


default search action
ITW 2019: Visby, Sweden
- 2019 IEEE Information Theory Workshop, ITW 2019, Visby, Sweden, August 25-28, 2019. IEEE 2019, ISBN 978-1-5386-6900-6

- Gowtham R. Kurri, Vinod M. Prabhakaran:

Coordination via Shared Randomness. 1-5 - Alexandra M. Porter, Mary Wootters:

Embedded Index Coding. 1-5 - Yuta Sakai

, Mladen Kovacevic
, Vincent Y. F. Tan:
Second-Order Asymptotics of the Continuous-Time Poisson Channel. 1-5 - Damian Dudzicz, Silas L. Fong, Ashish Khisti:

An Explicit Construction of Optimal Streaming Codes for Channels with Burst and Arbitrary Erasures. 1-5 - Semih Yagli

, Alex Dytso
, H. Vincent Poor:
Estimation of Bounded Normal Mean: An Alternative Proof for the Discreteness of the Least Favorable Prior. 1-5 - Grant Greenberg, Ilan Shomorony:

The Metagenomic Binning Problem: Clustering Markov Sequences. 1-5 - Melih Bastopcu

, Sennur Ulukus:
Age of Information for Updates with Distortion. 1-5 - Victoria Kostina

:
Rate loss in the Gaussian CEO problem. 1-5 - Neri Merhav:

Error Exponents of Typical Random Trellis Codes. 1-5 - Swanand Kadhe

, Anoosheh Heidarzadeh, Alex Sprintson, Onur Ozan Koyluoglu:
On an Equivalence Between Single-Server PIR with Side Information and Locally Recoverable Codes. 1-5 - Seung-Hyun Nam

, Si-Hyeon Lee
:
Secrecy Capacity of a Gaussian Wiretap Channel with One-bit ADCs is Always Positive. 1-5 - Kirill Ivanov

, Rüdiger L. Urbanke:
Improved decoding of second-order Reed-Muller codes. 1-5 - Peng Zou, Omur Ozel, Suresh Subramaniam

:
Relative Age of Information: A New Metric for Status Update Systems. 1-5 - Gaurav Kumar Agarwal, Martina Cardone, Christina Fragouli:

On Secure Capacity of Multiple Unicast Traffic over Separable Networks. 1-5 - Hikmet Yildiz, Babak Hassibi:

Gabidulin Codes with Support Constraints. 1-5 - Mahdi Haghifam, Vincent Y. F. Tan, Ashish Khisti:

Sequential Classification with Empirically Observed Statistics. 1-5 - Litian Liu, Derya Malak, Muriel Médard:

Guesswork for Inference in Machine Translation with Seq2seq Model. 1-5 - Federico Brunero

, Daniela Tuninetti
, Natasha Devroye:
On Code Design for Wireless Channels with Additive Radar Interference. 1-5 - Soumya Subhra Banerjee, Himanshu Tyagi:

Practical Universal Data Exchange using Polar Codes. 1-5 - Holger Boche, Rafael F. Schaefer

, H. Vincent Poor:
On the Structure of the Capacity Formula for General Finite State Channels with Applications. 1-5 - Tobias J. Oechtering, Maël Le Treust:

Coordination Coding with Causal Decoder for Vector-valued Witsenhausen Counterexample Setups. 1-5 - Ghassen Zafzouf

, Girish N. Nair, Jamie S. Evans:
Zero-Error Capacity of Multiple Access Channels via Nonstochastic Information. 1-5 - Yuichiro Fujiwara, Yu Tsunoda

:
Small stopping sets in projective low-density parity-check codes. 1-5 - Eric Graves, Allison Beemer

:
Transforming an arbitrary code for the wiretap channel of type I into a code for the wiretap channel of type II. 1-5 - Amedeo Roberto Esposito

, Michael Gastpar, Ibrahim Issa
:
Learning and Adaptive Data Analysis via Maximal Leakage. 1-5 - Homa Esfahanizadeh, Ruiyi Wu, Lara Dolecek:

