default search action
ISIT 2019: Paris, France
- IEEE International Symposium on Information Theory, ISIT 2019, Paris, France, July 7-12, 2019. IEEE 2019, ISBN 978-1-5386-9291-2
- Kristoffer Stern, Anders E. Kalør, Beatriz Soret, Petar Popovski:
Massive Random Access with Common Alarm Messages. 1-5 - Justin Khim, Varun S. Jog, Po-Ling Loh:
Adversarial Influence Maximization. 1-5 - Ahmed A. Zewail, Aylin Yener:
Untrusted Caches in Two-layer Networks. 1-5 - Jaume Riba, Ferran De Cabrera:
A Proof of de Bruijn Identity based on Generalized Price's Theorem. 1-5 - Satyajit Thakor, Mohammad Ishtiyaq Qureshi:
Undirected Unicast Network Capacity: A Partition Bound. 1-5 - Chih-Hua Chang, Chih-Chun Wang:
Coded Caching with Heterogeneous File Demand Sets - The Insufficiency of Selfish Coded Caching. 1-5 - Haewon Jeong, Yaoqing Yang, Pulkit Grover:
Systematic Matrix Multiplication Codes. 1-5 - Chih-Hua Chang, Chih-Chun Wang:
Coded Caching with Full Heterogeneity: Exact Capacity of The Two-User/Two-File Case. 6-10 - Hadi Reisizadeh, Mohammad Ali Maddah-Ali, Soheil Mohajer:
Cache-Aided Two-User Broadcast Channels with State Information at Receivers. 16-20 - Kirill Ivanov, Rüdiger L. Urbanke:
Permutation-based Decoding of Reed-Muller Codes in Binary Erasure Channel. 21-25 - Mikhail Kamenev, Yulia Kameneva, Oleg Kurmaev, Alexey Maevskiy:
A New Permutation Decoding Method for Reed-Muller Codes. 26-30 - Myna Vajha, V. S. Chaitanya Mukka, P. Vijay Kumar:
Backtracking and Look-Ahead Decoding Algorithms for Improved Successive Cancellation Decoding Performance of Polar Codes. 31-35 - Alex Dytso, Martina Cardone, Mishfad S. Veedu, H. Vincent Poor:
On Estimation under Noisy Order Statistics. 36-40 - Devavrat Shah, Christina Lee Yu:
Iterative Collaborative Filtering for Sparse Noisy Tensor Estimation. 41-45 - Nived Rajaraman, Prafulla Chandra, Andrew Thangaraj, Ananda Theertha Suresh:
Convergence of Chao Unseen Species Estimator. 46-50 - Zsolt Talata:
Context Block Estimation for Random Fields. 51-55 - Irina E. Bocharova, Boris D. Kudryashov, Vitaly Skachek:
AVN-based Elimination of Short Cycles in Tanner Graphs of QC LDPC Codes. 56-60 - Juane Li, Keke Liu, Shu Lin, Khaled A. S. Abdel-Ghaffar:
Construction of Partial Geometries and LDPC codes based on Reed-Solomon Codes. 61-65 - Ryoichiro Yoshida, Kenta Kasai:
Linear Permutation Polynomial Codes. 66-70 - Xin Xiao, Bane Vasic, Shu Lin, Khaled A. S. Abdel-Ghaffar, William E. Ryan:
Quasi-Cyclic LDPC Codes for Correcting Multiple Phased Bursts of Erasures. 71-75 - Peng Fei, Zhiying Wang:
LDPC Codes for Portable DNA Storage. 76-80 - Tal Shinkar, Eitan Yaakobi, Andreas Lenz, Antonia Wachter-Zeh:
Clustering-Correcting Codes. 81-85 - Wentu Song, Kui Cai, Kees A. Schouhamer Immink:
Sequence-Subset Distance and Coding for Error Control for DNA-based Data Storage. 86-90 - Yeow Meng Chee, Han Mao Kiah, Hengjia Wei:
Efficient and Explicit Balanced Primer Codes. 91-95 - Huseyin A. Inan, Surin Ahn, Peter Kairouz, Ayfer Özgür:
A Group Testing Approach to Random Access for Short-Packet Communication. 96-100 - Ilya Vorobyev:
A New Algorithm for Two-Stage Group Testing. 101-105 - Mohammad Fereydounian, Xingran Chen, Hamed Hassani, Shirin Saeedi Bidokhti:
Non-asymptotic Coded Slotted ALOHA. 111-115 - Ali Zibaeenejad, Jun Chen:
The Optimal Power Control Policy for an Energy Harvesting System with Look-Ahead: Bernoulli Energy Arrivals. 116-120 - Chang-Sik Choi, François Baccelli, Gustavo de Veciana:
Analysis of Data Harvesting by Unmanned Aerial Vehicles. 121-125 - Daewon Seo, Lav R. Varshney:
Information and Energy Transmission with Experimentally-Sampled Harvesting Functions. 126-130 - Jihad Fahs, Aslan Tchamkerten, Mansoor I. Yousefi:
On the Optimal Input of the Nondispersive Optical Fiber. 131-135 - Morteza Soltani, Zouheir Rezki:
Discrete-Time Poisson Optical Wiretap Channel with Peak Intensity Constraint. 136-140 - Reza Rafie Borujeny, Frank R. Kschischang:
A Variational Signal-Space Distance Measure for Nondispersive Optical Fiber. 141-145 - Siu-Wai Ho:
The Interplay Between Block Design and Channel Estimation in VLC Systems. 146-150 - Keigo Takeuchi:
A Unified Framework of State Evolution for Message-Passing Algorithms. 151-155 - Mahdi Cheraghchi, João Ribeiro:
Simple Codes and Sparse Recovery with Fast Decoding. 156-160 - Mengke Lian, Fabrizio Carpi, Christian Häger, Henry D. Pfister:
Learned Belief-Propagation Decoding with Simple Scaling and SNR Adaptation. 161-165 - Serdar Sahin, Antonio Maria Cipriano, Charly Poulliat, Marie-Laure Boucheret:
Evolution Analysis of Iterative BICM Receivers with Expectation Propagation over ISI Channels. 166-170 - Ali Gholami, Mohammad Ali Maddah-Ali, Seyed Abolfazl Motahari:
Private Shotgun DNA Sequencing. 171-175 - Praveen Venkatesh, Sanghamitra Dutta, Pulkit Grover:
How should we define Information Flow in Neural Circuits? 176-180 - Sundara Rajan Srinivasavaradhan, Michelle Du, Suhas N. Diggavi, Christina Fragouli:
Symbolwise MAP for Multiple Deletion Channels. 181-185 - Gabriel Schamberg, Todd P. Coleman:
On the Bias of Directed Information Estimators. 186-190 - Fei Wei, Michael Langberg, Michelle Effros:
A Local Perspective on the Edge Removal Problem. 191-195 - Xuan Guang, Raymond W. Yeung:
Local-Encoding-Preserving Secure Network Coding for Fixed Dimension. 201-205 - Yirui Liu, John MacLaren Walsh:
On the Complexity of Computing the Shannon Outer Bound to a Network Coding Capacity Region. 206-210 - Michelle Kleckler, Soheil Mohajer:
Secure Determinant Codes: A Class of Secure Exact-Repair Regenerating Codes. 211-215 - Hanxu Hou, Yunghsiang S. Han, Patrick P. C. Lee, Qingfeng Zhou:
New Regenerating Codes over Binary Cyclic Codes. 216-220 - Nitish Mital, Katina Kralevska, Cong Ling, Deniz Gündüz:
Practical Functional Regenerating Codes for Broadcast Repair of Multiple Nodes. 221-225 - Zitan Chen, Alexander Barg:
Explicit constructions of MSR codes for the rack-aware storage model. 226-230 - Lin Zhou, Vincent Y. F. Tan, Mehul Motani:
Second-Order Asymptotically Optimal Statistical Classification. 231-235 - Matthew Aldridge:
Rates of Adaptive Group Testing in the Linear Regime. 236-240 - Peter Harremoës:
The Rate Distortion Test of Normality. 241-245 - Yu Xiang:
Distributed False Discovery Rate Control with Quantization. 246-249 - Dawei Ding, Yihui Quek, Peter W. Shor, Mark M. Wilde:
Entropy Bound for the Classical Capacity of a Quantum Channel Assisted by Classical Feedback. 250-254 - Haobo Li, Ning Cai:
A Blahut-Arimoto Type Algorithm for Computing Classical-Quantum Channel Capacity. 255-259 - Mario Berta, Francesco Borderi, Omar Fawzi, Volkher B. Scholz:
Quantum Coding via Semidefinite Programming. 260-264 - Michael X. Cao, Pascal O. Vontobel:
Optimizing Bounds on the Classical Information Rate of Quantum Channels with Memory. 265-269 - Mari Kobayashi, Hassan Hamad, Gerhard Kramer, Giuseppe Caire:
Joint State Sensing and Communication over Memoryless Multiple Access Channels. 270-274 - Michael Dikshtein, Anelia Somekh-Baruch, Shlomo Shamai Shitz:
Broadcasting Information subject to State Masking over a MIMO State Dependent Gaussian Channel. 275-279 - Viswanathan Ramachandran, Sibi Raj B. Pillai, Vinod M. Prabhakaran:
Message and State Communication over Channels with Action Dependent States. 280-284 - Yinfei Xu, Jian Lu, Guojun Chen:
Constrained Communication Over the Gaussian Dirty Paper Channel. 285-289 - Ehsan Asadi Kangarshahi, Albert Guillén i Fàbregas:
An Upper Bound to the Mismatch Capacity. 287-2877 - Maria Abu Sini, Eitan Yaakobi:
Reconstruction of Sequences in DNA Storage. 290-294 - Ville Junnila, Tero Laihonen, Tuomo Lehtilä:
The Levenshtein's Channel and the List Size in Information Retrieval. 295-299 - Yuanyuan Tang, Yonatan Yehezkeally, Moshe Schwartz, Farzad Farnoud Hassanzadeh:
Single-Error Detection and Correction for Duplication and Substitution Channels. 300-304 - Bagus Santoso, Yasutada Oohama:
Secure Broadcasting of Two Encrypted Sources under Side-Channel Attacks. 305-309 - Éloi de Chérisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida:
An Information-Theoretic Model for Side-Channel Attacks in Embedded Hardware. 310-315 - Alireza Poostindouz, Reihaneh Safavi-Naini:
Wiretap Secret Key Capacity of Tree-PIN. 315-319 - Dakota Flanary, Benjamin Jensen, Bradford Clark, Kalin Norman, Nathan Nelson, Michael Rice, Willie K. Harrison:
Manufacturing an Erasure Wiretap Channel from Channel Sounding Measurements. 320-324 - Ali Maatouk, Mohamad Assaad, Anthony Ephremides:
Age of Information With Prioritized Streams: When to Buffer Preempted Packets? 325-329 - Antzela Kosta, Nikolaos Pappas, Anthony Ephremides, Vangelis Angelakis:
Queue Management for Age Sensitive Status Updates. 330-334 - Elie Najm, Emre Telatar, Rajai Nasser:
Optimal Age over Erasure Channels. 335-339 - Rajat Talak, Eytan H. Modiano:
Age-Delay Tradeoffs in Single Server Systems. 340-344 - Rajat Talak, Sertac Karaman, Eytan H. Modiano:
When a Heavy Tailed Service Minimizes Age of Information. 345-349 - Fatemeh Kazemi, Esmaeil Karimi, Anoosheh Heidarzadeh, Alex Sprintson:
Single-Server Single-Message Online Private Information Retrieval with Side Information. 350-354 - Mohammad Hossein Mousavi, Mohammad Ali Maddah-Ali, Mahtab Mirmohseni:
Private Inner Product Retrieval for Distributed Machine Learning. 355-359 - Nikita Polyanskii, Ilya Vorobyev:
Constructions of Batch Codes via Finite Geometry. 360-364 - Qiwen Wang, Hua Sun, Mikael Skoglund:
Symmetric Private Information Retrieval with Mismatched Coded Messages and Randomness. 365-369 - Ruida Zhou, Chao Tian, Tie Liu, Hua Sun:
Capacity-Achieving Private Information Retrieval Codes from MDS-Coded Databases with Minimum Message Size. 370-374 - Hong Hu, Yue M. Lu:
Asymptotics and Optimal Designs of SLOPE for Sparse Linear Regression. 375-379 - Holger Boche, Ullrich J. Mönich:
Turing Computability of the Fourier Transform of Bandlimited Functions. 380-384 - Nir Shlezinger, Salman Salamatian, Yonina C. Eldar, Muriel Médard:
Joint Sampling and Recovery of Correlated Sources. 385-389 - Salman Salamatian, Nir Shlezinger, Yonina C. Eldar, Muriel Médard:
Task-Based Quantization for Recovering Quadratic Functions Using Principal Inertia Components. 390-394 - Sattar Vakili, Qing Zhao:
A Random Walk Approach to First-Order Stochastic Convex Optimization. 395-399 - Galen Reeves, Vaishakhi Mayya, Alexander Volfovsky:
The Geometry of Community Detection via the MMSE Matrix. 400-404 - Jean Barbier, Chun Lam Chan, Nicolas Macris:
Mutual Information for the Stochastic Block Model by the Adaptive Interpolation Method. 405-409 - Chung Chan, Ali Al-Bashabsheh, Da Sun Handason Tam, Chao Zhao:
Finding Better Web Communities in Digraphs via Max-Flow Min-Cut. 410-414 - Luca Corinzia, Paolo Penna, Luca Mondada, Joachim M. Buhmann:
Exact Recovery for a Family of Community-Detection Generative Models. 415-419 - Mohammad Esmaeili, Hussein Saad, Aria Nosratinia:
Community Detection with Side Information via Semidefinite Programming. 420-424 - Shan Lu, Wei Hou, Jun Cheng, Hiroshi Kamabe:
Multi-User UD k-Ary Codes Recursively Constructed from Short-Length Multiary Codes for Multiple-Access Adder Channel. 425-429 - Ilias Zadik, Yury Polyanskiy, Christos Thrampoulidis:
Improved bounds on Gaussian MAC and sparse regression via Gaussian inequalities. 430-434 - Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Multiple Access Channels with Adversarial Users. 435-439 - Suhas S. Kowshik, Yury Polyanskiy:
Quasi-static fading MAC with many users and finite payload. 440-444 - Uzi Pereg, Yossef Steinberg:
The Capacity Region of the Arbitrarily Varying MAC: With and Without Constraints. 445-449 - Xuan He, Kui Cai, Wentu Song, Zhen Mei:
Dynamic Programming for Quantization of q-ary Input Discrete Memoryless Channels. 450-454 - Xiaojie Wang, Chulong Liang, Li Ping, Stephan ten Brink:
Achievable Rate Region for Iterative Multi-User Detection via Low-cost Gaussian Approximation. 455-459 - Yahya H. Ezzeldin, Martina Cardone, Christina Fragouli, Giuseppe Caire:
Polynomial-time Capacity Calculation and Scheduling for Half-Duplex 1-2-1 Networks. 460-464 - Yahya H. Ezzeldin, Martina Cardone, Christina Fragouli, Giuseppe Caire:
On the Multicast Capacity of Full-Duplex 1-2-1 Networks. 465-469 - Holger Boche, Rafael F. Schaefer, H. Vincent Poor:
Identification Capacity of Correlation-Assisted Discrete Memoryless Channels: Analytical Properties and Representations. 470-474 - Robert Graczyk, Amos Lapidoth:
Two-Stage Guessing. 475-479 - Ken R. Duffy, Muriel Médard:
Guessing random additive noise decoding with soft detection symbol reliability information - SGRAND. 480-484 - Neri Merhav, Asaf Cohen:
Universal Randomized Guessing with Application to Asynchronous Decentralized Brute - Force Attacks. 485-489 - Noga Alon, Omri Ben-Eliezer, Chong Shangguan, Itzhak Tamo:
The Hat Guessing Number of Graphs. 490-494 - Pantelimon George Popescu, Marios Omar Choudary:
Refinement of Massey Inequality : (To Nicolae Ţăpuş on his 70th birthday). 495-496 - Ahmed Douik, Babak Hassibi:
Non-Negative Matrix Factorization via Low-Rank Stochastic Manifold Optimization. 497-501 - Eric Graves, Qiang Ning, Prithwish Basu:
An information theoretic model for summarization, and some basic results. 502-506 - Nandan Sriranga, Chandra R. Murthy, Vaneet Aggarwal:
A Method to Improve Consensus Averaging using Quantized ADMM. 507-511 - Shirin Jalali, Xin Yuan:
Solving linear inverse problems using generative models. 512-516 - Lakshmi Natarajan, Hoang Dau, Prasad Krishnan, V. Lalitha:
Locality in Index Coding for Large Min-Rank. 517-521 - Lawrence Ong, Badri N. Vellambi, Jörg Kliewer:
Optimal-Rate Characterisation for Pliable Index Coding using Absent Receivers. 522-526 - Shanuja Sasi, B. Sundar Rajan:
Code Construction for Pliable Index Coding. 527-531 - Tang Liu, Daniela Tuninetti:
Decentralized Pliable Index Coding. 532-536 - Joseph Geumlek, Kamalika Chaudhuri:
Profile-based Privacy for Locally Private Computations. 537-541 - Kangwook Lee, Hoon Kim, Kyungmin Lee, Changho Suh, Kannan Ramchandran:
Synthesizing Differentially Private Datasets using Random Mixing. 542-546 - Yuuya Yoshida, Man-Hong Yung, Masahito Hayashi:
Optimal Mechanism for Randomized Responses under Universally Composable Security Measure. 547-551 - Hsiang Hsu, Shahab Asoodeh, Flávio P. Calmon:
Information-Theoretic Privacy Watchdogs. 552-556 - Maryam Hosseini, Narayana Santhanam:
Tail redundancy and its characterizations of universal compression. 557-561 - Boris Ryabko:
Time-universal data compression and prediction. 562-566 - Jorge F. Silva, Pablo Piantanida:
Universal D-Semifaithfull Coding for Countably Infinite Alphabets. 567-571 - Shashank Vatedka, Aslan Tchamkerten:
Local Decoding and Update of Compressed Data. 572-576 - Hao Wang, Mario Díaz, José Cândido Silveira Santos Filho, Flávio P. Calmon:
An Information-Theoretic View of Generalization via Wasserstein Distance. 577-581 - Ibrahim Issa, Amedeo Roberto Esposito, Michael Gastpar:
Strengthened Information-theoretic Bounds on the Generalization Error. 582-586 - Yuheng Bu, Shaofeng Zou, Venugopal V. Veeravalli:
Tightening Mutual Information Based Bounds on Generalization Error. 587-591 - Hang Zhang, Afshin Abdi, Faramarz Fekri:
Compressive Sensing with a Multiple Convex Sets Domain. 592-596 - Abbas Khalili, Farhad Shirani, Elza Erkip, Yonina C. Eldar:
Tradeoff Between Delay and High SNR Capacity in Quantized MIMO Systems. 597-601 - Abbas Khalili, Farhad Shirani, Elza Erkip, Yonina C. Eldar:
On Multiterminal Communication over MIMO Channels with One-bit ADCs at the Receivers. 602-606 - Ahmed Arafa, Jing Yang, Sennur Ulukus, H. Vincent Poor:
Using Erasure Feedback for Online Timely Updating with an Energy Harvesting Sensor. 607-611 - Alejandro Lancho, Johan Östman, Giuseppe Durisi, Tobias Koch, Gonzalo Vazquez-Vilar:
Saddlepoint Approximations for Noncoherent Single-Antenna Rayleigh Block-Fading Channels. 612-616 - Allison Beemer, Oliver Kosut, Jörg Kliewer, Eric Graves, Paul L. Yu:
Structured Coding for Authentication in the Presence of a Malicious Adversary. 617-621 - Dimiter Ostrev:
Composable, Unconditionally Secure Message Authentication without any Secret Key. 622-626 - Sagnik Bhattacharya, Amitalok J. Budkuley, Sidharth Jaggi:
Shared Randomness in Arbitrarily Varying Channels. 627-631 - Xishi Nicholas Wang, Amitalok J. Budkuley, Andrej Bogdanov, Sidharth Jaggi:
When are large codes possible for AVCs? 632-636 - Seyed Ali Ossia, Borzoo Rassouli, Hamed Haddadi, Hamid R. Rabiee, Deniz Gündüz:
Privacy Against Brute-Force Inference Attacks. 637-641 - Jiachun Liao, Lalitha Sankar, Oliver Kosut, Flávio P. Calmon:
Robustness of Maximal α-Leakage to Side Information. 642-646 - Shigeaki Kuzuoka:
On the Conditional Smooth Rényi Entropy and Its Application in Guessing. 647-651 - Shota Saito, Toshiyasu Matsushima:
Non-Asymptotic Fundamental Limits of Guessing Subject to Distortion. 652-656 - Bin Dai, Chong Li, Yingbin Liang, Zheng Ma, Shlomo Shamai Shitz:
The Dirty Paper Wiretap Feedback Channel with or without Action on the State. 657-661 - Hao Ge, Randall A. Berry:
Quantized Mechanisms for Gaussian Multiple Access Wiretap Channels. 662-666 - Jinyuan Chen, Chunhua Geng:
Optimal Secure GDoF of Symmetric Gaussian Wiretap Channel with a Helper. 667-671 - Rémi A. Chou, Aylin Yener:
The Degraded Gaussian Many-Access Wiretap Channel. 672-676 - Hadi Reisizadeh, Mohammad Ali Maddah-Ali, Soheil Mohajer:
Subspace Coding for Coded Caching: Decentralized and Centralized Placements Meet for Three Users. 677-681 - Hari Hara Suthan Chittoor, Bhavana M, Prasad Krishnan:
Coded Caching via Projective Geometry: A new low subpacketization scheme. 682-686 - Jinbei Zhang, Xiaojun Lin, Chih-Chun Wang:
Closing the Gap for Coded Caching with Distinct File Sizes. 687-691 - Kai Wan, Daniela Tuninetti, Mingyue Ji, Giuseppe Caire:
On Coded Caching with Correlated Files. 692-696 - Emmanuel Abbe, Enric Boix Adserà:
Subadditivity Beyond Trees and the Chi-Squared Mutual Information. 697-701 - Ferdinando Cicalese, Luisa Gargano, Ugo Vaccaro:
An Information Theoretic Approach to Probability Mass Function Truncation. 702-706 - Matthew G. Reyes, David L. Neuhoff:
Monotonicity of Entropy in Positively Correlated Ising Trees. 707-711 - Md Mahmudul Hasan, Shuangqing Wei, Ali Moharrer:
Algebraic Properties of Wyner Common Information Solution under Graphical Constraints. 712-716 - Dong-Jun Han, Jy-yong Sohn, Jaekyun Moon:
Coded Distributed Computing over Packet Erasure Channels. 717-721 - Muah Kim, Jy-yong Sohn, Jaekyun Moon:
Coded Matrix Multiplication on a Group-Based Model. 722-726 - Yasuo Matsuyama:
Divergence Family Attains Blockchain Applications via α-EM Algorithm. 727-731 - Ziv Goldfeld, Guy Bresler, Yury Polyanskiy:
Information Storage in the Stochastic Ising Model at Low Temperature. 732-736 - Seyed Pooya Shariatpanahi, Jingjing Zhang, Osvaldo Simeone, Babak Hossein Khalaj, Mohammad Ali Maddah-Ali:
Cloud-Aided Interference Management with Cache-Enabled Edge Nodes and Users. 737-741 - Nir Shlezinger, Emeka Abakasanga, Ron Dabora, Yonina C. Eldar:
On the Capacity of Sampled Interference-Limited Communications Channels. 742-746 - Jean de Dieu Mutangana, Ravi Tandon:
Interference Channels with Confidential Messages: Leveraging OFDM Transmission to Scale up Secure Degrees of Freedom with No CSIT. 747-751 - Ragini Chaluvadi, Bolli Madhuri, Srikrishna Bhashyam:
Channel Conditions for the Optimality of Interference Decoding Schemes for K-user Gaussian Interference Channels. 752-756 - Andreas Lenz, Paul H. Siegel, Antonia Wachter-Zeh, Eitan Yaakobi:
Anchor-Based Correction of Substitutions in Indexed Sets. 757-761 - Ilan Shomorony, Reinhard Heckel:
Capacity Results for the Noisy Shuffling Channel. 762-766 - Jin Sima, Netanel Raviv, Jehoshua Bruck:
On Coding Over Sliced Information. 767-771 - Yeow Meng Chee, Han Mao Kiah, Tuan Thanh Nguyen:
Linear-Time Encoders for Codes Correcting a Single Edit for DNA-Based Data Storage. 772-776 - Luca Barletta, Stefano Rini:
On the Degrees of Freedom of the Oversampled Wiener Phase Noise Channel. 777-781 - Chirag C. Shetty, Kamal Singh, Sibi Raj B. Pillai:
On Decentralized Power Control for Ergodic MIMO Multiple Access Channels. 782-786 - Liyan Xie, Yao Xie, George V. Moustakides:
Asynchronous Multi-Sensor Change-Point Detection for Seismic Tremors. 787-791 - Jesús Rodríguez Sánchez, Juan Vidal Alegría, Fredrik Rusek:
Decentralized Massive MIMO Systems: Is There Anything to be Discussed? 787-791 - Yunseo Nam, Heedong Do, Yo-Seb Jeon, Namyoon Lee:
Capacity Analysis of MISO Channels with One-Bit Transceiver. 792-796 - Ertem Tuncel:
On Error Exponents Under A Privacy-Preserving Voting Regime. 797-801 - Neri Merhav:
False-Accept/False-Reject Trade-offs for Ensembles of Biometric Authentication Systems. 802-806 - Rémi A. Chou:
Biometric Systems with Multiuser Access Structures. 807-811 - Vamoua Yachongka, Hideki Yagi:
Identification, Secrecy, Template, and Privacy-Leakage of Biometric Identification System under Noisy Enrollment. 812-816 - Carolina Naim, Fangwei Ye, Salim El Rouayheb:
ON-OFF Privacy with Correlated Requests. 817-821 - Moritz Wiese, Holger Boche:
A Graph-Based Modular Coding Scheme Which Achieves Semantic Security. 822-826 - Willie K. Harrison, Matthieu R. Bloch:
Attributes of Generators for Best Finite Blocklength Coset Wiretap Codes over Erasure Channels. 827-831 - Xavier Coiteux-Roy, Stefan Wolf:
Proving Erasure. 832-836 - Ziv Aharoni, Oron Sabag, Haim H. Permuter:
Computing the Feedback Capacity of Finite State Channels using Reinforcement Learning. 837-841 - Parthe Pandit, Mojtaba Sahraee, Sundeep Rangan, Alyson K. Fletcher:
Asymptotics of MAP Inference in Deep Networks. 842-846 - Jin Sima, Jehoshua Bruck:
Optimal k-Deletion Correcting Codes. 847-851 - M. Nikhil Krishnan, Deeptanshu Shukla, P. Vijay Kumar:
A Quadratic Field-Size Rate-Optimal Streaming Code for Channels with Burst and Random Erasures. 852-856 - Beongjun Choi, Jy-yong Sohn, Dong-Jun Han, Jaekyun Moon:
Scalable Network-Coded PBFT Consensus Algorithm. 857-861 - Han Cai, Tuvi Etzion, Moshe Schwartz, Antonia Wachter-Zeh:
Network Coding Solutions for the Combination Network and its Subgraphs. 862-866 - Mahesh Babu Vaddi, B. Sundar Rajan:
Weight Enumerating Function, Number of Full Rank Sub-matrices and Network Coding. 867-871 - Sagnik Bhattacharya, Adrish Banerjee:
A method to find the volume of a sphere in the Lee metric, and its applications. 872-876 - Elsa Dupraz, Lav R. Varshney:
Binary Recursive Estimation on Noisy Hardware. 877-881 - Neri Merhav:
Trading off Weak-Noise Estimation Performance and Outage Exponents in Nonlinear Modulation. 882-886 - Vladislav Z. B. Tadic, Arnaud Doucet:
Asymptotic Properties of Recursive Particle Maximum Likelihood Estimation. 887-891 - Ziv Goldfeld, Kristjan H. Greenewald, Jonathan Weed, Yury Polyanskiy:
Optimality of the Plug-in Estimator for Differential Entropy Estimation under Gaussian Convolutions. 892-896 - Dhruva Kartik, Ashutosh Nayyar, Urbashi Mitra:
Active Hypothesis Testing: Beyond Chernoff-Stein. 897-901 - Jun Muramatsu, Shigeki Miyake:
Stochastic Decision with Stationary Memoryless Sequence. 902-906 - Lele Wang, Ofer Shayevitz:
Adaptive Sequence Phase Detection. 907-911 - Yahya H. Ezzeldin, Christina Fragouli, Suhas N. Diggavi:
Quantizing Signals for Linear Classification. 912-916 - Christopher Rose, I. Saira Mian:
A General Upper Bound on Point-to-Point Particle Timing Channel Capacity Under Constant Particle Emission Intensity. 917-921 - David L. Rodríguez-Sarmiento, M. E. Duarte-González, T. Rodríguez-Quiñones, Reginaldo Palazzo Júnior:
Procedure for Identifying Odd-sized Nucleotide Sequences as Codewords of BCH Codes over GF(4). 922-926 - Mladen Kovacevic, Sanja Brdar, Vladimir S. Crnojevic:
Some Enumeration Problems in the Duplication-Loss Model of Genome Rearrangement. 927-931 - Ohad Elishco, Ryan Gabrys, Muriel Médard, Eitan Yaakobi:
Repeat-Free Codes. 932-936 - Anurag Anshu, Mario Berta, Rahul Jain, Marco Tomamichel:
Second-Order Characterizations via Partial Smoothing. 937-941 - Cheuk Ting Li, Venkat Anantharam:
A Unified Framework for One-shot Achievability via the Poisson Matching Lemma. 942-946 - Chung Chan, Navin Kashyap, Praneeth Kumar Vippathalla, Qiaoqiao Zhou:
One-Shot Perfect Secret Key Agreement for Finite Linear Sources. 947-951 - Masahito Hayashi:
Semi-Finite Length Analysis for Secure Random Number Generation. 952-956 - Xuehe Wang, Lingjie Duan:
Dynamic Pricing for Controlling Age of Information. 962-966 - Himanshu Tyagi, Shun Watanabe:
A New Proof of Nonsignalling Multiprover Parallel Repetition Theorem. 967-971 - Serkan Sariotakas, Philippe Furrer, Sinan Gezici, Tamás Linder, Serdar Yüksel:
On the Number of Bins in Equilibria for Signaling Games. 972-976 - Ishaque Ashar Kadampot, Mehrdad Tahmasbi, Matthieu R. Bloch:
Codes for Covert Communication over Additive White Gaussian Noise Channels. 977-981 - Mehrasa Ahmadipour, Sadaf Salehkalaibar, Mohammad Hossein Yassaee, Vincent Y. F. Tan:
Covert Communication Over a Compound Discrete Memoryless Channel. 982-986 - Ori Shmuel, Asaf Cohen, Omer Gurewitz, Alejandro Cohen:
Multi-Antenna Jamming in Covert Communication. 987-991 - Qiaosheng Eric Zhang, Matthieu R. Bloch, Mayank Bakshi, Sidharth Jaggi:
Undetectable Radios: Covert Communication under Spectral Mask Constraints. 992-996 - Anshuka Rangi, Massimo Franceschetti:
Towards a Non-Stochastic Information Theory. 997-1001 - Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate, Carol Wang:
The Interplay of Causality and Myopia in Adversarial Channel Models. 1002-1006 - Yonglong Li, Guangyue Han, Paul H. Siegel:
On the Capacity of the Flash Memory Channel with Inter-cell Interference. 1007-1011 - Irina E. Bocharova, Boris D. Kudryashov, Maben Rabi, Nikita Lyamin, Wouter Dankers, Erik Frick, Alexey V. Vinel:
Modeling Packet Losses in Communication Networks. 1012-1016 - Roy D. Yates, Jing Zhong, Wuyang Zhang:
Updates with Multiple Service Classes. 1017-1021 - Yi-Hsuan Tseng, Yu-Pin Hsu:
Online Energy-Efficient Scheduling for Timely Information Downloads in Mobile Networks. 1022-1026 - Haoyue Tang, Jintao Wang, Zihan Tang, Jian Song:
Scheduling to Minimize Age of Synchronization in Wireless Broadcast Networks with Random Updates. 1027-1031 - Sandeep Banik, Sanjit K. Kaul, P. B. Sujit:
Minimizing Age in Gateway Based Update Systems. 1032-1036 - Zhiyuan Jiang, Sheng Zhou:
Status from a Random Field: How Densely Should One Update? 1037-1041 - Anoosheh Heidarzadeh, Swanand Kadhe, Salim Y. El Rouayheb, Alex Sprintson:
Single-Server Multi-Message Individually-Private Information Retrieval with Side Information. 1042-1046 - Jingke Xu, Yaqian Zhang, Zhifang Zhang:
A Capacity-Achieving T-PIR Scheme Based On MDS Array Codes. 1047-1051 - Nicholas Woolsey, Rong-Rong Chen, Mingyue Ji:
A New Design of Private Information Retrieval for Storage Constrained Databases. 1052-1056 - Umberto Martínez-Peñas:
Private Information Retrieval from Locally Repairable Databases with Colluding Servers. 1057-1061 - Yeow Meng Chee, Han Mao Kiah, Eitan Yaakobi, Hui Zhang:
A Generalization of the Blackburn-Etzion Construction for Private Information Retrieval Array Codes. 1062-1066 - Jie Li, Xiaohu Tang:
Systematic Construction of MDS Codes with Small Sub-packetization Level and Near Optimal Repair Bandwidth. 1067-1071 - Michel Kulhandjian, Hovannes Kulhandjian, Claude D'Amours:
Improved Soft Decoding of Reed-Solomon Codes on Gilbert-Elliott Channels. 1072-1076 - Venkatesan Guruswami, Haotian Jiang:
Near-optimal Repair of Reed-Solomon Codes with Low Sub-packetization. 1077-1081 - Viduranga Bandara Wijekoon, Hoang Dau, Emanuele Viterbo:
Iterative Decoding of Reed-Solomon Codes based on Non-binary Matrices. 1082-1086 - Weiqi Li, Hoang Dau, Zhiying Wang, Hamid Jafarkhani, Emanuele Viterbo:
On the I/O Costs in Repairing Short-Length Reed-Solomon Codes. 1087-1091 - Malihe Aliasgari, Osvaldo Simeone, Jörg Kliewer:
Distributed and Private Coded Matrix Computation with Flexible Communication Load. 1092-1096 - Minchul Kim, Jungwoo Lee:
Private Secure Coded Computation. 1097-1101 - Qian Yu, Amir Salman Avestimehr:
Harmonic Coding: An Optimal Linear Code for Privacy-Preserving Gradient-Type Computation. 1102-1106 - Rafael G. L. D'Oliveira, Salim El Rouayheb, David A. Karpuk:
GASP Codes for Secure Distributed Matrix Multiplication. 1107-1111 - Saeid Sahraei, Amir Salman Avestimehr:
INTERPOL: Information Theoretically Verifiable Polynomial Evaluation. 1112-1116 - Gautam Aishwarya, Mokshay Madiman:
Remarks on Rényi versions of conditional entropy and mutual information. 1117-1121 - Maciej Skórski:
Strong Chain Rules for Min-Entropy under Few Bits Spoiled. 1122-1126 - Massimiliano Rossi:
Greedy additive approximation algorithms for minimum-entropy coupling problem. 1127-1131 - Mohammad Mahdi Mojahedian, Salman Beigi, Amin Gohari, Mohammad Hossein Yassaee, Mohammad Reza Aref:
A Correlation Measure Based on Vector-Valued Lp Norms. 1132-1136 - Jiange Li, Arnaud Marsiglietti, James Melbourne:
Entropic Central Limit Theorem for Rényi Entropy. 1137-1141 - Hao-Chung Cheng, Eric P. Hanson, Nilanjana Datta, Min-Hsiu Hsieh:
Duality between source coding with quantum side information and c-q channel coding. 1142-1146 - Zahra Baghali Khanian, Andreas J. Winter:
Entanglement-Assisted Quantum Data Compression. 1147-1151 - Zahra Baghali Khanian, Andreas J. Winter:
Distributed Compression of Correlated Classical-Quantum Sources. 1152-1156 - Nilanjana Datta, Christoph Hirche, Andreas J. Winter:
Convexity and Operational Interpretation of the Quantum Information Bottleneck Function. 1157-1161 - Mohsen Heidari, Touheed Anwar Atif, S. Sandeep Pradhan:
Faithful Simulation of Distributed Quantum Measurements with Applications in Distributed Rate-Distortion Theory. 1162-1166 - Ali Bereyhi, Saba Asaad, Bernhard Gäde, Ralf R. Müller:
RLS-Based Detection for Massive Spatial Modulation MIMO. 1167-1171 - Aymen Askri, Ghaya Rekaya-Ben Othman:
DNN assisted Sphere Decoder. 1172-1176 - Fan Zhang, Aria Nosratinia:
The Degrees of Freedom of MIMO Relay under Coherence Diversity. 1177-1181 - Lu Wei:
Ergodic MIMO Mutual Information: Twenty Years After Emre Telatar. 1182-1186 - Mohammad Nur Hasan, Brian M. Kurkoski, Amin Sakzad, Emanuele Viterbo:
Orthogonal Precoder for Integer-Forcing MIMO. 1187-1191 - Mohsen Heidari, S. Sandeep Pradhan, Ramji Venkataramanan:
Boolean Functions with Biased Inputs: Approximation and Noise Sensitivity. 1192-1196 - Germán Bassi, Mikael Skoglund:
On the Mutual Information of Two Boolean Functions, with Application to Privacy. 1197-1201 - Hengjie Yang, Richard D. Wesel:
On the Most Informative Boolean Functions of the Very Noisy Channel. 1202-1206 - Orhan Ocal, Swanand Kadhe, Kannan Ramchandran:
Low-degree Pseudo-Boolean Function Recovery Using Codes. 1207-1211 - Youle Xu, Qichun Wang:
Searching for Highly Nonlinear DPA-Resistant Balanced Boolean Functions in the Rotation Symmetric Class. 1212-1216 - Nujoom Sageer Karat, Spandan Dey, Anoop Thomas, B. Sundar Rajan:
An Optimal Linear Error Correcting Delivery Scheme for Coded Caching with Shared Caches. 1217-1221 - Mohamed Salman, Mahesh K. Varanasi:
The Exact Capacity-Memory Tradeoff for Caching with Uncoded Prefetching in the Two-Receiver Gaussian Broadcast Channel. 1222-1226 - Shailja Agrawal, K. V. Sushena Sree, Prasad Krishnan:
Coded Caching based on Combinatorial Designs. 1227-1231 - Kota Srinivas Reddy, Nikhil Karamchandani:
Rate-Memory Trade-off for Multi-access Coded Caching with Uncoded Placement. 1232-1236 - Chinmayananda Arunachala, B. Sundar Rajan:
Optimal Scalar Linear Codes for a Class of Jointly Extended Groupcast Index Coding Problems. 1237-1241 - Yucheng Liu, Parastoo Sadeghi:
Generalized Alignment Chain: Improved Converse Results for Index Coding. 1242-1246 - Mahesh Babu Vaddi, B. Sundar Rajan:
Reduced Complexity Index Codes and Improved Upperbound on Broadcast Rate for Neighboring Interference Problems. 1247-1251 - Mahesh Babu Vaddi, B. Sundar Rajan:
A Generalisation of Interlinked Cycle Structures and Their Index Coding Capacity. 1252-1256 - Hsuan-Yin Lin, Siddhartha Kumar, Eirik Rosnes, Alexandre Graell i Amat, Eitan Yaakobi:
Weakly-Private Information Retrieval. 1257-1261 - Islam Samy, Ravi Tandon, Loukas Lazos:
On the Capacity of Leaky Private Information Retrieval. 1262-1266 - Karim Banawan, Batuhan Arasli, Yi-Peng Wei, Sennur Ulukus:
Private Information Retrieval from Heterogeneous Uncoded Caching Databases. 1267-1271 - Karim Banawan, Sennur Ulukus:
Private Information Retrieval from Non-Replicated Databases. 1272-1276 - Reza Khosravi-Farsani:
New Sum-Rate Capacity Results for Multi-User Interference Channels. 1277-1281 - Subhajit Majhi, Patrick Mitran:
On the Capacity of Gaussian Multiple-Access Interference Channels. 1282-1286 - Xinping Yi, Hua Sun:
Opportunistic Topological Interference Management. 1287-1291 - Amir Leshem, Uri Erez:
Ergodic Spatial Nulling for Achieving Interference Free Rates. 1292-1296 - Burak Çakmak, Manfred Opper:
Convergent Dynamics for Solving the TAP Equations of Ising Models with Arbitrary Rotation Invariant Coupling Matrices. 1297-1301 - Gautam Dasarathy:
Gaussian Graphical Model Selection from Size Constrained Measurements. 1302-1306 - Saurabh Sihag, Ali Tajer:
Structure Learning of Similar Ising Models: Information-theoretic Bounds. 1307-1311 - Vincenzo Matta, Augusto Santos, Ali H. Sayed:
Graph Learning with Partial Observations: Role of Degree Concentration. 1312-1316 - Arezou Rezazadeh, Josep Font-Segura, Alfonso Martinez, Albert Guillén i Fàbregas:
Joint Source-Channel Coding for the Multiple-Access Channel with Correlated Sources. 1317-1321 - Jian-Jian Weng, Fady Alajaji, Tamás Linder:
Joint Source-Channel Coding for the Transmission of Correlated Sources over Two-Way Channels. 1322-1326 - Yashas Malur Saidutta, Afshin Abdi, Faramarz Fekri:
Joint Source-Channel Coding for Gaussian Sources over AWGN Channels using Variational Autoencoders. 1327-1331 - Yuval Kochman, Or Ordentlich, Yury Polyanskiy:
A Lower Bound on the Expected Distortion of Joint Source-Channel Coding. 1332-1336 - Chentao Yue, Mahyar Shirvanimoghaddam, Yonghui Li, Branka Vucetic:
Hamming Distance Distribution of the 0-reprocessing Estimate of the Ordered Statistic Decoder. 1337-1341 - Christian Senger:
Improved Iterative Decoding of Product Codes Based on Trusted Symbols. 1342-1346 - Tarik Benaddi, Arti D. Yardi, Charly Poulliat, Iryna Andriyanova:
Estimating the Maximum a Posteriori Threshold for Serially Concatenated Turbo Codes. 1347-1351 - Xiao Ma, Wenchao Lin, Suihua Cai, Baodian Wei:
Statistical Learning Aided Decoding of BMST Tail-Biting Convolutional Code. 1352-1356 - Hikari Koremura, Haruhiko Kaneko:
Successive Cancellation Decoding of Polar Codes for Insertion/Deletion Error Correction. 1357-1361 - Ido Tal, Henry D. Pfister, Arman Fazeli, Alexander Vardy:
Polar Codes for the Deletion Channel: Weak and Strong Polarization. 1362-1366 - Jin Sima, Jehoshua Bruck:
Correcting Deletions in Multiple-Heads Racetrack Memories. 1367-1371 - Mahed Abroshan, Ramji Venkataramanan, Lara Dolecek, Albert Guillén i Fàbregas:
Coding for Deletion Channels with Multiple Traces. 1372-1376 - Emirhan Gürpinar, Andrei E. Romashchenko:
How to Use Undiscovered Information Inequalities: Direct Applications of the Copy Lemma. 1377-1381 - Lin Ling, Chee-Wei Tan, Siu-Wai Ho, Raymond W. Yeung:
Scalable Automated Proving of Information Theoretic Inequalities with Proximal Algorithms. 1382-1386 - Mohammad Hossein Yassaee:
Almost Exact Analysis of Soft Covering Lemma via Large Deviation. 1387-1391 - Xianming Liu, Ronit Bustin, Guangyue Han, Shlomo Shamai Shitz:
An Elementary Proof of a Classical Information-Theoretic Formula. 1392-1396 - Arman Fazeli, Alexander Vardy, Hanwen Yao:
Convolutional Decoding of Polar Codes. 1397-1401 - Barak Beilin, David Burshtein:
On Polar Coding for Binary Dirty Paper. 1402-1406 - David Tse, Bin Li, Kai Chen, Ling Liu, Jiaqi Gu:
Polar Coding for Parallel Gaussian Channels. 1407-1411 - Grigorii Trofimiuk, Peter Trifonov:
Reduced complexity window processing of binary polarization kernels. 1412-1416 - Shunsuke Horii, Takahiro Yoshida, Manabu Kobayashi, Toshiyasu Matsushima:
Distributed Stochastic Gradient Descent Using LDGM Codes. 1417-1421 - Eleftherios Lampiris, Daniel Jiménez Zorrilla, Petros Elia:
Mapping Heterogeneity Does Not Affect Wireless Coded MapReduce. 1422-1426 - Konstantinos Konstantinidis, Aditya Ramamoorthy:
CAMR: Coded Aggregated MapReduce. 1427-1431 - Mohammad Mohammadi Amiri, Deniz Gündüz:
Machine Learning at the Wireless Edge: Distributed Stochastic Gradient Descent Over-the-Air. 1432-1436 - David Gamarnik, Eren C. Kizildag:
High-Dimensional Linear Regression and Phase Retrieval via PSLQ Integer Relation Algorithm. 1437-1441 - Kohei Miyamoto, Andrew R. Barron, Jun'ichi Takeuchi:
Improved MDL Estimators Using Local Exponential Family Bundles Applied to Mixture Families. 1442-1446 - Puning Zhao, Lifeng Lai:
Minimax Regression via Adaptive Nearest Neighbor. 1447-1451 - Samet Oymak, Mehrdad Mahdavi, Jiasi Chen:
Learning Feature Nonlinearities with Regularized Binned Regression. 1452-1456 - Antonio Bazco Nogueras, Lorenzo Miretti, Paul de Kerret, David Gesbert, Nicolas Gresset:
Achieving Vanishing Rate Loss in Decentralized Network MIMO. 1457-1461 - Igor Burago, Marco Levorato:
Cloud-Assisted On-Sensor Observation Classification in Latency-Impeded IoT Systems. 1462-1466 - Roy Karasik, Osvaldo Simeone, Shlomo Shamai Shitz:
Latency Limits for Content Delivery in a Fog-RAN with D2D Communication. 1467-1471 - Shouvik Ganguly, Young-Han Kim:
Capacity Scaling for Cloud Radio Access Networks with Limited Orthogonal Fronthaul. 1472-1476 - Alexandr V. Kostochka, Xujun Liu, Roberto Assis Machado, Olgica Milenkovic:
Directed Intersection Representations and the Information Content of Digraphs. 1477-1481 - Rashad Eletreby, Osman Yagan:
On the Connectivity of Inhomogeneous Random K-out Graphs. 1482-1486 - Shahab Shams, Nicholas Ruozzi, Péter Csikvári:
Counting Homomorphisms in Bipartite Graphs. 1487-1491 - Shahar Stein Ioushua, Ofer Shayevitz:
Counting Graphs with a Given Degree Sequence: An Information-theoretic Perspective. 1492-1496 - Pin-Hsun Lin, Eduard A. Jorswieck, Carsten R. Janda, Martin Mittelbach, Rafael F. Schaefer:
On Stochastic Orders and Fading Gaussian Multi-User Channels with Statistical CSIT. 1497-1501 - Saeed Karimi-Bidhendi, Jun Guo, Hamid Jafarkhani:
Using Quantization to Deploy Heterogeneous Nodes in Two-Tier Wireless Sensor Networks. 1502-1506 - Shenghao Yang, Jie Wang, Yanyan Dong, Yiheng Zhang:
On the Capacity Scalability of Line Networks with Buffer Size Constraints. 1507-1511 - Takahiro Ota, Ryoji Nakamura, Akiko Manada:
A Fast Node Arrangement Algorithm of Wireless Sensor Networks for Two-dimensional Constraints. 1512-1516 - Krzysztof Turowski, Philippe Jacquet, Wojciech Szpankowski:
Asymptotics of Entropy of the Dirichlet-Multinomial Distribution. 1517-1521 - Hoover H. F. Yin, Ka Hei Ng, Yu Ting Shing, Russell W. F. Lai, Xishi Wang:
Decision Procedure for the Existence of Two-Channel Prefix-Free Codes. 1522-1526 - Kengo Hashimoto, Ken-ichi Iwata, Hirosuke Yamamoto:
