Search

Showing total 3,138 results

Search Constraints

Start Over You searched for: Search Limiters Full Text Remove constraint Search Limiters: Full Text Topic coding theory Remove constraint Topic: coding theory Journal ieee transactions on information theory Remove constraint Journal: ieee transactions on information theory
3,138 results

Search Results

1. Secret Writing on Dirty Paper: A Deterministic View.

2. Near-Capacity Dirty-Paper Code Design: A Source-Channel Coding Approach.

3. A Close -to-Capacity Dirty Paper Coding Scheme.

4. Relative Generalized Hamming Weights of One-Point Algebraic Geometric Codes<xref ref-type="fn" rid="fn1">1</xref><fn id="fn1"><label>1</label><p>The paper is registered to the ORCID of Olav Geil. For more details please visit ...

5. Dirty-Paper Coding for the Gaussian Multiaccess Channel With Conferencing.

6. Two remarks on a paper by Moreno and Kumar [binary Reed-Muller codes]

7. Localized Error Correction in Projective Space.

8. Comments and Additions to Recent Papers on New Convolutional Codes.

9. The Effect of Local Decodability Constraints on Variable-Length Compression.

10. 2005 Information Theory Society Paper Award.

11. Universal Tree Source Coding Using Grammar-Based Compression.

12. Fundamental Limits of Distributed Linear Encoding.

13. Optimal Pliable Fractional Repetition Codes That are Locally Recoverable: A Bipartite Graph Approach.

14. State-Dependent Gaussian Interference Channels: Can State Be Fully Canceled?

15. Optimum Overflow Thresholds in Variable-Length Source Coding Allowing Non-Vanishing Error Probability.

16. Cyclic Bent Functions and Their Applications in Sequences.

17. Iterative Message Passing Algorithm for Vertex-Disjoint Shortest Paths.

18. Improved Bounds on Lossless Source Coding and Guessing Moments via Rényi Measures.

19. The Repair Problem for Reed–Solomon Codes: Optimal Repair of Single and Multiple Erasures With Almost Optimal Node Size.

20. Nearly Optimal Constructions of PIR and Batch Codes.

21. Simultaneous Partial Inverses and Decoding Interleaved Reed–Solomon Codes.

22. Forest Learning From Data and its Universal Coding.

23. Encoder Blind Combinatorial Compressed Sensing.

24. Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Save-and-Transmit and Best-Effort.

25. A Novel Application of Boolean Functions With High Algebraic Immunity in Minimal Codes.

26. Coordination in Distributed Networks via Coded Actions With Application to Power Control.

27. Asymptotics of Input-Constrained Erasure Channel Capacity.

28. A Single-Shot Approach to Lossy Source Coding Under Logarithmic Loss.

29. Convertible Codes: Enabling Efficient Conversion of Coded Data in Distributed Storage.

30. Shortened Linear Codes From APN and PN Functions.

31. List Decodability of Symbol-Pair Codes.

32. Secrecy Capacity-Memory Tradeoff of Erasure Broadcast Channels.

33. The Capacity of Online (Causal) $q$ -Ary Error-Erasure Channels.

34. Constructions of Partial MDS Codes Over Small Fields.

35. Explicit Capacity Approaching Coding for Interactive Communication.

36. MDS Code Constructions With Small Sub-Packetization and Near-Optimal Repair Bandwidth.

37. Near-Optimal Codes for Information Embedding in Gray-Scale Signals.

38. State Amplification Subject to Masking Constraints.

39. Two or Three Weight Linear Codes From Non-Weakly Regular Bent Functions.

40. Source and Channel Polarization Over Finite Fields and Reed–Solomon Matrices.

41. Fast-Decodable MIDO Codes With Large Coding Gain.

42. Optimization of Heterogeneous Coded Caching.

43. Asymptotic Gilbert–Varshamov Bound on Frequency Hopping Sequences.

44. The Single-Uniprior Index-Coding Problem: The Single-Sender Case and the Multi-Sender Extension.

45. Alignment-Based Network Coding for Two-Unicast-Z Networks.

46. Multidimensional Manhattan Sampling and Reconstruction.

47. A Numerical Study on the Wiretap Network With a Simple Network Topology.

48. Codes for Partially Stuck-At Memory Cells.

49. A Class of Two-Weight and Three-Weight Codes and Their Applications in Secret Sharing.

50. Weak Flip Codes and their Optimality on the Binary Erasure Channel.