default search action
Information Theory and Applications 2011: San Diego, CA, USA
- Information Theory and Applications Workshop, ITA 2011, San Diego, California, USA, February 6-11, 2011. IEEE 2011, ISBN 978-1-4577-0361-4
- Emmanuel Abbe:
Randomness and dependencies extraction via polarization. 8-14 - Qiuju Diao, Qin Huang, Shu Lin, Khaled A. S. Abdel-Ghaffar:
A transform approach for analyzing and constructing quasi-cyclic low-density parity-check codes. 15-22 - Ahmad Abu Al Haija, Mai Vu:
Can half-duplex be simply derived from full-duplex communications? 23-27 - Venkat Anantharam, Vivek S. Borkar:
Stochastic approximation with 'bad' noise. 28-29 - George K. Atia, Venugopal V. Veeravalli:
Sensor scheduling for energy-efficient tracking in cluttered environments. 41-49 - Serhat Nazim Avci, Xiaodan Hu, Ender Ayanoglu:
Hitless recovery from link failures in networks with arbitrary topology. 50-55 - Ansuman Adhikary, Vasileios Ntranos, Giuseppe Caire:
Cognitive femtocells: Breaking the spatial reuse barrier of cellular systems. 56-65 - Tsung-Yi Chen, Nambi Seshadri, Richard D. Wesel:
Incremental redundancy: A comparison of a sphere-packing analysis and convolutional codes. 66-70 - Max H. M. Costa:
Noisebergs in Z Gaussian interference channels. 71-76 - David G. M. Mitchell, Michael Lentmaier, Daniel J. Costello Jr.:
AWGN channel analysis of terminated LDPC convolutional codes. 77-81 - Yiwei Song, Natasha Devroye:
Structured interference-mitigation in two-hop networks. 82-87 - Ozgun Y. Bursalioglu, Giuseppe Caire, Dariush Divsalar:
Joint source-channel coding for deep space image transmission using rateless codes. 88-97 - Jeongho Jeon, Anthony Ephremides:
Extending the power of backpressure to correlated traffic. 98-102 - Fatemeh Fazel, Maryam Fazel, Milica Stojanovic:
Design of a random access network for compressed sensing. 103-111 - Pulkit Grover, Anant Sahai, Karthik Ganesan, Jan M. Rabaey:
"Green codes with short wires at the decoder: Fundamental limits and constructions". 112-115 - Yi Gai, Shankar Ganesan, Bhaskar Krishnamachari:
The saturation throughput region of p-persistent CSMA. 116-119 - Ruggero Carli, Giacomo Como, Paolo Frasca, Federica Garin:
Distributed averaging on digital noisy networks. 120-128 - Jerry D. Gibson:
The 3-dB transcoding penalty in digital cellular communications. 129-134 - Alexandre Graell i Amat, Eirik Rosnes:
On the minimum distance properties of weighted nonbinary repeat multiple-accumulate codes. 135-139 - Amites Sarkar, Martin Haenggi:
Percolation in the secrecy graph. 140-145 - Xinyu Zhang, Jiangtao Wen, Yuxing Han, John D. Villasenor:
An improved compressive sensing reconstruction algorithm using linear/non-linear mapping. 146-152 - Tor Helleseth, Sondre Rønjom:
Simplifying algebraic attacks with univariate analysis. 153-159 - Tracey Ho, Sukwon Kim, Yanbo Yang, Michelle Effros, Amir Salman Avestimehr:
On network error correction with limited feedback capacity. 160-162 - Qin Huang, Shu Lin, Khaled A. S. Abdel-Ghaffar:
Error-correcting codes for flash coding. 163-185 - Qin Huang, Qiuju Diao, Shu Lin, Khaled A. S. Abdel-Ghaffar:
Cyclic and quasi-cyclic LDPC codes: New developments. 186-195 - Shirin Jalali, Michelle Effros, Tracey Ho:
On the impact of a single edge on the network coding capacity. 196-200 - Shirin Jalali, Michelle Effros:
Separation of source-network coding and channel coding in wireline networks. 201-207 - Anxiao Jiang, Hongchao Zhou, Jehoshua Bruck:
Maximizing the storage capacity of nonvolatile memories. 208-216 - Irina E. Bocharova, Florian Hug, Rolf Johannesson, Boris D. Kudryashov:
On the exact bit error probability for Viterbi decoding of convolutional codes. 217-222 - Luis Alfonso Lastras-Montaño, Patrick J. Meaney, Eldee Stephens, Barry M. Trager, James A. O'Connor, Luiz C. Alves:
A new class of array codes for memory storage. 223-232 - Jungwon Lee, Dimitris Toumpakaris, Wei Yu:
Interference mitigation via joint detection in a fading environment. 233-239 - Haoyang Liu, Keqin Liu, Qing Zhao:
Learning and sharing in a changing world: Non-Bayesian restless bandit with multiple players. 240-246 - Manu Sharma, Xiaojun Lin:
OFDM downlink scheduling for delay-optimality: Many-channel many-source asymptotics with general arrival processes. 247-256 - Alfonso Martinez, Albert Guillen i Fabregas:
Saddlepoint approximation of random-coding bounds. 257-262 - Zhoujia Mao, Can Emre Koksal, Ness B. Shroff:
Towards achieving full secrecy rate in wireless networks: A control theoretic approach. 263-270 - Sriram Venkateswaran, Sumit Singh, Upamanyu Madhow, Raghuraman Mudumbai:
Distributed synchronization and medium access in wireless mesh networks. 271-278 - Ivana Maric, Bojan Bostjancic, Andrea Goldsmith:
Resource allocation for constrained backhaul in picocell networks. 279-284 - Ian A. Kash, Michael Mitzenmacher, Justin Thaler, Jonathan R. Ullman:
On the zero-error capacity threshold for deletion channels. 285-289 - Raj Rao Nadakuditi, Mingyan Liu:
Latency-optimizing file splitting for transmission over a large multi-hop network. 290-295 - Esa Ollila, Visa Koivunen, H. Vincent Poor:
Complex-valued signal processing - essential models, tools and statistics. 296-305 - Pedro C. Pinto, João Barros, Moe Z. Win:
Wireless secrecy in large-scale networks. 306-315 - Gregory J. Pottie:
Fair resource allocation in one-dimensional cellular systems. 316-323 - Marco Martalò, Marco Picone, Michele Amoretti, Gianluigi Ferrari, Riccardo Raheli:
Randomized network coding in distributed storage systems with layered overlay. 324-330 - Ye Wang, Shantanu Rane, Stark C. Draper, Prakash Ishwar:
An information-theoretic analysis of revocability and reusability in secure biometrics. 331-340 - Chenwei Wang, Haralabos C. Papadopoulos, Sean A. Ramprashad, Giuseppe Caire:
Design and operation of Blind Interference Alignment in cellular and cluster-based systems. 341-350 - Min Li, Osvaldo Simeone, Aylin Yener:
Message and state cooperation in a relay channel when the relay has strictly causal state information. 351-356 - Byungju Lee, Byonghyo Shim:
A vector perturbation based user selection for multi-antenna downlink channels. 357-360 - Harpreet S. Dhillon, Radha Krishna Ganti, Jeffrey G. Andrews:
A tractable framework for coverage and outage in heterogeneous cellular networks. 361-366 - Itzhak Tamo, Moshe Schwartz:
On optimal anticodes over permutations with the infinity norm. 367 - Rajiv Soundararajan, Sriram Vishwanath:
Quantization using compressive sensing. 368-373 - Damla Ozgul, Alex Sprintson:
An algorithm for cooperative data exchange with cost criterion. 374-377 - Nargiz Kalantarova, Kyeongyeon Kim, Suleyman Serdar Kozat, Andrew C. Singer:
Nonlinear turbo equalization using context trees. 378-382 - Ulrich Tamm:
Possible applications of information theory in logistics. 383-385 - Daniela Tuninetti:
A new sum-rate outer bound for interference channels with three source-destination pairs. 386-393 - Kwang Taik Kim, Chan-Soo Hwang, Vahid Tarokh:
Network error correction from matrix network coding. 394-402 - Niloofar Fazlollahi, David Starobinski, Ari Trachtenberg:
Connecting identifying codes and fundamental bounds. 403-409 - Badri N. Vellambi, Nima Torabkhani, Faramarz Fekri:
Study of throughput and delay in finite-buffer line networks. 410-414 - Chiunlin Lim, Ao Tang:
Dynamic speed scaling and load balancing of interconnected queues. 415-424 - Lav R. Varshney, Joong Bum Rhim, Kush R. Varshney, Vivek K. Goyal:
Categorical decision making by people, committees, and crowds. 425-434 - Taposh Banerjee, Venugopal V. Veeravalli:
Bayesian quickest change detection under energy constraints. 435-444 - Pascal O. Vontobel:
A combinatorial characterization of the Bethe and the Kikuchi partition functions. 445-454 - Jiadong Wang, Lara Dolecek, Richard D. Wesel:
LDPC absorbing sets, the null space of the cycle consistency matrix, and Tanner's constructions. 455-459 - Yuval Kochman, Gregory W. Wornell:
Finite multi-coset sampling and sparse arrays. 460-466 - Hans-Andrea Loeliger, Lukas Bolliger, Georg Wilckens, Jonas Biveroni:
Analog-to-digital conversion using unstable filters. 467-470 - Amos Lapidoth, Andreas Malär, Michèle A. Wigger:
Constrained Wyner-Ziv source coding. 471-472 - Lin Zheng, Da-ke He, En-Hui Yang:
On the information theoretic performance comparison of causal video coding and predictive video coding. 473-479 - Roy D. Yates, David Tse:
K user fading broadcast channels with CSI at the receivers. 480-485 - Silas L. Fong, Raymond W. Yeung:
Capacity bounds for full-duplex two-way relay channel with feedback. 486-495 - Angela I. Barbero, Eirik Rosnes, Guang Yang, Øyvind Ytrehus:
Constrained codes for passive RFID communication. 496-504 - Yang Yang, Zixiang Xiong:
An improved lattice-based scheme for lossy distributed compression of linear functions. 505-509 - Xinmiao Zhang, Yu Zheng:
Efficient codeword recovery architecture for low-complexity Chase Reed-Solomon decoding. 510-513 - Nicolò Michelusi, Osvaldo Simeone, Marco Levorato, Petar Popovski, Michele Zorzi:
Optimal cognitive transmission exploiting redundancy in the primary ARQ process. 514-523 - Jinyuan Chen, Arun Kumar Singh, Petros Elia, Raymond Knopp:
Interference neutralization for separated multiuser uplink-downlink with distributed relays. 524-532 - Francesco Negro, Irfan Ghauri, Dirk T. M. Slock:
Deterministic annealing design and analysis of the Noisy MIMO Interference Channel. 533-542
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.