Information Theoretic Methods for Future Communication Systems
| dc.contributor.editor | Günlü, Onur | |
| dc.contributor.editor | Schaefer, Rafael F. | |
| dc.contributor.editor | Boche, Holger | |
| dc.contributor.editor | Poor, H. Vincent | |
| dc.date.accessioned | 2023-06-23T09:46:34Z | |
| dc.date.available | 2023-06-23T09:46:34Z | |
| dc.date.issued | 2023 | |
| dc.identifier | ONIX_20230623_9783036573649_67 | |
| dc.identifier.uri | https://directory.doabooks.org/handle/20.500.12854/100835 | |
| dc.description.abstract | This reprint focuses on information and coding theoretic metrics, analyses, and methods applied to future communication and computation systems. Analyses of learning algorithms and information security problems are studied in detail. The main themes addressed are multiple access channels, interference channels, and delay-Doppler domain analysis, as well as secure and private compression, matrix multiplication, and transmission methods. | |
| dc.language | English | |
| dc.subject.classification | thema EDItEUR::K Economics, Finance, Business and Management::KN Industry and industrial studies::KNT Media, entertainment, information and communication industries::KNTX Information technology industries | en_US |
| dc.subject.other | massive MIMO | |
| dc.subject.other | precoding | |
| dc.subject.other | coarse quantization | |
| dc.subject.other | coordinate descent | |
| dc.subject.other | information rates | |
| dc.subject.other | semantic communication | |
| dc.subject.other | knowledge graph | |
| dc.subject.other | semantic extraction | |
| dc.subject.other | semantic restoration | |
| dc.subject.other | coded cache | |
| dc.subject.other | cooperation | |
| dc.subject.other | device-to-device | |
| dc.subject.other | transmission delay | |
| dc.subject.other | frequency-selective interference channel | |
| dc.subject.other | K-user interference channel | |
| dc.subject.other | DoF | |
| dc.subject.other | instantaneous relay | |
| dc.subject.other | error-control coding | |
| dc.subject.other | gradient coding | |
| dc.subject.other | random codes | |
| dc.subject.other | ADMM | |
| dc.subject.other | rings | |
| dc.subject.other | coding theory | |
| dc.subject.other | Johnson bound | |
| dc.subject.other | Plotkin bound | |
| dc.subject.other | Gaussian wiretap channel | |
| dc.subject.other | Gaussian multiple-access wiretap channel | |
| dc.subject.other | Gaussian broadcast wiretap channel | |
| dc.subject.other | jamming | |
| dc.subject.other | secure communication | |
| dc.subject.other | orthogonal time frequency space modulation | |
| dc.subject.other | discrete Zak transform | |
| dc.subject.other | delay-Doppler channel | |
| dc.subject.other | time-frequency dispersive channel | |
| dc.subject.other | 6G | |
| dc.subject.other | information theoretic security | |
| dc.subject.other | secure source coding | |
| dc.subject.other | remote source | |
| dc.subject.other | private key | |
| dc.subject.other | side information | |
| dc.subject.other | broadcast approach | |
| dc.subject.other | channel state information | |
| dc.subject.other | latency | |
| dc.subject.other | multiple access | |
| dc.subject.other | distributed computation | |
| dc.subject.other | matrix multiplication | |
| dc.subject.other | distributed learning | |
| dc.subject.other | polynomial codes | |
| dc.subject.other | n/a | |
| dc.title | Information Theoretic Methods for Future Communication Systems | |
| dc.type | book | |
| oapen.identifier.doi | 10.3390/books978-3-0365-7365-6 | |
| oapen.relation.isPublishedBy | 46cabcaa-dd94-4bfe-87b4-55023c1b36d0 | |
| oapen.relation.isbn | 9783036573649 | |
| oapen.relation.isbn | 9783036573656 | |
| oapen.pages | 264 | |
| oapen.place.publication | Basel |
Files in this item
| Files | Size | Format | View |
|---|---|---|---|
|
There are no files associated with this item. |
|||

