1193 | -- | 1203 | Nicolas Sendrier. Finding the permutation between equivalent linear codes: The support splitting algorithm |
1204 | -- | 1216 | Rudolf Ahlswede, Ning Cai, Shuo-Yen Robert Li, Raymond W. Yeung. Network information flow |
1217 | -- | 1226 | Te Sun Han. Weak variable-length source coding |
1227 | -- | 1245 | John C. Kieffer, En-Hui Yang, Gregory J. Nelson, Pamela C. Cosman. Universal lossless compression via multilevel pattern matching |
1246 | -- | 1262 | Serap A. Savari. A probabilistic approach to some asymptotics in noiseless communication |
1263 | -- | 1275 | Udar Mittal, Nam Phamdo. Duality theorems for joint source-channel coding |
1276 | -- | 1291 | Benjamin Belzer. Bounds on the a priori index crossover probabilities for trellis-based channel codes |
1292 | -- | 1301 | Erik Ordentlich, Ron M. Roth. Two-dimensional weight-constrained codes through enumeration bounds |
1302 | -- | 1316 | Josh Hogan, Ron M. Roth, Gitit Ruckenstein. Nested input-constrained codes |
1317 | -- | 1329 | Howard Barnum, Emanuel Knill, Michael A. Nielsen. On quantum fidelities and channel capacities |
1330 | -- | 1338 | Oded Goldreich, Dana Ron, Madhu Sudan. Chinese remaindering with errors |
1339 | -- | 0 | Dan Boneh, Glenn Durfee. Cryptanalysis of RSA with private key d less than N:::0.292::: |
1350 | -- | 1356 | Ueli M. Maurer. Authentication theory and hypothesis testing |
1357 | -- | 1365 | John A. Gubner, Wei-Bin Chang, Majeed M. Hayat. Performance analysis of hypothesis testing for sparse pairwise interaction point processes |
1366 | -- | 1383 | Vladimir P. Dragalin, Alexander G. Tartakovsky, Venugopal V. Veeravalli. Multihypothesis sequential probability ratio tests - Part II: Accurate asymptotic expansions for the expected sample size |
1384 | -- | 1400 | Ì. Emre Telatar, David N. C. Tse. Capacity and mutual information of wideband multipath fading channels |
1401 | -- | 1425 | Oren Somekh, Shlomo Shamai. Shannon-theoretic approach to a Gaussian cellular multiple-access channel with fading |
1426 | -- | 1447 | Kiran, David N. C. Tse. Effective interference and effective bandwidth of linear multiuser receivers in asynchronous CDMA systems |
1448 | -- | 1458 | Seong Ill Park, So Ryoung Park, Iickho Song, Naoki Suehiro. Multiple-access interference reduction for QS-CDMA systems with a novel class of polyphase sequences |
1459 | -- | 1482 | Lei Wei, Honghui Qi. Near-optimal limited-search detection on ISI/CDMA channels and decoding of long convolutional codes |
1483 | -- | 1494 | Giulio Colavolpe, Riccardo Raheli. Theoretical analysis and performance limits of noncoherent sequence detection of coded PSK |
1495 | -- | 1509 | Aleksandar Kavcic, José M. F. Moura. Matrices with banded inverses: Inversion algorithms and factorization of Gauss-Markov processes |
1510 | -- | 1514 | Rolf Johannesson, Per Ståhl, Emma Wittenmark. A note on type II convolutional codes |
1514 | -- | 1523 | Yaron Shany, Yair Be ery. Linear tail-biting trellises, the square-root bound, and applications for Reed-Muller codes |
1523 | -- | 1527 | Yaron Shany, Yair Be ery. Bounds on the state complexity of codes from the Hermitian function field and its subfields |
1527 | -- | 1532 | Chaoping Xing, San Ling. A class of linear codes with good parameters from algebraic curves |
1532 | -- | 1535 | Patrick Solé. Towers of function fields and iterated means |
1535 | -- | 1538 | Hao Chen. On the minimum distances of Schubert codes |
1539 | -- | 1544 | Iliya Bouyukliev, David B. Jaffe, Vesselin Vavrek. The smallest length of eight-dimensional binary linear codes with prescribed minimum distance |
1544 | -- | 1545 | Juriaan Simonis. Adding a parity-check bit |
1545 | -- | 1550 | Kathy J. Horadam, Parampalli Udaya. Cocyclic Hadamard codes |
1550 | -- | 1554 | Noboru Hamada, Tor Helleseth, Halvard Martinsen, Øyvind Ytrehus. There is no ternary [28, 6, 16] code |
1554 | -- | 1558 | Irfan Siap, Nuh Aydin, Dwijendra K. Ray-Chaudhuri. New ternary quasi-cyclic codes with better minimum distances |
1558 | -- | 1564 | Arkadii G. D yachkov, David C. Torney. On similarity codes |
1564 | -- | 1572 | Rasmus Refslund Nielsen. A class of Sudan-decodable codes |
1573 | -- | 1580 | Xiao Ma, Xin-mei Wang. On the minimal interpolation problem and decoding RS codes |
1580 | -- | 1584 | Michael Schmidt, Gerhard Fettweis. On memory redundancy in the BCJR algorithm for nonrecursive shift register processes |
1584 | -- | 1589 | Catherine Lamy, Joseph Boutros. On random rotations diversity and minimum MSE decoding of lattices |
1590 | -- | 1597 | Jos H. Weber, Khaled A. S. Abdel-Ghaffar. Guaranteed error correction rate for a simple concatenated coding scheme with single-trial decoding |
1597 | -- | 1599 | Fang-Wei Fu, Torleiv Kløve, Shu-Tao Xia. The undetected error probability threshold of m-out-of-n codes |
1599 | -- | 1602 | Khaled A. S. Abdel-Ghaffar, Jos H. Weber. Constructing efficient DC-free runlength-limited block codes for recording channels |
1602 | -- | 1609 | Flemming Topsøe. Some inequalities for information divergence and related measures of discrimination |
1610 | -- | 1617 | Uri Erez, Ram Zamir. Noise prediction for channels with side information at the transmitter |
1617 | -- | 1623 | Tamás Linder. On the training distortion of vector quantizers |
1623 | -- | 1633 | Vivek K. Goyal, Jun Zhuang, Martin Vetterli. Transform coding with backward adaptive updates |
1633 | -- | 1637 | Karthik Visweswariah, Sanjeev R. Kulkarni, Sergio Verdú. Universal coding of nonstationary sources |
1637 | -- | 1644 | Sze-Lok Chan, Mordecai J. Golin. A dynamic programming algorithm for constructing optimal 1 -ended binary prefix-free codes |
1644 | -- | 1649 | Samuel L. Braunstein, Christopher A. Fuchs, Daniel Gottesman, Hoi-Kwong Lo. A quantum analog of huffman coding |
1649 | -- | 1653 | Maurizio Magarini, Arnaldo Spalvieri. Optimization of distributed detection systems under the minimum average misclassification risk criterion |
1654 | -- | 1658 | Steven Kay. Sufficiency, classification, and the class-specific feature theorem |
1658 | -- | 1665 | Ulf Grenander, Anuj Srivastava, Michael I. Miller. Asymptotic performance analysis of Bayesian target recognition |
1666 | -- | 1673 | Jean-Jacques Fuchs, Bernard Delyon. Minimal L1-norm reconstruction function for oversampled signals: Applications to time-delay estimation |
1673 | -- | 1676 | Roland Averkamp, Christian Houdré. A note on the discrete wavelet transform of second-order processes |
1677 | -- | 1682 | Jesús Navarro-Moreno, Juan Carlos Ruiz-Molina, Mariano J. Valderrama. A solution to linear estimation problems using approximate Karhunen-Loéve expansions |
1683 | -- | 1691 | Tommy Guess, Mahesh K. Varanasi. Error exponents for maximum-likelihood and successive decoders for the Gaussian CDMA channel |
1691 | -- | 1695 | Shinya Matsufuji, Kyoki Imamura. A spread-spectrum communication system protecting information data from interception |
1695 | -- | 1696 | Cédric Villani. A short proof of the "Concavity of entropy power" |