2019
DOI: 10.1109/tcomm.2019.2919021
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Transmission Control for Joint User Identification and Channel Estimation in Massive Connectivity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
35
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 43 publications
(35 citation statements)
references
References 37 publications
0
35
0
Order By: Relevance
“…where (b) is due to (3), and (c) is due to that h n ∼ CN 0, [7], and (e) is due to the distributions ofĥ n and ∆h n , as M → ∞ [1]. Then, by [8],…”
Section: Analysis Of Sstrmentioning
confidence: 99%
See 3 more Smart Citations
“…where (b) is due to (3), and (c) is due to that h n ∼ CN 0, [7], and (e) is due to the distributions ofĥ n and ∆h n , as M → ∞ [1]. Then, by [8],…”
Section: Analysis Of Sstrmentioning
confidence: 99%
“…The asymptotic performance of user activity detection and channel estimation is analyzed in [1], and the asymptotic achievable rate is analyzed in [2] (assuming perfect user activity detection). In [3], the authors propose channel-based access control and modified AMP for user activity detection, and analyze the performance of user activity detection. Note that in [1] and [3], performance analysis of the data transmission phase is not considered.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…As a further challenge, the large number of connected users in MTC makes the conventional 'handshaking'-based access control impractical owing to its high communication overhead and due to the resultant signal latency [31]. As a remedy, random access control schemes dispensing with handshaking have received intense attention in NOMA scenarios [32].…”
Section: Introductionmentioning
confidence: 99%