Login / Signup
ITW Fall
2015
2015
2015
Keyphrases
Publications
2015
Wenwen Zhao
,
Lifeng Lai
Distributed testing against independence with conferencing encoders.
ITW Fall
(2015)
Jun Geng
,
Weiyu Xu
,
Lifeng Lai
Detection of correlated components in multivariate Gaussian models.
ITW Fall
(2015)
Ahmed A. Zewail
,
Aylin Yener
The two-hop interference untrusted-relay channel with confidential messages.
ITW Fall
(2015)
Jin-Ho Chung
,
Kyeongcheol Yang
New construction of asymptotically optimal optical orthogonal codes.
ITW Fall
(2015)
Mahed Abroshan
,
Amin Aminzadeh Gohari
,
Sidharth Jaggi
Zero error coordination.
ITW Fall
(2015)
Xiao Huang
,
Salim El Rouayheb
Index coding and network coding via rank minimization.
ITW Fall
(2015)
Tetsunao Matsuta
,
Tomohiko Uyematsu
Achievable rate regions for asynchronous Slepian-Wolf coding systems.
ITW Fall
(2015)
Pritam Mukherjee
,
Sennur Ulukus
Secure degrees of freedom of the interference channel with no eavesdropper CSI.
ITW Fall
(2015)
Ning Liang
,
Wenyi Zhang
A mixed-ADC receiver architecture for massive MIMO systems.
ITW Fall
(2015)
2015 IEEE Information Theory Workshop - Fall (ITW), Jeju Island, South Korea, October 11-15, 2015
ITW Fall
(2015)
Inaki Estella Aguerri
,
Deniz Gündüz
Correlated Gaussian sources over Gaussian weak interference channels.
ITW Fall
(2015)
Amitalok J. Budkuley
,
Bikash Kumar Dey
,
Vinod M. Prabhakaran
Dirty paper arbitrarily varying channel with a state-aware adversary.
ITW Fall
(2015)
Gholamreza Alirezaei
,
Rudolf Mathar
Optimum one-bit quantization.
ITW Fall
(2015)
Gilwon Lee
,
Youngchul Sung
,
Junyeong Seo
How many users are needed for non-trivial performance of random beamforming in highly-directional mm-wave MIMO downlink?
ITW Fall
(2015)
Meryem Benammar
,
Abdellatif Zaidi
Rate-distortion function for a Heegard-Berger problem with two sources and degraded reconstruction sets.
ITW Fall
(2015)
Nima Tavangaran
,
Holger Boche
,
Rafael F. Schaefer
Secret-Key capacity of compound source models with one-way public communication.
ITW Fall
(2015)
Runxin Wang
,
Junya Honda
,
Hirosuke Yamamoto
,
Rongke Liu
,
Yi Hou
Construction of polar codes for channels with memory.
ITW Fall
(2015)
Wentu Song
,
Son Hoang Dau
,
Chau Yuen
Erasure codes with symbol locality and group decodability for distributed storage.
ITW Fall
(2015)
Chandra Thapa
,
Lawrence Ong
,
Sarah J. Johnson
Generalized interlinked cycle cover for index coding.
ITW Fall
(2015)
Farshid Mokhtarinezhad
,
Jörg Kliewer
,
Osvaldo Simeone
Lossy compression with privacy constraints: Optimality of polar codes.
ITW Fall
(2015)
Bruce E. Hajek
,
Yihong Wu
,
Jiaming Xu
Exact recovery threshold in the binary censored block model.
ITW Fall
(2015)
Germán Bassi
,
Pablo Piantanida
,
Shlomo Shamai
The wiretap channel with generalized feedback: Secure communication and key generation.
ITW Fall
(2015)
Maria Angeles Vázquez-Castro
A geometric approach to dynamic network coding.
ITW Fall
(2015)
Vincent Y. F. Tan
Error and erasure exponents for the asymmetric broadcast channel.
ITW Fall
(2015)
Hamed Mirghasemi
,
Jean-Claude Belfiore
Lattice code design criterion for MIMO wiretap channels.
