


default search action
ITW 2018: Guangzhou, China
- IEEE Information Theory Workshop, ITW 2018, Guangzhou, China, November 25-29, 2018. IEEE 2018, ISBN 978-1-5386-3599-5

- Bing Dong, Shaoguo Wen, Zhongwei Si:

Optimization of the Factor Graph for the Multiuser Superposition Transmission. 1-5 - Xiangxiang Xu

, Shao-Lun Huang, Lizhong Zheng, Lin Zhang:
The Geometric Structure of Generalized Softmax Learning. 1-5 - Anoosheh Heidarzadeh, Fatemeh Kazemi, Alex Sprintson:

Capacity of Single-Server Single-Message Private Information Retrieval with Coded Side Information. 1-5 - Masahito Hayashi

:
Secure physical layer network coding versus secure network coding. 1-5 - Rana Ali Amjad:

Information Rates and Error Exponents for Probabilistic Amplitude Shaping. 1-5 - Grigorii Trofimiuk, Peter Trifonov:

Efficient decoding of polar codes with some 16×16 kernels. 1-5 - Minh Thanh Vu

, Tobias J. Oechtering, Mikael Skoglund:
Testing in Identification Systems. 1-5 - Qifu Tyler Sun, Hanqi Tang, Zongpeng Li, Xiaolong Yang, Keping Long:

Circular-shift Linear Network Codes with Arbitrary Odd Block Lengths. 1-5 - Runzhou Li, Qin Huang, Zulin Wang:

Encoding of Non-binary Quasi-cyclic Codes by Lin-Chung-Han Transform. 1-5 - Hang Zhang, Afshin Abdi, Faramarz Fekri

:
Sparse Recovery of Sign Vectors under Uncertain Sensing Matrices. 1-5 - Qi Chen, Chunming Tang, Zhiqiang Lin:

Locally Repairable Codes with Heterogeneous Locality Constraints. 1-5 - Minoru Kuribayashi

, Shodai Suma, Nobuo Funabiki:
Efficient Decoding Algorithm for Cyclically Permutable Code. 1-5 - Anindya Bijoy Das

, Li Tang, Aditya Ramamoorthy:
C3LES: Codes for Coded Computation that Leverage Stragglers. 1-5 - Khac-Hoang Ngo

, Sheng Yang, Maxime Guillaud
:
The Optimal DoF Region for the Two-User Non-Coherent SIMO Multiple-Access Channel. 1-5 - Hoang Dau

, Emanuele Viterbo
:
Repair Schemes with Optimal I/O Costs for Full-Length Reed-Solomon Codes with Two Parities. 1-5 - Mengke Lian, Christian Häger

, Henry D. Pfister
:
What Can Machine Learning Teach Us about Communications? 1-5 - Qiwen Wang, Hua Sun, Mikael Skoglund:

The ϵ-error Capacity of Symmetric PIR with Byzantine Adversaries. 1-5 - Shachar Shayovitz, Meir Feder:

Redundancy Capacity Theorem for On-Line Learning Under a Certain Form of Hypotheses Class. 1-5 - Xiangfeng Liu, Ying Li:

Deep MIMO Detection Based on Belief Propagation. 1-5 - Salman Habib, Jörg Kliewer:

Algebraic Optimization of Binary Spatially Coupled Measurement Matrices for Interval Passing. 1-5 - Shao-Lun Huang, Gregory W. Wornell

, Lizhong Zheng:
Gaussian Universal Features, Canonical Correlations, and Common Information. 1-5 - Behrooz Tahmasebi, Mohammad Ali Maddah-Ali, Seyed Abolfazl Motahari:

Information Theory of Mixed Population Genome-Wide Association Studies. 1-5 - Weijun Fang, Fang-Wei Fu:

Optimal Cyclic (r, ẟ) Locally Repairable Codes with Unbounded Length. 1-5 - Behzad Asadi, Lawrence Ong

, Sarah J. Johnson:
Centralized Caching with Unequal Cache Sizes. 1-5 - Yucheng Liu, Parastoo Sadeghi

, Young-Han Kim:
Three-Layer Composite Coding for Index Coding. 1-5 - Yeow Meng Chee

, Ryan Gabrys, Alexander Vardy, Van Khu Vu, Eitan Yaakobi:
Reconstruction from Deletions in Racetrack Memories. 1-5 - Oliver Kosut, Jörg Kliewer:

Authentication Capacity of Adversarial Channels. 1-5 - Victor Quintero

, Samir Medina Perlaza, Jean-Marie Gorce, H. Vincent Poor:
Approximate Nash Region of the Gaussian Interference Channel with Noisy Output Feedback. 1-5 - Yen-Chin Liao, Hsie-Chia Chang, Shu Lin:

Generalized Globally-Coupled Low-Density Parity-Check Codes. 1-5 - Emanuele Parrinello, Ayse Ünsal, Petros Elia

:
Optimal coded caching in heterogeneous networks with uncoded prefetching. 1-5 - Arezou Rezazadeh

, Josep Font-Segura
, Alfonso Martinez
, Albert Guillen i Fabregas:
Multiple-Access Channel with Independent Sources: Error Exponent Analysis. 1-5 - Alex Dytso

, Malcolm Egan, Samir Medina Perlaza, H. Vincent Poor, Shlomo Shamai Shitz
:
Optimal Inputs for Some Classes of Degraded Wiretap Channels. 1-5 - Josep Font-Segura

, Alfonso Martinez
, Albert Guillen i Fabregas:
Saddlepoint Approximation of the Cost-Constrained Random Coding Error Probability. 1-5 - Yanling Chen, A. J. Han Vinck:

Systematic [n, n - 2] codes with capability of correcting single- and adjacent transposition errors. 1-5 - Yi-Peng Wei, Sennur Ulukus:

Private Information Retrieval with Private Side Information Under Storage Constraints. 1-5 - Yuxin Liu, Badri N. Vellambi

, Young-Han Kim, Parastoo Sadeghi
:
On the Capacity Region for Secure Index Coding. 1-5 - Jing Zhong, Roy D. Yates, Emina Soljanin

:
Timely Lossless Source Coding for Randomly Arriving Symbols. 1-5 - Jiachun Liao, Oliver Kosut, Lalitha Sankar, Flávio P. Calmon:

Privacy Under Hard Distortion Constraints. 1-5 - Bin Chen, Shu-Tao Xia:

Bandwidth Efficiency of Distance-optimal Scalar Locally Repairable Codes. 1-5 - Cynthia Rush, Kuan Hsieh, Ramji Venkataramanan:

Capacity-achieving sparse regression codes via spatial coupling. 1-5 - Michael Gandelman, Yuval Cassuto:

Treeplication: An Erasure Code that is Almost as Painless as Replication. 1-5 - Zheng Li, Sheng Yang:

A Linearly Precoded Rate Splitting Approach and Its Optimality for MIMO Broadcast Channels. 1-5 - Nitish Mital, Katina Kralevska

, Cong Ling, Deniz Gündüz
:
Storage-Repair Bandwidth Trade-off for Wireless Caching with Partial Failure and Broadcast Repair. 1-5 - Qiaosheng Eric Zhang

, Mayank Bakshi, Sidharth Jaggi
:
Covert Communication over Adversarially Jammed Channels. 1-5 - Mingchao Yu, Parastoo Sadeghi

:
Approximating Throughput and Packet Decoding Delay in Linear Network Coded Wireless Broadcast. 1-5 - Ali Maatouk, Mohamad Assaad, Anthony Ephremides:

The Age of Updates in a Simple Relay Network. 1-5 - Vincent Y. F. Tan, Si-Hyeon Lee

:
Time-Division is Optimal for Covert Communication over Some Broadcast Channels. 1-5 - Amirhossein Reisizadeh, Pedro Abdalla, Ramtin Pedarsani:

Sub-linear Time Stochastic Threshold Group Testing via Sparse-Graph Codes. 1-5 - Mahesh Babu Vaddi, B. Sundar Rajan:

Low Complexity Decoding and Capacity of Index Coding Problems with Symmetric Side-Information. 1-5 - Deyao Zhang, Nan Liu:

Coded Cache Placement for Heterogeneous Cache Sizes. 1-5 - Zhen Mei, Kui Cai, Long Shi

:
Information Theoretic Bounds Based Channel Quantization Design for Emerging Memories. 1-5 - Linqi Song

, Christina Fragouli, Devavrat Shah:
Recommender Systems over Wireless: Challenges and Opportunities. 1-5 - Guohua Zhang, Yulin Hu

, Qinwei He
, Juhua Wang:
Type-II Quasi-Cyclic LDPC Codes with Girth Eight from Sidon Sequence. 1-5 - Zuxing Li, Tobias J. Oechtering:

Privacy-Utility Management of Hypothesis Tests. 1-5 - Arman Fazeli

, S. Hamed Hassani, Marco Mondelli, Alexander Vardy:
Binary Linear Codes with Optimal Scaling: Polar Codes with Large Kernels. 1-5 - Shengtian Yang

, Jun Chen:
A Geometric Property of Relative Entropy and the Universal Threshold Phenomenon for Binary-Input Channels with Noisy State Information at the Encoder. 1-5 - Sreejith Sreekumar, Deniz Gündüz

, Asaf Cohen:
Distributed Hypothesis Testing Under Privacy Constraints. 1-5 - Alankrita Bhatt, Jiun-Ting Huang, Young-Han Kim, J. Jon Ryu, Pinar Sen:

Variations on a Theme by Liu, Cuff, and Verdú: The Power of Posterior Sampling. 1-5 - Mohammad-Reza Sadeghi

, Farzane Amirzade, Daniel Panario
, Amin Sakzad
:
A Neural Network Lattice Decoding Algorithm. 1-5 - Qian Yu, Netanel Raviv, Amir Salman Avestimehr:

Coding for Private and Secure Multiparty Computing. 1-5 - Weijun Fang, Fang-Wei Fu, Bin Chen, Shu-Tao Xia:

On Optimal (r, δ)-LRCs with Length n | (q+1). 1-5 - Adrian Tovar Lopez, Varun S. Jog:

Generalization error bounds using Wasserstein distances. 1-5 - Hanzaleh Akbari Nodehi, Seyed Reza Hoseini Najarkolaei, Mohammad Ali Maddah-Ali:

Entangled Polynomial Coding in Limited-Sharing Multi-Party Computation. 1-5 - Zehui Chen, Clayton Schoeny, Lara Dolecek:

Coding Assisted Adaptive Thresholding for Sneak-Path Mitigation in Resistive Memories. 1-5 - Tao Guo, Xuan Guang, Kenneth W. Shum:

Symmetric Multilevel Imperfect Secret Sharing. 1-5 - Borzoo Rassouli, Deniz Gündüz

:
Optimal Utility-Privacy Trade-off with Total Variation Distance as a Privacy Measure. 1-5 - Yizhu Wang, Jing Zhou

, Wenyi Zhang:
Capacity Bounds for Bandlimited Gaussian Channels With Peak-to-Average-Power-Ratio Constraint. 1-5 - Mahesh Babu Vaddi, B. Sundar Rajan:

On the Broadcast Rate and Fractional Clique Cover of Single Unicast Index Coding Problems. 1-5 - Karthik Nagarjuna, Paul H. Siegel:

Universal Polar Coding for Asymmetric Channels. 1-5 - Soumya Subhra Banerjee, Himanshu Tyagi:

RT-Polar: An HARQ Scheme with Universally Competitive Rates. 1-5 - Luca Barletta, Stefano Rini:

The Degrees of Freedom of the Oversampled Non-Coherent Channel. 1-5 - An Liu, Xihan Chen, Wei Yu, Vincent K. N. Lau, Min-Jian Zhao:

Fronthaul Data Reduction in Massive MIMO Aided C-RAN via Two-timescale Hybrid Compression. 1-5 - Ardhendu Tripathy

, Aditya Ramamoorthy:
Zero-error Function Computation on a Directed Acyclic Network. 1-5 - Bryan Liu, Yixuan Xie, Lei Yang, Jinhong Yuan

:
An Iterative Soft-Decision Decoding Algorithm with Dynamic Saturation for Short Reed-Solomon Codes. 1-5 - Joseph Kampeas, Asaf Cohen, Omer Gurewitz:

On the Outage Probability of Distributed MAC with ZF Detection. 1-5 - Clayton Schoeny, Irina Alam, Mark Gottscho, Puneet Gupta

, Lara Dolecek:
Error Correction and Detection for Computing Memories Using System Side Information. 1-5 - Vinuta V. Gayatri, Pradeep Kiran Sarvepalli:

Decoding Topological Subsystem Color Codes and Generalized Subsystem Surface Codes. 1-5 - Shanxiang Lyu

, Christian Porter, Cong Ling:
Performance Limits of Lattice Reduction over Imaginary Quadratic Fields with Applications to Compute-and-Forward. 1-5 - Bin Dai, Linman Yu, Yuan Luo:

New Results on the Wire-tap Channel with Noiseless Feedback. 1-5 - Yigit Ugur, Inaki Estella Aguerri, Abdellatif Zaidi:

Vector Gaussian CEO Problem Under Logarithmic Loss. 1-5 - Tang Liu, Daniela Tuninetti

:
An Information Theoretic Converse for the "Consecutive Complete-S" PICOD Problem. 1-5 - Ori Shmuel, Asaf Cohen, Omer Gurewitz:

Asymptotically Optimal Scheduling for Compute-and-Forward. 1-5 - Tongxin Li:

Maximum Likelihood Upper Bounds on the Capacities of Discrete Information Stable Channels. 1-5 - Seyed Pooya Shariatpanahi

, Mahdi Jafari Siavoshani, Mohammad Ali Maddah-Ali:
Multi-Message Private Information Retrieval with Private Side Information. 1-5 - Maxime Tremblay

, Benjamin Bourassa, David Poulin:
Depth versus Breadth in Convolutional Polar Codes. 1-5 - Mohamed S. Nafea, Aylin Yener:

The Caching Broadcast Channel with a Wire and Cache Tapping Adversary of Type II. 1-5 - Linqi Song

, Jie Xu
:
Dynamic Edge Caching with Popularity Drifting. 1-5 - Mohsen Heidari

, Achilleas Anastasopoulos, S. Sandeep Pradhan:
On The Reliability Function of Discrete Memoryless Multiple-Access Channel with Feedback. 1-5 - Shan Lu, Wei Hou, Jun Cheng, Hiroshi Kamabe:

A New Kind of Nonbinary Uniquely Decodable Codes with Arbitrary Code Length for Multiple-Access Adder Channel. 1-5 - Longguang Li, Stefan M. Moser, Ligong Wang, Michèle A. Wigger:

On the Capacity of MIMO Optical Wireless Channels. 1-5 - Wei Kang, Nan Liu:

An Upper bound on the Error Exponent in Lossless Source Coding with a Helper. 1-5 - Jin Yeong Tan, Lawrence Ong

, Behzad Asadi:
The Secure Two-Receiver Broadcast Channel With One-Sided Receiver Side Information. 1-5 - Homa Nikbakht, Michèle A. Wigger, Shlomo Shamai Shitz

:
Mixed Delay Constraints at Maximum Sum-Multiplexing Gain. 1-5 - Hsuan-Yin Lin, Siddhartha Kumar, Eirik Rosnes, Alexandre Graell i Amat:

Asymmetry Helps: Improved Private Information Retrieval Protocols for Distributed Storage. 1-5 - Lei Yu

, Vincent Y. F. Tan:
Simulation of Random Variables under Rényi Divergence Measures of All Orders. 1-5 - Siddhartha Kumar, Hsuan-Yin Lin, Eirik Rosnes, Alexandre Graell i Amat:

Local Reconstruction Codes: A Class of MDS-PIR Capacity-Achieving Codes. 1-5 - Sarah E. Anderson, Ann Johnston, Gauri Joshi, Gretchen L. Matthews

, Carolyn Mayer, Emina Soljanin
:
Service Rate Region of Content Access from Erasure Coded Storage. 1-5 - Lukas Holzbaur, Ragnar Freij-Hollanti, Antonia Wachter-Zeh, Camilla Hollanti

:
Private Streaming with Convolutional Codes. 1-5 - Joseph J. Boutros, Uri Erez, Johannes Van Wonterghem

, Gil I. Shamir, Gilles Zémor:
Geometric shaping: low-density coding of Gaussian-like constellations. 1-5 - Cunlu Zhou

, David G. M. Mitchell, Roxana Smarandache:
Free Pseudodistance Growth Rates for Spatially Coupled LDPC Codes over the BEC. 1-5 - Alex Dytso

, H. Vincent Poor, Shlomo Shamai Shitz
:
Capacity of the Vector Gaussian Channel in the Small Amplitude Regime. 1-5 - Wenchao Lin, Suihua Cai, Baodian Wei, Xiao Ma:

Coding Theorem for Systematic LDGM Codes Under List Decoding. 1-5 - Eleftherios Lampiris, Petros Elia

:
Full Coded Caching Gains for Cache-less Users. 1-5 - Xiaokang Wang, Wai Ho Mow:

Joint Channel-Network Decoding for Asynchronous Physical-Layer Network Coding. 1-5 - Hantao Zhang, Cong Shen:

Best Arm Identification for Both Stochastic and Adversarial Multi-armed Bandits. 1-5 - Yanfang Liu, Pablo M. Olmos, David G. M. Mitchell:

On Generalized LDPC Codes for 5G Ultra Reliable Communication. 1-5 - Seunghoan Song

, Masahito Hayashi
:
Secure Quantum Network Code without Classical Communication. 1-5 - Karim A. Banawan

, Sennur Ulukus:
Private Information Retrieval from Multiple Access Channels. 1-5 - Ago-Erik Riet

, Vitaly Skachek, Eldho K. Thomas
:
Asynchronous Batch and PIR Codes from Hypergraphs. 1-5 - Qifa Yan, Sheng Yang, Michèle A. Wigger:

Storage, Computation, and Communication: A Fundamental Tradeoff in Distributed Computing. 1-5 - Amos Lapidoth, Christoph Pfister:

Testing Against Independence and a Rényi Information Measure. 1-5 - Puning Zhao, Lifeng Lai:

Nonparametric Direct Entropy Difference Estimation. 1-5 - Qifa Yan, Xiaohu Tang, Qingchun Chen:

Placement Delivery Array and Its Applications. 1-5 - Kang Wei

, Jun Li
, Lingjun Kong, Feng Shu, Yonghui Li:
Read-Voltage Optimization for Finite Code Length in MLC NAND Flash Memory. 1-5 - Masahito Hayashi

, Tadashi Wadayama, Ángeles Vázquez-Castro:
Secure Computation-and-Forward Communication with Linear Codes. 1-5 - Amitalok J. Budkuley, Bikash Kumar Dey, Sidharth Jaggi, Vinod M. Prabhakaran:

On the Rate Distortion Function of Arbitrarily Varying Remote Sources. 1-5 - Jingjing Zhang, Osvaldo Simeone:

Cloud-Edge Non-Orthogonal Transmission for Fog Networks with Delayed CSI at the Cloud. 1-5 - Prasad Krishnan:

Coded Caching via Line Graphs of Bipartite Graphs. 1-5 - Xin Huang, Li Chen:

Iterative Multistage Soft Decoding of Multilevel Reed-Solomon Codes. 1-5 - Arya Mazumdar:

Capacity of Locally Recoverable Codes. 1-5 - Fang Liu, Kenneth W. Shum, Wing Shing Wong:

A Distributed Unicast Scheme Based on Schedule Sequences in Ad Hoc Networks. 1-5 - Kaiming Shen, Reza Khosravi-Farsani, Wei Yu:

Capacity Limits of Full-Duplex Cellular Network. 1-5 - Rawad Bitar, Salim El Rouayheb:

Staircase-PIR: Universally Robust Private Information Retrieval. 1-5 - Holger Boche, Minglai Cai, Christian Deppe, Janis Nötzel:

Secret Message Transmission over Quantum Channels under Adversarial Quantum Noise: Secrecy Capacity and Super-activations. 1-5 - Tae-Hwan Lee, Hee-Heon Jung, Jin-Ho Chung:

A New One-Coincidence Frequency-Hopping Sequence Set of Length p2 - p. 1-4 - Hikmet Yildiz, Babak Hassibi:

Optimum Linear Codes with Support Constraints over Small Fields. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














