Search

Showing total 780 results

Search Constraints

Start Over You searched for: Topic random variables Remove constraint Topic: random variables Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Language english Remove constraint Language: english Journal ieee transactions on information theory Remove constraint Journal: ieee transactions on information theory
780 results

Search Results

101. Simulation of a Channel With Another Channel.

102. Source-Channel Secrecy for Shannon Cipher System.

103. The Log-Volume of Optimal Codes for Memoryless Channels, Asymptotically Within a Few Nats.

104. An Ergodic Theory of Binary Operations—Part II: Applications to Polarization.

105. The Three-Terminal Interactive Lossy Source Coding Problem.

106. Asymptotic Minimax Robust Quickest Change Detection for Dependent Stochastic Processes With Parametric Uncertainty.

107. Aliasing-Truncation Errors in Sampling Approximations of Sub-Gaussian Signals.

108. Rate-Distortion Function for a Heegard-Berger Problem With Two Sources and Degraded Reconstruction Sets.

109. The Gray-Wyner Network and Wyner’s Common Information for Gaussian Sources.

110. Outer Bounds for Multiuser Settings: The Auxiliary Receiver Approach.

111. On Sampling Continuous-Time AWGN Channels.

112. Generalized Submodular Information Measures: Theoretical Properties, Examples, Optimization Algorithms, and Applications.

113. Information-Theoretic Secret Sharing From Correlated Gaussian Random Variables and Public Communication.

114. A Graph Symmetrization Bound on Channel Information Leakage Under Blowfish Privacy.

115. Guesswork With Quantum Side Information.

116. An Upgrading Algorithm With Optimal Power Law.

117. Symmetric Private Information Retrieval from MDS Coded Distributed Storage With Non-Colluding and Colluding Servers.

118. Upper Bounds via Lamination on the Constrained Secrecy Capacity of Hypergraphical Sources.

119. Feedback Capacity and Coding for the $(0,k)$ -RLL Input-Constrained BEC.

120. Minimal Characterization of Shannon-Type Inequalities Under Functional Dependence and Full Conditional Independence Structures.

121. Determining the Number of Samples Required to Estimate Entropy in Natural Sequences.

122. Improved Upper Bounds and Structural Results on the Capacity of the Discrete-Time Poisson Channel.

123. A Multi-Layer Encoding and Decoding Strategy for Binary Erasure Channel.

124. Robust Estimators and Test Statistics for One-Shot Device Testing Under the Exponential Distribution.

125. MIMO Gaussian Broadcast Channels With Common, Private, and Confidential Messages.

126. Rényi Resolvability and Its Applications to the Wiretap Channel.

127. On the Evaluation of Marton’s Inner Bound for Two-Receiver Broadcast Channels.

128. Close to Uniform Prime Number Generation With Fewer Random Bits.

129. Optimal Uniform Secret Sharing.

130. Network Coherence Time Matters—Aligned Image Sets and the Degrees of Freedom of Interference Networks With Finite Precision CSIT and Perfect CSIR.

131. Strong Functional Representation Lemma and Applications to Coding Theorems.

132. A Variational Characterization of Rényi Divergences.

133. Characterizations of Two Channel Orderings: Input-Degradedness and the Shannon Ordering.

134. From Compressed Sensing to Compressed Bit-Streams: Practical Encoders, Tractable Decoders.

135. Optimal Rates of Teaching and Learning Under Uncertainty.

136. Sketching Semidefinite Programs for Faster Clustering.

137. Reverse Euclidean and Gaussian Isoperimetric Inequalities for Parallel Sets With Applications.

138. Secret Key Agreement: General Capacity and Second-Order Asymptotics.

139. Weak Convergence Analysis of Asymptotically Optimal Hypothesis Tests.

140. Coding Schemes With Rate-Limited Feedback That Improve Over the No Feedback Capacity for a Large Class of Broadcast Channels.

141. Opportunistic Detection Rules: Finite and Asymptotic Analysis.

142. Multiple Access Channels With Combined Cooperation and Partial Cribbing.

143. The Random Coding Bound Is Tight for the Average Linear Code or Lattice.

144. Probabilistic Existence Results for Separable Codes.

145. The Gaussian Multiple Access Diamond Channel.

146. Optimum Power Control at Finite Blocklength.

147. One-Shot Variable-Length Secret Key Agreement Approaching Mutual Information.

148. Secret Key Generation From Vector Gaussian Sources With Public and Private Communications.

149. CodedSketch: A Coding Scheme for Distributed Computation of Approximated Matrix Multiplication.

150. Variable-Length Compression Allowing Errors.