


default search action
IEEE Transactions on Information Theory, Volume 65
Volume 65, Number 1, January 2019
- Mansoor I. Yousefi, Frank R. Kschischang:

2018 IEEE Information Theory Society Paper Award. 1 - Arash Gholami Davoodi, Syed Ali Jafar:

2018 IEEE Communications Society and Information Theory Society Joint Paper Award. 2 - Serge Kas Hanna

, Salim El Rouayheb:
Guess & Check Codes for Deletions, Insertions, and Synchronization. 3-15 - Zhengchun Zhou

, Xia Li, Chunming Tang
, Cunsheng Ding
:
Binary LCD Codes and Self-Orthogonal Codes From a Generic Construction. 16-27 - Sven C. Polak

:
Semidefinite Programming Bounds for Constant-Weight Codes. 28-38 - Claude Carlet

, Sihem Mesnager
, Chunming Tang
, Yanfeng Qi
:
New Characterization and Parametrization of LCD Codes. 39-49 - Netanel Raviv

, Moshe Schwartz
, Eitan Yaakobi
:
Rank-Modulation Codes for DNA Storage With Shotgun Sequencing. 50-64 - Hanqi Tang

, Qifu Tyler Sun
, Zongpeng Li
, Xiaolong Yang
, Keping Long:
Circular-Shift Linear Network Coding. 65-80 - Jy-yong Sohn

, Beongjun Choi
, Sung Whan Yoon
, Jaekyun Moon
:
Capacity of Clustered Distributed Storage. 81-107 - Xudong Li, Liming Ma

, Chaoping Xing
:
Optimal Locally Repairable Codes Via Elliptic Curves. 108-117 - Wael Halbawi

, Zihan Liu, Iwan M. Duursma, Hoang Dau
, Babak Hassibi:
Sparse and Balanced Reed-Solomon and Tamo-Barg Codes. 118-130 - Roland D. Barrolleta, Mercè Villanueva

:
Partial Permutation Decoding for Several Families of Linear and ℤ4-Linear Codes. 131-141 - Yu-Chih Huang

, Yi Hong
, Emanuele Viterbo
, Lakshmi Natarajan
:
Layered Space-Time Index Coding. 142-158 - Filip Paluncic

, Bodhaswar T. Maharaj
:
Capacity-Approaching Non-Binary Balanced Codes Using Auxiliary Data. 159-173 - Louay Bazzi

:
On the Covering Radius of Small Codes Versus Dual Distance. 174-183 - Prahladh Harsha

, Srikanth Srinivasan
:
Robust Multiplication-Based Tests for Reed-Muller Codes. 184-197 - Alberto Ravagnani

, Frank R. Kschischang
:
Adversarial Network Coding. 198-219 - Joseph Connelly

, Kenneth Zeger
:
Capacity and Achievable Rate Regions for Linear Network Coding Over Ring Alphabets. 220-234 - Gireeja Ranade

, Anant Sahai:
Control Capacity. 235-254 - Xiugang Wu

, Leighton Pate Barnes
, Ayfer Özgür
:
"The Capacity of the Relay Channel": Solution to Cover's Problem in the Gaussian Case. 255-275 - Lin Song, Fady Alajaji

, Tamás Linder
:
Capacity of Burst Noise-Erasure Channels With and Without Feedback and Input Cost. 276-291 - Jingge Zhu

, Sung Hoon Lim
, Michael Gastpar
:
Communication Versus Computation: Duality for Multiple-Access Channels and Source Coding. 292-301 - Masahito Hayashi

:
Universal Channel Coding for General Output Alphabet. 302-321 - Hua Sun

, Syed Ali Jafar
:
The Capacity of Symmetric Private Information Retrieval. 322-329 - Ilai Bistritz

, Amir Leshem
:
Game Theoretic Dynamic Channel Allocation for Frequency-Selective Interference Channels. 330-353 - Song-Nam Hong

, Dennis Hui, Ivana Maric
, Giuseppe Caire
:
On the Achievable Rates of Virtual Full-Duplex Relay Channel. 354-367 - Tianyu Yang, Nan Liu

, Wei Kang
, Shlomo Shamai Shitz
:
Converse Results for the Downlink Multicell Processing With Finite Backhaul Capacity. 368-379 - Austin Collins

, Yury Polyanskiy
:
Coherent Multiple-Antenna Block-Fading Channels at Finite Blocklength. 380-405 - Arash Gholami Davoodi

, Syed Ali Jafar
:
Aligned Image Sets and the Generalized Degrees of Freedom of Symmetric MIMO Interference Channel With Partial CSIT. 406-417 - Dawei Ding

, Dmitri S. Pavlichin, Mark M. Wilde
:
Quantum Channel Capacities per Unit Cost. 418-435 - Maki Yoshida

, Toru Fujiwara
, Marc P. C. Fossorier:
Optimal Uniform Secret Sharing. 436-443 - Karim A. Banawan

, Sennur Ulukus
:
Secure Degrees of Freedom Region of Static and Time-Varying Gaussian MIMO Interference Channel. 444-461 - Hai Cheng

, Xiaojun Yuan
, Yihua Tan:
Generalized Compute-Compress-and-Forward. 462-481 - Alon Kipnis

, Andrea J. Goldsmith, Yonina C. Eldar
:
The Distortion-Rate Function of Sampled Wiener Processes. 482-499 - Jun Muramatsu

, Shigeki Miyake:
Channel Code Using Constrained-Random-Number Generator Revisited. 500-510 - Cheng-Der Fuh, Alexander G. Tartakovsky

:
Asymptotic Bayesian Theory of Quickest Change Detection for Hidden Markov Models. 511-529 - Jaksa Cvitanic

, Drazen Prelec, Sonja Radas
, Hrvoje Sikic
:
Game of Duels: Information-Theoretic Axiomatization of Scoring Rules. 530-537 - Alessio Sancetta

:
Consistency Results for Stationary Autoregressive Processes With Constrained Coefficients. 538-550 - Yingjie Fei

, Yudong Chen:
Exponential Error Rates of SDP for Block Models: Beyond Grothendieck's Inequality. 551-571 - Ahmed El Alaoui

, Aaditya Ramdas, Florent Krzakala
, Lenka Zdeborová, Michael I. Jordan
:
Decoding From Pooled Data: Phase Transitions of Message Passing. 572-585 - Holger Boche, Volker Pohl

:
Calculating the Hilbert Transform on Spaces With Energy Concentration: Convergence and Divergence Regions. 586-603 - Rafah El-Khatib, Nicolas Macris

, Tom Richardson, Rüdiger L. Urbanke:
Displacement Convexity in Spatially Coupled Scalar Recursions. 604-621 - Vincenzo Matta

, Ali H. Sayed
:
Consistent Tomography Under Partial Observations Over Adaptive Networks. 622-646 - Qian Yu

, Mohammad Ali Maddah-Ali
, Amir Salman Avestimehr:
Characterizing the Rate-Memory Tradeoff in Cache Networks Within a Factor of 2. 647-663 - Gal Shulkind

, Stefanie Jegelka, Gregory W. Wornell
:
Sensor Array Design Through Submodular Optimization. 664-675 - Jong Yoon Hyun

, Yoonjin Lee
:
Characterization of p-ary Bent Functions in Terms of Strongly Regular Graphs. 676-684
Volume 65, Number 2, February 2019
- Yining Wang

, Yu-Xiang Wang
, Aarti Singh:
A Theoretical Analysis of Noisy Sparse Subspace Clustering on Dimensionality-Reduced Data. 685-706 - Oliver Johnson

, Matthew Aldridge
, Jonathan Scarlett
:
Performance of Group Testing Algorithms With Near-Constant Tests Per Item. 707-723 - Nazanin Takbiri

, Amir Houmansadr
, Dennis L. Goeckel
, Hossein Pishro-Nik
:
Matching Anonymized and Obfuscated Time Series to Users' Profiles. 724-741 - Mahdi Soltanolkotabi

, Adel Javanmard, Jason D. Lee
:
Theoretical Insights Into the Optimization Landscape of Over-Parameterized Shallow Neural Networks. 742-769 - Gabriel H. Tucci, Ke Wang

:
New Methods for Handling Singular Sample Covariance Matrices. 770-786 - Matías Vera, Leonardo Rey Vega

, Pablo Piantanida
:
Collaborative Information Bottleneck. 787-815 - Baris Nakiboglu

:
The Sphere Packing Bound via Augustin's Method. 816-840 - Baris Nakiboglu

:
The Rényi Capacity and Center. 841-860 - Uzi Pereg

, Yossef Steinberg
:
The Arbitrarily Varying Channel Under Constraints With Side Information at the Encoder. 861-887 - M. H. R. Khouzani, Pasquale Malacaria:

Generalized Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage Under Symmetric Constraints. 888-901 - Jithin Ravi

, Bikash Kumar Dey
:
Function Computation Through a Bidirectional Relay. 902-916 - Assaf Kartowsky

, Ido Tal
:
Greedy-Merge Degrading has Optimal Power-Law. 917-934 - Christopher G. Blake

, Frank R. Kschischang
:
Energy, Latency, and Reliability Tradeoffs in Coding Circuits. 935-946 - Hilal Asi

, Eitan Yaakobi
:
Nearly Optimal Constructions of PIR and Batch Codes. 947-964 - Ryan Gabrys

, Frederic Sala:
Codes Correcting Two Deletions. 965-974 - Kun Huang

, Udaya Parampalli
, Ming Xian:
Improved Upper Bounds on Systematic-Length for Linear Minimum Storage Regenerating Codes. 975-984 - Yi-Sheng Su

:
Optimal Pliable Fractional Repetition Codes That are Locally Recoverable: A Bipartite Graph Approach. 985-999 - Carlos Galindo

, Olav Geil
, Fernando Hernando
, Diego Ruano
:
New Binary and Ternary LCD Codes. 1008-1016 - Yoones Hashemi, Amir H. Banihashemi

:
Characterization and Efficient Search of Non-Elementary Trapping Sets of LDPC Codes With Applications to Stopping Sets. 1017-1033 - Ignacio Cascudo

:
On Squares of Cyclic Codes. 1034-1047 - Yuan Luo

, Chaoping Xing
, Chen Yuan
:
Optimal Locally Repairable Codes of Distance 3 and 4 via Cyclic Codes. 1048-1053 - Rocco Trombetti

, Yue Zhou
:
A New Family of MRD Codes in $\mathbb{F_q}^{2n\times2n}$ With Right and Middle Nuclei $\mathbb F_{q^n}$. 1054-1062 - Diego Napp

, Raquel Pinto
, Marisa Toste
:
Column Distances of Convolutional Codes Over ${\mathbb Z}_{p^r}$. 1063-1071 - Anuradha Sharma

, Tania Sidana
:
On the Structure and Distances of Repeated-Root Constacyclic Codes of Prime Power Lengths Over Finite Commutative Chain Rings. 1072-1084 - Hessam Mahdavifar

, Alexander Vardy
:
Algebraic List-Decoding in Projective Space: Decoding With Multiplicities and Rank-Metric Codes. 1085-1100 - Nikolay I. Yankov

, Radka Russeva, Emine Karatash:
Classification of Binary Self-Dual [76, 38, 14] Codes With an Automorphism of Order 9. 1101-1105 - Claudio M. Qureshi

:
Matched Metrics to the Binary Asymmetric Channels. 1106-1112 - Anshul Jaiswal

, Manav R. Bhatnagar
:
Free-Space Optical Communication: A Diversity-Multiplexing Tradeoff Perspective. 1113-1125 - Arash Gholami Davoodi

, Syed Ali Jafar
:
$K$ -User Symmetric $M\times N$ MIMO Interference Channel Under Finite Precision CSIT: A GDoF Perspective. 1126-1136 - Seyed Arvin Ayoughi

, Wei Yu
:
Interference Mitigation via Relaying. 1137-1152 - Or Ordentlich

, Uri Erez
:
Performance Analysis and Optimal Filter Design for Sigma-Delta Modulation via Duality With DPCM. 1153-1164 - Mark Braverman, Brendan Juba

:
The Price of Uncertain Priors in Source Coding. 1165-1171 - Chen Gong, Xiaodong Wang

:
On Finite Block-Length Quantization Distortion. 1172-1188 - Julien Lavauzelle

:
Private Information Retrieval From Transversal Designs. 1189-1205 - Karim A. Banawan

, Sennur Ulukus
:
The Capacity of Private Information Retrieval from Byzantine and Colluding Databases. 1206-1219 - Alireza Vahid

, A. Robert Calderbank:
Throughput Region of Spatially Correlated Interference Packet Networks. 1220-1235 - Ahmad AlAmmouri

, Jeffrey G. Andrews
, François Baccelli
:
A Unified Asymptotic Analysis of Area Spectral Efficiency in Ultradense Cellular Networks. 1236-1248 - Jia-Min Zhang

, Tian Tian
, Wen-Feng Qi
, Qun-Xiong Zheng
:
A New Method for Finding Affine Sub-Families of NFSR Sequences. 1249-1257 - Fabien Arlery

, UyHour Tan
, Olivier Rabaste:
Generalization and Improvement of the Levenshtein Lower Bound for Aperiodic Correlation. 1258-1266 - Michal Horovitz

, Eitan Yaakobi
:
Reconstruction of Sequences Over Non-Identical Channels. 1267-1286 - Pierre-Alain Fouque

, Mehdi Tibouchi
:
Close to Uniform Prime Number Generation With Fewer Random Bits. 1307-1317 - Chunlei Xie

, WeiGuo Zhang
, Enes Pasalic
:
Correction to "Large Sets of Orthogonal Sequences Suitable for Applications in CDMA Systems". 1318 - Iwan M. Duursma

:
Shortened Regenerating Codes. 1000-1007 - Anurag Anshu

, Rahul Jain
, Naqueeb Ahmad Warsi
:
Building Blocks for Communication Over Noisy Quantum Networks. 1287-1306
Volume 65, Number 3, March 2019
- Lei Yu

, Vincent Y. F. Tan
:
Asymptotic Coupling and Its Applications in Information Theory. 1321-1344 - Shengtian Yang

, Rui Xu, Jun Chen
, Jian-Kang Zhang:
Intrinsic Capacity. 1345-1360 - Venkat Anantharam

, Amin Aminzadeh Gohari
, Chandra Nair
:
On the Evaluation of Marton's Inner Bound for Two-Receiver Broadcast Channels. 1361-1371 - Chandra Nair

, David Ng
:
Invariance of the Han-Kobayashi Region With Respect to Temporally-Correlated Gaussian Inputs. 1372-1374 - Mokshay Madiman

, Farhad Ghassemi:
Combinatorial Entropy Power Inequalities: A Preliminary Study of the Stam Region. 1375-1386 - Arnaud Marsiglietti

, James Melbourne
:
On the Entropy Power Inequality for the Rényi Entropy of Order [0, 1]. 1387-1396 - Shaofeng Zou

, Georgios Fellouris
, Venugopal V. Veeravalli
:
Quickest Change Detection Under Transient Dynamics: Theory and Asymptotic Analysis. 1397-1412 - Alexander G. Tartakovsky

:
Asymptotic Optimality of Mixture Rules for Detecting Changes in General Stochastic Models. 1413-1429 - Dong Yin

, Ramtin Pedarsani
, Yudong Chen
, Kannan Ramchandran:
Learning Mixtures of Sparse Linear Regressions Using Sparse Graph Codes. 1430-1451 - Andreas Elsener

, Sara A. van de Geer
:
Sharp Oracle Inequalities for Stationary Points of Nonconvex Penalized M-Estimators. 1452-1472 - Hao Henry Zhou

, Garvesh Raskutti:
Non-Parametric Sparse Additive Auto-Regressive Network Models. 1473-1492 - Raymond W. Yeung

, Ali Al-Bashabsheh
, Chao Chen, Qi Chen
, Pierre Moulin:
On Information-Theoretic Characterizations of Markov Random Fields and Subfields. 1493-1511 - Shahab Asoodeh

, Mario Díaz
, Fady Alajaji
, Tamás Linder
:
Estimation Efficiency Under Privacy Constraints. 1512-1534 - Michael Kohler, Adam Krzyzak

:
Estimation of a Density From an Imperfect Simulation Model. 1535-1546 - Praneeth Narayanamurthy

, Namrata Vaswani
:
Provable Dynamic Robust PCA or Robust Subspace Tracking. 1547-1577 - Ahmed Elzanaty

, Andrea Giorgetti
, Marco Chiani
:
Limits on Sparse Data Acquisition: RIC Analysis of Finite Gaussian Matrices. 1578-1588 - Xin Jiang Hunt

, Patricia Reynaud-Bouret
, Vincent Rivoirard
, Laure Sansonnet
, Rebecca Willett
:
A Data-Dependent Weighted LASSO Under Poisson Noise. 1589-1613 - Simon R. Blackburn

, Jessica Claridge
:
Finite-Field Matrix Channels for Network Coding. 1614-1625 - Urs Niesen

, Shrinivas Kudekar
:
Joint Crosstalk-Avoidance and Error-Correction Coding for Parallel Data Buses. 1626-1638 - Min Ye

, Alexander Barg
:
Cooperative Repair: Constructions of Optimal MDS Codes for All Admissible Parameters. 1639-1656 - Noga Alon, Boris Bukh

, Yury Polyanskiy
:
List-Decodable Zero-Rate Codes. 1657-1667 - Chengju Li

, Peng Zeng
:
Constructions of Linear Codes With One-Dimensional Hull. 1668-1676 - Irina E. Bocharova

, Boris D. Kudryashov
, Vitaly Skachek
, Yauhen Yakimenka
:
BP-LED Decoding Algorithm for LDPC Codes Over AWGN Channels. 1677-1693 - Claude Carlet

, Sihem Mesnager
, Chunming Tang
, Yanfeng Qi
:
On $\sigma$ -LCD Codes. 1694-1704 - Michal Horovitz

, Tuvi Etzion
:
Local Rank Modulation for Flash Memories. 1705-1713 - Mohammad Ali Maddah-Ali

, Urs Niesen
:
Cache-Aided Interference Channels. 1714-1724 - Min Li

, Lawrence Ong
, Sarah J. Johnson
:
Cooperative Multi-Sender Index Coding. 1725-1739 - Yansheng Wu

, Qin Yue:
Factorizations of Binomial Polynomials and Enumerations of LCD and Self-Dual Constacyclic Codes. 1740-1751 - José Joaquín Bernal

, Marinês Guerreiro, Juan Jacobo Simón
:
From ds-Bounds for Cyclic Codes to True Minimum Distance for Abelian Codes. 1752-1763 - Dania Elzouki, Sorina Dumitrescu

, Jun Chen
:
Lattice-Based Robust Distributed Source Coding. 1764-1781 - Sangsin Na

, David L. Neuhoff
:
Monotonicity of Step Sizes of MSE-Optimal Symmetric Uniform Scalar Quantizers. 1782-1792 - Alvaro Martín

, Gadiel Seroussi
, Luciana Vitale:
Asymptotically Tight Bounds on the Depth of Estimated Context Trees. 1793-1806 - Roy D. Yates

, Sanjit K. Kaul
:
The Age of Information: Real-Time Status Updating by Multiple Sources. 1807-1827 - Xing Liu

, Liang Zhou
, Shengqiang Li
:
A New Method to Construct Strictly Optimal Frequency Hopping Sequences With New Parameters. 1828-1844 - Qian Guo

, Thomas Johansson
, Paul Stankovski Wagner
:
A Key Recovery Reaction Attack on QC-MDPC. 1845-1861 - Lei Yu

, Vincent Y. F. Tan
:
Rényi Resolvability and Its Applications to the Wiretap Channel. 1862-1897 - Yimin Pang, Mahesh K. Varanasi

:
A Unified Theory of Multiple-Access and Interference Channels via Approximate Capacity Regions for the MAC-IC-MAC. 1898-1920 - Jinming Wen

, Xiao-Wen Chang:
On the KZ Reduction. 1921-1935 - Ezio Biglieri

, Emanuele Viterbo
:
Line Codes Generated by Finite Coxeter Groups. 1936-1947 - Ather Gattami

:
Feedback Capacity of Gaussian Channels Revisited. 1948-1960 - Antonio Campello

, Daniel Dadush, Cong Ling:
AWGN-Goodness Is Enough: Capacity-Achieving Lattice Codes Based on Dithered Probabilistic Shaping. 1961-1971
Volume 65, Number 4, April 2019
- Mengfan Zheng

, Cong Ling, Wen Chen, Meixia Tao
:
Polar Coding Strategies for the Interference Channel With Partial-Joint Decoding. 1973-1993 - Eren Sasoglu, Ido Tal

:
Polar Coding for Processes With Memory. 1994-2003 - Boaz Shuval

, Ido Tal
:
Fast Polarization for Processes With Memory. 2004-2020 - Boaz Shuval

, Ido Tal
:
A Lower Bound on the Probability of Error of Polar Codes over BMS Channels. 2021-2045 - Ron M. Roth

:
Fault-Tolerant Dot-Product Engines. 2046-2057 - Matthew Aldridge

:
Individual Testing Is Optimal for Nonadaptive Group Testing in the Linear Regime. 2058-2061 - Ali Dehghan

, Amir H. Banihashemi
:
From Cages to Trapping Sets and Codewords: A Technique to Derive Tight Upper Bounds on the Minimum Size of Trapping Sets and Minimum Distance of LDPC Codes. 2062-2074 - Heide Gluesing-Luerssen

, Anna-Lena Horlemann-Trautmann
:
Symbol Erasure Correction in Random Networks With Spread Codes. 2075-2091 - Emmanuel Boutillon

:
Optimization of Non Binary Parity Check Coefficients. 2092-2100 - Herivelto Martins Borges Filho

, Alonso Sepúlveda Castellanos
, Guilherme Chaud Tizziotti
:
Subcovers and Codes on a Class of Trace-Defining Curves. 2101-2106 - Ragnar Freij-Hollanti

, Oliver W. Gnilke
, Camilla Hollanti
, Anna-Lena Horlemann-Trautmann
, David A. Karpuk
, Ivo Kubjas
:
$t$ -Private Information Retrieval Schemes Using Transitive Codes. 2107-2118 - Joaquim Borges

, Steven T. Dougherty, Cristina Fernández-Córdoba
, Roger Ten-Valls
:
${\mathbb{Z}_{2}\mathbb{Z}_{4}}$ -Additive Cyclic Codes: Kernel and Rank. 2119-2127 - Ahmed H. Hareedy

, Chinmayi Lanka, Nian Guo
, Lara Dolecek
:
A Combinatorial Methodology for Optimizing Non-Binary Graph-Based Codes: Theoretical Analysis and Applications in Data Storage. 2128-2154 - Eitan Yaakobi

, Jehoshua Bruck
:
On the Uncertainty of Information Retrieval in Associative Memories. 2155-2165 - Lingfei Jin

, Haibin Kan
:
Self-Dual Near MDS Codes from Elliptic Curves. 2166-2170 - Venkatesan Guruswami

, Ray Li
:
Polynomial Time Decodable Codes for the Binary Deletion Channel. 2171-2178 - Anelia Somekh-Baruch

:
Ratio List Decoding. 2179-2189 - Mehrdad Tahmasbi

, Matthieu R. Bloch
:
First- and Second-Order Asymptotics in Covert Communication. 2190-2212 - Germán Bassi

, Pablo Piantanida
, Shlomo Shamai Shitz
:
The Wiretap Channel With Generalized Feedback: Secure Communication and Key Generation. 2213-2233 - Lin Zhou

, Vincent Y. F. Tan
, Mehul Motani
:
The Dispersion of Mismatched Joint Source-Channel Coding for Arbitrary Sources and Additive Channels. 2234-2251 - Galen Reeves

, Henry D. Pfister
:
The Replica-Symmetric Prediction for Random Linear Estimation With Gaussian Matrices Is Exact. 2252-2283 - Boshuang Huang

, Kobi Cohen
, Qing Zhao
:
Active Anomaly Detection in Heterogeneous Processes. 2284-2301 - Zai Yang

, Jinhui Tang
, Yonina C. Eldar
, Lihua Xie
:
On the Sample Complexity of Multichannel Frequency Estimation via Convex Optimization. 2302-2315 - Majid Asadi, Nader Ebrahimi

, Omid Kharazmi
, Ehsan S. Soofi
:
Mixture Models, Bayes Fisher Information, and Divergence Measures. 2316-2321 - Aamir Anis

, Aly El Gamal
, Amir Salman Avestimehr, Antonio Ortega
:
A Sampling Theory Perspective of Graph-Based Semi-Supervised Learning. 2322-2342 - Chao Ma

, Xin Liu, Zaiwen Wen
:
Globally Convergent Levenberg-Marquardt Method for Phase Retrieval. 2343-2359 - Pengfei Yang, Biao Chen

:
Robust Kullback-Leibler Divergence and Universal Hypothesis Testing for Continuous Distributions. 2360-2373 - Mahdi Soltanolkotabi

:
Structured Signal Recovery From Quadratic Measurements: Breaking Sample Complexity Barriers via Nonconvex Optimization. 2374-2400 - Eric C. Hall

, Garvesh Raskutti, Rebecca M. Willett
:
Learning High-Dimensional Generalized Linear Autoregressive Models. 2401-2422 - Sharu Theresa Jose

, Ankur A. Kulkarni
:
Improved Finite Blocklength Converses for Slepian-Wolf Coding via Linear Programming. 2423-2441 - Nematollah Iri

, Oliver Kosut
:
Fine Asymptotics for Universal One-to-One Compression of Parametric Sources. 2442-2458 - Aaron B. Wagner

, Amine Laourine, Nadine Hussami:
Degradedness and Secrecy in Memoryless Queues. 2459-2476 - Neri Merhav

:
Ensemble Performance of Biometric Authentication Systems Based on Secret Key Generation. 2477-2491 - Tao Liu

, Guangyue Han
:
Feedback Capacity of Stationary Gaussian Channels Further Examined. 2492-2506 - Thomas R. Dean

, Mary Wootters
, Andrea J. Goldsmith
:
Blind Joint MIMO Channel Estimation and Decoding. 2507-2524 - Ziv Goldfeld

, Haim H. Permuter
:
MIMO Gaussian Broadcast Channels With Common, Private, and Confidential Messages. 2525-2544 - Kasper Duivenvoorden

, Nikolas P. Breuckmann
, Barbara M. Terhal
:
Renormalization Group Decoder for a Four-Dimensional Toric Code. 2545-2562 - Kyungjoo Noh

, Victor V. Albert
, Liang Jiang
:
Quantum Capacity Bounds of Gaussian Thermal Loss Channels and Achievable Rates With Gottesman-Kitaev-Preskill Codes. 2563-2582 - Xin Wang

, Kun Fang
, Runyao Duan:
Semidefinite Programming Converse Bounds for Quantum Communication. 2583-2592 - Carlos Galindo

, Fernando Hernando
, Diego Ruano
:
Classical and Quantum Evaluation Codes at the Trace Roots. 2593-2602 - Sina Salek

, Daniela Cadamuro
, Philipp Kammerlander
, Karoline Wiesner:
Quantum Rate-Distortion Coding of Relevant Information. 2603-2613 - Michele Dall'Arno

, Francesco Buscemi
:
Tradeoff Relations Between Accessible Information, Informational Power, and Purity. 2614-2622 - Anurag Anshu

, Rahul Jain
, Naqueeb Ahmad Warsi
:
A Hypothesis Testing Approach for Communication Over Entanglement-Assisted Compound Quantum Channel. 2623-2636
Volume 65, Number 5, May 2019
- Ron M. Roth

, Alexander Zeh
:
On Spectral Design Methods for Quasi-Cyclic Codes. 2637-2647 - Natalia Silberstein

, Tuvi Etzion
, Moshe Schwartz
:
Locality and Availability of Array Codes Constructed From Subspaces. 2648-2660 - Jay Mardia

, Burak Bartan
, Mary Wootters
:
Repairing Multiple Failures for Scalar MDS Codes. 2661-2672 - Itzhak Tamo

, Min Ye
, Alexander Barg
:
The Repair Problem for Reed-Solomon Codes: Optimal Repair of Single and Multiple Erasures With Almost Optimal Node Size. 2673-2695 - Hongwei Liu

, Youcef Maouche
:
Two or Few-Weight Trace Codes over ${\mathbb{F}_{q}}+u{\mathbb{F}_{q}}$. 2696-2703 - Masato Tajima

:
An Innovations Approach to Viterbi Decoding of Convolutional Codes. 2704-2722 - Zhifang Zhang

, Jingke Xu:
The Optimal Sub-Packetization of Linear Capacity-Achieving PIR Schemes With Colluding Servers. 2723-2735 - Kaveh Mahdaviani

, Ashish Khisti
, Soheil Mohajer
:
Bandwidth Adaptive & Error Resilient MBR Exact Repair Regenerating Codes. 2736-2759 - Venkata Gandikota

, Elena Grigorescu
, Sidharth Jaggi
, Samson Zhou
:
Nearly Optimal Sparse Group Testing. 2760-2773 - Zilin Jiang

, Nikita Polyanskii
, Ilya Vorobyev
:
On Capacities of the Two-User Union Channel With Complete Feedback. 2774-2781 - Marco Mondelli

, S. Hamed Hassani, Rüdiger L. Urbanke:
Construction of Polar Codes With Sublinear Complexity. 2782-2791 - Seyed Pooya Shariatpanahi

, Giuseppe Caire
, Babak Hossein Khalaj
:
Physical-Layer Schemes for Wireless Coded Caching. 2792-2807 - Venkat Anantharam

, François Baccelli
:
Error Exponents for Dimension-Matched Vector Multiple Access Channels With Additive Noise. 2808-2823 - Tibor Keresztfalvi

, Amos Lapidoth
:
Multiplexing Zero-Error and Rare-Error Communications Over a Noisy Channel. 2824-2837 - Longguang Li

, Aslan Tchamkerten
:
Second-Order Asymptotics for Communication Under Strong Asynchronism. 2838-2849 - Ahmad Beirami

, A. Robert Calderbank, Mark M. Christiansen, Ken R. Duffy
, Muriel Médard:
A Characterization of Guesswork on Swiftly Tilting Curves. 2850-2871 - Hao-Chung Cheng

, Min-Hsiu Hsieh
, Marco Tomamichel
:
Quantum Sphere-Packing Bounds With Polynomial Prefactors. 2872-2898 - Tongyang Li

, Xiaodi Wu
:
Quantum Query Complexity of Entropy Estimation. 2899-2921 - Holger Boche, Minglai Cai

, Ning Cai:
Message Transmission Over Classical Quantum Channels With a Jammer With Side Information: Message Transmission Capacity and Resources. 2922-2943 - Gaojun Luo

, Xiwang Cao
, Xiaojing Chen:
MDS Codes With Hulls of Arbitrary Dimensions and Their Quantum Error Correction. 2944-2952 - Benjamin Mark

, Garvesh Raskutti, Rebecca Willett
:
Network Estimation From Point Process Data. 2953-2975 - Jinchi Chen

, Yulong Liu
:
Stable Recovery of Structured Signals From Corrupted Sub-Gaussian Measurements. 2976-2994 - Yunwen Lei

, Ürün Dogan, Ding-Xuan Zhou
, Marius Kloft
:
Data-Dependent Generalization Bounds for Multi-Class Classification. 2995-3021 - Tony Yaacoub

, George V. Moustakides
, Yajun Mei
:
Optimal Stopping for Interval Estimation in Bernoulli Trials. 3022-3033 - Jie Ding

, Jiawei Zhou
, Vahid Tarokh
:
Asymptotically Optimal Prediction for Time-Varying Data Generating Processes. 3034-3067 - Felix Abramovich

, Vadim Grinshtein
:
High-Dimensional Classification by Sparse Logistic Regression. 3068-3079 - Narayanaswamy Balakrishnan

, Elena Castilla
, Nirian Martín
, Leandro Pardo
:
Robust Estimators and Test Statistics for One-Shot Device Testing Under the Exponential Distribution. 3080-3096 - Yanjun Li

, Kiryung Lee
, Yoram Bresler
:
Blind Gain and Phase Calibration via Sparse Spectral Methods. 3097-3123 - Abiy Tasissa

, Rongjie Lai
:
Exact Reconstruction of Euclidean Distance Geometry Problem Using Low-Rank Matrix Completion. 3124-3144 - Lin Zhou

, Vincent Y. F. Tan
, Mehul Motani
:
Refined Asymptotics for Rate-Distortion Using Gaussian Codebooks for Arbitrary Sources. 3145-3159 - Carlos Ochoa

, Gonzalo Navarro
:
RePair and All Irreducible Grammars are Upper Bounded by High-Order Empirical Entropy. 3160-3164 - Patrick Ah-Fat

, Michael Huth
:
Optimal Accuracy-Privacy Trade-Off for Secure Computations. 3165-3182 - Qiwen Wang

, Mikael Skoglund
:
On PIR and Symmetric PIR From Colluding Databases With Adversaries and Eavesdroppers. 3183-3197 - Qiwen Wang

, Hua Sun
, Mikael Skoglund
:
The Capacity of Private Information Retrieval With Eavesdroppers. 3198-3214 - Yi-Peng Wei

, Karim Banawan
, Sennur Ulukus
:
Fundamental Limits of Cache-Aided Private Information Retrieval With Unknown and Uncoded Prefetching. 3215-3232 - Maki Yoshida

, Satoshi Obana
:
Verifiably Multiplicative Secret Sharing. 3233-3245 - Paulo Ricardo Branco da Silva

, Danilo Silva
:
Multilevel LDPC Lattices With Efficient Encoding and Decoding and a Generalization of Construction $\text{D}'$. 3246-3260 - Kaniska Mohanty

, Mahesh K. Varanasi
:
On the Generalized Degrees of Freedom of the MIMO Interference Channel With Delayed CSIT. 3261-3277 - Cynthia Rush

, Ramji Venkataramanan
:
The Error Probability of Sparse Superposition Codes With Approximate Message Passing Decoding. 3278-3303 - Yansheng Wu

, Qin Yue, Fengwei Li:
Three Families of Monomial Functions With Three-Valued Walsh Spectrum. 3304-3314
Volume 65, Number 6, June 2019
- Oliver Kosut

, Jörg Kliewer
:
Strong Converses are Just Edge Removal Properties. 3315-3339 - Boris Bukh

, Christopher Cox
:
On a Fractional Version of Haemers' Bound. 3340-3348 - Lei Yu

, Vincent Y. F. Tan
:
Simulation of Random Variables Under Rényi Divergence Measures of All Orders. 3349-3383 - Zitan Chen

, Sidharth Jaggi
, Michael Langberg
:
The Capacity of Online (Causal) $q$ -Ary Error-Erasure Channels. 3384-3411 - Ran Averbuch

, Nir Weinberger
, Neri Merhav
:
Expurgated Bounds for the Asymmetric Broadcast Channel. 3412-3435 - Ferdinando Cicalese

, Luisa Gargano
, Ugo Vaccaro
:
Minimum-Entropy Couplings and Their Applications. 3436-3451 - Anelia Somekh-Baruch

, Jonathan Scarlett
, Albert Guillen i Fabregas
:
Generalized Random Gilbert-Varshamov Codes. 3452-3469 - Ajaykrishnan Nageswaran

, Prakash Narayan
:
Data Privacy for a $\rho$ -Recoverable Function. 3470-3488 - Xingguo Li

, Junwei Lu, Raman Arora
, Jarvis D. Haupt
, Han Liu, Zhaoran Wang, Tuo Zhao
:
Symmetry, Saddle Points, and Global Optimization Landscape of Nonconvex Matrix Factorization. 3489-3514 - Jason M. Klusowski

, Dana Yang, W. D. Brinda
:
Estimating the Coefficients of a Mixture of Two Linear Regressions by Expectation Maximization. 3515-3524 - Sabyasachi Chatterjee

, Sumit Mukherjee
:
Estimation in Tournaments and Graphs Under Monotonicity Constraints. 3525-3539 - John M. Konstantinides

, Ioannis Andreadis:
Empirical Lipschitz Constants for the Renyi Entropy Maximum Likelihood Estimator. 3540-3554 - Michael G. Moore

, Mark A. Davenport
:
Estimation of Poisson Arrival Processes Under Linear Models. 3555-3564 - Emmanuel Abbe, Tamir Bendory

, William E. Leeb, João M. Pereira
, Nir Sharon
, Amit Singer
:
Multireference Alignment Is Easier With an Aperiodic Translation Distribution. 3565-3584 - Rotem Mulayoff

, Tomer Michaeli
:
On the Minimal Overcompleteness Allowing Universal Sparse Representation. 3585-3599 - Junjie Ma

, Ji Xu, Arian Maleki
:
Optimization-Based AMP for Phase Retrieval: The Impact of Initialization and $\ell_{2}$ Regularization. 3600-3629 - Zheng Wang

, Cong Ling
:
Lattice Gaussian Sampling by Markov Chain Monte Carlo: Bounded Distance Decoding and Trapdoor Sampling. 3630-3645 - Jonathan Scarlett

:
Noisy Adaptive Group Testing: Bounds and Algorithms. 3646-3661 - Venkatesan Guruswami

, Chaoping Xing
, Chen Yuan
:
How Long Can Optimal Locally Repairable Codes Be? 3662-3670 - Maya Levy

, Eitan Yaakobi
:
Mutually Uncorrelated Codes for DNA Storage. 3671-3691 - Ryan Gabrys

, Eitan Yaakobi
, Mario Blaum
, Paul H. Siegel
:
Constructions of Partial MDS Codes Over Small Fields. 3692-3701 - Yeow Meng Chee

, Johan Chrisnata
, Han Mao Kiah
, San Ling
, Tuan Thanh Nguyen
, Van Khu Vu
:
Capacity-Achieving Codes That Mitigate Intercell Interference and Charge Leakage in Flash Memories. 3702-3712 - Chong-Dao Lee

:
Radical-Locator Polynomials and Row-Echelon Partial Syndrome Matrices With Applications to Decoding Cyclic Codes. 3713-3723 - Yauhen Yakimenka

, Vitaly Skachek
, Irina E. Bocharova
, Boris D. Kudryashov
:
Stopping Redundancy Hierarchy Beyond the Minimum Distance. 3724-3737 - Arkadii G. D'yachkov, Nikita Polyanskii

, Vladislav Yu. Shchukin
, Ilya Vorobyev
:
Separable Codes for the Symmetric Multiple-Access Channel. 3738-3750 - Ling-Hua Chang

, Po-Ning Chen
, Vincent Y. F. Tan
, Carol Wang
, Yunghsiang S. Han
:
On the Maximum Size of Block Codes Subject to a Distance Criterion. 3751-3757 - Sudarsan V. S. Ranganathan, Dariush Divsalar

, Richard D. Wesel
:
Quasi-Cyclic Protograph-Based Raptor-Like LDPC Codes for Short Block-Lengths. 3758-3777 - Ali Dehghan

, Amir H. Banihashemi
:
On Computing the Multiplicity of Cycles in Bipartite Graphs Using the Degree Distribution and the Spectrum of the Graph. 3778-3789 - Xuan Guang

, Raymond W. Yeung
, Shenghao Yang
, Congduan Li
:
Improved Upper Bound on the Network Function Computing Capacity. 3790-3811 - Ran Gelles

, Yael Tauman Kalai:
Constant-Rate Interactive Coding Is Impossible, Even in Constant-Degree Networks. 3812-3829 - Chengju Li

, Peng Wu
, Fengmei Liu:
On Two Classes of Primitive BCH Codes and Some Related Codes. 3830-3840 - Minjia Shi

, Rongsheng Wu, Denis S. Krotov
:
On $Z_p Z_{p^k}$ -Additive Codes and Their Duality. 3841-3847 - Yan-Yu Zhang

, Hong-Yi Yu, Jian-Kang Zhang
:
Constellation-Optimal Beamformers for Multiuser MISO Broadcast Visible Light Communications. 3848-3870 - Hua Sun

:
The Capacity of Anonymous Communications. 3871-3879 - Hua Sun

, Syed Ali Jafar
:
The Capacity of Private Computation. 3880-3897 - Razane Tajeddine

, Oliver W. Gnilke
, David A. Karpuk
, Ragnar Freij-Hollanti
, Camilla Hollanti
:
Private Information Retrieval From Coded Storage Systems With Colluding, Byzantine, and Unresponsive Servers. 3898-3906 - Alex Dytso

, Mert Al
, H. Vincent Poor
, Shlomo Shamai Shitz
:
On the Capacity of the Peak Power Constrained Vector Gaussian Channel: An Estimation Theoretic Perspective. 3907-3921 - Rashad Eletreby

, Osman Yagan
:
$k$ -Connectivity of Inhomogeneous Random Key Graphs With Unreliable Links. 3922-3949 - Hayata Yamasaki

, Mio Murao
:
Quantum State Merging for Arbitrarily Small-Dimensional Systems. 3950-3972 - Elton Yechao Zhu

, Quntao Zhuang
, Min-Hsiu Hsieh
, Peter W. Shor:
Superadditivity in Trade-Off Capacities of Quantum Channels. 3973-3989 - Yvo Desmedt

, Fred Piper:
Perfect Anonymity. 3990-3997
Volume 65, Number 7, July 2019
- Mahdi Cheraghchi

:
Expressions for the Entropy of Basic Discrete Distributions. 3999-4009 - Mehrdad Kiamari

, Amir Salman Avestimehr:
Capacity Region of the Symmetric Injective K-User Deterministic Interference Channel. 4010-4022 - Ken R. Duffy

, Jiange Li
, Muriel Médard:
Capacity-Achieving Guessing Random Additive Noise Decoding. 4023-4040 - Terence Chan

, Satyajit Thakor
, Alex J. Grant
:
Minimal Characterization of Shannon-Type Inequalities Under Functional Dependence and Full Conditional Independence Structures. 4041-4051 - Mahdi Cheraghchi

, João Ribeiro
:
Improved Upper Bounds and Structural Results on the Capacity of the Discrete-Time Poisson Channel. 4052-4068 - Wei Yang

, Rafael F. Schaefer
, H. Vincent Poor
:
Wiretap Channels: Nonasymptotic Fundamental Limits. 4069-4093 - Olivier Binette

:
A Note on Reverse Pinsker Inequalities. 4094-4096 - Ori Peled

, Oron Sabag
, Haim H. Permuter
:
Feedback Capacity and Coding for the (0, k)-RLL Input-Constrained BEC. 4097-4114 - Shuangqing Liu, Yanxun Chang

, Tao Feng
:
Constructions for Optimal Ferrers Diagram Rank-Metric Codes. 4115-4130 - Tuvi Etzion

, Hui Zhang
:
Grassmannian Codes With New Distance Measures for Network Coding. 4131-4142 - Milad Johnny

