We analyze the performance of coded slotted ALOHA systems for a scenario where users have different error protection requirements and correspondingly can be divided into user classes. The main goal is to design the system so that the requirements for each class are satisfied. To that end, we derive analytical error floor approximations of the packet loss rate for each class in the finite frame length regime, as well as the density evolution in the asymptotic case. Based on this analysis, we propose a heuristic approach for the optimization of the degree distributions to provide the required unequal error protection. In addition, we analyze the decoding delay for users in different classes and show that better protected users experience a sm...
© 2016 IEEE. In this paper we investigate the coded slotted ALOHA (CSA) schemes with repetition code...
The on-off fading channel is used as a proxy to gain insights on the performance of coded slotted Al...
In this paper, a random access scheme is introduced, which relies on the combination of packet erasu...
We analyze the performance of coded slotted ALOHA systems for a scenario where users have different ...
We present a framework for the analysis of the error floor of coded slotted ALOHA (CSA) for finite f...
International audienceCoded Slotted ALOHA (CSA) is a random access scheme based on the application o...
The recent research has established an analogy between successive interference cancellation in slott...
We consider a frame asynchronous coded slotted ALOHA (FA-CSA) system for uncoordinated multiple acce...
In this letter, we develop a converse bound on the asymptotic load threshold of coded slotted ALOHA ...
In this letter, we develop a converse bound on the asymptotic load threshold of coded slotted ALOHA ...
We consider a frame-asynchronous coded slotted ALOHA (FA-CSA) system where users join according to a...
© 2017 IEEE. In this paper, we investigate the design and analysis of coded slotted ALOHA (CSA) sche...
We study different notions of capacity for time-slotted ALOHA systems. In these systems multiple use...
We propose an uncoordinated medium access con- trol (MAC) protocol, called all-to-all broadcast code...
This paper presents a finite length analysis of multislot type frameless ALOHA based on a dynamic pr...
© 2016 IEEE. In this paper we investigate the coded slotted ALOHA (CSA) schemes with repetition code...
The on-off fading channel is used as a proxy to gain insights on the performance of coded slotted Al...
In this paper, a random access scheme is introduced, which relies on the combination of packet erasu...
We analyze the performance of coded slotted ALOHA systems for a scenario where users have different ...
We present a framework for the analysis of the error floor of coded slotted ALOHA (CSA) for finite f...
International audienceCoded Slotted ALOHA (CSA) is a random access scheme based on the application o...
The recent research has established an analogy between successive interference cancellation in slott...
We consider a frame asynchronous coded slotted ALOHA (FA-CSA) system for uncoordinated multiple acce...
In this letter, we develop a converse bound on the asymptotic load threshold of coded slotted ALOHA ...
In this letter, we develop a converse bound on the asymptotic load threshold of coded slotted ALOHA ...
We consider a frame-asynchronous coded slotted ALOHA (FA-CSA) system where users join according to a...
© 2017 IEEE. In this paper, we investigate the design and analysis of coded slotted ALOHA (CSA) sche...
We study different notions of capacity for time-slotted ALOHA systems. In these systems multiple use...
We propose an uncoordinated medium access con- trol (MAC) protocol, called all-to-all broadcast code...
This paper presents a finite length analysis of multislot type frameless ALOHA based on a dynamic pr...
© 2016 IEEE. In this paper we investigate the coded slotted ALOHA (CSA) schemes with repetition code...
The on-off fading channel is used as a proxy to gain insights on the performance of coded slotted Al...
In this paper, a random access scheme is introduced, which relies on the combination of packet erasu...