Journal: IEEE Transactions on Information Theory

Volume 33, Issue 6

759 -- 772Te Sun Han. Hypothesis testing with multiterminal data compression
773 -- 787Thomas J. Flynn, Robert M. Gray. Encoding of correlated observations
788 -- 801Imre Csiszár, Thomas M. Cover, Byoung-Seon Choi. Conditional limit theorems under Markov conditioning
802 -- 812Charles R. Baker. Capacity of the mismatched Gaussian channel
813 -- 826Kingo Kobayashi. Combinatorial structure and capacity of the permuting relay channel
827 -- 838Nariman Farvardin, Vinay A. Vaishampayan. Optimal quantizer design for noisy channels: An approach to combined source - channel coding
839 -- 848John J. O Reilly, José R. F. da Rocha. Improved error probability evaluation methods for direct detection optical communication systems
849 -- 854Ivan Damgård. Concatenated group codes and their exponents
855 -- 865Ender Ayanoglu, Robert M. Gray. The design of joint source and channel trellis waveform coders
866 -- 876Takeshi Hashimoto. A list-type reduced-constraint generalization of the Viterbi algorithm
877 -- 881Bruce E. Hajek. Locating the maximum of a simple random sequence by sequential search
882 -- 888Robert F. Pawula, Stephen O. Rice. A differential equation related to a random telegraph wave problem--Computer calculation of series solution
889 -- 894Novellone Rozario, Athanasios Papoulis. Spectral estimation from nonconsecutive data
895 -- 906Georgios Tziritas. On the distribution of positive-definite Gaussian quadratic forms
907 -- 0James A. Bucklew. The source coding theorem via Sanov s theorem
910 -- 0Jovan Dj. Golic, Milorad M. Obradovic. A lower bound on the redundancy of D-ary Huffman codes
911 -- 0Wil J. van Gils, Jean-Paul Boly. On combined symbol-and-bit error-control [4, 2] codes over {0, 1}:::8::: to be used in the (4, 2) concept fault-tolerant computer
917 -- 0Stefan M. Dodunekov, Tor Helleseth, Nickolai Manev, Øyvind Ytrehus. New bounds on binary linear codes of dimension eight
919 -- 0W. M. C. J. van Overveld. Multiple-burst error-correcting cyclic product codes
923 -- 0Johan P. Hansen. Codes on the Klein quartic, ideals, and decoding
925 -- 0Anselm Blumer. Minimax universal noiseless coding for unifilar and Markov sources
930 -- 0Mansour I. Irshid. Gray code weighting system
931 -- 933Jean-Pierre Adoul. Fast ML decoding algorithm for the Nordstrom - Robinson code
934 -- 0Ernst L. Leiss. On testing for immutability of codes
938 -- 942Franklin S. Weinstein. Some probabilistic properties of the line-of-sight angle error to a remote object
942 -- 0Yoram Baram. A lower bound on the mean square error of reduced-order estimators for nonlinear processes

Volume 33, Issue 5

613 -- 619Zhen Zhang, Toby Berger, James L. Massey. Some families of zero- error block codes for the two-user binary adder channel with feedback
620 -- 631Wil J. van Gils. Two-dimensional dot codes for product identification
632 -- 640Christian Thommesen. Error-correcting capabilities of concatenated codes with MDS outer codes on memoryless channels with maximum- likelihood decoding
641 -- 650Te Sun Han, Max H. M. Costa. Broadcast channels with arbitrarily correlated sources
651 -- 655John C. Kieffer. Fixed-rate encoding of nonstationary information sources
656 -- 664Robert M. Gray, Mari O. Dunham, Richard L. Gobbi. Ergodicity of Markov channels
665 -- 680Tom Verhoeff. An updated table of minimum-distance bounds for binary linear codes
681 -- 693Jovan Dj. Golic. On the relationship between the information measures and the Bayes probability of error
694 -- 701Jovan Dj. Golic. On the relationship between the separability measures and the Bayes probability of error
702 -- 709John M. Pollard, Claus-Peter Schnorr. An efficient solution of the congruence x:::2:::+ky:::2:::=mpmod{n}
710 -- 0Max H. M. Costa, Abbas A. El Gamal. The capacity region of the discrete memoryless interference channel with strong interference
711 -- 0Joy A. Thomas. Feedback can at most double Gaussian multiple access channel capacity
716 -- 0Kristien de Bruyn, Vyacheslav V. Prelov, Edward C. van der Meulen. Reliable transmission of two correlated sources over an asymmetric multiple-access channel
719 -- 0Ying Cheng. New linear codes constructed by concatenating, extending, and shortening methods
721 -- 0Thomas H. E. Ericson, Victor A. Zinoviev. An improvement of the Gilbert bound for constant weight codes
723 -- 0Vera Pless, Vladimir D. Tonchev. Self-dual codes over GF(7)
727 -- 0Ludo M. G. M. Tolhuizen. New binary linear block codes
729 -- 0J. Martin Borden, A. J. Han Vinck. On coding for stuck-at defects
735 -- 0Paul Kabaila. On the probability of error for decision-feedback equalizers
738 -- 0Robert M. Gagliardi, J. Robbins, Herbert Taylor. Acquisition sequences in PPM communications
744 -- 0Mohamed H. El-Zahar, Mahmoud K. Khairat. On the weight distribution of the coset leaders of the first-order Reed - Muller code
747 -- 0Xuejia Lai. Condition for the nonsingularity of a feedback shift-register over a general finite field
749 -- 0W. Cary Huffman, Vassil Y. Yorgov. A [72, 36, 16] doubly even code does not have an automorphism of order 11

Volume 33, Issue 4

461 -- 482Robert J. McEliece, Edward C. Posner, Eugene R. Rodemich, Santosh S. Venkatesh. The capacity of the Hopfield associative memory
483 -- 501Lee-Fang Wei. Trellis-coded modulation with multidimensional constellations
502 -- 521Zhen Zhang, Toby Berger. New results in binary multiple descriptions
522 -- 530David L. Neuhoff, Roberto Garcia-Muñoz. Robust source coding of weakly compact classes
531 -- 538Jovan Dj. Golic. On the relationship between the efficiency measures of multicategory information systems
539 -- 556Prakash Narayan, Donald L. Snyder. Signal set design for band-limited memoryless multiple-access channels with soft decision demodulation
557 -- 568Brian H. Marcus, Paul H. Siegel. On codes with spectral nulls at rational submultiples of the symbol frequency
569 -- 576Lewis Pakula. Asymptotic zero distribution of orthogonal polynomials in sinusoidal frequency estimation
577 -- 581Frank K. Hwang, Xian M. Chang. Cutoff points for roll call protocols in multiple access systems
582 -- 590John H. Cozzens, Larry A. Finkelstein. Range and error analysis for a fast Fourier transform computed over Z[{omega}]
591 -- 0Pierce E. Cantrell, Anand K. Ojha. Comparison of generalized Q- function algorithms
596 -- 0Frank K. Hwang, Lawrence A. Shepp. Some inequalities concerning random subsets of a set
598 -- 0Jorma Rissanen, Marl Wax. Measures of mutual and causal dependence between two time series
601 -- 0Jonathan J. Ashley, Paul H. Siegel. A note on the Shannon capacity of run-length-limited codes
605 -- 0H. J. Tiersma. Remarks on codes from Hermitian curves

Volume 33, Issue 3

305 -- 309Jacobus H. van Lint, T. A. Springer. Generalized Reed - Solomon codes from algebraic geometry
310 -- 314Rudolf Ahlswede, Amiram H. Kaspi. Optimal coding strategies for certain permuting channels
315 -- 322Baruch Awerbuch, Robert G. Gallager. A new distributed algorithm to find breadth first search trees
323 -- 328Ronald L. Rivest. Network control by Bayesian broadcast
329 -- 340Loren P. Clare, Izhak Rubin. Performance boundaries for prioritized multiplexing systems
341 -- 349Micha Hofri, Zvi Rosberg. Packet delay under the golden ratio weighted TDM policy in a multiple-access channel
350 -- 359Neil L. Gerr, Stamatis Cambanis. Analysis of adaptive differential PCM of a stationary Gauss - Markov input
360 -- 366Dale H. Mugler, Wolfgang Splettstösser. Linear prediction from samples of a function and its derivatives
367 -- 372Wolfgang Härdle, Rainer Nixdorf. Nonparametric sequential estimation of zeros and extrema of regression functions
373 -- 382Nelson M. Blachman, Robert Machol. Confidence intervals based on one or more observations
383 -- 392Soura Dasgupta, Yih-Fang Huang. Asymptotically convergent modified recursive least-squares with data-dependent updating and forgetting factor for systems with bounded noise
393 -- 407Jitendra K. Tugnait. Identification of linear stochastic systems via second- and fourth-order cumulant matching
408 -- 0Wlodzimierz Greblicki, Miroslaw Pawlak. Necessary and sufficient conditions for Bayes risk consistency of a recursive kernel classification rule
412 -- 0Philippe Delsarte, Yves V. Genin, Y. Kamp. Stability of linear predictors and numerical range of a linear operator
415 -- 0John S. Sadowsky. On the robust discrimination of Poisson random counting measures
419 -- 0Attilio J. Rainal. First and second passage times of Rayleigh processes
426 -- 0Ian F. Blake, H. Darabian. Approximations for the probability in the tails of the binomial distribution
428 -- 0Jean-Louis Dornstetter. On the equivalence between Berlekamp s and Euclid s algorithms
432 -- 0Michiel H. M. Smid. Duadic codes
434 -- 0Jacobus H. Weber, Cornelis de Vroedt, Dick E. Boekee. New upper bounds on the size of codes correcting asymmetric errors
438 -- 0Jan L. P. de Lameillieure. A heuristic algorithm for the construction of a code with limited word length
443 -- 0Katalin Marton. Sequences achieving the boundary of the entropy region for a two-source are virtually memoryless
448 -- 0Kenneth J. Kerpez. The rate-distortion function of a binary symmetric source when side information may be absent
452 -- 0Kees A. Schouhamer Immink, G. F. M. Beenker. Binary transmission codes with higher order spectral zeros at zero frequency
454 -- 0Michael E. Monaco, James M. Lawler. Corrections and additions to Error recovery for variable length codes by J.C. Maxted and J.P. Robinson

Volume 33, Issue 2

177 -- 195A. Robert Calderbank, Neil J. A. Sloane. New trellis codes based on lattices and cosets
196 -- 202Ephraim Zehavi, Jack K. Wolf. On the performance evaluation of trellis codes
203 -- 209Joseph L. Hibey. Cycle slipping in an optical communication system employing subcarrier angle modulation
210 -- 218Sebastian Engell. New results on the real-time transmission problem
219 -- 223David J. Aldous. Ultimate instability of exponential back-off protocol for acknowledgment-based transmission control of random access communication channels
224 -- 232Fan R. K. Chung, Edward G. Coffman Jr., Martin I. Reiman, Burton Simon. The forwarding index of communication networks
233 -- 237Leonidas Georgiadis, Panayota Papantoni-Kazakos. A 0.487 throughput limited sensing algorithm
238 -- 245Alberto Apostolico, Aviezri S. Fraenkel. Robust transmission of unbounded strings using Fibonacci representations
246 -- 257Tjalling J. Tjalkens, Frans M. J. Willems. Variable to fixed-length codes for Markov sources
263 -- 266Paul C. Shields. The ergodic and entropy theorems revisited
267 -- 284Brian L. Hughes, Prakash Narayan. Gaussian arbitrarily varying channels
285 -- 0Gregory J. Pottie, Desmond P. Taylor. An approach to Ungerboeck coding for rectangular signal sets
290 -- 0Giuliano Benelli, Romano Fantacci. Euclidean distance for combinations of some Hamming codes and binary CPFSK modulation
293 -- 0Bruce L. Montgomery, B. V. K. Vijaya Kumar. On the average codeword length of optimal binary codes for extended sources
296 -- 0John L. Brown Jr.. Detection of a known signal in colored Gaussian noise - A new coordinate approach
298 -- 0Augustus J. E. M. Janssen. Comments on Characterizing the radar ambiguity functions by L. Auslander and R. Tolimieri
299 -- 0Howard H. Ma, Jack K. Wolf. Correction to Binary unequal error-protection block codes formed from convolutional codes by generalized tail-biting (Nov 86 776-786)

Volume 33, Issue 1

3 -- 10Peter Elias. Interval and recency rank source coding: Two on-line adaptive variable-length schemes
11 -- 15George V. Moustakides, John B. Thomas. Robust detection of signals in dependent noise
21 -- 35James Ting-Ho Lo, Sze-Kui Ng. Optimal functional expansion for estimation from counting observations
36 -- 46Patrick A. Kelly, William L. Root. Stability in linear detection
47 -- 51Chiaw-Hock Sim. A stochastic process associated with the EAR(l) model
52 -- 61John S. Sadowsky. An asymptotically least-favorable Chernoff bound for a large class of dependent data processes
62 -- 68Sergio Verdú. Maximum likelihood sequence detection for intersymbol interference channels: A new upper bound on error probability
69 -- 76Te Sun Han, Kingo Kobayashi. A dichotomy of functions F(X, Y) of correlated sources (X, Y)
77 -- 82Vassil Y. Yorgov. A method for constructing inequivalent self-dual codes with applications to length 56
83 -- 90Eli Gafni, Dimitri P. Bertsekas. Asymptotic optimality of shortest path routing algorithms
91 -- 104Larry A. Dunning. Encoding and decoding for the minimization of message symbol error rates in linear block codes
105 -- 115Mansour Loeloeian, Jean Conan. A transform approach to Goppa codes
116 -- 123Abbas A. El Gamal, Lane A. Hemachandra, Itzhak Shperling, Victor K.-W. Wei. Using simulated annealing to design good codes
124 -- 131Rainer A. Rueppel, Othmar Staffelbach. Products of linear recurring sequences with maximum complexity
132 -- 143Israel Cidon, Moshe Sidi. Erasures and noise in splitting multiple access algorithms
144 -- 0M. R. Schroeder, Neil J. A. Sloane. New permutation codes using Hadamard unscrambling
146 -- 0Kyoki Imamura, Wataru Yoshida. A simple derivation of the Berlekamp- Massey algorithm and some applications
150 -- 0Michele Elia. Algebraic decoding of the (23, 12, 7) Golay code
151 -- 0Juriaan Simonis. Binary even [25, 15, 6] codes do not exist
153 -- 0W. M. C. J. van Overveld. Some construction of new burst-error-correcting codes
154 -- 0Hatsukazu Tanaka. Data structure of Huffman codes and its application to efficient encoding and decoding
156 -- 0Bruce L. Montgomery, Julia Abrahams. On the redundancy of optimal binary prefix-condition codes for finite and infinite sources
160 -- 0Bernard C. Picinbono, Michel Bouvet. Constrained Wiener filtering
166 -- 0C. T. Ng, Andrew K. C. Wong. On the nonuniqueness of discretization of two-dimensional probability distribution subject to the maximization of Shannon s entropy
169 -- 0Michael Gutman. On uniform quantization with various distortion measures
172 -- 0R. E. Mortensen. Review of Random Processes: A Mathematical Approach for Engineers (Gray, R.M., and Davisson, L.D.; 1986)