default search action
ISIT 2016: Barcelona, Spain
- IEEE International Symposium on Information Theory, ISIT 2016, Barcelona, Spain, July 10-15, 2016. IEEE 2016, ISBN 978-1-5090-1806-2
Mo-AM-1-1: Lossless Source Coding
- Jorge F. Silva, Pablo Piantanida:
Almost lossless variable-length source coding on countably infinite alphabets. 1-5 - Weihua Hu, Hirosuke Yamamoto, Junya Honda:
Tight upper bounds on the redundancy of optimal binary AIFV codes. 6-10 - Hidetoshi Yokoo:
On the stationary distribution of Asymmetric Binary Systems. 11-15 - John C. Kieffer:
A survey of Bratteli information source theory. 16-20
Mo-AM-1-2: Change-Point Detection
- Husheng Li:
Data driven quickest change detection: An algorithmic complexity approach. 21-25 - George V. Moustakides, Venugopal V. Veeravalli:
Sequentially detecting transitory changes. 26-30 - Jie Chen, Wenyi Zhang, H. Vincent Poor:
Non-bayesian multiple change-point detection controlling false discovery rate. 31-35 - Sourabh Banerjee, Georgios Fellouris:
Decentralized sequential change detection with ordered CUSUMs. 36-40
Mo-AM-1-3: Polar Codes 1
- Song-Nam Hong, Dennis Hui, Ivana Maric:
Capacity-achieving rate-compatible polar codes. 41-45 - Bin Li, David Tse, Kai Chen, Hui Shen:
Capacity-achieving rateless polar codes. 46-50 - Talha Cihad Gülcü, Min Ye, Alexander Barg:
Construction of polar codes for arbitrary discrete memoryless channels. 51-55 - Maxim Raginsky:
Channel polarization and Blackwell measures. 56-60
Mo-AM-1-4: Distributed Storage 1
- Netanel Raviv, Natalia Silberstein, Tuvi Etzion:
Constructions of high-rate minimum storage regenerating codes over small fields. 61-65 - Hyuk Lee, Jungwoo Lee:
An outer bound on the storage-bandwidth tradeoff of exact-repair cooperative regenerating codes. 66-70 - Muralee Nikhil Krishnan, P. Vijay Kumar:
On MBR codes with replication. 71-75 - Arman Fazeli, Sreechakra Goparaju, Alexander Vardy:
Minimum storage regenerating codes for all parameters. 76-80
Mo-AM-1-5: Matrix Completion
- Yanjun Li, Kiryung Lee, Yoram Bresler:
Optimal sample complexity for stable matrix recovery. 81-85 - James Saunderson, Maryam Fazel, Babak Hassibi:
Simple algorithms and guarantees for low rank matrix completion over F2. 86-90 - Ramya Korlakai Vinayak, Babak Hassibi:
Similarity clustering in the presence of outliers: Exact recovery via convex program. 91-95 - Daniel L. Pimentel-Alarcón, Robert D. Nowak:
A converse to low-rank matrix completion. 96-100
Mo-AM-1-6: Sequences 1
- Tor Helleseth, Alexander Kholosha:
New ternary binomial bent functions. 101-104 - Min Kyu Song, Hong-Yeop Song, Dae San Kim, Jang Yong Lee:
Correlation properties of sequences from the 2-D array structure of Sidelnikov sequences of different lengths and their union. 105-109 - Sihem Mesnager:
On constructions of bent functions from involutions. 110-114 - Xinjiao Chen, Chunlei Li, Chunming Rong:
Perfect Gaussian integer sequences from cyclic difference sets. 115-119
Mo-AM-1-7: Index Coding 1
- Linqi Song, Christina Fragouli:
A polynomial-time algorithm for pliable index coding. 120-124 - Mahesh Babu Vaddi, B. Sundar Rajan:
Optimal vector linear index codes for some symmetric side information problems. 125-129 - Prasad Krishnan, V. Lalitha:
A class of index coding problems with rate 1/3. 130-134 - Kai Wan, Daniela Tuninetti, Pablo Piantanida:
On caching with more users than files. 135-139
Mo-AM-1-8: Multi-Terminal Source Coding 1
- Yaoqing Yang, Pulkit Grover, Soummya Kar:
Coding for lossy function computation: Analyzing sequential function computation with distortion accumulation. 140-144 - Jhelum Chakravorty, Aditya Mahajan:
Structural results for two-user interactive communication. 145-149 - Ebrahim MolavianJazi, Aylin Yener:
Two-way lossy compression via a relay with self source. 150-154 - Wenbo He, Bobak Nazer:
Integer-forcing source coding: Successive cancellation and source-channel duality. 155-159
Mo-AM-1-9: Broadcast Channels
- Shih-Chun Lin, I-Hsiang Wang:
Single-user CSIT can be quite useful for state-dependent broadcast channels. 160-164 - Ahmed Attia Abotabl, Aria Nosratinia:
Bit-additive superposition coding for the bandwidth limited broadcast channel. 165-169 - Silas L. Fong, Vincent Y. F. Tan:
A proof of the strong converse theorem for Gaussian broadcast channels via the Gaussian Poincaré inequality. 170-174 - Behzad Asadi, Lawrence Ong, Sarah J. Johnson:
A unified inner bound for the two-receiver memoryless broadcast channel with channel state and message side information. 175-179
Mo-AM-2-1: Approximate Message Passing
- Charles Jeon, Arian Maleki, Christoph Studer:
On the performance of mismatched data detection in large MIMO systems. 180-184 - Yash Deshpande, Emmanuel Abbe, Andrea Montanari:
Asymptotic mutual information for the binary stochastic block model. 185-189 - Alyson K. Fletcher, Mojtaba Sahraee-Ardakan, Sundeep Rangan, Philip Schniter:
Expectation consistent approximate inference: Generalizations and convergence. 190-194
Mo-AM-2-2: Constrained Coding 1
- Vitaly Skachek, Kees A. Schouhamer Immink:
Minimum pearson distance detection in the presence of unknown slowly varying offset. 195-199 - Yeow Meng Chee, Johan Chrisnata, Han Mao Kiah, San Ling, Thanh Thanh Nguyen, Van Khu Vu:
Rates of constant-composition codes that mitigate intercell interference. 200-204 - Yeow Meng Chee, Johan Chrisnata, Han Mao Kiah, San Ling, Thanh Thanh Nguyen, Van Khu Vu:
Efficient encoding/decoding of capacity-achieving constant-composition ICI-free codes. 205-209 - Chaitanya Kumar Matcha, Mohsen Bahrami, Shounak Roy, Shayan Garani Srinivasa, Bane Vasic:
Generalized belief propagation based TDMR detector and decoder. 210-214
Mo-AM-2-3: Polar Codes 2
- Henry D. Pfister, Rüdiger L. Urbanke:
Near-optimal finite-length scaling for polar codes over large alphabets. 215-219 - Christian Schürch:
A partial order for the synthesized channels of a polar code. 220-224 - Eren Sasoglu, Ido Tal:
Polar coding for processes with memory. 225-229 - Magali Bardet, Vlad Dragoi, Ayoub Otmani, Jean-Pierre Tillich:
Algebraic properties of polar codes from a new polynomial formalism. 230-234
Mo-AM-2-4: Distributed Storage 2
- Kaveh Mahdaviani, Ashish Khisti, Soheil Mohajer:
Bandwidth adaptive & error resilient regenerating codes with minimum repair bandwidth. 235-239 - Moslem Noori, Emina Soljanin, Masoud Ardakani:
On storage allocation for maximum service rate in distributed storage systems. 240-244 - Yuchong Hu, Patrick P. C. Lee, Xiaoyang Zhang:
Double Regenerating Codes for hierarchical data centers. 245-249 - Rami Cohen, Yuval Cassuto:
Placement and read algorithms for high throughput in coded network switches. 250-254
Mo-AM-2-5: Information Theory in Biology 1
- Abram Magner, Daisuke Kihara, Wojciech Szpankowski:
The Boltzmann sequence-structure channel. 255-259 - Noga Alon, Jehoshua Bruck, Farzad Farnoud, Siddharth Jain:
On the duplication distance of binary strings. 260-264 - Shirshendu Ganguly, Elchanan Mossel, Miklós Z. Rácz:
Sequence assembly from corrupted shotgun reads. 265-269 - Ohad Elishco, Farzad Farnoud, Moshe Schwartz, Jehoshua Bruck:
The capacity of some Pólya string models. 270-274
Mo-AM-2-6: Wireless Communications 1
- Mohamed Fadel, Aria Nosratinia:
Broadcast channel under unequal coherence intervals. 275-279 - Derya Malak, Mazin Al-Shalash, Jeffrey G. Andrews:
Optimizing the spatial content caching distribution for device-to-device communications. 280-284 - Ejder Bastug, Mehdi Bennis, Marios Kountouris, Mérouane Debbah:
Edge caching for coverage and capacity-aided heterogeneous networks. 285-289 - Changho Suh, David Tse, Jaewoong Cho:
To feedback or not to feedback. 290-294
Mo-AM-2-7: Feedback 1
- Jui Wu, Achilleas Anastasopoulos:
On the capacity of the chemical channel with feedback. 295-299 - Photios A. Stavrou, Charalambos D. Charalambous, Christos K. Kourtellaris:
Sequential Necessary and Sufficient Conditions for optimal channel input distributions of channels with memory and feedback. 300-304 - Rana Abbas, Mahyar Shirvanimoghaddam, Yonghui Li, Branka Vucetic:
Analysis on LT codes for unequal recovery time with complete and partial feedback. 305-309 - Oron Sabag, Haim H. Permuter, Henry D. Pfister:
A single-letter upper bound on the feedback capacity of unifilar finite-state channels. 310-314
Mo-AM-2-8: Multiple Antennas 1
- Seok-Hwan Park, Osvaldo Simeone, Shlomo Shamai:
Joint optimization of cloud and edge processing for fog radio access networks. 315-319 - An Liu, Vincent K. N. Lau:
Sum capacity of massive MIMO systems with quantized hybrid beamforming. 320-324 - Sergey Loyka:
The capacity of Gaussian MISO channels under total and per-antenna power constraints. 325-329 - Giuseppa Alfano, Carla-Fabiana Chiasserini, Alessandro Nordio:
SNR gap between MIMO linear receivers: Characterization and applications. 330-334
Mo-AM-2-9: Multiple Access Channels 1
- Per Austrin, Petteri Kaski, Mikko Koivisto, Jesper Nederlof:
Sharper upper bounds for unbalanced Uniquely Decodable Code Pairs. 335-339 - Parham Noorzad, Michelle Effros, Michael Langberg:
The unbounded benefit of encoder cooperation for the k-user MAC. 340-344 - Austin Taghavi, Avinash Vem, Jean-François Chamberland, Krishna R. Narayanan:
On the design of universal schemes for massive uncoordinated multiple access. 345-349 - Siu-Wai Ho, Chi Wan Sung:
Uncoordinated multiple access schemes for visible light communications and positioning. 350-354
Mo-PM-1-1: Point Process Channels
- Ligong Wang:
On the continuous-time Poisson channel with varying dark current known to the transmitter. 355-359 - Nirmal V. Shende, Aaron B. Wagner:
The stochastic-calculus approach to multi-receiver poisson channels. 360-364 - Guido Carlo Ferrante, Tony Q. S. Quek, Moe Z. Win:
An achievable rate region for superposed timing channels. 365-369 - Guido Carlo Ferrante, Tony Q. S. Quek, Moe Z. Win:
Timing capacity of queues with random arrival and modified service times. 370-374 - Ain Ul Aisha, Yingbin Liang, Lifeng Lai, Shlomo Shamai:
On the sum-rate capacity of non-symmetric Poisson multiple access channel. 375-379
Mo-PM-1-2: Constrained Coding 2
- Elie N. Mambou, Theo G. Swart:
Encoding and decoding of balanced q-ary sequences using a Gray code prefix. 380-384 - Jos H. Weber, Theo G. Swart, Kees A. Schouhamer Immink:
Simple systematic Pearson coding. 385-389 - Ryan Gabrys, Olgica Milenkovic:
Balanced permutation codes. 390-394 - Ohad Elishco, Tom Meyerovitch, Moshe Schwartz:
Encoding semiconstrained systems. 395-399 - Tadashi Wadayama, Taisuke Izumi:
Bounds on asymptotic rate of capacitive crosstalk avoidance codes for on-chip buses. 400-404
Mo-PM-1-3: Coded Caching
- Qianqian Yang, Deniz Gündüz:
Centralized coded caching for heterogeneous lossy requests. 405-409 - Mohammed Karmoose, Martina Cardone, Christina Fragouli:
Simplifying wireless social caching. 410-414 - Jad Hachem, Urs Niesen, Suhas N. Diggavi:
A layered caching architecture for the interference channel. 415-419 - Li Tang, Aditya Ramamoorthy:
Coded caching for networks with the resolvability property. 420-424 - Vaishakh Ravindrakumar, Parthasarathi Panda, Nikhil Karamchandani, Vinod M. Prabhakaran:
Fundamental limits of secretive coded caching. 425-429
Mo-PM-1-4: Distributed Storage 3
- Preetum Nakkiran, K. V. Rashmi, Kannan Ramchandran:
Optimal systematic distributed storage codes with fast encoding. 430-434 - Swanand Kadhe, Alex Sprintson:
Codes with unequal locality. 435-439 - Jie Hao, Shu-Tao Xia, Bin Chen:
Some results on optimal locally repairable codes. 440-444 - Anyu Wang, Zhifang Zhang, Dongdai Lin:
Two classes of (r, t)-locally repairable codes. 445-449 - Netanel Raviv, Eitan Yaakobi, Muriel Médard:
Coding for locality in reconstructing permutations. 450-454
Mo-PM-1-5: Energy Harvesting 1
- Silas L. Fong, Vincent Y. F. Tan, Jing Yang:
A non-asymptotic achievable rate for the AWGN energy-harvesting channel using save-and-transmit. 455-459 - Ayça Özçelikkale, Tomas McKelvey, Mats Viberg:
Performance bounds for remote estimation with an energy harvesting sensor. 460-464 - Konchady Gautam Shenoy, Vinod Sharma:
Finite blocklength achievable rates for energy harvesting AWGN channels with infinite buffer. 465-469 - Hajar Mahdavi-Doost, Narayan Prasad, Sampath Rangarajan:
Optimizing energy efficiency over energy-harvesting LTE cellular networks. 470-474 - Xianwen Wu, Jing Yang, Jingxian Wu:
Optimal energy management for energy harvesting transmitters under battery usage constraint. 475-479
Mo-PM-1-6: Sequences 2
- Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nian Li:
On the (non-)existence of APN (n, n)-functions of algebraic degree n. 480-484 - Soukayna Qarboua, Julien Schrek, Caroline Fontaine:
New results about Tu-Deng's conjecture. 485-489 - Lucien Lapierre, Petr Lisonek:
On vectorial bent functions with Dillon-type exponents. 490-494 - Nir Weinberger, Ofer Shayevitz:
On the optimal boolean function for prediction under quadratic loss. 495-499 - Or Ordentlich, Ofer Shayevitz, Omri Weinstein:
An improved upper bound for the most informative boolean function conjecture. 500-504
Mo-PM-1-7: Secrecy
- Dan He, Yuan Luo, Ning Cai:
Strong secrecy capacity of the wiretap channel II with DMC main channel. 505-509 - Germán Bassi, Pablo Piantanida, Shlomo Shamai:
Secret key generation over noisy channels with common randomness. 510-514 - Shashank Vatedka, Navin Kashyap:
A lattice coding scheme for secret key generation from Gaussian Markov tree sources. 515-519 - Ibrahim Issa, Sudeep Kamath, Aaron B. Wagner:
Maximal leakage minimization for the Shannon cipher system. 520-524
Mo-PM-1-8: Lossy Compression 1
- Sung Hoon Lim, Chien-Yi Wang, Michael Gastpar:
Information theoretic caching: The multi-user case. 525-529 - Badri N. Vellambi, Jörg Kliewer, Matthieu R. Bloch:
Lossy compression with near-uniform encoder outputs. 530-534 - Sinem Unal, Aaron B. Wagner:
An LP lower bound for rate distortion with variable side information. 535-539 - Alon Kipnis, Stefano Rini, Andrea J. Goldsmith:
Multiterminal compress-and-estimate source coding. 540-544
Mo-PM-1-9: JKW Award Finalists 1 / Interference
- Wonjae Shin, Namyoon Lee, Jungwoo Lee, H. Vincent Poor:
Guiding blind transmitters for K-user MISO interference relay channels with Imperfect channel knowledge. 545-549 - Xinping Yi, Giuseppe Caire:
Topological interference management with decoded message passing. 550-554 - Heecheol Yang, Navid Naderializadeh, Amir Salman Avestimehr, Jungwoo Lee:
Topological interference management with reconfigurable antennas. 555-559 - Hua Sun, Syed Ali Jafar:
Blind interference alignment for private information retrieval. 560-564 - Cheuk Ting Li, Abbas El Gamal:
Distributed simulation of continuous random variables. 565-569
Mo-PM-2-1: Information Measures 1
- Chandra Nair, Nan Nan Wang:
Evaluating hypercontractivity parameters using information measures. 570-574 - Mahito Sugiyama, Hiroyuki Nakahara, Koji Tsuda:
Information decomposition on structured space. 575-579 - Dmitri S. Pavlichin, Tsachy Weissman:
Chained Kullback-Leibler divergences. 580-584 - Marco Tomamichel, Masahito Hayashi:
Operational interpretation of Rényi conditional mutual information via composite hypothesis testing against Markov distributions. 585-589
Mo-PM-2-2: Communications
- Ayse Ünsal, Raymond Knopp, Neri Merhav:
Lower bounds on joint modulation-estimation performance for the Gaussian MAC. 590-594 - Shweta Agrawal, Ran Gelles, Amit Sahai:
Adaptive protocols for interactive communication. 595-599 - Tetsunao Matsuta, Tomohiko Uyematsu:
Caching-aided multicast for partial information. 600-604 - Qun Zhang, Terence H. Chan:
Achievable rates of soliton communication systems. 605-609 - Pavlos Kazakopoulos, Aris L. Moustakas:
On the soliton spectral efficiency in non-linear optical fibers. 610-614
Mo-PM-2-3: Coding for Insertion and Deletion Channels
- Frederic Sala, Ryan Gabrys, Clayton Schoeny, Kayvon Mazooji, Lara Dolecek:
Exact sequence reconstruction for insertion-correcting codes. 615-619 - Venkatesan Guruswami, Ray Li:
Efficiently decodable insertion/deletion codes for high-noise and high-rate regimes. 620-624 - Manabu Hagiwara:
On ordered syndromes for multi insertion/deletion error-correcting codes. 625-629 - Clayton Schoeny, Antonia Wachter-Zeh, Ryan Gabrys, Eitan Yaakobi:
Codes correcting a burst of deletions or insertions. 630-634 - Ryohei Goto, Kenta Kasai, Haruhiko Kaneko:
Coding of insertion-deletion-substitution channels without markers. 635-639
Mo-PM-2-4: Distributed Storage 4
- Alexander Zeh, Eitan Yaakobi:
Bounds and constructions of codes with multiple localities. 640-644 - Jie Hao, Shu-Tao Xia, Bin Chen:
Recursive bounds for locally repairable codes with multiple repair groups. 645-649 - Toni Ernvall, Thomas Westerbäck, Ragnar Freij-Hollanti, Camilla Hollanti:
A connection between locally repairable codes and exact regenerating codes. 650-654 - Balaji Srinivasan Babu, K. P. Prasanth, P. Vijay Kumar:
Binary codes with locality for multiple erasures having short block length. 655-659 - Sarit Buzaglo, Eitan Yaakobi, Yuval Cassuto, Paul H. Siegel:
Consecutive switch codes. 660-664
Mo-PM-2-5: Compressed Sensing 1
- Galen Reeves, Henry D. Pfister:
The replica-symmetric prediction for compressed sensing with Gaussian matrices is exact. 665-669 - Meng-Yang Chen, Francesco Renna, Miguel R. D. Rodrigues:
On the design of linear projections for compressive sensing with side information. 670-674 - Haolei Weng, Le Zheng, Arian Maleki, Xiaodong Wang:
Phase transition and noise sensitivity of ℓp-minimization for 0 ≤ p ≤ 1. 675-679 - Junan Zhu, Ahmad Beirami, Dror Baron:
Performance trade-offs in multi-processor approximate message passing. 680-684
Mo-PM-2-6: Entropy
- Sudeep Kamath, Sergio Verdú:
Estimation of entropy rate and Rényi entropy rate for Markov chains. 685-689 - Or Ordentlich:
Novel lower bounds on the entropy rate of binary hidden Markov processes. 690-694 - François Baccelli, Jae Oh Woo:
On the entropy and mutual information of point processes. 695-699 - Hirosuke Yamamoto, Qiqiang Liu:
Highly sensitive universal statistical test. 700-704 - Saikat Guha, Jeffrey H. Shapiro, Raúl García-Patrón Sánchez:
Thinning, photonic beamsplitting, and a general discrete Entropy power Inequality. 705-709
Mo-PM-2-7: Interference in Wireless Networks 1
- Yan Zhu, Cong Shen:
On layered erasure interference channels without CSI at transmitters. 710-714 - Joyson Sebastian, Can Karakus, Suhas N. Diggavi:
Approximately achieving the feedback interference channel capacity with point-to-point codes. 715-719 - Yair Noam, Naama Kimelfeld, Benjamin M. Zaidel:
On the two-user MISO interference channel with single user decoding and partial CSIT. 720-724
Mo-PM-2-8: Lossy Compression 2
- Farhad Shirani Chaharsooghi, Mohsen Heidari, S. Sandeep Pradhan:
Quasi Linear Codes: Application to point-to-point and multi-terminal source coding. 730-734 - Tobias Koch, Gonzalo Vazquez-Vilar:
A general rate-distortion converse bound for entropy-constrained scalar quantization. 735-739 - Alon Kipnis, Yonina C. Eldar, Andrea J. Goldsmith:
Information rates of sampled Wiener processes. 740-744 - Shigeaki Kuzuoka:
On the smooth Rényi entropy and variable-length source coding allowing errors. 745-749 - Jiantao Jiao, Yanjun Han, Tsachy Weissman:
Minimax estimation of the L1 distance. 750-754
Mo-PM-2-9: JKW Award Finalists 2
- Cynthia Rush, Ramji Venkataramanan:
Finite-sample analysis of Approximate Message Passing. 755-759 - David Sutter, Marco Tomamichel, Aram W. Harrow:
Strengthened monotonicity of relative entropy via pinched Petz recovery map. 760-764 - Nir Weinberger, Neri Merhav:
A large deviations approach to secure lossy compression. 765-769
Tu-AM-1-1: Belief Propagation
- Arise Kuriya, Toshiyuki Tanaka:
Effects of the approximations from BP to AMP for small-sized problems. 770-774 - Hussein Saad, Ahmed Attia Abotabl, Aria Nosratinia:
EXIT analysis for belief propagation in degree-correlated stochastic block models. 775-779 - Alaa Saade, Marc Lelarge, Florent Krzakala, Lenka Zdeborová:
Clustering from sparse pairwise measurements. 780-784 - Farzin Haddadpour, Mahdi Jafari Siavoshani, Morteza Noshad:
Low-complexity stochastic Generalized Belief Propagation. 785-789
Tu-AM-1-2: Cryptography and Security 1
- Ueli Maurer, João Ribeiro:
New perspectives on weak Oblivious Transfer. 790-794 - Marco Baldi, Paolo Santini, Franco Chiaraluce:
Soft McEliece: MDPC code-based McEliece cryptosystems with very compact keys through real-valued intentional errors. 795-799 - Simona Samardjiska, Danilo Gligoroski:
An encryption scheme based on Random Split of St-Gen codes. 800-804 - Olivier Rioul, Annelie Heuser, Sylvain Guilley, Jean-Luc Danger:
Inter-class vs. mutual information as side-channel distinguishers. 805-809
Tu-AM-1-3: Polar Codes 3
- Christopher G. Blake, Frank R. Kschischang:
Energy complexity of polar codes. 810-814 - Seyyed Ali Hashemi, Carlo Condo, Warren J. Gross:
Simplified Successive-Cancellation List decoding of polar codes. 815-819 - Rajai Nasser:
Erasure schemes using generalized polar codes: Zero-undetected-error capacity and performance trade-offs. 820-824
Tu-AM-1-4: Distributed Storage 5
- Chao Tian:
Symmetry, demand types and outer bounds in caching systems. 825-829 - Chao Tian, Jun Chen:
Caching and delivery via interference elimination. 830-834 - Asma Ghorbel, Mari Kobayashi, Sheng Yang:
Content delivery in erasure broadcast channels with cache and feedback. 835-839
Tu-AM-1-5: Clustering
- Emmanuel Abbe, Colin Sandon:
Crossing the KS threshold in the stochastic block model with information theory. 840-844 - K. Pavan Srinath, Ramji Venkataramanan:
Cluster-seeking shrinkage estimators. 845-849 - Wenqi Wang, Shuchin Aeron, Vaneet Aggarwal:
On deterministic conditions for subspace clustering under missing data. 850-854 - Fabio D'Andreagiovanni, Giuseppe Caire:
An unconventional clustering problem: User Service Profile Optimization. 855-859
Tu-AM-1-6: Wireless Communications 2
- Yonghee Han, Jungwoo Lee:
Two-stage compressed sensing for millimeter wave channel estimation. 860-864 - Flavio Zabini, Andrea Conti:
Ginibre sampling and signal reconstruction. 865-869 - Yuanming Shi, Jun Zhang, Khaled Ben Letaief:
Statistical group sparse beamforming for green Cloud-RAN via large system analysis. 870-874 - Haider Ali Jasim Alshamary, Weiyu Xu:
Efficient optimal joint channel estimation and data detection for massive MIMO systems. 875-879
Tu-AM-1-7: Channel Uncertainty and CSI
- Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate:
A bit of delay is sufficient and stochastic encoding is necessary to overcome online adversarial erasures. 880-884 - Stefano Rini, Shlomo Shamai:
On the capacity of the dirty paper channel with fast fading and discrete channel states. 885-889 - Rui Xu, Jun Chen, Tsachy Weissman, Jian-Kang Zhang:
When is noisy state information at the encoder as useless as no information or as good as noise-free state? 890-894 - Maël Le Treust, Matthieu R. Bloch:
Empirical coordination, state masking and state amplification: Core of the decoder's knowledge. 895-899
Tu-AM-1-8: Channel Capacity 1
- Saeid Haghighatshoar, Peter Jung, Giuseppe Caire:
Capacity and degree-of-freedom of OFDM channels with amplitude constraint. 900-904 - Siddharth Barman, Omar Fawzi:
Algorithmic aspects of optimal channel coding. 905-909 - Antonio Campello, Cong Ling, Jean-Claude Belfiore:
Algebraic lattice codes achieve the capacity of the compound block-fading channel. 910-914 - Zitan Chen, Sidharth Jaggi, Michael Langberg:
The capacity of online (causal) q-ary error-erasure channels. 915-919
Tu-AM-1-9: Reed-Solomon Codes
- Margreta Kuijper, Martin Bossert:
On (partial) unit memory codes based on Reed-Solomon codes for streaming. 920-924 - Jun Zhang, Daqing Wan:
On deep holes of projective Reed-Solomon codes. 925-929 - Irene Marquez Corbella, Jean-Pierre Tillich:
Using Reed-Solomon codes in the (U | U + V ) construction and an application to cryptography. 930-934 - Wael Halbawi, Zihan Liu, Babak Hassibi:
Balanced Reed-Solomon codes. 935-939
Tu-AM-2-1: Constrained Coding 3
- Evyatar Hemo, Yuval Cassuto:
d-imbalance WOM codes for reduced inter-cell interference in multi-level NVMs. 940-944 - Michal Horovitz, Eitan Yaakobi:
On the capacity of non-binary write-once memory. 945-949 - Yuval Cassuto, Shahar Kvatinsky, Eitan Yaakobi:
Write sneak-path constraints avoiding disturbs in memristor crossbar arrays. 950-954 - Pengfei Huang, Paul H. Siegel, Eitan Yaakobi:
Performance of flash memories with different binary labelings: A multi-user perspective. 955-959
Tu-AM-2-2: Statistical Inference 1
- Akshay Krishnamurthy:
Minimax structured normal means inference. 960-964 - Aaditya Ramdas, David Isenberg, Aarti Singh, Larry A. Wasserman:
Minimax lower bounds for linear independence testing. 965-969 - Binglin Li, Shuangqing Wei, Yue Wang, Jian Yuan:
Chernoff information of bottleneck Gaussian trees. 970-974 - Michael Kohler, Adam Krzyzak:
The rates of convergence of neural network estimates of hierarchical interaction regression models. 975-977
Tu-AM-2-3: Polar Codes 4
- Ling Liu, Cong Ling:
Polar codes and polar lattices for independent fading channels. 978-982 - Remi A. Chou, Aylin Yener:
Polar coding for the multiple access wiretap channel via rate-splitting and cooperative jamming. 983-987 - Jincheng Dai, Kai Niu, Zhongwei Si, Jiaru Lin:
Polar coded non-orthogonal multiple access. 988-992 - Jin Sima, Wei Chen:
Polar codes for broadcast channels with receiver message side information and noncausal state available at the encoder. 993-997
Tu-AM-2-4: Distributed Storage 6
- Yi-Sheng Su:
Design of membership matrices for (r, t)-availability in distributed storage. 998-1002 - Ankit Singh Rawat, Onur Ozan Koyluoglu, Sriram Vishwanath:
Centralized repair of multiple node failures. 1003-1007 - Sihuang Hu, Itzhak Tamo, Alexander Barg:
Combinatorial and LP bounds for LRC codes. 1008-1012 - Siddhartha Brahma, Hugues Mercier:
Reliability-bandwidth tradeoffs for distributed storage allocations. 1013-1017
Tu-AM-2-5: Information Theory in Biology 2
- Joseph Hui, Ilan Shomorony, Kannan Ramchandran, Thomas A. Courtade:
Overlap-based genome assembly from variable-length reads. 1018-1022 - Nariman Farsad, Yonathan Murin, Andrew W. Eckford, Andrea J. Goldsmith:
On the capacity of diffusion-based molecular timing channels. 1023-1027 - Siddharth Jain, Farzad Farnoud, Moshe Schwartz, Jehoshua Bruck:
Duplication-correcting codes for data storage in the DNA of living organisms. 1028-1032 - Yen-Chi Lee, Chiun-Chuan Chen, Ping-Cheng Yeh, Chia-Han Lee:
Distribution of first arrival position in molecular communication. 1033-1037
Tu-AM-2-6: Inequalities 1
- Salman Beigi, Chandra Nair:
Equivalent characterization of reverse Brascamp-Lieb-type inequalities using information measures. 1038-1042 - Jingbo Liu, Thomas A. Courtade, Paul W. Cuff, Sergio Verdú:
Smoothing Brascamp-Lieb inequalities and strong converses for common randomness generation. 1043-1047 - Jingbo Liu, Thomas A. Courtade, Paul W. Cuff, Sergio Verdú:
Brascamp-Lieb inequality and its reverse: An information theoretic view. 1048-1052 - Ashok Vardhan Makkuva, Yihong Wu:
On additive-combinatorial affine inequalities for Shannon entropy and differential entropy. 1053-1057
Tu-AM-2-7: Multiple Antennas 2
- Nir Shlezinger, Ron Dabora:
The capacity of discrete-time Gaussian MIMO channels with periodic characteristics. 1058-1062 - Elad Domanovitz, Uri Erez:
Universal outage behavior of randomly precoded integer forcing Over MIMO channels. 1063-1067 - Austin Collins, Yury Polyanskiy:
Dispersion of the coherent MIMO block-fading channel. 1068-1072 - Mario Díaz:
On the symmetries and the capacity achieving input covariance matrices of multiantenna channels. 1073-1077
Tu-AM-2-8: Multi-Terminal Source Coding 2
- Kittipong Kittichokechai, Giuseppe Caire:
Privacy-constrained remote source coding. 1078-1082 - Georg Pichler, Pablo Piantanida, Gerald Matz:
Distributed information-theoretic biclustering. 1083-1087 - Solmaz Torabi, Jie Ren, John MacLaren Walsh:
Practical interactive scheme for extremum computation in distributed networks. 1088-1092 - Neri Merhav:
Universal decoding for source-channel coding with side information. 1093-1097
Tu-AM-2-9: BCH Codes / Quasi-Cyclic Codes
- Yingquan Wu:
Generalized integrated interleaving BCH codes. 1098-1102 - Ron M. Roth, Alexander Zeh:
Long cyclic codes over GF(4) and GF(8) better than BCH codes in the high-rate region. 1103-1107 - Ron M. Roth, Alexander Zeh:
On spectral design methods for quasi-cyclic codes. 1108-1112 - Alexander Zeh, San Ling:
Spectral analysis of quasi-cyclic product codes. 1113-1117
Tu-PM-1-1: Information Measures 2
- Yuheng Bu, Shaofeng Zou, Yingbin Liang, Venugopal V. Veeravalli:
Estimation of KL divergence between large-alphabet distributions. 1118-1122 - M. Ashok Kumar, Igal Sason:
On projections of the Rényi divergence on generalized convex sets. 1123-1127 - Jiange Li, Matthieu Fradelizi, Mokshay M. Madiman:
Information concentration for convex measures. 1128-1132 - Kevin R. Moon, Kumar Sricharan, Kristjan H. Greenewald, Alfred O. Hero III:
Improving convergence of divergence functional ensemble estimators. 1133-1137 - Ferdinando Cicalese, Luisa Gargano, Ugo Vaccaro:
Approximating probability distributions with short vectors, via information theoretic distance measures. 1138-1142
Tu-PM-1-2: Learning 1
- Kangwook Lee, Maximilian Lam, Ramtin Pedarsani, Dimitris S. Papailiopoulos, Kannan Ramchandran:
Speeding up distributed machine learning using codes. 1143-1147 - Zahra Shakeri, Waheed Uz Zaman Bajwa, Anand D. Sarwate:
Minimax lower bounds for Kronecker-structured dictionary learning. 1148-1152 - Nihar B. Shah, Sivaraman Balakrishnan, Martin J. Wainwright:
Feeling the bern: Adaptive estimators for Bernoulli probabilities of pairwise comparisons. 1153-1157 - Jalal Etesami, Negar Kiyavash:
Interventional dependency graphs: An approach for discovering influence structure. 1158-1162 - Philipp Grohs, Thomas Wiatowski, Helmut Bölcskei:
Deep convolutional neural networks on cartoon functions. 1163-1167
Tu-PM-1-3: Superposition Codes / Group Testing 1
- Yoshinari Takeishi, Jun'ichi Takeuchi:
An improved upper bound on block error probability of least squares superposition codes with unbiased Bernoulli dictionary. 1168-1172 - Jean Barbier, Mohamad Dia, Nicolas Macris:
Proof of threshold saturation for spatially coupled sparse superposition codes. 1173-1177 - Arkadii G. D'yachkov, Ilya V. Vorobyev, N. A. Polyanskii, Vladislav Yu. Shchukin:
On multistage learning a hidden hypergraph. 1178-1182 - Arkady G. D'yachkov, Ilya V. Vorobyev, N. A. Polyanskii, Vladislav Yu. Shchukin:
On a hypergraph approach to multistage group testing problems. 1183-1191
Tu-PM-1-4: Distributed Storage 7
- Hui Zhang, Vitaly Skachek:
Bounds for batch codes with restricted query size. 1192-1196 - Alexander Vardy, Eitan Yaakobi:
Constructions of batch codes with near-optimal redundancy. 1197-1201 - Min Ye, Alexander Barg:
Explicit constructions of MDS array codes and RS codes with optimal repair bandwidth. 1202-1206 - Lluis Pamies-Juarez, Cyril Guyot, Robert Mateescu:
Spider Codes: Practical erasure codes for distributed storage systems. 1207-1211 - Mehran Elyasi, Soheil Mohajer:
New exact-repair codes for distributed storage systems using matrix determinant. 1212-1216
Tu-PM-1-5: Data Compression
- Abram Magner, Krzysztof Turowski, Wojciech Szpankowski:
Lossless compression of binary trees with correlated vertex names. 1217-1221 - Hee Sun Kim, Zsolt Talata:
Context Set Weighting method. 1222-1226 - Nematollah Iri, Oliver Kosut:
A new Type Size code for universal one-to-one compression of parametric sources. 1227-1231 - Matthew G. Reyes, David L. Neuhoff:
Cutset width and spacing for Reduced Cutset Coding of Markov random fields. 1232-1236 - Kristo Visk, Ago-Erik Riet:
Generalisation of Kraft inequality for source coding into permutations. 1237-1241
Tu-PM-1-6: Heterogeneous Networks
- Thomas Stahlbuhk, Brooke Shrader, Eytan H. Modiano:
Throughput maximization in uncooperative spectrum sharing networks. 1242-1246 - Trung-Anh Do, Sang-Woon Jeon, Won-Yong Shin:
Caching in mobile HetNets: A throughput-delay trade-off perspective. 1247-1251 - Nof Abuzainab, Walid Saad, H. Vincent Poor:
Cognitive hierarchy theory for heterogeneous uplink multiple access in the Internet of Things. 1252-1256 - Animesh Kumar:
Bandlimited field estimation from samples recorded by a location-unaware mobile sensor. 1257-1261 - Michal Yemini, Anelia Somekh-Baruch, Reuven Cohen, Amir Leshem:
Simultaneous connectivity in heterogeneous cognitive radio networks. 1262-1266
Tu-PM-1-7: Feedback 2
- Sergey Loyka, Charalambos D. Charalambous:
Feedback does not increase the capacity of compound channels with additive noise. 1267-1271 - Annina Bracher, Amos Lapidoth:
The zero-error capacity of the Gelfand-Pinsker channel with a feedback link. 1272-1276 - Shraga I. Bross, Amos Lapidoth:
Conveying data and State with feedback. 1277-1281 - Marat V. Burnashev, Hirosuke Yamamoto:
On optimal transmission strategies for channels with noiseless feedback. 1282-1286 - Christos K. Kourtellaris, Charalambos D. Charalambous:
Information structures of capacity achieving distribution for channels with memory and feedback. 1287-1291
Tu-PM-1-8: DoF in Wireless Networks
- David Stotz, Syed Ali Jafar, Helmut Bölcskei, Shlomo Shamai:
Canonical conditions for K/2 degrees of freedom. 1292-1296 - Arash Gholami Davoodi, Syed Ali Jafar:
GDoF of the MISO BC: Bridging the gap between finite precision CSIT and perfect CSIT. 1297-1301 - Tian Ding, Xiaojun Yuan, Soung Chang Liew:
Degrees of freedom of MIMO Y channel with multiple relays. 1302-1306 - Arash Gholami Davoodi, Syed Ali Jafar:
Generalized DoF of the symmetric K-user interference channel under finite precision CSIT. 1307-1311 - Shih-Yi Yeh, I-Hsiang Wang:
Degrees of freedom of the bursty MIMO X channel without feedback. 1312-1316
Tu-PM-1-9: Combinatorial Coding Theory
- Roland D. Barrolleta, Mercè Villanueva:
PD-sets for Z4-linear codes: Hadamard and Kerdock codes. 1317-1321 - Divesh Aggarwal, Jop Briët:
Revisiting the Sanders-Bogolyubov-Ruzsa theorem in Fpn and its application to non-malleable codes. 1322-1326 - Yang Yang, Zhengchun Zhou, Xiaohu Tang:
Two classes of zero difference balanced functions and their optimal constant composition codes. 1327-1330 - Daniel F. Cullina, Marco Dalai, Yury Polyanskiy:
Rate-distance tradeoff for codes above graph capacity. 1331-1335 - Tuvi Etzion, Marcelo Firer:
Metrics based on finite directed graphs. 1336-1340
Tu-PM-2-1: Network Structures
- Javad Heydari, Ali Tajer, H. Vincent Poor:
Quickest detection of Markov networks. 1341-1345 - Keehwan Park, Jean Honorio:
Information-theoretic lower bounds for recovery of diffusion network structures. 1346-1350 - Son Hoang Dau, Olgica Milenkovic:
Inference of latent network features via co-intersection representations of graphs. 1351-1355
Tu-PM-2-2: Cryptography and Security 2
- Qian Guo, Thomas Johansson:
A p-ary MDPC scheme. 1356-1360 - Sundara Rajan S, Shijin Rajakrishnan, Andrew Thangaraj, Vinod M. Prabhakaran:
Lower bounds and optimal protocols for three-party secure computation. 1361-1365 - Julia Chaulet, Nicolas Sendrier:
Worst case QC-MDPC decoder for McEliece cryptosystem. 1366-1370 - AmirEmad Ghassami, Daniel F. Cullina, Negar Kiyavash:
Message partitioning and limited auxiliary randomness: Alternatives to Honey Encryption. 1371-1375
Tu-PM-2-3: Group Testing 2
- Moein Falahatgar, Ashkan Jafarpour, Alon Orlitsky, Venkatadheeraj Pichapati, Ananda Theertha Suresh:
Estimating the number of defectives with group testing. 1376-1380 - Matthew Aldridge, Oliver Johnson, Jonathan Scarlett:
Improved group testing rates with constant column weight designs. 1381-1385 - I-Hsiang Wang, Shao-Lun Huang, Kuan-Yun Lee, Kwang-Cheng Chen:
Data extraction via histogram and arithmetic mean queries: Fundamental limits and algorithms. 1386-1390 - Alejandro Cohen, Asaf Cohen, Omer Gurewitz:
Secure Group Testing. 1391-1395
Tu-PM-2-4: Distributed Storage 8
- Rawad Bitar, Salim El Rouayheb:
Staircase codes for secret sharing with optimal communication and read overheads. 1396-1400 - Wentao Huang, Jehoshua Bruck:
Secure RAID schemes for distributed storage. 1401-1405 - Fangwei Ye, Kenneth W. Shum, Raymond W. Yeung:
The rate region of secure exact-repair regenerating codes for 5 nodes. 1406-1410 - Razan Tajeddine, Salim El Rouayheb:
Private information retrieval from MDS coded data in distributed storage systems. 1411-1415
Tu-PM-2-5: Compressed Sensing 2
- Reinhard Heckel:
Super-resolution MIMO radar. 1416-1420 - Hongwei Wang, Hang Yu, Michael Hoy, Justin Dauwels, Heping Wang:
Variational Bayesian dynamic compressive sensing. 1421-1425 - Jun Zhang, Urbashi Mitra, Kuan-Wen Huang, Nicolò Michelusi:
Support recovery from noisy random measurements via weighted ℓ1 minimization. 1426-1430 - Sanghamitra Dutta, Pulkit Grover:
Adaptivity provably helps: Information-theoretic limits on l0 cost of non-adaptive sensing. 1431-1435
Tu-PM-2-6: Scheduling
- Georgios S. Paschos, Mathieu Leconte, Apostolos Destounis:
Routing with blinkers: Online throughput maximization without queue length information. 1436-1440 - Bin Tang, Xiaoliang Wang, Cam-Tu Nguyen, Sanglu Lu:
Constructing sub-exponentially large optical priority queues with switches and fiber delay lines. 1441-1445 - Qing He, Di Yuan, Anthony Ephremides:
A general optimality condition of link scheduling for emptying a wireless network. 1446-1450 - Juan Liu, Yuyi Mao, Jun Zhang, Khaled Ben Letaief:
Delay-optimal computation task scheduling for mobile-edge computing systems. 1451-1455
Tu-PM-2-7: Interference in Wireless Networks 2
- Borna Kananian, Mohammad Ali Maddah-Ali, Seyed Pooya Shariatpanahi, Babak Hossein Khalaj:
Collaboration alignment in distributed interference management in uplink cellular systems. 1456-1460 - Aly El Gamal:
Cell associations that maximize the average uplink-downlink degrees of freedom. 1461-1465 - Paul de Kerret, David Gesbert:
Network MIMO: Transmitters with no CSI can still be very useful. 1466-1470 - Sebastian Stern, Robert F. H. Fischer:
Advanced factorization strategies for lattice-reduction-aided preequalization. 1471-1475 - Pritam Mukherjee, Sennur Ulukus:
Real interference alignment for vector channels. 1476-1480
Tu-PM-2-8: Multiple Access Channels 2
- Anatoly Khina, Yuval Kochman, Uri Erez:
The dirty MIMO multiple-access channel. 1481-1485 - Sara Shahi, Daniela Tuninetti, Natasha Devroye:
On the capacity of strong asynchronous multiple access channels with a large number of users. 1486-1490 - Wasim Huleihel, Yossef Steinberg:
Multiple access channel with unreliable cribbing. 1491-1495 - Yunhao Sun, Ruchen Duan, Yingbin Liang, Ashish Khisti, Shlomo Shamai:
Helper-assisted state cancelation for multiple access channels. 1496-1500
Tu-PM-2-9: Lattice Codes
- Xiaolu Hou, Frédérique E. Oggier:
On LCD codes and lattices. 1501-1505 - Nuwan S. Ferdinand, Matthew S. Nokleby, Behnaam Aazhang:
Voronoi constellations for high-dimensional lattice codes. 1506-1510 - Wael Alghamdi, Walid Abediseid, Mohamed-Slim Alouini:
On the construction of capacity-achieving lattice Gaussian codes. 1511-1515 - Maiara F. Bollauf, Ram Zamir:
Uniformity properties of Construction C. 1516-1520
We-AM-1-1: Error Exponents 1
- Mani Bastani Parizi, Emre Telatar, Neri Merhav:
Exact random coding secrecy exponents for the wiretap channel. 1521-1525 - Shengyu Zhu, Biao Chen:
Distributed detection over connected networks via one-bit quantizer. 1526-1530 - Yutaka Jitsumatsu, Yasutada Oohama:
Computing the optimal exponent of correct decoding for discrete memoryless sources. 1531-1535 - Masahito Hayashi, Vincent Y. F. Tan:
Remaining uncertainties and exponents under Rényi information measures. 1536-1540
We-AM-1-2: Statistical Inference 2
- Pierre Moulin:
Asymptotically achievable error probabilities for multiple hypothesis testing. 1541-1545 - Shang Li, Xiaoou Li, Xiaodong Wang, Jingchen Liu:
Optimal sequential test with finite horizon and constrained sensor selection. 1546-1550 - Céline Aubel, Helmut Bölcskei:
Deterministic performance analysis of subspace methods for cisoid parameter estimation. 1551-1555 - Siheng Chen, Rohan Varma, Aarti Singh, Jelena Kovacevic:
A statistical perspective of sampling scores for linear regression. 1556-1560
We-AM-1-3: LDPC Codes 1
- Srdan Brkic, Predrag Ivanis, Bane Vasic:
Guaranteed error correction of faulty bit-flipping decoders under data-dependent gate failures. 1561-1565 - Predrag Ivanis, Bane Vasic, David Declercq:
Performance evaluation of faulty iterative decoders using absorbing Markov chains. 1566-1570 - Hiroki Mori, Tadashi Wadayama:
Performance analysis of fault erasure belief propagation decoder based on density evolution. 1571-1575 - Linjia Chang, Avhishek Chatterjee, Lav R. Varshney:
LDPC decoders with missing connections. 1576-1580
We-AM-1-4: Distributed Storage 9 / Deletion Channel
- Alexander Zeh, Antonia Wachter-Zeh:
Improved erasure list decoding locally repairable codes using alphabet-dependent list recovery. 1581-1585 - Antti Pöllänen, Thomas Westerbäck, Ragnar Freij-Hollanti, Camilla Hollanti:
Bounds on the maximal minimum distance of linear locally repairable codes. 1586-1590 - Guangda Hu, Sergey Yekhanin:
New constructions of SD and MR codes over small finite fields. 1591-1595 - Ryan Gabrys, Eitan Yaakobi:
Sequence reconstruction over the deletion channel. 1596-1600
We-AM-1-5: Wireless Communications 3
- Jeonghun Park, Jeffrey G. Andrews, Robert W. Heath Jr., Namyoon Lee:
A lower bound on the optimum feedback rate for downlink multi-antenna cellular networks. 1601-1605 - Liang Liu, Pratik Patil, Wei Yu:
An uplink-downlink duality for cloud radio access network. 1606-1610 - Serkan Ak, Hazer Inaltekin, H. Vincent Poor:
Gaussian approximation for the downlink interference in heterogeneous cellular networks. 1611-1615 - Serkan Ak, Hazer Inaltekin, H. Vincent Poor:
Downlink outage performance of heterogeneous cellular networks. 1616-1620
We-AM-1-6: Game Theory
- Payam Delgosha, Amin Aminzadeh Gohari, Mohammad Akbarpour:
High probability guarantees in repeated games: Theory and applications in information theory. 1621-1625 - Emrah Akyol, Cedric Langbort, Tamer Basar:
On the role of side information in strategic communication. 1626-1630 - Serkan Saritas, Serdar Yüksel, Sinan Gezici:
Dynamic signaling games under Nash and Stackelberg equilibria. 1631-1635 - Arnob Ghosh, Saswati Sarkar, Randall A. Berry:
Secondary spectrum market: To acquire or not to acquire side information? 1636-1640
We-AM-1-7: Information Measures 3
- Yuta Sakai, Ken-ichi Iwata:
Relations between conditional Shannon entropy and expectation of ℓα-norm. 1641-1645 - Alex Dytso, Ronit Bustin, Daniela Tuninetti, Natasha Devroye, H. Vincent Poor, Shlomo Shamai:
On the minimum mean p-th error in Gaussian noise channels and its applications. 1646-1650 - Lukasz Debowski:
Consistency of the plug-in estimator of the entropy rate for ergodic processes. 1651-1655 - Hiroshi Nagaoka:
A characterization of statistical manifolds on which the relative entropy is a Bregman divergence. 1656-1659
We-AM-1-8: Relay Channels
- Youlong Wu:
Achievable rate regions for cooperative relay broadcast channels with rate-limited feedback. 1660-1664 - Shirin Saeedi Bidokhti, Gerhard Kramer:
Capacity of two-relay diamond networks with rate-limited links to the relays and a binary adder multiple access channel. 1665-1669 - Jonathan Ponniah, Liang-Liang Xie:
An achievable rate region for the two-way multiple relay channel. 1670-1674 - Xiugang Wu, Ayfer Özgür:
Improving on the cut-set bound for general primitive relay channels. 1675-1679
We-AM-1-9: Quantum Capacity and Quantum Channels
- Holger Boche, Gisbert Janssen, Stephan Kaltenstadler:
Entanglement assisted classical capacity of compound quantum channels. 1680-1684 - Shawn X. Cui, Zheng-Feng Ji, Nengkun Yu, Bei Zeng:
Quantum capacities for entanglement networks. 1685-1689 - Xin Wang, Runyao Duan:
A semidefinite programming upper bound of quantum capacity. 1690-1694 - Li Gao, Marius Junge, Nicholas LaRacuente:
Operator algebra approach to quantum capacities. 1695-1699
We-AM-2-1: Error Exponents 2
- Hye Won Chung, Lizhong Zheng, Brian M. Sadler, Alfred O. Hero III:
Unequal error protection coding approaches to the noisy 20 questions problem. 1700-1704 - Gil Katz, Pablo Piantanida, Mérouane Debbah:
Collaborative distributed hypothesis testing with general hypotheses. 1705-1709 - Anusha Lalitha, Tara Javidi:
Reliability of sequential hypothesis testing can be achieved by an almost-fixed-length test. 1710-1714 - Marco Dalai, Yury Polyanskiy:
Bounds on the reliability of a typewriter channel. 1715-1719
We-AM-2-2: Statistical Inference 3
- Alvaro Martín, Gadiel Seroussi:
Asymptotically tight bounds on the depth of estimated context trees. 1720-1724 - Joe Suzuki:
Structure learning and universal coding when missing values exist. 1725-1729 - Hang Yu, Junwei Huang, Justin Dauwels:
Latent tree ensemble of pairwise copulas for spatial extremes analysis. 1730-1734 - Christopher J. Quinn, Ali Pinar, Jing Gao, Lu Su:
Sparse approximations of directed information graphs. 1735-1739
We-AM-2-3: LDPC Codes 2 / RM Codes
- Fanny Jardel, Joseph Jean Boutros, Mireille Sarkiss:
Stopping sets for MDS-based product codes. 1740-1744 - Yu Tsunoda, Yuichiro Fujiwara:
Probabilistic bounds on the trapping redundancy of linear codes. 1745-1749 - Santhosh Kumar, A. Robert Calderbank, Henry D. Pfister:
Reed-Muller codes achieve capacity on the quantum erasure channel. 1750-1754 - Shrinivas Kudekar, Santhosh Kumar, Marco Mondelli, Henry D. Pfister, Rüdiger L. Urbanke:
Comparing the bit-MAP and block-MAP decoding thresholds of reed-muller codes on BMS channels. 1755-1759 - Alexandre Soro, Jérôme Lacan, Vincent Roca, Valentin Savin, Mathieu Cunche:
Enhanced recursive Reed-Muller erasure decoding. 1760-1763
We-AM-2-4: Network Coding 1
- Woong Kim, Michael Langberg, Michelle Effros:
A characterization of the capacity region for network coding with dependent sources. 1764-1768 - Ming Fai Wong, Michelle Effros, Michael Langberg:
On tightness of an entropic region outer bound for network coding and the edge removal property. 1769-1773 - Xunrui Yin, Zongpeng Li, Xin Wang:
A reduction approach to the multiple-unicast conjecture in network coding. 1774-1778 - Oliver Kosut, Jörg Kliewer:
On the relationship between edge removal and strong converses. 1779-1783 - Parham Noorzad, Michelle Effros, Michael Langberg:
Can negligible cooperation increase network reliability? 1784-1788
We-AM-2-5: Information Theory in Biology 3
- David Doty, Andrew Winslow:
Design of geometric molecular bonds. 1789-1793 - Pulkit Grover:
Fundamental limits on source-localization accuracy of EEG-based neural sensing. 1794-1798 - Ilan Shomorony, Govinda M. Kamath, Fei Xia, Thomas A. Courtade, David N. C. Tse:
Partial DNA assembly: A rate-distortion perspective. 1799-1803 - Peter J. Thomas, Andrew W. Eckford:
Shannon capacity of signal transduction for multiple independent receptors. 1804-1808
We-AM-2-6: Caching and Computation
- Julien Lavauzelle, Françoise Levy-dit-Vehel:
New proofs of retrievability using locally decodable codes. 1809-1813 - Songze Li, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Fundamental tradeoff between computation and communication in distributed computing. 1814-1818 - Shirin Saeedi Bidokhti, Michèle A. Wigger, Roy Timo:
Erasure broadcast networks with receiver caching. 1819-1823 - Mohsen Heidari, S. Sandeep Pradhan:
How to compute modulo prime-power sums. 1824-1828 - Yonathan Murin, Yonatan Kaspi, Ron Dabora, Deniz Gündüz:
Energy-distortion tradeoff for the gaussian broadcast channel with feedback. 1829-1833 - Lei Yu, Houqiang Li, Weiping Li:
Distortion bounds for source broadcast over degraded channel. 1834-1838 - Erman Koken, Ertem Tuncel:
On the energy-distortion tradeoff for the Gaussian broadcast problem. 1839-1843 - Erman Koken, Ertem Tuncel:
Joint source-channel coding for broadcasting correlated sources. 1844-1848
We-AM-2-8: Relay and Two Way Channels
- Leila Ghabeli, Milan S. Derpich:
The capacity gap calculation for multi-pair bidirectional Gaussian relay networks based on successive compute-and-forward strategy. 1849-1853 - Lin Song, Fady Alajaji, Tamás Linder:
Adaptation is useless for two discrete additive-noise two-way channels. 1854-1858 - David E. Simmons, Justin P. Coon, Naqueeb Ahmad Warsi:
Capacity and power scaling laws for finite antenna amplify-and-forward relay networks. 1859-1863 - Arash Behboodi, Anas Chaaban, Rudolf Mathar, Mohamed-Slim Alouini:
On full duplex Gaussian relay channels with self-interference. 1864-1868
We-AM-2-9: Channel Capacity 2
- Yonglong Li, Aleksandar Kavcic, Guangyue Han:
On the capacity of multilevel NAND flash memory channels. 1869-1873
We-AM-2-8: Relay and Two Way Channels
- Malcolm Egan, Mauro L. de Freitas, Laurent Clavier, Alban Goupil, Gareth W. Peters, Nourddine Azzaoui:
Achievable rates for additive isotropic α-stable noise channels. 1874-1878
We-AM-2-9: Channel Capacity 2
- Ahmad ElMoslimany, Tolga M. Duman:
On the capacity of fading channels with amplitude-limited inputs. 1879-1883 - Mainak Chowdhury, Andrea Goldsmith:
Capacity of block Rayleigh fading channels without CSI. 1884-1888
Th-AM-1-1: Community Detection
- Akshay Gadde, Eyal En Gad, Salman Avestimehr, Antonio Ortega:
Active learning for community detection in stochastic block models. 1889-1893 - Bruce E. Hajek, Yihong Wu, Jiaming Xu:
Information limits for recovering a hidden community. 1894-1898 - Narae Ryu, Sae-Young Chung:
Community detection with colored edges. 1899-1903 - Jonathan Scarlett, Volkan Cevher:
Partial recovery bounds for the sparse stochastic block model. 1904-1908
Th-AM-1-2: Code Construction and Analysis
- Shahrouz Sharifi, Mehdi Dabirnia, Ahmet Korhan Tanc, Tolga M. Duman:
Short block length code design for interference channels. 1909-1913 - Mahyar Shirvanimoghaddam, Sarah J. Johnson:
Approaching the capacity of AWGN channels using multi-layer raptor codes and superposition modulation. 1914-1918 - Weiqiang Yang, Ying Li, Xiaopu Yu, Yue Sun:
Two-way spinal codes. 1919-1923 - Zheng Wang, Cong Ling:
Further results on independent Metropolis-Hastings-Klein sampling. 1924-1928
Th-AM-1-3: LDPC Codes 3
- Kechao Huang, Xiao Ma, Baoming Bai:
Systematic block Markov superposition transmission of repetition codes. 1929-1933 - Yaoqing Yang, Pulkit Grover, Soummya Kar:
Computing linear transforms with unreliable components. 1934-1938 - Eirik Rosnes, Michael Helmling:
Constructing valid convex hull inequalities for single parity-check codes over prime fields. 1939-1943 - Shunsuke Horii, Toshiyasu Matsushima, Shigeichi Hirasawa:
Linear programming decoding of binary linear codes for symbol-pair read channels. 1944-1948
Th-AM-1-4: Network Coding 2
- Tuvi Etzion, Antonia Wachter-Zeh:
Vector network coding based on subspace codes outperforms scalar linear network coding. 1949-1953 - Jonas Hansen, Jan Østergaard, Johnny Kudahl, John H. Madsen:
On the construction of jointly superregular lower triangular Toeplitz matrices. 1954-1958 - Umberto Martínez-Peñas:
Generalized rank weights of reducible codes, optimal cases and related properties. 1959-1963 - Joseph Connelly, Kenneth Zeger:
A class of non-linearly solvable networks. 1964-1968
Th-AM-1-5: Energy Harvesting 2
- Anshoo Tandon, Mehul Motani, Lav R. Varshney:
Subblock energy-constrained codes for simultaneous energy and information transfer. 1969-1973 - Selma Belhadj Amor, Samir Medina Perlaza, Ioannis Krikidis, H. Vincent Poor:
Feedback enhances simultaneous energy and information transmission in multiple access channels. 1974-1978 - Dor Shaviv, Ayfer Özgür, Haim H. Permuter:
Capacity of remotely powered communication. 1979-1983 - Abdulrahman Baknina, Sennur Ulukus:
Online scheduling for energy harvesting broadcast channels with finite battery. 1984-1988
Th-AM-1-6: Estimation
- Shahab Asoodeh, Fady Alajaji, Tamás Linder:
Privacy-aware MMSE estimation. 1989-1993 - Jian Ding, Yuval Peres, Gireeja Ranade:
A tiger by the tail: When multiplicative noise stymies control. 1994-1998 - Graeme Baker, Serdar Yüksel:
Continuity and robustness to incorrect priors in estimation and control. 1999-2003 - Moritz Wiese, Karl Henrik Johansson, Tobias J. Oechtering, Panos Papadimitratos, Henrik Sandberg, Mikael Skoglund:
Uncertain wiretap channels and secure estimation. 2004-2008
Th-AM-1-7: Source-Channel Coding over MAC
- Basak Guler, Deniz Gündüz, Aylin Yener:
On lossy transmission of correlated sources over a multiple access channel. 2009-2013 - Arun Padakandla:
Communicating correlated sources over a MAC in the absence of a Gács-Körner common part. 2014-2018 - Mohsen Heidari, Farhad Shirani Chaharsooghi, S. Sandeep Pradhan:
New sufficient conditions for Multiple-Access Channel with correlated sources. 2019-2023 - Amos Lapidoth, Michèle A. Wigger:
A necessary condition for the transmissibility of correlated sources over a MAC. 2024-2028
Th-AM-1-8: Caching in Wireless Networks
- Ravi Tandon, Osvaldo Simeone:
Cloud-aided wireless networks with edge caching: Fundamental latency trade-offs in fog Radio Access Networks. 2029-2033 - Fan Xu, Kangqi Liu, Meixia Tao:
Cooperative Tx/Rx caching in interference channels: A storage-latency tradeoff study. 2034-2038 - Xinping Yi, Giuseppe Caire:
Topological coded caching. 2039-2043 - Navid Naderializadeh, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Fundamental limits of cache-aided interference management. 2044-2048
Th-AM-1-9: Classical-Quantum Channels
- Holger Boche, Ning Cai, Janis Noetzel:
Classical-quantum channels with causal and non-causal channel state information at the sender. 2049-2053 - Naqueeb Ahmad Warsi, Justin P. Coon:
Coding for classical-quantum channels with rate limited side information at the encoder: An information-spectrum approach. 2054-2058 - Holger Boche, Minglai Cai, Christian Deppe, Janis Noetzel:
Classical-quantum arbitrarily varying wiretap channel: Common randomness assisted code and continuity. 2059-2063 - Azadeh Sheikholeslami, Boulat A. Bash, Don Towsley, Dennis Goeckel, Saikat Guha:
Covert communication over classical-quantum channels. 2064-2068
Th-AM-2-1: Lossy Compression and Rate-Distortion
- Kousha Kalantari, Lalitha Sankar, Anand D. Sarwate:
Optimal differential privacy mechanisms under Hamming distortion for structured source classes. 2069-2073 - Marina Haikin, Ram Zamir:
Analog coding of a source with erasures. 2074-2078 - Farideh Ebrahim Rezagah, Shirin Jalali, Elza Erkip, H. Vincent Poor:
Rate-distortion dimension of stochastic processes. 2079-2083 - Ahmad Golmohammadi, David G. M. Mitchell, Jörg Kliewer, Daniel J. Costello Jr.:
Windowed encoding of spatially coupled LDGM codes for lossy source compression. 2084-2088
Th-AM-2-2: Learning 2
- Tho Ngoc Le, Vijay G. Subramanian, Randall A. Berry:
Are imperfect reviews helpful in social learning? 2089-2093 - Shashank Vatedka, Pascal O. Vontobel:
Pattern maximum likelihood estimation of finite-state discrete-time Markov chains. 2094-2098 - Matthew S. Nokleby, Ahmad Beirami, A. Robert Calderbank:
Rate-distortion bounds on Bayes risk in supervised learning. 2099-2103 - Guilherme França, José Bento:
An explicit rate bound for over-relaxed ADMM. 2104-2108
Th-AM-2-3: LDPC Codes 4
- Markus Stinner, Luca Barletta, Pablo M. Olmos:
Finite-length scaling based on Belief Propagation for spatially coupled LDPC codes. 2109-2113 - Christian Häger, Henry D. Pfister, Alexandre Graell i Amat, Fredrik Brannstrom:
Deterministic and ensemble-based spatially-coupled product codes. 2114-2118 - Rafah El-Khatib, Nicolas Macris:
The velocity of the decoding wave for spatially coupled codes on BMS channels. 2119-2123 - Dmitri V. Truhachev, Alireza Karami, Lei M. Zhang, Frank R. Kschischang:
Decoding analysis accounting for mis-corrections for spatially-coupled split-component codes. 2124-2128 - Junyi Du, Jinhong Yuan, Liang Zhou, Xuan He:
A progressive edge growth algorithm for bit mapping design of LDPC coded BICM schemes. 2129-2133
Th-AM-2-4: Network Coding 3
- Gaurav Kumar Agarwal, Martina Cardone, Christina Fragouli:
Coding across unicast sessions can increase the secure message capacity. 2134-2138 - Peida Tian, Sidharth Jaggi, Mayank Bakshi, Oliver Kosut:
Arbitrarily varying networks: Capacity-achieving computationally efficient codes. 2139-2143 - Jaemin Han, Chih-Chun Wang:
Linear network coding capacity region of the smart repeater with broadcast erasure channels. 2144-2148 - Henry P. Romero, Mahesh Kumar Varanasi:
Superposition coding in the combination network. 2149-2153 - Fatemeh Arbabjolfaei, Young-Han Kim:
Approximate capacity of index coding for some classes of graphs. 2154-2158
Th-AM-2-5: Applications of Random Matrix Theory
- Walid Hachem, Aris L. Moustakas, Leonid A. Pastur:
Time and frequency selective Ricean MIMO capacity: An ergodic operator approach. 2159-2163 - Apostolos Karadimitrakis, Aris L. Moustakas, Hartmut Hafermann, Axel Müller:
Optical fiber MIMO channel model and its analysis. 2164-2168 - Toshiyuki Tanaka:
Limiting eigenvalue distributions of block random matrices with one-dimensional coupling structure. 2169-2173 - Khalil Elkhalil, Abla Kammoun, Tareq Y. Al-Naffouri, Mohamed-Slim Alouini:
Exact closed-form expression for the inverse moments of one-sided correlated Gram matrices. 2174-2178
Th-AM-2-6: Wireless Communications 4
- Erdem Koyuncu, Christian Remling, Xiaoyi Leo Liu, Hamid Jafarkhani:
Outage-optimized distributed quantizers for multicast beamforming. 2179-2183 - Ezio Biglieri, I-Wei Lai:
The impact of independence assumptions on wireless communication analysis. 2184-2188 - Yanru Tang, Faeze Heydaryan, Jie Luo:
On utility optimization in distributed multiple access over a multi-packet reception channel. 2189-2193 - Vasuki Narasimha Swamy, Gireeja Ranade, Anant Sahai:
Robustness of cooperative communication schemes to channel models. 2194-2198
Th-AM-2-7: Interference Channels
- Salman Beigi, Sida Liu, Chandra Nair, Mehdi Yazdanpanah:
Some results on the scalar Gaussian interference channel. 2199-2203 - Ali Haghi, Amir K. Khandani:
The maximum Han-Kobayashi sum-rate for Gaussian interference channels. 2204-2208 - Yury Polyanskiy, Yihong Wu:
Converse bounds for interference channels via coupling and proof of Costa's conjecture. 2209-2213 - Farhad Shirani Chaharsooghi, S. Sandeep Pradhan:
Trade-off between communication and cooperation in the Interference Channel. 2214-2218
Th-AM-2-8: Covert Communications
- Mayank Bakshi, Vinod M. Prabhakaran:
Plausible deniability over broadcast channels. 2219-2223 - Mehrdad Tahmasbi, Matthieu R. Bloch:
Second-order asymptotics of covert communications over noisy channels. 2224-2228 - Keerthi Suria Kumar Arumugam, Matthieu R. Bloch:
Keyless covert communication over Multiple-Access Channels. 2229-2233 - Qiaosheng Eric Zhang, Mayank Bakshi, Sidharth Jaggi:
Computationally efficient deniable communication. 2234-2238
Th-AM-2-9: Quantum Information Theory
- Manoj Gopalkrishnan, Abhishek Deshpande, Varshith Kandula, Praveen Sriram:
A Bayesian view of single-qubit clocks, and an energy versus accuracy tradeoff. 2239-2243 - Xin Wang, Runyao Duan:
On the quantum no-signalling assisted zero-error classical simulation cost of non-commutative bipartite graphs. 2244-2248 - Anna Jencová:
Comparison of quantum channels and statistical experiments. 2249-2253 - Benno Salwey, Stefan Wolf:
Stronger attacks on causality-based key agreement. 2254-2258 - Runyao Duan, Cheng Guo, Chi-Kwong Li, Yinan Li:
Parallel distinguishability of quantum operations. 2259-2263
Th-PM-1-1: Quantum Codes 1
- Tyler Jackson, Markus Grassl, Bei Zeng:
Codeword stabilized quantum codes for asymmetric channels. 2264-2268 - Tyler Jackson, Markus Grassl, Bei Zeng:
Concatenated codes for amplitude damping. 2269-2273 - Alexei E. Ashikhmin, Ching-Yi Lai, Todd A. Brun:
Correction of data and syndrome errors by stabilizer codes. 2274-2278 - Sangjun Lee, Andreas Klappenecker:
Generalized fault-tolerant quantum computation over nice rings. 2279-2283
Th-PM-1-2: Inequalities 2
- Peng Xu, James Melbourne, Mokshay M. Madiman:
Reverse entropy power inequalities for s-concave densities. 2284-2288 - Eshed Ram, Igal Sason:
On Rényi entropy power inequalities. 2289-2293 - Thomas A. Courtade:
Strengthening the entropy power inequality. 2294-2298 - Jun Chen, Hao Ye, Chao Tian, Tie Liu, Zhiqing Xiao:
Cyclically symmetric entropy inequalities. 2299-2303 - Jihad Fahs, Ibrahim C. Abou-Faycal:
Generalized fisher information and upper bounds on the differential entropy of independent sums. 2304-2308
Th-PM-1-3: Data Exchange Problems
- Kai Cai, Guangyue Han:
Coding advantage in communications among peers. 2309-2313 - Ni Ding, Chung Chan, Qiaoqiao Zhou, Rodney A. Kennedy, Parastoo Sadeghi:
Fairness in communication for omniscience. 2314-2318 - Hooshang Ghasemi, Aditya Ramamoorthy:
Further results on lower bounds for coded caching. 2319-2323 - Anoosheh Heidarzadeh, Muxi Yan, Alex Sprintson:
Cooperative data exchange with priority classes. 2324-2328 - Himanshu Tyagi, Shun Watanabe:
Universal multiparty data exchange. 2329-2333
Th-PM-1-4: Network Coding 4
- Zhijie Ren, Jasper Goseling, Jos H. Weber, Michael Gastpar:
On the energy benefit of compute-and-forward for multiple unicasts. 2334-2338 - Gabriele Spini, Gilles Zémor:
Universally Secure Network Coding with feedback. 2339-2343 - Jinming Wen, Xiao-Wen Chang:
A linearithmic time algorithm for a shortest vector problem in compute-and-forward design. 2344-2348 - Hoover H. F. Yin, Shenghao Yang, Qiaoqiao Zhou, Lily M. L. Yung:
Adaptive recoding for BATS codes. 2349-2353 - Ardhendu Tripathy, Aditya Ramamoorthy:
On computation rates for arithmetic sum. 2354-2358
Th-PM-1-5: Compressed Sensing 3
- Namyoon Lee, Song-Nam Hong:
Coded compressive sensing: A compute-and-recover approach. 2359-2363 - Jinming Wen, Zhengchun Zhou, Jian Wang, Xiaohu Tang, Qun Mo:
A sharp condition for exact support recovery of sparse signals with orthogonal matching pursuit. 2364-2368 - Shirin Jalali, H. Vincent Poor:
Universal compressed sensing. 2369-2373 - Kyung-Su Kim, Sae-Young Chung:
Two-stage orthogonal Subspace Matching Pursuit for joint sparse recovery. 2374-2378 - Ju Sun, Qing Qu, John Wright:
A geometric analysis of phase retrieval. 2379-2383
Th-PM-1-6: Information Theory in Control
- Jui Wu, Achilleas Anastasopoulos:
Zero-rate achievability of posterior matching schemes for channels with memory. 2384-2388 - Christopher Rose:
State estimation, wireless tropes, demons and uncertainty. 2389-2393 - Serdar Yüksel:
Stationarity and ergodicity of stochastic non-linear systems controlled over communication channels. 2394-2398 - Takashi Tanaka, Karl Henrik Johansson, Tobias J. Oechtering, Henrik Sandberg, Mikael Skoglund:
Rate of prefix-free codes in LQG control systems. 2399-2403 - Anatoly Khina, Wael Halbawi, Babak Hassibi:
(Almost) practical tree codes. 2404-2408
Th-PM-1-7: Finite Blocklength Topics
- Lin Zhou, Vincent Y. F. Tan, Mehul Motani:
Second-order coding region for the discrete lossy Gray-Wyner source coding problem. 2409-2413 - Lin Zhou, Vincent Y. F. Tan, Mehul Motani:
Second-order coding region for the discrete successive refinement source coding problem. 2414-2418 - Lan V. Truong, Silas L. Fong, Vincent Y. F. Tan:
On second-order asymptotics of AWGN channels with feedback under the expected power constraint. 2419-2423 - Lars Palzer, Roy Timo:
Fixed-length compression for letter-based fidelity measures in the finite blocklength regime. 2424-2428 - Yucel Altug, H. Vincent Poor, Sergio Verdú:
On channel dispersion per unit cost. 2429-2433
Th-PM-1-8: Physical Layer Security
- Parisa Babaheidarian, Somayeh Salimi, Panos Papadimitratos:
Security in the Gaussian interference channel: Weak and moderately weak interference regimes. 2434-2438 - Remi A. Chou, Aylin Yener:
Multiuser authentication with anonymity constraints over noisy channels. 2439-2443 - Karim A. Banawan, Sennur Ulukus:
Secrecy in broadcast channel with combating helpers and interference channel with selfish users. 2444-2448 - Joseph Kampeas, Asaf Cohen, Omer Gurewitz:
On secrecy rates and outage in multi-user multi-eavesdroppers MISO systems. 2449-2453 - Meryem Benammar, Abdellatif Zaidi:
Secure lossy helper and Gray-Wyner problems. 2454-2458
Th-PM-1-9: Wireless Sensor Networks
- Osman Yagan:
Connectivity in inhomogeneous random key graphs. 2459-2463 - Rashad Eletreby, Osman Yagan:
Minimum node degree in inhomogeneous random key graphs with unreliable links. 2464-2468 - Alessandro Biason, Urbashi Mitra, Michele Zorzi:
Improved active sensing performance in wireless sensor networks via channel state information. 2469-2473 - Po-Ning Chen, Yunghsiang S. Han, Hsuan-Yin Lin, Pramod K. Varshney:
Optimal Byzantine attack for distributed inference with M-ary quantized data. 2474-2478 - Craig Wilson, Venugopal V. Veeravalli:
MMSE estimation in a sensor network in the presence of an adversary. 2479-2483
Fr-AM-1-1: Quantum Codes 2
- Masahiro Takeoka, Kaushik P. Seshadreesan, Mark M. Wilde:
Unconstrained distillation capacities of a pure-loss bosonic broadcast channel. 2484-2488 - Walter O. Krawec:
Asymptotic analysis of a three state quantum cryptographic protocol. 2489-2493 - Marius Junge, Renato Renner, David Sutter, Mark M. Wilde, Andreas J. Winter:
Universal recoverability in quantum information. 2494-2498 - Felipe Gomes Lacerda, Joseph M. Renes, Volkher B. Scholz:
Coherent state constellations for Bosonic Gaussian channels. 2499-2503
Fr-AM-1-2: Secret Keys and Secret Sharing
- Manuj Mukherjee, Chung Chan, Navin Kashyap, Qiaoqiao Zhou:
Bounds on the communication rate needed to achieve SK capacity in the hypergraphical source model. 2504-2508 - Mahdi Cheraghchi:
Nearly optimal robust secret sharing. 2509-2513 - Chung Chan, Ali Al-Bashabsheh, Qiaoqiao Zhou:
Incremental and decremental secret key agreement. 2514-2518 - Yongge Wang:
Quantum resistant random linear code based public key encryption scheme RLCE. 2519-2523
Fr-AM-1-3: LDPC Codes 5
- Yoones Hashemi, Amir H. Banihashemi:
Minimal characterization and provably efficient exhaustive search algorithm for elementary trapping sets of variable-regular LDPC codes. 2524-2528 - Ilya Dumer, Alexey A. Kovalev, Leonid P. Pryadko:
Distance verification for LDPC codes. 2529-2533 - Asit Kumar Pradhan, Andrew Thangaraj:
Near-capacity protograph doubly-generalized LDPC codes with block thresholds. 2534-2538 - Homayoon Hatami, David G. M. Mitchell, Daniel J. Costello Jr., Thomas E. Fuja:
Performance bounds for quantized LDPC decoders based on absorbing sets. 2539-2543
Fr-AM-1-4: Gabidulin Codes
- Anna-Lena Horlemann-Trautmann, Kyle Marshall, Joachim Rosenthal:
Considerations for rank-based cryptosystems. 2544-2548 - Sven Müelich, Sven Puchinger, David Mödinger, Martin Bossert:
An alternative decoding method for Gabidulin codes in characteristic zero. 2549-2553 - Sven Puchinger, Antonia Wachter-Zeh:
Sub-quadratic decoding of Gabidulin codes. 2554-2558 - Gwezheneg Robert:
A quadratic Welch-Berlekamp algorithm to decode generalized Gabidulin codes, and some variants. 2559-2563
Fr-AM-1-5: Age of Information
- Clement Kam, Sastry Kompella, Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Ephremides:
Age of information with a packet deadline. 2564-2568 - Ahmed M. Bedewy, Yin Sun, Ness B. Shroff:
Optimizing data freshness, throughput, and delay in multi-server information-update systems. 2569-2573 - Elie Najm, Rajai Nasser:
Age of information: The gamma awakening. 2574-2578 - Kun Chen, Longbo Huang:
Age-of-information in the presence of error. 2579-2583
Fr-AM-1-6: Wireless Communications 5
- Grace Villacrés, Tobias Koch:
Wireless networks of bounded capacity. 2584-2588 - Martina Cardone, Christina Fragouli, Daniela Tuninetti:
On network simplification for Gaussian Half-Duplex diamond networks. 2589-2593 - Yahya H. Ezzeldin, Ayan Sengupta, Christina Fragouli:
Wireless network simplification: Beyond diamond networks. 2594-2598 - Yi Li, Mustafa Cenk Gursoy, Senem Velipasalar:
Throughput of two-hop wireless channels with queueing constraints and finite blocklength codes. 2599-2603 - Sihuang Hu, Ofer Shayevitz:
The ρ-capacity of a graph. 2604-2608
Yi Li, M. Cenk Gursoy, Senem V elipasalar Fr-AM-1-7: Special Topics in Shannon Theory 1
- Imre Csiszár, Frantisek Matús:
Convergence of generalized entropy minimizers in sequences of convex problems. 2609-2613 - Jun Chen, Amir Salimi, Tie Liu, Chao Tian:
Orbit-entropy cones and extremal pairwise orbit-entropy inequalities. 2614-2618 - Eric Graves, Tan F. Wong:
Information stabilization of images over discrete memoryless channels. 2619-2623
Fr-AM-1-8: Interference in Wireless Networks 3
- Alireza Vahid, A. Robert Calderbank:
When does spatial correlation add value to delayed channel state information? 2624-2628 - Chunhua Geng, Syed Ali Jafar:
On the optimality of zero-forcing and treating interference as noise for K-user MIMO interference channels. 2629-2633 - Serj Haddad, Olivier Lévêque:
On the impact of sparsity on the broadcast capacity of wireless networks. 2634-2638 - Sunghyun Kim, Soheil Mohajer, Changho Suh:
Role of a relay in bursty networks with correlated transmissions. 2639-2643
Fr-AM-1-9: DNA-based Storage
- Ryan Gabrys, Eitan Yaakobi, Olgica Milenkovic:
Codes in the damerau distance for DNA storage. 2644-2648 - S. M. Hossein Tabatabaei Yazdi, Han Mao Kiah, Olgica Milenkovic:
Weakly mutually uncorrelated codes. 2649-2653 - Zuling Chang, Johan Chrisnata, Martianus Frederic Ezerman, Han Mao Kiah:
On the number of DNA sequence profiles for practical values of read lengths. 2654-2658
Fr-AM-2-1: Random Coding Bounds
- Neri Merhav:
The generalized stochastic likelihood decoder: Random coding and expurgated bounds. 2659-2663 - Jonathan Scarlett, Vincent Y. F. Tan, Giuseppe Durisi:
The dispersion of nearest-neighbor decoding for additive non-Gaussian channels. 2664-2668 - Wei Yang, Austin Collins, Giuseppe Durisi, Yury Polyanskiy, H. Vincent Poor:
A beta-beta achievability bound with applications. 2669-2673 - Kasper Fløe Trillingsgaard, Wei Yang, Giuseppe Durisi, Petar Popovski:
Variable-length coding with stop-feedback for the common-message broadcast channel. 2674-2678
Fr-AM-2-2: Distributions and Hypothesis Testing
- Anit Kumar Sahu, Soummya Kar:
Distributed recursive composite hypothesis testing: Imperfect communication. 2679-2683 - Yuting Wei, Martin J. Wainwright:
Sharp minimax bounds for testing discrete monotone distributions. 2684-2688 - Moein Falahatgar, Alon Orlitsky, Venkatadheeraj Pichapati, Ananda Theertha Suresh:
Learning Markov distributions: Does estimation trump compression? 2689-2693 - Adriano Pastore, Michael Gastpar:
Locally differentially-private distribution estimation. 2694-2698 - Theodoros Tsiligkaridis:
Asynchronous decentralized algorithms for the noisy 20 questions problem. 2699-2703
Fr-AM-2-3: LDPC Codes 6
- Irina E. Bocharova, Boris D. Kudryashov, Vitaly Skachek, Yauhen Yakimenka:
Low complexity algorithm approaching the ML decoding of binary LDPC codes. 2704-2708 - Ahmed H. Hareedy, Chinmayi Lanka, Clayton Schoeny, Lara Dolecek:
The weight consistency matrix framework for general non-binary LDPC code optimization: Applications in flash memories. 2709-2713 - Hassan Khodaiemehr, Mohammad-Reza Sadeghi, Daniel Panario:
Construction of full-diversity 1-level LDPC lattices for block-fading channels. 2714-2718 - Hiroshi Abe, Kenta Kasai:
Spatially-coupled codes approach symmetric information rate of finite-state Markov fading channels. 2719-2723
Fr-AM-2-4: Network Coding 5
- Nikhil Karamchandani, Suhas N. Diggavi, Giuseppe Caire, Shlomo Shamai:
Rate and delay for coded caching with carrier aggregation. 2724-2728 - Wenjie Li, Francesca Bassi, Michel Kieffer:
Sparse random linear network coding for data compression in WSNs. 2729-2733 - Yaoqing Yang, Soummya Kar, Pulkit Grover:
Energy efficient distributed coding for data collection in a noisy sparse network. 2734-2738
Fr-AM-2-5: Energy Harvesting 3
- Abdulrahman Baknina, Sennur Ulukus:
Online policies for multiple access channel with common energy harvesting source. 2739-2743 - Huseyin A. Inan, Dor Shaviv, Ayfer Özgür:
Capacity of the energy harvesting Gaussian MAC. 2744-2748 - Zhengwei Ni, Mehul Motani:
Optimization of time-switching energy harvesting receivers over multiple transmission blocks. 2749-2753 - Roberto Valentini, Marco Levorato:
Optimal aging-aware channel access control for wireless networks with energy harvesting. 2754-2758
Fr-AM-2-6: Wireless Communications 6
- Subhajit Majhi, Patrick Mitran:
On the capacity of a class of dual-band interference channels. 2759-2763 - Ryan Keating, Dongning Guo:
Multiuser two-way ranging. 2764-2768 - Gozde Ozcan, Mustafa Ozmen, Mustafa Cenk Gursoy:
QoS-driven energy-efficient power control with Markov arrivals and finite-alphabet inputs. 2769-2773 - Ahmed Hindy, Aria Nosratinia:
Lattice strategies for the ergodic fading dirty paper channel. 2774-2778
Fr-AM-2-7: Special Topics in Shannon Theory 2
- Martin Mittelbach, Eduard A. Jorswieck:
Cascade channels with infinite memory. 2779-2783 - Lele Wang, Sihuang Hu, Ofer Shayevitz:
Quickest sequence phase detection. 2784-2788 - Giovanni Alberti, Helmut Bölcskei, Camillo De Lellis, Günther Koliander, Erwin Riegler:
Lossless linear analog compression. 2789-2793 - Jiantao Jiao, Kartik Venkat, Tsachy Weissman:
Mutual information, relative entropy and estimation error in semi-martingale channels. 2794-2798
Fr-AM-2-8: Wiretap Channels 1
- Ziv Goldfeld, Paul Cuff, Haim H. Permuter:
Semantic-security capacity for wiretap channels of type II. 2799-2803 - Mohamed S. Nafea, Aylin Yener:
A new wiretap channel model and its strong secrecy capacity. 2804-2808 - Igor Bjelakovic, Jafar Mohammadi, Slawomir Stanczak:
Strong secrecy and stealth for broadcast channels with confidential messages. 2809-2813 - Karim A. Banawan, Sennur Ulukus:
Achievable secrecy rates in the multiple access wiretap channel with deviating users. 2814-2818 - Si-Hyeon Lee, Wanyao Zhao, Ashish Khisti:
Secure degrees of freedom of the Gaussian diamond-wiretap channel. 2819-2823
Fr-AM-2-9: Permutations in Coding Theory / Index Coding 2
- Yeow Meng Chee, Han Mao Kiah, San Ling, Tuan Thanh Nguyen, Van Khu Vu, Xiande Zhang:
String concatenation construction for Chebyshev permutation channel codes. 2824-2828 - Yonatan Yehezkeally, Moshe Schwartz:
Limited-magnitude error-correcting Gray codes for rank modulation. 2829-2833 - Lawrence Ong, Badri N. Vellambi, Phee Lep Yeoh, Jörg Kliewer, Jinhong Yuan:
Secure index coding: Existence and construction. 2834-2838 - Lakshmi Prasad Natarajan, Yi Hong, Emanuele Viterbo:
New error correcting codes for informed receivers. 2839-2843
Fr-PM-1-1: Quantum Information and Communication
- Mario Berta, Omar Fawzi, Marco Tomamichel:
Exploiting variational formulas for quantum relative entropy. 2844-2848 - Felix Leditzky, Mark M. Wilde, Nilanjana Datta:
Strong converse theorems using Rényi entropies. 2849-2853 - Gonzalo Vazquez-Vilar:
Multiple quantum hypothesis testing expressions and classical-quantum channel converse bounds. 2854-2857 - Andreas J. Winter:
"Pretty strong" converse for the private capacity of degraded quantum wiretap channels. 2858-2862
Fr-PM-1-2: Group Testing 3
- Shashanka Ubaru, Arya Mazumdar, Alexander Barg:
Group testing schemes from low-weight codewords of BCH codes. 2863-2867 - Jonathan Scarlett, Volkan Cevher:
Converse bounds for noisy group testing with arbitrary measurement matrices. 2868-2872 - Kangwook Lee, Ramtin Pedarsani, Kannan Ramchandran:
SAFFRON: A fast, efficient, and robust framework for group testing based on sparse-graph codes. 2873-2877 - Holger Boche, Ullrich J. Mönich, Ezra Tampubolon:
Strong divergence of the Shannon sampling series for an infinite dimensional signal space. 2878-2882
Fr-PM-1-3: LDPC Codes 7
- Ting Liu, Chao-Kai Wen, Shi Jin, Xiaohu You:
Generalized turbo signal recovery for nonlinear measurements and orthogonal sensing matrices. 2883-2887 - Jan Lewandowsky, Maximilian Stark, Gerhard Bauch:
Information Bottleneck Graphs for receiver design. 2888-2892 - David Matas, Meritxell Lamarca:
Asymptotic MAP upper bounds for LDPC codes. 2893-2897
Fr-PM-1-4: Delays in Networks
- Rafid Mahmood, Ahmed Badr, Ashish Khisti:
Low delay network streaming under burst losses. 2898-2902 - Chih-Chun Wang:
Delay-constrained capacity for broadcast erasure channels: A linear-coding-based study. 2903-2907 - Minghua Chen, Ye Tian, Chih-Chun Wang:
On coding capacity of delay-constrained network information flow: An algebraic approach. 2908-2912
Fr-PM-1-5: Complexity and Cryptography 1
- Divesh Aggarwal, Kaave Hosseini, Shachar Lovett:
Affine-malleable extractors, spectrum doubling, and application to privacy amplification. 2913-2917 - Jingbo Liu, Paul W. Cuff, Sergio Verdú:
Key generation with limited interaction. 2918-2922 - Sung-Il Pae:
Binarizations in random number generation. 2923-2927 - Olivier Rioul, Patrick Solé, Sylvain Guilley, Jean-Luc Danger:
On the entropy of Physically Unclonable Functions. 2928-2932
Fr-PM-1-6: Wireless Communications 7
- Bin Qian, Wai Ho Mow:
An extended Tanner graph approach to decoding LDPC codes over decode-and-forward relay channels. 2933-2937 - Doha Hamza, Jeff S. Shamma:
A blind matching algorithm for cognitive radio networks. 2938-2942 - Xiaobin Wu, Thomas E. Fuja, Thomas G. Pratt:
Channel coding for wireless communication via electromagnetic polarization. 2943-2947 - Kareem M. Attiah, Karim G. Seddik, Ramy H. Gohary, Halim Yanikomeroglu:
A systematic design approach for non-coherent Grassmannian constellations. 2948-2952
Fr-PM-1-7: Lossy Compression 3
- Yanina Shkel, Sergio Verdú:
A single-shot approach to lossy source coding under logarithmic loss. 2953-2957 - Ryo Nomura, Hideki Yagi:
Variable-length lossy source coding allowing some probability of union of overflow and excess distortion. 2958-2962 - Paul Cuff:
Soft covering with high probability. 2963-2967 - Vinay Praneeth Boda, Prakash Narayan:
Independent and memoryless sampling rate distortion. 2968-2972
Fr-PM-1-8: Wiretap Channels 2
- Zohaib Hassan Awan, Abdellatif Zaidi, Aydin Sezgin:
On SDoF of multi-receiver wiretap channel with alternating CSIT. 2973-2977 - Rick Fritschek, Gerhard Wunder:
Towards a constant-gap sum-capacity result for the Gaussian wiretap channel with a helper. 2978-2982 - Mohamed S. Nafea, Aylin Yener:
The multiple access wiretap channel II with a noisy main channel. 2983-2987 - Sina Rezaei Aghdam, Tolga M. Duman:
Low complexity precoding for MIMOME wiretap channels based on cut-off rate. 2988-2992
Fr-PM-1-9: MIMO and Space-Time Coding
- Laura Luzzi, Roope Vehkalahti, Alexander Gorodnik:
Towards a complete DMT classification of division algebra codes. 2993-2997 - Michal Kaliszan, Giuseppe Caire, Slawomir Stanczak:
On the throughput rate of wireless multipoint multicasting. 2998-3002 - Smarajit Das:
On the decoding delay of rate-1/2 complex orthogonal designs. 3003-3007
Fr-PM-2-3: LDPC Codes 8
- Liyuan Song, Qin Huang, Zulin Wang:
Set min-sum decoding algorithm for non-binary LDPC codes. 3008-3012 - Naoaki Kokubun, Hironori Uchikawa:
Integrated parallel interleaved concatenation for lowering error floors of LDPC codes. 3013-3017 - Takayuki Nozaki:
Cutsize distributions of balanced hypergraph bipartitions for random hypergraphs. 3018-3022 - Xijin Mu, Baoming Bai, Rui Zhang:
Multiplicative repetition based superposition transmission of nonbinary codes. 3023-3027
Fr-PM-2-4: Graphical Methods / Weight Distribution
- Jennifer Tang, Da Wang, Yury Polyanskiy, Gregory W. Wornell:
Defect tolerance: Fundamental limits and examples. 3028-3032 - Bernhard C. Geiger, Christoph Hofer-Temmel:
Graph-based lossless Markov lumpings. 3033-3037 - Christoph Pacher, Philipp Grabenweger, Dimitris E. Simos:
Weight distribution of the syndrome of linear codes and connections to combinatorial designs. 3038-3042
Fr-PM-2-5: Complexity and Cryptography 2
- Elena Egorova, Marcel Fernandez, Grigory A. Kabatiansky, Moon Ho Lee:
Signature codes for the A-channel and collusion-secure multimedia fingerprinting codes. 3043-3047 - Julian Loss, Ueli Maurer, Daniel Tschudi:
Hierarchy of three-party consistency specifications. 3048-3052 - Deepesh Data:
Secure computation of randomized functions. 3053-3057 - Gregor Seiler, Ueli Maurer:
On the impossibility of information-theoretic composable coin toss extension. 3058-3061
Fr-PM-2-7: Source and Channel Coding
- Morteza Varasteh, Osvaldo Simeone, Deniz Gündüz:
Joint source-channel coding with one-bit ADC front end. 3062-3066 - Arya Mazumdar, Yury Polyanskiy, Ankit Singh Rawat, Hajir Roozbehani:
Distance preserving maps and combinatorial joint source-channel coding for large alphabets. 3067-3071 - Si-Hyeon Lee, Vincent Y. F. Tan, Ashish Khisti:
Streaming data transmission in the moderate deviations and central limit regimes. 3072-3076
Fr-PM-2-8: Wiretap Channels 3
- Rafael F. Schaefer, Holger Boche, H. Vincent Poor:
Super-activation as a unique feature of arbitrarily varying wiretap channels. 3077-3081 - Laura Luzzi, Cong Ling, Roope Vehkalahti:
Almost universal codes for fading wiretap channels. 3082-3086 - Wei Yang, Rafael F. Schaefer, H. Vincent Poor:
Finite-blocklength bounds for wiretap channels. 3087-3091
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.