Journal: IEEE Transactions on Information Theory

Volume 64, Issue 9

5989 -- 6012Ebrahim MolavianJazi, Aylin Yener. Subset Source Coding
6013 -- 6033Alon Kipnis, Yonina C. Eldar, Andrea J. Goldsmith. Fundamental Distortion Limits of Analog-to-Digital Compression
6034 -- 6053Lei Yu 0003, Houqiang Li, Weiping Li. Distortion Bounds for Source Broadcast Problems
6054 -- 6069Daniyar Chumbalov, Andrei E. Romashchenko. On the Combinatorial Version of the Slepian-Wolf Problem
6070 -- 6080Abram Magner, Krzysztof Turowski, Wojciech Szpankowski. Lossless Compression of Binary Trees With Correlated Vertex Names
6081 -- 6097Basak Guler, Deniz Gündüz, Aylin Yener. Lossy Coding of Correlated Sources Over a Multiple Access Channel: Necessary Conditions and Separation Results
6098 -- 6114Rayan Saab, Rongrong Wang, Özgür Yilmaz. From Compressed Sensing to Compressed Bit-Streams: Practical Encoders, Tractable Decoders
6115 -- 6126Kenji Yamanishi, Shintaro Fukushima. Model Change Detection With the MDL Principle
6127 -- 6138Jungseul Ok, Sewoong Oh, Jinwoo Shin, Yung Yi. Optimal Inference in Crowdsourced Classification via Belief Propagation
6139 -- 6160Xi Chen 0010, Sivakanth Gopi, Jieming Mao, Jon Schneider. Optimal Instance Adaptive Algorithm for the Top-K Ranking Problem
6161 -- 6179Anusha Lalitha, Tara Javidi, Anand D. Sarwate. Social Learning and Distributed Hypothesis Testing
6180 -- 6195Jiangfan Zhang, Rick S. Blum, Lance M. Kaplan, Xuanxuan Lu. A Fundamental Limitation on Maximum Parameter Dimension for Accurate Estimation With Quantized Data
6196 -- 6207Anelia Somekh-Baruch. Converse Theorems for the DMC With Mismatched Decoding
6208 -- 6222Marco Dalai, Yury Polyanskiy. Bounds on the Reliability Function of Typewriter Channels
6223 -- 6235Neri Merhav. Error Exponents of Typical Random Codes
6236 -- 6256Wei Yang 0001, Austin Collins, Giuseppe Durisi, Yury Polyanskiy, H. Vincent Poor. Beta-Beta Bounds: Finite-Blocklength Analog of the Golden Formula
6257 -- 6267Jie Li 0019, Xiaohu Tang, Chao Tian. A Generic Transformation to Enable Optimal Repair in MDS Codes for Distributed Storage Systems
6268 -- 6276Elise Barelli, Peter Beelen, Mrinmoy Datta, Vincent Neiger, Johan Rosenkilde. Two-Point Codes for the Generalized GK Curve
6277 -- 6282Lingfei Jin, Chaoping Xing. Algebraic Geometry Codes With Complementary Duals Exceed the Asymptotic Gilbert-Varshamov Bound
6283 -- 6296S. M. Hossein Tabatabaei Yazdi, Han Mao Kiah, Ryan Gabrys, Olgica Milenkovic. Mutually Uncorrelated Primers for DNA-Based Data Storage
6297 -- 6304Antonia Wachter-Zeh. List Decoding of Insertions and Deletions
6305 -- 6314Maosheng Xiong. On Cyclic Codes of Composite Length and the Minimum Distance
6315 -- 6319Liqing Xu, Hao Chen 0029. New Constant-Dimension Subspace Codes from Maximum Rank Distance Codes
6320 -- 6332Brian M. Kurkoski. Encoding and Indexing of Lattice Codes
6333 -- 6339Gilles R. Ducharme, Philippe Maurine. Estimating the Signal-to-Noise Ratio Under Repeated Sampling of the Same Centered Signal: Applications to Side-Channel Attacks on a Cryptoprocessor
6340 -- 6361Alexei Ashikhmin, Liangbin Li, Thomas L. Marzetta. Interference Reduction in Multi-Cell Massive MIMO Systems With Large-Scale Fading Precoding
6362 -- 6383Shih-Chun Lin, I-Hsiang Wang. Gaussian Broadcast Channels With Intermittent Connectivity and Hybrid State Information at the Transmitter
6384 -- 6418Charalambos D. Charalambous, Christos K. Kourtellaris, Sergey Loyka. Capacity Achieving Distributions and Separation Principle for Feedback Gaussian Channels With Memory: the LQG Theory of Directed Information
6419 -- 6428Clement Kam, Sastry Kompella, Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Ephremides. On the Age of Information With Packet Deadlines
6429 -- 6442Jianghua Zhong, Dongdai Lin. On Minimum Period of Nonlinear Feedback Shift Registers in Grain-Like Structure
6443 -- 6453Claude Carlet. Characterizations of the Differential Uniformity of Vectorial Functions by the Walsh Transform
6454 -- 6459Cupjin Huang, Zihan Tan, Shenghao Yang, Xuan Guang. Comments on Cut-Set Bounds on Network Function Computation
6460 -- 0Chandra Thapa, Lawrence Ong, Sarah J. Johnson. Corrections to "Interlinked Cycles for Index Coding: Generalizing Cycles and Cliques"

Volume 64, Issue 8

5457 -- 5477Kiryung Lee, Yanjun Li, Kyong Hwan Jin, Jong Chul Ye. Unified Theory for Recovery of Sparse Signals in a General Transform Domain
5478 -- 5487Sjoerd Dirksen, Guillaume Lecué, Holger Rauhut. On the Gap Between Restricted Isometry Properties and Sparse Recovery Conditions
5488 -- 5497Jonathan Weed. Approximately Certifying the Restricted Isometry Property is Hard
5498 -- 5512Yuan Li 0006, Garvesh Raskutti. q-Ball Sparsity
5513 -- 5530Larry Goldstein, Stanislav Minsker, Xiaohan Wei. Structured Signal Recovery From Non-Linear and Heavy-Tailed Measurements
5531 -- 5548Holger Boche, Ezra Tampubolon. PAPR Problem for Walsh Systems and Related Problems
5549 -- 5554Anelia Somekh-Baruch, Amir Leshem, Venkatesh Saligrama. On the Non-Existence of Unbiased Estimators in Constrained Estimation Problems
5555 -- 5569Mark Kozdoba, Shie Mannor. Source Estimation in Time Series and the Surprising Resilience of HMMs
5570 -- 5580Thomas Hirschler, Wolfgang Woess. Comparing Entropy Rates on Finite and Infinite Rooted Trees
5581 -- 5591Abhik Ghosh, Ayanendranath Basu. A New Family of Divergences Originating From Model Adequacy Tests and Application to Robust Statistical Inference
5592 -- 5628Christos Thrampoulidis, Ehsan Abbasi, Babak Hassibi. Precise Error Analysis of Regularized M-Estimators in High Dimensions
5629 -- 5661Weihao Gao, Sewoong Oh, Pramod Viswanath. Demystifying Fixed k-Nearest Neighbor Information Estimators
5662 -- 5676Min Ye 0005, Alexander Barg. Optimal Schemes for Discrete Distribution Estimation Under Locally Differential Privacy
5677 -- 5690Jianping He, Lin Cai 0001, Xinping Guan. Preserving Data-Privacy With Added Noises: Optimal Estimation and Privacy Analysis
5691 -- 5703Thomas A. Courtade, Max Fathi, Ashwin Pananjady. Quantitative Stability of the Entropy Power Inequality
5704 -- 5725Anuran Makur, Yury Polyanskiy. Comparison of Channels: Criteria for Domination by a Symmetric Channel
5726 -- 5742Chien-Yi Wang, Michele A. Wigger, Abdellatif Zaidi. On Achievability for Downlink Cloud Radio Access Networks With Base Station Cooperation
5743 -- 5754Hua Sun, Syed Ali Jafar. Multiround Private Information Retrieval: Capacity and Storage Overhead
5755 -- 5766Chong Shangguan, YiWei Zhang, Gennian Ge. Centralized Coded Caching Schemes: A Hypergraph Theoretical Approach
5767 -- 5768T. S. Jayram, Erdal Arikan. A Note on Some Inequalities Used in Channel Polarization and Polar Coding
5769 -- 5775Cunsheng Ding, Hao Liu 0011, Vladimir D. Tonchev. 2(n)
5776 -- 5782Bocong Chen, Hongwei Liu. New Constructions of MDS Codes With Complementary Duals
5783 -- 5805N. Prakash, Vitaly Abdrashitov, Muriel Médard. The Storage Versus Repair-Bandwidth Trade-off for Clustered Storage Systems
5806 -- 5812Yeow Meng Chee, Xiande Zhang. Optimal q-Ary Error Correcting/All Unidirectional Error Detecting Codes
5813 -- 5831Sivakanth Gopi, Swastik Kopparty, Rafael Mendes de Oliveira, Noga Ron-Zewi, Shubhangi Saraf. Locally Testable and Locally Correctable Codes approaching the Gilbert-Varshamov Bound
5832 -- 5861Günther Koliander, Dominic Schuhmacher, Franz Hlawatsch. Rate-Distortion Theory of Finite Point Processes
5862 -- 5878Cheuk Ting Li, Abbas El Gamal. Extended Gray-Wyner System With Complementary Causal Side Information
5879 -- 5897Lin Zhou 0002, Vincent Y. F. Tan, Lei Yu 0003, Mehul Motani. Exponential Strong Converse for Content Identification With Lossy Recovery
5898 -- 5919Joseph Kampeas, Asaf Cohen 0001, Omer Gurewitz. The Ergodic Capacity of the Multiple Access Channel Under Distributed Scheduling - Order Optimality of Linear Receivers
5920 -- 5937Dor Shaviv, Ayfer Özgür. Online Power Control for Block i.i.d. Energy Harvesting Channels
5938 -- 5956Srdjan Z. Budisin, Predrag Spasojevic. K
5957 -- 5960Richard Hofer, Arne Winterhof. On the 2-Adic Complexity of the Two-Prime Generator
5961 -- 5969Elie N. Mambou, Theo G. Swart. A Construction for Balancing Non-Binary Sequences Based on Gray Code Prefixes
5970 -- 5984Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento. Commitment and Oblivious Transfer in the Bounded Storage Model With Errors
5985 -- 0Wataru Kumagai, Masahito Hayashi. Corrections to "Random Number Conversion and LOCC Conversion via Restricted Storage"

