Search

Showing total 370 results
370 results

Search Results

1. On the Capacity of the Carbon Copy onto Dirty Paper Channel.

2. Secret Writing on Dirty Paper: A Deterministic View.

3. Dirty-Paper Coding for the Gaussian Multiaccess Channel With Conferencing.

4. Writing on Fading Paper, Dirty Tape With Little Ink: Wideband Limits for Causal Transmitter CSI.

5. Computation Alignment: Capacity Approximation Without Noise Accumulation.

6. Localized Error Correction in Projective Space.

7. Minimum Energy per Bit in Broadcast and Interference Channels With Correlated Information.

8. Gaussian Broadcast Channels With Intermittent Connectivity and Hybrid State Information at the Transmitter.

9. Generalized Nearest Neighbor Decoding.

10. Coding With Noiseless Feedback Over the Z-Channel.

11. The Dirty MIMO Multiple-Access Channel.

12. List Decoding Random Euclidean Codes and Infinite Constellations.

13. Topological Interference Management With Confidential Messages.

14. Quantum CDMA Communication Systems.

15. Cooperative Multiple-Access Channels With Distributed State Information.

16. Impact of Action-Dependent State and Channel Feedback on Gaussian Wiretap Channels.

17. Quadratic Privacy-Signaling Games and the MMSE Information Bottleneck Problem for Gaussian Sources.

18. On the Capacity-Achieving Input of Channels With Phase Quantization.

19. Optimal Age Over Erasure Channels.

20. A Framework for Characterizing the Value of Information in Hidden Markov Models.

21. Source Coding When the Side Information May Be Delayed.

22. The Langberg-Médard Multiple Unicast Conjecture for 3-Pair Networks.

23. The Secrecy Capacity Region of the Gaussian MIMO Broadcast Channel.

24. State-Dependent Interference Channel With Correlated States.

25. On Secure Network Coding for Multiple Unicast Traffic.

26. The Gray-Wyner Network and Wyner’s Common Information for Gaussian Sources.

27. Outer Bounds for Multiuser Settings: The Auxiliary Receiver Approach.

28. Novel Outer Bounds and Capacity Results for the Interference Channel With Conferencing Receivers.

29. Secrecy Capacity-Memory Tradeoff of Erasure Broadcast Channels.

30. Deterministic Identification Over Channels With Power Constraints.

31. Network Information Theoretic Security With Omnipresent Eavesdropping.

32. Gaussian Multiple and Random Access Channels: Finite-Blocklength Analysis.

33. On the Capacity Enlargement of Gaussian Broadcast Channels With Passive Noisy Feedback.

34. Covert Identification Over Binary-Input Discrete Memoryless Channels.

35. Comments and Corrections to “Capacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information”.

36. Transmission of a Bit Over a Discrete Poisson Channel With Memory.

37. Gaussian Intersymbol Interference Channels With Mismatch.

38. The Capacity of Online (Causal) $q$ -Ary Error-Erasure Channels.

39. Message Transmission Over Classical Quantum Channels With a Jammer With Side Information: Message Transmission Capacity and Resources.

40. Cache-Aided Interference Channels.

41. Coherent Multiple-Antenna Block-Fading Channels at Finite Blocklength.

42. State-Dependent Gaussian Multiple Access Channels: New Outer Bounds and Capacity Results.

43. Capacity Characterization for State-Dependent Gaussian Channel With a Helper.

44. Boundary of the Gaussian Han-Kobayashi Rate Region.

45. Rate Splitting and Successive Decoding for Gaussian Interference Channels.

46. Locally Decodable Index Codes.

47. Coding Theorems for Noisy Permutation Channels.

48. Vector Network Coding Based on Subspace Codes Outperforms Scalar Linear Network Coding.

49. Lattice Codes Achieve the Capacity of Common Message Gaussian Broadcast Channels With Coded Side Information.

50. Converse Bounds on Modulation-Estimation Performance for the Gaussian Multiple-Access Channel.