Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
Information Theory and Reliable CommunicationDecember 1968
Publisher:
  • John Wiley & Sons, Inc.
  • 605 Third Ave. New York, NY
  • United States
ISBN:978-0-471-29048-3
Published:01 December 1968
Pages:
588
Skip Bibliometrics Section
Reflects downloads up to 12 Feb 2025Bibliometrics
Abstract

No abstract available.

Cited By

  1. Li K and Yao Y (2025). Reliable Simulation of Quantum Channels: The Error Exponent, IEEE Transactions on Information Theory, 71:1, (518-529), Online publication date: 1-Jan-2025.
  2. Chan C, Fu F and Xiong M (2025). Decoding error probability of random parity-check matrix ensemble over the erasure channel, Designs, Codes and Cryptography, 93:1, (51-77), Online publication date: 1-Jan-2025.
  3. Cocco G, Guillén i Fàbregas A and Font-Segura J (2024). A Refinement of Expurgation, IEEE Transactions on Information Theory, 70:12, (8419-8422), Online publication date: 1-Dec-2024.
  4. Jin L, Xu X, Han S, Chi X, Zhang P and Yuen C (2024). Achievable Rate of Linear Holographic MIMO With Arbitrary Aperture-Length, IEEE Transactions on Wireless Communications, 23:11_Part_1, (16742-16756), Online publication date: 1-Nov-2024.
  5. Bariffi J, Bartz H, Liva G and Rosenthal J (2024). Error-Correction Performance of Regular Ring-Linear LDPC Codes Over Lee Channels, IEEE Transactions on Information Theory, 70:11, (7820-7839), Online publication date: 1-Nov-2024.
  6. Li Z, Göttsch F, Li S, Chen M and Caire G (2024). Joint Fronthaul Load Balancing and Computation Resource Allocation in Cell-Free User-Centric Massive MIMO Networks, IEEE Transactions on Wireless Communications, 23:10_Part_2, (14125-14139), Online publication date: 1-Oct-2024.
  7. Yavas R, Kostina V and Effros M (2024). Third-Order Analysis of Channel Coding in the Small-to-Moderate Deviations Regime, IEEE Transactions on Information Theory, 70:9, (6139-6170), Online publication date: 1-Sep-2024.
  8. Khina A and Merhav N (2024). Modulation and Estimation With a Helper, IEEE Transactions on Information Theory, 70:9, (6189-6210), Online publication date: 1-Sep-2024.
  9. Su J, Han G and Shamai S (2024). Feedback Capacity of the Continuous-Time ARMA(1,1) Gaussian Channel, IEEE Transactions on Information Theory, 70:9, (6171-6188), Online publication date: 1-Sep-2024.
  10. Grigorescu A, Boche H, Schaefer R and Vincent Poor H (2024). Capacity of Finite State Channels With Feedback: Algorithmic and Optimization Theoretic Properties, IEEE Transactions on Information Theory, 70:8, (5413-5426), Online publication date: 1-Aug-2024.
  11. Wei Ling C, Liu Y and Li C (2024). Weighted Parity-Check Codes for Channels With State and Asymmetric Channels, IEEE Transactions on Information Theory, 70:8, (5573-5588), Online publication date: 1-Aug-2024.
  12. Langberg M and Sabag O (2024). Competitive Channel-Capacity, IEEE Transactions on Information Theory, 70:7, (4585-4598), Online publication date: 1-Jul-2024.
  13. Hayashi M and Chen Y (2023). Non-Adaptive Coding for Two-Way Wiretap Channel With or Without Cost Constraints, IEEE Transactions on Information Theory, 70:7, (4611-4633), Online publication date: 1-Jul-2024.
  14. Esposito A and Mondelli M (2024). Concentration Without Independence via Information Measures, IEEE Transactions on Information Theory, 70:6, (3823-3839), Online publication date: 1-Jun-2024.
  15. Somekh-Baruch A (2024). An Upper Bound on the Reliability Function of Discrete Memoryless Channels, IEEE Transactions on Information Theory, 70:5, (3059-3081), Online publication date: 1-May-2024.
  16. Atif T, Sohail M and Pradhan S (2023). Lossy Quantum Source Coding With a Global Error Criterion Based on a Posterior Reference Map, IEEE Transactions on Information Theory, 70:5, (3470-3498), Online publication date: 1-May-2024.
  17. Cheng H and Gao L (2023). Error Exponent and Strong Converse for Quantum Soft Covering, IEEE Transactions on Information Theory, 70:5, (3499-3511), Online publication date: 1-May-2024.
  18. Lapidoth A and Wang L (2023). State-Dependent DMC With a Causal Helper, IEEE Transactions on Information Theory, 70:5, (3162-3174), Online publication date: 1-May-2024.
  19. Wang J, Yang S, Dong Y and Zhang Y (2024). On Achievable Rates of Line Networks With Generalized Batched Network Coding, IEEE Journal on Selected Areas in Communications, 42:5, (1316-1328), Online publication date: 1-May-2024.
  20. Wan P and Chen P (2024). Maximizing Weighted Sum-Rate Over Gaussian Broadcast Channels, IEEE Transactions on Information Theory, 70:4, (2922-2935), Online publication date: 1-Apr-2024.
  21. Shemuel E, Sabag O and Permuter H (2024). Finite-State Channels With Feedback and State Known at the Encoder, IEEE Transactions on Information Theory, 70:3, (1610-1628), Online publication date: 1-Mar-2024.
  22. Femenias G and Riera-Palou F (2024). Mobile Edge Computing Aided Cell-Free Massive MIMO Networks, IEEE Transactions on Mobile Computing, 23:2, (1246-1261), Online publication date: 1-Feb-2024.
  23. Moshksar K (2024). On a Class of Time-Varying Gaussian ISI Channels, IEEE Transactions on Information Theory, 70:2, (1147-1166), Online publication date: 1-Feb-2024.
  24. Zhang Y and Vatedka S (2024). Multiple Packing: Lower Bounds via Error Exponents, IEEE Transactions on Information Theory, 70:2, (1008-1039), Online publication date: 1-Feb-2024.
  25. Ghaddar N, Ganguly S, Wang L and Kim Y (2024). A Lego-Brick Approach to Coding for Network Communication, IEEE Transactions on Information Theory, 70:2, (865-903), Online publication date: 1-Feb-2024.
  26. Cao Q and Zhou Q (2024). Zero-Error Capacity of the Chemical Residual Channel, IEEE Transactions on Information Theory, 70:2, (854-864), Online publication date: 1-Feb-2024.
  27. Göktepe B, Hellge C, Schierl T and Stanczak S (2024). Distributed Machine-Learning for Early HARQ Feedback Prediction in Cloud RANs, IEEE Transactions on Wireless Communications, 23:1, (31-44), Online publication date: 1-Jan-2024.
  28. Theocharous A, Gregoriou G, Sapountzis P and Kontoyiannis I (2024). Temporally Causal Discovery Tests for Discrete Time Series and Neural Spike Trains, IEEE Transactions on Signal Processing, 72, (1333-1347), Online publication date: 1-Jan-2024.
  29. Ma J, Xu J and Maleki A (2024). Toward Designing Optimal Sensing Matrices for Generalized Linear Inverse Problems, IEEE Transactions on Information Theory, 70:1, (482-508), Online publication date: 1-Jan-2024.
  30. Sefidgaran M, Zaidi A and Krasnowski P Minimum description length and generalization guarantees for representation learning Proceedings of the 37th International Conference on Neural Information Processing Systems, (1489-1525)
  31. Tamir R and Merhav N (2023). Error Exponents of the Dirty-Paper and Gel’fand–Pinsker Channels, IEEE Transactions on Information Theory, 69:12, (7479-7498), Online publication date: 1-Dec-2023.
  32. Truong L, Cocco G, Font-Segura J and Guillén i Fàbregas A (2023). Concentration Properties of Random Codes, IEEE Transactions on Information Theory, 69:12, (7499-7537), Online publication date: 1-Dec-2023.
  33. Rameshwar V and Kashyap N (2023). Coding Schemes Based on Reed-Muller Codes for (d, ∞)-RLL Input-Constrained Channels, IEEE Transactions on Information Theory, 69:11, (7003-7024), Online publication date: 1-Nov-2023.
  34. Ezzine R, Wiese M, Deppe C and Boche H (2023). A Proof of a Single-Letter Capacity Formula for MIMO Gauss-Markov Rayleigh Fading Channels, IEEE Transactions on Information Theory, 69:11, (6878-6896), Online publication date: 1-Nov-2023.
  35. Ogbe D, Wang C and Love D (2023). On the Optimal Delay Growth Rate of Multi-Hop Line Networks: Asymptotically Delay-Optimal Designs and the Corresponding Error Exponents, IEEE Transactions on Information Theory, 69:10, (6167-6193), Online publication date: 1-Oct-2023.
  36. Pan H, Chan T, Leung V and Li J (2023). Age of Information in Physical-Layer Network Coding Enabled Two-Way Relay Networks, IEEE Transactions on Mobile Computing, 22:8, (4485-4499), Online publication date: 1-Aug-2023.
  37. Luzzi L, Ling C and Bloch M (2023). Optimal Rate-Limited Secret Key Generation From Gaussian Sources Using Lattices, IEEE Transactions on Information Theory, 69:8, (4944-4960), Online publication date: 1-Aug-2023.
  38. Tsur D, Aharoni Z, Goldfeld Z and Permuter H (2023). Neural Estimation and Optimization of Directed Information Over Continuous Spaces, IEEE Transactions on Information Theory, 69:8, (4777-4798), Online publication date: 1-Aug-2023.
  39. Akrout M, Shyianov V, Bellili F, Mezghani A and Heath R (2023). Super-Wideband Massive MIMO, IEEE Journal on Selected Areas in Communications, 41:8, (2414-2430), Online publication date: 1-Aug-2023.
  40. Sun L, Yang Y, Chen M, Guo C, Saad W and Poor H (2023). Adaptive Information Bottleneck Guided Joint Source and Channel Coding for Image Transmission, IEEE Journal on Selected Areas in Communications, 41:8, (2628-2644), Online publication date: 1-Aug-2023.
  41. Rodríguez-Gálvez B, Blaas A, Rodríguez P, Goliński A, Suau X, Ramapuram J, Busbridge D and Zappella L The role of entropy and reconstruction in multi-view self-supervised learning Proceedings of the 40th International Conference on Machine Learning, (29143-29160)
  42. Somekh-Baruch A (2023). Upper Bounds on the Mismatched Reliability Function and Capacity Using a Genie Receiver, IEEE Transactions on Information Theory, 69:7, (4196-4217), Online publication date: 1-Jul-2023.
  43. Merhav N (2023). D-Semifaithful Codes That are Universal Over Both Memoryless Sources and Distortion Measures, IEEE Transactions on Information Theory, 69:7, (4746-4757), Online publication date: 1-Jul-2023.
  44. Ngo K, Lancho A, Durisi G and Graell i Amat A (2023). Unsourced Multiple Access With Random User Activity, IEEE Transactions on Information Theory, 69:7, (4537-4558), Online publication date: 1-Jul-2023.
  45. Zhang Z, You X, Wang D, Xia X, Zhu P, Jiang Y, Liang C and Wang J (2023). Performance of Multidevice Downlink Cell-Free System Under Finite Blocklength for uRLLC With Hard Deadlines, IEEE Journal on Selected Areas in Communications, 41:7, (2090-2106), Online publication date: 1-Jul-2023.
  46. Hou N, Xia X and Zheng Y (2023). CloakLoRa: A Covert Channel Over LoRa PHY, IEEE/ACM Transactions on Networking, 31:3, (1159-1172), Online publication date: 1-Jun-2023.
  47. Ling Y and Scarlett J (2023). Multi-Bit Relaying Over a Tandem of Channels, IEEE Transactions on Information Theory, 69:6, (3511-3524), Online publication date: 1-Jun-2023.
  48. Horák P, Hromada V and Grošek O (2023). On the Maximum Size of a Prefix Code, IEEE Transactions on Information Theory, 69:5, (2855-2859), Online publication date: 1-May-2023.
  49. Merhav N and Böcherer G (2023). Codebook Mismatch can be Fully Compensated by Mismatched Decoding, IEEE Transactions on Information Theory, 69:4, (2152-2164), Online publication date: 1-Apr-2023.
  50. Guo N and Kostina V (2023). Reliability Function for Streaming Over a DMC With Feedback, IEEE Transactions on Information Theory, 69:4, (2165-2192), Online publication date: 1-Apr-2023.
  51. Gao J, Wu Y, Shao S, Yang W and Poor H (2023). Energy Efficiency of Massive Random Access in MIMO Quasi-Static Rayleigh Fading Channels With Finite Blocklength, IEEE Transactions on Information Theory, 69:3, (1618-1657), Online publication date: 1-Mar-2023.
  52. Li K, Yao Y and Hayashi M (2023). Tight Exponential Analysis for Smoothing the Max-Relative Entropy and for Quantum Privacy Amplification, IEEE Transactions on Information Theory, 69:3, (1680-1694), Online publication date: 1-Mar-2023.
  53. Hayashi M (2023). Analytical Algorithm for Capacities of Classical and Classical-Quantum Channels, IEEE Transactions on Information Theory, 69:3, (1381-1393), Online publication date: 1-Mar-2023.
  54. Dokoupil J and Václavek P Forgetting Factor Kalman Filter with Dependent Noise Processes 2019 IEEE 58th Conference on Decision and Control (CDC), (1809-1815)
  55. Dokoupil J and Václavek P Variable Exponential Forgetting for Estimation of the Statistics of the Normal-Wishart Distribution with a Constant Precision 2019 IEEE 58th Conference on Decision and Control (CDC), (5094-5100)
  56. Subramanian V, Arya R and Sahai A Generalization for multiclass classification with overparameterized linear models Proceedings of the 36th International Conference on Neural Information Processing Systems, (23479-23494)
  57. ACM
    Haddad M, Wiecek P, Habachi O, Perlaza S and Shah S Fair Iterative Water-Filling Game for Multiple Access Channels Proceedings of the 25th International ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems, (125-132)
  58. Tyrsin A (2022). Entropy Modeling of Network Structures, Automation and Remote Control, 83:10, (1608-1618), Online publication date: 1-Oct-2022.
  59. Lange M and Lange A (2022). Information-Theoretic Lower Bounds to Error Probability for the Models of Noisy Discrete Source Coding and Object Classification, Pattern Recognition and Image Analysis, 32:3, (570-574), Online publication date: 1-Sep-2022.
  60. ACM
    Diffie W and Hellman M Privacy and Authentication: An Introduction to Cryptography Democratizing Cryptography, (431-514)
  61. ACM
    Slayton R (2022). Democratizing Cryptography, 10.1145/3549993, Online publication date: 24-Aug-2022.
  62. Shemuel E, Sabag O and Permuter H (2022). The Feedback Capacity of Noisy Output Is the STate (NOST) Channels, IEEE Transactions on Information Theory, 68:8, (5044-5059), Online publication date: 1-Aug-2022.
  63. Burnashev M (2022). On the Reliability Function for a BSC with Noiseless Feedback at Zero Rate, Problems of Information Transmission, 58:3, (203-216), Online publication date: 1-Jul-2022.
  64. Huang J, Zhang H, Huang C and Zhang W (2022). Compressed Random Access for Noncoherent Massive Machine-Type Communications With Energy Modulation, IEEE Transactions on Wireless Communications, 21:7, (5175-5190), Online publication date: 1-Jul-2022.
  65. Nimalsiri N, Ratnam E, Smith D, Mediwaththe C and Halgamuge S (2022). Coordinated Charge and Discharge Scheduling of Electric Vehicles for Load Curve Shaping, IEEE Transactions on Intelligent Transportation Systems, 23:7, (7653-7665), Online publication date: 1-Jul-2022.
  66. Guo N and Kostina V Reliability function for streaming over a DMC with feedback 2022 IEEE International Symposium on Information Theory (ISIT), (3204-3209)
  67. Yavas R, Kostina V and Effros M Third-order Analysis of Channel Coding in the Moderate Deviations Regime 2022 IEEE International Symposium on Information Theory (ISIT), (2309-2314)
  68. Grigorescu A, Boche H, Schaefer R and Vincent Poor H Capacity of Finite State Channels with Feedback: Algorithmic and Optimization Theoretic Properties 2022 IEEE International Symposium on Information Theory (ISIT), (498-503)
  69. Zhang Y and Vatedka S Lower Bounds on List Decoding Capacity using Error Exponents 2022 IEEE International Symposium on Information Theory (ISIT), (1324-1329)
  70. Cocco G, Guillén i Fàbregas A and Font-Segura J Typical Random Coding Exponent for Finite-State Channels 2022 IEEE International Symposium on Information Theory (ISIT), (3210-3214)
  71. Maalaoui A, Poulliat C and Andriyanova I Geometric versus Probabilistic Shaping for Circular-QAM with Nonbinary LDPC Codes 2022 IEEE International Symposium on Information Theory (ISIT), (396-401)
  72. Boche H and Deppe C Computability of the Channel Reliability Function and Related Bounds1 2022 IEEE International Symposium on Information Theory (ISIT), (1530-1535)
  73. Hayashi M Analytical calculation formulas for capacities of classical and classical-quantum channels 2022 IEEE International Symposium on Information Theory (ISIT), (91-96)
  74. Li K, Yao Y and Hayashi M Exponents in smoothing the max-relative entropy and of randomness extraction against quantum side information 2022 IEEE International Symposium on Information Theory (ISIT), (1862-1867)
  75. Esposito A, Vandenbroucque A and Gastpar M On Sibson’s α-Mutual Information 2022 IEEE International Symposium on Information Theory (ISIT), (2904-2909)
  76. Ma X, Wang Y and Zhu T A New Framework for Proving Coding Theorems for Linear Codes 2022 IEEE International Symposium on Information Theory (ISIT), (2768-2773)
  77. Abbas S, Tonnellier T, Ercan F, Jalaleddine M and Gross W (2022). High-Throughput and Energy-Efficient VLSI Architecture for Ordered Reliability Bits GRAND, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 30:6, (681-693), Online publication date: 1-Jun-2022.
  78. Domanovitz E, Philosof T and Khina A The Information Velocity of Packet-Erasure Links IEEE INFOCOM 2022 - IEEE Conference on Computer Communications, (190-199)
  79. Tsurko V and Mikhalskii A (2022). Evaluation of Statistical Relationship of Random Variables via Mutual Information, Automation and Remote Control, 83:5, (734-742), Online publication date: 1-May-2022.
  80. Bae H, Min S, Choi H and Yoon S (2020). DNA Privacy: Analyzing Malicious DNA Sequences Using Deep Neural Networks, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 19:2, (888-898), Online publication date: 1-Mar-2022.
  81. Huang S, Xiao M and Poor H (2022). Achievable Rate Analysis of Millimeter Wave Channels Using Random Coding Error Exponents, IEEE Transactions on Wireless Communications, 21:1, (250-263), Online publication date: 1-Jan-2022.
  82. Schulte P, Amjad R, Wiegart T and Kramer G (2022). Invertible Low-Divergence Coding, IEEE Transactions on Information Theory, 68:1, (178-192), Online publication date: 1-Jan-2022.
  83. Barsbey M, Sefidgaran M, Erdogdu M, Richard G and Şimşekli U Heavy tails in SGD and compressibility of overparametrized neural networks Proceedings of the 35th International Conference on Neural Information Processing Systems, (29364-29378)
  84. Merhav N (2021). On Error Exponents of Encoder-Assisted Communication Systems, IEEE Transactions on Information Theory, 67:11, (7019-7029), Online publication date: 1-Nov-2021.
  85. ACM
    Ren X and Zhang X Intermittent Demand of Spare parts based on Modem Technology Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering, (103-108)
  86. Cheng H and Nakiboğlu B On the Existence of the Augustin Mean 2021 IEEE Information Theory Workshop (ITW), (1-6)
  87. Truong L, Cocco G, Font-Segura J and Guillén i Fàbregas A Concentration of Random-Coding Error Exponents 2021 IEEE Information Theory Workshop (ITW), (1-5)
  88. Nouri A, Asvadi R, Chen J and Vontobel P Finite-Input Intersymbol Interference Wiretap Channels 2021 IEEE Information Theory Workshop (ITW), (1-6)
  89. Lev O and Khina A Energy-limited Joint Source–Channel Coding via Analog Pulse Position Modulation 2021 IEEE Information Theory Workshop (ITW), (1-6)
  90. Etminan J, Mohanna F and Abed Hodtani G (2021). Effects of relay and side information at one encoder on the coverage regions in Gaussian multiple‐access channel, Transactions on Emerging Telecommunications Technologies, 32:10, Online publication date: 7-Oct-2021.
  91. D’yachkov A and Goshkoder D (2021). New Lower Bounds on the Fraction of Correctable Errors under List Decoding in Combinatorial Binary Communication Channels, Problems of Information Transmission, 57:4, (301-320), Online publication date: 1-Oct-2021.
  92. Ngo K, Lancho A, Durisi G and Amat A Massive Uncoordinated Access With Random User Activity 2021 IEEE International Symposium on Information Theory (ISIT), (3014-3019)
  93. Erez U, Østergaard J and Zamir R An Orthogonality Principle for Select-Maximum Estimation of Exponential Variables 2021 IEEE International Symposium on Information Theory (ISIT), (3162-3166)
  94. Liu Y and Effros M Nested LDPC Codes for Random Access Communication 2021 IEEE International Symposium on Information Theory (ISIT), (1877-1882)
  95. Han Y, Urlea M and Loyka S On Optimal Power Allocation for Modulation-Constrained Gaussian Channels 2021 IEEE International Symposium on Information Theory (ISIT), (3109-3114)
  96. Atif T and Pradhan S Distributed Quantum Faithful Simulation and Function Computation Using Algebraic Structured Measurements 2021 IEEE International Symposium on Information Theory (ISIT), (124-129)
  97. Palacio-Baus K and Devroye N Achievable Error Exponents for Two-Way AWGN Channels 2021 IEEE International Symposium on Information Theory (ISIT), (2078-2083)
  98. Atif T, Padakandla A and Pradhan S Synthesizing Correlated Randomness using Algebraic Structured Codes 2021 IEEE International Symposium on Information Theory (ISIT), (2417-2422)
  99. Nilsson A, Bocharova I, Kudryashov B and Johansson T A Weighted Bit Flipping Decoder for QC-MDPC-based Cryptosystems 2021 IEEE International Symposium on Information Theory (ISIT), (1266-1271)
  100. Li Y and Tan V On the Feed-Forward Rate-Distortion Function for Stationary and Ergodic Sources 2021 IEEE International Symposium on Information Theory (ISIT), (2756-2761)
  101. Merhav N On Error Exponents of Encoder-Assisted Communication Systems 2021 IEEE International Symposium on Information Theory (ISIT), (918-923)
  102. Cocco G, i Fàbregas A and Font-Segura J A Dual-Domain Achievability of the Typical Error Exponent 2021 IEEE International Symposium on Information Theory (ISIT), (930-933)
  103. Gkagkos M and Charalambous C Structural Properties of Test Channels of the RDF for Gaussian Multivariate Distributed Sources 2021 IEEE International Symposium on Information Theory (ISIT), (2631-2636)
  104. Ahmadypour N and Gohar A Transmission of a Bit over a Discrete Poisson Channel with Memory 2020 IEEE Information Theory Workshop (ITW), (1-5)
  105. Palacio-Baus K and Devroye N Achievable error exponents for the two-way parallel DMC 2020 IEEE Information Theory Workshop (ITW), (1-5)
  106. Darsena D, Gelli G and Verde F Non-cooperative superposition relaying for multicarrier cognitive networks 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), (1-6)
  107. Letzepis N Optimal power allocation for parallel Gaussian channels with LPD constraints MILCOM 2016 - 2016 IEEE Military Communications Conference, (103-107)
  108. Liang Y, Rajan D and Eliezer O (2021). The Construction of Nonlinear Block Codes for the Enhanced WWVB Broadcast, IEEE Transactions on Wireless Communications, 20:3, (1714-1726), Online publication date: 1-Mar-2021.
  109. Khan M, Kashif H and Rafay A (2021). Performance and optimization of hybrid FSO/RF communication system in varying weather, Photonic Network Communications, 41:1, (47-56), Online publication date: 1-Feb-2021.
  110. Östman J, Devassy R, Durisi G and Ström E (2021). Short-Packet Transmission via Variable-Length Codes in the Presence of Noisy Stop Feedback, IEEE Transactions on Wireless Communications, 20:1, (214-227), Online publication date: 1-Jan-2021.
  111. Jankowski M, Gündüz D and Mikolajczyk K (2020). Wireless Image Retrieval at the Edge, IEEE Journal on Selected Areas in Communications, 39:1, (89-100), Online publication date: 1-Jan-2021.
  112. Dokoupil J and Václavek P Regularized Estimation with Variable Exponential Forgetting 2020 59th IEEE Conference on Decision and Control (CDC), (312-318)
  113. Han D, De Schutter E and Hong S Lamina-specific neuronal properties promote robust, stable signal propagation in feedforward networks Proceedings of the 34th International Conference on Neural Information Processing Systems, (3033-3044)
  114. Sholomov L (2021). Polynomial Asymptotically Optimal Coding of Underdetermined Bernoulli Sources of the General Form, Problems of Information Transmission, 56:4, (373-387), Online publication date: 1-Dec-2020.
  115. Ardimanov N, Shayevitz O and Tamo I (2020). Minimum Guesswork With an Unreliable Oracle, IEEE Transactions on Information Theory, 66:12, (7528-7538), Online publication date: 1-Dec-2020.
  116. Tandon A, Tan V and Varshney L (2020). The Bee-Identification Error Exponent With Absentee Bees, IEEE Transactions on Information Theory, 66:12, (7602-7614), Online publication date: 1-Dec-2020.
  117. Ordentlich O, Polyanskiy Y and Shayevitz O (2020). A Note on the Probability of Rectangles for Correlated Binary Strings, IEEE Transactions on Information Theory, 66:12, (7878-7886), Online publication date: 1-Dec-2020.
  118. Ban M (2020). Decoherence of a two-level system in a coherent superposition of two dephasing environments, Quantum Information Processing, 19:11, Online publication date: 1-Nov-2020.
  119. Ban M (2020). Relaxation process of a two-level system in a coherent superposition of two environments, Quantum Information Processing, 19:10, Online publication date: 30-Oct-2020.
  120. İşcan O, Böhnke R and Xu W (2020). Sign‐bit shaping using polar codes, Transactions on Emerging Telecommunications Technologies, 31:10, Online publication date: 5-Oct-2020.
  121. Makarov S, Ishkaev I, Lavrenyuk I, Ovsyannikova A and Zavjalov S Noncoherent Detection of Optimal FTN Signals with Differential Encoding Internet of Things, Smart Spaces, and Next Generation Networks and Systems, (162-173)
  122. Ovchinnikov A and Fominykh A About Burst Decoding for Block-Permutation LDPC Codes Internet of Things, Smart Spaces, and Next Generation Networks and Systems, (393-401)
  123. Yang Y, Bamler R and Mandt S Variational Bayesian quantization Proceedings of the 37th International Conference on Machine Learning, (10670-10680)
  124. Nakiboğlu B (2020). The Sphere Packing Bound for Memoryless Channels, Problems of Information Transmission, 56:3, (201-244), Online publication date: 1-Jul-2020.
  125. Lancho A, Östman J, Durisi G, Koch T and Vazquez-Vilar G (2020). Saddlepoint Approximations for Short-Packet Wireless Communications, IEEE Transactions on Wireless Communications, 19:7, (4831-4846), Online publication date: 1-Jul-2020.
  126. Sakai Y, Iwata K and Fujisaki H (2020). Modular Arithmetic Erasure Channels and Their Multilevel Channel Polarization, IEEE Transactions on Information Theory, 66:7, (3976-4006), Online publication date: 1-Jul-2020.
  127. Goldfeld Z, Greenewald K, Niles-Weed J and Polyanskiy Y (2020). Convergence of Smoothed Empirical Measures With Applications to Entropy Estimation, IEEE Transactions on Information Theory, 66:7, (4368-4391), Online publication date: 1-Jul-2020.
  128. Tandon A, Tan V and Varshney L Bee-Identification Error Exponent with Absentee Bees 2020 IEEE International Symposium on Information Theory (ISIT), (2891-2896)
  129. Jaffal Y and Abou-Faycal I Lossy coding of a time-limited piece of a band-limited white Gaussian source 2020 IEEE International Symposium on Information Theory (ISIT), (2309-2313)
  130. Charusaie M, Rini S and Amini A On the Compressibility of Affinely Singular Random Vectors 2020 IEEE International Symposium on Information Theory (ISIT), (2240-2245)
  131. Lentner D and Kramer G Stealth Communication with Vanishing Power over Binary Symmetric Channels 2020 IEEE International Symposium on Information Theory (ISIT), (822-827)
  132. Chang L, Chen P, Alajaji F and Han Y The Asymptotic Generalized Poor-Verdú Bound Achieves the BSC Error Exponent at Zero Rate 2020 IEEE International Symposium on Information Theory (ISIT), (2131-2136)
  133. Charalambous C, Charalambous T, Kourtellaris C and van Schuppen J Structural Properties of Nonanticipatory Epsilon Entropy of Multivariate Gaussian Sources 2020 IEEE International Symposium on Information Theory (ISIT), (2867-2872)
  134. Fradelizi M, Li J and Madiman M Usable deviation bounds for the information content of convex measures 2020 IEEE International Symposium on Information Theory (ISIT), (2258-2263)
  135. Pan J, Li Y, Tan V and Eldar Y On the Error Exponent of Approximate Sufficient Statistics for M-ary Hypothesis Testing 2020 IEEE International Symposium on Information Theory (ISIT), (1313-1318)
  136. Rameshwar V and Kashyap N Computable Lower Bounds for Capacities of Input-Driven Finite-State Channels 2020 IEEE International Symposium on Information Theory (ISIT), (2002-2007)
  137. Yao H, Fazeli A and Vardy A List Decoding of Arıkan’s PAC Codes 2020 IEEE International Symposium on Information Theory (ISIT), (443-448)
  138. Aharoni Z, Tsur D, Goldfeld Z and Permuter H Capacity of Continuous Channels with Memory via Directed Information Neural Estimator 2020 IEEE International Symposium on Information Theory (ISIT), (2014-2019)
  139. Dumenil A, Awwad E and Measson C Tetrahedral Coding and Non-Unitary Resilience in Polarization-Multiplexed Lightwave Transmissions 2020 IEEE International Symposium on Information Theory (ISIT), (309-314)
  140. Su P, Huang Y, Lin S, Wang I and Wang C Error Rate Analysis for Random Linear Streaming Codes in the Finite Memory Length Regime 2020 IEEE International Symposium on Information Theory (ISIT), (491-496)
  141. Li Y and Tan V On the Capacity of Deletion Channels with States 2020 IEEE International Symposium on Information Theory (ISIT), (2114-2119)
  142. Liu Y and Effros M Finite-Blocklength and Error-Exponent Analyses for LDPC Codes in Point-to-Point and Multiple Access Communication 2020 IEEE International Symposium on Information Theory (ISIT), (361-366)
  143. Burnashev M (2020). New Upper Bounds in the Hypothesis Testing Problem with Information Constraints, Problems of Information Transmission, 56:2, (157-172), Online publication date: 1-Apr-2020.
  144. Cohen A, Cohen A and Gurewitz O (2020). Efficient Data Collection Over Multiple Access Wireless Sensors Network, IEEE/ACM Transactions on Networking, 28:2, (491-504), Online publication date: 1-Apr-2020.
  145. De D and Das J (2019). Nanocomputing channel fidelity of QCA code converter circuits under thermal randomness, Journal of Computational Electronics, 19:1, (419-434), Online publication date: 1-Mar-2020.
  146. Camps Moreno E, Martínez-Moro E and Sarmiento Rosales E (2020). Vardøhus Codes: Polar Codes Based on Castle Curves Kernels, IEEE Transactions on Information Theory, 66:2, (1007-1022), Online publication date: 1-Feb-2020.
  147. Aragona R, Marzi F, Mignosi F and Spezialetti M (2020). Entropy and Compression: A Simple Proof of an Inequality of Khinchin-Ornstein-Shields, Problems of Information Transmission, 56:1, (13-22), Online publication date: 1-Jan-2020.
  148. Boche H and Mönich U (2020). Turing Meets Shannon: Computable Sampling Type Reconstruction With Error Control, IEEE Transactions on Signal Processing, 68, (6350-6365), Online publication date: 1-Jan-2020.
  149. Zhou L (2020). Multiple Private Key Generation for Continuous Memoryless Sources With a Helper, IEEE Transactions on Information Forensics and Security, 15, (2629-2640), Online publication date: 1-Jan-2020.
  150. Gangrade A, Venkatesh P, Nazer B and Saligrama V Efficient near-optimal testing of community changes in balanced stochastic block models Proceedings of the 33rd International Conference on Neural Information Processing Systems, (10364-10375)
  151. Bollauf M, Zamir R and Costa S (2019). Multilevel Constructions: Coding, Packing and Geometric Uniformity, IEEE Transactions on Information Theory, 65:12, (7669-7681), Online publication date: 1-Dec-2019.
  152. Timo R, Vellambi B, Grant A and Nguyen K (2019). Tracking Unstable Autoregressive Sources Over Discrete Memoryless Channels, IEEE Transactions on Information Theory, 65:12, (8140-8163), Online publication date: 1-Dec-2019.
  153. Liu J, Yassaee M and Verdú S (2019). Sharp Bounds for Mutual Covering, IEEE Transactions on Information Theory, 65:12, (8067-8083), Online publication date: 1-Dec-2019.
  154. Merhav N (2019). Error Exponents of Typical Random Codes for the Colored Gaussian Channel, IEEE Transactions on Information Theory, 65:12, (8164-8179), Online publication date: 1-Dec-2019.
  155. ACM
    Shrivastava A and Joshi A Directedness and persistence in audio-visual interface for emergent users Proceedings of the 10th Indian Conference on Human-Computer Interaction, (1-12)
  156. Nakiboğlu B (2020). The Augustin Capacity and Center, Problems of Information Transmission, 55:4, (299-342), Online publication date: 1-Oct-2019.
  157. Kumar Arumugam K and Bloch M (2019). Embedding Covert Information in Broadcast Communications, IEEE Transactions on Information Forensics and Security, 14:10, (2787-2801), Online publication date: 1-Oct-2019.
  158. ACM
    Aupy G, Gainaru A and Fèvre V (2019). I/O Scheduling Strategy for Periodic Applications, ACM Transactions on Parallel Computing, 6:2, (1-26), Online publication date: 10-Sep-2019.
  159. Yaguchi R and Hayashi M (2019). Second Order Analysis for Joint Source-Channel Coding With General Channel and Markovian Source, IEEE Transactions on Information Theory, 65:9, (5750-5770), Online publication date: 1-Sep-2019.
  160. Vazquez-Vilar G, Guillén i Fàbregas A and Verdú S (2019). The Error Probability of Generalized Perfect Codes via the Meta-Converse, IEEE Transactions on Information Theory, 65:9, (5705-5717), Online publication date: 1-Sep-2019.
  161. Horovitz M, Yaakobi E, Gad E and Bruck J Iterative Programming of Noisy Memory Cells 2019 IEEE Information Theory Workshop (ITW), (1-5)
  162. Tandon A, Tan V and Varshney L Random Coding Error Exponent for the Bee-Identification Problem 2019 IEEE Information Theory Workshop (ITW), (1-5)
  163. Hayashi M and Chen Y Secrecy and Error Exponents of k-Transmitter Multiple Access Wire-tap Channel 2019 IEEE Information Theory Workshop (ITW), (1-5)
  164. Boche H, Schaefer R and Poor H On the Structure of the Capacity Formula for General Finite State Channels with Applications 2019 IEEE Information Theory Workshop (ITW), (1-5)
  165. Nam S and Lee S Secrecy Capacity of a Gaussian Wiretap Channel with One-bit ADCs is Always Positive 2019 IEEE Information Theory Workshop (ITW), (1-5)
  166. Nakiboğlu B A Simple Derivation of the Refined SPB for the Constant Composition Codes 2019 IEEE International Symposium on Information Theory (ISIT), (2659-2663)
  167. Huleihel B, Sabag O, Permuter H, Kashyap N and Shamai Shitz S Computable Upper Bounds for Unifilar Finite-State Channels 2019 IEEE International Symposium on Information Theory (ISIT), (1892-1896)
  168. Cao M and Vontobel P Optimizing Bounds on the Classical Information Rate of Quantum Channels with Memory 2019 IEEE International Symposium on Information Theory (ISIT), (265-269)
  169. Palacio-Baus K, Asadi M and Devroye N Error Exponents of Parallel Two-way Discrete Memoryless Channels using Variable Length Coding 2019 IEEE International Symposium on Information Theory (ISIT), (2249-2253)
  170. Lancho A, Östman J, Durisi G, Koch T and Vazquez-Vilar G Saddlepoint Approximations for Noncoherent Single-Antenna Rayleigh Block-Fading Channels 2019 IEEE International Symposium on Information Theory (ISIT), (612-616)
  171. Ben-Yishai A, Kim Y, Ordentlich O and Shayevitz O The Interactive Capacity of the Binary Symmetric Channel is at Least 1/40 the Shannon Capacity 2019 IEEE International Symposium on Information Theory (ISIT), (2868-2872)
  172. Somekh-Baruch A, Scarlett J and i Fàbregas A A Recursive Cost-Constrained Construction that Attains the Expurgated Exponent 2019 IEEE International Symposium on Information Theory (ISIT), (2938-2942)
  173. Ben-Yishai A, Shayevitz O and Kim Y Shannon Capacity is Achievable for a Large Class of Interactive Markovian Protocols 2019 IEEE International Symposium on Information Theory (ISIT), (2863-2867)
  174. Paolini E and Liva G A Lower Bound on the Error Exponent of Linear Block Codes over the Erasure Channel 2019 IEEE International Symposium on Information Theory (ISIT), (1732-1736)
  175. Wu C, Han G and Marcus B A Deterministic Algorithm for the Capacity of Finite-State Channels 2019 IEEE International Symposium on Information Theory (ISIT), (1897-1901)
  176. Liu X, Busting R, Han G and Shitz S An Elementary Proof of a Classical Information-Theoretic Formula 2019 IEEE International Symposium on Information Theory (ISIT), (1392-1396)
  177. Goldfeld Z, Greenewald K, Weed J and Polyanskiy Y Optimality of the Plug-in Estimator for Differential Entropy Estimation under Gaussian Convolutions 2019 IEEE International Symposium on Information Theory (ISIT), (892-896)
  178. Aharoni Z, Sabag O and Permuter H Computing the Feedback Capacity of Finite State Channels using Reinforcement Learning 2019 IEEE International Symposium on Information Theory (ISIT), (837-841)
  179. Yassaee M Almost Exact Analysis of Soft Covering Lemma via Large Deviation 2019 IEEE International Symposium on Information Theory (ISIT), (1387-1391)
  180. Gutman Y and Śpiewak A New Uniform Bounds for Almost Lossless Analog Compression 2019 IEEE International Symposium on Information Theory (ISIT), (1702-1706)
  181. Font-Segura J, Martinez A and i Fàbregas A Asymptotics of the Random Coding Error Probability for Constant-Composition Codes 2019 IEEE International Symposium on Information Theory (ISIT), (2947-2951)
  182. Huleihel W, Salamatian S, Merhav N and Médard M (2019). Gaussian Intersymbol Interference Channels With Mismatch, IEEE Transactions on Information Theory, 65:7, (4499-4517), Online publication date: 1-Jul-2019.
  183. Truhachev D and Schlegel C (2019). Coupling Data Transmission for Multiple-Access Communications, IEEE Transactions on Information Theory, 65:7, (4550-4574), Online publication date: 1-Jul-2019.
  184. Duffy K, Li J and Médard M (2019). Capacity-Achieving Guessing Random Additive Noise Decoding, IEEE Transactions on Information Theory, 65:7, (4023-4040), Online publication date: 1-Jul-2019.
  185. Somekh-Baruch A, Scarlett J and Guillen I Fabregas A (2019). Generalized Random Gilbert-Varshamov Codes, IEEE Transactions on Information Theory, 65:6, (3452-3469), Online publication date: 1-Jun-2019.
  186. Averbuch R, Weinberger N and Merhav N (2019). Expurgated Bounds for the Asymmetric Broadcast Channel, IEEE Transactions on Information Theory, 65:6, (3412-3435), Online publication date: 1-Jun-2019.
  187. Desmedt Y and Piper F (2019). Perfect Anonymity, IEEE Transactions on Information Theory, 65:6, (3990-3997), Online publication date: 1-Jun-2019.
  188. Yu L and Tan V (2019). Simulation of Random Variables Under Rényi Divergence Measures of All Orders, IEEE Transactions on Information Theory, 65:6, (3349-3383), Online publication date: 1-Jun-2019.
  189. Kosut O and Kliewer J (2019). Strong Converses are Just Edge Removal Properties, IEEE Transactions on Information Theory, 65:6, (3315-3339), Online publication date: 1-Jun-2019.
  190. Jaffal Y and Abou-Faycal I Achievable rates using PAM time-limited pulses over band-limited channels: From Nyquist to FTN 2019 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  191. Awan H, Adve R, Wallbridge N, Plummer C and Eckford A Impact of Population on the Mutual Information of Action Potential Driven Communication in Plants 2019 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  192. Hara T, Stoica R, Ishibashi K and Freitas de Abreu G On the Sum-Rate Capacity and Spectral Efficiency Gains of Massively Concurrent NOMA Systems 2019 IEEE Wireless Communications and Networking Conference (WCNC), (1-7)
  193. Jaffal Y and Abou-Faycal I Using time-limited pulses in a combined PAM-OMM system over band-limited channels 2019 IEEE Wireless Communications and Networking Conference (WCNC), (1-7)
  194. Biondi F, Kawamoto Y, Legay A and Traonouez L (2019). Hybrid statistical estimation of mutual information and its application to information flow, Formal Aspects of Computing, 31:2, (165-206), Online publication date: 1-Apr-2019.
  195. Muramatsu J and Miyake S (2018). Channel Code Using Constrained-Random-Number Generator Revisited, IEEE Transactions on Information Theory, 65:1, (500-510), Online publication date: 1-Jan-2019.
  196. Hayashi M (2018). Universal Channel Coding for General Output Alphabet, IEEE Transactions on Information Theory, 65:1, (302-321), Online publication date: 1-Jan-2019.
  197. Song L, Alajaji F and Linder T (2018). Capacity of Burst Noise-Erasure Channels With and Without Feedback and Input Cost, IEEE Transactions on Information Theory, 65:1, (276-291), Online publication date: 1-Jan-2019.
  198. Carli R and Dotoli M Distributed Control for Waterfilling of Networked Control Systems with Coupling Constraints 2018 IEEE Conference on Decision and Control (CDC), (3710-3715)
  199. Dokoupil J and Václavek P Data-Driven Stabilized Forgetting Design Using the Geometric Mean of Normal Probability Densities 2018 IEEE Conference on Decision and Control (CDC), (1403-1408)
  200. Hassan O, Panayirci E, Poor H and Haas H Physical-Layer Security for Indoor Visible Light Communications with Space Shift Keying Modulation 2018 IEEE Global Communications Conference (GLOBECOM), (1-6)
  201. Ghaddar N, Kim Y, Milstein L, Ma L and Yi B Joint Channel Estimation and Error Correction for Finite-State Markov Channels Using Polar Codes 2018 IEEE Global Communications Conference (GLOBECOM), (1-6)
  202. Matsumine T, Kurkoski B and Ochiai H Construction D Lattice Decoding and Its Application to BCH Code Lattices 2018 IEEE Global Communications Conference (GLOBECOM), (1-6)
  203. Awan H, Adve R, Wallbridge N, Plummer C and Eckford A Characterizing Information Propagation in Plants 2018 IEEE Global Communications Conference (GLOBECOM), (1-6)
  204. Qian J, Gao F, Jin S, Xing L and Zhao J Capacity of Ambient Backscatter Communications with Binary Input and Binary Output Channel 2018 IEEE Global Communications Conference (GLOBECOM), (1-5)
  205. Trillingsgaard K, Yang W, Durisi G and Popovski P (2018). Common-Message Broadcast Channels With Feedback in the Nonasymptotic Regime: Stop Feedback, IEEE Transactions on Information Theory, 64:12, (7686-7718), Online publication date: 1-Dec-2018.
  206. Merhav N (2018). Lower Bounds on Exponential Moments of the Quadratic Error in Parameter Estimation, IEEE Transactions on Information Theory, 64:12, (7636-7648), Online publication date: 1-Dec-2018.
  207. Chou R and Yener A (2018). Polar Coding for the Multiple Access Wiretap Channel via Rate-Splitting and Cooperative Jamming, IEEE Transactions on Information Theory, 64:12, (7903-7921), Online publication date: 1-Dec-2018.
  208. Lin W, Cai S, Wei B and Ma X Coding Theorem for Systematic LDGM Codes Under List Decoding 2018 IEEE Information Theory Workshop (ITW), (1-5)
  209. Boutros J, Erez U, Wonterghem J, Shamir G and Zèmorl G Geometric shaping: low-density coding of Gaussian-like constellations 2018 IEEE Information Theory Workshop (ITW), (1-5)
  210. Yang S and Chen J A Geometric Property of Relative Entropy and the Universal Threshold Phenomenon for Binary-Input Channels with Noisy State Information at the Encoder 2018 IEEE Information Theory Workshop (ITW), (1-5)
  211. Rezazadeh A, Font-Segura J, Martinez A and Fàbregas A Multiple-Access Channel with Independent Sources: Error Exponent Analysis 2018 IEEE Information Theory Workshop (ITW), (1-5)
  212. Amjad R Information Rates and Error Exponents for Probabilistic Amplitude Shaping 2018 IEEE Information Theory Workshop (ITW), (1-5)
  213. Sharma A and Murthy C (2018). On Finding a Subset of Non-Defective Items From a Large Population, IEEE Transactions on Signal Processing, 66:21, (5762-5775), Online publication date: 1-Nov-2018.
  214. Burin A and Shayevitz O (2018). Reducing Guesswork via an Unreliable Oracle, IEEE Transactions on Information Theory, 64:11, (6941-6953), Online publication date: 1-Nov-2018.
  215. Nguyen L, Wells R, Nguyen D and Tran N Outage Probability and Constrained Capacity of Moderate-Length Codes for Gaussian Mixture Over AWGN Channel MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM), (290-295)
  216. Sakai Y Generalized Fano-Type Inequality for Countably Infinite Systems with List-Decoding 2018 International Symposium on Information Theory and Its Applications (ISITA), (727-731)
  217. Niinomi T, Yagi H and Hirasawa S Decision Feedback Scheme with Criterion LR+Th for the Ensemble of Linear Block Codes* 2018 International Symposium on Information Theory and Its Applications (ISITA), (261-265)
  218. Font-Segura J, Martinez A and i Fàbregas A Asymptotics of the Random Coding Union Bound 2018 International Symposium on Information Theory and Its Applications (ISITA), (125-129)
  219. Tandon A and Motani M On the Sphere Packing Error Exponent for Constant Subblock-Composition Codes 2018 International Symposium on Information Theory and Its Applications (ISITA), (266-270)
  220. Shemuel E, Sabag O and Permuter H Finite-State Channel with Feedback and Causal State Information Available at the Encoder 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1081-1088)
  221. Makur A Information Capacity of BSC and BEC Permutation Channels 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1112-1119)
  222. Ul Hassan N, Xu W and Kakkavas A Applying Coded Modulation with Probabilistic and Geometric Shaping for Wireless Backhaul Channel 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), (1-5)
  223. Charalambous C, Kourtellaris C and Loyka S (2018). Capacity Achieving Distributions and Separation Principle for Feedback Gaussian Channels With Memory, IEEE Transactions on Information Theory, 64:9, (6384-6418), Online publication date: 1-Sep-2018.
  224. Merhav N (2018). Error Exponents of Typical Random Codes, IEEE Transactions on Information Theory, 64:9, (6223-6235), Online publication date: 1-Sep-2018.
  225. Dalai M and Polyanskiy Y (2018). Bounds on the Reliability Function of Typewriter Channels, IEEE Transactions on Information Theory, 64:9, (6208-6222), Online publication date: 1-Sep-2018.
  226. Makur A and Polyanskiy Y (2018). Comparison of Channels: Criteria for Domination by a Symmetric Channel, IEEE Transactions on Information Theory, 64:8, (5704-5725), Online publication date: 1-Aug-2018.
  227. Padaki A, Tandon R and Reed J (2018). On Adjacent Channel Co-Existence With Receiver Nonlinearity, IEEE Transactions on Wireless Communications, 17:7, (4922-4936), Online publication date: 1-Jul-2018.
  228. Hershey P and Sica M System of Systems for Tripwires Activation of Algorithms and Reasoning (STAAR) for Analysis of Mission Success 2018 13th Annual Conference on System of Systems Engineering (SoSE), (493-500)
  229. Merhav N Error Exponents of Typical Random Codes 2018 IEEE International Symposium on Information Theory (ISIT), (1675-1679)
  230. Honda J Exact Asymptotics of Random Coding Error Probability for General Memoryless Channels 2018 IEEE International Symposium on Information Theory (ISIT), (1844-1848)
  231. Heidarzadeh A, Chamberland J, Parag P and Wesel R A Systematic Approach to Incremental Redundancy over Erasure Channels 2018 IEEE International Symposium on Information Theory (ISIT), (1176-1180)
  232. Mohanan A, Rajagopalan A and Thangaraj A Dual Capacity Upper Bounds for Binary-input ISI and Constrained BIBO Channels 2018 IEEE International Symposium on Information Theory (ISIT), (301-305)
  233. Vazquez-Vilar G, Fàbregas A and Verdú S The Error Probability of Generalized Perfect Codes 2018 IEEE International Symposium on Information Theory (ISIT), (2491-2495)
  234. Sen P, Lim S and Kim Y Optimal Achievable Rates for Computation With Random Homologous Codes 2018 IEEE International Symposium on Information Theory (ISIT), (2351-2355)
  235. Noorzad P, Effros M and Langberg M Can Negligihle Cooperation Increase Capacity? The Average-Error Case 2018 IEEE International Symposium on Information Theory (ISIT), (1256-1260)
  236. Shlezinger N, Shaked R and Dabora R Bounds on the Capacity of MIMO Broadband Power Line Communications Channels 2018 IEEE International Symposium on Information Theory (ISIT), (1350-1354)
  237. Merhav N Lower Bounds on Exponential Moments of the Quadratic Error in Parameter Estimation 2018 IEEE International Symposium on Information Theory (ISIT), (741-745)
  238. Shende N, Wagner A and Altuğ Y When Does Feedback Improve the Second-Order Coding Rate in Discrete Memoryless Channels? 2018 IEEE International Symposium on Information Theory (ISIT), (1485-1489)
  239. Varasteh M, Rassouli B, Joudeh H and Clerckx B SWIPT Signalling over Complex AWGN Channels with Two Nonlinear Energy Harvester Models 2018 IEEE International Symposium on Information Theory (ISIT), (866-870)
  240. Tridenski S and Zamir R Channel Input Adaptation via Natural Type Selection 2018 IEEE International Symposium on Information Theory (ISIT), (226-230)
  241. Ordentlich O and Polyanskiy Y Entropy Under Additive Bernoulli and Spherical Noises 2018 IEEE International Symposium on Information Theory (ISIT), (521-525)
  242. Zhou L, F. Tan V and Motani M Second-Order Asymptotics of Rate-Distortion using Gaussian Codebooks for Arbitrary Sources 2018 IEEE International Symposium on Information Theory (ISIT), (1495-1499)
  243. Vazquez-Vilar G, i Fabregas A, Koch T and Lancho A Saddlepoint Approximation of the Error Probability of Binary Hypothesis Testing 2018 IEEE International Symposium on Information Theory (ISIT), (2306-2310)
  244. Tian P and Kostina V The Dispersion of the Gauss-Markov Source 2018 IEEE International Symposium on Information Theory (ISIT), (1490-1494)
  245. Rohweder D, Freudenberger J and Shavgulidze S Low-Density Parity-Check Codes over Finite Gaussian Integer Fields 2018 IEEE International Symposium on Information Theory (ISIT), (481-485)
  246. Ullah S, Liva G and Liew S Short packet physical-layer network coding with mismatched channel state information 2018 IEEE Wireless Communications and Networking Conference (WCNC), (1-5)
  247. Zheng M, Chen W and Ling C (2018). Polar Coding for the Cognitive Interference Channel With Confidential Messages, IEEE Journal on Selected Areas in Communications, 36:4, (762-774), Online publication date: 1-Apr-2018.
  248. Cheng H and Hsieh M (2018). Moderate Deviation Analysis for Classical-Quantum Channels and Quantum Hypothesis Testing, IEEE Transactions on Information Theory, 64:2, (1385-1403), Online publication date: 1-Feb-2018.
  249. Tomamichel M and Hayashi M (2018). Operational Interpretation of Rényi Information Measures via Composite Hypothesis Testing Against Product and Markov Distributions, IEEE Transactions on Information Theory, 64:2, (1064-1082), Online publication date: 1-Feb-2018.
  250. Fahs J and Abou-Faycal I (2018). On Properties of the Support of Capacity-Achieving Distributions for Additive Noise Channel Models With Input Cost Constraints, IEEE Transactions on Information Theory, 64:2, (1178-1198), Online publication date: 1-Feb-2018.
  251. Chung H, Sadler B, Zheng L and Hero A (2018). Unequal Error Protection Querying Policies for the Noisy 20 Questions Problem, IEEE Transactions on Information Theory, 64:2, (1105-1131), Online publication date: 1-Feb-2018.
  252. Steiner F, Liva G and Boecherer G Ultra-Sparse Non-Binary LDPC Codes for Probabilistic Amplitude Shaping GLOBECOM 2017 - 2017 IEEE Global Communications Conference, (1-5)
  253. Cheng H, Hsieh M and Tomamichel M Sphere-packing bound for classical-quantum channels 2017 IEEE Information Theory Workshop (ITW), (479-483)
  254. Tahmasbi M, Bloch M and Tan V Error exponent for covert communications over discrete memoryless channels 2017 IEEE Information Theory Workshop (ITW), (304-308)
  255. Kourtellaris C, Tzortzis I and Charalambous C Two-letter capacity formula for channels with memory and feedback 2017 IEEE Information Theory Workshop (ITW), (96-100)
  256. Ginzach S, Merhav N and Sason I Random-coding error exponent of variable-length codes with a single-bit noiseless feedback 2017 IEEE Information Theory Workshop (ITW), (584-588)
  257. Ullah S, Liva G and Liew S Physical-layer network coding: A random coding error exponent perspective 2017 IEEE Information Theory Workshop (ITW), (559-563)
  258. Gelles R (2017). Coding for Interactive Communication, Foundations and Trends® in Theoretical Computer Science, 13:1–2, (1-157), Online publication date: 17-Oct-2017.
  259. Shende N and Wagner A On very noisy channels with feedback 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (852-859)
  260. Wang C, Love D and Ogbe D Transcoding: A new strategy for relay channels 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (450-454)
  261. Merhav N (2017). Correction to “The Generalized Stochastic Likelihood Decoder: Random Coding and Expurgated Bounds”, IEEE Transactions on Information Theory, 63:10, (6827-6829), Online publication date: 1-Oct-2017.
  262. Weinberger N and Merhav N (2017). Channel Detection in Coded Communication, IEEE Transactions on Information Theory, 63:10, (6364-6392), Online publication date: 1-Oct-2017.
  263. Rezagah F, Jalali S, Erkip E and Poor H (2017). Compression-Based Compressed Sensing, IEEE Transactions on Information Theory, 63:10, (6735-6752), Online publication date: 1-Oct-2017.
  264. Padakandla A and Pradhan S (2017). An Achievable Rate Region Based on Coset Codes for Multiple Access Channel With States, IEEE Transactions on Information Theory, 63:10, (6393-6415), Online publication date: 1-Oct-2017.
  265. Song J, Jegou H, Snoek C, Tian Q and Sebe N (2017). Guest Editorial: Large-Scale Multimedia Data Retrieval, Classification, and Understanding, IEEE Transactions on Multimedia, 19:9, (1965-1967), Online publication date: 1-Sep-2017.
  266. Mao W and Hassibi B (2017). Capacity Analysis of Discrete Energy Harvesting Channels, IEEE Transactions on Information Theory, 63:9, (5850-5885), Online publication date: 1-Sep-2017.
  267. Yang Y, Kar S and Grover P (2017). Graph Codes for Distributed Instant Message Collection in an Arbitrary Noisy Broadcast Network, IEEE Transactions on Information Theory, 63:9, (6059-6084), Online publication date: 1-Sep-2017.
  268. Li Y, Kavčić A and Han G (2017). Capacity of Multilevel NAND Flash Memory Channels, IEEE Transactions on Information Theory, 63:9, (5934-5953), Online publication date: 1-Sep-2017.
  269. Gutiérrez-Gutiérrez J, Crespo P, Zárraga-Rodríguez M and Hogstad B (2017). Asymptotically Equivalent Sequences of Matrices and Capacity of a Discrete-Time Gaussian MIMO Channel With Memory, IEEE Transactions on Information Theory, 63:9, (6000-6003), Online publication date: 1-Sep-2017.
  270. Johnson O (2017). Strong Converses for Group Testing From Finite Blocklength Results, IEEE Transactions on Information Theory, 63:9, (5923-5933), Online publication date: 1-Sep-2017.
  271. Ge X, Zi R, Xiong X, Li Q and Wang L (2017). Millimeter Wave Communications With OAM-SM Scheme for Future Mobile Networks, IEEE Journal on Selected Areas in Communications, 35:9, (2163-2177), Online publication date: 1-Sep-2017.
  272. Calmon F, Makhdoumi A, Médard M, Varia M, Christiansen M and Duffy K (2017). Principal Inertia Components and Applications, IEEE Transactions on Information Theory, 63:8, (5011-5038), Online publication date: 1-Aug-2017.
  273. Merhav N (2017). The Generalized Stochastic Likelihood Decoder: Random Coding and Expurgated Bounds, IEEE Transactions on Information Theory, 63:8, (5039-5051), Online publication date: 1-Aug-2017.
  274. Chen Y, Koyluoglu O and Sezgin A (2017). Individual Secrecy for Broadcast Channels With Receiver Side Information, IEEE Transactions on Information Theory, 63:7, (4687-4708), Online publication date: 1-Jul-2017.
  275. Tutuncuoglu K, Ozel O, Yener A and Ulukus S (2017). The Binary Energy Harvesting Channel With a Unit-Sized Battery, IEEE Transactions on Information Theory, 63:7, (4240-4256), Online publication date: 1-Jul-2017.
  276. Weinberger N and Merhav N (2017). Simplified Erasure/List Decoding, IEEE Transactions on Information Theory, 63:7, (4218-4239), Online publication date: 1-Jul-2017.
  277. Kostina V (2017). Data Compression With Low Distortion and Finite Blocklength, IEEE Transactions on Information Theory, 63:7, (4268-4285), Online publication date: 1-Jul-2017.
  278. Moulin P Source coding with distortion profile constraints 2017 IEEE International Symposium on Information Theory (ISIT), (3215-3219)
  279. Cao M and Vontobel P Estimating the information rate of a channel with classical input and output and a quantum state 2017 IEEE International Symposium on Information Theory (ISIT), (3205-3209)
  280. Sakai Y and Iwata K Sharp bounds on Arimoto's conditional Rényi entropies between two distinct orders 2017 IEEE International Symposium on Information Theory (ISIT), (2975-2979)
  281. Honda J and Yamamoto H Yariable-to-fixed length homophonie coding suitable for asymmetric channel coding 2017 IEEE International Symposium on Information Theory (ISIT), (2850-2854)
  282. Sakai Y and Iwata K Optimal quantization of B-DMCs maximizing α-mutual information with monge property 2017 IEEE International Symposium on Information Theory (ISIT), (2668-2672)
  283. Goldin D and Burshtein D Performance bounds of concatenated polar coding schemes 2017 IEEE International Symposium on Information Theory (ISIT), (2603-2607)
  284. Hindy A and Nosratinia A On the universality of lattice codes for a class of ergodic fading channels 2017 IEEE International Symposium on Information Theory (ISIT), (2583-2587)
  285. Mao W, Diggavi S and Kannan S Models and information-theoretic bounds for nanopore sequencing 2017 IEEE International Symposium on Information Theory (ISIT), (2458-2462)
  286. Boutros J, Jardel F and Méasson C Probabilistic shaping and non-binary codes 2017 IEEE International Symposium on Information Theory (ISIT), (2308-2312)
  287. Weinberger N and Merhav N Lower bounds on parameter modulation-estimation under bandwidth constraints 2017 IEEE International Symposium on Information Theory (ISIT), (2093-2097)
  288. Yang S, Xu R, Chen J and Zhang J Intrinsic capacity 2017 IEEE International Symposium on Information Theory (ISIT), (2073-2077)
  289. Kostina V and Tuncel E The rate-distortion function for successive refinement of abstract sources 2017 IEEE International Symposium on Information Theory (ISIT), (1923-1927)
  290. Lee S, Tan V and Khisti A Exact moderate deviation asymptotics in streaming data transmission 2017 IEEE International Symposium on Information Theory (ISIT), (1252-1256)
  291. Scarlett J, Martinez A and Guillén i Fàbregas A Expurgated joint source-channel coding bounds and error exponents 2017 IEEE International Symposium on Information Theory (ISIT), (908-912)
  292. Geiger B and Koch T On the information dimension rate of stochastic processes 2017 IEEE International Symposium on Information Theory (ISIT), (888-892)
  293. Rezazadeh A, Font-Segura J, Martinez A and Guillen i Fàbregas A An achievable error exponent for the multiple access channel with correlated sources 2017 IEEE International Symposium on Information Theory (ISIT), (879-882)
  294. Sen P and Kim Y Homologous codes for multiple access channels 2017 IEEE International Symposium on Information Theory (ISIT), (874-878)
  295. Wang Y, Narayanan K and Jiang A Exploiting source redundancy to improve the rate of polar codes 2017 IEEE International Symposium on Information Theory (ISIT), (864-868)
  296. Wu T, Varshney L and Tan V Communication over a channel that wears out 2017 IEEE International Symposium on Information Theory (ISIT), (581-585)
  297. Sundaram R, Das A, Jalihal D and Ramaiyan V Optimal frame synchronization over a finite state Markov channel 2017 IEEE International Symposium on Information Theory (ISIT), (486-490)
  298. Cheng H and Hsieh M Moderate deviations for classical-quantum channels 2017 IEEE International Symposium on Information Theory (ISIT), (296-300)
  299. Cheng H, Hsieh M and Tomamichel M Sphere-packing bound for symmetric classical-quantum channels 2017 IEEE International Symposium on Information Theory (ISIT), (286-290)
  300. Song L, Alajaji F and Linder T On the capacity of burst noise-erasure channels with and without feedback 2017 IEEE International Symposium on Information Theory (ISIT), (206-210)
  301. Averbuch R and Merhav N Exact random coding exponents and universal decoders for the degraded broadcast channel 2017 IEEE International Symposium on Information Theory (ISIT), (191-195)
  302. Khan M and Jamil M (2017). Adaptive hybrid free space optical/radio frequency communication system, Telecommunications Systems, 65:1, (117-126), Online publication date: 1-May-2017.
  303. Xu A and Raginsky M (2017). Information-Theoretic Lower Bounds for Distributed Function Computation, IEEE Transactions on Information Theory, 63:4, (2314-2337), Online publication date: 1-Apr-2017.
  304. Ben-Yishai A and Shayevitz O (2017). Interactive Schemes for the AWGN Channel with Noisy Feedback, IEEE Transactions on Information Theory, 63:4, (2409-2427), Online publication date: 1-Apr-2017.
  305. Sharov A and Roth R (2017). On the Capacity of Generalized Ising Channels, IEEE Transactions on Information Theory, 63:4, (2338-2356), Online publication date: 1-Apr-2017.
  306. Parag P, Taghavi A and Chamberland J On Real-Time Status Updates over Symbol Erasure Channels 2017 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  307. Tal I (2017). On the Construction of Polar Codes for Channels With Moderate Input Alphabet Sizes, IEEE Transactions on Information Theory, 63:3, (1501-1509), Online publication date: 1-Mar-2017.
  308. Shlezinger N, Zahavi D, Murin Y and Dabora R (2017). The Secrecy Capacity of Gaussian MIMO Channels With Finite Memory, IEEE Transactions on Information Theory, 63:3, (1874-1897), Online publication date: 1-Mar-2017.
  309. Lim T and Franceschetti M (2017). Information Without Rolling Dice, IEEE Transactions on Information Theory, 63:3, (1349-1363), Online publication date: 1-Mar-2017.
  310. Xu A and Raginsky M (2017). Information-Theoretic Lower Bounds on Bayes Risk in Decentralized Estimation, IEEE Transactions on Information Theory, 63:3, (1580-1600), Online publication date: 1-Mar-2017.
  311. Etezadifar P and Farsi H (2017). Scalable video summarization via sparse dictionary learning and selection simultaneously, Multimedia Tools and Applications, 76:6, (7947-7971), Online publication date: 1-Mar-2017.
  312. Adjallah K and Wang Z Optimizing the reliability, maintainability and safety data collection process through lifecycle 2017 Annual Reliability and Maintainability Symposium (RAMS), (1-6)
  313. Sarbazi E, Safari M and Haas H On the Information Transfer Rate of SPAD Receivers for Optical Wireless Communications 2016 IEEE Global Communications Conference (GLOBECOM), (1-6)
  314. Yang Y and Pesavento M A Parallel Algorithm for Energy Efficiency Maximization in Massive MIMO Networks 2016 IEEE Global Communications Conference (GLOBECOM), (1-6)
  315. Lieske H, Kilian G, Breiling M, Rauh S, Robert J and Heuberger A (2016). Decoding Performance in Low-Power Wide Area Networks With Packet Collisions, IEEE Transactions on Wireless Communications, 15:12, (8195-8208), Online publication date: 1-Dec-2016.
  316. Fujita H (2016). On the Secrecy Capacity of Wiretap Channels With Side Information at the Transmitter, IEEE Transactions on Information Forensics and Security, 11:11, (2441-2452), Online publication date: 1-Nov-2016.
  317. Bashar F, Abhayapala T and Salehin S (2016). Dimensionality of Spatio-Temporal Broadband Signals Observed Over Finite Spatial and Temporal Windows, IEEE Transactions on Wireless Communications, 15:10, (6758-6770), Online publication date: 1-Oct-2016.
  318. ACM
    Awan H Reducing the Effect of Reaction Rate Constants on the Performance of Molecular Communication Networks Proceedings of the 3rd ACM International Conference on Nanoscale Computing and Communication, (1-6)
  319. Kostina V When is Shannon's lower bound tight at finite blocklength? 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (982-989)
  320. Goela N The structure of polarized channels via explicit parameters 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (347-354)
  321. Parizi M and Telatar E On channel resolvability in presence of Feedback 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (78-85)
  322. Mayya V, Mainsah B and Reeves G Modeling the P300-based brain-computer interface as a channel with memory 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (23-30)
  323. Parnell T, Dunner C, Mittelholzer T and Papandreou N (2016). Capacity of the MLC NAND Flash Channel, IEEE Journal on Selected Areas in Communications, 34:9, (2354-2365), Online publication date: 1-Sep-2016.
  324. Farsad N, Yilmaz H, Eckford A, Chae C and Guo W (2016). A Comprehensive Survey of Recent Advancements in Molecular Communication, IEEE Communications Surveys & Tutorials, 18:3, (1887-1919), Online publication date: 1-Jul-2016.
  325. ACM
    Hadian A, Nobari S, Minaei-Bidgoli B and Qu Q ROLL Proceedings of the 2016 International Conference on Management of Data, (1829-1842)
  326. Arıkan E (2016). Varentropy Decreases Under the Polar Transform, IEEE Transactions on Information Theory, 62:6, (3390-3400), Online publication date: 1-Jun-2016.
  327. Ivanov M, Häger C, Brännström F, Graell i Amat A, Alvarado A and Agrell E (2016). On the Information Loss of the Max-Log Approximation in BICM Systems, IEEE Transactions on Information Theory, 62:6, (3011-3025), Online publication date: 1-Jun-2016.
  328. Hayashi M (2016). Security Analysis of $\varepsilon $ -Almost Dual Universal2 Hash Functions: Smoothing of Min Entropy Versus Smoothing of Rényi Entropy of Order 2, IEEE Transactions on Information Theory, 62:6, (3451-3476), Online publication date: 1-Jun-2016.
  329. Khurana D, Maji H and Sahai A Secure Computation from Elastic Noisy Channels Proceedings, Part II, of the 35th Annual International Conference on Advances in Cryptology --- EUROCRYPT 2016 - Volume 9666, (184-212)
  330. You Q, Li Y, Liew S and Vucetic B (2016). Duality of channel encoding and decoding-Part II, Transactions on Emerging Telecommunications Technologies, 27:5, (685-697), Online publication date: 1-May-2016.
  331. Chaaban A and Sezgin A (2016). Multi-Hop Relaying: An End-to-End Delay Analysis, IEEE Transactions on Wireless Communications, 15:4, (2552-2561), Online publication date: 1-Apr-2016.
  332. Bethanabhotla D, Bursalioglu O, Papadopoulos H and Caire G (2016). Optimal User-Cell Association for Massive MIMO Wireless Networks, IEEE Transactions on Wireless Communications, 15:3, (1835-1850), Online publication date: 1-Mar-2016.
  333. Iyengar A, Siegel P and Wolf J (2016). On the Capacity of Channels With Timing Synchronization Errors, IEEE Transactions on Information Theory, 62:2, (793-810), Online publication date: 1-Feb-2016.
  334. Wang Y, Narayanan K and Huang Y (2016). Interleaved Concatenations of Polar Codes With BCH and Convolutional Codes, IEEE Journal on Selected Areas in Communications, 34:2, (267-277), Online publication date: 1-Feb-2016.
  335. Arikan E (2016). On the Origin of Polar Coding, IEEE Journal on Selected Areas in Communications, 34:2, (209-223), Online publication date: 1-Feb-2016.
  336. Sason I (2015). On the Rényi Divergence, Joint Range of Relative Entropies, and a Channel Coding Theorem, IEEE Transactions on Information Theory, 62:1, (23-34), Online publication date: 1-Jan-2016.
  337. Domb Y and Feder M (2015). Non-Random Coding Error Bounds for Lattices, IEEE Transactions on Information Theory, 62:1, (108-120), Online publication date: 1-Jan-2016.
  338. Domb Y, Zamir R and Feder M (2015). The Random Coding Bound Is Tight for the Average Linear Code or Lattice, IEEE Transactions on Information Theory, 62:1, (121-130), Online publication date: 1-Jan-2016.
  339. Bergel I, Perets Y and Shamai S (2015). Uplink Downlink Rate Balancing in Cooperating Cellular Networks, IEEE Transactions on Signal Processing, 63:23, (6272-6284), Online publication date: 1-Dec-2015.
  340. Erseghe T (2015). On the Evaluation of the Polyanskiy-Poor–Verdú Converse Bound for Finite Block-Length Coding in AWGN, IEEE Transactions on Information Theory, 61:12, (6578-6590), Online publication date: 1-Dec-2015.
  341. MolavianJazi E and Laneman J (2015). A Second-Order Achievable Rate Region for Gaussian Multi-Access Channels via a Central Limit Theorem for Functions, IEEE Transactions on Information Theory, 61:12, (6719-6733), Online publication date: 1-Dec-2015.
  342. Jeongho Yeo , Byung Wook Han , Joon Ho Cho and Lehnert J (2015). Capacity of an Orthogonal Overlay Channel, IEEE Transactions on Wireless Communications, 14:11, (6111-6124), Online publication date: 1-Nov-2015.
  343. Phan-Minh Nguyen and Armand M (2015). On Capacity Formulation With Stationary Inputs and Application to a Bit-Patterned Media Recording Channel Model, IEEE Transactions on Information Theory, 61:11, (5906-5930), Online publication date: 1-Nov-2015.
  344. Verde F, Scaglione A, Darsena D and Gelli G (2015). An Amplify-and-Forward Scheme for Spectrum Sharing in Cognitive Radio Channels, IEEE Transactions on Wireless Communications, 14:10, (5629-5642), Online publication date: 1-Oct-2015.
  345. Atar R and Merhav N (2015). Information–Theoretic Applications of the Logarithmic Probability Comparison Bound, IEEE Transactions on Information Theory, 61:10, (5366-5386), Online publication date: 1-Oct-2015.
  346. Hayashi M (2015). Quantum Wiretap Channel With Non-Uniform Random Number and Its Exponent and Equivocation Rate of Leaked Information, IEEE Transactions on Information Theory, 61:10, (5595-5622), Online publication date: 1-Oct-2015.
  347. Shkel Y, Tan V and Draper S (2015). Unequal Message Protection: Asymptotic and Non-Asymptotic Tradeoffs, IEEE Transactions on Information Theory, 61:10, (5396-5416), Online publication date: 1-Oct-2015.
  348. Ignatenko T and Willems F (2015). Fundamental Limits for Privacy-Preserving Biometric Identification Systems That Support Authentication, IEEE Transactions on Information Theory, 61:10, (5583-5594), Online publication date: 1-Oct-2015.
  349. Schaefer R and Loyka S (2015). The Secrecy Capacity of Compound Gaussian MIMO Wiretap Channels, IEEE Transactions on Information Theory, 61:10, (5535-5552), Online publication date: 1-Oct-2015.
  350. Su Min Kim , Tan Tai Do , Oechtering T and Peters G (2015). On the Entropy Computation of Large Complex Gaussian Mixture Distributions, IEEE Transactions on Signal Processing, 63:17, (4710-4723), Online publication date: 1-Sep-2015.
  351. Lapidoth A, Malar A and Ligong Wang (2015). Covering Point Patterns, IEEE Transactions on Information Theory, 61:9, (4521-4533), Online publication date: 1-Sep-2015.
  352. Mondelli M, Hassani S and Urbanke R (2015). Scaling Exponent of List Decoders With Applications to Polar Codes, IEEE Transactions on Information Theory, 61:9, (4838-4851), Online publication date: 1-Sep-2015.
  353. En-Hui Yang and Jin Meng (2015). New Nonasymptotic Channel Coding Theorems for Structured Codes, IEEE Transactions on Information Theory, 61:9, (4534-4553), Online publication date: 1-Sep-2015.
  354. Tan V and Bloch M (2015). Information Spectrum Approach to Strong Converse Theorems for Degraded Wiretap Channels, IEEE Transactions on Information Forensics and Security, 10:9, (1891-1904), Online publication date: 1-Sep-2015.
  355. Badr A, Lui D and Khisti A (2015). Streaming Codes for Multicast Over Burst Erasure Channels, IEEE Transactions on Information Theory, 61:8, (4181-4208), Online publication date: 1-Aug-2015.
  356. Jie Xing , Berger T, Sungkar M and Levy W (2015). Energy Efficient Neurons With Generalized Inverse Gaussian Conditional and Marginal Hitting Times, IEEE Transactions on Information Theory, 61:8, (4390-4398), Online publication date: 1-Aug-2015.
  357. Alsan M (2015). Extremality for Gallager’s Reliability Function $E_{0}$ , IEEE Transactions on Information Theory, 61:8, (4277-4292), Online publication date: 1-Aug-2015.
  358. Kurniawan E and Sun S (2015). Improper Gaussian Signaling Scheme for the Z-Interference Channel, IEEE Transactions on Wireless Communications, 14:7, (3912-3923), Online publication date: 1-Jul-2015.
  359. Al-Tous H and Barhumi I (2015). Resource Allocation for Multiuser Improved AF Cooperative Communication Scheme, IEEE Transactions on Wireless Communications, 14:7, (3655-3672), Online publication date: 1-Jul-2015.
  360. Jialing Liu , Elia N and Tatikonda S (2015). Capacity-Achieving Feedback Schemes for Gaussian Finite-State Markov Channels With Channel State Information, IEEE Transactions on Information Theory, 61:7, (3632-3650), Online publication date: 1-Jul-2015.
  361. Youngmin Jeong , Hyundong Shin and Win M (2015). $H$ -Transforms for Wireless Communication, IEEE Transactions on Information Theory, 61:7, (3773-3809), Online publication date: 1-Jul-2015.
  362. Naghshvar M, Javidi T and Chaudhuri K (2015). Bayesian Active Learning With Non-Persistent Noise, IEEE Transactions on Information Theory, 61:7, (4080-4098), Online publication date: 1-Jul-2015.
  363. Guangyue Han (2015). A Randomized Algorithm for the Capacity of Finite-State Channels, IEEE Transactions on Information Theory, 61:7, (3651-3669), Online publication date: 1-Jul-2015.
  364. Yuxin Chen , Yuejie Chi and Goldsmith A (2015). Exact and Stable Covariance Estimation From Quadratic Sampling via Convex Programming, IEEE Transactions on Information Theory, 61:7, (4034-4059), Online publication date: 1-Jul-2015.
  365. Karmakar S and Varanasi M (2015). The Generalized Diversity-Multiplexing Tradeoff of the MIMO Z Interference Channel, IEEE Transactions on Information Theory, 61:6, (3427-3445), Online publication date: 1-Jun-2015.
  366. Blake C and Kschischang F (2015). Energy Consumption of VLSI Decoders, IEEE Transactions on Information Theory, 61:6, (3185-3198), Online publication date: 1-Jun-2015.
  367. Merhav N (2015). Statistical Physics of Random Binning, IEEE Transactions on Information Theory, 61:5, (2454-2464), Online publication date: 1-May-2015.
  368. Tan V and Tomamichel M (2015). The Third-Order Term in the Normal Approximation for the AWGN Channel, IEEE Transactions on Information Theory, 61:5, (2430-2438), Online publication date: 1-May-2015.
  369. Ingber A, Courtade T and Weissman T (2015). Compression for Quadratic Similarity Queries, IEEE Transactions on Information Theory, 61:5, (2729-2747), Online publication date: 1-May-2015.
  370. Weinberger N and Merhav N (2015). Optimum Tradeoffs Between the Error Exponent and the Excess-Rate Exponent of Variable-Rate Slepian–Wolf Coding, IEEE Transactions on Information Theory, 61:4, (2165-2190), Online publication date: 1-Apr-2015.
  371. Huleihel W and Merhav N (2015). Universal Decoding for Gaussian Intersymbol Interference Channels, IEEE Transactions on Information Theory, 61:4, (1606-1618), Online publication date: 1-Apr-2015.
  372. Naghshvar M, Javidi T and Wigger M (2015). Extrinsic Jensen–Shannon Divergence: Applications to Variable-Length Coding, IEEE Transactions on Information Theory, 61:4, (2148-2164), Online publication date: 1-Apr-2015.
  373. Sutter T, Sutter D, Esfahani P and Lygeros J (2015). Efficient Approximation of Channel Capacities, IEEE Transactions on Information Theory, 61:4, (1649-1666), Online publication date: 1-Apr-2015.
  374. Tan V (2015). On the Reliability Function of the Discrete Memoryless Relay Channel, IEEE Transactions on Information Theory, 61:4, (1550-1573), Online publication date: 1-Apr-2015.
  375. Abu Al Haija A and Mai Vu (2015). Spectral Efficiency and Outage Performance for Hybrid D2D-Infrastructure Uplink Cooperation, IEEE Transactions on Wireless Communications, 14:3, (1183-1198), Online publication date: 1-Mar-2015.
  376. Merhav N (2015). On Zero-Rate Error Exponents of Finite-State Channels With Input-Dependent States, IEEE Transactions on Information Theory, 61:2, (741-750), Online publication date: 1-Feb-2015.
  377. Shuhang Wu , Shuangqing Wei , Yue Wang , Vaidyanathan R and Jian Yuan (2015). Partition Information and its Transmission Over Boolean Multi-Access Channels, IEEE Transactions on Information Theory, 61:2, (1010-1027), Online publication date: 1-Feb-2015.
  378. Mondelli M, Hassani S, Sason I and Urbanke R (2015). Achieving Marton’s Region for Broadcast Channels Using Polar Codes, IEEE Transactions on Information Theory, 61:2, (783-800), Online publication date: 1-Feb-2015.
  379. Ping-Chung Wang , Yu-Chih Huang and Narayanan K (2015). Asynchronous Physical-Layer Network Coding With Quasi-Cyclic Codes, IEEE Journal on Selected Areas in Communications, 33:2, (309-322), Online publication date: 1-Feb-2015.
  380. Zahedi A, Østergaard J, Jensen S, Bech S and Naylor P (2015). Audio coding in wireless acoustic sensor networks, Signal Processing, 107:C, (141-152), Online publication date: 1-Feb-2015.
  381. Rong Zhang , Lie-Liang Yang and Hanzo L (2015). Error Probability and Capacity Analysis of Generalised Pre-Coding Aided Spatial Modulation, IEEE Transactions on Wireless Communications, 14:1, (364-375), Online publication date: 1-Jan-2015.
  382. Zhu Y and Lafferty J Quantized estimation of gaussian sequence models in Euclidean balls Proceedings of the 28th International Conference on Neural Information Processing Systems - Volume 2, (3662-3670)
  383. Kudryashov B and Porov A (2014). Universal coding for memoryless sources with countably infinite alphabets, Problems of Information Transmission, 50:4, (390-399), Online publication date: 1-Oct-2014.
  384. Heuser A, Rioul O and Guilley S Good Is Not Good Enough Proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems --- CHES 2014 - Volume 8731, (55-74)
  385. ACM
    Chou C Molecular communication networks with general molecular circuit receivers Proceedings of ACM The First Annual International Conference on Nanoscale Computing and Communication, (1-9)
  386. Gibson J and Hu J (2014). Rate Distortion Bounds for Voice and Video, Foundations and Trends in Communications and Information Theory, 10:4, (379-514), Online publication date: 18-Feb-2014.
  387. ACM
    Viderman M (2013). Linear-time decoding of regular expander codes, ACM Transactions on Computation Theory, 5:3, (1-25), Online publication date: 1-Aug-2013.
  388. ACM
    Phan Ho A, Mai Hoang B, Sawaya W and Bas P Document authentication using graphical codes Proceedings of the first ACM workshop on Information hiding and multimedia security, (87-94)
  389. Malyutov M Search for sparse active inputs Information Theory, Combinatorics, and Search Theory, (609-647)
  390. Mhamdi T, Hasan O and Tahar S Quantitative analysis of information flow using theorem proving Proceedings of the 14th international conference on Formal Engineering Methods: formal methods and software engineering, (119-134)
  391. Varzakas P (2012). Channel capacity per user in a power and rate adaptive hybrid DS/FFH-CDMA cellular system over Rayleigh fading channels, International Journal of Communication Systems, 25:7, (943-952), Online publication date: 1-Jul-2012.
  392. ACM
    Viderman M Linear time decoding of regular expander codes Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, (168-182)
  393. ACM
    Koch T On bandlimited fading channels at high SNR Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, (1-5)
  394. Espinoza B and Smith G Min-Entropy leakage of channels in cascade Proceedings of the 8th international conference on Formal Aspects of Security and Trust, (70-84)
  395. Even G, Matsri Y and Medina M Multi-hop routing and scheduling in wireless networks in the SINR model Proceedings of the 7th international conference on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities, (202-214)
  396. Even G, Fais Y, Medina M, Shahar S and Zadorojniy A Real-Time video streaming in multi-hop wireless static ad hoc networks Proceedings of the 7th international conference on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities, (188-201)
  397. ACM
    Laber E and Molinaro M (2011). Improved approximations for the hotlink assignment problem, ACM Transactions on Algorithms, 7:3, (1-34), Online publication date: 1-Jul-2011.
  398. ACM
    Meng Z and Smith G Calculating bounds on information leakage using two-bit patterns Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and Analysis for Security, (1-12)
  399. Awan Z, Zaidi A and Vandendorpe L MAC with partially cooperating encoders and security constraints Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, (658-664)
  400. Luzzi L and Bloch M Capacity-based random codes cannot achieve strong secrecy over symmetric wiretap channels Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, (641-647)
  401. Schmeink A and Zhang H (2011). Capacity-achieving probability measure for a reduced number of signaling points, Wireless Networks, 17:4, (987-999), Online publication date: 1-May-2011.
  402. Blondeau C and Gérard B Multiple differential cryptanalysis Proceedings of the 18th international conference on Fast software encryption, (35-54)
  403. Dabora R and Goldsmith A (2010). Capacity theorems for discrete, finite-state broadcast channels with feedback and unidirectional receiver cooperation, IEEE Transactions on Information Theory, 56:12, (5958-5983), Online publication date: 1-Dec-2010.
  404. Koch T and Lapidoth A (2010). On multipath fading channels at high SNR, IEEE Transactions on Information Theory, 56:12, (5945-5957), Online publication date: 1-Dec-2010.
  405. Abbe E and Zheng L (2010). Linear universal decoding for compound channels, IEEE Transactions on Information Theory, 56:12, (5999-6013), Online publication date: 1-Dec-2010.
  406. Huang A, Abugharbieh R and Tam R (2010). A novel rotationally invariant region-based hidden Markov model for efficient 3-D image segmentation, IEEE Transactions on Image Processing, 19:10, (2737-2748), Online publication date: 1-Oct-2010.
  407. Bhaskaran S, Hanly S, Badruddin N and Evans J (2010). Maximizing the sum rate in symmetric networks of interfering links, IEEE Transactions on Information Theory, 56:9, (4471-4487), Online publication date: 1-Sep-2010.
  408. Como G (2010). Group codes outperform binary-coset codes on nonbinary symmetric memoryless channels, IEEE Transactions on Information Theory, 56:9, (4321-4334), Online publication date: 1-Sep-2010.
  409. Truhachev D, Zigangirov K and Costello D (2010). Distance bounds for periodically time-varying and tail-biting LDPC convolutional codes, IEEE Transactions on Information Theory, 56:9, (4301-4308), Online publication date: 1-Sep-2010.
  410. Chen J, Permuter H and Weissman T (2010). Tighter bounds on the capacity of finite-state channels via Markov set-chains, IEEE Transactions on Information Theory, 56:8, (3660-3691), Online publication date: 1-Aug-2010.
  411. Wu Y and Verdú S (2010). Rényi information dimension, IEEE Transactions on Information Theory, 56:8, (3721-3748), Online publication date: 1-Aug-2010.
  412. Hof E, Sason I and Shamai S (2010). Performance bounds for erasure, list and decision feedback schemes with linear block codes, IEEE Transactions on Information Theory, 56:8, (3754-3778), Online publication date: 1-Aug-2010.
  413. Özçelikkale A, Ozaktas H and Arikan E (2010). Signal recovery with cost-constrained measurements, IEEE Transactions on Signal Processing, 58:7, (3607-3617), Online publication date: 1-Jul-2010.
  414. Effros M, Goldsmith A and Liang Y (2010). Generalizing capacity, IEEE Transactions on Information Theory, 56:7, (3069-3087), Online publication date: 1-Jul-2010.
  415. Villalba L, Cortez J and Blaum M (2010). On the efficiency of shortened cyclic single-burst-correcting codes, IEEE Transactions on Information Theory, 56:7, (3290-3296), Online publication date: 1-Jul-2010.
  416. Bross S, Lapidoth A and Tinguely S (2010). Broadcasting correlated Gaussians, IEEE Transactions on Information Theory, 56:7, (3057-3068), Online publication date: 1-Jul-2010.
  417. Yu Y (2010). Squeezing the Arimoto-Blahut algorithm for faster convergence, IEEE Transactions on Information Theory, 56:7, (3149-3157), Online publication date: 1-Jul-2010.
  418. Mitra J and Lampe L (2010). Convolutionally coded transmission over Markov-Gaussian channels, IEEE Transactions on Communications, 58:7, (1939-1949), Online publication date: 1-Jul-2010.
  419. ACM
    Bai B, Chen W, Letaief K and Cao Z RBG matching Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, (621-625)
  420. Zhao L and Permuter H (2010). Zero-error feedback capacity of channels with state information via dynamic programming, IEEE Transactions on Information Theory, 56:6, (2640-2650), Online publication date: 1-Jun-2010.
  421. Calderero F and Marques F (2010). Region merging techniques using information theory statistical measures, IEEE Transactions on Image Processing, 19:6, (1567-1586), Online publication date: 1-Jun-2010.
  422. Mahmood A and Belfiore J (2010). An efficient algorithm for optimal discrete bit-loading in multicarrier systems, IEEE Transactions on Communications, 58:6, (1627-1630), Online publication date: 1-Jun-2010.
  423. Zaidi A, Shamai S, Piantanida P and Vandendorpe L On the capacity of a class of relay channels with orthogonal components and noncausal state information at source Proceedings of the 5th IEEE international conference on Wireless pervasive computing, (528-533)
  424. Zaidi A, Kotagiri S, Laneman J and Vandendorpe L (2010). Cooperative relaying with state available noncausally at the relay, IEEE Transactions on Information Theory, 56:5, (2272-2298), Online publication date: 1-May-2010.
  425. Muramatsu J and Miyake S (2010). Hash property and coding theorems for sparse matrices and maximum-likelihood coding, IEEE Transactions on Information Theory, 56:5, (2143-2167), Online publication date: 1-May-2010.
  426. Polyanskiy Y, Poor H and Verdú S (2010). Channel coding rate in the finite blocklength regime, IEEE Transactions on Information Theory, 56:5, (2307-2359), Online publication date: 1-May-2010.
  427. Subramanian V, Berry R and Agrawal R (2010). Joint scheduling and resource allocation in CDMA systems, IEEE Transactions on Information Theory, 56:5, (2416-2432), Online publication date: 1-May-2010.
  428. Liva G, Papaleo M, Párraga Niebla C, Cioni S, Scalise S, Vanelli-Coralli A, Corazza G, Kim P and Lee H (2010). The very short frame of mobile DVB-RCS, International Journal of Satellite Communications and Networking, 28:3-4, (209-231), Online publication date: 1-May-2010.
  429. Makki B, Beygi L and Eriksson T (2010). Channel capacity bounds in the presence of quantized channel state information, EURASIP Journal on Wireless Communications and Networking, 2010, (1-15), Online publication date: 1-Apr-2010.
  430. Le Nir V and Scheers B (2010). Distributed power allocation for parallel broadcast channels with only common information in cognitive tactical radio networks, EURASIP Journal on Wireless Communications and Networking, 2010, (1-10), Online publication date: 1-Apr-2010.
  431. García-Zambrana A, Castillo-Vázquez C and Castillo-Vázquez B (2010). On the capacity of FSO links over gamma-gamma atmospheric turbulence channels using OOK signaling, EURASIP Journal on Wireless Communications and Networking, 2010, (1-11), Online publication date: 1-Apr-2010.
  432. Dabora R and Goldsmith A (2010). The capacity region of the degraded finite-state broadcast channel, IEEE Transactions on Information Theory, 56:4, (1828-1851), Online publication date: 1-Apr-2010.
  433. Somaraju R and Trumpf J (2010). Degrees of freedom of a communication channel, IEEE Transactions on Information Theory, 56:4, (1560-1573), Online publication date: 1-Apr-2010.
  434. Ryabko D (2010). On Finding Predictors for Arbitrary Families of Processes, The Journal of Machine Learning Research, 11, (581-602), Online publication date: 1-Mar-2010.
  435. Özgür A and Lévêque O (2010). Throughput-delay tradeoff for hierarchical cooperation in ad hoc wireless networks, IEEE Transactions on Information Theory, 56:3, (1369-1377), Online publication date: 1-Mar-2010.
  436. Gordon D, Miller V and Ostapenko P (2010). Optimal hash functions for approximate matches on the n-cube, IEEE Transactions on Information Theory, 56:3, (984-991), Online publication date: 1-Mar-2010.
  437. Quek T and Shin H (2010). Bursty relay networks in low-SNR regimes, IEEE Transactions on Communications, 58:2, (694-705), Online publication date: 1-Feb-2010.
  438. Berger T and Levy W (2010). A mathematical theory of energy efficient neural computation and communication, IEEE Transactions on Information Theory, 56:2, (852-874), Online publication date: 1-Feb-2010.
  439. McDonnell M, Burkitt A, Grayden D, Meffin H and Grant A (2010). A channel model for inferring the optimal number of electrodes for future cochlear implants, IEEE Transactions on Information Theory, 56:2, (928-940), Online publication date: 1-Feb-2010.
  440. Suksompong P and Berger T (2010). Capacity analysis for integrate-and-fire neurons with descending action potential thresholds, IEEE Transactions on Information Theory, 56:2, (838-851), Online publication date: 1-Feb-2010.
  441. Tabatabaei Yazdi S and Savari S A max-flow/min-cut algorithm for a class of wireless networks Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (1209-1226)
  442. Gerck E The witness-voting system Towards Trustworthy Elections, (1-36)
  443. Seberry J, Charnes C, Pieprzyk J and Safavi-Naini R Crypto topics and applications II Algorithms and theory of computation handbook, (13-13)
  444. Gallager R and Nakiboğlu B (2010). Variations on a theme by Schalkwijk and Kailath, IEEE Transactions on Information Theory, 56:1, (6-17), Online publication date: 1-Jan-2010.
  445. Etkin R, Merhav N and Ordentlich E (2010). Error exponents of optimum decoding for the interference channel, IEEE Transactions on Information Theory, 56:1, (40-56), Online publication date: 1-Jan-2010.
  446. Harsha P, Jain R, McAllester D and Radhakrishnan J (2010). The communication complexity of correlation, IEEE Transactions on Information Theory, 56:1, (438-449), Online publication date: 1-Jan-2010.
  447. Durisi G, Schuster U, Bölcskei H and Shamai S (2010). Noncoherent capacity of underspread fading channels, IEEE Transactions on Information Theory, 56:1, (367-395), Online publication date: 1-Jan-2010.
  448. Chiu M (2010). Bandwidth-efficient modulation codes based on nonbinary irregular repeat-accumulate codes, IEEE Transactions on Information Theory, 56:1, (152-167), Online publication date: 1-Jan-2010.
  449. Akçakaya M and Tarokh V (2010). Shannon-theoretic limits on noisy compressive sampling, IEEE Transactions on Information Theory, 56:1, (492-504), Online publication date: 1-Jan-2010.
  450. Jiancai L, Wanwan Y, Weili Z, Yafo W, Zhihui Y, Jiakai X and Xinbao N The improvement of adaptive bit and power loading algorithm with low complexity in MIMO-OFDM systems Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications, (241-245)
  451. Guoliang X, Haixian Z and Wei Y A new convolutional decoding in OCDMA system Proceedings of the 7th international conference on Information, communications and signal processing, (620-623)
  452. Walsh J, Weber S and Maina C (2009). Optimal rate, IEEE Transactions on Information Theory, 55:12, (5491-5510), Online publication date: 1-Dec-2009.
  453. Sankar L, Mandayam N and Poor H (2009). On the sum-capacity of degraded Gaussian multiple-access relay channels, IEEE Transactions on Information Theory, 55:12, (5394-5411), Online publication date: 1-Dec-2009.
  454. Borade S, Nakiboǧlu B and Zheng L (2009). Unequal error protection, IEEE Transactions on Information Theory, 55:12, (5511-5539), Online publication date: 1-Dec-2009.
  455. Chen J, He D, Jagmohan A, Lastras-Montaño L and Yang E (2009). On the linear codebook-level duality between Slepian-Wolf coding and channel coding, IEEE Transactions on Information Theory, 55:12, (5575-5590), Online publication date: 1-Dec-2009.
  456. Merhav N (2009). Joint source channel coding via statistical mechanics, IEEE Transactions on Information Theory, 55:12, (5382-5393), Online publication date: 1-Dec-2009.
  457. Ignatenko T and Willems F (2009). Biometric systems, IEEE Transactions on Information Forensics and Security, 4:4, (956-973), Online publication date: 1-Dec-2009.
  458. Farid A and Hranilovic S (2009). Channel capacity and non-uniform signalling for free-space optical intensity channels, IEEE Journal on Selected Areas in Communications, 27:9, (1553-1563), Online publication date: 1-Dec-2009.
  459. Peng Y and Rajan D Achievable rate of Gaussian cognitive Z-interference channel with partial side information Proceedings of the 28th IEEE conference on Global telecommunications, (6078-6082)
  460. Hong J and Li V Impact of information on network performance - an information-theoretic perspective Proceedings of the 28th IEEE conference on Global telecommunications, (3540-3545)
  461. Nguyen T and Lampe L Rateless multilevel coding and applications Proceedings of the 28th IEEE conference on Global telecommunications, (1603-1609)
  462. Sheng Z, Ding Z and Leung K Transmission delay analysis with finite coding length in wireless cooperative networks Proceedings of the 28th IEEE conference on Global telecommunications, (1277-1282)
  463. Armada A, Sánchez-Fernández M and Corvaja R Waterfilling schemes for zero-forcing coordinated base station transmission Proceedings of the 28th IEEE conference on Global telecommunications, (213-217)
  464. Rahimzadeh P and Beaulieu N Asymptotic performance analysis of optimum combining for dense multiple antenna reception under Rayleigh fading Proceedings of the 28th IEEE conference on Global telecommunications, (27-34)
  465. Hayashi M (2009). Information spectrum approach to second-order coding rate in channel coding, IEEE Transactions on Information Theory, 55:11, (4947-4966), Online publication date: 1-Nov-2009.
  466. Sadrabadi M, Bayesteh A and Khandani A (2009). Achieving long-term fairness and optimum multiuser diversity gain in time-varying broadcast channels, IEEE Transactions on Information Theory, 55:10, (4585-4597), Online publication date: 1-Oct-2009.
  467. Jinlin F, Chunping H, Lei Y, Ke L, Jianjun L and Shanlin S Channel capacity of MIMO multi-carrier modulation in additive noise Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (1933-1936)
  468. Bai Q and Nossek J On two cross-layer assisted resource allocation schemes in multiuser multicarrier systems Proceedings of the 6th international conference on Symposium on Wireless Communication Systems, (186-190)
  469. Draper S, Kschischang F and Frey B (2009). Rateless coding for arbitrary channel mixtures with decoder channel state information, IEEE Transactions on Information Theory, 55:9, (4119-4133), Online publication date: 1-Sep-2009.
  470. Farmanbar H and Khandani A (2009). Precoding for the AWGN channel with discrete interference, IEEE Transactions on Information Theory, 55:9, (4019-4032), Online publication date: 1-Sep-2009.
  471. Ryabko B (2009). Compression-based methods for nonparametric prediction and estimation of some characteristics of time series, IEEE Transactions on Information Theory, 55:9, (4309-4315), Online publication date: 1-Sep-2009.
  472. Bhatnagar J and Kumar A (2009). On estimating performance indices for biometric identification, Pattern Recognition, 42:9, (1803-1815), Online publication date: 1-Sep-2009.
  473. Fang X Are you becoming a diabetic? a data mining approach Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 5, (18-22)
  474. Koch T, Lapidoth A and Sotiriadis P (2009). Channels that heat up, IEEE Transactions on Information Theory, 55:8, (3594-3612), Online publication date: 1-Aug-2009.
  475. Li T and Collins O (2009). Design and analysis of successive decoding with finite levels for the Markov channel, IEEE Transactions on Information Theory, 55:8, (3526-3543), Online publication date: 1-Aug-2009.
  476. Shrader B and Permuter H (2009). Feedback capacity of the compound channel, IEEE Transactions on Information Theory, 55:8, (3629-3644), Online publication date: 1-Aug-2009.
  477. Bae J and Anastasopoulos A (2009). Capacity-achieving codes for finite-state channels with maximum-likelihood decoding, IEEE Journal on Selected Areas in Communications, 27:6, (974-984), Online publication date: 1-Aug-2009.
  478. Varzakas P Closed-form expression for the optimum antennas number of a spread spectrum MIMO system under Rayleigh fading conditions Proceedings of the 13th WSEAS international conference on Communications, (56-59)
  479. Adami D, Callegari C, Giordano S, Pagano M and Russo F On the use of compression algorithms for the classification of IP flows Proceedings of the 12th international conference on Symposium on Performance Evaluation of Computer & Telecommunication Systems, (355-360)
  480. El-Hajjar M, Alamri O, Wang J, Zummo S and Hanzo L (2009). Layered steered space-time codes using multi-dimensional sphere packing modulation, IEEE Transactions on Wireless Communications, 8:7, (3335-3340), Online publication date: 1-Jul-2009.
  481. Zhong Y, Alajaji F and Linder T (2009). Random-coding lower bounds for the error exponent of joint quantization and watermarking systems, IEEE Transactions on Information Theory, 55:7, (3264-3283), Online publication date: 1-Jul-2009.
  482. Arikan E (2009). Channel polarization, IEEE Transactions on Information Theory, 55:7, (3051-3073), Online publication date: 1-Jul-2009.
  483. Grover P, Sahai A and Park S The finite-dimensional Witsenhausen counterexample Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, (604-613)
  484. Goel S and Negi R Analysis of delay statistics for the queued-code Proceedings of the 2009 IEEE international conference on Communications, (3803-3808)
  485. Nguyen T and Lampe L Coded pulse-position modulation for free-space optical communications Proceedings of the 2009 IEEE international conference on Communications, (3707-3712)
  486. Ohlmer E and Fettweis G Link adaptation in linearly precoded closed-loop MIMO-OFDM systems with linear receivers Proceedings of the 2009 IEEE international conference on Communications, (2999-3004)
  487. Herzet C, Toto-Zarasoa V and Roumy A Error resilient non-asymmetric Slepian-Wolf coding Proceedings of the 2009 IEEE international conference on Communications, (2043-2047)
  488. Miao G, Himayat N, Li G and Talwar S Low-complexity energy-efficient OFDMA Proceedings of the 2009 IEEE international conference on Communications, (1844-1848)
  489. Kiyavash N, Coleman T and Rodrigues M Novel shaping and complexity-reduction techniques for approaching capacity over queuing timing channels Proceedings of the 2009 IEEE international conference on Communications, (1769-1773)
  490. Pimentel C and Alajaji F A discrete channel model for capturing memory and soft-decision information Proceedings of the 2009 IEEE international conference on Communications, (1763-1768)
  491. Xiao C and Zheng Y Transmit precoding for MIMO systems with partial CSI and discrete-constellation inputs Proceedings of the 2009 IEEE international conference on Communications, (1737-1741)
  492. Bhaskaran S, Hanly S, Badruddin N and Evans J Maximizing the sum rate in symmetric networks of interfering links Proceedings of the 2009 IEEE international conference on Communications, (1674-1679)
  493. Permuter H, Weissman T and Chen J (2009). Capacity region of the finite-state multiple-access channel with and without feedback, IEEE Transactions on Information Theory, 55:6, (2455-2477), Online publication date: 1-Jun-2009.
  494. Martinez A, Fàbregas A, Caire G and Willems F (2009). Bit-interleaved coded modulation revisited, IEEE Transactions on Information Theory, 55:6, (2756-2765), Online publication date: 1-Jun-2009.
  495. Philosof T and Zamir R (2009). On the loss of single-letter characterization, IEEE Transactions on Information Theory, 55:6, (2442-2454), Online publication date: 1-Jun-2009.
  496. Popovski P and Simeone O (2009). Wireless secrecy in cellular systems with infrastructure-aided cooperation, IEEE Transactions on Information Forensics and Security, 4:2, (242-256), Online publication date: 1-Jun-2009.
  497. Hehn T and Huber J (2009). LDPC codes and convolutional codes with equal structural delay, IEEE Transactions on Communications, 57:6, (1683-1692), Online publication date: 1-Jun-2009.
  498. Huang K, Heath R and Andrews J (2009). Limited feedback beamforming over temporally-correlated channels, IEEE Transactions on Signal Processing, 57:5, (1959-1975), Online publication date: 1-May-2009.
  499. Gupta A and Verdú S (2009). Nonlinear sparse-graph codes for lossy compression, IEEE Transactions on Information Theory, 55:5, (1961-1975), Online publication date: 1-May-2009.
  500. Como G and Fagnani F (2009). The capacity of finite Abelian group codes over symmetric memoryless channels, IEEE Transactions on Information Theory, 55:5, (2037-2054), Online publication date: 1-May-2009.
  501. Watanabe Y and Kamoi K (2009). A formulation of the channel capacity of multiple-access channel, IEEE Transactions on Information Theory, 55:5, (2083-2096), Online publication date: 1-May-2009.
  502. Como G, Yüksel S and Tatikonda S (2009). The error exponent of variable-length codes over Markov channels with feedback, IEEE Transactions on Information Theory, 55:5, (2139-2160), Online publication date: 1-May-2009.
  503. El Sanousi G A concise review of the space time premise and its impact on modern wireless communication theory Proceedings of the Sixth international conference on Wireless and Optical Communications Networks, (343-349)
  504. Sung T and Bojanczyk A Cross-layer delay-constrained packet scheduling over multiuser wireless channels Proceedings of the 2009 conference on Wireless Telecommunications Symposium, (407-412)
  505. Quek T and Shin H Bursty wideband relay networks Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (2690-2695)
  506. Taylor S and Sadeghi P Finite-state Markov modelling of frequency-selective fading channels with correlated taps Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (209-214)
  507. Franceschetti M and Chakraborty K (2009). Space-time duality in multiple antenna channels, IEEE Transactions on Wireless Communications, 8:4, (1733-1743), Online publication date: 1-Apr-2009.
  508. Li T, Ni Q, Malone D, Leith D, Xiao Y and Turletti T (2009). Aggregation with fragment retransmission for very high-speed WLANs, IEEE/ACM Transactions on Networking, 17:2, (591-604), Online publication date: 1-Apr-2009.
  509. Zhong Y, Alajaji F and Campbell L (2009). Error exponents for asymmetric two-user discrete memoryless source-channel coding systems, IEEE Transactions on Information Theory, 55:4, (1487-1518), Online publication date: 1-Apr-2009.
  510. Yang S, Chen Y and Qiu P (2009). Linear-codes-based lossless joint source-channel coding for multiple-access channels, IEEE Transactions on Information Theory, 55:4, (1468-1486), Online publication date: 1-Apr-2009.
  511. Denic S, Charalambous C and Djouadi S (2009). Information theoretic bounds for compound MIMO Gaussian channels, IEEE Transactions on Information Theory, 55:4, (1603-1617), Online publication date: 1-Apr-2009.
  512. Shin H and Win M (2009). Gallager's exponent for MIMO channels, IEEE Transactions on Communications, 57:4, (972-985), Online publication date: 1-Apr-2009.
  513. Smith G On the Foundations of Quantitative Information Flow Proceedings of the 12th International Conference on Foundations of Software Science and Computational Structures - Volume 5504, (288-302)
  514. Merhav N (2009). The generalized random energy model and its application to the statistical physics of ensembles of hierarchical codes, IEEE Transactions on Information Theory, 55:3, (1250-1268), Online publication date: 1-Mar-2009.
  515. Hof E, Sason I and Shamai S (2009). Performance bounds for nonbinary linear block codes over memoryless symmetric channels, IEEE Transactions on Information Theory, 55:3, (977-996), Online publication date: 1-Mar-2009.
  516. Zhong Y, Alajaji F and Campbell L (2009). Joint source-channel coding excess distortion exponent for some memoryless continuous-alphabet systems, IEEE Transactions on Information Theory, 55:3, (1296-1319), Online publication date: 1-Mar-2009.
  517. Chen X and Schmid N (2009). Empirical capacity of a recognition channel for single-and multipose object recognition under the constraint of PCA encoding, IEEE Transactions on Image Processing, 18:3, (636-651), Online publication date: 1-Mar-2009.
  518. Kougianos E, Mohanty S and Mahapatra R (2009). Hardware assisted watermarking for multimedia, Computers and Electrical Engineering, 35:2, (339-358), Online publication date: 1-Mar-2009.
  519. Permuter H, Weissman T and Goldsmith A (2009). Finite state channels with time-invariant deterministic feedback, IEEE Transactions on Information Theory, 55:2, (644-662), Online publication date: 1-Feb-2009.
  520. Srinivasan S and Varanasi M (2009). Optimal constellations for the low-SNR noncoherent MIMO block Rayleigh-fading channel, IEEE Transactions on Information Theory, 55:2, (776-796), Online publication date: 1-Feb-2009.
  521. Sadeghi P, Vontobel P and Shams R (2009). Optimization of information rate upper and lower bounds for channels with memory, IEEE Transactions on Information Theory, 55:2, (663-688), Online publication date: 1-Feb-2009.
  522. Biagioni A, Fantacci R, Marabissi D and Tarchi D (2009). Adaptive subcarrier allocation schemes for wireless OFDMA systems in WiMAX networks, IEEE Journal on Selected Areas in Communications, 27:2, (217-225), Online publication date: 1-Feb-2009.
  523. lzak D (2009). Degrees of conditional (in)dependence, Information Sciences: an International Journal, 179:3, (197-209), Online publication date: 15-Jan-2009.
  524. Dong X, Li X and Wu D Analysis of packet error probability in delay constrained communication over fading channels Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, (1090-1094)
  525. Zaidi A and Vandendorpe L (2009). Lower bounds on the capacity of the relay channel with states at the source, EURASIP Journal on Wireless Communications and Networking, 2009, (1-22), Online publication date: 1-Jan-2009.
  526. Chen J and Slock D (2009). On optimum end-to-end distortion in MIMO systems, EURASIP Journal on Wireless Communications and Networking, 2009, (1-9), Online publication date: 1-Jan-2009.
  527. Boucheron S, Garivier A and Gassiat E (2009). Coding on countably infinite alphabets, IEEE Transactions on Information Theory, 55:1, (358-373), Online publication date: 1-Jan-2009.
  528. Tatikonda S and Mitter S (2009). The capacity of channels with feedback, IEEE Transactions on Information Theory, 55:1, (323-349), Online publication date: 1-Jan-2009.
  529. Lapidoth A and Moser S (2009). On the capacity of the discrete-time poisson channel, IEEE Transactions on Information Theory, 55:1, (303-322), Online publication date: 1-Jan-2009.
  530. ACM
    Zhang W, Stojanovic M and Mitra U Analysis of a simple multihop underwater acoustic network Proceedings of the 3rd International Workshop on Underwater Networks, (3-10)
  531. Ryabko B (2008). Applications of Kolmogorov Complexity and Universal Codes to Nonparametric Estimation of Characteristics of Time Series, Fundamenta Informaticae, 83:1-2, (177-196), Online publication date: 15-Aug-2008.
  532. Ryabko B (2008). Applications of Kolmogorov Complexity and Universal Codes to Nonparametric Estimation of Characteristics of Time Series, Fundamenta Informaticae, 83:1-2, (177-196), Online publication date: 1-Jan-2008.
  533. Guillén i Fàbregas A, Martinez A and Caire G (2008). Bit-Interleaved Coded Modulation, Foundations and Trends in Communications and Information Theory, 5:1-2, (1-153), Online publication date: 1-Jan-2008.
  534. Luo X and Giannakis G (2008). Energy-constrained optimal quantization for wireless sensor networks, EURASIP Journal on Advances in Signal Processing, 2008, (1-12), Online publication date: 1-Jan-2008.
  535. Kotagiri S and Laneman J (2008). Multiaccess channels with state known to some encoders and independent messages, EURASIP Journal on Wireless Communications and Networking, 2008, (1-14), Online publication date: 1-Jan-2008.
  536. Ermolova N and Makarevitch B (2008). Practical approaches to adaptive resource allocation in OFDM systems, EURASIP Journal on Wireless Communications and Networking, 2008, (1-13), Online publication date: 1-Jan-2008.
  537. El Shabrawy T and Le-Ngoc T (2007). Subcarrier group assignment for MC-CDMA wireless networks, EURASIP Journal on Wireless Communications and Networking, 2007, (1-12), Online publication date: 1-Oct-2007.
  538. ACM
    Zhang W and Mitra U A delay-reliability analysis for multihop underwater acoustic communication Proceedings of the 2nd Workshop on Underwater Networks, (57-64)
  539. ACM
    Nakamura E, Loureiro A and Frery A (2007). Information fusion for wireless sensor networks, ACM Computing Surveys, 39:3, (9-es), Online publication date: 3-Sep-2007.
  540. Bhatnagar J and Kumar A On some performance indices for biometric identification system Proceedings of the 2007 international conference on Advances in Biometrics, (1043-1056)
  541. ACM
    Babb B Evolved transforms surpass the FBI wavelet for improved fingerprint compression and reconstruction Proceedings of the 9th annual conference companion on Genetic and evolutionary computation, (2603-2606)
  542. Altman E, Avrachenkov K and Garnaev A A jamming game in wireless networks with transmission cost Proceedings of the 1st EuroFGI international conference on Network control and optimization, (1-12)
  543. Rong B, Qian Y and Lu K (2007). Integrated Downlink Resource Management for Multiservice WiMAX Networks, IEEE Transactions on Mobile Computing, 6:6, (621-632), Online publication date: 1-Jun-2007.
  544. Kodialam M and Lakshman T Achievable Rate Region for Wireless Systems with Time Varying Channels Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (53-61)
  545. Babb B, Moore F and Peterson M Evolved transforms beat the FBI wavelet for improved fingerprint compression and reconstruction Proceedings of the 6th Conference on 6th WSEAS International Conference on Signal Processing - Volume 6, (179-184)
  546. ACM
    Pandurangan G and Upfal E (2007). Entropy-based bounds for online algorithms, ACM Transactions on Algorithms, 3:1, (1-19), Online publication date: 1-Feb-2007.
  547. Esposito A The amount of information on emotional states conveyed by the verbal and nonverbal channels Progress in nonlinear speech processing, (249-268)
  548. ACM
    Singhal R, Choi G and Mahapatra R Information theoretic approach to address delay and reliability in long on-chip interconnects Proceedings of the 2006 IEEE/ACM international conference on Computer-aided design, (310-314)
  549. ACM
    Bandyopadhyay S, Bhattacharyya D and Pal A (2006). Secure delivery of handwritten signature, Ubiquity, 2006:October, (1-12), Online publication date: 1-Oct-2006.
  550. Ryabko B, Astola J and Gammerman A (2006). Application of Kolmogorov complexity and universal codes to identity testing and nonparametric testing of serial independence for time series, Theoretical Computer Science, 359:1, (440-448), Online publication date: 14-Aug-2006.
  551. ACM
    Biagi M, Baccarelli E, Cordeschi N, Pelizzoni C and Garzia F Interference suppression in MIMO systems for throughput enhancement and error reduction Proceedings of the 2006 international conference on Wireless communications and mobile computing, (611-616)
  552. Li T, Ni Q, Malone D, Leith D, Xiao Y and Turletti T A New MAC Scheme for Very High-Speed WLANs Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, (171-180)
  553. Gursoy M, Poor H and Verdú S (2006). On-off frequency-shift keying for wideband fading channels, EURASIP Journal on Wireless Communications and Networking, 2006:3, (1-15), Online publication date: 1-Jun-2006.
  554. Singhal R, Choi G and Mahapatra R Information Theoretic Capacity of Long On-chip Interconnects in the Presence of Crosstalk Proceedings of the 7th International Symposium on Quality Electronic Design, (407-412)
  555. Willig A and Mitschke R Results of bit error measurements with sensor nodes and casuistic consequences for design of energy-efficient error control schemes Proceedings of the Third European conference on Wireless Sensor Networks, (310-325)
  556. Arikan E Cutoff rate enhancement General Theory of Information Transfer and Combinatorics, (1066-1068)
  557. Ahlswede R, Arikan E, Bäumer L and Deppe C Information theoretic models in language evolution General Theory of Information Transfer and Combinatorics, (769-787)
  558. Ahlswede R and Körner J Appendix General Theory of Information Transfer and Combinatorics, (664-677)
  559. Ahlswede R On concepts of performance parameters for channels General Theory of Information Transfer and Combinatorics, (639-663)
  560. Laczay B Coding for the multiple-access adder channel General Theory of Information Transfer and Combinatorics, (165-195)
  561. Goud P, Hang R, Truhachev D and Schlegel C (2006). A portable MIMO testbed and selected channel measurements, EURASIP Journal on Advances in Signal Processing, 2006, (141-141), Online publication date: 1-Jan-2006.
  562. Zheng F and Kaiser T (2006). On the channel capacity of multiantenna systems with Nakagami fading, EURASIP Journal on Advances in Signal Processing, 2006, (15-15), Online publication date: 1-Jan-2006.
  563. Fletcher A, Rangan S, Goyal V and Ramchandran K (2006). Denoising by sparse approximation, EURASIP Journal on Advances in Signal Processing, 2006, (98-98), Online publication date: 1-Jan-2006.
  564. Topak E, Voloshynovskiy S, Koval O, Mihcak M and Pun T (2005). Towards geometrically robust data-hiding with structured codebooks, Multimedia Systems, 11:2, (121-132), Online publication date: 1-Dec-2005.
  565. Venkitasubramaniam P, Adireddy S and Tong L (2005). Sensitivity and Coding of Opportunistic ALOHA in Sensor Networks with Mobile Access, Journal of VLSI Signal Processing Systems, 41:3, (329-344), Online publication date: 1-Nov-2005.
  566. Rachlin Y, Negi R and Khosla P Sensing capacity for discrete sensor network applications Proceedings of the 4th international symposium on Information processing in sensor networks, (17-es)
  567. Tallini L (2005). Bounds on the Capacity of the Unidirectional Channels, IEEE Transactions on Computers, 54:2, (232-235), Online publication date: 1-Feb-2005.
  568. Feldman J and Stein C LP decoding achieves capacity Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms, (460-469)
  569. Rankin D, Gulliver T and Taylor D (2005). Parallel and serial concatenated single parity check product codes, EURASIP Journal on Advances in Signal Processing, 2005, (775-783), Online publication date: 1-Jan-2005.
  570. Biglieri E and Taricco G (2004). Transmission and reception with multiple antennas, Communications and Information Theory, 1:2, (183-332), Online publication date: 1-Oct-2004.
  571. Boiko L (2004). Wavelets and Estimation of Discontinuous Functions, Problems of Information Transmission, 40:3, (226-236), Online publication date: 1-Jul-2004.
