default search action
ITW 2018: Guangzhou, China
- IEEE Information Theory Workshop, ITW 2018, Guangzhou, China, November 25-29, 2018. IEEE 2018, ISBN 978-1-5386-3599-5
- Bing Dong, Shaoguo Wen, Zhongwei Si:
Optimization of the Factor Graph for the Multiuser Superposition Transmission. 1-5 - Xiangxiang Xu, Shao-Lun Huang, Lizhong Zheng, Lin Zhang:
The Geometric Structure of Generalized Softmax Learning. 1-5 - Anoosheh Heidarzadeh, Fatemeh Kazemi, Alex Sprintson:
Capacity of Single-Server Single-Message Private Information Retrieval with Coded Side Information. 1-5 - Masahito Hayashi:
Secure physical layer network coding versus secure network coding. 1-5 - Rana Ali Amjad:
Information Rates and Error Exponents for Probabilistic Amplitude Shaping. 1-5 - Grigorii Trofimiuk, Peter Trifonov:
Efficient decoding of polar codes with some 16×16 kernels. 1-5 - Minh Thanh Vu, Tobias J. Oechtering, Mikael Skoglund:
Testing in Identification Systems. 1-5 - Qifu Tyler Sun, Hanqi Tang, Zongpeng Li, Xiaolong Yang, Keping Long:
Circular-shift Linear Network Codes with Arbitrary Odd Block Lengths. 1-5 - Runzhou Li, Qin Huang, Zulin Wang:
Encoding of Non-binary Quasi-cyclic Codes by Lin-Chung-Han Transform. 1-5 - Hang Zhang, Afshin Abdi, Faramarz Fekri:
Sparse Recovery of Sign Vectors under Uncertain Sensing Matrices. 1-5 - Qi Chen, Chunming Tang, Zhiqiang Lin:
Locally Repairable Codes with Heterogeneous Locality Constraints. 1-5 - Minoru Kuribayashi, Shodai Suma, Nobuo Funabiki:
Efficient Decoding Algorithm for Cyclically Permutable Code. 1-5 - Anindya Bijoy Das, Li Tang, Aditya Ramamoorthy:
C3LES: Codes for Coded Computation that Leverage Stragglers. 1-5 - Khac-Hoang Ngo, Sheng Yang, Maxime Guillaud:
The Optimal DoF Region for the Two-User Non-Coherent SIMO Multiple-Access Channel. 1-5 - Hoang Dau, Emanuele Viterbo:
Repair Schemes with Optimal I/O Costs for Full-Length Reed-Solomon Codes with Two Parities. 1-5 - Mengke Lian, Christian Häger, Henry D. Pfister:
What Can Machine Learning Teach Us about Communications? 1-5 - Qiwen Wang, Hua Sun, Mikael Skoglund:
The ϵ-error Capacity of Symmetric PIR with Byzantine Adversaries. 1-5 - Shachar Shayovitz, Meir Feder:
Redundancy Capacity Theorem for On-Line Learning Under a Certain Form of Hypotheses Class. 1-5 - Xiangfeng Liu, Ying Li:
Deep MIMO Detection Based on Belief Propagation. 1-5 - Salman Habib, Jörg Kliewer:
Algebraic Optimization of Binary Spatially Coupled Measurement Matrices for Interval Passing. 1-5 - Shao-Lun Huang, Gregory W. Wornell, Lizhong Zheng:
Gaussian Universal Features, Canonical Correlations, and Common Information. 1-5 - Behrooz Tahmasebi, Mohammad Ali Maddah-Ali, Seyed Abolfazl Motahari:
Information Theory of Mixed Population Genome-Wide Association Studies. 1-5 - Weijun Fang, Fang-Wei Fu:
Optimal Cyclic (r, ẟ) Locally Repairable Codes with Unbounded Length. 1-5 - Behzad Asadi, Lawrence Ong, Sarah J. Johnson:
Centralized Caching with Unequal Cache Sizes. 1-5 - Yucheng Liu, Parastoo Sadeghi, Young-Han Kim:
Three-Layer Composite Coding for Index Coding. 1-5 - Yeow Meng Chee, Ryan Gabrys, Alexander Vardy, Van Khu Vu, Eitan Yaakobi:
