Sign in

How to Identify and Authenticate Users in Massive Unsourced Random Access.

Radoslaw KotabaAnders E. KalørPetar PopovskiIsrael Leyva MayorgaBeatriz SoretMaxime GuillaudLuis Garcia Ordóñez
Published in: IEEE Commun. Lett. (2021)
Keyphrases
  • random access
  • user interaction
  • user profiles
  • multiview video coding
  • user interface
  • end users
  • solid state
  • disk storage
  • multiscale
  • recommender systems
  • database
  • social media
  • image coding