Coded random access: Applying codes on graphs to design random access protocols
The rise of machine-to-machine communications has rekindled interest in random access
protocols as a support for a massive number of uncoordinatedly transmitting devices. The …
protocols as a support for a massive number of uncoordinatedly transmitting devices. The …
ALOHA random access that operates as a rateless code
Various applications of wireless Machine-to-Machine (M2M) communications have
rekindled the research interest in random access protocols, suitable to support a large …
rekindled the research interest in random access protocols, suitable to support a large …
ALOHA-NOMA for massive machine-to-machine IoT communication
This paper proposes a new medium access control (MAC) protocol for Internet of Things
(IoT) applications incorporating pure ALOHA with power domain non-orthogonal multiple …
(IoT) applications incorporating pure ALOHA with power domain non-orthogonal multiple …
Random access for M2M communications with QoS guarantees
We propose a novel random access (RA) scheme with the quality of service (QoS)
guarantees for machine-to-machine (M2M) communications. We consider a slotted …
guarantees for machine-to-machine (M2M) communications. We consider a slotted …
The dynamic behavior of frameless ALOHA: Drift analysis, throughput, and age of information
We study the dynamic behavior of frameless ALOHA, both in terms of throughput and age of
information (AoI). In particular, differently from previous studies, our analysis accounts for the …
information (AoI). In particular, differently from previous studies, our analysis accounts for the …
Age of information minimization for frameless ALOHA in grant-free massive access
In this paper, we focus on the optimal problem of average age of information (AAoI) in grant-
free massive access, and propose an age-critical frameless ALOHA (ACFA) random access …
free massive access, and propose an age-critical frameless ALOHA (ACFA) random access …
Massive M2M access with reliability guarantees in LTE systems
Machine-to-Machine (M2M) communications are one of the major drivers of the cellular
network evolution towards 5G systems. One of the key challenges is on how to provide …
network evolution towards 5G systems. One of the key challenges is on how to provide …
Code‐expanded radio access protocol for machine‐to‐machine communications
The random access methods used for support of machine‐to‐machine, also referred to as
Machine‐Type Communications, in current cellular standards are derivatives of traditional …
Machine‐Type Communications, in current cellular standards are derivatives of traditional …
Poisson receivers: A probabilistic framework for analyzing coded random access
In this article, we develop a probabilistic framework for analyzing coded random access. Our
framework is based on a new abstract receiver (decoder), called a Poisson receiver, that is …
framework is based on a new abstract receiver (decoder), called a Poisson receiver, that is …
Efficient distributed mac for dynamic demands: Congestion and age based designs
X Zhou, I Koprulu, A Eryilmaz… - IEEE/ACM Transactions …, 2022 - ieeexplore.ieee.org
Future generation wireless technologies are expected to serve an increasingly dense and
dynamic population of users that generate short bundles of information to be transferred …
dynamic population of users that generate short bundles of information to be transferred …