Abstract is missing.
- Protecting data against unwanted inferencesSupriyo Chakraborty, Nicolas Bitouze, Mani B. Srivastava, Lara Dolecek. [doi]
- Source coding, lists, and Rényi EntropyChristoph Bunte, Amos Lapidoth. 1-5 [doi]
- Degrees of freedom of the rank-deficient MIMO X channelAdrian Agustin, Josep Vidal. 1-5 [doi]
- On the mutual information between random variables in networksXiaoli Xu, Satyajit Thakor, Yong Liang Guan. 1-5 [doi]
- Distortion minimization in layered broadcast transmission of a Gaussian source over Rayleigh channelsWessam Mesbah, Mohammad Shaqfeh, Hussein M. Alnuweiri. 1-5 [doi]
- Two-partition-symmetrical entropy function regionsQi Chen, Raymond W. Yeung. 1-5 [doi]
- Cyclic interference neutralization on the 2 × 2 × 2 full-duplex two-way relay-interference channelHenning Maier, Rudolf Mathar. 1-5 [doi]
- On the stability region of a relay-assisted multiple access schemeNikolaos Pappas, Marios Kountouris, Anthony Ephremides, Apostolos Traganitis. 1-8 [doi]
- Any positive feedback rate increases the capacity of strictly less-noisy broadcast channelsYoulong Wu, Michele A. Wigger. 1-5 [doi]
- On information flow and feedback in relay networksBobbie Chern, Ayfer Özgür. 1-5 [doi]
- Concatenated permutation block codes based on set partitioning for substitution and deletion error-controlReolyn Heymann, Jos H. Weber, Theo G. Swart, Hendrik C. Ferreira. 1-5 [doi]
- A closed-form scaling law for convolutional LDPC codes over the BECPablo M. Olmos, Rüdiger L. Urbanke. 1-5 [doi]
- MAC capacity under distributed scheduling of multiple users and linear decorrelationJoseph Kampeas, Asaf Cohen, Omer Gurewitz. 1-5 [doi]
- Spatially-coupled low density lattices based on construction a with applications to compute-and-forwardNihat Engin Tunali, Krishna R. Narayanan, Henry D. Pfister. 1-5 [doi]
- Flag orbit codes and their expansion to Stiefel codesRenaud-Alexandre Pitaval, Olav Tirkkonen. 1-5 [doi]
- Improved decoding for binary source coding with coded side informationAnne Savard, Claudio Weidmann. 1-5 [doi]
- Non-parametric prediction of the mid-price dynamics in a limit order bookDeepan Palguna, Ilya Pollak. 1-5 [doi]
- The likelihood encoder for source codingPaul Cuff, Eva C. Song. 1-2 [doi]
- Characterising correlation via entropy functionsSatyajit Thakor, Terence H. Chan, Alexander J. Grant. 1-2 [doi]
- Asymptotically minimax regret by Bayes mixtures for non-exponential familiesJun-ichi Takeuchi, Andrew R. Barron. 1-5 [doi]
- Impact of random and burst packet losses on H.264 scalable video codingSiyu Tang, Patrice Rondao-Alface. 1-5 [doi]
- Computing the Camion's multivariate BCH boundJosé Joaquín Bernal, Diana H. Bueno-Carreño, Juan Jacobo Simón. 1-5 [doi]
- On the average-listsize capacity and the cutoff rate of discrete memoryless channels with feedbackChristoph Bunte, Amos Lapidoth. 1-5 [doi]
- On the information complexity of cascaded norms with small domainsT. S. Jayram. 1-5 [doi]
- Constrained rank modulation schemesFrederic Sala, Lara Dolecek. 1-5 [doi]
- Design of non-binary quasi-cyclic LDPC codes by ACE optimizationAlex Bazarsky, Noam Presman, Simon Litsyn. 1-5 [doi]
- Secure degrees of freedom of MIMO X-channels with output feedback and delayed CSIAbdellatif Zaidi, Zohaib Hassan Awan, Shlomo Shamai Shitz, Luc Vandendorpe. 1-5 [doi]
- Information-preserving Markov aggregationBernhard C. Geiger, Christoph Temmel. 1-5 [doi]
- Channel polarization with higher order memoryHuseyin Afser, Hakan Deliç. 1-5 [doi]
- New geometrical spectra of linear codes with applications to performance analysisXiao Ma, Jia Liu, Qiutao Zhuang, Baoming Bai. 1-5 [doi]
- Source broadcasting over erasure channels: Distortion bounds and code designLouis Tan, Yao Li, Ashish Khisti, Emina Soljanin. 1-5 [doi]
- Achievable rates for intermittent multi-access communicationMostafa Khoshnevisan, J. Nicholas Laneman. 1-5 [doi]
- The secrecy capacity of a compound MIMO Gaussian channelRafael F. Schaefer, Sergey Loyka. 1-5 [doi]
- Polar codes with dynamic frozen symbols and their decoding by directed searchPeter Trifonov, Vera Miloslavskaya. 1-5 [doi]
- The entropy of sums and Rusza's divergence on abelian groupsIoannis Kontoyiannis, Mokshay M. Madiman. 1-2 [doi]
- Compression of noisy signals with information bottlenecksAmin Emad, Olgica Milenkovic. 1-5 [doi]
- Thresholds of spatially coupled systems via Lyapunov's methodChristian Schlegel, Marat V. Burnashev. 1-5 [doi]
- Nonbinary LDPC-coded differential modulation: Performance and decoding algorithmMinghua Li, Baoming Bai, Peiying Zhang, Xiao Ma. 1-5 [doi]
- Joint channel intrinsic randomness and channel resolvabilityAlexandre J. Pierrot, Matthieu R. Bloch. 1-5 [doi]
- Novel tight classification error bounds under mismatch conditions based on f-DivergenceRalf Schlüter, Markus Nußbaum-Thom, Eugen Beck, Tamer Alkhouli, Hermann Ney. 1-5 [doi]
- A connection between good rate-distortion codes and backward DMCsCurt Schieler, Paul Cuff. 1-5 [doi]
- Combinatorial flow over cyclic linear networksChung Chan, Kenneth W. Shum, Qifu Tyler Sun. 1-5 [doi]
- State-dependent Gaussian Z-channel with mismatched side-information and interferenceRuchen Duan, Yingbin Liang, Ashish Khisti, Shlomo Shamai Shitz. 1-5 [doi]
- Cooperative energy harvesting communications with relaying and energy sharingKaya Tutuncuoglu, Aylin Yener. 1-5 [doi]
- Enabling multiplication in lattice codes via Construction AFrédérique E. Oggier, Jean-Claude Belfiore. 1-5 [doi]
- Physical-layer cryptography through massive MIMOThomas Dean, Andrea Goldsmith. 1-5 [doi]
- ε-Capacity and strong converse for channels with general stateMarco Tomamichel, Vincent Y. F. Tan. 1-5 [doi]
- Capacity region of a class of interfering relay channelsHieu T. Do, Tobias J. Oechtering, Mikael Skoglund, Mai Vu. 1-5 [doi]
- Some coding and information theoretic problems in contemporary (video) content deliveryEmina Soljanin. 1-5 [doi]
- Iterative similarity inference via message passing in factor graphs for Collaborative FilteringJun Zou, Arash Einolghozati, Erman Ayday, Faramarz Fekri. 1-5 [doi]
- On polarization for the linear operator channelCesar Brito, Jörg Kliewer. 1-5 [doi]
- Maximum likelihood associative memoriesVincent Gripon, Michael Rabbat. 1-5 [doi]
- Signals that can be easily time-frequency synchronized from their ambiguity functionTohru Kohda, Yutaka Jitsumatsu, Kazuyuki Aihara. 1-5 [doi]
- Gaussian half-duplex relay networks: Improved gap and a connection with the assignment problemMartina Cardone, Daniela Tuninetti, Raymond Knopp, Umer Salim. 1-5 [doi]
- Erasure/list exponents for Slepian-Wolf decodingNeri Merhav. 1-5 [doi]
- Bypassing correlation decay for matchings with an application to XORSATMarc Lelarge. 1-5 [doi]
