


default search action
ITW 2017: Kaohsiung, Taiwan
- 2017 IEEE Information Theory Workshop, ITW 2017, Kaohsiung, Taiwan, November 6-10, 2017. IEEE 2017, ISBN 978-1-5090-3097-2

- Yi-Peng Wei, Sennur Ulukus:

Novel decentralized coded caching through coded prefetching. 1-5 - Qian Yu, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:

Communication-optimal coding designs for caching networks. 6-10 - Sarah Kamel, Michèle A. Wigger, Mireille Sarkiss

:
Coded caching for wiretap broadcast channels. 11-15 - Joan S. Pujol Roig, Abolfazl Seyed Motahari, Filippo Tosato, Deniz Gündüz

:
Fundamental limits of latency in a cache-aided 4×4 interference channel. 16-20 - Qingyu Liu, Lei Deng

, Haibo Zeng, Minghua Chen
:
On the min-max-delay problem: NP-completeness, algorithm, and integrality gap. 21-25 - Stanislav Kruglik

, Marina Dudina, Valeriya Potapova, Alexey A. Frolov
:
On one generalization of LRC codes with availability. 26-30 - Jie Hao, Shu-Tao Xia, Bin Chen, Fang-Wei Fu:

On the weight hierarchy of locally repairable codes. 31-35 - Chi Wan Sung, Kenneth W. Shum, Quan Yu, Guangping Xu

:
Maximally recoverable codes: Connections to generic network coding and maximal matching. 36-40 - Kaveh Mahdaviani, Soheil Mohajer, Ashish Khisti:

Product matrix minimum storage regenerating codes with flexible number of helpers. 41-45 - Vitaly Abdrashitov, N. Prakash, Muriel Médard:

The storage vs repair bandwidth trade-off for multiple failures in clustered storage networks. 46-50 - Harout K. Aydinian, Holger Boche:

Fractional repetition codes based on partially ordered sets. 51-55 - Bing Zhu, Kenneth W. Shum, Hui Li

:
On the duality of fractional repetition codes. 56-60 - Jad Hachem, Nikhil Karamchandani, Sharayu Moharir, Suhas N. Diggavi:

Caching with partial matching under Zipf demands. 61-65 - Hari Hara Suthan C, Ishani Chugh, Prasad Krishnan:

An improved secretive coded caching scheme exploiting common demands. 66-70 - Qiwen Wang, Mikael Skoglund:

Linear symmetric private information retrieval for MDS coded distributed storage with colluding servers. 71-75 - Silas L. Fong, Vincent Y. F. Tan:

A tight upper bound on the second-order coding rate of parallel Gaussian channels with feedback. 76-80 - Shun Watanabe

:
A converse bound on Wyner-Ahlswede-Körner Network via Gray-Wyner network. 81-85 - Stefan M. Moser, Ligong Wang, Michèle A. Wigger:

Asymptotic high-SNR capacity of MISO optical intensity channels. 86-90 - Sara Shahi, Daniela Tuninetti

, Natasha Devroye:
On the capacity of the slotted strongly asynchronous channel with a bursty user. 91-95 - Christos K. Kourtellaris, Ioannis Tzortzis, Charalambos D. Charalambous:

Two-letter capacity formula for channels with memory and feedback. 96-100 - Meryem Benammar, Valerio Bioglio

, Frederic Gabry, Ingmar Land:
Multi-kernel polar codes: Proof of polarization and error exponents. 101-105 - Mine Alsan, Vincent Y. F. Tan:

Robust decoding schemes for polar coding over compound channels. 106-110 - Haiyang Liu, Li Ping:

Low-rate regular concatenated zigzag codes are capacity-approaching over the BEC. 111-115 - Lev Yohananov, Eitan Yaakobi:

Codes for erasures over directed graphs. 116-120 - Avinash Vem, Krishna R. Narayanan, Jun Cheng, Jean-François Chamberland

:
A user-independent serial interference cancellation based coding scheme for the unsourced random access Gaussian channel. 121-125 - Shiyuan Mo, Li Chen:

Improved sliding window decoding of spatially coupled low-density parity-check codes. 126-130 - Gou Hosoya, Hiroyuki Yashima:

Spatially-coupled LDPC codes for two dimensional erasure channel. 131-135 - Michael X. Cao, Pascal O. Vontobel

:
Double-edge factor graphs: Definition, properties, and examples. 136-140 - Marco Ferrari

, Alessandro Tomasoni, Sandro Bellini:
Analysis of practical LDPC decoders in tanner graphs with absorbing sets. 141-145 - Dongming Yuan, Lu Li, Yuanan Liu:

Lowering the error floors of low-density parity-check codes with additional check nodes. 146-150 - Sarit Buzaglo, Paul H. Siegel:

Weakly constrained codes via row-by-row coding. 151-155 - Ori Rottenstreich, Yuval Cassuto:

Optimal compression of element pairs in fixed-width memories. 156-160 - Yeow Meng Chee

, Han Mao Kiah, Alexander Vardy, Van Khu Vu, Eitan Yaakobi:
Codes correcting position errors in racetrack memories. 161-165 - Clayton Schoeny, Frederic Sala, Mark Gottscho, Irina Alam, Puneet Gupta

, Lara Dolecek:
Context-aware resiliency: Unequal message protection for random-access memories. 166-170 - Seok-Hwan Park, Osvaldo Simeone, Shlomo Shamai

:
Uplink sum-rate analysis of C-RAN with interconnected radio units. 171-175 - Qizhong Yao, Zhengchuan Chen, Howard H. Yang, Tony Q. S. Quek

:
Delay-aware massive random access: Adaptive framing and successive decoding. 176-180 - Morteza Varasteh, Borzoo Rassouli, Bruno Clerckx:

Wireless information and power transfer over an AWGN channel: Nonlinearity and asymmetric Gaussian signaling. 181-185 - Aleksey V. Reznichenko, Ivan S. Terekhov:

Channel capacity and simple correlators for nonlinear communication channel at large SNR and small dispersion. 186-190 - Shiuan-Hao Kuo, Zhen-U. Liu, Jeff Yang:

On practical LDPC code construction for NAND flash applications. 191-195 - Tingjun Xie, Ying Y. Tai, Jiangli Zhu:

Polar codes for NAND-based SSD systems: A joint source channel coding perspective. 196-200 - Wei Lin, Yu-Cheng Hsu, Tsai-Hao Kuo, Yu-Siang Yang, Szu-Wei Chen, Chun-Wei Tsao, An-Chang Liu, Lih-Yuarn Ou, Tien-Ching Wang, Shao-Wei Yen, Yu-Hsiang Lin, Kuo-Hsin Lai, Chi-Heng Yang, Li-Chun Liang, Pei-Jung Hsu:

3X endurance enhancement by advanced signal processor for 3D NAND flash memory. 201-203 - Huang-Chang Lee, Jieng-Heng Shy, Yen-Ming Chen

, Yeong-Luh Ueng
:
LDPC coded modulation for TLC flash memory. 204-208 - Haoyu Qi, Qingle Wang, Mark M. Wilde:

Applications of position-based coding to classical communication over quantum channels. 209-213 - Anurag Anshu:

An upper bound on quantum capacity of unital quantum channels. 214-218 - Priya J. Nadkarni, Shayan Srinivasa Garani:

Entanglement assisted binary quantum tensor product codes. 219-223 - Guanghui Song, Kui Cai, Jun Cheng:

Union bound analysis of multilevel flash memory channels. 224-228 - Ahmed H. Hareedy

, Homa Esfahanizadeh, Lara Dolecek:
High performance non-binary spatially-coupled codes for flash memories. 229-233 - Siyi Yang, Clayton Schoeny, Lara Dolecek:

Order-optimal permutation codes in the generalized cayley metric. 234-238 - Akira Yamawaki, Hiroshi Kamabe, Shan Lu:

Construction of parallel RIO codes using coset coding with hamming codes. 239-243 - Kenta Kasai, Akiyoshi Hashimoto:

LDPC turbo decoder using generalized belief propagation over two-dimensional inter-symbol interference channel. 244-248 - Koutaro Okada, Hiroki Koga:

A construction of the progressive (3, n)-threshold visual cryptography using a BIBD and analysis of its optimality. 249-253 - Tetsunao Matsuta, Tomohiko Uyematsu:

On the minimum worst-case cost and the minimum average cost to erase information. 254-258 - Junji Shikata:

Tighter bounds on entropy of secret keys in authentication codes. 259-263 - Deepesh Data, Vinod M. Prabhakaran:

Secure computation of randomized functions: Further results. 264-268 - Zheng Wang, Cong Ling:

On the geometric ergodicity of Gibbs algorithm for lattice Gaussian sampling. 269-273 - Sudheer Poojary

, Sanidhay Bhambay, Parimal Parag
:
Real-time status updates for correlated source. 274-278 - Yahya H. Ezzeldin, Mohammed Karmoose

, Christina Fragouli:
Communication vs distributed computation: An alternative trade-off curve. 279-283 - Tang Liu, Daniela Tuninetti

:
Information theoretic converse proofs for some PICOD problems. 284-288 - Linqi Song

, Sundara Rajan Srinivasavaradhan, Christina Fragouli:
The benefit of being flexible in distributed computation. 289-293 - Mahesh Babu Vaddi, B. Sundar Rajan:

On the capacity of index coding problems with symmetric neighboring interference. 294-298 - Keerthi Suria Kumar Arumugam

, Matthieu R. Bloch:
Covert communication over broadcast channels. 299-303 - Mehrdad Tahmasbi, Matthieu R. Bloch, Vincent Y. F. Tan:

Error exponent for covert communications over discrete memoryless channels. 304-308 - Xuan Guang, Raymond W. Yeung:

Alphabet size reduction for secure network coding. 309-313 - Wasim Huleihel, Muriel Médard:

Privacy through familiarity. 314-318 - Matthew P. Johnson, Liang Zhao, Supriyo Chakraborty:

Computing messages that reveal selected inferences while protecting others. 319-323 - Martin Damrath

, H. Birkan Yilmaz
, Chan-Byoung Chae
, Peter Adam Hoeher:
Spatial coding techniques for molecular MIMO. 324-328 - Yuting Fang

, Adam Noel, Yiran Wang, Nan Yang
:
Simplified cooperative detection for multi-receiver molecular communication. 329-333 - Adam Noel, Yuting Fang

, Nan Yang
, Dimitrios Makrakis, Andrew W. Eckford:
Effect of local population uncertainty on cooperation in bacteria. 334-338 - Afshin Abdi, Arash Einolghozati, Faramarz Fekri

:
Computing framework in biological cells via stochastic methods. 339-343 - I-Hsiang Wang, Yu-Chih Huang

, Shih-Chun Lin:
Role of feedback in modulo-sum computation over K-user erasure multiple-access channels. 344-348 - Yigit Ugur, Inaki Estella Aguerri, Abdellatif Zaidi:

A generalization of blahut-arimoto algorithm to compute rate-distortion regions of multiterminal source coding under logarithmic loss. 349-353 - Jian-Jia Weng, Fady Alajaji, Tamás Linder:

Lossy transmission of correlated sources over two-way channels. 354-358 - Shan Lu, Hiroshi Kamabe, Jun Cheng:

Codes for T-user asymmetric multiple-access channel with independent sources. 359-363 - Stefano Rini, Shlomo Shamai

:
The approximate capacity for the 3-receiver writing on random dirty paper channel. 364-368 - Sadaf Salehkalaibar, Michèle A. Wigger, Ligong Wang:

Hypothesis testing over cascade channels. 369-373 - Anusha Lalitha, Tara Javidi

:
Learning via active hypothesis testing over networks. 374-378 - Hang Zhang, Afshin Abdi, Faramarz Fekri

:
Recovery of sign vectors in quadratic compressed sensing. 379-383 - Chun Lam Chan, Nicolas Macris:

Stability threshold and phase transition of generalized censored block models. 384-388 - Hang Zhang, Afshin Abdi, Faramarz Fekri

:
Compressive sensing with energy constraint. 389-393 - Yanling Chen, Onur Ozan Koyluoglu, A. J. Han Vinck:

Joint secrecy over the K-transmitter multiple access channel. 394-398 - Selma Belhadj Amor, Vincent Y. F. Tan:

On the Gaussian MAC with degraded message sets and long-term power constraints. 399-403 - Qianqian Yang, Pablo Piantanida, Deniz Gündüz

:
The multi-layer information bottleneck problem. 404-408 - Vincent Y. F. Tan, Cheng-Hsiung Liu, I-Hsiang Wang:

Delay scaling laws of random wireless networks: Impact of blocklength. 409-413 - Ayse Ünsal, Jean-Marie Gorce

:
The dispersion of superposition coding for Gaussian broadcast channels. 414-418 - Ling-Hua Chang, Carol Wang, Po-Ning Chen

, Yunghsiang S. Han, Vincent Y. F. Tan:
Distance spectrum formula for the largest minimum hamming distance of finite-length binary block codes. 419-423 - Ilya Soloveychik, Yu Xiang, Vahid Tarokh:

Explicit symmetric pseudo-random matrices. 424-428 - Jun'ichi Takeuchi, Hiroshi Nagaoka:

Information geometry of the family of Markov kernels defined by a context tree. 429-433 - Shao-Lun Huang, Lin Zhang, Lizhong Zheng:

An information-theoretic approach to unsupervised feature selection for high-dimensional data. 434-438 - Pei-Duo Yu, Chee-Wei Tan

, Hung-Lin Fu:
Rumor source detection in unicyclic graphs. 439-443 - Kai Wan, Mingyue Ji, Pablo Piantanida, Daniela Tuninetti

:
Novel outer bounds for combination networks with end-user-caches. 444-448 - Mahed Abroshan, Ramji Venkataramanan, Albert Guillen i Fabregas:

Multilayer codes for synchronization from deletions. 449-453 - Pengfei Huang, Yi Liu, Xiaojie Zhang, Paul H. Siegel, Erich F. Haratsch:

Syndrome-coupled rate-compatible error-correcting codes. 454-458 - Sneh Gupta, V. Lalitha:

Locality-aware hybrid coded MapReduce for server-rack architecture. 459-463 - Albin Severinson, Alexandre Graell i Amat

, Eirik Rosnes:
Block-diagonal coding for distributed computing with straggling servers. 464-468 - Masahito Hayashi

:
Asymptotic analysis for hidden Markovian process with quantum hidden system. 469-473 - Anurag Anshu, Rahul Jain

, Naqueeb Ahmad Warsi:
Achievability bounds on quantum state redistribution using convex split and position based decoding. 474-478 - Hao-Chung Cheng

, Min-Hsiu Hsieh
, Marco Tomamichel
:
Sphere-packing bound for classical-quantum channels. 479-483 - Felix Leditzky, Debbie W. Leung, Graeme Smith:

Quantum and private capacities of low-noise channels. 484-488 - Francesco Buscemi:

Comparison of noisy channels and reverse data-processing theorems. 489-493 - Chao He, Sheng Yang:

On the two-user erasure broadcast channel with one-sided feedback. 494-498 - Zheng Li, Chao He, Sheng Yang:

On the capacity of the two-user erasure broadcast channel with mixed CSIT. 499-503 - Alessandro Nordio, Carla-Fabiana Chiasserini

, Emanuele Viterbo
:
Optimal transmission strategy in full-duplex relay networks. 504-508 - Ori Shmuel, Asaf Cohen, Omer Gurewitz:

The necessity of scheduling in compute-and-forward. 509-513 - Mohammed Karmoose

, Linqi Song
, Martina Cardone, Christina Fragouli:
Preserving privacy while broadcasting: K-limited-access schemes. 514-518 - Hirosuke Yamamoto

, Ken-ichi Iwata
:
An iterative algorithm to construct optimal binary AIFV-m codes. 519-523 - Huihui Wu, Sorina Dumitrescu:

Design of optimal entropy-constrained scalar quantizer for sequential coding of correlated sources. 524-528 - Anatoly Khina

, Victoria Kostina
, Ashish Khisti, Babak Hassibi:
Sequential coding of Gauss-Markov sources with packet erasures and feedback. 529-530 - Photios A. Stavrou, Jan Østergaard

, Charalambos D. Charalambous, Milan S. Derpich:
An upper bound to zero-delay rate distortion via Kalman filtering for vector Gaussian sources. 534-538 - Ruiyang Song, Stefano Rini, Alon Kipnis

, Andrea J. Goldsmith:
Compress-and-estimate source coding for a vector Gaussian source. 539-543 - Sharu Theresa Jose, Ankur A. Kulkarni:

Linear programming based finite blocklength converses for some network-like problems. 544-548 - Luca Barletta, Flaminio Borgonovo:

The stability of exponential backoff protocols for Slotted-Aloha with saturated queues. 549-553 - Carol Wang, Mehul Motani:

Coding for the binary energy harvesting channel with finite battery. 554-558 - Shakeel Salamat Ullah, Gianluigi Liva, Soung Chang Liew:

Physical-layer network coding: A random coding error exponent perspective. 559-563 - Renming Qi, Chen Feng

, Yu-Chih Huang
:
A simpler proof for the existence of capacity-achieving nested lattice codes. 564-568 - Elad Domanovitz, Uri Erez:

Explicit lower bounds on the outage probability of integer forcing over Nr × 2 channels. 569-573 - Elad Domanovitz, Uri Erez:

Outage probability bounds for integer-forcing source coding. 574-578 - Congduan Li, Fangwei Ye, Xuan Guang, Zhiheng Zhou, Chee-Wei Tan

, Raymond W. Yeung:
On independent distributed source coding problems with exact repair. 579-583 - Shai Ginzach, Neri Merhav, Igal Sason:

Random-coding error exponent of variable-length codes with a single-bit noiseless feedback. 584-588 - Ryo Nomura

, Hideki Yagi:
Overflow probability of variable-length codes allowing non-vanishing error probability. 589-593 - Shuiyin Liu, Yi Hong

, Emanuele Viterbo
:
XY precoder for MIMO systems. 594-598 - Stefano Rini, Luca Barletta, Yonina C. Eldar, Elza Erkip:

A general framework for MIMO receivers with low-resolution quantization. 599-603 - Khac-Hoang Ngo

, Sheng Yang, Maxime Guillaud
:
An achievable DoF region for the two-user non-coherent MIMO broadcast channel with statistical CSI. 604-608 - Yao-Shan Hsiao, I-Hsiang Wang:

On the benefit of delayed CSIT in fading MIMO broadcast channel with CSIR locality. 609-613 - Luca Barletta, Stefano Rini:

Capacity outer bound and degrees of freedom of Wiener phase noise channels with oversampling. 614-618

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














