Journal: IEEE Transactions on Information Theory

Volume 66, Issue 11

6607 -- 6616Amos Lapidoth, Gian Marti. Encoder-Assisted Communications Over Additive Noise Channels
6617 -- 6634Mohamed Adel Attia, Deepak Kumar, Ravi Tandon. The Capacity of Private Information Retrieval From Uncoded Storage Constrained Databases
6635 -- 6659Ran Tamir, Neri Merhav, Nir Weinberger, Albert Guillén i Fàbregas. Large Deviations Behavior of the Logarithmic Error Probability of Random Codes
6660 -- 6681Aaron B. Wagner, Nirmal V. Shende, Yücel Altug. A New Method for Employing Feedback to Improve Coding Performance
6682 -- 6687Amir Tasbihi, Frank R. Kschischang. On the Capacity of Waveform Channels Under Square-Law Detection of Time-Limited Signals
6688 -- 6722Shuqing Chen, Michelle Effros, Victoria Kostina. Lossless Source Coding in the Point-to-Point, Multiple Access, and Random Access Scenarios
6723 -- 6748Anuran Makur. Coding Theorems for Noisy Permutation Channels
6749 -- 6761Venkatesan Guruswami, Satyanarayana V. Lokam, Sai Vikneshwar Mani Jayaraman. ϵ-MSR Codes: Contacting Fewer Code Blocks for Exact Repair
6762 -- 6773Jong Yoon Hyun, Jungyun Lee, Yoonjin Lee. Infinite Families of Optimal Linear Codes Constructed From Simplicial Complexes
6774 -- 6785Zongrun Du, Chengju Li, Sihem Mesnager. Constructions of Self-Orthogonal Codes From Hulls of BCH Codes and Their Parameters
6786 -- 6798Han Cai, Johan Chrisnata, Tuvi Etzion, Moshe Schwartz 0001, Antonia Wachter-Zeh. Network-Coding Solutions for Minimal Combination Networks and Their Sub-Networks
6799 -- 6808Daniele Bartoli, Maria Montanucci, Luciane Quoos. Locally Recoverable Codes From Automorphism Group of Function Fields of Genus g ≥ 1
6809 -- 6822Hoang Dau, Wentu Song, Alex Sprintson, Chau Yuen. Secure Erasure Codes With Partial Reconstructibility
6823 -- 6834Luciano Panek, Jerry Anderson Pinheiro. General Approach to Poset and Additive Metrics
6835 -- 6854Tsung-Ching Lin, Chong-Dao Lee, Trieu-Kien Truong, Yaotsu Chang, Yan-Haw Chen. On Decoding Algebraic Codes Using Radical Locators
6855 -- 6862Minjia Shi, Alessandro Neri 0002, Patrick Solé. How Many Weights Can a Quasi-Cyclic Code Have?
6863 -- 6871Sara D. Cardell, Marcelo Firer, Diego Napp. Generalized Column Distances
6872 -- 6883Ziling Heng, Qiuyan Wang, Cunsheng Ding. Two Families of Optimal Linear Codes and Their Subfield Codes
6884 -- 6897Shuangqing Liu, Yanxun Chang, Tao Feng 0002. Parallel Multilevel Constructions for Constant Dimension Codes
6898 -- 6907Peter J. Dukes, Ferdinand Ihringer, Nathan Lindzey. On the Algebraic Combinatorics of Injections and its Applications to Injection Codes
6908 -- 6919Yuanyuan Tang, Yonatan Yehezkeally, Moshe Schwartz 0001, Farzad Farnoud. Single-Error Detection and Correction for Duplication and Substitution Channels
6920 -- 6938Hessam Mahdavifar. Polar Coding for Non-Stationary Channels
6939 -- 6961Hamdi Joudeh, Xinping Yi, Bruno Clerckx, Giuseppe Caire. On the Optimality of Treating Inter-Cell Interference as Noise: Downlink Cellular Networks and Uplink-Downlink Duality
6962 -- 6976Payam Delgosha, Venkat Anantharam. Universal Lossless Compression of Graphical Data
6977 -- 6998Yonatan Gutman, Adam Spiewak. Metric Mean Dimension and Analog Compression
6999 -- 7021Junge Wang, Bofeng Yuan, Lexiang Huang, Syed Ali Jafar. Sum-GDoF of 2-User Interference Channel With Limited Cooperation Under Finite Precision CSIT
7022 -- 7032Yajing Zhou, Yang Yang 0005, Zhengchun Zhou, Kushal Anand, Su Hu, Yong Liang Guan 0001. New Complementary Sets With Low PAPR Property Under Spectral Null Constraints
7033 -- 7055Tao Guo, Chao Tian 0002, Tie Liu 0002, Raymond W. Yeung. Weakly Secure Symmetric Multilevel Diversity Coding
7056 -- 7066Paul de Kerret, David Gesbert, Jingjing Zhang 0002, Petros Elia. Optimal DoF of the K-User Broadcast Channel With Delayed and Imperfect Current CSIT
7067 -- 7080Rashad Eletreby, Osman Yagan. Connectivity of Inhomogeneous Random K-Out Graphs
7081 -- 7087Lilya Budaghyan, Tor Helleseth, Nikolay S. Kaleyski. A New Family of APN Quadrinomials
7088 -- 7100Oriol Farràs, Tarik Kaced, Sebastià Martín Molleví, Carles Padró. Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing
7101 -- 7112Shuxing Li, Wilfried Meidl, Alexandr Polujan, Alexander Pott, Constanza Riera, Pantelimon Stanica. Vanishing Flats: A Combinatorial Viewpoint on the Planarity of Functions and Their Application
7113 -- 7131Mehrdad Tahmasbi, Matthieu R. Bloch. Covert and Secret Key Expansion Over Quantum Channels Under Collective Attacks
7132 -- 7154Yuwen Gu, Hui Zou. Sparse Composite Quantile Regression in Ultrahigh Dimensions With Tuning Parameter Calibration
7155 -- 7179Banghua Zhu, Jiantao Jiao, David Tse. Deconstructing Generative Adversarial Networks
7180 -- 7195Rasika Rajapakshage, Marianna Pensky. Is Clustering Advantageous in Statistical Ill-Posed Linear Inverse Problems?
7196 -- 7221Nir Weinberger, Meir Feder. k-Vectors: An Alternating Minimization Algorithm for Learning Regression Functions
7222 -- 7230Yonglong Li, Vincent Y. F. Tan. Second-Order Asymptotics of Sequential Hypothesis Testing
7231 -- 7236Vasileios Nakos. Nearly Optimal Sparse Polynomial Multiplication
7237 -- 7252Maxime Ferreira Da Costa, Yuejie Chi. On the Stable Resolution Limit of Total Variation Regularization for Spike Deconvolution
7253 -- 7273Amirafshar Moshtaghpour, José M. Bioucas-Dias, Laurent Jacques. Close Encounters of the Binary Kind: Signal Reconstruction Guarantees for Compressive Hadamard Sampling With Haar Wavelet Basis
7274 -- 7301Lijun Ding, Yudong Chen 0001. Leave-One-Out Approach for Matrix Completion: Primal and Dual Analysis
7302 -- 7310Yi Li 0002, Vasileios Nakos. Sublinear-Time Algorithms for Compressive Phase Retrieval