Results 11 to 20 of about 1,277,780 (284)
Deep Reinforcement Learning Heterogeneous Channels for Poisson Multiple Access
This paper proposes a medium access control (MAC) protocol based on deep reinforcement learning (DRL), i.e., multi-channel transmit deep-reinforcement learning multi-channel access (MCT-DLMA) in heterogeneous wireless networks (HetNets).
Xu Zhang +3 more
doaj +1 more source
The neural multiple access channel [PDF]
In many neural systems, independently encoded information must at some point be transmitted over the spike train of one neuron. We introduce a method for quantitatively studying the effects of the signal encoding and transmission processes on the rates of transmission of multiple sources of information over one spike train, using the multiple access ...
Brian J, Fischer, M Brandon, Westover
openaire +2 more sources
With the growth of terminal devices and data traffic, privacy concerns have inspired an innovative edge learning framework, called federated learning (FL).
Jianda Wang, Shuaishuai Guo
doaj +1 more source
Efficient Coding of the Embedded Signal in Steganographic Systems with Multiple Access [PDF]
Today, steganographic systems with multiple access are of considerable importance. In such sys-tems, the orthogonal Walsh-Hadamard transform is most often used for multiplexing and divid-ing channels, which leads to the need for efficient coding of the ...
Kobozeva A.A., Kobozeva A.A.,
doaj +1 more source
Subgradient Descent Learning Over Fading Multiple Access Channels With Over-the-Air Computation
We focus on a distributed learning problem in a communication network, consisting of $N$ distributed nodes and a central parameter server (PS). The PS is responsible for performing the computation based on data received from the nodes, which are ...
Tamir L. S. Gez, Kobi Cohen
doaj +1 more source
The dirty MIMO multiple-access channel [PDF]
To appear, IEEE Transactions on Information ...
Anatoly Khina, Yuval Kochman, Uri Erez
openaire +4 more sources
Deterministic multiple access wiretap channel [PDF]
Two-user Multiple Access Channel with a Wire-Tapper (MAC-WT) is considered. A general outer bound for the secrecy capacity region is given. Also, we have defined the Deterministic MAC-WT, where the channel input of each user is a deterministic function of the channel output and the channel input of the other user.
Vahid Jahandideh +2 more
+7 more sources
Analyses of Space Division Multiple Access (SDMA) Schemes for Global Mobile Satellite Communications (GMSC) [PDF]
This paper describes analyzes of the Space Division Multiple Access (SDMA) technique and their hybrids with other Multiple Access Technique (MAT) such as Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), and Code Division ...
Stojce Dimov Ilcev
doaj +1 more source
On Separation for Multiple Access Channels [PDF]
We examine the issue of separation for multiple access channels. We demonstrate that source-channel separation holds for noisy multiple access channels, when the channel operates over a common finite field.
Effros, Michelle +3 more
core +1 more source
Homologous Codes for Multiple Access Channels [PDF]
Building on recent development by Padakandla and Pradhan, and by Lim, Feng, Pastore, Nazer, and Gastpar, this paper studies the potential of structured nested coset coding as a complete replacement for random coding in network information theory. The roles of two techniques used in nested coset coding to generate nonuniform codewords, namely, shaping ...
Pinar Sen, Young-Han Kim
openaire +2 more sources

