default search action
ISIT 2020: Los Angeles, CA, USA
- IEEE International Symposium on Information Theory, ISIT 2020, Los Angeles, CA, USA, June 21-26, 2020. IEEE 2020, ISBN 978-1-7281-6432-8
- Rachel N. Berman, Ron M. Roth:
On the Number of Factorizations of Polynomials over Finite Fields. 1-6 - Wei Zhao, Kenneth W. Shum, Shenghao Yang:
Optimal Locally Repairable Constacyclic Codes of Prime Power Lengths. 7-12 - Renaud-Alexandre Pitaval, Yi Qin:
Grassmannian Frames in Composite Dimensions by Exponentiating Quadratic Forms. 13-18 - Julian Renner, Sven Puchinger, Antonia Wachter-Zeh, Camilla Hollanti, Ragnar Freij-Hollanti:
Low-Rank Parity-Check Codes over the Ring of Integers Modulo a Prime Power. 19-24 - Ryan Gabrys, Srilakshmi Pattabiraman, Olgica Milenkovic:
Mass Error-Correction Codes for Polymer-Based Data Storage. 25-30 - Mahdi Soleymani, Hessam Mahdavifar:
Analog Subspace Coding: A New Approach to Coding for Non-Coherent Wireless Networks. 31-36 - Tuan Thanh Nguyen, Kui Cai, Kees A. Schouhamer Immink:
Binary Subblock Energy-Constrained Codes: Knuth's Balancing and Sequence Replacement Techniques. 37-41 - Mengke Lian, Christian Häger, Henry D. Pfister:
Decoding Reed-Muller Codes Using Redundant Code Constraints. 42-47 - Shohei Satake, Yujie Gu:
Constructions of Complex Codebooks Asymptotically Meeting the Welch Bound: A Graph Theoretic Approach. 48-53 - Sven Puchinger, Julian Renner, Johan Rosenkilde:
Generic Decoding in the Sum-Rank Metric. 54-59 - Hikmet Yildiz, Netanel Raviv, Babak Hassibi:
Support Constrained Generator Matrices of Gabidulin Codes in Characteristic Zero. 60-65 - Fatemeh Kazemi, Sascha Kurz, Emina Soljanin:
A Geometric View of the Service Rates of Codes Problem and its Application to the Service Rate of the First Order Reed-Muller Codes. 66-71 - Rishabh K. Iyer, Jeff A. Bilmes:
Concave Aspects of Submodular Functions. 72-77 - Nicolas Charpenay, Maël Le Treust:
Zero-Error Coding with a Generator Set of Variable-Length Words. 78-83 - Roni Con, Amir Shpilka:
Explicit and Efficient Constructions of Coding Schemes for the Binary Deletion Channel. 84-89 - Ilya Vorobyev:
Optimal Multistage Group Testing Algorithm for 3 Defectives. 90-95 - Chong Shangguan, Itzhak Tamo:
Error Detection and Correction in Communication Networks. 96-101 - Aditya Potukuchi, Yihan Zhang:
Improved efficiency for covering codes matching the sphere-covering bound. 102-107 - Duc Tu Dao, Han Mao Kiah, Hengjia Wei:
Maximum Length of Robust Positioning Sequences. 108-113 - Jing Hao, Han Huang, Galyna V. Livshyts, Konstantin E. Tikhomirov:
Distribution of the Minimum Distance of Random Linear Codes. 114-119 - Dor Elimelech:
The Capacity of Multidimensional Permutations with Restricted Movement. 120-125 - Yonatan Yehezkeally, Moshe Schwartz:
Uncertainty of Reconstructing Multiple Messages from Uniform-Tandem-Duplication Noise. 126-131 - Abhishek Agarwal, Olgica Milenkovic, Srilakshmi Pattabiraman, João Ribeiro:
Group Testing with Runlength Constraints for Topological Molecular Storage. 132-137 - Gianira Nicoletta Alfarano, Julia Lieb, Joachim Rosenthal:
Construction of Rate (n - 1 )/n Non-Binary LDPC Convolutional Codes via Difference Triangle Sets. 138-143 - Mira Gonen, Ishay Haviv, Michael Langberg, Alex Sprintson:
Minimizing the alphabet size of erasure codes with restricted decoding sets. 144-149 - Steven T. Dougherty, Josep Rifà, Mercè Villanueva:
Constructions of Nonequivalent Fp-Additive Generalised Hadamard Codes. 150-155 - Jinwen Shi, Cong Ling, Osvaldo Simeone, Jörg Kliewer:
Coded Computation Against Straggling Channel Decoders in the Cloud for Gaussian Channels. 156-161 - Shailja Agrawal, Prasad Krishnan:
Low Complexity Distributed Computing via Binary Matrices with Extension to Stragglers. 162-167 - Nicholas Woolsey, Rong-Rong Chen, Mingyue Ji:
Heterogeneous Computation Assignments in Coded Elastic Computing. 168-173 - Hoang Dau, Ryan Gabrys, Yu-Chih Huang, Chen Feng, Quang-Hung Luu, Eidah J. Alzahrani, Zahir Tari:
Optimizing the Transition Waste in Coded Elastic Computing. 174-178 - Shunsuke Horii:
Improved Computation-Communication Trade-Off for Coded Distributed Computing using Linear Dependence of Intermediate Values. 179-184 - Chien-Sheng Yang, Ramtin Pedarsani, Amir Salman Avestimehr:
Coded Computing in Unknown Environment via Online Learning. 185-190 - Quang Minh Nguyen, Haewon Jeong, Pulkit Grover:
Coded QR Decomposition. 191-196 - Adarsh M. Subramaniam, Anoosheh Heidarzadeh, Asit Kumar Pradhan, Krishna R. Narayanan:
Product Lagrange Coded Computing. 197-202 - Songze Li, Mingchao Yu, Chien-Sheng Yang, Amir Salman Avestimehr, Sreeram Kannan, Pramod Viswanath:
PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously. 203-208 - Yu Ye, Hao Chen, Ming Xiao, Mikael Skoglund, H. Vincent Poor:
Incremental ADMM with Privacy-Preservation for Decentralized Consensus Optimization. 209-214 - Kuikui Li, Meixia Tao, Jingjing Zhang, Osvaldo Simeone:
Multi-Cell Mobile Edge Coded Computing: Trading Communication and Computing for Distributed Matrix Multiplication. 215-220 - Xian Su, Xiaomei Zhong, Xiaodi Fan, Jun Li:
Local Re-encoding for Coded Matrix Multiplication. 221-226 - Zhen Chen, Zhuqing Jia, Zhiying Wang, Syed Ali Jafar:
GCSA Codes with Noise Alignment for Secure Coded Multi-Party Batch Matrix Multiplication. 227-232 - Pedro Soto, Jun Li:
Straggler-free Coding for Concurrent Matrix Multiplications. 233-238 - Asit Kumar Pradhan, Anoosheh Heidarzadeh, Krishna R. Narayanan:
Factored LT and Factored Raptor Codes for Large-Scale Distributed Matrix Multiplication. 239-244 - Qian Yu, Amir Salman Avestimehr:
Entangled Polynomial Codes for Secure, Private, and Batch Distributed Matrix Multiplication: Breaking the "Cubic" Barrier. 245-250 - Burak Hasircioglu, Jesús Gómez-Vilardebó, Deniz Gündüz:
Bivariate Polynomial Coding for Straggler Exploitation with Heterogeneous Workers. 251-256 - Pei Peng, Emina Soljanin, Philip Whiting:
Diversity vs. Parallelism in Distributed Computing with Redundancy. 257-262 - Andrew Thangaraj, Henry D. Pfister:
Efficient Maximum-Likelihood Decoding of Reed-Muller RM(m-3, m) Codes. 263-268 - Zilong Wang, Erzhong Xue, Guang Gong:
A New Construction of QAM Golay Complementary Sequence Pair. 269-273 - Cheuk Ting Leung, Mehul Motani, Rajshekhar Vishweshwar Bhat:
Multi-Label and Concatenated Neural Block Decoders. 274-279 - Hajir Roozbehani, Yury Polyanskiy:
Graceful degradation over the BEC via non-linear codes. 280-285 - Li Peng:
Time-Frequency Division Multiple Access and the TFDMA Ad Hoc Network Based on the (n, n(n-1), n-1) Permutation Group Codes. 286-291 - Hengjie Yang, Linfang Wang, Vincent Lau, Richard D. Wesel:
An Efficient Algorithm for Designing Optimal CRCs for Tail-Biting Convolutional Codes. 292-297 - Jiongyue Xing, Li Chen, Martin Bossert:
Low-Complexity Chase Decoding of Reed-Solomon Codes through Basis Reduction. 298-302 - Suihua Cai, Xiao Ma:
Twisted-Pair Superposition Transmission for Low Latency Communications. 303-308 - Arnaud Dumenil, Elie Awwad, Cyril Measson:
Tetrahedral Coding and Non-Unitary Resilience in Polarization-Multiplexed Lightwave Transmissions. 309-314 - Alejandro Cohen, Amit Solomon, Ken R. Duffy, Muriel Médard:
Noise Recycling. 315-320 - Tomer Raviv, Nir Raviv, Yair Be'ery:
Data-Driven Ensembles for Deep and Hard-Decision Hybrid Decoding. 321-326 - Marco Ferrari, Ramon Marenzi, Luca Barletta:
Message Flow Analysis in Practical LDPC Decoders for the Interpretation of Absorbing Set Thresholds. 327-332 - Jiongyue Xing, Martin Bossert, Sebastian Bitzer, Li Chen:
Iterative Decoding of Non-Binary Cyclic Codes Using Minimum-Weight Dual Codewords. 333-337 - Andreas Buchberger, Christian Häger, Henry D. Pfister, Laurent Schmalen, Alexandre Graell i Amat:
Pruning Neural Belief Propagation Decoders. 338-342 - Sundara Rajan Srinivasavaradhan, Suhas N. Diggavi, Christina Fragouli:
Equivalence of ML decoding to a continuous optimization problem. 343-348 - Viduranga Bandara Wijekoon, Emanuele Viterbo, Yi Hong:
A Low Complexity Decoding Algorithm for NB-LDPC Codes over Quadratic Extension Fields. 349-354 - Emna Ben Yacoub, Gianluigi Liva:
Asymptotic Absorbing Set Enumerators for Non-Binary Protograph-Based LDPC Code Ensembles. 355-360 - Yuxin Liu, Michelle Effros:
Finite-Blocklength and Error-Exponent Analyses for LDPC Codes in Point-to-Point and Multiple Access Communication. 361-366 - Emily McMillon, Allison Beemer, Christine A. Kelley:
Analysis of Absorbing Sets using Cosets and Syndromes. 367-372 - Yihan Zhang:
List Decoding for Oblivious Arbitrarily Varying MACs: Constrained and Gaussian. 373-378 - Noga Ron-Zewi, Mary Wootters, Gilles Zémor:
Linear-time Erasure List-decoding of Expander Codes. 379-383 - Changryoul Choi, Jechang Jeong:
Fast Soft Decision Decoding of Linear Block Codes Using Partial Syndrome Search. 384-388 - Boaz Shuval, Ido Tal:
List Decoding of Universal Polar Codes. 389-394 - Marvin Geiselhart, Ahmed Elkelesh, Moustafa Ebada, Sebastian Cammerer, Stephan ten Brink:
CRC-Aided Belief Propagation List Decoding of Polar Codes. 395-400 - Marco Mondelli, Seyyed Ali Hashemi, John M. Cioffi, Andrea Goldsmith:
Simplified Successive Cancellation Decoding of Polar Codes Has Sublinear Latency. 401-406 - Peter Trifonov:
Recursive Trellis Decoding Techniques of Polar Codes. 407-412 - Binghao Li, Baoming Bai, Min Zhu, Shenyang Zhou:
Improved Belief Propagation List Decoding for Polar Codes. 413-418 - Jincheng Dai, Kai Niu, Zhongwei Si:
Asynchronous Polar-Coded Modulation. 419-424 - Yunus Inan, Emre Telatar:
Finite-Level Quantization Procedures for Construction and Decoding of Polar Codes. 425-430 - Jaume del Olmo Alòs, Javier R. Fonollosa:
Polar Coding for the Wiretap Broadcast Channel with Multiple Messages. 431-436 - Mustafa Cemil Coskun, Joachim Neu, Henry D. Pfister:
Successive Cancellation Inactivation Decoding for Modified Reed-Muller and eBCH Codes. 437-442 - Hanwen Yao, Arman Fazeli, Alexander Vardy:
List Decoding of Arıkan's PAC Codes. 443-448 - James Chin-Jen Pang, Hessam Mahdavifar, S. Sandeep Pradhan:
Capacity-achieving Polar-based LDGM Codes with Crowdsourcing Applications. 449-454 - Arman Fazeli, Alexander Vardy, Hanwen Yao:
Hardness of Successive-Cancellation Decoding of Linear Codes. 455-460 - Xiaowei Wu, Min Qiu, Jinhong Yuan:
Partially Information Coupled Duo-Binary Turbo Codes. 461-466 - Homa Esfahanizadeh, Eshed Ram, Yuval Cassuto, Lara Dolecek:
Spatially Coupled Codes with Sub-Block Locality: Joint Finite Length-Asymptotic Design Approach. 467-472 - Min Zhu, David G. M. Mitchell, Michael Lentmaier, Daniel J. Costello Jr.:
A Novel Design of Spatially Coupled LDPC Codes for Sliding Window Decoding. 473-478 - Muhammad Umar Farooq, Saeedeh Moloudi, Michael Lentmaier:
Generalized LDPC Codes with Convolutional Code Constraints. 479-484 - Lev Tauz, Homa Esfahanizadeh, Lara Dolecek:
Non-Uniform Windowed Decoding For Multi-Dimensional Spatially-Coupled LDPC Codes. 485-490 - Pin-Wen Su, Yu-Chih Huang, Shih-Chun Lin, I-Hsiang Wang, Chih-Chun Wang:
Error Rate Analysis for Random Linear Streaming Codes in the Finite Memory Length Regime. 491-496 - Elad Domanovitz, Ashish Khisti, Wai-Tian Tan, Xiaoqing Zhu, John G. Apostolopoulos:
Streaming Erasure Codes over Multi-hop Relay Network. 497-502 - Vinayak Ramkumar, Myna Vajha, M. Nikhil Krishnan, P. Vijay Kumar:
Staggered Diagonal Embedding Based Linear Field Size Streaming Codes. 503-508 - Michael Rudow, K. V. Rashmi:
Online Versus Offline Rate in Streaming Codes for Variable-Size Messages. 509-514 - Jia Liu, Chaoyong Wang:
Tangential-Sphere Bound Revisited. 515-518 - Vincent Corlay, Joseph J. Boutros, Philippe Ciblat, Loïc Brunel:
On the decoding of Barnes-Wall lattices. 519-524 - Huseyin A. Inan, Ayfer Özgür:
Strongly Explicit and Efficiently Decodable Probabilistic Group Testing. 525-530 - Tefjol Pllaha, Olav Tirkkonen, A. Robert Calderbank:
Reconstruction of Multi-user Binary Subspace Chirps. 531-536 - Maiara F. Bollauf, Sueli I. R. Costa, Ram Zamir:
Lattice Construction C⋆ from Self-Dual Codes. 537-541 - Yeow Meng Chee, Tuvi Etzion, Han Mao Kiah, Hui Zhang:
Recovery Sets for Subspaces from a Vector Space. 542-547 - Rawad Bitar, Sidharth Jaggi:
Communication Efficient Secret Sharing in the Presence of Malicious Adversary. 548-553 - Hanxu Hou, Patrick P. C. Lee, Yunghsiang S. Han:
Minimum Storage Rack-Aware Regenerating Codes with Exact Repair and Small Sub-Packetization. 554-559 - Hanxu Hou, Patrick P. C. Lee, Yunghsiang S. Han:
Toward Optimality in Both Repair and Update via Generic MDS Code Transformation. 560-565 - Yeow Meng Chee, Charles Joseph Colbourn, Hoang Dau, Ryan Gabrys, Alan Chi Hung Ling, Dylan Lusi, Olgica Milenkovic:
Access Balancing in Storage Systems by Labeling Partial Steiner Systems. 566-570 - Han Cai, Moshe Schwartz:
On Optimal Locally Repairable Codes and Generalized Sector-Disk Codes. 571-576 - Francisco Maturana, V. S. Chaitanya Mukka, K. V. Rashmi:
Access-optimal Linear MDS Convertible Codes for All Parameters. 577-582 - Talha Cihad Gulcu:
Secure Node Repair of Reed-Solomon Codes. 583-588 - Zitan Chen, Min Ye, Alexander Barg:
Repair of RS codes with optimal access and error correction. 589-594 - Weijun Fang, Bin Chen, Shu-Tao Xia, Fang-Wei Fu:
Complete Characterization of Optimal LRCs with Minimum Distance 6 and Locality 2: Improved Bounds and Constructions. 595-599 - Weijun Fang, Bin Chen, Shu-Tao Xia, Fang-Wei Fu:
Perfect LRCs and k-Optimal LRCs. 600-604 - Rémi A. Chou, Jörg Kliewer:
Secure Distributed Storage: Rate-Privacy Trade-Off and XOR-Based Coding Scheme. 605-610 - Jie Hao, Jun Zhang, Shu-Tao Xia, Fang-Wei Fu, Yi-Xian Yang:
Weight Distributions of q-ary Optimal Locally Repairable Codes with Locality 2, Distance 5 and Even Dimension. 611-615 - Zitan Chen, Alexander Barg:
Cyclic LRC codes with hierarchy and availability. 616-621 - Siyi Yang, Ahmed H. Hareedy, A. Robert Calderbank, Lara Dolecek:
Topology-Aware Cooperative Data Protection in Blockchain-Based Decentralized Storage Networks. 622-627 - Lukas Holzbaur, Sven Puchinger, Eitan Yaakobi, Antonia Wachter-Zeh:
Partial MDS Codes with Local Regeneration. 628-633 - Lukas Holzbaur, Rina Polyanskaya, Nikita Polyanskii, Ilya Vorobyev:
Lifted Reed-Solomon Codes with Application to Batch Codes. 634-639 - Prasad Krishnan, V. Lalitha, Lakshmi Natarajan:
Coded Data Rebalancing: Fundamental Limits and Constructions. 640-645 - Fatemeh Kazemi, Esmaeil Karimi, Emina Soljanin, Alex Sprintson:
A Combinatorial View of the Service Rates of Codes Problem, its Equivalence to Fractional Matching and its Connection with Batch Codes. 646-651 - Michelle Kleckler, Soheil Mohajer:
Secure Determinant Codes: Type-II Security. 652-657 - Sagi Marcovich, Eitan Yaakobi:
Reconstruction of Strings from their Substrings Spectrum. 658-663 - Ryan Gabrys, Han Mao Kiah, Alexander Vardy, Eitan Yaakobi, Yiwei Zhang:
Locally Balanced Constraints. 664-669 - Lev Yohananov, Eitan Yaakobi:
Codes over Trees. 670-675 - Han Mao Kiah, Tuan Thanh Nguyen, Eitan Yaakobi:
Coding for Sequence Reconstruction for Single Edits. 676-681 - Ron M. Roth, Paul H. Siegel:
On Parity-Preserving Variable-Length Constrained Coding. 682-687 - Ahmed H. Hareedy, Beyza Dabak, A. Robert Calderbank:
Q-ary Asymmetric LOCO Codes: Constrained Codes Supporting Flash Evolution. 688-693 - Tuan Thanh Nguyen, Kui Cai, Kees A. Schouhamer Immink, Han Mao Kiah:
Constrained Coding with Error Control for DNA-Based Data Storage. 694-699 - Utkarsh Gupta, Han Mao Kiah, Alexander Vardy, Hanwen Yao:
Polar Codes with Balanced Codewords. 700-705 - Renfei Bu, Jos H. Weber, Kees A. Schouhamer Immink:
Maximum Likelihood Decoding for Channels with Uniform Noise and Signal Dependent Offset. 706-710 - Siddharth Jain, Farzad Farnoud, Moshe Schwartz, Jehoshua Bruck:
Coding for Optimized Writing Rate in DNA Storage. 711-716 - Jin Sima, Netanel Raviv, Jehoshua Bruck:
Robust Indexing - Optimal Codes for DNA Storage. 717-722 - Andreas Lenz, Cyrus Rashtchian, Paul H. Siegel, Eitan Yaakobi:
Covering Codes for Insertions and Deletions. 723-728 - Takayuki Nozaki:
Weight Enumerators for Number-Theoretic Codes and Cardinalities of Tenengolts' Non-binary Codes. 729-733 - Yuanyuan Tang, Farzad Farnoud:
Error-correcting Codes for Short Tandem Duplication and Substitution Errors. 734-739 - Jin Sima, Ryan Gabrys, Jehoshua Bruck:
Optimal Codes for the q-ary Deletion Channel. 740-745 - Yeow Meng Chee, Van Khu Vu:
Codes Correcting Synchronization Errors for Symbol-Pair Read Channels. 746-750 - Jin Sima, Ryan Gabrys, Jehoshua Bruck:
Syndrome Compression for Optimal Redundancy Codes. 751-756 - Andreas Lenz, Nikita Polyanskii:
Optimal Codes Correcting a Burst of Deletions of Variable Length. 757-762 - Omer Sabary, Eitan Yaakobi, Alexander Yucovich:
The Error Probability of Maximum-Likelihood Decoding over Two Deletion/Insertion Channels. 763-768 - Jin Sima, Ryan Gabrys, Jehoshua Bruck:
Optimal Systematic t-Deletion Correcting Codes. 769-774 - Ilia Smagloy, Lorenz Welter, Antonia Wachter-Zeh, Eitan Yaakobi:
Single-Deletion Single-Substitution Correcting Codes. 775-780 - Ryo Sakogawa, Haruhiko Kaneko:
Symbolwise MAP Estimation for Multiple-Trace Insertion/Deletion/Substitution Channels. 781-785 - Yixin Wang, Md. Noor-A-Rahim, Erry Gunawan, Yong Liang Guan, Chueh-Loo Poh:
Thermodynamically Stable DNA Code Design using a Similarity Significance Model. 786-791 - Yongjune Kim, Yoocharn Jeon, Cyril Guyot, Yuval Cassuto:
Optimizing the Write Fidelity of MRAMs. 792-797 - Nastaran Abadi Khooshemehr, Mohammad Ali Maddah-Ali:
Fundamental Limits of Distributed Encoding. 798-803 - Elsa Dupraz, Lav R. Varshney:
Noisy In-Memory Recursive Computation with Memristor Crossbars. 804-809 - Hyeon-Seong Im, Si-Hyeon Lee:
Mobility-Assisted Covert Communication over Wireless Ad Hoc Networks. 810-815 - Kang-Hee Cho, Si-Hyeon Lee:
Treating Interference as Noise is Optimal for Covert Communication over Interference Channels. 816-821 - Diego Lentner, Gerhard Kramer:
Stealth Communication with Vanishing Power over Binary Symmetric Channels. 822-827 - Shi-Yuan Wang, Matthieu R. Bloch:
Covert MIMO Communications under Variational Distance Constraint. 828-833 - Hassan ZivariFard, Matthieu R. Bloch, Aria Nosratinia:
Keyless Covert Communication in the Presence of Channel State Information. 834-839 - Mehrdad Tahmasbi, Matthieu R. Bloch:
Active Covert Sensing. 840-845 - Terry Shue Chien Lau, Chik How Tan:
Rank Preserving Code-based Signature. 846-851 - Yohei Okawa, Hiroki Koga:
An Ideal Secret Sharing Scheme Realizing an Access Structure Based on a Finite Projective Plane of Order 3. 852-857 - Ido Shahaf, Or Ordentlich, Gil Segev:
An Information-Theoretic Proof of the Streaming Switching Lemma for Symmetric Encryption. 858-863 - Deepak Agrawal, Smarajit Das, Srinivasan Krishanaswamy:
Secret sharing schemes based on Nonlinear codes. 864-867 - Yoshinori Ogawa, Shingo Sato, Junji Shikata, Hideki Imai:
Aggregate Message Authentication Codes with Detecting Functionality from Biorthogonal Codes. 868-873 - Onur Günlü, Rafael F. Schaefer, H. Vincent Poor:
Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication. 874-878 - Congduan Li, Jingliang He, Shiqiu Liu, Dongliang Guo, Linqi Song:
On Secrecy Key of a class of Secure Asymmetric Multilevel Diversity Coding System. 879-883 - Bo Guan, Nazanin Takbiri, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Sequence Obfuscation to Thwart Pattern Matching Attacks. 884-889 - Ajaykrishnan Nageswaran, Prakash Narayan:
Distribution Privacy Under Function Recoverability. 890-895 - Shahab Asoodeh, Mario Díaz, Flávio P. Calmon:
Privacy Amplification of Iterative Algorithms via Contraction Coefficients. 896-901 - Fangwei Ye, Hyunghoon Cho, Salim El Rouayheb:
Mechanisms for Hiding Sensitive Genotypes with Information-Theoretic Privacy. 902-907 - Zhuolun Xiang, Bolin Ding, Xi He, Jingren Zhou:
Linear and Range Counting under Metric-based Local Differential Privacy. 908-913 - Antonious M. Girgis, Deepesh Data, Suhas N. Diggavi:
Hiding Identities: Estimation Under Local Differential Privacy. 914-919 - Shahab Asoodeh, Jiachun Liao, Flávio P. Calmon, Oliver Kosut, Lalitha Sankar:
A Better Bound Gives a Hundred Rounds: Enhanced Privacy Guarantees via f-Divergences. 920-925 - Yucheng Liu, Ni Ding, Parastoo Sadeghi, Thierry Rakotoarivelo:
Privacy-Utility Tradeoff in a Guessing Framework Inspired by Index Coding. 926-931 - Giulia Cervia, Tobias J. Oechtering, Mikael Skoglund:
Remote Joint Strong Coordination and Reliable Communication. 932-937 - Carsten Rudolf Janda, Eduard A. Jorswieck, Moritz Wiese, Holger Boche:
Arbitrarily Varying Wiretap Channels with Non-Causal Side Information at the Jammer. 938-943 - Zhou Li, Hua Sun:
Conditional Disclosure of Secrets: A Noise and Signal Alignment Approach. 944-948 - Hao Xu, Giuseppe Caire, Cunhua Pan:
An Achievable Region for the Multiple Access Wiretap Channels with Confidential and Open Messages. 949-954 - Qiaoqiao Zhou, Chung Chan, Raymond W. Yeung:
On the Discussion Rate Region for the PIN Model. 955-959 - Anna Frank:
Delay-Optimal Coding for Secure Transmission over Parallel Burst Erasure Channels with an Eavesdropper. 960-965 - Chung Chan, Navin Kashyap, Praneeth Kumar Vippathalla, Qiaoqiao Zhou:
Secure Information Exchange for Omniscience. 966-971 - Gowtham R. Kurri, Vinod M. Prabhakaran:
Secure Computation to Hide Functions of Inputs. 972-977 - Hongchao Zhou, Abbas El Gamal:
Network Information Theoretic Security. 978-983 - Allison Beemer, Eric Graves, Jörg Kliewer, Oliver Kosut, Paul L. Yu:
Authentication with Mildly Myopic Adversaries. 984-989 - Noha M. Helal, Matthieu R. Bloch, Aria Nosratinia:
Resolvability of the Multiple Access Channel with Two-Sided Cooperation. 990-994 - Yanina Y. Shkel, H. Vincent Poor:
A compression perspective on secrecy measures. 995-1000 - Varun Narayanan, Manoj Mishra, Vinod M. Prabhakaran:
Private Two-Terminal Hypothesis Testing. 1001-1006 - Fatemeh Hosseinigoki, Oliver Kosut:
Capacity Region of the Gaussian Arbitrarily-Varying Broadcast Channel. 1007-1011 - Chao Tian:
On the Storage Cost of Private Information Retrieval. 1012-1017 - Tao Guo, Ruida Zhou, Chao Tian:
On the Information Leakage in Private Information Retrieval Systems. 1018-1023 - Mohammad Nassar, Eitan Yaakobi:
Array Codes for Functional PIR and Batch Codes. 1024-1029 - Yanliang Zhou, Qiwen Wang, Hua Sun, Shengli Fu:
The Minimum Upload Cost of Symmetric Private Information Retrieval. 1030-1034 - Zhusheng Wang, Karim Banawan, Sennur Ulukus:
Private Set Intersection Using Multi-Message Symmetric Private Information Retrieval. 1035-1040 - Xinyu Yao, Nan Liu, Wei Kang:
The Capacity of Private Information Retrieval Under Arbitrary Collusion Patterns. 1041-1046 - Ori Shmuel, Asaf Cohen:
Private Information Retrieval Over Gaussian MAC. 1047-1052 - Hsuan-Yin Lin, Siddhartha Kumar, Eirik Rosnes, Alexandre Graell i Amat, Eitan Yaakobi:
The Capacity of Single-Server Weakly-Private Information Retrieval. 1053-1058 - Matteo Allaix, Lukas Holzbaur, Tefjol Pllaha, Camilla Hollanti:
Quantum Private Information Retrieval from MDS-coded and Colluding Servers. 1059-1064 - Lukas Holzbaur, Camilla Hollanti, Antonia Wachter-Zeh:
Computational Code-Based Single-Server Private Information Retrieval. 1065-1070 - Islam Samy, Mohamed Adel Attia, Ravi Tandon, Loukas Lazos:
Latent-variable Private Information Retrieval. 1071-1076 - Seunghoan Song, Masahito Hayashi:
Capacity of Quantum Private Information Retrieval with Colluding Servers. 1077-1082 - Su Li:
Single-server Multi-message Private Information Retrieval with Side Information: the General Cases. 1083-1088 - Ruida Zhou, Tao Guo, Chao Tian:
Weakly Private Information Retrieval Under the Maximal Leakage Metric. 1089-1094 - Xiang Zhang, Kai Wan, Hua Sun, Mingyue Ji:
Cache-aided Multiuser Private Information Retrieval. 1095-1100 - Yinfei Xu, Daming Cao:
Secret Key Generation From Vector Gaussian Sources With Public and Private Communications. 1101-1105 - Jari Lietzén, Roope Vehkalahti, Olav Tirkkonen:
A Two-way QKD Protocol Outperforming One-way Protocols at Low QBER. 1106-1111 - Anoosheh Heidarzadeh, Alex Sprintson:
Private Computation with Individual and Joint Privacy. 1112-1117 - Behrooz Tahmasebi, Mohammad Ali Maddah-Ali:
Private Function Computation. 1118-1123 - Jaber Kakar, Anton Khristoforov, Seyedhamed Ebadifar, Aydin Sezgin:
Uplink Cost Adjustable Schemes in Secure Distributed Matrix Multiplication. 1124-1129 - Xiaochuan Ma, Lifeng Lai, Shuguang Cui:
Optimal Two-Stage Bayesian Sequential Change Diagnosis. 1130-1135 - Qunzhi Xu, Yajun Mei, George V. Moustakides:
Second-Order Asymptotically Optimal Change-point Detection Algorithm with Sampling Control. 1136-1140 - Anamitra Chaudhuri, Georgios Fellouris:
Sequential Detection and Isolation of a Correlated Pair. 1141-1146 - Taposh Banerjee, Prudhvi Gurram, Gene T. Whipps:
Multislot and Multistream Quickest Change Detection in Statistically Periodic Processes. 1147-1152 - Ruizhi Zhang, Shaofeng Zou:
A Game-Theoretic Approach to Sequential Detection in Adversarial Environments. 1153-1158 - Subhrakanti Dey:
Asymptotics of Quickest Change Detection with an Energy Harvesting Sensor. 1159-1164 - Aristomenis Tsopelakos, Georgios Fellouris:
Sequential anomaly detection with observation control under a generalized error metric. 1165-1170 - Georgios Rovatsos, Venugopal V. Veeravalli, George V. Moustakides:
Quickest Detection of a Dynamic Anomaly in a Heterogeneous Sensor Network. 1171-1176 - Mangqing Guo, Mustafa Cenk Gursoy, Pramod K. Varshney:
Sparse Activity Detection in Cell-Free Massive MIMO systems. 1177-1182 - Alex Dytso, H. Vincent Poor, Shlomo Shamai Shitz:
A General Derivative Identity for the Conditional Mean Estimator in Gaussian Noise and Some Applications. 1183-1188 - Xiangxiang Xu, Weida Wang, Shao-Lun Huang:
On the Sample Complexity of Estimating Small Singular Modes. 1189-1194 - Xiao-Wen Chang, Zhilong Chen, Yingzi Xu:
On the Randomized Babai Point. 1195-1200 - Banghua Zhu, Jiantao Jiao, Jacob Steinhardt:
When does the Tukey Median work? 1201-1206 - Prafulla Chandra, Andrew Thangaraj, Nived Rajaraman:
Missing Mass of Markov Chains. 1207-1212 - Kuan-Yun Lee, Thomas A. Courtade:
Linear Models are Most Favorable among Generalized Linear Models. 1213-1218 - Neri Merhav:
Weak-Noise Modulation-Estimation of Vector Parameters. 1219-1223 - Kenneth Chang, Nathaniel Raymondi, Ashutosh Sabharwal, Suhas N. Diggavi:
"Wireless Paint": Code Design for 3D Orientation Estimation with Backscatter Arrays. 1224-1229 - Osman Emre Dai, Daniel Cullina, Negar Kiyavash:
Achievability of nearly-exact alignment for correlated Gaussian databases. 1230-1235 - Elyas Sabeti, Peter X. K. Song, Alfred O. Hero III:
Pattern-Based Analysis of Time Series: Estimation. 1236-1241 - Aolin Xu, Todd Coleman:
Minimax Lower Bounds for Circular Source Localization. 1242-1247 - Meng-Che Chang, Matthieu R. Bloch:
Evasive Active Hypothesis Testing. 1248-1253 - Xi Zhang, Qixuan ZW, H. Vincent Poor:
Sequential Hypothesis Criterion Based Optimal Caching Schemes Over Mobile Wireless Networks. 1254-1258 - Tomer Berg, Or Ordentlich, Ofer Shayevitz:
Binary Hypothesis Testing with Deterministic Finite-Memory Decision Rules. 1259-1264 - Daewon Seo, Ravi Kiran Raman, Lav R. Varshney:
Social Learning with Beliefs in a Parallel Network. 1265-1270 - Charvi Rastogi, Sivaraman Balakrishnan, Nihar B. Shah, Aarti Singh:
Two-Sample Testing on Pairwise Comparison Data and the Role of Modeling Assumptions. 1271-1276 - Dhruva Kartik, Ashutosh Nayyar, Urbashi Mitra:
Testing for Anomalies: Active Strategies and Non-asymptotic Analysis. 1277-1282 - Sreejith Sreekumar, Deniz Gündüz:
Strong Converse for Testing Against Independence over a Noisy channel. 1283-1288 - Abdellatif Zaidi:
Hypothesis Testing Against Independence Under Gaussian Noise. 1289-1294 - Yonglong Li, Vincent Y. F. Tan:
Second-Order Asymptotics of Sequential Hypothesis Testing. 1295-1300 - Mauricio E. Gonzalez, Jorge F. Silva:
Data-Driven Representations for Testing Independence: A Connection with Mutual Information Estimation. 1301-1306 - Min-Oh Jeong, Alex Dytso, Martina Cardone, H. Vincent Poor:
Recovering Structure of Noisy Data through Hypothesis Testing. 1307-1312 - Jiachun Pan, Yonglong Li, Vincent Y. F. Tan, Yonina C. Eldar:
On the Error Exponent of Approximate Sufficient Statistics for M-ary Hypothesis Testing. 1313-1318 - Saurabh Sihag, Ali Tajer:
Approximate Recovery Of Ising Models with Side Information. 1319-1324 - Guy Bresler, Mina Karzand:
Minimax Prediction in Tree Ising Models. 1325-1330 - Yuwen Huang, Pascal O. Vontobel:
Characterizing the Bethe Partition Function of Double-Edge Factor Graphs via Graph Covers. 1331-1336 - Albert Podusenko, Wouter M. Kouw, Bert de Vries:
Online Variational Message Passing in Hierarchical Autoregressive Models. 1337-1342 - Mansi Sood, Osman Yagan:
k-Connectivity in Random Graphs induced by Pairwise Key Predistribution Schemes. 1343-1348 - Krzysztof Turowski, Jithin K. Sreedharan, Wojciech Szpankowski:
Temporal Ordered Clustering in Dynamic Networks. 1349-1354 - Mohammad Esmaeili, Aria Nosratinia:
Community Detection with Secondary Latent Variables. 1355-1360 - Ian Hogeboom-Burr, Serdar Yüksel:
Comparison of Information Structures for Zero-Sum Games in Standard Borel Spaces. 1361-1366 - Ertan Kazikli, Sinan Gezici, Serdar Yüksel:
Quadratic Privacy-Signaling Games and Payoff Dominant Equilibria. 1367-1372 - Pawan Poojary, Randall Berry:
Observational Learning with Fake Agents. 1373-1378 - Anuj S. Vora, Ankur A. Kulkarni:
Achievable Rates for Strategic Communication. 1379-1384 - Junhan Kim, Byonghyo Shim:
Optimal Restricted Isometry Condition for Exact Sparse Recovery with Orthogonal Least Squares. 1385-1390 - Avishek Ghosh, Kannan Ramchandran:
Some Performance Guarantees of Global LASSO with Local Assumptions for Convolutional Sparse Design Matrices. 1391-1396 - Zhongxing Sun, Wei Cui, Yulong Liu:
Quantized Corrupted Sensing with Random Dithering. 1397-1402 - Takashi Takahashi, Yoshiyuki Kabashima:
Macroscopic Analysis of Vector Approximate Message Passing in a Model Mismatch Setting. 1403-1408 - Jeongmin Chae, Song-Nam Hong:
A Novel B-MAP Proxy for Greedy Sparse Signal Recovery Algorithms. 1409-1413 - Thach V. Bui, Mahdi Cheraghchi, Isao Echizen:
Improved non-adaptive algorithms for threshold group testing with a gap. 1414-1419 - Nelvin Tan, Jonathan Scarlett:
Near-Optimal Sparse Adaptive Group Testing. 1420-1425 - Orhan Ocal, Kannan Ramchandran:
Fast Compressive Large-Scale Matrix-Matrix Multiplication Using Product Codes. 1426-1431 - Kuan Hsieh, Ramji Venkataramanan:
Modulated Sparse Regression Codes. 1432-1437 - Parth K. Thaker, Gautam Dasarathy, Angelia Nedic:
On the Sample Complexity and Optimization Landscape for Quadratic Feasibility Problems. 1438-1443 - Yi Qin, Renaud-Alexandre Pitaval:
Structured Quasi-Gray labelling for Reed-Muller Grassmannian Constellations. 1444-1449 - Thuan Nguyen, Thinh Nguyen:
Structure of Optimal Quantizer for Binary-Input Continuous-Output Channels with Output Constraints. 1450-1455 - Nishant Mehrotra, Ashutosh Sabharwal:
DoF Analysis for Multipath-Assisted Imaging: Single Frequency Illumination. 1456-1461 - P. Charantej Reddy, Aditya Siripuram, Brad Osgood:
Some results on convolution idempotents. 1462-1467 - Antonio Bazco Nogueras, Arash Gholami Davoodi, Paul de Kerret, David Gesbert, Nicolas Gresset, Syed Ali Jafar:
DoF Region of the Decentralized MIMO Broadcast Channel - How many informed antennas do we need? 1468-1473 - Siyao Li, Daniela Tuninetti, Natasha Devroye:
The Fading Gaussian Broadcast Channel with Channel State Information and Output Feedback. 1474-1479 - Aditya Narayan Ravi, Sibi Raj B. Pillai, Vinod M. Prabhakaran, Michèle A. Wigger:
When does Partial Noisy Feedback Enlarge the Capacity of a Gaussian Broadcast Channel? 1480-1485 - Mohamed Salman, Mahesh K. Varanasi:
On the Capacity Region of the Three-Receiver Broadcast Channel With Receiver Message Cognition. 1486-1491 - Amin Gohari, Chandra Nair:
New Outer Bounds for the Two-Receiver Broadcast Channel. 1492-1497 - Mohamed Salman, Mahesh K. Varanasi:
Diamond Message Set Groupcasting: From an Achievable Rate Region for the DM Broadcast Channel to the Capacity of the Combination Network. 1498-1503 - Yuzhou Gu, Hajir Roozbehani, Yury Polyanskiy:
Broadcasting on trees near criticality. 1504-1509 - Mohamed Salman, Mahesh K. Varanasi:
On the Broadcast Channel with Non-Distinct Message Demands and Symmetric Side Information. 1510-1515 - Jinyuan Chen:
Multi-layer Interference Alignment and GDoF of the K-User Asymmetric Interference Channel. 1516-1521 - Max H. M. Costa, Chandra Nair, David Ng, Yan Nan Wang:
On the structure of certain non-convex functionals and the Gaussian Z-interference channel. 1522-1527 - Maha Zohdy, Ali Tajer, Shlomo Shamai Shitz:
Interference Management without CSIT: A Broadcast Approach. 1528-1533 - Milad Johnny, Alireza Vahid:
Embedding Information in Radiation Pattern Fluctuations. 1534-1539 - Chandra Nair, Mehdi Yazdanpanah:
On the AND-OR Interference Channel and the Sandglass Conjecture. 1540-1545 - Min Qiu, Yu-Chih Huang, Jinhong Yuan:
On Discrete Signaling and Treating Interference as Noise for Complex Gaussian Interference Channels. 1546-1551 - Fan Li, Jinyuan Chen:
Secure Communications with Limited Common Randomness at Transmitters. 1552-1557 - Yao-Chia Chan, Syed Ali Jafar:
Secure GDoF of the Z-channel with Finite Precision CSIT: How Robust are Structured Codes? 1558-1563 - Viswanathan Ramachandran, Sibi Raj B. Pillai, Vinod M. Prabhakaran:
Strong Coordination with Side Information. 1564-1569 - Touheed Anwar Atif, Arun Padakandla, S. Sandeep Pradhan:
Source Coding for Synthesizing Correlated Randomness. 1570-1575 - Rumia Sultana, Rémi A. Chou:
Explicit Construction of Multiple Access Channel Resolvability Codes from Source Resolvability Codes. 1576-1580 - Shouvik Ganguly, Lele Wang, Young-Han Kim:
A Functional Construction of Codes for Multiple Access and Broadcast Channels. 1581-1586 - Yihan Zhang, Shashank Vatedka, Sidharth Jaggi:
Quadratically Constrained Two-way Adversarial Channels. 1587-1592 - Sarthak Jain, Soheil Mohajer, Martina Cardone:
On the Fraction of Capacity One Relay can Achieve in Gaussian Half-Duplex Diamond Networks. 1593-1598 - Yahya H. Ezzeldin, Martina Cardone, Christina Fragouli, Giuseppe Caire:
Gaussian 1-2-1 Networks with Imperfect Beamforming. 1599-1604 - Jonathan Ponniah, Liang-Liang Xie:
Multi-Cast Channels with Hierarchical Flow. 1605-1610 - Xiaoshen Song, Giuseppe Caire:
Queue-Aware Beam Scheduling for Half-Duplex mmWave Relay Networks. 1611-1616 - Kai Cai, Guangyue Han:
The Langberg-Médard Multiple Unicast Conjecture: Stable 3-Pair Networks. 1617-1622 - Mohammad Ishtiyaq Qureshi, Satyajit Thakor:
On the Partition Bound for Undirected Unicast Network Information Capacity. 1623-1628 - Shenghao Yang, Jie Wang:
Upper Bound Scalability on Achievable Rates of Batched Codes for Line Networks. 1629-1634 - Xuan Guang, Raymond W. Yeung:
Linear Network Error Correction Coding Revisited. 1635-1640 - Kenneth W. Shum, Hanxu Hou:
Network Coding Based on Byte-wise Circular Shift and Integer Addition. 1641-1645 - Hedongliang Liu, Hengjia Wei, Sven Puchinger, Antonia Wachter-Zeh, Moshe Schwartz:
On the Gap between Scalar and Vector Solutions of Generalized Combination Networks. 1646-1651 - Hoover H. F. Yin, Ka Hei Ng, Xishi Wang, Qi Cao, Lucien K. L. Ng:
On the Memory Requirements of Block Interleaver for Batched Network Codes. 1652-1657 - Arno Schneuwly, Derya Malak, Muriel Médard:
Discrete Water Filling Multi-Path Packet Scheduling. 1658-1663 - Nujoom Sageer Karat, Kodi Lakshmi Vijith Bhargav, B. Sundar Rajan:
On the Optimality of Two Decentralized Coded Caching Schemes With and Without Error Correction. 1664-1669 - Sonu Rathi, Anoop Thomas, Monolina Dutta:
An Optimal Linear Error Correcting Scheme for Shared Caching with Small Cache Sizes. 1670-1674 - Emanuele Parrinello, Petros Elia, Eleftherios Lampiris:
Extending the Optimality Range of Multi-Antenna Coded Caching with Shared Caches. 1675-1680 - Aniruddha Phatak, Mahesh K. Varanasi:
Eliminating Pairing Loss for Coded Caching with Three Erasure-Coded Servers. 1681-1686 - Mohamed Salman, Mahesh K. Varanasi:
An Upper Bound on the Capacity-Memory Tradeoff of Interleavable Discrete Memoryless Broadcast Channels with Uncoded Prefetching. 1687-1692 - Hamdi Joudeh, Eleftherios Lampiris, Petros Elia, Giuseppe Caire:
Fundamental Limits of Wireless Caching Under Mixed Cacheable and Uncacheable Traffic. 1693-1698 - Xiang Zhang, Xianfeng Terry Yang, Mingyue Ji:
A New Design Framework on D2D Coded Caching with Optimal Rate and Less Subpacketizations. 1699-1704 - Kai Wan, Hua Sun, Mingyue Ji, Daniela Tuninetti, Giuseppe Caire:
Novel Converse for Device-to-Device Demand-Private Caching with a Trusted Server. 1705-1710 - Pinar Sen, Michael Gastpar, Young-Han Kim:
Successive Refinement to Caching for Dynamic Requests. 1711-1716 - Kai Wan, Hua Sun, Mingyue Ji, Daniela Tuninetti, Giuseppe Caire:
Cache-Aided Scalar Linear Function Retrieval. 1717-1722 - Anjana Ambika Mahesh, Nujoom Sageer Karat, B. Sundar Rajan:
Min-rank of Embedded Index Coding Problems. 1723-1728 - Tang Liu, Daniela Tuninetti:
Secure Decentralized Pliable Index Coding. 1729-1734 - Lawrence Ong, Badri N. Vellambi:
Secure Network and Index Coding Equivalence: The Last Piece of the Puzzle. 1735-1740 - Subhankar Banerjee, Rajarshi Bhattacharjee, Abhishek Sinha:
Fundamental Limits of Age-of-Information in Stationary and Non-stationary Environments. 1741-1746 - Ali Maatouk, Saad Kriouile, Mohamad Assaad, Anthony Ephremides:
Asymptotically Optimal Scheduling Policy For Minimizing The Age of Information. 1747-1752 - Qian Wang, He Chen, Yonghui Li, Branka Vucetic:
Minimizing Age of Information via Hybrid NOMA/OMA. 1753-1758 - Roy D. Yates, Sanjit K. Kaul:
Age of Information in Uncoordinated Unslotted Updating. 1759-1764 - Mohammad Moltafet, Markus Leinonen, Marian Codreanu:
Average Age of Information for a Multi-Source M/M/1 Queueing Model With Packet Management. 1765-1769 - Xingran Chen, Konstantinos Gatsis, Hamed Hassani, Shirin Saeedi Bidokhti:
Age of Information in Random Access Channels. 1770-1775 - Songtao Feng, Jing Yang:
AoI Minimization in Broadcast Channels with Channel State Information. 1776-1781 - Cho-Hsin Tsai, Chih-Chun Wang:
Age-of-Information Revisited: Two-way Delay and Distribution-oblivious Online Algorithm. 1782-1787 - Omur Ozel:
Timely Status Updating Through Intermittent Sensing and Transmission. 1788-1793 - Baturalp Buyukates, Melih Bastopcu, Sennur Ulukus:
Optimal Selective Encoding for Timely Updates with Empty Symbol. 1794-1799 - Melih Bastopcu, Sennur Ulukus:
Partial Updates: Losing Information for Freshness. 1800-1805 - Amir Behrouzi-Far, Emina Soljanin, Roy D. Yates:
Data Freshness in Leader-Based Replicated Storage. 1806-1811 - Ahmed Arafa, Karim Banawan, Karim G. Seddik, H. Vincent Poor:
Timely Estimation Using Coded Quantized Samples. 1812-1817 - Uzi Pereg:
Communication over Quantum Channels with Parameter Estimation. 1818-1823 - Narayanan Rengaswamy, Kaushik P. Seshadreesan, Saikat Guha, Henry D. Pfister:
Quantum Advantage via Qubit Belief Propagation. 1824-1829 - Marco Fanizza, Matteo Rosati, Michalis Skotiniotis, John Calsamiglia, Vittorio Giovannetti:
Performance of Gaussian encodings for classical communication on correlated quantum phase-noise channels. 1830-1834 - Saikat Guha, Quntao Zhuang, Boulat A. Bash:
Infinite-fold enhancement in communications capacity using pre-shared entanglement. 1835-1839 - Kun Wang, Masahito Hayashi:
Permutation Enhances Classical Communication Assisted by Entangled States. 1840-1845 - Dina Abdelhadi, Joseph M. Renes:
Second-order asymptotics of quantum data compression from partially-smoothed conditional entropy. 1846-1851 - Zahra Baghali Khanian, Andreas J. Winter:
General Mixed State Quantum Data Compression with and without Entanglement Assistance. 1852-1857 - Zahra Baghali Khanian, Andreas J. Winter:
Quantum State Redistribution for Ensemble Sources. 1858-1863 - Eyuri Wakakuwa, Yoshifumi Nakata, Min-Hsiu Hsieh:
One-Shot Trade-Off Bounds for State Redistribution of Classical-Quantum Sources. 1864-1869 - Manabu Hagiwara, Ayumu Nakayama:
A Four-Qubits Code that is a Quantum Deletion Error-Correcting Code with the Optimal Length. 1870-1874 - Yingkai Ouyang, Ching-Yi Lai:
Linear programming bounds for quantum amplitude damping codes. 1875-1879 - Alexei Ashikhmin:
Fidelity of Finite Length Quantum Codes in Qubit Erasure Channel. 1880-1885 - Sangjun Lee, Mehdi Mhalla, Valentin Savin:
Trimming Decoding of Color Codes over the Quantum Erasure Channel. 1886-1890 - Narayanan Rengaswamy, A. Robert Calderbank, Michael Newman, Henry D. Pfister:
Classical Coding Problem from Transversal T Gates. 1891-1896 - Sarah Brandsen, Kevin D. Stubbs, Henry D. Pfister:
Reinforcement Learning with Neural Networks for Quantum Multiple Hypothesis Testing. 1897-1902 - Gilad Gour, Mark M. Wilde:
Entropy of a Quantum Channel: Definition, Properties, and Application. 1903-1908 - Navneeth Ramakrishnan, Raban Iten, Volkher B. Scholz, Mario Berta:
Quantum Blahut-Arimoto Algorithms. 1909-1914 - Mark M. Wilde:
Coherent Quantum Channel Discrimination. 1915-1920 - Xavier Coiteux-Roy, Stefan Wolf:
On the Advantage of Irreversible Processes in Single-System Games. 1921-1926 - Yichen Huang:
2D Local Hamiltonian with Area Laws Is QMA-Complete. 1927-1932 - Sarah Brandsen, Mengke Lian, Kevin D. Stubbs, Narayanan Rengaswamy, Henry D. Pfister:
Adaptive Procedures for Discriminating Between Arbitrary Tensor-Product Quantum States. 1933-1938 - Kun Wang, Xin Wang, Mark M. Wilde:
Quantification of Unextendible Entanglement and Its Applications in Entanglement Distillation. 1939-1943 - Omar Amer, Walter O. Krawec:
Finite Key Analysis of the Extended B92 Protocol. 1944-1948 - Farzin Salek, Andreas J. Winter:
Multi-User Distillation of Common Randomness and Entanglement from Quantum States. 1949-1954 - Janis Nötzel, Stephen Diadamo:
Entanglement-Assisted Data Transmission as an Enabling Technology: A Link-Layer Perspective. 1955-1960 - Holger Boche, Gisbert Janßen, Sajad Saeedinaeeni:
Universal superposition codes: capacity regions of compound quantum broadcast channel with confidential messages. 1961-1966 - Hao-Chung Cheng, Nilanjana Datta, Cambyse Rouzé:
Strong Converse Bounds in Quantum Network Information Theory. 1967-1972 - Yuuya Yoshida, Masahito Hayashi:
Classical Mechanism is Optimal in Classical-Quantum Differentially Private Mechanisms. 1973-1977 - Walter O. Krawec:
A New High-Dimensional Quantum Entropic Uncertainty Relation with Applications. 1978-1983 - Eric P. Hanson, Vishal Katariya, Nilanjana Datta, Mark M. Wilde:
Guesswork with Quantum Side Information: Optimal Strategies and Aspects of Security. 1984-1989 - Holger Boche, Minglai Cai, Moritz Wiese, Christian Deppe, Roberto Ferrara:
Semantic Security for Quantum Wiretap Channels. 1990-1995 - Arkin Tikku, Joseph M. Renes, Mario Berta:
Additivity in Classical-Quantum Wiretap Channels. 1996-2001 - V Arvind Rameshwar, Navin Kashyap:
Computable Lower Bounds for Capacities of Input-Driven Finite-State Channels. 2002-2007 - Holger Boche, Rafael F. Schaefer, H. Vincent Poor:
On the Algorithmic Computability of Achievability and Converse: ϵ-Capacity of Compound Channels and Asymptotic Bounds of Error-Correcting Codes. 2008-2013 - Ziv Aharoni, Dor Tsur, Ziv Goldfeld, Haim H. Permuter:
Capacity of Continuous Channels with Memory via Directed Information Neural Estimator. 2014-2019 - Holger Boche, Christian Deppe:
Computability of the Zero-Error Capacity with Kolmogorov Oracle. 2020-2025 - Anuran Makur:
Bounds on Permutation Channel Capacity. 2026-2031 - Antonino Favano, Marco Ferrari, Maurizio Magarini, Luca Barletta:
Capacity Bounds for Amplitude-Constrained AWGN MIMO Channels with Fading. 2032-2037 - Sourjya Dutta, Abbas Khalili, Elza Erkip, Sundeep Rangan:
Capacity Bounds for Communication Systems with Quantization and Spectral Constraints. 2038-2043 - Heedong Do, Namyoon Lee, Angel Lozano:
Capacity of Line-of-Sight MIMO Channels. 2044-2048 - Yong Jin Daniel Kim, Yi Feng:
Capacity of Multicarrier Faster-than-Nyquist Signaling. 2049-2054 - Song Fang, Quanyan Zhu:
A Connection between Feedback Capacity and Kalman Filter for Colored Gaussian Noises. 2055-2060 - Christian Deppe, Georg Maringer, Vladimir S. Lebedev:
Bounds for the capacity error function for unidirectional channels with noiseless feedback. 2061-2066 - Yonatan Urman, David Burshtein:
Feedback Channel Communication with Low Precision Arithmetic. 2067-2072 - Christos K. Kourtellaris, Charalambos D. Charalambous, Sergey Loyka:
New Formulas of Ergodic Feedback Capacity of AGN Channels Driven by Stable and Unstable Autoregressive Noise. 2073-2078 - Nancy Ronquillo, Tara Javidi:
Measurement Dependent Noisy Search with Stochastic Coefficients. 2079-2084 - Achilleas Anastasopoulos, Sandeep Pradhan:
Decentralized sequential active hypothesis testing and the MAC feedback capacity. 2085-2090 - Christos K. Kourtellaris, Charalambos D. Charalambous, Sergey Loyka:
From Feedback Capacity to Tight Achievable Rates without Feedback for AGN Channels with Stable and Unstable Autoregressive Noise. 2091-2096 - Uzi Pereg, Yossef Steinberg:
The Arbitrarily Varying Channel with Colored Gaussian Noise. 2097-2102 - Amitalok J. Budkuley, Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate, Carol Wang:
Symmetrizability for Myopic AVCs. 2103-2107 - Amir Saberi, Farhad Farokhi, Girish N. Nair:
An Explicit Formula for the Zero-Error Feedback Capacity of a Class of Finite-State Additive Noise Channels. 2108-2113 - Yonglong Li, Vincent Y. F. Tan:
On the Capacity of Deletion Channels with States. 2114-2119 - Eli Shemuel, Oron Sabag, Haim H. Permuter:
Feedback Capacity of Finite-State Channels with Causal State Known at the Encoder. 2120-2125 - Yasutada Oohama:
Strong Converse for the State Dependent Channel. 2126-2130 - Ling-Hua Chang, Po-Ning Chen, Fady Alajaji, Yunghsiang S. Han:
The Asymptotic Generalized Poor-Verdú Bound Achieves the BSC Error Exponent at Zero Rate. 2131-2136 - Sergey Tridenski, Anelia Somekh-Baruch, Ram Zamir:
Proof of Convergence for Correct-Decoding Exponent Computation. 2137-2142 - Marco Bondaschi, Marco Dalai:
Revisiting Zero-Rate Bounds on the Reliability Function of Discrete Memoryless Channels. 2143-2148 - Hao-Chung Cheng, Baris Nakiboglu:
Refined Strong Converse for the Constant Composition Codes. 2149-2154 - Yuta Sakai, Vincent Y. F. Tan:
Variable-Length Source Dispersions Differ under Maximum and Average Error Criteria. 2155-2160 - Hengjie Yang, Richard D. Wesel:
Finite-Blocklength Performance of Sequential Transmission over BSC with Noiseless Feedback. 2161-2166 - Lin Zhou, Alfred O. Hero III:
Resolution Limits of Non-Adaptive Querying for Noisy 20 Questions Estimation. 2167-2172 - Amaael Antonini, Hengjie Yang, Richard D. Wesel:
Low Complexity Algorithms for Transmission of Short Blocks over the BSC with Full Feedback. 2173-2178 - Lampros Gavalakis, Ioannis Kontoyiannis:
Lossless Data Compression with Side Information: Nonasymptotics and Dispersion. 2179-2183 - Neri Merhav:
Noisy Guesses. 2184-2188 - Robert Graczyk, Amos Lapidoth:
Gray-Wyner and Slepian-Wolf Guessing. 2189-2193 - Suayb S. Arslan, Elif Haytaoglu:
Cost of Guessing: Applications to Data Repair. 2194-2198 - Yanjun Han:
Constrained Functional Value under General Convexity Conditions with Applications to Distributed Simulation. 2199-2204 - Leighton Pate Barnes, Ayfer Özgür:
The Courtade-Kumar Most Informative Boolean Function Conjecture and a Symmetrized Li-Médard Conjecture are Equivalent. 2205-2209 - Yikun Bai, Xiugang Wu, Ayfer Özgür:
Information Constrained Optimal Transport: From Talagrand, to Marton, to Cover. 2210-2215 - Wei Cao, Alex Dytso, Michael Fauß, H. Vincent Poor, Gang Feng:
On Nonparametric Estimation of the Fisher Information. 2216-2221 - Benjamin Wu, Aaron B. Wagner, G. Edward Suh, Ibrahim Issa:
Strong Asymptotic Composition Theorems for Sibson Mutual Information. 2222-2227 - Baran Tan Bacinoglu, Yin Sun, Elif Uysal:
On the Trackability of Stochastic Processes Based on Causal Information. 2228-2233 - Salman Salamatian, Asaf Cohen, Muriel Médard:
Approximate Gács-Körner Common Information. 2234-2239 - Mohammad-Amin Charusaie, Stefano Rini, Arash Amini:
On the Compressibility of Affinely Singular Random Vectors. 2240-2245 - Aolin Xu:
Continuity of Generalized Entropy. 2246-2251 - Shao-Lun Huang, Xiangxiang Xu, Lizhong Zheng, Gregory W. Wornell:
A Local Characterization for Wyner Common Information. 2252-2257 - Matthieu Fradelizi, Jiange Li, Mokshay Madiman:
Usable deviation bounds for the information content of convex measures. 2258-2263 - Maciej Obremski, Maciej Skorski:
Complexity of Estimating Rényi Entropy of Markov Chains. 2264-2269 - Mohammad A. Alhejji, Graeme Smith:
A Tight Uniform Continuity Bound for Equivocation. 2270-2274 - Valérie Girardin, Philippe Regnault:
Rényi Divergence rates of Ergodic Markov Chains: existence, explicit expressions and properties. 2275-2279 - Yuta Sakai, Vincent Y. F. Tan:
On the Second- and Third-Order Asymptotics of Smooth Rényi Entropy and Their Applications. 2280-2285 - Ryo Nomura, Hideki Yagi:
Optimum Source Resolvability Rate with Respect to f-Divergences Using the Smooth Rényi Entropy. 2286-2291 - James Melbourne, Tomasz Tkocz:
On the Rényi Entropy of Log-Concave Sequences. 2292-2296 - Christoph Hirche:
Rényi Bounds on Information Combining. 2297-2302 - Joachim Breitner, Maciej Skorski:
Explicit Renyi Entropy for Hidden Markov Models. 2303-2308 - Youssef Jaffal, Ibrahim C. Abou-Faycal:
Lossy coding of a time-limited piece of a band-limited white Gaussian source. 2309-2313 - Chao Qi, Tobias Koch:
A High-SNR Normal Approximation for MIMO Rayleigh Block-Fading Channels. 2314-2319 - Ravi Kiran Raman, Lav R. Varshney:
