4057 | -- | 4070 | Avraham Reani, Neri Merhav. Data-Processing Bounds for Scalar Lossy Source Codes With Side Information at the Decoder |
4071 | -- | 4094 | Nan Ma, Prakash Ishwar. The Infinite-Message Limit of Two-Terminal Interactive Source Coding |
4095 | -- | 4105 | Yanlin Geng, Varun Jog, Chandra Nair, Zizhou Vincent Wang. An Information Inequality and Evaluation of Marton's Inner Bound for Binary Input Broadcast Channels |
4106 | -- | 4128 | Ravi Tandon, Syed Ali Jafar, Shlomo Shamai, H. Vincent Poor. On the Synergistic Benefits of Alternating CSIT for the MISO Broadcast Channel |
4129 | -- | 4138 | Ashish Khisti, Brett Hern, Krishna R. Narayanan. On Modulo-Sum Computation Over an Erasure Multiple-Access Channel |
4139 | -- | 4170 | Augusto Aubry, Inaki Esnaola, Antonia Maria Tulino, Sivarama Venkatesan. Achievable Rate Region for Gaussian MIMO MAC With Partial CSI |
4171 | -- | 4191 | Shraga I. Bross, Yossef Steinberg, Stephan Tinguely. The Discrete Memoryless Interference Channel With One-Sided Generalized Feedback |
4192 | -- | 4212 | Peyman Razaghi, Song-Nam Hong, Lei Zhou, Wei Yu, Giuseppe Caire. Two Birds and One Stone: Gaussian Interference Channel With a Shared Out-of-Band Relay of Limited Rate |
4213 | -- | 4229 | Veniamin I. Morgenshtern, Erwin Riegler, Wei Yang, Giuseppe Durisi, Shaowei Lin, Bernd Sturmfels, Helmut Bölcskei. Capacity Pre-Log of Noncoherent SIMO Channels Via Hironaka's Theorem |
4230 | -- | 4242 | Thijs Laarhoven, Jeroen Doumen, Peter Roelse, Boris Skoric, Benne de Weger. Dynamic Tardos Traitor Tracing Schemes |
4243 | -- | 4271 | Antonia Maria Tulino, Giuseppe Caire, Sergio Verdú, Shlomo Shamai. Support Recovery With Sparsely Sampled Free Random Matrices |
4272 | -- | 4279 | Benjamin Ricaud, Bruno Torrésani. Refined Support and Entropic Uncertainty Inequalities |
4280 | -- | 4289 | Marco F. Duarte, Michael B. Wakin, Dror Baron, Shriram Sarvotham, Richard G. Baraniuk. Measurement Bounds for Sparse Signal Ensembles via Graphical Models |
4290 | -- | 4308 | Arian Maleki, Laura Anitori, Zai Yang, Richard G. Baraniuk. Asymptotic Analysis of Complex LASSO via Complex Approximate Message Passing (CAMP) |
4309 | -- | 4315 | Junhong Lin, Song Li, Yi Shen. Compressed Data Separation With Redundant Dictionaries |
4316 | -- | 4323 | Min Zhang, Zheng-Hai Huang, Ying Zhang. Restricted $p$ -Isometry Properties of Nonconvex Matrix Recovery |
4324 | -- | 4337 | Yudong Chen, Ali Jalali, Sujay Sanghavi, Constantine Caramanis. Low-Rank Matrix Recovery From Errors and Erasures |
4338 | -- | 4356 | Ameya Agaskar, Yue M. Lu. A Spectral Graph Uncertainty Principle |
4357 | -- | 4373 | Elchanan Mossel, Sébastien Roch, Allan Sly. Robust Estimation of Latent Tree Graphical Models: Inferring Hidden States With Inexact Parameters |
4374 | -- | 4388 | Kumar Sricharan, Dennis Wei, Alfred O. Hero. Ensemble Estimators for Multivariate Entropy Estimation |
4389 | -- | 4396 | Kai-Sheng Song. Asymptotic Relative Efficiency and Exact Variance Stabilizing Transformation for the Generalized Gaussian Distribution |
4397 | -- | 4407 | Robin S. Langley. Probability Functionals for Self-Consistent and Invariant Inference: Entropy and Fisher Information |
4408 | -- | 4422 | Mark Kliger, Joseph M. Francos. Strongly Consistent Model Order Selection for Estimating 2-D Sinusoids in Colored Noise |
4423 | -- | 4439 | Rami Hagege, Joseph M. Francos. Linear Estimation of Time-Warped Signals |
4440 | -- | 4461 | Vikram Krishnamurthy. How to Schedule Measurements of a Noisy Markov Chain in Decision Making? |
4462 | -- | 4481 | Ali Tajer, H. Vincent Poor. Quick Search for Rare Events |
4482 | -- | 4497 | Hideki Yagi, H. Vincent Poor. Bounds on Maximum Likelihood Decoding Performance for Linear Codes at Low Rates |
4498 | -- | 4509 | Jin Xu, Biao Chen. Secure Coding Over Networks Against Noncooperative Eavesdropping |
4510 | -- | 4519 | Mario Blaum, James Lee Hafner, Steven Hetzler. Partial-MDS Codes and Their Application to RAID Type of Architectures |
4520 | -- | 4529 | Amir Shpilka. New Constructions of WOM Codes Using the Wozencraft Ensemble |
4530 | -- | 4541 | Anxiao Jiang, Michael Langberg, Moshe Schwartz, Jehoshua Bruck. Trajectory Codes for Flash Memory |
4542 | -- | 4552 | Mehdi Karimi, Amir H. Banihashemi. On the Girth of Quasi-Cyclic Protograph LDPC Codes |
4553 | -- | 4583 | Yige Wang, Stark C. Draper, Jonathan S. Yedidia. Hierarchical and High-Girth QC LDPC Codes |
4584 | -- | 4597 | Brian K. Butler, Paul H. Siegel. Bounds on the Minimum Distance of Punctured Quasi-Cyclic LDPC Codes |
4598 | -- | 4614 | Hosung Park, Seokbeom Hong, Jong-Seon No, Dong-Joon Shin. Design of Multiple-Edge Protographs for QC LDPC Codes Avoiding Short Inevitable Cycles |
4615 | -- | 4625 | Francisco J. Plaza Martín, José Ignacio Iglesias Curto, Gloria Serrano Sotelo. On the Construction of 1-D MDS Convolutional Goppa Codes |
4626 | -- | 4661 | Gesualdo Scutari, Jong-Shi Pang. Joint Sensing and Power Allocation in Nonconvex Cognitive Radio Games: Nash Equilibria and Distributed Algorithms |
4662 | -- | 4667 | Nian Li, Tor Helleseth, Alexander Kholosha, Xiaohu Tang. On the Walsh Transform of a Class of Functions From Niho Exponents |
4668 | -- | 4674 | Yeow Meng Chee, Han Mao Kiah, Punarbasu Purkayastha, Chengmin Wang. Cross-Bifix-Free Codes Within a Constant Factor of Optimality |
4675 | -- | 4686 | Longjiang Qu, Yin Tan, Chik-How Tan, Chao Li. Constructing Differentially 4-Uniform Permutations Over ${\BBF}_{2^{2k}}$ via the Switching Method |
4687 | -- | 4699 | Jedrzej Kaniewski, Marco Tomamichel, Esther Hänggi, Stephanie Wehner. Secure Bit Commitment From Relativistic Constraints |
4700 | -- | 4717 | Toyohiro Tsurumaru, Masahito Hayashi. Dual Universality of Hash Functions and Its Applications to Quantum Cryptography |
4718 | -- | 4729 | Mark M. Wilde, Saikat Guha. Polar Codes for Degradable Quantum Channels |
4730 | -- | 4732 | Kiryung Lee, Yoram Bresler. Corrections to "ADMiRA: Atomic Decomposition for Minimum Rank Approximation" |
4730 | -- | 0 | Tuvi Etzion, Natalia Silberstein. Errata to "Codes and Designs Related to Lifted MRD Codes" |