Abstract is missing.
- One-Bit Null Space Learning for MIMO underlay cognitive radioYair Noam, Andrea J. Goldsmith. 1-7 [doi]
- Determining the unique decodability of a string in linear timeJiaxi Jin, Aryeh Kontorovich, Ari Trachtenberg. 1-11 [doi]
- Local recovery properties of capacity achieving codesArya Mazumdar, Venkat Chandar, Gregory W. Wornell. 1-3 [doi]
- Inferring causality in networks of WSS processes by pairwise estimation methodsSyamantak Datta Gupta, Ravi R. Mazumdar. 1-9 [doi]
- Layered schemes for large-alphabet secret key distributionHongchao Zhou, Ligong Wang, Gregory W. Wornell. 1-10 [doi]
- Cost-constrained random coding and applicationsJonathan Scarlett, Alfonso Martinez, Albert Guillen i Fabregas. 1-7 [doi]
- Optimal locally repairable codes with local minimum storage regeneration via rank-metric codesAnkit Singh Rawat, Natalia Silberstein, Onur Ozan Koyluoglu, Sriram Vishwanath. 1-8 [doi]
- Nonparametric distributed sequential detection via universal source codingJithin Kazuthuveettil Sreedharan, Vinod Sharma. 1-7 [doi]
- Wireless network compression: Code design and trade offsMohsen Sardari, Ahmad Beirami, Faramarz Fekri. 1-8 [doi]
- Resource allocation for hierarchical underwater sensor networksFatemeh Fazel, Milica Stojanovic. 1-10 [doi]
- Music and symbolic dynamics: The science behind an artShayan G. Srinivasa, Harish Seshadri. 1-7 [doi]
- Improved lower bounds on the total variation distance and relative entropy for the Poisson approximationIgal Sason. 1-4 [doi]
- Random access with physical-layer network codingJasper Goseling, Michael Gastpar, Jos H. Weber. 1-7 [doi]
- Keep it simple stupid - On the effect of lower-order terms in BIC-like criteriaTeemu Roos, Yuan Zou. 1-7 [doi]
- Flat tori, lattices and spherical codesSueli I. R. Costa, Cristiano Torezzan, Antonio Campello, Vinay A. Vaishampayan. 1-8 [doi]
- On the capacity of MIMO Wiener phase-noise channelsGiuseppe Durisi, Alberto Tarable, Christian Camarda, Guido Montorsi. 1-7 [doi]
- Maximum-likelihood modulation classification with incomplete channel informationWilliam C. Headley, V. Gautham Chavali, Claudio R. C. M. da Silva. 1-4 [doi]
- A new metaconverse and outer region for finite-blocklength MACsPierre Moulin. 1-8 [doi]
- Online learning and adaptation over networks: More information is not necessarily betterAli H. Sayed, Sheng-Yuan Tu, Jianshu Chen. 1-8 [doi]
- Opinion formation in Ising networksMohammad Hadi Afrasiabi, Roch Guérin, S. S. Venkatesh. 1-10 [doi]
- Coding and decoding schemes tailor made for image transmissionMarcelo Firer, Laura L. Ramos Rifo, Luciano Panek. 1-8 [doi]
- Symmetric capacity of the Gaussian two-way relay channel to within 1/4e [nat]Majid Nasiri Khormuji. 1-5 [doi]
- Trapping set structure of LDPC codes on finite geometriesQiuju Diao, Ying Yu Tai, Shu Lin, Khaled A. S. Abdel-Ghaffar. 1-8 [doi]
- Cognitive access policies under a primary ARQ process via chain decodingNicolò Michelusi, Petar Popovski, Michele Zorzi. 1-8 [doi]
- A class of generalized RS-codes with faster encoding and decoding algorithmsAmin Shokrollahi. 1-10 [doi]
- SAR codesBertrand M. Hochwald, David J. Love, Su Yan, Jianming Jin. 1-9 [doi]
- Signal processing with factor graphs: Beamforming and Hilbert transformHans-Andrea Loeliger, Christoph Reller. 1-4 [doi]
- Universal outlier detectionYun Li, Sirin Nitinawarat, Venugopal V. Veeravalli. 1-5 [doi]
- GPS aided inter-vehicular wireless networkingIzhak Rubin, Andrea Baiocchi, Francesca Cuomo, Pierpaolo Salvo. 1-9 [doi]
- Can we improve over weber sampling of haptic signals?Amit Bhardwaj, Onkar Dabeer, Subhasis Chaudhuri. 1-6 [doi]
- Rate-distortion in closed-loop LTI systemsEduardo I. Silva, Milan S. Derpich, Jan Østergaard. 1-2 [doi]
- Insights from the use of Shannon's codes in adaptive multicast transmission protocolsJason D. Ellis, Michael B. Pursley. 1-2 [doi]
- Rate distortion lower bounds for video sources and the HEVC standardJing Hu, Malavika Bhaskaranand, Jerry D. Gibson. 1-10 [doi]
- Low latency communicationsIvana Maric. 1-6 [doi]
- Improved MU-MIMO performance for future 802.11 systems using differential feedbackRon Porat, Eric Ojard, Nihar Jindal, Matthew Fischer, Vinko Erceg. 1-5 [doi]
- Learning hidden Markov sparse modelsLin Li, Anna Scaglione. 1-10 [doi]
- Linked-cluster technique for finding the distance of a quantum LDPC codeAlexey A. Kovalev, Ilya Dumer, Leonid P. Pryadko. 1-6 [doi]
- Relationship between antidictionary automata and compacted substring automataTakahiro Ota, Hiroyoshi Morita. 1-4 [doi]
- Shannon meets Walras on interference networksEduard A. Jorswieck, Rami Mochaourab. 1-7 [doi]
- Sidestepping the Rayleigh limit for LoS spatial multiplexing: A distributed architecture for long-range wireless fiberAndrew Irish, François Quitin, Upamanyu Madhow, Mark J. W. Rodwell. 1-6 [doi]
- Dictionaries for image-based recognitionVishal M. Patel, Qiang Qiu, Rama Chellappa. 1-8 [doi]
- State space cryptanalysis of the MICKEY cipherTor Helleseth, Cees J. A. Jansen, Oleksandr Kazymyrov, Alexander Kholosha. 1-10 [doi]
- Sequential multi-sensor change-point detectionBy Yao Xie, David Siegmund. 1-20 [doi]
- Signal reconstruction in linear mixing systems with different error metricsJin Tan, Dror Baron. 1-7 [doi]
- On the information rate of phase noise-limited communicationsMarco Martalò, Carlo Tripodi, Riccardo Raheli. 1-7 [doi]
- Unfolding the entropy power inequalityMokshay M. Madiman, Liyao Wang. 1-2 [doi]
- Reducing the latency of Lee-O'Sullivan interpolation through modified initializationXinmiao Zhang, Richard Shi, James A. Ritcey. 1-5 [doi]
- Communication complexity and data compressionUlrich Tamm. 1-4 [doi]
- Audio informed watermarking by means of dirty trellis codesAndrea Abrardo, Mauro Barni, GianLuigi Ferrari. 1-8 [doi]
- Data driven suppression rule for speech enhancementIvan Tashev, Malcolm Slaney. 1-6 [doi]
- New results on low-density integer latticesNicola di Pietro, Joseph Jean Boutros, Gilles Zémor, Loic Brunei. 1-6 [doi]
- Noncoherent trellis-coded quantization for massive MIMO limited feedback beamformingJunil Choi, Zachary Chance, David J. Love, Upamanyu Madhow. 1-6 [doi]
- Polarity-balanced codesJos H. Weber, Kees A. Schouhamer Immink, Paul H. Siegel, Theo G. Swart. 1-5 [doi]
- Compound polar codesHessam Mahdavifar, Mostafa El-Khamy, Jungwon Lee, Inyup Kang. 1-6 [doi]
- Convergence of the conditional per symbol entropy for stationary Gaussian fading channels for almost all input sequencesMeik Dorpinghaus, Norbert Gaffke, Lorens A. Imhof, Rudolf Mathar. 1-3 [doi]
- Error correcting code for flash memoriesAnxiao Andrew Jiang, Yue Li, Eyal En Gad, Michael Langberg, Jehoshua Bruck. 1-4 [doi]
- Compressive covariance samplingDaniel Romero, Geert Leus. 1-8 [doi]
- An optimized linear scheme for stabilization over multi-user Gaussian networksIbrahim Bilal, Ali A. Zaidi, Tobias J. Oechtering, Mikael Skoglund. 1-8 [doi]
- Network coding broadcast delay on erasure channelsNan Xie, Steven Weber. 1-8 [doi]
- Auction-based spectrum sharing in cognitive radio networks with heterogeneous channelsMehrdad Khaledi, Alhussein A. Abouzeid. 1-8 [doi]
- A general approach to random coding for multi-terminal networksStefano Rini, Andrea Goldsmith. 1-9 [doi]
- Trapping set structure of LDPC codes on finite geometriesQiuju Diao, Ying Yu Tai, Shu Lin, Khaled A. S. Abdel-Ghaffar. 1-8 [doi]
- New non-asymptotic random channel coding theoremsEn-Hui Yang, Jin Meng. 1-8 [doi]
- Lucas polynomials and power sumsUlrich Tamm. 1-4 [doi]
- Multiple access and two-way channels with energy harvesting and bi-directional energy cooperationKaya Tutuncuoglu, Aylin Yener. 1-8 [doi]
- Finite rate of innovation channel models and DoF of MIMO multi-user systems with delayed CSIT feedbackYohan Lejosne, Dirk T. M. Slock, Yi Yuan-Wu. 1-8 [doi]
- Optimal equivocation in secrecy systems a special case of distortion-based characterizationPaul Cuff. 1-3 [doi]
- Capacity bounds for the Gaussian X channelRanga Prasad, Ananthanarayanan Chockalingam. 1-10 [doi]
- Covariance and entropy in Markov random fieldsMatthew G. Reyes. 1-6 [doi]
- Power-efficient transmission design for MISO broadcast systems with QoS constraintsChunshan Liu, Min Li, Stephen V. Hanly. 1-7 [doi]
- Codes with local regenerationGovinda M. Kamath, N. Prakash, V. Lalitha, P. Vijay Kumar. 1-5 [doi]
- Interference-based cell selection in heterogenous networksKemal Davaslioglu, Ender Ayanoglu. 1-6 [doi]
- Approximate sum-capacity of full- and half-duplex asymmetric interference channels with unilateral source cooperationMartina Cardone, Daniela Tuninetti, Raymond Knopp, Umer Salim. 1-9 [doi]
- Control recognition bounds for visual learning and explorationVasiliy Karasev, Alessandro Chiuso, Stefano Soatto. 1-8 [doi]
- A scaling law approach to wireless relay networksAyfer Ozgur. 1-7 [doi]
- Hardware-impairment compensation for enabling distributed large-scale MIMORyan Rogalin, Ozgun Y. Bursalioglu, Haralabos C. Papadopoulos, Giuseppe Caire, Andreas F. Molisch. 1-10 [doi]
- Information theoretic privacy for smart metersDeniz Gündüz, Jesús Gómez-Vilardebó, Onur Tan, H. Vincent Poor. 1-7 [doi]
- Gossip with transmission constraintsVivek S. Borkar, Rahul M. Makhijani, Rajesh Sundaresan. 1-4 [doi]
- Information source detection in the SIR model: A sample path based approachKai Zhu, Lei Ying. 1-9 [doi]
- An efficient exhaustive low-weight codeword search for structured LDPC codesSeyed Mehrdad Khatami, Ludovic Danjean, Dung Viet Nguyen, Bane V. Vasic. 1-10 [doi]
- On finding a set of healthy individuals from a large populationAbhay Sharma, Chandra R. Murthy. 1-5 [doi]
- Firing the genie: Two-phase short-blocklength convolutional coding with feedbackAdam R. Williamson, Tsung-Yi Chen, Richard D. Wesel. 1-6 [doi]
- On the non-existence of lattice tilings by quasi-crossesMoshe Schwartz. 1-2 [doi]
- Multi-rate sequential data transmissionCheuk Ting Li, Shenghao Yang, Raymond W. Yeung. 1-2 [doi]
- Upper bounds on the capacity of binary intermittent communicationMostafa Khoshnevisan, J. Nicholas Laneman. 1-6 [doi]