Search

Showing total 5,796 results

Search Constraints

Start Over You searched for: Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Language english Remove constraint Language: english Journal ieee transactions on information theory Remove constraint Journal: ieee transactions on information theory
5,796 results

Search Results

151. State-Dependent Symbol-Wise Decode and Forward Codes Over Multihop Relay Networks.

152. Sequential Transmission Over Binary Asymmetric Channels With Feedback.

153. On the Relation Between Identifiability, Differential Privacy, and Mutual-Information Privacy.

156. Reconstruction of Strings From Their Substrings Spectrum.

157. Transmission of a Bit Over a Discrete Poisson Channel With Memory.

158. Binary Linear Codes With Few Weights From Two-to-One Functions.

159. On CCZ-Equivalence of the Inverse Function.

166. Compressed Sensing in the Presence of Speckle Noise.

167. Stability and Risk Bounds of Iterative Hard Thresholding.

168. Uncertainty-of-Information Scheduling: A Restless Multiarmed Bandit Framework.

169. On the Fundamental Limits of Device-to-Device Private Caching Under Uncoded Cache Placement and User Collusion.

170. Generalized Nearest Neighbor Decoding.

171. Revisiting Cryptanalysis on ChaCha From Crypto 2020 and Eurocrypt 2021.

172. A Unifying Framework to Construct QC-LDPC Tanner Graphs of Desired Girth.

173. Entropic Compressibility of Lévy Processes.

174. Precoding and Scheduling for AoI Minimization in MIMO Broadcast Channels.

175. A Galois Connection Approach to Wei-Type Duality Theorems.

176. Improved Bounds for (b, k)-Hashing.

177. Enumeration of Extended Irreducible Binary Goppa Codes.

178. Some Upper Bounds and Exact Values on Linear Complexities Over F M of Sidelnikov Sequences for M = 2 and 3.

179. Convex Formulation of Overparameterized Deep Neural Networks.

180. Statistically Robust, Risk-Averse Best Arm Identification in Multi-Armed Bandits.

181. High Dimensional Inference With Random Maximum A-Posteriori Perturbations.

182. Codes for Graph Erasures.

183. The Poisson Channel With Varying Dark Current Known to the Transmitter.

184. Latency Analysis for Distributed Coded Storage Systems.

185. List Decodability of Symbol-Pair Codes.

186. Secrecy Capacity-Memory Tradeoff of Erasure Broadcast Channels.

187. Gaussian Intersymbol Interference Channels With Mismatch.

188. The Capacity of Online (Causal) $q$ -Ary Error-Erasure Channels.

189. Minimum-Entropy Couplings and Their Applications.

190. Optimization-Based AMP for Phase Retrieval: The Impact of Initialization and $\ell_{2}$ Regularization.

191. Improved Upper Bound on the Network Function Computing Capacity.

192. Constructions of Partial MDS Codes Over Small Fields.

193. The Error Probability of Sparse Superposition Codes With Approximate Message Passing Decoding.

194. The Replica-Symmetric Prediction for Random Linear Estimation With Gaussian Matrices Is Exact.

195. Structured Signal Recovery From Quadratic Measurements: Breaking Sample Complexity Barriers via Nonconvex Optimization.

196. Learning High-Dimensional Generalized Linear Autoregressive Models.

197. Optimization of Non Binary Parity Check Coefficients.

198. First- and Second-Order Asymptotics in Covert Communication.

199. Cache-Aided Interference Channels.

200. Lattice-Based Robust Distributed Source Coding.