default search action
Information Theory and Applications 2016: La Jolla, CA, USA
- 2016 Information Theory and Applications Workshop, ITA 2016, La Jolla, CA, USA, January 31 - February 5, 2016. IEEE 2016, ISBN 978-1-5090-2529-9
- Felipe Gómez-Cuba, Michele Zorzi:
Optimal link scheduling in millimeter wave multi-hop networks with space division multiple access. 1-9 - Eirik Rosnes, Michael Helmling:
On adaptive linear programming decoding of linear codes over GF(8). 1-10 - Omur Ozel, Venkat Anantharam:
State estimation in energy harvesting systems. 1-9 - Olivier Rioul, Max H. M. Costa:
On some almost properties. 1-5 - Chinwendu Enyioha, Sindri Magnússon, Kathryn Heal, Na Li, Carlo Fischione, Vahid Tarokh:
Robustness analysis for an online decentralized descent power allocation algorithm. 1-8 - Max H. M. Costa, Chandra Nair:
Gaussian Z-interference channel: Around the corner. 1-6 - Shahid Mehraj Shah, A. Krishna Chaitanya, Vinod Sharma:
Resource allocation in fading multiple access wiretap channel via game theoretic learning. 1-7 - Babak Mamandipoor, Amin Arbabian, Upamanyu Madhow:
New models and super-resolution techniques for short-range radar: Theory and experiments. 1-7 - Chao He, Richard D. Gitlin:
Limiting performance of massive MIMO downlink cellular systems. 1-6 - Seok-Ho Chang, Meesue Shin, Jihwan P. Choi, Jun Won Choi:
Full and partial frequency reuses for the layered bitstream transmission. 1-4 - Matthew G. Reyes, David L. Neuhoff:
Minimum conditional description length estimation for Markov random fields. 1-6 - Onur Kaya, Nugman Su, Sennur Ulukus, Mutlu Koca:
Delay tolerant cooperation in the energy harvesting multiple access channel. 1-8 - Wassim Tabikh, Dirk T. M. Slock, Yi Yuan-Wu:
Optimal beamforming with combined channel and path CSIT for multi-cell multi-user MIMO. 1-6 - Onkar Dabeer:
Fast distributed multi-channel MAC for achieving FDM in unlicensed spectrum. 1-4 - Nuria González Prelcic, Roi Méndez-Rial, Robert W. Heath Jr.:
Radar aided beam alignment in MmWave V2I communications supporting antenna diversity. 1-7 - Anum Ali, Nuria González Prelcic, Robert W. Heath Jr.:
Estimating millimeter wave channels using out-of-band measurements. 1-6 - Jhelum Chakravorty, Aditya Mahajan:
Fundamental limits of remote estimation of autoregressive Markov processes under communication constraints. 1-16 - Yongjune Kim, B. V. K. Vijaya Kumar:
Duality between erasures and defects. 1-10 - Nima Riahi, Peter Gerstoft:
Locating sources in a dense array through network-based clustering. 1-8 - Sudarsan V. S. Ranganathan, Kasra Vakilinia, Lara Dolecek, Dariush Divsalar, Richard D. Wesel:
Some results on spatially coupled protograph LDPC codes. 1-6 - Navid Tafaghodi Khajavi, Anthony Kuh:
The quality of tree approximation from AUC bounds. 1-7 - Ebrahim MolavianJazi, Aylin Yener:
Lossy subset source coding. 1-10 - Abbas Termos, Bertrand M. Hochwald:
Capacity benefits of antenna coupling. 1-5 - Luong Nguyen, Sangtae Kim, Byonghyo Shim:
Localization in Internet of Things network: Matrix completion approach. 1-4 - Yashar M. Aval, Sarah Kate Wilson, Milica Stojanovic:
Differentially coherent detection: Lower complexity, higher capacity? 1-5 - Abdulrahman Baknina, Omur Ozel, Sennur Ulukus:
Energy harvesting communications under temperature constraints. 1-10 - Anoosheh Heidarzadeh, Alex Sprintson:
Optimal exchange of data over broadcast networks with adversaries. 1-5 - Abhishek K. Gupta, Jeffrey G. Andrews, Robert W. Heath Jr.:
Can operators simply share millimeter wave spectrum licenses? 1-7 - Kasper Fløe Trillingsgaard, Petar Popovski:
Encoding of control information and data for downlink broadcast of short packets. 1-5 - Claudio M. Qureshi, Sueli I. R. Costa:
On perfect q-ary codes in the maximum metric. 1-4 - Matthew Boring, Shawn K. Kelly, Jeffrey A. Weldon, Michael J. Tarr, Amanda Robinson, Marlene Behrmann, Pulkit Grover:
Containing errors in computations for neural sensing: Does a hierarchical-referencing strategy lead to energy savings? 1-5 - Daniel Munoz-Alvarez, Lang Tong:
On the efficiency of connection charges under renewable integration in distribution systems. 1-6 - Naveen Goela, Jean Bolot:
Encoding movies and data in DNA storage. 1 - Evangelos Chatziafratis, Yingrui Zhang, Osman Yagan:
On the robustness of power systems: Optimal load-capacity distributions and hardness of attacking. 1-10 - Sanjib Sur, Xinyu Zhang:
Scoping environment for robust 60 GHz link deployment. 1-6 - Antonios Michaloliakos, Weng-Chon Ao, Konstantinos Psounis:
Joint user-beam selection for hybrid beamforming in asynchronously coordinated multi-cell networks. 1-10 - Juane Li, Shu Lin, Khaled A. S. Abdel-Ghaffar, William E. Ryan, Daniel J. Costello Jr.:
Globally coupled LDPC codes. 1-10 - Hans-Andrea Loeliger, Lukas Bruderer, Hampus Malmberg, Federico Wadehn, Nour Zalmai:
On sparsity by NUV-EM, Gaussian message passing, and Kalman smoothing. 1-10 - Avhishek Chatterjee, Lav R. Varshney:
Energy-reliability limits in nanoscale circuits. 1-6 - Seyyed A. Fatemi, Anthony Kuh, Vijay Gupta:
Energy efficient scheduling algorithms for pumping water in radial networks. 1-6 - Hemant Saggar, Greg Pottie, Babak Daneshrad:
On maximizing the average capacity with interference alignment in a time varying channel. 1-5 - Yanina Shkel, Sergio Verdú:
A coding theorem for f-separable distortion measures. 1-7 - Shanyu Zhou, Hulya Seferoglu, Erdem Koyuncu:
Blocking avoidance in wireless Networks. 1-6 - Martin Mittelbach, Eduard A. Jorswieck:
A coding theorem and converse of Kadota and Wyner revisited. 1-6 - Yuksel Ozan Basciftci, Ye Wang, Prakash Ishwar:
On privacy-utility tradeoffs for constrained data release mechanisms. 1-6 - Yatao Bian, Alexey Gronskiy, Joachim M. Buhmann:
Information-theoretic analysis of MaxCut algorithms. 1-5 - Alex Dytso, Ronit Bustin, Daniela Tuninetti, Natasha Devroye, H. Vincent Poor, Shlomo Shamai Shitz:
On communications through a Gaussian noise channel with an MMSE disturbance constraint. 1-8 - Wenyi Zhang:
A remark on channels with transceiver distortion. 1-4 - Parinaz Naghizadeh, Mingyan Liu:
Inter-temporal incentives in security information sharing agreements. 1-8 - En-Hui Yang:
On coding for data analytics: New information distances. 1-6 - Peter Marbach:
The structure of communities in information networks. 1-6 - Ulrich Tamm:
Communication complexity of functions related to set intersection. 1-4 - Rama Chellappa, Jun-Cheng Chen, Rajeev Ranjan, Swami Sankaranarayanan, Amit Kumar, Vishal M. Patel, Carlos Domingo Castillo:
Towards the design of an end-to-end automated system for image and video-based recognition. 1-7 - Srdan Brkic, Predrag Ivanis, Bane Vasic, David Declercq:
Message-aggregation enhanced iterative hard-decision decoders. 1-8 - Bane Vasic, Predrag Ivanis, David Declercq, Khoa LeTrung:
Approaching maximum likelihood performance of LDPC codes by stochastic resonance in noisy iterative decoders. 1-9 - Chien-Yi Wang, Sung Hoon Lim, Michael Gastpar:
A new converse bound for coded caching. 1-6 - Shay Moran, Amir Yehudayoff:
Sample compression schemes for VC classes. 1-14 - Anna Scaglione:
Continuous-time marginal pricing of power trajectories in power systems. 1-6 - Yalagala Naresh, Ananthanarayanan Chockalingam:
On media-based modulation using RF mirrors. 1-10 - Kemal Davaslioglu, Cemil Can Coskun, Ender Ayanoglu:
New algorithms for maximizing cellular wireless network energy efficiency. 1-10 - Ankit Singh Rawat, Onur Ozan Koyluoglu, Sriram Vishwanath:
Progress on high-rate MSR codes: Enabling arbitrary number of helper nodes. 1-6 - Wei Zhou, Shu Lin, Khaled A. S. Abdel-Ghaffar:
Fire codes capable of correcting bursts beyond their guaranteed burst-correcting capabilities. 1-5 - Kingo Kobayashi, Hajime Sato, Mamoru Hoshi:
The number of paths in boundary restricted Pascal triangle. 1-10 - Siddhartha S. Borkotoky, Michael B. Pursley:
Network-coded file distribution in an ad hoc relay network. 1-5 - Kush R. Varshney:
Engineering safety in machine learning. 1-5 - Toby Berger, Mustafa Sungkar:
Barndorff-Nielsen diffusions model neurons in primary sensory cortex. 1-4 - David R. Wasserman:
Designing polar codes to minimize the BER of CRC-aided list decoding. 1-3 - Lav R. Varshney, Preethi Jyothi, Mark Hasegawa-Johnson:
Language coverage for mismatched crowdsourcing. 1-9 - Thomas Steinke, Jonathan R. Ullman:
Interactive fingerprinting codes and the hardness of preventing false discovery. 1-41 - Arnob Ghosh, Saswati Sarkar:
Secondary spectrum oligopoly market over large locations. 1-10 - Lorenzo Coviello, Massimo Franceschetti, Manuel García-Herranz, Iyad Rahwan:
Predicting and containing epidemic risk using friendship networks. 1-7 - Alvaro Martín, Gadiel Seroussi:
Asymptotically tight bounds on the depth of estimated context trees. 1-3 - Hao-Jun Michael Shi, Mindy Case, Xiaoyi Gu, Shenyinying Tu, Deanna Needell:
Methods for quantized compressed sensing. 1-9 - Shahrouz Khalili, Osvaldo Simeone:
Control-data separation in cloud RAN: The case of uplink HARQ. 1-5 - Gugan Thoppe, Vivek S. Borkar:
A concentration result for stochastic approximation (Extended abstract). 1-2
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.