Show simple item record

dc.contributor.editorGünlü, Onur
dc.contributor.editorSchaefer, Rafael F.
dc.contributor.editorBoche, Holger
dc.contributor.editorPoor, H. Vincent
dc.date.accessioned2023-06-23T09:46:34Z
dc.date.available2023-06-23T09:46:34Z
dc.date.issued2023
dc.identifierONIX_20230623_9783036573649_67
dc.identifier.urihttps://directory.doabooks.org/handle/20.500.12854/100835
dc.description.abstractThis reprint focuses on information and coding theoretic metrics, analyses, and methods applied to future communication and computation systems. Analyses of learning algorithms and information security problems are studied in detail. The main themes addressed are multiple access channels, interference channels, and delay-Doppler domain analysis, as well as secure and private compression, matrix multiplication, and transmission methods.
dc.languageEnglish
dc.subject.classificationthema EDItEUR::K Economics, Finance, Business and Management::KN Industry and industrial studies::KNT Media, entertainment, information and communication industries::KNTX Information technology industriesen_US
dc.subject.othermassive MIMO
dc.subject.otherprecoding
dc.subject.othercoarse quantization
dc.subject.othercoordinate descent
dc.subject.otherinformation rates
dc.subject.othersemantic communication
dc.subject.otherknowledge graph
dc.subject.othersemantic extraction
dc.subject.othersemantic restoration
dc.subject.othercoded cache
dc.subject.othercooperation
dc.subject.otherdevice-to-device
dc.subject.othertransmission delay
dc.subject.otherfrequency-selective interference channel
dc.subject.otherK-user interference channel
dc.subject.otherDoF
dc.subject.otherinstantaneous relay
dc.subject.othererror-control coding
dc.subject.othergradient coding
dc.subject.otherrandom codes
dc.subject.otherADMM
dc.subject.otherrings
dc.subject.othercoding theory
dc.subject.otherJohnson bound
dc.subject.otherPlotkin bound
dc.subject.otherGaussian wiretap channel
dc.subject.otherGaussian multiple-access wiretap channel
dc.subject.otherGaussian broadcast wiretap channel
dc.subject.otherjamming
dc.subject.othersecure communication
dc.subject.otherorthogonal time frequency space modulation
dc.subject.otherdiscrete Zak transform
dc.subject.otherdelay-Doppler channel
dc.subject.othertime-frequency dispersive channel
dc.subject.other6G
dc.subject.otherinformation theoretic security
dc.subject.othersecure source coding
dc.subject.otherremote source
dc.subject.otherprivate key
dc.subject.otherside information
dc.subject.otherbroadcast approach
dc.subject.otherchannel state information
dc.subject.otherlatency
dc.subject.othermultiple access
dc.subject.otherdistributed computation
dc.subject.othermatrix multiplication
dc.subject.otherdistributed learning
dc.subject.otherpolynomial codes
dc.subject.othern/a
dc.titleInformation Theoretic Methods for Future Communication Systems
dc.typebook
oapen.identifier.doi10.3390/books978-3-0365-7365-6
oapen.relation.isPublishedBy46cabcaa-dd94-4bfe-87b4-55023c1b36d0
oapen.relation.isbn9783036573649
oapen.relation.isbn9783036573656
oapen.pages264
oapen.place.publicationBasel


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

https://creativecommons.org/licenses/by/4.0/
Except where otherwise noted, this item's license is described as https://creativecommons.org/licenses/by/4.0/