Volume 64, Issue 7

4689 -- 4708Felix Leditzky, Nilanjana Datta, Graeme Smith. Useful States and Entanglement Distillation
4709 -- 4728Shima Bab Hadiashar, Ashwin Nayak, Renato Renner. Communication Complexity of One-Shot Remote State Preparation
4729 -- 4738Dmitri Maslov, Martin Roetteler. Shorter Stabilizer Circuits via Bruhat Decomposition and Quantum Circuit Transformations
4739 -- 4757Christoph Hirche, David Reeb. Bounds on Information Combining With Quantum Side Information
4758 -- 4765Angela Capel, Angelo Lucia, David Pérez-García. Superadditivity of Quantum Relative Entropy for General States
4766 -- 4783Yuxiang Yang, Ge Bai, Giulio Chiribella, Masahito Hayashi. Compression for Quantum Population Coding
4784 -- 4791Vladimir Man'Ko, Liubov Markovich. Optimal Nonlinear Filtering of Quantum State
4792 -- 4818Kiryung Lee, Ning Tian, Justin Romberg. Fast and Guaranteed Blind Multichannel Deconvolution Under a Bilinear System Model
4819 -- 4842Thomas Wiatowski, Philipp Grohs, Helmut Bölcskei. Energy Propagation in Deep Convolutional Neural Networks
4843 -- 4871Hamid Ghourchian, Arash Amini, Amin Gohari. How Compressible Are Innovation Processes?
4872 -- 4894Jess Banks, Cristopher Moore, Roman Vershynin, Nicolas Verzelen, Jiaming Xu. Information-Theoretic Bounds and Phase Transitions in Clustering, Sparse PCA, and Submatrix Localization
4895 -- 4906Miguel Abadi, Sandro Gallo, Erika Alejandra Rada-Mora. The Shortest Possible Return Time of β-Mixing Processes
4907 -- 4922Danna Zhang, Wei Biao Wu. Asymptotic Theory for Estimators of High-Order Statistics of Stationary Processes
4923 -- 4939Shun Watanabe. Neyman-Pearson Test for Zero-Rate Multiterminal Hypothesis Testing
4940 -- 4961Oron Sabag, Haim H. Permuter, Navin Kashyap. Feedback Capacity and Coding for the BIBO Channel With a No-Repeated-Ones Input Constraint
4962 -- 4992Christos K. Kourtellaris, Charalambos D. Charalambous. Information Structures for Feedback Capacity of Channels With Memory and Transmission Cost: Stochastic Optimal Control and Variational Equalities
4993 -- 5016Martin Mittelbach, Eduard A. Jorswieck. Coding Theorem and Converse for Abstract Channels With Time Structure and Memory
5017 -- 5041Hon-Fah Chong, Ying-Chang Liang. On the Capacity Region of the Parallel Degraded Broadcast Channel With Three Receivers and Three-Degraded Message Sets
5042 -- 5069Michael Heindlmaier, Shirin Saeedi Bidokhti. Capacity Regions of Two-Receiver Broadcast Erasure Channels With Feedback and Memory
5070 -- 5086Ran Averbuch, Neri Merhav. Exact Random Coding Exponents and Universal Decoders for the Asymmetric Broadcast Channel
5087 -- 5100Remi A. Chou, Matthieu R. Bloch, Jörg Kliewer. Empirical and Strong Coordination via Soft Covering With Polar Codes
5101 -- 5109Tetsuya Kobayashi, Hiroyoshi Morita, Akiko Manada. On the Capacity of Write-Constrained Memories
5110 -- 5130Zhao Wang, Rafael F. Schaefer, Mikael Skoglund, Ming Xiao, H. Vincent Poor. Strong Secrecy for Interference Channels Based on Channel Resolvability
5131 -- 5155Gerhard Kramer. Autocorrelation Function for Dispersion-Free Fiber Channels With Distributed Amplification
5156 -- 5169Mladen Kovacevic 0001, Vincent Y. F. Tan. Codes in the Space of Multisets - Coding for Permutation Channels With Impairments
5170 -- 5178Krishna Kaipa. An Improvement of the Asymptotic Elias Bound for Non-Binary Codes
5179 -- 5190Yong Li 0023, Yunde Duan, Hsin-Chiu Chang, Hongqing Liu, Trieu-Kien Truong. Using the Difference of Syndromes to Decode Quadratic Residue Codes
5191 -- 5218Hsuan-Yin Lin, Stefan M. Moser, Po-Ning Chen. Weak Flip Codes and their Optimality on the Binary Erasure Channel
5219 -- 5230Ronen Karni, Moshe Schwartz 0001. Infinity-Norm Permutation Covering Codes From Cyclic Groups
5231 -- 5239Antonio Campello. Random Ensembles of Lattices From Generalized Reductions
5240 -- 5260Jennifer Tang, Da Wang, Yury Polyanskiy, Gregory W. Wornell. Defect Tolerance: Fundamental Limits and Examples
5261 -- 5276Jasper Goseling, Cedomir Stefanovic, Petar Popovski. Sign-Compute-Resolve for Tree Splitting Random Access
5277 -- 5295Maxim Lvov, Haim H. Permuter. Initialization Algorithms for Convolutional Network Coding
5296 -- 5311Rafid Mahmood, Ahmed Badr, Ashish Khisti. Streaming Codes for Multiplicative-Matrix Channels With Burst Rank Loss
5312 -- 5325Giusi Alfano, Carla-Fabiana Chiasserini, Alessandro Nordio, Siyuan Zhou. Information-Theoretic Characterization of MIMO Systems With Multiple Rayleigh Scattering
5326 -- 5358Victor Quintero, Samir Medina Perlaza, Inaki Esnaola, Jean-Marie Gorce. Approximate Capacity Region of the Two-User Gaussian Interference Channel With Noisy Channel-Output Feedback
5359 -- 5380Jad Hachem, Urs Niesen, Suhas N. Diggavi. Degrees of Freedom of Cache-Aided Wireless Interference Networks
5381 -- 5394Qing He, Di Yuan, Anthony Ephremides. Optimal Link Scheduling for Age Minimization in Wireless Systems
5395 -- 5418Maialen Larrañaga, Mohamad Assaad, Apostolos Destounis, Georgios S. Paschos. Asymptotically Optimal Pilot Allocation Over Markovian Fading Channels
5419 -- 5431Lijun Ji, Baokun Ding, Xin Wang, Gennian Ge. Asymptotically Optimal Optical Orthogonal Signature Pattern Codes
5432 -- 5440Samir Hodzic, Wilfried Meidl, Enes Pasalic. Full Characterization of Generalized Bent Functions as (Semi)-Bent Spaces, Their Dual, and the Gray Image
5441 -- 5452Sihem Mesnager, Chunming Tang, Yanfeng Qi, Libo Wang, Baofeng Wu, Keqin Feng. Further Results on Generalized Bent Functions and Their Complete Characterization
5453 -- 5454Thomas A. Courtade, Guangyue Han, Yaochen Wu. Counterexample to the Vector Generalization of Costa's Entropy Power Inequality, and Partial Resolution
5455 -- 0Wataru Kumagai, Masahito Hayashi. Corrections to "Second-Order Asymptotics of Conversions of Distributions and Entangled States Based on Rayleigh-Normal Probability Distributions"