Reconstruction from Deletions in Racetrack Memories. 1-5 - Oliver Kosut, Jörg Kliewer:
Authentication Capacity of Adversarial Channels. 1-5 - Victor Quintero, Samir Medina Perlaza, Jean-Marie Gorce, H. Vincent Poor:
Approximate Nash Region of the Gaussian Interference Channel with Noisy Output Feedback. 1-5 - Yen-Chin Liao, Hsie-Chia Chang, Shu Lin:
Generalized Globally-Coupled Low-Density Parity-Check Codes. 1-5 - Emanuele Parrinello, Ayse Ünsal, Petros Elia:
Optimal coded caching in heterogeneous networks with uncoded prefetching. 1-5 - Arezou Rezazadeh, Josep Font-Segura, Alfonso Martinez, Albert Guillen i Fabregas:
Multiple-Access Channel with Independent Sources: Error Exponent Analysis. 1-5 - Alex Dytso, Malcolm Egan, Samir Medina Perlaza, H. Vincent Poor, Shlomo Shamai Shitz:
Optimal Inputs for Some Classes of Degraded Wiretap Channels. 1-5 - Josep Font-Segura, Alfonso Martinez, Albert Guillen i Fabregas:
Saddlepoint Approximation of the Cost-Constrained Random Coding Error Probability. 1-5 - Yanling Chen, A. J. Han Vinck:
Systematic [n, n - 2] codes with capability of correcting single- and adjacent transposition errors. 1-5 - Yi-Peng Wei, Sennur Ulukus:
Private Information Retrieval with Private Side Information Under Storage Constraints. 1-5 - Yuxin Liu, Badri N. Vellambi, Young-Han Kim, Parastoo Sadeghi:
On the Capacity Region for Secure Index Coding. 1-5 - Jing Zhong, Roy D. Yates, Emina Soljanin:
Timely Lossless Source Coding for Randomly Arriving Symbols. 1-5 - Jiachun Liao, Oliver Kosut, Lalitha Sankar, Flávio P. Calmon:
Privacy Under Hard Distortion Constraints. 1-5 - Bin Chen, Shu-Tao Xia:
Bandwidth Efficiency of Distance-optimal Scalar Locally Repairable Codes. 1-5 - Cynthia Rush, Kuan Hsieh, Ramji Venkataramanan:
Capacity-achieving sparse regression codes via spatial coupling. 1-5 - Michael Gandelman, Yuval Cassuto:
Treeplication: An Erasure Code that is Almost as Painless as Replication. 1-5 - Zheng Li, Sheng Yang:
A Linearly Precoded Rate Splitting Approach and Its Optimality for MIMO Broadcast Channels. 1-5 - Nitish Mital, Katina Kralevska, Cong Ling, Deniz Gündüz:
Storage-Repair Bandwidth Trade-off for Wireless Caching with Partial Failure and Broadcast Repair. 1-5 - Qiaosheng Eric Zhang, Mayank Bakshi, Sidharth Jaggi:
Covert Communication over Adversarially Jammed Channels. 1-5 - Mingchao Yu, Parastoo Sadeghi:
Approximating Throughput and Packet Decoding Delay in Linear Network Coded Wireless Broadcast. 1-5 - Ali Maatouk, Mohamad Assaad, Anthony Ephremides:
The Age of Updates in a Simple Relay Network. 1-5 - Vincent Y. F. Tan, Si-Hyeon Lee:
Time-Division is Optimal for Covert Communication over Some Broadcast Channels. 1-5 - Amirhossein Reisizadeh, Pedro Abdalla, Ramtin Pedarsani:
Sub-linear Time Stochastic Threshold Group Testing via Sparse-Graph Codes. 1-5 - Mahesh Babu Vaddi, B. Sundar Rajan:
Low Complexity Decoding and Capacity of Index Coding Problems with Symmetric Side-Information. 1-5 - Deyao Zhang, Nan Liu:
Coded Cache Placement for Heterogeneous Cache Sizes. 1-5 - Zhen Mei, Kui Cai, Long Shi:
Information Theoretic Bounds Based Channel Quantization Design for Emerging Memories. 1-5 - Linqi Song, Christina Fragouli, Devavrat Shah:
Recommender Systems over Wireless: Challenges and Opportunities. 1-5 - Guohua Zhang, Yulin Hu, Qinwei He, Juhua Wang:
Type-II Quasi-Cyclic LDPC Codes with Girth Eight from Sidon Sequence. 1-5 - Zuxing Li, Tobias J. Oechtering:
Privacy-Utility Management of Hypothesis Tests. 1-5 - Arman Fazeli, S. Hamed Hassani, Marco Mondelli, Alexander Vardy:
Binary Linear Codes with Optimal Scaling: Polar Codes with Large Kernels. 1-5 - Shengtian Yang, Jun Chen:
A Geometric Property of Relative Entropy and the Universal Threshold Phenomenon for Binary-Input Channels with Noisy State Information at the Encoder. 1-5 - Sreejith Sreekumar, Deniz Gündüz, Asaf Cohen:
Distributed Hypothesis Testing Under Privacy Constraints. 1-5 - Alankrita Bhatt, Jiun-Ting Huang, Young-Han Kim, J. Jon Ryu, Pinar Sen:
Variations on a Theme by Liu, Cuff, and Verdú: The Power of Posterior Sampling. 1-5 - Mohammad-Reza Sadeghi, Farzane Amirzade, Daniel Panario, Amin Sakzad:
A Neural Network Lattice Decoding Algorithm. 1-5 - Qian Yu, Netanel Raviv, Amir Salman Avestimehr:
Coding for Private and Secure Multiparty Computing. 1-5 - Weijun Fang, Fang-Wei Fu, Bin Chen, Shu-Tao Xia:
On Optimal (r, δ)-LRCs with Length n | (q+1). 1-5 - Adrian Tovar Lopez, Varun S. Jog:
Generalization error bounds using Wasserstein distances. 1-5 - Hanzaleh Akbari Nodehi, Seyed Reza Hoseini Najarkolaei, Mohammad Ali Maddah-Ali:
Entangled Polynomial Coding in Limited-Sharing Multi-Party Computation. 1-5 - Zehui Chen, Clayton Schoeny, Lara Dolecek:
Coding Assisted Adaptive Thresholding for Sneak-Path Mitigation in Resistive Memories. 1-5 - Tao Guo, Xuan Guang, Kenneth W. Shum:
Symmetric Multilevel Imperfect Secret Sharing. 1-5 - Borzoo Rassouli, Deniz Gündüz:
Optimal Utility-Privacy Trade-off with Total Variation Distance as a Privacy Measure. 1-5 - Yizhu Wang, Jing Zhou, Wenyi Zhang:
Capacity Bounds for Bandlimited Gaussian Channels With Peak-to-Average-Power-Ratio Constraint. 1-5 - Mahesh Babu Vaddi, B. Sundar Rajan:
On the Broadcast Rate and Fractional Clique Cover of Single Unicast Index Coding Problems. 1-5 - Karthik Nagarjuna, Paul H. Siegel:
Universal Polar Coding for Asymmetric Channels. 1-5 - Soumya Subhra Banerjee, Himanshu Tyagi:
RT-Polar: An HARQ Scheme with Universally Competitive Rates. 1-5 - Luca Barletta, Stefano Rini:
The Degrees of Freedom of the Oversampled Non-Coherent Channel. 1-5 - An Liu, Xihan Chen, Wei Yu, Vincent K. N. Lau, Min-Jian Zhao:
Fronthaul Data Reduction in Massive MIMO Aided C-RAN via Two-timescale Hybrid Compression. 1-5 - Ardhendu Tripathy, Aditya Ramamoorthy:
Zero-error Function Computation on a Directed Acyclic Network. 1-5 - Bryan Liu, Yixuan Xie, Lei Yang, Jinhong Yuan:
An Iterative Soft-Decision Decoding Algorithm with Dynamic Saturation for Short Reed-Solomon Codes. 1-5 - Joseph Kampeas, Asaf Cohen, Omer Gurewitz:
On the Outage Probability of Distributed MAC with ZF Detection. 1-5 - Clayton Schoeny, Irina Alam, Mark Gottscho, Puneet Gupta, Lara Dolecek:
Error Correction and Detection for Computing Memories Using System Side Information. 1-5 - Vinuta V. Gayatri, Pradeep Kiran Sarvepalli:
Decoding Topological Subsystem Color Codes and Generalized Subsystem Surface Codes. 1-5 - Shanxiang Lyu, Christian Porter, Cong Ling:
Performance Limits of Lattice Reduction over Imaginary Quadratic Fields with Applications to Compute-and-Forward. 1-5 - Bin Dai, Linman Yu, Yuan Luo:
New Results on the Wire-tap Channel with Noiseless Feedback. 1-5 - Yigit Ugur, Inaki Estella Aguerri, Abdellatif Zaidi:
Vector Gaussian CEO Problem Under Logarithmic Loss. 1-5 - Tang Liu, Daniela Tuninetti:
An Information Theoretic Converse for the "Consecutive Complete-S" PICOD Problem. 1-5 - Ori Shmuel, Asaf Cohen, Omer Gurewitz:
Asymptotically Optimal Scheduling for Compute-and-Forward. 1-5 - Tongxin Li:
Maximum Likelihood Upper Bounds on the Capacities of Discrete Information Stable Channels. 1-5 - Seyed Pooya Shariatpanahi, Mahdi Jafari Siavoshani, Mohammad Ali Maddah-Ali:
Multi-Message Private Information Retrieval with Private Side Information. 1-5 - Maxime Tremblay, Benjamin Bourassa, David Poulin:
Depth versus Breadth in Convolutional Polar Codes. 1-5 - Mohamed S. Nafea, Aylin Yener:
The Caching Broadcast Channel with a Wire and Cache Tapping Adversary of Type II. 1-5 - Linqi Song, Jie Xu:
Dynamic Edge Caching with Popularity Drifting. 1-5 - Mohsen Heidari, Achilleas Anastasopoulos, S. Sandeep Pradhan:
On The Reliability Function of Discrete Memoryless Multiple-Access Channel with Feedback. 1-5 - Shan Lu, Wei Hou, Jun Cheng, Hiroshi Kamabe:
A New Kind of Nonbinary Uniquely Decodable Codes with Arbitrary Code Length for Multiple-Access Adder Channel. 1-5 - Longguang Li, Stefan M. Moser, Ligong Wang, Michèle A. Wigger:
On the Capacity of MIMO Optical Wireless Channels. 1-5 - Wei Kang, Nan Liu:
An Upper bound on the Error Exponent in Lossless Source Coding with a Helper. 1-5 - Jin Yeong Tan, Lawrence Ong, Behzad Asadi:
The Secure Two-Receiver Broadcast Channel With One-Sided Receiver Side Information. 1-5 - Homa Nikbakht, Michèle A. Wigger, Shlomo Shamai Shitz:
Mixed Delay Constraints at Maximum Sum-Multiplexing Gain. 1-5 - Hsuan-Yin Lin, Siddhartha Kumar, Eirik Rosnes, Alexandre Graell i Amat:
Asymmetry Helps: Improved Private Information Retrieval Protocols for Distributed Storage. 1-5 - Lei Yu, Vincent Y. F. Tan:
Simulation of Random Variables under Rényi Divergence Measures of All Orders. 1-5 - Siddhartha Kumar, Hsuan-Yin Lin, Eirik Rosnes, Alexandre Graell i Amat:
Local Reconstruction Codes: A Class of MDS-PIR Capacity-Achieving Codes. 1-5 - Sarah E. Anderson, Ann Johnston, Gauri Joshi, Gretchen L. Matthews, Carolyn Mayer, Emina Soljanin:
Service Rate Region of Content Access from Erasure Coded Storage. 1-5 - Lukas Holzbaur, Ragnar Freij-Hollanti, Antonia Wachter-Zeh, Camilla Hollanti:
Private Streaming with Convolutional Codes. 1-5 - Joseph J. Boutros, Uri Erez, Johannes Van Wonterghem, Gil I. Shamir, Gilles Zémor:
Geometric shaping: low-density coding of Gaussian-like constellations. 1-5 - Cunlu Zhou, David G. M. Mitchell, Roxana Smarandache:
Free Pseudodistance Growth Rates for Spatially Coupled LDPC Codes over the BEC. 1-5 - Alex Dytso, H. Vincent Poor, Shlomo Shamai Shitz:
Capacity of the Vector Gaussian Channel in the Small Amplitude Regime. 1-5 - Wenchao Lin, Suihua Cai, Baodian Wei, Xiao Ma:
Coding Theorem for Systematic LDGM Codes Under List Decoding. 1-5 - Eleftherios Lampiris, Petros Elia:
Full Coded Caching Gains for Cache-less Users. 1-5 - Xiaokang Wang, Wai Ho Mow:
Joint Channel-Network Decoding for Asynchronous Physical-Layer Network Coding. 1-5 - Hantao Zhang, Cong Shen:
Best Arm Identification for Both Stochastic and Adversarial Multi-armed Bandits. 1-5 - Yanfang Liu, Pablo M. Olmos, David G. M. Mitchell:
On Generalized LDPC Codes for 5G Ultra Reliable Communication. 1-5 - Seunghoan Song, Masahito Hayashi:
Secure Quantum Network Code without Classical Communication. 1-5 - Karim A. Banawan, Sennur Ulukus:
Private Information Retrieval from Multiple Access Channels. 1-5 - Ago-Erik Riet, Vitaly Skachek, Eldho K. Thomas:
Asynchronous Batch and PIR Codes from Hypergraphs. 1-5 - Qifa Yan, Sheng Yang, Michèle A. Wigger:
Storage, Computation, and Communication: A Fundamental Tradeoff in Distributed Computing. 1-5 - Amos Lapidoth, Christoph Pfister:
Testing Against Independence and a Rényi Information Measure. 1-5 - Puning Zhao, Lifeng Lai:
Nonparametric Direct Entropy Difference Estimation. 1-5 - Qifa Yan, Xiaohu Tang, Qingchun Chen:
Placement Delivery Array and Its Applications. 1-5 - Kang Wei, Jun Li, Lingjun Kong, Feng Shu, Yonghui Li:
Read-Voltage Optimization for Finite Code Length in MLC NAND Flash Memory. 1-5 - Masahito Hayashi, Tadashi Wadayama, Ángeles Vázquez-Castro:
Secure Computation-and-Forward Communication with Linear Codes. 1-5 - Amitalok J. Budkuley, Bikash Kumar Dey, Sidharth Jaggi, Vinod M. Prabhakaran:
On the Rate Distortion Function of Arbitrarily Varying Remote Sources. 1-5 - Jingjing Zhang, Osvaldo Simeone:
Cloud-Edge Non-Orthogonal Transmission for Fog Networks with Delayed CSI at the Cloud. 1-5 - Prasad Krishnan:
Coded Caching via Line Graphs of Bipartite Graphs. 1-5 - Xin Huang, Li Chen:
Iterative Multistage Soft Decoding of Multilevel Reed-Solomon Codes. 1-5 - Arya Mazumdar:
Capacity of Locally Recoverable Codes. 1-5 - Fang Liu, Kenneth W. Shum, Wing Shing Wong:
A Distributed Unicast Scheme Based on Schedule Sequences in Ad Hoc Networks. 1-5 - Kaiming Shen, Reza Khosravi-Farsani, Wei Yu:
Capacity Limits of Full-Duplex Cellular Network. 1-5 - Rawad Bitar, Salim El Rouayheb:
Staircase-PIR: Universally Robust Private Information Retrieval. 1-5 - Holger Boche, Minglai Cai, Christian Deppe, Janis Nötzel:
Secret Message Transmission over Quantum Channels under Adversarial Quantum Noise: Secrecy Capacity and Super-activations. 1-5 - Tae-Hwan Lee, Hee-Heon Jung, Jin-Ho Chung:
A New One-Coincidence Frequency-Hopping Sequence Set of Length p2 - p. 1-4 - Hikmet Yildiz, Babak Hassibi:
Optimum Linear Codes with Support Constraints over Small Fields. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.