Login / Signup
How to Identify and Authenticate Users in Massive Unsourced Random Access.
Radoslaw Kotaba
Anders E. Kalør
Petar Popovski
Israel Leyva Mayorga
Beatriz Soret
Maxime Guillaud
Luis Garcia Ordóñez
Published in:
IEEE Commun. Lett. (2021)
Keyphrases
</>
random access
user interaction
user profiles
multiview video coding
user interface
end users
solid state
disk storage
multiscale
recommender systems
database
social media
image coding