Search

Showing total 134 results

Search Constraints

Start Over You searched for: Search Limiters Full Text Remove constraint Search Limiters: Full Text Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Topic information retrieval Remove constraint Topic: information retrieval Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Journal ieee transactions on information theory Remove constraint Journal: ieee transactions on information theory
134 results

Search Results

1. Almost Optimal Construction of Functional Batch Codes Using Extended Simplex Codes.

2. PIR Array Codes With Optimal Virtual Server Rate.

3. Nearly Optimal Constructions of PIR and Batch Codes.

4. PIR Schemes With Small Download Complexity and Low Storage Requirements.

5. Sampling and Distortion Tradeoffs for Indirect Source Retrieval.

6. Structured Signal Recovery From Quadratic Measurements: Breaking Sample Complexity Barriers via Nonconvex Optimization.

7. Information Retrieval With Varying Number of Input Clues.

8. Error-Correcting Regenerating and Locally Repairable Codes via Rank-Metric Codes.

9. Private Proximity Retrieval Codes.

10. The Capacity of Private Information Retrieval from Byzantine and Colluding Databases.

11. Preserving Data-Privacy With Added Noises: Optimal Estimation and Privacy Analysis.

12. Optimal Schemes for Discrete Distribution Estimation Under Locally Differential Privacy.

13. Toward Optimal Secure Distributed Storage Systems With Exact Repair.

14. Bounds on the Size of Locally Recoverable Codes.

15. Private Information Retrieval in Graph-Based Replication Systems.

16. Fractional Repetition Codes With Optimal Reconstruction Degree.

17. Symmetric Private Information Retrieval from MDS Coded Distributed Storage With Non-Colluding and Colluding Servers.

18. Array Codes for Functional PIR and Batch Codes.

19. The MDS Queue: Analysing the Latency Performance of Erasure Codes.

20. Radical-Locator Polynomials and Row-Echelon Partial Syndrome Matrices With Applications to Decoding Cyclic Codes.

21. Private Information Retrieval From Transversal Designs.

22. Capacity-Achieving Private Information Retrieval Schemes From Uncoded Storage Constrained Servers With Low Sub-Packetization.

23. Asymmetric Leaky Private Information Retrieval.

24. On Levenshtein’s Channel and List Size in Information Retrieval.

25. Trace Reconstruction Problems in Computational Biology.

26. Codes in the Damerau Distance for Deletion and Adjacent Transposition Correction.

27. Phase Retrieval Without Small-Ball Probability Assumptions.

28. Duplication-Correcting Codes for Data Storage in the DNA of Living Organisms.

29. Support Recovery in the Phase Retrieval Model: Information-Theoretic Fundamental Limit.

30. X-Secure T-Private Information Retrieval From MDS Coded Storage With Byzantine and Unresponsive Servers.

31. Private Streaming With Convolutional Codes.

32. BASIC Codes: Low-Complexity Regenerating Codes for Distributed Storage Systems.

33. A Construction of New MDS Symbol-Pair Codes.

34. The Optimal Sub-Packetization of Linear Capacity-Achieving PIR Schemes With Colluding Servers.

35. A Combinatorial Methodology for Optimizing Non-Binary Graph-Based Codes: Theoretical Analysis and Applications in Data Storage.

36. The Storage Versus Repair-Bandwidth Trade-off for Clustered Storage Systems.

37. Locally Repairable Codes.

38. Irregular MDS Array Codes.

39. Batched Sparse Codes.

40. Explicit Maximally Recoverable Codes With Locality.

41. PhaseMax: Convex Phase Retrieval via Basis Pursuit.

42. Capacity of Quantum Private Information Retrieval With Colluding Servers.

43. On the Relationships Among Optimal Symmetric Fix-Free Codes.

45. Achieving Maximum Distance Separable Private Information Retrieval Capacity With Linear Codes.

46. Private Information Retrieval From Coded Storage Systems With Colluding, Byzantine, and Unresponsive Servers.

47. The Capacity of Private Computation.

48. The Capacity of Private Information Retrieval With Eavesdroppers.

49. Fundamental Limits of Cache-Aided Private Information Retrieval With Unknown and Uncoded Prefetching.

50. On PIR and Symmetric PIR From Colluding Databases With Adversaries and Eavesdroppers.