Abstract is missing.
- Message from the General Co-ChairsCostas N. Georghiades, S. Verdul. [doi]
- Zero-error information and applications in cryptographyStefan Wolf, Jurg Wultschleger. 1-6 [doi]
- Pseudo-codewords of cycle codes via zeta functionsRalf Koetter, Wen-Ching W. Li, Pascal O. Vontobel, Judy L. Walker. 7-12 [doi]
- From concatenated codes to graph codesJørn Justesen, Tom Høholdt. 13-16 [doi]
- Enhanced decoding by error detection on a channel with correlated 2-dimensional errorsPål Ellingsen, Øyvind Ytrehus, Paul Siegel. 17-21 [doi]
- Two-dimensional error correcting codes using finite-field waveletsMina Sartipi, Faramarz Fekri. 22-27 [doi]
- A concatenated [(4, 1, 3)] quantum convolutional codeAantonio Carlos Aido de Almeida, Reginaldo Palazzo Jr.. 28-33 [doi]
- Lossy source coding of multiple Gaussian sources: m-helper problemAmeesh Pandya, Aman Kansal, Greg Pottie, Mani B. Srivastava. 34-38 [doi]
- On the total weighted square correlation minimization in multicellular synchronous DS-CDMA systemsPaul Cotae, Matt Aguirre, Catalin Lacatus. 39-44 [doi]
- Tradeoff-optimality of D-BLASTSaurabha Tavildar, Pramod Viswanath. 45-49 [doi]
- Shannon information and biological fitnessCarl T. Bergstrom, Michael Lachmann. 50-54 [doi]
- Genomic analysis using methods from information theoryJoachim Hagenauer, Zaher Dawy, Bernhard Goebel, Pavol Hanus, Jakob C. Mueller. 55-59 [doi]
- Information theory and coding problems in geneticsOlgica Milenkovic, Bane Vasic. 60-65 [doi]
- Information geometric formulation and interpretation of accelerated Blahut-Arimoto-type algorithmsGerald Matz, Pierre Duhamel. 66-70 [doi]
- Entropy, compound Poisson approximation, log-Sobolev inequalities and measure concentrationIoannis Kontoyiannis, Mokshay M. Madiman. 71-75 [doi]
- Extremal distributions in information theory and hypothesis testingCharuhas Pandit, Jianyi Huang, Sean P. Meyn, Venugopal V. Veeravalli. 76-81 [doi]
- Dynamic model selection with its applications to computer securityYuko Maruyama, Kenji Yamanishi. 82-87 [doi]
- On multiple description source coding with decoder side informationSuhas N. Diggavi, Vinay A. Vaishampayan. 88-93 [doi]
- Efficient pruning of bi-directional context trees with applications to universal denoising and compressionErik Ordentlich, Marcelo J. Weinberger, Tsachy Weissman. 94-98 [doi]
- Limit results on pattern entropyAlon Orlitsky, Narayana P. Santhanam, Krishnamurthy Viswanathan, Junan Zhang. 99-104 [doi]
- Grammar-based coding: new perspectivesEn-Hui Yang, Da-ke He, John C. Kieffer. 105-110 [doi]
- Predictive coding of correlated sourcesErtem Tuncel. 111-116 [doi]
- New bounds on the entropy rate of hidden Markov processesErik Ordentlich, Tsachy Weissman. 117-122 [doi]
- Universal variable-length data compression of binary sources using fountain codesGiuseppe Caire, Shlomo Shamai, Amin Shokrollahi, Sergio Verdú. 123-128 [doi]
- Channel symmetry in Slepian-Wolf code design based on LDPC codes with application to the quadratic Gaussian Wyner-Ziv problemSamuel Cheng, Zixiang Xiong. 129-134 [doi]
- A special class of multiple description scalar quantizersChao Tian, Sheila S. Hemami. 135-140 [doi]
- Enumeration algorithms for constructing (d/sub 1/, /spl infin/, d/sub 2/, /spl infin/) run length limited arrays: capacity estimates and coding schemesShayan G. Srinivasa, Steven W. McLaughlin. 141-146 [doi]
- Sensing capacity for target detectionYaron Rachlin, Rohit Negi, Pradeep K. Khosla. 147-152 [doi]
- Design of sensor networks for detection applications via large-deviation theoryJean-François Chamberland, Venugopal V. Veeravalli. 153-158 [doi]
- Capacity, stability and flows in large-scale random networksChristina Peraki, Sergio D. Servetto. 159-164 [doi]
- On the optimum number of hops in linear wireless networksMarcin Sikora, J. Nicholas Laneman, Martin Haenggi, Daniel J. Costello Jr., Thomas E. Fuja. 165-169 [doi]
- On the asymptotic performance of threshold-based acquisition systems in multipath fading channelsSaravanan Vijayakumaran, Tan F. Wong, Sandeep R. Aedudodla. 170-175 [doi]
- Capacity bounds for an ultra-wideband channel modelErdal Arikan. 176-181 [doi]
- Opportunistic dynamic subchannel allocation in multiuser OFDM networks with limited feedbackShahab Sanayei, Aria Nosratinia, Naofal Al-Dhahir. 182-186 [doi]
- Spatial mapping for MIMO systemsFrederik Simoens, Henk Wymeersch, Marc Moeneclaey. 187-192 [doi]
- MIMO transceiver design using geometric mean decompositionYi Jiang, Jian Li, William W. Hager. 193-197 [doi]
- Impact of desynchronization on PPM UWB systems: a capacity based approachMohamed Kamoun, Marc de Courville, Laurent Mazet, Pierre Duhamel. 198-203 [doi]
- Capacity-approaching codes on the q-ary symmetric channel for large qAndrea Shokrollahi. 204-208 [doi]
- Distributed source coding using serially-concatenated-accumulate codesJohnny Chen, Ashish Khisti, Dmitry Malioutov, Jonathan S. Yedidia. 209-214 [doi]
- Results on punctured LDPC codesH. Pishro-Nik, F. Fekri. 215-219 [doi]
- Instanton method of post-error-correction analytical evaluationVladimir Y. Chernyak, Misha Chertkov, Mikhail G. Stepanov, Bane Vasic. 220-224 [doi]
- Generalized belief propagation receiver for near-optimal detection of two-dimensional channels with memoryOri Shental, Anthony J. Weiss, Noam Shental, Yair Weiss. 225-229 [doi]
- Upper bounds on the rate of LDPC codes for Gilbert-Elliott channelsPulkit Grover, Ajit Kumar Chaturvedi. 230-235 [doi]
- RT oblivious erasure correctingAmos Beimel, Shlomi Dolev, Noam Singer. 236-241 [doi]
- Signature coding and information transfer for the multiple access adder channelLászló Györfi, Bálint Laczay. 242-246 [doi]
- On the advantage of network coding for improving network throughputAmit Agarwal, Moses Charikar. 247-249 [doi]
- Using the BCH construction to generate robust linear hash functionsJ. P. Grossman, Levente Jakab. 250-253 [doi]
- Information theoretic approach to the Perron root of nonnegative irreducible matricesSlawomir Stanczak, Holger Boche. 254-259 [doi]
- Space-time information propagation in mobile ad hoc wireless networksPhilippe Jacquet. 260-264 [doi]
- Mutual information and conditional mean estimation in Poisson channelsDongning Guo, Sergio Verdú, Shlomo Shamai. 265-270 [doi]
- Digital fountains: a survey and look forwardMichael Mitzenmacher. 271-276 [doi]
- Transmitter cooperation in ad-hoc wireless networks: does dirty-paper coding beat relaying?Chris T. K. Ng, Andrea J. Goldsmith. 277-282 [doi]
- Network coding gain of combination networksChi Kin Ngai, Raymond W. Yeung. 283-287 [doi]
- Power control and scheduling for interfering linksYih-Hao Lin, Rene L. Cruz. 288-291 [doi]
- Achievable diversity-vs-multiplexing tradeoffs in half-duplex cooperative channelsKambiz Azarian, Hesham El Gamal, Philip Schniter. 292-297 [doi]
- On multiple access for distributed dependent sources: a content-based group testing approachYao-Win Hong, Anna Scaglione. 298-303 [doi]
- Minimum-energy multicast in mobile ad hoc networks using network codingYunnan Wu, Philip A. Chou, Sun-Yuan Kung. 304-309 [doi]
- Decentralized network codingChristina Fragouli, Emina Soljanin. 310-314 [doi]
- Combining data fusion with joint source-channel coding of correlated sensorsWei Zhong, Javier Garcia-Frias. 315-317 [doi]
- Source-channel coding for algebraic multiterminal binningZixiang Xiong, Vladimir Stankovic 0001, Samuel Cheng, Angelos D. Liveris, Yong Sun. 318-323 [doi]
- On source and channel codes for multiple inputs and outputs: does multiple description beat space time?Michelle Effros, Ralf Koetter, Andrea J. Goldsmith, Muriel Médard. 324-329 [doi]
- Source coding with feed-forwardRamji Venkataramanan, S. Sandeep Pradhan. 330-335 [doi]
- On the variable-delay reliability function of discrete memoryless channels with access to noisy feedbackAnant Sahai, Tunc Simsek. 336-341 [doi]
- Broadcasting with fidelity criteriaNima Sarshar, Xiaolin Wu 0001. 342-347 [doi]
- On error exponents of nested lattice codes for the AWGN channelTie Liu, Pierre Moulin, Ralf Koetter. 348-352 [doi]
- Error exponents for channel coding with side informationPierre Moulin, Ying Wang. 353-358 [doi]
- Diversity gain region for MIMO fading broadcast channelsLihua Weng, Achilleas Anastasopoulos, S. Sandeep Pradhan. 359-364 [doi]
- On the capacity of vector Gaussian interference channelsSriram Vishwanath, Syed Ali Jafar. 365-369 [doi]
- Full diversity unitary space-time Bruhat constellationsTerasan Niyomsataya, Ali Miri, Monica Nevins. 370-374 [doi]
- Weighted space-time bit-interleaved coded modulationThanh Tùng Kim, George Jöngren, Mikael Skoglund. 375-380 [doi]
- On the outage probability of quasi-orthogonal space-time codesAydin Sezgin, Tobias J. Oechtering. 381-386 [doi]
- Efficient multiuser cooperation strategies using QAM space-time block codesPranav Dayal, Mahesh K. Varanasi. 387-392 [doi]
- On space-time codes and constellation labellingA. Roger Hammons Jr.. 393-395 [doi]
- Collaborative beamforming in ad hoc networksHideki Ochiai, Patrick Mitran, H. Vincent Poor, Vahid Tarokh. 396-401 [doi]
- Outage capacities of space-time architecturesNarayan Prasad, Mahesh K. Varanasi. 402-407 [doi]
- An upper bound on SNR for limited feedback MIMO beamforming systemsBishwarup Mondal, Robert W. Heath Jr.. 408-412 [doi]
- Capacity analysis of MIMO systems with unknown channel state informationJun Zheng, Bhaskar D. Rao. 413-417 [doi]
- Optimum transmit architecture of a MIMO system under modulus channel knowledge at the transmitterMiquel Payaró, Xavier Mestre, Miguel Angel Lagunas. 418-422 [doi]
- On the costs of channel state informationLizhong Zheng, David Tse, Muriel Médard. 423-427 [doi]
- MIMO channels in the low SNR regime: communication rate, error exponent and signal peakinessXinzhou Wu, R. Srikant. 428-433 [doi]
- Capacity of space-time wireless channels: a physical perspectiveAkbar M. Sayeed, Vasanthan Raghavan, Jayesh H. Kotecha. 434-439 [doi]
- Delay-limited capacity and maximum throughput of spatially correlated multiple antenna systems under average and peak-power constraintsEduard A. Jorswieck, Holger Boche, Aydin Sezgin. 440-445 [doi]
- On capacity for single-frequency spatial channelsLeif W. Hanlen, Alex J. Grant, Rodney A. Kennedy. 446-451 [doi]
- Gaussian multiple-access channels under received-power constraintsMichael Gastpar. 452-457 [doi]
- Outage minimization and optimal power control for the fading relay channelNasir Ahmed, Mohammad Ali Khojastepour, Behnaam Aazhang. 458-462 [doi]
- Wireless networks, diversity and space-time codesYindi Jing, Babak Hassibi. 463-468 [doi]
- Capacity, architecture, protocols, and sensing in wireless networksP. R. Kumar. 469-472 [doi]