


default search action
ITW 2015: Jerusalem, Israel
- 2015 IEEE Information Theory Workshop, ITW 2015, Jerusalem, Israel, April 26 - May 1, 2015. IEEE 2015, ISBN 978-1-4799-5524-4
- Aditya Vempaty, Lav R. Varshney:
CEO problem for belief sharing. 1-5 - Jacob Ziv:
A constrained-dictionary version of LZ78 asymptotically achieves the finite-state compressibility with a distortion measure. 1-4 - Joel Ratsaby:
On complexity and randomness of Markov-chain prediction. 1-5 - Igal Sason:
Tight bounds for symmetric divergence measures and a new inequality relating f-divergences. 1-5 - Yi-Peng Wei, Sennur Ulukus:
Polar coding for the general wiretap channel. 1-5 - Shaofeng Zou, Yingbin Liang, Lifeng Lai, Shlomo Shamai
:
Degraded broadcast channel: Secrecy outside of a bounded range. 1-5 - G. David Forney Jr.:
Unique factorization and controllability of tail-biting trellis realizations via controller granule decompositions. 1-5 - Nir Weinberger, Wasim Huleihel, Neri Merhav:
Erasure/list random coding error exponents are not universally achievable. 1-5 - Amin Sakzad
, Anna-Lena Trautmann
, Emanuele Viterbo
:
Cross-packing lattices for the Rician fading channel. 1-5 - Shenghao Yang, Yi Chen, Soung Chang Liew, Lizhao You
:
Coding for network-coded slotted ALOHA. 1-5 - Cupjin Huang, Zihan Tan
, Shenghao Yang:
Upper bound on function computation in directed acyclic networks. 1-5 - Yauhen Yakimenka, Vitaly Skachek:
Refined upper bounds on stopping redundancy of binary linear codes. 1-5 - Xishuo Liu, Stark C. Draper
:
Encoding and decoding algorithms for LP-decodable multipermutation codes. 1-5 - Natarajan Lakshmi Prasad
, Yi Hong
, Emanuele Viterbo
:
Lattice index coding for the broadcast channel. 1-5 - Martina Cardone, Daniela Tuninetti
, Raymond Knopp:
The approximate optimality of simple schedules for half-duplex multi-relay networks. 1-5 - Yunyan Chang, Slawomir Stanczak, Chan Zhou:
Throughput scaling for random hybrid wireless networks with physical-layer network coding. 1-5 - Shlomo Engelberg, Osnat Keren:
Zero-latency zero-error codes for parallel asynchronous channels with arbitrary skews. 1-4 - Sang-Woon Jeon, Song-Nam Hong
, Mingyue Ji, Giuseppe Caire:
On the capacity of multihop device-to-device caching networks. 1-5 - Jingge Zhu
, Michael Gastpar:
Compute-and-forward using nested linear codes for the Gaussian MAC. 1-5 - Ziv Goldfeld, Haim H. Permuter
, Gerhard Kramer
:
Broadcast channels with cooperation: Capacity and duality for the semi-deterministic case. 1-5 - Meryem Benammar, Pablo Piantanida, Shlomo Shamai
:
Capacity results for the Multicast Cognitive Interference Channel. 1-5 - Alex Dytso
, Daniela Tuninetti
, Natasha Devroye:
The Gaussian Interference Channel with lack of codebook knowledge at one receiver: Symmetric capacity to within a gap with a PAM input. 1-5 - Talha Cihad Gülcü, Alexander Barg:
Achieving secrecy capacity of the wiretap channel and broadcast channel with a confidential component. 1-5 - Kechao Huang, David G. M. Mitchell
, Xiao Ma, Daniel J. Costello Jr.:
Asymptotic distance properties of protograph-based spatially coupled LDPC codes over GF(q). 1-5 - Yonathan Murin, Yonatan Kaspi, Ron Dabora, Deniz Gündüz
:
On the transmission of a bivariate Gaussian source over the Gaussian broadcast channel with feedback. 1-5 - Marcelo J. Weinberger:
One-to-one lossless codes in the variable input-length regime: Back to Kraft's inequality. 1-5 - Shashank Vatedka
, Navin Kashyap:
Some "goodness" properties of LDA lattices. 1-5 - Ayush Jain, Rakesh Kumar Bansal:
Point-wise analysis of redundancy in SWLZ algorithm for φ-mixing sources. 1-5 - Ayush Jain, Rakesh Kumar Bansal:
Exponential rates of convergence for waiting times and generalized AEP. 1-5 - Michal Horovitz
, Eitan Yaakobi:
WOM codes with uninformed encoder. 1-5 - Alex Karrila
, Camilla Hollanti:
A comparison of skewed and orthogonal lattices in Gaussian wiretap channels. 1-5 - Oron Sabag