A Finite-Length Construction of Irregular Spatially-Coupled Codes. 1-5 - Haiyun He, Lin Zhou

, Vincent Y. F. Tan:
Distributed Detection with Empirically Observed Statistics. 1-5 - Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:

Multiple Access Channels with Byzantine Users. 1-5 - John MacLaren Walsh, Alexander Erick Trofimoff:

On Designing Probabilistic Supports to Map the Entropy Region. 1-5 - Tao Guo, Chao Tian, Tie Liu, Raymond W. Yeung:

Weakly Secure Symmetric Multilevel Diversity Coding. 1-5 - Yeow Meng Chee

, Michal Horovitz
, Alexander Vardy, Van Khu Vu, Eitan Yaakobi:
Endurance-Limited Memories with Informed Decoder. 1-5 - Michael Gastpar, Erixhen Sula:

Relaxed Wyner's Common Information. 1-5 - Rafael G. L. D'Oliveira, Salim El Rouayheb, Daniel Heinlein, David A. Karpuk:

Degree Tables for Secure Distributed Matrix Multiplication. 1-5 - Mohammad Vahid Jamali, Mahdi Soleymani, Hessam Mahdavifar:

Coded Distributed Computing: Performance Limits and Code Designs. 1-5 - Masahito Hayashi

, Yanling Chen:
Secrecy and Error Exponents of k-Transmitter Multiple Access Wire-tap Channel. 1-5 - Viduranga Bandara Wijekoon, Shuiyin Liu, Emanuele Viterbo

, Yi Hong
, Rino Micheloni, Alessia Marelli:
Coset Probability Based Majority-logic Decoding for Non-binary LDPC Codes. 1-5 - Reo Eriguchi, Noboru Kunihiro:

Strongly Secure Ramp Secret Sharing Schemes from Any Linear Secret Sharing Schemes. 1-5 - Cynthia Rush, Kuan Hsieh, Ramji Venkataramanan:

Spatially Coupled Sparse Regression Codes with Sliding Window AMP Decoding. 1-5 - Fuchun Lin, San Ling

, Reihaneh Safavi-Naini, Huaxiong Wang:
Non-malleable Coding for Arbitrary Varying Channels. 1-5 - Hitika Tiwari, Satyajit Thakor

:
On Characterization of Entropic Vectors at the Boundary of Almost Entropic Cones. 1-5 - Jinzhe Pan, Wai Ho Mow:

A New Importance Sampling Algorithm for Fast Simulation of Linear Block Codes over BSCs. 1-5 - Berksan Serbetci, Emanuele Parrinello, Petros Elia

:
Multi-access coded caching: gains beyond cache-redundancy. 1-5 - Tomer Berg

, Ofer Shayevitz, Young-Han Kim, Lele Wang:
Some Results on Distributed Source Simulation with no Communication. 1-5 - Chaitanya Chinni, Abhishek Kulkarni, Dheeraj M. Pai, Kaushik Mitra

, Pradeep Kiran Sarvepalli:
Neural Decoder for Topological Codes using Pseudo-Inverse of Parity Check Matrix. 1-5 - Ali Dehghan, Amir H. Banihashemi:

On the Computational Complexity of Finding Bipartite Graphs with a Small Number of Short Cycles and Large Girth. 1-5 - Mohammad Fereydounian, Mohammad Vahid Jamali, Hamed Hassani, Hessam Mahdavifar:

Channel Coding at Low Capacity. 1-5 - Ahmed A. Zewail, Aylin Yener:

Secure Caching and Delivery for Combination Networks with Asymmetric Connectivity. 1-5 - Homa Nikbakht, Michèle A. Wigger, Walid Hachem, Shlomo Shamai Shitz:

Mixed Delay Constraints on a Fading C-RAN Uplink. 1-5 - Tang Liu, Daniela Tuninetti

:
Private Pliable Index Coding. 1-5 - Adriano Da Silva:

On the continuity of the invariance entropy for hyperbolic linear control systems on Lie groups. 1-5 - Roman Sokolovskii, Fredrik Brännström

, Alexandre Graell i Amat:
A Refined Scaling Law for Spatially Coupled LDPC Codes Over the Binary Erasure Channel. 1-5 - Irina E. Bocharova, Boris D. Kudryashov:

Source coding with side information for binary memoryless sources. 1-5 - Srilakshmi Pattabiraman, Ryan Gabrys, Olgica Milenkovic:

Reconstruction and Error-Correction Codes for Polymer-Based Data Storage. 1-5 - Emanuele Parrinello, Petros Elia

:
Coded Caching with Optimized Shared-Cache Sizes. 1-5 - Christian Porter, Shanxiang Lyu

, Cong Ling:
On the Optimality of Gauss's Algorithm over Euclidean Imaginary Quadratic Fields. 1-5 - Hsuan-Yin Lin, Siddhartha Kumar, Eirik Rosnes, Alexandre Graell i Amat:

Improved Private Information Retrieval for Coded Storage From Code Decomposition : (Invited Paper). 1-5 - Seunghoan Song

, Masahito Hayashi
:
Capacity of Quantum Private Information Retrieval with Collusion of All But One of Servers. 1-5 - Lukas Holzbaur, Ragnar Freij-Hollanti, Camilla Hollanti

:
On the Capacity of Private Information Retrieval from Coded, Colluding, and Adversarial Servers. 1-5 - Hua Sun:

Private Information Delivery. 1-5 - Michail Mylonakis, Photios A. Stavrou, Mikael Skoglund:

Empirical Coordination Subject to a Fidelity Criterion. 1-5 - Ting-Yi Wu, Anshoo Tandon, Mehul Motani, Lav R. Varshney:

On the Outage-Constrained Rate of Skip-Sliding Window Codes. 1-5 - Lorenzo Miretti

, Paul de Kerret, David Gesbert:
On the Fundamental Limits of Cooperative Multiple-Access Channels with Distributed CSIT. 1-5 - Mehmet Fatih Aktas, Emina Soljanin

:
Anonymity Mixes as (Partial) Assembly Queues: Modeling and Analysis. 1-5 - Kazushi Mimura, Jun'ichi Takeuchi:

Dynamics of Damped Approximate Message Passing Algorithms. 1-5 - Song Fang, Mikael Skoglund, Karl Henrik Johansson

, Hideaki Ishii, Quanyan Zhu:
Generic Variance Bounds on Estimation and Prediction Errors in Time Series Analysis: An Entropy Perspective. 1-5 - Ryo Nomura

:
Intrinsic Randomness Problem with Respect to a Subclass of f-divergence. 1-5 - Alex Dytso

, H. Vincent Poor:
Properties of the Conditional Mean Estimator in Poisson Noise. 1-5 - Carlo Condo, Valerio Bioglio

, Ingmar Land:
SC-Flip Decoding of Polar Codes with High Order Error Correction Based on Error Dependency. 1-5 - James Chin-Jen Pang, Hessam Mahdavifar, S. Sandeep Pradhan:

Coding for Crowdsourced Classification with XOR Queries. 1-5 - Adarsh M. Subramaniam, Anoosheh Heidarzadeh, Krishna R. Narayanan:

Collaborative Decoding of Polynomial Codes for Distributed Computation. 1-5 - Olav Tirkkonen

, A. Robert Calderbank:
Codebooks of Complex Lines Based on Binary Subspace Chirps. 1-5 - Jun Muramatsu

:
Successive-Cancellation Decoding of Linear Source Code. 1-5 - Mahdi Cheraghchi

, João Ribeiro
, Ryan Gabrys, Olgica Milenkovic:
Coded Trace Reconstruction. 1-5 - Karim Banawan

, Batuhan Arasli
, Sennur Ulukus:
Improved Storage for Efficient Private Information Retrieval. 1-5 - Jin Yeong Tan, Lawrence Ong

, Behzad Asadi:
Can Marton Coding Alone Ensure Individual Secrecy? 1-5 - Christoph Kawan, Serdar Yüksel:

Stochastic stability of nonlinear dynamical systems under information constraints*. 1-5 - Sarah A. Obead, Hsuan-Yin Lin, Eirik Rosnes, Jörg Kliewer:

On the Capacity of Private Nonlinear Computation for Replicated Databases. 1-5 - Mahesh Babu Vaddi, B. Sundar Rajan:

On the Minrank of Symmetric and Neighboring Side-information Index Coding Problems. 1-5 - Moustafa Ebada, Ahmed Elkelesh, Stephan ten Brink:

Optimizing Polar Codes Compatible with Off-the-Shelf LDPC Decoders. 1-5 - Ahmed H. Hareedy

, A. Robert Calderbank:
A New Family of Constrained Codes with Applications in Data Storage. 1-5 - Bryan Liu, Shuangyang Li

, Yixuan Xie, Jinhong Yuan:
Deep Learning Assisted Sum-Product Detection Algorithm for Faster-than-Nyquist Signaling. 1-5 - Peng Kang, Yixuan Xie, Lei Yang, Chen Zheng, Jinhong Yuan, Yuejun Wei:

Enhanced Quasi-Maximum Likelihood Decoding of Short LDPC Codes Based on Saturation. 1-5 - Ishaque Ashar Kadampot, Matthieu R. Bloch:

Forward Reconciliation for Covert Key Generation. 1-5 - Seyyed Ali Hashemi

, Carlo Condo, Marco Mondelli, Warren J. Gross:
Rate-Flexible Fast Polar Decoders. 1-5 - Mehdi Dabirnia

, Alfonso Martinez, Albert Guillén i Fàbregas:
A Mismatched Decoding Perspective of Channel Output Quantization. 1-4 - Fritz Colonius, João A. N. Cossich, Alexandre J. Santana:

Invariance pressure for linear discrete-time systems. 1-4 - Chinmayananda Arunachala, Vaneet Aggarwal

, B. Sundar Rajan:
Optimal Broadcast Rate of a Class of Two-Sender Unicast Index Coding Problems. 1-5 - Yunqi Wan, Li Chen, Fangguo Zhang

:
Design of Guruswami-Sudan List Decoding for Elliptic Codes. 1-5 - Jiahui Chen, Haoyu Yin, Xiaowen You, Yanlin Geng, Youlong Wu:

Centralized Coded Caching with User Cooperation. 1-5 - Hannes Bartz, Thomas Jerkovits, Sven Puchinger, Johan Rosenkilde

:
Fast Root Finding for Interpolation-Based Decoding of Interleaved Gabidulin Codes. 1-5 - Michal Hledík, Thomas R. Sokolowski, Gasper Tkacik:

A Tight Upper Bound on Mutual Information. 1-5 - Narges Kazempour, Mahtab Mirmohseni, Mohammad Reza Aref:

Private Authentication: Optimal Information Theoretic Schemes. 1-5 - Yasutada Oohama:

Capacity Results for Discrete Memoryless Channels in the Finite Blocklength Regime. 1-5 - Hamid Ghourchian, Photios A. Stavrou, Tobias J. Oechtering, Mikael Skoglund:

Block Source Coding with Sequential Encoding. 1-5 - Emrah Akyol

:
On Optimal Jamming in Strategic Communication. 1-5 - Arun Padakandla:

Achievable Rate-Distortion Region for Robust Distributed Source Coding. 1-5 - Abdellatif Zaidi, Inaki Estella Aguerri:

Optimal Rate-Exponent Region for a Class of Hypothesis Testing Against Conditional Independence Problems. 1-5 - Anshoo Tandon

, Vincent Y. F. Tan, Lav R. Varshney:
Random Coding Error Exponent for the Bee-Identification Problem. 1-5 - Noha M. Helal

, Matthieu R. Bloch, Aria Nosratinia
:
Channel Resolvability with a Full-Duplex Decode-and-Forward Relay. 1-5 - Mireille Sarkiss

, Michèle A. Wigger:
Multi-library Coded Caching with Partial Secrecy. 1-5 - Xiugang Wu, Ayfer Özgür

, Michael Peleg, Shlomo Shamai Shitz:
New Upper Bounds on the Capacity of Primitive Diamond Relay Channels. 1-5 - Salman Habib, David G. M. Mitchell, Jörg Kliewer:

optimization of Nested Array-based LDPC Codes Via Spatial Coupling. 1-5 - Johan Östman, Rahul Devassy, Giuseppe Durisi, Erik G. Ström:

On the Nonasymptotic Performance of Variable-Length Codes with Noisy Stop Feedback. 1-5 - Holger Boche, Rafael F. Schaefer

, H. Vincent Poor:
Coding for Non-IID Sources and Channels: Entropic Approximations and a Question of Ahlswede. 1-5 - Hassan ZivariFard, Matthieu R. Bloch, Aria Nosratinia

:
Keyless Covert Communication in the Presence of Non-causal Channel State Information. 1-5 - Fangwei Ye, Carolina Naim, Salim El Rouayheb:

Preserving ON-OFF Privacy for Past and Future Requests. 1-5 - Diana Cristina González, Salman Salamatian, Muriel Médard, Michel Daoud Yacoub

:
Capacity of Wideband Multipath Fading Networks with Physically Degraded Broadcast. 1-5 - Siyao Li

, Hulya Seferoglu, Daniela Tuninetti
, Natasha Devroye:
On The Stability Region of the Layered Packet Erasure Broadcast Channel with Output Feedback. 1-5 - Onur Günlü

, Rafael F. Schaefer
, Gerhard Kramer:
Private Authentication with Physical Identifiers Through Broadcast Channel Measurements. 1-5 - Rawad Bitar, Mary Wootters, Salim El Rouayheb:

Stochastic Gradient Coding for Flexible Straggler Mitigation in Distributed Learning. 1-5 - Mohammad Rowshan

, Emanuele Viterbo
:
Improved List Decoding of Polar Codes by Shifted-pruning. 1-5 - Arnav Solanki

, Martina Cardone, Soheil Mohajer:
Non-Colluding Attacks Identification in Distributed Computing. 1-5 - Giulia Cervia, Tobias J. Oechtering, Mikael Skoglund:

Fixed-Length Strong Coordination. 1-5 - Shun Watanabe

, Te Sun Han:
Interval Algorithm for Random Number Generation: Information Spectrum Approach. 1-5 - Ran Averbuch, Neri Merhav:

Error Exponents of Typical Random Codes of Source-Channel Coding. 1-5 - Wei-Ting Chang, Ravi Tandon:

On the Upload versus Download Cost for Secure and Private Matrix Multiplication. 1-5 - Alireza Vahid, I-Hsiang Wang, Shih-Chun Lin:

Capacity Results for Erasure Broadcast Channels with Intermittent Feedback. 1-5 - Grigorii Trofimiuk, Peter Trifonov:

Construction of binary polarization kernels for low complexity window processing. 1-5 - Setareh Sharifian, Reihaneh Safavi-Naini:

A Modular Semantically Secure Wiretap Code with Shared Key for Weakly Symmetric Channels. 1-5 - Mohammad Moltafet, Markus Leinonen, Marian Codreanu

:
Closed-Form Expression for the Average Age of Information in a Multi-Source M/G/1 Queueing Model. 1-5 - Mahesh Babu Vaddi, B. Sundar Rajan:

A Field-Size Independent Code Construction for Groupcast Index Coding Problems. 1-5 - Ni Ding, Parastoo Sadeghi

:
A Submodularity-based Clustering Algorithm for the Information Bottleneck and Privacy Funnel. 1-5 - Min Qiu

, Xiaowei Wu, Yixuan Xie, Jinhong Yuan:
Density Evolution Analysis of Partially Information Coupled Turbo Codes on the Erasure Channel. 1-5 - Laurent Schmalen, Vahid Aref:

Spatially Coupled LDPC Codes with Non-uniform Coupling for Improved Decoding Speed. 1-5 - Lan V. Truong, Jonathan Scarlett:

On the Information-Theoretic Limits of Noisy Sparse Phase Retrieval. 1-5 - Yuta Nakahara

, Toshiyasu Matsushima:
Covariance Evolution for Spatially "Mt. Fuji" Coupled LDPC Codes. 1-5 - Shraga I. Bross, Amos Lapidoth:

The Additive Noise Channel with a Helper. 1-5 - Ali Reza Pedram, Takashi Tanaka, Matthew T. Hale:

Bidirectional Information Flow and the Roles of Privacy Masks in Cloud-Based Control. 1-5 - Shao-Lun Huang, Xiangxiang Xu:

On The Sample Complexity of HGR Maximal Correlation Functions. 1-5 - Elad Domanovitz, Silas L. Fong, Ashish Khisti:

An Explicit Rate-Optimal Streaming Code for Channels with Burst and Arbitrary Erasures. 1-5 - Xiaowei Wu, Jinhong Yuan:

Partially Information Coupled Bit-Interleaved Polar Coded Modulation for 16-QAM. 1-5 - Xingran Chen

, Shirin Saeedi Bidokhti:
Benefits of Coding on Age of Information in Broadcast Networks. 1-5 - Salman Salamatian, Litian Liu, Ahmad Beirami, Muriel Médard:

Mismatched Guesswork and One-to-One Codes. 1-5 - Shuo Shao, Jesús Gomicronmez-Vilardebomicron, Kai Zhang, Chao Tian:

On the Fundamental Limit of Coded Caching Systems with a Single Demand Type. 1-5 - Yihuan Liao, Lei Yang, Jinhong Yuan, Kechao Huang, Raymond W. K. Leung, Junyi Du:

LDPC Code Design for Delayed Bit-Interleaved Coded Modulation. 1-5 - Peter Trifonov:

Trellis-based Decoding Techniques for Polar Codes with Large Kernels. 1-5 - Frédéric Dupuis, Ashutosh Goswami

, Mehdi Mhalla, Valentin Savin
:
Purely Quantum Polar Codes. 1-5 - Andreas Lenz, Paul H. Siegel, Antonia Wachter-Zeh, Eitan Yaakobi:

An Upper Bound on the Capacity of the DNA Storage Channel. 1-5 - Lukas Holzbaur, Sven Puchinger, Antonia Wachter-Zeh:

On Error Decoding of Locally Repairable and Partial MDS Codes. 1-5 - Ali Dehghan, Amir H. Banihashemi:

From the Spectrum of the Adjacency Matrix to the Spectrum of Directed Edge Matrix: Counting Cycles of a Bipartite Graph Through a Simple Equation. 1-5 - Ahmed H. Hareedy

, Rohith Kuditipudi, A. Robert Calderbank:
Increasing the Lifetime of Flash Memories Using Multi-Dimensional Graph-Based Codes. 1-5 - Arun Padakandla:

On Enhancing the Fixed Block-Length Coding Scheme for Joint source-channel communication. 1-5 - Mohamed Seif, Ravi Tandon, Ming Li:

Context Aware Laplacian Mechanism for Local Information Privacy. 1-5 - Esmaeil Karimi, Fatemeh Kazemi, Anoosheh Heidarzadeh, Krishna R. Narayanan, Alex Sprintson:

Sparse Graph Codes for Non-adaptive Quantitative Group Testing. 1-5 - Michal Horovitz

, Eitan Yaakobi, Eyal En Gad, Jehoshua Bruck:
Iterative Programming of Noisy Memory Cells. 1-5 - Andrea Grigorescu, Holger Boche:

Differential Power Analysis Attacks from an Information-Theoretic Perspective. 1-5 - Jean Barbier

, Clément Luneau, Nicolas Macris:
Mutual Information for Low-Rank Even-Order Symmetric Tensor Factorization. 1-5 - Arthur Américo, Pasquale Malacaria, M. H. R. Khouzani:

Channel Ordering and Supermodularity. 1-5 - Maiara F. Bollauf

, Joseph J. Boutros, Nordine Mir:
New Bounds for GLD Lattices and Codes. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