  572. Biglieri E and Taricco G Multiple antennas Wireless communications systems and networks, (613-654)
  573. Hamza A, Krim H and Zerubia J (2004). A nonlinear entropic variational model for image filtering, EURASIP Journal on Advances in Signal Processing, 2004, (2408-2422), Online publication date: 1-Jan-2004.
  574. Jin H and Acampora A (2004). Bounds on the outage-constrained capacity region of space-division multiple-access radio systems, EURASIP Journal on Advances in Signal Processing, 2004, (1288-1298), Online publication date: 1-Jan-2004.
  575. ACM
    Moskowitz I, Newman R, Crepeau D and Miller A Covert channels and anonymizing networks Proceedings of the 2003 ACM workshop on Privacy in the electronic society, (79-88)
  576. Ishwar P, Puri R, Pradhan S and Ramchandran K On rate-constrained estimation in unreliable sensor networks Proceedings of the 2nd international conference on Information processing in sensor networks, (178-192)
  577. Yedidia J, Freeman W and Weiss Y Understanding belief propagation and its generalizations Exploring artificial intelligence in the new millennium, (239-269)
  578. Bar-Noy A, Nisgav A and Patt-Shamir B (2002). Nearly optimal perfectly periodic schedules, Distributed Computing, 15:4, (207-220), Online publication date: 1-Dec-2002.
  579. Şlȩzak D (2002). Approximate entropy reducts, Fundamenta Informaticae, 53:3,4, (365-390), Online publication date: 30-May-2002.
  580. Puri R, Ramchandran K and Pradhan S n-Channel Multiple Descriptions Proceedings of the Data Compression Conference
  581. Grant A (2002). Rayleigh fading multi-antenna channels, EURASIP Journal on Advances in Signal Processing, 2002:3, (316-329), Online publication date: 1-Mar-2002.
  582. Ryabko B and Topsøe F (2002). On Asymptotically Optimal Methods of Prediction and Adaptive Coding for Markov Sources, Journal of Complexity, 18:1, (224-241), Online publication date: 1-Mar-2002.
  583. Ślȩzak D Approximate Bayesian networks Technologies for constructing intelligent systems, (313-325)
  584. Grant A (2002). Rayleigh fading multi-antenna channels, EURASIP Journal on Advances in Signal Processing, 2002:1, (316-329), Online publication date: 1-Jan-2002.
  585. Orten P and Svensson A (2002). Sequential Decoding of Convolutional Codes for Rayleigh Fading Channels, Wireless Personal Communications: An International Journal, 20:1, (61-74), Online publication date: 1-Jan-2002.
  586. Pandurangan G and Upfal E Can entropy characterize performance of online algorithms? Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms, (727-734)
  587. Tian J A branch-and-bound algorithm for MDL learning Bayesian networks Proceedings of the Sixteenth conference on Uncertainty in artificial intelligence, (580-588)
  588. Dijk M, Jackson W and Martin K (1998). A General Decomposition Construction for Incomplete SecretSharing Schemes, Designs, Codes and Cryptography, 15:3, (301-321), Online publication date: 1-Dec-1998.
  589. ACM
    Chor B, Kushilevitz E, Goldreich O and Sudan M (1998). Private information retrieval, Journal of the ACM, 45:6, (965-981), Online publication date: 1-Nov-1998.
  590. Forcheri P, Gentilini P and Molfino M (1998). Informational Logic as a Tool for Automated Reasoning, Journal of Automated Reasoning, 20:1-2, (167-190), Online publication date: 1-Apr-1998.
  591. Foschini G and Gans M (1998). On Limits of Wireless Communications in a Fading Environment when UsingMultiple Antennas, Wireless Personal Communications: An International Journal, 6:3, (311-335), Online publication date: 1-Mar-1998.
  592. Dijk M (1997). A Linear Construction of Secret Sharing Schemes, Designs, Codes and Cryptography, 12:2, (161-201), Online publication date: 1-Oct-1997.
  593. Jackson W, M. Martin K and M. O'keefe C (1997). Mutually Trusted Authority-Free Secret Sharing Schemes, Journal of Cryptology, 10:4, (261-289), Online publication date: 1-Sep-1997.
  594. Damgård I, Pedersen T and Pfitzmann B (1997). On the existence of statistically hiding bit commitment schemes and fail-stop signatures, Journal of Cryptology, 10:3, (163-194), Online publication date: 1-Jun-1997.
  595. ACM
    Freund Y, Schapire R, Singer Y and Warmuth M Using and combining predictors that specialize Proceedings of the twenty-ninth annual ACM symposium on Theory of computing, (334-343)
  596. Foschini G and Valenzuela R (1997). Initial estimation of communication efficiency of indoor wireless channels, Wireless Networks, 3:2, (141-154), Online publication date: 1-May-1997.
  597. Xiang Y, Wong S and Cercone N (1997). A “Microscopic” Study of Minimum Entropy Search in Learning Decomposable Markov Networks, Machine Language, 26:1, (65-92), Online publication date: 1-Jan-1997.
  598. Chang J and Pedram M Module assignment for low power Proceedings of the conference on European design automation, (376-381)
  599. Desmedt Y Simmons' protocol is not free of subliminal channels Proceedings of the 9th IEEE workshop on Computer Security Foundations
  600. Béguin P and Cresti A General short computational secret sharing schemes Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques, (194-208)
  601. Jackson W, Martin K and O'Keefe C Efficient secret sharing without a mutually trusted authority Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques, (183-193)
  602. Desmedt Y Securing traceability of ciphertexts Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques, (147-157)
  603. Farach M, Noordewier M, Savari S, Shepp L, Wyner A and Ziv J On the entropy of DNA Proceedings of the sixth annual ACM-SIAM symposium on Discrete algorithms, (48-57)
  604. Krishnan P and Vitter J Optimal prediction for prefetching in the worst case Proceedings of the fifth annual ACM-SIAM symposium on Discrete algorithms, (392-401)
  605. ACM
    Schulman L Deterministic coding for interactive communication Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing, (747-756)
  606. Al-Dhahir N and Cioffi J Optimal transmit filters for packet-based data transmission on dispersive channels with application to the FIR MMSE-DFE Proceedings of the 1993 IEEE international conference on Acoustics, speech, and signal processing: digital speech processing - Volume III, (1-4)
  607. Brown P, deSouza P, Mercer R, Pietra V and Lai J (1992). Class-based n-gram models of natural language, Computational Linguistics, 18:4, (467-479), Online publication date: 1-Dec-1992.
  608. ACM
    Schulman L Sample spaces uniform on neighborhoods Proceedings of the twenty-fourth annual ACM symposium on Theory of Computing, (17-25)
  609. Frankel Y and Desmedt Y Classification of ideal homomorphic threshold schemes over finite Abelian groups Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques, (25-34)
  610. Gray J (1992). Toward a Mathematical Foundation for Information Flow Security, Journal of Computer Security, 1:3-4, (255-294), Online publication date: 1-May-1992.
  611. ACM
    Dholakia A, Lee T, Bitzer D, Vouk M, Wang L and Franzon P An efficient table-driven decoder for one-half rate convolutional codes Proceedings of the 30th annual ACM Southeast Regional Conference, (116-123)
  612. Szpankowski W (1991). On the height of digital trees and related problems, Algorithmica, 6:1-6, (256-277), Online publication date: 1-Jun-1991.
  613. ACM
    Maurer U Perfect cryptographic security from partially independent channels Proceedings of the twenty-third annual ACM symposium on Theory of Computing, (561-571)
  614. Tsai C, Gligor V and Shandersekaran C (1990). On the Identification of Covert Storage Channels in Secure Systems, IEEE Transactions on Software Engineering, 16:6, (569-580), Online publication date: 1-Jun-1990.
  615. Chen F and Shrager J Automatic discovery of contextual factors describing phonological variation Proceedings of the workshop on Speech and Natural Language, (284-289)
  616. Wallmeier H (1988). Games with informants, International Journal of Game Theory, 17:4, (245-278), Online publication date: 1-Dec-1988.
  617. Brown P, Cocke J, Pietra S, Pietra V, Jelinek F, Mercer R and Roossin P A statistical approach to language translation Proceedings of the 12th conference on Computational linguistics - Volume 1, (71-76)
  618. ACM
    Jones D (1988). Application of splay trees to data compression, Communications of the ACM, 31:8, (996-1007), Online publication date: 1-Aug-1988.
  619. Brown P, Cocks J, Pietra S, Pietra V, Jelinek F, Mercer R and Roossin P A statistical approach to french / english translation User-Oriented Content-Based Text and Image Handling, (810-828)
  620. Linsker R An application of the principle of maximum information preservation to linear systems Proceedings of the 2nd International Conference on Neural Information Processing Systems, (186-194)
  621. Ben-Tal A and Teboulle M (1988). Extension of some results for channel capacity using a generalized information measure, Applied Mathematics and Optimization, 17:1, (121-132), Online publication date: 1-Jan-1988.
  622. ACM
    Faloutsos C and Christodoulakis S (1987). Optimal signature extraction and information loss, ACM Transactions on Database Systems, 12:3, (395-428), Online publication date: 1-Sep-1987.
  623. Abu-Mostafa Y (1987). On the Time-Bandwidth Proof in VLSI Complexity, IEEE Transactions on Computers, 36:2, (239-240), Online publication date: 1-Feb-1987.
  624. Oikonomou K (1987). Abstractions of Finite-State Machines Optimal with Respect to Single Undetectable Output Faults, IEEE Transactions on Computers, 36:2, (185-200), Online publication date: 1-Feb-1987.
  625. Hammerstrom D The connectivity analysis of simple association Proceedings of the 1st International Conference on Neural Information Processing Systems, (338-347)
  626. ACM
    Vazirani U Efficiency considerations in using semi-random sources Proceedings of the nineteenth annual ACM symposium on Theory of computing, (160-168)
  627. ACM
    Bentley J, Sleator D, Tarjan R and Wei V (1986). A locally adaptive data compression scheme, Communications of the ACM, 29:4, (320-330), Online publication date: 1-Apr-1986.
  628. ACM
    Dolev D, Maier D, Mairson I and Ullman J Correcting faults in write-once memory Proceedings of the sixteenth annual ACM symposium on Theory of computing, (225-229)
  629. Yeh C, Reed I and Truong T (1984). Systolic Multipliers for Finite Fields GF(2m), IEEE Transactions on Computers, 33:4, (357-360), Online publication date: 1-Apr-1984.
  630. Kuang Yung Liu (1984). Architecture for VLSI Design of Reed-Solomon Decoders, IEEE Transactions on Computers, 33:2, (178-189), Online publication date: 1-Feb-1984.
  631. ACM
    Rivest R and Shamir A How to reuse a "write - once " memory (Preliminary Version) Proceedings of the fourteenth annual ACM symposium on Theory of computing, (105-113)
  632. Varshney P, Hartmann C and De Faria J (1982). Application of Information Theory to Sequential Fault Diagnosis, IEEE Transactions on Computers, 31:2, (164-170), Online publication date: 1-Feb-1982.
  633. Parker, Jr. D (1980). Conditions for Optimality of the Huffman Algorithm, SIAM Journal on Computing, 9:3, (470-489), Online publication date: 1-Aug-1980.
  634. ACM
    Brown D Kraft storage and access for list implementations(Extended Abstract) Proceedings of the twelfth annual ACM symposium on Theory of computing, (100-107)
  635. ACM
    Swamy S and Savage J Space-time tradeoffs for linear recursion Proceedings of the 6th ACM SIGACT-SIGPLAN symposium on Principles of programming languages, (135-142)
  636. ACM
    Carter L, Floyd R, Gill J, Markowsky G and Wegman M Exact and approximate membership testers Proceedings of the tenth annual ACM symposium on Theory of computing, (59-65)
  637. Gill J (1977). Computational Complexity of Probabilistic Turing Machines, SIAM Journal on Computing, 6:4, (675-695), Online publication date: 1-Dec-1977.
  638. Sharma B and Autar R (1973). An Inversion Theorem and Generalized Entropies for Continuous Distributions, SIAM Journal on Applied Mathematics, 25:2, (125-132), Online publication date: 1-Sep-1973.
  639. ACM
    Reed I Information theory and privacy in data banks Proceedings of the June 4-8, 1973, national computer conference and exposition, (581-587)
  640. ACM
    Gates H and Blizard R Coding/decoding for data compression and error control on data links using digital computers Proceedings of the November 17-19, 1970, fall joint computer conference, (503-514)
  641. Donaldson R and Toussaint G (1970). Use of Contextual Constraints in Recognition of Contour-Traced Handprinted Characters, IEEE Transactions on Computers, 19:11, (1096-1099), Online publication date: 1-Nov-1970.
  642. Sezer A and Gezici S Optimal channel switching for average capacity maximization in the presence of switching delays 2016 IEEE Wireless Communications and Networking Conference, (1-6)
  643. Rezagah F, Jalali S, Erkip E and Poor H Using compression codes in compressed sensing 2016 IEEE Information Theory Workshop (ITW), (444-448)
  644. Sakai Y and Iwata K A generalized erasure channel in the sense of polarization for binary erasure channels 2016 IEEE Information Theory Workshop (ITW), (399-403)
  645. Leinonen M, Codreanu M, Juntti M and Kramer G Rate-distortion lower bound for compressed sensing via conditional remote source coding 2016 IEEE Information Theory Workshop (ITW), (275-279)
  646. Haim E and Kochman Y Binary distributed hypothesis testing via Körner-Marton coding 2016 IEEE Information Theory Workshop (ITW), (146-150)
  647. Li W, Bassi F and Kieffer M Sparse random linear network coding for data compression in WSNs 2016 IEEE International Symposium on Information Theory (ISIT), (2729-2733)
  648. Yang W, Collins A, Durisi G, Polyanskiy Y and Poor H A beta-beta achievability bound with applications 2016 IEEE International Symposium on Information Theory (ISIT), (2669-2673)
  649. Merhav N The generalized stochastic likelihood decoder: Random coding and expurgated bounds 2016 IEEE International Symposium on Information Theory (ISIT), (2659-2663)
  650. Khina A, Halbawi W and Hassibi B (Almost) practical tree codes 2016 IEEE International Symposium on Information Theory (ISIT), (2404-2408)
  651. Rose C State estimation, wireless tropes, demons and uncertainty 2016 IEEE International Symposium on Information Theory (ISIT), (2389-2393)
  652. Rezagah F, Jalali S, Erkip E and Poor H Rate-distortion dimension of stochastic processes 2016 IEEE International Symposium on Information Theory (ISIT), (2079-2083)
  653. Kavčić A, Kavcic A and Han G On the capacity of multilevel NAND flash memory channels 2016 IEEE International Symposium on Information Theory (ISIT), (1869-1873)
  654. Chung H, Zheng L, Sadler B and Hero A Unequal error protection coding approaches to the noisy 20 questions problem 2016 IEEE International Symposium on Information Theory (ISIT), (1700-1704)
  655. Sakai Y and Iwata K Relations between conditional Shannon entropy and expectation of ℓα-norm 2016 IEEE International Symposium on Information Theory (ISIT), (1641-1645)
  656. Cohen A, Cohen A and Gurewitz O Secure Group Testing 2016 IEEE International Symposium on Information Theory (ISIT), (1391-1395)
  657. Burnashev M and Yamamoto H On optimal transmission strategies for channels with noiseless feedback 2016 IEEE International Symposium on Information Theory (ISIT), (1282-1286)
  658. Merhav N Universal decoding for source-channel coding with side information 2016 IEEE International Symposium on Information Theory (ISIT), (1093-1097)
  659. Xu R, Chen J, Weissman T and Zhang J When is noisy state information at the encoder as useless as no information or as good as noise-free state? 2016 IEEE International Symposium on Information Theory (ISIT), (890-894)
  660. Stavrou P, Charalambous C and Kourtellaris C Sequential Necessary and Sufficient Conditions for optimal channel input distributions of channels with memory and feedback 2016 IEEE International Symposium on Information Theory (ISIT), (300-304)
  661. Şaşoğlu E and Tal I Polar coding for processes with memory 2016 IEEE International Symposium on Information Theory (ISIT), (225-229)
  662. Raginsky M Channel polarization and Blackwell measures 2016 IEEE International Symposium on Information Theory (ISIT), (56-60)
  663. Letzepis N Total Variation Distance and Improved Random Coding Union Bounds 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
  664. Awan H, Adve R, Wallbridge N, Plummer C and Eckford A Characterizing Communication Properties of Mechanosensitive Signals 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
  665. Borras J and Vazquez G Interference Mitigation under Degrees-of-Freedom Sensing Uncertainties in Opportunistic Transmission 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
  666. Cao W, Dytso A, Fauss M, Feng G and Poor H Robust Waterfilling for Approximately Gaussian Inputs 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
  667. Makur A and Zheng L Bounds between contraction coefficients 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1422-1429)
  668. Altuğ Y, Poor H and Verdú S Variable-length channel codes with probabilistic delay guarantees 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (642-649)
  669. Wyner A (1969). On Cading and Information Theory, SIAM Review, 11:3, (317-346), Online publication date: 1-Jul-1969.
Contributors
  • Massachusetts Institute of Technology

Recommendations