Monday 24.02.2020 |
|
|
|
8:30 |
Arrival and registration |
|
9:00 |
Welcome |
|
9:15 |
Session 1 |
Chair: Federico Clazzer (DLR) |
|
A. Fengler (TU Berlin) |
Unsourced Random Access via Sparse Regression |
|
R. Mueller (FAU Erlangen) |
Exact Block Error Probability of Gaussian Random Codes in AWGN under Angle Decoding |
|
K. Andreev, A. Frolov (Skoltech) |
A Polar Code Based TIN-SIC Scheme for the Unsourced Random Access in the Quasi-Static Fading MAC |
10:30 |
Coffee Break |
|
11:15 |
Session 2 |
Chair: Yury Polyanskiy (MIT) |
|
A. Guillèn i Fá (UPF) |
A single-letter upper bound to the mismatch capacity |
|
G. Kramer (TUM) |
Capacity Bounds for Gaussian Massive Multi-access Systems |
|
A. Özgür (Stanford) |
Distributed Learning under Communication (and Privacy) Constraints |
12:30 |
Lunch Break |
|
13:45 |
Fabian Steiner (TUM) |
Pretty Good Codes (Demo) |
14:00 |
Session 3 |
Chair: Francisco Lazaro (DLR) |
|
J.-F. Chamberland (Texas A&M) |
Leveraging Structural Properties of Tree Coding in Unsourced Random Access |
|
S. Saeedi Bidokhti (Univ. Pennsylvania) |
Information Freshness in Random Access Channels |
|
M. Chiani (Univ. of Bologna) |
Collecting Confidential Messages on a Tally Stick |
|
H. Pfister (Duke Univ.) |
Reinforcement Learning for Channel Coding |
15:40 |
Coffee Break |
|
16:25 |
Session 4 |
Chair: Gianluigi Liva (DLR) |
|
L. Schmalen (KIT) |
Burst correction capabilities of spatially coupled LDPC codes: finite-length analysis and application example |
|
M. Geiselhart (Univ. of Stuttgart) |
Iterative Decoding of Polar Codes: Towards SCL Performance |
|
A. Buchberger (Chalmers Univ.) |
Pruning Neural Belief Propagation Decoders |
|
19:00 |
|
Social Dinner at Augustiner am Wörthsee (self-paid) |
|
|
Tuesday 25.02.2020 |
9:00 |
Session 5 |
Chair: Balazs Matuz (DLR) |
|
A. Munari (DLR) |
Modern Random Access for Machine-Type Communications: a Multi-Receiver Perspective |
|
R. Venkataramanan (Cambridge Univ.) |
Sparse Regression Codes for Many-Access Channels |
|
D. Vukobratovic (Univ. Of Novi Sad) |
Two Scenarios in Coded Random Access |
10:15 |
Coffee Break |
|
11:00 |
Session 6 |
Chair: Federico Clazzer (DLR) |
|
P. Popovski (Aalborg Univ.) |
Models and Analysis of Wireless Access for Heterogeneous Connectivity Types |
|
Y. Polyanskiy (MIT) |
Remarks on algorithms for massive random access |
|
A. Pradhan (Texas A&M) |
Polar Coding and Serial Interference Cancellation for the Unsourced MAC |
12:15 |
Lunch Break |
|
14:00 |
Session 7 |
Chair: Estefania Recayte (DLR) |
|
E. Paolini (Univ. of Bologna) |
Rateless codes: Performance bounds and error exponents |
|
S. Stanczak, M. Frey (TU Berlin/Fraunhofer HHI) |
Approximation of Functions over the Air with Applications in (Massive) Wireless Sensor Networks |
|
G. Durisi (Chalmers Univ.) |
Short-packet Transmission via Variable-Length Codes in the Presence of Noisy Stop Feedback |
15:15 |
Coffee Break |
|
16:00 |
Session 8 |
Chair: Andrea Munari (DLR) |
|
E. Egorova, G. Kabatiansky (Skoltech) |
Signature codes for different MACs: what do we know and what we don't? |
|
E. Jorswieck (TU Braunschweig) |
On Copula-based Multiuser Performance Bounds |
|
G. Cocco (UPF) |
An application of sequential joint encoding to video streaming |