Search

Showing total 4,279 results

Search Constraints

Start Over You searched for: Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years Language english Remove constraint Language: english Journal ieee transactions on information theory Remove constraint Journal: ieee transactions on information theory
4,279 results

Search Results

151. Compressibility Measures for Affinely Singular Random Vectors.

152. Quadratic Privacy-Signaling Games and the MMSE Information Bottleneck Problem for Gaussian Sources.

153. Distributed Learning With Dependent Samples.

154. On the Capacity-Achieving Input of Channels With Phase Quantization.

155. Proof of Mirror Theory for ξ max = 2.

156. Revisiting Cryptanalysis on ChaCha From Crypto 2020 and Eurocrypt 2021.

157. Streaming Codes for Variable-Size Messages.

158. The Secret Arithmetic of Patterns: A General Method for Designing Constrained Codes Based on Lexicographic Indexing.

159. Optimal Age Over Erasure Channels.

160. The Subfield Codes and Subfield Subcodes of a Family of MDS Codes.

161. Approximate Unitary Designs Give Rise to Quantum Channels With Super Additive Classical Holevo Capacity.

162. Ouroboros: An Efficient and Provably Secure KEM Family.

163. Recovering or Testing Extended-Affine Equivalence.

164. Decoding Nonbinary LDPC Codes via Proximal-ADMM Approach.

165. Some Upper Bounds and Exact Values on Linear Complexities Over F M of Sidelnikov Sequences for M = 2 and 3.

166. Enumeration of Extended Irreducible Binary Goppa Codes.

167. Settling the Sharp Reconstruction Thresholds of Random Graph Matching.

168. Q -Ary Non-Overlapping Codes: A Generating Function Approach.

169. Coordinate-Ordering-Free Upper Bounds for Linear Insertion-Deletion Codes.

170. Entropic Compressibility of Lévy Processes.

171. A Framework for Characterizing the Value of Information in Hidden Markov Models.

172. Storage-Computation-Communication Tradeoff in Distributed Computing: Fundamental Limits and Complexity.

173. The Price of Competition: Effect Size Heterogeneity Matters in High Dimensions.

174. Sparse and Balanced MDS Codes Over Small Fields.

175. Tsallis and Rényi Deformations Linked via a New λ-Duality.

176. Convex Formulation of Overparameterized Deep Neural Networks.

177. Macroscopic Analysis of Vector Approximate Message Passing in a Model-Mismatched Setting.

178. Statistically Robust, Risk-Averse Best Arm Identification in Multi-Armed Bandits.

179. The Differential Spectrum of the Power Mapping x p n −3.

180. Source Coding When the Side Information May Be Delayed.

183. 2008 IEEE Information Theory Society Paper Award.

184. 2006 IEEE Communications Society and Information Theory Society Joint Paper Award.

185. 2005 IEEE Communications Society and Information Theory Society Joint Paper Award.

186. 2005 Information Theory Society Paper Award.

187. 2004 IEEE Information Theory Society Paper Award.

189. A Novel Representation for Permutations.

190. Capacity Limits of Full-Duplex Cellular Network.

191. Spectral Method for Phase Retrieval: An Expectation Propagation Perspective.

192. Gaussian 1-2-1 Networks: Capacity Results for mmWave Communications.

193. 2007 IEEE Information Theory Society Paper Award.

194. Strong Secrecy of Arbitrarily Varying Wiretap Channel With Constraints.

195. A Subfield-Based Construction of Optimal Linear Codes Over Finite Fields.

196. On the Duals of Generalized Bent Functions.

197. Constructing Orientable Sequences.

198. Polar Codes for Quantum Reading.

199. Guessing Based on Compressed Side Information.

200. Estimation and Testing on Independent Not Identically Distributed Observations Based on Rényi’s Pseudodistances.