Search

Showing total 31 results
31 results

Search Results

1. Asymptotic Divergences and Strong Dichotomy.

2. On the Information-Theoretic Security of Combinatorial All-or-Nothing Transforms.

3. A Bound on Undirected Multiple-Unicast Network Information Flow.

4. Signaling Games for Log-Concave Distributions: Number of Bins and Properties of Equilibria.

5. Bayesian Risk With Bregman Loss: A Cramér–Rao Type Bound and Linear Estimation.

6. Outer Bounds for Multiuser Settings: The Auxiliary Receiver Approach.

7. The Capacity Achieving Distribution for the Amplitude Constrained Additive Gaussian Channel: An Upper Bound on the Number of Mass Points.

8. Information-Distilling Quantizers.

9. A Tight Upper Bound on the Second-Order Coding Rate of the Parallel Gaussian Channel With Feedback.

10. On Exact and ∞-Rényi Common Informations.

11. On the Sub-Optimality of Single-Letter Coding Over Networks.

12. Upper Bounds via Lamination on the Constrained Secrecy Capacity of Hypergraphical Sources.

13. Improved Upper Bounds and Structural Results on the Capacity of the Discrete-Time Poisson Channel.

14. Distributed Testing With Cascaded Encoders.

15. Demystifying Fixed $k$ -Nearest Neighbor Information Estimators.

16. Probabilistic Existence Results for Separable Codes.

17. Bayesian Quickest Change-Point Detection With Sampling Right Constraints.

18. On Achievable Rates of AWGN Energy-Harvesting Channels With Block Energy Arrival and Non-Vanishing Error Probabilities.

19. Arimoto?R?nyi Conditional Entropy and Bayesian $M$ -Ary Hypothesis Testing.

20. Regular Hilberg Processes: An Example of Processes With a Vanishing Entropy Rate.

21. Capacity Analysis of Discrete Energy Harvesting Channels.

22. Achievable Rates for Gaussian Degraded Relay Channels With Non-Vanishing Error Probabilities.

23. The Log-Volume of Optimal Codes for Memoryless Channels, Asymptotically Within a Few Nats.

24. Expanded GDoF-optimality Regime of Treating Interference as Noise in the $M\times 2$ X-Channel.

25. Cooperation for Interference Management: A GDoF Perspective.

26. Aliasing-Truncation Errors in Sampling Approximations of Sub-Gaussian Signals.

27. Rate-Distortion Function for a Heegard-Berger Problem With Two Sources and Degraded Reconstruction Sets.

28. Secret Key Agreement: General Capacity and Second-Order Asymptotics.

29. Random Forests and Kernel Methods.

30. The Gaussian Multiple Access Diamond Channel.

31. A Note on the Broadcast Channel With Stale State Information at the Transmitter.