Enumeration and Coding of Compact Code Trees for Binary AIFV Codes. 1527-1531 - Yanina Y. Shkel, Rick S. Blum, H. Vincent Poor:
Variable-length compression and secrecy by design. 1532-1536 - Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert:
Reed-Solomon Codes over Fields of Characteristic Zero. 1537-1541 - Eleonora Guerrini, Romain Lebreton, Ilaria Zappatore:
Polynomial Linear System Solving with Errors by Simultaneous Polynomial Reconstruction of Interleaved Reed-Solomon Codes. 1542-1546 - Jiongyue Xing, Li Chen, Martin Bossert:
Progressive Module Minimization for Re-encoding Transformed Soft Decoding of RS Codes. 1547-1551 - Welington Santos:
On Fractional Decoding of Reed-Solomon Codes. 1552-1556 - Bing Zhu, Kenneth W. Shum, Hui Li, Weiping Wang:
On the Optimal Reconstruction Degree of Fractional Repetition Codes. 1557-1561 - Ohad Elishco, Alexander Barg:
Capacity of dynamical storage systems. 1562-1566 - Bh. Rekha Devi, V. Lalitha:
On Epsilon-MSCR Codes for Two Erasures. 1567-1571 - Roberta Barbi, Pascal Felber, Laurent Hayez, Hugues Mercier:
Convolutional LPDC codes for Distributed Storage Systems. 1572-1576 - Zhengrui Li, Sian-Jheng Lin:
Update Bandwidth for Distributed Storage. 1577-1581 - Lev Yohananov, Yuval Efron, Eitan Yaakobi:
Double and Triple Node-Erasure-Correcting Codes over Graphs. 1582-1586 - Mladen Kovacevic:
Bounds on Codes for the Bit-Shift Channel with (d, k)-Constrained Inputs. 1587-1591 - Navin Kashyap, Ron M. Roth, Paul H. Siegel:
The Capacity of Count-Constrained ICI-Free Systems. 1592-1596 - Yeow Meng Chee, Han Mao Kiah, A. J. Han Vinck, Van Khu Vu, Eitan Yaakobi:
Coding for Write ℓ-step-up Memories. 1597-1601 - Zhijie Huang, Hong Jiang, Hao Che, Nong Xiao, Ning Li:
Efficient MDS Array Codes for Correcting Multiple Column Erasures. 1602-1606 - Giselle Strey, Antonio Campello, João E. Strapasson, Sueli I. R. Costa:
Perfect Codes in Euclidean Lattices: Bounds and Case Studies. 1607-1611 - Henrique K. Miyamoto, Henrique N. Sá Earp, Sueli I. R. Costa:
Constructive spherical codes in 2k dimensions. 1612-1616 - Hiroyoshi Morita:
Double Nearest-Neighbor Error Correcting Codes on Hexagonal Signal Constellation. 1617-1621 - Vincent Corlay, Joseph J. Boutros, Philippe Ciblat, Loïc Brunel:
On the CVP for the root lattices via folding with deep ReLU neural networks. 1622-1626 - Yihan Zhang, Shashank Vatedka:
List Decoding Random Euclidean Codes and Infinite Constellations. 1627-1631 - Anuran Makur, Elchanan Mossel, Yury Polyanskiy:
Broadcasting on Random Networks. 1632-1636 - Arash Gholami Davoodi, Syed Ali Jafar:
Degrees of Freedom Region of the (M, N1, N2) MIMO Broadcast Channel with Partial CSIT: An Application of Sum-set Inequalities. 1637-1641 - Mohamed Salman, Mahesh K. Varanasi:
Capacity Results via Message Merging and Superposition Coding in the K-Receiver Broadcast Channel with General Message Sets. 1642-1646 - Shih-Chun Lin, I-Hsiang Wang, Alireza Vahid:
No Feedback, No Problem: Capacity of Erasure Broadcast Channels with Single-User Delayed CSI. 1647-1651 - Shraga I. Bross:
Broadcasting Correlated Gaussians and Asymmetric Data Transmission. 1652-1656 - Anoosheh Heidarzadeh, Alex Sprintson:
Private Computation with Side Information: The Single-Server Case. 1657-1661 - Anoosheh Heidarzadeh, Fatemeh Kazemi, Alex Sprintson:
Capacity of Single-Server Single-Message Private Information Retrieval with Private Coded Side Information. 1662-1666 - Behrooz Tahmasebi, Mohammad Ali Maddah-Ali:
Private Sequential Function Computation. 1667-1671 - Netanel Raviv, David A. Karpuk:
Private Polynomial Computation from Lagrange Encoding. 1672-1676 - Sarah A. Obead, Hsuan-Yin Lin, Eirik Rosnes, Jörg Kliewer:
Private Polynomial Computation for Noncolluding Coded Databases. 1677-1681 - Danny Dubé, Hidetoshi Yokoo:
Fast Construction of Almost Optimal Symbol Distributions for Asymmetric Numeral Systems. 1682-1686 - Danny Hucke, Markus Lohrey, Louisa Seelbach Benkner:
Entropy Bounds for Grammar-Based Tree Compressors. 1687-1691 - Shuqing Chen, Michelle Effros, Victoria Kostina:
Lossless Source Coding in the Point-to-Point, Multiple Access, and Random Access Scenarios. 1692-1696 - Tomasz Luczak, Abram Magner, Wojciech Szpankowski:
Compression of Preferential Attachment Graphs. 1697-1701 - Yonatan Gutman, Adam Spiewak:
New Uniform Bounds for Almost Lossless Analog Compression. 1702-1706 - Allison Gagliano, Walter O. Krawec, Hasan Iqbal:
From Classical to Semi-Quantum Secure Communication. 1707-1711 - Farzin Salek, Min-Hsiu Hsieh, Javier R. Fonollosa:
Publicness, Privacy and Confidentiality in the Single-Serving Quantum Broadcast Channel. 1712-1716 - Holger Boche, Gisbert Janßen, Sajad Saeedinaeeni:
Simultaneous transmission of classical and quantum information under channel uncertainty and jamming attacks. 1717-1721 - Holger Boche, Minglai Cai, Ning Cai:
Message Transmission over Classical Quantum Channels with a Jammer with Side Information, Correlation as Resource and Common Randomness Generating. 1722-1726 - Seunghoan Song, Masahito Hayashi:
Capacity of Quantum Private Information Retrieval with Multiple Servers. 1727-1731 - Enrico Paolini, Gianluigi Liva:
A Lower Bound on the Error Exponent of Linear Block Codes over the Erasure Channel. 1732-1736 - Han Mao Kiah, Anshoo Tandon, Mehul Motani:
Generalized Sphere-Packing Bound for Subblock-Constrained Codes. 1737-1741 - Jinming Wen, Xiao-Wen Chang, Jian Weng:
Improved Upper Bounds on the Hermite and KZ Constants. 1742-1746 - Peter G. Boyvalenkov, Peter Dragnev, Douglas P. Hardin, Edward B. Saff, Maya Stoyanova:
Linear Programming Bounds for Cardinality and Energy of Codes of Given Min and Max Distances. 1747-1751 - Yu Tsunoda, Yuichiro Fujiwara:
On the Maximum Number of Codewords of X-Codes of Constant Weight Three. 1752-1756 - Hanwen Yao, Arman Fazeli, Alexander Vardy:
Explicit Polar Codes with Small Scaling Exponent. 1757-1761 - Jaume del Olmo Alòs, Javier R. Fonollosa:
Polar Coding for Common Message Only Wiretap Broadcast Channel. 1762-1766 - Min Jang, Seok-Ki Ahn, Hongsil Jeong, Kyung-Joong Kim, Seho Myung, Sang-Hyo Kim, Kyeongcheol Yang:
Puncturing and Shortening for Polar Codes via the Partial Order by Binary Domination. 1767-1771 - Mohammad Rowshan, Emanuele Viterbo:
How to Modify Polar Codes for List Decoding. 1772-1776 - Aditya Ramamoorthy, Li Tang, Pascal O. Vontobel:
Universally Decodable Matrices for Distributed Matrix-Vector Multiplication. 1777-1781 - Hyegyeong Park, Jaekyun Moon:
Irregular Product Coded Computation for High-Dimensional Matrix Multiplication. 1782-1786 - Netanel Raviv, Qian Yu, Jehoshua Bruck, Salman Avestimehr:
Download and Access Trade-offs in Lagrange Coded Computing. 1787-1791 - Suayb S. Arslan:
Distributed Matrix Multiplication with MDS Array BP-XOR Codes for Scaling Clusters. 1792-1796 - Gauri Jagatap, Chinmay Hegde:
Linearly Convergent Algorithms for Learning Shallow Residual Networks. 1797-1801 - Longyun Guo, Jean Honorio, John Morgan:
Cost-Aware Learning for Improved Identifiability with Multiple Experiments. 1802-1806 - Vinay A. Vaishampayan:
Classification in a Large Network. 1807-1811 - Youngjae Min, Hye Won Chung:
Shallow Neural Network can Perfectly Classify an Object following Separable Probability Distribution. 1812-1816 - Lin Zhou, Alfred O. Hero III:
Exponential Strong Converse for Successive Refinement with Causal Decoder Side Information. 1817-1821 - Omer Bilgen, Aaron B. Wagner:
A New Proof for the Quadratic Gaussian Two-Encoder Source-Coding Problem. 1822-1826 - Sung Hoon Lim, Chen Feng, Adriano Pastore, Bobak Nazer, Michael Gastpar:
Towards an Algebraic Network Information Theory: Distributed Lossy Computation of Linear Functions. 1827-1831 - Yinfei Xu, Xuan Guang, Jian Lu:
Vector Gaussian Successive Refinement With Degraded Side Information. 1832-1836 - Mokshay Madiman, Piotr Nayar, Tomasz Tkocz:
On the question of the best additive noise among symmetric log-concave noises. 1837-1841 - Olivier Rioul, Ram Zamir:
Equality in the Matrix Entropy-Power Inequality and Blind Separation of Real and Complex sources. 1842-1846 - Venkat Anantharam, Varun S. Jog, Chandra Nair:
Unifying the Brascamp-Lieb Inequality and the Entropy Power Inequality. 1847-1851 - Nir Weinberger, Yuval Kochman, Michèle A. Wigger:
Exponent Trade-off for Hypothesis Testing Over Noisy Channels. 1852-1856 - Hang Zhang, Martin Slawski, Ping Li:
Permutation Recovery from Multiple Measurement Vectors in Unlabeled Sensing. 1857-1861 - Prafulla Chandra, Andrew Thangaraj:
Concentration and Tail Bounds for Missing Mass. 1862-1866 - Praneeth Narayanamurthy, Vahid Daneshpajooh, Namrata Vaswani:
Provable Subspace Tracking with Missing Entries. 1867-1871 - Emanuele Bellini, Florian Caullery, Philippe Gaborit, Marc Manzano, Víctor Mateu:
Improved Veron Identification and Signature Schemes in the Rank Metric. 1872-1876 - Haoyu Li, Renzhang Liu, Qutaibah M. Malluhi, Yanbin Pan, Yongge Wang, Tianyuan Xie:
Breaking HK17 in Practice. 1877-1881 - Irina E. Bocharova, Thomas Johansson, Boris D. Kudryashov:
Improved iterative decoding of QC-MDPC codes in the McEliece public key cryptosystem. 1882-1886 - Lukas Holzbaur, Hedongliang Liu, Sven Puchinger, Antonia Wachter-Zeh:
On Decoding and Applications of Interleaved Goppa Codes. 1887-1891 - Bashar Huleihel, Oron Sabag, Haim H. Permuter, Navin Kashyap, Shlomo Shamai Shitz:
Computable Upper Bounds for Unifilar Finite-State Channels. 1892-1896 - Chengyu Wu, Guangyue Han, Brian H. Marcus:
A Deterministic Algorithm for the Capacity of Finite-State Channels. 1897-1901 - Ryusei Fujita, Ken-ichi Iwata, Hirosuke Yamamoto:
An Iterative Algorithm to Optimize the Average Performance of Markov Chains with Finite States. 1902-1906 - Semih Yagli, Alex Dytso, H. Vincent Poor, Shlomo Shamai Shitz:
An Upper Bound on the Number of Mass Points in the Capacity Achieving Distribution for the Amplitude Constrained Additive Gaussian Channel. 1907-1911 - Denis S. Krotov, Patrick Solé:
The punctured Dodecacode is uniformly packed. 1912-1916 - Denis S. Krotov:
On Dual Codes in the Doob Schemes. 1917-1921 - Martianus Frederic Ezerman, San Ling, Buket Özkaya, Jareena Tharnnukhroh:
Spectral Bounds for Quasi-Twisted Codes. 1922-1926 - Rodolfo Canto Torres, Jean-Pierre Tillich:
Speeding up decoding a code with a non-trivial automorphism group up to an exponential factor. 1927-1931 - Peter Trifonov:
On Construction of Polar Subcodes with Large Kernels. 1932-1936 - Rajai Nasser:
On the Polarization Levels of Automorphic-Symmetric Channels. 1937-1941 - Thomas Wiegart, Tobias Prinz, Fabian Steiner, Peihong Yuan:
Design of Polar Codes for Parallel Channels with an Average Power Constraint. 1942-1946 - Valerio Bioglio, Ingmar Land, Carlo Condo:
Improved Hybrid Design of Polar Codes and Multi-Kernel Polar Codes. 1947-1951 - B. R. Vinay Kumar, Navin Kashyap:
Probabilistic Forwarding of Coded Packets on Networks. 1952-1956 - Hoover H. F. Yin, Ka Hei Ng, Xishi Wang, Qi Cao:
On the Minimum Delay of Block Interleaver for Batched Network Codes. 1957-1961 - Hoover H. F. Yin, Bin Tang, Ka Hei Ng, Shenghao Yang, Xishi Wang, Qiaoqiao Zhou:
A Unified Adaptive Recoding Framework for Batched Network Coding. 1962-1966 - Hoover H. F. Yin, Xiaoli Xu, Ka Hei Ng, Yong Liang Guan, Raymond W. Yeung:
Packet Efficiency of BATS Coding on Wireless Relay Network with Overhearing. 1967-1971 - Haoyu Fu, Yuejie Chi, Yingbin Liang:
Local Geometry of Cross Entropy Loss in Learning One-Hidden-Layer Neural Networks. 1972-1976 - Hui Xie, Jirong Yi, Weiyu Xu, Raghu Mudumbai:
An Information-Theoretic Explanation for the Adversarial Fragility of AI Classifiers. 1977-1981 - Shao-Lun Huang, Xiangxiang Xu, Lizhong Zheng, Gregory W. Wornell:
An Information Theoretic Interpretation to Deep Neural Networks. 1984-1988 - Changlong Wu, Narayana Santhanam:
Being correct eventually almost surely. 1989-1993 - Daming Cao, Lin Zhou, Vincent Y. F. Tan:
Strong Converse for Hypothesis Testing Against Independence over a Two-Hop Network. 1994-1998 - Minh Thanh Vu, Tobias J. Oechtering, Mikael Skoglund:
Operational Equivalence of Distributed Hypothesis Testing and Identification Systems. 1999-2003 - Sreejith Sreekumar, Deniz Gündüz:
Hypothesis Testing over a Noisy Channel. 2004-2008 - Derya Malak, Muriel Médard, Edmund M. Yeh:
Spatial Soft-Core Caching. 2009-2013 - Eleftherios Lampiris, Aly El Gamal, Petros Elia:
Wyner's Network on Caches: Combining Receiver Caching with a Flexible Backhaul. 2014-2018 - Ke Wang, Youlong Wu, Jiahui Chen, Haoyu Yin:
Reduce Transmission Delay for Caching-Aided Two-Layer Networks. 2019-2023 - Heping Wan, Anders Høst-Madsen, Aria Nosratinia:
Compress-and-Forward via Multilevel Coding. 2024-2028 - Alon Kipnis, Galen Reeves:
Gaussian Approximation of Quantization Error for Estimation from Compressed Data. 2029-2033 - Daewon Seo, Lav R. Varshney:
The CEO Problem with rth Power of Difference Distortion. 2034-2038 - Nirmal V. Shende, Aaron B. Wagner:
Functional Covering of Point Processes. 2039-2043 - Peida Tian, Victoria Kostina:
From Parameter Estimation to Dispersion of Nonstationary Gauss-Markov Processes. 2044-2048 - Alessandro Neri, Sven Puchinger, Anna-Lena Horlemann-Trautmann:
Invariants and Inequivalence of Linear Rank-Metric Codes. 2049-2053 - Chunlei Li:
Interpolation-based Decoding of Nonlinear Maximum Rank Distance Codes. 2054-2058 - Jiun-Hung Yu, Hans-Andrea Loeliger:
Decoding Gabidulin Codes via Partial Inverses of Linearized Polynomials. 2059-2063 - Min Ye, Emmanuel Abbe:
Recursive projection-aggregation decoding of Reed-Muller codes. 2064-2068 - Hangjin Liu, Cynthia Rush, Dror Baron:
An Analysis of State Evolution for Approximate Message Passing with Side Information. 2069-2073 - Ehsan Abbasi, Fariborz Salehi, Babak Hassibi:
Sparse Covariance Estimation from Quadratic Measurements: A Precise Analysis. 2074-2078 - Yonatan Shadmi, Peter Jung, Giuseppe Caire:
Sparse Non-Negative Recovery from Shifted Symmetric Subgaussian Measurements using NNLS. 2079-2083 - Zhongxing Sun, Wei Cui, Yulong Liu:
Recovery of Structured Signals From Corrupted Non-Linear Measurements. 2084-2088 - Boaz Shuval, Ido Tal:
Universal Polarization for Processes with Memory. 2089-2093 - Mengfan Zheng, Ling Liu, Cong Ling:
On the Polarization of Rényi Entropy. 2094-2098 - Rajai Nasser:
On the Convergence of the Polarization Process in the Noisiness/Weak-∗ Topology. 2099-2103 - Ruslan Alexandrovich Morozov, Peter Trifonov:
A Lower Bound on Minimum Distance of Convolutional Polar Codes. 2104-2108 - Yuta Sakai, Ken-ichi Iwata, Hiroshi Fujisaki:
Countably Infinite Multilevel Source Polarization for Non-Stationary Erasure Distributions. 2109-2113 - Yi-Peng Wei, Batuhan Arasli, Karim Banawan, Sennur Ulukus:
Private Information Retrieval from Decentralized Uncoded Caching Databases. 2114-2118 - Tuvi Etzion, Oliver W. Gnilke, David A. Karpuk, Eitan Yaakobi, Yiwei Zhang:
Private Proximity Retrieval. 2119-2123 - Xinyu Yao, Nan Liu, Wei Kang:
The Capacity of Multi-round Private Information Retrieval from Byzantine Databases. 2124-2128 - Yiwei Zhang, Eitan Yaakobi, Tuvi Etzion:
Bounds on the Length of Functional PIR and Batch Codes. 2129-2133 - Yiwei Zhang, Eitan Yaakobi, Tuvi Etzion, Moshe Schwartz:
On the Access Complexity of PIR Schemes. 2134-2138 - Ajaykrishnan Nageswaran, Prakash Narayan:
Predicate Privacy and List Privacy for a ρ-Recoverable Function. 2139-2143 - Joseph M. Renes:
Privacy Amplification, Lossy Compression, and their Duality to Channel Coding. 2144-2148 - Masahito Hayashi:
Secure list decoding. 2149-2153 - Miguel Arrieta, Iñaki Esnaola, Michelle Effros:
Universal Privacy Guarantees for Smart Meters. 2154-2158 - Sreejith Sreekumar, Deniz Gündüz:
Optimal Privacy-Utility Trade-off under a Rate Constraint. 2159-2163 - Kang-Hee Cho, Si-Hyeon Lee, Vincent Y. F. Tan:
Throughput Scaling of Covert Communication over Wireless Adhoc Networks. 2164-2168 - David Kibloff, Samir M. Perlaza, Ligong Wang:
Embedding Covert Information on a Given Broadcast Code. 2169-2173 - Jian Lu, Yinfei Xu, Ping Zhang, Qiao Wang:
Secure Multiterminal Source Coding With Actions. 2174-2178 - Mehrdad Tahmasbi, Matthieu R. Bloch:
Steganography Protocols for Quantum Channels. 2179-2183 - Mehrdad Tahmasbi, Matthieu R. Bloch, Aylin Yener:
In-Band Sensing of the Adversary's Channel for Secure Communication in Wireless Channels. 2184-2188 - Ashwin Verma, R. K. Bansal:
Sequential Change Detection Based on Universal Compression for Markov Sources. 2189-2193 - Javad Heydari, Ali Tajer:
Quickest Search for a Change Point. 2194-2198 - Taposh Banerjee, Prudhvi Gurram, Gene T. Whipps:
Bayesian Quickest Detection of Changes in Statistically Periodic Processes. 2204-2208 - Yu-Jui Huang, Shih-Chun Lin, Yu-Chih Huang:
On Byzantine Distributed Sequential Change Detection with Multiple Hypotheses. 2209-2213 - Cédric Bleuler, Amos Lapidoth, Christoph Pfister:
Gambling and Rényi Divergence. 2214-2218 - Hao-Chung Cheng, Gao Li, Min-Hsiu Hsieh:
Properties of Scaled Noncommutative Rényi and Augustin Information. 2219-2223 - Jiange Li, Arnaud Marsiglietti, James Melbourne:
Rényi Entropy Power Inequalities for s-concave Densities. 2224-2228 - Lei Yu, Vincent Y. F. Tan:
On Exact and ∞-Rényi Common Informations. 2229-2233 - Ryo Nomura:
Source resolvability problem with respect to a certain subclass of f-divergence. 2234-2238 - Anusha Lalitha, Anatoly Khina, Tara Javidi, Victoria Kostina:
Real-time Binary Posterior Matching. 2239-2243 - Christian Deppe, Vladimir S. Lebedev:
Algorithms for Q-ary Error-Correcting Codes with Partial Feedback and Limited Magnitude. 2244-2248 - Kenneth Palacio-Baus, Meysam Asadi, Natasha Devroye:
Error Exponents of Parallel Two-way Discrete Memoryless Channels using Variable Length Coding. 2249-2253 - Kenneth Palacio-Baus, Natasha Devroye:
Variable-length Coding Error Exponents for the AWGN Channel with Noisy Feedback at Zero-Rate. 2254-2258 - Oron Sabag, Haim H. Permuter, Shlomo Shamai Shitz:
Capacity-Achieving Coding Scheme for the MAC with Degraded Message Sets and Feedback. 2259-2263 - Cheng-Yu Pai, Yong-Ting Ni, Yen-Cheng Liu, Meng-Hsien Kuo, Chao-Yu Chen:
Constructions of Two-Dimensional Binary Z-Complementary Array Pairs. 2264-2268 - Dan Zhang:
Zero Correlation Zone Sequences from a Unified Construction of Perfect Polyphase Sequences. 2269-2273 - Min Zeng, Yuan Luo, Min Kyu Song, Hong-Yeop Song:
The FM-linear Complexity of M-ary Sidel'nikov Sequences of Period p - 1 = f • Mλ. 2274-2278 - Palash Sarkar, Sudhan Majhi, Zilong Liu:
A Direct and Generalized Construction of Polyphase Complementary Set With Low PMEPR. 2279-2283 - Shibsankar Das, Udaya Parampalli, Sudhan Majhi, Zilong Liu:
Near-Optimal Zero Correlation Zone Sequence Sets from Paraunitary Matrices. 2284-2288 - Yaniv Fogel, Meir Feder:
Universal Learning of Individual Data. 2289-2293 - Mohsen Ghassemi, Zahra Shakeri, Waheed U. Bajwa, Anand D. Sarwate:
Sample Complexity Bounds for Low-Separation-Rank Dictionary Learning. 2294-2298 - Vidya Muthukumar, Kailas Vodrahalli, Anant Sahai:
Harmless interpolation of noisy data in regression. 2299-2303 - Koby Bibas, Yaniv Fogel, Meir Feder:
A New Look at an Old Problem: A Universal Learning Approach to Linear Regression. 2304-2308 - Debaditya Chaudhuri, Michael Langberg, Michelle Effros:
Secure Network Coding in the Setting in Which a Non-Source Node May Generate Random Keys. 2309-2313 - Shanuja Sasi, B. Sundar Rajan:
Optimal Index Codes for Some Interlinked Cycle Structures with Outer Cycles. 2314-2318 - Bhavana M, Prasad Krishnan:
On Index coding for Complementary Graphs with focus on Circular Perfect Graphs. 2319-2323 - Suman Ghosh, Lakshmi Natarajan:
Codes for Updating Linear Functions over Small Fields. 2324-2328 - Elad Romanov, Or Ordentlich:
Blind Unwrapping of Modulo Reduced Gaussian Vectors: Recovering MSBs from LSBs. 2329-2333 - Tetsunao Matsuta, Tomohiko Uyematsu:
On the Distance Between the Rumor Source and Its Optimal Estimate in a Regular Tree. 2334-2338 - Wei-Ning Chen, I-Hsiang Wang:
On the Price of Source Anonymity in Heterogeneous Parametric Point Estimation. 2339-2343 - Saurabh Sihag, Ali Tajer:
Secure Estimation under Causative Attacks. 2344-2348 - Chong Shangguan, Itzhak Tamo:
Universally Sparse Hypergraphs with Applications to Coding Theory. 2349-2353 - János Körner, Chandra Nair, David Ng:
On the size of pairwise-colliding permutations. 2354-2358 - Ryan Gabrys, Hoang Dau, Charles J. Colbourn, Olgica Milenkovic:
Set-Codes with Small Intersections and Small Discrepancies. 2359-2363 - Yeow Meng Chee, Han Mao Kiah, Hui Zhang:
Lower Bounds for Total Storage of Multiset Combinatorial Batch Codes using Linear Programming. 2364-2368 - Yeow Meng Chee, Tuvi Etzion, Han Mao Kiah, Van Khu Vu, Eitan Yaakobi:
Constrained de Bruijn Codes and their Applications. 2369-2373 - Serge Kas Hanna, Salim El Rouayheb:
List Decoding of Deletions Using Guess & Check Codes. 2374-2378 - Takayuki Nozaki:
Bounded Single Insertion/Deletion Correcting Codes. 2379-2383 - Luca G. Tallini, Nawaf Alqwaifly, Bella Bose:
On Deletion/Insertion of Zeros and Asymmetric Error Control Codes*. 2384-2388 - Aristomenis Tsopelakos, Georgios Fellouris, Venugopal V. Veeravalli:
Sequential anomaly detection with observation control. 2389-2393 - George V. Moustakides:
Detecting Changes in Hidden Markov Models. 2394-2398 - Georgios Rovatsos, Shaofeng Zou, Venugopal V. Veeravalli:
Quickest Detection of a Moving Target in a Sensor Network. 2399-2403 - Yu-Chih Huang, Shih-Chun Lin, Yu-Jui Huang:
A Tight Converse to the Asymptotic Performance of Byzantine Distributed Sequential Change Detection. 2404-2408 - Qin Huang, Simeng Zheng, Yuanhan Ni, Zulin Wang, Shuai Wang:
Querying Policies Based on Sparse Matrices for Noisy 20 Questions. 2409-2413 - Jeremiah Blocki, Venkata Gandikota, Elena Grigorescu, Samson Zhou:
Relaxed Locally Correctable Codes in Computationally Bounded Channels. 2414-2418 - Ron M. Roth:
Analog Error-Correcting Codes. 2419-2423 - Xinmiao Zhang:
Decoding of Generalized Three-Layer Integrated Interleaved Codes. 2424-2428 - Eshed Ram, Yuval Cassuto:
On Decoding Random-Access SC-LDPC Codes. 2429-2433 - Homayoon Hatami, David G. M. Mitchell, Daniel J. Costello Jr., Thomas E. Fuja:
A Modified Min-Sum Algorithm for Quantized LDPC Decoders. 2434-2438 - Pierre Loidreau:
Using algebraic structures to improve LDPC code reconstruction over a noisy channel. 2439-2443 - Tadashi Wadayama, Satoshi Takabe:
Deep Learning-Aided Trainable Projected Gradient Decoding for LDPC Codes. 2444-2448 - Alexios Balatsoukas-Stimming, Aris Filos-Ratsikas:
On the Computational Complexity of Blind Detection of Binary Linear Codes. 2449-2453 - François Cayre, Nicolas Le Bihan:
Complexity and Similarity for Sequences using LZ77-based conditional information measure. 2454-2458 - Holger Boche, Volker Pohl:
On the Algorithmic Solvability of the Spectral Factorization and the Calculation of the Wiener Filter on Turing Machines. 2459-2463 - Magali Bardet, Ayoub Otmani, Mohamed Saeed-Taha:
Permutation Code Equivalence is Not Harder Than Graph Isomorphism When Hulls Are Trivial. 2464-2468 - Seyed Mohammadreza Mousavi Kalan, Mahdi Soltanolkotabi, Amir Salman Avestimehr:
Fitting ReLUs via SGD and Quantized SGD. 2469-2473 - Shao-Lun Huang, Xiangxiang Xu:
On the Robustness of Noisy ACE Algorithm and Multi-Layer Residual Learning. 2474-2478 - Tyler Sypherd, Mario Díaz, Lalitha Sankar, Peter Kairouz:
A Tunable Loss Function for Binary Classification. 2479-2483 - Pinar Sen, Michael Gastpar:
Successive Refinement to Caching for Dynamic Content. 2484-2488 - Tayyebeh Jahani-Nezhad, Mohammad Ali Maddah-Ali:
CodedSketch: Coded Distributed Computation of Approximated Matrix Multiplication. 2489-2493 - Ting-Yi Wu, Anshoo Tandon, Lav R. Varshney, Mehul Motani:
Multicasting Energy and Information Simultaneously. 2494-2498 - Varun S. Jog:
Teaching and learning in uncertainty. 2499-2503 - Dariusz Kalocinski, Tomasz Steifer:
An Almost Perfectly Predictable Process with No Optimal Predictor. 2504-2508 - Joe Suzuki:
Mutual Information Estimation: Independence Detection and Consistency. 2514-2518 - Michal Yemini, Andrea J. Goldsmith:
Optimal Resource Allocation for Cellular Networks with Virtual Cell Joint Decoding. 2519-2523 - Saad Kriouile, Maialen Larrañaga, Mohamad Assaad:
Whittle Index Policy for Multichannel Scheduling in Queueing Systems. 2524-2528 - Sarthak Jain, Mehran Elyasi, Martina Cardone, Soheil Mohajer:
On Simple Scheduling in Half-Duplex Relay Diamond Networks. 2529-2533 - Shahram Shahsavari, Farhad Shirani, Elza Erkip:
On the Fundamental Limits of Multi-user Scheduling under Short-term Fairness Constraints. 2534-2538 - Chao Gan, Jing Yang, Ruida Zhou, Cong Shen:
Online Learning with Diverse User Preferences. 2539-2543 - Jonathan Scarlett, Ilija Bogunovic, Volkan Cevher:
Overlapping Multi-Bandit Best Arm Identification. 2544-2548 - Linqi Song, Christina Fragouli, Devavrat Shah:
Interactions Between Learning and Broadcasting in Wireless Recommendation Systems. 2549-2553 - P. N. Karthik, Rajesh Sundaresan:
Learning to Detect an Odd Markov Arm. 2554-2558 - Francisco Revson Fernandes Pereira, Ruud Pellikaan, Giuliano Gadioli La Guardia, Francisco M. de Assis:
Application of Complementary Dual AG Codes to Entanglement-Assisted Quantum Codes. 2559-2563 - Mario Berta, Christoph Hirche, Eneet Kaur, Mark M. Wilde:
Stein's Lemma for Classical-Quantum Channels. 2564-2568 - Omar Fawzi, Johanna Seif, Dániel Szilágyi:
Approximation algorithms for classical-quantum channel coding. 2569-2573 - Toshiki Matsumine, Toshiaki Koike-Akino, Ye Wang:
Channel Decoding with Quantum Approximate Optimization Algorithm. 2574-2578 - Erik Mårtensson:
The Asymptotic Complexity of Coded-BKW with Sieving Using Increasing Reduction Factors. 2579-2583 - Li-Ping Wang:
Loong: a new IND-CCA-secure code-based KEM. 2584-2588 - Zheng Wang, Cong Ling:
Slice Sampling for Lattice Gaussian Distribution. 2589-2593 - Paolo Santini, Marco Baldi, Franco Chiaraluce:
Cryptanalysis of a One-Time Code-Based Digital Signature Scheme. 2594-2598 - Massimo Battaglioni, Marco Baldi, Franco Chiaraluce, Michael Lentmaier:
Girth Properties of Time-Varying SC-LDPC Convolutional Codes. 2599-2603 - Christopher Boyd, Roope Vehkalahti, Olav Tirkkonen, Antti Laaksonen:
Code Design Principles for Ultra-Reliable Random Access with Preassigned Patterns. 2604-2608 - Alexios Balatsoukas-Stimming, Stefano Rini, Jörg Kliewer:
LDPC Coded Multiuser Shaping for the Gaussian Multiple Access Channel. 2609-2613 - Qianfan Wang, Suihua Cai, Wenchao Lin, Li Chen, Xiao Ma:
Spatially Coupled LDPC Codes via Partial Superposition. 2614-2618 - Su Wang, Borja Peleato:
Coded Caching with Heterogeneous User Profiles. 2619-2623 - Vijith Kumar K. P, Brijesh Kumar Rai, Tony Jacob:
Fundamental Limits of Coded Caching: The Memory Rate Pair (K - 1 - 1/K, 1/(K-1)). 2624-2628 - Vijith Kumar K. P, Brijesh Kumar Rai, Tony Jacob:
Pareto Optimal Schemes in Coded Caching. 2629-2633 - Yousef AlHassoun, Faisal Alotaibi, Aly El Gamal, Hesham El Gamal:
Towards Jointly Optimal Placement and Delivery: To Code or Not to Code in Wireless Caching Networks. 2634-2638 - Kuikui Li, Meixia Tao, Zhiyong Chen:
A Computation-Communication Tradeoff Study for Mobile Edge Computing Networks. 2639-2643 - Nicholas Woolsey, Rong-Rong Chen, Mingyue Ji:
Cascaded Coded Distributed Computing on Heterogeneous Networks. 2644-2648 - Sukjong Ha, Jingjing Zhang, Osvaldo Simeone, Joonhyuk Kang:
Coded Federated Computing in Wireless Networks with Straggling Devices and Imperfect CSI. 2649-2653 - Yaoqing Yang, Matteo Interlandi, Pulkit Grover, Soummya Kar, Saeed Amizadeh, Markus Weimer:
Coded Elastic Computing. 2654-2658 - Baris Nakiboglu:
A Simple Derivation of the Refined SPB for the Constant Composition Codes. 2659-2663 - Lóránt Farkas, Tamás Kói:
Two Contributions to Error Exponents for Asynchronous Multiple Access Channel. 2664-2668 - Neri Merhav:
Error Exponents of Typical Random Codes for the Colored Gaussian Channel. 2669-2673 - Uri Hadar, Jingbo Liu, Yury Polyanskiy, Ofer Shayevitz:
Error Exponents in Distributed Hypothesis Testing of Correlations. 2674-2678 - Jonathan Scarlett:
An Efficient Algorithm for Capacity-Approaching Noisy Adaptive Group Testing. 2679-2683 - Junhan Kim, Byonghyo Shim:
Nearly Sharp Restricted Isometry Condition of Rank Aware Order Recursive Matching Pursuit. 2684-2688 - Luoluo Liu, Sang Peter Chin, Trac D. Tran:
JOBS: Joint-Sparse Optimization from Bootstrap Samples. 2689-2693 - Niklas Koep, Arash Behboodi, Rudolf Mathar:
The Group Restricted Isometry Property for Subgaussian Block Diagonal Matrices. 2694-2698 - Efe Aras, Kuan-Yun Lee, Ashwin Pananjady, Thomas A. Courtade:
A Family of Bayesian Cramér-Rao Bounds, and Consequences for Log-Concave Priors. 2699-2703 - Leighton Pate Barnes, Yanjun Han, Ayfer Özgür:
Fisher Information for Distributed Estimation under a Blackboard Communication Protocol. 2704-2708 - Lekshmi Ramesh, Chandra R. Murthy, Himanshu Tyagi:
Sample-Measurement Tradeoff in Support Recovery Under a Subgaussian Prior. 2709-2713 - Wenda Zhou, Shirin Jalali:
Towards theoretically-founded learning-based denoising. 2714-2718 - Deepesh Data, Linqi Song, Suhas N. Diggavi:
Data Encoding Methods for Byzantine-Resilient Distributed Optimization. 2719-2723 - Deepesh Data, Suhas N. Diggavi:
Byzantine-Tolerant Distributed Coordinate Descent. 2724-2728 - Emre Ozfatura, Deniz Gündüz, Sennur Ulukus:
Speeding Up Distributed Gradient Descent by Utilizing Non-persistent Stragglers. 2729-2733 - Raj Kumar Maity, Ankit Singh Rawat, Arya Mazumdar:
Robust Gradient Descent via Moment Encoding and LDPC Codes. 2734-2738 - Elena Egorova, Marcel Fernandez, Grigory Kabatiansky:
A Construction of Traceability Set Systems with Polynomial Tracing Algorithm. 2739-2742 - Fan Li, Jinyuan Chen:
How to Break the Limits of Secrecy Constraints in Communication Networks? 2743-2747 - Farhad Shirani, Siddharth Garg, Elza Erkip:
A Concentration of Measure Approach to Database De-anonymization. 2748-2752 - Fuchun Lin, Reihaneh Safavi-Naini, Mahdi Cheraghchi, Huaxiong Wang:
Non-Malleable Codes against Active Physical Layer Adversary. 2753-2757 - Ceren Sevinç, Ertem Tuncel:
On the Analysis of Energy-Distortion Tradeoff for Zero-Delay Transmission over Gaussian Broadcast Channels. 2758-2762 - Jithin Ravi, Tobias Koch:
Capacity per Unit-Energy of Gaussian Many-Access Channels. 2763-2767 - Suhas S. Kowshik, Kirill V. Andreev, Alexey A. Frolov, Yury Polyanskiy:
Energy efficient random access for the quasi-static fading MAC. 2768-2772 - Denis S. Krotov, Vladimir N. Potapov:
On two-fold packings of radius-1 balls in Hamming graphs. 2773-2777 - Gabriella Akemi Miyamoto, Marcelo Firer:
Metrics which turn tilings into binary perfect codes. 2778-2782 - Sara D. Cardell, Diego Napp, Marcelo Firer:
Unrestricted Generalized Column Distances: A Wider Definition. 2783-2787 - Roberto Assis Machado, Marcelo Firer:
Weights which respect support and NN-decoding. 2788-2792 - Ankur Mallick, Gauri Joshi:
Rateless Codes for Distributed Computations with Sparse Compressed Matrices. 2793-2797 - Chien-Sheng Yang, Ramtin Pedarsani, Amir Salman Avestimehr:
Timely Coded Computing. 2798-2802 - Qifa Yan, Michèle A. Wigger, Sheng Yang, Xiaohu Tang:
A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes. 2803-2807 - Amirhossein Reisizadeh, Saurav Prakash, Ramtin Pedarsani, Amir Salman Avestimehr:
Tree Gradient Coding. 2808-2812 - Swanand Kadhe, Onur Ozan Koyluoglu, Kannan Ramchandran:
Gradient Coding Based on Block Designs for Mitigating Adversarial Stragglers. 2813-2817 - Han Cai, Ying Miao, Moshe Schwartz, Xiaohu Tang:
On Optimal Locally Repairable Codes with Super-Linear Length. 2818-2822 - Bin Chen, Shu-Tao Xia, Jie Hao:
Improved bounds and Optimal Constructions of Locally Repairable Codes with distance 5 and 6. 2823-2827 - Jie Hao, Kenneth W. Shum, Shu-Tao Xia, Yi-Xian Yang:
Classification of Optimal Ternary (r, δ)-Locally Repairable Codes Attaining the Singleton-like Bound. 2828-2832 - Matthias Grezet, Camilla Hollanti:
The Complete Hierarchical Locality of the Punctured Simplex Code. 2833-2837 - Umberto Martínez-Peñas, Diego Napp:
Locally Repairable Convolutional Codes with Sliding Window Repair. 2838-2842 - Alexander Fengler, Peter Jung, Giuseppe Caire:
SPARCs and AMP for Unsourced Random Access. 2843-2847 - Toshiyuki Tanaka:
Phase Transition in Mixed ℓ2/ℓ1-norm Minimization for Block-Sparse Compressed Sensing. 2848-2852 - Vasileios Nakos:
One-Bit ExpanderSketch for One-Bit Compressed Sensing. 2853-2857 - Wonwoo Cho, Nam Yul Yu:
Security Analysis of Compressed Encryption With Sparse Matrices Against Chosen Plaintext Attacks. 2858-2862 - Assaf Ben-Yishai, Ofer Shayevitz, Young-Han Kim:
Shannon Capacity is Achievable for a Large Class of Interactive Markovian Protocols. 2863-2867 - Assaf Ben-Yishai, Young-Han Kim, Or Ordentlich, Ofer Shayevitz:
The Interactive Capacity of the Binary Symmetric Channel is at Least 1/40 the Shannon Capacity. 2868-2872 - Jingbo Liu, Ayfer Özgür:
New Converses for the Relay Channel via Reverse Hypercontractivity. 2878-2882 - Yasutada Oohama:
An Inequality Useful for Proofs of Strong Converse Theorems in Network Information Theory. 2883-2887 - July X. Li, Pascal O. Vontobel:
Pseudocodeword-based Decoding of Quantum Stabilizer Codes. 2888-2892 - Kao-Yueh Kuo, Ching-Yi Lai:
The Encoding and Decoding Complexities of Entanglement-Assisted Quantum Stabilizer Codes. 2893-2897 - Martianus Frederic Ezerman, San Ling, Buket Özkaya, Patrick Solé:
Good Stabilizer Codes from Quasi-Cyclic Codes over F4 and F9. 2898-2902 - Tejas Gandhi, Piyush Kurur, Rajat Mittal:
Stabilizer codes from modified symplectic forms. 2903-2907 - Trung Can, Narayanan Rengaswamy, A. Robert Calderbank, Henry D. Pfister:
Kerdock Codes Determine Unitary 2-Designs. 2908-2912 - Dennis Ogbe, Chih-Chun Wang, David J. Love:
On the Optimal Delay Amplification Factor of Multi-Hop Relay Channels. 2913-2917 - Kaiming Shen, Reza Khosravi-Farsani, Wei Yu:
Achievable Rates and Outer Bounds for Full-Duplex Relay Broadcast Channel with Side Message. 2918-2922 - Satoshi Takabe, Tadashi Wadayama, Masahito Hayashi:
Asymptotic Analysis on LDPC-BICM Scheme for Compute-and-Forward Relaying. 2923-2927 - Wasim Huleihel, Yury Polyanskiy, Ofer Shayevitz:
Relaying One Bit Across a Tandem of Binary-Symmetric Channels. 2928-2932 - Ran Averbuch, Neri Merhav, Albert Guillén i Fàbregas:
Large Deviations of Typical Random Codes. 2933-2937 - Anelia Somekh-Baruch, Jonathan Scarlett, Albert Guillén i Fàbregas:
A Recursive Cost-Constrained Construction that Attains the Expurgated Exponent. 2938-2942 - Gonzalo Vazquez-Vilar:
On the Error Probability of Optimal Codes in Gaussian Channels under Maximal Power Constraint. 2943-2946 - Josep Font-Segura, Alfonso Martinez, Albert Guillén i Fàbregas:
Asymptotics of the Random Coding Error Probability for Constant-Composition Codes. 2947-2951 - Benjamin Fuller, Lowen Peng:
Continuous-Source Fuzzy Extractors: Source uncertainty and insecurity. 2952-2956 - Denis S. Krotov:
On (2n/3 - 1)-Resilient (n, 2)-Functions. 2957-2961 - Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert S. Coulter, Irene Villa:
On Isotopic Shift Construction for Planar Functions. 2962-2966 - Patrick Ah-Fat, Michael Huth:
Scalable Information Flow Analysis of Secure Three-Party Affine Computations. 2967-2971 - Serdar Boztas:
On the Complexity of the 3XORSUM Problem. 2972-2976 - Kai Wan, Daniela Tuninetti, Mingyue Ji, Giuseppe Caire:
A Novel Cache-aided Fog-RAN Architecture. 2977-2981 - Amirreza Asadzadeh, Giuseppe Caire:
Coded Caching with Small Subpacketization via Spatial Reuse and Content Base Replication. 2982-2986 - Emanuele Parrinello, Ayse Ünsal, Petros Elia:
Optimal Coded Caching under Statistical QoS Information. 2987-2991 - Çagkan Yapar, Kai Wan, Rafael F. Schaefer, Giuseppe Caire:
On D2D Caching with Uncoded Cache Placement. 2992-2996 - Ching-Yi Lai, Kai-Min Chung:
Interactive Leakage Chain Rule for Quantum Min-entropy. 2997-3001 - Christopher T. Chubb, Kamil Korzekwa, Marco Tomamichel:
Moderate deviation analysis of majorisation-based resource interconversion. 3002-3006 - Eyuri Wakakuwa, Yoshifumi Nakata:
One-Shot Randomized and Nonrandomized Partial Decoupling. 3007-3011 - Jayadev Acharya, Ibrahim Issa, Nirmal V. Shende, Aaron B. Wagner:
Measuring Quantum Entropy. 3012-3016 - Mohammad Fahim, Viveck R. Cadambe:
Numerically Stable Polynomially Coded Computing. 3017-3021 - Anindya Bijoy Das, Aditya Ramamoorthy:
Distributed Matrix-Vector Multiplication: A Convolutional Coding Approach. 3022-3026 - Ziwen Pan, Kaushik P. Seshadreesan, William Clark, Mark R. Adcock, Ivan B. Djordjevic, Jeffrey H. Shapiro, Saikat Guha:
Secret key distillation over a pure loss quantum wiretap channel under restricted eavesdropping. 3032-3036 - Hessam Mahdavifar, Najme Ebrahimi:
Secret Key Generation via Pulse-Coupled Synchronization. 3037-3041 - Johannes Rauh, Pradeep Kr. Banerjee, Eckehard Olbrich, Jürgen Jost:
Unique Information and Secret Key Decompositions. 3042-3046 - Reo Eriguchi, Noboru Kunihiro, Mitsugu Iwamoto:
Optimal Multiple Assignment Schemes Using Ideal Multipartite Secret Sharing Schemes. 3047-3051 - Ankit Pensia, Varun S. Jog, Po-Ling Loh:
Mean estimation for entangled single-sample distributions. 3052-3056 - Charalambos D. Charalambous, Christos K. Kourtellaris:
Global Optimality of Encoders and MSE Decoders for Communicating Unstable Markov Processes over Unstable Gaussian Recursive Models with Feedback: A Nonanticipative RDF Approach. 3057-3061 - Chengzhuo Ni, Mengdi Wang:
Maximum Likelihood Tensor Decomposition of Markov Decision Process. 3062-3066 - Jing Hao, Varun S. Jog:
Dual Loomis-Whitney inequalities via information theory. 3067-3071 - Amir Saberi, Farhad Farokhi, Girish N. Nair:
State Estimation via Worst-Case Erasure and Symmetric Channels with Memory. 3072-3076 - Silas L. Fong, Ashish Khisti, Baochun Li, Wai-Tian Tan, Xiaoqing Zhu, John G. Apostolopoulos:
Optimal Streaming Erasure Codes over the Three-Node Relay Network. 3077-3081 - Silas L. Fong, Ashish Khisti, Baochun Li, Wai-Tian Tan, Xiaoqing Zhu, John G. Apostolopoulos:
Optimal Multiplexed Erasure Codes for Streaming Messages with Different Decoding Delays. 3082-3086 - Vinayak Ramkumar, P. Vijay Kumar:
Coded MapReduce Schemes Based on Placement Delivery Array. 3087-3091 - Hamdi Joudeh, Xinping Yi, Bruno Clerckx:
On Multi-Cell Uplink-Downlink Duality with Treating Inter-Cell Interference as Noise. 3092-3096 - Mohamed Salman, Mahesh K. Varanasi:
The Symmetric Capacity of the K-Receiver Interleaved Broadcast Channel with Symmetric Side Information. 3097-3101 - Yao-Chia Chan, Syed Ali Jafar:
Towards an Extremal Network Theory - Robust GDoF Gain of Transmitter Cooperation over TIN. 3102-3106 - Yujie Gu, Ofer Shayevitz:
On the Non-Adaptive Zero-Error Capacity of the Discrete Memoryless Two-Way Channel. 3107-3111 - Elad Domanovitz, Uri Erez:
On the Importance of Asymmetry and Monotonicity Constraints in Maximal Correlation Analysis. 3112-3116 - Lei Yu, Vincent Y. F. Tan:
Exact Channel Synthesis. 3117-3121 - Wael Alghamdi, Flávio P. Calmon:
Mutual Information as a Function of Moments. 3122-3126 - Xueyan Niu, Christopher J. Quinn:
A Measure of Synergy, Redundancy, and Unique Information using Information Geometry. 3127-3131
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.