Abstract is missing.
- On oblivious transfer capacityRudolf Ahlswede, Imre Csiszár. 1-3 [doi]
- Multiterminal secrecy generationImre Csiszár, Prakash Narayan. 4 [doi]
- A deterministic approach to wireless network error correctionSoheil Mohajer, Suhas N. Diggavi. 5-9 [doi]
- Clustering phenomena in message-passing schemesSekhar Tatikonda. 10-12 [doi]
- Harnessing bursty interferenceNilesh Khude, Vinod M. Prabhakaran, Pramod Viswanath. 13-16 [doi]
- Testing goodness-of-fit via rate distortionPeter Harremoës. 17-21 [doi]
- Coding efficiency and reliability in probe-based storage devicesMaria Varsamou, Theodore Antonakopoulos. 22-26 [doi]
- Constructing optimal whole-bit recycling codesDanny Dubé, Vincent Beaudoin. 27-31 [doi]
- On the random coding exponent of nonlinear gaussian channelsKostis Xenoulis, Nicholas Kalouptsidis. 32-36 [doi]
- Secure bits through queuesBrian P. Dunn, Matthieu Bloch, J. Nicholas Laneman. 37-41 [doi]
- Instantaneous forwarding strategies for relay channels with known interferenceMajid Nasiri Khormuji, Mikael Skoglund. 42-46 [doi]
- Relaying simultaneous multicast messagesDeniz Gündüz, Osvaldo Simeone, Andrea Goldsmith, Harold Vincent Poor, Shlomo Shamai. 47-51 [doi]
- Multirelay channel with non-ergodic link failuresOsvaldo Simeone, Oren Somekh, Elza Erkip, H. Vincent Poor, Shlomo Shamai. 52-56 [doi]
- Capacity region of the deterministic multi-pair bi-directional relay networkAmir Salman Avestimehr, M. Amin Khajehnejad, Aydin Sezgin, Babak Hassibi. 57-61 [doi]
- Statistical SVMs for robust detection, supervised learning, and universal classificationDayu Huang, Jayakrishnan Unnikrishnan, Sean P. Meyn, Venugopal V. Veeravalli, Amit Surana. 62-66 [doi]
- Estimating the residual waiting time for binary stationary time seriesGusztáv Morvai, Benjamin Weiss 0002. 67-70 [doi]
- An MSE-tunable linear estimator with conditional dominance over least-squares estimationVinay Uday Prabhu, Dimitris Toumpakaris. 71-75 [doi]
- Distributed computation of symmetric functions with binary inputsNikhil Karamchandani, Rathinakumar Appuswamy, Massimo Franceschetti. 76-80 [doi]
- Limited feedback for multicarrier block fading channels: A rate distortion approachManish Agarwal, Dongning Guo, Michael L. Honig. 81-85 [doi]
- On LDPC codes over symmetric channelsHamid Saeedi, Hossein Pishro-Nik. 86-90 [doi]
- Efficient iterative sphere detectors based on the Schnorr-Euchner enumerationMichael Samuel, Michael P. Fitz. 91-95 [doi]
- On minimization of multivariate entropy functionalsImre Csiszár, Frantisek Matús. 96-100 [doi]
- A simple memoryless proof of the capacity of the exponential server timing channelTodd P. Coleman. 101-105 [doi]
- A model for pricing data bundles based on minimax risks for estimation of a location parameterMokshay M. Madiman, Andrew R. Barron, Abram Kagan, Tinghui Yu. 106-109 [doi]
- A cross-layer view of wireless multicasting under uncertaintyAnna Pantelidou, Anthony Ephremides. 110-114 [doi]
- Cross layer optimization of static lightpath demands in transparent WDM optical networksKostas Christodoulopoulos, Konstantinos Manousakis, Emmanouel A. Varvarigos. 115-119 [doi]
- Finite-state broadcast channels with feedback and receiver cooperationRon Dabora, Andrea Goldsmith. 120-124 [doi]
- Towards secure multiresolution network codingLuísa Lima, João Barros, Muriel Médard, Alberto López Toledo. 125-129 [doi]
- On the capacity of multisource non-coherent network codingSoheil Mohajer, Mahdi Jafari Siavoshani, Suhas N. Diggavi, Christina Fragouli. 130-134 [doi]
- Queueing performance under Network CodingOmer H. Abdelrahman, Erol Gelenbe. 135-139 [doi]
- Information theory meets game theory on the interference channelRandall A. Berry, David N. C. Tse. 140-144 [doi]
- Comparing multilateral and bilateral exchange models for content distributionChristina Aperjis, Michael J. Freedman, Ramesh Johari. 145-146 [doi]
- A game theoretic approach to network codingJason R. Marden, Michelle Effros. 147-151 [doi]
- Anthropic correction of information estimatesMichael C. Gastpar, Patrick R. Gill, Frédéric E. Theunissen. 152-155 [doi]
- On modeling gene regulatory networks using Markov random fieldsNarayana Santhanam, Janis Dingel, Olgica Milenkovic. 156-160 [doi]
- Coding for noisy quadratic-Gaussian Wyner-Ziv problem : A successive quantization approachSong-Jheng Lin, Shih-Chun Lin, Kai-Sheng Chen, Hsuan-Jung Su. 161-165 [doi]
- Binary erasure multiple descriptions: Average-case distortionEbad Ahmed, Aaron B. Wagner. 166-170 [doi]
- Distortion-rate functions for quantized compressive sensingWei Dai 0001, Hoa Vinh Pham, Olgica Milenkovic. 171-175 [doi]
- Rate-distortion optimized network communication using general MDCMingkai Shao, Sorina Dumitrescu, Xiaolin Wu 0001. 176-180 [doi]
- Optimal amplify and forward strategy for two-way relay channel with multiple relaysRahul Vaze, Robert W. Heath Jr.. 181-185 [doi]
- Analysis of Contention-based relay selection mechanisms in autonomous multi-hop networksCarlos H. M. de Lima, Giuseppe Thadeu Freitas de Abreu. 186-190 [doi]
- On the capacity of the erasure multiple relay channelSrinath Puducheri, Thomas E. Fuja. 191-195 [doi]
- Mutual information of amplify-and-forward DSTBCs over the random set relay channelQiang Xue, Giuseppe Abreu, Behnaam Aazhang. 196-200 [doi]
- Downlink scheduling using compressed sensingSibi Raj Bhaskaran, Linda M. Davis, Alex J. Grant, Stephen V. Hanly, Paul Tune. 201-205 [doi]
- Approximately optimal utility maximizationAngelia Nedic, Vijay G. Subramanian. 206-210 [doi]
- A mechanism for pricing service guaranteesBruce E. Hajek, Sichao Yang. 211-215 [doi]
- A channel-enhancement approach to the secrecy capacity of the multiantenna wiretap channelTie Liu, Shlomo Shamai. 216-220 [doi]
- Three-user MIMO MACs with cooperationMichele A. Wigger, Gerhard Kramer. 221-225 [doi]
- Optimized training and feedback for MIMO downlink channelsMari Kobayashi, Nihar Jindal, Giuseppe Caire. 226-230 [doi]
- An iterative scheme for near optimal and universal lossy compressionShirin Jalali, Andrea Montanari, Tsachy Weissman. 231-235 [doi]
- Efficient random codebooks and databases for lossy compression in near-linear timeIoannis Kontoyiannis, Christos Gioran. 236-240 [doi]
- Sparse Markov source estimation via transformed LassoTeemu Roos, Bin Yu. 241-245 [doi]
- High dimensional Principal Component Analysis with contaminated dataHuan Xu, Constantine Caramanis, Shie Mannor. 246-250 [doi]
- Recent results on pattern maximum likelihoodJayadev Acharya, Alon Orlitsky, Shengjun Pan. 251-255 [doi]
- Quantization splitting for symmetric K-channel multiple descriptionsChao Tian, Jun Chen. 256-260 [doi]
- AND-OR tree analysis of distributed LT codesDino Sejdinovic, Robert J. Piechocki, Angela Doufexi. 261-265 [doi]
- Problems we can solve with a helperHaim H. Permuter, Yossef Steinberg, Tsachy Weissman. 266-270 [doi]
- Menger's paths with minimum mergingsGuangyue Han. 271-275 [doi]
- Analog network coding mappings in Gaussian multiple-access two-hop channelsSha Yao, Mikael Skoglund. 276-280 [doi]
- Universal weakly secure network codingDanilo Silva, Frank R. Kschischang. 281-285 [doi]
- Stability analysis for cognitive radio with cooperative enhancementsIoannis Krikidis, J. Nicholas Laneman, John Thompson, Steve McLaughlin 0001. 286-290 [doi]
- Three-user cognitive channels with cumulative message sharing: An achievable rate regionKyatsandra G. Nagananda, Chandra R. Murthy. 291-295 [doi]
- Rate region and power considerations in a simple 2×2 interference channelEmmanouil Spanakis, Apostolos Traganitis, Anthony Ephremides. 296-300 [doi]
- Capacity bounds for the Gaussian interference channel with transmitter cooperationRavi Tandon, Sennur Ulukus. 301-305 [doi]
- Distribution of MIMO mutual information: A large deviations approachPavlos Kazakopoulos, Panayotis Mertikopoulos, Aris L. Moustakas, Giuseppe Caire. 306-310 [doi]
- Approximate capacity of the symmetric half-duplex Gaussian butterfly networkAmir Salman Avestimehr, Tracey Ho. 311-315 [doi]
- M-user cooperative wireless communications based on nonbinary network codesMing Xiao, Mikael Skoglund. 316-320 [doi]
- Reciprocity in linear deterministic networks under linear codingAdnan Raja, Vinod M. Prabhakaran, Pramod Viswanath. 321-325 [doi]
- On a theory of network equivalenceRalf Koetter, Michelle Effros, Muriel Médard. 326-330 [doi]
- Capacity of deterministic Z-chain relay-interference networkSoheil Mohajer, Suhas N. Diggavi, Christina Fragouli, David N. C. Tse. 331-335 [doi]
- K-user interference channels: Achievable secrecy rate and degrees of freedomXiang He, Aylin Yener. 336-340 [doi]
- Partial cognitive relay channelMasih Nilchian, Vahid Aref, Mohammad Reza Aref. 341-345 [doi]