Journal: IEEE Transactions on Information Theory

Volume 64, Issue 2

689 -- 703Richard Kueng, Peter Jung 0001. Robust Nonnegative Sparse Recovery and the Nullspace Property of 0/1 Measurements
704 -- 727Peter Jung 0001, Felix Krahmer, Dominik Stöger. Blind Demixing and Deconvolution at Near-Optimal Rate
728 -- 737Lasha Ephremidze, Faisal Saied, Ilya M. Spitkovsky. On the Algorithmization of Janashia-Lagvilava Matrix Spectral Factorization Method
738 -- 751Zheng Wang, Cong Ling. On the Geometric Ergodicity of Metropolis-Hastings Algorithms for Lattice Gaussian Sampling
752 -- 772Salem Said, Hatem Hajri, Lionel Bombrun, Baba C. Vemuri. Gaussian Distributions on Riemannian Symmetric Spaces: Statistical Learning With Structured Covariance Matrices
773 -- 794Gang Wang 0014, Georgios B. Giannakis, Yonina C. Eldar. Solving Systems of Random Quadratic Equations via Truncated Amplitude Flow
795 -- 830Diaa Al Mohamad, Assia Boumahdaf. Semiparametric Two-Component Mixture Models When One Component Is Defined Through Linear Constraints
831 -- 852Nidhin Koshy Vaidhiyan, Rajesh Sundaresan. Learning to Detect an Oddball Target
853 -- 874K. Pavan Srinath, Ramji Venkataramanan. Cluster-Seeking James-Stein Estimators
875 -- 888Masahito Hayashi, Vincent Y. F. Tan. Minimum Rates of Approximate Sufficient Statistics
889 -- 899Jian Liu 0004, Sihem Mesnager, Lusheng Chen. New Constructions of Optimal Locally Recoverable Codes via Good Polynomials
900 -- 908Lingfei Jin, Yuan Luo, Chaoping Xing. Repairing Algebraic Geometry Codes
909 -- 917Yeow Meng Chee, Xiande Zhang. Linear Size Constant-Composition Codes Meeting the Johnson Bound
918 -- 932Evyatar Hemo, Yuval Cassuto. A Constrained Coding Scheme for Correcting Asymmetric Magnitude-1 Errors in q-Ary Channels
933 -- 943Rawad Bitar, Salim El Rouayheb. Staircase Codes for Secret Sharing With Optimal Communication and Read Overheads
944 -- 951Ron M. Roth. On Decoding Rank-Metric Codes Over Large Fields
952 -- 971Chong-Dao Lee. Algebraic Decoding of Cyclic Codes Using Partial Syndrome Matrices
972 -- 978Michael Dowling, Shuhong Gao. Fast Decoding of Expander Codes
979 -- 999Linqi Song, Christina Fragouli. A Polynomial-Time Algorithm for Pliable Index Coding
1000 -- 1022Hua Sun, Syed Ali Jafar. Private Information Retrieval from MDS Coded Data With Colluding Servers: Settling a Conjecture by Freij-Hollanti et al
1023 -- 1037Xiugang Wu, Ayfer Özgür. Cut-Set Bound is Loose for Gaussian Relay Networks
1038 -- 1045Siddharth Barman, Omar Fawzi. Algorithmic Aspects of Optimal Channel Coding
1046 -- 1063Anatoly Khina, Yuval Kochman, Ashish Khisti. The MIMO Wiretap Channel Decomposed
1064 -- 1082Marco Tomamichel, Masahito Hayashi. Operational Interpretation of Rényi Information Measures via Composite Hypothesis Testing Against Product and Markov Distributions
1083 -- 1091Benjamin Arras, Yvik Swan. IT Formulae for Gamma Target: Mutual Information and Relative Entropy
1092 -- 1104Mireille El Gheche, Giovanni Chierchia, Jean-Christophe Pesquet. Proximity Operators of Discrete Information Divergences
1105 -- 1131Hye Won Chung, Brian M. Sadler, Lizhong Zheng, Alfred O. Hero III. Unequal Error Protection Querying Policies for the Noisy 20 Questions Problem
1132 -- 1162Badri N. Vellambi, Jörg Kliewer, Matthieu R. Bloch. Strong Coordination Over Multi-Hop Line Networks Using Channel Resolvability Codebooks
1163 -- 1177Ahmad ElMoslimany, Tolga M. Duman. On the Discreteness of Capacity-Achieving Distributions for Fading and Signal-Dependent Noise Channels With Amplitude-Limited Inputs
1178 -- 1198Jihad Fahs, Ibrahim C. Abou-Faycal. On Properties of the Support of Capacity-Achieving Distributions for Additive Noise Channel Models With Input Cost Constraints
1199 -- 1216Félix Balado, David Haughton. Asymptotically Optimum Perfect Universal Steganography of Finite Memoryless Sources
1217 -- 1230Ayse Ünsal, Raymond Knopp, Neri Merhav. Converse Bounds on Modulation-Estimation Performance for the Gaussian Multiple-Access Channel
1231 -- 1240Alex Alvarado, Erik Agrell, Fredrik Brannstrom. Asymptotic Comparison of ML and MAP Detectors for Multidimensional Constellations
1241 -- 1261Morteza Varasteh, Borzoo Rassouli, Osvaldo Simeone, Deniz Gündüz. Zero-Delay Source-Channel Coding With a Low-Resolution ADC Front End
1262 -- 1280Kasper Fløe Trillingsgaard, Petar Popovski. Generalized HARQ Protocols with Delayed Channel State Information and Average Latency Constraints
1281 -- 1296Qian Yu, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr. The Exact Rate-Memory Tradeoff for Caching With Uncoded Prefetching
1297 -- 1316Sakshi Kapoor, Sreejith Sreekumar, Sibi Raj B. Pillai. Distributed Scheduling in Multiple Access With Bursty Arrivals Under a Maximum Delay Constraint
1317 -- 1339Wenhan Dai, Yuan Shen, Moe Z. Win. A Computational Geometry Framework for Efficient Network Localization
1340 -- 1346Zhengchun Zhou, Dan Zhang, Tor Helleseth, Jinming Wen. A Construction of Multiple Optimal ZCZ Sequence Sets With Good Cross Correlation
1347 -- 1360Francis N. Castro, Oscar E. González, Luis A. Medina. Diophantine Equations With Binomial Coefficients and Perturbations of Symmetric Boolean Functions
1361 -- 1367Huangsheng Yu, Shujuan Dang, Dianhua Wu. a, 1, Q)-OOCs
1368 -- 1373Per Austrin, Petteri Kaski, Mikko Koivisto, Jesper Nederlof. Sharper Upper Bounds for Unbalanced Uniquely Decodable Code Pairs
1374 -- 1384Motohisa Fukuda, Ion Nechita. On the Minimum Output Entropy of Random Orthogonal Quantum Channels
1385 -- 1403Hao-Chung Cheng, Min-Hsiu Hsieh. Moderate Deviation Analysis for Classical-Quantum Channels and Quantum Hypothesis Testing
1404 -- 1422Ravi Kishore, Ashutosh Kumar 0002, Chiranjeevi Vanarasa, Kannan Srinathan. On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission