


default search action
ISIT 2014: Honolulu, HI, USA
- 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29 - July 4, 2014. IEEE 2014, ISBN 978-1-4799-5186-4

- Anders Høst-Madsen, Aleksandar Kavcic, Venugopal V. Veeravalli:

Welcome. 1
Lossy Source Coding
- Amir Ingber, Tsachy Weissman:

Compression for similarity identification: Fundamental limits. 1-5 - Farzad Farnoud, Moshe Schwartz

, Jehoshua Bruck
:
Bounds for permutation rate-distortion. 6-10 - Da Wang, Arya Mazumdar, Gregory W. Wornell

:
Lossy compression of permutations. 11-15 - Roy Timo, Alex J. Grant, Badri N. Vellambi

:
Streaming with autoregressive-hamming distortion for ultra short-delay communications. 16-20
Wiretap Channel
- Jun Muramatsu

:
General formula for secrecy capacity of wiretap channel with noncausal state. 21-25 - Yanling Chen, Onur Ozan Koyluoglu, Aydin Sezgin

:
On the achievable individual-secrecy rate region for broadcast channels with receiver side information. 26-30 - Zohaib Hassan Awan, Abdellatif Zaidi, Aydin Sezgin

:
Achievable secure degrees of freedom of MISO broadcast channel With alternating CSIT. 31-35 - Sina Lashgari, Amir Salman Avestimehr:

Blind wiretap channel with delayed CSIT. 36-40
Caching for Wireless
- Avik Sengupta, Ravi Tandon, T. Charles Clancy:

Decentralized caching with secure delivery. 41-45 - An Liu

, Vincent K. N. Lau
:
Cache-induced opportunistic MIMO cooperation: A new paradigm for future wireless content access networks. 46-50 - Pol Blasco, Deniz Gündüz

:
Multi-armed bandit optimization of cache content in wireless infostation networks. 51-55 - Jad Hachem, Nikhil Karamchandani, Suhas N. Diggavi:

Multi-level coded caching. 56-60
Ad Hoc Networks
- Cheol Jeong, Won-Yong Shin:

Ad hoc networking with rate-limited infrastructure: Generalized capacity scaling. 61-65 - I-Wei Lai, Chia-Han Lee, Kwang-Cheng Chen

, Ezio Biglieri:
Performance of path-time codes for end-to-end transmission in ad hoc multihop networks. 66-70 - Song-Nam Hong

, Giuseppe Caire:
Demystifying the scaling laws of dense wireless networks: No linear scaling in practice. 71-75 - Felipe Gómez-Cuba

, Sundeep Rangan, Elza Erkip
:
Scaling laws for Infrastructure Single and multihop wireless networks in wideband regimes. 76-80
Network Information Theory 1
- Jin Sima, Wei Chen:

Joint network and Gelfand-Pinsker coding for 3-receiver Gaussian broadcast channels with receiver message side information. 81-85 - Ruchen Duan, Yingbin Liang, Ashish Khisti, Shlomo Shamai

:
State-dependent parallel Gaussian channels with a common helper in high power regime. 86-90 - Ronit Bustin, H. Vincent Poor

, Shlomo Shamai
:
The effect of maximal rate codes on the interfering message rate. 91-95 - Ahmed Attia Abotabl

, Aria Nosratinia
:
Multi-level coding and multi-stage decoding in MAC, broadcast, and relay channel. 96-100
Fundamentals of Network Coding
- Randall Dougherty, Eric Freiling, Kenneth Zeger:

Characteristic-dependent linear rank inequalities and network coding applications. 101-105 - Wentao Huang, Tracey Ho, Michael Langberg, Jörg Kliewer:

Reverse edge cut-set bounds for secure network coding. 106-110 - Chun Meng, Athina Markopoulou

:
On routing-optimal networks for multiple unicasts. 111-115 - Péter Babarczi

, János Tapolcai
, Lajos Rónyai, Muriel Médard:
Resilient flow decomposition of unicast connections with network coding. 116-120
Polar Coding
- Liang Zhang, Zhaoyang Zhang, Xianbin Wang, Qilian Yu, Yan Chen:

On the puncturing patterns for punctured polar codes. 121-125 - David Burshtein, Dina Goldin:

On the scaling of the blocklength in some polar coding schemes. 126-130 - Marco Mondelli

, Seyed Hamed Hassani, Rüdiger L. Urbanke:
From polar to Reed-Muller codes: A technique to improve the finite-length performance. 131-135 - Mine Alsan:

A novel partial order for the information sets of polar codes over B-DMCs. 136-140
Classical-Quantum Channels
- Marco Tomamichel

, Vincent Yan Fu Tan:
Second order refinements for the classical capacity of quantum channels with separable input states. 141-145 - Holger Boche, Minglai Cai, Christian Deppe

:
Classical-quantum arbitrarily varying wiretap channel - A capacity formula with Ahlswede Dichotomy - Resources. 146-150 - Marco Dalai

, Andreas J. Winter
:
Constant compositions in the sphere packing bound for classical-quantum channels. 151-155 - Holger Boche, Janis Nötzel:

Cooperation for the classical-quantum multiple access channel. 156-160 - Gowtham Ramani Kumar, Cheuk Ting Li

, Abbas El Gamal:
Exact common information. 161-165 - Nigel Burke

, John Enns:
Coincidence of 1- and 2-dimensional entropies. 166-170 - Govind Ramnarayan, Gireeja Ranade

, Anant Sahai:
Side-information in control and estimation. 171-175 - Georg Böcherer, Rana Ali Amjad:

Informational divergence and entropy rate on rooted trees with probabilities. 176-180
Quantization
- Or Ordentlich, Uri Erez:

Integer-Forcing source coding. 181-185 - Tobias Koch

:
On the dither-quantized Gaussian channel at low SNR. 186-190 - Ken-ichi Iwata

, Shin-ya Ozawa:
Quantizer design for outputs of binary-input discrete memoryless channels using SMAWK algorithm. 191-195 - Da Wang, Yury Polyanskiy, Gregory W. Wornell

:
Scalar quantization with noisy partitions and its application to Flash ADC design. 196-200
MIMO Wiretap Channel
- Sergey Loyka, Charalambos D. Charalambous

:
Rank-deficient solutions for optimal signaling over secure MIMO channels. 201-205 - Anatoly Khina

, Yuval Kochman, Ashish Khisti:
Decomposing the MIMO wiretap channel. 206-210 - Ravi Tandon, Pablo Piantanida, Shlomo Shamai

:
On multi-user MISO wiretap channels with delayed CSIT. 211-215 - Pritam Mukherjee, Ravi Tandon, Sennur Ulukus:

MISO broadcast channels with confidential messages and alternating CSIT. 216-220
Approximate Message Passage
- Saeid Haghighatshoar:

Multi terminal probabilistic compressed sensing. 221-225 - Yoshiyuki Kabashima, Mikko Vehkaperä

:
Signal recovery using expectation consistent approximation for linear observations. 226-230 - Xiaochen Zhao, Wei Dai:

Power allocation in compressed sensing of non-uniformly sparse signals. 231-235 - Sundeep Rangan, Philip Schniter, Alyson K. Fletcher:

On the convergence of approximate message passing with arbitrary matrices. 236-240
Wireless Networks
- Jinfeng Du

, Muriel Médard, Ming Xiao, Mikael Skoglund:
Scalable upper bounding models for wireless networks. 241-245 - Jun Zhao

:
Minimum node degree and k-connectivity in wireless networks with unreliable links. 246-250 - Harpreet S. Dhillon, Giuseppe Caire:

Information theoretic upper bound on the capacity of wireless backhaul networks. 251-255 - Huazi Zhang, Yufan Huang, Zhaoyang Zhang, Huaiyu Dai:

Mobile conductance in sparse networks and mobility-connectivity tradeoff. 256-260
Network Information Theory 2
- Alex Dytso

, Natasha Devroye, Daniela Tuninetti
:
On Gaussian interference channels with mixed gaussian and discrete inputs. 261-265 - Ebrahim MolavianJazi, J. Nicholas Laneman:

On the second-order cost of TDMA for Gaussian multiple access. 266-270 - Ilan Shomorony, Amir Salman Avestimehr:

A generalized cut-set bound for deterministic multi-flow networks and its applications. 271-275 - Reza Khosravi-Farsani:

The sum-rate capacity of general degraded interference networks with arbitrary topologies. 276-280
Index Coding 1
- Mehrdad Tahmasbi, Amirbehshad Shahrasbi

, Amin Gohari:
Critical graphs in index coding. 281-285 - Fatemeh Arbabjolfaei, Young-Han Kim:

Local time sharing for index coding. 286-290 - Karthikeyan Shanmugam

, Alexandros G. Dimakis, Michael Langberg:
Graph theory versus minimum rank for index coding. 291-295 - Karthikeyan Shanmugam

, Alexandros G. Dimakis:
Bounding multiple unicasts through index coding and Locally Repairable Codes. 296-300
Polar Coding - Theory and Practice
- Mine Alsan, Emre Telatar:

A simple proof of polarization and polarization for non-stationary channels. 301-305 - Marco Mondelli

, Seyed Hamed Hassani, Rüdiger L. Urbanke, Igal Sason:
Achieving Marton's region for broadcast channels using polar codes. 306-310 - Lele Wang, Eren Sasoglu:

Polar coding for interference networks. 311-315 - Aria Ghasemian Sahebi, S. Sandeep Pradhan:

Polar codes for some multi-terminal communications problems. 316-320
Quantum Sensing and Measurements
- Mankei Tsang

:
Mismatched quantum filtering and entropic information. 321-325 - Masahiro Takeoka, Saikat Guha, Mark M. Wilde

:
Squashed entanglement and the two-way assisted capacities of a quantum channel. 326-330 - Mario Berta

, Joseph M. Renes
, Mark M. Wilde
:
Identifying the information gain of a quantum measurement. 331-335 - Hari Krovi, Saikat Guha, Zachary Dutton, Marcus P. da Silva

:
Optimal measurements for symmetric quantum states with applications to optical quantum communication. 336-340
Renyi Entropy and f-divergence
- Terence H. Chan

, Alex J. Grant
:
Bounds for constrained entropy maximisation. 341-345 - Christoph Bunte, Amos Lapidoth:

Codes for tasks and Rényi entropy rate. 346-350 - Jiantao Jiao, Thomas A. Courtade, Albert No, Kartik Venkat, Tsachy Weissman:

Information divergences and the curious case of the binary alphabet. 351-355 - Kevin R. Moon

, Alfred O. Hero III:
Ensemble estimation of multivariate f-divergence. 356-360
Degrees of Freedom
- Anas Chaaban, Henning Maier, Aydin Sezgin

:
The degrees-of-freedom of multi-way device-to-device communications is limited by 2. 361-365 - David T. H. Kao, Amir Salman Avestimehr:

Linear degrees of freedom of the MIMO X-channel with delayed CSIT. 366-370 - Daniel Zahavi, Ron Dabora:

On the generalized degrees-of-freedom of the phase fading Z-interference channel with a relay. 371-375 - Ahmed Wagdy, Amr El-Keyi, Tamer Khattab

, Mohammed Nafie:
A degrees of freedom-optimal scheme for SISO X channel with synergistic alternating CSIT. 376-380 - Massimo Franceschetti:

On Landau's eigenvalue theorem and its applications. 381-385
Topics in Secrecy 1
- Kittipong Kittichokechai

, Tobias J. Oechtering
, Mikael Skoglund:
Lossy source coding with reconstruction privacy. 386-390 - Jianwei Xie, Sennur Ulukus:

Inseparability of the multiple access wiretap channel. 391-395 - Shaofeng Zou, Yingbin Liang, Lifeng Lai, Shlomo Shamai

:
Layered secure broadcasting over MIMO channels and application in secret sharing. 396-400 - Mitsugu Iwamoto, Junji Shikata:

Secret sharing schemes based on min-entropies. 401-405 - Sanket Satpathy, Paul Cuff:

Secure coordination with a two-sided helper. 406-410
Coding and Communication Theory
- Uzi Pereg

