Login / Signup
How to Identify and Authenticate Users in Massive Unsourced Random Access.
Radoslaw Kotaba
Anders E. Kalør
Petar Popovski
Israel Leyva Mayorga
Beatriz Soret
Maxime Guillaud
Luis Garcia Ordóñez
Published in:
CoRR (2021)
Keyphrases
</>
random access
memory size
disk storage
user interface
solid state
multiview video coding
recommender systems
collaborative filtering
user interaction
database systems
end users
user profiles
flash memory
external memory
video coding