Achievable and converse bounds over a general channel and general decoding metric (Englisch)
- Neue Suche nach: Elkayam, Nir
- Neue Suche nach: Feder, Meir
- Neue Suche nach: Elkayam, Nir
- Neue Suche nach: Feder, Meir
In:
2015 IEEE Information Theory Workshop (ITW)
;
1-5
;
2015
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:Achievable and converse bounds over a general channel and general decoding metric
-
Beteiligte:Elkayam, Nir ( Autor:in ) / Feder, Meir ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.04.2015
-
Format / Umfang:279159 byte
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Tight bounds for symmetric divergence measures and a new inequality relating f-divergencesSason, Igal et al. | 2015
- 1
-
The Gaussian Interference Channel with lack of codebook knowledge at one receiver: Symmetric capacity to within a gap with a PAM inputDytso, Alex / Tuninetti, Daniela / Devroye, Natasha et al. | 2015
- 1
-
Some “goodness” properties of LDA latticesVatedka, Shashank / Kashyap, Navin et al. | 2015
- 1
-
The two-way multi-relay channelPonniah, Jonathan / Xie, Liang-Liang / Kumar, P.R et al. | 2015
- 1
-
Erasure/list random coding error exponents are not universally achievableWeinberger, Nir / Huleihel, Wasim / Merhav, Neri et al. | 2015
- 1
-
Capacity results for the Multicast Cognitive Interference ChannelBenammar, Meryem / Piantanida, Pablo / Shamai, Shlomo et al. | 2015
- 1
-
Capacity of the (1, ∞)-RLL input-constrained erasure channel with feedbackSabag, Oron / Permuter, Haim H. / Kashyap, Navin et al. | 2015
- 1
-
Oblivious transfer over OFDM and MIMO channelsRavi, Jithin / Dey, Bikash Kumar / Viterbo, Emanuele et al. | 2015
- 1
-
Optimal linear and cyclic locally repairable codes over small fieldsZeh, Alexander / Yaakobi, Eitan et al. | 2015
- 1
-
Non-locality distillation as cryptographic gameBrassard, Gilles / Salwey, Benno / Wolf, Stefan et al. | 2015
- 1
-
Coordinating partially-informed agents over state-dependent networksLarrousse, Benjamin / Lasaulce, Samson / Wigger, Michele et al. | 2015
- 1
-
On compute-and-forward with feedbackOrdentlich, Or / Erez, Uri / Nazer, Bobak et al. | 2015
- 1
-
Secret-key cryptography from ideal primitives: A systematic overviewGazi, Peter / Tessaro, Stefano et al. | 2015
- 1
-
CEO problem for belief sharingVempaty, Aditya / Varshney, Lav R. et al. | 2015
- 1
-
Degraded broadcast channel: Secrecy outside of a bounded rangeZou, Shaofeng / Liang, Yingbin / Lai, Lifeng / Shamai, Shlomo et al. | 2015
- 1
-
Sub-Nyquist sampling achieves optimal rate-distortionKipnis, Alon / Goldsmith, Andrea J. / Eldar, Yonina C. et al. | 2015
- 1
-
Security in locally repairable storageAgarwal, Abhishek / Mazumdar, Arya et al. | 2015
- 1
-
On the noisy feedback capacity of Gaussian broadcast channelsPillai, Sibi Raj B. / Prabhakaran, Vinod M. et al. | 2015
- 1
-
Non-binary GLD codes and their latticesdi Pietro, Nicola / Basha, Nour / Boutros, Joseph J. et al. | 2015
- 1
-
Subset-universal lossy compressionOrdentlich, Or / Shayevitz, Ofer et al. | 2015
- 1
-
ADMM decoding of error correction codes: From geometries to algorithmsLiu, Xishuo / Draper, Stark C. et al. | 2015
- 1
-
Asymmetric Lee distance codes: New bounds and constructionsGabrys, Ryan / Kiah, Han Mao / Milenkovic, Olgica et al. | 2015
- 1
-
One-to-one lossless codes in the variable input-length regime: Back to Kraft's inequalityWeinberger, Marcelo J. et al. | 2015
- 1
-
Codes for DNA storage channelsKiah, Han Mao / Puleo, Gregory J. / Milenkovic, Olgica et al. | 2015
- 1
-
Nested lattice codes for secure bidirectional relaying with asymmetric channel gainsVatedka, Shashank / Kashyap, Navin et al. | 2015
- 1
-
Caching-aided coded multicasting with multiple random requestsJi, Mingyue / Tulino, Antonia / Llorca, Jaime / Caire, Giuseppe et al. | 2015
- 1
-
Copyright page| 2015
- 1
-
Throughput scaling for random hybrid wireless networks with physical-layer network codingChang, Yunyan / Stanczak, Slawomir / Zhou, Chan et al. | 2015
- 1
-
Asymptotic distance properties of protograph-based spatially coupled LDPC codes over GF(q)Huang, Kechao / Mitchell, David G. M. / Ma, Xiao / Costello, Daniel J. et al. | 2015
- 1
-
Cyclic codes and algebraic immunity of Boolean functionsMesnager, Sihem / Cohen, Gerard et al. | 2015
- 1
-
Conditioning and covariance on caterpillarsAllen, Sarah R. / O'Donnell, Ryan et al. | 2015
- 1
-
Capacity region continuity of the compound broadcast channel with confidential messagesGrigorescu, Andrea / Boche, Holger / Schaefer, Rafael F. / Poor, H. Vincent et al. | 2015
- 1
-
Gaussian estimation under attack uncertaintyJavidi, Tara / Kaspi, Yonatan / Tyagi, Himanshu et al. | 2015
- 1
-
Bounds for complexity of syndrome decoding for poset metricsFirer, Marcelo / Pinheiro, Jerry Anderson et al. | 2015
- 1
-
Secrecy-good polar lattices with optimal shaping for the Gaussian wiretap channelsLiu, Ling / Yan, Yanfei / Ling, Cong et al. | 2015
- 1
-
Polar coding for the broadcast channel with confidential messagesChou, Remi A. / Bloch, Matthieu R. et al. | 2015
- 1
-
Multihop virtual full-duplex relay channelsHong, Song-Nam / Maric, Ivana / Hui, Dennis / Caire, Giuseppe et al. | 2015
- 1
-
On adaptive linear programming decoding of ternary linear codesRosnes, Eirik / Helmling, Michael et al. | 2015
- 1
-
Information-theory-friendly models for fiber-optic channels: A primerAgrell, Erik / Durisi, Giuseppe / Johannisson, Pontus et al. | 2015
- 1
-
Lattice index coding for the broadcast channelNatarajan, Lakshmi / Hong, Yi / Viterbo, Emanuele et al. | 2015
- 1
-
Broadcast channels with cooperation: Capacity and duality for the semi-deterministic caseGoldfeld, Ziv / Permuter, Haim H. / Kramer, Gerhard et al. | 2015
- 1
-
Design of LDPC codes for the q-ary partial erasure channelCohen, Rami / Cassuto, Yuval et al. | 2015
- 1
-
New directions in information theoretic security: Benefits of bidirectional signalingYener, Aylin et al. | 2015
- 1
-
Capacity of deterministic, half-duplex, line networks with two sourcesKramer, Gerhard et al. | 2015
- 1
-
Non-asymptotic covering lemmasVerdu, Sergio et al. | 2015
- 1
-
Polar coding for the general wiretap channelWei, Yi-Peng / Ulukus, Sennur et al. | 2015
- 1
-
On complexity and randomness of Markov-chain predictionRatsaby, J. et al. | 2015
- 1
-
The approximate optimality of simple schedules for half-duplex multi-relay networksCardone, Martina / Tuninetti, Daniela / Knopp, Raymond et al. | 2015
- 1
-
Point-wise analysis of redundancy in SWLZ algorithm for φ-mixing sourcesJain, Ayush / Bansal, Rakesh K et al. | 2015
- 1
-
Exponential rates of convergence for waiting times and generalized AEPJain, Ayush / Bansal, Rakesh K et al. | 2015
- 1
-
