{"id":"https://openalex.org/W2009794530","doi":"https://doi.org/10.1109/isit.2014.6874870","title":"On the stability of random multiple access with feedback exploitation and queue priority","display_name":"On the stability of random multiple access with feedback exploitation and queue priority","publication_year":2014,"publication_date":"2014-06-01","ids":{"openalex":"https://openalex.org/W2009794530","doi":"https://doi.org/10.1109/isit.2014.6874870","mag":"2009794530"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2014.6874870","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2014.6874870","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1401.1513","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055400388","display_name":"Karim G. Seddik","orcid":"https://orcid.org/0000-0002-2279-592X"},"institutions":[{"id":"https://openalex.org/I80693520","display_name":"American University in Cairo","ror":"https://ror.org/0176yqn58","country_code":"EG","type":"education","lineage":["https://openalex.org/I80693520"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Karim G. Seddik","raw_affiliation_strings":["Electronics Engineering Department, American University in Cairo, New Cairo, Egypt","Electron. Eng. Dept., American Univ. in Cairo, New Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"Electronics Engineering Department, American University in Cairo, New Cairo, Egypt","institution_ids":["https://openalex.org/I80693520"]},{"raw_affiliation_string":"Electron. Eng. Dept., American Univ. in Cairo, New Cairo, Egypt","institution_ids":["https://openalex.org/I80693520"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5055400388"],"corresponding_institution_ids":["https://openalex.org/I80693520"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10770965,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"436","last_page":"440"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-access","display_name":"Random access","score":0.9002753496170044},{"id":"https://openalex.org/keywords/queue","display_name":"Queue","score":0.7456601858139038},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6246100068092346},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6130501627922058},{"id":"https://openalex.org/keywords/acknowledgement","display_name":"Acknowledgement","score":0.5683615207672119},{"id":"https://openalex.org/keywords/stability","display_name":"Stability (learning theory)","score":0.5275575518608093},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4999971389770508},{"id":"https://openalex.org/keywords/priority-queue","display_name":"Priority queue","score":0.48288536071777344},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.46597906947135925},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4441557824611664},{"id":"https://openalex.org/keywords/queueing-theory","display_name":"Queueing theory","score":0.419852614402771},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10329148173332214}],"concepts":[{"id":"https://openalex.org/C101722063","wikidata":"https://www.wikidata.org/wiki/Q218825","display_name":"Random access","level":2,"score":0.9002753496170044},{"id":"https://openalex.org/C160403385","wikidata":"https://www.wikidata.org/wiki/Q220543","display_name":"Queue","level":2,"score":0.7456601858139038},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6246100068092346},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6130501627922058},{"id":"https://openalex.org/C2777880217","wikidata":"https://www.wikidata.org/wiki/Q4674282","display_name":"Acknowledgement","level":2,"score":0.5683615207672119},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.5275575518608093},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4999971389770508},{"id":"https://openalex.org/C26951474","wikidata":"https://www.wikidata.org/wiki/Q629283","display_name":"Priority queue","level":3,"score":0.48288536071777344},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.46597906947135925},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4441557824611664},{"id":"https://openalex.org/C22684755","wikidata":"https://www.wikidata.org/wiki/Q847526","display_name":"Queueing theory","level":2,"score":0.419852614402771},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10329148173332214},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1109/isit.2014.6874870","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2014.6874870","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1401.1513","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1401.1513","pdf_url":"https://arxiv.org/pdf/1401.1513","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"mag:2009794530","is_oa":true,"landing_page_url":"https://arxiv.org/abs/1401.1513","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.754.3350","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.754.3350","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://arxiv.org/pdf/1401.1513.pdf","raw_type":"text"},{"id":"doi:10.48550/arxiv.1401.1513","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1401.1513","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1401.1513","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1401.1513","pdf_url":"https://arxiv.org/pdf/1401.1513","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2011672178","https://openalex.org/W2013890596","https://openalex.org/W2050882265","https://openalex.org/W2099390823","https://openalex.org/W2104157404","https://openalex.org/W2129074926","https://openalex.org/W2134353651","https://openalex.org/W2154756494","https://openalex.org/W2963487582"],"related_works":["https://openalex.org/W2029657175","https://openalex.org/W3003468061","https://openalex.org/W2951593110","https://openalex.org/W2953329264","https://openalex.org/W2758737187","https://openalex.org/W2128435725","https://openalex.org/W2157531983","https://openalex.org/W2947143132","https://openalex.org/W2105976144","https://openalex.org/W2898806784","https://openalex.org/W2090960495","https://openalex.org/W2151608698","https://openalex.org/W2953271590","https://openalex.org/W2804372445","https://openalex.org/W2740715474","https://openalex.org/W2789557201","https://openalex.org/W1964882163","https://openalex.org/W2908521385","https://openalex.org/W1592506959","https://openalex.org/W3005249596"],"abstract_inverted_index":{"In":[0],"this":[1,68,76],"paper,":[2],"we":[3],"study":[4],"the":[5,17,20,25,35,39,50,57,64,81,85,95],"stability":[6,26,65,78,82],"of":[7,34,67,84],"two":[8,36],"interacting":[9],"queues":[10,18,37],"under":[11,28,45],"random":[12,29,70,87],"multiple":[13,30],"access":[14,31,56,71,88],"in":[15],"which":[16],"leverage":[19],"feedback":[21,40,96],"information.":[22,97],"We":[23,62],"derive":[24],"region":[27,66,79,83],"where":[32],"one":[33],"exploits":[38],"information":[41],"and":[42,49,73],"backs":[43],"off":[44],"negative":[46],"acknowledgement":[47],"(NACK)":[48],"other,":[51],"higher":[52],"priority,":[53],"queue":[54],"will":[55],"channel":[58],"with":[59],"probability":[60],"one.":[61],"characterize":[63],"feedback-based":[69],"protocol":[72],"prove":[74],"that":[75,91],"derived":[77],"encloses":[80],"conventional":[86],"(RA)":[89],"scheme":[90],"does":[92],"not":[93],"exploit":[94]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