ITW Fall
(2015)
Badri N. Vellambi
,
Jörg Kliewer
,
Matthieu R. Bloch
Strong coordination over multi-hop line networks.
ITW Fall
(2015)
Eirik Rosnes
,
Alexandre Graell i Amat
Analysis of spatially-coupled counter braids.
ITW Fall
(2015)
Renaud-Alexandre Pitaval
,
Lu Wei
,
Olav Tirkkonen
,
Jukka Corander
On the exact volume of metric balls in complex Grassmann manifolds.
ITW Fall
(2015)
Nan Zhang
,
Md. Noor-A.-Rahim
,
Badri N. Vellambi
,
Khoa D. Nguyen
Anytime properties of protograph-based repeat-accumulate codes.
ITW Fall
(2015)
Fatemeh Arbabjolfaei
,
Young-Han Kim
On critical index coding problems.
ITW Fall
(2015)
Jason Castiglione
,
Aleksandar Kavcic
Trellis based lower bounds on capacities of channels with synchronization errors.
ITW Fall
(2015)
Alexey Buzuverov
,
Hussein Al-Shatri
,
Anja Klein
On the degrees of freedom of the three-user MIMO interference channel with delayed CSIT.
ITW Fall
(2015)
Shounak Roy
,
Shayan Garani Srinivasa
Two dimensional error-correcting codes using finite field Fourier transform.
ITW Fall
(2015)
Yanlin Geng
,
Fan Cheng
Duality between finite numbers of discrete multiple access and broadcast channels.
ITW Fall
(2015)
Abdellatif Zaidi
On two terminal interactive source coding for function computation with remote sources.
ITW Fall
(2015)
Min Zhu
,
David G. M. Mitchell
,
Michael Lentmaier
,
Daniel J. Costello Jr.
,
Baoming Bai
Window decoding of Braided Convolutional Codes.
ITW Fall
(2015)
Amaro Barreal
,
Joonas Pääkkönen
,
David A. Karpuk
,
Camilla Hollanti
,
Olav Tirkkonen
A low-complexity message recovery method for Compute-and-Forward relaying.
ITW Fall
(2015)
Liyasi Wu
Locally correcting multiple bits and codes of high rate.
ITW Fall
(2015)
Emrah Akyol
,
Cedric Langbort
,
Tamer Basar
Strategic compression and transmission of information.
ITW Fall
(2015)
Seyed Pooya Shariatpanahi
,
Abolfazl S. Motahari
,
Babak Hossein Khalaj
Content delivery via multi-server coded caching in linear networks.
ITW Fall
(2015)
Lav R. Varshney
Toward limits of constructing reliable memories from unreliable components.
ITW Fall
(2015)
Igal Sason
,
Sergio Verdú
Upper bounds on the relative entropy and Rényi divergence as a function of total variation distance for finite alphabets.
ITW Fall
(2015)
Xuan Guang
,
Jiyong Lu
,
Fang-Wei Fu
Variable-security-level secure network coding.
ITW Fall
(2015)
Kevin Luo
,
Ramy H. Gohary
,
Halim Yanikomeroglu
The capacity of a broadcast channel with Gaussian jamming and a friendly eavesdropper.
ITW Fall
(2015)
Lei Yu
,
Houqiang Li
,
Weiping Li
,
Zixiang Xiong
,
Anders Høst-Madsen
On the energy-delay tradeoff in lossy network communications.
ITW Fall
(2015)
Mehrdad Tahmasbi
,
Faramarz Fekri
On the capacity achieving probability measures for molecular receivers.
ITW Fall
(2015)
Jhordany Rodriguez Parra
,
Terence Chan
,
Ingmar Land
,
Siu-Wai Ho
Authentication for two-way relay channel with Physical-Layer Network coding.
ITW Fall
(2015)
Divesh Aggarwal
,
Alexander Golovnev
A note on lower bounds for non-interactive message authentication using weak keys.
ITW Fall
(2015)
Youlong Wu
Coding schemes for discrete memoryless multicast networks with rate-limited feedback.
ITW Fall
(2015)
Yuxin Chen
,
Changho Suh
Top-K ranking: An information-theoretic perspective.
ITW Fall
(2015)