Volume 64, Issue 6

3957 -- 3974Imre Csiszár, Thomas Breuer. Expected Value Minimization in Information Theoretic Multiple Priors Models
3975 -- 4000Ali Ahmed 0004, Laurent Demanet. Leveraging Diversity and Sparsity in Blind Deconvolution
4001 -- 4023Reinhard Heckel, Mahdi Soltanolkotabi. Generalized Line Spectral Estimation via Convex Optimization
4024 -- 4043Jie Ding, Vahid Tarokh, Jing-yu Yang. Bridging AIC and BIC: A New Criterion for Autoregression
4044 -- 4071Armin Eftekhari, Dehui Yang, Michael B. Wakin. Weighted Matrix Completion and Recovery With Prior Subspace Information
4072 -- 4080Guy Bresler, David Gamarnik, Devavrat Shah. Learning Graphical Models From the Glauber Dynamics
4081 -- 4104Michael Tschannen, Helmut Bölcskei. Noisy Subspace Clustering via Matching Pursuits
4105 -- 4119Gregory J. Puleo, Olgica Milenkovic. Correlation Clustering and Biclustering With Locally Bounded Errors
4120 -- 4128Lee-Ad Gottlieb, Aryeh Kontorovich, Pinhas Nisnevitch. Near-Optimal Sample Compression for Nearest Neighbors
4129 -- 4158Samet Oymak, Benjamin Recht, Mahdi Soltanolkotabi. Sharp Time-Data Tradeoffs for Linear Inverse Problems
4159 -- 4178Martin Slawski, Ping Li. On the Trade-Off Between Bit Depth and Number of Samples for a Basic Approach to Structured Signal Recovery From b-Bit Quantized Linear Measurements
4179 -- 4190Ilan Komargodski, Moni Naor, Eylon Yogev. How to Share a Secret, Infinitely
4191 -- 4206Umberto Martínez-Peñas. Communication Efficient and Strongly Secure Secret Sharing Schemes Based on Algebraic Geometry Codes
4207 -- 4227Arpita Patra, Divya Ravi. On the Power of Hybrid Networks in Multi-Party Computation
4228 -- 4232Domingo Gómez-Pérez, László Mérai, Harald Niederreiter. On the Expansion Complexity of Sequences Over Finite Fields
4233 -- 4258Hugues Mercier, Maxime Augier, Arjen K. Lenstra. STeP-Archival: Storage Integrity and Tamper Resistance Using Data Entanglement
4259 -- 4281Changho Suh, Jaewoong Cho, David Tse. Two-Way Interference Channel Capacity: How to Have the Cake and Eat It Too
4282 -- 4293Parham Noorzad, Michelle Effros, Michael Langberg. Can Negligible Rate Increase Network Reliability?
4294 -- 4308Eli Haim, Yuval Kochman, Uri Erez. On Random-Coding Union Bounds With and Without Erasures
4309 -- 4322Ori Rottenstreich, Yuval Cassuto. Optimal Compression for Two-Field Entries in Fixed-Width Memories
4323 -- 4346Igal Sason, Sergio Verdú. Improved Bounds on Lossless Source Coding and Guessing Moments via Rényi Measures
4347 -- 4364Qianqian Yang, Deniz Gündüz. Coded Caching and Content Delivery With Heterogeneous Distortion Requirements
4365 -- 4378Ahmed Badr, Devin Lui, Ashish Khisti, Wai-tian Tan, Xiaoqing Zhu, John G. Apostolopoulos. Multiplexed Coding for Multiple Streams With Different Decoding Delays
4379 -- 4381Tarik Kaced. Information Inequalities are Not Closed Under Polymatroid Duality
4382 -- 4391Abhishek Bhowmick 0001, Shachar Lovett. The List Decoding Radius for Reed-Muller Codes Over Small Fields
4392 -- 4398Tim L. Alderson. 3-Dimensional Optical Orthogonal Codes With Ideal Autocorrelation-Bounds and Optimal Constructions
4399 -- 4411Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nian Li, Bo Sun. On Upper Bounds for Algebraic Degrees of APN Functions
4412 -- 4422Ron M. Roth, Netanel Raviv, Itzhak Tamo. Construction of Sidon Spaces With Applications to Coding
4423 -- 4437Badih Ghazi, Euiwoong Lee. LP/SDP Hierarchy Lower Bounds for Decoding Random LDPC Codes
4438 -- 4451Ali Dehghan 0001, Amir H. Banihashemi. On the Tanner Graph Cycle Distribution of Random LDPC, Random Protograph-Based LDPC, and Random Quasi-Cyclic LDPC Code Ensembles
4452 -- 4466Shojiro Sakata, Masaya Fujisawa. Fast Decoding of Dual Multipoint Codes From Algebraic Curves Up to the Kirfel-Pellikaan Bound
4467 -- 4479Qiwen Wang, Sidharth Jaggi. End-to-End Error-Correcting Codes on Networks With Worst-Case Bit Errors
4480 -- 4495Elisa Gorla, Alberto Ravagnani. An Algebraic Framework for End-to-End Physical-Layer Network Coding
4496 -- 4512Wentao Huang, Tracey Ho, Michael Langberg, Jörg Kliewer. Single-Unicast Secure Network Coding and Network Error Correction are as Hard as Multiple-Unicast Network Coding
4513 -- 4529Xuan Guang, Raymond W. Yeung. Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach
4530 -- 4539Xunrui Yin, Zongpeng Li, Yaduo Liu, Xin Wang. A Reduction Approach to the Multiple-Unicast Conjecture in Network Coding
4540 -- 4561Zhiying Wang, Viveck R. Cadambe. Multi-Version Coding - An Information-Theoretic Perspective of Consistent Distributed Storage
4562 -- 4580Henry P. Romero, Mahesh K. Varanasi. Hierarchical Successive Group Decoding Achieves Capacity in the Multiple Access Channel With General Message Sets
4581 -- 4593Sunghyun Kim, I-Hsiang Wang, Changho Suh. A Relay Can Increase Degrees of Freedom in Bursty Interference Networks
4594 -- 4609Rhys Bowden, Darryl Veitch. Finding the Right Tree: Topology Inference Despite Spatial Dependences
4610 -- 4628Pranav Sakulkar, Bhaskar Krishnamachari. Online Learning Schemes for Power Allocation in Energy Harvesting Communications
4629 -- 4652An Liu 0001, Vincent K. N. Lau, Giuseppe Caire. Cache-Induced Hierarchical Cooperation in Wireless Device-to-Device Caching Networks
4653 -- 4663Honggang Hu, Xiaolong Yang, Shaohua Tang. New Classes of Ternary Bent Functions From the Coulter-Matthews Bent Functions
4664 -- 4673Raul Garcia-Patron, William Matthews, Andreas J. Winter 0002. Quantum Enhancement of Randomness Distribution
4674 -- 4685Markus Grassl, Linghang Kong, Zhaohui Wei, Zhang-Qi Yin, Bei Zeng. Quantum Error-Correcting Codes for Qudit Amplitude Damping
4686 -- 0Tadashi Wadayama. Comments on "Nonadaptive Group Testing Based on Sparse Pooling Graphs"

Volume 64, Issue 5

3237 -- 3253Jayakrishnan Unnikrishnan, Saeid Haghighatshoar, Martin Vetterli. Unlabeled Sensing With Random Linear Measurements
3254 -- 3273Vince Lyzinski. Information Recovery in Shuffled Graphs via Graph Matching
3274 -- 3285Abhinav V. Sambasivan, Jarvis D. Haupt. Minimax Lower Bounds for Noisy Matrix Completion Under Sparse Factor Models
3286 -- 3300Ashwin Pananjady, Martin J. Wainwright, Thomas A. Courtade. Linear Regression With Shuffled Data: Statistical and Computational Limits of Permutation Recovery
3301 -- 3312Irène Waldspurger. Phase Retrieval With Random Gaussian Sensing Vectors by Alternating Projections
3313 -- 3330Weihao Gao, Sewoong Oh, Pramod Viswanath. Breaking the Bandwidth Barrier: Geometrical Adaptive Entropy Estimation
3331 -- 3345Dong Dai, Lei Han, Ting Yang, Tong Zhang. Bayesian Model Averaging With Exponentiated Least Squares Loss
3346 -- 3360Georgios Fellouris, Erhan Bayraktar, Lifeng Lai. Efficient Byzantine Sequential Change Detection
3361 -- 3370Alix Lheritier, Frédéric Cazals. A Sequential Non-Parametric Multivariate Two-Sample Test
3371 -- 3393Marco Mondelli, S. Hamed Hassani, Rüdiger L. Urbanke. How to Achieve the Capacity of Asymmetric Channels
3394 -- 3402Chaoping Xing, Chen Yuan. A New Class of Rank-Metric Codes and Their List Decoding Beyond the Unique Decoding Radius
3403 -- 3410Joshua Brakensiek, Venkatesan Guruswami, Samuel Zbarsky. Efficient Low-Redundancy Codes for Correcting Multiple Deletions
3411 -- 3430Yoones Hashemi, Amir H. Banihashemi. Characterization of Elementary Trapping Sets in Irregular LDPC Codes and the Corresponding Efficient Exhaustive Search Algorithms
3431 -- 3449Vahid Aref, Narayanan Rengaswamy, Laurent Schmalen. Finite-Length Analysis of Spatially-Coupled Regular LDPC Ensembles on Burst-Erasure Channels
3450 -- 3460Yujie Gu, Ying Miao. Bounds on Traceability Schemes
3461 -- 3480Ardhendu Tripathy, Aditya Ramamoorthy. Sum-Networks From Incidence Structures: Construction and Capacity Analysis
3481 -- 3492Abhishek Agarwal, Alexander Barg, Sihuang Hu, Arya Mazumdar, Itzhak Tamo. Combinatorial Alphabet-Dependent Bounds for Locally Recoverable Codes
3493 -- 3512Imad Ahmad, Chih-Chun Wang. Locally Repairable Regenerating Codes: Node Unavailability and the Insufficiency of Stationary Local Repair
3513 -- 3527Wentu Song, Kai Cai, Chau Yuen, Kui Cai, Guangyue Han. On Sequential Locally Repairable Codes
3528 -- 3537Claudio Qureshi, Sueli I. R. Costa, Christiane B. Rodrigues, Marcelo Firer. On Equivalence of Binary Asymmetric Channels Regarding the Maximum Likelihood Decoding
3538 -- 3578Annina Bracher, Amos Lapidoth. The Zero-Error Feedback Capacity of State-Dependent Channels
3579 -- 3589Ashok Vardhan Makkuva, Yihong Wu 0001. Equivalence of Additive-Combinatorial Linear Inequalities for Shannon Entropy and Differential Entropy
3590 -- 3609Elon Lindenstrauss, Masaki Tsukamoto. From Rate Distortion Theory to Metric Mean Dimension: Variational Principle
3610 -- 3615Tarik Kaced, Andrei E. Romashchenko, Nikolai K. Vereshchagin. A Conditional Information Inequality and Its Combinatorial Applications
3616 -- 3632Lei Yu 0003, Vincent Y. F. Tan. Wyner's Common Information Under Rényi Divergence Measures
3633 -- 3654Benjamin Larrousse, Samson Lasaulce, Matthieu R. Bloch. Coordination in Distributed Networks via Coded Actions With Application to Power Control
3655 -- 3678Parham Noorzad, Michelle Effros, Michael Langberg. The Unbounded Benefit of Encoder Cooperation for the $k$ -User MAC
3679 -- 3695Simon Li, Ashish Khisti, Aditya Mahajan. Information-Theoretic Privacy for Smart Metering Systems with a Rechargeable Battery
3696 -- 3714Wenwen Tu, Lifeng Lai. Keyless Authentication and Authenticated Capacity
3715 -- 3733Semih Yagli, Yucel Altug, Sergio Verdú. Minimax Rényi Redundancy
3734 -- 3755Vincent Y. F. Tan, Masahito Hayashi. Analysis of Remaining Uncertainties and Exponents Under Various Conditional Rényi Entropies
3756 -- 3780Lin Zhou 0002, Vincent Y. F. Tan, Mehul Motani. Achievable Moderate Deviations Asymptotics for Streaming Compression of Correlated Sources
3781 -- 3809Farhad Shirani Chaharsooghi, S. Sandeep Pradhan. An Achievable Rate-Distortion Region for Multiple Descriptions Source Coding Based on Coset Codes
3810 -- 3824Alon Kipnis, Andrea J. Goldsmith, Yonina C. Eldar. The Distortion Rate Function of Cyclostationary Gaussian Processes
3825 -- 3841Burak Çakmak, Ralf R. Müller, Bernard H. Fleury. Capacity Scaling in MIMO Systems With General Unitarily Invariant Random Matrices
3842 -- 3864Xinping Yi, Giuseppe Caire. Topological Interference Management With Decoded Message Passing
3865 -- 3882Sudeep Kamath, Venkatachalam Anantharam, David Tse, Chih-Chun Wang. The Two-Unicast Problem
3883 -- 3893Weiping Zhu. Statistical Properties of Loss Rate Estimators in Tree Topology
3894 -- 3915Mauro Barni, Benedetta Tondi. Adversarial Source Identification Game With Corrupted Training
3916 -- 3926Cheuk Ting Li, Abbas El Gamal. Maximal Correlation Secrecy
3927 -- 3943Carlos Aguilar Melchor, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Gilles Zémor. Efficient Encryption From Random Quasi-Cyclic Codes
3944 -- 3952Yupeng Jiang, Dongdai Lin. Lower and Upper Bounds on the Density of Irreducible NFSRs
3953 -- 0S. Sandeep Pradhan, Mohsen Heidari, Aria Ghasemian Sahebi. Corrections to "Abelian Group Codes for Channel Coding and Source Coding"

Volume 64, Issue 4

2173 -- 2192Thomas A. Courtade. A Strong Entropy Power Inequality
2193 -- 2211Salman Beigi, Amin Gohari. Φ-Entropic Measures of Correlation
2212 -- 2219Lukasz Debowski. Maximal Repetition and Zero Entropy Rate
2220 -- 2230Ferdinando Cicalese, Luisa Gargano, Ugo Vaccaro. Bounds on the Entropy of a Function of a Random Variable and Their Applications
2231 -- 2239Neri Merhav. Universal Decoding Using a Noisy Codebook
2240 -- 2252Lóránt Farkas, Tamás Kói. Universal Random Access Error Exponents for Codebooks of Different Blocklengths
2253 -- 2266Jonathan Scarlett, Alfonso Martinez, Albert Guillen i Fabregas. Mismatched Multi-Letter Successive Decoding for the Multiple-Access Channel
2267 -- 2297Arun Padakandla, S. Sandeep Pradhan. Achievable Rate Region for Three User Discrete Broadcast Channel Based on Coset Codes
2298 -- 2320Shih-Yi Yeh, I-Hsiang Wang. Degrees of Freedom of the Bursty MIMO X Channel Without Feedback
2321 -- 2332Youlong Wu. Achievable Rates for Discrete Memoryless Multicast Networks With and Without Feedback
2333 -- 2346Lan V. Truong, Vincent Y. F. Tan. On Gaussian MACs With Variable-Length Feedback and Non-Vanishing Error Probabilities
2347 -- 2360Huseyin A. Inan, Dor Shaviv, Ayfer Özgür. Capacity of the Energy Harvesting Gaussian MAC
2361 -- 2370Hua Sun, Syed Ali Jafar. The Capacity of Robust Private Information Retrieval With Colluding Databases
2371 -- 2389Chung Chan, Manuj Mukherjee, Navin Kashyap, Qiaoqiao Zhou. On the Optimality of Secret Key Agreement via Omniscience
2390 -- 2397Sihem Mesnager, Chunming Tang, Yanfeng Qi. Complementary Dual Algebraic Geometry Codes
2398 -- 2409Tuvi Etzion, Marcelo Firer, Roberto Assis Machado. Metrics Based on Finite Directed Graphs and Coding Invariants
2410 -- 2416Shu Liu, Chaoping Xing, Chen Yuan. List Decoding of Cover Metric Codes Up to the Singleton Bound
2417 -- 2430Hai Q. Dinh, Bac T. Nguyen, Abhay Kumar Singh, Songsak Sriboonchitta. On the Symbol-Pair Distance of Repeated-Root Constacyclic Codes of Prime Power Lengths
2431 -- 2443Theo G. Swart, Jos H. Weber, Kees A. Schouhamer Immink. Prefixless q-Ary Balanced Codes With Fast Syndrome-Based Error Correction
2444 -- 2459Carlos Galindo, Olav Geil, Fernando Hernando, Diego Ruano. Improved Constructions of Nested Code Pairs
2460 -- 2473Tuvi Etzion, Antonia Wachter-Zeh. Vector Network Coding Based on Subspace Codes Outperforms Scalar Linear Network Coding
2474 -- 2484Ohad Elishco, Tom Meyerovitch, Moshe Schwartz 0001. On Encoding Semiconstrained Systems
2485 -- 2498Sarit Buzaglo, Yuval Cassuto, Paul H. Siegel, Eitan Yaakobi. Consecutive Switch Codes
2499 -- 2511Bin Chen, Shu-Tao Xia, Jie Hao, Fang-Wei Fu. Constructions of Optimal Cyclic (r, δ) Locally Repairable Codes
2512 -- 2528Yuchong Hu, Patrick P. C. Lee, Kenneth W. Shum, Pan Zhou. Proxy-Assisted Regenerating Codes With Uncoded Repair for Distributed Storage Systems
2529 -- 2549Umberto Martínez-Peñas, Ryutaroh Matsumoto. Relative Generalized Matrix Weights of Matrix Codes for Universal Security on Wire-Tap Networks
2550 -- 2570Ryan Gabrys, Eitan Yaakobi, Olgica Milenkovic. Codes in the Damerau Distance for Deletion and Adjacent Transposition Correction
2571 -- 2582Zi-Long Liu, Yong Liang Guan, Udaya Parampalli, Su Hu. Spectrally-Constrained Sequences: Bounds and Constructions
2583 -- 2592Cheuk Ting Li, Abbas El Gamal. A Universal Coding Scheme for Remote Generation of Continuous Random Variables
2593 -- 2608Ashwin Pananjady, Thomas A. Courtade. The Effect of Local Decodability Constraints on Variable-Length Compression
2609 -- 2625Tobias Koch, Gonzalo Vazquez-Vilar. A Rigorous Approach to High-Resolution Entropy-Constrained Vector Quantization
2626 -- 2638Sangsin Na, David L. Neuhoff. On the Convexity of the MSE Distortion of Symmetric Uniform Scalar Quantization
2639 -- 2647Yue M. Lu, Jon Onativia, Pier Luigi Dragotti. Sparse Representation in Fourier and Local Bases Using ProSparse: A Probabilistic Analysis
2648 -- 2674Yuheng Bu, Shaofeng Zou, Yingbin Liang, Venugopal V. Veeravalli. Estimation of KL Divergence: Optimal Minimax Rate
2675 -- 2689Tom Goldstein, Christoph Studer. PhaseMax: Convex Phase Retrieval via Basis Pursuit
2690 -- 2705Yonatan Kaspi, Ofer Shayevitz, Tara Javidi. Searching With Measurement Dependent Noise
2706 -- 2726Zahra Shakeri, Waheed U. Bajwa, Anand D. Sarwate. Minimax Lower Bounds on Dictionary Learning for Tensor Data
2727 -- 2741W. D. Brinda, Jason M. Klusowski. Finite-Sample Risk Bounds for Maximum Likelihood Estimation With Arbitrary Penalties
2742 -- 2758Shang Li, Xiaodong Wang. Fully Distributed Sequential Hypothesis Testing: Algorithms and Asymptotic Analyses
2759 -- 2773Ankur A. Kulkarni. Local and Networked Mean-square Estimation with High Dimensional Log-concave Noise
2774 -- 2790Elad Domanovitz, Uri Erez. Outage Behavior of Integer Forcing With Random Unitary Pre-Processing
2791 -- 2804Junse Lee, Namyoon Lee, François Baccelli. Scaling Laws for Ergodic Spectral Efficiency in MIMO Poisson Networks
2805 -- 2836Solomon W. Golomb, Beatrice A. Golomb. A Career in Engineering
2837 -- 2838Andrew J. Viterbi. Solomon Wolf Golomb 1932-2016
2839 -- 2843Joe Buhler, Paul Cuff, Al Hales, Richard Stong. Puzzles in Memory of Solomon Golomb
2844 -- 2857Guang Gong, Tor Helleseth, P. Vijay Kumar. Solomon W. Golomb - Mathematician, Engineer, and Pioneer
2858 -- 2875Serdar Boztas, Ferruh Özbudak, Eda Tekin. Explicit Full Correlation Distribution of Sequence Families Using Plateaued Functions
2876 -- 2882Branislav M. Popovic. Optimum Sets of Interference-Free Sequences With Zero Autocorrelation Zones
2883 -- 2895Yeow Meng Chee, Han Mao Kiah, San Ling, Hengjia Wei. Geometric Orthogonal Codes of Size Larger Than Optical Orthogonal Codes
2896 -- 2900Zhengchun Zhou, Tor Helleseth, Udaya Parampalli. A Family of Polyphase Sequences With Asymptotically Optimal Correlation
2901 -- 2909Min Kyu Song, Hong-Yeop Song. A Construction of Odd Length Generators for Optimal Families of Perfect Sequences
2910 -- 2923Yi Chen, Yuan-Hsun Lo, Kenneth W. Shum, Wing Shing Wong, Yijin Zhang. CRT Sequences With Applications to Collision Channels Allowing Successive Interference Cancellation
2924 -- 2931Ryan Gabrys, Eitan Yaakobi. Sequence Reconstruction Over the Deletion Channel
2932 -- 2940Jia-Min Zhang, Tian Tian, Wen-Feng Qi, Qun-Xiong Zheng. On the Affine Sub-Families of Quadratic NFSRs
2941 -- 2952Ming Li 0033, Dongdai Lin. De Bruijn Sequences, Adjacency Graphs, and Cyclotomy
2953 -- 2961Andrew Klapper, Zhixiong Chen. On the Nonexistence of q-Bent Boolean Functions
2962 -- 2968Thomas W. Cusick. Weight Recursions for Any Rotation Symmetric Boolean Functions
2969 -- 2978Claude Carlet, Xi Chen. dth-Order Correlation-Immune Boolean Functions Through the Fourier-Hadamard Transform
2979 -- 2986Robert S. Coulter, Sihem Mesnager. n
2987 -- 2999Fengrong Zhang, Yongzhuang Wei, Enes Pasalic, Shixiong Xia. Large Sets of Disjoint Spectra Plateaued Functions Inequivalent to Partially Linear Functions
3000 -- 3009Zilong Wang, Guang Gong. Discrete Fourier Transform of Boolean Functions over the Complex Field and Its Applications
3010 -- 3017Claude Carlet, Sihem Mesnager, Chunming Tang, Yanfeng Qi, Ruud Pellikaan. q Are Equivalent to LCD Codes for q>3
3018 -- 3030Angela I. Barbero, Øyvind Ytrehus. Rate (n-1)/n Systematic Memory Maximum Distance Separable Convolutional Codes
3031 -- 3041Sihem Mesnager, Chunming Tang, Yanfeng Qi. 2-Correcting Lee Codes: (Quasi)-Perfect Spectral Conditions and Some Constructions
3042 -- 3047Claudio Qureshi, Antonio Campello, Sueli I. R. Costa. Non-Existence of Linear Perfect Lee Codes With Radius 2 for Infinitely Many Dimensions
3048 -- 3061Peter Horák, Dongryul Kim. 50 Years of the Golomb-Welch Conjecture
3062 -- 3085Yeow Meng Chee, Tuvi Etzion, Han Mao Kiah, Alexander Vardy. Cooling Codes: Thermal-Management Coding for High-Performance Interconnects
3086 -- 3098Mahed Abroshan, Ramji Venkataramanan, Albert Guillen i Fabregas. Coding for Segmented Edit Channels
3099 -- 3120Li Tang, Aditya Ramamoorthy. Coded Caching Schemes With Reduced Subpacketization From Linear Block Codes
3121 -- 3135Kaveh Mahdaviani, Soheil Mohajer, Ashish Khisti. Product Matrix MSR Codes With Bandwidth Adaptive Exact Repair
3136 -- 3143Navid Nasr Esfahani, Ian Goldberg, Douglas R. Stinson. Some Results on the Existence of t-All-or-Nothing Transforms Over Arbitrary Alphabets
3144 -- 3149Jonathan Jedwab, Lily Yen. Costas Cubes
3150 -- 3152Alfred W. Hales. Random Walks on Visible Points
3153 -- 3161Ryosuke Sugiura, Yutaka Kamamoto, Noboru Harada, Takehiro Moriya. Optimal Golomb-Rice Code Extension for Lossless Coding of Low-Entropy Exponentially Distributed Sources
3162 -- 3169Viorel Nitica. Revisiting a Tiling Hierarchy
3170 -- 3178Ilya Soloveychik, Yu Xiang, Vahid Tarokh. Pseudo-Wigner Matrices
3179 -- 3196Ilya Soloveychik, Yu Xiang, Vahid Tarokh. Symmetric Pseudo-Random Matrices
3197 -- 3215Chong Li, Nicola Elia. Youla Coding and Computation of Gaussian Feedback Capacity
3216 -- 3236Wei Mao, Suhas N. Diggavi, Sreeram Kannan. Models and Information-Theoretic Bounds for Nanopore Sequencing

