Codes Against Online Adversaries: Large Alphabets
暂无分享,去创建一个
[1] Anand D. Sarwate,et al. Robust and adaptive communication under uncertain interference , 2008 .
[2] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[3] Thomas M. Cover,et al. Elements of information theory (2. ed.) , 2006 .
[4] Anand D. Sarwate,et al. Improved upper bounds on the capacity of binary channels with causal adversaries , 2012, ISIT.
[5] D. Blackwell,et al. The Capacities of Certain Channel Classes Under Random Coding , 1960 .
[6] O. Antoine,et al. Theory of Error-correcting Codes , 2022 .
[7] Prakash Narayan,et al. Reliable Communication Under Channel Uncertainty , 1998, IEEE Trans. Inf. Theory.
[8] Michael Langberg,et al. Codes against online adversaries , 2008, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[9] Elwyn R. Berlekamp,et al. Algebraic coding theory , 1984, McGraw-Hill series in systems science.
[10] Feller William,et al. An Introduction To Probability Theory And Its Applications , 1950 .
[11] Imre Csiszár,et al. Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .
[12] Muriel Médard,et al. On Jamming in the Wideband Regime , 2006, 2006 IEEE International Symposium on Information Theory.
[13] Carles Padró,et al. Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors , 2008, EUROCRYPT.
[14] Anand D. Sarwate,et al. Coding against delayed adversaries , 2010, 2010 IEEE International Symposium on Information Theory.
[15] Michael Langberg,et al. Binary causal-adversary channels , 2009, 2009 IEEE International Symposium on Information Theory.
[16] Michael Alekhnovich. Linear diophantine equations over polynomials and soft decoding of Reed-Solomon codes , 2005, IEEE Transactions on Information Theory.
[17] Tracey Ho,et al. Correction of adversarial errors in networks , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[18] Kenneth W. Shum,et al. A low-complexity algorithm for the construction of algebraic-geometric codes better than the Gilbert-Varshamov bound , 2001, IEEE Trans. Inf. Theory.
[19] Michael Langberg,et al. Adversarial models and resilient schemes for network coding , 2008, 2008 IEEE International Symposium on Information Theory.
[20] Eli Upfal,et al. Probability and Computing: Randomized Algorithms and Probabilistic Analysis , 2005 .
[21] Anant Sahai,et al. The Necessity and Sufficiency of Anytime Capacity for Stabilization of a Linear System Over a Noisy Communication Link—Part I: Scalar Systems , 2006, IEEE Transactions on Information Theory.
[22] W. W. Peterson,et al. Encoding and error-correction procedures for the Bose-Chaudhuri codes , 1960, IRE Trans. Inf. Theory.
[23] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .