Acknowledgment for Support.
暂无分享,去创建一个
P. Vontobel | E. Biglieri | G. Taricco | R. Yeung | F. Kschischang | E. Telatar | H. Loeliger | T. Mittelholzer | J. Sayir | E. Abbe | N. Nefedov | B. Plattner | M. Wigger | S. Mangold | P. Chevillat | W. Hirt | U. Erez | E. Viterbo | G. Kramer | I. Kontoyiannis | B. Fleury | A. Wittneben | M. Hänggi | Stefan Moser | I. Sason | Rita Hildebrand | Silvia Tempel | M. Lerjen
[1] P. Ney. DEVIATIONS FOR RANDOM WALK ON R d , 2016 .
[2] Kong Bo,et al. The Depth Spectrum for (1 - u) -Constacyclic Codes over Fp + uFp + ...u(k-1) Fp , 2016 .
[3] Sebastian Fischer,et al. Exploring Artificial Intelligence In The New Millennium , 2016 .
[4] Yasushige Watase,et al. Introduction to Diophantine Approximation , 2015, Formaliz. Math..
[5] Jonathan Scarlett,et al. On the Dispersions of the Gel’fand–Pinsker Channel and Dirty Paper Coding , 2013, IEEE Transactions on Information Theory.
[6] Tsachy Weissman,et al. Compression for Quadratic Similarity Queries , 2013, IEEE Transactions on Information Theory.
[7] Tara Javidi,et al. Extrinsic Jensen–Shannon Divergence: Applications to Variable-Length Coding , 2013, IEEE Transactions on Information Theory.
[8] Shlomo Shamai,et al. Comparison of the Achievable Rates in OFDM and Single Carrier Modulation with I.I.D. Inputs , 2013, IEEE Transactions on Information Theory.
[9] Vincent Yan Fu Tan,et al. Nonasymptotic and Second-Order Achievability Bounds for Coding With Side-Information , 2013, IEEE Transactions on Information Theory.
[10] Uri Erez,et al. Precoded integer-forcing universally achieves the MIMO capacity to within a constant gap , 2013, 2013 IEEE Information Theory Workshop (ITW).
[11] S. Frick,et al. Compressed Sensing , 2014, Computer Vision, A Reference Guide.
[12] Farrokh Etezadi,et al. Zero-Delay Sequential Transmission of Markov Sources Over Burst Erasure Channels , 2014, IEEE Transactions on Information Theory.
[13] Troels Pedersen,et al. Analysis of Stochastic Radio Channels With Temporal Birth-Death Dynamics: A Marked Spatial Point Process Perspective , 2014, IEEE Transactions on Antennas and Propagation.
[14] Idoia Ochoa,et al. Compression Schemes for Similarity Queries , 2014, 2014 Data Compression Conference.
[15] Abbas El Gamal,et al. An efficient feedback coding scheme with low error probability for discrete memoryless channels , 2013, 2014 IEEE International Symposium on Information Theory.
[16] Christian Senger. Prefactor Reduction of the Guruswami–Sudan Interpolation Step , 2014, IEEE Transactions on Information Theory.
[17] Li Peng,et al. Expurgated Random-Coding Ensembles: Exponents, Refinements, and Connections , 2013, IEEE Transactions on Information Theory.
[18] Haim H. Permuter,et al. Capacity of a POST Channel With and Without Feedback , 2014, IEEE Transactions on Information Theory.
[19] Neri Merhav,et al. Analysis of Mismatched Estimation Errors Using Gradients of Partition Functions , 2013, IEEE Transactions on Information Theory.
[20] Albert Guillén i Fàbregas,et al. Mismatched Decoding: Error Exponents, Second-Order Rates and Saddlepoint Approximations , 2013, IEEE Transactions on Information Theory.
[21] Tobias Koch,et al. A Rate-Splitting Approach to Fading Channels With Imperfect Channel-State Information , 2013, IEEE Transactions on Information Theory.
[22] Amir Salman Avestimehr,et al. Capacity Results for Binary Fading Interference Channels With Delayed CSIT , 2013, IEEE Transactions on Information Theory.
[23] Syed Ali Jafar,et al. Topological Interference Management Through Index Coding , 2013, IEEE Transactions on Information Theory.
[24] Cong Ling,et al. Semantically Secure Lattice Codes for the Gaussian Wiretap Channel , 2012, IEEE Transactions on Information Theory.
[25] Haim H. Permuter,et al. Capacity and Coding for the Ising Channel With Feedback , 2012, IEEE Transactions on Information Theory.
[26] Tsachy Weissman,et al. Multiterminal Source Coding Under Logarithmic Loss , 2011, IEEE Transactions on Information Theory.
[27] Deniz Gündüz,et al. Identification and Lossy Reconstruction in Noisy Databases , 2014, IEEE Transactions on Information Theory.
[28] Martin Bossert,et al. Improved Decoding of Partial Unit Memory Codes Using List Decoding of Reed--Solomon Codes , 2014 .
[29] Tsachy Weissman,et al. The Minimal Compression Rate for Similarity Identification , 2013, ArXiv.
[30] Gernot Kubin,et al. Information Loss and Anti-Aliasing Filters in Multirate Systems , 2013, ArXiv.
[31] Matthieu R. Bloch,et al. Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.
[32] Zhong Zheng,et al. On the Ergodic Mutual Information of Multiple Cluster Scattering MIMO Channels , 2013, IEEE Communications Letters.
[33] Paul W. Cuff,et al. The likelihood encoder for source coding , 2013, 2013 IEEE Information Theory Workshop (ITW).
[34] Gernot Akemann,et al. Products of rectangular random matrices: singular values and progressive scattering. , 2013, Physical review. E, Statistical, nonlinear, and soft matter physics.
[35] Youlong Wu,et al. Any positive feedback rate increases the capacity of strictly less-noisy broadcast channels , 2013, 2013 IEEE Information Theory Workshop (ITW).
[36] Cong Ling,et al. Achieving the AWGN channel capacity with lattice Gaussian coding , 2013, 2013 IEEE International Symposium on Information Theory.
[37] Maxim Raginsky,et al. Logarithmic Sobolev inequalities and strong data processing theorems for discrete channels , 2013, 2013 IEEE International Symposium on Information Theory.
[38] Frans M. J. Willems,et al. Fundamental limits of identification: Identification rate, search and memory complexity trade-off , 2013, 2013 IEEE International Symposium on Information Theory.
[39] Tsachy Weissman,et al. Compression for exact match identification , 2013, 2013 IEEE International Symposium on Information Theory.
[40] Shlomo Shamai,et al. On the Synergistic Benefits of Alternating CSIT for the MISO Broadcast Channel , 2013, IEEE Transactions on Information Theory.
[41] Frédérique E. Oggier,et al. Coding Techniques for Repairability in Networked Distributed Storage Systems , 2013, Found. Trends Commun. Inf. Theory.
[42] Amanda de Paula,et al. Comparison of OFDM and SC-DFE Capacities Without Channel Knowledge at the Transmitter , 2013, ArXiv.
[43] Vincent Yan Fu Tan,et al. ε-Capacities and Second-Order Coding Rates for Channels with General State , 2013, ArXiv.
[44] Yi Hong,et al. Practical Secrecy using Artificial Noise , 2013, IEEE Communications Letters.
[45] Ayfer Özgür,et al. Improved capacity approximations for Gaussian relay networks , 2013, 2013 IEEE Information Theory Workshop (ITW).
[46] Venkat Anantharam,et al. On Maximal Correlation, Hypercontractivity, and the Data Processing Inequality studied by Erkip and Cover , 2013, ArXiv.
[47] Gernot Kubin,et al. On the Rate of Information Loss in Memoryless Systems , 2013, ArXiv.
[48] Lu Wei,et al. Singular value correlation functions for products of Wishart random matrices , 2013, ArXiv.
[49] Tsachy Weissman,et al. Quadratic Similarity Queries on Compressed Data , 2013, 2013 Data Compression Conference.
[50] Fredrik Rusek,et al. Faster-Than-Nyquist Signaling , 2013, Proceedings of the IEEE.
[51] Andreas Schenk,et al. Noncoherent Detection in Massive MIMO Systems , 2013, WSA.
[52] Amin Gohari,et al. A technique for deriving one-shot achievability results in network information theory , 2013, 2013 IEEE International Symposium on Information Theory.
[53] Raef Bassily,et al. Deaf Cooperation and Relay Selection Strategies for Secure Communication in Multiple Relay Networks , 2013, IEEE Transactions on Signal Processing.
[54] Hua Sun,et al. Topological interference management with alternating connectivity , 2013, 2013 IEEE International Symposium on Information Theory.
[55] Jungwon Lee,et al. On the construction and decoding of concatenated polar codes , 2013, 2013 IEEE International Symposium on Information Theory.
[56] Henk D. L. Hollmann. Storage codes — Coding rate and repair locality , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).
[57] Neri Merhav. Universal Decoding for Arbitrary Channels Relative to a Given Class of Decoding Metrics , 2013, IEEE Transactions on Information Theory.
[58] Shuai Zhang,et al. Controlling the Error Floor in LDPC Decoding , 2012, IEEE Transactions on Communications.
[59] Paul W. Cuff,et al. Distributed Channel Synthesis , 2012, IEEE Transactions on Information Theory.
[60] Akbar M. Sayeed,et al. Delay-Doppler channel estimation with almost linear complexity: To Solomon Golomb for the occasion of his 80 birthday mazel tov , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.
[61] Andreas Schenk,et al. Reduced complexity super-trellis decoding for convolutionally encoded transmission over ISI-channels , 2012, 2013 International Conference on Computing, Networking and Communications (ICNC).
[62] Erik G. Larsson,et al. Scaling Up MIMO: Opportunities and Challenges with Very Large Arrays , 2012, IEEE Signal Process. Mag..
[63] Roope Vehkalahti,et al. Inverse Determinant Sums and Connections Between Fading Channel Information Theory and Algebra , 2011, IEEE Transactions on Information Theory.
[64] Frédérique E. Oggier,et al. An Error Probability Approach to MIMO Wiretap Channels , 2011, IEEE Transactions on Communications.
[65] Sennur Ulukus,et al. Multi-Receiver Wiretap Channel With Public and Confidential Messages , 2013, IEEE Transactions on Information Theory.
[66] Soung Chang Liew,et al. Physical-layer network coding: Tutorial, survey, and beyond , 2011, Phys. Commun..
[67] Ramji Venkataramanan,et al. An Achievable Rate Region for the Broadcast Channel With Feedback , 2013, IEEE Transactions on Information Theory.
[68] Michele A. Wigger,et al. On the Capacity of the Discrete Memoryless Broadcast Channel With Feedback , 2010, IEEE Transactions on Information Theory.
[69] Xiugang Wu,et al. On the Optimal Compressions in the Compress-and-Forward Relay Schemes , 2010, IEEE Transactions on Information Theory.
[70] Frank R. Kschischang,et al. An Algebraic Approach to Physical-Layer Network Coding , 2010, IEEE Transactions on Information Theory.
[71] Carles Padró,et al. Information Theoretic Security , 2013, Lecture Notes in Computer Science.
[72] Idoia Ochoa,et al. Efficient similarity queries via lossy compression , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[73] Xudong Wang,et al. Cross-layer Scheduling in Multi-user System with Delay and Secrecy Constraints , 2012, ArXiv.
[74] Christina Fragouli,et al. Optimizing Quantize-Map-and-Forward relaying for Gaussian diamond networks , 2012, 2012 IEEE Information Theory Workshop.
[75] Alexander Vardy,et al. Semantic Security for the Wiretap Channel , 2012, CRYPTO.
[76] Andreas Schenk,et al. Matched Decoding for Punctured Convolutional Encoded Transmission Over ISI-Channels , 2012, ArXiv.
[77] Ayfer Özgür,et al. Achieving the capacity of the N-relay Gaussian diamond network within logn bits , 2012, 2012 IEEE Information Theory Workshop.
[78] Vincent C. Gaudet,et al. Switching Activity Minimization in Iterative LDPC Decoders , 2012, J. Signal Process. Syst..
[79] A. Lee Swindlehurst,et al. Outage performance for amplify-and-forward channels with an unauthenticated relay , 2012, 2012 IEEE International Conference on Communications (ICC).
[80] Shlomo Shamai,et al. Retrospective Interference Alignment Over Interference Networks , 2012, IEEE Journal of Selected Topics in Signal Processing.
[81] Gernot Kubin,et al. Signal Enhancement as Minimization of Relevant Information Loss , 2012, ArXiv.
[82] Tsachy Weissman,et al. The porosity of additive noise sequences , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.
[83] Abbas El Gamal,et al. Three-Receiver Broadcast Channels With Common and Confidential Messages , 2012, IEEE Transactions on Information Theory.
[84] Thomas A. Courtade. Information masking and amplification: The source coding setting , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.
[85] Farrokh Etezadi,et al. Prospicient Real-Time Coding of Markov Sources over Burst Erasure Channels: Lossless Case , 2012, 2012 Data Compression Conference.
[86] Gernot Kubin,et al. Relative information loss in the PCA , 2012, 2012 IEEE Information Theory Workshop.
[87] Xinbing Wang,et al. Impact of secrecy on capacity in large-scale wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.
[88] Meir Feder,et al. Communication over Individual Channels -- a general framework , 2012, ArXiv.
[89] Syed Ali Jafar,et al. Optimal Use of Current and Outdated Channel State Information: Degrees of Freedom of the MISO BC with Mixed CSIT , 2012, IEEE Communications Letters.
[90] David Gesbert,et al. Degrees of Freedom of Time Correlated MISO Broadcast Channel With Delayed CSIT , 2012, IEEE Transactions on Information Theory.
[91] Moe Z. Win,et al. Secure Communication in Stochastic Wireless Networks—Part II: Maximum Rate and Collusion , 2012, IEEE Transactions on Information Forensics and Security.
[92] Patrick Solé,et al. Cyclic codes over $M_2(\F_2)$ , 2012, ArXiv.
[93] Vincent Y. F. Tan,et al. On the dispersions of three network information theory problems , 2012, 2012 46th Annual Conference on Information Sciences and Systems (CISS).
[94] Joakim Jaldén,et al. Sphere Decoding Complexity Exponent for Decoding Full-Rate Codes Over the Quasi-Static MIMO Channel , 2011, IEEE Transactions on Information Theory.
[95] Alexandros G. Dimakis,et al. LDPC Codes for Compressed Sensing , 2010, IEEE Transactions on Information Theory.
[96] Daniela Tuninetti,et al. Inner and Outer Bounds for the Gaussian Cognitive Interference Channel and New Capacity Results , 2010, IEEE Transactions on Information Theory.
[97] Mohammad Ali Maddah-Ali,et al. Completely Stale Transmitter Channel State Information is Still Very Useful , 2010, IEEE Transactions on Information Theory.
[98] Massimo Franceschetti,et al. LQG Control Approach to Gaussian Broadcast Channels With Feedback , 2010, IEEE Transactions on Information Theory.
[99] Onur Ozan Koyluoglu,et al. On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Transactions on Information Theory.
[100] Sanjeev Arora,et al. Message-Passing Algorithms and Improved LP Decoding , 2009, IEEE Transactions on Information Theory.
[101] Mokshay M. Madiman,et al. Entropy and set cardinality inequalities for partition‐determined functions , 2008, Random Struct. Algorithms.
[102] Farrokh Etezadi,et al. Real-Time Coding of Markov Sources over Erasure Channels , 2012 .
[103] Jean-Claude Belfiore. Lattice codes for the compute-and-forward protocol: The flatness factor , 2011, 2011 IEEE Information Theory Workshop.
[104] Aydin Sezgin,et al. Secrecy in broadcast channels with receiver side information , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[105] Andreas Schenk,et al. Design rules for bit-interleaved coded impulse-radio ultra-wideband modulation with autocorrelation-based detection , 2011, 2011 8th International Symposium on Wireless Communication Systems.
[106] Michael Gastpar,et al. New achievable rates for the Gaussian broadcast channel with feedback , 2011, 2011 8th International Symposium on Wireless Communication Systems.
[107] Frank R. Kschischang,et al. A Simplified Successive-Cancellation Decoder for Polar Codes , 2011, IEEE Communications Letters.
[108] Ranjan K. Mallik,et al. Distribution of Inner Product of Complex Gaussian Random Vectors and its Applications , 2011, IEEE Transactions on Communications.
[109] Stark C. Draper,et al. On reliability of content identification from databases based on noisy queries , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[110] Eli Haim,et al. Improving the MAC error exponent using distributed structure , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[111] Alexandros G. Dimakis,et al. Explicit matrices for sparse approximation , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[112] Alexander Vardy,et al. List decoding of polar codes , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[113] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[114] Aaron B. Wagner,et al. Refinement of the sphere packing bound for symmetric channels , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[115] Gernot Kubin,et al. On the Information Loss in Memoryless Systems: The Multivariate Case , 2011, ArXiv.
[116] Urs Niesen,et al. Computation Alignment: Capacity Approximation Without Noise Accumulation , 2011, IEEE Transactions on Information Theory.
[117] G. Lauer. Some optimal partial-unit-memory codes , 2011 .
[118] Imre Csiszár,et al. Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .
[119] Zhen Zhang,et al. Rate Distortion Theory for Causal Video Coding: Characterization, Computation Algorithm, and Comparison , 2011, IEEE Transactions on Information Theory.
[120] Daniela Tuninetti,et al. New Inner and Outer Bounds for the Memoryless Cognitive Interference Channel and Some New Capacity Results , 2011, IEEE Transactions on Information Theory.
[121] Gernot Kubin,et al. Some results on the information loss in dynamical systems , 2011, 2011 8th International Symposium on Wireless Communication Systems.
[122] C. M. Folkman,et al. Sketched oxide single-electron transistor. , 2011, Nature nanotechnology.
[123] Vahid Tarokh,et al. Spectral Distribution of Random Matrices From Binary Linear Block Codes , 2011, IEEE Transactions on Information Theory.
[124] Matthieu R. Bloch,et al. Wireless Secrecy Regions With Friendly Jamming , 2011, IEEE Transactions on Information Forensics and Security.
[125] Brendan D. McKay,et al. Subgraphs of random graphs with specified degrees , 2011 .
[126] Ram Zamir,et al. A lower bound on the average entropy of a function determined up to a diagonal linear map on F_q^n , 2011, ArXiv.
[127] Kin K. Leung,et al. Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting , 2011, IEEE Transactions on Wireless Communications.
[128] Emmanuel Abbe,et al. Randomness and dependencies extraction via polarization , 2011, 2011 Information Theory and Applications Workshop.
[129] Mikael Skoglund,et al. Outage performances for amplify-and-forward, decode-and-forward and cooperative jamming strategies for the wiretap channel , 2011, 2011 IEEE Wireless Communications and Networking Conference.
[130] Gerhard Kramer,et al. Short-message quantize-forward network coding , 2011, 2011 8th International Workshop on Multi-Carrier Systems & Solutions.
[131] Gernot Kubin,et al. Information loss in static nonlinearities , 2011, 2011 8th International Symposium on Wireless Communication Systems.
[132] Masahito Hayashi,et al. Secure Multiplex Network Coding , 2011, 2011 International Symposium on Networking Coding.
[133] Johannes B. Huber,et al. Reduced-complexity collaborative decoding of interleaved Reed-Solomon and Gabidulin codes , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[134] Anne-Marie Kermarrec,et al. Repairing Multiple Failures with Coordinated and Adaptive Regenerating Codes , 2011, 2011 International Symposium on Networking Coding.
[135] Kenneth W. Shum. Cooperative Regenerating Codes for Distributed Storage Systems , 2011, 2011 IEEE International Conference on Communications (ICC).
[136] Michael Gastpar,et al. Reliable Physical Layer Network Coding , 2011, Proceedings of the IEEE.
[137] Masahito Hayashi,et al. Secure multiplex coding with a common message , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[138] Heide Gluesing-Luerssen,et al. Characteristic Generators and Dualization for Tail-Biting Trellises , 2011, IEEE Transactions on Information Theory.
[139] Andreas Schenk,et al. Decision-Feedback Differential Detection in Impulse-Radio Ultra-Wideband Systems , 2011, IEEE Transactions on Communications.
[140] Urs Niesen,et al. The Degrees of Freedom of Compute-and-Forward , 2011, IEEE Transactions on Information Theory.
[141] Haim H. Permuter,et al. To feed or not to feed back , 2010, 2011 IEEE International Symposium on Information Theory Proceedings.
[142] Mikael Skoglund,et al. Rate-equivocation optimal spatially coupled LDPC codes for the BEC wiretap channel , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[143] Krishna R. Narayanan,et al. Multilevel coding schemes for compute-and-forward , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[144] Andrew Thangaraj,et al. Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes , 2010, IEEE Transactions on Information Forensics and Security.
[145] Frédérique Oggier,et al. Self-repairing homomorphic codes for distributed storage systems , 2010, 2011 Proceedings IEEE INFOCOM.
[146] Daniela Tuninetti,et al. Interference Channel With Generalized Feedback (a.k.a. With Source Cooperation): Part I: Achievable Region , 2010, IEEE Transactions on Information Theory.
[147] Alexander Vardy,et al. The Re-Encoding Transformation in Algebraic List-Decoding of Reed–Solomon Codes , 2011, IEEE Transactions on Information Theory.
[148] David Tse,et al. Interference mitigation through limited transmitter cooperation , 2010, 2010 IEEE International Symposium on Information Theory.
[149] Neri Merhav. Rate–Distortion Function via Minimum Mean Square Error Estimation , 2011, IEEE Transactions on Information Theory.
[150] Shlomo Shamai,et al. Estimation in Gaussian Noise: Properties of the Minimum Mean-Square Error , 2010, IEEE Transactions on Information Theory.
[151] Heide Gluesing-Luerssen,et al. Linear Tail-Biting Trellises: Characteristic Generators and the BCJR-Construction , 2010, IEEE Transactions on Information Theory.
[152] Sae-Young Chung,et al. Noisy Network Coding , 2010, IEEE Transactions on Information Theory.
[153] Alexander Vardy,et al. Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes , 2010, IEEE Transactions on Information Theory.
[154] Byung-Jae Kwak,et al. LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.
[155] Neri Merhav. Optimum Estimation via Gradients of Partition Functions and Information Measures: A Statistical-Mechanical Perspective , 2011, IEEE Transactions on Information Theory.
[156] David Tse,et al. Interference Mitigation Through Limited Receiver Cooperation , 2009, IEEE Transactions on Information Theory.
[157] Meir Feder,et al. Optimal Feedback Communication Via Posterior Matching , 2009, IEEE Transactions on Information Theory.
[158] Michael Gastpar,et al. Compute-and-Forward: Harnessing Interference Through Structured Codes , 2009, IEEE Transactions on Information Theory.
[159] Suhas N. Diggavi,et al. Wireless Network Information Flow: A Deterministic Approach , 2009, IEEE Transactions on Information Theory.
[160] Nicolas Macris,et al. Decay of Correlations for Sparse Graph Error Correcting Codes , 2011, SIAM J. Discret. Math..
[161] Sergey Loyka,et al. From Multi-Keyholes to Measure of Correlation and Power Imbalance in MIMO Channels: Outage Capacity Analysis , 2008, IEEE Transactions on Information Theory.
[162] Uri Erez,et al. Lattice Strategies for the Dirty Multiple Access Channel , 2007, IEEE Transactions on Information Theory.
[163] Prakash Ishwar,et al. On Delayed Sequential Coding of Correlated Sources , 2011, IEEE Transactions on Information Theory.
[164] Jean-Claude Belfiore,et al. Diversity-Multiplexing Tradeoff of Double Scattering MIMO Channels , 2006, IEEE Transactions on Information Theory.
[165] Amanda de Paula,et al. A comparison between OFDM and single-carrier with cyclic prefix using channel coding and frequency-selective block fading channels , 2011 .
[166] Tsachy Weissman,et al. Pointwise Relations between Information and Estimation , 2011, ArXiv.
[167] Ram Zamir. Can Structure Beat Random ?-The Story of Lattice Codes , 2011 .
[168] M. R. Leadbetter. Poisson Processes , 2011, International Encyclopedia of Statistical Science.
[169] Sergey Loyka,et al. On Outage Probability and Diversity-Multiplexing Tradeoff in MIMO Relay Channels , 2011, IEEE Transactions on Communications.
[170] Haim H. Permuter,et al. Extension of the Blahut-Arimoto algorithm for maximizing directed information , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[171] Shlomo Shamai,et al. On the dirty paper channel with fading dirt , 2010, 2010 IEEE 26-th Convention of Electrical and Electronics Engineers in Israel.
[172] Meir Feder,et al. Universal Communication over Modulo-additive Channels with an Individual Noise Sequence , 2010, ArXiv.
[173] Neri Merhav,et al. Statistical Physics and Information Theory , 2010, Found. Trends Commun. Inf. Theory.
[174] Yvo Desmedt,et al. General Perfectly Secure Message Transmission Using Linear Codes , 2010, ASIACRYPT.
[175] Frans M. J. Willems,et al. Fundamental limits for biometric identification with a database containing protected templates , 2010, 2010 International Symposium On Information Theory & Its Applications.
[176] Frans M. J. Willems,et al. Identification and secret-key binding in binary-symmetric template-protected biometric systems , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[177] Bernd Girod,et al. Forward Error Protection for low-delay packet video , 2010, 2010 18th International Packet Video Workshop.
[178] Yasutada Oohama. Gaussian Zig-Zag Source Coding Problem , 2010, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[179] Thomas L. Marzetta,et al. Noncooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas , 2010, IEEE Transactions on Wireless Communications.
[180] Johannes B. Huber,et al. Improving successive cancellation decoding of polar codes by usage of inner block codes , 2010, 2010 6th International Symposium on Turbo Codes & Iterative Information Processing.
[181] Masahito Hayashi,et al. Strong security and separated code constructions for the broadcast channels with confidential messages , 2010, ArXiv.
[182] Nan Liu,et al. Wiretap channel with shared key , 2010, 2010 IEEE Information Theory Workshop.
[183] Frans M. J. Willems,et al. Identification and secret-key generation in biometric systems with protected templates , 2010, MM&Sec '10.
[184] Tsachy Weissman,et al. The Relationship Between Causal and Noncausal Mismatched Estimation in Continuous-Time AWGN Channels , 2010, IEEE Transactions on Information Theory.
[185] Paul W. Cuff. Using a secret key to foil an eavesdropper , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[186] Paul W. Cuff. A Framework for Partial Secrecy , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[187] Toshiyuki Tanaka,et al. Non-binary polar codes using Reed-Solomon codes and algebraic geometry codes , 2010, 2010 IEEE Information Theory Workshop.
[188] Mikael Skoglund,et al. Nested Polar Codes for Wiretap and Relay Channels , 2010, IEEE Communications Letters.
[189] Aaron B. Wagner,et al. Moderate deviation analysis of channel coding: Discrete memoryless case , 2010, 2010 IEEE International Symposium on Information Theory.
[190] Emre Telatar,et al. Polar codes for q-ary source coding , 2010, 2010 IEEE International Symposium on Information Theory.
[191] Mokshay M. Madiman,et al. The entropies of the sum and the difference of two IID random variables are not too different , 2010, 2010 IEEE International Symposium on Information Theory.
[192] Christian Senger,et al. A link between Guruswami-Sudan's list-decoding and decoding of interleaved Reed-Solomon codes , 2010, 2010 IEEE International Symposium on Information Theory.
[193] A. Robert Calderbank,et al. Why Gabor frames? Two fundamental measures of coherence and their role in model selection , 2010, Journal of Communications and Networks.
[194] Andreas Schenk,et al. Soft-output sphere decoder for multiple-symbol differential detection of impulse-radio ultra-wideband , 2010, 2010 IEEE International Symposium on Information Theory.
[195] Suhas N. Diggavi,et al. Approximately achieving Gaussian relay network capacity with lattice codes , 2010, 2010 IEEE International Symposium on Information Theory.
[196] H. Vincent Poor,et al. Channel Coding Rate in the Finite Blocklength Regime , 2010, IEEE Transactions on Information Theory.
[197] Marco Baldi,et al. Non-systematic codes for physical layer security , 2010, 2010 IEEE Information Theory Workshop.
[198] P. Vary,et al. Semi-analytical solution for rate distortion function and OPTA for sources with arbitrary distribution , 2010, 2010 International ITG Conference on Source and Channel Coding (SCC).
[199] Martin Bossert,et al. On the equivalence of Sudan-decoding and decoding via virtual extension to an interleaved Reed-Solomon code , 2010, 2010 International ITG Conference on Source and Channel Coding (SCC).
[200] Jose C. Principe,et al. Information Theoretic Learning - Renyi's Entropy and Kernel Perspectives , 2010, Information Theoretic Learning.
[201] Michael Gastpar,et al. Integer-forcing linear receivers , 2010, 2010 IEEE International Symposium on Information Theory.
[202] Gregory W. Wornell,et al. Causal Transmission of Colored Source Frames over a Packet Erasure Channel , 2010, 2010 Data Compression Conference.
[203] Wei Yu,et al. On the symmetric capacity of the K-user symmetric cyclic Gaussian interference channel , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).
[204] Helmut Bölcskei,et al. Performance and Complexity Analysis of Infinity-Norm Sphere-Decoding , 2010, IEEE Transactions on Information Theory.
[205] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[206] Emre Telatar,et al. Polar Codes for the m-User MAC , 2010 .
[207] Wei Yu,et al. Design of irregular LDPC codes with optimized performance-complexity tradeoff , 2010, IEEE Transactions on Communications.
[208] Michael Huber. Combinatorial bounds and characterizations of splitting authentication codes , 2010, Cryptography and Communications.
[209] Abbas El Gamal,et al. Lecture Notes on Network Information Theory , 2010, ArXiv.
[210] Erdal Arikan,et al. Source polarization , 2010, 2010 IEEE International Symposium on Information Theory.
[211] Mayank Bakshi,et al. Concatenated Polar codes , 2010, 2010 IEEE International Symposium on Information Theory.
[212] A. Robert Calderbank,et al. Construction of a Large Class of Deterministic Sensing Matrices That Satisfy a Statistical Isometry Property , 2009, IEEE Journal of Selected Topics in Signal Processing.
[213] Haim H. Permuter,et al. Coordination Capacity , 2009, IEEE Transactions on Information Theory.
[214] Jian-Kang Zhang,et al. Novel Rotated Quasi-Orthogonal Space-Time Block Codes With the Fixed Nearest Neighbor Number , 2009, IEEE Signal Processing Letters.
[215] Sergio Verdú,et al. Mismatched Estimation and Relative Entropy , 2009, IEEE Transactions on Information Theory.
[216] Terence Tao,et al. Sumset and Inverse Sumset Theory for Shannon Entropy , 2009, Combinatorics, Probability and Computing.
[217] Rüdiger L. Urbanke,et al. Polar Codes are Optimal for Lossy Source Coding , 2009, IEEE Transactions on Information Theory.
[218] Shlomo Shamai,et al. Statistical Physics of Signal Estimation in Gaussian Noise: Theory and Examples of Phase Transitions , 2008, IEEE Transactions on Information Theory.
[219] Alexander Sprintson,et al. Joint Physical Layer Coding and Network Coding for Bidirectional Relaying , 2008, IEEE Transactions on Information Theory.
[220] Ezio Biglieri,et al. Low-Density Parity-Check Codes for Nonergodic Block-Fading Channels , 2007, IEEE Transactions on Information Theory.
[221] Martin Bossert,et al. Syndrome Decoding of Reed–Solomon Codes Beyond Half the Minimum Distance Based on Shift-Register Synthesis , 2010, IEEE Transactions on Information Theory.
[222] Young-Han Kim,et al. Feedback Capacity of Stationary Gaussian Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[223] T. Ho,et al. On Linear Network Coding , 2010 .
[224] Nevio Benvenuto,et al. Single Carrier Modulation With Nonlinear Frequency Domain Equalization: An Idea Whose Time Has Come—Again , 2010, Proceedings of the IEEE.
[225] Alexandros G. Dimakis,et al. Channel Coding LP Decoding and Compressed Sensing LP Decoding: Further Connections ∗ , 2010 .
[226] Frans M. J. Willems,et al. Biometric Systems: Privacy and Secrecy Aspects , 2009, IEEE Transactions on Information Forensics and Security.
[227] Alexandros G. Dimakis,et al. LP decoding meets LP decoding: A connection between channel coding and compressed sensing , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[228] A. Robert Calderbank,et al. Efficient and Robust Compressed Sensing Using Optimized Expander Graphs , 2009, IEEE Transactions on Information Theory.
[229] Emre Telatar,et al. Polarization for arbitrary discrete memoryless channels , 2009, 2009 IEEE Information Theory Workshop.
[230] J. Romme,et al. Noncoherent ultra-wideband systems , 2009, IEEE Signal Processing Magazine.
[231] Frans M. J. Willems,et al. Searching methods for biometric identification systems: Fundamental limits , 2009, 2009 IEEE International Symposium on Information Theory.
[232] Todd P. Coleman,et al. A stochastic control viewpoint on ‘Posterior Matching’-style feedback communication schemes , 2009, 2009 IEEE International Symposium on Information Theory.
[233] Leandros Tassiulas,et al. Broadcast erasure channel with feedback - Capacity and algorithms , 2009, 2009 Workshop on Network Coding, Theory, and Applications.
[234] Moe Z. Win,et al. Wireless physical-layer security: The case of colluding eavesdroppers , 2009, 2009 IEEE International Symposium on Information Theory.
[235] Ram Zamir,et al. On the Loss of Single-Letter Characterization: The Dirty Multiple Access Channel , 2009, IEEE Transactions on Information Theory.
[236] Johannes B. Huber,et al. LDPC codes and convolutional codes with equal structural delay: a comparison , 2009, IEEE Transactions on Communications.
[237] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[238] J. Boutros. Diversity and coding gain evolution in graph codes , 2009, 2009 Information Theory and Applications Workshop.
[239] Norman C. Beaulieu,et al. On the ergodic capacity of multi-hop wireless relaying systems , 2009, IEEE Transactions on Wireless Communications.
[240] Shlomo Shamai,et al. Compound Wiretap Channels , 2009, EURASIP J. Wirel. Commun. Netw..
[241] Sae-Young Chung,et al. Capacity of the Gaussian Two-way Relay Channel to within 1/2 Bit , 2009, ArXiv.
[242] Lutz H.-J. Lampe,et al. Decision-Feedback Subset Multiple-Symbol Differential Detection for Unitary Space-Time Modulation , 2009, IEEE Transactions on Vehicular Technology.
[243] Rüdiger L. Urbanke,et al. Polar Codes for Channel and Source Coding , 2009, ArXiv.
[244] Rüdiger L. Urbanke,et al. Polar codes: Characterization of exponent, bounds, and constructions , 2009, 2009 IEEE International Symposium on Information Theory.
[245] Imre Z. Ruzsa. Sumsets and entropy , 2009, Random Struct. Algorithms.
[246] Erdal Arikan,et al. Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.
[247] Emre Telatar,et al. On the rate of channel polarization , 2008, 2009 IEEE International Symposium on Information Theory.
[248] Olgica Milenkovic,et al. Subspace Pursuit for Compressive Sensing Signal Reconstruction , 2008, IEEE Transactions on Information Theory.
[249] Masahito Hayashi,et al. Information Spectrum Approach to Second-Order Coding Rate in Channel Coding , 2008, IEEE Transactions on Information Theory.
[250] Igal Sason,et al. Bounds on the Number of Iterations for Turbo-Like Ensembles Over the Binary Erasure Channel , 2007, IEEE Transactions on Information Theory.
[251] Igal Sason,et al. On Universal Properties of Capacity-Approaching LDPC Code Ensembles , 2007, IEEE Transactions on Information Theory.
[252] S. Sandeep Pradhan,et al. Lattices for Distributed Source Coding: Jointly Gaussian Sources and Reconstruction of a Linear Function , 2007, IEEE Transactions on Information Theory.
[253] Sekhar Tatikonda,et al. The Capacity of Channels With Feedback , 2006, IEEE Transactions on Information Theory.
[254] Ertem Tuncel. Capacity/Storage Tradeoff in High-Dimensional Identification Systems , 2006, IEEE Transactions on Information Theory.
[255] Dimitri P. Bertsekas,et al. Neuro-Dynamic Programming , 2009, Encyclopedia of Optimization.
[256] Michael I. Jordan,et al. Graphical Models, Exponential Families, and Variational Inference , 2008, Found. Trends Mach. Learn..
[257] M. Loncar,et al. On the asymptotic performance of low-complexity decoded LDPC codes with constituent hamming codes , 2008, 2008 5th International Symposium on Turbo Codes and Related Topics.
[258] G. Ferrari,et al. On information theoretic aspects of single- and multi-carrier communications , 2008, 2008 Information Theory and Applications Workshop.
[259] A. Dasgupta. Asymptotic Theory of Statistics and Probability , 2008 .
[260] Shamgar Gurevich,et al. The Finite Harmonic Oscillator and Its Applications to Sequences, Communication, and Radar , 2008, IEEE Transactions on Information Theory.
[261] Mehul Motani,et al. On The Han–Kobayashi Region for theInterference Channel , 2008, IEEE Transactions on Information Theory.
[262] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[263] Vahid Tarokh,et al. A Frame Construction and a Universal Distortion Bound for Sparse Representations , 2008, IEEE Transactions on Signal Processing.
[264] Vincenzo Lottici,et al. Multiple symbol differential detection for UWB communications , 2008, IEEE Transactions on Wireless Communications.
[265] Piotr Indyk,et al. Combining geometry and combinatorics: A unified approach to sparse signal recovery , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[266] Ram Zamir,et al. Entropy Amplification Property and the Loss for Writing on Dirty Paper , 2008, IEEE Transactions on Information Theory.
[267] A. Lapidoth,et al. On the entropy of the sum and of the difference of independent random variables , 2008, 2008 IEEE 25th Convention of Electrical and Electronics Engineers in Israel.
[268] Helmut Bölcskei,et al. Soft-output sphere decoding: algorithms and VLSI implementation , 2008, IEEE Journal on Selected Areas in Communications.
[269] D. Stoyan,et al. Statistical Analysis and Modelling of Spatial Point Patterns , 2008 .
[270] Neri Merhav,et al. Error Exponents of Erasure/List Decoding Revisited Via Moments of Distance Enumerators , 2007, IEEE Transactions on Information Theory.
[271] Yi Jiang,et al. The generalized triangular decomposition , 2007, Math. Comput..
[272] Suhas N. Diggavi,et al. Side-Information Scalable Source Coding , 2007, IEEE Transactions on Information Theory.
[273] Frank R. Kschischang,et al. Coding for Errors and Erasures in Random Network Coding , 2007, IEEE Transactions on Information Theory.
[274] Roy D. Yates,et al. Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.
[275] Hua Wang,et al. Gaussian Interference Channel Capacity to Within One Bit , 2007, IEEE Transactions on Information Theory.
[276] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[277] Haim H. Permuter,et al. Capacity of the Trapdoor Channel With Feedback , 2006, IEEE Transactions on Information Theory.
[278] Igal Sason,et al. An Improved Sphere-Packing Bound for Finite-Length Codes Over Symmetric Memoryless Channels , 2006, IEEE Transactions on Information Theory.
[279] Pramod Viswanath,et al. Rate Region of the Quadratic Gaussian Two-Encoder Source-Coding Problem , 2005, IEEE Transactions on Information Theory.
[280] Joseph A. O'Sullivan,et al. Achievable Rates for Pattern Recognition , 2005, IEEE Transactions on Information Theory.
[281] Strong Secrecy for Wireless Channels , 2008 .
[282] Sergey Loyka,et al. Finite-SNR Diversity-Multiplexing Tradeoff via Asymptotic Analysis of Large MIMO Systems , 2010, IEEE Transactions on Information Theory.
[283] Christina Fragouli,et al. On Capacity of Line Networks , 2007, IEEE Transactions on Information Theory.
[284] G.J.M. Janssen,et al. Performance Analysis of UWB Autocorrelation Receivers Over Nakagami-Fading Channels , 2007, IEEE Journal of Selected Topics in Signal Processing.
[285] Lizhong Zheng,et al. Amplify-and-Forward in Wireless Relay Networks: Rate, Diversity, and Network Size , 2007, IEEE Transactions on Information Theory.
[286] C. Schlegel,et al. LDPC Decoder Message Formatting Based on Activity Factor Minimization Using Differential Density Evolution , 2007, 2007 IEEE Information Theory Workshop.
[287] S. Shamai,et al. Capacity for Classes of Broadcast Channels with Receiver Side Information , 2007, 2007 IEEE Information Theory Workshop.
[288] Weiyu Xu,et al. Efficient Compressive Sensing with Deterministic Guarantees Using Expander Graphs , 2007, 2007 IEEE Information Theory Workshop.
[289] David Tse,et al. Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.
[290] Joel A. Tropp,et al. Signal Recovery From Random Measurements Via Orthogonal Matching Pursuit , 2007, IEEE Transactions on Information Theory.
[291] Ronald A. DeVore,et al. Deterministic constructions of compressed sensing matrices , 2007, J. Complex..
[292] Minghua Chen,et al. Pyramid Codes: Flexible Schemes to Trade Space for Access Efficiency in Reliable Data Storage Systems , 2007, Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007).
[293] Amin Shokrollahi,et al. Raptor codes , 2011, IEEE Transactions on Information Theory.
[294] Andrea Montanari,et al. Asymptotic Rate versus Design Rate , 2007, 2007 IEEE International Symposium on Information Theory.
[295] Yasutada Oohama,et al. Capacity Theorems for Relay Channels with Confidential Messages , 2007, 2007 IEEE International Symposium on Information Theory.
[296] Yi Jiang,et al. Diversity-Multiplexing Tradeoff of MIMO Systems with Antenna Selection , 2007, 2007 IEEE International Symposium on Information Theory.
[297] Larry J. Greenstein,et al. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.
[298] P. Vijay Kumar,et al. Approximately-Universal Space-Time Codes for the Parallel, Multi-Block and Cooperative-Dynamic-Decode-and-Forward Channels , 2007, ArXiv.
[299] Riccardo Zecchina,et al. Encoding for the Blackwell Channel with Reinforced Belief Propagation , 2007, 2007 IEEE International Symposium on Information Theory.
[300] John S. Thompson,et al. MIMO Configurations for Relay Channels: Theory and Practice , 2007, IEEE Transactions on Wireless Communications.
[301] Soung Chang Liew,et al. > Replace This Line with Your Paper Identification Number (double-click Here to Edit) < 1 , 2022 .
[302] Yejun He,et al. Performance Evaluation of Adaptive Two-Dimensional Turbo Product Codes Composed of Hamming Codes , 2007, 2007 IEEE International Conference on Integration Technology.
[303] Serap A. Savari,et al. Communicating Probability Distributions , 2007, IEEE Transactions on Information Theory.
[304] Igal Sason,et al. Parity-Check Density Versus Performance of Binary Linear Block Codes: New Bounds and Applications , 2007, IEEE Transactions on Information Theory.
[305] Y.-H. Kim,et al. A Coding Theorem for a Class of Stationary Channels with Feedback , 2007, 2007 IEEE International Symposium on Information Theory.
[306] A. Robert Calderbank,et al. Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.
[307] Desmond P. Taylor,et al. A Statistical Model for Indoor Multipath Propagation , 2007 .
[308] Massimo Franceschetti,et al. SPECIAL ISSUE ON MODELS, THEORY, AND CODES FOR RELAYING AND COOPERATION IN COMMUNICATION NETWORKS , 2007 .
[309] A. Hora,et al. Distance-Regular Graphs , 2007 .
[310] Johannes B. Huber,et al. Information Combining , 2006, Found. Trends Commun. Inf. Theory.
[311] Tracey Ho,et al. A Random Linear Network Coding Approach to Multicast , 2006, IEEE Transactions on Information Theory.
[312] Vinod M. Prabhakaran,et al. Syndrome-Based Robust Video Transmission Over Networks with Bursty Losses , 2006, 2006 International Conference on Image Processing.
[313] Johannes A. Buchmann,et al. Perspectives for cryptographic long-term security , 2006, CACM.
[314] Shlomo Shamai,et al. The Capacity Region of the Gaussian Multiple-Input Multiple-Output Broadcast Channel , 2006, IEEE Transactions on Information Theory.
[315] Andrea J. Goldsmith,et al. Finite State Channels With Time-Invariant Deterministic Feedback , 2006, IEEE Transactions on Information Theory.
[316] Nan Guo,et al. Improved autocorrelation demodulation receivers based on multiple-symbol detection for UWB communications , 2006, IEEE Transactions on Wireless Communications.
[317] Georg Schmidt,et al. Multi-Sequence Linear Shift-Register Synthesis: The Varying Length Case , 2006, 2006 IEEE International Symposium on Information Theory.
[318] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[319] J. Nicholas Laneman,et al. Modulation and demodulation for cooperative diversity in wireless systems , 2006, IEEE Transactions on Wireless Communications.
[320] Piotr Sniady,et al. Second order freeness and fluctuations of random matrices. III: Higher order freeness and free cumulants , 2006, Documenta Mathematica.
[321] Tie Liu,et al. An Extremal Inequality Motivated by Multiterminal Information-Theoretic Problems , 2006, IEEE Transactions on Information Theory.
[322] Anders Høst-Madsen,et al. Capacity bounds for Cooperative diversity , 2006, IEEE Transactions on Information Theory.
[323] Lutz H.-J. Lampe,et al. "Turbo DPSK" using soft multiple-symbol differential sphere decoding , 2006, IEEE Transactions on Information Theory.
[324] Michael Chertkov,et al. Loop series for discrete statistical models on graphs , 2006, ArXiv.
[325] Ralf Koetter,et al. On the Block Error Probability of LP Decoding of LDPC Codes , 2006, ArXiv.
[326] Aggelos Bletsas,et al. A simple Cooperative diversity method based on network path selection , 2005, IEEE Journal on Selected Areas in Communications.
[327] E. Candès,et al. Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information , 2004, IEEE Transactions on Information Theory.
[328] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[329] Zixiang Xiong,et al. On dualities in multiterminal coding problems , 2006, IEEE Transactions on Information Theory.
[330] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[331] A. Robert Calderbank,et al. The Finite Heisenberg-Weyl Groups in Radar and Communications , 2006, EURASIP J. Adv. Signal Process..
[332] Golan Yona,et al. BIOZON: a system for unification, management and analysis of heterogeneous biological data , 2006, BMC Bioinformatics.
[333] Hirosuke Yamamoto,et al. How to attain the ordinary channel capacity securely in wiretap channels , 2005, IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005..
[334] C. Chong,et al. A modified S-V clustering channel model for the UWB indoor residential environment , 2005, 2005 IEEE 61st Vehicular Technology Conference.
[335] Muriel Médard,et al. Interference management via capacity-achieving codes for the deterministic broadcast channel , 2005, IEEE Information Theory Workshop, 2005..
[336] Muriel Médard,et al. Rate-splitting for the deterministic broadcast channel , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[337] Wei Yu,et al. Coding for the blackwell channel: a survey propagation approach , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[338] Meir Feder,et al. Communicating using feedback over a binary channel with arbitrary noise sequence , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[339] Gil I. Shamir,et al. Non-systematic low-density parity-check codes for nonuniform sources , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[340] R. Negi,et al. Secret communication in presence of colluding eavesdroppers , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[341] Simon Litsyn,et al. Lattices which are good for (almost) everything , 2005, IEEE Transactions on Information Theory.
[342] Guang Gong,et al. Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar , 2005 .
[343] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[344] Ralf R. Müller,et al. MIMO channel modeling and the principle of maximum entropy , 2005, IEEE Transactions on Information Theory.
[345] A. Lee Swindlehurst,et al. A vector-perturbation technique for near-capacity multiantenna multiuser communication-part II: perturbation , 2005, IEEE Transactions on Communications.
[346] Gennian Ge,et al. Combinatorial Constructions for Optimal Splitting Authentication Codes , 2005, SIAM J. Discret. Math..
