default search action
ITW 2010: Dublin, Ireland
- Marcus Greferath, Joachim Rosenthal, Alexander Barg, Gilles Zémor:
2010 IEEE Information Theory Workshop, ITW 2010, Dublin, Ireland, August 30 - September 3, 2010. IEEE 2010, ISBN 978-1-4244-8264-1 - Christine Bachoc:
Applications of semidefinite programming to coding theory. 1-5 - Ian F. Blake:
Abelian varieties in coding and cryptography. 1-5 - Tali Kaufman:
Local computation in codes. 1-5 - Jean-Claude Belfiore, Patrick Solé:
Unimodular lattices for the Gaussian Wiretap Channel. 1-5 - Konstantinos Drakakis, Francesco Iorio, Scott Rickard:
The enumeration of Costas arrays of order 28. 1-5 - Marcus Greferath, Alexandr Nechaev:
Generalized Frobenius extensions of finite rings and trace functions. 1-5 - Alexander Barg, G. Robert Blakley, Grigory Kabatiansky, Cédric Tavernier:
Robust parent-identifying codes. 1-4 - Julien Bringer, Hervé Chabanne, Gérard D. Cohen, Bruno Kindarji:
Identification codes in cryptographic protocols. 1-5 - Sihem Mesnager:
Recent results on bent and hyper-bent functions and their link with some exponential sums. 1-5 - Hugues Randriam:
Hecke operators with odd determinant and binary frameproof codes beyond the probabilistic bound? 1-5 - Constanza Riera, Matthew Geoffrey Parker:
Boolean functions whose restrictions are highly nonlinear. 1-5 - Davide Schipani, Joachim Rosenthal:
Coding solutions for the secure biometric storage problem. 1-4 - Rudolf Ahlswede:
Every channel with time structure has a capacity sequence. 1 - Minji Kim, Muriel Médard, João Barros:
A multi-hop multi-source Algebraic Watchdog. 1-5 - Anand D. Sarwate:
Coding against myopic adversaries. 1-5 - David Burshtein, Idan Goldenberg:
Improved linear programming decoding and bounds on the minimum distance of LDPC codes. 1-5 - Farzad Farnoud, Chien-Yu Chen, Olgica Milenkovic, Navin Kashyap:
A graphical model for computing the minimum cost transposition distance. 1-5 - S. Hamed Hassani, Nicolas Macris, Rüdiger L. Urbanke:
Coupled graphical models and their thresholds. 1-5 - Vitaly Skachek:
Characterization of graph-cover pseudocodewords of codes over F3. 1-5 - Emmanuel Abbe:
Universal source polarization and sparse recovery. 1-5 - Eran Hof, Shlomo Shamai:
Secrecy-achieving polar-coding. 1-5 - Toshiyuki Tanaka:
On speed of channel polarization. 1-5 - Sergey Bravyi:
Stabilizer subsystem codes with spatially local generators. 1-5 - Nicolas Delfosse, Gilles Zémor:
Quantum erasure-correcting codes and percolation on regular tilings of the hyperbolic plane. 1-5 - Guillaume Duclos-Cianci, David Poulin:
A renormalization group decoding algorithm for topological quantum codes. 1-5 - Markus Grassl, Martin Rötteler:
On encoders for quantum convolutional codes. 1-5 - Pradeep Kiran Sarvepalli:
Topological color codes over higher alphabet. 1-5 - Graeme Smith:
Quantum channel capacities. 1-5 - Emmanuel Abbe, Rethnakaran Pulikkoonattu:
Universal a posteriori metrics game. 1-5 - Emrah Akyol, Kumar Viswanatha, Kenneth Rose:
On conditions for linearity of optimal estimation. 1-5 - Ali Al-Bashabsheh, Yongyi Mao:
Valiant transform of forney graphs. 1-5 - Giuseppa Alfano, Antonio De Maio, Antonia M. Tulino:
Information-theoretic performance analysis of LMS MIMO communications. 1-5 - A. Taufiq Asyhari, Albert Guillén i Fàbregas:
Coding for the MIMO ARQ block-fading channel with imperfect feedback and CSIR. 1-5 - Marco Baldi, Marco Bianchi, Franco Chiaraluce:
Non-systematic codes for physical layer security. 1-5 - José Joaquín Bernal, Juan Jacobo Simón:
Information sets for abelian codes. 1-5 - Joaquim Borges, Cristina Fernández-Córdoba, Steven T. Dougherty:
Additive codes over Z2× Z4. 1-3 - Mijail Borges-Quintana, Miguel Angel Borges-Trenard, Irene Márquez-Corbella, Edgar Martínez-Moro:
An algebraic view to gradient descent decoding. 1-4 - Lorenzo Cappellari:
Lossy source compression of non-uniform binary sources using GQ-LDGM codes. 1-5 - Yuval Cassuto, Zvonimir Bandic:
Low-complexity wire-tap codes with security and error-correction guarantees. 1-5 - Hsin-Li Chiu, Sau-Hsuan Wu, Jin-Hao Li:
Cooperative ARQs with opportunistic distributed space-time coding: Effective protocols and performance analysis. 1-5 - Tao Cui, Tracey Ho, Jörg Kliewer:
On secure network coding with unequal link capacities and restricted wiretapping sets. 1-5 - Ron Dabora:
The capacity region of the interference channel with a relay in the strong interference regime subject to phase fading. 1-5 - Romar dela Cruz, Annika Meyer, Patrick Solé:
An extension of Massey scheme for secret sharing. 1-5 - Theodoros K. Dikaliotis, Alexandros G. Dimakis, Tracey Ho, Michelle Effros:
On the delay advantage of coding in packet erasure networks. 1-5 - Hieu T. Do, Tobias J. Oechtering, Mikael Skoglund:
Coding for the Z channel with a digital relay link. 1-5 - Jinfeng Du, Ming Xiao, Mikael Skoglund:
Cooperative strategies for relay-aided multi-cell wireless networks with backhaul. 1-5 - Tuvi Etzion, Alexander Vardy, Eitan Yaakobi:
Dense error-correcting codes in the Lee metric. 1-5 - Anthony Fanous, Anthony Ephremides:
Network-level cooperative protocols for wireless multicasting: Stable throughput analysis and use of network coding. 1-5 - Heide Gluesing-Luerssen, Elizabeth A. Weaver:
Tail-biting products trellises, the BCJR-construction and their duals. 1-5 - Naveen Goela, Satish Babu Korada, Michael Gastpar:
On LP decoding of polar codes. 1-5 - Naira M. Grigoryan, Ashot N. Harutyunyan:
Error exponents in multiple hypothesis testing for arbitrarily varying sources. 1-5 - Albert Guillén i Fàbregas, Alfonso Martinez:
Bit-interleaved coded modulation with shaping. 1-5 - Willie K. Harrison, João Almeida, Demijan Klinc, Steven W. McLaughlin, João Barros:
Stopping sets for physical-layer security. 1-5 - David F. Hayes, Sarah J. Johnson, Steven R. Weller:
Irregular repeat-accumulate-like codes with improved error floor performance. 1-5 - Siu-Wai Ho, Terence Chan, Alex J. Grant:
The confidence interval of entropy estimation through a noisy channel. 1-5 - Eran Hof, Igal Sason, Shlomo Shamai:
Polar coding for reliable communications over parallel channels. 1-5 - Jing Huang, Krishnan Padmanabhan, Oliver M. Collins:
Exact PWM representation of bandlimited signals. 1-5 - Amin Jafarian, Sriram Vishwanath:
On achievable rates for classes of non-linear deterministic interference channels. 1-5 - Hyoungsuk Jeon, Daesung Hwang, Hyuckjae Lee, Jeongseok Ha, Jinho Choi:
Secure type-based multiple access: Transmission strategy and analysis for perfect secrecy. 1-5 - Sang-Woon Jeon, Sae-Young Chung, Syed Ali Jafar:
Approximate capacity of a class of multi-source Gaussian relay networks. 1-5 - Anxiao Jiang, Jehoshua Bruck, Hao Li:
Constrained codes for phase-change memories. 1-5 - Jubin Jose, Sriram Vishwanath:
Sum capacity of K user Gaussian degraded interference channels. 1-5 - Sabine Kampf, Martin Bossert:
The Euclidean algorithm for Generalized Minimum Distance decoding of Reed-Solomon codes. 1-5 - Wei Kang, Nan Liu:
Wiretap channel with shared key. 1-5 - Alireza Keshavarz-Haddad, Mohammad Amir Khojastepour:
Rotate-and-add coding: A novel algebraic network coding scheme. 1-5 - Reza Khosravi-Farsani, Bahareh Akhbari, Mohammad Reza Aref:
Achievable rate regions for Dirty Tape Channels and "joint writing on Dirty paper and Dirty Tape". 1-5 - Kittipong Kittichokechai, Tobias J. Oechtering, Mikael Skoglund:
Source coding with common reconstruction and action-dependent side information. 1-5 - Stefan Krone, Gerhard P. Fettweis:
Fading channels with 1-bit output quantization: Optimal modulation, ergodic capacity and outage probability. 1-5 - Khumbo Kumwenda, Eric C. Mwambene:
Codes from graphs related to the categorical product of triangular graphs and Kn. 1-5 - Bryan Larish, George F. Riley:
The collection channel in a Wireless Sensor Network. 1-5 - Yuval Lomnitz, Meir Feder:
An achievable rate for the MIMO individual channel. 1-5 - Brian L. Luke, Phillip E. Pace:
Computation of the robust symmetrical number system dynamic range. 1-5 - Mahtab Mirmohseni, Bahareh Akhbari, Mohammad Reza Aref:
Capacity regions for some classes of Causal Cognitive Interference Channels with delay. 1-5 - David G. M. Mitchell, Roxana Smarandache, Michael Lentmaier, Daniel J. Costello Jr.:
Quasi-cyclic asymptotically regular LDPC codes. 1-5 - Soheil Mohajer, Suhas N. Diggavi:
Gaussian diamond network with adversarial jammer. 1-5 - M. Mokhtar, Yahya Mohasseb, Mohammed Nafie, Hesham El Gamal:
On the deterministic multicast capacity of bidirectional relay networks. 1-5 - Oscar Moreno, José R. Ortiz-Ubarri:
Group permutable constant weight codes. 1-5 - Ryuhei Mori, Toshiyuki Tanaka:
Non-binary polar codes using Reed-Solomon codes and algebraic geometry codes. 1-5 - Lina Mroueh, Jean-Claude Belfiore:
How to achieve the optimal DMT of selective fading MIMO channels? 1-5 - Maria Nastasescu, A. Robert Calderbank:
The projective Kerdock code. 1-5 - Lakshmi Prasad Natarajan, B. Sundar Rajan:
A new full-diversity criterion and low-complexity STBCs with Partial Interference Cancellation decoding. 1-5 - Dung Viet Nguyen, Bane Vasic, Michael W. Marcellin, Shashi Kiran Chilappagari:
Structured LDPC codes from permutation matrices free of small trapping sets. 1-5 - Stefano Rini, Daniela Tuninetti, Natasha Devroye:
Outer bounds for the interference channel with a cognitive relay. 1-5 - Sadaf Salehkalaibar, Mohammad Reza Aref:
On the capacity region of the degraded Z channel. 1-5 - Md. Zahurul I. Sarkar, Tharmalingam Ratnarajah:
On the secure outage performance for wireless multicasting through slow fading channels. 1-5 - François Simon:
Capacity of a noisy function. 1-5 - Ananda Theertha Suresh, Arunkumar Subramanian, Andrew Thangaraj, Matthieu R. Bloch, Steven W. McLaughlin:
Strong secrecy for erasure wiretap channels. 1-5 - Eeva Suvitie, Jyrki T. Lahtonen:
On the degree of the inverse of quadratic permutation polynomial interleavers. 1-5 - Kohtaro Tadaki:
Properties of optimal prefix-free machines as instantaneous codes. 1-5 - Ami Tavory, Meir Feder:
Universal portfolio algorithms in realistic-outcome markets. 1-5 - Duc To, Jinho Choi:
Reduced-state decoding in two-way relay networks with physical-layer network coding. 1-5 - Nima Torabkhani, Badri N. Vellambi, Faramarz Fekri:
Throughput and latency of acyclic erasure networks with feedback in a finite buffer regime. 1-5 - Anna-Lena Trautmann, Felice Manganiello, Joachim Rosenthal:
Orbit codes - A new concept in the area of network coding. 1-4 - Jayakrishnan Unnikrishnan, Sean P. Meyn, Venugopal V. Veeravalli:
On thresholds for robust goodness-of-fit tests. 1-4 - Kumar Viswanatha, Emrah Akyol, Kenneth Rose:
On optimum communication cost for joint compression and dispersive information routing. 1-5 - Svyatoslav Voloshynovskiy, Oleksiy J. Koval, Fokko Beekhof, Farzad Farhadzadeh, Taras Holotyak:
Information-theoretical analysis of private content identification. 1-5 - Dejan Vukobratovic, Cedomir Stefanovic, Vladimir Stankovic:
Fireworks: A random linear coding scheme for distributed storage in wireless sensor networks. 1-5 - P. C. Weeraddana, Marian Codreanu, Matti Latva-aho, Anthony Ephremides:
The benefits from simultaneous transmission and reception in wireless networks. 1-5 - Eitan Yaakobi, Anxiao Jiang, Paul H. Siegel, Alexander Vardy, Jack K. Wolf:
On the parallel programming of flash memory cells. 1-5 - Eitan Yaakobi, Scott Kayser, Paul H. Siegel, Alexander Vardy, Jack K. Wolf:
Efficient two-write WOM-codes. 1-5 - Hongyi Yao, Theodoros K. Dikaliotis, Sidharth Jaggi, Tracey Ho:
Multi-source operator channels: Efficient capacity-achieving codes. 1-5 - Mohammad Hossein Yassaee, Mohammad Reza Aref:
Multiple Access Wiretap channels with strong secrecy. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.