default search action
ITW 2012: Lausanne, Switzerland
- 2012 IEEE Information Theory Workshop, Lausanne, Switzerland, September 3-7, 2012. IEEE 2012, ISBN 978-1-4673-0224-1
- Amit Sahai:
An information-theoretic protocol compiler. 1-4 - Victoria Kostina, Sergio Verdú:
To code or not to code: Revisited. 5-9 - Yuval Kochman, Arya Mazumdar, Yury Polyanskiy:
Results on combinatorial joint source-channel coding. 10-14 - Yuval Kochman, Gregory W. Wornell:
On uncoded transmission and blocklength. 15-19 - Najeeb ul Hassan, Ali Emre Pusane, Michael Lentmaier, Gerhard P. Fettweis, Daniel J. Costello Jr.:
Reduced complexity window decoding schedules for coupled LDPC codes. 20-24 - Arvind Yedla, Yung-Yih Jian, Phong S. Nguyen, Henry D. Pfister:
A simple proof of threshold saturation for coupled vector recursions. 25-29 - Koji Tazoe, Kenta Kasai, Kohichi Sakaniwa:
Efficient termination of spatially-coupled codes. 30-34 - Grégory Demay, Ueli Maurer:
Common randomness amplification: A constructive view. 35-39 - Sachin Kadloor, Negar Kiyavash, Parv Venkitasubramaniam:
Scheduling with privacy constraints. 40-44 - Kumar Viswanatha, Emrah Akyol, Kenneth Rose:
A new achievable region for Gaussian multiple descriptions based on subset typicality. 45-49 - Pål Anders Floor, Anna N. Kim, Tor A. Ramstad, Ilangko Balasingham:
On transmission of multiple Gaussian sources over a Gaussian MAC using a VQLC mapping. 50-54 - Roy Timo, Tobias J. Oechtering, Michèle A. Wigger:
Source coding with conditionally less noisy side information. 55-59 - Ilan Shomorony, Amir Salman Avestimehr:
On the role of deterministic models in K × K × K wireless networks. 60-64 - Emmanuel Abbe, Shao-Lun Huang, Emre Telatar:
Proof of the outage probability conjecture for MISO channels. 65-69 - Michael Langberg, Michelle Effros:
Source coding for dependent sources. 70-74 - Ignacio Cascudo, Ronald Cramer, Chaoping Xing:
The arithmetic codex. 75-79 - Yuval Ishai:
The complexity of information theoretic secure computation. 80 - Ilya Mironov:
Differential privacy as a protocol constraint. 81-83 - Oner Orhan, Deniz Gündüz, Elza Erkip:
Throughput maximization for an energy harvesting communication system with processing cost. 84-88 - Omur Ozel, Ersen Ekrem, Sennur Ulukus:
Gaussian wiretap channel with a batteryless energy harvesting transmitter. 89-93 - Kaya Tutuncuoglu, Aylin Yener:
The energy harvesting multiple access channel with energy storage losses. 94-98 - Manoj Prabhakaran, Vinod M. Prabhakaran:
On secure multiparty sampling for more than two parties. 99-103 - Salil P. Vadhan, Colin Jia Zheng:
Characterizing pseudoentropy. 104-108 - Yevgeniy Dodis, Yu Yu:
Overcoming weak expectations. 109-113 - David Sutter, Joseph M. Renes, Frédéric Dupuis, Renato Renner:
Achieving the capacity of any DMC using only polar codes. 114-118 - Vera Miloslavskaya, Peter Trifonov:
Design of binary polar codes with arbitrary kernel. 119-123 - Yanfei Yan, Cong Ling:
A Construction of lattices from polar codes. 124-128 - Kumar Viswanatha, Emrah Akyol, Tejaswi Nanjundaswamy, Kenneth Rose:
On common information and the encoding of sources that are not successively refinable. 129-133 - Annina Bracher, Amos Lapidoth, Yossef Steinberg:
On feedback, cribbing, and causal state-information on the multiple-access channel. 134-138 - Omur Ozel, Ersen Ekrem, Sennur Ulukus:
Gaussian wiretap channel with an amplitude constraint. 139-143 - Jinfeng Du, Ming Xiao, Mikael Skoglund, Shlomo Shamai:
Short-message noisy network coding with partial source cooperation. 144-147 - Arash Behboodi, Pablo Piantanida:
On the asymptotic spectrum of the error probability of composite networks. 148-152 - Mattias Andersson, Ashish Khisti, Mikael Skoglund:
Secret-key agreement over a non-coherent block-fading MIMO wiretap channel. 153-157 - Madhu Sudan:
Communication amid uncertainty. 158-161 - Chiranjib Choudhuri, Urbashi Mitra:
On Witsenhausen's counterexample: The asymptotic vector case. 162-166 - Behzad Ahmadi, Osvaldo Simeone:
On channels with action-dependent states. 167-171 - Kristen Ann Woyach, Kate Harrison, Gireeja Ranade, Anant Sahai:
Comments on unknown channels. 172-176 - Shun Watanabe, Yasutada Oohama:
Privacy amplification theorem for bounded storage eavesdropper. 177-181 - Jia Wang, Jun Chen:
On vector Gaussian multiterminal source coding. 182-186 - Ilan Shomorony, Amir Salman Avestimehr, Himanshu Asnani, Tsachy Weissman:
Worst-case source for distributed compression with quadratic distortion. 187-191 - Andrew Steele, Susanne Pumplün, Frédérique E. Oggier:
MIDO space-time codes from associative and nonassociative cyclic algebras. 192-196 - Masoud Alipour, Omid Etesami, Ghid Maatouk, Amin Shokrollahi:
Irregular product codes. 197-201 - David G. M. Mitchell, Roxana Smarandache, Daniel J. Costello Jr.:
Constructing good QC-LDPC codes by pre-lifting protographs. 202-206 - Vaneet Aggarwal, Melissa Duarte, Ashutosh Sabharwal, N. K. Shankaranarayanan:
Full- or half-duplex? A capacity analysis with bounded radio resources. 207-211 - Emre Atsan, Raymond Knopp, Suhas N. Diggavi, Christina Fragouli:
Towards integrating Quantize-Map-Forward relaying into LTE. 212-216 - Daniela Tuninetti:
An outer bound for the memoryless two-user interference channel with general cooperation. 217-221 - Zheng Wang, Cong Ling:
Derandomized sampling algorithm for lattice decoding. 222-226 - Stefano Rini, Ernest Kurniawan, Andrea J. Goldsmith:
Combining superposition coding and binning achieves capacity for the Gaussian cognitive interference channel. 227-231 - Xi Liu, Osvaldo Simeone, Elza Erkip:
Lossy computing of correlated sources with fractional sampling. 232-236 - Glenn J. Bradford, J. Nicholas Laneman:
Error exponents for block Markov superposition encoding with varying decoding latency. 237-241 - Seok-Hwan Park, Osvaldo Simeone, Onur Sahin, Shlomo Shamai:
Robust distributed compression for cloud radio access networks. 242-246 - Aman Bhatia, Aravind R. Iyengar, Paul H. Siegel:
Multilevel 2-cell t-write codes. 247-251 - Anxiao Jiang, Yue Li, Jehoshua Bruck:
Bit-fixing codes for multi-level cells. 252-256 - Carl H. Heymann, Hendrik C. Ferreira, Jos H. Weber:
A DC-free multi-mode run-length limited coding scheme. 257-261 - Tarik Kaced, Andrei E. Romashchenko:
On the non-robustness of essentially conditional information inequalities. 262-266 - Satyajit Thakor, Alex J. Grant, Terence Chan:
Compact representation of polymatroid axioms for random variables with conditional independencies. 267-271 - Qi Chen, Raymond W. Yeung:
Characterizing the entropy function region via extreme rays. 272-276 - Inaki Estella Aguerri, Deniz Gündüz:
Capacity of a class of relay channels with state. 277-281 - Ben-Yue Chang, Dariush Divsalar, Lara Dolecek:
Non-binary protograph-based LDPC codes for short block-lengths. 282-286 - Michael J. Neely:
Asynchronous control for coupled Markov decision systems. 287-291 - Amin Karbasi, Morteza Zadimoghaddam:
Sequential group testing with graph constraints. 292-296 - Panu Luosto, Ciprian Doru Giurcaneanu, Petri Kontkanen:
Construction of irregular histograms by penalized maximum likelihood: A comparative study. 297-301 - Eiichi Sakurai, Kenji Yamanishi:
Comparison of dynamic model selection with infinite HMM for statistical model change detection. 302-306 - Annina Bracher, Graeme Pope, Christoph Studer:
Coherence-based probabilistic recovery guarantees for sparsely corrupted signals. 307-311 - Emrah Akyol, Kumar Viswanatha, Kenneth Rose:
On random binning versus conditional codebook methods in multiple descriptions coding. 312-316 - Badri N. Vellambi:
Multi-terminal source coding: Zero-rate encoders cannot enlarge the rate region. 317-321 - Ingmar Land, Claudio Weidmann, Badri N. Vellambi:
Characterizing the rate region of the coded side-information problem. 322-326 - Iryna Andriyanova, Denise Maurice, Jean-Pierre Tillich:
Spatially coupled quantum LDPC codes. 327-331 - Li Chen:
Iterative soft-decision decoding of Hermitian codes. 332-336 - François Simon:
From channel codes to computation codes. 337-341 - Gerhard Kramer:
Networks with in-block memory. 342-346 - Leonidas Georgiadis, Georgios S. Paschos, Leandros Tassiulas, Lavy Libman:
Stability and capacity through evacuation times. 347-351 - Chih-Chun Wang:
Capacity region of two symmetric nearby erasure channels with channel state feedback. 352-356 - Leonid Geller, David Burshtein:
Bounds on the belief propagation threshold of non-binary LDPC codes. 357-361 - Mehdi Molkaraie, Hans-Andrea Loeliger:
Extending monte carlo methods to factor graphs with negative and complex factors. 362-366 - Xishuo Liu, Stark C. Draper, Benjamin Recht:
Suppressing pseudocodewords by penalizing the objective of LP decoding. 367-371 - Shirin Saeedi Bidokhti, Vinod M. Prabhakaran, Suhas N. Diggavi:
On multicasting nested message sets over combination networks. 372-376 - Bobbie Chern, Ayfer Özgür:
Achieving the capacity of the N-relay Gaussian diamond network within logn bits. 377-380 - Ayan Sengupta, I-Hsiang Wang, Christina Fragouli:
Optimizing Quantize-Map-and-Forward relaying for Gaussian diamond networks. 381-385 - Camilo G. Taborda, Fernando Pérez-Cruz:
Derivative of the relative entropy over the poisson and Binomial channel. 386-390 - Mohammad Naghshvar, Michèle A. Wigger, Tara Javidi:
Optimal reliability over a class of binary-input channels with feedback. 391-395 - Ralf R. Müller, Bruhtesfa E. Godana, Mohammad Ali Sedaghat, Johannes B. Huber:
On channel capacity of communication via antenna arrays with receiver noise matching. 396-400 - Shun Watanabe:
Expurgation exponent of leaked information in privacy amplification for binary sources. 401-405 - Amin Gohari, Mohammad Hossein Yassaee, Mohammad Reza Aref:
Secure channel simulation. 406-410 - Mohammad Farzad Pourbabaee, Mohammad Javad Emadi, Arash Gholami Davoodi, Mohammad Reza Aref:
Lattice coding for multiple access channels with common message and additive interference. 412-416 - María Constanza Estela, Laura Luzzi, Cong Ling, Jean-Claude Belfiore:
Analysis of lattice codes for the many-to-one interference channel. 417-421 - Nicola di Pietro, Joseph Jean Boutros, Gilles Zémor, Loïc Brunel:
Integer low-density lattices based on construction A. 422-426 - Bobbie Chern, Idoia Ochoa, Alexandros Manolakos, Albert No, Kartik Venkat, Tsachy Weissman:
Reference based genome compression. 427-431 - Jean-Camille Birget, Desmond S. Lun, Anthony Wirth, Dawei Hong:
A theoretical approach to gene network identification. 432-436 - Arash Einolghozati, Mohsen Sardari, Faramarz Fekri:
Molecular communication between two populations of bacteria. 437-441 - Ramy H. Gohary, Halim Yanikomeroglu:
Grassmannian signalling achieves the ergodic high SNR capacity of the non-coherent MIMO relay channel within an SNR-independent gap. 442-446 - Frederic Knabe, Omar Mohamed, Carolin Huppert:
Achievable sum-rates in Gaussian multiple-access channels with MIMO-AF-relay and direct links. 447-451 - Yu Yu, Xiangxue Li, Haifeng Qian:
Two-source extractors for leaky sources. 452-456 - Anatoly Khina, Or Ordentlich, Uri Erez, Yuval Kochman, Gregory W. Wornell:
Decode-and-forward for the Gaussian relay channel via standard AWGN coding and decoding. 457-461 - Alexandre J. Pierrot, Matthieu R. Bloch:
LDPC-based coded cooperative jamming codes. 462-466 - Somayeh Salimi, Mikael Skoglund:
Secret key agreement using correlated sources over the generalized multiple access channel. 467-471 - Milad Sefidgaran, Aslan Tchamkerten:
On function computation over a cascade network. 472-476 - Tsung-Yi Chen, Dariush Divsalar, Richard D. Wesel:
Chernoff bounds for analysis of rate-compatible sphere-packing with numerous transmissions. 477-481 - Suvarup Saha, Randall A. Berry:
The combinatorial structure of linear deterministic interference channels. 482-486 - David Declercq, Erbao Li, Bane Vasic, Shiva Kumar Planjery:
Approaching maximum likelihood decoding of finite length LDPC codes via FAID diversity. 487-491 - Pablo M. Olmos, Fernando Pérez-Cruz, Luis Salamanca, Juan José Murillo-Fuentes:
Finite-length performance of spatially-coupled LDPC codes under TEP decoding. 492-496 - Ankit Singh Rawat, Sriram Vishwanath:
On locality in distributed storage systems. 497-501 - Shenghao Yang:
Superposition coding for linear operator channels over finite fields. 502-506 - Naveen Goela, Changho Suh, Michael Gastpar:
Network coding with computation alignment. 507-511 - Mladen Kovacevic, Ivan Stanojevic, Vojin Senk:
On the hardness of entropy minimization and related problems. 512-516 - Payam Delgosha, Amin Aminzadeh Gohari:
Information theoretic cutting of a cake. 517-521 - Steffen Schober, Ahmed Mansour:
On the estimation of entropy for unknown support size. 522-526 - Pulkit Grover:
Fundamental limits on power consumption for lossless signal reconstruction. 527-531 - Maria Cláudia Ferrari de Castro, Bartolomeu F. Uchôa Filho, Tiago T. V. Vinhoza, Mario de Noronha-Neto, João Barros:
Improved joint turbo decoding and physical-layer network coding. 532-536 - Peter Trifonov:
On the additive complexity of the cyclotomic FFT algorithm. 537-541 - Igal Sason:
On the entropy of sums of Bernoulli random variables via the Chen-Stein method. 542-546 - Wojciech Kotlowski, Peter Grünwald:
Sequential normalized maximum likelihood in log-loss prediction. 547-551 - Behzad Ahmadi, Osvaldo Simeone, Chiranjib Choudhuri, Urbashi Mitra:
On cascade source coding with a side information "vending machine". 552-556 - Hiroki Kanazawa, Kenji Yamanishi:
An MDL-based change-detection algorithm with its applications to learning piecewise stationary memoryless sources. 557-561 - Bernhard C. Geiger, Gernot Kubin:
Relative information loss in the PCA. 562-566 - Amin Movahed, Ashkan Panahi, Giuseppe Durisi:
A robust RFPI-based 1-bit compressive sensing reconstruction algorithm. 567-571 - Wei Yang, Giuseppe Durisi, Tobias Koch, Yury Polyanskiy:
Diversity versus channel knowledge at finite block-length. 572-576 - Sheng Yang, Mari Kobayashi, David Gesbert, Xinping Yi:
Degrees of freedom of MISO broadcast channel with perfect delayed and imperfect current CSIT. 577-581 - Ligong Wang, Gregory W. Wornell:
Refined analysis of the Poisson channel in the high-photon-efficiency regime. 582-586 - Shahriar Etemadi Tajbakhsh, Parastoo Sadeghi:
Coded cooperative data exchange for multiple unicasts. 587-591 - Petar Popovski, Osvaldo Simeone:
Two-way communication with energy exchange. 592-596 - Shirish Karande:
Retargeting LT codes using XORs at the relay. 597-601 - Stefano Rini:
An extension to the chain graph representation of an achievable scheme. 602-606 - Jun Muramatsu, Shigeki Miyake:
Uniform random number generation by using sparse matrix. 607-611 - François Simon:
Recurrent AMS one-sided channels. 612-616 - Igor Bjelakovic, Holger Boche, Jochen Sommerfeld:
Strong secrecy in arbitrarily varying wiretap channels. 617-621 - Willie K. Harrison, Steven W. McLaughlin:
Equivocations for the simple substitution cipher with erasure-prone ciphertext. 622-626 - Lifeng Lai, Siu-Wai Ho:
Simultaneously generating multiple keys and multi-commodity flow in networks. 627-631 - Samar Agnihotri, Sidharth Jaggi, Minghua Chen:
Analog network coding in general SNR regime: Performance of network simplification. 632-636 - Lu Gan, Kezhi Li, Cong Ling:
Golay meets Hadamard: Golay-paired Hadamard matrices for fast compressed sensing. 637-641 - Vincent Gripon, Michael G. Rabbat, Vitaly Skachek, Warren J. Gross:
Compressing multisets using tries. 642-646 - Mikko Vehkaperä, Yoshiyuki Kabashima, Saikat Chatterjee, Erik Aurell, Mikael Skoglund, Lars K. Rasmussen:
Analysis of sparse representations using bi-orthogonal dictionaries. 647-651 - Md. Zahurul I. Sarkar, Tharmalingam Ratnarajah:
Aspect of security in the cognitive relay assisted interference channels. 652-656 - Hamid G. Bafghi, Babak Seyfe, Mahtab Mirmohseni, Mohammad Reza Aref:
On the achievable rate region of a new Gaussian wiretap channel with side information. 657-661 - Fuchun Lin, Frédérique E. Oggier:
Gaussian wiretap lattice codes from binary self-dual codes. 662-666 - Mohsen Rezaee, Maxime Guillaud:
Limited feedback for interference alignment in the K-user MIMO Interference Channel. 667-671 - Henning Maier, Rudolf Mathar:
Uniform and non-uniform delay-rate tradeoffs in partial ergodic interference alignment. 672-676 - Mostafa Monemizadeh, Ghosheh Abed Hodtani:
Achievable rate regions for compound multiple access channel with channel state information. 677-681 - Arash Amini, Ulugbek Kamilov, Michael Unser:
The analog formulation of sparsity implies infinite divisibility and rules out Bernoulli-Gaussian priors. 682-686
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.