Search

Showing total 9,455 results

Search Constraints

Start Over You searched for: Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Language english Remove constraint Language: english Journal ieee transactions on information theory Remove constraint Journal: ieee transactions on information theory
9,455 results

Search Results

301. Zero-Error Capacity Regions of Noisy Networks.

302. On Linear Codes With One-Dimensional Euclidean Hull and Their Applications to EAQECCs.

303. Universal Consistency of Deep Convolutional Neural Networks.

304. Optimal Anticodes, MSRD Codes, and Generalized Weights in the Sum-Rank Metric.

305. The Langberg-Médard Multiple Unicast Conjecture for 3-Pair Networks.

306. Multiple Criss-Cross Insertion and Deletion Correcting Codes.

307. Optimal High-Order Tensor SVD via Tensor-Train Orthogonal Iteration.

308. On the Decoding Performance of Spatially Coupled LDPC Codes With Sub-Block Access.

309. Recoverable Systems.

310. Learning Quantum Circuits of Some T Gates.

311. On the Capacity of MISO Optical Intensity Channels With Per-Antenna Intensity Constraints.

312. Optimal Distributed Composite Testing in High-Dimensional Gaussian Models With 1-Bit Communication.

313. CRC-Aided List Decoding of Convolutional Codes in the Short Blocklength Regime.

314. Base Field Extension of AG Codes for Decoding.

315. Closed-Form Characterization of the MGF of AoI in Energy Harvesting Status Update Systems.

316. Transmit Correlation Diversity: Generalization, New Techniques, and Improved Bounds.

317. Hierarchical Coding for Cloud Storage: Topology-Adaptivity, Scalability, and Flexibility.

318. Estimation of a Function of Low Local Dimensionality by Deep Neural Networks.

319. A Class of Narrow-Sense BCH Codes.

320. The Poisson Channel With Varying Dark Current Known to the Transmitter.

321. Latency Analysis for Distributed Coded Storage Systems.

322. Generalized Subspace Subcodes With Application in Cryptology.

323. The Subfield Codes of Ovoid Codes.

324. Blind Group Testing.

325. List Decodability of Symbol-Pair Codes.

326. Secrecy Capacity-Memory Tradeoff of Erasure Broadcast Channels.

327. Secret-Key Generation in Many-to-One Networks: An Integrated Game-Theoretic and Information-Theoretic Approach.

328. Explicit Construction of Optimal Locally Recoverable Codes of Distance 5 and 6 via Binary Constant Weight Codes.

329. Gaussian Intersymbol Interference Channels With Mismatch.

330. BER-Improved Quantization of Source-to-Relay Link SNR for Cooperative Beamforming: A Fixed Point Theory Approach.

331. State-Dependent Interference Channel With Correlated States.

332. The Capacity of Online (Causal) $q$ -Ary Error-Erasure Channels.

333. Improved Upper Bound on the Network Function Computing Capacity.

334. On the Capacity of the Peak Power Constrained Vector Gaussian Channel: An Estimation Theoretic Perspective.

335. Superadditivity in Trade-Off Capacities of Quantum Channels.

336. The Repair Problem for Reed–Solomon Codes: Optimal Repair of Single and Multiple Erasures With Almost Optimal Node Size.

337. Message Transmission Over Classical Quantum Channels With a Jammer With Side Information: Message Transmission Capacity and Resources.

338. Network Estimation From Point Process Data.

339. MIMO Gaussian Broadcast Channels With Common, Private, and Confidential Messages.

340. Structured Signal Recovery From Quadratic Measurements: Breaking Sample Complexity Barriers via Nonconvex Optimization.

341. On the Uncertainty of Information Retrieval in Associative Memories.

342. Cache-Aided Interference Channels.

343. Asymptotic Optimality of Mixture Rules for Detecting Changes in General Stochastic Models.

344. Finite-Field Matrix Channels for Network Coding.

345. On $\sigma$ -LCD Codes.

346. Factorizations of Binomial Polynomials and Enumerations of LCD and Self-Dual Constacyclic Codes.

347. Optimal Pliable Fractional Repetition Codes That are Locally Recoverable: A Bipartite Graph Approach.

348. Interference Mitigation via Relaying.

349. Greedy–Merge Degrading has Optimal Power-Law.

350. On the Structure and Distances of Repeated-Root Constacyclic Codes of Prime Power Lengths Over Finite Commutative Chain Rings.