Information Theoretic Methods for Future Communication Systems
This reprint focuses on information and coding theoretic metrics, analyses, and methods applied to future communication and computation systems. Analyses of learning algorithms and information security problems are studied in detail. The main themes addressed are multiple access channels, interferen...
Saved in:
Other Authors: | , , , |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
Basel
MDPI - Multidisciplinary Digital Publishing Institute
2023
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_100835 | ||
005 | 20230623 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20230623s2023 xx |||||o ||| 0|eng d | ||
020 | |a books978-3-0365-7365-6 | ||
020 | |a 9783036573649 | ||
020 | |a 9783036573656 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.3390/books978-3-0365-7365-6 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a KNTX |2 bicssc | |
100 | 1 | |a Günlü, Onur |4 edt | |
700 | 1 | |a Schaefer, Rafael F. |4 edt | |
700 | 1 | |a Boche, Holger |4 edt | |
700 | 1 | |a Poor, H. Vincent |4 edt | |
700 | 1 | |a Günlü, Onur |4 oth | |
700 | 1 | |a Schaefer, Rafael F. |4 oth | |
700 | 1 | |a Boche, Holger |4 oth | |
700 | 1 | |a Poor, H. Vincent |4 oth | |
245 | 1 | 0 | |a Information Theoretic Methods for Future Communication Systems |
260 | |a Basel |b MDPI - Multidisciplinary Digital Publishing Institute |c 2023 | ||
300 | |a 1 electronic resource (264 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a This reprint focuses on information and coding theoretic metrics, analyses, and methods applied to future communication and computation systems. Analyses of learning algorithms and information security problems are studied in detail. The main themes addressed are multiple access channels, interference channels, and delay-Doppler domain analysis, as well as secure and private compression, matrix multiplication, and transmission methods. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by/4.0/ |2 cc |4 https://creativecommons.org/licenses/by/4.0/ | ||
546 | |a English | ||
650 | 7 | |a Information technology industries |2 bicssc | |
653 | |a massive MIMO | ||
653 | |a precoding | ||
653 | |a coarse quantization | ||
653 | |a coordinate descent | ||
653 | |a information rates | ||
653 | |a semantic communication | ||
653 | |a knowledge graph | ||
653 | |a semantic extraction | ||
653 | |a semantic restoration | ||
653 | |a coded cache | ||
653 | |a cooperation | ||
653 | |a device-to-device | ||
653 | |a transmission delay | ||
653 | |a frequency-selective interference channel | ||
653 | |a K-user interference channel | ||
653 | |a DoF | ||
653 | |a instantaneous relay | ||
653 | |a error-control coding | ||
653 | |a gradient coding | ||
653 | |a random codes | ||
653 | |a ADMM | ||
653 | |a rings | ||
653 | |a coding theory | ||
653 | |a Johnson bound | ||
653 | |a Plotkin bound | ||
653 | |a Gaussian wiretap channel | ||
653 | |a Gaussian multiple-access wiretap channel | ||
653 | |a Gaussian broadcast wiretap channel | ||
653 | |a jamming | ||
653 | |a secure communication | ||
653 | |a orthogonal time frequency space modulation | ||
653 | |a discrete Zak transform | ||
653 | |a delay-Doppler channel | ||
653 | |a time-frequency dispersive channel | ||
653 | |a 6G | ||
653 | |a information theoretic security | ||
653 | |a secure source coding | ||
653 | |a remote source | ||
653 | |a private key | ||
653 | |a side information | ||
653 | |a broadcast approach | ||
653 | |a channel state information | ||
653 | |a latency | ||
653 | |a multiple access | ||
653 | |a distributed computation | ||
653 | |a matrix multiplication | ||
653 | |a distributed learning | ||
653 | |a polynomial codes | ||
653 | |a n/a | ||
856 | 4 | 0 | |a www.oapen.org |u https://mdpi.com/books/pdfview/book/7298 |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/100835 |7 0 |z DOAB: description of the publication |