Motivated by the analogy between successive interference cancellation and iterative belief-propagation on erasure channels, irregular repetition slotted ALOHA (IRSA) strategies have received a lot of attention in the design of medium access control protocols. The IRSA schemes have been mostly analyzed for theoretical scenarios for homogenous sources, where they are shown to substantially improve the system performance compared to classical slotted ALOHA protocols. In this work, we consider generic systems where sources in different importance classes compete for a common channel. We propose a new prioritized IRSA algorithm and derive the probability to correctly resolve collisions for data from each source class. We then make use of our the...
International audienceCoded Slotted ALOHA (CSA) is a random access scheme based on the application o...
In this paper, we study the problem of designing adaptive Medium Access Control (MAC) solutions for ...
Random access (RA) protocols are normally used in a satellite networks for initial terminal access a...
In this paper, coded slotted ALOHA (CSA) is introduced as a powerful random access scheme to the MAC...
In this paper, a random access scheme is introduced, which relies on the combination of packet erasu...
In this paper, a dynamic access probability adjustment strategy for coded random access schemes base...
International audienceWireless communications play an important part in the systems of the Internet ...
Recently, contention resolution diversity slotted ALOHA (CRDSA) has been introduced as a simple but...
ALOHA-type protocols became a popular solution for distributed and uncoordinated multiple random acc...
Random access represents possibly the simplest and yet one of the best known approaches for sharing...
Various applications of wireless Machine-to-Machine (M2M) communications have rekindled the research...
In this paper, we propose a novel decentralized framework for optimizing the transmission strategy o...
Random Access MAC protocols are simple and effective when the nature of the traffic is unpredictable...
With an explosive development of the Internet-of-Things (IoT), the number of devices or machines (ca...
In this paper, we develop a new class of medium access control protocol, which allows each user to t...
International audienceCoded Slotted ALOHA (CSA) is a random access scheme based on the application o...
In this paper, we study the problem of designing adaptive Medium Access Control (MAC) solutions for ...
Random access (RA) protocols are normally used in a satellite networks for initial terminal access a...
In this paper, coded slotted ALOHA (CSA) is introduced as a powerful random access scheme to the MAC...
In this paper, a random access scheme is introduced, which relies on the combination of packet erasu...
In this paper, a dynamic access probability adjustment strategy for coded random access schemes base...
International audienceWireless communications play an important part in the systems of the Internet ...
Recently, contention resolution diversity slotted ALOHA (CRDSA) has been introduced as a simple but...
ALOHA-type protocols became a popular solution for distributed and uncoordinated multiple random acc...
Random access represents possibly the simplest and yet one of the best known approaches for sharing...
Various applications of wireless Machine-to-Machine (M2M) communications have rekindled the research...
In this paper, we propose a novel decentralized framework for optimizing the transmission strategy o...
Random Access MAC protocols are simple and effective when the nature of the traffic is unpredictable...
With an explosive development of the Internet-of-Things (IoT), the number of devices or machines (ca...
In this paper, we develop a new class of medium access control protocol, which allows each user to t...
International audienceCoded Slotted ALOHA (CSA) is a random access scheme based on the application o...
In this paper, we study the problem of designing adaptive Medium Access Control (MAC) solutions for ...
Random access (RA) protocols are normally used in a satellite networks for initial terminal access a...