Journal: IEEE Transactions on Information Theory

Volume 33, Issue 2

177 -- 195A. Robert Calderbank, Neil J. A. Sloane. New trellis codes based on lattices and cosets
196 -- 202Ephraim Zehavi, Jack K. Wolf. On the performance evaluation of trellis codes
203 -- 209Joseph L. Hibey. Cycle slipping in an optical communication system employing subcarrier angle modulation
210 -- 218Sebastian Engell. New results on the real-time transmission problem
219 -- 223David J. Aldous. Ultimate instability of exponential back-off protocol for acknowledgment-based transmission control of random access communication channels
224 -- 232Fan R. K. Chung, Edward G. Coffman Jr., Martin I. Reiman, Burton Simon. The forwarding index of communication networks
233 -- 237Leonidas Georgiadis, Panayota Papantoni-Kazakos. A 0.487 throughput limited sensing algorithm
238 -- 245Alberto Apostolico, Aviezri S. Fraenkel. Robust transmission of unbounded strings using Fibonacci representations
246 -- 257Tjalling J. Tjalkens, Frans M. J. Willems. Variable to fixed-length codes for Markov sources
263 -- 266Paul C. Shields. The ergodic and entropy theorems revisited
267 -- 284Brian L. Hughes, Prakash Narayan. Gaussian arbitrarily varying channels
285 -- 0Gregory J. Pottie, Desmond P. Taylor. An approach to Ungerboeck coding for rectangular signal sets
290 -- 0Giuliano Benelli, Romano Fantacci. Euclidean distance for combinations of some Hamming codes and binary CPFSK modulation
293 -- 0Bruce L. Montgomery, B. V. K. Vijaya Kumar. On the average codeword length of optimal binary codes for extended sources
296 -- 0John L. Brown Jr.. Detection of a known signal in colored Gaussian noise - A new coordinate approach
298 -- 0Augustus J. E. M. Janssen. Comments on Characterizing the radar ambiguity functions by L. Auslander and R. Tolimieri
299 -- 0Howard H. Ma, Jack K. Wolf. Correction to Binary unequal error-protection block codes formed from convolutional codes by generalized tail-biting (Nov 86 776-786)