default search action
ISIT 2021: Melbourne, Australia
- IEEE International Symposium on Information Theory, ISIT 2021, Melbourne, Australia, July 12-20, 2021. IEEE 2021, ISBN 978-1-5386-8209-8
- Siyao Li, Daniela Tuninetti, Natasha Devroye:
A Control-Theoretic Linear Coding Scheme for the Fading Gaussian Broadcast Channel with Feedback. 1-6 - Oron Sabag, Victoria Kostina, Babak Hassibi:
Feedback Capacity of MIMO Gaussian Channels. 7-12 - Rajesh K. Mishra, Deepanshu Vasal, Hyeji Kim:
Linear Coding for AWGN Channels with Noisy Output Feedback via Dynamic Programming. 13-18 - Julian Renner, Sven Puchinger, Antonia Wachter-Zeh:
Decoding High-Order Interleaved Rank-Metric Codes. 19-24 - Sven Puchinger, Julian Renner, Antonia Wachter-Zeh, Jens Zumbrägel:
Efficient Decoding of Gabidulin Codes over Galois Rings. 25-30 - Wrya K. Kadir, Chunlei Li, Ferdinando Zullo:
On interpolation-based decoding of a class of maximum rank distance codes. 31-36 - Mohammad Mahdi Mahvari, Mari Kobayashi, Abdellatif Zaidi:
Scalable Vector Gaussian Information Bottleneck. 37-42 - Teng-Hui Huang, Aly El Gamal:
A Provably Convergent Information Bottleneck Solution via ADMM. 43-48 - Yuheng Bu, Tony Wang, Gregory W. Wornell:
SDP Methods for Sensitivity-Constrained Privacy Funnel and Information Bottleneck Problems. 49-54 - Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Philippe Gaborit:
Zero-Knowledge Reparation of the Véron and AGS Code-based Identification Schemes. 55-60 - Khaled Taleb, Meryem Benammar:
On the information leakage of finite block-length wiretap polar codes. 61-65 - Xuan Guang, Yang Bai, Raymond W. Yeung:
Secure Network Function Computation. 66-71 - Sijie Li, Rawad Bitar, Sidharth Jaggi, Yihan Zhang:
Network Coding with Myopic Adversaries. 72-77 - Qifa Yan, Daniela Tuninetti:
Robust and Secure Cache-aided Private Linear Function Retrieval from Coded Servers. 78-83 - Emna Ben Yacoub:
List Message Passing Decoding of Non-binary Low-Density Parity-Check Codes. 84-89 - Mengnan Xu, Dan Zeng, Zhichao Sheng, Zhonghao Zhang, Chongbin Xu:
Some Results on Density Evolution of Nonbinary SC-LDPC Ensembles Over the BEC. 90-95 - Gada Rezgui, Iryna Andriyanova, Asma Maaloui, Charly Poulliat:
A Class of Non-Binary Doubly-Generalized LDPC codes for Moderate and High Code Rates. 96-100 - Taposh Banerjee, Ahmad F. Taha, Eugene John:
Robust Quickest Change Detection in Statistically Periodic Processes. 101-105 - Zhongchang Sun, Shaofeng Zou:
Quickest Dynamic Anomaly Detection in Anonymous Heterogeneous Sensor Networks. 106-111 - Qunzhi Xu, Yajun Mei:
Multi-Stream Quickest Detection with Unknown Post-Change Parameters Under Sampling Control. 112-117 - Andreas Bluhm, Ángela Capel, Zentrum Mathematik, Antonio Pérez-Hernández:
Weak Quasi-Factorization for the Belavkin-Staszewski Relative Entropy. 118-123 - Touheed Anwar Atif, S. Sandeep Pradhan:
Distributed Quantum Faithful Simulation and Function Computation Using Algebraic Structured Measurements. 124-129 - Anurag Anshu, Shima Bab Hadiashar, Rahul Jain, Ashwin Nayak, Dave Touchette:
One-Shot Quantum State Redistribution and Quantum Markov Chains. 130-135 - Ke Wu, Aaron B. Wagner:
A Practical Coding Scheme for the BSC with Feedback. 136-141 - Amaael Antonini, Rita Gimelshein, Richard D. Wesel:
Causal (Progressive) Encoding over Binary Symmetric Channels with Noiseless Feedback. 142-147 - Nian Guo, Victoria Kostina:
Instantaneous SED coding over a DMC. 148-153 - Sven Puchinger, Johan Rosenkilde:
Bounds on List Decoding of Linearized Reed-Solomon Codes. 154-159 - Hannes Bartz, Sven Puchinger:
Decoding of Interleaved Linearized Reed-Solomon Codes with Applications to Network Coding. 160-165 - Ba-Duc Pham, Pierre Loidreau:
On the decoding of the sum of Gabidulin codes. 166-171 - Jiachun Pan, Yonglong Li, Vincent Y. F. Tan:
Asymptotics of Sequential Composite Hypothesis Testing under Probabilistic Constraints. 172-177 - Sung-Wen Lan, I-Hsiang Wang:
Heterogeneous Sequential Hypothesis Testing with Active Source Selection under Budget Constraints. 178-183 - Parham Boroumand, Albert Guillén i Fàbregas:
Error Exponent Sensitivity of Sequential Probability Ratio Testing. 184-189 - Shi-Yuan Wang, Matthieu R. Bloch:
Explicit Design of Provably Covert Channel Codes. 190-195 - Meng-Che Chang, Matthieu R. Bloch:
Covert Authentication Against a Myopic Adversary. 196-201 - Hassan ZivariFard, Matthieu R. Bloch, Aria Nosratinia:
Covert Communication via Non-Causal Cribbing from a Cooperative Jammer. 202-207 - Arman Sharififar, Parastoo Sadeghi, Neda Aboutorab:
Broadcast Rate Requires Nonlinear Coding in a Unicast Index Coding Instance of Size 36. 208-213 - Prasad Krishnan, Rogers Mathew, Subrahmanyam Kalyanasundaram:
Pliable Index Coding via Conflict-Free Colorings of Hypergraphs. 214-219 - Kota Srinivas Reddy, Nujoom Sageer Karat, Nikhil Karamchandani:
On the Optimal Transmission Rate for Symmetric Index Coding Problems. 220-225 - Irina E. Bocharova, Boris D. Kudryashov, Vitaly Skachek:
Euclidean Distance Spectra of Irregular NB LDPC Coded QAM Signals with Optimized Mappings. 226-231 - Tadashi Wadayama, Satoshi Takabe:
Proximal Decoding for LDPC-coded Massive MIMO Channels. 232-237 - Ilya Dumer, Navid Gharavi:
Codes approaching the Shannon limit with polynomial complexity per information bit. 238-243 - Eli Chien, Olgica Milenkovic, Angelia Nedich:
Support Estimation with Sampling Artifacts and Errors. 244-249 - Fumito Tagashira, Tomoyuki Obuchi, Toshiyuki Tanaka:
Sharp Asymptotics of Matrix Sketching for a Rank-One Spiked Model. 250-255 - Stefano Della Fiore, Simone Costa, Marco Dalai:
New upper bounds for (b, k)-hashing. 256-261 - Rahul Jain:
Chain-Rules for Channel Capacity. 262-267 - Uzi Pereg:
Bosonic Dirty Paper Coding. 268-271 - Omar Fawzi, Ala Shayeghi, Hoang Ta:
A hierarchy of efficient bounds on quantum capacities exploiting symmetry. 272-277 - Wafa Labidi, Holger Boche, Christian Deppe, Moritz Wiese:
Identification over the Gaussian Channel in the Presence of Feedback. 278-283 - Alireza Vahid:
Distortion-Based Outer-Bounds for Channels with Rate-Limited Feedback. 284-289 - V Arvind Rameshwar, Navin Kashyap:
Bounds on the Feedback Capacity of the ($d, \infty$)-RLL Input-Constrained Binary Erasure Channel. 290-295 - Yang Xu, Haibin Kan, Guangyue Han:
Fourier-Reflexive Partitions Induced by Poset Metric. 296-301 - Dor Elimelech, Marcelo Firer, Moshe Schwartz:
The Generalized Covering Radii of Linear Codes. 302-307 - Takayuki Nozaki:
Distance Enumerators for Number-Theoretic Codes. 308-313 - Xiangxiang Xu, Shao-Lun Huang:
An Information Theoretic Framework for Distributed Learning Algorithms. 314-319 - Basak Güler, Aylin Yener:
Energy-Harvesting Distributed Machine Learning. 320-325 - Jayadev Acharya, Clément L. Canonne, Yuhan Liu, Ziteng Sun, Himanshu Tyagi:
Interactive Inference under Information Constraints. 326-331 - Jeremiah Blocki, Elena Grigorescu, Tamalika Mukherjee:
Differentially-Private Sublinear-Time Clustering. 332-337 - Antonious M. Girgis, Deepesh Data, Suhas N. Diggavi:
Differentially Private Federated Learning with Shuffling and Client Self-Sampling. 338-343 - Shahab Asoodeh, Wei-Ning Chen, Flávio P. Calmon, Ayfer Özgür:
Differentially Private Federated Learning: An Information-Theoretic Perspective. 344-349 - Hui Zhao, Antonio Bazco Nogueras, Petros Elia:
Wireless Coded Caching With Shared Caches Can Overcome the Near-Far Bottleneck. 350-355 - Rina Su, Qifu Tyler Sun, Zhongshan Zhang:
On the Delay of Random Linear Network Coding in Full-Duplex Relay Networks. 356-361 - Juwendo Denis, Hulya Seferoglu:
Efficient network coding scheme for disjoint clusters of D2D networks and cellular communications. 362-367 - Farzane Amirzade, Mohammad-Reza Sadeghi, Daniel Panario:
Quasi-Cyclic Protograph-Based Raptor-Like LDPC Codes With Girth 6 and Shortest Length. 368-373 - Huaan Li, Baoming Bai, Hengzhou Xu, Chao Chen:
Construction of Algebraic-Based Variable-Rate QC-LDPC Codes. 374-379 - Roxana Smarandache, David G. M. Mitchell:
Necessary and Sufficient Girth Conditions for Tanner Graphs of Quasi-Cyclic LDPC Codes. 380-385 - Liyan Xie, Yao Xie:
Optimality of Graph Scanning Statistic for Online Community Detection. 386-390 - Changlong Wu, Narayana Santhanam:
Estimating Properties of Dynamic Graphical Models. 391-395 - Lan V. Truong:
Linear Models with Hidden Markov Sources via Replica Method. 396-401 - Masahito Hayashi, Ning Cai:
Universal classical-quantum multiple access channel coding. 402-407 - Haowei Shi, Min-Hsiu Hsieh, Saikat Guha, Zheshen Zhang, Quntao Zhuang:
Entanglement-assisted multiple-access channels: capacity regions and protocol designs. 408-413 - Touheed Anwar Atif, Arun Padakandla, S. Sandeep Pradhan:
Computing Sum of Sources over a Classical-Quantum MAC. 414-419 - Wael Alghamdi, Flávio P. Calmon:
Polynomial Approximations of Conditional Expectations in Scalar Gaussian Channels. 420-425 - Antonino Favano, Marco Ferrari, Maurizio Magarini, Luca Barletta:
The Capacity of the Amplitude-Constrained Vector Gaussian Channel. 426-431 - Shuai Ma, Michèle A. Wigger:
First- and Second-Moment Constrained Gaussian Channels. 432-437 - Hiram H. López, Gretchen L. Matthews, Daniel Valvo:
Augmented Reed-Muller Codes of High Rate and Erasure Repair. 438-443 - Changjiang Ji, Yan Xu, Sihuang Hu:
Extended Cyclic Codes Sandwiched Between Reed-Muller Codes. 444-449 - Maiara F. Bollauf, Øyvind Ytrehus:
Tiling of Constellations. 450-454 - Yandong Shi, Yong Zhou, Yuanming Shi:
Over-the-Air Decentralized Federated Learning. 455-460 - Emre Ozfatura, Kerem Ozfatura, Deniz Gündüz:
Time-Correlated Sparsification for Communication-Efficient Federated Learning. 461-466 - Emre Ozfatura, Kerem Ozfatura, Deniz Gündüz:
FedADC: Accelerated Federated Learning with Drift Control. 467-472 - Rafael G. L. D'Oliveira, Muriel Médard, Parastoo Sadeghi:
Differential Privacy for Binary Functions via Randomized Graph Colorings. 473-478 - Jun Xu, Xiaodong Wang, Pengcheng Zhu, Xiaohu You:
Joint Differentially Private Channel Estimation in Cell-free Hybrid Massive MIMO. 479-484 - Sayak Ray Chowdhury, Xingyu Zhou, Ness B. Shroff:
Adaptive Control of Differentially Private Linear Quadratic Systems. 485-490 - Jiun-Ting Huang, Young-Han Kim:
Two-Way Token Passing Channels. 491-496 - Vinayak Suresh, Eric Ruzomberka, David J. Love:
Stochastic-Adversarial Channels: Online Adversaries With Feedback Snooping. 497-502 - Syomantak Chaudhuri, Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Compound Arbitrarily Varying Channels. 503-508 - Sven Puchinger, Johan Rosenkilde, Grigory Solomatov:
Improved Power Decoding of Algebraic Geometry Codes. 509-514 - Gretchen L. Matthews, Aidan W. Murphy, Welington Santos:
Fractional decoding of codes from Hermitian curves. 515-520 - Yunqi Wan, Li Chen, Fangguo Zhang:
Algebraic Soft Decoding of Elliptic Codes. 521-526 - Sanae Amani, Mahnoosh Alizadeh, Christos Thrampoulidis:
Regret Bounds for Safe Gaussian Process Bandit Optimization. 527-532 - Chengshuai Shi, Cong Shen:
An Attackability Perspective on No-Sensing Adversarial Multi-player Multi-armed Bandits. 533-538 - Cem Kalkanli, Ayfer Özgür:
Asymptotic Performance of Thompson Sampling in the Batched Multi-Armed Bandits. 539-544 - Shahab Asoodeh, Maryam Aliakbarpour, Flávio P. Calmon:
Local Differential Privacy Is Equivalent to Contraction of an $f$-Divergence. 545-550 - Ni Ding, Yucheng Liu, Farhad Farokhi:
A Linear Reduction Method for Local Differential Privacy and Log-lift. 551-556 - Milan Lopuhaä-Zwakenberg, Jasper Goseling:
Robust Local Differential Privacy. 557-562 - Lakshmi Prasad Natarajan, Smiju Kodamthuruthil Joy:
Permute & Add Network Codes via Group Algebras. 563-568 - Liwen Liu, Jinbei Zhang, Xinyu Xie:
Intension between Two Layers of Coded Caching Networks. 569-574 - Arman Sharififar, Neda Aboutorab, Parastoo Sadeghi:
Update-based Maximum Column Distance Coding Scheme for Index Coding Problem. 575-580 - Min Qiu, Xiaowei Wu, Jinhong Yuan, Alexandre Graell i Amat:
Generalized Spatially Coupled Parallel Concatenated Convolutional Codes With Partial Repetition. 581-586 - Siyi Yang, Ahmed H. Hareedy, Shyam Venkatasubramanian, A. Robert Calderbank, Lara Dolecek:
GRADE-AO: Towards Near-Optimal Spatially-Coupled Codes With High Memories. 587-592 - Toshiaki Koike-Akino, Ye Wang:
Protograph-Based Design for QC Polar Codes. 593-598 - Zhongchang Sun, Qunwei Li, Ruizhi Zhang, Shaofeng Zou:
A Computationally Efficient Algorithm for Quickest Change Detection in Anonymous Heterogeneous Sensor Networks. 599-604 - Anamitra Chaudhuri, Georgios Fellouris, Ali Tajer:
Sequential Change Detection of a Correlation Structure under a Sampling Constraint. 605-610 - Sundara Rajan Srinivasavaradhan, Pavlos Nikolopoulos, Christina Fragouli, Suhas N. Diggavi:
An entropy reduction approach to continual testing. 611-616 - Rémi A. Chou:
Private Classical Communication over Quantum Multiple-Access Channels. 617-622 - Sayantan Chakraborty, Aditya Nema, Pranab Sen:
A multi-sender decoupling theorem and simultaneous decoding for the quantum MAC. 623-627 - Sayantan Chakraborty, Aditya Nema, Pranab Sen:
Novel one-shot inner bounds for unassisted fully quantum channels via rate splitting. 628-633 - Neil Irwin Bernardo, Jingge Zhu, Jamie S. Evans:
Is Phase Shift Keying Optimal for Channels with Phase-Quantized Output? 634-639 - Andrea Cacioppo, Janis Nötzel, Matteo Rosati:
Compound Channel Capacities under Energy Constraints and Application. 640-645 - Thuan Nguyen, Thinh Nguyen:
Optimal Thresholding Quantizer Maximizing Mutual Information of Discrete Multiple-Input Continuous One-Bit Output Quantization. 646-651 - Jiasheng Yuan, Jiongyue Xing, Li Chen:
Plausibility Analysis of Shift-Sum Decoding for Cyclic Codes. 652-657 - Thomas Jerkovits, Vladimir Sidorenko, Antonia Wachter-Zeh:
Decoding of Space-Symmetric Rank Errors. 658-663 - Hedongliang Liu, Sabine Pircher, Alexander Zeh, Antonia Wachter-Zeh:
Decoding of (Interleaved) Generalized Goppa Codes. 664-669 - Ruida Zhou, Chao Tian, Tie Liu:
Individually Conditional Individual Mutual Information Bound on Generalization Error. 670-675 - Pradeep Kr. Banerjee, Guido Montúfar:
Information Complexity and Generalization Bounds. 676-681 - Gholamali Aminian, Laura Toni, Miguel R. D. Rodrigues:
Information-Theoretic Bounds on the Moments of the Generalization Error of Learning Algorithms. 682-687 - Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Communication With Adversary Identification in Byzantine Multiple Access Channels. 688-693 - Hua Sun:
Compound Secure Groupcast: Key Assignment for Selected Broadcasting. 694-699 - Matthias Frey, Igor Bjelakovic, Slawomir Stanczak:
Towards Secure Over-The-Air Computation. 700-705 - K. K. Krishnan Namboodiri, B. Sundar Rajan:
Optimal Demand Private Coded Caching for Users with Small Buffers. 706-711 - Hamidreza Bakhshzad Mahmoodi, Mohammad Javad Salehi, Antti Tölli:
Non-Symmetric Coded Caching for Location-Dependent Content Delivery. 712-717 - Eleftherios Lampiris, Hamdi Joudeh, Giuseppe Caire, Petros Elia:
Coded Caching under Asynchronous Demands. 718-723 - Gustavo Kasper Facenda, Elad Domanovitz, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:
Streaming Erasure Codes over Multi-Access Relay Networks. 724-729 - Pin-Wen Su, Yu-Chih Huang, Shih-Chun Lin, I-Hsiang Wang, Chih-Chun Wang:
Random Linear Streaming Codes in the Finite Memory Length and Decoding Deadline Regime. 730-735 - Myna Vajha, Vinayak Ramkumar, M. Nikhil Krishnan, P. Vijay Kumar:
Explicit Rate-Optimal Streaming Codes with Smaller Field Size. 736-741 - Donald Q. Adams, Adarsh Barik, Jean Honorio:
Information-Theoretic Bounds for Integral Estimation. 742-747 - Amedeo Roberto Esposito, Michael Gastpar:
Lower-bounds on the Bayesian Risk in estimation procedures via Sibson's $\alpha$-Mutual Information. 748-753 - Xiaohan Kang, Bruce E. Hajek:
Lower Bounds on Information Requirements for Causal Network Inference. 754-759 - Touheed Anwar Atif, Arun Padakandla, S. Sandeep Pradhan:
Achievable rate-region for 3 - User Classical-Quantum Interference Channel using Structured Codes. 760-765 - Evan J. D. Anderson, Saikat Guha, Boulat A. Bash:
Fundamental Limits of Bosonic Broadcast Channels. 766-771 - Uzi Pereg, Christian Deppe, Holger Boche:
Quantum Broadcast Channels with Cooperating Decoders: An Information-Theoretic Perspective on Quantum Repeaters. 772-777 - Dadja Anade, Jean-Marie Gorce, Philippe Mary, Samir M. Perlaza:
Saddlepoint Approximations of Cumulative Distribution Functions of Sums of Random Vectors. 778-783 - Lin Zhou, Alfred O. Hero III:
Achievable Resolution Limits for the Noisy Adaptive 20 Questions Problem. 784-789 - Lin Zhou, Alfred O. Hero III:
Resolution Limits of Non-Adaptive 20 Questions Estimation for Multiple Targets. 790-795 - Cristina Fernández-Córdoba, Carlos Vela, Mercè Villanueva:
On the Linearity and Structure of Z2s-Linear Simplex and MacDonald Codes. 796-800 - Patrick Solé, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Bent Sequences over Hadamard Codes for Physically Unclonable Functions. 801-806 - Mahdi Soleymani, Hessam Mahdavifar:
New Packings in Grassmannian Space. 807-812 - Jared Tanner, Giuseppe Ughi:
Mutual Information of Neural Network Initialisations: Mean Field Approximations. 813-818 - David Gamarnik, Eren C. Kizildag, Ilias Zadik:
Self-Regularity of Output Weights for Overparameterized Two-Layer Neural Networks. 819-824 - Daria Reshetova, Yikun Bai, Xiugang Wu, Ayfer Özgür:
Understanding Entropic Regularization in GANs. 825-830 - Morteza Soltani, Zouheir Rezki:
The Rate-Equivocation Region of the Degraded Discrete-Time Poisson Wiretap Channel. 831-836 - Jean de Dieu Mutangana, Ravi Tandon, Ziv Goldfeld, Shlomo Shamai Shitz:
Wiretap Channel with Latent Variable Secrecy. 837-842 - Yiqi Chen, Dan He, Chenhao Ying, Yuan Luo:
Strong Secrecy of Arbitrarily Varying Wiretap Channels with Constraints by Stochastic Code. 843-848 - Minquan Cheng, Dequan Liang, Kai Wan, Mingming Zhang, Giuseppe Caire:
A Novel Transformation Approach of Shared-link Coded Caching Schemes for Multiaccess Networks. 849-854 - Pooja Nayak Muralidhar, B. Sundar Rajan:
Multi-access Coded Caching from a New Class of Cross Resolvable Designs. 855-860 - Shanuja Sasi, B. Sundar Rajan:
Multi-access Coded Caching Scheme with Linear Sub-packetization using PDAs. 861-866 - Amit Berman, Sarit Buzaglo, Avner Dor, Yaron Shany, Itzhak Tamo:
Repairing Reed-Solomon Codes Evaluated on Subspaces. 867-871 - Magali Bardet, Rocco Mora, Jean-Pierre Tillich:
Decoding Reed-Solomon codes by solving a bilinear system with a Gröbner basis approach. 872-877 - Vinayak Ramkumar, Myna Vajha, P. Vijay Kumar:
Generalized Simple Streaming Codes from MDS Codes. 878-883 - Songtao Feng, Jing Yang:
Adaptive Surveillance Testing for Efficient Infection Rate Estimation. 884-889 - Belhal Karimi, Ping Li:
Two-Timescale Stochastic EM Algorithms. 890-895 - Kang Du, Yu Xiang:
Causal Inference Using Linear Time-Varying Filters with Additive Noise. 896-901 - Matteo Rosati:
Performance of Coherent Frequency-Shift Keying for Classical Communication on Quantum Channels. 902-905 - Dawei Ding, Sumeet Khatri, Yihui Quek, Peter W. Shor, Xin Wang, Mark M. Wilde:
Upper bound on the classical capacity of a quantum channel assisted by classical feedback. 906-911 - Holger Boche, Minglai Cai, H. Vincent Poor, Rafael F. Schaefer:
Detectability of Denial-of-Service Attacks on Arbitrarily Varying Classical-Quantum Channels. 912-917 - Neri Merhav:
On Error Exponents of Encoder-Assisted Communication Systems. 918-923 - Ran Tamir Averbuch, Neri Merhav:
Trade-Offs Between Error and Excess-Rate Exponents of Typical Slepian-Wolf Codes. 924-929 - Giuseppe Cocco, Albert Guillén i Fàbregas, Josep Font-Segura:
A Dual-Domain Achievability of the Typical Error Exponent. 930-933 - Nikita Polyanskii:
Two-Stage Coding over the Z-Channel. 934-939 - Mira Gonen, Michael Langberg, Alex Sprintson:
Minimizing the Alphabet Size in Codes with Restricted Error Sets. 940-945 - Xiaopeng Cheng, Ximing Fu, Yuanxin Guo, Kenneth W. Shum, Shenghao Yang:
Successively Solvable Shift-Add Systems - a Graphical Characterization. 946-951 - Fredrik Hellström, Giuseppe Durisi:
Fast-Rate Loss Bounds via Conditional Information Measures with Applications to Neural Networks. 952-957 - Weixin Liang, James Zou:
Neural Group Testing to Accelerate Deep Learning. 958-963 - Jeremy Johnston, Xiaodong Wang:
Model-Based Neural Networks for Massive and Sporadic Connectivity. 964-969 - Rumia Sultana, Rémi A. Chou:
Low-Complexity Secret Sharing Schemes Using Correlated Random Variables and Rate-Limited Public Communication. 970-975 - Donald Q. Adams, Hemanta K. Maji, Hai H. Nguyen, Minh L. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang:
Lower Bounds for Leakage-Resilient Secret-Sharing Schemes against Probing Attacks. 976-981 - Seunghoan Song, Masahito Hayashi:
Equivalence of Non-Perfect Secret Sharing and Symmetric Private Information Retrieval with General Access Structure. 982-987 - Venkatesan Guruswami, Andrii Riazanov:
Linear Shannon Capacity of Cayley Graphs. 988-992 - Lei Yu, Venkat Anantharam, Jun Chen:
Type Graphs and Small-Set Expansion. 993-998 - Himanshu Asnani, Jeff A. Bilmes, Rishabh K. Iyer:
Independence Properties of Generalized Submodular Information Measures. 999-1004 - Fan Zhou, Arini Fitri, Khoirul Anwar, Brian M. Kurkoski:
Encoding and Decoding Construction D' Lattices for Power-Constrained Communications. 1005-1010 - Obed Rhesa Ludwiniananda, Ning Liu, Khoirul Anwar, Brian M. Kurkoski:
Design of Polar Code Lattices of Finite Dimension. 1011-1016 - Shen Li, Ali Mirani, Magnus Karlsson, Erik Agrell:
Designing Voronoi Constellations to Minimize Bit Error Rate. 1017-1022 - Mario Díaz, Peter Kairouz, Jiachun Liao, Lalitha Sankar:
Neural Network-based Estimation of the MMSE. 1023-1028 - Kordag Mehmet Kilic, Jehoshua Bruck:
Neural Network Computations with DOMINATION Functions. 1029-1034 - Xu Wang, Ali Al-Bashabsheh, Chao Zhao, Chung Chan:
Adaptive Label Smoothing for Classifier-based Mutual Information Neural Estimation. 1035-1040 - Mehrdad Tahmasbi, Boulat A. Bash, Saikat Guha, Matthieu R. Bloch:
Signaling for Covert Quantum Sensing. 1041-1045 - Matteo Allaix, Lukas Holzbaur, Tefjol Pllaha, Camilla Hollanti:
High-Rate Quantum Private Information Retrieval with Weakly Self-Dual Star Product Codes. 1046-1051 - Seunghoan Song, Masahito Hayashi:
Quantum Private Information Retrieval for Quantum Messages. 1052-1057 - Siyuan Wang, Qifa Yan, Jingjing Zhang, Jianping Wang, Linqi Song:
Coded Alternating Least Squares for Straggler Mitigation in Distributed Recommendations. 1058-1063 - Elahe Vedadi, Hulya Seferoglu:
Adaptive Coding for Matrix Multiplication at Edge Networks. 1064-1069 - Michael Rudow, K. V. Rashmi, Venkatesan Guruswami:
A locality-based lens for coded computation. 1070-1075 - Mikhail Kamenev:
Sequential Decoding of High-Rate Reed-Muller Codes. 1076-1081 - Dorsa Fathollahi, Nariman Farsad, Seyyed Ali Hashemi, Marco Mondelli:
Sparse Multi-Decoder Recursive Projection Aggregation for Reed-Muller Codes. 1082-1087 - Mohammad Vahid Jamali, Xiyang Liu, Ashok Vardhan Makkuva, Hessam Mahdavifar, Sewoong Oh, Pramod Viswanath:
Reed-Muller Subcodes: Machine Learning-Aided Design of Efficient Soft Recursive Decoding. 1088-1093 - Septimia Sarbu, Abdellatif Zaidi:
On Learning Parametric Distributions from Quantized Samples. 1094-1099 - Min-Oh Jeong, Alex Dytso, Martina Cardone:
Retrieving Data Permutations from Noisy Observations: High and Low Noise Asymptotics. 1100-1105 - Luca Corinzia, Paolo Penna, Wojciech Szpankowski, Joachim M. Buhmann:
On maximum-likelihood estimation in the all-or-nothing regime. 1106-1111 - Zhusheng Wang, Karim Banawan, Sennur Ulukus:
An Information-Theoretic Scheme for Multi-Party Private Set Intersection. 1112-1117 - Swanand Kadhe, Nived Rajaraman, Kannan Ramchandran:
FastShare: Scalable Secret Sharing by Leveraging Locality. 1118-1123 - Yizhou Zhao, Hua Sun:
Information Theoretic Secure Aggregation with User Dropouts. 1124-1129 - Anelia Somekh-Baruch:
Robust Multicasting and an Upper Bound on the Mismatch Capacity of the DMC. 1130-1135 - Ehsan Asadi Kangarshahi, Albert Guillén i Fàbregas:
A Sphere-Packing Exponent for Mismatched Decoding. 1136-1141 - Marco Bondaschi, Albert Guillén i Fàbregas, Marco Dalai:
Zero-rate Reliability Function for Mismatched Decoding. 1142-1146 - Onur Günlü, Jörg Kliewer, Rafael F. Schaefer, Vladimir Sidorenko:
Doubly-Exponential Identification via Channels: Code Constructions and Bounds. 1147-1152 - Yunxiang Yao, Wai Ho Mow:
Optimal Index Assignment for Scalar Quantizers and M-PSK via a Discrete Convolution-Rearrangement Inequality. 1153-1158 - Gerhard Kramer:
Divergence Scaling for Distribution Matching. 1159-1163 - Qiuling Xu, Kevin Bello, Jean Honorio:
A Le Cam Type Bound for Adversarial Learning and Applications. 1164-1169 - Chuteng Zhou, Quntao Zhuang, Matthew Mattina, Paul N. Whatmough:
Strong data processing inequality in neural networks with noisy neurons and its implications. 1170-1175 - Arezou Rezazadeh, Sharu Theresa Jose, Giuseppe Durisi, Osvaldo Simeone:
Conditional Mutual Information-Based Generalization Bound for Meta Learning. 1176-1181 - Zihao Gong, Christos N. Gagatsos, Saikat Guha, Boulat A. Bash:
Fundamental Limits of Loss Sensing over Bosonic Channels. 1182-1187 - Hao-Chung Cheng, Andreas J. Winter, Nengkun Yu:
Discrimination of quantum states under locality constraints in the many-copy setting. 1188-1193 - Farzin Salek, Masahito Hayashi, Andreas J. Winter:
Asymptotic Separation Between Adaptive and Non-adaptive Strategies in Quantum Channel Discrimination. 1194-1199 - Chung-Yi Lin, Victoria Kostina, Babak Hassibi:
Differentially Quantized Gradient Descent. 1200-1205 - Mahdi Soleymani, Ramy E. Ali, Hessam Mahdavifar, Amir Salman Avestimehr:
List-Decodable Coded Computing: Breaking the Adversarial Toleration Barrier. 1206-1211 - Navjot Singh, Deepesh Data, Jemin George, Suhas N. Diggavi:
SQuARM-SGD: Communication-Efficient Momentum SGD for Decentralized Optimization. 1212-1217 - Hanwen Yao, Arman Fazeli, Alexander Vardy:
A Deterministic Algorithm for Computing the Weight Distribution of Polar Codes. 1218-1223 - Yuan Li, Huazi Zhang, Rong Li, Jun Wang, Guiying Yan, Zhiming Ma:
On the Weight Spectrum of Pre-Transformed Polar Codes. 1224-1229 - Marvin Geiselhart, Ahmed Elkelesh, Moustafa Ebada, Sebastian Cammerer, Stephan ten Brink:
On the Automorphism Group of Polar Codes. 1230-1235 - Batuhan Arasli, Sennur Ulukus:
Graph and Cluster Formation Based Group Testing. 1236-1241 - Surin Ahn, Wei-Ning Chen, Ayfer Özgür:
Adaptive Group Testing on Networks with Community Structure. 1242-1247 - Larkin Flodin, Arya Mazumdar:
Probabilistic Group Testing with a Linear Number of Tests. 1248-1253 - Alireza Poostindouz, Reihaneh Safavi-Naini:
Second-Order Asymptotics for One-way Secret Key Agreement. 1254-1259 - Carlos Aguilar Melchor, Nicolas Aragon, Victor Dyseryn, Philippe Gaborit:
Fast and Secure Key Generation for Low Rank Parity Check Codes Cryptosystems. 1260-1265 - Alexander Nilsson, Irina E. Bocharova, Boris D. Kudryashov, Thomas Johansson:
A Weighted Bit Flipping Decoder for QC-MDPC-based Cryptosystems. 1266-1271 - Amos Lapidoth, Gian Marti, Yiming Yan:
Other Helper Capacities. 1272-1277 - Cihan Tepedelenlioglu:
Channel Inclusion Beyond Discrete Memoryless Channels. 1278-1283 - Dror Drach, Or Ordentlich, Ofer Shayevitz:
Binary Maximal Correlation Bounds and Isoperimetric Inequalities via Anti-Concentration. 1284-1289 - Andreas Lenz, Rawad Bitar, Antonia Wachter-Zeh, Eitan Yaakobi:
Function-Correcting Codes. 1290-1295 - Yiheng Zhang, Ximing Fu, Xuanchen Wu, Shenghao Yang, Kenneth W. Shum:
Solving Monoshift Systems and Applications in Random Coding. 1296-1301 - Venkatesan Guruswami, Andrii Riazanov:
Linear Programming Bounds for Almost-Balanced Binary Codes. 1302-1307 - Olusola Tolulope Odeyomi, Gergely V. Záruba:
Differentially-Private Federated Learning with Long-Term Constraints Using Online Mirror Descent. 1308-1313 - Zitao Li, Jean Honorio:
Regularized Loss Minimizers with Local Data Perturbation: Consistency and Data Irrecoverability. 1314-1319 - Ye Wang, Shuchin Aeron, Adnan Siraj Rakin, Toshiaki Koike-Akino, Pierre Moulin:
Robust Machine Learning via Privacy/ Rate-Distortion Theory. 1320-1325 - Masahito Hayashi, Kun Fang, Kun Wang:
Finite Block Length Analysis on Quantum Coherence Distillation and Incoherent Randomness Extraction. 1326-1331 - Yichen Huang:
Entanglement Dynamics from Random Product States at Long Times. 1332-1337 - Yuwen Huang, Pascal O. Vontobel:
Sets of Marginals and Pearson-Correlation-based CHSH Inequalities for a Two-Qubit System. 1338-1343 - Abbas El Gamal, Amin Gohari, Chandra Nair:
Strengthened Cutset Upper Bound on the Capacity of the Relay Channel and Applications. 1344-1349 - Sarthak Jain, Martina Cardone, Soheil Mohajer:
When an Energy-Efficient Scheduling is Optimal for Half-Duplex Relay Networks? 1350-1355 - Yan Hao Ling, Jonathan Scarlett:
Optimal Rates of Teaching and Learning Under Binary Symmetric Noise. 1356-1360 - Shashwat Silas:
Real-time oblivious erasure correction with linear time decoding and constant feedback. 1361-1366 - Nadim Ghaddar, Shouvik Ganguly, Lele Wang, Young-Han Kim:
A Lego-Brick Approach to Coding for Asymmetric Channels and Channels with State. 1367-1372 - Ismail Senöz, Albert Podusenko, Semih Akbayrak, Christoph Mathys, Bert de Vries:
The Switching Hierarchical Gaussian Filter. 1373-1378 - Lei Liu, Shunqi Huang, Brian M. Kurkoski:
Memory Approximate Message Passing. 1379-1384 - Keigo Takeuchi:
Bayes-Optimal Convolutional AMP. 1385-1390 - Carolina Naim, Rafael G. L. D'Oliveira, Salim El Rouayheb:
Private Multi-Group Aggregation. 1391-1396 - Masahito Hayashi:
Secure Modulo Sum via Multiple Access Channel. 1397-1402 - Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer:
Secure Multi-Function Computation with Private Remote Sources. 1403-1408 - Hoover H. F. Yin, Ka Hei Ng, Allen Z. Zhong, Raymond W. Yeung, Shenghao Yang:
Intrablock Interleaving for Batched Network Coding with Blockwise Adaptive Recoding. 1409-1414 - Hoover H. F. Yin, Ka Hei Ng:
Impact of Packet Loss Rate Estimation on Blockwise Adaptive Recoding for Batched Network Coding. 1415-1420 - Michael Langberg, Michelle Effros:
Edge removal in undirected networks. 1421-1426 - Jie Wang, Zhiyuan Jia, Hoover H. F. Yin, Shenghao Yang:
Small-Sample Inferred Adaptive Recoding for Batched Network Coding. 1427-1432 - Jinjun Cheng, Li Chen:
BCH Based U-UV Codes and Its Decoding. 1433-1438 - Yihan Zhang, Sidharth Jaggi, Amitalok J. Budkuley:
Tight List-Sizes for Oblivious AVCs under Constraints. 1439-1444 - Shota Saito, Toshiyasu Matsushima:
Evaluation of Error Probability of Classification Based on the Analysis of the Bayes Code: Extension and Example. 1445-1450 - Taishi Watanabe, Takeo Ohseki, Kosuke Yamazaki:
Deep Learning-Based Bit Reliability Based Decoding for Non-binary LDPC Codes. 1451-1456 - P. N. Karthik, Rajesh Sundaresan:
Learning to Detect an Odd Restless Markov Arm. 1457-1462 - Hyejin Park, Seiyun Shin, Kwang-Sung Jun, Jungseul Ok:
Transfer Learning in Bandits with Latent Continuity. 1463-1468 - Mohsen Heidari, Arun Padakandla, Wojciech Szpankowski:
A Theoretical Framework for Learning from Quantum Data. 1469-1474 - Saptarshi Chakraborty, Debolina Paul, Swagatam Das:
$t$-Entropy: A New Measure of Uncertainty with Some Applications. 1475-1480 - Jingzhen Hu, Qingzhong Liang, Narayanan Rengaswamy, A. Robert Calderbank:
CSS Codes that are Oblivious to Coherent Noise. 1481-1486 - Ashutosh Goswami, Mehdi Mhalla, Valentin Savin:
Quantum Polarization of Qudit Channels. 1487-1492 - Taro Shibayama, Manabu Hagiwara:
Permutation-Invariant Quantum Codes for Deletion Errors. 1493-1498 - Yingkai Ouyang:
Permutation-invariant quantum coding for quantum deletion channels. 1499-1503 - Efe Aras, Thomas A. Courtade:
Sharp Maximum-Entropy Comparisons. 1504-1509 - Erixhen Sula, Michael Gastpar:
Lower bound on relaxed Wyner's Common Information. 1510-1515 - Laigang Guo, Chun-Ming Yuan, Xiao-Shan Gao:
Lower Bound for Derivatives of Costa's Differential Entropy. 1516-1521 - Ming Li, Yupeng Jiang, Dongdai Lin:
Construction of De Bruijn Sequences from l-sequences. 1522-1527 - Sagi Marcovich, Tuvi Etzion, Eitan Yaakobi:
Balanced de Bruijn Sequences. 1528-1533 - Sharu Theresa Jose, Osvaldo Simeone:
An Information-Theoretic Analysis of the Impact of Task Similarity on Meta-Learning. 1534-1539 - Xuetong Wu, Jonathan H. Manton, Uwe Aickelin, Jingge Zhu:
Online Transfer Learning: Negative Transfer and Effect of Prior Knowledge. 1540-1545 - Samrat Mukhopadhyay, Abhishek Sinha:
Online Caching with Optimal Switching Regret. 1546-1551 - Kao-Yueh Kuo, I-Chun Chern, Ching-Yi Lai:
Decoding of Quantum Data-Syndrome Codes via Belief Propagation. 1552-1557 - July X. Li, Joseph M. Renes, Pascal O. Vontobel:
Pseudocodeword-based Decoding of Quantum Color Codes. 1558-1563 - Nithin Raveendran, Bane Vasic:
Trapping Set Analysis of Finite-Length Quantum LDPC Codes. 1564-1569 - Anindya Bijoy Das, Aditya Ramamoorthy:
Coded sparse matrix computation schemes that leverage partial stragglers. 1570-1575 - Weiqi Li, Zhen Chen, Zhiying Wang, Syed Ali Jafar, Hamid Jafarkhani:
Flexible Constructions for Distributed Matrix Multiplication. 1576-1581 - Viveck R. Cadambe, Flávio P. Calmon, Ateet Devulapalli, Haewon Jeong:
E-Approximate Coded Matrix Multiplication is Nearly Twice as Efficient as Exact Multiplication. 1582-1587 - Lei Liu, Chulong Liang, Junjie Ma, Li Ping:
Capacity Optimality of AMP in Coded Systems. 1588-1593 - Arman Fazeli, Alexander Vardy, Hanwen Yao:
List Decoding of Polar Codes: How Large Should the List Be to Achieve ML Decoding? 1594-1599 - Yonatan Urman, David Burshtein:
Efficient Maximum Likelihood Decoding of Polar Codes Over the Binary Erasure Channel. 1600-1605 - Lekshmi Ramesh, Chandra R. Murthy, Himanshu Tyagi:
Phase Transitions for Support Recovery from Gaussian Linear Measurements. 1606-1611 - Ivan Lau, Jonathan Jedwab:
Construction of binary matrices for near-optimal compressed sensing. 1612-1617 - Zhongxing Sun, Wei Cui, Yulong Liu:
Phase Transitions in Recovery of Structured Signals from Corrupted Measurements. 1618-1623 - Praneeth Kumar Vippathalla, Chung Chan, Navin Kashyap, Qiaoqiao Zhou:
Secret Key Agreement and Secure Omniscience of Tree-PIN Source with Linear Wiretapper. 1624-1629 - Moritz Wiese, Holger Boche:
Mosaics of combinatorial designs for privacy amplification. 1630-1635 - Charbel Saliba, Laura Luzzi, Cong Ling:
A reconciliation approach to key generation based on Module-LWE. 1636-1641 - Yirui Liu, John MacLaren Walsh:
Linear Complexity Entropy Regions. 1642-1647 - Jingbo Liu:
Soft Minoration: Solution to Cover's Problem In the Original Discrete Memoryless Setting. 1648-1652 - Cheuk Ting Li:
Infinite Divisibility of Information. 1653-1658 - Tingyao Xiong, Jonathan I. Hall:
Sieves for Binary Sequences with large SRS and SHG Contrast Ratios. 1659-1664 - P. Vijay Kumar, Dileep Dharmappa, Sugandh Mishra:
Interleaved $Z_{4}$-Linear Sequences with Improved Correlation for Satellite Navigation. 1665-1670 - Mahyar Shirvanimoghaddam:
On the Hamming Weight Distribution of Subsequences of Pseudorandom Sequences. 1671-1675 - Harshat Kumar, Dionysios S. Kalogerias, George J. Pappas, Alejandro Ribeiro:
Actor-only Deterministic Policy Gradient via Zeroth-order Gradient Oracles in Action Space. 1676-1681 - Chengzhuo Ni, Anru R. Zhang, Yaqi Duan, Mengdi Wang:
Learning Good State and Action Representations via Tensor Decomposition. 1682-1687 - Vrettos Moulos:
Bicausal Optimal Transport for Markov Chains via Dynamic Programming. 1688-1693 - Kui Cai, Han Mao Kiah, Mehul Motani, Tuan Thanh Nguyen:
Coding for Segmented Edits with Local Weight Constraints. 1694-1699 - Yonatan Yehezkeally, Nikita Polyanskii:
On Codes for the Noisy Substring Channel. 1700-1705 - Maria Abu Sini, Eitan Yaakobi:
On List Decoding of Insertions and Deletions under the Reconstruction Model. 1706-1711 - Aditya Ramamoorthy, Li Tang:
Numerically stable coded matrix computations via circulant and rotation matrix embeddings. 1712-1717 - Asit Kumar Pradhan, Anoosheh Heidarzadeh, Krishna R. Narayanan:
Asymptotic Analysis of Factored LT Codes for Distributed Matrix Multiplication. 1718-1723 - Anindya Bijoy Das, Aditya Ramamoorthy, Namrata Vaswani:
Efficient and Robust Distributed Matrix Computations via Convolutional Coding. 1724-1729 - Hanwen Yao, Hessam Mahdavifar, Arman Fazeli, Alexander Vardy:
Channel Combining for Nonstationary Polarization on Erasure Channels. 1730-1735 - Valerio Bioglio, Carlo Condo, Ingmar Land:
Sliding Window Polar Codes. 1736-1741 - Fariba Abbasi, Hessam Mahdavifar, Emanuele Viterbo:
Hybrid Non-Binary Repeated Polar Codes For Low-SNR Regime. 1742-1747 - Lekshmi Ramesh, Chandra R. Murthy, Himanshu Tyagi:
Multiple Support Recovery Using Very Few Measurements Per Sample. 1748-1753 - Mohammad Mehrabi, Aslan Tchamkerten:
Error-Correction for Sparse Support Recovery Algorithms. 1754-1759 - Hang Zhang, Ping Li:
Sparse Recovery with Shuffled Labels: Statistical Limits and Practical Estimators. 1760-1765 - Xiang Zhang, Kai Wan, Hua Sun, Mingyue Ji, Giuseppe Caire:
A New Design of Cache-aided Multiuser Private Information Retrieval with Uncoded Prefetching. 1766-1771 - Sajani Vithana, Karim Banawan, Sennur Ulukus:
Semantic Private Information Retrieval From MDS-Coded Databases. 1772-1777 - Yi-Sheng Su:
Private Information Retrieval Using Circulant Permutation Matrices or the Zero Matrix. 1778-1783 - Ryo Nomura, Hideki Yagi:
Optimum Intrinsic Randomness Rate with Respect to f -Divergences Using the Smooth Min Entropy. 1784-1789 - Anshuka Rangi, Massimo Franceschetti:
Channel Coding Theorems in Non-stochastic Information Theory. 1790-1795 - Amedeo Roberto Esposito, Diyuan Wu, Michael Gastpar:
On conditional Sibson's $\alpha$ -Mutual Information. 1796-1801 - Zhi Gu, Zhengchun Zhou, Avik Ranjan Adhikary, Yanghe Feng, Pingzhi Fan:
Construction of Golay-ZCZ Sequences with New Lengths. 1802-1805 - Ana-Isabel Gómez, Domingo Gómez-Pérez, Andrew Z. Tirkel:
Generalised GMW Sequences. 1806-1811 - Minghui Yang, Shiyuan Qiang, Keqin Feng, Dongdai Lin:
On the 4-Adic Complexity of Quaternary Sequences of Period $2p$ with Ideal Autocorrelation. 1812-1816 - Abram Magner:
On Dimension in Graph Convolutional Networks for Distinguishing Random Graph Models. 1817-1822 - Nishant Mehrotra, Eric Graves, Ananthram Swami, Ashutosh Sabharwal:
Minimax Bounds for Blind Network Inference. 1823-1828 - Ning Zhang, Weina Wang, Lele Wang:
Attributed Graph Alignment. 1829-1834 - Yuanyuan Tang, Hao Lou, Farzad Farnoud:
Error-correcting codes for short tandem duplications and at most $p$ substitutions. 1835-1840 - Alexander R. Block, Jeremiah Blocki:
Private and Resource-Bounded Locally Decodable Codes for Insertions and Deletions. 1841-1846 - Daniella Bar-Lev, Yotam Gershon, Omer Sabary, Eitan Yaakobi:
Decoding for Optimal Expected Normalized Distance over the t-Deletion Channel. 1847-1852 - Burak Hasircioglu, Jesús Gómez-Vilardebó, Deniz Gündüz:
Speeding Up Private Distributed Matrix Multiplication via Bivariate Polynomial Codes. 1853-1858 - Jie Li, Camilla Hollanti:
Improved Private and Secure Distributed Matrix Multiplication. 1859-1864 - Mahdi Soleymani, Hessam Mahdavifar, Amir Salman Avestimehr:
Analog Privacy-Preserving Coded Computing. 1865-1870 - Shih-Chun Lin, Chih-Chun Wang, I-Hsiang Wang, Yu-Chih Huang, Yi-Chun Lai:
On finite-length analysis and channel dispersion for broadcast packet erasure channels with feedback. 1871-1876 - Yuxin Liu, Michelle Effros:
Nested LDPC Codes for Random Access Communication. 1877-1882 - Recep Can Yavas, Victoria Kostina, Michelle Effros:
Variable-length Feedback Codes with Several Decoding Times for the Gaussian Channel. 1883-1888 - Maël Le Treust, Tobias J. Oechtering:
Continuous Random Variable Estimation is not Optimal for the Witsenhausen Counterexample. 1889-1894 - Rahul Arya, Chih-Yuan Chiu, Gireeja Ranade:
Stabilizability of Vector Systems with Uniform Actuation Unpredictability. 1895-1900 - Photios A. Stavrou, Mikael Skoglund:
New Formulation of NRDF to Compute Partially Observed Gaussian Processes with MSE Distortion. 1901-1906 - Islam Samy, Mohamed Adel Attia, Ravi Tandon, Loukas Lazos:
On the Capacity of Latent Variable Private Information Retrieval. 1907-1912 - Bar Sadeh, Yujie Gu, Itzhak Tamo:
Bounds on the Capacity of PIR over Graphs. 1913-1918 - Ruida Zhou, Chao Tian, Hua Sun, James S. Plank:
Two-Level Private Information Retrieval. 1919-1924 - Rami Ezzine, Moritz Wiese, Christian Deppe, Holger Boche:
Common Randomness Generation over Slow Fading Channels. 1925-1930 - Yanjun Han, Kedar Tatwawadi, Gowtham R. Kurri, Zhengqing Zhou, Vinod M. Prabhakaran, Tsachy Weissman:
Optimal Communication Rates and Combinatorial Properties for Common Randomness Generation. 1931-1936 - Aditya Narayan Ravi, Alireza Vahid, Ilan Shomorony:
Capacity of the Torn Paper Channel with Lost Pieces. 1937-1942 - Han Mao Kiah, Alexander Vardy, Hanwen Yao:
Efficient Bee Identification. 1943-1948 - Konstantin Makarychev, Miklós Z. Rácz, Cyrus Rashtchian, Sergey Yekhanin:
Batch Optimization for DNA Synthesis. 1949-1954 - Gabriel Arpino, Nicolò Grometto, Afonso S. Bandeira:
Group Testing in the High Dilution Regime. 1955-1960 - Thach V. Bui, Mahdi Cheraghchi, Thuc Dinh Nguyen:
Improved algorithms for non-adaptive group testing with consecutive positives. 1961-1966 - Nelvin Tan, Jonathan Scarlett:
An Analysis of the DD Algorithm for Group Testing with Size-Constrained Tests. 1967-1972 - Mahdi Cheraghchi, Ryan Gabrys, Olgica Milenkovic:
Semiquantitative Group Testing in at Most Two Rounds. 1973-1978 - Daniella Bar-Lev, Tuvi Etzion, Eitan Yaakobi:
On Levenshtein Balls with Radius One. 1979-1984 - Serge Kas Hanna, Rawad Bitar:
Detecting Deletions and Insertions in Concatenated Strings with Optimal Redundancy. 1985-1990 - Rawad Bitar, Serge Kas Hanna, Nikita Polyanskii, Ilya Vorobyev:
Optimal Codes Correcting Localized Deletions. 1991-1996 - Robert Graczyk, Amos Lapidoth, Yiming Yan:
Guessing a Tuple. 1997-2001 - Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar:
Evaluating Multiple Guesses by an Adversary via a Tunable Loss Function. 2002-2007 - Shigeaki Kuzuoka:
Asynchronous Guessing Subject to Distortion. 2008-2012 - Yulong You, Sian-Jheng Lin:
Efficient Codebook Constructions of AIVF Codes. 2013-2017 - Ken-ichi Iwata, Hirosuke Yamamoto:
AIVF Codes Based on Iterative Algorithm and Dynamic Programming. 2018-2023 - Hoover H. F. Yin, Xishi Wang, Ka Hei Ng, Russell W. F. Lai, Lucien K. L. Ng, Jack P. K. Ma:
On Multi-Channel Huffman Codes for Asymmetric-Alphabet Channels. 2024-2029 - J. Jon Ryu, Jiun-Ting Huang, Young-Han Kim:
On the Role of Eigendecomposition in Kernel Embedding. 2030-2035 - Chen-Hao Hsiao, I-Hsiang Wang:
Joint Clustering and Ranking from Heterogeneous Pairwise Comparisons. 2036-2041 - Neharika Jali, Nikhil Karamchandani, Sharayu Moharir:
Greedy $k$-Center from Noisy Distance Samples. 2042-2047 - D. Shivakrishna, Aaditya M. Nair, V. Lalitha:
A Field Size Bound and Constructions of Maximally Recoverable Codes with Hierarchical Locality. 2048-2053 - Lukas Holzbaur, Sven Puchinger, Eitan Yaakobi, Antonia Wachter-Zeh:
Correctable Erasure Patterns in Product Topologies. 2054-2059 - Tim Hellemans, Arti D. Yardi, Tejas Bodas:
Download time analysis for distributed storage systems with node failures. 2060-2065 - Farhad Mirkarimi, Nariman Farsad:
Neural Computation of Capacity Region of Memoryless Multiple Access Channels. 2066-2071 - Yihan Zhang:
Zero-Error Communication over Adversarial MACs. 2072-2077 - Kenneth Palacio-Baus, Natasha Devroye:
Achievable Error Exponents for Two-Way AWGN Channels. 2078-2083 - Grigorii Trofimiuk:
A Search Method for Large Polarization Kernels. 2084-2089 - Peter Trifonov:
Recursive Trellis Processing of Large Polarization Kernels. 2090-2095 - Min Ye:
On the extremal configurations of MAC polarization over erasure channels. 2096-2100 - Qian Yu, Yury Polyanskiy:
Broadcasting on Trees Near Criticality: Perturbation Theory. 2101-2106 - Anuran Makur, Elchanan Mossel, Yury Polyanskiy:
Reconstruction on 2D Regular Grids. 2107-2112 - Geewon Suh, Sangwoo Jeon, Changho Suh:
When to Use Graph Side Information in Matrix Completion. 2113-2118 - Zhusheng Wang, Sennur Ulukus:
Symmetric Private Information Retrieval with User-Side Common Randomness. 2119-2124 - Nahid Esmati, Anoosheh Heidarzadeh, Alex Sprintson:
Private Linear Transformation: The Joint Privacy Case. 2125-2130 - Nahid Esmati, Anoosheh Heidarzadeh, Alex Sprintson:
Private Linear Transformation: The Individual Privacy Case. 2131-2136 - Heecheol Yang, Sangwoo Hong, Jungwoo Lee:
Private and Secure Coded Computation in Straggler-Exploiting Distributed Matrix Multiplication. 2137-2142 - Saikiran Bulusu, Venkata Gandikota, Arya Mazumdar, Ankit Singh Rawat, Pramod K. Varshney:
Byzantine Resilient Distributed Clustering with Redundant Data Assignment. 2143-2148 - Kai Wan, Hua Sun, Mingyue Ji, Giuseppe Caire:
Secure Distributed Linearly Separable Computation. 2149-2154 - Yinfei Xu, Qizhou Guo, Jian Lu, Zhicheng Liu, Xuan Guang:
Two-Way Lossy Compression of Product Sources With a Helper. 2155-2160 - Naifu Zhang, Meixia Tao, Jia Wang:
Sum-Rate-Distortion Function for Indirect Multiterminal Source Coding in Federated Learning. 2161-2166 - Evagoras Stylianou, Charalambos D. Charalambous, Themistoklis Charalambous:
Joint Rate Distortion Function of a Tuple of Correlated Multivariate Gaussian Sources with Individual Fidelity Criteria. 2167-2172 - Matthew L. Malloy, Ardhendu Tripathy, Robert D. Nowak:
Optimal Confidence Sets for the Multinomial Parameter. 2173-2178 - Leighton Pate Barnes, Ayfer Özgür:
Fisher Information and Mutual Information Constraints. 2179-2184 - Atin Gayen, M. Ashok Kumar:
A Generalized notion of Sufficiency for Power-law Distributions. 2185-2190 - Hanxu Hou, Patrick P. C. Lee:
Generalized Rack-aware Regenerating Codes for Jointly Optimal Node and Rack Repairs. 2191-2196 - Adway Patra, Alexander Barg:
Regenerating codes on graphs. 2197-2202 - Zhifang Zhang, Liyang Zhou:
Rack-Aware Regenerating Codes with Fewer Helper Racks. 2203-2207 - Adriano Pastore, Sung Hoon Lim, Chen Feng, Bobak Nazer, Michael Gastpar:
A Discretization Approach to Compute-Forward. 2208-2213 - Oliver Kosut, Michelle Effros, Michael Langberg:
Every Bit Counts: Second-Order Analysis of Cooperation in the Multiple-Access Channel. 2214-2219 - Fei Wei, Oliver Kosut:
A Wringing-Based Proof of a Second-Order Converse for the Multiple-Access Channel under Maximal Error Probability. 2220-2225 - Sisi Miao, Christian Senger:
Dual-containing Alternant Codes for Applications in the Calderbank-Shor-Steane Construction. 2226-2231 - Narayanan Rengaswamy, Henry D. Pfister:
On the Duality Between the BSC and Quantum PSC. 2232-2237 - Francisco Revson Fernandes Pereira, Stefano Mancini:
Polar Codes for Quantum Reading. 2238-2243 - Seyedehsara Nayer, Namrata Vaswani:
Sample-Efficient Low Rank Phase Retrieval. 2244-2249 - Yunzhen Yao, Liangzu Peng, Manolis C. Tsakiris:
Unsigned Matrix Completion. 2250-2255 - Yanting Ma, Min Kang, Jack W. Silverstein, Dror Baron:
Local Convergence of an AMP Variant to the LASSO Solution in Finite Dimensions. 2256-2261 - Yauhen Yakimenka, Hsuan-Yin Lin, Eirik Rosnes, Jörg Kliewer:
Optimal Rate-Distortion-Leakage Tradeoff for Single-Server Information Retrieval. 2262-2267 - Karim Banawan, Ahmed Arafa, Sennur Ulukus:
Timely Private Information Retrieval. 2268-2273 - Sahasrajit Sarmasarkar, V. Lalitha, Nikhil Karamchandani:
On Gradient Coding with Partial Recovery. 2274-2279 - Margalit Glasgow, Mary Wootters:
Approximate Gradient Coding with Optimal Decoding. 2280-2285 - Birenjith Sasidharan, Anoop Thomas:
Coded Gradient Aggregation: A Tradeoff Between Communication Costs at Edge Nodes and at Helper Nodes. 2286-2291 - Anders Høst-Madsen:
Bounds for Learning Lossless Source Coding. 2292-2297 - Neri Merhav:
On More General Distributions of Random Binning for Slepian-Wolf Encoding. 2298-2303 - Shirin Saeedi Bidokhti, Aylin Yener:
On the Timeliness of Arithmetic Coding. 2304-2309 - Deepesh Data, Suhas N. Diggavi:
Byzantine-Resilient SGD in High Dimensions on Heterogeneous Data. 2310-2315 - Abdulrahman Alabdulkareem, Jean Honorio:
Information-theoretic lower bounds for zero-order stochastic gradient estimation. 2316-2321 - Krishna Reddy Kesari, Jean Honorio:
First Order Methods take Exponential Time to Converge to Global Minimizers of Non-Convex Functions. 2322-2327 - Zhengyi Jiang, Hanxu Hou, Yunghsiang S. Han, Zhongyi Huang, Bo Bai, Gong Zhang:
An Efficient Piggybacking Design with Lower Repair Bandwidth and Lower Sub-packetization. 2328-2333 - Francisco Maturana, K. V. Rashmi:
Bandwidth Cost of Code Conversions in Distributed Storage: Fundamental Limits and Optimal Constructions. 2334-2339 - Rooji Jinan, Ajay Badita, Pradeep Kiran Sarvepalli, Parimal Parag:
Low latency replication coded storage over memory -constrained servers. 2340-2345 - Hei Victor Cheng, Wei Yu:
Multiplexing Gain of Modulating Phases Through Reconfigurable Intelligent Surface. 2346-2351 - Roy Karasik, Osvaldo Simeone, Marco Di Renzo, Shlomo Shamai:
Single-RF Multi-User Communication Through Reconfigurable Intelligent Surfaces: An Information-Theoretic Analysis. 2352-2357 - Chuan-Zheng Lee, Leighton Pate Barnes, Ayfer Özgür:
Lower Bounds for Over-the-Air Statistical Estimation. 2358-2363 - Jun Muramatsu:
Successive-Cancellation Decoding of Binary Polar Codes Based on Symmetric Parametrization. 2364-2368 - Seyyed Ali Hashemi, Marco Mondelli, Arman Fazeli, Alexander Vardy, John M. Cioffi, Andrea Goldsmith:
Parallelism versus Latency in Simplified Successive-Cancellation Decoding of Polar Codes. 2369-2374 - Suihua Cai, Haowei Chen, Baodian Wei, Xiao Ma:
Dual Coupled Polar Codes with Successive Cancellation List Decoding. 2375-2380 - P. Charantej Reddy, V. S. S. Prabhu Tej, Aditya Siripuram, Brad Osgood:
Computing the Discrete Fourier Transform of signals with spectral frequency support. 2381-2386 - Samuel Pinilla, Kumar Vijay Mishra, Brian M. Sadler:
WaveMax: FrFT-Based Convex Phase Retrieval for Radar Waveform Design. 2387-2392 - Setareh Sharifian, Reihaneh Safavi-Naini:
Information-theoretic Key Encapsulation and its Application to Secure Communication. 2393-2398 - Thom Wiggers, Simona Samardjiska:
Practically Solving LPN. 2399-2404 - Qian Guo, Erik Mårtensson, Paul Stankovski Wagner:
On the Sample Complexity of solving LWE using BKW-Style Algorithms. 2405-2410 - Gowtham R. Kurri, Viswanathan Ramachandran, Sibi Raj B. Pillai, Vinod M. Prabhakaran:
Multiple Access Channel Simulation. 2411-2416 - Touheed Anwar Atif, Arun Padakandla, S. Sandeep Pradhan:
Synthesizing Correlated Randomness using Algebraic Structured Codes. 2417-2422 - Mohammadamin Baniasadi, Ertem Tuncel:
Robust Gaussian JSCC Under the Near-Infinity Bandwidth Regime with Side Information at the Receiver. 2423-2428 - Yashas Malur Saidutta, Afshin Abdi, Faramarz Fekri:
Analog Joint Source-Channel Coding for Distributed Functional Compression using Deep Neural Networks. 2429-2434 - Assaf Ben-Yishai, Or Ordentlich:
Constructing Multiclass Classifiers using Binary Classifiers Under Log-Loss. 2435-2440 - Yuval Cassuto, Yongjune Kim:
Boosting for Straggling and Flipping Classifiers. 2441-2446 - Bijan Mazaheri, Siddharth Jain, Jehoshua Bruck:
Synthesizing New Expertise via Collaboration. 2447-2452 - Sundara Rajan Srinivasavaradhan, Sivakanth Gopi, Henry D. Pfister, Sergey Yekhanin:
Trellis BMA: Coded Trace Reconstruction on IDS Channels for DNA Storage. 2453-2458 - Mahdi Cheraghchi, Joseph Downs, João Ribeiro, Alexandra Veliche:
Mean-Based Trace Reconstruction over Practically any Replication-Insertion Channel. 2459-2464 - Reyna Hulett, Shubham Chandak, Mary Wootters:
On Coding for an Abstracted Nanopore Channel for DNA Storage. 2465-2470 - Kuan Hsieh, Cynthia Rush, Ramji Venkataramanan:
Near-Optimal Coding for Massive Multiple Access. 2471-2476 - Jyotish Robin, Elza Erkip:
Capacity Bounds and User Identification Costs in Rayleigh-Fading Many-Access Channel. 2477-2482 - Hao Xu, Tianyu Yang, Giuseppe Caire, Shlomo Shamai Shitz:
Information Bottleneck for an Oblivious Relay with Channel State Information: the Vector Case. 2483-2488 - Jian-Jia Weng, Fady Alajaji, Tamás Linder:
An Information Bottleneck Problem with Rényi's Entropy. 2489-2494 - Michael Dikshtein, Or Ordentlich, Shlomo Shamai Shitz:
The Double-Sided Information-Bottleneck Function. 2495-2500 - Kazuho Watanabe:
Statistical Learning of the Insensitive Parameter in Support Vector Models. 2501-2506 - Gil I. Shamir, Wojciech Szpankowski:
A Lower Bound for Regret in Logistic Regression. 2507-2512 - Anmol Dwivedi, Sihui Wang, Ali Tajer:
Linear Discriminant Analysis under $f$-divergence Measures. 2513-2518 - Jin Sima, Jehoshua Bruck:
Trace Reconstruction with Bounded Edit Distance. 2519-2524 - Sami Davies, Miklós Z. Rácz, Benjamin G. Schiffer, Cyrus Rashtchian:
Approximate Trace Reconstruction: Algorithms. 2525-2530 - Elena Grigorescu, Madhu Sudan, Minshen Zhu:
Limitations of Mean-Based Algorithms for Trace Reconstruction at Small Distance. 2531-2536 - Vijith Kumar K. P, Brijesh Kumar Rai, Tony Jacob:
Pareto Optimal Schemes in Coded Caching: Uncoded Prefetching. 2537-2541 - Xinyu Xie, Weiyi Tan, Jinbei Zhang, Zhiyong Luo:
Coded Caching for Two Users with Distinct File Sizes. 2542-2547 - Yirui Liu, John MacLaren Walsh:
Exponentially Simpler Network Rate Regions. 2548-2553 - Henry D. Pfister, Ido Tal:
Polar Codes for Channels with Insertions, Deletions, and Substitutions. 2554-2559 - Karthik Nagarjuna Tunuguntla, Paul H. Siegel:
Polar Shaping Codes for Costly Noiseless and Noisy Channels. 2560-2565 - Jincheng Dai, Kai Niu, Jinnan Piao:
Fast Construction of Bit-Interleaved Polar-Coded Modulation. 2566-2571 - Eray Can Elumar, Mansi Sood, Osman Yagan:
On the Connectivity and Giant Component Size of Random K-out Graphs Under Randomly Deleted Nodes. 2572-2577 - Jiajun Liang, Chuyang Ke, Jean Honorio:
Information Theoretic Limits of Exact Recovery in Sub-hypergraph Models for Community Detection. 2578-2583 - Ni Ding, Mohammad Amin Zarrabian, Parastoo Sadeghi:
$\alpha$-Information-theoretic Privacy Watchdog and Optimal Privatization Scheme. 2584-2589 - Yucheng Liu, Lawrence Ong, Sarah Johnson, Jörg Kliewer, Parastoo Sadeghi, Phee Lep Yeoh:
Information Leakage in Zero-Error Source Coding: A Graph-Theoretic Perspective. 2590-2595 - Olivier Rioul, Wei Cheng, Sylvain Guilley:
Cumulant Expansion of Mutual Information for Quantifying Leakage of a Protected Secret. 2596-2601 - Amit Solomon, Ken R. Duffy, Muriel Médard:
Managing Noise and Interference Separately - Multiple Access Channel Decoding using Soft GRAND. 2602-2607 - Ya-Chun Liang, Chung-Shou Liao, Xinping Yi:
Topological Interference Management with Adversarial Perturbation. 2608-2613 - Rajesh K. Mishra, Karl Chahine, Hyeji Kim, Syed Ali Jafar, Sriram Vishwanath:
Distributed Interference Alignment for K-user Interference Channels via Deep Learning. 2614-2619 - Sagnik Bhattacharya, Prakash Narayan:
Universal Single-Shot Sampling Rate Distortion. 2620-2624 - Shlomi Agmon, Etam Benger, Or Ordentlich, Naftali Tishby:
Critical Slowing Down Near Topological Transitions in Rate-Distortion Problems. 2625-2630 - Michail Gkagkos, Charalambos D. Charalambous:
Structural Properties of Test Channels of the RDF for Gaussian Multivariate Distributed Sources. 2631-2636 - Farzad Shahrivari, Nikola Zlatanov:
An Asymptotically Optimal Algorithm For Classification of Data Vectors with Independent Non-Identically Distributed Elements. 2637-2642 - Sajad Khodadadian, AmirEmad Ghassami, Negar Kiyavash:
Impact of Data Processing on Fairness in Supervised Learning. 2643-2648 - Alexandra M. Porter, Mary Wootters:
On Greedy Approaches to Hierarchical Aggregation. 2649-2654 - Wentu Song, Nikita Polyanskii, Kui Cai, Xuan He:
On Multiple-Deletion Multiple-Substitution Correcting Codes. 2655-2660 - Kento Nakada:
Perfect Binary Codes Capable of Correcting Equal Multiple Deletions. 2661-2665 - Johan Chrisnata, Han Mao Kiah:
Correcting Two Deletions with More Reads. 2666-2671 - Nastaran Abadi Khooshemehr, Mohammad Ali Maddah-Ali:
The Discrepancy Attack on Polyshard-ed Blockchains. 2672-2677 - Canran Wang, Netanel Raviv:
Low Latency Cross-Shard Transactions in Coded Blockchain. 2678-2683 - Birenjith Sasidharan, Emanuele Viterbo:
Private Data Access in Blockchain Systems Employing Coded Sharding. 2684-2689 - Serkan Saritas, Photios A. Stavrou, Ragnar Thobaben, Mikael Skoglund:
Quadratic Signaling Games with Channel Combining Ratio. 2690-2695 - Maël Le Treust, Tristan Tomala:
Strategic Communication with Decoder Side Information. 2696-2701 - Omer Amar, Kobi Cohen:
Online Learning for Shortest Path and Backpressure Routing in Wireless Networks. 2702-2707 - Mojtaba Abolfazli, Anders Høst-Madsen, June Zhang, Andras Bratincsak:
Graph Coding for Model Selection and Anomaly Detection in Gaussian Graphical Models. 2708-2713 - Yihong Wu, Jiaming Xu, Sophie H. Yu:
Settling the Sharp Reconstruction Thresholds of Random Graph Matching. 2714-2719 - Serhat Bakirtas, Elza Erkip:
Database Matching Under Column Deletions. 2720-2725 - Mahshad Shariatnasab, Farhad Shirani, Siddharth Garg, Elza Erkip:
On Graph Matching Using Generalized Seed Side-Information. 2726-2731 - Mohamed Seif, Wei-Ting Chang, Ravi Tandon:
Privacy Amplification for Federated Learning via User Sampling and Wireless Aggregation. 2732-2737 - Qinghua Ding, Chin Wa Ken Lau, Chandra Nair, Yan Nan Wang:
Concavity of output relative entropy for channels with binary inputs. 2738-2743 - Amin Gohari, Chandra Nair, David Ng:
An Information Inequality Motivated by the Gaussian Z-Interference Channel. 2744-2749 - Cheuk Ting Li:
An Automated Theorem Proving Framework for Information-Theoretic Results. 2750-2755 - Yonglong Li, Vincent Y. F. Tan:
On the Feed-Forward Rate-Distortion Function for Stationary and Ergodic Sources. 2756-2761 - Aviv Adler, Jennifer Tang, Yury Polyanskiy:
Quantization of Random Distributions under KL Divergence. 2762-2767 - Ahmed Elshafiy, Mahmoud Namazi, Ram Zamir, Kenneth Rose:
Stochastic Codebook Regeneration for Sequential Compression of Continuous Alphabet Sources. 2768-2773 - Mohsen Heidari, Jithin K. Sreedharan, Gil I. Shamir, Wojciech Szpankowski:
Information Sufficiency via Fourier Expansion. 2774-2779 - Yingzhen Yang, Ping Li:
FROS: Fast Regularized Optimization by Sketching. 2780-2785 - Antonio A. Ginart, Maxim Naumov, Dheevatsa Mudigere, Jiyan Yang, James Zou:
Mixed Dimension Embeddings with Application to Memory-Efficient Recommendation Systems. 2786-2791 - Payam Delgosha, Venkat Anantharam:
A Universal Lossless Compression Method applicable to Sparse Graphs and heavy-tailed Sparse Graphs. 2792-2797 - Yeow Meng Chee, Manabu Hagiwara, Van Khu Vu:
Two Dimensional Deletion Correcting Codes and their Applications. 2792-2797 - Lorenz Welter, Rawad Bitar, Antonia Wachter-Zeh, Eitan Yaakobi:
Multiple Criss-Cross Deletion-Correcting Codes. 2798-2803 - Shuche Wang, Jin Sima, Farzad Farnoud:
Non-binary Codes for Correcting a Burst of at Most 2 Deletions. 2804-2809 - Kai Wan, Hua Sun, Mingyue Ji, Daniela Tuninetti, Giuseppe Caire:
Cache-Aided Matrix Multiplication Retrieval. 2810-2815 - Yinbin Ma, Daniela Tuninetti:
A General Coded Caching Scheme for Scalar Linear Function Retrieval. 2816-2821 - Zhen-Qing He, Hang Liu, Xiaojun Yuan, Ying-Jun Angela Zhang, Ying-Chang Liang:
Semi-Blind Channel Estimation for RIS-Aided Massive MIMO: A Trilinear AMP Approach. 2822-2827 - Roya Gholami, Laura Cottatellucci, Dirk T. M. Slock:
Tackling Pilot Contamination in Cell-Free Massive MIMO by Joint Channel Estimation and Linear Multi-User Detection. 2828-2833 - Yahia Shabara, C. Emre Koksal, Eylem Ekici:
How Long to Estimate Sparse MIMO Channels. 2834-2839 - Puning Zhao, Lifeng Lai:
On the Convergence Rates of KNN Density Estimation. 2840-2845 - Maciej Skorski:
Mean-Squared Accuracy of Good-Turing Estimator. 2846-2851 - Hamidreza Amini Khorasgani, Hemanta K. Maji, Himanshi K. Mehta, Mingyuan Wang:
Efficient Distributed Coin-tossing Protocols. 2852-2857 - Hamidreza Amini Khorasgani, Hemanta K. Maji, Mingyuan Wang:
Optimally-secure Coin-tossing against a Byzantine Adversary. 2858-2863 - Fan Li, Jinyuan Chen:
Communication-Efficient Signature-Free Asynchronous Byzantine Agreement. 2864-2869 - Aditya Narayan Ravi, Sibi Raj B. Pillai, Vinod M. Prabhakaran, Michèle A. Wigger:
On the Capacity Region of Gaussian Broadcast Channels under Two-Sided Noisy Feedback. 2870-2875 - Sreejith Sreekumar, Ziv Goldfeld:
Soft-covering via Constant-composition Superposition codes. 2876-2881 - Stefan Schwarz:
Non-Coherent Broadcasting based on Grassmannian Superposition Transmission. 2882-2887 - Lin Bai, Zhuangfei Wu, Lin Zhou:
Achievable Second-Order Asymptotics for Successive Refinement Using Gaussian Codebooks. 2888-2893 - Jiakun Liu, Wenyi Zhang, H. Vincent Poor:
A Rate-Distortion Framework for Characterizing Semantic Information. 2894-2899 - Sahasrajit Sarmasarkar, Kota Srinivas Reddy, Nikhil Karamchandani:
Query Complexity of Heavy Hitter Estimation. 2900-2905 - Ioannis Papageorgiou, Ioannis Kontoyiannis, Lambros Mertzanis, Athina Panotopoulou, Maria Skoularidou:
Revisiting Context-Tree Weighting for Bayesian Inference. 2906-2911 - Mohammad Saeed Masiha, Amin Gohari, Mohammad Hossein Yassaee, Mohammad Reza Aref:
Learning under Distribution Mismatch and Model Misspecification. 2912-2917 - Guanghui Song, Kui Cai, Ce Sun, Xingwei Zhong, Jun Cheng:
Selector Failure Detection for Resistive Random Access Memories. 2918-2923 - Yeow Meng Chee, Alexander Vardy, Van Khu Vu, Eitan Yaakobi:
Coding for Transverse-Reads in Domain Wall Memories. 2924-2929 - Tuan Thanh Nguyen, Kui Cai, Kees A. Schouhamer Immink, Yeow Meng Chee:
Efficient Design of Capacity-Approaching Two-Dimensional Weight-Constrained Codes. 2930-2935 - Roope Vehkalahti, Tefjol Pllaha, Olav Tirkkonen:
Signature Code Design for Fast Fading Channels. 2936-2941 - Benjamin M. Zaidel, Shlomo Shamai Shitz:
Sparse and Dense: An Achievable Region for Code-Domain NOMA with Mixed Users. 2942-2947 - Michail Gkagkos, Asit Kumar Pradhan, Vamsi K. Amalladinne, Krishna Narayanan, Jean-François Chamberland, Costas N. Georghiades:
Approximate Support Recovery using Codes for Unsourced Multiple Access. 2948-2953 - Jingyuan Xia, Deniz Gündüz:
Meta-learning Based Beamforming Design for MISO Downlink. 2954-2959 - Sueda Taner, Christoph Studer:
Optimality of the Discrete Fourier Transform for Beamspace Massive MU-MIMO Communication. 2960-2965 - Abbas Khalili, Shahram Shahsavari, Mohammad Ali Amir Khojastepour, Elza Erkip:
On Single-User Interactive Beam Alignment in Millimeter Wave Systems: Impact of Feedback Delay. 2966-2971 - Guidan Yao, Ahmed M. Bedewy, Ness B. Shroff:
Age-Optimal Low-Power Status Update over Time-Correlated Fading Channel. 2972-2977 - Saad Kriouile, Mohamad Assaad:
Minimizing the Age of Incorrect Information for Real-time Tracking of Markov Remote Sources. 2978-2983 - Roy D. Yates:
The Age of Gossip in Networks. 2984-2989 - Jabari Hastings, Amy Kanne, Ray Li, Mary Wootters:
Wedge-Lifted Codes. 2990-2995 - Ximing Fu, Chenhao Wu, Yuanxin Guo, Shenghao Yang:
Two-tone Shift-XOR Storage Codes. 2996-3001 - Francisco Maturana, K. V. Rashmi:
Irregular Array Codes with Arbitrary Access Sets for Geo-Distributed Storage. 3002-3007 - Jie Ni, Jianping Zheng, Zijie Liang:
Massive MIMO Un-Sourced Random Access with Dynamic User Activity. 3008-3013 - Khac-Hoang Ngo, Alejandro Lancho, Giuseppe Durisi, Alexandre Graell i Amat:
Massive Uncoordinated Access With Random User Activity. 3014-3019 - Qipeng Wang, Liang Liu, Shuowen Zhang, Francis C. M. Lau:
On Massive IoT Connectivity with Temporally-Correlated User Activity. 3020-3025 - Ioannis Kontoyiannis, Yi Heng Lim, Katia Papakonstantinopoulou, Wojciech Szpankowski:
Symmetry and the Entropy of Small-World Structures and Graphs. 3026-3031 - Alankrita Bhatt, Ziao Wang, Chi Wang, Lele Wang:
Universal Graph Compression: Stochastic Block Models. 3038-3043 - Malcolm Egan:
Dependence Testing via Extremes for Regularly Varying Models. 3044-3049 - Yan Wang:
Sub-Gaussian Error Bounds for Hypothesis Testing. 3050-3055 - Zhongchang Sun, Shaofeng Zou:
A Data-Driven Approach to Robust Hypothesis Testing Using Kernel MMD Uncertainty Sets. 3056-3061 - Yingyin Pan, Jianghua Zhong, Dongdai Lin:
On Galois NFSRs with Terminal Bits. 3062-3067 - Akanshu Gupta, Abhinava Sikdar, Arpan Chattopadhyay:
Quickest detection of false data injection attack in remote state estimation. 3068-3073 - Anand Jerry George, Navin Kashyap:
An MCMC Method to Sample from Lattice Distributions. 3074-3079 - Vamsi K. Amalladinne, Allen Hao, Stefano Rini, Jean-François Chamberland:
Multi-Class Unsourced Random Access via Coded Demixing. 3080-3085 - Yuan-Hsun Lo, Wen-Wen Gu, Yijin Zhang:
New Results on Optimal Multichannel Conflict-Avoiding Codes. 3086-3091 - Chao Zhang, Aymen Askri, Ghaya Rekaya-Ben Othman:
Distributed DNN based Processing for Uplink Could-RAN. 3092-3096 - Neri Merhav:
Optimal Correlators for Detection and Estimation in Optical Receivers. 3097-3102 - Sarah Bahanshal, Anas Chaaban:
A Binary Decomposition and Transmission Schemes for the Peak-Constrained IM/DD Channel. 3103-3108 - Yu Han, Maria Urlea, Sergey Loyka:
On Optimal Power Allocation for Modulation-Constrained Gaussian Channels. 3109-3114 - Xi Zhang, Jingqing Wang, H. Vincent Poor:
AoI-Driven Statistical Delay and Error-Rate Bounded QoS Provisioning for URLLC Over Wireless Networks in the Finite Blocklength Regime. 3115-3120 - Parisa Rafiee, Mustafa Oktav, Omur Ozel:
Intermittent Status Updating with Random Update Arrivals. 3121-3126 - Xingran Chen, Renpu Liu, Shaochong Wang, Shirin Saeedi Bidokhti:
Timely Broadcasting in Erasure Networks: Age-Rate Tradeoffs. 3127-3132 - Yeow Meng Chee, Duc Tu Dao, Tuvi Etzion, Han Mao Kiah, Hui Zhang:
Regular Multiset Combinatorial Batch Codes over Vector Spaces. 3133-3138 - Lev Yohananov, Eitan Yaakobi:
Almost Optimal Construction of Functional Batch Codes Using Hadamard Codes. 3139-3144 - Fan Zhang, Aria Nosratinia:
Coherence Diversity DoF in MIMO Relays: Generalization, Transmission Schemes, and Multi-Relay Strategies. 3145-3150 - Giorgio Taricco:
Information Rate Optimization for Joint Relay and Link in Non-Regenerative MIMO Channels. 3151-3155 - Mine Gokce Dogan, Yahya H. Ezzeldin, Christina Fragouli:
On optimal relay placement in directional networks. 3156-3161 - Uri Erez, Jan Østergaard, Ram Zamir:
An Orthogonality Principle for Select-Maximum Estimation of Exponential Variables. 3162-3166 - Sorina Dumitrescu, Sara Zendehboodi:
Globally Optimal Design of a Distributed Scalar Quantizer for Linear Classification. 3167-3172 - Kengo Hashimoto, Ken-ichi Iwata:
On the Optimality of Binary AIFV Codes with Two Code Trees. 3173-3178 - Hao Wang, Hsiang Hsu, Mario Díaz, Flávio P. Calmon:
The Impact of Split Classifiers on Group Fairness. 3179-3184 - Kai Liang, Youlong Wu:
Improved Communication Efficiency for Distributed Mean Estimation with Side Information. 3185-3190 - Doyeon Kim, Hye Won Chung:
Crowdsourced Labeling for Worker-Task Specialization Model. 3191-3195 - Linghui Zhou, Tobias J. Oechtering, Mikael Skoglund:
Incremental Design of Secure Biometric Identification and Authentication. 3196-3201 - Zhou Li, Hua Sun:
On the Linear Capacity of Conditional Disclosure of Secrets. 3202-3207 - Manideep Mamindlapally, Anuj Kumar Yadav, Manoj Mishra, Amitalok J. Budkuley:
Commitment Capacity under Cost Constraints. 3208-3213 - Xujun Liu, Olgica Milenkovic:
The Postdoc Problem under the Mallows Model. 3214-3219 - Alexey V. Lebedev, Christian Deppe:
Non-Adaptive and Adaptive Two-Sided Search with Fast Objects. 3220-3224 - Igal Sason:
Entropy-Based Proofs of Combinatorial Results on Bipartite Graphs. 3225-3230 - Cihan Tepedelenlioglu:
Portfolio Growth Rate and Ergodic Capacity of Fading Channels. 3231-3236 - Khac-Hoang Ngo, Sheng Yang:
A Generalized Gaussian Model for Wireless Communications. 3237-3242 - Pin-Hsun Lin, Shih-Chun Lin, Eduard A. Jorswieck:
Early Decoding for Gaussian Broadcast Channels with Heterogeneous Blocklength Constraints. 3243-3248 - Akanksha Jaiswal, Arpan Chattopadhyay:
Minimization of Age-of-Information in Remote Sensing with Energy Harvesting. 3249-3254 - Cho-Hsin Tsai, Chih-Chun Wang:
Jointly Minimizing AoI Penalty and Network Cost Among Coexisting Source-Destination Pairs. 3255-3260 - Weijun Fang, Bin Chen, Shu-Tao Xia, Fang-Wei Fu:
Singleton-Optimal LRCs and Perfect LRCs via Cyclic Codes. 3261-3266 - Jie Hao, Kenneth W. Shum, Shu-Tao Xia, Fang-Wei Fu, Yixian Yang:
On Optimal Quaternary Locally Repairable Codes. 3267-3272 - Ohad Elishco, Alexander Barg:
Capacity and Construction of Recoverable Systems. 3273-3278 - Prakash Chaki, Takumi Ishihara, Shinya Sugiura:
Eigenvalue Decomposition Precoded Faster-Than-Nyquist Transmission of Index Modulated Symbols. 3279-3284 - Zijie Liang, Jianping Zheng, Jie Ni:
Index Modulation Aided Massive MIMO Un-sourced Random Access. 3285-3290 - Bharath Shamasundar, Aria Nosratinia:
Spectral Efficiency of Multi-Antenna Index Modulation. 3291-3295 - Hao Lou, Farzad Farnoud Hassanzadeh:
Asymptotic Analysis of Data Deduplication with a Constant Number of Substitutions. 3296-3301 - Yotam Gershon, Yuval Cassuto:
Efficient Distributed Source Coding of Fragmented Genomic Sequencing Data. 3302-3307 - Ilan Shomorony, Govinda M. Kamath:
Sketching and Sequence Alignment: A Rate-Distortion Perspective. 3308-3313 - Alon Kipnis, David L. Donoho:
Two-sample Testing of Discrete Distributions under Rare/Weak Perturbations. 3314-3319 - Jie Wang, Rui Gao, Yao Xie:
Two-sample Test using Projected Wasserstein Distance. 3320-3325 - Arpan Mukherjee, Ali Tajer, Pin-Yu Chen, Payel Das:
Active Binary Classification of Random Fields. 3326-3331 - Ajaykrishnan Nageswaran, Prakash Narayan:
Distribution Privacy Under Function $\rho$ -Recoverability. 3332-3337 - Ceren Sevinç, Ertem Tuncel:
Information Theoretic Approach on Randomized Response Models in Surveys. 3338-3342 - Samiru Gayan, Rajitha Senanayake, Hazer Inaltekin, Jamie S. Evans:
Selection Combining for Multi-Antenna Communication with Low-Resolution ADCs. 3343-3348 - Shahin Khobahi, Nir Shlezinger, Mojtaba Soltanalian, Yonina C. Eldar:
Model-Inspired Deep Detection with Low-Resolution Receivers. 3349-3354 - Priyanka Kaswan, Melih Bastopcu, Sennur Ulukus:
Freshness Based Cache Updating in Parallel Relay Networks. 3355-3360 - James Scott Broadhead, Przemyslaw Pawelczak:
Data Freshness in Mixed-Memory Intermittently-Powered Systems. 3361-3366 - Meng Zhang, Ahmed Arafa, Ermin Wei, Randall A. Berry:
Optimal Mechanism Design for Fresh Data Acquisition. 3367-3372 - Ron M. Roth:
Asymptotic Bounds on the Rate of Locally Repairable Codes. 3373-3378 - Han Cai, Cuiling Fan, Ying Miao, Moshe Schwartz, Xiaohu Tang:
An Improved Bound for Optimal Locally Repairable Codes. 3379-3384
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.