Abstract is missing.
- On the Capacity of the Two-User IM/DD Interference ChannelZhenyu Zhang, Anas Chaaban. 1-6 [doi]
- Cognitive decision making for the long-haul fiber optic communication systemsMahdi Naghshvarian Jahromi, Shiva Kumar, M. Jamal Deen. 1-5 [doi]
- On Optimal Information-Theoretically Secure Key ManagementEn-Hui Yang, Xin-Wen Wu. 1-6 [doi]
- Capacity of Generalized Discrete-Memoryless Push-to-Talk Two-Way ChannelsJian-Jia Weng, Fady Alajaji, Tamás Linder. 1-6 [doi]
- Reduced Complexity Ordering in Subspace MIMO Detection AlgorithmsMohammad Kazem Izadinasab, Oussama Damen. 1-5 [doi]
- Index Assignment Optimized for Partial EncryptionMehrshad Kafi, Sorina Dumitrescu. 1-6 [doi]
- Smart long-haul fiber optic communication systems using brain-like intelligenceMahdi Naghshvarianjahromi, Shiva Kumar, M. Jamal Deen. 1-6 [doi]
- Performance analysis of turbo codes over the Bernoulli-Gaussian impulsive noise channelGhassan M. Kraidy, Hassan Hamad. 1-5 [doi]
- Optimal Node Density for Multi-RAT Coexistence in Unlicensed SpectrumPhillip B. Oni, Steven D. Blostein. 1-6 [doi]
- A Bounded-Noise Model for Nondispersive Optical FiberReza Rafie Borujeny, Frank R. Kschischang. 1-5 [doi]
- Performance Analysis of a Perfect SI Cancellation Scheme for Differential Channel-Unaware TWRNsSalime Bameri, Ramy H. Gohary. 1-6 [doi]
- On the Performance of Slotted Vector-Disjunctive ChannelFedor I. Ivanov, Pavel S. Rybin, Valentin B. Afanassiev. 1-5 [doi]
- Dynamic spectrum access under partial observations: A restless bandit approachNima Akbarzadeh, Aditya Mahajan. 1-6 [doi]
- Hierarchical coded matrix multiplicationShahrzad Kiani, Nuwan S. Ferdinand, Stark C. Draper. 1-6 [doi]
- A Practical, Provably Unbreakable Approach to Physical Layer SecurityAmir K. Khandani, E. Bateni. 1-6 [doi]
- An Optimal Finite Alphabet NOMA Scheme for Two-User Uplink ChannelsJina Zhen, Anzhong Wong, Jian-Kang Zhang, Kon Max Wong. 1-5 [doi]
- Massive MIMO Channels Under the Joint Power ConstraintsM. Khojastehnia, Sergey Loyka, François Gagnon. 1-6 [doi]
- Coded Caching: Global vs Local Content PopularityAbhin Shah, Nikhil Karamchandani, Suhas N. Diggavi. 1-6 [doi]
- Automated EEG Source Error Thresholding (AESET) in L2-Regularization Inverse ProblemsYounes Sadat-Nejad, Soosan Beheshti. 1-5 [doi]
- Correct Number of Clusters (CNC) Description Length in Arbitrary Shape ClusteringMahdi Shamsi, Faizan Rahman, Soosan Beheshti. 1-4 [doi]
- Maximal Information Leakage based Privacy Preserving Data Disclosure MechanismsTianrui Xiao, Ashish Khisti. 1-6 [doi]
- Extremal Results for the Relative-Entropy Ratio of Collinear Probability DistributionsShengtian Yang, Jun Chen 0005. 1-6 [doi]
- Zipper Codes: Spatially-Coupled Product-Like Codes with Iterative Algebraic DecodingAlvin Y. Sukmadji, Umberto Martínez-Peñas, Frank R. Kschischang. 1-6 [doi]
- Analysis for Massive MIMO Systems with Two-Layer Linear Receive ProcessingWahiba Abid, Sébastien Roy 0002, Mohamed L. Ammari. 1-6 [doi]
- A Soft Metric for Assessing the Compliance of WLAN DevicesAmmar Alhosainy, Ramy H. Gohary, Ioannis Lambadaris. 1-6 [doi]
- Performance Analysis of Low Density Parity-Check Codes over the Bernoulli-Gaussian ChannelGhassan M. Kraidy. 1-5 [doi]
- Key Performance Indicators in Multidimensional Constellations for Uplink SCMA SystemsMonirosharieh Vameghestahbanati, Ian D. Marsland, Ramy H. Gohary, Halim Yanikomeroglu. 1-6 [doi]
- Lattice-based Robust Distributed Source Coding for Three Correlated SourcesDania Elzouki, Sorina Dumitrescu, Jun Chen. 1-6 [doi]
- Scalar Quantizer Design for Two-Way ChannelsSaeed Rezazadeh, Fady Alajaji, Wai-Yip Chan. 1-6 [doi]
- Performance Analysis of FSO MIMO Multiplexing Links with Beam Wander and Nonzero Boresight Pointing ErrorsHossein Safi, Akbar Dargahi, Julian Cheng. 1-6 [doi]
- Information Storage in Multilayer Resistive MemoriesSusanna E. Rumsey, Stark C. Draper, Frank R. Kschischang. 1-6 [doi]
- Image Retrieval via Canonical Correlation AnalysisKangdi Shi, Xiaohong Liu, Muhammad Alrabeiah, Xintong Guo, Jie Lin, Huan Liu, Jun Chen. 1-6 [doi]
- Multiple Access Binary Computation Offloading via Reinforcement LearningMahsa Salmani, Foad Sohrabi, Timothy N. Davidson, Wei Yu 0001. 1-6 [doi]
- Multi-Server Private Information Retrieval with Coded Side InformationFatemeh Kazemi, Esmaeil Karimi, Anoosheh Heidarzadeh, Alex Sprintson. 1-6 [doi]
- Sum-Capacity-Achieving Distributions in the Input-Dependent Gaussian Noise Optical Multiple Access Channel with Peak and Average Intensity ConstraintsMorteza Soltani, Zouheir Rezki, Anas Chaaban. 1-6 [doi]
- Address space partitioning for the parallel dictionary LZW data compression algorithmMalek Safieh, Jürgen Freudenberger. 1-6 [doi]
- Infection-Curing Games over Polya Contagion NetworksGreg Harrington, Fady Alajaji, Bahman Gharesifard. 1-6 [doi]
- On Source-Channel Communication over Multiple-Access Interference Relay Channels with Phase UncertaintiesSubhajit Majhi, Meysam Shahrbaf Motlagh, Patrick Mitran. 1-5 [doi]
- Angular MIMO for Underwater Wireless Optical Communications: Channel Modelling and CapacityAbdallah S. Ghazy, Steve Hranilovic, Mohammad Ali Khalighi. 1-6 [doi]
- Performance Analysis of Adaptive Modulation in MIMO-MRC Systems with Transmit Beamforming over Rayleigh Product ChannelsFaten Ben Abdallah, Mohamed Lassaad Ammari, Paul Fortier. 1-4 [doi]