Volume 64, Issue 3

1425 -- 1435Anurag Anshu, Rahul Jain 0001, Naqueeb Ahmad Warsi. A One-Shot Achievability Result for Quantum State Redistribution
1436 -- 1453Anurag Anshu, Rahul Jain 0001, Naqueeb Ahmad Warsi. A Generalized Quantum Slepian-Wolf
1454 -- 1460Xin Wang 0022, Runyao Duan. Separation Between Quantum Lovász Number and Entanglement-Assisted Zero-Error Classical Capacity
1461 -- 1470Lan Luo, Zhi Ma. Non-Binary Quantum Synchronizable Codes From Repeated-Root Cyclic Codes
1471 -- 1480Sungsoo Ahn, Michael Chertkov, Andrew E. Gelfand, Sejun Park, Jinwoo Shin. Maximum Weight Matching Using Odd-Sized Cycles: Max-Product Belief Propagation and Half-Integrality
1481 -- 1496Natarajan Lakshmi Prasad, Yi Hong, Emanuele Viterbo. Lattice Codes Achieve the Capacity of Common Message Gaussian Broadcast Channels With Coded Side Information
1497 -- 1513Mario Blaum, Steven R. Hetzler. Extended Product and Integrated Interleaved Codes
1514 -- 1529Kangwook Lee, Maximilian Lam, Ramtin Pedarsani, Dimitris S. Papailiopoulos, Kannan Ramchandran. Speeding Up Distributed Machine Learning Using Codes
1530 -- 1547Xiaoqing Fan, Oliver Kosut, Aaron B. Wagner. Variable Packet-Error Coding
1548 -- 1560Chao Tian, Jun Chen 0005. Caching and Delivery via Interference Elimination
1561 -- 1594Nicola di Pietro, Gilles Zémor, Joseph J. Boutros. LDA Lattices Without Dithering Achieve Capacity on the Gaussian Channel
1595 -- 1603Lin Sok, Jean-Claude Belfiore, Patrick Solé, Aslan Tchamkerten. Lattice Codes for Deletion and Repetition Channels
1604 -- 1620Xiao Ma, Kechao Huang, Baoming Bai. Systematic Block Markov Superposition Transmission of Repetition Codes
1621 -- 1646K. V. Rashmi, Nihar B. Shah, Kannan Ramchandran, P. Vijay Kumar. Information-Theoretically Secure Erasure Codes for Distributed Storage
1647 -- 1665Ling Liu 0003, Yanfei Yan, Cong Ling 0001. Achieving Secrecy Capacity of the Gaussian Wiretap Channel With Polar Lattices
1666 -- 1698Kiryung Lee, Yihong Wu 0001, Yoram Bresler. Near-Optimal Compressed Sensing of a Class of Sparse Low-Rank Matrices Via Sparse Power Factorization
1699 -- 1705Rui Zhang, Song Li. tk (0<t<4/3)
1706 -- 1724Elaheh Mohammadi, Farokh Marvasti. Sampling and Distortion Tradeoffs for Bandlimited Periodic Signals
1725 -- 1737Samuel Vaiter, Gabriel Peyré, Jalal Fadili. Model Consistency of Partly Smooth Regularizers
1738 -- 1766Yudong Chen, Xinyang Yi, Constantine Caramanis. Convex and Nonconvex Formulations for Mixed Regression With Two Components: Minimax Optimal Rates
1767 -- 1783Sabyasachi Chatterjee, John D. Lafferty. Denoising Flows on Trees
1784 -- 1799Yu-Hang Xiao, Lei Huang 0001, Junhao Xie, Hing-Cheung So. Approximate Asymptotic Distribution of Locally Most Powerful Invariant Test for Independence: Complex Case
1800 -- 1811Triet M. Le. A Multivariate Hawkes Process With Gaps in Observations
1812 -- 1824Fode Zhang, Yimin Shi, Hon Keung Tony Ng, Ruibing Wang. Information Geometry of Generalized Bayesian Prediction Using α-Divergences as Loss Functions
1825 -- 1844Jihad Fahs, Ibrahim C. Abou-Faycal. Information Measures, Inequalities and Performance Bounds for Parameter Estimation in Impulsive Noise Environments
1845 -- 1866Thomas Wiatowski, Helmut Bölcskei. A Mathematical Theory of Deep Convolutional Neural Networks for Feature Extraction
1867 -- 1878Venkat Chandar, Aslan Tchamkerten. Sampling Constrained Asynchronous Communication: How to Sleep Efficiently
1879 -- 1892Flávio du Pin Calmon, Yury Polyanskiy, Yihong Wu 0001. Strong Data Processing Inequalities for Input Constrained Additive Noise Channels
1893 -- 1918Shraga I. Bross, Amos Lapidoth. The Rate-and-State Capacity with Feedback
1919 -- 1944Ni Ding, Chung Chan, Qiaoqiao Zhou, Rodney A. Kennedy, Parastoo Sadeghi. Determining Optimal Rates for Communication for Omniscience
1945 -- 1956Karim A. Banawan, Sennur Ulukus. The Capacity of Private Information Retrieval From Coded Databases
1957 -- 1976Roy Timo, Shirin Saeedi Bidokhti, Michele A. Wigger, Bernhard C. Geiger. A Rate-Distortion Approach to Caching
1977 -- 1991Wonseok Jeon, Sae-Young Chung. Capacity of Continuous-Space Electromagnetic Channels With Lossy Transceivers
1992 -- 2011Wenbo He, Bobak Nazer, Shlomo Shamai Shitz. Uplink-Downlink Duality for Integer-Forcing
2012 -- 2037Alex Dytso, Ronit Bustin, Daniela Tuninetti, Natasha Devroye, H. Vincent Poor, Shlomo Shamai Shitz. pth Error in Gaussian Noise Channels and Its Applications
2038 -- 2064Silas L. Fong, Vincent Y. F. Tan, Ayfer Özgür. On Achievable Rates of AWGN Energy-Harvesting Channels With Block Energy Arrival and Non-Vanishing Error Probabilities
2065 -- 2076Xinping Yi, Hua Sun, Syed Ali Jafar, David Gesbert. TDMA is Optimal for All-Unicast DoF Region of TIM if and only if Topology is Chordal Bipartite
2077 -- 2092Mohamed S. Nafea, Aylin Yener. A New Wiretap Channel Model and Its Strong Secrecy Capacity
2093 -- 2103Pritam Mukherjee, Sennur Ulukus. Secure Degrees of Freedom of the Multiple Access Wiretap Channel With Multiple Antennas
2104 -- 2120Shaofeng Zou, Yingbin Liang, Lifeng Lai, H. Vincent Poor, Shlomo Shamai Shitz. Degraded Broadcast Channel With Secrecy Outside a Bounded Range
2121 -- 2141Pranav Madadi, François Baccelli, Gustavo de Veciana. Shared Rate Process for Mobile Users in Poisson Networks and Applications
2142 -- 2171Imad Ahmad, Chih-Chun Wang. When Can Intelligent Helper Node Selection Improve the Performance of Distributed Storage Networks?

Volume 64, Issue 2

689 -- 703Richard Kueng, Peter Jung 0001. Robust Nonnegative Sparse Recovery and the Nullspace Property of 0/1 Measurements
704 -- 727Peter Jung 0001, Felix Krahmer, Dominik Stöger. Blind Demixing and Deconvolution at Near-Optimal Rate
728 -- 737Lasha Ephremidze, Faisal Saied, Ilya M. Spitkovsky. On the Algorithmization of Janashia-Lagvilava Matrix Spectral Factorization Method
738 -- 751Zheng Wang, Cong Ling. On the Geometric Ergodicity of Metropolis-Hastings Algorithms for Lattice Gaussian Sampling
752 -- 772Salem Said, Hatem Hajri, Lionel Bombrun, Baba C. Vemuri. Gaussian Distributions on Riemannian Symmetric Spaces: Statistical Learning With Structured Covariance Matrices
773 -- 794Gang Wang 0014, Georgios B. Giannakis, Yonina C. Eldar. Solving Systems of Random Quadratic Equations via Truncated Amplitude Flow
795 -- 830Diaa Al Mohamad, Assia Boumahdaf. Semiparametric Two-Component Mixture Models When One Component Is Defined Through Linear Constraints
831 -- 852Nidhin Koshy Vaidhiyan, Rajesh Sundaresan. Learning to Detect an Oddball Target
853 -- 874K. Pavan Srinath, Ramji Venkataramanan. Cluster-Seeking James-Stein Estimators
875 -- 888Masahito Hayashi, Vincent Y. F. Tan. Minimum Rates of Approximate Sufficient Statistics
889 -- 899Jian Liu 0004, Sihem Mesnager, Lusheng Chen. New Constructions of Optimal Locally Recoverable Codes via Good Polynomials
900 -- 908Lingfei Jin, Yuan Luo, Chaoping Xing. Repairing Algebraic Geometry Codes
909 -- 917Yeow Meng Chee, Xiande Zhang. Linear Size Constant-Composition Codes Meeting the Johnson Bound
918 -- 932Evyatar Hemo, Yuval Cassuto. A Constrained Coding Scheme for Correcting Asymmetric Magnitude-1 Errors in q-Ary Channels
933 -- 943Rawad Bitar, Salim El Rouayheb. Staircase Codes for Secret Sharing With Optimal Communication and Read Overheads
944 -- 951Ron M. Roth. On Decoding Rank-Metric Codes Over Large Fields
952 -- 971Chong-Dao Lee. Algebraic Decoding of Cyclic Codes Using Partial Syndrome Matrices
972 -- 978Michael Dowling, Shuhong Gao. Fast Decoding of Expander Codes
979 -- 999Linqi Song, Christina Fragouli. A Polynomial-Time Algorithm for Pliable Index Coding
1000 -- 1022Hua Sun, Syed Ali Jafar. Private Information Retrieval from MDS Coded Data With Colluding Servers: Settling a Conjecture by Freij-Hollanti et al
1023 -- 1037Xiugang Wu, Ayfer Özgür. Cut-Set Bound is Loose for Gaussian Relay Networks
1038 -- 1045Siddharth Barman, Omar Fawzi. Algorithmic Aspects of Optimal Channel Coding
1046 -- 1063Anatoly Khina, Yuval Kochman, Ashish Khisti. The MIMO Wiretap Channel Decomposed
1064 -- 1082Marco Tomamichel, Masahito Hayashi. Operational Interpretation of Rényi Information Measures via Composite Hypothesis Testing Against Product and Markov Distributions
1083 -- 1091Benjamin Arras, Yvik Swan. IT Formulae for Gamma Target: Mutual Information and Relative Entropy
1092 -- 1104Mireille El Gheche, Giovanni Chierchia, Jean-Christophe Pesquet. Proximity Operators of Discrete Information Divergences
1105 -- 1131Hye Won Chung, Brian M. Sadler, Lizhong Zheng, Alfred O. Hero III. Unequal Error Protection Querying Policies for the Noisy 20 Questions Problem
1132 -- 1162Badri N. Vellambi, Jörg Kliewer, Matthieu R. Bloch. Strong Coordination Over Multi-Hop Line Networks Using Channel Resolvability Codebooks
1163 -- 1177Ahmad ElMoslimany, Tolga M. Duman. On the Discreteness of Capacity-Achieving Distributions for Fading and Signal-Dependent Noise Channels With Amplitude-Limited Inputs
1178 -- 1198Jihad Fahs, Ibrahim C. Abou-Faycal. On Properties of the Support of Capacity-Achieving Distributions for Additive Noise Channel Models With Input Cost Constraints
1199 -- 1216Félix Balado, David Haughton. Asymptotically Optimum Perfect Universal Steganography of Finite Memoryless Sources
1217 -- 1230Ayse Ünsal, Raymond Knopp, Neri Merhav. Converse Bounds on Modulation-Estimation Performance for the Gaussian Multiple-Access Channel
1231 -- 1240Alex Alvarado, Erik Agrell, Fredrik Brannstrom. Asymptotic Comparison of ML and MAP Detectors for Multidimensional Constellations
1241 -- 1261Morteza Varasteh, Borzoo Rassouli, Osvaldo Simeone, Deniz Gündüz. Zero-Delay Source-Channel Coding With a Low-Resolution ADC Front End
1262 -- 1280Kasper Fløe Trillingsgaard, Petar Popovski. Generalized HARQ Protocols with Delayed Channel State Information and Average Latency Constraints
1281 -- 1296Qian Yu, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr. The Exact Rate-Memory Tradeoff for Caching With Uncoded Prefetching
1297 -- 1316Sakshi Kapoor, Sreejith Sreekumar, Sibi Raj B. Pillai. Distributed Scheduling in Multiple Access With Bursty Arrivals Under a Maximum Delay Constraint
1317 -- 1339Wenhan Dai, Yuan Shen, Moe Z. Win. A Computational Geometry Framework for Efficient Network Localization
1340 -- 1346Zhengchun Zhou, Dan Zhang, Tor Helleseth, Jinming Wen. A Construction of Multiple Optimal ZCZ Sequence Sets With Good Cross Correlation
1347 -- 1360Francis N. Castro, Oscar E. González, Luis A. Medina. Diophantine Equations With Binomial Coefficients and Perturbations of Symmetric Boolean Functions
1361 -- 1367Huangsheng Yu, Shujuan Dang, Dianhua Wu. a, 1, Q)-OOCs
1368 -- 1373Per Austrin, Petteri Kaski, Mikko Koivisto, Jesper Nederlof. Sharper Upper Bounds for Unbalanced Uniquely Decodable Code Pairs
1374 -- 1384Motohisa Fukuda, Ion Nechita. On the Minimum Output Entropy of Random Orthogonal Quantum Channels
1385 -- 1403Hao-Chung Cheng, Min-Hsiu Hsieh. Moderate Deviation Analysis for Classical-Quantum Channels and Quantum Hypothesis Testing
1404 -- 1422Ravi Kishore, Ashutosh Kumar 0002, Chiranjeevi Vanarasa, Kannan Srinathan. On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission

Volume 64, Issue 12

7449 -- 7464Mehdi Molkaraie, Vicenc Gomez. Monte Carlo Methods for the Ferromagnetic Potts Model Using Factor Graph Duality
7465 -- 7487G. David Forney. Codes on Graphs: Models for Elementary Algebraic Topology and Statistical Physics
7488 -- 7510Ali Al-Bashabsheh, Pascal O. Vontobel. A Factor-Graph Approach to Algebraic Topology, With Applications to Kramers-Wannier Duality
7511 -- 7528Jiun-Hung Yu, Hans-Andrea Loeliger. Simultaneous Partial Inverses and Decoding Interleaved Reed-Solomon Codes
7529 -- 7550Ankit Singh Rawat, Onur Ozan Koyluoglu, Sriram Vishwanath. Centralized Repair of Multiple Node Failures With Applications to Communication Efficient Secret Sharing
7551 -- 7556Joaquim Borges, Steven T. Dougherty, Cristina Fernández-Córdoba, Roger Ten-Valls. 4-Additive Cyclic Codes
7557 -- 7576N. Prakash, Muriel Médard. Communication Cost for Updating Linear Functions When Message Updates are Sparse: Connections to Maximally Recoverable Codes
7577 -- 7593Yu Tsunoda, Yuichiro Fujiwara, Hana Ando, Peter Vandendriessche. Bounds on Separating Redundancy of Linear Codes and Rates of X-Codes
7594 -- 7612Hamid Javadi, Andrea Montanari. A Statistical Model for Motifs Detection
7613 -- 7635Martin Azizyan, Akshay Krishnamurthy, Aarti Singh. Extreme Compressive Sampling for Covariance Estimation
7636 -- 7648Neri Merhav. Lower Bounds on Exponential Moments of the Quadratic Error in Parameter Estimation
7649 -- 7656Jason M. Klusowski, Andrew R. Barron. 0 Controls
7657 -- 7685Sung-Hoon Lim, Chen Feng, Adriano Pastore, Bobak Nazer, Michael Gastpar. A Joint Typicality Approach to Compute-Forward
7686 -- 7718Kasper F. Trillingsgaard, Wei Yang 0001, Giuseppe Durisi, Petar Popovski. Common-Message Broadcast Channels With Feedback in the Nonasymptotic Regime: Stop Feedback
7719 -- 7741Kasper F. Trillingsgaard, Wei Yang 0001, Giuseppe Durisi, Petar Popovski. Common-Message Broadcast Channels With Feedback in the Nonasymptotic Regime: Full Feedback
7742 -- 7758Vinay Praneeth Boda, Prakash Narayan. Universal Sampling Rate Distortion
7759 -- 7779Santiago Mazuelas, Yuan Shen, Moe Z. Win. Spatiotemporal Information Coupling in Network Navigation
7780 -- 7791Arash Gholami Davoodi, Syed Ali Jafar. Network Coherence Time Matters - Aligned Image Sets and the Degrees of Freedom of Interference Networks With Finite Precision CSIT and Perfect CSIR
7792 -- 7801Joseph M. Renes. On Privacy Amplification, Lossy Compression, and Their Duality to Channel Coding
7802 -- 7827Mark M. Wilde, Haoyu Qi. Energy-Constrained Private and Quantum Capacities of Quantum Channels
7828 -- 7846Hamid Ghourchian, Gholamali Aminian, Amin Gohari, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari. On the Capacity of a Class of Signal-Dependent Noise Channels
7847 -- 7865Antonio Campello, Cong Ling 0001, Jean-Claude Belfiore. Universal Lattice Codes for MIMO Channels
7866 -- 7882Wei Yang 0001, Yingbin Liang, Shlomo Shamai Shitz, H. Vincent Poor. State-Dependent Gaussian Multiple Access Channels: New Outer Bounds and Capacity Results
7883 -- 7902Mayank Bakshi, Vinod M. Prabhakaran. Plausible Deniability Over Broadcast Channels
7903 -- 7921Remi A. Chou, Aylin Yener. Polar Coding for the Multiple Access Wiretap Channel via Rate-Splitting and Cooperative Jamming

Volume 64, Issue 11

6941 -- 6953Amir Burin, Ofer Shayevitz. Reducing Guesswork via an Unreliable Oracle
6954 -- 6966Stefan M. Moser, Ligong Wang, Michele A. Wigger. Capacity Results on Multiple-Input Single-Output Wireless Optical Channels
6967 -- 6978Cheuk Ting Li, Abbas El Gamal. Strong Functional Representation Lemma and Applications to Coding Theorems
6979 -- 6989Venkat Anantharam. A Variational Characterization of Rényi Divergences
6990 -- 6995Alexander Golovnev, Oded Regev 0001, Omri Weinstein. The Minrank of Random Graphs
6996 -- 7016Shirin Saeedi Bidokhti, Michele A. Wigger, Roy Timo. Noisy Broadcast Networks With Receiver Caching
7017 -- 7030Shengyu Zhu, Biao Chen. Distributed Detection in Ad Hoc Networks Through Quantized Consensus
7031 -- 7050Linqi Song, Christina Fragouli. Making Recommendations Bandwidth Aware
7051 -- 7062Chien-Yi Wang, Shirin Saeedi Bidokhti, Michele A. Wigger. Improved Converses and Gap Results for Coded Caching
7063 -- 7080Tao Li 0002, Jiexiang Wang. Distributed Averaging With Random Network Graphs and Noises
7081 -- 7093Razan Tajeddine, Oliver W. Gnilke, Salim El Rouayheb. Private Information Retrieval From MDS Coded Data in Distributed Storage Systems
7094 -- 7112Yeow Meng Chee, Han Mao Kiah, Alexander Vardy, Van Khu Vu, Eitan Yaakobi. Coding for Racetrack Memories
7113 -- 7131Rafah El-Khatib, Nicolas Macris. The Velocity of the Propagating Wave for Spatially Coupled Systems With Applications to LDPC Codes
7132 -- 7136Igor E. Shparlinski. On Constructing Primitive Roots in Finite Fields With Advice
7137 -- 7152Geonu Kim, Jungwoo Lee 0001. Locally Repairable Codes With Unequal Local Erasure Correction
7153 -- 7170Dina Goldin, David Burshtein. On the Finite Length Scaling of q-Ary Polar Codes
7171 -- 7177Sergei V. Bezzateev, Natalia A. Shekhunova. Lower Bounds on the Covering Radius of the Non-Binary and Binary Irreducible Goppa Codes
7178 -- 7187Netanel Raviv. Asymptotically Optimal Regenerating Codes Over Any Field
7188 -- 7193Peter Beelen, Lingfei Jin. Explicit MDS Codes With Complementary Duals
7194 -- 7207Si-Hyeon Lee, Ashish Khisti. The Wiretapped Diamond-Relay Channel
7208 -- 7217Arash Gholami Davoodi, Bofeng Yuan, Syed Ali Jafar. GDoF Region of the MISO BC: Bridging the Gap Between Finite Precision and Perfect CSIT
7218 -- 7241Laura Luzzi, Roope Vehkalahti, Cong Ling 0001. Almost Universal Codes for MIMO Wiretap Channels
7242 -- 7263Eirik Rosnes, Alexandre Graell i Amat. Asymptotic Analysis and Spatial Coupling of Counter Braids
7264 -- 7286Cynthia Rush, Ramji Venkataramanan. Finite Sample Analysis of Approximate Message Passing Algorithms
7287 -- 7310Huishuai Zhang, Yuejie Chi, Yingbin Liang. Median-Truncated Nonconvex Approach for Phase Retrieval With Outliers
7311 -- 7338Anru Zhang, Dong Xia. Tensor SVD: Statistical and Computational Limits
7339 -- 7348Wenwen Zhao, Lifeng Lai. Distributed Testing With Cascaded Encoders
7349 -- 7358Joe Suzuki. Forest Learning From Data and its Universal Coding
7359 -- 7380Yuksel Ozan Basciftci, Can Emre Koksal, Alexei Ashikhmin. Physical-Layer Security in TDD Massive MIMO
7381 -- 7394Eric Chitambar, Ben Fortescue, Min-Hsiu Hsieh. The Conditional Common Information in Classical and Quantum Secret Key Distillation
7395 -- 7423Anurag Anshu, Ankit Garg, Aram Wettroth Harrow, Penghui Yao. Expected Communication Cost of Distributed Quantum Tasks
7424 -- 7442Rajai Nasser, Joseph M. Renes. Polar Codes for Arbitrary Classical-Quantum Channels and Arbitrary cq-MACs
7443 -- 7445Ulrich Michel, Martin Kliesch, Richard Kueng, David Gross 0003. Comments on "Improving Compressed Sensing With the Diamond Norm"-Saturation of the Norm Inequalities Between Diamond and Nuclear Norm

