default search action
ITW 2009: Volos, Greece
- Bruce E. Hajek, Leandros Tassiulas, Venkat Anantharam, Ioannis Kontoyiannis:
2009 IEEE Information Theory Workshop, ITW 2009, Volos, Greece, June 10-12, 2009. IEEE 2009, ISBN 978-1-4244-4536-3 - Rudolf Ahlswede, Imre Csiszár:
On oblivious transfer capacity. 1-3 - Imre Csiszár, Prakash Narayan:
Multiterminal secrecy generation. 4 - Soheil Mohajer, Suhas N. Diggavi:
A deterministic approach to wireless network error correction. 5-9 - Sekhar Tatikonda:
Clustering phenomena in message-passing schemes. 10-12 - Nilesh Khude, Vinod M. Prabhakaran, Pramod Viswanath:
Harnessing bursty interference. 13-16 - Peter Harremoës:
Testing goodness-of-fit via rate distortion. 17-21 - Maria Varsamou, Theodore Antonakopoulos:
Coding efficiency and reliability in probe-based storage devices. 22-26 - Danny Dubé, Vincent Beaudoin:
Constructing optimal whole-bit recycling codes. 27-31 - Kostis Xenoulis, Nicholas Kalouptsidis:
On the random coding exponent of nonlinear gaussian channels. 32-36 - Brian P. Dunn, Matthieu R. Bloch, J. Nicholas Laneman:
Secure bits through queues. 37-41 - Majid Nasiri Khormuji, Mikael Skoglund:
Instantaneous forwarding strategies for relay channels with known interference. 42-46 - Deniz Gündüz, Osvaldo Simeone, Andrea Goldsmith, Harold Vincent Poor, Shlomo Shamai:
Relaying simultaneous multicast messages. 47-51 - Osvaldo Simeone, Oren Somekh, Elza Erkip, H. Vincent Poor, Shlomo Shamai:
Multirelay channel with non-ergodic link failures. 52-56 - Amir Salman Avestimehr, M. Amin Khajehnejad, Aydin Sezgin, Babak Hassibi:
Capacity region of the deterministic multi-pair bi-directional relay network. 57-61 - Dayu Huang, Jayakrishnan Unnikrishnan, Sean P. Meyn, Venugopal V. Veeravalli, Amit Surana:
Statistical SVMs for robust detection, supervised learning, and universal classification. 62-66 - Gusztáv Morvai, Benjamin Weiss:
Estimating the residual waiting time for binary stationary time series. 67-70 - Vinay Uday Prabhu, Dimitris Toumpakaris:
An MSE-tunable linear estimator with conditional dominance over least-squares estimation. 71-75 - Nikhil Karamchandani, Rathinakumar Appuswamy, Massimo Franceschetti:
Distributed computation of symmetric functions with binary inputs. 76-80 - Manish Agarwal, Dongning Guo, Michael L. Honig:
Limited feedback for multicarrier block fading channels: A rate distortion approach. 81-85 - Hamid Saeedi, Hossein Pishro-Nik:
On LDPC codes over symmetric channels. 86-90 - Michael Samuel, Michael P. Fitz:
Efficient iterative sphere detectors based on the Schnorr-Euchner enumeration. 91-95 - Imre Csiszár, Frantisek Matús:
On minimization of multivariate entropy functionals. 96-100 - Todd P. Coleman:
A simple memoryless proof of the capacity of the exponential server timing channel. 101-105 - Mokshay M. Madiman, Andrew R. Barron, Abram Kagan, Tinghui Yu:
A model for pricing data bundles based on minimax risks for estimation of a location parameter. 106-109 - Anna Pantelidou, Anthony Ephremides:
A cross-layer view of wireless multicasting under uncertainty. 110-114 - Kostas Christodoulopoulos, Konstantinos Manousakis, Emmanouel A. Varvarigos:
Cross layer optimization of static lightpath demands in transparent WDM optical networks. 115-119 - Ron Dabora, Andrea Goldsmith:
Finite-state broadcast channels with feedback and receiver cooperation. 120-124 - Luísa Lima, João Barros, Muriel Médard, Alberto López Toledo:
Towards secure multiresolution network coding. 125-129 - Soheil Mohajer, Mahdi Jafari Siavoshani, Suhas N. Diggavi, Christina Fragouli:
On the capacity of multisource non-coherent network coding. 130-134 - Omer H. Abdelrahman, Erol Gelenbe:
Queueing performance under Network Coding. 135-139 - Randall A. Berry, David N. C. Tse:
Information theory meets game theory on the interference channel. 140-144 - Christina Aperjis, Michael J. Freedman, Ramesh Johari:
Comparing multilateral and bilateral exchange models for content distribution. 145-146 - Jason R. Marden, Michelle Effros:
A game theoretic approach to network coding. 147-151 - Michael C. Gastpar, Patrick R. Gill, Frédéric E. Theunissen:
Anthropic correction of information estimates. 152-155 - Narayana Santhanam, Janis Dingel, Olgica Milenkovic:
On modeling gene regulatory networks using Markov random fields. 156-160 - Song-Jheng Lin, Shih-Chun Lin, Kai-Sheng Chen, Hsuan-Jung Su:
Coding for noisy quadratic-Gaussian Wyner-Ziv problem : A successive quantization approach. 161-165 - Ebad Ahmed, Aaron B. Wagner:
Binary erasure multiple descriptions: Average-case distortion. 166-170 - Wei Dai, Hoa Vinh Pham, Olgica Milenkovic:
Distortion-rate functions for quantized compressive sensing. 171-175 - Mingkai Shao, Sorina Dumitrescu, Xiaolin Wu:
Rate-distortion optimized network communication using general MDC. 176-180 - Rahul Vaze, Robert W. Heath Jr.:
Optimal amplify and forward strategy for two-way relay channel with multiple relays. 181-185 - Carlos H. M. de Lima, Giuseppe Thadeu Freitas de Abreu:
Analysis of Contention-based relay selection mechanisms in autonomous multi-hop networks. 186-190 - Srinath Puducheri, Thomas E. Fuja:
On the capacity of the erasure multiple relay channel. 191-195 - Qiang Xue, Giuseppe Abreu, Behnaam Aazhang:
Mutual information of amplify-and-forward DSTBCs over the random set relay channel. 196-200 - Sibi Raj Bhaskaran, Linda M. Davis, Alex J. Grant, Stephen V. Hanly, Paul Tune:
Downlink scheduling using compressed sensing. 201-205 - Angelia Nedic, Vijay G. Subramanian:
Approximately optimal utility maximization. 206-210 - Bruce E. Hajek, Sichao Yang:
A mechanism for pricing service guarantees. 211-215 - Tie Liu, Shlomo Shamai:
A channel-enhancement approach to the secrecy capacity of the multiantenna wiretap channel. 216-220 - Michèle A. Wigger, Gerhard Kramer:
Three-user MIMO MACs with cooperation. 221-225 - Mari Kobayashi, Nihar Jindal, Giuseppe Caire:
Optimized training and feedback for MIMO downlink channels. 226-230 - Shirin Jalali, Andrea Montanari, Tsachy Weissman:
An iterative scheme for near optimal and universal lossy compression. 231-235 - Ioannis Kontoyiannis, Christos Gioran:
Efficient random codebooks and databases for lossy compression in near-linear time. 236-240 - Teemu Roos, Bin Yu:
Sparse Markov source estimation via transformed Lasso. 241-245 - Huan Xu, Constantine Caramanis, Shie Mannor:
High dimensional Principal Component Analysis with contaminated data. 246-250 - Jayadev Acharya, Alon Orlitsky, Shengjun Pan:
Recent results on pattern maximum likelihood. 251-255 - Chao Tian, Jun Chen:
Quantization splitting for symmetric K-channel multiple descriptions. 256-260 - Dino Sejdinovic, Robert J. Piechocki, Angela Doufexi:
AND-OR tree analysis of distributed LT codes. 261-265 - Haim H. Permuter, Yossef Steinberg, Tsachy Weissman:
Problems we can solve with a helper. 266-270 - Guangyue Han:
Menger's paths with minimum mergings. 271-275 - Sha Yao, Mikael Skoglund:
Analog network coding mappings in Gaussian multiple-access two-hop channels. 276-280 - Danilo Silva, Frank R. Kschischang:
Universal weakly secure network coding. 281-285 - Ioannis Krikidis, J. Nicholas Laneman, John S. Thompson, Steve McLaughlin:
Stability analysis for cognitive radio with cooperative enhancements. 286-290 - Kyatsandra G. Nagananda, Chandra R. Murthy:
Three-user cognitive channels with cumulative message sharing: An achievable rate region. 291-295 - Emmanouil Spanakis, Apostolos Traganitis, Anthony Ephremides:
Rate region and power considerations in a simple 2×2 interference channel. 296-300 - Ravi Tandon, Sennur Ulukus:
Capacity bounds for the Gaussian interference channel with transmitter cooperation. 301-305 - Pavlos Kazakopoulos, Panayotis Mertikopoulos, Aris L. Moustakas, Giuseppe Caire:
Distribution of MIMO mutual information: A large deviations approach. 306-310 - Amir Salman Avestimehr, Tracey Ho:
Approximate capacity of the symmetric half-duplex Gaussian butterfly network. 311-315 - Ming Xiao, Mikael Skoglund:
M-user cooperative wireless communications based on nonbinary network codes. 316-320 - Adnan Raja, Vinod M. Prabhakaran, Pramod Viswanath:
Reciprocity in linear deterministic networks under linear coding. 321-325 - Ralf Koetter, Michelle Effros, Muriel Médard:
On a theory of network equivalence. 326-330 - Soheil Mohajer, Suhas N. Diggavi, Christina Fragouli, David N. C. Tse:
Capacity of deterministic Z-chain relay-interference network. 331-335 - Xiang He, Aylin Yener:
K-user interference channels: Achievable secrecy rate and degrees of freedom. 336-340 - Masih Nilchian, Vahid Aref, Mohammad Reza Aref:
Partial cognitive relay channel. 341-345
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.