, Haim H. Permuter
, Navin Kashyap:
Capacity of the (1, ∞)-RLL input-constrained erasure channel with feedback. 1-5 - Abhinav Ganesan, Sidharth Jaggi, Venkatesh Saligrama
:
Non-adaptive group testing with inhibitors. 1-5 - Inaki Estella Aguerri, Deniz Gündüz
:
Gaussian joint source-channel coding for the strong interference channel. 1-5 - Sihem Mesnager, Gérard D. Cohen:
Cyclic codes and algebraic immunity of Boolean functions. 1-5 - Jithin Ravi
, Bikash Kumar Dey:
Zero-error function computation through a bidirectional relay. 1-5 - Jithin Ravi
, Bikash Kumar Dey, Emanuele Viterbo
:
Oblivious transfer over OFDM and MIMO channels. 1-5 - Alon Kipnis
, Andrea J. Goldsmith, Yonina C. Eldar:
Sub-Nyquist sampling achieves optimal rate-distortion. 1-5 - Alexey A. Frolov
, Victor V. Zyablov
:
A new coding method for a multiple-access system with a large number of active users. 1-5 - Sarah R. Allen, Ryan O'Donnell:
Conditioning and covariance on caterpillars. 1-5 - Abhishek Agarwal, Arya Mazumdar:
Security in locally repairable storage. 1-5 - Sibi Raj B. Pillai, Vinod M. Prabhakaran:
On the noisy feedback capacity of Gaussian broadcast channels. 1-5 - Qiwen Wang, Viveck R. Cadambe
, Sidharth Jaggi, Moshe Schwartz
, Muriel Médard:
File updates under random/arbitrary insertions and deletions. 1-5 - Andrea Grigorescu, Holger Boche, Rafael F. Schaefer, H. Vincent Poor:
Capacity region continuity of the compound broadcast channel with confidential messages. 1-5 - Tara Javidi
, Yonatan Kaspi, Himanshu Tyagi:
Gaussian estimation under attack uncertainty. 1-5 - Kaushik Senthoor, Birenjith Sasidharan
, P. Vijay Kumar:
Improved layered regenerating codes characterizing the exact-repair storage-repair bandwidth tradeoff for certain parameter sets. 1-5 - Yatao Bian
, Alexey Gronskiy, Joachim M. Buhmann:
Greedy MaxCut algorithms and their information content. 1-5 - Alexander Zeh, Eitan Yaakobi:
Optimal linear and cyclic locally repairable codes over small fields. 1-5 - Gilles Brassard, Benno Salwey, Stefan Wolf
:
Non-locality distillation as cryptographic game. 1-5 - Rami Cohen, Yuval Cassuto:
Design of LDPC codes for the q-ary partial erasure channel. 1-5 - Dusan Jakovetic, Aleksandar Minja
, Dragana Bajovic, Dejan Vukobratovic
:
Distributed storage allocations for neighborhood-based data access. 1-5 - Nicola di Pietro
, Nour Basha, Joseph Jean Boutros:
Non-binary GLD codes and their lattices. 1-5 - Pengfei Huang, Eitan Yaakobi, Hironori Uchikawa, Paul H. Siegel:
Cyclic linear binary locally repairable codes. 1-5 - Zhao Wang, Ming Xiao, Mikael Skoglund, H. Vincent Poor:
Secrecy degrees of freedom of the two-user MISO broadcast channel with mixed CSIT. 1-5 - Marcelo Firer, Jerry Anderson Pinheiro:
Bounds for complexity of syndrome decoding for poset metrics. 1-5 - Ling Liu, Yanfei Yan, Cong Ling:
Secrecy-good polar lattices with optimal shaping for the Gaussian wiretap channels. 1-5 - Han Mao Kiah, Gregory J. Puleo, Olgica Milenkovic:
Codes for DNA storage channels. 1-5 - Christos K. Kourtellaris, Charalambos D. Charalambous
:
Capacity of Binary State Symmetric Channel with and without feedback and transmission cost. 1-5 - Michèle A. Wigger, Roy Timo, Shlomo Shamai
:
Conferencing in Wyner's asymmetric interference network: Effect of number of rounds. 1-5 - Zhijie Ren, Jasper Goseling, Jos H. Weber, Michael Gastpar:
Secure transmission using an untrusted relay with scaled compute-and-forward. 1-5 - Luca Barletta, Gerhard Kramer
:
Upper bound on the capacity of discrete-time Wiener phase noise channels. 1-5 - Nir Elkayam, Meir Feder:
Achievable and converse bounds over a general channel and general decoding metric. 1-5 - Mainak Chowdhury, Alexandros Manolakos, Felipe Gómez-Cuba
, Elza Erkip
, Andrea J. Goldsmith:
Capacity scaling in noncoherent wideband massive SIMO systems. 1-5 - Ronit Bustin, Rafael F. Schaefer, H. Vincent Poor, Shlomo Shamai
:
On MMSE properties of optimal codes for the Gaussian wiretap channel. 1-5 - Jonathan Ponniah
, Liang-Liang Xie, Panganamala Ramana Kumar:
The two-way multi-relay channel. 1-5 - Sergey Tridenski, Ram Zamir:
Stochastic interpretation for the Arimoto algorithm. 1-5 - Remi A. Chou
, Matthieu R. Bloch:
Polar coding for the broadcast channel with confidential messages. 1-5 - Qiaosheng Eric Zhang
, Swanand Kadhe
, Mayank Bakshi
, Sidharth Jaggi, Alex Sprintson:
Talking reliably, secretly, and efficiently: A "complete" characterization. 1-5 - Muxi Yan, Alex Sprintson:
Approximation algorithms for erasure correcting Data Exchange. 1-5 - Anxiao Jiang, Yue Li, Jehoshua Bruck
:
Error correction through language processing. 1-5 - Or Ordentlich, Ofer Shayevitz:
Subset-universal lossy compression. 1-5 - Jean-Claude Belfiore, Yi Hong
, Emanuele Viterbo
:
Harmonic analysis of binary functions. 1-5 - Song-Nam Hong
, Ivana Maric, Dennis Hui, Giuseppe Caire:
Multihop virtual full-duplex relay channels. 1-5 - Jhelum Chakravorty, Aditya Mahajan:
Distortion-transmission trade-off in real-time transmission of Markov sources. 1-5 - Eirik Rosnes, Michael Helmling:
On adaptive linear programming decoding of ternary linear codes. 1-5 - Shashank Vatedka
, Navin Kashyap:
Nested lattice codes for secure bidirectional relaying with asymmetric channel gains. 1-5 - Benjamin Larrousse, Samson Lasaulce, Michèle A. Wigger:
Coordinating partially-informed agents over state-dependent networks. 1-5 - Assaf Ben-Yishai, Ofer Shayevitz:
The AWGN BC with MAC feedback: A reduction to noiseless feedback via interaction. 1-5 - Or Ordentlich, Uri Erez, Bobak Nazer:
On compute-and-forward with feedback. 1-5 - Ignacio Cascudo
:
Powers of codes and applications to cryptography. 1-5 - Xishuo Liu, Stark C. Draper
:
ADMM decoding of error correction codes: From geometries to algorithms. 1-5 - Erik Agrell, Giuseppe Durisi
, Pontus Johannisson:
Information-theory-friendly models for fiber-optic channels: A primer. 1-5 - Oliver Kosut:
Boosting output distributions in finite blocklength channel coding converse bounds. 1-5 - Alexander Vardy
, Eitan Yaakobi:
Codes for RAID solutions based upon SSDs. 1-5 - Daniel Cullina
, Negar Kiyavash:
Combinatorial channels from partially ordered sets. 1-5 - Dor Shaviv
, Ayfer Özgür
, Haim H. Permuter
:
Can feedback increase the capacity of the energy harvesting channel? 1-5 - Victoria Kostina
, Yury Polyanskiy, Sergio Verdú:
Transmitting k samples over the Gaussian channel: Energy-distortion tradeoff. 1-5 - Peter Gazi, Stefano Tessaro:
Secret-key cryptography from ideal primitives: A systematic overview. 1-5 - Ying-zong Huang, Gregory W. Wornell:
Separation architectures for lossy compression. 1-5 - Aylin Yener:
New directions in information theoretic security: Benefits of bidirectional signaling. 1-5 - Aman Bhatia, Veeresh Taranalli, Paul H. Siegel, Shafa Dahandeh, Anantha Raman Krishnan, Patrick Lee, Dahua Qin, Moni Sharma, Teik Yeo:
Polar codes for magnetic recording channels. 1-5 - Gerhard Kramer
, Mansoor I. Yousefi, Frank R. Kschischang
:
Upper bound on the capacity of a cascade of nonlinear and noisy channels. 1-4 - Gerhard Kramer
:
Capacity of deterministic, half-duplex, line networks with two sources. 1-2 - Naftali Tishby, Noga Zaslavsky
:
Deep learning and the information bottleneck principle. 1-5 - Erman Koken, Ertem Tuncel
, Deniz Gündüz
:
On the distortion-energy tradeoff for zero-delay transmission of a Gaussian source over the AWGN channel. 1-5 - Ryan Gabrys, Han Mao Kiah, Olgica Milenkovic:
Asymmetric Lee distance codes: New bounds and constructions. 1-5 - Mingyue Ji, Antonia M. Tulino
, Jaime Llorca
, Giuseppe Caire:
Caching-aided coded multicasting with multiple random requests. 1-5 - Sergio Verdú:
Non-asymptotic covering lemmas. 1-3

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.