IEEE International Symposium on Information Theory proceedings (ISIT), 2012 : 1 - 6 July 2012, Cambridge, Massachusetts, USA (Englisch)

ISIT; 2012; Cambridge, Mass.
IEEE , Piscataway, NJ; 2012
  • Neue Suche nach: IEEE
Wie erhalte ich diesen Titel?

Dokumentinformationen

  • Titel:
    IEEE International Symposium on Information Theory proceedings (ISIT), 2012 : 1 - 6 July 2012, Cambridge, Massachusetts, USA
  • Kongress:
    ISIT; 2012; Cambridge, Mass.
    IEEE International Symposium on Information Theory; 2012; Cambridge, Mass.
  • Verlag:
    IEEE
  • Erscheinungsort:
    Piscataway, NJ
  • Erscheinungsjahr:
    2012
  • Format / Umfang:
    Online-Ressource
  • Anmerkungen:
    Parallel als Druckausg. erschienen
  • ISBN:
  • Medientyp:
    Konferenzband
  • Format:
    Elektronische Ressource
  • Sprache:
    Englisch
  • Klassifikation:
    BKL:    54.10 Theoretische Informatik / 53.71 Theoretische Nachrichtentechnik

Inhaltsverzeichnis Konferenzband

Das Inhaltsverzeichnis des Konferenzbandes wird automatisch erzeugt, daher kann es lückenhaft sein, obwohl alle Artikel in der TIB verfügbar sind.

1
Technical program committee
| 2012
1
Committees
| 2012
1
Program
| 2012
1
2012 IEEE International Symposium on Information Theory Proceedings [copyright notice]
| 2012
1
Data processing lower bounds for scalar lossy source codes with side information at the decoder
Reani, Avraham / Merhav, Neri | 2012
6
Graph-based code design for quadratic-Gaussian Wyner-Ziv problem with arbitrary side information
Wei, Yi-Peng / Lin, Shih-Chun / Lin, Yu-Hsiu / Su, Hsuan-Jung | 2012
11
Source coding with delayed side information
Simeone, Osvaldo / Permuter, Haim H. | 2012
16
A compression algorithm using mis-aligned side-information
Ma, Nan / Ramchandran, Kannan / Tse, David | 2012
21
Construction of MIMO MAC codes achieving the pigeon hole bound
Ernvall, Toni / Vehkalahti, Roope | 2012
26
On the sum-capacity of Gaussian MAC with peak constraint
Mamandipoor, Babak / Moshksar, Kamyar / Khandani, Amir K. | 2012
31
Expurgation for discrete multiple-access channels via linear codes
Haim, Eli / Kochman, Yuval / Erez, Uri | 2012
36
Simpler achievable rate regions for multiaccess with finite blocklength
Jazi, Ebrahim Molavian / Laneman, J. Nicholas | 2012
41
On two unicast wireless networks with destination-to-source feedback
Wang, I-Hsiang | 2012
46
On degrees of freedom of layered two unicast networks with delayed CSIT
Wang, I-Hsiang / Diggavi, Suhas | 2012
51
On the sum secure degrees of freedom of two-unicast layered wireless networks
Xie, Jianwei / Ulukus, Sennur | 2012
51
Sum Secure Degrees of Freedom of Two-Unicast Layered Wireless Networks
Xie, J. / Ulukus, S. / Institute of Electrical and Electronics Engineers
56
Approximate ergodic capacity of a class of fading 2-user 2-hop networks
Jeon, Sang-Woon / Wang, Chien-Yi / Gastpar, Michael | 2012
61
Broadcast channels with confidential messages by randomness constrained stochastic encoder
Watanabe, Shun / Oohama, Yasutada | 2012
66
Secrecy is cheap if the adversary must reconstruct
Schieler, Curt / Cuff, Paul | 2012
71
Imperfect secrecy in wiretap channel II
Cheng, Fan / Yeung, Raymond W. / Shum, Kenneth W. | 2012
76
Strong secrecy in compound broadcast channels with confidential messages
Wyrembelski, Rafael F. / Boche, Holger | 2012
81
Burst list decoding of interleaved Reed-Solomon codes
Kolan, Tom / Roth, Ron M. | 2012
86
List decoding algorithms based on Gröbner bases for general one-point AG codes
Geil, Olav / Matsumoto, Ryutaroh / Ruano, Diego | 2012
86
List Decoding Algorithms based on Grobner Bases for General One-Point AG Codes
Geil, O. / Matsumoto, R. / Ruano, D. / Institute of Electrical and Electronics Engineers
91
An algorithm for list decoding number field codes
Biasse, Jean-Francois / Quintin, Guillaume | 2012
96
A lifting decoding scheme and its application to interleaved linear codes
Quintin, Guillaume | 2012
101
Translation association schemes, poset metrics, and the shape enumerator of codes
Barg, Alexander / Firer, Marcelo | 2012
106
On the uncertainty of information retrieval in associative memories
Yaakobi, Eitan / Bruck, Jehoshua | 2012
111
On q-ary antipodal matchings and applications
Ordentlich, Erik / Roth, Ron M. / Seroussi, Gadiel | 2012
116
Optimal family of q-ary codes obtained from a substructure of generalised Hadamard matrices
Bracken, Carl / Chee, Yeow Meng / Purkayastha, Punarbasu | 2012
120
High-rate sparse superposition codes with iteratively optimal estimates
Barron, Andrew R. / Cho, Sanghee | 2012
125
The capacity of the multi-MMSE constrained Gaussian channel
Bustin, Ronit | 2012
130
Expurgated infinite constellations at finite dimensions
Ingber, Amir / Zamir, Ram | 2012
135
The capacity loss of dense constellations
Koch, Tobias / Martinez, Alfonso / i Fabregas, Albert Guillen | 2012
140
On optimum strategies for minimizing the exponential moments of a loss function
Merhav, Neri | 2012
145
On the equivalence between Stein identity and de Bruijn identity
Park, Sangwoo / Serpedin, Erchin / Qaraqe, Khalid | 2012
150
Minimization of entropy functionals revisited
Csiszar, Imre / Matus, Frantisek | 2012
155
Shannon entropy convergence results in the countable infinite case
Silva, Jorge F. / Parada, Patricio A. | 2012
160
Sphere packing bound for quantum channels
Dalai, Marco | 2012
165
Stabilizer codes over Frobenius rings
Nadella, Sushma / Klappenecker, Andreas | 2012
170
Nice nearrings
Klappenecker, Andreas | 2012
174
A general formula of rate-distortion functions for source coding with side information at many decoders
Matsuta, Tetsunao / Uyematsu, Tomohiko | 2012
179
On the Heegard-Berger problem with common reconstruction constraints
Ahmadi, Behzad / Tandon, Ravi / Simeone, Osvaldo / Poor, H. Vincent | 2012
184
Distributed and cascade lossy source coding with a side information "vending machine"
Ahmadi, Behzad / Simeone, Osvaldo | 2012
189
Information masking and amplification: The source coding setting
Courtade, Thomas A. | 2012
194
Multiple description coding based compress-and-forward for the broadcast relay channel
Yildirim, Seckin Anil / Yuksel, Melda | 2012
199
Broadcast correlated Gaussians: The vector-scalar case
Song, Lin / Chen, Jun / Tian, Chao | 2012
204
Quadratic Gaussian source broadcast with individual bandwidth mismatches
Tan, Louis / Khisti, Ashish / Soljanin, Emina | 2012
209
The broadcast approach under mixed delay constraints
Cohen, Kfir M. / Steiner, Avi | 2012
214
Is Gaussian noise the worst-case additive noise in wireless networks?
Shomorony, Ilan / Avestimehr, A. Salman | 2012
219
Optimized flow allocation for anonymous communication in multipath wireless networks
Yang, Chouchang / Alomair, Basel / Poovendran, Radha | 2012
224
Can geographic routing scale when nodes are mobile?
Ramasamy, Dinesh / Madhow, Upamanyu | 2012
229
An asymptotically optimal push-pull method for multicasting over a random network
Swamy, Vasuki Narasimha / Sundaresan, Rajesh / Viswanath, Pramod | 2012
234
Broadcasting over fading wiretap channels
Liang, Yingbin / Lai, Lifeng / Poor, H. Vincent | 2012
239
On the ergodic secret message capacity of the wiretap channel with finite-rate feedback
Rezki, Zouheir / Khisti, Ashish / Alouini, Mohamed-Slim | 2012
244
Capacity region of non-degraded wiretap channel with noiseless feedback
Dai, Bin / Vinck, A. J. Han / Luo, Yuan / Zhuang, Zhuojun | 2012
249
An achievable region for the Wiretap multiple-access channel with common message
Wiese, Moritz / Boche, Holger | 2012
254
Projected subcodes of the second order binary Reed-Muller code
Legeay, Matthieu / Loidreau, Pierre | 2012
259
Spherically punctured biorthogonal codes
Dumer, Ilya / Kapralova, Olga | 2012
264
Multiplicative secret sharing schemes from Reed-Muller type codes
Duursma, Iwan / Shen, Jiashun | 2012
269
Partial permutation decoding for abelian codes
Bernal-Buitrago, Jose Joaquin / Simon, Juan Jacobo | 2012
274
On embedding conditions of shifts of finite type into the Fibonacci-Dyck shift
Fujisaki, Hiroshi | 2012
279
Approximately counting the number of constrained arrays via the sum-product algorithm
Parvaresh, Farzad / Vontobel, Pascal O. | 2012
284
On codes for structured bursts
Lastras-Montano, L. A. / Blaum, M. | 2012
289
Erasure coding for real-time streaming
Leong, Derek / Ho, Tracey | 2012
294
On the capacity of additive white alpha-stable noise channels
Fahs, Jihad / Abou-Faycal, Ibrahim | 2012
299
Bounds on the capacity of the additive inverse Gaussian noise channel
Chang, Hui-Ting / Moser, Stefan M. | 2012
304
Achievable rates of Gaussian channels with realistic duty cycle and power constraints
Li, Hui / Guo, Dongning | 2012
309
An efficient algorithm to calculate BICM capacity
Bocherer, Georg / Altenbach, Fabian / Alvarado, Alex / Corroy, Steven / Mathar, Rudolf | 2012
314
Quantization effect on second moment of log-likelihood ratio and its application to decentralized sequential detection
Wang, Yan / Mei, Yajun | 2012
319
The sufficiency principle for decentralized data reduction
Xu, Ge / Chen, Biao | 2012
324
Nonparametric decentralized detection based on weighted count kernel
Hu, Jiayao / Liang, Yingbin / Xing, Eric P. | 2012
329
Distributed estimation in multi-agent networks
Sankar, Lalitha / Poor, H. Vincent | 2012
334
Quantum polar codes for arbitrary channels
Wilde, Mark M. / Renes, Joseph M. | 2012
339
A construction of quantum codes via a class of classical polynomial codes
Jin, Lingfei / Xing, Chaoping | 2012
343
Quantum LDPC codes obtained by non-binary constructions
Andriyanova, Iryna / Maurice, Denise / Tillich, Jean-Pierre | 2012
348
Improved quantum hypergraph-product LDPC codes
Kovalev, Alexey A. / Pryadko, Leonid P. | 2012
353
On real-time and causal secure source coding
Kaspi, Yonatan / Merhav, Neri | 2012
358
Rate-distortion behavior at low distortion for densely sampled Gaussian data
Neuhoff, David L. / Pradhan, S. Sandeep | 2012
363
Pointwise lossy source coding theorem for sources with memory
Oguz, Barlas / Anantharam, Venkat | 2012
368
Gaussian rate-distortion via sparse linear regression over compact dictionaries
Venkataramanan, Ramji / Joseph, Antony / Tatikonda, Sekhar | 2012
373
Lossy source coding via spatially coupled LDGM ensembles
Aref, Vahid / Macris, Nicolas / Urbanke, Rudiger / Vuffray, Marc | 2012
378
On three-receiver more capable channels
Nair, Chandra / Xia, Lingxiao | 2012
383
The capacity region of some classes of parallel degraded broadcast channels with three receivers and three-degraded message sets
Chong, Hon Fah / Liang, Ying-Chang | 2012
388
Broadcast capacity regions with three receivers and message cognition
Oechtering, Tobias J. / Wigger, Michele / Timo, Roy | 2012
393
Three-receiver broadcast channels with side information
Hajizadeh, Saeed / Hodtani, Ghosheh Abed | 2012
398
Is non-unique decoding necessary?
Bidokhti, Shirin Saeedi / Prabhakaran, Vinod M. / Diggavi, Suhas. N. | 2012
403
Blind compute-and-forward
Feng, Chen / Silva, Danilo / Kschischang, Frank R. | 2012
408
Rateless coded hybrid amplify/decode-forward cooperation for wireless multicast
Khan, Talha Ahmed / Uppal, Momin / Host-Madsen, Anders / Xiong, Zixiang | 2012
413
Dynamic QMF for half-duplex relay networks
Ozgur, Ayfer / Diggavi, Suhas | 2012
418
Joint optimization of the transmit covariance and the relay precoder in general Gaussian amplify-and-forward relay channels
Gohary, Ramy H. / Yanikomeroglu, Halim | 2012
423
Layered quantize-forward for the two-way relay channel
Do, Hieu T. / Oechtering, Tobias J. / Skoglund, Mikael | 2012
428
Broadcasting private messages securely
Czap, Laszlo / Prabhakaran, Vinod M. / Diggavi, Suhas / Fragouli, Christina | 2012
433
On private broadcasting over independent parallel channels
Khisti, Ashish / Liu, Tie | 2012
438
Degraded broadcast channel with noncausal side information, confidential messages and noiseless feedback
Dai, Bin / Hong, Jiehua / Vinck, A. J. Han / Luo, Yuan / Zhuang, Zhuojun | 2012
443
On optimal signaling over secure MIMO channels
Loyka, Sergey / Charalambous, Charalambos D. | 2012
448
Square root law for communication with low probability of detection on AWGN channels
Bash, Boulat A. / Goeckel, Dennis / Towsley, Don | 2012
453
Spatially coupled ensembles universally achieve capacity under belief propagation
Kudekar, Shrinivas / Richardson, Tom / Urbanke, Rudiger | 2012
458
How to prove the Maxwell conjecture via spatial coupling — A proof of concept
Giurgiu, Andrei / Macris, Nicolas / Urbanke, Rudiger | 2012
463
Spatially-coupled binary MacKay-Neal codes for channels with non-binary inputs and affine subspace outputs
Kasai, Kenta / Nozaki, Takayuki / Sakaniwa, Kohichi | 2012
468
Improving spatially coupled LDPC codes by connecting chains
Truhachev, Dmitri / Mitchell, David G. M. / Lentmaier, Michael / Costello, Daniel J. | 2012
473
Distance spectrum estimation of LDPC convolutional codes
Zhou, Hua / Mitchell, David G. M. / Goertz, Norbert / Costello, Daniel J. | 2012
478
Spatially-coupled random access on graphs
Liva, Gianluigi / Paolini, Enrico / Lentmaier, Michael / Chiani, Marco | 2012
483
Biff (Bloom filter) codes: Fast error correction for large data sets
Mitzenmacher, Michael / Varghese, George | 2012
488
Distributed rateless coding with cooperative sources
Shirvanimoghaddam, Mahyar / Li, Yonghui / Vucetic, Branka | 2012
493
On matching short LDPC codes with spectrally-efficient modulation
Nowak, Stefan / Kays, Ruediger | 2012
498
On the power transfer of error-control codes for RFID communications
Yang, Guang / Rosnes, Eirik / Barbero, Angela I. / Ytrehus, Oyvind | 2012
503
A characterization of the number of subsequences obtained via the deletion channel
Liron, Y. / Langberg, M. | 2012
508
Adaptive synchronization marker for insertion/deletion/substitution error correction
Inoue, Masato / Kaneko, Haruhiko | 2012
513
A coloring approach to constructing deletion correcting codes from constant weight subgraphs
Cullina, Daniel / Kulkarni, Ankur A. / Kiyavash, Negar | 2012
518
Directed information on abstract spaces: Properties and extremum problems
Charalambous, Charalambos D. / Stavrou, Photios A. | 2012
523
Universal estimation of directed information via sequential probability assignments
Jiao, Jiantao / Permuter, Haim H. / Zhao, Lei / Kim, Young-Han / Weissman, Tsachy | 2012
528
Lossy common information of two dependent random variables
Viswanatha, Kumar / Akyol, Emrah / Rose, Kenneth | 2012
533
Information divergence is more χ2-distributed than the χ2-statistics
Harremoes, Peter / Tusnady, Gabor | 2012
533
Information Divergence is more chi square distributed than the chi squared statistics
Harremoes, P. / Tusnady, G. / Institute of Electrical and Electronics Engineers
538
Application of information-type divergences to constructing multiple-priors and variational preferences
Ahmadi-Javid, A. | 2012
541
The ultimate limits of optical communication efficiency with photon-counting receivers
Dolinar, Sam / Erkmen, Baris I. / Moision, Bruce / Birnbaum, Kevin M. / Divsalar, Dariush | 2012
546
Polar coding to achieve the Holevo capacity of a pure-loss optical channel
Guha, Saikat / Wilde, Mark M. | 2012
551
Explicit capacity-achieving receivers for optical communication and quantum reading
Wilde, Mark M. / Guha, Saikat / Tan, Si-Hui / Lloyd, Seth | 2012
556
Quantum M-ary phase shift keying
Nair, Ranjith / Yen, Brent J. / Guha, Saikat / Shapiro, Jeffrey H. / Pirandola, Stefano | 2012
561
On lossless universal compression of distributed identical sources
Beirami, Ahmad / Fekri, Faramarz | 2012
566
Polar coding for the Slepian-Wolf problem based on monotone chain rules
Bilkent, Erdal Arikan | 2012
571
On the vector Gaussian L-terminal CEO problem
Wang, Jia / Chen, Jun | 2012
576
An outer bound for the vector Gaussian CEO problem
Ekrem, Ersen / Ulukus, Sennur | 2012
581
On Marton's inner bound for broadcast channels
Gohari, Amin / Nair, Chandra / Anantharam, Venkat | 2012
586
The capacity region of the two-receiver vector Gaussian broadcast channel with private and common messages
Geng, Yanlin / Nair, Chandra | 2012
591
The state-dependent semideterministic broadcast channel
Lapidoth, Amos / Wang, Ligong | 2012
596
The degraded broadcast channel with action-dependent states
Steinberg, Yossef / Weissman, Tsachy | 2012
601
Percolation in directed random geometric graphs
Dousse, Olivier | 2012
606
Power optimization on a network: The effects of randomness
Moustakas, Aris L. / Bambos, Nicholas | 2012
611
Cooperation versus interference in large wireless relay networks
Altieri, Andres / Vega, Leonardo Rey / Galarza, Cecilia G. / Piantanida, Pablo | 2012
616
Interference and throughput in Aloha-based ad hoc networks with isotropic node distribution
Tanbourgi, Ralph / Jakel, Holger / Chaichenets, Leonid / Jondral, Friedrich K. | 2012
621
Capacity achieving linear codes with random binary sparse generating matrices over the Binary Symmetric Channel
Kakhaki, A. Makhdoumi / Abadi, H. Karkeh / Pad, P. / Saeedi, H. / Marvasti, F. / Alishahi, K. | 2012
626
Nested lattice codes for arbitrary continuous sources and channels
Sahebi, Aria G. / Pradhan, S. Sandeep | 2012
631
Codes over non-Abelian groups: Point-to-point communications and computation over MAC
Sahebi, Aria G. / Pradhan, S. Sandeep | 2012
636
Efficient decoding of permutation codes obtained from distance preserving maps
Chee, Yeow Meng / Purkayastha, Punarbasu | 2012
641
Observability, controllability and local reducibility of linear codes on graphs
Forney, G. David / Gluesing-Luerssen, Heide | 2012
646
Reducing complexity of tail-biting trellises
Gluesing-Luerssen, Heide / Forney, G. David | 2012
651
A graphical revisit of the Krawtchouk transform
Mao, Yongyi / Chan, Terence H. | 2012
656
A factor-graph representation of probabilities in quantum mechanics
Loeliger, Hans-Andrea / Vontobel, Pascal O. | 2012
661
Importance of symbol equity in coded modulation for power line communications
Chee, Yeow Meng / Kiah, Han Mao / Purkayastha, Punarbasu / Wang, Chengmin | 2012
666
Optimal equitable symbol weight codes for power line communications
Chee, Yeow Meng / Kiah, Han Mao / Ling, Alan C. H. / Wang, Chengmin | 2012
671
Codes for locating objects in sensor networks
Junnila, Ville / Laihonen, Tero / Parreau, Aline | 2012
676
New lower bounds for identifying codes in infinite grids
Junnila, Ville / Laihonen, Tero | 2012
681
Improved upper bounds on the capacity of binary channels with causal adversaries
Dey, Bikash Kumar / Jaggi, Sidharth / Langberg, Michael / Sarwate, Anand D. | 2012
686
Finding the capacity of a quantized binary-input DMC
Kurkoski, Brian M. / Yagi, Hideki | 2012
691
On the capacity of binary input symmetric q-ary output channels with synchronization errors
Rahmati, Mojtaba / Duman, Tolga M. | 2012
691
On the Capacity of Binary Input Symmetric q-ary Output Channels with Syncrhonization Errors
Rahmati, M. / Duman, T.M. / Institute of Electrical and Electronics Engineers
696
Mutual information and relative entropy over the Binomial and Negative Binomial channels
Taborda, Camilo G. / Perez-Cruz, Fernando | 2012
701
Pointwise relations between information and estimation in Gaussian noise
Venkat, Kartik / Weissman, Tsachy | 2012
706
Estimation with a helper who knows the interference
Chia, Yeow-Khiang / Soundararajan, Rajiv / Weissman, Tsachy | 2012
711
Rate distortion codes for the collective estimation from independent noisy observations
Murayama, Tatsuto / Davis, Peter | 2012
716
Mismatched MMSE estimation of multivariate Gaussian sources
Esnaola, Inaki / Tulino, Antonia M. / Poor, H. Vincent | 2012
721
Classical codes for quantum broadcast channels
Savov, Ivan / Wilde, Mark M. | 2012
726
Capacities of classical compound quantum wiretap and classical quantum compound wiretap channels
Cai, Minglai / Cai, Ning / Deppe, Christian | 2012
731
Partial decode-forward for quantum relay channels
Savov, Ivan / Wilde, Mark M. / Vu, Mai | 2012
736
Achieving the Han-Kobayashi inner bound for the quantum interference channel
Sen, Pranab | 2012
741
On symmetric L1 distance error control codes and elementary symmetric functions
Tallini, Luca G. / Bose, Bella | 2012
746
On symmetric/asymmetric Lee distance error control codes and elementary symmetric functions
Tallini, Luca G. / Bose, Bella | 2012
751
New constructions of codes for asymmetric channels via concatenation
Grassl, Markus / Shor, Peter / Smith, Graeme / Smolin, John / Zeng, Bei | 2012
756
The effect of zero-rate encoders in the multi-terminal source coding problem
Vellambi, Badri N. | 2012
761
Multiterminal source coding under logarithmic loss
Courtade, Thomas A. / Weissman, Tsachy | 2012
766
On cooperation in multi-terminal computation and rate distortion
Sefidgaran, Milad / Tchamkerten, Aslan | 2012
771
Polynomials and computing functions of correlated sources
Huang, Sheng / Skoglund, Mikael | 2012
776
An upper bound on relaying over capacity
Xue, Feng | 2012
781
Buffer-aided relaying in a three node network
Zlatanov, Nikola / Schober, Robert / Lampe, Lutz | 2012
786
The capacity region of restricted multi-way relay channels with deterministic uplinks
Ong, Lawrence / Johnson, Sarah J. | 2012
791
The finite field multi-way relay channel with correlated sources: Beyond three users
Ong, Lawrence / Timo, Roy / Johnson, Sarah J. | 2012
796
Reliable versus unreliable transmission for energy efficient transmission in relay networks
Host-Madsen, Anders / Jiang, Nan / Yang, Yang / Xiong, Zixiang | 2012
801
Bounds on the minimum energy-per-bit for bursty traffic in diamond networks
Shomorony, Ilan / Etkin, Raul / Parvaresh, Farzad / Avestimehr, A. Salman | 2012
806
Impact of channel and source variations on the energy efficiency under QoS constraints
Ozmen, Mustafa / Gursoy, M. Cenk | 2012
811
Energy efficient greedy link scheduling and power control in wireless networks
Sridharan, Arun / Joo, Changhee / Koksal, C. Emre | 2012
816
Second-order achievable rates in random number generation for mixed sources
Nomura, Ryo / Han, Te Sun | 2012
821
Moderate deviations analysis of binary hypothesis testing
Sason, Igal | 2012
826
The log-volume of optimal constant-composition codes for memoryless channels, within O(1) bits
Moulin, Pierre | 2012
831
Finite blocklength coding for multiple access channels
Huang, Yen-Wei / Moulin, Pierre | 2012
836
Hyper-bent functions via Dillon-like exponents
Mesnager, Sihem / Flori, Jean-Pierre | 2012
841
New classes of generalized boolean bent functions over Z4
Li, Nian / Tang, Xiaohu / Helleseth, Tor | 2012
846
An optimal sampling technique for distinguishing random S-boxes
Stankovski, Paul / Hell, Martin | 2012
851
Cross-recurrence property of m-sequences
Hemmati, Farhad | 2012
855
Channel capacity under general nonuniform sampling
Chen, Yuxin / Eldar, Yonina C. / Goldsmith, Andrea J. | 2012
860
Continuous time channels with interference
Ivan, Ioana / Mitzenmacher, Michael / Thaler, Justin / Yuen, Henry | 2012
865
On establishing the Shannon ordering for discrete memoryless channels
Zhang, Yuan / Tepedelenlioglu, Cihan | 2012
870
Ergodic capacity ordering of fading channels
Rajan, Adithya / Tepedelenlioglu, Cihan | 2012
875
Penalized maximum likelihood methods for finite memory estimators of infinite memory processes
Talata, Zsolt | 2012
880
Piecewise constant prediction
Ordentlich, Erik / Weinberger, Marcelo J. / Wu, Yihong | 2012
885
Efficient tracking of large classes of experts
Gyorgy, Andras / Linder, Tamas / Lugosi, Gabor | 2012
890
Precise evaluation of leaked information with universal2 privacy amplification in the presence of quantum attacker
Hayashi, Masahito | 2012
895
Quantum wiretap channel with non-uniform random number and its exponent of leaked information
Hayashi, Masahito | 2012
900
Entanglement cost of quantum channels
Berta, Mario / Christandl, Matthias / Brandao, Fernando G. S. L. / Wehner, Stephanie | 2012
905
Mutually unbiased bases as submodules and subspaces
Hall, Joanne L. / Stovicek, Jan | 2012
910
A simple technique for bounding the redundancy of source coding with side information
Kuzuoka, Shigeaki | 2012
915
The dispersion of Slepian-Wolf coding
Tan, Vincent Y. F. / Kosut, Oliver | 2012
920
Moderate-deviations of lossy source coding for discrete and Gaussian sources
Tan, Vincent Y. F. | 2012
925
Relations between redundancy patterns of the Shannon code and wave diffraction patterns of partially disordered media
Merhav, Neri | 2012
930
Code design for very noisy relay channels
Suthisopapan, Puripong / Kasai, Kenta / Meesomboon, Anupap / Imtawil, Virasit / Sakaniwa, Kohichi | 2012
935
Algebraic fast-decodable relay codes for distributed communications
Hollanti, Camilla / Markin, Nadya | 2012
940
Superposition of binary and Gaussian codebooks to relay data in diamond networks
Parvaresh, Farzad / Etkin, Raul | 2012
945
Erasure-correcting vs. erasure-detecting codes for the full-duplex binary erasure relay channel
Ivashkina, Marina / Andriyanova, Iryna / Piantanida, Pablo / Poulliat, Charly | 2012
950
Wireless information transfer with opportunistic energy harvesting
Liu, Liang / Zhang, Rui / Chua, Kee-Chaing | 2012
955
Optimal save-then-transmit protocol for energy harvesting wireless transmitters
Luo, Shixin / Zhang, Rui / Lim, Teng Joon | 2012
960
On optimal online policies in energy harvesting systems for compound poisson energy arrivals
Mitran, Patrick | 2012
965
Energy cooperation in energy harvesting wireless communications
Gurakan, Berk / Ozel, Omur / Yang, Jing / Ulukus, Sennur | 2012
970
Dynamic intrusion detection in resource-constrained cyber networks
Liu, Keqin / Zhao, Qing | 2012
975
A Byzantine attack defender: The Conditional Frequency Check
He, Xiaofan / Dai, Huaiyu / Ning, Peng | 2012
980
Distributed ranking in networks with limited memory and communication
Jung, Kyomin / Kim, Bo Young / Vojnovic, Milan | 2012
985
Degree-guided map-reduce task assignment with data locality constraint
Xie, Qiaomin / Lu, Yi | 2012
990
Trade-offs between instantaneous and total capacity in multi-cell flash memories
Gad, Eyal En / Bruck, Jehoshua | 2012
995
Optimized cell programming for flash memories with quantizers
Qin, Minghai / Yaakobi, Eitan / Siegel, Paul H. | 2012
1000
Tackling intracell variability in TLC Flash through tensor product codes
Gabrys, Ryan / Yaakobi, Eitan / Grupp, Laura / Swanson, Steven / Dolecek, Lara | 2012
1005
Coding strategies for the uniform noise rewritable channel with hidden state
Venkataramanan, R. / Tatikonda, S. / Lastras-Montano, L. A. / Franceschini, M. | 2012
1010
Meeting the Levenshtein bound with equality by weighted-correlation complementary set
Liu, Zi Long / Guan, Yong Liang | 2012
1014
On the cross-correlation of ternary m-sequences of period 34k+2 − 1 with decimation 34k+2 − 32k+1 +2/4 + 32k+1
Kim, Ji-Youp / Choi, Sung-Tai / Lim, Taehyung / No, Jong-Seon / Chung, Habong | 2012
1019
Large zero periodic autocorrelation zone of Golay sequences
Gong, Guang / Huo, Fei / Yang, Yang | 2012
1024
Large zero odd periodic autocorrelation zone of Golay sequences and QAM Golay sequences
Yang, Yang / Huo, Fei / Gong, Guang | 2012
1029
Linear information coupling problems
Huang, Shao-Lun / Zheng, Lizhong | 2012
1034
Cut-set bound for generalized networks
Fong, Silas L. / Yeung, Raymond W. / Kramer, Gerhard | 2012
1039
Cut-set bound for generalized networks with positive delay
Fong, Silas L. / Yeung, Raymond W. | 2012
1044
Achievability proof via output statistics of random binning
Yassaee, Mohammad Hossein / Aref, Mohammad Reza / Gohari, Amin | 2012
1049
Constrained probability
Willems, Jan C. | 2012
1054
Estimation of the entropy on the basis of its polynomial representation
Vinck, Martin / Battaglia, Francesco P. / Balakirsky, Vladimir B. / Vinck, A. J. Han / Pennartz, Cyriel | 2012
1059
q-Gaussian based Smoothed Functional algorithms for stochastic optimization
Ghoshdastidar, Debarghya / Dukkipati, Ambedkar / Bhatnagar, Shalabh | 2012
1064
Multi-level error-resilient neural networks
Salavati, Amir Hesam / Karbasi, Amin | 2012
1069
Work recoverable from two-particle information
Levitin, Lev B / Toffoli, Tommaso | 2012
1072
Entropy rate calculations of algebraic measures
Marchand, Katy / Mulherkar, Jaideep / Nachtergaele, Bruno | 2012
1077
Necessary and sufficient conditions for minimax strategy in quantum signal detection
Kato, Kentaro | 2012
1082
Planar difference functions
Hall, Joanne L. / Rao, Asha / Donovan, Diane | 2012
1087
Results on the fundamental gain of memory-assisted universal source coding
Beirami, Ahmad / Sardari, Mohsen / Fekri, Faramarz | 2012
1092
On fast and memory-efficient construction of an antidictionary array
Fukae, Hirotada / Ota, Takahiro / Morita, Hiroyoshi | 2012
1097
Information spectrum approach to overflow probability of variable-length codes with conditional cost function
Nomura, Ryo / Matsushima, Toshiyasu | 2012
1102
Bounds on estimated Markov orders of individual sequences
Vitale, Luciana / Martin, Alvaro / Seroussi, Gadiel | 2012
1107
Variable-length extractors
Zhou, Hongchao / Bruck, Jehoshua | 2012
1112
Simple schedules for half-duplex networks
Brahma, Siddhartha / Ozgur, Ayfer / Fragouli, Christina | 2012
1117
Reducibility of joint relay positioning and flow optimization problem
Thakur, Mohit / Fawaz, Nadia / Medard, Muriel | 2012
1122
Wireless network-level partial relay cooperation
Pappas, Nikolaos / Jeon, Jeongho / Ephremides, Anthony / Traganitis, Apostolos | 2012
1127
Wireless MIMO switching with MMSE relaying
Wang, Fanggang / Liew, Soung Chang / Guo, Dongning | 2012
1132
Spectral efficiency limits in pilot-assisted cooperative communications
Lozano, Angel / Andrews, Jeffrey G. / Heath, Robert W. | 2012
1137
Pilot contamination precoding in multi-cell large scale antenna systems
Ashikhmin, Alexei / Marzetta, Thomas | 2012
1142
Wireless network control with privacy using hybrid ARQ
Sarikaya, Yunus / Ercetin, Ozgur / Koksal, C. Emre | 2012
1147
Reverse Compute and Forward: A Low-Complexity Architecture for Downlink Distributed Antenna System
Hong, S. / Caire, G. / Institute of Electrical and Electronics Engineers
1147
Reverse compute and forward: A low-complexity architecture for downlink distributed antenna systems
Hong, Song-Nam / Caire, Giuseppe | 2012
1152
Base station cooperation with limited feedback: A large system analysis
Muharar, Rusdha / Zakhour, Randa / Evans, Jamie | 2012
1157
Distributed computing with privacy
Tyagi, Himanshu | 2012
1162
Secure computation in a bidirectional relay
Kashyap, Navin / Shashank, V / Thangaraj, Andrew | 2012
1167
On the secrecy capacity of 3-receiver Broadcast Channel with causal states and conferencing
Salehkalaibar, Sadaf / Aref, Mohammad Reza | 2012
1172
On secure communication with constrained randomization
Bloch, Matthieu R. / Kliewer, Jourg | 2012
1177
Secure transmission of a Gaussian source over Gaussian channels with side information
Villard, Joffrey / Piantanida, Pablo | 2012
1182
Long MDS codes for optimal repair bandwidth
Wang, Zhiying / Tamo, Itzhak / Bruck, Jehoshua | 2012
1187
Access vs. bandwidth in codes for storage
Tamo, Itzhak / Wang, Zhiying / Bruck, Jehoshua | 2012
1192
Functional-repair-by-transfer regenerating codes
Shum, Kenneth W. / Hu, Yuchong | 2012
1197
Exact scalar minimum storage coordinated regenerating codes
Le Scouarnec, Nicolas | 2012
1202
Regenerating codes for errors and erasures in distributed storage
Rashmi, K. V. / Shah, Nihar B. / Ramchandran, Kannan / Kumar, P. Vijay | 2012
1207
On inverses of APN exponents
Kyureghyan, Gohar M. / Suder, Valentin | 2012
1212
Generalized bent functions and their relation to Maiorana-McFarland class
Budaghyan, Lilya / Carlet, Claude / Helleseth, Tor / Kholosha, Alexander | 2012
1216
Binary Niho sequences with four-valued cross correlations
Luo, Jinquan / Helleseth, Tor | 2012
1221
Rotating-table game and construction of periodic sequences with lightweight calculation
Zeng, Min / Luo, Yuan / Gong, Guang | 2012
1226
Low Probability of Intercept properties of some binary sequence families with good correlation properties
Boztas, Serdar / Parampalli, Udaya | 2012