Abstract is missing.
- Systematic [n, n - 2] codes with capability of correcting single- and adjacent transposition errorsYanling Chen, A. J. Han Vinck. 1-5 [doi]
- Information Theoretic Bounds Based Channel Quantization Design for Emerging MemoriesZhen Mei, Kui Cai, Long Shi. 1-5 [doi]
- Secret Message Transmission over Quantum Channels under Adversarial Quantum Noise: Secrecy Capacity and Super-activationsHolger Boche, Minglai Cai, Christian Deppe, Janis Nötzel. 1-5 [doi]
- On the Broadcast Rate and Fractional Clique Cover of Single Unicast Index Coding ProblemsMahesh Babu Vaddi, B. Sundar Rajan. 1-5 [doi]
- Full Coded Caching Gains for Cache-less UsersEleftherios Lampiris, Petros Elia. 1-5 [doi]
- On the Outage Probability of Distributed MAC with ZF DetectionJoseph Kampeas, Asaf Cohen 0001, Omer Gurewitz. 1-5 [doi]
- On Generalized LDPC Codes for 5G Ultra Reliable CommunicationYanfang Liu, Pablo M. Olmos, David G. M. Mitchell. 1-5 [doi]
- What Can Machine Learning Teach Us about Communications?Mengke Lian, Christian Häger, Henry D. Pfister. 1-5 [doi]
- Recommender Systems over Wireless: Challenges and OpportunitiesLinqi Song, Christina Fragouli, Devavrat Shah. 1-5 [doi]
- Optimal coded caching in heterogeneous networks with uncoded prefetchingEmanuele Parrinello, Ayse Ünsal, Petros Elia. 1-5 [doi]
- Decoding Topological Subsystem Color Codes and Generalized Subsystem Surface CodesVinuta V. Gayatri, Pradeep Kiran Sarvepalli. 1-5 [doi]
- A Distributed Unicast Scheme Based on Schedule Sequences in Ad Hoc NetworksFang Liu, Kenneth W. Shum, Wing Shing Wong. 1-5 [doi]
- The ϵ-error Capacity of Symmetric PIR with Byzantine AdversariesQiwen Wang, Hua Sun, Mikael Skoglund. 1-5 [doi]
- A Linearly Precoded Rate Splitting Approach and Its Optimality for MIMO Broadcast ChannelsZheng Li, Sheng Yang. 1-5 [doi]
- Sparse Recovery of Sign Vectors under Uncertain Sensing MatricesHang Zhang, Afshin Abdi, Faramarz Fekri. 1-5 [doi]
- Variations on a Theme by Liu, Cuff, and Verdú: The Power of Posterior SamplingAlankrita Bhatt, Jiun-Ting Huang, Young-Han Kim 0001, J. Jon Ryu, Pinar Sen. 1-5 [doi]
- The Optimal DoF Region for the Two-User Non-Coherent SIMO Multiple-Access ChannelKhac-Hoang Ngo, Sheng Yang, Maxime Guillaud. 1-5 [doi]
- Capacity-achieving sparse regression codes via spatial couplingCynthia Rush, Kuan Hsieh, Ramji Venkataramanan. 1-5 [doi]
- Centralized Caching with Unequal Cache SizesBehzad Asadi, Lawrence Ong, Sarah J. Johnson. 1-5 [doi]
- Treeplication: An Erasure Code that is Almost as Painless as ReplicationMichael Gandelman, Yuval Cassuto. 1-5 [doi]
- A Neural Network Lattice Decoding AlgorithmMohammad-Reza Sadeghi 0001, Farzane Amirzade, Daniel Panario, Amin Sakzad. 1-5 [doi]
- Fronthaul Data Reduction in Massive MIMO Aided C-RAN via Two-timescale Hybrid CompressionAn Liu 0001, Xihan Chen, Wei Yu, Vincent K. N. Lau, Min-Jian Zhao. 1-5 [doi]
- Authentication Capacity of Adversarial ChannelsOliver Kosut, Jörg Kliewer. 1-5 [doi]
- The Age of Updates in a Simple Relay NetworkAli Maatouk, Mohamad Assaad, Anthony Ephremides. 1-5 [doi]
- A Geometric Property of Relative Entropy and the Universal Threshold Phenomenon for Binary-Input Channels with Noisy State Information at the EncoderShengtian Yang, Jun Chen 0005. 1-5 [doi]
- A New One-Coincidence Frequency-Hopping Sequence Set of Length p2 - pTae Hwan Lee, Hee-Heon Jung, Jin-Ho Chung. 1-4 [doi]
- Privacy Under Hard Distortion ConstraintsJiachun Liao, Oliver Kosut, Lalitha Sankar, Flavio P. Calmon. 1-5 [doi]
- Geometric shaping: low-density coding of Gaussian-like constellationsJoseph J. Boutros, Uri Erez, Johannes Van Wonterghem, Gil I. Shamir, Gilles Zémor. 1-5 [doi]
- Sub-linear Time Stochastic Threshold Group Testing via Sparse-Graph CodesAmirhossein Reisizadeh, Pedro Abdalla, Ramtin Pedarsani. 1-5 [doi]
- Approximating Throughput and Packet Decoding Delay in Linear Network Coded Wireless BroadcastMingchao Yu, Parastoo Sadeghi. 1-5 [doi]
- Coding Assisted Adaptive Thresholding for Sneak-Path Mitigation in Resistive MemoriesZehui Chen, Clayton Schoeny, Lara Dolecek. 1-5 [doi]
- Saddlepoint Approximation of the Cost-Constrained Random Coding Error ProbabilityJosep Font-Segura, Alfonso Martinez, Albert Guillen i Fabregas. 1-5 [doi]
- On the Capacity of MIMO Optical Wireless ChannelsLongguang Li, Stefan M. Moser, Ligong Wang, Michele A. Wigger. 1-5 [doi]
- Efficient Decoding Algorithm for Cyclically Permutable CodeMinoru Kuribayashi, Shodai Suma, Nobuo Funabiki. 1-5 [doi]
- On the Rate Distortion Function of Arbitrarily Varying Remote SourcesAmitalok J. Budkuley, Bikash Kumar Dey, Sidharth Jaggi, Vinod M. Prabhakaran. 1-5 [doi]
- Optimization of the Factor Graph for the Multiuser Superposition TransmissionBing Dong, Shaoguo Wen, Zhongwei Si. 1-5 [doi]
- Local Reconstruction Codes: A Class of MDS-PIR Capacity-Achieving CodesSiddhartha Kumar, Hsuan-Yin Lin, Eirik Rosnes, Alexandre Graell i Amat. 1-5 [doi]
- Testing Against Independence and a Rényi Information MeasureAmos Lapidoth, Christoph Pfister. 1-5 [doi]
- Capacity Limits of Full-Duplex Cellular NetworkKaiming Shen, Reza Khosravi-Farsani, Wei Yu 0001. 1-5 [doi]
- Coding for Private and Secure Multiparty ComputingQian Yu, Netanel Raviv, Amir Salman Avestimehr. 1-5 [doi]
- Entangled Polynomial Coding in Limited-Sharing Multi-Party ComputationHanzaleh Akbari Nodehi, Seyed Reza Hoseini Najarkolaei, Mohammad Ali Maddah-Ali. 1-5 [doi]
- Covert Communication over Adversarially Jammed ChannelsQiaosheng Eric Zhang, Mayank Bakshi, Sidharth Jaggi. 1-5 [doi]
- Encoding of Non-binary Quasi-cyclic Codes by Lin-Chung-Han TransformRunzhou Li, Qin Huang, Zulin Wang. 1-5 [doi]
- Optimum Linear Codes with Support Constraints over Small FieldsHikmet Yildiz, Babak Hassibi. 1-5 [doi]
- Secure Quantum Network Code without Classical CommunicationSeunghoan Song, Masahito Hayashi. 1-5 [doi]
- Low Complexity Decoding and Capacity of Index Coding Problems with Symmetric Side-InformationMahesh Babu Vaddi, B. Sundar Rajan. 1-5 [doi]
- Maximum Likelihood Upper Bounds on the Capacities of Discrete Information Stable ChannelsTongxin Li. 1-5 [doi]
- Locally Repairable Codes with Heterogeneous Locality ConstraintsQi Chen, Chunming Tang, Zhiqiang Lin. 1-5 [doi]
- Testing in Identification SystemsMinh Thanh Vu, Tobias J. Oechtering, Mikael Skoglund. 1-5 [doi]
- Read-Voltage Optimization for Finite Code Length in MLC NAND Flash MemoryKang Wei, Jun Li, Lingjun Kong, Feng Shu, Yonghui Li. 1-5 [doi]
- Mixed Delay Constraints at Maximum Sum-Multiplexing GainHoma Nikbakht, Michele A. Wigger, Shlomo Shamai Shitz. 1-5 [doi]
- Capacity of the Vector Gaussian Channel in the Small Amplitude RegimeAlex Dytso, H. Vincent Poor, Shlomo Shamai Shitz. 1-5 [doi]
- Time-Division is Optimal for Covert Communication over Some Broadcast ChannelsVincent Y. F. Tan, Si-Hyeon Lee. 1-5 [doi]
- Staircase-PIR: Universally Robust Private Information RetrievalRawad Bitar, Salim El Rouayheb. 1-5 [doi]
- Reconstruction from Deletions in Racetrack MemoriesYeow Meng Chee, Ryan Gabrys, Alexander Vardy, Van Khu Vu, Eitan Yaakobi. 1-5 [doi]
- Secure physical layer network coding versus secure network codingMasahito Hayashi. 1-5 [doi]
- Three-Layer Composite Coding for Index CodingYucheng Liu, Parastoo Sadeghi, Young-Han Kim 0001. 1-5 [doi]
- Vector Gaussian CEO Problem Under Logarithmic LossYigit Ugur, Inaki Estella Aguerri, Abdellatif Zaidi. 1-5 [doi]
- Nonparametric Direct Entropy Difference EstimationPuning Zhao, Lifeng Lai. 1-5 [doi]
- On The Reliability Function of Discrete Memoryless Multiple-Access Channel with FeedbackMohsen Heidari, Achilleas Anastasopoulos, S. Sandeep Pradhan. 1-5 [doi]
- The Caching Broadcast Channel with a Wire and Cache Tapping Adversary of Type IIMohamed S. Nafea, Aylin Yener. 1-5 [doi]
- The Secure Two-Receiver Broadcast Channel With One-Sided Receiver Side InformationJin Yeong Tan, Lawrence Ong, Behzad Asadi. 1-5 [doi]
- An Iterative Soft-Decision Decoding Algorithm with Dynamic Saturation for Short Reed-Solomon CodesBryan Liu, Yixuan Xie, Lei Yang, Jinhong Yuan. 1-5 [doi]
- Secure Computation-and-Forward Communication with Linear CodesMasahito Hayashi, Tadashi Wadayama, Angeles Vazquez-Castro. 1-5 [doi]
- Service Rate Region of Content Access from Erasure Coded StorageSarah E. Anderson, Ann Johnston, Gauri Joshi, Gretchen L. Matthews, Carolyn Mayer, Emina Soljanin. 1-5 [doi]
- Dynamic Edge Caching with Popularity DriftingLinqi Song, Jie Xu 0001. 1-5 [doi]
- On the Capacity Region for Secure Index CodingYuxin Liu, Badri N. Vellambi, Young-Han Kim 0001, Parastoo Sadeghi. 1-5 [doi]
- Private Information Retrieval from Multiple Access ChannelsKarim A. Banawan, Sennur Ulukus. 1-5 [doi]
- Asynchronous Batch and PIR Codes from HypergraphsAgo-Erik Riet, Vitaly Skachek, Eldho K. Thomas. 1-5 [doi]
- Optimal Utility-Privacy Trade-off with Total Variation Distance as a Privacy MeasureBorzoo Rassouli, Deniz Gündüz. 1-5 [doi]
- Placement Delivery Array and Its ApplicationsQifa Yan, Xiaohu Tang, Qingchun Chen. 1-5 [doi]
- Optimal Cyclic (r, ẟ) Locally Repairable Codes with Unbounded LengthWeijun Fang, Fangwei Fu. 1-5 [doi]
- Deep MIMO Detection Based on Belief PropagationXiangfeng Liu, Ying Li. 1-5 [doi]
- Information Rates and Error Exponents for Probabilistic Amplitude ShapingRana Ali Amjad. 1-5 [doi]
- Multiple-Access Channel with Independent Sources: Error Exponent AnalysisArezou Rezazadeh, Josep Font-Segura, Alfonso Martinez, Albert Guillen i Fabregas. 1-5 [doi]
- Binary Linear Codes with Optimal Scaling: Polar Codes with Large KernelsArman Fazeli, S. Hamed Hassani, Marco Mondelli, Alexander Vardy. 1-5 [doi]
- Generalization error bounds using Wasserstein distancesAdrian Tovar Lopez, Varun Jog. 1-5 [doi]
- Coding Theorem for Systematic LDGM Codes Under List DecodingWenchao Lin, Suihua Cai, Baodian Wei, Xiao Ma. 1-5 [doi]
- Asymptotically Optimal Scheduling for Compute-and-ForwardOri Shmuel, Asaf Cohen 0001, Omer Gurewitz. 1-5 [doi]
- Algebraic Optimization of Binary Spatially Coupled Measurement Matrices for Interval PassingSalman Habib, Jörg Kliewer. 1-5 [doi]
- Free Pseudodistance Growth Rates for Spatially Coupled LDPC Codes over the BECCunlu Zhou, David G. M. Mitchell, Roxana Smarandache. 1-5 [doi]
- Information Theory of Mixed Population Genome-Wide Association StudiesBehrooz Tahmasebi, Mohammad Ali Maddah-Ali, Seyed Abolfazl Motahari. 1-5 [doi]
- Symmetric Multilevel Imperfect Secret SharingTao Guo, Xuan Guang, Kenneth W. Shum. 1-5 [doi]
- Best Arm Identification for Both Stochastic and Adversarial Multi-armed BanditsHantao Zhang, Cong Shen. 1-5 [doi]
- Gaussian Universal Features, Canonical Correlations, and Common InformationShao-Lun Huang, Gregory W. Wornell, Lizhong Zheng. 1-5 [doi]
- An Information Theoretic Converse for the "Consecutive Complete-S" PICOD ProblemTang Liu 0002, Daniela Tuninetti. 1-5 [doi]
- Approximate Nash Region of the Gaussian Interference Channel with Noisy Output FeedbackVictor Quintero, Samir Medina Perlaza, Jean-Marie Gorce, H. Vincent Poor. 1-5 [doi]
- Capacity of Single-Server Single-Message Private Information Retrieval with Coded Side InformationAnoosheh Heidarzadeh, Fatemeh Kazemi, Alex Sprintson. 1-5 [doi]
- Circular-shift Linear Network Codes with Arbitrary Odd Block LengthsQifu Tyler Sun, Hanqi Tang, Zongpeng Li, Xiaolong Yang, Keping Long. 1-5 [doi]
- Storage, Computation, and Communication: A Fundamental Tradeoff in Distributed ComputingQifa Yan, Sheng Yang, Michele A. Wigger. 1-5 [doi]
- The Geometric Structure of Generalized Softmax LearningXiangxiang Xu 0001, Shao-Lun Huang, Lizhong Zheng, Lin Zhang. 1-5 [doi]
- Redundancy Capacity Theorem for On-Line Learning Under a Certain Form of Hypotheses ClassShachar Shayovitz, Meir Feder. 1-5 [doi]
- Private Information Retrieval with Private Side Information Under Storage ConstraintsYi-Peng Wei, Sennur Ulukus. 1-5 [doi]
- Zero-error Function Computation on a Directed Acyclic NetworkArdhendu Tripathy, Aditya Ramamoorthy. 1-5 [doi]
- On Optimal (r, δ)-LRCs with Length n | (q+1)Weijun Fang, Fang-Wei Fu, Bin Cheny, Shu-Tao Xia. 1-5 [doi]
- Cloud-Edge Non-Orthogonal Transmission for Fog Networks with Delayed CSI at the CloudJingjing Zhang, Osvaldo Simeone. 1-5 [doi]
- An Upper bound on the Error Exponent in Lossless Source Coding with a HelperWei Kang 0002, Nan Liu. 1-5 [doi]
- Multi-Message Private Information Retrieval with Private Side InformationSeyed Pooya Shariatpanahi, Mahdi Jafari Siavoshani, Mohammad Ali Maddah-Ali. 1-5 [doi]
- The Degrees of Freedom of the Oversampled Non-Coherent ChannelLuca Barletta, Stefano Rini. 1-5 [doi]
- Capacity of Locally Recoverable CodesArya Mazumdar. 1-5 [doi]
- Efficient decoding of polar codes with some 16×16 kernelsGrigorii Trofimiuk, Peter Trifonov. 1-5 [doi]
- RT-Polar: An HARQ Scheme with Universally Competitive RatesSoumya Subhra Banerjee, Himanshu Tyagi. 1-5 [doi]
- Depth versus Breadth in Convolutional Polar CodesMaxime Tremblay, Benjamin Bourassa, David Poulin. 1-5 [doi]
- Storage-Repair Bandwidth Trade-off for Wireless Caching with Partial Failure and Broadcast RepairNitish Mital, Katina Kralevska, Cong Ling 0001, Deniz Gündüz. 1-5 [doi]
- Simulation of Random Variables under Rényi Divergence Measures of All OrdersLei Yu 0003, Vincent Y. F. Tan. 1-5 [doi]
- Private Streaming with Convolutional CodesLukas Holzbaur, Ragnar Freij-Hollanti, Antonia Wachter-Zeh, Camilla Hollanti. 1-5 [doi]
- Optimal Inputs for Some Classes of Degraded Wiretap ChannelsAlex Dytso, Malcolm Egan, Samir Medina Perlaza, H. Vincent Poor, Shlomo Shamai Shitz. 1-5 [doi]
- Performance Limits of Lattice Reduction over Imaginary Quadratic Fields with Applications to Compute-and-ForwardShanxiang Lyu, Christian Porter, Cong Ling 0001. 1-5 [doi]
- New Results on the Wire-tap Channel with Noiseless FeedbackBin Dai 0003, Linman Yu, Yuan Luo. 1-5 [doi]
- Asymmetry Helps: Improved Private Information Retrieval Protocols for Distributed StorageHsuan-Yin Lin, Siddhartha Kumar, Eirik Rosnes, Alexandre Graell i Amat. 1-5 [doi]
- Distributed Hypothesis Testing Under Privacy ConstraintsSreejith Sreekumar, Deniz Gündüz, Asaf Cohen 0001. 1-5 [doi]
- A New Kind of Nonbinary Uniquely Decodable Codes with Arbitrary Code Length for Multiple-Access Adder ChannelShan Lu, Wei Hou, Jun Cheng 0001, Hiroshi Kamabe. 1-5 [doi]
- Repair Schemes with Optimal I/O Costs for Full-Length Reed-Solomon Codes with Two ParitiesHoang Dau, Emanuele Viterbo. 1-5 [doi]
- Type-II Quasi-Cyclic LDPC Codes with Girth Eight from Sidon SequenceGuohua Zhang, Yulin Hu, Qinwei He, Juhua Wang. 1-5 [doi]
- Joint Channel-Network Decoding for Asynchronous Physical-Layer Network CodingXiaokang Wang, Wai Ho Mow. 1-5 [doi]
- Timely Lossless Source Coding for Randomly Arriving SymbolsJing Zhong, Roy D. Yates, Emina Soljanin. 1-5 [doi]
- Bandwidth Efficiency of Distance-optimal Scalar Locally Repairable CodesBin Chen 0011, Shu-Tao Xia. 1-5 [doi]
- Coded Caching via Line Graphs of Bipartite GraphsPrasad Krishnan. 1-5 [doi]
- Capacity Bounds for Bandlimited Gaussian Channels With Peak-to-Average-Power-Ratio ConstraintYizhu Wang, Jing Zhou, Wenyi Zhang. 1-5 [doi]
- Universal Polar Coding for Asymmetric ChannelsKarthik Nagarjuna, Paul H. Siegel. 1-5 [doi]
- Iterative Multistage Soft Decoding of Multilevel Reed-Solomon CodesXin Huang, Li Chen. 1-5 [doi]
- Privacy-Utility Management of Hypothesis TestsZuxing Li, Tobias J. Oechtering. 1-5 [doi]
- Generalized Globally-Coupled Low-Density Parity-Check CodesYen-Chin Liao, Hsie-Chia Chang, Shu Lin. 1-5 [doi]
- Error Correction and Detection for Computing Memories Using System Side InformationClayton Schoeny, Irina Alam, Mark Gottscho, Puneet Gupta, Lara Dolecek. 1-5 [doi]
- Coded Cache Placement for Heterogeneous Cache SizesDeyao Zhang, Nan Liu. 1-5 [doi]
- 3LES: Codes for Coded Computation that Leverage StragglersAnindya B. Das, Li Tang, Aditya Ramamoorthy. 1-5 [doi]