


default search action
Information Theory and Applications 2010: San Diego, CA, USA
- Information Theory and Applications Workshop, ITA 2010, San Diego, California, USA, January 31 - February 5, 2010. IEEE 2010, ISBN 978-1-4244-7014-3

- Emmanuel Abbe, Emre Telatar:

MAC polar codes and matroids. 8-15 - Li Zhang, Qin Huang, Shu Lin, Khaled A. S. Abdel-Ghaffar, Ian F. Blake:

Quasi-cyclic LDPC codes on Latin squares and the ranks of their parity-check matrices. 16-22 - Jung Hyun Bae, Achilleas Anastasopoulos:

The capacity of Markov channels with noiseless output and state feedback. 23-27 - Hong Ju Park, Boyu Li, Ender Ayanoglu:

Multiple beamforming with constellation precoding: Diversity analysis and Sphere Decoding. 28-38 - Maricica Nistor, João Barros

, Fausto Vieira
, Tiago T. V. Vinhoza
, Joerg Widmer
:
Network coding delay: A brute-force analysis. 39-43 - Hong Wan, Rong-Rong Chen, Jun Won Choi, Andrew C. Singer

, James C. Preisig
, Behrouz Farhang-Boroujeny
:
Markov Chain Monte Carlo detection for underwater acoustic channels. 44-48 - Yeo Hun Yun, Joon Ho Cho:

On sum capacity of continuous-time overloaded CDMA systems. 49-58 - Jun Won Choi, Byonghyo Shim

, Andrew C. Singer
:
On the improved path metric for soft-input soft-output tree detection. 59-63 - Si-Hyeon Lee

, Sae-Young Chung:
When is compress-and-forward optimal? 64-66 - Michael Lentmaier, David G. M. Mitchell, Gerhard P. Fettweis, Daniel J. Costello Jr.:

Asymptotically regular LDPC codes with linear distance growth and thresholds close to capacity. 67-74 - Matthew Ager, Zoran Cvetkovic, Peter Sollich:

High-dimensional linear representations for robust speech recognition. 75-79 - Kevin Swersky, Bo Chen, Benjamin M. Marlin

, Nando de Freitas:
A tutorial on stochastic approximation algorithms for training Restricted Boltzmann Machines and Deep Belief Nets. 80-89 - Dominique Tschopp, Suhas N. Diggavi:

Facebrowsing: Search and navigation through comparisons. 90-99 - Shadi Abu-Surra, Dariush Divsalar, William E. Ryan:

On the existence of typical minimum distance for protograph-based LDPC codes. 100-106 - Lara Dolecek:

On absorbing sets of structured sparse graph codes. 107-111 - Michelle Effros:

On capacity outer bounds for a simple family of wireless networks. 112-118 - Michele Franceschini, Luis Alfonso Lastras-Montaño, John P. Karidis, Ashish Jagmohan:

Information theory based design of phase-change memories. 119-125 - Randa Zakhour, David Gesbert

:
Team decision for the cooperative MIMO channel with imperfect CSIT sharing. 126-131 - Jerry D. Gibson, Jing Hu, Pravin Ramadas:

New rate distortion bounds for speech coding based on composite source models. 132-136 - Alexandre Graell i Amat

, Ingmar Land
:
An analytical expression of the probability of error for relaying with decode-and-forward. 137-141 - Aman Jain, Deniz Gündüz

, Sanjeev R. Kulkarni, H. Vincent Poor, Sergio Verdú:
Energy-distortion tradeoff with multiple sources and feedback. 142-146 - Riccardo Giacomelli, Radha Krishna Ganti

, Martin Haenggi
:
Asymptotic outage analysis of general motion-invariant Ad Hoc Networks. 147-152 - Thomas R. Halford, Keith M. Chugg:

Barrage Relay Networks. 153-160 - Te Sun Han:

Polymatroids with network coding. 161-172 - Takao Inoue, Robert W. Heath Jr.

:
Grassmannian predictive frequency domain compression for limited feedback beamforming. 173-177 - Tor Helleseth, Alexander Kholosha:

On generalized bent functions. 178-183 - Sukwon Kim, Tracey Ho, Michelle Effros, Amir Salman Avestimehr:

New results on network error correction: Capacities and upper bounds. 184-193 - Bertrand M. Hochwald, Louay M. A. Jalloul:

Statistical distributions that arise in constrained beamforming with incomplete channel information. 194-203 - Libin Jiang, Jian Ni, R. Srikant, Jean C. Walrand:

Performance bounds of distributed CSMA scheduling. 204-209 - Irina E. Bocharova, Florian Hug, Rolf Johannesson, Boris D. Kudryashov:

On weight enumerators and MacWilliams identity for convolutional codes. 210-215 - Ashish Khisti:

On the MISO compound wiretap channel. 216-222 - Tao Cui, Tracey Ho, Jörg Kliewer:

Achievable strategies for general secure network coding. 223-228 - Onur Ozan Koyluoglu, Can Emre Koksal, Hesham El Gamal:

On secrecy capacity scaling in wireless networks. 229-232 - Changmian Wang, Bhaskar Krishnamachari, Qing Zhao, Geir E. Øien:

Performance of round robin policies for dynamic multichannel access. 233-239 - K. V. Rashmi, Nihar B. Shah, P. Vijay Kumar, Kannan Ramchandran:

Explicit and optimal codes for distributed storage. 240-244 - L. A. Lastras-Montao, Thomas Mittelholzer, Michele Franceschini:

Superposition coding in rewritable channels. 245-253 - Jin-Woo Lee, Hee-Nam Cho, Han-Jun Park, Yong-Hwan Lee:

Sum-rate capacity of correlated multi-user MIMO channels. 254-258 - Ayfer Özgür

, Olivier Lévêque, David Tse:
Linear capacity scaling in wireless networks: Beyond physical limits? 259-268 - Li Zhang, Qin Huang, Shu Lin:

Iterative decoding of a class of cyclic codes. 269-277 - Quanquan Liang, Mingyan Liu, Dongfeng Yuan:

Channel estimation for opportunistic spectrum sensing: Uniform and random sensing. 278-287 - Lukas Bolliger, Hans-Andrea Loeliger, Christian Vogel

:
Simulation, MMSE estimation, and interpolation of sampled continuous-time signals using factor graphs. 288-291 - Mahdi Lotfinezhad, Peter Marbach:

Delay performance of CSMA policies in multihop wireless networks: A new perspective. 292-299 - Eric Torkildson, Hong Zhang, Upamanyu Madhow:

Channel modeling for millimeter wave MIMO. 300-307 - Marco Martalò

, Gianluigi Ferrari
, Andrea Abrardo, Michele Franceschini, Riccardo Raheli
:
Density evolution-based analysis and design of LDPC codes with a priori information. 308-316 - Fang Zhao, Muriel Médard:

On analyzing and improving COPE performance. 317-322 - Hon Fah Chong, Mehul Motani

, Nan Feng:
Transmitter optimization for distributed Gaussian MIMO channels. 323-328 - Pierre Moulin:

Statistical modeling and analysis of content identification. 329-333 - Varun S. Jog, Chandra Nair:

An information inequality for the BSSC broadcast channel. 334-341 - Behrouz Touri, Angelia Nedic

, Sundhar Srinivasan Ram:
Asynchronous stochastic convex optimization over random networks: Error bounds. 342-351 - Michael J. Neely:

Stochastic network optimization with non-convex utilities and costs. 352-361 - Sirin Nitinawarat, Prakash Narayan:

Perfect omniscience, perfect secrecy and Steiner tree packing. 362-366 - Eduardo I. Silva, Milan S. Derpich

, Jan Østergaard
:
Independent source coding for control over noiseless channels. 367-368 - Po-Hsiang Lai, Joseph A. O'Sullivan

:
MDL hierarchical clustering with incomplete data. 369-373 - Yue Zhao, Gregory J. Pottie:

Optimization of power and channel allocation using the deterministic channel model. 374-381 - Mathieu Feuillet, Alexandre Proutière, Philippe Robert:

Random capture algorithms fluid limits and stability. 382-385 - Giuseppe Caire, Sean A. Ramprashad, Haralabos C. Papadopoulos:

Rethinking network MIMO: Cost of CSIT, performance analysis, and architecture comparisons. 386-395 - Shadi Abu-Surra, David Declercq, Dariush Divsalar, William E. Ryan:

Trapping set enumerators for specific LDPC codes. 396-400 - Lalitha Sankar, S. Raj Rajagopalan, H. Vincent Poor:

Utility and privacy of data sources: Can Shannon help conceal and reveal information? 401-407 - M. H. R. Khouzani, Saswati Sarkar:

Dynamic malware attack in energy-constrained mobile wireless networks. 408-418 - Mehmet Ercan Yildiz, Roberto Pagliari, Asuman E. Ozdaglar, Anna Scaglione

:
Voting models in random networks. 419-425 - Itzhak Tamo, Moshe Schwartz

:
Correcting limited-magnitude errors in the rank-modulation scheme. 426-427 - Tsung-Yi Chen, Nambi Seshadri, Ba-Zhong Shen:

Is feedback a performance equalizer of classic and modern codes? 428-432 - Lei Ying, R. Srikant, Srinivas Shakkottai:

The asymptotic behavior of minimum buffer size requirements in large P2P streaming networks. 433-438 - Wenyi Zhang, Ahmed K. Sadek

, Cong Shen, Stephen J. Shellhammer:
Adaptive spectrum sensing. 439-445 - Noam Shental, Amnon Amir, Or Zuk:

Compressed sensing-based pooling experiments using next generation sequencing. 446-447 - Andrew C. Singer

, Andrew J. Bean, Jun Won Choi:
Mutual information and time-interleaved analog-to-digital conversion. 448-452 - Francesco Negro, Shakti Prasad Shenoy, Irfan Ghauri

, Dirk T. M. Slock
:
On the MIMO interference channel. 453-461 - Goran Ivkovic, Predrag Spasojevic

, Ivan Seskar:
Single sensor radio scene analysis for packet based radio signals. 462-471 - Shiyao Chen, Lang Tong:

Multiuser cognitive access of continuous time Markov channels: Maximum throughput and effective bandwidth regions. 472-481 - Sudarshan Vasudevan, Stephan Adams, Dennis Goeckel, Zhiguo Ding, Donald F. Towsley

, Kin K. Leung:
Multi-user diversity for secrecy in wireless networks. 482-490 - Dmitri V. Truhachev:

Multi-stream information transmission over K-user interference networks. 491-499 - Daniela Tuninetti

:
An outer bound region for Interference Channels with Generalized Feedback. 500-504 - Omur Ozel, Elif Uysal-Biyikoglu

, Tolga Girici:
Optimal buffer partitioning on a multiuser wireless link. 505-514 - Shiva Kumar Planjery, Shashi Kiran Chilappagari, Bane Vasic, David Declercq, Ludovic Danjean:

Iterative decoding beyond belief propagation. 515-524 - Pascal O. Vontobel

:
A factor-graph-based random walk, and its relevance for LP decoding analysis and Bethe entropy characterization. 525-534 - Thomas A. Courtade, Richard D. Wesel:

A deterministic approach to rate-compatible fountain communication. 535-539 - Yang Yang, Yifu Zhang, Zixiang Xiong:

A new sufficient condition for sum-rate tightness of quadratic Gaussian MT source coding. 540-544 - En-Hui Yang, Jin Meng:

On interactive encoding and decoding for distributed lossless coding of individual sequences. 545-551 - Peyman Razaghi, Wei Yu:

Universal relaying for the interference channel. 552-557 - Xinmiao Zhang, Jiangli Zhu:

Hardware complexities of algebraic soft-decision Reed-Solomon decoders and comparisons. 558-567 - Keqin Liu, Qing Zhao:

Decentralized multi-armed bandit with multiple distributed players. 568-577

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














