default search action
ITW 2014: Hobart, Tasmania, Australia
- 2014 IEEE Information Theory Workshop, ITW 2014, Hobart, Tasmania, Australia, November 2-5, 2014. IEEE 2014
- Ram Zamir:
How to design an efficient lattice coding scheme. 1-4 - Bobak Nazer, Michael Gastpar:
Compute-and-forward for discrete memoryless networks. 5-9 - Yu-Chih Huang, Krishna R. Narayanan:
Lattices from codes for harnessing interference: An overview and generalizations. 10-14 - Joseph Jean Boutros, Nicola di Pietro, Nour Basha:
Generalized low-density (GLD) lattices. 15-19 - Brian M. Kurkoski, Ricardo Antonio Parrao Hernandez:
Message variance convergence condition for generalizations of LDLC lattices. 20-24 - Ahmed A. Zewail, Aylin Yener:
The multiple access channel with an untrusted relay. 25-29 - Pak Hou Che, Mayank Bakshi, Chung Chan, Sidharth Jaggi:
Reliable deniable communication with channel uncertainty. 30-34 - K. Sankeerth Rao, Vinod M. Prabhakaran:
A new upperbound for the oblivious transfer capacity of discrete memoryless channels. 35-39 - Pengwei Wang, Reihaneh Safavi-Naini:
An efficient code for Adversarial Wiretap channel. 40-44 - Zhiqing Xiao, Yunzhou Li, Ming Zhao, Jing Wang:
Interactive code to correct and detect omniscient Byzantine adversaries. 45-49 - Mohammad Ali Tebbi, Terence H. Chan, Chi Wan Sung:
Linear programming bounds for robust locally repairable storage codes. 50-54 - Mohammad Ali Tebbi, Terence H. Chan, Chi Wan Sung:
A code design framework for multi-rack distributed storage. 55-59 - Anwitaman Datta:
Locally Repairable RapidRAID Systematic Codes - One simple convoluted way to get it all. 60-64 - Ping Hu, Kenneth W. Shum, Chi Wan Sung:
The fundamental theorem of distributed storage systems revisited. 65-69 - Quan Yu, Chi Wan Sung, Terence H. Chan:
Locally repairable codes over a network. 70-74 - Alex Sprintson:
Reductions techniques for establishing equivalence between different classes of network and index coding problems. 75-76 - Yu Xiang, Young-Han Kim:
A few meta-theorems in network information theory. 77-81 - Michelle Effros, Michael Langberg:
Is there a canonical network for network information theory? 82-86 - Henning Maier, Rudolf Mathar:
Cyclic interference alignment and cancellation in 3-user X- networks with minimal backhaul. 87-91 - Henning Maier, Anas Chaaban, Rudolf Mathar:
Symmetric Degrees of Freedom of the MIMO 3-way channel with MT × MR antennas. 92-96 - Lu Yang, Wei Zhang:
On achievable degrees of freedom of 3-user MIMO interference channels. 97-101 - Edin Zhang, Chiachi Huang:
On feasibility of linear interference alignment with symbol extension for two-cell MIMO interfering multiple access channel. 102-106 - Rick Fritschek, Gerhard Wunder:
Enabling the multi-user generalized degrees of freedom in the Gaussian cellular channel. 107-111 - Hamed Mirghasemi, Jean-Claude Belfiore:
The semantic secrecy rate of the lattice Gaussian coding for the Gaussian wiretap channel. 112-116 - Xiaolu Hou, Fuchun Lin, Frédérique E. Oggier:
Construction and secrecy gain of a family of 5-modular lattices. 117-121 - Maria Angeles Vázquez-Castro:
Arithmetic geometry of compute and forward. 122-126 - Nuwan S. Ferdinand, Brian M. Kurkoski, Behnaam Aazhang, Matti Latva-aho:
Shaping low-density lattice codes using Voronoi integers. 127-131 - Shahab Ghasemi-Goojani, Hamid Behroozi:
On the Ice-Wine problem: Recovering linear combination of codewords over the Gaussian Multiple Access Channel. 132-136 - Olav Geil, Stefano Martin, Ryutaroh Matsumoto, Diego Ruano, Yuan Luo:
Relative generalized Hamming weights of one-point algebraic geometric codes. 137-141 - Jérôme Ducoat, Frédérique E. Oggier:
Rank weight hierarchy of some classes of cyclic codes. 142-146 - Frederic Sala, Ryan Gabrys, Lara Dolecek:
Gilbert-Varshamov-like lower bounds for deletion-correcting codes. 147-151 - Bernhard Haeupler, Michael Mitzenmacher:
Repeated deletion channels. 152-156 - Ching-Yi Lai, Min-Hsiu Hsieh, Hsiao-feng Lu:
A complete MacWilliams theorem for convolutional codes. 157-161 - Masanori Hirotomo, Makoto Takita, Masakatu Morii:
Syndrome decoding of symbol-pair codes. 162-166 - Kasra Vakilinia, Adam R. Williamson, Sudarsan Vasista Srinivasan Ranganathan, Dariush Divsalar, Richard D. Wesel:
Feedback systems using non-binary LDPC codes with a limited number of transmissions. 167-171 - Yixuan Xie, Jinhong Yuan, Yuichiro Fujiwara:
Quantum synchronizable codes from quadratic residue codes and their supercodes. 172-176 - Hiroki Koga:
On the capacity and the zero-error capacity of k-resilient AND anti-collusion codes. 177-181 - Hongbo Si, Haris Vikalo, Sriram Vishwanath:
Haplotype assembly: An information theoretic view. 182-186 - Eirik Rosnes:
Spatially-coupled counter braids. 187-191 - Burak Çakmak, Ole Winther, Bernard H. Fleury:
S-AMP: Approximate message passing for general matrix ensembles. 192-196 - Jun Muramatsu:
Variable-length lossy source code using a constrained-random-number generator. 197-201 - Tomohiko Uyematsu, Tetsunao Matsuta:
Revisiting the rate-distortion theory using smooth max Rényi divergence. 202-206 - Nan Zhang, Badri N. Vellambi, Khoa D. Nguyen:
Delay exponent of variable-length random binning for point-to-point transmission. 207-211 - Ahmad Beirami, Faramarz Fekri:
Fundamental limits of universal lossless one-to-one compression of parametric sources. 212-216 - Ulrich Speidel, T. Aaron Gulliver, Ali Makhdoumi, Muriel Médard:
Using T-codes as locally decodable source codes. 217-221 - Jun'ichi Takeuchi, Andrew R. Barron:
Stochastic Complexity for tree models. 222-226 - Pak Hou Che, Swanand Kadhe, Mayank Bakshi, Chung Chan, Sidharth Jaggi, Alex Sprintson:
Reliable, deniable and hidable communication: A quick survey. 227-231 - Andrew Thangaraj:
Coding for wiretap channels: Channel resolvability and semantic security. 232-236 - Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas N. Diggavi:
On the oblivious transfer capacity region of the binary erasure broadcast channel. 237-241 - Parth Pradhan, Parv Venkitasubramaniam:
Under the radar attacks in dynamical systems: Adversarial privacy utility tradeoffs. 242-246 - Oliver Kosut, Li-Wei Kao:
On generalized active attacks by causal adversaries in networks. 247-251 - Flávio P. Calmon, Mayank Varia, Muriel Médard:
An exploration of the role of principal inertia components in information theory. 252-256 - Christoph Bunte, Amos Lapidoth:
Rényi entropy and quantization for densities. 257-261 - Wei Mao, Babak Hassibi:
Capacity bounds for certain channels with states and the energy harvesting channel. 262-266 - Yonatan Kaspi, Ofer Shayevitz, Tara Javidi:
Searching with measurement dependent noise. 267-271 - Maël Le Treust:
Correlation between channel state and information source with empirical coordination constraint. 272-276 - Amin Sakzad, Emanuele Viterbo:
Unitary precoding for integer-forcing MIMO linear receivers. 277-281 - Elad Domanovitz, Uri Erez:
Performance of precoded integer-forcing for closed-loop MIMO multicast. 282-286 - David A. Karpuk, Camilla Hollanti:
Multi-dimensional and non-uniform constellation optimization via the special orthogonal group. 287-291 - Aris L. Moustakas, Luca Sanguinetti, Mérouane Debbah:
Effects of mobility on user energy consumption and total throughput in a massive MIMO system. 292-296 - Min Li, Iain B. Collings, Stephen V. Hanly, Chunshan Liu, Phil Whiting:
Multicell coordinated scheduling with multiuser ZF beamforming: Policies and performance bounds. 297-301 - Uditha L. Wijewardhana, Marian Codreanu:
Sparse Bayesian learning approach for streaming signal recovery. 302-306 - Jean-Claude Belfiore:
Codes for wireless wiretap channels. 307-308 - Shuiyin Liu, Yi Hong, Emanuele Viterbo:
On measures of information theoretic security. 309-310 - Li-Chia Choo, Cong Ling:
Superposition lattice coding for Gaussian broadcast channel with confidential message. 311-315 - Jinlong Lu, J. Harshan, Frédérique E. Oggier:
A USRP implementation of wiretap lattice codes. 316-320 - Huishuai Zhang, Yingbin Liang, Lifeng Lai:
Key capacity region for a cellular source model. 321-325 - Derrick Wing Kwan Ng, Robert Schober:
Max-min fair wireless energy transfer for secure multiuser communication systems. 326-330 - Omur Ozel, Kaya Tutuncuoglu, Sennur Ulukus, Aylin Yener:
Capacity of the energy harvesting channel with energy arrival information at the receiver. 331-335 - Kaya Tutuncuoglu, Omur Ozel, Aylin Yener, Sennur Ulukus:
State amplification and state masking for the binary energy harvesting channel. 336-340 - Suzhi Bi, Chin Keong Ho, Rui Zhang:
Recent advances in joint wireless energy and information transfer. 341-345 - Xiao Gao, David B. Grayden, Mark D. McDonnell:
Inferring the dynamic range of electrode current by using an information theoretic model of cochlear implant stimulation. 346-350 - Steffen Limmer, Slawomir Stanczak:
On ℓp-norm computation over multiple-access channels. 351-355 - Tansu Alpcan, Tom Everitt, Marcus Hutter:
Can we measure the difficulty of an optimization problem? 356-360 - Jianwei Xie, Sennur Ulukus:
Secure degrees of freedom region of the Gaussian interference channel with secrecy constraints. 361-365 - Mine Alsan, Emre Telatar:
Polarization as a novel architecture to boost the classical mismatched capacity of B-DMCs. 366-370 - Mine Alsan:
Universal polar decoding with channel knowledge at the encoder. 371-375 - Vera Miloslavskaya, Peter Trifonov:
Sequential decoding of polar codes with arbitrary binary kernel. 376-380 - Harish Vangala, Emanuele Viterbo, Yi Hong:
A new multiple folded successive cancellation decoder for polar codes. 381-385 - Peter Trifonov:
Successive cancellation permutation decoding of Reed-Solomon codes. 386-390 - Mohammad S. Karim, Neda Aboutorab, Ali A. Nasir, Parastoo Sadeghi:
Decoding delay reduction in network coded cooperative systems with intermittent status update. 391-395 - Xuan Guang, Jiyong Lu, Fang-Wei Fu:
Locality-preserving secure network coding. 396-400 - Mohammad Esmaeilzadeh, Neda Aboutorab:
