Search

Showing total 7,277 results

Search Constraints

Start Over You searched for: Search Limiters Full Text Remove constraint Search Limiters: Full Text Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Journal ieee transactions on information theory Remove constraint Journal: ieee transactions on information theory
7,277 results

Search Results

151. Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Save-and-Transmit and Best-Effort.

152. Construction of Asymptotically Good Locally Repairable Codes via Automorphism Groups of Function Fields.

153. Routeing Properties in a Gibbsian Model for Highly Dense Multihop Networks.

154. Asymptotic Analysis of RZF in Large-Scale MU-MIMO Systems Over Rician Channels.

155. Improved Support Recovery in Universal 1-bit Compressed Sensing

156. Universal Graph Compression: Stochastic Block Models

157. On a Class of Time-Varying Gaussian ISI Channels

158. Coded Caching With Private Demands and Caches

159. ABS+ Polar Codes: Exploiting More Linear Transforms on Adjacent Bits

160. Minimum Feedback for Collision-Free Scheduling in Massive Random Access.

161. Bounds on the Nonlinearity of Differentially Uniform Functions by Means of Their Image Set Size, and on Their Distance to Affine Functions.

162. Uplink-Downlink Duality Between Multiple-Access and Broadcast Channels With Compressing Relays.

163. Gaussian State Amplification with Noisy Observations

164. On Zero-Error Capacity of Binary Channels With One Memory.

165. Beta–Beta Bounds: Finite-Blocklength Analog of the Golden Formula.

166. On the Trade-Off Between Bit Depth and Number of Samples for a Basic Approach to Structured Signal Recovery From $b$ -Bit Quantized Linear Measurements.

167. Optimal Compression for Two-Field Entries in Fixed-Width Memories.

168. Coordination in Distributed Networks via Coded Actions With Application to Power Control.

169. Lattice Codes Achieve the Capacity of Common Message Gaussian Broadcast Channels With Coded Side Information.

170. Shared Rate Process for Mobile Users in Poisson Networks and Applications.

171. Information-Theoretically Secure Erasure Codes for Distributed Storage.

172. Cluster-Seeking James–Stein Estimators.

173. Converse Bounds on Modulation-Estimation Performance for the Gaussian Multiple-Access Channel.

174. Gaussian Distributions on Riemannian Symmetric Spaces: Statistical Learning With Structured Covariance Matrices.

175. Asymptotics of Input-Constrained Erasure Channel Capacity.

176. A Single-Shot Approach to Lossy Source Coding Under Logarithmic Loss.

177. Construction of Sequences With High Nonlinear Complexity From Function Fields.

178. Sampling and Distortion Tradeoffs for Indirect Source Retrieval.

179. Capacity Characterization for State-Dependent Gaussian Channel With a Helper

180. A Novel Application of Boolean Functions With High Algebraic Immunity in Minimal Codes.

181. A Signal-Space Distance Measure for Nondispersive Optical Fiber.

182. Cooperative Multiple-Access Channels With Distributed State Information.

183. Some Punctured Codes of Several Families of Binary Linear Codes.

184. Shortened Linear Codes Over Finite Fields.

185. On the Convergence of Orthogonal/Vector AMP: Long-Memory Message-Passing Strategy.

186. Encoder Blind Combinatorial Compressed Sensing.

187. Memory AMP.

188. State-Dependent Symbol-Wise Decode and Forward Codes Over Multihop Relay Networks.

189. Sequential Transmission Over Binary Asymmetric Channels With Feedback.

190. On the Relation Between Identifiability, Differential Privacy, and Mutual-Information Privacy.

193. State-Dependent Parallel Gaussian Networks With a Common State-Cognitive Helper

194. Reconstruction of Strings From Their Substrings Spectrum.

195. Transmission of a Bit Over a Discrete Poisson Channel With Memory.

196. Binary Linear Codes With Few Weights From Two-to-One Functions.

197. On CCZ-Equivalence of the Inverse Function.