- Sampling versus random binning for multiple descriptions of a bandlimited sourceAdam Mashiach, Jan Østergaard, Ram Zamir. 1-5 [doi]
- On the interference channel with common messages and the role of rate-sharingStefano Rini, Andrea Goldsmith. 1-5 [doi]
- One-shot bounds for various information theoretic problems using smooth min and max Rényi divergencesNaqueeb Ahmad Warsi. 1-5 [doi]
- A new design criterion for spherically-shaped division algebra-based space-time codesLaura Luzzi, Roope Vehkalahti. 1-5 [doi]
- On Semi-Probabilistic universal predictionAlexander Rakhlin, Karthik Sridharan. 1-5 [doi]
- A lower bound on achievable rates by polar codes with mismatch polar decodingMine Alsan. 1-5 [doi]
- Cognitive cooperative communications on the Multiple Access ChannelJonathan Shimonovich, Anelia Somekh-Baruch, Shlomo Shamai Shitz. 1-5 [doi]
- Linear network coding for multiple groupcast sessions: An interference alignment approachAbhik Kumar Das, Siddhartha Banerjee, Sriram Vishwanath. 1-5 [doi]
- Lattice quantization noise revisitedCong Ling, Lu Gan. 1-5 [doi]
- Precoded integer-forcing universally achieves the MIMO capacity to within a constant gapOr Ordentlich, Uri Erez. 1-5 [doi]
- Design of masking matrix for QC-LDPC codesYang Liu, Ying Li. 1-5 [doi]
- Optimal binary measurement matrices for compressed sensingArash Saber Tehrani, Alexandros G. Dimakis, Giuseppe Caire. 1-5 [doi]
- Polar coding for secret-key generationRemi A. Chou, Matthieu R. Bloch, Emmanuel Abbe. 1-5 [doi]
- Bounding the entropic region via information geometryYunshu Liu, John MacLaren Walsh. 1-5 [doi]
- On degrees-of-freedom of full-duplex uplink/downlink channelAchaleshwar Sahai, Suhas Diggavi, Ashutosh Sabharwal. 1-5 [doi]
- Displacement convexity - A useful framework for the study of spatially coupled codesRafah El-Khatib, Nicolas Macris, Rüdiger L. Urbanke. 1-5 [doi]
- Robust error correction for real-valued signals via message-passing decoding and spatial couplingJean Barbier, Florent Krzakala, Lenka Zdeborová, Pan Zhang. 1-5 [doi]
- Information-theoretic limits on the classification of Gaussian mixtures: Classification on the Grassmann manifoldMatthew S. Nokleby, A. Robert Calderbank, Miguel R. D. Rodrigues. 1-5 [doi]
- An impossibility result for high dimensional supervised learningMohammad H. Rohban, Prakash Ishwar, Burkay Orten, William C. Karl, Venkatesh Saligrama. 1-5 [doi]
- Polar coding for fading channelsHongbo Si, Onur Ozan Koyluoglu, Sriram Vishwanath. 1-5 [doi]
- When is it possible to simulate a DMC channel from another?Farzin Haddadpour, Mohammad Hossein Yassaee, Mohammad Reza Aref, Amin Gohari. 1-5 [doi]
- On the weakest resource for coordination in AV-MACs with conferencing encodersMoritz Wiese, Holger Boche. 1-5 [doi]
- Characterization of the smooth Rényi Entropy Using MajorizationHiroki Koga. 1-5 [doi]
- Aggregating rankings with positional constraintsFarzad Farnoud Hassanzadeh, Olgica Milenkovic. 1-5 [doi]
- Nonasymptotic noisy lossy source codingVictoria Kostina, Sergio Verdú. 1-5 [doi]
- On existence of optimal linear encoders over non-field rings for data compression with application to computingSheng Huang, Mikael Skoglund. 1-5 [doi]
- Lovasz ϑ, SVMs and applicationsVinay Jethava, Jacob Sznajdman, Chiranjib Bhattacharyya, Devdatt P. Dubhashi. 1-5 [doi]
- On the capacity of ms/3t and 3s/nt sum-networksBrijesh Kumar Rai, Niladri Das. 1-5 [doi]
- Sparse Regression codes: Recent results and future directionsRamji Venkataramanan, Sekhar Tatikonda. 1-5 [doi]
- The least degraded and the least upgraded channel with respect to a channel familyWei Liu, Seyed Hamed Hassani, Rüdiger L. Urbanke. 1-5 [doi]
- A new unified method for intrinsic randomness problems of general sourcesTomohiko Uyematsu, Shohei Kunimatsu. 1-5 [doi]
- A phase transition for the uniform distribution in the pattern maximum likelihood problemWinston Fernandes, Navin Kashyap. 1-5 [doi]
- Operational extremality of Gaussianity in network compression, communication, and codingHimanshu Asnani, Ilan Shomorony, Amir Salman Avestimehr, Tsachy Weissman. 1 [doi]
- On the role of interference decoding in compound broadcast channelsMeryem Benammar, Pablo Piantanida. 1-5 [doi]
- Coupled neural associative memoriesAmin Karbasi, Amir Hesam Salavati, Amin Shokrollahi. 1-5 [doi]
- Rate-distortion bounds for an ε-insensitive distortion measureKazuho Watanabe. 1-5 [doi]
- Packing tubes on tori: An efficient method for low SNR analog error correctionRobert M. Taylor, Lamine Mili, Amir Zaghloul. 1-5 [doi]
- A general framework for statistically characterizing the dynamics of MIMO channelsF. Javier López-Martínez, Eduardo Martos-Naya, José F. Paris, Andrea Goldsmith. 1-5 [doi]
- Uplink multi-cell processing: Approximate sum capacity under a sum backhaul constraintYuhan Zhou, Wei Yu, Dimitris Toumpakaris. 1-5 [doi]
- Two-unicast two-hop interference network: Finite-field modelSong-Nam Hong, Giuseppe Caire. 1-5 [doi]
- Distributed function computation over a tree networkMilad Sefidgaran, Aslan Tchamkerten. 1-5 [doi]
- The Heegard-Berger problem with common receiver reconstructionsBadri N. Vellambi, Roy Timo. 1-5 [doi]
- Multi-cell cooperation with random user locations under arbitrary signalingMaksym A. Girnyk, Mikko Vehkaperä, Lars K. Rasmussen. 1-5 [doi]
- Network coding designs suited for the real world: What works, what doesn't, what's promisingMorten Videbæk Pedersen, Daniel Enrique Lucani, Frank H. P. Fitzek, Chres W. Sørensen, Arash Shahbaz Badr. 1-5 [doi]
- Multilevel topological interference managementChunhua Geng, Hua Sun, Syed Ali Jafar. 1-5 [doi]
- On symmetric multiple description codingLin Song, Shuo Shao, Jun Chen. 1-5 [doi]
- Exploiting common randomness: A resource for network secrecyLászló Czap, Vinod M. Prabhakaran, Suhas N. Diggavi, Christina Fragouli. 1-5 [doi]
- Secrecy & Rate Adaptation for secure HARQ protocolsMaël Le Treust, Leszek Szczecinski, Fabrice Labeau. 1-5 [doi]
- Fixed-to-variable length resolution coding for target distributionsGeorg Böcherer, Rana Ali Amjad. 1-5 [doi]
- 2q with applications to compute-and-forwardYu-Chih Huang, Krishna R. Narayanan. 1-5 [doi]
- On the reliable transmission of correlated sources over two-relay networkMohammad Nasiraee, Bahareh Akhbari, Mahmoud Ahmadian-Attari, Mohammad Reza Aref. 1-5 [doi]
- Equivalence of inner regions for broadcast channel codingJun Muramatsu. 1-5 [doi]
- Improved capacity lower bounds for channels with deletions and insertionsRamji Venkataramanan, Sekhar Tatikonda. 1-5 [doi]
- Fundamental limits of distributed caching in D2D wireless networksMingyue Ji, Giuseppe Caire, Andreas F. Molisch. 1-5 [doi]
- Capacity region of multi-resolution streaming in peer-to-peer networksBatuhan Karagöz, Semih Yavuz, Tracey Ho, Michelle Effros. 1-5 [doi]
