Abstract is missing.
- Non-locality distillation as cryptographic gameGilles Brassard, Benno Salwey, Stefan Wolf. 1-5 [doi]
- Cross-packing lattices for the Rician fading channelAmin Sakzad, Anna-Lena Trautmann, Emanuele Viterbo. 1-5 [doi]
- Non-adaptive group testing with inhibitorsAbhinav Ganesan, Sidharth Jaggi, Venkatesh Saligrama. 1-5 [doi]
- Secrecy degrees of freedom of the two-user MISO broadcast channel with mixed CSITZhao Wang, Ming Xiao, Mikael Skoglund, H. Vincent Poor. 1-5 [doi]
- Sub-Nyquist sampling achieves optimal rate-distortionAlon Kipnis, Andrea J. Goldsmith, Yonina C. Eldar. 1-5 [doi]
- Transmitting k samples over the Gaussian channel: Energy-distortion tradeoffVictoria Kostina, Yury Polyanskiy, Sergio Verdú. 1-5 [doi]
- Capacity of Binary State Symmetric Channel with and without feedback and transmission costChristos K. Kourtellaris, Charalambos D. Charalambous. 1-5 [doi]
- File updates under random/arbitrary insertions and deletionsQiwen Wang, Viveck R. Cadambe, Sidharth Jaggi, Moshe Schwartz, Muriel Médard. 1-5 [doi]
- Gaussian joint source-channel coding for the strong interference channelInaki Estella Aguerri, Deniz Gündüz. 1-5 [doi]
- Cyclic codes and algebraic immunity of Boolean functionsSihem Mesnager, Gérard D. Cohen. 1-5 [doi]
- ADMM decoding of error correction codes: From geometries to algorithmsXishuo Liu, Stark C. Draper. 1-5 [doi]
- Bounds for complexity of syndrome decoding for poset metricsMarcelo Firer, Jerry Anderson Pinheiro. 1-5 [doi]
- Achieving secrecy capacity of the wiretap channel and broadcast channel with a confidential componentTalha Cihad Gulcu, Alexander Barg. 1-5 [doi]
- Powers of codes and applications to cryptographyIgnacio Cascudo. 1-5 [doi]
- Talking reliably, secretly, and efficiently: A "complete" characterizationQiaosheng Zhang, Swanand Kadhe, Mayank Bakshi, Sidharth Jaggi, Alex Sprintson. 1-5 [doi]
- Secrecy-good polar lattices with optimal shaping for the Gaussian wiretap channelsLing Liu, Yanfei Yan, Cong Ling. 1-5 [doi]
- Polar coding for the general wiretap channelYi-Peng Wei, Sennur Ulukus. 1-5 [doi]
- Encoding and decoding algorithms for LP-decodable multipermutation codesXishuo Liu, Stark C. Draper. 1-5 [doi]
- The approximate optimality of simple schedules for half-duplex multi-relay networksMartina Cardone, Daniela Tuninetti, Raymond Knopp. 1-5 [doi]
- Error correction through language processingAnxiao Jiang, Yue Li, Jehoshua Bruck. 1-5 [doi]
- The two-way multi-relay channelJonathan Ponniah, Liang-Liang Xie, Panganamala Ramana Kumar. 1-5 [doi]
- Upper bound on function computation in directed acyclic networksCupjin Huang, Zihan Tan, Shenghao Yang. 1-5 [doi]
- Optimal linear and cyclic locally repairable codes over small fieldsAlexander Zeh, Eitan Yaakobi. 1-5 [doi]
- Erasure/list random coding error exponents are not universally achievableNir Weinberger, Wasim Huleihel, Neri Merhav. 1-5 [doi]
- Boosting output distributions in finite blocklength channel coding converse boundsOliver Kosut. 1-5 [doi]
- The Gaussian Interference Channel with lack of codebook knowledge at one receiver: Symmetric capacity to within a gap with a PAM inputAlex Dytso, Daniela Tuninetti, Natasha Devroye. 1-5 [doi]
- Coordinating partially-informed agents over state-dependent networksBenjamin Larrousse, Samson Lasaulce, Michele A. Wigger. 1-5 [doi]
- Unique factorization and controllability of tail-biting trellis realizations via controller granule decompositionsG. David Forney. 1-5 [doi]
- Achievable and converse bounds over a general channel and general decoding metricNir Elkayam, Meir Feder. 1-5 [doi]
- Coding for network-coded slotted ALOHAShenghao Yang, Yi Chen, Soung Chang Liew, Lizhao You. 1-5 [doi]
- Compute-and-forward using nested linear codes for the Gaussian MACJingge Zhu, Michael Gastpar. 1-5 [doi]
- Refined upper bounds on stopping redundancy of binary linear codesYauhen Yakimenka, Vitaly Skachek. 1-5 [doi]
- Design of LDPC codes for the q-ary partial erasure channelRami Cohen, Yuval Cassuto. 1-5 [doi]
- Approximation algorithms for erasure correcting Data ExchangeMuxi Yan, Alex Sprintson. 1-5 [doi]
- Conditioning and covariance on caterpillarsSarah R. Allen, Ryan O'Donnell. 1-5 [doi]
- Asymmetric Lee distance codes: New bounds and constructionsRyan Gabrys, Han Mao Kiah, Olgica Milenkovic. 1-5 [doi]
- Degraded broadcast channel: Secrecy outside of a bounded rangeShaofeng Zou, Yingbin Liang, Lifeng Lai, Shlomo Shamai. 1-5 [doi]
- Capacity of the (1, ∞)-RLL input-constrained erasure channel with feedbackOron Sabag, Haim H. Permuter, Navin Kashyap. 1-5 [doi]
- On the capacity of multihop device-to-device caching networksSang-Woon Jeon, Song-Nam Hong, Mingyue Ji, Giuseppe Caire. 1-5 [doi]
- Nested lattice codes for secure bidirectional relaying with asymmetric channel gainsShashank Vatedka, Navin Kashyap. 1-5 [doi]
- Improved layered regenerating codes characterizing the exact-repair storage-repair bandwidth tradeoff for certain parameter setsKaushik Senthoor, Birenjith Sasidharan, P. Vijay Kumar. 1-5 [doi]
- WOM codes with uninformed encoderMichal Horovitz, Eitan Yaakobi. 1-5 [doi]
- Lattice index coding for the broadcast channelLakshmi Natarajan, Yi Hong, Emanuele Viterbo. 1-5 [doi]
- Secret-key cryptography from ideal primitives: A systematic overviewPeter Gazi, Stefano Tessaro. 1-5 [doi]
- Information-theory-friendly models for fiber-optic channels: A primerErik Agrell, Giuseppe Durisi, Pontus Johannisson. 1-5 [doi]
- Distributed storage allocations for neighborhood-based data accessDusan Jakovetic, Aleksandar Minja, Dragana Bajovic, Dejan Vukobratovic. 1-5 [doi]
- Deep learning and the information bottleneck principleNaftali Tishby, Noga Zaslavsky. 1-5 [doi]
- CEO problem for belief sharingAditya Vempaty, Lav R. Varshney. 1-5 [doi]
- Capacity region continuity of the compound broadcast channel with confidential messagesAndrea Grigorescu, Holger Boche, Rafael F. Schaefer, H. Vincent Poor. 1-5 [doi]
- Zero-latency zero-error codes for parallel asynchronous channels with arbitrary skewsShlomo Engelberg, Osnat Keren. 1-4 [doi]
- Capacity scaling in noncoherent wideband massive SIMO systemsMainak Chowdhury, Alexandros Manolakos, Felipe Gomez-Cuba, Elza Erkip, Andrea J. Goldsmith. 1-5 [doi]
- Gaussian estimation under attack uncertaintyTara Javidi, Yonatan Kaspi, Himanshu Tyagi. 1-5 [doi]
- Zero-error function computation through a bidirectional relayJithin Ravi, Bikash Kumar Dey. 1-5 [doi]
- Point-wise analysis of redundancy in SWLZ algorithm for φ-mixing sourcesAyush Jain, Rakesh K. Bansal. 1-5 [doi]
- On complexity and randomness of Markov-chain predictionJoel Ratsaby. 1-5 [doi]
- Can feedback increase the capacity of the energy harvesting channel?Dor Shaviv, Ayfer Özgür, Haim H. Permuter. 1-5 [doi]
- On compute-and-forward with feedbackOr Ordentlich, Uri Erez, Bobak Nazer. 1-5 [doi]
- Capacity results for the Multicast Cognitive Interference ChannelMeryem Benammar, Pablo Piantanida, Shlomo Shamai. 1-5 [doi]
- Polar codes for magnetic recording channelsAman Bhatia, Veeresh Taranalli, Paul H. Siegel, Shafa Dahandeh, Anantha Raman Krishnan, Patrick Lee, Dahua Qin, Moni Sharma, Teik Yeo. 1-5 [doi]
- A comparison of skewed and orthogonal lattices in Gaussian wiretap channelsAlex Karrila, Camilla Hollanti. 1-5 [doi]
- On the noisy feedback capacity of Gaussian broadcast channelsSibi Raj B. Pillai, Vinod M. Prabhakaran. 1-5 [doi]
- Asymptotic distance properties of protograph-based spatially coupled LDPC codes over GF(q)Kechao Huang, David G. M. Mitchell, Xiao Ma, Daniel J. Costello Jr.. 1-5 [doi]
- On the distortion-energy tradeoff for zero-delay transmission of a Gaussian source over the AWGN channelErman Koken, Ertem Tuncel, Deniz Gündüz. 1-5 [doi]
- Cyclic linear binary locally repairable codesPengfei Huang, Eitan Yaakobi, Hironori Uchikawa, Paul H. Siegel. 1-5 [doi]
- Polar coding for the broadcast channel with confidential messagesRemi A. Chou, Matthieu R. Bloch. 1-5 [doi]
- Capacity of deterministic, half-duplex, line networks with two sourcesGerhard Kramer. 1-2 [doi]
- Some "goodness" properties of LDA latticesShashank Vatedka, Navin Kashyap. 1-5 [doi]
- Broadcast channels with cooperation: Capacity and duality for the semi-deterministic caseZiv Goldfeld, Haim H. Permuter, Gerhard Kramer. 1-5 [doi]
- On MMSE properties of optimal codes for the Gaussian wiretap channelRonit Bustin, Rafael F. Schaefer, H. Vincent Poor, Shlomo Shamai. 1-5 [doi]
- Non-binary GLD codes and their latticesNicola di Pietro, Nour Basha, Joseph Jean Boutros. 1-5 [doi]
- Subset-universal lossy compressionOr Ordentlich, Ofer Shayevitz. 1-5 [doi]
- Oblivious transfer over OFDM and MIMO channelsJithin Ravi, Bikash Kumar Dey, Emanuele Viterbo. 1-5 [doi]
- Greedy MaxCut algorithms and their information contentYatao Bian, Alexey Gronskiy, Joachim M. Buhmann. 1-5 [doi]
- One-to-one lossless codes in the variable input-length regime: Back to Kraft's inequalityMarcelo J. Weinberger. 1-5 [doi]
- Non-asymptotic covering lemmasSergio Verdú. 1-3 [doi]
- Combinatorial channels from partially ordered setsDaniel Cullina, Negar Kiyavash. 1-5 [doi]
- On adaptive linear programming decoding of ternary linear codesEirik Rosnes, Michael Helmling. 1-5 [doi]
- On the transmission of a bivariate Gaussian source over the Gaussian broadcast channel with feedbackYonathan Murin, Yonatan Kaspi, Ron Dabora, Deniz Gündüz. 1-5 [doi]
- Tight bounds for symmetric divergence measures and a new inequality relating f-divergencesIgal Sason. 1-5 [doi]
- New directions in information theoretic security: Benefits of bidirectional signalingAylin Yener. 1-5 [doi]
- Stochastic interpretation for the Arimoto algorithmSergey Tridenski, Ram Zamir. 1-5 [doi]
- A constrained-dictionary version of LZ78 asymptotically achieves the finite-state compressibility with a distortion measureJacob Ziv. 1-4 [doi]
- Exponential rates of convergence for waiting times and generalized AEPAyush Jain, Rakesh K. Bansal. 1-5 [doi]
- The AWGN BC with MAC feedback: A reduction to noiseless feedback via interactionAssaf Ben-Yishai, Ofer Shayevitz. 1-5 [doi]
- Codes for DNA storage channelsHan Mao Kiah, Gregory J. Puleo, Olgica Milenkovic. 1-5 [doi]
- Harmonic analysis of binary functionsJean-Claude Belfiore, Yi Hong, Emanuele Viterbo. 1-5 [doi]
- Security in locally repairable storageAbhishek Agarwal, Arya Mazumdar. 1-5 [doi]
- Upper bound on the capacity of a cascade of nonlinear and noisy channelsGerhard Kramer, Mansoor I. Yousefi, Frank R. Kschischang. 1-4 [doi]
- Multihop virtual full-duplex relay channelsSong-Nam Hong, Ivana Maric, Dennis Hui, Giuseppe Caire. 1-5 [doi]
- Distortion-transmission trade-off in real-time transmission of Markov sourcesJhelum Chakravorty, Aditya Mahajan. 1-5 [doi]
- Throughput scaling for random hybrid wireless networks with physical-layer network codingYunyan Chang, Slawomir Stanczak, Chan Zhou. 1-5 [doi]
- Conferencing in Wyner's asymmetric interference network: Effect of number of roundsMichele A. Wigger, Roy Timo, Shlomo Shamai. 1-5 [doi]
- A new coding method for a multiple-access system with a large number of active usersAlexey Frolov, Victor V. Zyablov. 1-5 [doi]
- Caching-aided coded multicasting with multiple random requestsMingyue Ji, Antonia Maria Tulino, Jaime Llorca, Giuseppe Caire. 1-5 [doi]
- Upper bound on the capacity of discrete-time Wiener phase noise channelsLuca Barletta, Gerhard Kramer. 1-5 [doi]
- Secure transmission using an untrusted relay with scaled compute-and-forwardZhijie Ren, Jasper Goseling, Jos H. Weber, Michael Gastpar. 1-5 [doi]
- Separation architectures for lossy compressionYing-zong Huang, Gregory W. Wornell. 1-5 [doi]
- Codes for RAID solutions based upon SSDsAlexander Vardy, Eitan Yaakobi. 1-5 [doi]