Volume 64, Issue 10

6461 -- 6483Ohad Elishco, Tom Meyerovitch, Moshe Schwartz 0001. On Independence and Capacity of Multidimensional Semiconstrained Systems
6484 -- 6497José Joaquín Bernal, Juan Jacobo Simón Pinero. Information Sets From Defining Sets for Reed-Muller Codes of First and Second Order
6498 -- 6505Gaojun Luo, Xiwang Cao. Two Constructions of Asymptotically Optimal Codebooks via the Hyper Eisenstein Sum
6506 -- 6525Ankit Singh Rawat, Itzhak Tamo, Venkatesan Guruswami, Klim Efremenko. MDS Code Constructions With Small Sub-Packetization and Near-Optimal Repair Bandwidth
6526 -- 6535Ian F. Blake, Shu Lin. On Short Cycle Enumeration in Biregular Bipartite Graphs
6536 -- 6545Cunsheng Ding, Ziling Heng, Zhengchun Zhou. Minimal Binary Linear Codes
6546 -- 6560Ran Gelles, Bernhard Haeupler, Gillat Kol, Noga Ron-Zewi, Avi Wigderson. Explicit Capacity Approaching Coding for Interactive Communication
6561 -- 6566Tao Zhang 0030, Gennian Ge. On the Nonexistence of Perfect Splitter Sets
6567 -- 6582Hoang Dau, Iwan M. Duursma, Han Mao Kiah, Olgica Milenkovic. Repairing Reed-Solomon Codes With Multiple Erasures
6583 -- 6589Claude Carlet, Cem Güneri, Ferruh Özbudak, Buket Özkaya, Patrick Solé. On Linear Complementary Pairs of Codes
6590 -- 6603Tsung-Ching Lin, Chong-Dao Lee, Trieu-Kien Truong, Yaotsu Chang. The Use of Multivariate Weak-Locator Polynomials to Decode Cyclic Codes up to Actual Minimum Distance
6604 -- 6619Anshoo Tandon, Han Mao Kiah, Mehul Motani. Bounds on the Size and Asymptotic Rate of Subblock-Constrained Codes
6620 -- 6637François Bachoc, Fabrice Gamboa, Jean-Michel Loubes, Nil Venet. A Gaussian Process Regression Model for Distribution Inputs
6638 -- 6661Simone Brugiapaglia, Ben Adcock. Robustness to Unknown Error in Sparse Regularization
6662 -- 6671Jiantao Jiao, Kartik Venkat, Tsachy Weissman. Mutual Information, Relative Entropy and Estimation Error in Semi-Martingale Channels
6672 -- 6706Jiantao Jiao, Yanjun Han, Tsachy Weissman. 1 Distance
6707 -- 6721Mohammad Golbabaee, Mike E. Davies. Inexact Gradient Projection and Fast Data Driven Compressed Sensing
6722 -- 6730Juan Miguel Medina, Bruno Cernuschi-Frías. On the Papoulis Sampling Theorem: Some General Conditions
6731 -- 6742Junfeng Wu, Guodong Shi, Brian D. O. Anderson, Karl Henrik Johansson. Kalman Filtering Over Fading Channels: Zero-One Laws and Almost Sure Stabilities
6743 -- 6758Irene Valero Toranzo, Steeve Zozor, Jean-Marc Brossier. Generalization of the de Bruijn Identity to General φ-Entropies and φ-Fisher Informations
6759 -- 6770Rajai Nasser. Characterizations of Two Channel Orderings: Input-Degradedness and the Shannon Ordering
6771 -- 6778Qi Cao, Ning Cai 0001, Wangmei Guo, Raymond W. Yeung. On Zero-Error Capacity of Binary Channels With One Memory
6779 -- 6802Si-Hyeon Lee, Sae-Young Chung. A Unified Random Coding Bound
6803 -- 6815Krzysztof Postek, Aharon Ben-Tal. Computing the Channel Capacity of a Communication System Affected by Uncertain Transition Probabilities
6816 -- 6829Christoph Kawan, Serdar Yüksel. On Optimal Coding of Non-Linear Dynamical Systems
6830 -- 6841Ehsan Shafieepoorfard, Maxim Raginsky. Sequential Empirical Coordination Under an Output Entropy Constraint
6842 -- 6862Karim A. Banawan, Sennur Ulukus. Multi-Message Private Information Retrieval: Capacity Results and Near-Optimal Schemes
6863 -- 6877Yu-Chih Huang, Krishna R. Narayanan, Ping-Chung Wang. Lattices Over Algebraic Integers With an Application to Compute-and-Forward
6878 -- 6893Morteza Soltani, Zouheir Rezki. Optical Wiretap Channel With Input-Dependent Gaussian Noise Under Peak- and Average-Intensity Constraints
6894 -- 6916Jinyuan Chen. On the MISO Channel With Feedback: Can Infinitely Massive Antennas Achieve Infinite Capacity?
6917 -- 6928Rupert H. Levene, Vern I. Paulsen, Ivan G. Todorov. Complexity and Capacity Bounds for Quantum Channels
6929 -- 6938Eric A. Carlen, Anna Vershynina. Recovery and the Data Processing Inequality for Quasi-Entropies

Volume 64, Issue 1

4 -- 25Igal Sason, Sergio Verdú. Arimoto-Rényi Conditional Entropy and Bayesian M-Ary Hypothesis Testing
26 -- 37Himanshu Tyagi, Pramod Viswanath, Shun Watanabe. Interactive Communication for Data Exchange
38 -- 56Dor Shaviv, Ayfer Özgür, Haim H. Permuter. A Communication Channel With Random Battery Recharges
57 -- 76Chung Chan, Ali Al-Bashabsheh, Qiaoqiao Zhou. Change of Multivariate Mutual Information: From Local to Global
77 -- 92Mokshay M. Madiman, Ioannis Kontoyiannis. Entropy Bounds on Abelian Groups and the Ruzsa Divergence
93 -- 108Varun Jog, Venkat Anantharam. Intrinsic Entropies of Log-Concave Distributions
109 -- 128Songze Li, Mohammad Ali Maddah-Ali, Qian Yu, Amir Salman Avestimehr. A Fundamental Tradeoff Between Computation and Communication in Distributed Computing
129 -- 147Yanina Y. Shkel, Sergio Verdú. A Single-Shot Approach to Lossy Source Coding Under Logarithmic Loss
148 -- 162Yonglong Li, Guangyue Han. Asymptotics of Input-Constrained Erasure Channel Capacity
163 -- 191Yuta Sakai, Ken-ichi Iwata. 0 for Ternary-Input Discrete Memoryless Channels
192 -- 204Umberto Martínez-Peñas. Generalized Rank Weights of Reducible Codes, Optimal Cases, and Related Properties
205 -- 224Lei M. Zhang, Dmitri V. Truhachev, Frank R. Kschischang. Spatially Coupled Split-Component Codes With Iterative Algebraic Decoding
225 -- 248Renaud-Alexandre Pitaval, Lu Wei, Olav Tirkkonen, Camilla Hollanti. Density of Spherically Embedded Stiefel and Grassmann Codes
249 -- 256Kees A. Schouhamer Immink, Kui Cai. Composition Check Codes
257 -- 273Bella Bose, Noha Elarief, Luca G. Tallini. On Codes Achieving Zero Error Capacities in Limited Magnitude Error Channels
274 -- 291Joseph Connelly, Kenneth Zeger. Linear Network Coding Over Rings - Part I: Scalar Codes and Commutative Alphabets
292 -- 308Joseph Connelly, Kenneth Zeger. Linear Network Coding Over Rings - Part II: Vector Codes and Non-Commutative Alphabets
309 -- 321Talha Cihad Gülcü, Min Ye 0005, Alexander Barg. Construction of Polar Codes for Arbitrary Discrete Memoryless Channels
322 -- 348Shenghao Yang, Tsz-Ching Ng, Raymond W. Yeung. Finite-Length Analysis of BATS Codes
349 -- 366Jinbei Zhang, Xiaojun Lin, Xinbing Wang. Coded Caching Under Arbitrary Popularity Distributions
367 -- 383Yuwei Xu, Claude Carlet, Sihem Mesnager, Chuankun Wu. Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of Vectorial Functions
384 -- 392Yang Yang, Xiaohu Tang. Generic Construction of Binary Sequences of Period 2N With Optimal Odd Correlation Magnitude Based on Quaternary Sequences of Odd Period N
393 -- 402Deng Tang, Subhamoy Maitra. n/2
403 -- 411Alexander Pott, Enes Pasalic, Amela Muratovic-Ribic, Samed Bajric. On the Maximum Number of Bent Components of Vectorial Functions
412 -- 428Veit Elser. The Complexity of Bit Retrieval
429 -- 450Sameer Pawar, Kannan Ramchandran. FFAST: An Algorithm for Computing an Exactly k-Sparse DFT in O(k log k) Time
451 -- 466Sameer Pawar, Kannan Ramchandran. R-FFAST: A Robust Sub-Linear Time Algorithm for Computing a Sparse DFT
467 -- 484Tamir Bendory, Yonina C. Eldar, Nicolas Boumal. Non-Convex Phase Retrieval From STFT Measurements
485 -- 500Felix Krahmer, Yi-Kai Liu. Phase Retrieval Without Small-Ball Probability Assumptions
501 -- 512Michael Kohler, Adam Krzyzak. Adaptive Estimation of Quantiles in a Simulation Model
513 -- 530Alex Dytso, Ronit Bustin, Daniela Tuninetti, Natasha Devroye, H. Vincent Poor, Shlomo Shamai Shitz. On Communication Through a Gaussian Channel With an MMSE Disturbance Constraint
531 -- 546Kaniska Mohanty, Mahesh K. Varanasi. The Generalized Degrees of Freedom Region of the MIMO Z-Interference Channel With Delayed CSIT
547 -- 576Matha Deghel, Mohamad Assaad, Mérouane Debbah, Anthony Ephremides. Queueing Stability and CSI Probing of a TDD Wireless Network With Interference Alignment
577 -- 592Joseph M. Renes. Duality of Channels and Codes
593 -- 612Cambyse Rouze, Nilanjana Datta. Finite Blocklength and Moderate Deviation Analysis of Hypothesis Testing of Correlated Quantum States and Application to Classical-Quantum Channels With Memory
613 -- 621Kenji Nakahira, Tsuyoshi Sasaki Usuda. Realizing a 2-D Positive Operator-Valued Measure by Local Operations and Classical Communication
622 -- 639Ching-Yi Lai, Alexei E. Ashikhmin. Linear Programming Bounds for Entanglement-Assisted Quantum Error-Correcting Codes by Split Weight Enumerators
640 -- 653Xin Wang 0022, Wei Xie, Runyao Duan. Semidefinite Programming Strong Converse Bounds for Classical Capacity
654 -- 685Mitsugu Iwamoto, Kazuo Ohta, Junji Shikata. Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography