Coded slotted ALOHA: A graph-based method for uncoordinated multiple access

E Paolini, G Liva, M Chiani - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
In this paper, a random access scheme is introduced, which relies on the combination of
packet erasure correcting codes and successive interference cancellation (SIC). The …

Spatially-coupled random access on graphs

G Liva, E Paolini, M Lentmaier… - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
In this paper we investigate the effect of spatial coupling applied to the recently-proposed
coded slotted ALOHA (CSA) random access protocol. Thanks to the bridge between the …

Construction and analysis of shift-invariant, asynchronous-symmetric channel-hopping sequences for cognitive radio networks

WC Chen, GC Yang, MK Chang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Besides designing channel-hopping (CH) sequences, finding good methods of
communication rendezvous is important for improving spectral efficiency and alleviating …

Age of information for periodic status updates under sequence based scheduling

F Liu, WS Wong, YH Lo, Y Zhang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This paper considers a system in which multiple users send periodically generated status
information to a common access point (AP) over a collision channel. To avoid high …

Graph-based random access for the collision channel without feedback: Capacity bound

E Paolini, G Liva, M Chiani - 2011 IEEE Global …, 2011 - ieeexplore.ieee.org
A random access scheme for the collision channel without feedback is proposed. The
scheme is based on erasure correcting codes for the recovery of packet segments that are …

DV-Hop localization with protocol sequence based access

L Gui, X Huang, F Xiao, Y Zhang, F Shu… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
Among typical range-free localization schemes for sensor networks, DV-Hop has its
distinguishing advantage of the capability to localize unknown nodes, which have less than …

Time synchronization attack and countermeasure for multisystem scheduling in remote estimation

Z Guo, Y Ni, WS Wong, L Shi - IEEE Transactions on Automatic …, 2020 - ieeexplore.ieee.org
We consider time synchronization attack against multisystem scheduling in a remote state
estimation scenario where a number of sensors monitor different linear dynamical processes …

Construction and applications of CRT sequences

KW Shum, WS Wong - IEEE Transactions on Information …, 2010 - ieeexplore.ieee.org
Protocol sequences are used for channel access in the collision channel without feedback.
Each user accesses the channel according to a deterministic zero-one pattern, called the …

Protocol sequences for the multiple-packet reception channel without feedback

Y Zhang, YH Lo, WS Wong… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Consider a time-slotted communication channel that is shared by K active users transmitting
to a single receiver. It is assumed that the receiver has the ability of the multiple-packet …

CRT sequences with applications to collision channels allowing successive interference cancellation

Y Chen, YH Lo, KW Shum, WS Wong… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Protocol sequences are periodic zero-one sequences for the scheduling of packet
transmissions in a time-slotted channel. A special class of protocol sequences, called shift …