We present a coherent and systematic review of Random Access Algorithms for packet networks, as developed over three and a half decades. We consider the appropriate user models and we classify the algorithms according...We present a coherent and systematic review of Random Access Algorithms for packet networks, as developed over three and a half decades. We consider the appropriate user models and we classify the algorithms according to the channel sensing constraints imposed. We also present a review of the analytical methodologies required for the performance analysis of these algorithms.展开更多
We consider qualitatively robust predictive mappings of stochastic environmental models, where protection against outlier data is incorporated. We utilize digital representations of the models and deploy stochastic bi...We consider qualitatively robust predictive mappings of stochastic environmental models, where protection against outlier data is incorporated. We utilize digital representations of the models and deploy stochastic binary neural networks that are pre-trained to produce such mappings. The pre-training is implemented by a back propagating supervised learning algorithm which converges almost surely to the probabilities induced by the environment, under general ergodicity conditions.展开更多
A critical component of the smart grid (SG) infrastructure is the embedded communications network, where an important objective of the latter is the expansion of its throughput, in conjunction with the satisfaction of...A critical component of the smart grid (SG) infrastructure is the embedded communications network, where an important objective of the latter is the expansion of its throughput, in conjunction with the satisfaction of specified latency and accuracy requirements. For the effective design of the communications network, the user and traffic profiles, such as known-user vs. unknown-user populations and bursty vs. non-bursty data traffics, must be carefully considered and subsequently modeled. This paper relates user and traffic models to the deployment of effective multiple access transmission algorithms in the communications network of the SG.展开更多
We consider sparse signals embedded in additive white noise. We study parametrically optimal as well as tree-search sub-optimal signal detection policies. As a special case, we consider a constant signal and Gaussian ...We consider sparse signals embedded in additive white noise. We study parametrically optimal as well as tree-search sub-optimal signal detection policies. As a special case, we consider a constant signal and Gaussian noise, with and without data outliers present. In the presence of outliers, we study outlier resistant robust detection techniques. We compare the studied policies in terms of error performance, complexity and resistance to outliers.展开更多
文摘We present a coherent and systematic review of Random Access Algorithms for packet networks, as developed over three and a half decades. We consider the appropriate user models and we classify the algorithms according to the channel sensing constraints imposed. We also present a review of the analytical methodologies required for the performance analysis of these algorithms.
文摘We consider qualitatively robust predictive mappings of stochastic environmental models, where protection against outlier data is incorporated. We utilize digital representations of the models and deploy stochastic binary neural networks that are pre-trained to produce such mappings. The pre-training is implemented by a back propagating supervised learning algorithm which converges almost surely to the probabilities induced by the environment, under general ergodicity conditions.
文摘A critical component of the smart grid (SG) infrastructure is the embedded communications network, where an important objective of the latter is the expansion of its throughput, in conjunction with the satisfaction of specified latency and accuracy requirements. For the effective design of the communications network, the user and traffic profiles, such as known-user vs. unknown-user populations and bursty vs. non-bursty data traffics, must be carefully considered and subsequently modeled. This paper relates user and traffic models to the deployment of effective multiple access transmission algorithms in the communications network of the SG.
文摘We consider sparse signals embedded in additive white noise. We study parametrically optimal as well as tree-search sub-optimal signal detection policies. As a special case, we consider a constant signal and Gaussian noise, with and without data outliers present. In the presence of outliers, we study outlier resistant robust detection techniques. We compare the studied policies in terms of error performance, complexity and resistance to outliers.