Inter-session network coding for transmitting multiple layered streams over single-hop wireless networks. 401-405 - Shenghao Yang, Bin Tang:
From LDPC to chunked network codes. 406-410 - Bin Dai, Zheng Ma:
Feedback enhances the security of degraded broadcast channels with confidential messages and causal channel state information. 411-415 - Fei Lang, Zhixiang Deng, Bao-Yun Wang:
Secure communication of correlated sources over broadcast channels. 416-420 - Meryem Benammar, Pablo Piantanida:
On the secrecy capacity region of the Wiretap Broadcast Channel. 421-425 - Ahmed S. Mansour, Rafael F. Schaefer, Holger Boche:
Secrecy measures for broadcast channels with receiver side information: Joint vs individual. 426-430 - Christian A. Naesseth, Fredrik Lindsten, Thomas B. Schön:
Capacity estimation of two-dimensional channels using Sequential Monte Carlo. 431-435 - Juhua Wang, Guohua Zhang, Quan Zhou, Yang Yang, Rong Sun:
Explicit constructions for type-1 QC-LDPC codes with girth at least ten. 436-440 - Francisco Lázaro Blasco, Gianluigi Liva, Gerhard Bauch:
LT code design for inactivation decoding. 441-445 - Fanny Jardel, Joseph Jean Boutros:
Non-uniform spatial coupling. 446-450 - Md. Noor-A-Rahim, Khoa D. Nguyen, Gottfried Lechner:
Delay-exponent of bilayer anytime code. 451-455 - Sachini Jayasooriya, Sarah J. Johnson, Lawrence Ong, Regina Berretta:
Optimization of graph based codes for belief propagation decoding. 456-460 - Behzad Amiri, Jorge-Arturo Flores-Castro, Lara Dolecek:
Design of non-binary quasi-cyclic LDPC codes by absorbing set removal. 461-465 - Remi A. Chou, Matthieu R. Bloch, Jörg Kliewer:
Low-complexity channel resolvability codes for the symmetric multiple-access channel. 466-470 - Alberto G. Perotti, Branislav M. Popovic:
Enhanced trellis coded multiple access (ETCMA). 471-475 - Lan V. Truong:
Posterior matching scheme for Gaussian multiple access channel with feedback. 476-480 - Shenghao Yang, Soung Chang Liew, Lizhao You, Yi Chen:
Linearly-coupled fountain codes for network-coded multiple access. 481-485 - Sreejith Sreekumar, Sibi Raj B. Pillai, Bikash Kumar Dey:
On the adaptive capacity region of fading MACs with distributed CSI. 486-490 - Joseph Kampeas, Asaf Cohen, Omer Gurewitz:
The capacity of the Multiple Access Channel under distributed scheduling and MMSE decoding. 491-495 - Deepesh Data, Bikash Kumar Dey, Manoj Mishra, Vinod M. Prabhakaran:
How to securely compute the modulo-two sum of binary sources. 496-500 - Ali Makhdoumi, Salman Salamatian, Nadia Fawaz, Muriel Médard:
From the Information Bottleneck to the Privacy Funnel. 501-505 - Annina Bracher, Eran Hof, Amos Lapidoth:
Distributed storage for data security. 506-510 - Mitsugu Iwamoto, Tsukasa Omino, Yuichi Komano, Kazuo Ohta:
A new model of Client-Server Communications under information theoretic security. 511-515 - Yongge Wang, Yvo Desmedt:
Efficient secret sharing schemes achieving optimal information rate. 516-520 - Ye Wang, Prakash Ishwar, Shantanu Rane:
An elementary completeness proof for secure two-party computation primitives. 521-525 - Weifei Zeng, Viveck R. Cadambe, Muriel Médard:
A recursive coding algorithm for two-unicast-Z networks. 526-530 - Homa Esfahanizadeh, Farshad Lahouti, Babak Hassibi:
A matrix completion approach to linear index coding problem. 531-535 - Mingchao Yu, Parastoo Sadeghi, Neda Aboutorab:
On deterministic linear network coded broadcast and its relation to matroid theory. 536-540 - Javad B. Ebrahimi, Mahdi Jafari Siavoshani:
On index coding and graph homomorphism. 541-545 - Kai Cai, Guangyue Han:
On the solvability of three-pair networks with common bottleneck links. 546-550 - Ruchen Duan, Yingbin Liang, Ashish Khisti, Shlomo Shamai:
Dirty interference cancellation for Gaussian broadcast channels. 551-555 - Sung Hoon Lim, Kwang Taik Kim, Young-Han Kim:
Distributed decode-forward for broadcast. 556-560 - Stefano Rini, Shlomo Shamai:
On capacity of the dirty paper channel with fading dirt in the strong fading regime. 561-565 - Meryem Benammar, Pablo Piantanida, Shlomo Shamai:
Multiple description coding for the Compound Broadcast Channel. 566-570 - Behzad Asadi, Lawrence Ong, Sarah J. Johnson:
Coding schemes for a class of receiver message side information in AWGN broadcast channels. 571-575 - Reolyn Heymann, Jos H. Weber, Theo G. Swart, Hendrik C. Ferreira:
Concatenated permutation block codes for correcting single transposition errors. 576-580 - Margreta Kuijper, Anna-Lena Trautmann:
Iterative list-decoding of Gabidulin codes via Gröbner based interpolation. 581-585 - Stefan Farthofer, Andreas Winkelbauer, Gerald Matz:
Achieving positive rates over AWGN channels with quantized feedback and linear processing. 586-590 - Zi Long Liu, Yong Liang Guan, Udaya Parampalli:
A new construction of zero correlation zone sequences from generalized reed-muller codes. 591-595 - Ankur A. Kulkarni:
Insertion and deletion errors with a forbidden symbol. 596-600 - Ravi Motwani, Eitan Yaakobi:
Construction of random input-output codes with moderate block lengths. 601-605 - Michal Horovitz, Tuvi Etzion:
Local rank modulation for flash memories. 606-610 - Daesung Kim, Jeongseok Ha:
Quasi-primitive block-wise concatenated BCH codes for NAND flash memories. 611-615 - Antonio C. de A. Campello Jr., Vinay A. Vaishampayan:
Set avoidance probabilities and bounds on the reliability of erasure coded storage systems. 616-620 - Thomas Westerbäck, Toni Ernvall, Camilla Hollanti:
Almost affine locally repairable codes and matroid theory. 621-625 - Mohamed S. Nafea, Aylin Yener:
Secure degrees of freedom for the MIMO wiretap channel with a multiantenna cooperative jammer. 626-630 - Anatoly Khina, Yuval Kochman, Ashish Khisti:
From ordinary AWGN codes to optimal MIMO wiretap schemes. 631-635 - Shuiyin Liu, Yi Hong, Emanuele Viterbo:
Unshared secret key cryptography: Achieving Shannon's ideal secrecy and perfect secrecy. 636-640 - Ramanan Subramanian, Ingmar Land:
The role of artificial noise in multi-antenna fading wiretap channels: Useful or harmful? 641-645 - Matthieu R. Bloch, Jörg Kliewer:
Strong coordination over a three-terminal relay network. 646-650 - Anne Savard, Claudio Weidmann:
On the multiway relay channel with direct links. 651-655 - Siddhartha Brahma, Ayan Sengupta, Christina Fragouli:
Switched local schedules for diamond networks. 656-660 - Sanjay Karmakar, Mahesh K. Varanasi:
The diversity multiplexing tradeoff of the half-duplex relay network. 661-665 - He Chen, Xiangyun Zhou, Yonghui Li, Peng Wang, Branka Vucetic:
Wireless-powered cooperative communications via a hybrid relay. 666-670
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.