


default search action
ITW 2015: Jerusalem, Israel
- 2015 IEEE Information Theory Workshop, ITW 2015, Jerusalem, Israel, April 26 - May 1, 2015. IEEE 2015, ISBN 978-1-4799-5524-4

- Aditya Vempaty, Lav R. Varshney:

CEO problem for belief sharing. 1-5 - Jacob Ziv:

A constrained-dictionary version of LZ78 asymptotically achieves the finite-state compressibility with a distortion measure. 1-4 - Joel Ratsaby:

On complexity and randomness of Markov-chain prediction. 1-5 - Igal Sason:

Tight bounds for symmetric divergence measures and a new inequality relating f-divergences. 1-5 - Yi-Peng Wei, Sennur Ulukus:

Polar coding for the general wiretap channel. 1-5 - Shaofeng Zou, Yingbin Liang, Lifeng Lai, Shlomo Shamai

:
Degraded broadcast channel: Secrecy outside of a bounded range. 1-5 - G. David Forney Jr.:

Unique factorization and controllability of tail-biting trellis realizations via controller granule decompositions. 1-5 - Nir Weinberger, Wasim Huleihel, Neri Merhav:

Erasure/list random coding error exponents are not universally achievable. 1-5 - Amin Sakzad

, Anna-Lena Trautmann
, Emanuele Viterbo
:
Cross-packing lattices for the Rician fading channel. 1-5 - Shenghao Yang, Yi Chen, Soung Chang Liew, Lizhao You

:
Coding for network-coded slotted ALOHA. 1-5 - Cupjin Huang, Zihan Tan

, Shenghao Yang:
Upper bound on function computation in directed acyclic networks. 1-5 - Yauhen Yakimenka, Vitaly Skachek:

Refined upper bounds on stopping redundancy of binary linear codes. 1-5 - Xishuo Liu, Stark C. Draper

:
Encoding and decoding algorithms for LP-decodable multipermutation codes. 1-5 - Natarajan Lakshmi Prasad

, Yi Hong
, Emanuele Viterbo
:
Lattice index coding for the broadcast channel. 1-5 - Martina Cardone, Daniela Tuninetti

, Raymond Knopp:
The approximate optimality of simple schedules for half-duplex multi-relay networks. 1-5 - Yunyan Chang, Slawomir Stanczak, Chan Zhou:

Throughput scaling for random hybrid wireless networks with physical-layer network coding. 1-5 - Shlomo Engelberg, Osnat Keren:

Zero-latency zero-error codes for parallel asynchronous channels with arbitrary skews. 1-4 - Sang-Woon Jeon, Song-Nam Hong

, Mingyue Ji, Giuseppe Caire:
On the capacity of multihop device-to-device caching networks. 1-5 - Jingge Zhu

, Michael Gastpar:
Compute-and-forward using nested linear codes for the Gaussian MAC. 1-5 - Ziv Goldfeld, Haim H. Permuter

, Gerhard Kramer
:
Broadcast channels with cooperation: Capacity and duality for the semi-deterministic case. 1-5 - Meryem Benammar, Pablo Piantanida, Shlomo Shamai

:
Capacity results for the Multicast Cognitive Interference Channel. 1-5 - Alex Dytso

, Daniela Tuninetti
, Natasha Devroye:
The Gaussian Interference Channel with lack of codebook knowledge at one receiver: Symmetric capacity to within a gap with a PAM input. 1-5 - Talha Cihad Gülcü, Alexander Barg:

Achieving secrecy capacity of the wiretap channel and broadcast channel with a confidential component. 1-5 - Kechao Huang, David G. M. Mitchell

, Xiao Ma, Daniel J. Costello Jr.:
Asymptotic distance properties of protograph-based spatially coupled LDPC codes over GF(q). 1-5 - Yonathan Murin, Yonatan Kaspi, Ron Dabora, Deniz Gündüz

:
On the transmission of a bivariate Gaussian source over the Gaussian broadcast channel with feedback. 1-5 - Marcelo J. Weinberger:

One-to-one lossless codes in the variable input-length regime: Back to Kraft's inequality. 1-5 - Shashank Vatedka

, Navin Kashyap:
Some "goodness" properties of LDA lattices. 1-5 - Ayush Jain, Rakesh Kumar Bansal:

Point-wise analysis of redundancy in SWLZ algorithm for φ-mixing sources. 1-5 - Ayush Jain, Rakesh Kumar Bansal:

Exponential rates of convergence for waiting times and generalized AEP. 1-5 - Michal Horovitz

, Eitan Yaakobi:
WOM codes with uninformed encoder. 1-5 - Alex Karrila

, Camilla Hollanti
:
A comparison of skewed and orthogonal lattices in Gaussian wiretap channels. 1-5 - Oron Sabag

, Haim H. Permuter
, Navin Kashyap:
Capacity of the (1, ∞)-RLL input-constrained erasure channel with feedback. 1-5 - Abhinav Ganesan, Sidharth Jaggi, Venkatesh Saligrama

:
Non-adaptive group testing with inhibitors. 1-5 - Inaki Estella Aguerri, Deniz Gündüz

:
Gaussian joint source-channel coding for the strong interference channel. 1-5 - Sihem Mesnager, Gérard D. Cohen:

Cyclic codes and algebraic immunity of Boolean functions. 1-5 - Jithin Ravi

, Bikash Kumar Dey:
Zero-error function computation through a bidirectional relay. 1-5 - Jithin Ravi

, Bikash Kumar Dey, Emanuele Viterbo
:
Oblivious transfer over OFDM and MIMO channels. 1-5 - Alon Kipnis

, Andrea J. Goldsmith, Yonina C. Eldar:
Sub-Nyquist sampling achieves optimal rate-distortion. 1-5 - Alexey A. Frolov

, Victor V. Zyablov
:
A new coding method for a multiple-access system with a large number of active users. 1-5 - Sarah R. Allen, Ryan O'Donnell:

Conditioning and covariance on caterpillars. 1-5 - Abhishek Agarwal, Arya Mazumdar:

Security in locally repairable storage. 1-5 - Sibi Raj B. Pillai, Vinod M. Prabhakaran:

On the noisy feedback capacity of Gaussian broadcast channels. 1-5 - Qiwen Wang, Viveck R. Cadambe

, Sidharth Jaggi
, Moshe Schwartz
, Muriel Médard:
File updates under random/arbitrary insertions and deletions. 1-5 - Andrea Grigorescu, Holger Boche, Rafael F. Schaefer, H. Vincent Poor:

Capacity region continuity of the compound broadcast channel with confidential messages. 1-5 - Tara Javidi

, Yonatan Kaspi, Himanshu Tyagi:
Gaussian estimation under attack uncertainty. 1-5 - Kaushik Senthoor, Birenjith Sasidharan

, P. Vijay Kumar:
Improved layered regenerating codes characterizing the exact-repair storage-repair bandwidth tradeoff for certain parameter sets. 1-5 - Yatao Bian

, Alexey Gronskiy, Joachim M. Buhmann:
Greedy MaxCut algorithms and their information content. 1-5 - Alexander Zeh, Eitan Yaakobi:

Optimal linear and cyclic locally repairable codes over small fields. 1-5 - Gilles Brassard, Benno Salwey, Stefan Wolf

:
Non-locality distillation as cryptographic game. 1-5 - Rami Cohen, Yuval Cassuto:

Design of LDPC codes for the q-ary partial erasure channel. 1-5 - Dusan Jakovetic, Aleksandar Minja

, Dragana Bajovic, Dejan Vukobratovic
:
Distributed storage allocations for neighborhood-based data access. 1-5 - Nicola di Pietro

, Nour Basha, Joseph Jean Boutros:
Non-binary GLD codes and their lattices. 1-5 - Pengfei Huang, Eitan Yaakobi, Hironori Uchikawa, Paul H. Siegel:

Cyclic linear binary locally repairable codes. 1-5 - Zhao Wang, Ming Xiao, Mikael Skoglund, H. Vincent Poor:

Secrecy degrees of freedom of the two-user MISO broadcast channel with mixed CSIT. 1-5 - Marcelo Firer, Jerry Anderson Pinheiro:

Bounds for complexity of syndrome decoding for poset metrics. 1-5 - Ling Liu, Yanfei Yan, Cong Ling:

Secrecy-good polar lattices with optimal shaping for the Gaussian wiretap channels. 1-5 - Han Mao Kiah, Gregory J. Puleo, Olgica Milenkovic:

Codes for DNA storage channels. 1-5 - Christos K. Kourtellaris, Charalambos D. Charalambous

:
Capacity of Binary State Symmetric Channel with and without feedback and transmission cost. 1-5 - Michèle A. Wigger, Roy Timo, Shlomo Shamai

:
Conferencing in Wyner's asymmetric interference network: Effect of number of rounds. 1-5 - Zhijie Ren, Jasper Goseling, Jos H. Weber, Michael Gastpar:

Secure transmission using an untrusted relay with scaled compute-and-forward. 1-5 - Luca Barletta, Gerhard Kramer

:
Upper bound on the capacity of discrete-time Wiener phase noise channels. 1-5 - Nir Elkayam, Meir Feder:

Achievable and converse bounds over a general channel and general decoding metric. 1-5 - Mainak Chowdhury, Alexandros Manolakos, Felipe Gómez-Cuba

, Elza Erkip
, Andrea J. Goldsmith:
Capacity scaling in noncoherent wideband massive SIMO systems. 1-5 - Ronit Bustin, Rafael F. Schaefer, H. Vincent Poor, Shlomo Shamai

:
On MMSE properties of optimal codes for the Gaussian wiretap channel. 1-5 - Jonathan Ponniah

, Liang-Liang Xie, Panganamala Ramana Kumar:
The two-way multi-relay channel. 1-5 - Sergey Tridenski, Ram Zamir:

Stochastic interpretation for the Arimoto algorithm. 1-5 - Remi A. Chou

, Matthieu R. Bloch:
Polar coding for the broadcast channel with confidential messages. 1-5 - Qiaosheng Eric Zhang

, Swanand Kadhe
, Mayank Bakshi
, Sidharth Jaggi
, Alex Sprintson:
Talking reliably, secretly, and efficiently: A "complete" characterization. 1-5 - Muxi Yan, Alex Sprintson:

Approximation algorithms for erasure correcting Data Exchange. 1-5 - Anxiao Jiang, Yue Li, Jehoshua Bruck

:
Error correction through language processing. 1-5 - Or Ordentlich, Ofer Shayevitz:

Subset-universal lossy compression. 1-5 - Jean-Claude Belfiore, Yi Hong

, Emanuele Viterbo
:
Harmonic analysis of binary functions. 1-5 - Song-Nam Hong

, Ivana Maric, Dennis Hui, Giuseppe Caire:
Multihop virtual full-duplex relay channels. 1-5 - Jhelum Chakravorty, Aditya Mahajan:

Distortion-transmission trade-off in real-time transmission of Markov sources. 1-5 - Eirik Rosnes, Michael Helmling:

On adaptive linear programming decoding of ternary linear codes. 1-5 - Shashank Vatedka

, Navin Kashyap:
Nested lattice codes for secure bidirectional relaying with asymmetric channel gains. 1-5 - Benjamin Larrousse, Samson Lasaulce, Michèle A. Wigger:

Coordinating partially-informed agents over state-dependent networks. 1-5 - Assaf Ben-Yishai, Ofer Shayevitz:

The AWGN BC with MAC feedback: A reduction to noiseless feedback via interaction. 1-5 - Or Ordentlich, Uri Erez, Bobak Nazer:

On compute-and-forward with feedback. 1-5 - Ignacio Cascudo

:
Powers of codes and applications to cryptography. 1-5 - Xishuo Liu, Stark C. Draper

:
ADMM decoding of error correction codes: From geometries to algorithms. 1-5 - Erik Agrell, Giuseppe Durisi

, Pontus Johannisson:
Information-theory-friendly models for fiber-optic channels: A primer. 1-5 - Oliver Kosut:

Boosting output distributions in finite blocklength channel coding converse bounds. 1-5 - Alexander Vardy

, Eitan Yaakobi:
Codes for RAID solutions based upon SSDs. 1-5 - Daniel Cullina

, Negar Kiyavash:
Combinatorial channels from partially ordered sets. 1-5 - Dor Shaviv

, Ayfer Özgür
, Haim H. Permuter
:
Can feedback increase the capacity of the energy harvesting channel? 1-5 - Victoria Kostina

, Yury Polyanskiy, Sergio Verdú:
Transmitting k samples over the Gaussian channel: Energy-distortion tradeoff. 1-5 - Peter Gazi, Stefano Tessaro:

Secret-key cryptography from ideal primitives: A systematic overview. 1-5 - Ying-zong Huang, Gregory W. Wornell

:
Separation architectures for lossy compression. 1-5 - Aylin Yener:

New directions in information theoretic security: Benefits of bidirectional signaling. 1-5 - Aman Bhatia, Veeresh Taranalli, Paul H. Siegel, Shafa Dahandeh, Anantha Raman Krishnan, Patrick Lee, Dahua Qin, Moni Sharma, Teik Yeo:

Polar codes for magnetic recording channels. 1-5 - Gerhard Kramer

, Mansoor I. Yousefi, Frank R. Kschischang
:
Upper bound on the capacity of a cascade of nonlinear and noisy channels. 1-4 - Gerhard Kramer

:
Capacity of deterministic, half-duplex, line networks with two sources. 1-2 - Naftali Tishby, Noga Zaslavsky

:
Deep learning and the information bottleneck principle. 1-5 - Erman Koken, Ertem Tuncel

, Deniz Gündüz
:
On the distortion-energy tradeoff for zero-delay transmission of a Gaussian source over the AWGN channel. 1-5 - Ryan Gabrys, Han Mao Kiah, Olgica Milenkovic:

Asymmetric Lee distance codes: New bounds and constructions. 1-5 - Mingyue Ji, Antonia M. Tulino

, Jaime Llorca
, Giuseppe Caire:
Caching-aided coded multicasting with multiple random requests. 1-5 - Sergio Verdú:

Non-asymptotic covering lemmas. 1-3

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














