Search

Showing total 88 results
88 results

Search Results

1. On the Capacity of the Carbon Copy onto Dirty Paper Channel.

2. Dirty-Paper Coding for the Gaussian Multiaccess Channel With Conferencing.

3. Writing on Fading Paper, Dirty Tape With Little Ink: Wideband Limits for Causal Transmitter CSI.

4. Gaussian Broadcast Channels With Intermittent Connectivity and Hybrid State Information at the Transmitter.

5. The Dirty MIMO Multiple-Access Channel.

6. Topological Interference Management With Confidential Messages.

7. Massive Coded-NOMA for Low-Capacity Channels: A Low-Complexity Recursive Approach.

8. The Secrecy Capacity Region of the Gaussian MIMO Broadcast Channel.

9. State-Dependent Interference Channel With Correlated States.

10. Gaussian Multiple and Random Access Channels: Finite-Blocklength Analysis.

11. Systematic Polar Coded Modulation for Informed Receivers.

12. Selective Encoding Policies for Maximizing Information Freshness.

13. Cache-Aided Interference Channels.

14. Capacity Characterization for State-Dependent Gaussian Channel With a Helper.

15. Boundary of the Gaussian Han-Kobayashi Rate Region.

16. AMC and HARQ: How to Increase the Throughput.

17. Opportunistic Topological Interference Management.

18. Rate-Splitting for Multi-Antenna Non-Orthogonal Unicast and Multicast Transmission: Spectral and Energy Efficiency Analysis.

19. Stringently Delay-Constrained Group Decoding and Adaptive Transmission for Multi-User Interference Channel.

20. Broadcast Approach to Multiple Access With Local CSIT.

21. Fast Beam Alignment for Millimeter Wave Communications: A Sparse Encoding and Phaseless Decoding Approach.

22. Feedback Coding Schemes for the Broadcast Channel With Mutual Secrecy Requirement at the Receivers.

23. Capacity of Gaussian Many-Access Channels.

24. State Amplification Subject to Masking Constraints.

25. On the Capacity of the Two-User Symmetric Interference Channel With Transmitter Cooperation and Secrecy Constraints.

26. A Multi-Layer Encoding and Decoding Strategy for Binary Erasure Channel.

27. Interference Mitigation in Large-Scale Multiuser Molecular Communication.

28. The Wiretap Channel With Generalized Feedback: Secure Communication and Key Generation.

29. Layered Division Multiplexing With Distributed Multiple-Input Single-Output Schemes.

30. Fountain-Coding-Based Secure Communications Exploiting Outage Prediction and Limited Feedback.

31. Generalized Compute-Compress-and-Forward.

32. Performance Analysis and Improvement of Online Fountain Codes.

33. Parity-Check Coding Based on Genetic Circuits for Engineered Molecular Communication Between Biological Cells.

34. Stable Throughput Region of the Two-User Broadcast Channel.

35. Multiaccess Communication via a Broadcast Approach Adapted to the Multiuser Channel.

36. State-Dependent Gaussian Interference Channels: Can State Be Fully Canceled?

37. Approximate Capacity of the Dirty Multiple-Access Channel With Partial State Information at the Encoders.

38. Layered Coding for the Interference Channel With a Relay.

39. ECRB-Based Optimal Parameter Encoding Under Secrecy Constraints.

40. Approximate Capacity Region of the Two-User Gaussian Interference Channel With Noisy Channel-Output Feedback.

41. Achievable Rates for Discrete Memoryless Multicast Networks With and Without Feedback.

42. Retroactive Antijamming for MISO Broadcast Channels.

43. Providing Secrecy With Structured Codes: Two-User Gaussian Channels.

44. On the Capacity of the K-User Cyclic Gaussian Interference Channel.

45. Capacity Results for the Multicast Cognitive Interference Channel.

46. Individual Secrecy for Broadcast Channels With Receiver Side Information.

47. Simplified Erasure/List Decoding.

48. How to Boost the Throughput of HARQ With Off-the-Shelf Codes.

49. Adaptive Cross-Packet HARQ.

50. Gaussian Multiple Access via Compute-and-Forward.