Search

Showing total 7,373 results

Search Constraints

Start Over You searched for: Search Limiters Full Text Remove constraint Search Limiters: Full Text Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Journal ieee transactions on information theory Remove constraint Journal: ieee transactions on information theory
7,373 results

Search Results

201. A Single-Shot Approach to Lossy Source Coding Under Logarithmic Loss.

202. Construction of Sequences With High Nonlinear Complexity From Function Fields.

203. Sampling and Distortion Tradeoffs for Indirect Source Retrieval.

204. The Dirty MIMO Multiple-Access Channel.

205. Asymptotically Equivalent Sequences of Matrices and Capacity of a Discrete-Time Gaussian MIMO Channel With Memory.

207. Capacity Characterization for State-Dependent Gaussian Channel With a Helper

208. Some Punctured Codes of Several Families of Binary Linear Codes.

209. Cooperative Multiple-Access Channels With Distributed State Information.

210. Shortened Linear Codes Over Finite Fields.

211. Reconstruction of Strings From Their Substrings Spectrum.

212. Transmission of a Bit Over a Discrete Poisson Channel With Memory.

213. Binary Linear Codes With Few Weights From Two-to-One Functions.

214. On CCZ-Equivalence of the Inverse Function.

215. State-Dependent Symbol-Wise Decode and Forward Codes Over Multihop Relay Networks.

216. Sequential Transmission Over Binary Asymmetric Channels With Feedback.

217. Compressed Sensing in the Presence of Speckle Noise.

218. Stability and Risk Bounds of Iterative Hard Thresholding.

219. Uncertainty-of-Information Scheduling: A Restless Multiarmed Bandit Framework.

220. On the Fundamental Limits of Device-to-Device Private Caching Under Uncoded Cache Placement and User Collusion.

221. Revisiting Cryptanalysis on ChaCha From Crypto 2020 and Eurocrypt 2021.

222. Generalized Nearest Neighbor Decoding.

223. A Unifying Framework to Construct QC-LDPC Tanner Graphs of Desired Girth.

224. Fundamental Limits for Privacy-Preserving Biometric Identification Systems That Support Authentication.

226. State-Dependent Parallel Gaussian Networks With a Common State-Cognitive Helper

227. Sublinear-Time Non-Adaptive Group Testing With O(k log n) Tests via Bit-Mixing Coding.

228. Capacity Limits of Full-Duplex Cellular Network.

235. Precoding and Scheduling for AoI Minimization in MIMO Broadcast Channels.

236. Entropic Compressibility of Lévy Processes.

237. A Galois Connection Approach to Wei-Type Duality Theorems.

238. Some Upper Bounds and Exact Values on Linear Complexities Over F M of Sidelnikov Sequences for M = 2 and 3.

239. Improved Bounds for (b, k)-Hashing.

240. Enumeration of Extended Irreducible Binary Goppa Codes.

241. Convex Formulation of Overparameterized Deep Neural Networks.

242. Statistically Robust, Risk-Averse Best Arm Identification in Multi-Armed Bandits.

243. Phase Transitions in Recovery of Structured Signals From Corrupted Measurements.

244. Strong Secrecy of Arbitrarily Varying Wiretap Channel With Constraints.

245. Constructing Orientable Sequences.

246. Biprojective Almost Perfect Nonlinear Functions.

247. Construction of Optimal (r , δ)-Locally Recoverable Codes and Connection With Graph Theory.

248. Infinite Families of Linear Codes Supporting More t -Designs.

249. Convertible Codes: Enabling Efficient Conversion of Coded Data in Distributed Storage.

250. On Linear Codes With One-Dimensional Euclidean Hull and Their Applications to EAQECCs.