|
[1] C.-H. Yu, L. Huang, C.-S. Chang, and D.-S. Lee, "Poisson receivers: a probabilistic framework for analyzing coded random access," arXiv preprint arXiv:2008.07561,2020. [2] C.-P. Li, J. Jiang, W. Chen, T. Ji, and J. Smee, "5g ultra-reliable and low-latency systems design," in Networks and Communications (EuCNC), 2017 European Conference on. IEEE, 2017, pp. 1-5. [3] M. Bennis, M. Debbah, and H. V. Poor, "Ultra-reliable and low-latency wireless communication: Tail, risk and scale," arXiv preprint arXiv:1801.01270, 2018. [4] P. Popovski, C ̌. Stefanovic ́, J. J. Nielsen, E. De Carvalho, M. Angjelichinoski, K. F.Trillingsgaard, and A.-S. Bana, "Wireless access in ultra-reliable low-latency communication (urllc)," IEEE Transactions on Communications, vol. 67, no. 8, pp.5783-5801,2019. [5] E. Casini, R. De Gaudenzi, and O. D. R. Herrero, "Contention resolution diversity slotted aloha (crdsa): An enhanced random access scheme for satellite access packet networks," IEEE Transactions on Wireless Communications, vol. 6, no. 4, 2007. [6] G. Liva, "Graph-based analysis and optimization of contention resolution diversity slotted aloha," IEEE Transactions on Communications, vol. 59, no. 2, pp. 477-487, 2011. [7] K. R. Narayanan and H. D. Pster, "Iterative collision resolution for slotted aloha: An optimal uncoordinated transmission policy," in Turbo Codes and Iterative Information Processing (ISTC), 2012 7th International Symposium on. IEEE, 2012, pp.136-139. [8] E. Paolini, G. Liva, and M. Chiani, "Random access on graphs: A survey and new results," in Signals, Systems and Computers (ASILOMAR), 2012 Conference Record of the Forty Sixth Asilomar Conference on. IEEE, 2012, pp. 1743-1747. [9] D. Jakovetic ́, D. Bajovic ́, D. Vukobratovic ́, and V. Crnojevic ́, "Cooperative slotted aloha for multi-base station systems," IEEE Transactions on Communications, vol. 63, no. 4, pp. 1443-1456, 2015. [10] C ̌. Stefanovic and D. Vukobratovic ́, "Coded random access," in Network Coding and Subspace Designs. Springer, 2018, pp. 339-359. [11] R. Hoshyar, F. P. Wathan, and R. Tafazolli, "Novel low-density signature for synchronous cdma systems over awgn channel," IEEE Transactions on Signal Processing, vol. 56, no. 4, pp. 1616-1626, 2008. [12] H. Nikopour and H. Baligh, "Sparse code multiple access," in Personal Indoor and Mobile Radio Communications (PIMRC), 2013 IEEE 24th International Symposium on. IEEE, 2013, pp. 332-336. [13] Z. Yuan, G. Yu, W. Li, Y. Yuan, X. Wang, and J. Xu, "Multi-user shared access for internet of things," in Vehicular Technology Conference (VTC Spring), 2016 IEEE 83rd. IEEE, 2016, pp. 1-5. [14] S. Chen, B. Ren, Q. Gao, S. Kang, S. Sun, and K. Niu, " Pattern division multiple access-a novel nonorthogonal multiple access for fifth-generation radio networks," IEEE Transactions on Vehicular Technology, vol. 66, no. 4, pp. 3185-3196, 2017. [15] O. Ordentlich and Y. Polyanskiy, "Low complexity schemes for the random access gaussian channel," in 2017 IEEE International Symposium on Information Theory (ISIT). IEEE, 2017, pp. 2528-2532. [16] C.-S. Chang, D.-S. Lee, and C.Wang, "Asynchronous grant-free uplink transmissions in multichannel wireless networks with heterogeneous qos guarantees," IEEE/ACM Transactions on Networking, vol. 27, no. 4, pp. 1584-1597, 2019. [17] Y. Liu, Y. Deng, M. Elkashlan, A. Nallanathan, and G. K. Karagiannidis, "Analyzing grant-free access for urllc service," arXiv preprint arXiv:2002.07842, 2020. [18] K. Andreev, E. Marshakov, and A. Frolov, "A polar code based tin-sic scheme for the unsourced random access in the quasi-static fading mac," arXiv preprint arXiv:2005.06899, 2020. [19] R. Gallager, "Low-density parity-check codes," IRE Transactions on information theory, vol. 8, no. 1, pp. 21-28, 1962. [20] C ̌. Stefanovic ́, M. Momoda, and P. Popovski, "Exploiting capture e ffect in frameless aloha for massive wireless random access," in 2014 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2014, pp. 1762-1767. [21] F. Clazzer, E. Paolini, I. Mambelli, and C ̌. Stefanovic ́, "Irregular repetition slotted aloha over the rayleigh block fading channel with capture," in 2017 IEEE International Conference on Communications (ICC). IEEE, 2017, pp. 1-6. [22] R. L. Cruz, "A calculus for network delay. i. network elements in isolation," IEEE Transactions on information theory, vol. 37, no. 1, pp. 114{131, 1991. [23] R. L. Cruz, \A calculus for network delay. ii. network analysis," IEEE Transactions on information theory, vol. 37, no. 1, pp. 132-141, 1991. [24] C.