Search

Showing total 253 results
253 results

Search Results

101. Empirical Lipschitz Constants for the Renyi Entropy Maximum Likelihood Estimator.

102. Minimum-Entropy Couplings and Their Applications.

103. Robust Estimators and Test Statistics for One-Shot Device Testing Under the Exponential Distribution.

104. The Optimal Sub-Packetization of Linear Capacity-Achieving PIR Schemes With Colluding Servers.

105. Second-Order Asymptotics for Communication Under Strong Asynchronism.

106. The Replica-Symmetric Prediction for Random Linear Estimation With Gaussian Matrices Is Exact.

107. First- and Second-Order Asymptotics in Covert Communication.

108. Rényi Resolvability and Its Applications to the Wiretap Channel.

109. On the Evaluation of Marton’s Inner Bound for Two-Receiver Broadcast Channels.

110. Close to Uniform Prime Number Generation With Fewer Random Bits.

111. Optimal Uniform Secret Sharing.

112. Network Coherence Time Matters—Aligned Image Sets and the Degrees of Freedom of Interference Networks With Finite Precision CSIT and Perfect CSIR.

113. Strong Functional Representation Lemma and Applications to Coding Theorems.

114. Distributed Testing With Cascaded Encoders.

115. Characterizations of Two Channel Orderings: Input-Degradedness and the Shannon Ordering.

116. From Compressed Sensing to Compressed Bit-Streams: Practical Encoders, Tractable Decoders.

117. A Numerical Study on the Wiretap Network With a Simple Network Topology.

118. Probabilistic Existence Results for Separable Codes.

119. Conditioning of Random Block Subdictionaries With Applications to Block-Sparse Recovery and Regression.

120. Channel Simulation via Interactive Communications.

121. Distinguishing Infections on Different Graph Topologies.

122. The Strong Law of Large Numbers and the Entropy Ergodic Theorem for Nonhomogeneous Bifurcating Markov Chains Indexed by a Binary Tree.

123. Information Embedding and the Triple Role of Control.

124. On the Two-User Interference Channel With Lack of Knowledge of the Interference Codebook at One Receiver.

125. Achieving Marton’s Region for Broadcast Channels Using Polar Codes.

126. Achievability Proof via Output Statistics of Random Binning.

127. Bayesian Quickest Change-Point Detection With Sampling Right Constraints.

128. Network Coding Capacity Regions via Entropy Functions.

129. Second-Order Slepian-Wolf Coding Theorems for Non-Mixed and Mixed Sources.

130. On Network Functional Compression.

131. Preserving Data-Privacy With Added Noises: Optimal Estimation and Privacy Analysis.

132. On Achievability for Downlink Cloud Radio Access Networks With Base Station Cooperation.

133. Comparison of Channels: Criteria for Domination by a Symmetric Channel.

134. Demystifying Fixed $k$ -Nearest Neighbor Information Estimators.

135. How Compressible Are Innovation Processes?

136. Feedback Capacity and Coding for the BIBO Channel With a No-Repeated-Ones Input Constraint.

137. On the Capacity of Write-Constrained Memories.

138. Asymptotic Theory for Estimators of High-Order Statistics of Stationary Processes.

139. On the Capacity Region of the Parallel Degraded Broadcast Channel With Three Receivers and Three-Degraded Message Sets.

140. On the Tanner Graph Cycle Distribution of Random LDPC, Random Protograph-Based LDPC, and Random Quasi-Cyclic LDPC Code Ensembles.

141. Equivalence of Additive-Combinatorial Linear Inequalities for Shannon Entropy and Differential Entropy.

142. $\Phi$ -Entropic Measures of Correlation.

143. Bounds on the Entropy of a Function of a Random Variable and Their Applications.

144. Sampling and Distortion Tradeoffs for Bandlimited Periodic Signals.

145. On Achievable Rates of AWGN Energy-Harvesting Channels With Block Energy Arrival and Non-Vanishing Error Probabilities.

146. Approximate Asymptotic Distribution of Locally Most Powerful Invariant Test for Independence: Complex Case.

147. Operational Interpretation of Rényi Information Measures via Composite Hypothesis Testing Against Product and Markov Distributions.

148. Unequal Error Protection Querying Policies for the Noisy 20 Questions Problem.

149. IT Formulae for Gamma Target: Mutual Information and Relative Entropy.

150. Staircase Codes for Secret Sharing With Optimal Communication and Read Overheads.