Search

Your search keyword '"Jafar, Syed A."' showing total 415 results

Search Constraints

Start Over You searched for: Author "Jafar, Syed A." Remove constraint Author: "Jafar, Syed A." Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
415 results on '"Jafar, Syed A."'

Search Results

1. Enhancing K-user Interference Alignment for Discrete Constellations via Learning

2. The Inverted 3-Sum Box: General Formulation and Quantum Information Theoretic Optimality

3. Blind Interference Alignment for MapReduce: Exploiting Side-information with Reconfigurable Antennas

8. Capacity of Summation over a Symmetric Quantum Erasure MAC with Partially Replicated Inputs

9. A Coding Scheme for Unresponsive and Byzantine Server Resilient Quantum $X$-Secure $T$-Private Information Retrieval

10. On the Capacity of Secure $K$-user Product Computation over a Quantum MAC

11. The Capacity of Classical Summation over a Quantum MAC with Arbitrarily Distributed Inputs and Entanglements

12. Quantum Cross Subspace Alignment Codes via the $N$-sum Box Abstraction

13. $N$-Sum Box: An Abstraction for Linear Computation over Many-to-one Quantum Networks

15. On the Generic Capacity of $K$-User Symmetric Linear Computation Broadcast

16. The Capacity of 3 User Linear Computation Broadcast

17. The Extremal GDoF Gain of Optimal versus Binary Power Control in $K$ User Interference Networks Is $\Theta(\sqrt{K})$

18. Flexible Distributed Matrix Multiplication

19. AI in Insurance

20. AI in Finance

21. On Single Server Private Information Retrieval with Private Coded Side Information

22. Private Retrieval, Computing and Learning: Recent Progress and Future Challenges

23. Flexible Distributed Matrix Multiplication

24. Price of Precision in Coded Distributed Matrix Multiplication: A Dimensional Analysis

25. Sum-GDoF of Symmetric Multi-hop Interference Channel under Finite Precision CSIT using Aligned-Images Sumset Inequalities

26. Multilevel Topological Interference Management: A TIM-TIN Perspective

27. Secure GDoF of the Z-channel with Finite Precision CSIT: How Robust are Structured Codes?

28. $X$-Secure $T$-Private Federated Submodel Learning with Elastic Dropout Resilience

29. Double Blind $T$-Private Information Retrieval

30. Canonical Conditions for K/2 Degrees of Freedom

31. GCSA Codes with Noise Alignment for Secure Coded Multi-Party Batch Matrix Multiplication

32. DoF Region of the Decentralized MIMO Broadcast Channel -- How many informed antennas do we need?

33. On the Synergistic Benefits of Reconfigurable Antennas and Partial Channel Knowledge for the MIMO Interference Channel

34. Cross Subspace Alignment Codes for Coded Distributed Batch Computation

35. Double Blind T-Private Information Retrieval

36. Cross Subspace Alignment Codes for Coded Distributed Batch Computation

37. Exploring Aligned-Images Bounds:Robust Secure GDoF of 3-to-1 Interference Channel

38. On the Asymptotic Capacity of X-Secure T-Private Information Retrieval With Graph-Based Replicated Storage

39. $X$-secure $T$-private Information Retrieval from MDS Coded Storage with Byzantine and Unresponsive Servers

40. On the Capacity of Secure Distributed Batch Matrix Multiplication

41. GDoF of Interference Channel with Limited Cooperation under Finite Precision CSIT

42. On the Asymptotic Capacity of $X$-Secure $T$-Private Information Retrieval with Graph Based Replicated Storage

43. On the Capacity of Computation Broadcast

44. Towards an Extremal Network Theory -- Robust GDoF Gain of Transmitter Cooperation over TIN

45. Degrees of Freedom Region of the $(M,N_1,N_2)$ MIMO Broadcast Channel with Partial CSIT: An Application of Sum-set Inequalities Based on Aligned Image Sets

46. On the Capacity of Locally Decodable Codes

47. Generalized Cross Subspace Alignment Codes for Coded Distributed Batch Matrix Multiplication

48. Robust Optimality of TIN under Secrecy Constraints

49. Cross Subspace Alignment and the Asymptotic Capacity of $X$ -Secure $T$ -Private Information Retrieval

50. Cross Subspace Alignment and the Asymptotic Capacity of X-Secure T -Private Information Retrieval

Catalog

Books, media, physical & digital resources