Abstract:
The paper is based on the brief communication [1], where proofs of results were omitted or drastically abridged. In the present paper, not only this gap is filled but also the very model of restricted asynchronous multiple access from [1] is considered in a somewhat more general situation.