Energy efficiency of massive random access in MIMO quasi-static Rayleigh fading channels with finite blocklength
This paper considers the massive random access problem in multiple-input multiple-output
(MIMO) quasi-static Rayleigh fading channels. Specifically, we derive achievability and …
(MIMO) quasi-static Rayleigh fading channels. Specifically, we derive achievability and …
Next-generation multiple access: From basic principles to modern architectures
EA Jorswieck - Proceedings of the IEEE, 2024 - ieeexplore.ieee.org
The pressure to develop new network architectures and multiple access technologies is
driven by increasing demands on network performance, number of devices, network traffic …
driven by increasing demands on network performance, number of devices, network traffic …
Unsourced multiple access with random user activity
To account for the massive uncoordinated random access scenario, which is relevant for the
Internet of Things, Polyanskiy et al.(2017) proposed a novel formulation of the multiple …
Internet of Things, Polyanskiy et al.(2017) proposed a novel formulation of the multiple …
Signal processing and learning for next generation multiple access in 6G
Wireless communication systems to date primarily rely on the orthogonality of resources to
facilitate the design and implementation, from user access to data transmission. Emerging …
facilitate the design and implementation, from user access to data transmission. Emerging …
Covert communication for spatially sparse mmWave massive MIMO channels
Covert communication, also known as communication with low probability of detection, aims
to provide reliable communication for legal users and prevent any other user from detecting …
to provide reliable communication for legal users and prevent any other user from detecting …
On second order rate regions for the static scalar Gaussian broadcast channel
D Tuninetti, P Sheldon, B Smida… - IEEE Journal on …, 2023 - ieeexplore.ieee.org
This paper considers the single antenna, static, scalar Gaussian broadcast channel in the
finite blocklength regime. Second order achievable and converse rate regions are …
finite blocklength regime. Second order achievable and converse rate regions are …
Ultra-Reliable Low-Latency Communications: Foundations, Enablers, System Design, and Evolution Towards 6G
NH Mahmood, I Atzeni, EA Jorswieck… - … and Trends® in …, 2023 - nowpublishers.com
Wireless communication has traditionally been designed to connect human users. The main
design goal was to maximize the data rate while guaranteeing moderate reliability and …
design goal was to maximize the data rate while guaranteeing moderate reliability and …
Unsourced multiple access with common alarm messages: Network slicing for massive and critical IoT
We investigate the coexistence of massive and critical Internet of Things (IoT) services in the
context of the unsourced multiple access (UMA) framework introduced by Polyanskiy (2017) …
context of the unsourced multiple access (UMA) framework introduced by Polyanskiy (2017) …
Second-order performance of early decoding with shell codes in Gaussian broadcast channels
M Mross, PH Lin, EA Jorswieck - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
We investigate early decoding in a Gaussian broadcast channel with heterogeneous
blocklength constraints when shell codes are used. By shell codes, we refer to non-iid codes …
blocklength constraints when shell codes are used. By shell codes, we refer to non-iid codes …
Many-user multiple access with random user activity
We study the Gaussian multiple access channel with random user activity, in the regime
where the number of users is proportional to the code length. The receiver may know some …
where the number of users is proportional to the code length. The receiver may know some …