


default search action
ITW 2009: Volos, Greece
- Bruce E. Hajek, Leandros Tassiulas, Venkat Anantharam, Ioannis Kontoyiannis:

2009 IEEE Information Theory Workshop, ITW 2009, Volos, Greece, June 10-12, 2009. IEEE 2009, ISBN 978-1-4244-4536-3 - Rudolf Ahlswede, Imre Csiszár:

On oblivious transfer capacity. 1-3 - Imre Csiszár, Prakash Narayan:

Multiterminal secrecy generation. 4 - Soheil Mohajer, Suhas N. Diggavi:

A deterministic approach to wireless network error correction. 5-9 - Sekhar Tatikonda:

Clustering phenomena in message-passing schemes. 10-12 - Nilesh Khude, Vinod M. Prabhakaran, Pramod Viswanath:

Harnessing bursty interference. 13-16 - Peter Harremoës:

Testing goodness-of-fit via rate distortion. 17-21 - Maria Varsamou, Theodore Antonakopoulos:

Coding efficiency and reliability in probe-based storage devices. 22-26 - Danny Dubé, Vincent Beaudoin:

Constructing optimal whole-bit recycling codes. 27-31 - Kostis Xenoulis, Nicholas Kalouptsidis:

On the random coding exponent of nonlinear gaussian channels. 32-36 - Brian P. Dunn, Matthieu R. Bloch, J. Nicholas Laneman:

Secure bits through queues. 37-41 - Majid Nasiri Khormuji, Mikael Skoglund:

Instantaneous forwarding strategies for relay channels with known interference. 42-46 - Deniz Gündüz

, Osvaldo Simeone
, Andrea Goldsmith, Harold Vincent Poor, Shlomo Shamai
:
Relaying simultaneous multicast messages. 47-51 - Osvaldo Simeone

, Oren Somekh, Elza Erkip
, H. Vincent Poor, Shlomo Shamai
:
Multirelay channel with non-ergodic link failures. 52-56 - Amir Salman Avestimehr, M. Amin Khajehnejad, Aydin Sezgin

, Babak Hassibi:
Capacity region of the deterministic multi-pair bi-directional relay network. 57-61 - Dayu Huang, Jayakrishnan Unnikrishnan

, Sean P. Meyn, Venugopal V. Veeravalli, Amit Surana:
Statistical SVMs for robust detection, supervised learning, and universal classification. 62-66 - Gusztáv Morvai, Benjamin Weiss:

Estimating the residual waiting time for binary stationary time series. 67-70 - Vinay Uday Prabhu, Dimitris Toumpakaris:

An MSE-tunable linear estimator with conditional dominance over least-squares estimation. 71-75 - Nikhil Karamchandani, Rathinakumar Appuswamy, Massimo Franceschetti:

Distributed computation of symmetric functions with binary inputs. 76-80 - Manish Agarwal, Dongning Guo, Michael L. Honig:

Limited feedback for multicarrier block fading channels: A rate distortion approach. 81-85 - Hamid Saeedi

, Hossein Pishro-Nik:
On LDPC codes over symmetric channels. 86-90 - Michael Samuel, Michael P. Fitz:

Efficient iterative sphere detectors based on the Schnorr-Euchner enumeration. 91-95 - Imre Csiszár, Frantisek Matús:

On minimization of multivariate entropy functionals. 96-100 - Todd P. Coleman:

A simple memoryless proof of the capacity of the exponential server timing channel. 101-105 - Mokshay M. Madiman, Andrew R. Barron, Abram Kagan, Tinghui Yu:

A model for pricing data bundles based on minimax risks for estimation of a location parameter. 106-109 - Anna Pantelidou

, Anthony Ephremides:
A cross-layer view of wireless multicasting under uncertainty. 110-114 - Kostas Christodoulopoulos

, Konstantinos Manousakis
, Emmanouel A. Varvarigos
:
Cross layer optimization of static lightpath demands in transparent WDM optical networks. 115-119 - Ron Dabora, Andrea Goldsmith:

Finite-state broadcast channels with feedback and receiver cooperation. 120-124 - Luísa Lima, João Barros

, Muriel Médard, Alberto López Toledo:
Towards secure multiresolution network coding. 125-129 - Soheil Mohajer, Mahdi Jafari Siavoshani, Suhas N. Diggavi, Christina Fragouli:

On the capacity of multisource non-coherent network coding. 130-134 - Omer H. Abdelrahman

, Erol Gelenbe:
Queueing performance under Network Coding. 135-139 - Randall A. Berry

, David N. C. Tse:
Information theory meets game theory on the interference channel. 140-144 - Christina Aperjis, Michael J. Freedman, Ramesh Johari:

Comparing multilateral and bilateral exchange models for content distribution. 145-146 - Jason R. Marden, Michelle Effros:

A game theoretic approach to network coding. 147-151 - Michael C. Gastpar, Patrick R. Gill, Frédéric E. Theunissen:

Anthropic correction of information estimates. 152-155 - Narayana Santhanam, Janis Dingel, Olgica Milenkovic:

On modeling gene regulatory networks using Markov random fields. 156-160 - Song-Jheng Lin, Shih-Chun Lin

, Kai-Sheng Chen, Hsuan-Jung Su
:
Coding for noisy quadratic-Gaussian Wyner-Ziv problem : A successive quantization approach. 161-165 - Ebad Ahmed, Aaron B. Wagner:

Binary erasure multiple descriptions: Average-case distortion. 166-170 - Wei Dai, Hoa Vinh Pham, Olgica Milenkovic:

Distortion-rate functions for quantized compressive sensing. 171-175 - Mingkai Shao, Sorina Dumitrescu, Xiaolin Wu:

Rate-distortion optimized network communication using general MDC. 176-180 - Rahul Vaze, Robert W. Heath Jr.

:
Optimal amplify and forward strategy for two-way relay channel with multiple relays. 181-185 - Carlos H. M. de Lima, Giuseppe Thadeu Freitas de Abreu

:
Analysis of Contention-based relay selection mechanisms in autonomous multi-hop networks. 186-190 - Srinath Puducheri, Thomas E. Fuja:

On the capacity of the erasure multiple relay channel. 191-195 - Qiang Xue, Giuseppe Abreu

, Behnaam Aazhang:
Mutual information of amplify-and-forward DSTBCs over the random set relay channel. 196-200 - Sibi Raj Bhaskaran, Linda M. Davis, Alex J. Grant

, Stephen V. Hanly
, Paul Tune:
Downlink scheduling using compressed sensing. 201-205 - Angelia Nedic

, Vijay G. Subramanian
:
Approximately optimal utility maximization. 206-210 - Bruce E. Hajek, Sichao Yang:

A mechanism for pricing service guarantees. 211-215 - Tie Liu, Shlomo Shamai

:
A channel-enhancement approach to the secrecy capacity of the multiantenna wiretap channel. 216-220 - Michèle A. Wigger, Gerhard Kramer

:
Three-user MIMO MACs with cooperation. 221-225 - Mari Kobayashi, Nihar Jindal, Giuseppe Caire:

Optimized training and feedback for MIMO downlink channels. 226-230 - Shirin Jalali, Andrea Montanari, Tsachy Weissman:

An iterative scheme for near optimal and universal lossy compression. 231-235 - Ioannis Kontoyiannis, Christos Gioran:

Efficient random codebooks and databases for lossy compression in near-linear time. 236-240 - Teemu Roos, Bin Yu:

Sparse Markov source estimation via transformed Lasso. 241-245 - Huan Xu, Constantine Caramanis

, Shie Mannor
:
High dimensional Principal Component Analysis with contaminated data. 246-250 - Jayadev Acharya, Alon Orlitsky, Shengjun Pan:

Recent results on pattern maximum likelihood. 251-255 - Chao Tian, Jun Chen:

Quantization splitting for symmetric K-channel multiple descriptions. 256-260 - Dino Sejdinovic

, Robert J. Piechocki
, Angela Doufexi
:
AND-OR tree analysis of distributed LT codes. 261-265 - Haim H. Permuter

, Yossef Steinberg
, Tsachy Weissman:
Problems we can solve with a helper. 266-270 - Guangyue Han:

Menger's paths with minimum mergings. 271-275 - Sha Yao, Mikael Skoglund:

Analog network coding mappings in Gaussian multiple-access two-hop channels. 276-280 - Danilo Silva

, Frank R. Kschischang
:
Universal weakly secure network coding. 281-285 - Ioannis Krikidis

, J. Nicholas Laneman, John S. Thompson, Steve McLaughlin
:
Stability analysis for cognitive radio with cooperative enhancements. 286-290 - Kyatsandra G. Nagananda, Chandra R. Murthy

:
Three-user cognitive channels with cumulative message sharing: An achievable rate region. 291-295 - Emmanouil Spanakis

, Apostolos Traganitis, Anthony Ephremides:
Rate region and power considerations in a simple 2×2 interference channel. 296-300 - Ravi Tandon, Sennur Ulukus:

Capacity bounds for the Gaussian interference channel with transmitter cooperation. 301-305 - Pavlos Kazakopoulos, Panayotis Mertikopoulos

, Aris L. Moustakas, Giuseppe Caire:
Distribution of MIMO mutual information: A large deviations approach. 306-310 - Amir Salman Avestimehr, Tracey Ho:

Approximate capacity of the symmetric half-duplex Gaussian butterfly network. 311-315 - Ming Xiao, Mikael Skoglund:

M-user cooperative wireless communications based on nonbinary network codes. 316-320 - Adnan Raja, Vinod M. Prabhakaran, Pramod Viswanath:

Reciprocity in linear deterministic networks under linear coding. 321-325 - Ralf Koetter, Michelle Effros, Muriel Médard:

On a theory of network equivalence. 326-330 - Soheil Mohajer, Suhas N. Diggavi, Christina Fragouli, David N. C. Tse:

Capacity of deterministic Z-chain relay-interference network. 331-335 - Xiang He, Aylin Yener:

K-user interference channels: Achievable secrecy rate and degrees of freedom. 336-340 - Masih Nilchian, Vahid Aref, Mohammad Reza Aref:

Partial cognitive relay channel. 341-345

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














