Search

Showing total 1,185 results

Search Constraints

Start Over You searched for: Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Topic encoding Remove constraint Topic: encoding Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Publication Type Academic Journals Remove constraint Publication Type: Academic Journals Journal ieee transactions on information theory Remove constraint Journal: ieee transactions on information theory
1,185 results

Search Results

1. Torn-Paper Coding.

2. On the Capacity of the Carbon Copy onto Dirty Paper Channel.

3. On the Dispersions of the Gel’fand–Pinsker Channel and Dirty Paper Coding.

4. Coding With Noiseless Feedback Over the Z-Channel.

5. Generalized Compression Strategy for the Downlink Cloud Radio Access Network.

6. Fundamental Limits of Distributed Linear Encoding.

7. State-Dependent Interference Channel With Correlated States.

8. Gaussian Broadcast Channels With Intermittent Connectivity and Hybrid State Information at the Transmitter.

9. Almost Optimal Construction of Functional Batch Codes Using Extended Simplex Codes.

10. State-Dependent Gaussian Interference Channels: Can State Be Fully Canceled?

11. Explicit Constructions of MSR Codes for Clustered Distributed Storage: The Rack-Aware Storage Model.

12. On the Sub-Packetization Size and the Repair Bandwidth of Reed-Solomon Codes.

13. Polar Codes for Quantum Reading.

14. Secret-Key Generation in Many-to-One Networks: An Integrated Game-Theoretic and Information-Theoretic Approach.

15. Wiretap Channels: Nonasymptotic Fundamental Limits.

16. The Repair Problem for Reed–Solomon Codes: Optimal Repair of Single and Multiple Erasures With Almost Optimal Node Size.

17. Message Transmission Over Classical Quantum Channels With a Jammer With Side Information: Message Transmission Capacity and Resources.

18. State-Dependent Gaussian Multiple Access Channels: New Outer Bounds and Capacity Results.

19. Forest Learning From Data and its Universal Coding.

20. Distributed Linearly Separable Computation.

21. From Random Matrix Theory to Coding Theory: Volume of a Metric Ball in Unitary Group.

22. Random Coding Error Exponents for the Two-User Interference Channel.

23. Capacity Characterization for State-Dependent Gaussian Channel With a Helper.

24. Encoder Blind Combinatorial Compressed Sensing.

25. Coded Caching With Distributed Storage.

26. Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Save-and-Transmit and Best-Effort.

27. Uplink-Downlink Duality Between Multiple-Access and Broadcast Channels With Compressing Relays.

28. Lattice Codes Achieve the Capacity of Common Message Gaussian Broadcast Channels With Coded Side Information.

29. The Dirty MIMO Multiple-Access Channel.

30. Reconstruction of Strings From Their Substrings Spectrum.

31. Transmission of a Bit Over a Discrete Poisson Channel With Memory.

32. State-Dependent Symbol-Wise Decode and Forward Codes Over Multihop Relay Networks.

33. Sequential Transmission Over Binary Asymmetric Channels With Feedback.

34. Sublinear-Time Non-Adaptive Group Testing With O(k log n) Tests via Bit-Mixing Coding.

35. Strong Secrecy of Arbitrarily Varying Wiretap Channel With Constraints.

36. Constructing Orientable Sequences.

37. Construction of Optimal (r , δ)-Locally Recoverable Codes and Connection With Graph Theory.

38. Convertible Codes: Enabling Efficient Conversion of Coded Data in Distributed Storage.

39. On the Decoding Performance of Spatially Coupled LDPC Codes With Sub-Block Access.

40. List Decodability of Symbol-Pair Codes.

41. Secrecy Capacity-Memory Tradeoff of Erasure Broadcast Channels.

42. Gaussian Intersymbol Interference Channels With Mismatch.

43. The Capacity of Online (Causal) $q$ -Ary Error-Erasure Channels.

44. Cache-Aided Interference Channels.

45. Finite-Field Matrix Channels for Network Coding.

46. Converse Results for the Downlink Multicell Processing With Finite Backhaul Capacity.

47. Centralized Repair of Multiple Node Failures With Applications to Communication Efficient Secret Sharing.

48. Comments on Cut-Set Bounds on Network Function Computation.

49. An Ergodic Theory of Binary Operations—Part I: Key Properties.

50. List Decoding for Arbitrarily Varying Multiple Access Channel Revisited: List Configuration and Symmetrizability.