The analogies between successive interference cancellation (SIC) in slotted ALOHA framework and iterative belief-propagation erasure-decoding, established recently, enabled the application of the erasure-coding theory and tools to design random access schemes. This approach leads to throughput substantially higher than the one offered by the traditional slotted ALOHA. In the simplest setting, SIC progresses when a successful decoding occurs for a single user transmission. In this paper we consider a more general setting of a channel with capture and explore how such physical model affects the design of the coded random access protocol. Specifically, we assess the impact of capture effect in Rayleigh fading scenario on the design of SIC-enab...
We present a novel scheme for Slotted ALOHA random access systems that combines physical-layer netwo...
Wireless random access protocols are attracting a revived research interest as a simple yet effectiv...
In this letter we motivate the need to revisit the MAC protocol used in Gen2 RFID system in order to...
We propose a novel distributed random access scheme for wireless networks based on slotted ALOHA, mo...
2noThe performance of the widely adopted slotted Aloha (SA) scheme has been recently improved thanks...
This paper investigates the throughput of a Framed Slotted Aloha (FSA) random access scheme, called ...
Framed slotted aloha (FSA) is a multiple access protocol widely used in wireless communication for i...
Random access protocols relying on the transmission of packet replicas in multiple slots and exploit...
Various applications of wireless Machine-to-Machine (M2M) communications have rekindled the research...
Providing ultra-reliable, low-latency and massive access is a technical challenge that demands a red...
The recent research has established an analogy between successive interference cancellation in slott...
International audienceCoded Slotted ALOHA (CSA) is a random access scheme based on the application o...
none4siRandom access protocols relying on the transmission of packet replicas in multiple slots and ...
In this paper, a random access scheme is introduced, which relies on the combination of packet erasu...
In this paper, coded slotted ALOHA (CSA) is introduced as a powerful random access scheme to the MAC...
We present a novel scheme for Slotted ALOHA random access systems that combines physical-layer netwo...
Wireless random access protocols are attracting a revived research interest as a simple yet effectiv...
In this letter we motivate the need to revisit the MAC protocol used in Gen2 RFID system in order to...
We propose a novel distributed random access scheme for wireless networks based on slotted ALOHA, mo...
2noThe performance of the widely adopted slotted Aloha (SA) scheme has been recently improved thanks...
This paper investigates the throughput of a Framed Slotted Aloha (FSA) random access scheme, called ...
Framed slotted aloha (FSA) is a multiple access protocol widely used in wireless communication for i...
Random access protocols relying on the transmission of packet replicas in multiple slots and exploit...
Various applications of wireless Machine-to-Machine (M2M) communications have rekindled the research...
Providing ultra-reliable, low-latency and massive access is a technical challenge that demands a red...
The recent research has established an analogy between successive interference cancellation in slott...
International audienceCoded Slotted ALOHA (CSA) is a random access scheme based on the application o...
none4siRandom access protocols relying on the transmission of packet replicas in multiple slots and ...
In this paper, a random access scheme is introduced, which relies on the combination of packet erasu...
In this paper, coded slotted ALOHA (CSA) is introduced as a powerful random access scheme to the MAC...
We present a novel scheme for Slotted ALOHA random access systems that combines physical-layer netwo...
Wireless random access protocols are attracting a revived research interest as a simple yet effectiv...
In this letter we motivate the need to revisit the MAC protocol used in Gen2 RFID system in order to...