Search

Showing total 420 results

Search Constraints

Start Over You searched for: Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Topic decoding algorithms Remove constraint Topic: decoding algorithms Language english Remove constraint Language: english Journal ieee transactions on information theory Remove constraint Journal: ieee transactions on information theory
420 results

Search Results

1. On the Optimal Fronthaul Compression and Decoding Strategies for Uplink Cloud Radio Access Networks.

2. Encoder Blind Combinatorial Compressed Sensing.

3. A Single-Shot Approach to Lossy Source Coding Under Logarithmic Loss.

4. Base Field Extension of AG Codes for Decoding.

5. List Decodability of Symbol-Pair Codes.

6. Reconstruction of Sequences Over Non-Identical Channels.

7. Learning Immune-Defectives Graph Through Group Tests.

8. Identification Rate, Search and Memory Complexity Tradeoff: Fundamental Limits.

9. List Decoding for Arbitrarily Varying Multiple Access Channel Revisited: List Configuration and Symmetrizability.

10. The q -Ary Antiprimitive BCH Codes.

11. A Numerical Study on the Wiretap Network With a Simple Network Topology.

12. Decoding of Dual-Containing Codes From Hermitian Tower and Applications.

13. On Codes Achieving Zero Error Capacities in Limited Magnitude Error Channels.

14. Narrow-Sense BCH Codes Over \mathrm GF(q) With Length n=\frac q^m-1q-1.

15. Feedback-Based Online Network Coding.

16. Criss-Cross Insertion and Deletion Correcting Codes.

17. Polar Coding for Channels With Deletions.

18. Prefactor Reduction of the Guruswami–Sudan Interpolation Step.

19. On the Broadcast Capacity Scaling of Large Wireless Networks at Low SNR.

20. Geometric Approach to b-Symbol Hamming Weights of Cyclic Codes.

21. Reed–Muller Codes: Theory and Algorithms.

22. A Probabilistic Peeling Decoder to Efficiently Analyze Generalized LDPC Codes Over the BEC.

23. LDPC Codes Over the $q$ -ary Multi-Bit Channel.

24. Verifiably Multiplicative Secret Sharing.

25. Multilevel LDPC Lattices With Efficient Encoding and Decoding and a Generalization of Construction $\text{D}'$.

26. Second-Order Asymptotics for Communication Under Strong Asynchronism.

27. A Characterization of Guesswork on Swiftly Tilting Curves.

28. On the Uncertainty of Information Retrieval in Associative Memories.

29. Local Rank Modulation for Flash Memories.

30. Collaborative Information Bottleneck.

31. The Capacity of Private Information Retrieval from Byzantine and Colluding Databases.

32. Universal Communication—Part II: Channels With Memory.

33. Codes for Correcting Localized Deletions.

34. Ouroboros: An Efficient and Provably Secure KEM Family.

35. Decoding Nonbinary LDPC Codes via Proximal-ADMM Approach.

36. Semiconstrained Systems.

37. Causal Relay Networks.

38. Output Constrained Lossy Source Coding With Limited Common Randomness.

39. Fast Decoding of Dual Multipoint Codes From Algebraic Curves Up to the Kirfel–Pellikaan Bound.

40. Approaching Capacity at High Rates With Iterative Hard-Decision Decoding.

41. Individual Secrecy for the Broadcast Channel.

42. Algebraic Decoding of Some Quadratic Residue Codes With Weak Locators.

43. Deception With Side Information in Biometric Authentication Systems.

44. Low Rank Parity Check Codes: New Decoding Algorithms and Applications to Cryptography.

45. On Decoding Binary Quasi-Reversible BCH Codes.

46. Near-Optimal Sparsity-Constrained Group Testing: Improved Bounds and Algorithms.

47. Capacity Bounds and Sum Rate Capacities of a Class of Discrete Memoryless Interference Channels.

48. On the VLSI Energy Complexity of LDPC Decoder Circuits.

49. Burst-Erasure Correcting Codes With Optimal Average Delay.

50. Efficiently Decoding Reed–Muller Codes From Random Errors.