Registration of Finite Resolution Images: a Second-order Analysis. 2320-2325 - Deekshith P. K., Vinod Sharma:
Second-Order Achievable Rates for a Block Fading Gaussian Multiple Access Channel. 2326-2331 - Shun Watanabe, Te Sun Han:
Isomorphism Problem Revisited: Information Spectrum Approach. 2332-2336 - Qinghua Devon Ding, Sidharth Jaggi, Shashank Vatedka, Yihan Zhang:
Empirical Properties of Good Channel Codes. 2337-2342 - Neri Merhav, Igal Sason:
Exact Expressions in Source and Channel Coding Problems Using Integral Representations. 2343-2348 - Payam Delgosha, Venkat Anantharam:
A Universal Low Complexity Compression Algorithm for Sparse Marked Graphs. 2349-2354 - Ryusei Fujita, Ken-ichi Iwata, Hirosuke Yamamoto:
On a Redundancy of AIFV-m Codes for m =3, 5. 2355-2359 - Hirosuke Yamamoto, Koki Imaeda, Kengo Hashimoto, Ken-ichi Iwata:
A Universal Data Compression Scheme based on the AIVF Coding Techniques. 2360-2364 - Ferdinando Cicalese, Eros Rossi:
On D-ary Fano Codes. 2365-2370 - Shashank Vatedka, Venkat Chandar, Aslan Tchamkerten:
O (log log n) Worst-Case Local Decoding and Update Efficiency for Data Compression. 2371-2376 - Hao Lou, Farzad Farnoud:
Data Deduplication with Random Substitutions. 2377-2382 - Christoph Hirche, Andreas J. Winter:
An Alphabet-Size Bound for the Information Bottleneck Function. 2383-2388 - Nir Elkayam, Meir Feder:
One shot approach to lossy source coding under average distortion constraints. 2389-2393 - Cheuk Ting Li:
Asymptotically Scale-invariant Multi-resolution Quantization. 2394-2398 - Kazuho Watanabe:
Discrete Optimal Reconstruction Distributions for Itakura-Saito Distortion Measure. 2399-2404 - Shraga I. Bross:
Scalable Source Coding With Causal Side Information and a Causal Helper. 2405-2409 - Emrah Akyol, Urbashi Mitra, Ertem Tuncel, Kenneth Rose:
Improved Achievable Regions in Networked Scalable Coding Problems. 2410-2415 - Chandra Nair, Yan Nan Wang:
On optimal weighted-sum rates for the modulo sum problem. 2416-2420 - Pierre Escamilla, Abdellatif Zaidi, Michèle A. Wigger:
Some Results on the Vector Gaussian Hypothesis Testing Problem. 2421-2425 - Sourya Basu, Daewon Seo, Lav R. Varshney:
Hypergraph-based Coding Schemes for Two Source Coding Problems under Maximal Distortion. 2426-2431 - Omer Bilgen, Aaron B. Wagner:
Gaussian Multiterminal Source-Coding with Markovity: An Efficiently-Computable Outer Bound. 2432-2437 - Victoria Kostina, Babak Hassibi:
Fundamental limits of distributed tracking. 2438-2443 - Charalambos D. Charalambous, Jan H. van Schuppen:
Characterization of Conditional Independence and Weak Realizations of Multivariate Gaussian Random Variables: Applications to Networks. 2444-2449 - Ahmed Elshafiy, Mahmoud Namazi, Kenneth Rose:
On Effective Stochastic Mechanisms for On-The-Fly Codebook Regeneration. 2450-2455 - Nian Guo, Victoria Kostina:
Optimal Causal Rate-Constrained Sampling for a Class of Continuous Markov Processes. 2456-2461 - Rooji Jinan, Parimal Parag, Himanshu Tyagi:
Tracking an Auto-Regressive Process with Limited Communication. 2462-2467 - Jian-Jia Weng, Fady Alajaji, Tamás Linder:
Adaptive Coding for Two-Way Lossy Source-Channel Communication. 2468-2473 - Mohammadamin Baniasadi, Ertem Tuncel:
Robust Gaussian Joint Source-Channel Coding Under the Near-Zero Bandwidth Regime. 2474-2479 - Qiaosheng Eric Zhang, Vincent Y. F. Tan, Changho Suh:
Achievability Bounds for Community Detection and Matrix Completion with Two-Sided Graph Side-Information. 2480-2485 - Adarsh Bank, Jean Honorio:
Provable Efficient Skeleton Learning of Encodable Discrete Bayes Nets in Poly-Time and Sample Complexity. 2486-2491 - Kasper Green Larsen, Michael Mitzenmacher, Charalampos E. Tsourakakis:
Optimal Learning of Joint Alignments with a Faulty Oracle. 2492-2497 - Heasung Kim, Taehyun Cho, Jungwoo Lee, Wonjae Shin, H. Vincent Poor:
An Efficient Neural Network Architecture for Rate Maximization in Energy Harvesting Downlink Channels. 2498-2503 - Patrick Murer, Hans-Andrea Loeliger:
Online Memorization of Random Firing Sequences by a Recurrent Neural Network. 2504-2509 - Shota Saito, Toshiyasu Matsushima:
Evaluation of Error Probability of Classification Based on the Analysis of the Bayes Code. 2510-2514 - Hossein Taheri, Ramtin Pedarsani, Christos Thrampoulidis:
Optimality of Least-squares for Classification in Gaussian-Mixture Models. 2515-2520 - Jaewoong Cho, Gyeongjo Hwang, Changho Suh:
A Fair Classifier Using Mutual Information. 2521-2526 - Ganesh Ramachandra Kini, Christos Thrampoulidis:
Analytic Study of Double Descent in Binary Classification: The Impact of Loss. 2527-2532 - Hung-Wei Hsu, I-Hsiang Wang:
On Binary Statistical Classification from Mismatched Empirically Observed Statistics. 2533-2538 - Avishek Ghosh, Raj Kumar Maity, Arya Mazumdar, Kannan Ramchandran:
Communication Efficient Distributed Approximate Newton Method. 2539-2544 - Avishek Ghosh, Raj Kumar Maity, Swanand Kadhe, Arya Mazumdar, Kannan Ramchandran:
Communication Efficient and Byzantine Tolerant Distributed Learning. 2545-2550 - Daesung Kim, Hye Won Chung:
Crowdsourced Classification with XOR Queries: An Algorithm with Optimal Sample Complexity. 2551-2555 - Venkata Gandikota, Arya Mazumdar, Ankit Singh Rawat:
Reliable Distributed Clustering with Redundant Data Assignment. 2556-2561 - Puning Zhao, Lifeng Lai:
Analysis of K Nearest Neighbor KL Divergence Estimation for Continuous Distributions. 2562-2567 - Changlong Wu, Narayana Santhanam:
Entropy property testing with finitely many errors. 2568-2573 - Sudeep Kamath, Alon Orlitsky, Venkatadheeraj Pichapati, Ehsan Zobeidi:
On Learning Parametric Non-Smooth Continuous Distributions. 2574-2579 - Md Mahmudul Hasan, Shuangqing Wei, Ali Moharrer:
Latent Factor Analysis of Gaussian Distributions under Graphical Constraints. 2580-2585 - Nir Weinberger:
Learning Additive Noise Channels: Generalization Bounds and Algorithms. 2586-2591 - Tan Li, Linqi Song, Christina Fragouli:
Federated Recommendation System via Differential Privacy. 2592-2597 - Mohammad Mohammadi Amiri, Deniz Gündüz, Sanjeev R. Kulkarni, H. Vincent Poor:
Update Aware Device Scheduling for Federated Learning at the Wireless Edge. 2598-2603 - Mohamed Seif, Ravi Tandon, Ming Li:
Wireless Federated Learning with Local Differential Privacy. 2604-2609 - Nir Shlezinger, Stefano Rini, Yonina C. Eldar:
The Communication-Aware Clustered Federated Learning Problem. 2610-2615 - Saurav Prakash, Amirhossein Reisizadeh, Ramtin Pedarsani, Amir Salman Avestimehr:
Hierarchical Coded Gradient Aggregation for Learning at the Edge. 2616-2621 - Neophytos Charalambides, Hessam Mahdavifar, Alfred O. Hero III:
Numerically Stable Binary Gradient Coding. 2622-2627 - Deepesh Data, Suhas N. Diggavi:
On Byzantine-Resilient High-Dimensional Stochastic Gradient Descent. 2628-2633 - Swanand Kadhe, Onur Ozan Koyluoglu, Kannan Ramchandran:
Communication-Efficient Gradient Coding for Straggler Mitigation in Distributed Learning. 2634-2639 - Ziv Goldfeld, Kengo Kato:
Limit Distributions for Smooth Total Variation and χ2-Divergence in High Dimensions. 2640-2645 - Clément Luneau, Nicolas Macris, Jean Barbier:
High-dimensional rank-one nonsymmetric matrix decomposition: the spherical case. 2646-2651 - Adel Javanmard, Hamid Nazerzadeh, Simeng Shao:
Multi-Product Dynamic Pricing in High-Dimensions with Heterogeneous Price Sensitivity. 2652-2657 - Prathamesh Mayekar, Himanshu Tyagi:
Limits on Gradient Compression for Stochastic Optimization. 2658-2663 - Abram Magner, Mayank Baranwal, Alfred O. Hero III:
The Power of Graph Convolutional Networks to Distinguish Random Graph Models. 2664-2669 - Collin Cademartori, Cynthia Rush:
Exponentially Fast Concentration of Vector Approximate Message Passing to its State Evolution. 2670-2675 - Ismail Senöz, Bert de Vries:
Online Message Passing-based Inference in the Hierarchical Gaussian Filter. 2676-2681 - Nir Shlezinger, Nariman Farsad, Yonina C. Eldar, Andrea J. Goldsmith:
Data-Driven Factor Graphs for Deep Symbol Detection. 2682-2687 - Netanel Raviv, Siddharth Jain, Pulakesh Upadhyaya, Jehoshua Bruck, Anxiao Andrew Jiang:
CodNN - Robust Neural Networks From Coded Classification. 2688-2693 - Kunping Huang, Paul H. Siegel, Anxiao Andrew Jiang:
Functional Error Correction for Reliable Neural Networks. 2694-2699 - Tyler Sypherd, Mario Díaz, Lalitha Sankar, Gautam Dasarathy:
On the α-loss Landscape in the Logistic Model. 2700-2705 - Avishek Ghosh, Ashwin Pananjady, Aditya Guntuboyina, Kannan Ramchandran:
Max-affine regression with universal parameter estimation for small-ball designs. 2706-2710 - Wael Alghamdi, Shahab Asoodeh, Hao Wang, Flávio P. Calmon, Dennis Wei, Karthikeyan Natesan Ramamurthy:
Model Projection: Theory and Applications to Fair Machine Learning. 2711-2716 - Anuran Makur, Gregory W. Wornell, Lizhong Zheng:
On Estimation of Modal Decompositions. 2717-2722 - Amedeo Roberto Esposito, Michael Gastpar, Ibrahim Issa:
Robust Generalization via f-Mutual Information. 2723-2728 - Ali Lotfi-Rezaabad, Sriram Vishwanath:
Learning Representations by Maximizing Mutual Information in Variational Autoencoders. 2729-2734 - Toshiaki Koike-Akino, Ye Wang:
Stochastic Bottleneck: Rateless Auto-Encoder for Flexible Dimensionality Reduction. 2735-2740 - Fredrik Hellström, Giuseppe Durisi:
Generalization Error Bounds via mth Central Moments of the Information Density. 2741-2746 - Shiyu Liu, Mehul Motani:
Exploring Unique Relevance for Mutual Information based Feature Selection. 2747-2752 - Azadeh Khaleghi, Daniil Ryabko:
Clustering piecewise stationary processes. 2753-2758 - Wenjing Chen, Ruida Zhou, Chao Tian, Cong Shen:
On Top-k Selection from m-wise Partial Rankings via Borda Counting. 2759-2764 - Elisabetta Cornacchia, Neta Singer, Emmanuel Abbe:
Polarization in Attraction-Repulsion Models. 2765-2770 - Jean Barbier, Galen Reeves:
Information-theoretic limits of a multiview low-rank symmetric spiked matrix model. 2771-2776 - Vrettos Moulos:
A Hoeffding Inequality for Finite State Markov Chains and its Applications to Markovian Bandits. 2777-2782 - Cem Kalkanli, Ayfer Özgür:
An Improved Regret Bound for Thompson Sampling in the Gaussian Linear Bandit Setting. 2783-2788 - Salman Habib, Allison Beemer, Jörg Kliewer:
Learned Scheduling of LDPC Decoders Based on Multi-armed Bandits. 2789-2794 - P. N. Karthik, Rajesh Sundaresan:
Detecting an Odd Restless Markov Arm with a Trembling Hand. 2795-2800 - Shubhanshu Shekhar, Mohammad Ghavamzadeh, Tara Javidi:
Active Learning for Classification with Abstention. 2801-2806 - Vahid Jamali, Antonia M. Tulino, Jaime Llorca, Elza Erkip:
Rényi Entropy Bounds on the Active Learning Cost-Performance Tradeoff. 2807-2812 - Sajjad Bahrami, Ertem Tuncel:
An Efficient Running Quantile Estimation Technique alongside Correntropy for Outlier Rejection in Online Regression. 2813-2818 - Xuetong Wu, Jonathan H. Manton, Uwe Aickelin, Jingge Zhu:
Information-theoretic analysis for transfer learning. 2819-2824 - Netanel Raviv, Siddharth Jain, Jehoshua Bruck:
What is the Value of Data? on Mathematical Methods for Data Quality Estimation. 2825-2830 - Zhengrui Li, Sian-Jheng Lin, Yunghsiang S. Han:
On the Exact Lower Bounds of Encoding Circuit Sizes of Hamming Codes and Hadamard Codes. 2831-2836 - David Gamarnik, Eren C. Kizildag:
Computing the Partition Function of the Sherrington-Kirkpatrick Model is Hard on Average. 2837-2842 - Saeid Sahraei, Mohammad Ali Maddah-Ali, Salman Avestimehr:
Interactive Verifiable Polynomial Evaluation. 2843-2848 - Vignesh Subramanian, Moses Won, Gireeja Ranade:
Learning a Neural-Network Controller for a Multiplicative Observation Noise System. 2849-2854 - Oron Sabag, Victoria Kostina, Babak Hassibi:
Stabilizing Dynamical Systems with Fixed-Rate Feedback using Constrained Quantizers. 2855-2860 - Ghassen Zafzouf, Girish N. Nair:
Distributed State Estimation with Bounded Errors over Multiple Access Channels. 2861-2866 - Charalambos D. Charalambous, Themistoklis Charalambous, Christos K. Kourtellaris, Jan H. van Schuppen:
Structural Properties of Nonanticipatory Epsilon Entropy of Multivariate Gaussian Sources. 2867-2872 - Mark Sinzger, Maximilian Gehri, Heinz Koeppl:
Poisson channel with binary Markov input and average sojourn time constraint. 2873-2878 - Praveen Venkatesh, Sanghamitra Dutta, Pulkit Grover:
How else can we define Information Flow in Neural Circuits? 2879-2884 - Andreas Lenz, Yi Liu, Cyrus Rashtchian, Paul H. Siegel, Antonia Wachter-Zeh, Eitan Yaakobi:
Coding for Efficient DNA Synthesis. 2885-2890 - Anshoo Tandon, Vincent Y. F. Tan, Lav R. Varshney:
Bee-Identification Error Exponent with Absentee Bees. 2891-2896 - Yeow Meng Chee, Johan Chrisnata, Tuvi Etzion, Han Mao Kiah:
Efficient Algorithm for the Linear Complexity of Sequences and Some Related Consequences. 2897-2902 - Nikita Polyanskii, Ilya Vorobyev:
Duplication with transposition distance to the root for q-ary strings. 2903-2908 - Ming Li, Yupeng Jiang, Dongdai Lin:
The Numbers of De Bruijn Sequences in Extremal Weight Classes. 2909-2914 - Minghui Yang, Lulu Zhang, Keqin Feng:
On the 2-Adic Complexity of A Class of Binary Sequences of Period 4p with Optimal Autocorrelation Magnitude. 2915-2920 - Dan Zhang, Tor Helleseth:
New Optimal Sets of Perfect Polyphase Sequences Based on Circular Florentine Arrays. 2921-2925 - Zilong Liu, Ping Yang, Yong Liang Guan, Pei Xiao:
Cross Z-Complementary Pairs (CZCPs) for Optimal Training in Broadband Spatial Modulation Systems. 2926-2930 - Cheng-Yu Pai, Chao-Yu Chen:
Constructions of Two-Dimensional Golay Complementary Array Pairs Based on Generalized Boolean Functions*. 2931-2935 - Hamdi Joudeh, Giuseppe Caire:
Optimality of Treating Inter-Cell Interference as Noise Under Finite Precision CSIT. 2936-2941 - Roya Gholami, Laura Cottatellucci, Dirk T. M. Slock:
Channel Models, Favorable Propagation and MultiStage Linear Detection in Cell-Free Massive MIMO. 2942-2947 - Guido Carlo Ferrante:
Approaching Capacity Without Pilots via Nonlinear Processing at the Edge. 2948-2952 - Abbas Khalili, Shahram Shahsavari, Mohammad Ali Amir Khojastepour, Elza Erkip:
On Optimal Multi-user Beam Alignment in Millimeter Wave Wireless Systems. 2953-2958 - Grace Villacrés, Tobias Koch, Gonzalo Vazquez-Vilar:
Bursty Wireless Networks of Bounded Capacity. 2959-2964 - Roy Karasik, Osvaldo Simeone, Marco Di Renzo, Shlomo Shamai Shitz:
Beyond Max-SNR: Joint Encoding for Reconfigurable Intelligent Surfaces. 2965-2970 - Qurrat-Ul-Ain Nadeem, Anas Chaaban, Mérouane Debbah:
Reconfigurable Surface Assisted Multi-User Opportunistic Beamforming. 2971-2976 - Shuowen Zhang, Rui Zhang:
On the Capacity of Intelligent Reflecting Surface Aided MIMO Communication. 2977-2982 - Hang Liu, Xiaojun Yuan, Ying-Jun Angela Zhang:
Message-Passing Based Channel Estimation for Reconfigurable Intelligent Surface Assisted MIMO. 2983-2988 - Justin Singh Kang, Wei Yu:
Minimum Feedback for Collision-Free Scheduling in Massive Random Access. 2989-2994 - Vamsi K. Amalladinne, Asit Kumar Pradhan, Cynthia Rush, Jean-François Chamberland, Krishna R. Narayanan:
On Approximate Message Passing for Unsourced Access with Coded Compressed Sensing. 2995-3000 - Alexander Fengler, Peter Jung, Giuseppe Caire:
Unsourced Multiuser Sparse Regression Codes achieve the Symmetric MAC Capacity. 3001-3006 - Tugcan Aktas, Pinar Sen:
Interleaved Block Coding for Achieving Gaussian Random Access Channel Capacity. 3007-3012 - Recep Can Yavas, Victoria Kostina, Michelle Effros:
Gaussian Multiple and Random Access in the Finite Blocklength Regime. 3013-3018 - Kirill V. Andreev, Evgeny Marshakov, Alexey A. Frolov:
A Polar Code Based TIN-SIC Scheme for the Unsourced Random Access in the Quasi-Static Fading MAC. 3019-3024 - Jithin Ravi, Tobias Koch:
Capacity per Unit-Energy of Gaussian Random Many-Access Channels. 3025-3030 - Sang-Woon Jeon, Hu Jin:
Online Estimation and Adaptation for Random Access with Successive Interference Cancellation. 3031-3036 - Sergey Loyka:
On The Capacity of Gaussian MIMO Channels Under Interference Constraints. 3037-3042 - Benjamin M. Zaidel, Ori Shental, Shlomo Shamai Shitz:
Bounding the Achievable Region of Sparse NOMA. 3043-3048 - Hossein Asgharimoghaddam, Antti Tölli:
Resource Allocation in Low Density Spreading Uplink NOMA via Asymptotic Analysis. 3049-3054 - Mohannad Shehadeh, Frank R. Kschischang:
Rate-Diversity Optimal Multiblock Space-Time Codes via Sum-Rank Codes. 3055-3060 - Nima Tavangaran, Mojtaba Vaezi, H. Vincent Poor:
On MIMO Gaussian Wiretap Channels with Optimal Energy Harvesting. 3061-3066 - Ioannis Krikidis:
Information-Energy Capacity Region for SWIPT Systems with Power Amplifier Nonlinearity. 3067-3072
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.