Search

Showing total 247 results

Search Constraints

Start Over You searched for: Topic receivers Remove constraint Topic: receivers Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Journal ieee transactions on information theory Remove constraint Journal: ieee transactions on information theory
247 results

Search Results

151. Secure Degrees of Freedom of One-Hop Wireless Networks With No Eavesdropper CSIT.

152. Achieving Secrecy Capacity of the Wiretap Channel and Broadcast Channel With a Confidential Component.

153. An Ergodic Theory of Binary Operations—Part II: Applications to Polarization.

154. Expanded GDoF-optimality Regime of Treating Interference as Noise in the $M\times 2$ X-Channel.

155. Distributed Multicast Tree Construction in Wireless Sensor Networks.

156. Secure Degrees of Freedom of the Gaussian Diamond-Wiretap Channel.

157. Distributed Structure: Joint Expurgation for the Multiple-Access Channel.

158. On the Symmetric $K$ -User Interference Channels With Limited Feedback.

159. Optimal Cognitive Access and Packet Selection Under a Primary ARQ Process via Chain Decoding.

160. On Base Field of Linear Network Coding.

161. Distributed Function Computation Over a Rooted Directed Tree.

162. On the Multiple Access Channel With Asynchronous Cognition.

163. Genie Chains: Exploring Outer Bounds on the Degrees of Freedom of MIMO Interference Networks.

164. General Capacity Region for the Fully Connected Three-Node Packet Erasure Network.

165. A Receiver-centric Approach to Interference Management: Fairness and Outage Optimization.

166. Aligned Image Sets Under Channel Uncertainty: Settling Conjectures on the Collapse of Degrees of Freedom Under Finite Precision CSIT.

167. Capacity and Rate Regions of a Class of Broadcast Interference Channels.

168. Expanding the Compute-and-Forward Framework: Unequal Powers, Signal Levels, and Multiple Linear Combinations.

169. Multicoding Schemes for Interference Channels.

170. On the Optimality of Treating Interference as Noise: Compound Interference Networks.

171. Counterexample to the Generalized Belfiore–Solé Secrecy Function Conjecture for $l$ -Modular Lattices.

172. Fountain Codes With Nonuniform Selection Distributions Through Feedback.

173. Subblock-Constrained Codes for Real-Time Simultaneous Energy and Information Transfer.

174. Linear Network Coding, Linear Index Coding and Representable Discrete Polymatroids.

175. Degrees of Freedom in Vector Interference Channels.

176. The Arbitrarily Varying Wiretap Channel—Secret Randomness, Stability, and Super-Activation.

177. Fundamental Limits of Communication With Low Probability of Detection.

178. A Simple Proof for the Optimality of Randomized Posterior Matching.

179. Overhead Performance Tradeoffs—A Resource Allocation Perspective.

180. Bounds on Entanglement Distillation and Secret Key Agreement for Quantum Broadcast Channels.

181. Linear Network Coding for Erasure Broadcast Channel With Feedback: Complexity and Algorithms.

182. On State-Dependent Degraded Broadcast Channels With Cooperation.

183. Computation in Multicast Networks: Function Alignment and Converse Theorems.

184. Coding Schemes With Rate-Limited Feedback That Improve Over the No Feedback Capacity for a Large Class of Broadcast Channels.

185. On the Age of Information in Status Update Systems With Packet Management.

186. Superposition Coding Is Almost Always Optimal for the Poisson Broadcast Channel.

187. An Achievable Rate Region for the Three-User Interference Channel Based on Coset Codes.

188. Sending a Bivariate Gaussian Source Over a Gaussian MAC With Unidirectional Conferencing Encoders.

189. A Lossy Source Coding Interpretation of Wyner’s Common Information.

190. A Model for Adversarial Wiretap Channels.

191. Optimum Transmission Through the Multiple-Antenna Gaussian Multiple Access Channel.

192. On the Gaussian Many-to-One X Channel.

193. (Sub-)Optimality of Treating Interference as Noise in the Cellular Uplink With Weak Interference.

194. Scalable Capacity Bounding Models for Wireless Networks.

195. Exploiting the $N$ -to-1 Mapping in Compress-and-Forward Relaying.

196. Coded Slotted ALOHA: A Graph-Based Method for Uncoordinated Multiple Access.

197. Spectral Efficiency of Random Time-Hopping CDMA.

198. Cellular Interference Alignment: Omni-Directional Antennas and Asymmetric Configurations.

199. Euclidean Information Theory of Networks.

200. Topological Interference Management With Transmitter Cooperation.