1281 | -- | 1317 | Eirik Rosnes, Michael Helmling. Adaptive Linear Programming Decoding of Nonbinary Linear Codes Over Prime Fields |
1318 | -- | 1332 | Kai Wan, Daniela Tuninetti, Pablo Piantanida. An Index Coding Approach to Caching With Uncoded Cache Placement |
1333 | -- | 1353 | Linqi Song, Christina Fragouli, Tianchu Zhao. A Pliable Index Coding Approach to Data Shuffling |
1354 | -- | 1384 | Qiaosheng Eric Zhang, Mayank Bakshi, Sidharth Jaggi. Covert Communication With Polynomial Computational Complexity |
1385 | -- | 1395 | Ohad Elishco, Ryan Gabrys, Eitan Yaakobi. Bounds and Constructions of Codes Over Symbol-Pair Read Channels |
1396 | -- | 1404 | Itzhak Tamo, Min Ye 0005, Alexander Barg. Error Correction Based on Partial Information |
1405 | -- | 1422 | Hanxu Hou, Patrick P. C. Lee. Binary MDS Array Codes With Optimal Repair |
1423 | -- | 1427 | Denis S. Krotov. The Existence of Perfect Codes in Doob Graphs |
1428 | -- | 1448 | Ning Cai, Masahito Hayashi. Secure Network Code for Adaptive and Active Attacks With No-Randomness in Intermediate Nodes |
1449 | -- | 1459 | Minjia Shi, Xiaoxiao Li, Alessandro Neri 0002, Patrick Solé. How Many Weights Can a Cyclic Code Have? |
1460 | -- | 1473 | Lior Eldar, Maris Ozols, Kevin Thompson 0005. The Need for Structure in Quantum LDPC Codes |
1474 | -- | 1481 | Hamed Narimani, Mohammadali Khosravifard. A New Code for Encoding All Monotone Sources With a Fixed Large Alphabet Size |
1482 | -- | 1496 | Elad Domanovitz, Uri Erez. Achievability Performance Bounds for Integer-Forcing Source Coding |
1497 | -- | 1519 | Ziv Goldfeld, Paul Cuff, Haim H. Permuter. Wiretap Channels With Random States Non-Causally Available at the Encoder |
1520 | -- | 1529 | Fatemeh Arbabjolfaei, Young-Han Kim 0001. Generalized Lexicographic Products and the Index Coding Capacity |
1530 | -- | 1548 | Jiangfan Zhang, Xiaodong Wang 0001. Asymptotically Optimal Stochastic Encryption for Quantized Sequential Detection in the Presence of Eavesdroppers |
1549 | -- | 1571 | Pinar Sen, Young-Han Kim 0001. Homologous Codes for Multiple Access Channels |
1572 | -- | 1584 | Antonio Campello, Cong Ling 0001, Jean-Claude Belfiore. Semantically Secure Lattice Codes for Compound MIMO Channels |
1585 | -- | 1606 | Yutaka Jitsumatsu, Yasutada Oohama. A New Iterative Algorithm for Computing the Correct Decoding Probability Exponent of Discrete Memoryless Channels |
1607 | -- | 1624 | Mehrdad Tahmasbi, Matthieu R. Bloch, Aylin Yener. Learning an Adversary's Actions for Secret Communication |
1625 | -- | 1657 | Ibrahim Issa, Aaron B. Wagner, Sudeep Kamath. An Operational Approach to Information Leakage |
1658 | -- | 1673 | Amichai Painsky, Gregory W. Wornell. Bregman Divergence Bounds and Universality Properties of the Logarithmic Loss |
1674 | -- | 1690 | Shigeaki Kuzuoka. On the Conditional Smooth Rényi Entropy and its Applications in Guessing and Source Coding |
1691 | -- | 1701 | Shun Watanabe, Te Sun Han. Interval Algorithm for Random Number Generation: Information Spectrum Approach |
1702 | -- | 1713 | Daniil Ryabko. Time-Series Information and Unsupervised Learning of Representations |
1714 | -- | 1737 | Xiao-Yang Liu, Shuchin Aeron, Vaneet Aggarwal, Xiaodong Wang 0001. Low-Tubal-Rank Tensor Completion Using Alternating Minimization |
1738 | -- | 1759 | Dongmian Zou, Radu Balan, Maneesh Singh. On Lipschitz Bounds of General Convolutional Neural Networks |
1760 | -- | 1784 | Yihua Li, Devavrat Shah, Dogyoon Song, Christina Lee Yu. Nearest Neighbors for Matrix Estimation Interpreted as Blind Regression for Latent Variable Model |
1785 | -- | 1821 | Qing Qu, Yuqian Zhang, Yonina C. Eldar, John Wright 0001. Convolutional Phase Retrieval via Gradient Descent |
1822 | -- | 1844 | Weiyu Xu, Haider Ali Jasim Alshamary, Tareq Y. Al-Naffouri, Alam Zaib. Optimal Joint Channel Estimation and Data Detection for Massive SIMO Wireless Systems: A Polynomial Complexity Solution |
1845 | -- | 1860 | Qianrui Li, Paul de Kerret, David Gesbert, Nicolas Gresset. Robust Regularized ZF in Cooperative Broadcast Channel Under Distributed CSIT |
1861 | -- | 1881 | Mirza Uzair Baig, Lei Yu 0003, Zixiang Xiong, Anders Høst-Madsen, Houqiang Li, Weiping Li. On the Energy-Delay Tradeoff in Streaming Data: Finite Blocklength Analysis |
1882 | -- | 1892 | Qing He 0002, Di Yuan 0001, Anthony Ephremides. Optimal Scheduling for Emptying a Wireless Network: Solution Characterization, Applications, Including Deadline Constraints |
1893 | -- | 1919 | Alexander Michael Daniel, Wei Yu 0001. Optimization of Heterogeneous Coded Caching |
1920 | -- | 1933 | Qian Yu, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr. Straggler Mitigation in Distributed Matrix Multiplication: Fundamental Limits and Optimal Coding |
1934 | -- | 1943 | Suhri Kim, Kisoon Yoon, Jihoon Kwon, Young-Ho Park 0001, Seokhie Hong. New Hybrid Method for Isogeny-Based Cryptosystems Using Edwards Curves |
1944 | -- | 1947 | Hassan Aly, Arne Winterhof. A Note on Hall's Sextic Residue Sequence: Correlation Measure of Order $k$ and Related Measures of Pseudorandomness |
1948 | -- | 0 | Anders Høst-Madsen. Corrections to "The Wideband Slope of Interference Channels: The Small Bandwidth Case" |