, Mohammad Reza Aref:
A Multi-Layer Encoding and Decoding Strategy for Binary Erasure Channel. 4143-4151 - Daniele Bartoli

, Matteo Bonini
:
Minimal Linear Codes in Odd Characteristic. 4152-4155 - Stanislav Kruglik

, Kamilla Nazirkhanova
, Alexey A. Frolov
:
New Bounds and Generalizations of Locally Recoverable Codes With Availability. 4156-4166 - Anyu Wang

, Zhifang Zhang
, Dongdai Lin
:
Bounds for Binary Linear Locally Repairable Codes via a Sphere-Packing Approach. 4167-4179 - Marwen Zorgui

, Zhiying Wang
:
Centralized Multi-Node Repair Regenerating Codes. 4180-4206 - Suman Ghosh

, Lakshmi Natarajan
:
Linear Codes for Broadcasting With Noisy Side Information. 4207-4226 - Amirhossein Reisizadeh

, Saurav Prakash
, Ramtin Pedarsani
, Amir Salman Avestimehr:
Coded Computation Over Heterogeneous Clusters. 4227-4242 - Siddhartha Kumar

, Hsuan-Yin Lin
, Eirik Rosnes
, Alexandre Graell i Amat
:
Achieving Maximum Distance Separable Private Information Retrieval Capacity With Linear Codes. 4243-4273 - Silas L. Fong

, Ashish Khisti
, Baochun Li
, Wai-Tian Tan, Xiaoqing Zhu
, John G. Apostolopoulos:
Optimal Streaming Codes for Channels With Burst and Arbitrary Erasures. 4274-4292 - Rami Cohen

, Netanel Raviv
, Yuval Cassuto
:
LDPC Codes Over the q-ary Multi-Bit Channel. 4293-4306 - Ali Dehghan

, Amir H. Banihashemi
:
Hardness Results on Finding Leafless Elementary Trapping Sets and Elementary Absorbing Sets of LDPC Codes. 4307-4315 - Daniel Panario

, Mark Saaltink, Brett Stevens, Daniel Wevrick:
A General Construction of Ordered Orthogonal Arrays Using LFSRs. 4316-4326 - Iosif Pinelis

:
Exact Upper and Lower Bounds on the Misclassification Probability. 4327-4334 - Ann-Kristin Becker, Hajo Holzmann

:
Nonparametric Identification in the Dynamic Stochastic Block Model. 4335-4344 - Andrew D. Back

, Daniel Angus
, Janet Wiles
:
Determining the Number of Samples Required to Estimate Entropy in Natural Sequences. 4345-4352 - Damian Straszak

, Nisheeth K. Vishnoi
:
Belief Propagation, Bethe Approximation and Polynomials. 4353-4363 - Lan V. Truong

, Vincent Y. F. Tan
:
Moderate Deviation Asymptotics for Variable-Length Codes With Feedback. 4364-4386 - Jean-Francois Collet

:
An Exact Expression for the Gap in the Data Processing Inequality for f-Divergences. 4387-4391 - Shang Li, Xiaoou Li, Xiaodong Wang

, Jingchen Liu:
Sequential Hypothesis Test With Online Usage-Constrained Sensor Selection. 4392-4410 - Sadaf Salehkalaibar

, Michèle A. Wigger
, Ligong Wang
:
Hypothesis Testing Over the Two-Hop Relay Network. 4411-4433 - Gauri Jagatap

, Chinmay Hegde
:
Sample-Efficient Algorithms for Recovering Structured Signals From Magnitude-Only Measurements. 4434-4456 - Thomas Debarre

, Julien Fageot
, Harshit Gupta
, Michael Unser
:
B-Spline-Based Exact Discretization of Continuous-Domain Inverse Problems With Generalized TV Regularization. 4457-4470 - George Barmpalias

, Andrew Lewis-Pye:
Compression of Data Streams Down to Their Information Content. 4471-4485 - Krishnan Eswaran

, Michael Gastpar
:
Remote Source Coding Under Gaussian Noise: Dueling Roles of Power and Entropy Power. 4486-4498 - Wasim Huleihel

, Salman Salamatian, Neri Merhav
, Muriel Médard:
Gaussian Intersymbol Interference Channels With Mismatch. 4499-4517 - Yunhao Sun

, Ruchen Duan, Yingbin Liang, Shlomo Shamai Shitz
:
State-Dependent Interference Channel With Correlated States. 4518-4531 - Wen-Hsuan Li, Jwo-Yuh Wu

:
BER-Improved Quantization of Source-to-Relay Link SNR for Cooperative Beamforming: A Fixed Point Theory Approach. 4532-4549 - Dmitri V. Truhachev

, Christian Schlegel
:
Coupling Data Transmission for Multiple-Access Communications. 4550-4574 - Inaki Estella Aguerri

, Abdellatif Zaidi, Giuseppe Caire
, Shlomo Shamai Shitz
:
On the Capacity of Cloud Radio Access Networks With Oblivious Relaying. 4575-4596 - Yubo Li

, Liying Tian
, Tao Liu, Chengqian Xu:
Constructions of Quasi-Complementary Sequence Sets Associated With Characters. 4597-4608 - Xin Wang

, Kun Fang
, Marco Tomamichel
:
On Converse Bounds for Classical Communication Over Quantum Channels. 4609-4619 - Ignacio Cascudo

, Jaron Skovsted Gundersen
, Diego Ruano
:
Improved Bounds on the Threshold Gap in Ramp Secret Sharing. 4620-4633 - Bin Zhu

:
On the Uniqueness Result of Theorem 6 in "Relative Entropy and the Multivariable Multidimensional Moment Problem". 4634-4639 - Nematollah Iri, Oliver Kosut:

Corrections to "Fine Asymptotics for Universal One-to-One Compression of Parametric Sources". 4640
Volume 65, Number 8, August 2019
- Thierry P. Berger

, Cheikh Thiécoumba Gueye
, Jean Belo Klamti:
Generalized Subspace Subcodes With Application in Cryptology. 4641-4657 - Lingfei Jin

:
Explicit Construction of Optimal Locally Recoverable Codes of Distance 5 and 6 via Binary Constant Weight Codes. 4658-4663 - Jong Yoon Hyun

, Hyun Kwang Kim, Jeong Rye Park
:
Weighted Posets and Digraphs Admitting the Extended Hamming Code to be a Perfect Code. 4664-4672 - Tao Feng

, Henk D. L. Hollmann
, Qing Xiang:
The Shift Bound for Abelian Codes and Generalizations of the Donoho-Stark Uncertainty Principle. 4673-4682 - Ajay Badita

, Parimal Parag
, Jean-François Chamberland
:
Latency Analysis for Distributed Coded Storage Systems. 4683-4698 - Shixin Zhu, Zhonghua Sun

, Xiaoshan Kai
:
A Class of Narrow-Sense BCH Codes. 4699-4714 - Cunsheng Ding

, Ziling Heng
:
The Subfield Codes of Ovoid Codes. 4715-4729 - Hanxu Hou

, Patrick P. C. Lee
, Kenneth W. Shum
, Yuchong Hu
:
Rack-Aware Regenerating Codes for Data Centers. 4730-4745 - Siyi Yang

, Clayton Schoeny
, Lara Dolecek
:
Theoretical Bounds and Constructions of Codes in the Generalized Cayley Metric. 4746-4763 - Gary R. W. Greaves

, Jeven Syatriadi
:
Reed-Solomon Codes Over Small Fields With Constrained Generator Matrices. 4764-4770 - Matthew Amy

, Michele Mosca:
T-Count Optimization and Reed-Muller Codes. 4771-4784 - Umberto Martínez-Peñas

, Frank R. Kschischang
:
Reliable and Secure Multishot Network Coding Using Linearized Reed-Solomon Codes. 4785-4803 - Mladen Kovacevic

:
Runlength-Limited Sequences and Shift-Correcting Codes: Asymptotic Analysis. 4804-4814 - Shu Liu, Chaoping Xing

, Chen Yuan
:
List Decodability of Symbol-Pair Codes. 4815-4821 - Daniel Heinlein

:
New LMRD Code Bounds for Constant Dimension Codes and Improved Constructions. 4822-4830 - Yanfang Liu

, Pablo M. Olmos
, Tobias Koch
:
A Probabilistic Peeling Decoder to Efficiently Analyze Generalized LDPC Codes Over the BEC. 4831-4853 - Nihar B. Shah

, Sivaraman Balakrishnan, Martin J. Wainwright:
Feeling the Bern: Adaptive Estimators for Bernoulli Probabilities of Pairwise Comparisons. 4854-4874 - Kirill Efimov, Larisa Adamyan

, Vladimir G. Spokoiny:
Adaptive Nonparametric Clustering. 4875-4892 - Dragana Bajovic

, José M. F. Moura
, Dejan Vukobratovic
:
Detecting Random Walks on Graphs With Heterogeneous Sensors. 4893-4914 - Pablo Martínez-Nuevo

, Alan V. Oppenheim
:
Lattice Functions for the Analysis of Analog-to-Digital Conversion. 4915-4923 - Yoshimasa Uematsu

, Yingying Fan
, Kun Chen
, Jinchi Lv
, Wei Lin
:
SOFAR: Large-Scale Association Network Learning. 4924-4939 - Nir Weinberger

, Yuval Kochman
:
On the Reliability Function of Distributed Hypothesis Testing Under Optimal Detection. 4940-4965 - Ligong Wang

:
The Poisson Channel With Varying Dark Current Known to the Transmitter. 4966-4978 - Ziv Goldfeld

, Haim H. Permuter
:
Wiretap and Gelfand-Pinsker Channels Analogy and Its Applications. 4979-4996 - Neri Merhav

:
False-Accept/False-Reject Trade-Offs for Ensembles of Biometric Authentication Systems. 4997-5006 - Nirmal V. Shende

, Aaron B. Wagner
:
The Stochastic-Calculus Approach to Multi-Receiver Poisson Channels. 5007-5027 - Lan V. Truong

, Vincent Y. F. Tan
:
The Reliability Function of Variable-Length Lossy Joint Source-Channel Coding With Feedback. 5028-5042 - Tibor Keresztfalvi

, Amos Lapidoth
:
Semi-Robust Communications Over a Broadcast Channel. 5043-5049 - Wasim Huleihel

, Ohad Elishco
, Muriel Médard:
Blind Group Testing. 5050-5063 - Vinay Praneeth Boda

:
Reconstructing Gaussian Sources by Spatial Sampling. 5064-5079 - Chung Chan

, Manuj Mukherjee
, Navin Kashyap
, Qiaoqiao Zhou
:
Upper Bounds via Lamination on the Constrained Secrecy Capacity of Hypergraphical Sources. 5080-5093 - Sarah Kamel

, Mireille Sarkiss
, Michèle A. Wigger
, Ghaya Rekaya-Ben Othman:
Secrecy Capacity-Memory Tradeoff of Erasure Broadcast Channels. 5094-5124 - Mohamed S. Nafea

, Aylin Yener
:
Generalizing Multiple Access Wiretap and Wiretap II Channel Models: Achievable Rates and Cost of Strong Secrecy. 5125-5143 - Remi A. Chou

, Aylin Yener
:
Secret-Key Generation in Many-to-One Networks: An Integrated Game-Theoretic and Information-Theoretic Approach. 5144-5159 - Qiwen Wang

, Mikael Skoglund
:
Symmetric Private Information Retrieval from MDS Coded Distributed Storage With Non-Colluding and Colluding Servers. 5160-5175 - Alireza Vahid

:
On the Degrees-of-Freedom of Two-Unicast Wireless Networks With Delayed CSIT. 5176-5188 - Neri Merhav

:
Tradeoffs Between Weak-Noise Estimation Performance and Outage Exponents in Nonlinear Modulation. 5189-5196 - Jingjing Zhang

, Osvaldo Simeone
:
Fundamental Limits of Cloud and Cache-Aided Interference Management With Multi-Antenna Edge Nodes. 5197-5214 - Ahmed M. Bedewy

, Yin Sun
, Ness B. Shroff:
Minimizing the Age of Information Through Queues. 5215-5232 - Christian Günther, Kai-Uwe Schmidt

:
Sequence Pairs With Asymptotically Optimal Aperiodic Correlation. 5233-5238 - Mateusz Michalek

, Yaroslav Shitov:
Quantum Version of Wielandt's Inequality Revisited. 5239-5242 - Qian Guo

, Thomas Johansson
, Erik Mårtensson
, Paul Stankovski Wagner
:
On the Asymptotics of Solving the LWE Problem Using Coded-BKW With Sieving. 5243-5259 - Chun Guo

:
Understanding the Related-Key Security of Feistel Ciphers From a Provable Perspective. 5260-5280 - Cong Ling

, Jean-Claude Belfiore:
Corrections to "Achieving AWGN Channel Capacity With Lattice Gaussian Coding". 5281
Volume 65, Number 9, September 2019
- Sergey G. Bobkov

, Gennadiy P. Chistyakov, Friedrich Götze:
Non-Uniform Bounds in the Poisson Approximation With Applications to Informational Distances I. 5283-5293 - Sergey G. Bobkov

:
Moments of the Scores. 5294-5301 - Anders Høst-Madsen

, Elyas Sabeti
, Chad Walton:
Data Discovery and Anomaly Detection Using Atypicality: Theory. 5302-5322 - Uri Hadar

, Ofer Shayevitz
:
Distributed Estimation of Gaussian Correlations. 5323-5338 - Sundeep Rangan

, Philip Schniter
, Alyson K. Fletcher
, Subrata Sarkar
:
On the Convergence of Approximate Message Passing With Arbitrary Matrices. 5339-5351 - Yuzo Maruyama

, Takeru Matsuda
, Toshio Ohnishi
:
Harmonic Bayesian Prediction Under $\alpha$ -Divergence. 5352-5366 - Chenglong Ye

, Yuhong Yang:
High-Dimensional Adaptive Minimax Sparse Estimation With Interactions. 5367-5379 - Morteza Ashraphijuo

, Vaneet Aggarwal
, Xiaodong Wang
:
Deterministic and Probabilistic Conditions for Finite Completability of Low-Tucker-Rank Tensor. 5380-5400 - Lek-Heng Lim

, Rodolphe Sepulchre
, Ke Ye
:
Geometric Distance Between Positive Definite Matrices of Different Dimensions. 5401-5405 - Yu-Xiang Wang

, Huan Xu, Chenlei Leng:
Provable Subspace Clustering: When LRR Meets SSC. 5406-5432 - Lev Yohananov

, Eitan Yaakobi
:
Codes for Graph Erasures. 5433-5453 - Swanand Kadhe

, Salim Y. El Rouayheb, Iwan M. Duursma
, Alex Sprintson
:
Codes With Locality in the Rank and Subspace Metrics. 5454-5468 - Mehran Elyasi

, Soheil Mohajer
:
Determinant Codes With Helper-Independent Repair for Single and Multiple Failures. 5469-5483 - Weiqi Li

, Zhiying Wang
, Hamid Jafarkhani
:
On the Sub-Packetization Size and the Repair Bandwidth of Reed-Solomon Codes. 5484-5502 - Liang Bai, Zihui Liu

:
On the Second Relative Greedy Weight of 4-Dimensional Codes. 5503-5518 - Thach V. Bui

, Minoru Kuribayashi
, Mahdi Cheraghchi
, Isao Echizen:
Efficiently Decodable Non-Adaptive Threshold Group Testing. 5519-5528 - Amit Solomon, Yuval Cassuto

:
Error-Correcting WOM Codes: Concatenation and Joint Design. 5529-5546 - Abhishek Agarwal, Larkin Flodin

, Arya Mazumdar
:
Linear Programming Approximations for Index Coding. 5547-5564 - Yiwei Zhang

, Xin Wang, Hengjia Wei
, Gennian Ge
:
On Private Information Retrieval Array Codes. 5565-5573 - Weijun Fang

, Fang-Wei Fu
:
New Constructions of MDS Euclidean Self-Dual Codes From GRS Codes and Extended GRS Codes. 5574-5579 - Arya Mazumdar

, Andrew McGregor
, Sofya Vorotnikova
:
Storage Capacity as an Information-Theoretic Vertex Cover and the Index Coding Rate. 5580-5591 - Huseyin A. Inan

, Peter Kairouz, Mary Wootters
, Ayfer Özgür:
On the Optimality of the Kautz-Singleton Construction in Probabilistic Group Testing. 5592-5603 - Dmitri V. Truhachev

, David G. M. Mitchell
, Michael Lentmaier
, Daniel J. Costello Jr.
, Alireza Karami
:
Code Design Based on Connecting Spatially Coupled Graph Chains. 5604-5617 - Jean Barbier

, Mohamad Dia
, Nicolas Macris
:
Universal Sparse Superposition Codes With Spatial Coupling and GAMP Decoding. 5618-5642 - Henry D. Pfister

, Rüdiger L. Urbanke:
Near-Optimal Finite-Length Scaling for Polar Codes Over Large Alphabets. 5643-5655 - Christopher G. Blake

, Frank R. Kschischang
:
Upper and Lower Bounds on the Computational Complexity of Polar Encoding and Decoding. 5656-5673 - Juan Pablo Vigneaux

:
Information Theory With Finite Vector Spaces. 5674-5687 - Urs Niesen

:
An Information-Theoretic Analysis of Deduplication. 5688-5704 - Gonzalo Vazquez-Vilar

, Albert Guillén i Fàbregas
, Sergio Verdú:
The Error Probability of Generalized Perfect Codes via the Meta-Converse. 5705-5717 - Bikash Kumar Dey

, Sidharth Jaggi
, Michael Langberg
:
Sufficiently Myopic Adversaries Are Blind. 5718-5736 - Sudheer Poojary

, Sanidhay Bhambay
, Parimal Parag
:
Real-Time Status Updates for Markov Source. 5737-5749 - Ryo Yaguchi, Masahito Hayashi

:
Second Order Analysis for Joint Source-Channel Coding With General Channel and Markovian Source. 5750-5770 - Chong Li

, Yingbin Liang, H. Vincent Poor
, Shlomo Shamai Shitz
:
Secrecy Capacity of Colored Gaussian Noise Channels With Feedback. 5771-5782 - Zhuqing Jia

, Hua Sun
, Syed Ali Jafar
:
Cross Subspace Alignment and the Asymptotic Capacity of $X$ -Secure $T$ -Private Information Retrieval. 5783-5798 - Enrico Piovano, Hamdi Joudeh

, Bruno Clerckx
:
Generalized Degrees of Freedom of the Symmetric Cache-Aided MISO Broadcast Channel With Partial CSIT. 5799-5815 - Meghana Bande, Aly El Gamal

, Venugopal V. Veeravalli
:
Degrees of Freedom in Wireless Interference Networks With Cooperative Transmission and Backhaul Load Constraints. 5816-5832 - Shihui Fu

, Xiutao Feng
, Qiang Wang
, Claude Carlet
:
On the Derivative Imbalance and Ambiguity of Functions. 5833-5845 - Xianhua Niu

, Chaoping Xing
:
New Extension Constructions of Optimal Frequency-Hopping Sequence Sets. 5846-5855 - WeiGuo Zhang

:
High-Meets-Low: Construction of Strictly Almost Optimal Resilient Boolean Functions via Fragmentary Walsh Spectra. 5856-5864 - Samir Hodzic, Enes Pasalic

, Yongzhuang Wei
, Fengrong Zhang
:
Designing Plateaued Boolean Functions in Spectral Domain and Their Classification. 5865-5879 - Gilad Gour

:
Comparison of Quantum Channels by Superchannels. 5880-5904 - Anurag Anshu

, Rahul Jain
, Naqueeb Ahmad Warsi
:
Convex-Split and Hypothesis Testing Approach to One-Shot Quantum Measurement Compression and Randomness Extraction. 5905-5924 - Samuel Epstein

:
Algorithmic No-Cloning Theorem. 5925-5930 - Marco Fanizza

, Andrea Mari
, Vittorio Giovannetti
:
Optimal Universal Learning Machines for Quantum State Discrimination. 5931-5944 - Péter Vrana

, Matthias Christandl
:
Distillation of Greenberger-Horne-Zeilinger States by Combinatorial Methods. 5945-5958 - Giacomo De Palma

:
New Lower Bounds to the Output Entropy of Multi-Mode Quantum Gaussian Channels. 5959-5968
Volume 65, Number 10, October 2019
- Alexander A. Sherstov

, Pei Wu
:
Optimal Interactive Coding for Insertions, Deletions, and Substitutions. 5971-6000 - Chin Hei Chan

, Enoch Kung, Maosheng Xiong
:
Random Matrices From Linear Codes and Wigner's Semicircle Law. 6001-6009 - Anand Kumar Narayanan

, Matthew Weidner
:
Subquadratic Time Encodable Codes Beating the Gilbert-Varshamov Bound. 6010-6021 - Ali Dehghan

, Amir H. Banihashemi
:
Asymptotic Average Multiplicity of Structures Within Different Categories of Trapping Sets, Absorbing Sets, and Stopping Sets in Random Regular and Irregular LDPC Code Ensembles. 6022-6043 - Erik Ordentlich, Ron M. Roth

:
On the Pointwise Threshold Behavior of the Binary Erasure Polarization Subchannels. 6044-6055 - Sean Ballentine, Alexander Barg

, Serge G. Vladut:
Codes With Hierarchical Locality From Covering Maps of Curves. 6056-6071 - Mohammad Ali Tebbi

, Terence H. Chan
, Chi Wan Sung:
Multi-Rack Distributed Data Storage Networks. 6072-6088 - Matthias Grezet

, Ragnar Freij-Hollanti
, Thomas Westerbäck, Camilla Hollanti
:
Alphabet-Dependent Bounds for Linear Locally Repairable Codes Based on Residual Codes. 6089-6100 - Fan Li

, Jinyuan Chen
, Zhiying Wang
:
Wireless MapReduce Distributed Computing. 6101-6114 - Farhad Shirani

, S. Sandeep Pradhan
:
On the Sub-Optimality of Single-Letter Coding Over Networks. 6115-6135 - Simon R. Blackburn

, Tuvi Etzion
:
PIR Array Codes With Optimal Virtual Server Rate. 6136-6145 - Clayton Schoeny

, Frederic Sala
, Mark Gottscho
, Irina Alam, Puneet Gupta
, Lara Dolecek
:
Context-Aware Resiliency: Unequal Message Protection for Random-Access Memories. 6146-6159 - Yujie Gu

, Minquan Cheng
, Grigory Kabatiansky, Ying Miao
:
Probabilistic Existence Results for Parent-Identifying Schemes. 6160-6170 - Sanghamitra Dutta

, Viveck R. Cadambe
, Pulkit Grover
:
"Short-Dot": Computing Large Linear Transforms Distributedly Using Coded Short Dot Products. 6171-6193 - Lin-Zhi Shen

, Fang-Wei Fu
:
The Decoding Error Probability of Linear Codes Over the Erasure Channel. 6194-6203 - Jared Antrobus

, Heide Gluesing-Luerssen
:
Maximal Ferrers Diagram Codes: Constructions and Genericity Considerations. 6204-6223 - Yuval Ginosar

, Aviram Rochas Moreno
:
Crossed Products and Coding Theory. 6224-6233 - Semih Yagli

, Paul Cuff
:
Exact Exponent for Soft Covering. 6234-6262 - Mohsen Heidari

, Farhad Shirani
, S. Sandeep Pradhan
:
Quasi Structured Codes for Multi-Terminal Communications. 6263-6289 - Jian-Jia Weng

, Lin Song, Fady Alajaji
, Tamás Linder
:
Capacity of Two-Way Channels With Symmetry Properties. 6290-6313 - Ido B. Gattegno

, Haim H. Permuter
, Shlomo Shamai Shitz
, Ayfer Özgür
:
Cooperative Binning for Semi-Deterministic Channels With Non-Causal State Information. 6314-6331 - Badri N. Vellambi

, Roy Timo
:
Common Reconstructions in the Successive Refinement Problem With Receiver Side Information. 6332-6354 - Peida Tian

, Victoria Kostina
:
The Dispersion of the Gauss-Markov Source. 6355-6384 - Victoria Kostina

, Ertem Tuncel
:
Successive Refinement of Abstract Sources. 6385-6398 - Moses Ganardi

, Danny Hucke, Markus Lohrey
, Louisa Seelbach Benkner
:
Universal Tree Source Coding Using Grammar-Based Compression. 6399-6413 - Lin Zhou

, Mehul Motani
:
Non-Asymptotic Converse Bounds and Refined Asymptotics for Two Source Coding Problems. 6414-6440 - Qi Zhao

, Yunchao Liu
, Xiao Yuan, Eric Chitambar
, Andreas J. Winter
:
One-Shot Coherence Distillation: Towards Completing the Picture. 6441-6453 - Kun Fang

, Xin Wang
, Marco Tomamichel
, Runyao Duan:
Non-Asymptotic Entanglement Distillation. 6454-6465 - Dmitry Gavinsky

:
Quantum Versus Classical Simultaneity in Communication Complexity. 6466-6483 - Guillaume Bouleux

, Maël Dugast
, Eric Marcon
:
Information Topological Characterization of Periodically Correlated Processes by Dilation Operators. 6484-6495 - Bernhard C. Geiger

, Tobias Koch
:
On the Information Dimension of Stochastic Processes. 6496-6518 - Stefano Maranò

, Ali H. Sayed
:
Detection Under One-Bit Messaging Over Adaptive Networks. 6519-6538 - Tamir Hazan, Francesco Orabona

, Anand D. Sarwate
, Subhransu Maji, Tommi S. Jaakkola:
High Dimensional Inference With Random Maximum A-Posteriori Perturbations. 6539-6560 - Kwangjun Ahn

, Kangwook Lee
, Changho Suh
:
Community Recovery in Hypergraphs. 6561-6579 - Xiao Li, Dong Yin

, Sameer Pawar, Ramtin Pedarsani
, Kannan Ramchandran:
Sub-Linear Time Support Recovery for Compressed Sensing Using Sparse-Graph Codes. 6580-6619 - Sajad Daei

, Farzan Haddadi
, Arash Amini
, Martin Lotz
:
On the Error in Phase Transition Computations for Compressed Sensing. 6620-6632 - Leonard J. Schulman

, Piyush Srivastava
:
Online Codes for Analog Signals. 6633-6649 - Dekai Liu

, Song Li
, Yi Shen
:
One-Bit Compressive Sensing With Projected Subgradient Method Under Sparsity Constraints. 6650-6663 - Sundeep Rangan

, Philip Schniter
, Alyson K. Fletcher:
Vector Approximate Message Passing. 6664-6684 - Yuting Wei

, Fanny Yang, Martin J. Wainwright:
Early Stopping for Kernel Boosting Algorithms: A General Analysis With Localized Complexities. 6685-6703 - Jiantao Jiao

, Yanjun Han
, Irena Fischer-Hwang
, Tsachy Weissman:
Estimating the Fundamental Limits is Easier Than Achieving the Fundamental Limits. 6704-6715 - Wenwen Tu

, Lifeng Lai
:
On Function Computation With Privacy and Secrecy Constraints. 6716-6733 - Holger Boche, Christian Deppe

, Andreas J. Winter
:
Secure and Robust Identification via Classical-Quantum Channels. 6734-6749 - Te Sun Han

, Masahide Sasaki:
Wiretap Channels With Causal State Information: Strong Secrecy. 6750-6765 - Pratik Patil

, Wei Yu
:
Generalized Compression Strategy for the Downlink Cloud Radio Access Network. 6766-6780 - Joachim Neu

, Anas Chaaban
, Aydin Sezgin
, Mohamed-Slim Alouini
:
Degrees-of-Freedom of the MIMO Three-Way Channel With Node-Intermittency. 6781-6800 - Yahya H. Ezzeldin

, Martina Cardone
, Christina Fragouli
, Daniela Tuninetti
:
Network Simplification in Half-Duplex: Building on Submodularity. 6801-6818 - Haode Yan, Zhengchun Zhou

, Jian Weng
, Jinming Wen
, Tor Helleseth, Qi Wang
:
Differential Spectrum of Kasami Power Permutations Over Odd Characteristic Finite Fields. 6819-6826 - So Hirai

, Kenji Yamanishi
:
Correction to Efficient Computation of Normalized Maximum Likelihood Codes for Gaussian Mixture Models With Its Applications to Clustering. 6827-6828
Volume 65, Number 11, November 2019
- Constantinos Daskalakis, Nishanth Dikkala

, Gautam Kamath
:
Testing Ising Models. 6829-6852 - Bruce E. Hajek

, Suryanarayana Sankagiri:
Community Recovery in a Preferential Attachment Graph. 6853-6874 - Wolfgang König

, András Tóbiás
:
Routeing Properties in a Gibbsian Model for Highly Dense Multihop Networks. 6875-6897 - Yibin Sheng, Zhongzhi Zhang

:
Low-Mean Hitting Time for Random Walks on Heterogeneous Networks. 6898-6910 - Michal Yemini

, Anelia Somekh-Baruch
, Reuven Cohen
, Amir Leshem
:
The Simultaneous Connectivity of Cognitive Networks. 6911-6930 - Shanxiang Lyu

, Antonio Campello, Cong Ling
:
Ring Compute-and-Forward Over Block-Fading Channels. 6931-6949 - Mahdi Cheraghchi

, João Ribeiro
:
Sharp Analytical Capacity Upper Bounds for Sticky and Related Channels. 6950-6974 - Annina Bracher

, Eran Hof, Amos Lapidoth
:
Guessing Attacks on Distributed-Storage Systems. 6975-6998 - Shirin Saeedi Bidokhti

, Michèle A. Wigger
, Aylin Yener
:
Benefits of Cache Assignment on Degraded Broadcast Channels. 6999-7019 - Keerthi Suria Kumar Arumugam

, Matthieu R. Bloch
:
Covert Communication Over a K-User Multiple-Access Channel. 7020-7044 - Filip Paluncic

, Bodhaswar T. Maharaj
, Hendrik C. Ferreira
:
Variable- and Fixed-Length Balanced Runlength-Limited Codes Based on a Knuth-Like Balancing Method. 7045-7066 - Guangkui Xu

, Longjiang Qu
:
Three Classes of Minimal Linear Codes Over the Finite Fields of Odd Characteristic. 7067-7078 - Chin Hei Chan

, Maosheng Xiong
:
On the Complete Weight Distribution of Subfield Subcodes of Algebraic-Geometric Codes. 7079-7086 - Xudong Li, Liming Ma

, Chaoping Xing
:
Construction of Asymptotically Good Locally Repairable Codes via Automorphism Groups of Function Fields. 7087-7094 - Hanxu Hou

, Yunghsiang S. Han
, Patrick P. C. Lee
, Yuchong Hu
, Hui Li
:
A New Design of Binary MDS Array Codes With Asymptotically Weak-Optimal Repair. 7095-7113 - Wei Wu

, Paul H. Siegel
:
Generalized Partial Orders for Polar Code Bit-Channels. 7114-7130 - Dina Goldin

, David Burshtein
:
Performance Bounds of Concatenated Polar Coding Schemes. 7131-7148 - Walid Hachem

, Adrien Hardy
, Shlomo Shamai
:
Mutual Information of Wireless Channels and Block-Jacobi Ergodic Operators. 7149-7167 - Jiang Hu

, Weiming Li
, Wang Zhou:
Central Limit Theorem for Mutual Information of Large MIMO Systems With Elliptically Correlated Channels. 7168-7180 - Arash Gholami Davoodi

, Syed Ali Jafar
:
Optimality of Simple Layered Superposition Coding in the 3 User MISO BC With Finite Precision CSIT. 7181-7207 - Hamdi Joudeh

, Bruno Clerckx
:
On the Optimality of Treating Inter-Cell Interference as Noise in Uplink Cellular Networks. 7208-7232 - Silas L. Fong

, Jing Yang
, Aylin Yener
:
Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Save-and-Transmit and Best-Effort. 7233-7252 - Borna Kananian

, Mohammad Ali Maddah-Ali
, Babak Hossein Khalaj
:
K-User Interference Channels With Backhaul Cooperation: DoF vs. Backhaul Load Trade-Off. 7253-7267 - Abla Kammoun

, Luca Sanguinetti
, Mérouane Debbah, Mohamed-Slim Alouini
:
Asymptotic Analysis of RZF in Large-Scale MU-MIMO Systems Over Rician Channels. 7268-7286 - Minqi Shen, Anders Høst-Madsen

:
The Wideband Slope of Interference Channels: The Small Bandwidth Case. 7287-7303 - Peter Hinz

, Sara A. van de Geer
:
A Framework for the Construction of Upper Bounds on the Number of Affine Linear Regions of ReLU Feed-Forward Neural Networks. 7304-7324 - Mohamed Adel Attia, Ravi Tandon

:
Near Optimal Coded Data Shuffling for Distributed Learning. 7325-7349 - Yining Wang

, Sivaraman Balakrishnan, Aarti Singh
:
Optimization of Smooth Functions With Noisy Observations: Local Minimax Rates. 7350-7366 - Yanting Ma

, Cynthia Rush
, Dror Baron
:
Analysis of Approximate Message Passing With Non-Separable Denoisers and Markov Random Field Priors. 7367-7389 - Wei-Ning Chen

, I-Hsiang Wang
:
Anonymous Heterogeneous Distributed Detection: Optimal Decision Rules, Error Exponents, and the Price of Anonymity. 7390-7406 - Farah Cherfaoui, Valentin Emiya, Liva Ralaivola, Sandrine Anthoine

:
Recovery and Convergence Rate of the Frank-Wolfe Algorithm for the m-Exact-Sparse Problem. 7407-7414 - Yanjun Li

, Yoram Bresler
:
Multichannel Sparse Blind Deconvolution on the Sphere. 7415-7436 - Dong Xia

:
Confidence Region of Singular Subspaces for Low-Rank Matrix Regression. 7437-7459 - Zhaoqiang Liu

, Vincent Y. F. Tan
:
The Informativeness of k-Means for Learning Mixture Models. 7460-7479 - Giovanni Alberti

, Helmut Bölcskei
, Camillo De Lellis
, Günther Koliander
, Erwin Riegler
:
Lossless Analog Compression. 7480-7513 - Sinem Unal

, Aaron B. Wagner
:
LP Bounds for Rate-Distortion With Variable Side Information. 7514-7532 - Cunsheng Ding

, Akihiro Munemasa
, Vladimir D. Tonchev:
Bent Vectorial Functions, Codes and Designs. 7533-7541 - Kangquan Li, Longjiang Qu

, Bing Sun, Chao Li:
New Results About the Boomerang Uniformity of Permutation Polynomials. 7542-7553 - Samir Hodzic, Enes Pasalic

, WeiGuo Zhang
:
Generic Constructions of Five-Valued Spectra Boolean Functions. 7554-7565 - Siddhartha Das

, Mark M. Wilde
:
Quantum Reading Capacity: General Definition and Bounds. 7566-7583 - Seth Lloyd, Peter W. Shor, Kevin Thompson

:
Polylog-LDPC Capacity Achieving Codes for the Noisy Quantum Erasure Channel. 7584-7595 - Frédéric Dupuis, Omar Fawzi

:
Entropy Accumulation With Improved Second-Order Term. 7596-7612 - Chao Tian

, Hua Sun
, Jun Chen
:
Capacity-Achieving Private Information Retrieval Codes With Optimal Message Size and Upload Cost. 7613-7627 - Karim Banawan

, Sennur Ulukus
:
Asymmetry Hurts: Private Information Retrieval Under Asymmetric Traffic Constraints. 7628-7645 - Beongjun Choi

, Jy-yong Sohn
, Sung Whan Yoon
, Jaekyun Moon
:
Secure Clustered Distributed Storage Against Eavesdropping. 7646-7668
Volume 65, Number 12, December 2019
- Maiara F. Bollauf

, Ram Zamir, Sueli I. R. Costa
:
Multilevel Constructions: Coding, Packing and Geometric Uniformity. 7669-7681 - Ryan Gabrys

, Olgica Milenkovic:
Unique Reconstruction of Coded Strings From Multiset Substring Spectra. 7682-7696 - Nicolas Aragon, Philippe Gaborit

, Adrien Hauteville, Olivier Ruatta, Gilles Zémor
:
Low Rank Parity Check Codes: New Decoding Algorithms and Applications to Cryptography. 7697-7717 - Hermann Tchatchiem Kamche

, Christophe Mouaha:
Rank-Metric Codes Over Finite Principal Ideal Rings and Applications. 7718-7735 - Ángel Luis Muñoz Castañeda

, José Maria Muñoz Porras, Francisco J. Plaza Martín
:
Rosenthal's Decoding Algorithm for Certain 1-Dimensional Convolutional Codes. 7736-7741 - Tianqiong Luo

, Vaneet Aggarwal
, Borja Peleato
:
Coded Caching With Distributed Storage. 7742-7755 - Saeid Sahraei

, Pierre Quinton
, Michael Gastpar
:
The Optimal Memory-Rate Trade-Off for the Non-Uniform Centralized Caching Problem With Two Files Under Uncoded Placement. 7756-7770 - N. Prakash

, V. Lalitha
, Balaji Srinivasan Babu, P. Vijay Kumar
:
Codes With Locality for Two Erasures. 7771-7789 - Umberto Martínez-Peñas

, Frank R. Kschischang
:
Universal and Dynamic Locally Repairable Codes With Maximal Recoverability via Sum-Rank Codes. 7790-7805 - Justin Kong

:
Ulam Ball Size Analysis for Permutation and Multipermutation Codes Correcting Translocation Errors. 7806-7828 - Yang Liu

, Ruihu Li
, Guanmin Guo
, Junli Wang:
Some Nonprimitive BCH Codes and Related Quantum Codes. 7829-7839 - Weijun Fang

, Fang-Wei Fu
:
Some New Constructions of Quantum MDS Codes. 7840-7847 - Anuradha Sharma

, Tania Sidana
:
On b-Symbol Distances of Repeated-Root Constacyclic Codes. 7848-7867 - Hikmet Yildiz

, Babak Hassibi:
Optimum Linear Codes With Support-Constrained Generator Matrices Over Small Fields. 7868-7875 - Dabin Zheng

, Mu Yuan, Nian Li, Lei Hu, Xiangyong Zeng:
Constructions of Involutions Over Finite Fields. 7876-7883 - Sihem Mesnager

, Longjiang Qu
:
On Two-to-One Mappings Over Finite Fields. 7884-7895 - Ali Bereyhi

, Ralf R. Müller
, Hermann Schulz-Baldes
:
Statistical Mechanics of MAP Estimation: General Replica Ansatz. 7896-7934 - Holger Boche, Ullrich J. Mönich

:
Tone Reservation for OFDM With Restricted Carrier Set. 7935-7949 - Vladislav Z. B. Tadic

, Arnaud Doucet
:
Analyticity of Entropy Rates of Continuous-State Hidden Markov Models. 7950-7975 - Soham Jana

, Ayanendranath Basu
:
A Characterization of All Single-Integral, Non-Kernel Divergence Estimators. 7976-7984 - Mohammad Mahdi Mojahedian

, Salman Beigi, Amin Gohari
, Mohammad Hossein Yassaee
, Mohammad Reza Aref:
A Correlation Measure Based on Vector-Valued Lp-Norms. 7985-8004 - Shirin Jalali

, Xin Yuan
:
Snapshot Compressed Sensing: Performance Bounds and Algorithms. 8005-8024 - Hao Wang

, Lisa Vo, Flávio P. Calmon
, Muriel Médard, Ken R. Duffy
, Mayank Varia
:
Privacy With Estimation Guarantees. 8025-8042 - Jiachun Liao

, Oliver Kosut
, Lalitha Sankar
, Flávio du Pin Calmon
:
Tunable Measures for Information Leakage and Applications to Privacy-Utility Tradeoffs. 8043-8066 - Jingbo Liu

, Mohammad Hossein Yassaee
, Sergio Verdú:
Sharp Bounds for Mutual Covering. 8067-8083 - Axel Flinth

, Sandra Keiper
:
Recovery of Binary Sparse Signals With Biased Measurement Matrices. 8084-8094 - I Eli Chien

, Chung-Yi Lin, I-Hsiang Wang
:
On the Minimax Misclassification Ratio of Hypergraph Community Detection. 8095-8118 - Aditya Siripuram

, William Wu, Brad Osgood
:
Discrete Sampling: A Graph Theoretic Approach to Orthogonal Interpolation. 8119-8130 - Asger Kjærulff Jensen

:
Asymptotic Majorization of Finite Probability Distributions. 8131-8139 - Roy Timo

, Badri N. Vellambi
, Alex J. Grant
, Khoa D. Nguyen
:
Tracking Unstable Autoregressive Sources Over Discrete Memoryless Channels. 8140-8163 - Neri Merhav

:
Error Exponents of Typical Random Codes for the Colored Gaussian Channel. 8164-8179 - Ohad Elishco

, Farzad Farnoud Hassanzadeh
, Moshe Schwartz
, Jehoshua Bruck
:
The Entropy Rate of Some Pólya String Models. 8180-8193 - Ryo Nomura

:
Overflow Probability of Variable-Length Codes With Codeword Cost. 8194-8206 - Stephan Foldes, Douglas Stott Parker, Sándor Radeleczki

:
The Meet Operation in the Imbalance Lattice of Maximal Instantaneous Codes: Alternative Proof of Existence. 8207-8212 - Ryo Nomura

, Hideki Yagi
:
Optimum Overflow Thresholds in Variable-Length Source Coding Allowing Non-Vanishing Error Probability. 8213-8221 - Yi-Peng Wei

, Karim Banawan
, Sennur Ulukus
:
The Capacity of Private Information Retrieval With Partially Known Private Side Information. 8222-8231 - Karim Banawan

, Sennur Ulukus
:
Noisy Private Information Retrieval: On Separability of Channel Coding and Information Retrieval. 8232-8249 - Ali Haghi

, Neda Mohammadizadeh, Amir K. Khandani:
Delay in Cooperative Communications: Achieving Higher Multiplexing Gain in Gaussian Interference Channels With Full-Duplex Transmitters. 8250-8272 - Xiaojun Yuan

, Haiyang Xin, Soung Chang Liew
, Yong Li
:
Capacity of the Gaussian Two-Pair Two-Way Relay Channel to Within ½ Bit. 8273-8304 - Yoshiaki Inoue

, Hiroyuki Masuyama, Tetsuya Takine
, Toshiyuki Tanaka
:
A General Formula for the Stationary Distribution of the Age of Information and Its Application to Single-Server Queues. 8305-8324 - Ashwin Jha

, Cuauhtemoc Mancillas-López
, Mridul Nandi
, Sourav Sen Gupta
:
On Random Read Access in OCB. 8325-8344 - Konstantinos Limniotis

, Nicholas Kolokotronis
:
The Error Linear Complexity Spectrum as a Cryptographic Criterion of Boolean Functions. 8345-8356

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














