Search

Showing total 724 results

Search Constraints

Start Over You searched for: Topic receivers Remove constraint Topic: receivers Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Publication Type Academic Journals Remove constraint Publication Type: Academic Journals Journal ieee transactions on information theory Remove constraint Journal: ieee transactions on information theory
724 results

Search Results

51. List-Decodable Zero-Rate Codes.

52. Generalized Compute-Compress-and-Forward.

53. Coherent Multiple-Antenna Block-Fading Channels at Finite Blocklength.

54. Plausible Deniability Over Broadcast Channels.

55. Distortion Bounds for Source Broadcast Problems.

56. On the Combinatorial Version of the Slepian–Wolf Problem.

57. Topological Interference Management With Confidential Messages.

58. Quadratic Privacy-Signaling Games and the MMSE Information Bottleneck Problem for Gaussian Sources.

59. On the Capacity-Achieving Input of Channels With Phase Quantization.

60. Optimal Age Over Erasure Channels.

61. Fundamental Limits of Communication With Low Probability of Detection.

62. Multicast Network Coding and Field Sizes.

63. Perfect Output Feedback in the Two-User Decentralized Interference Channel.

64. Coding Theorems for Noisy Permutation Channels.

65. Sign-Compute-Resolve for Tree Splitting Random Access.

66. Approximate Capacity Region of the Two-User Gaussian Interference Channel With Noisy Channel-Output Feedback.

67. A Relay Can Increase Degrees of Freedom in Bursty Interference Networks.

68. Vector Network Coding Based on Subspace Codes Outperforms Scalar Linear Network Coding.

69. Generalized HARQ Protocols with Delayed Channel State Information and Average Latency Constraints.

70. Index Coding With Erroneous Side Information.

71. Optimal Finite-Length and Asymptotic Index Codes for Five or Fewer Receivers.

72. Individual Secrecy for the Broadcast Channel.

73. A Framework for Characterizing the Value of Information in Hidden Markov Models.

74. The Langberg-Médard Multiple Unicast Conjecture for 3-Pair Networks.

75. Capacity-Achieving Feedback Schemes for Gaussian Finite-State Markov Channels With Channel State Information.

76. Secure Network Coding With Erasures and Feedback.

77. On the Two-User Interference Channel With Lack of Knowledge of the Interference Codebook at One Receiver.

78. Capacity of Distributed Opportunistic Scheduling in Nonhomogeneous Networks.

79. Layered Coding for the Interference Channel With a Relay.

80. The Capacity Region of Two-Receiver Multiple-Input Broadcast Packet Erasure Channels With Channel Output Feedback.

81. On Network Functional Compression.

82. On Secure Network Coding for Multiple Unicast Traffic.

83. Novel Outer Bounds and Capacity Results for the Interference Channel With Conferencing Receivers.

84. Quantum Reading Capacity: General Definition and Bounds.

85. On Function Computation With Privacy and Secrecy Constraints.

86. Individual Secrecy for Broadcast Channels With Receiver Side Information.

87. Simplified Erasure/List Decoding.

88. Graph Guessing Games and Non-Shannon Information Inequalities.

89. Fundamental Limits of Cache-Aided Wireless BC: Interplay of Coded-Caching and CSIT Feedback.

90. Gaussian Multiple Access via Compute-and-Forward.

91. Secure Degrees of Freedom of One-Hop Wireless Networks With No Eavesdropper CSIT.

92. Reliable Communications Across Parallel Asynchronous Channels With Arbitrary Skews.

93. An Ergodic Theory of Binary Operations—Part II: Applications to Polarization.

94. Dynamic Spectrum Management: A Complete Complexity Characterization.

95. Secure Degrees of Freedom of the Gaussian Diamond-Wiretap Channel.

96. Distributed Structure: Joint Expurgation for the Multiple-Access Channel.

97. Achievable DoF-Delay Trade-Offs for the $K$ -user MIMO Interference Channel With Delayed CSIT.

98. On the Symmetric $K$ -User Interference Channels With Limited Feedback.

99. Distributed Function Computation Over a Rooted Directed Tree.

100. General Capacity Region for the Fully Connected Three-Node Packet Erasure Network.