Cyclic linear binary locally repairable codesHuang, Pengfei / Yaakobi, Eitan / Uchikawa, Hironori / Siegel, Paul H. et al. | 2015
- 1
-
Capacity of Binary State Symmetric Channel with and without feedback and transmission costKourtellaris, Christos K. / Charalambous, Charalambos D. et al. | 2015
- 1
-
Error correction through language processingJiang, Anxiao / Li, Yue / Bruck, Jehoshua et al. | 2015
- 1
-
Unique factorization and controllability of tail-biting trellis realizations via controller granule decompositionsForney, G. David et al. | 2015
- 1
-
Upper bound on function computation in directed acyclic networksHuang, Cupjin / Tan, Zihan / Yang, Shenghao et al. | 2015
- 1
-
Encoding and decoding algorithms for LP-decodable multipermutation codesLiu, Xishuo / Draper, Stark C. et al. | 2015
- 1
-
On the capacity of multihop device-to-device caching networksJeon, Sang-Woon / Hong, Song-Nam / Ji, Mingyue / Caire, Giuseppe et al. | 2015
- 1
-
File updates under random/arbitrary insertions and deletionsWang, Qiwen / Cadambe, Viveck / Jaggi, Sidharth / Schwartz, Moshe / Medard, Muriel et al. | 2015
- 1
-
Secure transmission using an untrusted relay with scaled compute-and-forwardRen, Zhijie / Goseling, Jasper / Weber, Jos H. / Gastpar, Michael et al. | 2015
- 1
-
Approximation algorithms for erasure correcting Data ExchangeYan, Muxi / Sprintson, Alex et al. | 2015
- 1
-
Stochastic interpretation for the Arimoto algorithmTridenski, Sergey / Zamir, Ram et al. | 2015
- 1
-
Harmonic analysis of binary functionsBelfiore, Jean-Claude / Yi Hong, / Viterbo, Emanuele et al. | 2015
- 1
-
Distortion-transmission trade-off in real-time transmission of Markov sourcesChakravorty, Jhelum / Mahajan, Aditya et al. | 2015
- 1
-
Boosting output distributions in finite blocklength channel coding converse boundsKosut, Oliver et al. | 2015
- 1
-
Polar codes for magnetic recording channelsBhatia, Aman / Taranalli, Veeresh / Siegel, Paul H. / Dahandeh, Shafa / Krishnan, Anantha Raman / Lee, Patrick / Dahua Qin, / Sharma, Moni / Yeo, Teik et al. | 2015
- 1
-
A constrained-dictionary version of LZ78 asymptotically achieves the finite-state compressibility with a distortion measureZiv, Jacob et al. | 2015
- 1
-
Cross-packing lattices for the Rician fading channelSakzad, Amin / Trautmann, Anna-Lena / Viterbo, Emanuele et al. | 2015
- 1
-
Refined upper bounds on stopping redundancy of binary linear codesYakimenka, Yauhen / Skachek, Vitaly et al. | 2015
- 1
-
Achieving secrecy capacity of the wiretap channel and broadcast channel with a confidential componentGulcu, Talha Cihad / Barg, Alexander et al. | 2015
- 1
-
A new coding method for a multiple-access system with a large number of active usersFrolov, Alexey / Zyablov, Victor et al. | 2015
- 1
-
Upper bound on the capacity of discrete-time Wiener phase noise channelsBarletta, Luca / Kramer, Gerhard et al. | 2015
- 1
-
Capacity scaling in noncoherent wideband massive SIMO systemsChowdhury, Mainak / Manolakos, Alexandros / Gomez-Cuba, Felipe / Erkip, Elza / Goldsmith, Andrea J. et al. | 2015
- 1
-
Talking reliably, secretly, and efficiently: A “complete” characterizationZhang, Qiaosheng / Kadhe, Swanand / Bakshi, Mayank / Jaggi, Sidharth / Sprintson, Alex et al. | 2015
- 1
-
Can feedback increase the capacity of the energy harvesting channel?Shaviv, Dor / Ozgur, Ayfer / Permuter, Haim et al. | 2015
- 1
-
Zero-latency zero-error codes for parallel asynchronous channels with arbitrary skewsEngelberg, Shlomo / Keren, Osnat et al. | 2015
- 1
-
A comparison of skewed and orthogonal lattices in Gaussian wiretap channelsKarrila, Alex / Hollanti, Camilla et al. | 2015
- 1
-
Greedy MaxCut algorithms and their information contentBian, Yatao / Gronskiy, Alexey / Buhmann, Joachim M. et al. | 2015
- 1
-
Conferencing in Wyner's asymmetric interference network: Effect of number of roundsWigger, Michele / Timo, Roy / Shamai, Shlomo et al. | 2015
- 1
-
Achievable and converse bounds over a general channel and general decoding metricElkayam, Nir / Feder, Meir et al. | 2015
- 1
-
Transmitting k samples over the Gaussian channel: Energy-distortion tradeoffKostina, Victoria / Polyanskiy, Yury / Verdu, Sergio et al. | 2015
- 1
-
Deep learning and the information bottleneck principleTishby, Naftali / Zaslavsky, Noga et al. | 2015
- 1
-
On the transmission of a bivariate Gaussian source over the Gaussian broadcast channel with feedbackMurin, Yonathan / Kaspi, Yonatan / Dabora, Ron / Gunduz, Deniz et al. | 2015
- 1
-
WOM codes with uninformed encoderHorovitz, Michal / Yaakobi, Eitan et al. | 2015
- 1
-
Non-adaptive group testing with inhibitorsGanesan, Abhinav / Jaggi, Sidharth / Saligrama, Venkatesh et al. | 2015
- 1
-
Zero-error function computation through a bidirectional relayRavi, Jithin / Dey, Bikash Kumar et al. | 2015
- 1
-
Improved layered regenerating codes characterizing the exact-repair storage-repair bandwidth tradeoff for certain parameter setsSenthoor, Kaushik / Sasidharan, Birenjith / Kumar, P. Vijay et al. | 2015
- 1
-
Distributed storage allocations for neighborhood-based data accessJakovetic, Dusan / Minja, Aleksandar / Bajovic, Dragana / Vukobratovic, Dejan et al. | 2015
- 1
-
Powers of codes and applications to cryptographyCascudo, Ignacio et al. | 2015
- 1
-
Codes for RAID solutions based upon SSDsVardy, Alexander / Yaakobi, Eitan et al. | 2015
- 1
-
Combinatorial channels from partially ordered setsCullina, Daniel / Kiyavash, Negar et al. | 2015
- 1
-
Separation architectures for lossy compressionHuang, Ying-zong / Wornell, Gregory W. et al. | 2015
- 1
-
Upper bound on the capacity of a cascade of nonlinear and noisy channelsKramer, Gerhard / Yousefi, Mansoor I. / Kschischang, Frank R. et al. | 2015
- 1
-
Coding for network-coded slotted ALOHAYang, Shenghao / Chen, Yi / Liew, Soung Chang / You, Lizhao et al. | 2015
- 1
-
Compute-and-forward using nested linear codes for the Gaussian MACZhu, Jingge / Gastpar, Michael et al. | 2015
- 1
-
Gaussian joint source-channel coding for the strong interference channelAguerri, Inaki Estella / Gunduz, Deniz et al. | 2015
- 1
-
Secrecy degrees of freedom of the two-user MISO broadcast channel with mixed CSITWang, Zhao / Xiao, Ming / Skoglund, Mikael / Poor, H. Vincent et al. | 2015
- 1
-
On MMSE properties of optimal codes for the Gaussian wiretap channelBustin, Ronit / Schaefer, Rafael F. / Poor, H. Vincent / Shamai, Shlomo et al. | 2015
- 1
-
The AWGN BC with MAC feedback: A reduction to noiseless feedback via interactionBen-Yishai, Assaf / Shayevitz, Ofer et al. | 2015
- 1
-
On the distortion-energy tradeoff for zero-delay transmission of a Gaussian source over the AWGN channelKoken, Erman / Tuncel, Ertem / Gunduz, Deniz et al. | 2015