[347] Antonia Maria Tulino,et al. Asymptotic outage capacity of multiantenna channels , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[348] Hong Shen,et al. A relation between the Characteristic Generators of a linear code and its dual , 2005, IEEE Transactions on Information Theory.
[349] Martin J. Wainwright,et al. Using linear programming to Decode Binary linear codes , 2005, IEEE Transactions on Information Theory.
[350] Toby Berger,et al. The capacity of finite-State Markov Channels With feedback , 2005, IEEE Transactions on Information Theory.
[351] Shlomo Shamai,et al. Mutual information and minimum mean-square error in Gaussian channels , 2004, IEEE Transactions on Information Theory.
[352] Ezio Biglieri,et al. Coding for Wireless Channels , 2005 .
[353] Douglas R. Stinson,et al. The combinatorics of authentication and secrecy codes , 2005, Journal of Cryptology.
[354] Wei Wu,et al. Gaussian interference networks with feedback: Duality, sum capacity and dynamic team problems , 2005 .
[355] A. Nori. Unifying Views Of Tail-Biting Trellises For Linear Block Codes , 2005 .
[356] Andrea Ridolfi. Power spectra of random spikes and related complex signals , 2005 .
[357] Mahesh K. Varanasi,et al. An information-theoretic framework for deriving canonical decision-feedback receivers in Gaussian channels , 2005, IEEE Transactions on Information Theory.
[358] Marc P. C. Fossorier,et al. Sphere-packing bounds revisited for moderate block lengths , 2004, IEEE Transactions on Information Theory.
[359] Stephan ten Brink,et al. Extrinsic information transfer functions: model and erasure channel properties , 2004, IEEE Transactions on Information Theory.
[360] Halim Yanikomeroglu,et al. Multihop diversity in wireless relaying channels , 2004, IEEE Transactions on Communications.
[361] Daniele Micciancio,et al. Worst-case to average-case reductions based on Gaussian measures , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.
[362] Uri Erez,et al. Achieving 1/2 log (1+SNR) on the AWGN channel with lattice encoding and decoding , 2004, IEEE Transactions on Information Theory.
[363] Nicola Elia,et al. When bode meets shannon: control-oriented feedback communication schemes , 2004, IEEE Transactions on Automatic Control.
[364] Rüdiger L. Urbanke,et al. Capacity-achieving ensembles for the binary erasure channel with bounded complexity , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[365] G. David Forney,et al. Shannon meets Wiener II: On MMSE estimation in successive decoding schemes , 2004, ArXiv.
[366] Camilla Hollanti,et al. Four antenna space-time lattice constellations from division algebras , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[367] Neri Merhav,et al. On the random coding error exponents of the single-user and the multiple-access Gel'fand-Pinsker channels , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[368] Amin Shokrollahi,et al. Probabilistic decoding of interleaved RS-codes on the q-ary symmetric channel , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[369] Neri Merhav,et al. On successive refinement for the Wyner-Ziv problem , 2004, IEEE Transactions on Information Theory.
[370] Narendra Ahuja,et al. Wyner-Ziv coding of video: an error-resilient compression framework , 2004, IEEE Transactions on Multimedia.
[371] Kaoru Kurosawa,et al. New combinatorial designs and their applications to authentication codes and secret sharing schemes , 2004, Discret. Math..
[372] H.-A. Loeliger,et al. An introduction to factor graphs , 2004, IEEE Signal Process. Mag..
[373] Giuseppe Caire,et al. Design methods for irregular repeat-accumulate codes , 2003, IEEE Transactions on Information Theory.
[374] Kenneth Rose,et al. Rate-distortion approach to databases: storage and content-based retrieval , 2002, IEEE Transactions on Information Theory.
[375] Gustavus J. Simmons,et al. A cartesian product construction for unconditionally secure authentication codes that permit arbitration , 1990, Journal of Cryptology.
[376] Christopher Holden,et al. Perfect Space-Time Block Codes , 2004 .
[377] Marijke De Soete,et al. New bounds and constructions for authentication/secrecy codes with splitting , 2004, Journal of Cryptology.
[378] Victor Yu. Krachkovsky. Reed-Solomon codes for correcting phased error bursts , 2003, IEEE Trans. Inf. Theory.
[379] Stephan ten Brink,et al. Design of repeat-accumulate codes for iterative detection and decoding , 2003, IEEE Trans. Signal Process..
[380] James A. Hutchby,et al. Limits to binary logic switch scaling - a gedanken model , 2003, Proc. IEEE.
[381] Aris L. Moustakas,et al. MIMO capacity through correlated channels in the presence of correlated interferers and noise: a (not so) large N analysis , 2003, IEEE Trans. Inf. Theory.
[382] Hyundong Shin,et al. Capacity of multiple-antenna fading channels: spatial fading correlation, double scattering, and keyhole , 2003, IEEE Trans. Inf. Theory.
[383] Gregory W. Wornell,et al. Distributed space-time-coded protocols for exploiting cooperative diversity in wireless networks , 2003, IEEE Trans. Inf. Theory.
[384] Andrea J. Goldsmith,et al. Duality, achievable rates, and sum-rate capacity of Gaussian MIMO broadcast channels , 2003, IEEE Trans. Inf. Theory.
[385] J. Møller,et al. Statistical Inference and Simulation for Spatial Point Processes , 2003 .
[386] Ton Kalker,et al. On the capacity of a biometrical identification system , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..
[387] Alexander Vardy,et al. Efficient interpolation and factorization in algebraic soft-decision decoding of reed-solonion codes , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..
[388] Cindy C. Parman,et al. To code, or not to code? , 2003, The Journal of oncology management : the official journal of the American College of Oncology Administrators.
[389] David Tse,et al. Sum capacity of the vector Gaussian broadcast channel and uplink-downlink duality , 2003, IEEE Trans. Inf. Theory.
[390] Lizhong Zheng,et al. Diversity and multiplexing: a fundamental tradeoff in multiple-antenna channels , 2003, IEEE Trans. Inf. Theory.
[391] Constantinos B. Papadias,et al. Analysis and performance of some basic space-time architectures , 2003, IEEE J. Sel. Areas Commun..
[392] Sampo Niskanen,et al. Cliquer user's guide, version 1.0 , 2003 .
[393] Nadav Shulman,et al. Communication over an unknown channel via common broadcasting , 2003 .
[394] Jon Feldman,et al. Decoding error-correcting codes via linear programming , 2003 .
[395] P. Vontobel,et al. Graph-covers and iterative decoding of nite length codes , 2003 .
[396] Helmut Bölcskei,et al. Outdoor MIMO wireless channels: models and performance prediction , 2002, IEEE Trans. Commun..
[397] Michael Luby,et al. LT codes , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[398] Thomas Zwick,et al. A stochastic multipath channel model including path directions for indoor environments , 2002, IEEE J. Sel. Areas Commun..
[399] Alexander Vardy,et al. Closest point search in lattices , 2002, IEEE Trans. Inf. Theory.
[400] Sekhar Tatikonda,et al. Loopy Belief Propogation and Gibbs Measures , 2002, UAI.
[401] Gerhard Kramer,et al. Feedback strategies for white Gaussian interference networks , 2002, IEEE Trans. Inf. Theory.
[402] Neri Merhav,et al. Universal composite hypothesis testing: A competitive minimax approach , 2002, IEEE Trans. Inf. Theory.
[403] Reinaldo A. Valenzuela,et al. Keyholes, correlations, and capacities of multielement transmit and receive antennas , 2002, IEEE Trans. Wirel. Commun..
[404] R. Koetter,et al. The structure of tail-biting trellises: minimality and basic principles , 2002, Proceedings IEEE International Symposium on Information Theory,.
[405] Natalia A. Schmid,et al. Large deviations performance analysis for biomet-rics recognition , 2002 .
[406] Alexander Vardy,et al. On the Theory of Linear Trellises , 2002 .
[407] Ralf R. Müller,et al. A random matrix model of communication via antenna arrays , 2002, IEEE Trans. Inf. Theory.
[408] Xiaoming Huo,et al. Uncertainty principles and ideal atomic decomposition , 2001, IEEE Trans. Inf. Theory.
[409] R. Muller,et al. Confirmation of random matrix model for the antenna array channel by indoor measurements , 2001, IEEE Antennas and Propagation Society International Symposium. 2001 Digest. Held in conjunction with: USNC/URSI National Radio Science Meeting (Cat. No.01CH37229).
[410] G. Wornell,et al. The duality between information embedding and source coding with side information and some applications , 2001, Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252).
[411] R. Koetter,et al. An algebraic approach to network coding , 2001, Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252).
[412] T. Honold,et al. Characterization of finite Frobenius rings , 2001 .
[413] Avideh Zakhor,et al. Video multicast using layered FEC and scalable compression , 2001, IEEE Trans. Circuits Syst. Video Technol..
[414] Brendan J. Frey,et al. Factor graphs and the sum-product algorithm , 2001, IEEE Trans. Inf. Theory.
[415] Rüdiger L. Urbanke,et al. The capacity of low-density parity-check codes under message-passing decoding , 2001, IEEE Trans. Inf. Theory.
[416] R. Koetter,et al. On the Effective Weights of Pseudocodewords for Codes Defined on Graphs with Cycles , 2001 .
[417] David Thomas,et al. The Art in Computer Programming , 2001 .
[418] A. Vardy,et al. Algebraic soft-decision decoding of Reed-Solomon codes , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).
[419] Marcus Greferath,et al. Finite-Ring Combinatorics and MacWilliams' Equivalence Theorem , 2000, J. Comb. Theory A.
[420] Jeffrey A. Davis,et al. The fundamental limit on binary switching energy for terascale integration (TSI) , 2000, IEEE Journal of Solid-State Circuits.
[421] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.
[422] Ueli Maurer,et al. Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free , 2000, EUROCRYPT.
[423] Sae-Young Chung,et al. Sphere-bound-achieving coset codes and multilevel coset codes , 2000, IEEE Trans. Inf. Theory.
[424] Muriel Médard,et al. The effect upon channel capacity in wireless communications of perfect and imperfect knowledge of the channel , 2000, IEEE Trans. Inf. Theory.
[425] Michael A. Jensen,et al. Modeling the statistical time and angle of arrival characteristics of an indoor multipath channel , 2000, IEEE Journal on Selected Areas in Communications.
[426] H. Jin,et al. Irregular repeat accumulate codes , 2000 .
[427] Ingmar Land,et al. Log-likelihood values and Monte Carlo simulation - some fundamental results , 2000 .
[428] Marcus Greferath,et al. Linear Codes and Rings of Matrices , 1999, AAECC.
[429] Marcus Greferath,et al. Gray isometries for finite chain rings and a nonlinear ternary (36, 312, 15) code , 1999, IEEE Trans. Inf. Theory.
[430] Ueli Maurer,et al. Information-Theoretic Cryptography , 1999, CRYPTO.
[431] Alexander Barg,et al. On the complexity of minimum distance decoding of long linear codes , 1999, IEEE Trans. Inf. Theory.
[432] R. Schober,et al. Decision-feedback differential detection of MDPSK for flat Rayleigh fading channels , 1999, 1999 IEEE Communications Theory Mini-Conference (Cat. No.99EX352).
[433] Kaoru Kurosawa,et al. On a Fallacious Bound for Authentication Codes , 1999, Journal of Cryptology.
[434] Jay A. Wood. Duality for modules over finite rings and applications to coding theory , 1999 .
[435] Parampalli Udaya,et al. Cyclic Codes and Self-Dual Codes Over F2 + uF2 , 1999, IEEE Trans. Inf. Theory.
[436] K. Ramchandran,et al. Distributed source coding using syndromes (DISCUS): design and construction , 1999, Proceedings DCC'99 Data Compression Conference (Cat. No. PR00096).
[437] G. Horn. Iterative decoding and pseudo-codewords , 1999 .
[438] Anna Scaglione,et al. Filterbank transceivers optimizing information rate in block transmissions over dispersive channels , 1998, IEEE GLOBECOM 1998 (Cat. NO. 98CH36250).
[439] Venkatesan Guruswami,et al. Improved decoding of Reed-Solomon and algebraic-geometric codes , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).
[440] Thomas M. Cover,et al. Comments on Broadcast Channels , 1998, IEEE Trans. Inf. Theory.
[441] Shlomo Shamai,et al. Fading Channels: Information-Theoretic and Communication Aspects , 1998, IEEE Trans. Inf. Theory.
[442] Reinaldo A. Valenzuela,et al. V-BLAST: an architecture for realizing very high data rates over the rich-scattering wireless channel , 1998, 1998 URSI International Symposium on Signals, Systems, and Electronics. Conference Proceedings (Cat. No.98EX167).
[443] Yuan Xing Lee,et al. Decoding of parallel Reed-Solomon codes with applications to product and concatenated codes , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[444] A. Vardy,et al. Minimal tail-biting trellises: the Golay code and more , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[445] Amir Dembo,et al. Large Deviations Techniques and Applications , 1998 .
[446] Gerhard Kramer,et al. Directed information for channels with feedback , 1998 .
[447] Pravin Varaiya,et al. Capacity of fading channels with channel side information , 1997, IEEE Trans. Inf. Theory.
[448] Joachim Hagenauer,et al. Approaching Shannon's capacity limit by 0.2 dB using simple Hamming codes , 1997, IEEE Communications Letters.
[449] H. Viswanathan,et al. Sequential coding of correlated sources , 1997, Proceedings of IEEE International Symposium on Information Theory.
[450] M. Feder,et al. Universal decoding for channels with memory , 1997, Proceedings of IEEE International Symposium on Information Theory.
[451] Yuan Xing Lee,et al. Decoding For Iterative Reed-solomon Coding Schemes , 1997, 1997 IEEE International Magnetics Conference (INTERMAG'97).
[452] Christine Bachoc,et al. Applications of Coding Theory to the Construction of Modular Lattices , 1997, J. Comb. Theory A.
[453] A. Rhodius. On the maximum of ergodicity coefficients, the Dobrushin ergodicity coefficient, and products of stochastic matrices , 1997 .
[454] Madhu Sudan,et al. Decoding of Reed Solomon Codes beyond the Error-Correction Bound , 1997, J. Complex..
[455] Shlomo Shamai,et al. Information-theoretic considerations for symmetric, cellular, multiple-access fading channels - Part I , 1997, IEEE Trans. Inf. Theory.
[456] Felix Lazebnik,et al. On Systems of Linear Diophantine Equations , 1996 .
[457] Shlomo Shamai,et al. The intersymbol interference channel: lower bounds on capacity and channel precoding loss , 1996, IEEE Trans. Inf. Theory.
[458] Gerard J. Foschini,et al. Layered space-time architecture for wireless communication in a fading environment when using multi-element antennas , 1996, Bell Labs Technical Journal.
[459] Rüdiger L. Urbanke,et al. A rate-splitting approach to the Gaussian multiple-access channel , 1996, IEEE Trans. Inf. Theory.
[460] Gregory J. Pottie,et al. On punctured trellis-coded modulation , 1996, IEEE Trans. Inf. Theory.
[461] John M. Cioffi,et al. Block transmission over dispersive channels: transmit filter optimization and realization, and MMSE-DFE receiver performance , 1996, IEEE Trans. Inf. Theory.
[462] Bernard Henri Fleury,et al. Advanced Radio Channel Model for Magic WAND , 1996 .
[463] Niclas Wiberg,et al. Codes and Decoding on General Graphs , 1996 .
[464] R. Schweikert,et al. Performance of punctured pragmatic codes , 1995, Proceedings of GLOBECOM '95.
[465] John M. Cioffi,et al. MMSE decision-feedback equalizers and coding. I. Equalization results , 1995, IEEE Trans. Commun..
[466] Yu-Sun Liu,et al. A new universal random coding bound for the multiple-access channel , 1995, Proceedings of 1995 IEEE International Symposium on Information Theory.
[467] A. Lapidoth. On the role of mismatch in rate distortion theory , 1995, Proceedings of 1995 IEEE International Symposium on Information Theory.
[468] Y. Oohama. Gaussian multiterminal source coding , 1995, Proceedings of 1995 IEEE International Symposium on Information Theory.
[469] Georgios B. Giannakis,et al. Principal component filter banks for optimal multiresolution analysis , 1995, IEEE Trans. Signal Process..
[470] Patrick Robertson,et al. A comparison of optimal and sub-optimal MAP decoding algorithms operating in the log domain , 1995, Proceedings IEEE International Conference on Communications ICC '95.
[471] B. E. Spinnler,et al. Design of hyper states for reduced-state sequence estimation , 1995, Proceedings IEEE International Conference on Communications ICC '95.
[472] Satoshi Obana,et al. Combinatorial Bounds on Authentication Codes with Arbitration , 1995, Des. Codes Cryptogr..
[473] Ulrich K. Sorger,et al. Bounded minimum distance decoding of unit memory codes , 1995, IEEE Trans. Inf. Theory.
[474] Tal Rabin,et al. Robust sharing of secrets when the dealer is honest or cheating , 1994, JACM.
[475] Rudolf Ahlswede,et al. Identification via compressed data , 1994, Proceedings of 1994 Workshop on Information Theory and Statistics.
[476] M. Talagrand. On Russo's Approximate Zero-One Law , 1994 .
[477] Hans-Andrea Loeliger. A posteriori probabilities and performance evaluation of trellis codes , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[478] F. Alajaji,et al. Effect of feedback on the capacity of discrete additive channels with memory , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[479] N. J. A. Sloane,et al. The Z4-linearity of Kerdock, Preparata, Goethals, and related codes , 1994, IEEE Trans. Inf. Theory.
[480] Gregory Poltyrev,et al. On coding without restrictions for the AWGN channel , 1993, IEEE Trans. Inf. Theory.
[481] Uwe Dettmar. Partial unit memory codes , 1994 .
[482] U. Maurer. The Strong Secret Key Rate of Discrete Random Triples , 1994 .
[483] Michael Unser,et al. On the optimality of ideal filters for pyramid and wavelet signal approximation , 1993, IEEE Trans. Signal Process..
[484] W. Banaszczyk. New bounds in some transference theorems in the geometry of numbers , 1993 .
[485] Fumiyuki Adachi,et al. Decision feedback multiple-symbol differential detection for M-ary DPSK , 1993 .
[486] H. Hashemi,et al. The indoor radio propagation channel , 1993, Proc. IEEE.
[487] N. Merhav. Universal Decoding for Memoryless Gaussian Channels with a Deterministic Interference , 1993, Proceedings. IEEE International Symposium on Information Theory.
[488] Graham Everest,et al. Counting Algebraic Units with Bounded Height , 1993 .
[489] Frank R. Kschischang,et al. Optimal nonuniform signaling for Gaussian channels , 1993, IEEE Trans. Inf. Theory.
[490] T. Han,et al. Approximation Theory of Output Statistics , 1993, Proceedings. IEEE International Symposium on Information Theory.
[491] Sergio Verdú,et al. Gaussian multiaccess channels with ISI: Capacity region and multiuser water-filling , 1993, IEEE Trans. Inf. Theory.
[492] Hisato Iwai,et al. Wideband Propagation Model for the Analysis of the Effect of the Multipath Fading on the Near-Far Problem in CDMA Mobile Radio Systems (Special Issue on Land Mobile/Portable Propagation) , 1993 .
[493] G. Kaplan,et al. On Information Rates for Mismatched Decoders , 1993, Proceedings. IEEE International Symposium on Information Theory.
