


default search action
ITW Fall 2015: Jeju Island, South Korea
- 2015 IEEE Information Theory Workshop - Fall (ITW), Jeju Island, South Korea, October 11-15, 2015. IEEE 2015, ISBN 978-1-4673-7852-9

- Viveck R. Cadambe

, Arya Mazumdar:
Alphabet-size dependent bounds for exact repair in distributed storage. 1-3 - Chandra Thapa

, Lawrence Ong
, Sarah J. Johnson
:
Generalized interlinked cycle cover for index coding. 4-8 - Fatemeh Arbabjolfaei, Young-Han Kim:

On critical index coding problems. 9-13 - Xiao Huang

, Salim El Rouayheb:
Index coding and network coding via rank minimization. 14-18 - Wenwen Zhao, Lifeng Lai:

Distributed testing against independence with conferencing encoders. 19-23 - Jason Castiglione, Aleksandar Kavcic:

Trellis based lower bounds on capacities of channels with synchronization errors. 24-28 - Afshin Abdi, Faramarz Fekri

:
Source identification and compression of mixture data from finite observations. 29-33 - Xuan Guang, Jiyong Lu, Fang-Wei Fu:

Variable-security-level secure network coding. 34-38 - Amaro Barreal, Joonas Pääkkönen, David A. Karpuk, Camilla Hollanti

, Olav Tirkkonen
:
A low-complexity message recovery method for Compute-and-Forward relaying. 39-43 - Congduan Li, Steven Weber, John MacLaren Walsh:

Network combination operations preserving the sufficiency of linear network codes. 44-48 - Jhordany Rodriguez Parra, Terence Chan

, Ingmar Land, Siu-Wai Ho
:
Authentication for two-way relay channel with Physical-Layer Network coding. 49-53 - Jung-Hyun Kim, Mi-Young Nam, Hong-Yeop Song:

Optimal binary locally repairable codes with joint information locality. 54-58 - Han Mao Kiah, Son Hoang Dau

, Wentu Song, Chau Yuen:
Local codes with addition based repair. 59-63 - J. Harshan, Frédérique E. Oggier:

On Algebraic Manipulation Detection codes from linear codes and their application to storage systems. 64-68 - Jesper Pedersen

, Alexandre Graell i Amat
, Iryna Andriyanova, Fredrik Brannstrom
:
Repair scheduling in wireless distributed storage with D2D communication. 69-73 - Wentu Song, Son Hoang Dau

, Chau Yuen:
Erasure codes with symbol locality and group decodability for distributed storage. 74-78 - Sung Hoon Lim

, Michael Gastpar:
Coding theorems via linear codes: Joint decoding rate regions. 79-83 - Inaki Estella Aguerri, Deniz Gündüz

:
Correlated Gaussian sources over Gaussian weak interference channels. 84-88 - Victor Quintero

, Samir Medina Perlaza
, Jean-Marie Gorce
:
Noisy channel-output feedback capacity of the linear deterministic interference channel. 89-93 - Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran:

Dirty paper arbitrarily varying channel with a state-aware adversary. 94-98 - Bruce E. Hajek, Yihong Wu, Jiaming Xu:

Exact recovery threshold in the binary censored block model. 99-103 - Nikita A. Shevchenko, Jaroslaw E. Prilepsky

, Stanislav A. Derevyanko
, Alex Alvarado
, Polina Bayvel, Sergei K. Turitsyn
:
A lower bound on the per soliton capacity of the nonlinear optical fibre channel. 104-108 - Mehrdad Tahmasbi, Faramarz Fekri

:
On the capacity achieving probability measures for molecular receivers. 109-113 - Lav R. Varshney:

Toward limits of constructing reliable memories from unreliable components. 114-118 - Shounak Roy, Shayan Garani Srinivasa:

Two dimensional error-correcting codes using finite field Fourier transform. 119-123 - Liyasi Wu:

Locally correcting multiple bits and codes of high rate. 124-128 - Jin-Ho Chung, Kyeongcheol Yang:

New construction of asymptotically optimal optical orthogonal codes. 129-132 - Eirik Rosnes, Alexandre Graell i Amat

:
Analysis of spatially-coupled counter braids. 133-137 - Saeedeh Moloudi, Michael Lentmaier, Alexandre Graell i Amat

:
Threshold saturation for spatially coupled turbo-like codes over the binary erasure channel. 138-142 - Min Zhu, David G. M. Mitchell, Michael Lentmaier, Daniel J. Costello Jr., Baoming Bai:

Window decoding of Braided Convolutional Codes. 143-147 - Najeeb ul Hassan, Iryna Andriyanova, Michael Lentmaier, Gerhard P. Fettweis:

Protograph design for spatially-coupled codes to attain an arbitrary diversity order. 148-152 - Vincent Y. F. Tan:

Error and erasure exponents for the asymmetric broadcast channel. 153-157 - Sajjad Bahrami, Behrooz Razeghi

, Mostafa Monemizadeh, Ghosheh Abed Hodtani
:
Joint source-channel coding for broadcast channel with cooperating receivers. 158-162 - Yanlin Geng, Fan Cheng:

Duality between finite numbers of discrete multiple access and broadcast channels. 163-166 - Silas L. Fong

, Vincent Y. F. Tan:
A proof of the strong converse theorem for Gaussian multiple access channels. 167-171 - Ricardo Antonio Parrao Hernandez, Brian M. Kurkoski:

The three/two Gaussian parametric LDLC decoder. 172-176 - Nan Zhang, Md. Noor-A-Rahim

, Badri N. Vellambi
, Khoa D. Nguyen
:
Anytime properties of protograph-based repeat-accumulate codes. 177-181 - Farshid Mokhtarinezhad, Jörg Kliewer, Osvaldo Simeone

:
Lossy compression with privacy constraints: Optimality of polar codes. 182-186 - Runxin Wang, Junya Honda, Hirosuke Yamamoto

, Rongke Liu, Yi Hou:
Construction of polar codes for channels with memory. 187-191 - Badri N. Vellambi

, Jörg Kliewer, Matthieu R. Bloch:
Strong coordination over multi-hop line networks. 192-196 - Youlong Wu:

Coding schemes for discrete memoryless multicast networks with rate-limited feedback. 197-201 - Mahed Abroshan, Amin Aminzadeh Gohari

, Sidharth Jaggi:
Zero error coordination. 202-206 - Maria Angeles Vázquez-Castro:

A geometric approach to dynamic network coding. 207-211 - Yuxin Chen, Changho Suh

:
Top-K ranking: An information-theoretic perspective. 212-213 - Igal Sason, Sergio Verdú:

Upper bounds on the relative entropy and Rényi divergence as a function of total variation distance for finite alphabets. 214-218 - Emrah Akyol

, Cedric Langbort, Tamer Basar:
Strategic compression and transmission of information. 219-223 - Jun Geng, Weiyu Xu, Lifeng Lai:

Detection of correlated components in multivariate Gaussian models. 224-228 - Ning Liang, Wenyi Zhang:

A mixed-ADC receiver architecture for massive MIMO systems. 229-233 - Ramy H. Gohary, Halim Yanikomeroglu

:
The ergodic high SNR capacity of the spatially-correlated non-coherent MIMO channel within an SNR-independent gap. 234-238 - Alexey Buzuverov, Hussein Al-Shatri, Anja Klein:

On the degrees of freedom of the three-user MIMO interference channel with delayed CSIT. 239-243 - Gilwon Lee, Youngchul Sung, Junyeong Seo:

How many users are needed for non-trivial performance of random beamforming in highly-directional mm-wave MIMO downlink? 244-248 - Divesh Aggarwal, Alexander Golovnev:

A note on lower bounds for non-interactive message authentication using weak keys. 249-251 - Nima Tavangaran, Holger Boche, Rafael F. Schaefer:

Secret-Key capacity of compound source models with one-way public communication. 252-256 - Aleksandar Kavcic, Miodrag J. Mihaljevic, Kanta Matsuura

:
Light-weight secrecy system using channels with insertion errors: Cryptographic implications. 257-261 - Basak Guler, Kaya Tutuncuoglu, Aylin Yener:

Maximizing recommender's influence in a social network: An information theoretic perspective. 262-266 - Seyed Pooya Shariatpanahi

, Abolfazl S. Motahari, Babak Hossein Khalaj:
Content delivery via multi-server coded caching in linear networks. 267-271 - Lei Yu

, Houqiang Li, Weiping Li, Zixiang Xiong, Anders Høst-Madsen:
On the energy-delay tradeoff in lossy network communications. 272-276 - Hamed Mirghasemi, Jean-Claude Belfiore:

Lattice code design criterion for MIMO wiretap channels. 277-281 - Germán Bassi

, Pablo Piantanida, Shlomo Shamai
:
The wiretap channel with generalized feedback: Secure communication and key generation. 282-286 - Mani Bastani Parizi, Emre Telatar:

On the secrecy exponent of the wire-tap channel. 287-291 - Ron Steinfeld, Amin Sakzad

:
On massive MIMO physical layer cryptosystem. 292-296 - Renaud-Alexandre Pitaval, Lu Wei

, Olav Tirkkonen
, Jukka Corander:
On the exact volume of metric balls in complex Grassmann manifolds. 297-301 - Abdellatif Zaidi:

On two terminal interactive source coding for function computation with remote sources. 302-306 - Min-Hsiu Hsieh

, Shun Watanabe
:
Fully quantum source compression with a quantum helper. 307-311 - Tetsunao Matsuta, Tomohiko Uyematsu:

Achievable rate regions for asynchronous Slepian-Wolf coding systems. 312-316 - Pritam Mukherjee, Sennur Ulukus:

Secure degrees of freedom of the interference channel with no eavesdropper CSI. 317-321 - Ahmed A. Zewail, Aylin Yener:

The two-hop interference untrusted-relay channel with confidential messages. 322-326 - Kevin Luo, Ramy H. Gohary, Halim Yanikomeroglu

:
The capacity of a broadcast channel with Gaussian jamming and a friendly eavesdropper. 327-331 - Eric Graves, Tan F. Wong:

Information integrity between correlated sources through Wyner-Ziv coding. 332-336 - Zuxing Li, Tobias J. Oechtering:

Privacy on hypothesis testing in smart grids. 337-341 - Ling Liu, Cong Ling:

Polar lattices are good for lossy compression. 342-346 - Meryem Benammar, Abdellatif Zaidi:

Rate-distortion function for a Heegard-Berger problem with two sources and degraded reconstruction sets. 347-351 - Alon Kipnis

, Stefano Rini, Andrea J. Goldsmith:
The indirect rate-distortion function of a binary i.i.d source. 352-356 - Gholamreza Alirezaei

, Rudolf Mathar:
Optimum one-bit quantization. 357-361 - Georg Tauböck

, Erwin Riegler:
Almost lossless analog compression without phase information - complex case. 362-366

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














