


default search action
Information Theory and Applications 2011: San Diego, CA, USA
- Information Theory and Applications Workshop, ITA 2011, San Diego, California, USA, February 6-11, 2011. IEEE 2011, ISBN 978-1-4577-0361-4

- Emmanuel Abbe:

Randomness and dependencies extraction via polarization. 8-14 - Qiuju Diao, Qin Huang, Shu Lin, Khaled A. S. Abdel-Ghaffar:

A transform approach for analyzing and constructing quasi-cyclic low-density parity-check codes. 15-22 - Ahmad Abu Al Haija, Mai Vu:

Can half-duplex be simply derived from full-duplex communications? 23-27 - Venkat Anantharam, Vivek S. Borkar:

Stochastic approximation with 'bad' noise. 28-29 - George K. Atia, Venugopal V. Veeravalli:

Sensor scheduling for energy-efficient tracking in cluttered environments. 41-49 - Serhat Nazim Avci, Xiaodan Hu, Ender Ayanoglu:

Hitless recovery from link failures in networks with arbitrary topology. 50-55 - Ansuman Adhikary, Vasileios Ntranos, Giuseppe Caire:

Cognitive femtocells: Breaking the spatial reuse barrier of cellular systems. 56-65 - Tsung-Yi Chen, Nambi Seshadri, Richard D. Wesel:

Incremental redundancy: A comparison of a sphere-packing analysis and convolutional codes. 66-70 - Max H. M. Costa:

Noisebergs in Z Gaussian interference channels. 71-76 - David G. M. Mitchell, Michael Lentmaier, Daniel J. Costello Jr.:

AWGN channel analysis of terminated LDPC convolutional codes. 77-81 - Yiwei Song, Natasha Devroye:

Structured interference-mitigation in two-hop networks. 82-87 - Ozgun Y. Bursalioglu, Giuseppe Caire, Dariush Divsalar:

Joint source-channel coding for deep space image transmission using rateless codes. 88-97 - Jeongho Jeon, Anthony Ephremides:

Extending the power of backpressure to correlated traffic. 98-102 - Fatemeh Fazel, Maryam Fazel, Milica Stojanovic:

Design of a random access network for compressed sensing. 103-111 - Pulkit Grover

, Anant Sahai, Karthik Ganesan
, Jan M. Rabaey:
"Green codes with short wires at the decoder: Fundamental limits and constructions". 112-115 - Yi Gai, Shankar Ganesan, Bhaskar Krishnamachari:

The saturation throughput region of p-persistent CSMA. 116-119 - Ruggero Carli, Giacomo Como

, Paolo Frasca
, Federica Garin:
Distributed averaging on digital noisy networks. 120-128 - Jerry D. Gibson:

The 3-dB transcoding penalty in digital cellular communications. 129-134 - Alexandre Graell i Amat

, Eirik Rosnes:
On the minimum distance properties of weighted nonbinary repeat multiple-accumulate codes. 135-139 - Amites Sarkar, Martin Haenggi

:
Percolation in the secrecy graph. 140-145 - Xinyu Zhang, Jiangtao Wen, Yuxing Han, John D. Villasenor:

An improved compressive sensing reconstruction algorithm using linear/non-linear mapping. 146-152 - Tor Helleseth, Sondre Rønjom:

Simplifying algebraic attacks with univariate analysis. 153-159 - Tracey Ho, Sukwon Kim, Yanbo Yang, Michelle Effros, Amir Salman Avestimehr:

On network error correction with limited feedback capacity. 160-162 - Qin Huang, Shu Lin, Khaled A. S. Abdel-Ghaffar:

Error-correcting codes for flash coding. 163-185 - Qin Huang, Qiuju Diao, Shu Lin, Khaled A. S. Abdel-Ghaffar:

Cyclic and quasi-cyclic LDPC codes: New developments. 186-195 - Shirin Jalali, Michelle Effros, Tracey Ho:

On the impact of a single edge on the network coding capacity. 196-200 - Shirin Jalali, Michelle Effros:

Separation of source-network coding and channel coding in wireline networks. 201-207 - Anxiao Jiang, Hongchao Zhou, Jehoshua Bruck

:
Maximizing the storage capacity of nonvolatile memories. 208-216 - Irina E. Bocharova, Florian Hug, Rolf Johannesson, Boris D. Kudryashov:

On the exact bit error probability for Viterbi decoding of convolutional codes. 217-222 - Luis Alfonso Lastras-Montaño, Patrick J. Meaney, Eldee Stephens, Barry M. Trager, James A. O'Connor, Luiz C. Alves:

A new class of array codes for memory storage. 223-232 - Jungwon Lee, Dimitris Toumpakaris, Wei Yu:

Interference mitigation via joint detection in a fading environment. 233-239 - Haoyang Liu, Keqin Liu, Qing Zhao:

Learning and sharing in a changing world: Non-Bayesian restless bandit with multiple players. 240-246 - Manu Sharma, Xiaojun Lin:

OFDM downlink scheduling for delay-optimality: Many-channel many-source asymptotics with general arrival processes. 247-256 - Alfonso Martinez

, Albert Guillen i Fabregas
:
Saddlepoint approximation of random-coding bounds. 257-262 - Zhoujia Mao, Can Emre Koksal, Ness B. Shroff:

Towards achieving full secrecy rate in wireless networks: A control theoretic approach. 263-270 - Sriram Venkateswaran, Sumit Singh, Upamanyu Madhow, Raghuraman Mudumbai:

Distributed synchronization and medium access in wireless mesh networks. 271-278 - Ivana Maric, Bojan Bostjancic, Andrea Goldsmith:

Resource allocation for constrained backhaul in picocell networks. 279-284 - Ian A. Kash, Michael Mitzenmacher, Justin Thaler, Jonathan R. Ullman:

On the zero-error capacity threshold for deletion channels. 285-289 - Raj Rao Nadakuditi

, Mingyan Liu:
Latency-optimizing file splitting for transmission over a large multi-hop network. 290-295 - Esa Ollila, Visa Koivunen, H. Vincent Poor:

Complex-valued signal processing - essential models, tools and statistics. 296-305 - Pedro C. Pinto, João Barros

, Moe Z. Win
:
Wireless secrecy in large-scale networks. 306-315 - Gregory J. Pottie:

Fair resource allocation in one-dimensional cellular systems. 316-323 - Marco Martalò

, Marco Picone
, Michele Amoretti
, Gianluigi Ferrari
, Riccardo Raheli
:
Randomized network coding in distributed storage systems with layered overlay. 324-330 - Ye Wang, Shantanu Rane, Stark C. Draper

, Prakash Ishwar
:
An information-theoretic analysis of revocability and reusability in secure biometrics. 331-340 - Chenwei Wang, Haralabos C. Papadopoulos, Sean A. Ramprashad, Giuseppe Caire:

Design and operation of Blind Interference Alignment in cellular and cluster-based systems. 341-350 - Min Li

, Osvaldo Simeone
, Aylin Yener:
Message and state cooperation in a relay channel when the relay has strictly causal state information. 351-356 - Byungju Lee, Byonghyo Shim

:
A vector perturbation based user selection for multi-antenna downlink channels. 357-360 - Harpreet S. Dhillon, Radha Krishna Ganti

, Jeffrey G. Andrews:
A tractable framework for coverage and outage in heterogeneous cellular networks. 361-366 - Itzhak Tamo, Moshe Schwartz

:
On optimal anticodes over permutations with the infinity norm. 367 - Rajiv Soundararajan, Sriram Vishwanath:

Quantization using compressive sensing. 368-373 - Damla Ozgul, Alex Sprintson

:
An algorithm for cooperative data exchange with cost criterion. 374-377 - Nargiz Kalantarova, Kyeongyeon Kim, Suleyman Serdar Kozat, Andrew C. Singer

:
Nonlinear turbo equalization using context trees. 378-382 - Ulrich Tamm:

Possible applications of information theory in logistics. 383-385 - Daniela Tuninetti

:
A new sum-rate outer bound for interference channels with three source-destination pairs. 386-393 - Kwang Taik Kim, Chan-Soo Hwang, Vahid Tarokh:

Network error correction from matrix network coding. 394-402 - Niloofar Fazlollahi, David Starobinski, Ari Trachtenberg:

Connecting identifying codes and fundamental bounds. 403-409 - Badri N. Vellambi

, Nima Torabkhani, Faramarz Fekri
:
Study of throughput and delay in finite-buffer line networks. 410-414 - Chiunlin Lim, Ao Tang:

Dynamic speed scaling and load balancing of interconnected queues. 415-424 - Lav R. Varshney, Joong Bum Rhim, Kush R. Varshney, Vivek K. Goyal:

Categorical decision making by people, committees, and crowds. 425-434 - Taposh Banerjee, Venugopal V. Veeravalli:

Bayesian quickest change detection under energy constraints. 435-444 - Pascal O. Vontobel:

A combinatorial characterization of the Bethe and the Kikuchi partition functions. 445-454 - Jiadong Wang, Lara Dolecek, Richard D. Wesel:

LDPC absorbing sets, the null space of the cycle consistency matrix, and Tanner's constructions. 455-459 - Yuval Kochman, Gregory W. Wornell

:
Finite multi-coset sampling and sparse arrays. 460-466 - Hans-Andrea Loeliger, Lukas Bolliger, Georg Wilckens, Jonas Biveroni:

Analog-to-digital conversion using unstable filters. 467-470 - Amos Lapidoth, Andreas Malär, Michèle A. Wigger:

Constrained Wyner-Ziv source coding. 471-472 - Lin Zheng, Da-ke He, En-Hui Yang:

On the information theoretic performance comparison of causal video coding and predictive video coding. 473-479 - Roy D. Yates, David Tse:

K user fading broadcast channels with CSI at the receivers. 480-485 - Silas L. Fong

, Raymond W. Yeung:
Capacity bounds for full-duplex two-way relay channel with feedback. 486-495 - Angela I. Barbero

, Eirik Rosnes, Guang Yang, Øyvind Ytrehus:
Constrained codes for passive RFID communication. 496-504 - Yang Yang, Zixiang Xiong:

An improved lattice-based scheme for lossy distributed compression of linear functions. 505-509 - Xinmiao Zhang, Yu Zheng:

Efficient codeword recovery architecture for low-complexity Chase Reed-Solomon decoding. 510-513 - Nicolò Michelusi

, Osvaldo Simeone
, Marco Levorato, Petar Popovski
, Michele Zorzi:
Optimal cognitive transmission exploiting redundancy in the primary ARQ process. 514-523 - Jinyuan Chen, Arun Singh

, Petros Elia
, Raymond Knopp:
Interference neutralization for separated multiuser uplink-downlink with distributed relays. 524-532 - Francesco Negro, Irfan Ghauri, Dirk T. M. Slock

:
Deterministic annealing design and analysis of the Noisy MIMO Interference Channel. 533-542

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