- On the noise sensitivity and mutual information of (nested-) canalizing Boolean functionsJohannes Georg Klotz, Martin Bossert, Steffen Schober. 1-5 [doi]
- Projections, dissections and bandwidth expansion mappingsAntonio Campello, Vinay A. Vaishampayan, Sueli I. R. Costa. 1-5 [doi]
- Interference neutralization using lattice codesShahab Ghasemi-Goojani, Hamid Behroozi. 1-5 [doi]
- A deterministic annealing approach to optimization of zero-delay source-channel codesMustafa S. Mehmetoglu, Emrah Akyol, Kenneth Rose. 1-5 [doi]
- Prefixless q-ary balanced codes with ECCTheo G. Swart, Kees A. Schouhamer Immink. 1-5 [doi]
- Stochastic threshold group testingChun Lam Chan, Sheng Cai, Mayank Bakshi, Sidharth Jaggi, Venkatesh Saligrama. 1-5 [doi]
- The deterministic capacity of relay networks with relay private messagesAhmed A. Zewail, Yahya Mohasseb, Mohammed Nafie, Hesham El Gamal. 1-5 [doi]
- Learning joint quantizers for reconstruction and predictionMaxim Raginsky. 1-5 [doi]
- Outer bounds and a functional study of the edge removal problemEun Jee Lee, Michael Langberg, Michelle Effros. 1-5 [doi]
- Gaussian many-access channels: Definition and symmetric capacityXu Chen, Dongning Guo. 1-5 [doi]
- Informational confidence bounds for self-normalized averages and applicationsAurélien Garivier. 1-5 [doi]
- On 2-D non-adjacent-error channel modelsK. Manickam Shivkumar, Navin Kashyap. 1-5 [doi]
- The sum-capacity of different K-user cognitive interference channels in strong interferenceDiana Maamari, Daniela Tuninetti, Natasha Devroye. 1-5 [doi]
- Shannon entropy estimation from convergence results in the countable alphabet caseJorge F. Silva, Patricio Parada. 1-5 [doi]
- Reconstruction in the labeled stochastic block modelMarc Lelarge, Laurent Massoulié, Jiaming Xu. 1-5 [doi]
- Scaling exponent of list decoders with applications to polar codesMarco Mondelli, Seyed Hamed Hassani, Rüdiger L. Urbanke. 1-5 [doi]
- Analog index coding over block-fading MISO broadcast channels with feedbackPablo Piantanida, Mari Kobayashi, Giuseppe Caire. 1-5 [doi]
- Secrecy in cascade networksPaul Cuff. 1-5 [doi]
- MCUIUC - A new framework for metagenomic read compressionJonathan G. Ligo, Minji Kim, Amin Emad, Olgica Milenkovic, Venugopal V. Veeravalli. 1-5 [doi]
- Zero vs. ε error in interference channelsIlia Levi, Dan Vilenchik, Michael Langberg, Michelle Effros. 1-5 [doi]
- A finite length performance analysis of LDPC codes constructed by connecting spatially coupled chainsPablo M. Olmos, David G. M. Mitchell, Dmitri V. Truhachev, Daniel J. Costello Jr.. 1-5 [doi]
- Sparse signal processing with linear and non-linear observations: A unified shannon theoretic approachCem Aksoylar, George Atia, Venkatesh Saligrama. 1-5 [doi]
- Information theory for atypical sequencesAnders Høst-Madsen, Elyas Sabeti, Chad Walton. 1-5 [doi]
- Asymptotically equivalent sequences of matrices and relative entropyJesús Gutiérrez-Gutiérrez, Pedro M. Crespo. 1-4 [doi]
- Exact-regenerating codes between MBR and MSR pointsToni Ernvall. 1-5 [doi]
- The stability region of the two-user interference channelNikolaos Pappas, Marios Kountouris, Anthony Ephremides. 1-5 [doi]
- Improved capacity approximations for Gaussian relay networksRitesh Kolte, Ayfer Özgür. 1-5 [doi]
- Spectrum bandit optimizationMarc Lelarge, Alexandre Proutière, Sadegh Talebi. 1-5 [doi]