Harashima precoding \\\\\n\t\t\\textbf{CSIR} & CSI at the receiver & & \\textbf{NP} & Non-deterministic polynomial time problem & & \\textbf{Wi-Fi} & Trademark of IEEE 802.11 \\\\\n\t\t\\textbf{CSIT} & CSI at the transmitter & & \\textbf{NP-C} & NP complete & & \\textbf{VP} & Vector perturbation \\\\\n\t\t\\textbf{CDF} & Cumulative distribution function & & \\textbf{NSP} & Null space projection & & \\textbf{VQ} & Vector quantization \\\\\n\t\t\\textbf{DoF} & Degrees-of-freedom & & \\textbf{OFDMA} & Orthogonal frequency-division multiple access & & \\textbf{WSR} & Weighted sum rate \\\\\n\t\t\\textbf{DPC} & Dirty paper coding & & \\textbf{OFDM} & Orthogonal frequency-division multiplexing & & \\textbf{WLAN} & Wireless local area network \\\\\n\t\t\\textbf{EE} & Energy efficiency & & \\textbf{PSO} & Particle swarm optimization & & \\textbf{ZF} & Zero forcing \\\\\n\t\t\\textbf{EPA} & Equal power allocation & & \\textbf{PU2RC} & Per unitary basis stream user and rate control & & \\textbf{ZFBF} & ZF beamforming \\\\\n\t\t\\textbf{ExS} & Exhaustive search & & \\textbf{PHY} & Physical layer & & \\textbf{ZFDP} & ZF dirty paper \\\\\n\t\t\\bottomrule \n\t\\end{tabular}\n\\end{table*}\n\n\n\nSeveral authors have focused their work on asymptotic analysis and scaling laws of performance metrics or utility functions $U(\\cdot)$. The analytical results depend on the \\textit{system parameters}, $K$, $N$, $M$, $B$, $P$, and $q_k$ $\\forall k \\in \\mathcal{K}$. The information-theoretic results derived in several works provide fundamental limits of achievable values of $U(\\cdot)$ from the user and system perspectives. They also shed light on the relevance of each parameter, the conditions where the parameters are interchangeable, the potential and limitations of MU-MIMO systems, and judicious guidelines for the overall system design. For each utility function $U(\\cdot)$, and user priorities $\\omega_{k}$ $\\forall k$, there exist optimal and suboptimal operation points that can be characterized according to the system parameters and their respective regimes. \nThe capacity of MU-MIMO systems has been assessed in various asymptotic regimes: high SNR ($P\\rightarrow \\infty$), low SNR ($P\\rightarrow 0$), large number of users ($K\\rightarrow \\infty$), large number of transmit antennas ($M\\rightarrow \\infty$), and large codebook resolution ($B \\rightarrow \\infty$). \n\n\nTable~\\ref{tab:analytical-results} summarizes the system parameters and the antenna configurations, i.e., MISO ($N=1$) or MIMO ($N>1$), and $M \\geq N$. Every single reference in the table has its own system model, assumptions, and constraints, studying one parameter and the corresponding effects on the performance $U(\\cdot)$, and other fixed parameters. The table is by no means exhaustive; a comprehensive taxonomy of the asymptotic analytical results is out of the scope of this paper. Our aim is to provide a list of organized results from the reviewed paper, so that the interested reader may use each reference for further studies. \nNotice that the first row in Table~\\ref{tab:analytical-results} points to references that analyze the capacity as a function of different parameters, while the second row refers to works that provide analytical results of MU-MIMO systems with queue constraints.\n\n\n\n\n\\bibliographystyle{IEEEtran}\n\\scriptsize\n","meta":{"redpajama_set_name":"RedPajamaArXiv"}}