[494] N. Sloane,et al. Lower Bounds to Error Probability for Coding on Discrete Memoryless Channels. I , 1993 .
[495] Aaron D. Wyner,et al. Coding Theorems for a Discrete Source With a Fidelity CriterionInstitute of Radio Engineers, International Convention Record, vol. 7, 1959. , 1993 .
[496] Ephraim Zehavi,et al. 8-PSK trellis codes for a Rayleigh channel , 1992, IEEE Trans. Commun..
[497] Franz Edbauer. Bit error rate of binary and quaternary DPSK signals with multiple differential feedback detection , 1992, IEEE Trans. Commun..
[498] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[499] Jianhua Lin,et al. Divergence measures based on the Shannon entropy , 1991, IEEE Trans. Inf. Theory.
[500] Moti Yung,et al. Perfectly secure message transmission , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.
[501] Dariush Divsalar,et al. Multiple-symbol differential detection of MPSK , 1990, IEEE Trans. Commun..
[502] Spyros J. Papantoniou. Modelling the mobile-radio channel , 1990 .
[503] J. Massey. CAUSALITY, FEEDBACK AND DIRECTED INFORMATION , 1990 .
[504] R. Gray. Entropy and Information Theory , 1990, Springer New York.
[505] Joachim Hagenauer,et al. A Viterbi algorithm with soft-decision outputs and its applications , 1989, IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond.
[506] Alexandra Duel-Hallen,et al. Delayed decision-feedback sequence estimation , 1989, IEEE Trans. Commun..
[507] David J. Aldous,et al. Lower bounds for covering times for reversible Markov chains and random walks on graphs , 1989 .
[508] Nathan Linial,et al. The influence of variables on Boolean functions , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.
[509] Gustavus J. Simmons,et al. A survey of information authentication , 1988, Proc. IEEE.
[510] Béla Bollobás,et al. The Isoperimetric Number of Random Regular Graphs , 1988, Eur. J. Comb..
[511] Shahid U. H. Qureshi,et al. Reduced-state sequence estimation with set partitioning and decision feedback , 1988, IEEE Trans. Commun..
[512] G. Ungerboeck,et al. Trellis-coded modulation with redundant signal sets Part I: Introduction , 1987, IEEE Communications Magazine.
[513] J. L. Massey,et al. Cryptography ― a selective survey , 1986 .
[514] Hans-Martin Wallmeier,et al. Random coding bound and codes produced by permutations for the multiple-access channel , 1985, IEEE Trans. Inf. Theory.
[515] Toby Berger,et al. Rate distortion when side information may be absent , 1985, IEEE Trans. Inf. Theory.
[516] J.E. Mazo,et al. Digital communications , 1985, Proceedings of the IEEE.
[517] Jacob Ziv,et al. Universal decoding for finite-state channels , 1985, IEEE Trans. Inf. Theory.
[518] G. J. Foschini,et al. Contrasting performance of faster binary signaling with QAM , 1984, AT&T Bell Laboratories Technical Journal.
[519] Peter Ney,et al. Convexity and Large Deviations , 1984 .
[520] Lawrence H. Ozarow,et al. The capacity of the white Gaussian multiple access channel with feedback , 1984, IEEE Trans. Inf. Theory.
[521] Lawrence H. Ozarow,et al. An achievable region and outer bound for the Gaussian broadcast channel with feedback , 1984, IEEE Trans. Inf. Theory.
[522] G. Gonzalez. Microwave Transistor Amplifiers: Analysis and Design , 1984 .
[523] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[524] C.E. Shannon,et al. Communication in the Presence of Noise , 1949, Proceedings of the IRE.
[525] Max H. M. Costa,et al. Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.
[526] D. Aldous. Random walks on finite groups and rapidly mixing markov chains , 1983 .
[527] Imre Csiszár. Linear codes for sources and source networks: Error exponents, universal coding , 1982, IEEE Trans. Inf. Theory.
[528] C. R. Rao,et al. On the convexity of some divergence measures based on entropy functions , 1982, IEEE Trans. Inf. Theory.
[529] Imre Csiszár,et al. Graph decomposition: A new key to coding theorems , 1981, IEEE Trans. Inf. Theory.
[530] Te Sun Han,et al. A new achievable rate region for the interference channel , 1981, IEEE Trans. Inf. Theory.
[531] Imre Csiszár,et al. Towards a general theory of source networks , 1980, IEEE Trans. Inf. Theory.
[532] Abbas El Gamal,et al. Capacity theorems for the relay channel , 1979, IEEE Trans. Inf. Theory.
[533] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[534] János Körner,et al. How to encode the modulo-two sum of binary sources (Corresp.) , 1979, IEEE Trans. Inf. Theory.
[535] J. Wolfowitz. The rate distortion function for source coding with side information at the decoder , 1979 .
[536] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[537] Aaron D. Wyner,et al. The rate-distortion function for source coding with side information at the decoder , 1976, IEEE Trans. Inf. Theory.
[538] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[539] Aydano B. Carleial,et al. Interference channels , 1978, IEEE Trans. Inf. Theory.
[540] Jack K. Wolf,et al. Efficient maximum likelihood decoding of linear block codes using a trellis , 1978, IEEE Trans. Inf. Theory.
[541] J. Galdos,et al. Information and distortion in reduced-order filter design , 1977, IEEE Trans. Inf. Theory.
[542] P. Gács,et al. Spreading of Sets in Product Spaces and Hypercontraction of the Markov Operator , 1976 .
[543] Lin-nan Lee,et al. Short unit-memory byte-oriented binary convolutional codes having maximal free distance (Corresp.) , 1976, IEEE Trans. Inf. Theory.
[544] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[545] Aaron D. Wyner,et al. On source coding with side information at the decoder , 1975, IEEE Trans. Inf. Theory.
[546] Aaron D. Wyner,et al. The common information of two dependent random variables , 1975, IEEE Trans. Inf. Theory.
[547] W. C. Jakes,et al. Microwave Mobile Communications , 1974 .
[548] Robert M. Gray,et al. Source coding for a simple network , 1974 .
[549] H. Marko,et al. The Bidirectional Communication Theory - A Generalization of Information Theory , 1973, IEEE Transactions on Communications.
[550] Jack K. Wolf,et al. Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.
[551] D. Connor. Techniques for Reducing the Visibility of Transmission Errors in Digitally Encoded Video Signals , 1973, IEEE Trans. Commun..
[552] Robert G. Gallager,et al. The random coding bound is tight for the average code (Corresp.) , 1973, IEEE Trans. Inf. Theory.
[553] Richard E. Blahut,et al. Computation of channel capacity and rate-distortion functions , 1972, IEEE Trans. Inf. Theory.
[554] George L. Turin,et al. A statistical model of urban multipath propagation , 1972 .
[555] Suguru Arimoto,et al. An algorithm for computing the capacity of arbitrary discrete memoryless channels , 1972, IEEE Trans. Inf. Theory.
[556] Jacob Ziv,et al. Mutual information of the white Gaussian channel with and without feedback , 1971, IEEE Trans. Inf. Theory.
[557] Toby Berger,et al. Rate distortion theory : a mathematical basis for data compression , 1971 .
[558] T. Duncan. ON THE CALCULATION OF MUTUAL INFORMATION , 1970 .
[559] D. A. Bell,et al. Information Theory and Reliable Communication , 1969 .
[560] C. Rader. Discrete Fourier transforms when the number of data samples is prime , 1968 .
[561] H. Witsenhausen. A Counterexample in Stochastic Optimum Control , 1968 .
[562] Andrew J. Viterbi,et al. Error bounds for convolutional codes and an asymptotically optimum decoding algorithm , 1967, IEEE Trans. Inf. Theory.
[563] Nelson M. Blachman,et al. The convolution inequality for entropy powers , 1965, IEEE Trans. Inf. Theory.
[564] Robert G. Gallager,et al. A simple derivation of the coding theorem and some applications , 1965, IEEE Trans. Inf. Theory.
[565] Amiel Feinstein,et al. Information and information stability of random variables and processes , 1964 .
[566] Michael Horstein,et al. Sequential transmission using noiseless feedback , 1963, IEEE Trans. Inf. Theory.
[567] J. Wolfowitz. Products of indecomposable, aperiodic, stochastic matrices , 1963 .
[568] L. Goddard. Information Theory , 1962, Nature.
[569] R. Landauer,et al. Irreversibility and heat generation in the computing process , 1961, IBM J. Res. Dev..
[570] R. R. Bahadur,et al. On Deviations of the Sample Mean , 1960 .
[571] Satosi Watanabe,et al. Loss and Recovery of Information by Coarse Observation of Stochastic Chain , 1960, Inf. Control..
[572] C. Shannon. Probability of error for optimal codes in a Gaussian channel , 1959 .
[573] A. Rényi. On the dimension and entropy of probability distributions , 1959 .
[574] M. Bartlett,et al. Weak ergodicity in non-homogeneous Markov chains , 1958, Mathematical Proceedings of the Cambridge Philosophical Society.
[575] K Fan,et al. Minimax Theorems. , 1953, Proceedings of the National Academy of Sciences of the United States of America.
[576] Feller William,et al. An Introduction To Probability Theory And Its Applications , 1950 .
[577] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[578] H. Jeffreys. An invariant form for the prior probability in estimation problems , 1946, Proceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences.
[579] É. Lucas. Theorie des Fonctions Numeriques Simplement Periodiques , 1878 .
[580] T. Han,et al. A Dichotomy of Functions F ( X , Y ) o f Corre lated Sources ( X , Y ) from the Viewpoint o f the Achievable Rate Region , .
[581] S. Artstein,et al. Entropy Methods , .
[582] R. McEliece. On the Average List Size for the Guruswami-sudan Decoder * , 2022 .