, Ido Tal:
Channel upgradation for non-binary input alphabets and MACs. 411-415 - Cheuk Ting Li

, Abbas El Gamal:
An efficient feedback coding scheme with low error probability for discrete memoryless channels. 416-420 - Victor Y. Krachkovsky, Razmik Karabed, Shaohua Yang, Bruce A. Wilson:

On modulation coding for channels with cost constraints. 421-425 - Kasra Vakilinia, Tsung-Yi Chen, Sudarsan Vasista Srinivasan Ranganathan, Adam R. Williamson, Dariush Divsalar, Richard D. Wesel:

Short-blocklength non-binary LDPC codes with feedback-dependent incremental transmissions. 426-430 - Georg Bocherer:

Probabilistic signal shaping for bit-metric decoding. 431-435 - Karim G. Seddik

:
On the stability of random multiple access with feedback exploitation and queue priority. 436-440 - Ying Cui, Edmund M. Yeh, Stephen V. Hanly

:
Energy-efficient data transmission over multiple-access channels with QoS constraints. 441-445 - Stephen V. Hanly

, Philip A. Whiting:
Stable scheduling in Heterogeneous Networks. 446-450 - Ying Cui, Edmund M. Yeh:

Delay optimal control and its connection to the dynamic backpressure algorithm. 451-455 - Anoosheh Heidarzadeh, Amir H. Banihashemi:

How much can knowledge of delay model help chunked coding over networks with perfect feedback? 456-460
Network Information Theory 3
- Jonathan Scarlett, Vincent Y. F. Tan:

Second-order asymptotics for the gaussian MAC with degraded message sets. 461-465 - Kia Khezeli

, Jun Chen:
An improved outer bound on the admissible source region for broadcast channels with correlated sources. 466-470 - David Stotz, Helmut Bölcskei:

Explicit and almost sure conditions for K/2 degrees of freedom. 471-475 - Maksym A. Girnyk

, Mikko Vehkaperä
, Lars K. Rasmussen:
Asymptotic properties of dual-hop AF relay MIMO communication systems. 476-480 - Nir Weinberger, Neri Merhav:

Large deviations analysis of variable-rate Slepian-Wolf coding. 481-485
Index Coding 2
- Vijayvaradharaj T. Muralidharan, B. Sundar Rajan:

Linear index coding and representable discrete polymatroids. 486-490 - Lawrence Ong

:
Linear Codes are Optimal for Index-Coding Instances with Five or Fewer Receivers. 491-495 - Jungho So, Sangwoon Kwak, Youngchul Sung:

Some new results on index coding when the number of data is less than the number of receivers. 496-500 - Sangwoon Kwak, Jungho So, Youngchul Sung:

An extended least difference greedy clique-cover algorithm for index coding. 501-505
Applications of Spatially Coupled Codes
- Takuya Okazaki, Kenta Kasai:

Spatially-coupled MacKay-Neal codes with no bit nodes of degree two achieve the capacity of BEC. 506-510 - Keke Liu, Mostafa El-Khamy

, Jungwon Lee, Inyup Kang, Arvind Yedla:
Non-binary algebraic spatially-coupled quasi-cyclic LDPC codes. 511-515 - Santhosh Kumar, Avinash Vem, Krishna R. Narayanan, Henry D. Pfister

:
Spatially-coupled codes for side-information problems. 516-520 - Kosuke Sakata, Kenta Kasai, Kohichi Sakaniwa:

Spatially-coupled precoded rateless codes with bounded degree achieve the capacity of BEC under BP decoding. 521-525
Quantum Protocols
- Amin Baumeler

, Stefan Wolf
:
Perfect signaling among three parties violating predefined causal order. 526-530 - Kosuke Ito

, Wataru Kumagai, Masahito Hayashi
:
Asymptotic reversibility of LOCC conversions. 531-535 - Christoph Hirche

, Ciara Morgan:
Efficient achievability for quantum protocols using decoupling theorems. 536-540 - Holger Boche, Janis Nötzel:

Positivity, discontinuity, finite resources, nonzero error for arbitrarily varying quantum channels. 541-545 - Alexei E. Ashikhmin, Ching-Yi Lai

, Todd A. Brun
:
Robust quantum error syndrome extraction by classical coding. 546-550
Hypothesis Testing
- Anusha Lalitha, Anand D. Sarwate

, Tara Javidi
:
Social learning and distributed hypothesis testing. 551-555 - Yen-Wei Huang, Pierre Moulin:

Strong large deviations for composite hypothesis testing. 556-560 - David Mary, André Ferrari:

A non-asymptotic standardization of binomial counts in Higher Criticism. 561-565 - Ezio Biglieri, László Györfi:

Some remarks on robust binary hypothesis testing. 566-570 - Long Le, Douglas L. Jones:

Optimal simultaneous detection and signal and noise power estimation. 571-575
Multiterminal Source Coding 1
- Farhad Shirani Chaharsooghi

, S. Sandeep Pradhan:
An achievable rate-distortion region for the multiple descriptions problem. 576-580 - Yasutada Oohama:

One helper source coding problem for a class of correlated sources with memory. 581-585 - Adel Zahedi, Jan Østergaard

, Søren Holdt Jensen, Patrick A. Naylor
, Soren Bech
:
Distributed remote vector gaussian source coding with covariance distortion constraints. 586-590 - Pablo Piantanida, Leonardo Rey Vega

, Alfred O. Hero III:
A proof of the Generalized Markov Lemma with countable infinite sources. 591-595
Secrecy Measures
- Curt Schieler, Paul Cuff:

The Henchman problem: Measuring secrecy by the minimum distortion in a list. 596-600 - Jie Hou, Gerhard Kramer

:
Effective secrecy: Reliability, confusion and stealth. 601-605 - Boulat A. Bash, Dennis Goeckel, Don Towsley

:
LPD communication when the warden does not know when. 606-610 - Swanand Kadhe

, Sidharth Jaggi
, Mayank Bakshi
, Alex Sprintson:
Reliable, deniable, and hidable communication over multipath networks. 611-615
MIMO Channels
- Lu Wei

, Zhong Zheng, Jukka Corander, Giorgio Taricco
:
Outage capacity of OSTBCs over pico-cellular MIMO channels. 616-620 - Antonia M. Tulino

, Giuseppe Caire, Shlomo Shamai
:
Broadcast approach for the sparse-input random-sampled MIMO Gaussian channel. 621-625 - Jialin He, Dinesh Rajan:

Transmission strategies for MIMO channels with processing and transmit power constraints. 626-630 - Tao Cui, Qian Wang, Yindi Jing, Xinwei Yu:

SVD-based estimation for reduced-rank MIMO channel. 631-635
Relay Networks
- Sung Hoon Lim

, Kwang Taik Kim, Young-Han Kim:
Distributed decode-forward for multicast. 636-640 - Siddhartha Brahma, Christina Fragouli:

Structure of optimal schedules in diamond networks. 641-645 - Ivan Wang Hei Ho

, Soung Chang Liew, Lu Lu:
Feasibility study of physical-layer network coding in 802.11p VANETs. 646-650 - Wael Halbawi, Tracey Ho, Hongyi Yao, Iwan M. Duursma:

Distributed reed-solomon codes for simple multiple access networks. 651-655
Interference
- Ritesh Kolte

, Ayfer Özgür
, Haim H. Permuter
:
The capacity region of a class of deterministic state-dependent Z-interference channels. 656-660 - Evan Everett, Ashutosh Sabharwal:

A signal-space analysis of spatial self-interference isolation for full-duplex wireless. 661-665 - Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:

Binary Fading Interference Channel with No CSIT. 666-670 - Shaunak Mishra, I-Hsiang Wang, Suhas N. Diggavi:

Harnessing bursty interference in multicarrier systems with feedback. 671-675
Locally Repairable Codes
- Sreechakra Goparaju, A. Robert Calderbank:

Binary cyclic codes that are locally repairable. 676-680 - Ankit Singh Rawat

, Dimitris S. Papailiopoulos, Alexandros G. Dimakis, Sriram Vishwanath:
Locality and availability in distributed storage. 681-685 - Itzhak Tamo, Alexander Barg:

A family of optimal locally recoverable codes. 686-690 - Itzhak Tamo, Alexander Barg:

Bounds on locally recoverable codes with multiple recovering sets. 691-695
Pseudocodewords, Trapping Sets and Instantons
- Xishuo Liu, Stark C. Draper

:
Instanton search algorithm for the ADMM penalized decoder. 696-700 - Vida Ravanmehr, David Declercq, Bane Vasic:

Check-hybrid GLDPC codes: Systematic elimination of trapping sets by super checks. 701-705 - Jean-Christophe Sibel

, Sylvain Reynal
, David Declercq:
An application of generalized belief propagation: splitting trapping sets in LDPC codes. 706-710 - Sudarsan Vasista Srinivasan Ranganathan, Dariush Divsalar, Kasra Vakilinia, Richard D. Wesel:

Design of high-rate irregular non-binary LDPC codes using algorithmic stopping-set cancellation. 711-715
Quantum Shannon Theory
- Manish K. Gupta, Mark M. Wilde

:
Strong converse for entanglement-assisted capacity. 716-720 - Holger Boche, Gisbert Janssen:

Resource cost results for entanglement distillation and state merging under source uncertainties. 721-725 - Bhaskar Roy Bardhan, Raúl García-Patrón, Mark M. Wilde

, Andreas J. Winter
:
Strong converse for the capacity of quantum Gaussian channels. 726-730 - Marco Tomamichel

, Mario Berta
, Masahito Hayashi
:
A duality relation connecting different quantum generalizations of the conditional Rényi entropy. 731-735
Sequential Detection
- James Falt, Steven D. Blostein:

A Bayesian approach to two-sided quickest change detection. 736-740 - Taposh Banerjee, Venugopal V. Veeravalli:

Data-efficient quickest change detection with unknown post-change distribution. 741-745 - Wenyi Zhang, George V. Moustakides, H. Vincent Poor

:
Opportunistic detection rules. 746-750 - Daphney-Stavroula Zois

, Urbashi Mitra:
A Weiss-Weinstein lower bound based sensing strategy for active state tracking. 751-755
Multiterminal Source Coding 2
- Farshad Naghibi, Somayeh Salimi, Mikael Skoglund:

The CEO problem with secrecy constraints. 756-760 - Avraham Reani, Neri Merhav:

Universal quantization for separate encodings and joint decoding of correlated sources. 761-765 - Yinfei Xu, Qiao Wang:

Vector Gaussian two-terminal CEO problem under sum distortion. 766-770 - Leonardo Rey Vega

, Pablo Piantanida, Alfred O. Hero III:
On the three-terminal interactive lossy source coding problem. 771-775
Network Security
- Thomas A. Courtade, Thomas R. Halford:

Coded cooperative data exchange for a secret key. 776-780 - László Czap, Vinod M. Prabhakaran, Suhas N. Diggavi, Christina Fragouli:

Triangle network secrecy. 781-785 - Fan Cheng:

Optimality of routing on the wiretap network with simple network topology. 786-790 - Mahtab Mirmohseni, Panagiotis Papadimitratos

:
Active adversaries from an information-theoretic perspective: Data modification attacks. 791-795
Energy Harvesting 1
- Omur Ozel, Kaya Tutuncuoglu, Sennur Ulukus, Aylin Yener:

Capacity of the discrete memoryless energy harvesting channel with side information. 796-800 - Yishun Dong, Ayfer Özgür

:
Approximate capacity of energy harvesting communication with finite battery. 801-805 - Varun S. Jog, Venkat Anantharam:

An energy harvesting AWGN channel with a finite battery. 806-810 - Jing Yang

:
Achievable rate for energy harvesting channel with finite blocklength. 811-815 - James Yifei Yang, Bruce E. Hajek:

A hybrid algorithm for content placement in distributed video on demand systems. 816-820 - Ankit Singh Rawat

, Emina Soljanin
:
Dynamic control of video quality for AVS. 821-825 - Mehrnaz Tavan, Roy D. Yates, Waheed U. Bajwa:

Information in tweets: Analysis of a bufferless timing channel model. 826-830 - Aseem Sharma, Krishna P. Jagannathan

, Lav R. Varshney:
Information overload and human priority queuing. 831-835
Interference Channels 1
- Shaileshh Bojja Venkatakrishnan

, Pramod Viswanath, Sreeram Kannan:
Degrees of Freedom for multiple-multicast traffic. 836-840 - Hua Sun, Syed Ali Jafar

:
On the optimality of treating interference as noise for parallel deterministic interference networks. 841-845 - Xinping Yi, David Gesbert

:
Topological interference management with transmitter cooperation. 846-850 - Ali Haghi, Amir K. Khandani:

The separability and ergodic sum-rate of parallel Gaussian interference channels. 851-855
Emerging Problems in Network Coding and Distributed Storage
- Nihar B. Shah, K. V. Rashmi, Kannan Ramchandran:

One extra bit of download ensures perfectly private information retrieval. 856-860 - Nihar B. Shah, Kangwook Lee, Kannan Ramchandran:

The MDS queue: Analysing the latency performance of erasure codes. 861-865 - Chih-Chun Wang, Minghua Chen

:
Sending perishable information: Coding improves delay-constrained throughput even for single unicast. 866-870 - Zhiying Wang

, Viveck R. Cadambe
:
Multi-version coding in distributed storage. 871-875
Analysis of Spatially Coupled Codes
- Kechao Huang, David G. M. Mitchell

, Lai Wei, Xiao Ma, Daniel J. Costello Jr.:
Performance comparison of non-binary LDPC block and spatially coupled codes. 876-880 - Lai Wei, Toshiaki Koike-Akino

, David G. M. Mitchell
, Thomas E. Fuja, Daniel J. Costello Jr.:
Threshold analysis of non-binary spatially-coupled LDPC codes with windowed decoding. 881-885 - David G. M. Mitchell

, Lara Dolecek, Daniel J. Costello Jr.:
Absorbing set characterization of array-based spatially coupled LDPC codes. 886-890 - Markus Stinner, Pablo M. Olmos:

Analyzing finite-length protograph-based spatially coupled LDPC codes. 891-895
Quantum Error Control Codes 1
- Jihao Fan, Hanwu Chen:

Constructions of pure asymmetric quantum alternant codes based on subclasses of Alternant codes. 896-900 - Hye Won Chung

, Saikat Guha, Lizhong Zheng:
Superadditivity of quantum channel coding rate with finite blocklength quantum measurements. 901-905 - Markus Grassl

, Zhaohui Wei, Zhang-Qi Yin, Bei Zeng:
Quantum error-correcting codes for amplitude damping. 906-910 - Ching-Yi Lai

, Min-Hsiu Hsieh
:
The MacWilliams identity for quantum convolutional codes. 911-915
Information Theoretic Approaches to Prediction
- Michal Moshkovitz, Naftali Tishby:

Control your information for better predictions. 916-920 - Mert Pilanci, Martin J. Wainwright

:
Randomized sketches of convex programs with sharp guarantees. 921-925 - Guangyao Zhou, Stuart Geman, Joachim M. Buhmann:

Sparse feature selection by information theory. 926-930 - Youssef Mroueh, Lorenzo Rosasco:

On efficiency and low sample complexity in phase retrieval. 931-935
Multiterminal Source Coding 3
- Tetsunao Matsuta, Tomohiko Uyematsu:

Rate-distortion functions for source coding when side information with unknown delay may be present. 936-940 - Yeow-Khiang Chia:

On multiterminal source coding with list decoding constraints. 941-945 - Jiantao Jiao, Thomas A. Courtade, Kartik Venkat, Tsachy Weissman:

Justification of logarithmic loss via the benefit of side information. 946-950 - Sinem Unal, Aaron B. Wagner:

Vector Gaussian rate-distortion with variable side information. 951-955
Coding Schemes for Secrecy
- Himanshu Tyagi, Alexander Vardy

:
Explicit capacity-achieving coding scheme for the Gaussian wiretap channel. 956-960 - Yanfei Yan, Ling Liu, Cong Ling:

Polar lattices for strong secrecy over the mod-Λ Gaussian wiretap channel. 961-965 - Jérôme Ducoat, Frédérique E. Oggier:

An analysis of small dimensional fading wiretap lattice codes. 966-970 - Fuchun Lin, Cong Ling, Jean-Claude Belfiore:

Secrecy gain, flatness factor, and secrecy-goodness of even unimodular lattices. 971-975
Energy Harvesting 2
- Kaya Tutuncuoglu, Omur Ozel, Aylin Yener, Sennur Ulukus:

Improved capacity bounds for the binary energy harvesting channel. 976-980 - Sreejith Sreekumar, Sibi Raj B. Pillai, Bikash Kumar Dey:

Energy efficient random multiple access with strict delay constraints. 981-985 - Berk Gurakan, Sennur Ulukus:

Energy harvesting diamond channel with energy cooperation. 986-990 - Ali Mohammad Fouladgar, Osvaldo Simeone

, Elza Erkip
:
Constrained codes for joint energy and information transfer with receiver energy utilization requirements. 991-995
Cellular Networks
- Xinchen Zhang, Martin Haenggi

:
Cellular network coverage with inter-cell interference coordination and intra-cell diversity. 996-1000 - Jangho Yoon, Won-Yong Shin, Sang-Woon Jeon:

Elastic routing in wireless networks with directional antennas. 1001-1005 - Nan Liu, Wei Kang:

A new achievability scheme for downlink multicell processing with finite backhaul capacity. 1006-1010 - Mohammad Hassan Lotfi, George Kesidis, Saswati Sarkar:

Market-based power allocation for a differentially priced FDMA system. 1011-1015
Interference Channels 2
- Mohammad Ali Khojastepour, Mohammad Farajzadeh-Tehrani

:
Characterizing per node degrees of freedom in an interference network. 1016-1020 - Samir Medina Perlaza, Ravi Tandon, H. Vincent Poor

:
Symmetric decentralized interference channels with noisy feedback. 1021-1025 - Abdellatif Zaidi:

Achievable regions for interference channels with generalized and intermittent feedback. 1026-1030 - Sida Liu, Chandra Nair, Lingxiao Xia:

Interference channels with very weak interference. 1031-1035
Distributed Storage - Repair and Generation 1
- Sreechakra Goparaju, Salim El Rouayheb, A. Robert Calderbank:

New codes and inner bounds for exact repair in distributed storage systems. 1036-1040 - Henk D. L. Hollmann

:
On the minimum storage overhead of distributed storage codes with a given repair locality. 1041-1045 - Kenneth W. Shum, Hanxu Hou, Minghua Chen

, Huanle Xu, Hui Li
:
Regenerating codes over a binary cyclic code. 1046-1050
Interdisciplinary Coding Theory
- Arti D. Yardi

, Animesh Kumar, Saravanan Vijayakumaran
:
Channel-code detection by a third-party receiver via the likelihood ratio test. 1051-1055 - Lili Su, Olgica Milenkovic:

Synchronizing rankings via interactive communication. 1056-1060 - Yi-Kai Wang, Yitong Yin, Sheng Zhong:

Approximate capacities of two-dimensional codes by spatial mixing. 1061-1065 - Kenji Yasunaga:

Correction of samplable additive errors. 1066-1070
Quantum Error Control Codes 2
- Nicolas Delfosse, Jean-Pierre Tillich:

A decoding algorithm for CSS codes using the X/Z correlations. 1071-1075 - Pradeep Kiran Sarvepalli

:
Quantum codes and symplectic matroids. 1076-1080 - Andrew James Ferris, David Poulin:

Branching MERA codes: A natural extension of classical and quantum polar codes. 1081-1085 - Ilya Dumer

, Alexey A. Kovalev
, Leonid P. Pryadko:
Numerical techniques for finding the distances of quantum codes. 1086-1090
Markov Models and Estimation
- Masahito Hayashi

, Shun Watanabe
:
Information geometry approach to parameter estimation in Markov chains. 1091-1095 - Vatsal Sharan, Rakesh Kumar Bansal:

Large deviation property of waiting times for Markov and mixing processes. 1096-1100 - Tho Ngoc Le, Vijay G. Subramanian

, Randall A. Berry
:
The value of noise for informational cascades. 1101-1105 - Lukas Bruderer, Hans-Andrea Loeliger, Nour Zalmai:

Local statistical models from deterministic state space models, likelihood filtering, and local typicality. 1106-1110
Interdisciplinary Information Theory
- Dror A. Vinkler, Haim H. Permuter

, Neri Merhav:
Analogy between gambling and measurement-based work extraction. 1111-1115 - Christoph Bunte, Amos Lapidoth, Alex Samorodnitsky:

A proof of the Ahlswede-Cai-Zhang conjecture. 1116-1120 - Artyom Sharov, Ron M. Roth:

New upper bounds for grain-correcting and grain-detecting codes. 1121-1125 - Michael Walter

, Joseph M. Renes
:
A Heisenberg limit for quantum region estimation. 1126-1130 - Jun Zhao

, Osman Yagan, Virgil D. Gligor:
On topological properties of wireless sensor networks under the q-composite key predistribution scheme with on/off channels. 1131-1135
Secret-Key Capacity
- Masahito Hayashi

, Himanshu Tyagi, Shun Watanabe
:
Secret key agreement: General capacity and second-order asymptotics. 1136-1140 - Huishuai Zhang, Lifeng Lai, Yingbin Liang, Hua Wang:

Secret key-private key generation over three terminals: Capacity region. 1141-1145 - Jingbo Liu, Paul W. Cuff, Sergio Verdú:

Key capacity with limited one-way communication for product sources. 1146-1150 - Manuj Mukherjee

, Navin Kashyap:
On the communication complexity of secret key generation in the multiterminal source model. 1151-1155 - Manuj Mukherjee

, Navin Kashyap, Yogesh Sankarasubramaniam
:
Achieving SK capacity in the source model: When must all terminals talk? 1156-1160
Resource Allocation and Energy Harvesting
- He Chen

, Yunxiang Jiang, Yonghui Li
, Yuanye Ma, Branka Vucetic
:
A game-theoretical model for wireless information and power transfer in relay interference channels. 1161-1165 - Zhe Wang, Vaneet Aggarwal

, Xiaodong Wang:
Optimal energy-bandwidth allocation for energy harvesting interference networks. 1166-1170 - Omer Melih Gul

, Elif Uysal-Biyikoglu
:
Achieving nearly 100% throughput without feedback in energy harvesting wireless networks. 1171-1175 - Baran Tan Bacinoglu, Elif Uysal-Biyikoglu

:
Finite horizon online lazy scheduling with energy harvesting transmitters over fading channels. 1176-1180 - Meysam Shahrbaf Motlagh, Masoud Badiei Khuzani, Patrick Mitran:

On lossy source-channel transmission in Energy Harvesting communication systems. 1181-1185
Cooperative Communications
- Abdellatif Zaidi, Shlomo Shamai

:
Asymmetric cooperative multiple access channels with delayed CSI. 1186-1190 - Tasuku Soma

:
Multicasting in linear deterministic relay network by matrix completion. 1191-1195 - Shirin Saeedi Bidokhti, Gerhard Kramer

:
Capacity bounds for a class of diamond networks. 1196-1200 - Ritesh Kolte

, Urs Niesen, Piyush Gupta:
Energy-efficient communication over the unsynchronized Gaussian diamond network. 1201-1205 - Shuhang Wu, Shuangqing Wei, Yue Wang, Ramachandran Vaidyanathan, Jian Yuan:

Achievable partition information rate over noisy multi-access Boolean channel. 1206-1210
Interference Alignment
- Cheuk Ting Li

, Ayfer Özgür
:
Channel diversity needed for vector interference alignment. 1211-1215 - Abhinav Ganesan, B. Sundar Rajan:

Interference alignment with diversity for the 2 × 2 X-Network with three antennas. 1216-1220 - Abinesh Ramakrishnan, Sundar Rajan Krishnamurthy, Syed Ali Jafar

, Yaming Yu:
Degrees of freedom of interference channel with rank-deficient transfer matrix. 1221-1225 - Gokul Sridharan, Wei Yu:

Unstructured linear beamforming design for interference alignment in MIMO cellular networks. 1226-1230 - Emmanuel Abbe, Noga Alon, Afonso S. Bandeira:

Linear Boolean classification, coding and "the critical problem". 1231-1235 - Antonia Wachter-Zeh:

List decoding of crisscross error patterns. 1236-1240 - Hirosuke Yamamoto

, Masashi Ueda:
Identification codes to identify multiple objects. 1241-1245 - Ling Cheng, Theo G. Swart

, Hendrik C. Ferreira
, Khaled A. S. Abdel-Ghaffar:
Codes for correcting three or more adjacent deletions or insertions. 1246-1250 - Emmanuel Abbe, Afonso S. Bandeira, Annina Bracher, Amit Singer

:
Linear inverse problems on Erdős-Rényi graphs: Information-theoretic limits and efficient recovery. 1251-1255 - Arman Fazeli

, Alexander Vardy
, Eitan Yaakobi:
Generalized sphere packing bound: Basic principles. 1256-1260 - Arman Fazeli

, Alexander Vardy
, Eitan Yaakobi:
Generalized sphere packing bound: Applications. 1261-1265
Generalized Sphere Packing Bound: Applications
- Daniel F. Cullina

, Negar Kiyavash:
Generalized sphere-packing upper bounds on the size of codes for combinatorial channels. 1266-1270 - Jun Yang, Fady Alajaji, Glen Takahara:

New bounds on the probability of a finite union of events. 1271-1275 - Marco Dalai

:
An Elias bound on the Bhattacharyya distance of codes for channels with a zero-error capacity. 1276-1280
Problems in Bioinformatics and Neuroscience
- Andrew W. Eckford, Chan-Byoung Chae

:
Scaling laws for molecular communication. 1281-1285 - Eren Sasoglu, David Tse:

DNA assembly from paired reads as 2-D jigsaw puzzles. 1286-1290 - Nima Soltani, Andrea J. Goldsmith:

Directed information between connected leaky integrate-and-fire neurons. 1291-1295 - Jayadev Acharya, Hirakendu Das, Olgica Milenkovic, Alon Orlitsky, Shengjun Pan:

Quadratic-backtracking algorithm for string reconstruction from substring compositions. 1296-1300 - Farzad Farnoud, Moshe Schwartz

, Jehoshua Bruck
:
The capacity of string-duplication systems. 1301-1305
Sampling and Sensing
- Peng Zhang, Sumei Sun, Cong Ling:

Variable-density sampling on the dual lattice. 1306-1310 - Cem Aksoylar, Venkatesh Saligrama

:
Information-theoretic bounds for adaptive sparse recovery. 1311-1315 - Kei Sano, Ryosuke Matsushita, Toshiyuki Tanaka:

To average or not to average: Trade-off in compressed sensing with noisy measurements. 1316-1320 - Christos Boutsidis, Malik Magdon-Ismail:

Faster SVD-truncated regularized least-squares. 1321-1325 - Amichai Painsky, Saharon Rosset, Meir Feder:

Generalized binary independent component analysis. 1326-1330
Distributed Lossless Source Coding
- Oron Sabag

, Haim H. Permuter
, Asaf Cohen:
Lossless coding of correlated sources with actions in acyclic directed networks. 1331-1335 - Tomohiko Uyematsu, Tetsunao Matsuta:

Revisiting the Slepian-Wolf coding problem for general sources: A direct approach. 1336-1340 - Ziv Goldfeld, Haim H. Permuter

, Gerhard Kramer
:
The Ahlswede-Körner coordination problem with one-sided encoder cooperation. 1341-1345 - Eric Graves, Tan F. Wong:

Equating the achievable exponent region to the achievable entropy region by partitioning the source. 1346-1350
Reed-Solomon Codes for Secrecy
- Hiroki Koga, Shuntaro Honjo:

A secret sharing scheme based on a systematic Reed-Solomon code and analysis of its security for a general class of sources. 1351-1355 - Ping Hu, Chi Wan Sung

, Siu-Wai Ho
, Terence H. Chan
:
Three-level storage and nested MDS codes for perfect secrecy in multiple clouds. 1356-1360 - Baofeng Wu

, Qingfang Jin, Zhuojun Liu, Dongdai Lin:
Constructing Boolean functions with potentially optimal algebraic immunity based on additive decompositions of finite fields (extended abstract). 1361-1365 - Muxi Yan, Alex Sprintson, Igor Zelenko:

Weakly secure data exchange with Generalized Reed Solomon codes. 1366-1370
Scheduling and Power Control
- Matthew Johnston, Eytan H. Modiano, Yury Polyanskiy:

Opportunistic scheduling with limited channel state information: A rate distortion approach. 1371-1375 - Apostolos Destounis, Mohamad Assaad, Mérouane Debbah, Bessem Sayadi:

Traffic-aware training and scheduling for the 2-user MISO broadcast channel. 1376-1380 - Gozde Ozcan, Mustafa Cenk Gursoy:

QoS-driven power control for fading channels with arbitrary input distributions. 1381-1385 - Arash Saber Tehrani, Giuseppe Caire:

ZigZag neighbor discovery in wireless networks. 1386-1390
Cognitive Radios
- Abdulrahman Alabbasi

, Zouheir Rezki
, Basem Shihada
:
Energy efficiency and SINR maximization beamformers for cognitive radio utilizing sensing information. 1391-1395 - Seyed Ali Hesammohseni, Kamyar Moshksar, Amir K. Khandani:

A combined underlay and interweave strategy for cognitive radios. 1396-1400 - Mahmoud Ashour, M. Majid Butt

, Amr Mohamed
:
On the power efficiency for cognitive radio networks with multiple relays. 1401-1405 - Anthony Fanous, Anthony Ephremides:

Enhanced access schemes based on channel statistics for cognitive wireless networks. 1406-1410
Interference Channel with Cooperation
- Quan Geng, Tie Liu:

Symmetric two-user Gaussian interference channel with common message with very low interference. 1411-1415 - Reza Khosravi-Farsani, Reza Ebrahimpour:

Capacity theorems for the Cognitive Radio Channel with confidential messages. 1416-1420 - Germán Bassi

, Pablo Piantanida, Sheng Yang:
Constant-gap results and cooperative strategies for a class of Interference Relay Channels. 1421-1425 - Martina Cardone, Daniela Tuninetti

, Raymond Knopp, Umer Salim:
New outer bounds for the interference channel with unilateral source cooperation. 1426-1430
Algebraic Coding Theory 1
- Scott Kayser, Paul H. Siegel:

Constructions for constant-weight ICI-free codes. 1431-1435 - Yeow Meng Chee

, Fei Gao, Han Mao Kiah, Alan Chi Hung Ling, Hui Zhang, Xiande Zhang:
Decompositions of edge-colored digraphs: A new technique in the construction of constant-weight codes and related families. 1436-1440 - Yeow Meng Chee

, Han Mao Kiah, Punarbasu Purkayastha, Patrick Solé:
Product construction of affine codes. 1441-1445 - Alain Couvreur, Irene Marquez Corbella

, Ruud Pellikaan:
A polynomial time attack against algebraic geometry code based public key cryptosystems. 1446-1450 - Seyed Hamed Hassani, Rüdiger L. Urbanke:

Universal polar codes. 1451-1455 - Eren Sasoglu, Lele Wang:

Universal polarization. 1456-1460 - David Sutter

, Joseph M. Renes
:
Universal polar codes for more capable and less noisy channels and sources. 1461-1465 - Erdal Arikan:

A note on polarization martingales. 1466-1468
Quantum Communication and Security
- Marco Tomamichel

, Jesús Martínez-Mateo
, Christoph Pacher
, David Elkouss
:
Fundamental finite key limits for information reconciliation in quantum key distribution. 1469-1473 - Mario Berta

, Omar Fawzi
, Volkher B. Scholz
, Oleg Szehr
:
Variations on classical and quantum extractors. 1474-1478 - Helen Ebbe, Stefan Wolf

:
Trading permutation invariance for communication in multi-party non-locality distillation. 1479-1483 - Alberto Montina

, Stefan Wolf
:
Lower bounds on the communication complexity of two-party (quantum) processes. 1484-1488
Estimation and Statistical Physics
- Zheng Wang, Cong Ling, Guillaume Hanrot:

Markov chain Monte Carlo algorithms for lattice Gaussian sampling. 1489-1493 - Jean Barbier

, Florent Krzakala
:
Replica analysis and approximate message passing decoder for superposition codes. 1494-1498 - Florent Krzakala

, Andre Manoel
, Eric W. Tramel
, Lenka Zdeborová:
Variational free energies for compressed sensing. 1499-1503 - Ali Al-Bashabsheh, Yongyi Mao

:
On stochastic estimation of the partition function. 1504-1508
Joint Source-Channel Coding
- Erman Koken, Ertem Tuncel

:
On robustness of hybrid digital analog source-channel coding with bandwidth mismatch. 1509-1513 - Irina E. Bocharova, Albert Guillen i Fabregas

, Boris D. Kudryashov, Alfonso Martinez
, Adrià Tauste Campo
, Gonzalo Vazquez-Vilar:
Source-channel coding with multiple classes. 1514-1518 - Uri Mendlovic, Meir Feder:

Source broadcasting to the masses: Separation has a bounded loss. 1519-1523 - Se Yong Park, Tara Javidi

, Andrea J. Goldsmith:
Optimal strategies for dynamic joint source-channel coding with feedback. 1524-1528
Cryptography and Secrecy
- Özgür Dagdelen, Marc Fischlin:

Intercepting tokens in cryptographic protocols: The empire strikes back in the clone wars. 1529-1533 - Qichun Wang, Chik How Tan:

Cryptographic boolean functions with a large number of variables. 1534-1538 - Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas N. Diggavi:

The oblivious transfer capacity of the wiretapped binary erasure channel. 1539-1543 - Yuval Ishai, Hemanta K. Maji, Amit Sahai, Jürg Wullschleger:

Single-use ot combiners with near-optimal resilience. 1544-1548
Modulation and Demodulation
- Amir K. Khandani:

Media-based modulation: Converting static Rayleigh fading to AWGN. 1549-1553 - Hassan Ghozlan, Gerhard Kramer

:
Phase modulation for discrete-time wiener phase noise channels with oversampling at high SNR. 1554-1557 - Cenk Sahin, Lingjia Liu, Erik S. Perrins:

Early decoding for transmission over finite transport blocks. 1558-1562 - Ryota Yoshizawa

, Hideki Ochiai
:
A novel trellis-based PAPR reduction technique for OFDM signals. 1563-1567
Wireless Network Protocols
- Yijin Zhang, Yuan-Hsun Lo

, Feng Shu, Wing Shing Wong:
Protocol sequences for multiple-packet reception: Throughput invariance and user irrepressibility. 1568-1572 - Navid Naderializadeh

, Amir Salman Avestimehr:
ITLinQ: A new approach for spectrum sharing in device-to-device communication systems. 1573-1577 - Dusan Jakovetic, Dragana Bajovic, Dejan Vukobratovic

, Vladimir S. Crnojevic
:
Slotted Aloha for networked base stations with spatial and temporal diversity. 1578-1582 - Maice Costa, Marian Codreanu

, Anthony Ephremides:
Age of information with packet management. 1583-1587
Interference Management for Cellular
- Hyun Jong Yang, Won-Yong Shin, Bang Chul Jung

, Changho Suh
, Arogyaswami Paulraj:
Opportunistic downlink interference alignment. 1588-1592 - Sang-Woon Jeon, Changho Suh

:
Degrees of freedom of uplink-downlink multiantenna cellular networks. 1593-1597 - Vasileios Ntranos, Mohammad Ali Maddah-Ali, Giuseppe Caire:

Cellular interference alignment. 1598-1602 - Narayan Prasad, Mustafa Y. Arslan, Sampath Rangarajan:

Enhanced interference management in heterogeneous cellular networks. 1603-1607
Calculus
- Pascal O. Vontobel:

Counting balanced sequencesw/o forbidden patterns via the betheapproximation and loop calculus. 1608-1612 - Thomas Mittelholzer, Roy D. Cideciyan:

Enumerative modulation codes based on sliding-window substitutions. 1613-1617 - Mehrdad Khatami

, Vida Ravanmehr, Bane Vasic:
GBP-based detection and symmetric information rate for rectangular-grain TDMR model. 1618-1622 - Rafael Dowsley

, Felipe Lacerda, Anderson C. A. Nascimento
:
Oblivious transfer in the bounded storage model with errors. 1623-1627
Applications of Polar Coding Techniques
- Qi Shi, Lin Song, Chao Tian, Jun Chen, Sorina Dumitrescu:

Polar codes for multiple descriptions. 1628-1632 - Qing Li, Anxiao Andrew Jiang:

Coding for noisy write-efficient memories. 1633-1637 - Eyal En Gad, Yue Li, Jörg Kliewer, Michael Langberg, Anxiao Jiang, Jehoshua Bruck

:
Polar coding for noisy write-once memories. 1638-1642 - Naveen Goela:

Polarized random variables: Maximal correlations and common information. 1643-1647
Sequences
- Tae-Kyo Lee, Kyeongcheol Yang:

The induced correlations of Zadoff-Chu sequences. 1648-1652 - Chang-Min Cho, Ji-Youp Kim, Jong-Seon No:

Cross-correlation distribution between two decimated sequences by 2 and (pm+1)2 over 2. 1653-1657 - Jos H. Weber, Carl H. Heymann, Hendrik C. Ferreira

, Khaled A. S. Abdel-Ghaffar:
Optimized markers for balancing runlength-limited sequences in optical recording. 1658-1662 - Min Zeng, Yuan Luo, Guang Gong:

New binary sequences with good correlation based on high-order difference and interleaving techniques. 1663-1666
Density and Model Estimation
- Andrew R. Barron, Teemu Roos

, Kazuho Watanabe
:
Bayesian properties of normalized maximum likelihood and its fast computation. 1667-1671 - Jossy Sayir

:
The role model estimator revisited. 1672-1676 - Tina Felber, Michael Kohler, Adam Krzyzak:

Density estimation using real and artificial data. 1677-1681 - Jayadev Acharya, Ashkan Jafarpour, Alon Orlitsky, Ananda Theertha Suresh:

Sorting with adversarial comparators and application to density estimation. 1682-1686
Source-Channel Coding with Finite Blocklength
- Vincent Yan Fu Tan, Shun Watanabe

, Masahito Hayashi
:
Moderate deviations for joint source-channel coding of systems with Markovian memory. 1687-1691 - Yanina Shkel

, Vincent Y. F. Tan, Stark C. Draper
:
On mismatched unequal message protection for finite block length joint source-channel coding. 1692-1696 - Nir Elkayam, Meir Feder:

Information spectrum approach to the source channel separation theorem. 1697-1701 - Farhad Shirani Chaharsooghi

, S. Sandeep Pradhan:
Finite block-length gains in distributed source coding. 1702-1706
Biometrics & Cryptography
- Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:

Optimality of non-adaptive strategies: The case of parallel games. 1707-1711 - Paul Stankovski

, Lennart Brynielsson, Martin Hell
:
The efficiency of optimal sampling in the random S-box model. 1712-1716 - Jean-Charles Faugère, Ayoub Otmani

, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich:
Structural weakness of compact variants of the McEliece cryptosystem. 1717-1721 - Wei Kang, Daming Cao

, Nan Liu:
Authentication with side information. 1722-1726 - Diana Maamari, Natasha Devroye, Daniela Tuninetti

:
The capacity of the ergodic miso channel with per-antenna power constraint and an application to the fading cognitive interference channel. 1727-1731 - Oded Fischler, Uri Erez:

Performance of precoded integer-forcing for parallel Gaussian channels. 1732-1736 - Selma Belhadj Amor, Yossef Steinberg

, Michèle A. Wigger:
MAC-BC duality with linear-feedback schemes. 1737-1741 - Yohan Lejosne, Dirk T. M. Slock, Yi Yuan-Wu:

Net degrees of freedom of decomposition schemes for the MIMO IC with delayed CSIT. 1742-1746
Topics in Wireless Communications
- Nicolò Michelusi

, Urbashi Mitra:
A cross-layer framework for joint control and distributed sensing in agile wireless networks. 1747-1751 - Anjin Guo, Yi Zhong, Martin Haenggi

, Wenyi Zhang:
Success probabilities in Gauss-Poisson networks with and without cooperation. 1752-1756 - John Tadrous, Hesham El Gamal, Atilla Eryilmaz:

Can carriers make more profit while users save money? 1757-1761 - Yanru Tang, Tiegang Zhao, Jie Luo:

Medium access control game with an enhanced physical-link layer interface. 1762-1766
Interference Channels 3
- Hua Sun, Syed Ali Jafar

:
Topological interference management with multiple antennas. 1767-1771 - Soheil Gherekhloo, Anas Chaaban, Aydin Sezgin

:
Resolving entanglements in topological interference management with alternating connectivity. 1772-1776 - Chunhua Geng, Hua Sun, Syed Ali Jafar

:
On the optimality of treating interference as noise: General message sets. 1777-1781 - Morgan Barbier:

Re-encoding reformulation and application to Welch-Berlekamp algorithm. 1782-1786 - Son Hoang Dau

, Wentu Song, Chau Yuen:
On the existence of MDS codes over small fields with constrained generator matrices. 1787-1791 - Mario Blaum, James S. Plank

, Moshe Schwartz
, Eitan Yaakobi:
Partial MDS (PMDS) and Sector-Disk (SD) codes that tolerate the erasure of two random sectors. 1792-1796 - Yi Lyu, Li Chen:

A new progressive algebraic soft decoding algorithm for reed-solomon codes. 1797-1801
Topics in Coding and Communications
- Daniel Pedro Bezerra Chaves, Cecilio Pimentel

:
On the follower set graph of shifts of finite type. 1802-1806 - Eduardo Sany Laber, Wilfredo Bardales Roncalla, Ferdinando Cicalese:

On lower bounds for the Maximum Consecutive Subsums Problem and the (min, +)-convolution. 1807-1811 - Francesco Caltagirone, Lenka Zdeborová, Florent Krzakala

:
On convergence of approximate message passing. 1812-1816 - Christopher Rose

, I. Saira Mian:
Signaling with identical tokens: Upper bounds with energy constraints. 1817-1821
Sequences & Functions over Finite Fields
- Honggang Hu, Shuai Shao, Guang Gong, Tor Helleseth:

On the proof of Lin's conjecture. 1822-1826 - Lilya Budaghyan, Alexander Kholosha, Claude Carlet, Tor Helleseth:

Niho bent functions from quadratic o-monomials. 1827-1831 - Baofeng Wu

:
New classes of quadratic bent functions in polynomial forms. 1832-1836 - Meicheng Liu, Dongdai Lin:

Almost perfect algebraic immune functions with good nonlinearity. 1837-1841
Approximation Algorithms and Signal Processing
- Chinmay Hegde

, Piotr Indyk, Ludwig Schmidt:
A fast approximation algorithm for tree-sparse recovery. 1842-1846 - Jaeseok Lee, Suhyuk Kwon, Byonghyo Shim

:
A greedy search algorithm with tree pruning for sparse signal recovery. 1847-1851 - Sameer Pawar, Kannan Ramchandran:

A robust R-FFAST framework for computing a k-sparse n-length DFT in O(k log n) sample complexity using sparse-graph codes. 1852-1856 - Xiao Li, Joseph Kurata Bradley, Sameer Pawar, Kannan Ramchandran:

The SPRIGHT algorithm for robust sparse Hadamard Transforms. 1857-1861
Lossless Universal Source Coding
- Nikhil Krishnan, Dror Baron

, Mehmet Kivanç Mihçak:
A parallel two-pass MDL context tree algorithm for universal source coding. 1862-1866 - Jayadev Acharya, Ashkan Jafarpour, Alon Orlitsky, Ananda Theertha Suresh:

Efficient compression of monotone and m-modal distributions. 1867-1871 - Jayadev Acharya, Ashkan Jafarpour, Alon Orlitsky, Ananda Theertha Suresh:

Poissonization and universal compression of envelope classes. 1872-1876 - Narayana Prasad Santhanam, Venkat Anantharam, Aleksandar Kavcic, Wojciech Szpankowski:

Data-driven weak universal redundancy. 1877-1881
Finite Blocklength Capacity
- Shun Watanabe

, Masahito Hayashi
:
Strong converse and second-order asymptotics of channel resolvability. 1882-1886 - Vincent Y. F. Tan, Pierre Moulin:

Second-order capacities of erasure and list decoding. 1887-1891 - Jonathan Scarlett, Alfonso Martinez

, Albert Guillen i Fabregas
:
The saddlepoint approximation: Unified random coding asymptotics for fixed and varying rates. 1892-1896 - Yucel Altug, Aaron B. Wagner:

The third-order term in the normal approximation for singular channels. 1897-1901 - Ti-wen Tang, Hsiao-Ting Tien, Hsiao-feng Francis Lu:

Coding schemes with constant sphere-decoding complexity and high DMT performance for MIMO multiple access channels with low-rate feedback. 1902-1906
MIMO Multiple Access Channels With Low-Rate Feedback
- Mohammad Tarek Hussien, Karim G. Seddik

, Ramy H. Gohary, Mohammad Shaqfeh
, Hussein M. Alnuweiri, Halim Yanikomeroglu
:
Multi-resolution broadcasting over the Grassmann and stiefel manifolds. 1907-1911 - Jhanak Parajuli, Giuseppe Abreu

:
A space-time Tx scheme for two-cell MISO-BC with delayed CSIT. 1912-1916 - Grégory Berhuy, Nadya Markin, B. A. Sethuraman:

Fast lattice decodability of space-time block codes. 1917-1921
Relaying Schemes
- Siddhartha Brahma, Christina Fragouli:

A simple relaying strategy for diamond networks. 1922-1926 - Siddhartha Brahma, Ayan Sengupta, Christina Fragouli:

Efficient subnetwork selection in relay networks. 1927-1931 - David T. H. Kao, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:

Align-and-forward relaying for two-hop erasure broadcast channels. 1932-1936 - Chang-Ick Song, Cong Ling:

Achievable diversity-rate tradeoff of MIMO AF relaying systems with MMSE transceivers. 1937-1941
Discrete Memoryless Broadcast Channels 1
- Annina Bracher, Amos Lapidoth:

Identification via the broadcast channel. 1942-1946 - Yossef Steinberg

:
Channels with cooperation links that may be absent. 1947-1951 - Hyeji Kim, Abbas El Gamal:

Capacity region of the broadcast channel with two deterministic channel state components. 1952-1956 - Hon Fah Chong, Ying-Chang Liang

:
The capacity region of a new class of K-receiver degraded compound broadcast channels. 1957-1961
Topics in Distributed Storage
- N. Prakash

, V. Lalitha, P. Vijay Kumar:
Codes with locality for two erasures. 1962-1966 - Son Hoang Dau

, Wentu Song, Chau Yuen:
On block security of regenerating codes at the MBR point for distributed storage systems. 1967-1971 - Anyu Wang

, Zhifang Zhang:
Repair locality from a combinatorial perspective. 1972-1976 - Arya Mazumdar:

On a duality between recoverable distributed storage and index coding. 1977-1981
Applications of Codes on Graphs in Communications
- Tarik Benaddi, Charly Poulliat, Marie-Laure Boucheret, Benjamin Gadat, Guy Lesthievent:

Design of unstructured and protograph-based LDPC coded continuous phase modulation. 1982-1986 - John B. Anderson, Mehdi Zeinali

:
Analysis of best high rate convolutional codes for faster than Nyquist turbo equalization. 1987-1991 - Shahrouz Sharifi, Ahmet Korhan Tanc

, Tolga M. Duman:
On LDPC codes for Gaussian interference channels. 1992-1996 - Javier Cespedes

, Pablo M. Olmos, Matilde Sánchez Fernández
, Fernando Pérez-Cruz
:
Improved performance of LDPC-coded MIMO systems with EP-based soft-decisions. 1997-2001
Nonlinear Compressed Sensing
- Akshay Soni, Jarvis D. Haupt:

Estimation error guarantees for Poisson denoising with sparse and structured dictionary models. 2002-2006 - Sheng Cai, Mayank Bakshi

, Sidharth Jaggi, Minghua Chen
:
SUPER: Sparse signals with unknown phases efficiently recovered. 2007-2011 - Yuxin Chen, Andrea J. Goldsmith:

Information recovery from pairwise measurements. 2012-2016 - Yuxin Chen, Yuejie Chi

, Andrea J. Goldsmith:
Robust and universal covariance estimation from quadratic measurements via convex programming. 2017-2021
Graphical Models and Inference
- Jacob Søgaard, Søren Forchhammer

:
Maximizing entropy of pickard random fields for 2×2 binary constraints. 2022-2026 - Hajir Roozbehani, Yury Polyanskiy:

Algebraic methods of classifying directed graphical models. 2027-2031 - Hang Yu, Liaofan Zhang, Justin Dauwels:

Spatio-temporal graphical models for extreme events. 2032-2036 - Gautam Dasarathy

, Robert D. Nowak, Sébastien Roch:
New sample complexity bounds for phylogenetic inference from multiple loci. 2037-2041
Source Coding
- Eva C. Song, Paul Cuff, H. Vincent Poor

:
The likelihood encoder for lossy source compression. 2042-2046 - Wataru Kumagai, Masahito Hayashi

:
Random number conversion via restricted storage. 2047-2051 - Emrah Akyol

, Urbashi Mitra, Ertem Tuncel
, Kenneth Rose:
On scalable coding in the presence of decoder side information. 2052-2056 - Emrah Akyol

, Urbashi Mitra, Ertem Tuncel
, Kenneth Rose:
Source coding in the presence of exploration-exploitation tradeoff. 2057-2061
Finite Blocklength & Fading Channels
- Kasper F. Trillingsgaard, Petar Popovski

:
Block-fading channels with delayed CSIT at finite blocklength. 2062-2066 - Wei Yang, Giuseppe Caire, Giuseppe Durisi

, Yury Polyanskiy:
Finite-blocklength channel coding rate under a long-term power constraint. 2067-2071 - Wei Yang, Giuseppe Durisi

, Tobias Koch
, Yury Polyanskiy:
Dispersion of quasi-static MIMO fading channels via Stokes' theorem. 2072-2076 - Vincent Yan Fu Tan, Marco Tomamichel

:
The third-order term in the normal approximation for the AWGN channel. 2077-2081
Coding For Flash Memories
- Yeow Meng Chee

, Han Mao Kiah, Punarbasu Purkayastha:
Rewritable coset coding for flash memories. 2082-2086 - Yue Li, Anxiao Andrew Jiang, Jehoshua Bruck

:
Error correction and partial information rewriting for flash memories. 2087-2091 - Evyatar Hemo, Yuval Cassuto:

Codes for high performance write and read processes in multi-level NVMs. 2092-2096 - Rami Cohen, Yuval Cassuto:

LDPC codes for partial-erasure channels in multi-level memories. 2097-2101
Relay Channels
- Xianglan Jin, Young-Han Kim:

Approximate capacity of the MIMO relay channel. 2102-2106 - Chenwei Wang:

Beyond one-way communication: Degrees of freedom of the 4-user relay MIMO Y channel. 2107-2111 - Yu-Chih Huang

, Krishna R. Narayanan:
Multistage compute-and-forward with multilevel lattice codes based on product constructions. 2112-2116 - Amin Sakzad

, Emanuele Viterbo
, Joseph Jean Boutros, Yi Hong
:
Phase precoded compute-and-forward with partial feedback. 2117-2121
Discrete Memoryless Broadcast Channels 2
- Amir Salimi

, Tie Liu, Shuguang Cui
:
Polyhedral description of the symmetrical latency capacity region of broadcast channels. 2122-2126 - Youlong Wu, Michèle A. Wigger:

Coding schemes for discrete memoryless broadcast channels with rate-limited feedback. 2127-2131 - Kia Khezeli

, Jun Chen:
A source-channel separation theorem with application to the source broadcast problem. 2132-2136 - SaiDhiraj Amuru, Ravi Tandon, Shlomo Shamai

:
On the degrees-of-freedom of the 3-user MISO broadcast channel with hybrid CSIT. 2137-2141
Topics in Network Coding 1
- Nikhil Karamchandani, Urs Niesen, Mohammad Ali Maddah-Ali, Suhas N. Diggavi:

Hierarchical coded caching. 2142-2146 - Sudeep U. Kamath, David N. C. Tse, Chih-Chun Wang:

Two-unicast is hard. 2147-2151 - Ming Fai Wong, Michael Langberg, Michelle Effros:

Linear capacity equivalence between multiple multicast and multiple unicast. 2152-2156 - Qifu Sun, Xunrui Yin, Zongpeng Li, Keping Long:

Multicast network coding and field sizes. 2157-2161
Rateless Code Design
- Iqbal Hussain, Ingmar Land, Terence H. Chan

, Ming Xiao, Lars K. Rasmussen:
A new design framework for LT codes over noisy channels. 2162-2166 - Mahyar Shirvanimoghaddam

, Yonghui Li
, Branka Vucetic
:
Multiple access analog fountain codes. 2167-2171 - Yao Li, Louis Tan, Ashish Khisti, Emina Soljanin

:
Successive segmentation-based coding for broadcasting over erasure channels. 2172-2176 - Min Zhu, Yucheng Qu, Kai Zhang, Baoming Bai, Xiao Ma:

An improved ensemble of variable-rate LDPC codes with precoding. 2177-2181
Dimensionality Reduction
- Anastasios Kyrillidis, Michail Vlachos

, Anastasios Zouzias:
Approximate matrix multiplication with application to linear embeddings. 2182-2186 - Jinchun Zhan, Namrata Vaswani

, Chenlu Qiu:
Performance guarantees for ReProCS - Correlated low-rank matrix entries case. 2187-2191 - Jinchun Zhan, Namrata Vaswani

:
Robust PCA with partial subspace knowledge. 2192-2196 - Yash Deshpande, Andrea Montanari:

Information-theoretically optimal sparse PCA. 2197-2201
Information-Estimation Relationships
- Guangyue Han, Jian Song

:
Extensions of the I-MMSE relation. 2202-2206 - Camilo G. Taborda

, Fernando Pérez-Cruz
, Dongning Guo:
New information-estimation results for poisson, binomial and negative binomial models. 2207-2211 - Jiantao Jiao, Kartik Venkat, Tsachy Weissman:

Relations between information and estimation in scalar Lévy channels. 2212-2216 - Ivan Nourdin, Giovanni Peccati

, Yvik Swan:
Integration by parts and representation of information functionals. 2217-2221
Distributed Information Processing
- Mohsen Sardari, Ahmad Beirami, Faramarz Fekri

:
Mismatched side information in wireless network compression via overhearing helpers. 2222-2226 - Aolin Xu, Maxim Raginsky:

A new information-theoretic lower bound for distributed function computation. 2227-2231 - Johannes Rauh

, Nils Bertschinger, Eckehard Olbrich
, Jürgen Jost:
Reconsidering unique information: Towards a multivariate information decomposition. 2232-2236
Jamming, Collusion, Privacy
- Jalal Etesami, Negar Kiyavash:

A novel collusion attack on finite alphabet digital fingerprinting systems. 2237-2241 - Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran:

Writing on a dirty paper in the presence of jamming. 2242-2246 - Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran:

Correlated jamming in a Joint Source Channel Communication system. 2247-2251 - Tetsuya Kobayashi, Hiroyoshi Morita, Akiko Manada:

On the capacity of Write-Constrained Memories. 2252-2256
Coding for Memories On the Capacity of Write-Constrained Memories
- Erik Ordentlich, Ron M. Roth:

When data must satisfy constraints upon writing. 2257-2261 - Qing Li, Anxiao Jiang, Erich F. Haratsch:

Noise modeling and capacity analysis for NAND flash memories. 2262-2266
Topics in Learning
- Lili Su, Farzad Farnoud, Olgica Milenkovic:

Similarity distances between permutations. 2267-2271 - Abhik Kumar Das, Praneeth Netrapalli, Sujay Sanghavi, Sriram Vishwanath:

Learning structure of power-law Markov networks. 2272-2276 - Alexey Gronskiy, Joachim M. Buhmann:

How informative are Minimum Spanning Tree algorithms? 2277-2281
Dirty Paper Coding
- Jonathan Scarlett:

On the dispersion of dirty paper coding. 2282-2286 - Stefano Rini, Shlomo Shamai

:
The impact of phase fading on the dirty paper coding channel. 2287-2291 - Ram Zamir:

The modulo loss in lattice dirty-paper coding. 2292-2295
Topics in Network Coding 2
- Baojian Zhou, Wai Ho Mow

:
A quadratic programming relaxation approach to compute-and-forward network coding design. 2296-2300 - Vitaly Skachek, Michael G. Rabbat:

Subspace synchronization: A network-coding approach to object reconciliation. 2301-2305 - Jayant Apte, Congduan Li, John MacLaren Walsh:

Algorithms for computing network coding rate regions via single element extensions of matroids. 2306-2310
Spatially Coupled Systems
- Najeeb ul Hassan, Michael Lentmaier, Iryna Andriyanova, Gerhard P. Fettweis:

Improving code diversity on block-fading channels by spatial coupling. 2311-2315 - Keigo Takeuchi:

A generalization of threshold saturation: application to spatially coupled BICM-ID. 2316-2320 - Rafah El-Khatib, Nicolas Macris, Tom Richardson, Rüdiger L. Urbanke:

Analysis of coupled scalar systems by displacement convexity. 2321-2325
Lattice Codes
- Roope Vehkalahti

, Wittawat Kositwattanarerk, Frédérique E. Oggier:
Constructions a of lattices from number fields and division algebras. 2326-2330 - Roope Vehkalahti

, Laura Luzzi, Jean-Claude Belfiore:
Shifted inverse determinant sums and new bounds for the DMT of space-time lattice codes. 2331-2335 - Avinash Vem, Yu-Chih Huang

, Krishna R. Narayanan, Henry D. Pfister
:
Multilevel lattices based on spatially-coupled LDPC codes with applications. 2336-2340
Group Testing
- Arkadii G. D'yachkov, Ilya Vorobyev

, N. A. Polyanskii
, Vladislav Yu. Shchukin:
Bounds on the rate of superimposed codes. 2341-2345 - Tongxin Li

, Chun Lam Chan, Wenhao Huang, Tarik Kaced, Sidharth Jaggi:
Group testing with prior statistics. 2346-2350 - Amin Emad, Olgica Milenkovic:

Group testing for non-uniformly quantized adder channels. 2351-2355
Sequential Transmission & Feedback
- Mehnaz Mannan, Aditya Mahajan

:
Simultaneous real-time transmission of multiple Markov sources over a shared channel. 2356-2360 - Yucel Altug, Aaron B. Wagner:

Feedback can improve the second-order coding performance in discrete memoryless channels. 2361-2365 - Rui Ma, Todd P. Coleman:

Necessary and sufficient conditions for reliability of posterior matching in arbitrary dimensions. 2366-2370
Topics in Secrecy 2
- Quan Geng, Pramod Viswanath:

The optimal mechanism in differential privacy. 2371-2375 - Holger Boche, Rafael F. Schaefer, H. Vincent Poor

:
On arbitrarily varying wiretap channels for different classes of secrecy measures. 2376-2380 - Faruk Yavuz, Jun Zhao

, Osman Yagan, Virgil D. Gligor:
On secure and reliable communications in wireless sensor networks: Towards k-connectivity under a random pairwise key predistribution scheme. 2381-2385
Rank Modulation Codes
- Sarit Buzaglo, Eitan Yaakobi, Tuvi Etzion, Jehoshua Bruck

:
Systematic codes for rank modulation. 2386-2390 - Sarit Buzaglo, Tuvi Etzion:

Perfect permutation codes with the Kendall's τ-metric. 2391-2395 - Sarit Buzaglo, Eitan Yaakobi:

Constrained codes for rank modulation. 2396-2400
Topics in Networks
- Oliver Kosut, Jörg Kliewer:

Equivalence for networks with adversarial state. 2401-2405 - Yu Zhao, Biao Chen:

Capacity theorems for multi-functioning radios. 2406-2410 - Clement Kam, Sastry Kompella

, Anthony Ephremides:
Effect of message transmission diversity on status age. 2411-2415
Continuous-Time Information Theory
- Edwin Hammerich:

Waterfilling theorems in the time-frequency plane for the heat channel and a related source. 2416-2420 - Xianming Liu

, Guangyue Han:
Recent results in continuous-time network information theory. 2421-2425 - Luca Barletta, Gerhard Kramer

:
On continuous-time white phase noise channels. 2426-2429
Distributed Storage - Repair and Generation 2
- Birenjith Padmakumari Sasidharan

, Kaushik Senthoor, P. Vijay Kumar:
An improved outer bound on the storage-repair-bandwidth tradeoff of exact-repair regenerating codes. 2430-2434 - Gokhan Calis, Onur Ozan Koyluoglu:

Repairable Block Failure Resilient codes. 2435-2439 - Shiqiu Liu, Frédérique E. Oggier:

On storage codes allowing partially collaborative repairs. 2440-2444
Non-Binary LDPC Codes
- Koji Tazoe, Kenta Kasai, Kohichi Sakaniwa:

Non-binary LDPC codes with large alphabet size. 2445-2448 - Xishuo Liu, Stark C. Draper

:
ADMM decoding of non-binary LDPC codes in F2m. 2449-2453 - Juane Li, Keke Liu, Shu Lin, Khaled A. S. Abdel-Ghaffar:

Quasi-cyclic LDPC codes on two arbitrary sets of a finite field. 2454-2458 - Neri Merhav:

List decoding - Random coding exponents and expurgated exponents. 2459-2463 - Tsung-Yi Chen, Adam R. Williamson, Richard D. Wesel:

Asymptotic expansion and error exponent for two-phase feedback codes on DMCs. 2464-2468 - Tsung-Yi Chen, Dariush Divsalar, Richard D. Wesel:

Achievability bounds for rate-compatible codes. 2469-2473
Information Measures
- Peter Harremoës:

Mutual information of contingency tables and related inequalities. 2474-2478 - Nils Bertschinger, Johannes Rauh

:
The Blackwell relation defines no lattice. 2479-2483 - Georg Pichler

, Günther Koliander
, Erwin Riegler, Franz Hlawatsch:
Entropy for singular distributions. 2484-2488
Lossless Compression
- Hongchao Zhou, Da Wang, Gregory W. Wornell

:
A simple class of efficient compression schemes supporting local access and editing. 2489-2493 - Thomas A. Courtade, Sergio Verdú:

Cumulant generating function of codeword lengths in optimal lossless compression. 2494-2498 - Thomas A. Courtade, Sergio Verdú:

Variable-length lossy compression and channel coding: Non-asymptotic converses via cumulant generating functions. 2499-2503 - Xiao Yang, Andrew R. Barron:

Compression and predictive distributions for large alphabet i.i.d and Markov models. 2504-2508
Finite Blocklength & Error Exponents
- Nir Weinberger, Neri Merhav:

Codeword or noise? Exact random coding exponents for slotted asynchronism. 2509-2513 - Sy-Quoc Le, Vincent Yan Fu Tan, Mehul Motani

:
Second-order asymptotics for the Gaussian interference channel with strictly very strong interference. 2514-2518 - Yanina Y. Shkel

, Vincent Y. F. Tan, Stark C. Draper
:
Achievability bounds for unequal message protection at finite block lengths. 2519-2523 - Austin Collins, Yury Polyanskiy:

Orthogonal designs optimize achievable dispersion for coherent MISO channels. 2524-2528
Uplink and Downlink
- Ansuman Adhikary, Alexei E. Ashikhmin, Thomas L. Marzetta:

Uplink interference reduction in Large Scale Antenna Systems. 2529-2533 - Maha Alodeh

, Symeon Chatzinotas
, Björn E. Ottersten:
A multicast approach for constructive interference precoding in MISO downlink channel. 2534-2538 - Jonathan Scarlett, Alfonso Martinez

, Albert Guillen i Fabregas
:
Mismatched multi-letter successive decoding for the multiple-access channel. 2539-2543 - Wenbo He, Bobak Nazer, Shlomo Shamai

:
Uplink-downlink duality for integer-forcing. 2544-2548
Gaussian Channel with Feedback
- Erdem Koyuncu

, Hamid Jafarkhani
:
Delay-limited capacity of MIMO channels with limited feedback. 2549-2553 - Marat V. Burnashev

, Hirosuke Yamamoto
:
Noisy feedback improves the Gaussian channel reliability function. 2554-2558 - Christoph Bunte, Amos Lapidoth, Lars Palzer:

Coding for the Gaussian channel with intermittent feedback. 2559-2563
Broadcast Channels with Imperfect CSI
- Jinyuan Chen, Sheng Yang, Ayfer Özgür

, Andrea J. Goldsmith:
Outdated CSIT can achieve full DoF in heterogeneous parallel channels. 2564-2568 - Tsung-Yi Chen, Xu Chen, Dongning Guo:

Many-broadcast channels: Definition and capacity in the degraded case. 2569-2573 - Mohamed Fadel, Aria Nosratinia

:
Coherent, non-coherent, and mixed-CSIR broadcast channels: Multiuser degrees of freedom. 2574-2578 - Jinyuan Chen, Petros Elia

, Syed Ali Jafar
:
On the vector broadcast channel with alternating CSIT: A topological perspective. 2579-2583
Decoding and Encoding Algorithms for Algebraic Codes
- Alexander Zeh, San Ling

:
Decoding of quasi-cyclic codes up to a new lower bound on the minimum distance. 2584-2588 - Michael Helmling, Eirik Rosnes, Stefan Ruzika, Stefan Scholl:

Efficient maximum-likelihood decoding of linear block codes on binary memoryless channels. 2589-2593 - Anna-Lena Trautmann

:
Message encoding for spread and orbit codes. 2594-2598 - Srdan Brkic, Predrag N. Ivanis

, Bane Vasic:
Analysis of one-step majority logic decoding under correlated data-dependent gate failures. 2599-2603
Analysis of Iterative Decoding Algorithms
- Shrinivas Kudekar, Tom Richardson, Aravind R. Iyengar:

The effect of saturation on belief propagation decoding of LDPC codes. 2604-2608 - Saeedeh Moloudi, Michael Lentmaier:

Density evolution analysis of braided convolutional codes on the erasure channel. 2609-2613 - Qinliang Su, Yik-Chung Wu

:
Determining the convergence of variance in Gaussian belief propagation via semi-definite programming. 2614-2618 - Nithin Raveendran, Shayan Garani Srinivasa:

A modified sum-product algorithm over graphs with isolated short cycles. 2619-2623
Topics in Signal Processing
- Sijia Liu, Makan Fardad, Swarnendu Kar, Pramod K. Varshney:

On optimal sensor collaboration topologies for linear coherent estimation. 2624-2628 - Hailong Shi, Hao Zhang, Gang Li, Xiqin Wang:

Stable grassmann manifold embedding via Gaussian random matrices. 2629-2633 - Wasim Huleihel, Neri Merhav:

Asymptotic MMSE analysis under sparse representation modeling. 2634-2638
Markov Fields Types and Tilings
- Yuliy M. Baryshnikov

, Jaroslaw Duda, Wojciech Szpankowski:
Markov field types and tilings. 2639-2643 - Sheng Huang, Mikael Skoglund:

Supremus typicality. 2644-2648 - Junekey Jeon:

A generalized typicality for abstract alphabets. 2649-2653 - Jorge F. Silva, Milan S. Derpich

:
Precise best k-term approximation error analysis of ergodic processes. 2654-2658
Successive Refinement
- Albert No, Amir Ingber, Tsachy Weissman:

Strong successive refinability: Sufficient conditions. 2659-2663 - Badri N. Vellambi

, Roy Timo:
Successive refinement with common receiver reconstructions. 2664-2668 - Chien-Yi Wang, Michael Gastpar:

On distributed successive refinement with lossless recovery. 2669-2673 - Derek Xu, Kittipong Kittichokechai

, Tobias J. Oechtering
, Mikael Skoglund:
Secure successive refinement with degraded side information. 2674-2678
Finite Blocklength Source Coding
- Victoria Kostina

, Yury Polyanskiy, Sergio Verdú:
Variable-length compression allowing errors. 2679-2683 - Shigeaki Kuzuoka, Shun Watanabe

:
An information-spectrum approach to weak variable-length Slepian-Wolf coding. 2684-2688 - Oliver Kosut, Lalitha Sankar:

New results on third-order coding rate for universal fixed-to-variable source coding. 2689-2693
Backhaul Design for Cellular Systems
- Aly El Gamal, Venugopal V. Veeravalli:

Flexible backhaul design and degrees of freedom for linear interference networks. 2694-2698 - Seok-Hwan Park, Osvaldo Simeone

, Onur Sahin, Shlomo Shamai
:
Multivariate backhaul compression for the downlink of cloud radio access networks. 2699-2703 - Seok-Hwan Park, Osvaldo Simeone

, Onur Sahin, Shlomo Shamai
:
Multihop backhaul compression for the uplink of cloud radio access networks. 2704-2708 - Harpreet S. Dhillon, Giuseppe Caire:

Scalability of line-of-sight massive MIMO mesh networks for wireless backhaul. 2709-2713
Multi-way Relay Channel
- Zhiyu Cheng, Natasha Devroye:

The degrees of freedom of the K-pair-user full-duplex two-way interference channel with a MIMO relay. 2714-2718 - Reza Rafie Borujeny, Moslem Noori, Masoud Ardakani:

On the achievable rates of pairwise multiway relay channels. 2719-2723 - Stephan Schedler, Volker Kühn:

Mutual information based resource allocation in the two-way relay channel with OFDM. 2724-2728 - Leila Ghabeli

, Milan S. Derpich
:
Approaching the capacity of two-way gaussian relay channel with relay private messages. 2729-2733
Two-user IC
- Reza Khosravi-Farsani:

On the capacity region of the two-user Interference Channel. 2734-2738 - Zhengchuan Chen, Pingyi Fan

, Dapeng Oliver Wu
, Yunquan Dong, Khaled Ben Letaief
:
On the achievable sum rate of Gaussian interference channel via Gaussian signaling. 2739-2743 - Igal Sason:

On the corner points of the capacity region of a two-user Gaussian interference channel. 2744-2748 - Lele Wang, Eren Sasoglu, Young-Han Kim:

Sliding-window superposition coding for interference networks. 2749-2753
Deletion Correction in Permutations
- Farzad Farnoud, Olgica Milenkovic:

Multipermutation codes in the Ulam metric. 2754-2758 - Ryan Gabrys, Eitan Yaakobi, Farzad Farnoud, Jehoshua Bruck

:
Codes correcting erasures and deletions for rank modulation. 2759-2763 - Ryan Gabrys, Eitan Yaakobi, Farzad Farnoud, Frederic Sala, Jehoshua Bruck

, Lara Dolecek:
Single-deletion-correcting codes over permutations. 2764-2768 - Frederic Sala, Ryan Gabrys, Lara Dolecek:

Deletions in multipermutations. 2769-2773
Topics in LDPC and Turbo Coding
- Irina E. Bocharova, Boris D. Kudryashov, Rolf Johannesson:

LDPC convolutional codes versus QC LDPC block codes in communication standard scenarios. 2774-2778 - Hironori Uchikawa:

Design of non-precoded protograph-based LDPC codes. 2779-2783 - Jean-Pierre Tillich, Audrey Tixier, Nicolas Sendrier:

Recovering the interleaver of an unknown turbo-code. 2784-2788 - Zihui Liu, Jens Zumbrägel, Marcus Greferath, Xin-Wen Wu

:
Notes on the pseudoredundancy. 2789-2793
Optical Communications
- Ronen Dar, Meir Feder, Antonio Mecozzi

, Mark Shtaif:
On shaping gain in the nonlinear fiber-optic channel. 2794-2798 - Masahiro Takeoka, Saikat Guha:

Capacity of optical communication in loss and noise with general quantum Gaussian receivers. 2799-2803 - Qun Zhang, Terence H. Chan

, Alex J. Grant
:
Spatially periodic signals for fiber channels. 2804-2808 - Hongchao Zhou, Gregory W. Wornell

:
On the limits of communication over optical on-off keying channels with crosstalk. 2809-2813
Information Inequalities
- Siu-Wai Ho

, Chee Wei Tan
, Raymond W. Yeung:
Proving and disproving information inequalities. 2814-2818 - Randall Dougherty:

Computations of linear rank inequalities on six variables. 2819-2823 - Yuta Kishi, Nozomu Ochiumi, Masahiro Yanagida:

Entropy inequalities for sums over several subsets and their applications to average entropy. 2824-2828 - Liyao Wang, Jae Oh Woo, Mokshay M. Madiman:

A lower bound on the Rényi entropy of convolutions in the integers. 2829-2833
Rate Distortion for Gaussian Sources
- Alon Kipnis

, Andrea J. Goldsmith:
Distortion rate function of cyclo-stationary Gaussian processes. 2834-2838 - Steffen Dempfle, Fabian Steiner, Amir Ingber, Tsachy Weissman:

Compression for quadratic similarity queries via shape-gain quantizers. 2839-2843 - Ramji Venkataramanan, Sekhar Tatikonda:

The Gaussian rate-distortion function of sparse regression codes with optimal encoding. 2844-2848 - Andreas Winkelbauer, Stefan Farthofer, Gerald Matz:

The rate-information trade-off for Gaussian vector channels. 2849-2853
Variations on Channel Capacity
- Pulkit Grover

:
Is "Shannon-capacity of noisy computing" zero? 2854-2858 - Nir Elkayam, Meir Feder:

A universal decoder relative to a given family of metrics. 2859-2863 - Gábor Simonyi, Ágnes Tóth:

A generalization of Witsenhausen's zero-error rate for directed graphs. 2864-2868 - Arya Mazumdar:

On the capacity of memoryless adversary. 2869-2873 - Hideki Yagi, Ryo Nomura

:
Single-letter characterization of epsilon-capacity for mixed memoryless channels. 2874-2878
Fading Channels
- Hamza Soury

, Mohamed-Slim Alouini
:
On the symbol error rate of M-ary MPSK over generalized fading channels with additive Laplacian noise. 2879-2883 - Gholamreza Alirezaei

, Rudolf Mathar:
Scrutinizing the average error probability for Nakagami fading channels. 2884-2888 - Junyoung Nam:

Fundamental limits in correlated fading MIMO broadcast channels: Benefits of transmit correlation diversity. 2889-2893 - Zouheir Rezki

, Mohamed-Slim Alouini
:
On the outage capacity of the block fading channel at low-power regime. 2894-2898 - Behzad Asadi, Lawrence Ong

, Sarah J. Johnson
:
The capacity of three-receiver AWGN broadcast channels with receiver message side information. 2899-2903
Capacity Approximation
- David Sutter

, Peyman Mohajerin Esfahani
, Tobias Sutter, John Lygeros:
Efficient approximation of discrete memoryless channel capacities. 2904-2908 - Tobias Sutter, Peyman Mohajerin Esfahani

, David Sutter
, John Lygeros:
Capacity approximation of memoryless channels with countable output alphabets. 2909-2913 - Tobias Lutz:

Recursions for the trapdoor channel and an upper bound on its capacity. 2914-2918 - Xiao Gao

, David B. Grayden, Mark D. McDonnell
:
Using convex optimization to compute channel capacity in a channel model of cochlear implant stimulation. 2919-2923 - Ligong Wang, Gregory W. Wornell

:
The impact of dark current on the wideband Poisson channel. 2924-2928
Multiple Access Channel
- Michal Yemini

, Anelia Somekh-Baruch, Amir Leshem
:
On the asynchronous cognitive MAC. 2929-2933 - Tal Kopetz, Haim H. Permuter

, Shlomo Shamai
:
Multiple access channels with combined cooperation and partial cribbing. 2934-2938 - Jui Wu, Achilleas Anastasopoulos:

The feedback capacity of a class of finite state multiple access channels. 2939-2943 - Lóránt Farkas, Tamás Kói

:
Universal error exponent for discrete asynchronous multiple access channels. 2944-2948 - Jingge Zhu

, Michael Gastpar:
Gaussian (dirty) multiple access channels: A compute-and-forward perspective. 2949-2953
Algebraic Coding Theory 2
- Rafael Gregorio Lucas D'Oliveira, Marcelo Firer:

The packing radius of a code and partitioning problems: The case for poset metrics. 2954-2958 - Yeow Meng Chee

, Van Khu Vu:
Breakpoint analysis and permutation codes in generalized Kendall tau and Cayley metrics. 2959-2963 - Yeow Meng Chee

, Liyasi Wu, Chaoping Xing
:
Correcting on curves and highly sound locally correctable codes of high rate. 2964-2966 - Marion Bellard, Jean-Pierre Tillich:

Detecting and reconstructing an unknown convolutional code by counting collisions. 2967-2971
Decoding of Polar Codes
- Peter Trifonov:

Binary successive cancellation decoding of polar codes with Reed-Solomon kernel. 2972-2976 - Alexios Balatsoukas-Stimming, Georgios Karakonstantis, Andreas Burg

:
Enabling complexity-performance trade-offs for successive cancellation decoding of polar codes. 2977-2981 - Veeresh Taranalli, Paul H. Siegel:

Adaptive linear programming decoding of polar codes. 2982-2986 - Jing Guo, Minghai Qin, Albert Guillen i Fabregas

, Paul H. Siegel:
Enhanced belief propagation decoding of polar codes through concatenation. 2987-2991 - Dina Goldin, David Burshtein:

Gap to capacity in concatenated Reed-Solomon polar coding scheme. 2992-2996
Linear Inverse Problems 1
- Reinhard Heckel, Michael Tschannen, Helmut Bölcskei:

Subspace clustering of dimensionality-reduced data. 2997-3001 - Sunav Choudhary

, Urbashi Mitra:
Sparse blind deconvolution: What cannot be done. 3002-3006 - Christos Thrampoulidis, Samet Oymak, Babak Hassibi:

Simple error bounds for regularized noisy linear inverse problems. 3007-3011 - Matthew S. Nokleby, Miguel R. D. Rodrigues, A. Robert Calderbank:

Discrimination on the grassmann manifold: Fundamental limits of subspace classifiers. 3012-3016 - Galen Reeves:

The fundamental limits of stable recovery in compressed sensing. 3017-3021
Information Theory & Statistics
- Venkat Anantharam, Amin Aminzadeh Gohari

, Sudeep Kamath, Chandra Nair:
On hypercontractivity and a data processing inequality. 3022-3026 - Sabyasachi Chatterjee, Andrew R. Barron:

Information theoretic validity of penalized likelihood. 3027-3031 - Mustafa S. Mehmetoglu, Emrah Akyol

, Kenneth Rose:
A deterministic annealing approach to Witsenhausen's counterexample. 3032-3036 - Jun'ichi Takeuchi, Andrew R. Barron:

Asymptotically minimax regret for models with hidden variables. 3037-3041 - Zsolt Talata:

Markov neighborhood estimation with linear complexity for random fields. 3042-3046
Variations on Lossy Source Coding
- Yeow-Khiang Chia, Hon Fah Chong:

On lossy source coding with side information under the erasure distortion measure. 3047-3051 - Hongbo Si, Onur Ozan Koyluoglu, Sriram Vishwanath:

Lossy compression of exponential and laplacian sources using expansion coding. 3052-3056 - Vinay Praneeth Boda, Prakash Narayan:

Sampling rate distortion. 3057-3061 - Photios A. Stavrou, Christos K. Kourtellaris, Charalambos D. Charalambous

:
Applications of information Nonanticipative Rate Distortion Function. 3062-3066
Capacity with Constraints or Mismatch
- Anelia Somekh-Baruch:

A general formula for the mismatch capacity. 3067-3071 - Yonglong Li, Guangyue Han:

Input-constrained erasure channels: Mutual information and capacity. 3072-3076 - Jihad Fahs, Ibrahim C. Abou-Faycal:

A cauchy input achieves the capacity of a Cauchy channel under a logarithmic constraint. 3077-3081 - Or Ordentlich, Ofer Shayevitz:

Bounding techniques for the intrinsic uncertainty of channels. 3082-3086
MIMO Systems
- Yang Liu, Tiffany Jing Li, Xuanxuan Lu:

Multi-terminal joint transceiver design for MIMO systems with contaminated source and individual power constraint. 3087-3091 - Xiaohu Shang:

Interference mitigation and signal enhancement for K-user MIMO interference channels. 3092-3096 - Pierre Coucheney, Bruno Gaujal, Panayotis Mertikopoulos

:
Distributed optimization in multi-user MIMO systems with imperfect and delayed information. 3097-3101 - Alexander Fish

, Shamgar Gurevich:
Performance estimates of the pseudo-random method for radar detection. 3102-3106 - Ebtihal H. G. Yousif

, Tharmalingam Ratnarajah:
On the design and throughput analysis of a new MME detector using Bartlett's method. 3107-3111 - Pengfei Yang, Biao Chen:

Wyner's common information in Gaussian channels. 3112-3116
Variations on MAC
- Alexandros Manolakos, Mainak Chowdhury, Andrea J. Goldsmith:

CSI is not needed for optimal scaling in multiuser massive SIMO systems. 3117-3121 - Uri Mendlovic, Meir Feder:

Collaboration gain in MAC is limited. 3122-3126 - Xu Chen, Dongning Guo:

Many-access channels: The Gaussian case with random user activities. 3127-3131 - Parham Noorzad, Michelle Effros, Michael Langberg, Tracey Ho:

On the power of cooperation: Can a little help a lot? 3132-3136
Code Distance and Weight Enumerators
- Guanghui Song, Jun Cheng:

Distance enumerator analysis for multi-user codes. 3137-3141 - Ryutaroh Matsumoto

:
New asymptotic metrics for relative generalized Hamming weight. 3142-3144 - Wenbing Chen, Jinquan Luo, Yuansheng Tang:

Exponential sum from half quadratic forms and its application. 3145-3149 - Danilo Gligoroski, Katina Kralevska

:
Families of Optimal Binary Non-MDS Erasure Codes. 3150-3154
LDPC and Turbo Code Analysis
- Eirik Rosnes, Marcel Adrian Ambroze

, Martin Tomlinson:
An upper bound on the minimum distance of array low-density parity-check codes. 3155-3159 - Pavel S. Rybin

, Victor V. Zyablov
:
On the upper bound on undetected error probability for LDPC code. 3160-3164 - Pavel S. Rybin

:
On the error-correcting capabilities of low-complexity decoded irregular LDPC codes. 3165-3169 - Ayça Özçelikkale, Tolga M. Duman:

Lower bounds on the error probability of turbo codes. 3170-3174
Linear Inverse Problems 2
- Samet Oymak, Babak Hassibi:

A case for orthogonal measurements in linear inverse problems. 3175-3179 - Quan Geng, John Wright:

On the local correctness of ℓ1-minimization for dictionary learning. 3180-3184 - Mikko Vehkaperä

, Yoshiyuki Kabashima, Saikat Chatterjee:
Analysis of regularized LS reconstruction and random matrix ensembles in compressed sensing. 3185-3189 - Yuan Wang, Yajun Mei:

Online parallel monitoring via hard-thresholding post-change estimation. 3190-3194 - Saeed Bagheri, Anna Scaglione

:
The Cognitive Compressive Sensing problem. 3195-3199 - Jayadev Acharya, Ashkan Jafarpour, Alon Orlitsky, Ananda Theertha Suresh:

Sublinear algorithms for outlier detection and generalized closeness testing. 3200-3204 - Yun Li, Sirin Nitinawarat, Venugopal V. Veeravalli:

Universal sequential outlier hypothesis testing. 3205-3209

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














