Abstract is missing.
- MAC polar codes and matroidsEmmanuel Abbe, Emre Telatar. 8-15 [doi]
- Quasi-cyclic LDPC codes on Latin squares and the ranks of their parity-check matricesLi Zhang, Qin Huang, Shu Lin, Khaled A. S. Abdel-Ghaffar, Ian F. Blake. 16-22 [doi]
- The capacity of Markov channels with noiseless output and state feedbackJung Hyun Bae, Achilleas Anastasopoulos. 23-27 [doi]
- Multiple beamforming with constellation precoding: Diversity analysis and Sphere DecodingHong Ju Park, Boyu Li, Ender Ayanoglu. 28-38 [doi]
- Network coding delay: A brute-force analysisMaricica Nistor, João Barros, Fausto Vieira, Tiago T. V. Vinhoza, Joerg Widmer. 39-43 [doi]
- Markov Chain Monte Carlo detection for underwater acoustic channelsHong Wan, Rong-Rong Chen, Jun Won Choi, Andrew C. Singer, James C. Preisig, Behrouz Farhang-Boroujeny. 44-48 [doi]
- On sum capacity of continuous-time overloaded CDMA systemsYeo Hun Yun, Joon Ho Cho. 49-58 [doi]
- On the improved path metric for soft-input soft-output tree detectionJun Won Choi, Byonghyo Shim, Andrew C. Singer. 59-63 [doi]
- When is compress-and-forward optimal?Si-Hyeon Lee, Sae-Young Chung. 64-66 [doi]
- Asymptotically regular LDPC codes with linear distance growth and thresholds close to capacityMichael Lentmaier, David G. M. Mitchell, Gerhard Fettweis, Daniel J. Costello Jr.. 67-74 [doi]
- High-dimensional linear representations for robust speech recognitionMatthew Ager, Zoran Cvetkovic, Peter Sollich. 75-79 [doi]
- A tutorial on stochastic approximation algorithms for training Restricted Boltzmann Machines and Deep Belief NetsKevin Swersky, Bo Chen, Benjamin M. Marlin, Nando de Freitas. 80-89 [doi]
- Facebrowsing: Search and navigation through comparisonsDominique Tschopp, Suhas N. Diggavi. 90-99 [doi]
- On the existence of typical minimum distance for protograph-based LDPC codesShadi Abu-Surra, Dariush Divsalar, William E. Ryan. 100-106 [doi]
- On absorbing sets of structured sparse graph codesLara Dolecek. 107-111 [doi]
- On capacity outer bounds for a simple family of wireless networksMichelle Effros. 112-118 [doi]
- Information theory based design of phase-change memoriesMichele Franceschini, Luis Alfonso Lastras-Montaño, John P. Karidis, Ashish Jagmohan. 119-125 [doi]
- Team decision for the cooperative MIMO channel with imperfect CSIT sharingRanda Zakhour, David Gesbert. 126-131 [doi]
- New rate distortion bounds for speech coding based on composite source modelsJerry D. Gibson, Jing Hu, Pravin Ramadas. 132-136 [doi]
- An analytical expression of the probability of error for relaying with decode-and-forwardAlexandre Graell i Amat, Ingmar Land. 137-141 [doi]
- Energy-distortion tradeoff with multiple sources and feedbackAman Jain, Deniz Gündüz, Sanjeev R. Kulkarni, H. Vincent Poor, Sergio Verdú. 142-146 [doi]
- Asymptotic outage analysis of general motion-invariant Ad Hoc NetworksRiccardo Giacomelli, Radha Krishna Ganti, Martin Haenggi. 147-152 [doi]
- Barrage Relay NetworksThomas R. Halford, Keith M. Chugg. 153-160 [doi]
- Polymatroids with network codingTe Sun Han. 161-172 [doi]
- Grassmannian predictive frequency domain compression for limited feedback beamformingTakao Inoue, Robert W. Heath Jr.. 173-177 [doi]
- On generalized bent functionsTor Helleseth, Alexander Kholosha. 178-183 [doi]
- New results on network error correction: Capacities and upper boundsSukwon Kim, Tracey Ho, Michelle Effros, Amir Salman Avestimehr. 184-193 [doi]
- Statistical distributions that arise in constrained beamforming with incomplete channel informationBertrand M. Hochwald, Louay M. A. Jalloul. 194-203 [doi]
- Performance bounds of distributed CSMA schedulingLibin Jiang, Jian Ni, R. Srikant, Jean C. Walrand. 204-209 [doi]
- On weight enumerators and MacWilliams identity for convolutional codesIrina E. Bocharova, Florian Hug, Rolf Johannesson, Boris D. Kudryashov. 210-215 [doi]
- On the MISO compound wiretap channelAshish Khisti. 216-222 [doi]
- Achievable strategies for general secure network codingTao Cui, Tracey Ho, Jörg Kliewer. 223-228 [doi]
- On secrecy capacity scaling in wireless networksOnur Ozan Koyluoglu, Can Emre Koksal, Hesham El Gamal. 229-232 [doi]
- Performance of round robin policies for dynamic multichannel accessChangmian Wang, Bhaskar Krishnamachari, Qing Zhao, Geir E. Øien. 233-239 [doi]
- Explicit and optimal codes for distributed storageK. V. Rashmi, Nihar B. Shah, P. Vijay Kumar, Kannan Ramchandran. 240-244 [doi]
- Superposition coding in rewritable channelsL. A. Lastras-Montao, Thomas Mittelholzer, Michele Franceschini. 245-253 [doi]
- Sum-rate capacity of correlated multi-user MIMO channelsJin Woo Lee, Hee-Nam Cho, Han-Jun Park, Yong-Hwan Lee. 254-258 [doi]
- Linear capacity scaling in wireless networks: Beyond physical limits?Ayfer Özgür, Olivier Lévêque, David Tse. 259-268 [doi]
- Iterative decoding of a class of cyclic codesLi Zhang, Qin Huang, Shu Lin. 269-277 [doi]
- Channel estimation for opportunistic spectrum sensing: Uniform and random sensingQuanquan Liang, Mingyan Liu, Dongfeng Yuan. 278-287 [doi]
- Simulation, MMSE estimation, and interpolation of sampled continuous-time signals using factor graphsLukas Bolliger, Hans-Andrea Loeliger, Christian Vogel. 288-291 [doi]
- Delay performance of CSMA policies in multihop wireless networks: A new perspectiveMahdi Lotfinezhad, Peter Marbach. 292-299 [doi]
- Channel modeling for millimeter wave MIMOEric Torkildson, Hong Zhang, Upamanyu Madhow. 300-307 [doi]
- Density evolution-based analysis and design of LDPC codes with a priori informationMarco Martalò, GianLuigi Ferrari, Andrea Abrardo, Michele Franceschini, Riccardo Raheli. 308-316 [doi]
- On analyzing and improving COPE performanceFang Zhao 0001, Muriel Médard. 317-322 [doi]
- Transmitter optimization for distributed Gaussian MIMO channelsHon-Fah Chong, Mehul Motani, Nan Feng. 323-328 [doi]
- Statistical modeling and analysis of content identificationPierre Moulin. 329-333 [doi]
- An information inequality for the BSSC broadcast channelVarun Jog, Chandra Nair. 334-341 [doi]
- Asynchronous stochastic convex optimization over random networks: Error boundsBehrouz Touri, Angelia Nedic, Sundhar Srinivasan Ram. 342-351 [doi]
- Stochastic network optimization with non-convex utilities and costsMichael J. Neely. 352-361 [doi]
- Perfect omniscience, perfect secrecy and Steiner tree packingSirin Nitinawarat, Prakash Narayan. 362-366 [doi]
- Independent source coding for control over noiseless channelsEduardo I. Silva, Milan S. Derpich, Jan Østergaard. 367-368 [doi]
- MDL hierarchical clustering with incomplete dataPo-Hsiang Lai, Joseph A. O'Sullivan. 369-373 [doi]
- Optimization of power and channel allocation using the deterministic channel modelYue Zhao, Gregory J. Pottie. 374-381 [doi]
- Random capture algorithms fluid limits and stabilityMathieu Feuillet, Alexandre Proutiére, Philippe Robert. 382-385 [doi]
- Rethinking network MIMO: Cost of CSIT, performance analysis, and architecture comparisonsGiuseppe Caire, Sean A. Ramprashad, Haralabos C. Papadopoulos. 386-395 [doi]
- Trapping set enumerators for specific LDPC codesShadi Abu-Surra, David DeClerq, Dariush Divsalar, William E. Ryan. 396-400 [doi]
- Utility and privacy of data sources: Can Shannon help conceal and reveal information?Lalitha Sankar, S. Raj Rajagopalan, H. Vincent Poor. 401-407 [doi]
- Dynamic malware attack in energy-constrained mobile wireless networksM. H. R. Khouzani, Saswati Sarkar. 408-418 [doi]
- Voting models in random networksMehmet Ercan Yildiz, Roberto Pagliari, Asuman E. Ozdaglar, Anna Scaglione. 419-425 [doi]
- Correcting limited-magnitude errors in the rank-modulation schemeItzhak Tamo, Moshe Schwartz. 426-427 [doi]
- Is feedback a performance equalizer of classic and modern codes?Tsung-Yi Chen, Nambi Seshadri, Ba-Zhong Shen. 428-432 [doi]
- The asymptotic behavior of minimum buffer size requirements in large P2P streaming networksLei Ying, R. Srikant, Srinivas Shakkottai. 433-438 [doi]
- Adaptive spectrum sensingWenyi Zhang, Ahmed K. Sadek, Cong Shen, Stephen J. Shellhammer. 439-445 [doi]
- Compressed sensing-based pooling experiments using next generation sequencingNoam Shental, Amnon Amir, Or Zuk. 446-447 [doi]
- Mutual information and time-interleaved analog-to-digital conversionAndrew C. Singer, Andrew J. Bean, Jun Won Choi. 448-452 [doi]
- On the MIMO interference channelFrancesco Negro, Shakti Prasad Shenoy, Irfan Ghauri, Dirk T. M. Slock. 453-461 [doi]
- Single sensor radio scene analysis for packet based radio signalsGoran Ivkovic, Predrag Spasojevic, Ivan Seskar. 462-471 [doi]
- Multiuser cognitive access of continuous time Markov channels: Maximum throughput and effective bandwidth regionsShiyao Chen, Lang Tong. 472-481 [doi]
- Multi-user diversity for secrecy in wireless networksSudarshan Vasudevan, Stephan Adams, Dennis Goeckel, Zhiguo Ding, Donald F. Towsley, Kin K. Leung. 482-490 [doi]
- Multi-stream information transmission over K-user interference networksDmitri V. Truhachev. 491-499 [doi]
- An outer bound region for Interference Channels with Generalized FeedbackDaniela Tuninetti. 500-504 [doi]
- Optimal buffer partitioning on a multiuser wireless linkOmur Ozel, Elif Uysal-Biyikoglu, Tolga Girici. 505-514 [doi]
- Iterative decoding beyond belief propagationShiva Kumar Planjery, Shashi Kiran Chilappagari, Bane V. Vasic, David Declercq, Ludovic Danjean. 515-524 [doi]
- A factor-graph-based random walk, and its relevance for LP decoding analysis and Bethe entropy characterizationPascal O. Vontobel. 525-534 [doi]
- A deterministic approach to rate-compatible fountain communicationThomas A. Courtade, Richard D. Wesel. 535-539 [doi]
- A new sufficient condition for sum-rate tightness of quadratic Gaussian MT source codingYang Yang, Yifu Zhang, Zixiang Xiong. 540-544 [doi]
- On interactive encoding and decoding for distributed lossless coding of individual sequencesEn-Hui Yang, Jin Meng. 545-551 [doi]
- Universal relaying for the interference channelPeyman Razaghi, Wei Yu. 552-557 [doi]
- Hardware complexities of algebraic soft-decision Reed-Solomon decoders and comparisonsXinmiao Zhang, Jiangli Zhu. 558-567 [doi]
- Decentralized multi-armed bandit with multiple distributed playersKeqin Liu, Qing Zhao. 568-577 [doi]