-S. Chang, Performance guarantees in communication networks. Springer Science & Business Media, 2012. [25] J.-Y. Le Boudec and P. Thiran, Network calculus: a theory of deterministic queuing systems for the internet. Springer Science & Business Media, 2001, vol. 2050. [26] S. Mao and S. S. Panwar, "A survey of envelope processes and their applications in quality of service provisioning," IEEE Communications Surveys & Tutorials, vol. 8, no. 3, pp. 2-20, 2006. [27] Y. Jiang and Y. Liu, Stochastic network calculus. Springer, 2008, vol. 1. [28] M. Fidler, "Survey of deterministic and stochastic service curve models in the network calculus," IEEE Communications surveys & tutorials, vol. 12, no. 1, pp. 59-86,2010. [29] F. Baccelli, G. Cohen, G. J. Olsder, and J.-P. Quadrat, "Synchronization and linearity: an algebra for discrete event systems," 1992. [30] A. K. Parekh and R. G. Gallager, " A generalized processor sharing approach to flow control in integrated services networks: the single-node case," IEEE/ACM transactions on networking, vol.1, no. 3, pp. 344-357, 1993. [31] H. Sariowan, R. L. Cruz, and G. C. Polyzos, "Sced: A generalized scheduling policy for guaranteeing quality-of-service," IEEE/ACM Transactions on networking, vol. 7, no. 5, pp. 669-684, 1999. [32] E. Paolini, C. Stefanovic ́, G. Liva, and P. Popovski, "Coded random access: applying codes on graphs to design random access protocols," IEEE Communications Magazine, vol. 53, no. 6, pp. 144-150, 2015. [33] A. Munari, F. Clazzer, and G. Liva, "Multi-receiver aloha systems-a survey and new results," in Communication Workshop (ICCW), 2015 IEEE International Conference on. IEEE, 2015, pp.2108-2114. [34] M. Luby, M. Mitzenmacher, and M. A. Shokrollahi, "Analysis of random processes via and-or tree evaluation," in SODA, vol. 98, 1998, pp. 364-373. [35] M. Luby, M. Mitzenmacher, A. Shokrollah, and D. Spielman, "Analysis of low-density codes and improved designs using irregular graphs," in Proceedings of the thirtieth annual ACM symposium on Theory of computing, 1998, pp. 249-258. [36] T. J. Richardson and R. L. Urbanke, "The capacity of low-density parity-check codes under message-passing decoding," IEEE Transactions on Information Theory,vol. 47, no. 2, pp. 599-618, 2001. [37] N. Abramson, "The aloha system: another alternative for computer communications," in Proceedings of the November 17-19, 1970, fall joint computer conference. ACM, 1970, pp. 281-285. [38] 3GPP, "Service requirements for cyber-physical control applications in vertical domains," 3rd Generation Partnership Project (3GPP), Technical Specification (TS) 22.104, 03 2019, version 16.1.0. [Online]. Available: https://portal.3gpp.org/ desktopmodules/Specications/SpecicationDetails.aspx?specicationId=3528 [39] 3GPP, "Evolved Universal Terrestrial Radio Access (E-UTRA); User Equipment (UE) radio access capabilities," 3rd Generation Partnership Project (3GPP), Technical Specification (TS) 36.306, 06 2019, version 15.5.0. [Online]. Available: https://portal.3gpp.org/desktopmodules/Specications/SpecicationDetails.aspx?specicationId=2434 [40] A. Anand, G. De Veciana, and S. Shakkottai, "Joint scheduling of urllc and embb traffic in 5g wireless networks," IEEE/ACM Transactions on Networking, vol. 28, no. 2, pp. 477-490, 2020. [41] P. Popovski, K. F. Trillingsgaard, O. Simeone, and G. Durisi, "5g wireless network slicing for embb, urllc, and mmtc: A communication-theoretic view," IEEE Access, vol. 6, pp. 55 765-55 779, 2018.
|