default search action
Allison Beemer
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c17]Duncan Koepke, Michaela Schnell, Madelyn St. Pierre, Allison Beemer:
Authenticated Partial Correction Over AV-MACs: Toward Characterization and Coding. Allerton 2024: 1-8 - [c16]Mayank Bakshi, Sara Ghasvarianjahromi, Yauhen Yakimenka, Allison Beemer, Oliver Kosut, Jörg Kliewer:
Valid: a Validated Algorithm for Learning in Decentralized Networks with Possible Adversarial Presence. ISIT 2024: 2502-2507 - [i11]Mayank Bakshi, Sara Ghasvarianjahromi, Yauhen Yakimenka, Allison Beemer, Oliver Kosut, Jörg Kliewer:
VALID: a Validated Algorithm for Learning in Decentralized Networks with Possible Adversarial Presence. CoRR abs/2405.07316 (2024) - [i10]Duncan Koepke, Michaela Schnell, Madelyn St. Pierre, Allison Beemer:
Authenticated partial correction over AV-MACs: toward characterization and coding. CoRR abs/2407.17582 (2024) - 2023
- [j6]Emily McMillon, Allison Beemer, Christine A. Kelley:
Extremal absorbing sets in low-density parity-check codes. Adv. Math. Commun. 17(2): 465-483 (2023) - [j5]Salman Habib, Allison Beemer, Jörg Kliewer:
RELDEC: Reinforcement Learning-Based Decoding of Moderate Length LDPC Codes. IEEE Trans. Commun. 71(10): 5661-5674 (2023) - [j4]Eric Graves, Allison Beemer, Jörg Kliewer, Oliver Kosut, Paul L. Yu:
Keyless Authentication for AWGN Channels. IEEE Trans. Inf. Theory 69(1): 496-519 (2023) - [j3]Allison Beemer, Altan Berdan Kilic, Alberto Ravagnani:
Network Decoding. IEEE Trans. Inf. Theory 69(6): 3708-3730 (2023) - 2022
- [c15]Allison Beemer, Rutuja Kshirsagar, Gretchen L. Matthews:
Graph-based codes for hierarchical recovery. ISIT 2022: 1554-1559 - [i9]Allison Beemer, Altan Berdan Kilic, Alberto Ravagnani:
Network Decoding. CoRR abs/2205.14655 (2022) - 2021
- [j2]Salman Habib, Allison Beemer, Jörg Kliewer:
Belief Propagation Decoding of Short Graph-Based Channel Codes via Reinforcement Learning. IEEE J. Sel. Areas Inf. Theory 2(2): 627-640 (2021) - [c14]Salman Habib, Allison Beemer, Jörg Kliewer:
Decoding of Moderate Length LDPC Codes via Learned Clustered Check Node Scheduling. ISWCS 2021: 1-6 - [i8]Allison Beemer, Alberto Ravagnani:
The Curious Case of the Diamond Network. CoRR abs/2107.02144 (2021) - [i7]Eric Graves, Allison Beemer, Jörg Kliewer, Oliver Kosut, Paul L. Yu:
Keyless Authentication for AWGN Channels. CoRR abs/2111.06386 (2021) - [i6]Salman Habib, Allison Beemer, Jörg Kliewer:
RELDEC: Reinforcement Learning-Based Decoding of Moderate Length LDPC Codes. CoRR abs/2112.13934 (2021) - 2020
- [c13]Allison Beemer, Eric Graves, Jörg Kliewer, Oliver Kosut, Paul L. Yu:
Authentication and Partial Message Correction over Adversarial Multiple-Access Channels. CNS 2020: 1-6 - [c12]Emily McMillon, Allison Beemer, Christine A. Kelley:
Analysis of Absorbing Sets using Cosets and Syndromes. ISIT 2020: 367-372 - [c11]Allison Beemer, Eric Graves, Jörg Kliewer, Oliver Kosut, Paul L. Yu:
Authentication with Mildly Myopic Adversaries. ISIT 2020: 984-989 - [c10]Salman Habib, Allison Beemer, Jörg Kliewer:
Learned Scheduling of LDPC Decoders Based on Multi-armed Bandits. ISIT 2020: 2789-2794 - [c9]Salman Habib, Allison Beemer, Jörg Kliewer:
Learning to Decode: Reinforcement Learning for Decoding of Sparse Graph-Based Channel Codes. NeurIPS 2020 - [i5]Allison Beemer, Eric Graves, Jörg Kliewer, Oliver Kosut, Paul L. Yu:
Authentication Against a Myopic Adversary. CoRR abs/2001.03593 (2020) - [i4]Salman Habib, Allison Beemer, Jörg Kliewer:
Learning to Decode: Reinforcement Learning for Decoding of Sparse Graph-Based Channel Codes. CoRR abs/2010.05637 (2020)
2010 – 2019
- 2019
- [j1]Allison Beemer, Kathryn Haymaker, Christine A. Kelley:
Absorbing sets of codes from finite geometries. Cryptogr. Commun. 11(5): 1115-1131 (2019) - [c8]Allison Beemer, Oliver Kosut, Jörg Kliewer, Eric Graves, Paul L. Yu:
Authentication Against a Myopic Adversary. CNS 2019: 1-5 - [c7]Allison Beemer, Oliver Kosut, Jörg Kliewer, Eric Graves, Paul L. Yu:
Structured Coding for Authentication in the Presence of a Malicious Adversary. ISIT 2019: 617-621 - [c6]Eric Graves, Allison Beemer:
Transforming an arbitrary code for the wiretap channel of type I into a code for the wiretap channel of type II. ITW 2019: 1-5 - [i3]Eric Graves, Allison Beemer:
Modular design to transform codes for the wiretap channel of type I into codes for the wiretap channel of type II. CoRR abs/1901.06377 (2019) - 2018
- [c5]Allison Beemer, Ryan Coatney, Venkatesan Guruswami, Hiram H. Lopez, Fernando Piñero:
Explicit optimal-length locally repairable codes of distance 5. Allerton 2018: 800-804 - [i2]Allison Beemer, Ryan Coatney, Venkatesan Guruswami, Hiram H. López, Fernando Piñero:
Explicit optimal-length locally repairable codes of distance 5. CoRR abs/1810.03980 (2018) - 2017
- [c4]Allison Beemer, Salman Habib, Christine A. Kelley, Jörg Kliewer:
A generalized algebraic approach to optimizing SC-LDPC codes. Allerton 2017: 672-679 - [c3]Allison Beemer, Christine A. Kelley:
Multidimensional Decoding Networks for Trapping Set Analysis. ICMCTA 2017: 11-20 - [c2]Allison Beemer, Carolyn Mayer, Christine A. Kelley:
Erasure Correction and Locality of Hypergraph Codes. ICMCTA 2017: 21-29 - [i1]Allison Beemer, Salman Habib, Christine A. Kelley, Jörg Kliewer:
A Generalized Algebraic Approach to Optimizing SC-LDPC Codes. CoRR abs/1710.03619 (2017) - 2016
- [c1]Allison Beemer, Christine A. Kelley:
Avoiding trapping sets in SC-LDPC codes under windowed decoding. ISITA 2016: 206-210
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint