2537 | -- | 2548 | Kenji Yasunaga, Toru Fujiwara. On correctable errors of binary linear codes |
2549 | -- | 2550 | Daniel J. J. Versfeld, James N. Ridley, Hendrik C. Ferreira, Albertus S. J. Helberg. On systematic generator matrices for Reed-Solomon codes |
2551 | -- | 2560 | Itzhak Tamo, Moshe Schwartz. Correcting limited-magnitude errors in the rank-modulation scheme |
2561 | -- | 2567 | Ido Tal, Ron M. Roth. Bounds on the rate of 2-D bit-stuffing encoders |
2568 | -- | 2570 | Asha Rao, Nimalsiri Pinnawala. A family of two-weight irreducible cyclic codes |
2571 | -- | 2582 | Patric R. J. Östergård, Olli Pottonen, Kevin T. Phelps. The perfect binary one-error-correcting codes of length 15: part II-properties |
2583 | -- | 2586 | Shachar Lovett. Holes in generalized Reed-Muller codes |
2587 | -- | 2600 | Kwankyu Lee, Michael E. O Sullivan. Algebraic soft-decision decoding of Hermitian codes |
2601 | -- | 2610 | Ghassan M. Kraidy, Nicolas Gresset, Joseph Jean Boutros. Coding for the nonorthogonal amplify-and-forward cooperative channel |
2611 | -- | 2617 | Torleiv Kløve, Te-Tsung Lin, Shi-Chun Tsai, Wen-Guey Tzeng. Permutation arrays under the Chebyshev distance |
2618 | -- | 2625 | Silas L. Fong, Raymond W. Yeung. Variable-rate linear network coding |
2626 | -- | 2639 | Shashi Kiran Chilappagari, Dung Viet Nguyen, Bane V. Vasic, Michael W. Marcellin. Error correction capability of column-weight-three LDPC codes under the Gallager A algorithm-Part II |
2640 | -- | 2650 | Lei Zhao, Haim H. Permuter. Zero-error feedback capacity of channels with state information via dynamic programming |
2651 | -- | 2667 | Sergio Verdú, Shlomo Shamai. Variable-rate channel capacity |
2668 | -- | 2687 | Seyed Saeed Changiz Rezaei, Shahab Oveis Gharan, Amir K. Khandani. Relay scheduling in the half-duplex Gaussian parallel relay channel |
2688 | -- | 2698 | Jun Muramatsu, Shigeki Miyake. Hash property and fixed-rate universal coding theorems |
2699 | -- | 2713 | Mokshay M. Madiman, Prasad Tetali. Information inequalities for joint distributions, with interpretations and applications |
2753 | -- | 2765 | Dario Fertonani, Tolga M. Duman. Novel bounds on the capacity of the binary deletion channel |
2766 | -- | 2777 | Salem Said, Christian Lageman, Nicolas Le Bihan, Jonathan H. Manton. Decompounding on compact lie groups |
2778 | -- | 2782 | Gábor Molnár-Sáska, Gusztáv Morvai. Intermittent estimation for Gaussian processes |
2783 | -- | 2803 | Hana Godrich, Alexander M. Haimovich, Rick S. Blum. Target localization accuracy gain in MIMO radar-based systems |
2804 | -- | 2815 | Pedro Comesaña, Neri Merhav, Mauro Barni. Asymptotically optimum universal watermark embedding and detection in the high-SNR regime |
2816 | -- | 2828 | Hajar Mahdavi-Doost, Masoud Ebrahimi, Amir K. Khandani. Characterization of SINR region for interfering links with constrained power |
2829 | -- | 2844 | Arun Pachai Kannu, Philip Schniter. On the spectral efficiency of noncoherent doubly selective block-fading channels |
2845 | -- | 2866 | Giuseppe Caire, Nihar Jindal, Mari Kobayashi, Niranjay Ravindran. Multiuser MIMO achievable rates with downlink training and channel state |
2867 | -- | 2874 | Peng-Jun Wan, Chih-Wei Yi, Lixin Wang. Asymptotic critical transmission radius for k-connectivity in wireless ad hoc networks |
2875 | -- | 2886 | Jordi Ros, Wei K. Tsai. A lexicographic optimization framework to the flow control problem |
2887 | -- | 2892 | Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Ephremides. Random access in wireless networks with overlapping cells |
2893 | -- | 2904 | Qasim M. Chaudhari, Erchin Serpedin, Khalid A. Qaraqe. On minimum variance unbiased estimation of clock offset in a two-way message exchange mechanism |
2905 | -- | 2919 | Haim H. Permuter, Yossef Steinberg, Tsachy Weissman. Two-way source coding with a helper |
2920 | -- | 2927 | Mohammadali Khosravifard, Hassan Halabian, T. Aaron Gulliver. A Kraft-type sufficient condition for the existence of D-ary fix-free codes |
2928 | -- | 2937 | Michael Drmota, Yuriy A. Reznik, Wojciech Szpankowski. Tunstall code, Khodak variations, and random walks |
2938 | -- | 2945 | Long Wang, Keqin Feng, San Ling, Chaoping Xing. Asymmetric quantum codes: characterization and constructions |
2946 | -- | 2956 | Frédéric Dupuis, Patrick Hayden, Ke Li. A father protocol for quantum broadcast channels |
2957 | -- | 2960 | Branislav M. Popovic, Oskar Mauritz. Generalized chirp-like sequences with zero correlation zone |
2961 | -- | 2966 | Elena Dubrova. Finding matching initial states for equivalent NLFSRs in the Fibonacci and the Galois configurations |
2967 | -- | 2979 | Wei Wang, Martin J. Wainwright, Kannan Ramchandran. Information-theoretic limits on sparse signal recovery: dense versus sparse measurement matrices |
2980 | -- | 2998 | Raghunandan H. Keshavan, Andrea Montanari, Sewoong Oh. Matrix completion from a few entries |
2999 | -- | 3032 | Ronghui Tu, Yongyi Mao, Jiying Zhao. Is SP BP? |
3033 | -- | 3047 | Elmar Diederichs, Anatoli Juditsky, Vladimir Spokoiny, Christof Schütte. Sparse non-Gaussian component analysis |
3048 | -- | 3053 | Qichun Wang, Jie Peng, Haibin Kan, Xiangyang Xue. Constructions of cryptographically significant boolean functions using primitive polynomials |