Search

Showing total 321 results
321 results

Search Results

1. 2018 IEEE Information Theory Society Paper Award.

3. Improved Bounds for (b, k)-Hashing.

4. A Unified Framework for One-Shot Achievability via the Poisson Matching Lemma.

5. Secret Key-Enabled Authenticated-Capacity Region, Part—II: Typical-Authentication.

6. Simple Coding Techniques for Many-Hop Relaying.

7. Cyclic Bent Functions and Their Applications in Sequences.

8. Secret Key-Enabled Authenticated-Capacity Region, Part I: Average Authentication.

9. Tsallis and Rényi Deformations Linked via a New λ-Duality.

10. On the Duals of Generalized Bent Functions.

11. A Bound on Undirected Multiple-Unicast Network Information Flow.

12. On One-Dimensional Linear Minimal Codes Over Finite (Commutative) Rings.

13. Source Resolvability and Intrinsic Randomness: Two Random Number Generation Problems With Respect to a Subclass of f-Divergences.

14. Absolute Maximum Nonlinear Functions on Finite Nonabelian Groups.

15. The Gray-Wyner Network and Wyner’s Common Information for Gaussian Sources.

16. Generalized Submodular Information Measures: Theoretical Properties, Examples, Optimization Algorithms, and Applications.

17. Systematic Methods of Constructing Bent Functions and 2-Rotation Symmetric Bent Functions.

18. PIR Schemes With Small Download Complexity and Low Storage Requirements.

19. Maximal Ferrers Diagram Codes: Constructions and Genericity Considerations.

20. On the Derivative Imbalance and Ambiguity of Functions.

21. Locally-Constrained de Bruijn Codes: Properties, Enumeration, Code Constructions, and Applications.

22. Reverse Euclidean and Gaussian Isoperimetric Inequalities for Parallel Sets With Applications.

23. Optimal Change-Point Detection With Training Sequences in the Large and Moderate Deviations Regimes.

24. Adversarial Risk via Optimal Transport and Optimal Couplings.

25. Efficiently List-Decodable Insertion and Deletion Codes via Concatenation.

26. Repeat-Free Codes.

27. On Stopping Sets of AG Codes Over Certain Curves With Separated Variables.

28. Trace Reconstruction Problems in Computational Biology.

29. The Capacity of Online (Causal) $q$ -Ary Error-Erasure Channels.

30. Improved Upper Bound on the Network Function Computing Capacity.

31. On the Uncertainty of Information Retrieval in Associative Memories.

32. A Joint Typicality Approach to Compute–Forward.

33. Centralized Repair of Multiple Node Failures With Applications to Communication Efficient Secret Sharing.

34. Simultaneous Partial Inverses and Decoding Interleaved Reed–Solomon Codes.

35. Mutual Information, Relative Entropy and Estimation Error in Semi-Martingale Channels.

36. Comments on Cut-Set Bounds on Network Function Computation.

37. Strong Converse Bounds in Quantum Network Information Theory.

38. Algorithmic Computability of the Signal Bandwidth.

39. A Scale-Invariant Generalization of the Rényi Entropy, Associated Divergences and Their Optimizations Under Tsallis’ Nonextensive Framework.

40. Mutually Unbiased Equiangular Tight Frames.

41. On the Global Minimizers of Real Robust Phase Retrieval With Sparse Noise.

42. Information Density in Multi-Layer Resistive Memories.

43. Semisupervised Clustering by Queries and Locally Encodable Source Coding.

44. Enabling Optimal Access and Error Correction for the Repair of Reed–Solomon Codes.

45. Minimax Optimal Estimation of KL Divergence for Continuous Distributions.

46. New Constructions of Cooperative MSR Codes: Reducing Node Size to exp(O(n)).

47. An Achievable Rate-Distortion Region for Multiple Descriptions Source Coding Based on Coset Codes.

48. On the Maximum Number of Bent Components of Vectorial Functions.

49. Compute-Forward for DMCs: Simultaneous Decoding of Multiple Combinations.

50. Capacity Upper Bounds for the Relay Channel via Reverse Hypercontractivity.