Achievable and converse bounds over a general channel and general decoding metric (English)
- New search for: Elkayam, Nir
- New search for: Feder, Meir
- New search for: Elkayam, Nir
- New search for: Feder, Meir
In:
2015 IEEE Information Theory Workshop (ITW)
;
1-5
;
2015
- Conference paper / Electronic Resource
-
Title:Achievable and converse bounds over a general channel and general decoding metric
-
Contributors:Elkayam, Nir ( author ) / Feder, Meir ( author )
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2015-04-01
-
Size:279159 byte
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Tight bounds for symmetric divergence measures and a new inequality relating f-divergencesSason, Igal et al. | 2015
- 1
-
The Gaussian Interference Channel with lack of codebook knowledge at one receiver: Symmetric capacity to within a gap with a PAM inputDytso, Alex / Tuninetti, Daniela / Devroye, Natasha et al. | 2015
- 1
-
Some “goodness” properties of LDA latticesVatedka, Shashank / Kashyap, Navin et al. | 2015
- 1
-
The two-way multi-relay channelPonniah, Jonathan / Xie, Liang-Liang / Kumar, P.R et al. | 2015
- 1
-
Erasure/list random coding error exponents are not universally achievableWeinberger, Nir / Huleihel, Wasim / Merhav, Neri et al. | 2015
- 1
-
Capacity results for the Multicast Cognitive Interference ChannelBenammar, Meryem / Piantanida, Pablo / Shamai, Shlomo et al. | 2015
- 1
-
Capacity of the (1, ∞)-RLL input-constrained erasure channel with feedbackSabag, Oron / Permuter, Haim H. / Kashyap, Navin et al. | 2015
- 1
-
Oblivious transfer over OFDM and MIMO channelsRavi, Jithin / Dey, Bikash Kumar / Viterbo, Emanuele et al. | 2015
- 1
-
Optimal linear and cyclic locally repairable codes over small fieldsZeh, Alexander / Yaakobi, Eitan et al. | 2015
- 1
-
Non-locality distillation as cryptographic gameBrassard, Gilles / Salwey, Benno / Wolf, Stefan et al. | 2015
- 1
-
Coordinating partially-informed agents over state-dependent networksLarrousse, Benjamin / Lasaulce, Samson / Wigger, Michele et al. | 2015
- 1
-
On compute-and-forward with feedbackOrdentlich, Or / Erez, Uri / Nazer, Bobak et al. | 2015
- 1
-
Secret-key cryptography from ideal primitives: A systematic overviewGazi, Peter / Tessaro, Stefano et al. | 2015
- 1
-
Throughput scaling for random hybrid wireless networks with physical-layer network codingChang, Yunyan / Stanczak, Slawomir / Zhou, Chan et al. | 2015
- 1
-
Asymptotic distance properties of protograph-based spatially coupled LDPC codes over GF(q)Huang, Kechao / Mitchell, David G. M. / Ma, Xiao / Costello, Daniel J. et al. | 2015
- 1
-
Cyclic codes and algebraic immunity of Boolean functionsMesnager, Sihem / Cohen, Gerard et al. | 2015
- 1
-
Conditioning and covariance on caterpillarsAllen, Sarah R. / O'Donnell, Ryan et al. | 2015
- 1
-
Capacity region continuity of the compound broadcast channel with confidential messagesGrigorescu, Andrea / Boche, Holger / Schaefer, Rafael F. / Poor, H. Vincent et al. | 2015
- 1
-
Gaussian estimation under attack uncertaintyJavidi, Tara / Kaspi, Yonatan / Tyagi, Himanshu et al. | 2015
- 1
-
Bounds for complexity of syndrome decoding for poset metricsFirer, Marcelo / Pinheiro, Jerry Anderson et al. | 2015
- 1
-
Secrecy-good polar lattices with optimal shaping for the Gaussian wiretap channelsLiu, Ling / Yan, Yanfei / Ling, Cong et al. | 2015
- 1
-
Polar coding for the broadcast channel with confidential messagesChou, Remi A. / Bloch, Matthieu R. et al. | 2015
- 1
-
Multihop virtual full-duplex relay channelsHong, Song-Nam / Maric, Ivana / Hui, Dennis / Caire, Giuseppe et al. | 2015
- 1
-
On adaptive linear programming decoding of ternary linear codesRosnes, Eirik / Helmling, Michael et al. | 2015
- 1
-
Information-theory-friendly models for fiber-optic channels: A primerAgrell, Erik / Durisi, Giuseppe / Johannisson, Pontus et al. | 2015
- 1
-
Lattice index coding for the broadcast channelNatarajan, Lakshmi / Hong, Yi / Viterbo, Emanuele et al. | 2015
- 1
-
Broadcast channels with cooperation: Capacity and duality for the semi-deterministic caseGoldfeld, Ziv / Permuter, Haim H. / Kramer, Gerhard et al. | 2015
- 1
-
Design of LDPC codes for the q-ary partial erasure channelCohen, Rami / Cassuto, Yuval et al. | 2015
- 1
-
New directions in information theoretic security: Benefits of bidirectional signalingYener, Aylin et al. | 2015
- 1
-
Capacity of deterministic, half-duplex, line networks with two sourcesKramer, Gerhard et al. | 2015
- 1
-
Non-asymptotic covering lemmasVerdu, Sergio et al. | 2015
- 1
-
A constrained-dictionary version of LZ78 asymptotically achieves the finite-state compressibility with a distortion measureZiv, Jacob et al. | 2015
- 1
-
Cross-packing lattices for the Rician fading channelSakzad, Amin / Trautmann, Anna-Lena / Viterbo, Emanuele et al. | 2015
- 1
-
Refined upper bounds on stopping redundancy of binary linear codesYakimenka, Yauhen / Skachek, Vitaly et al. | 2015
- 1
-
Achieving secrecy capacity of the wiretap channel and broadcast channel with a confidential componentGulcu, Talha Cihad / Barg, Alexander et al. | 2015
- 1
-
A new coding method for a multiple-access system with a large number of active usersFrolov, Alexey / Zyablov, Victor et al. | 2015
- 1
-
Upper bound on the capacity of discrete-time Wiener phase noise channelsBarletta, Luca / Kramer, Gerhard et al. | 2015
- 1
-
Capacity scaling in noncoherent wideband massive SIMO systemsChowdhury, Mainak / Manolakos, Alexandros / Gomez-Cuba, Felipe / Erkip, Elza / Goldsmith, Andrea J. et al. | 2015
- 1
-
Talking reliably, secretly, and efficiently: A “complete” characterizationZhang, Qiaosheng / Kadhe, Swanand / Bakshi, Mayank / Jaggi, Sidharth / Sprintson, Alex et al. | 2015
- 1
-
Can feedback increase the capacity of the energy harvesting channel?Shaviv, Dor / Ozgur, Ayfer / Permuter, Haim et al. | 2015
- 1
-
Polar coding for the general wiretap channelWei, Yi-Peng / Ulukus, Sennur et al. | 2015
- 1
-
On complexity and randomness of Markov-chain predictionRatsaby, J. et al. | 2015
- 1
-
The approximate optimality of simple schedules for half-duplex multi-relay networksCardone, Martina / Tuninetti, Daniela / Knopp, Raymond et al. | 2015
- 1
-
Point-wise analysis of redundancy in SWLZ algorithm for φ-mixing sourcesJain, Ayush / Bansal, Rakesh K et al. | 2015
- 1
-
Exponential rates of convergence for waiting times and generalized AEPJain, Ayush / Bansal, Rakesh K et al. | 2015
- 1
-
Cyclic linear binary locally repairable codesHuang, Pengfei / Yaakobi, Eitan / Uchikawa, Hironori / Siegel, Paul H. et al. | 2015
- 1
-
Capacity of Binary State Symmetric Channel with and without feedback and transmission costKourtellaris, Christos K. / Charalambous, Charalambos D. et al. | 2015
- 1
-
Error correction through language processingJiang, Anxiao / Li, Yue / Bruck, Jehoshua et al. | 2015
- 1
-
Zero-latency zero-error codes for parallel asynchronous channels with arbitrary skewsEngelberg, Shlomo / Keren, Osnat et al. | 2015
- 1
-
A comparison of skewed and orthogonal lattices in Gaussian wiretap channelsKarrila, Alex / Hollanti, Camilla et al. | 2015
- 1
-
Greedy MaxCut algorithms and their information contentBian, Yatao / Gronskiy, Alexey / Buhmann, Joachim M. et al. | 2015
- 1
-
Conferencing in Wyner's asymmetric interference network: Effect of number of roundsWigger, Michele / Timo, Roy / Shamai, Shlomo et al. | 2015
- 1
-
Achievable and converse bounds over a general channel and general decoding metricElkayam, Nir / Feder, Meir et al. | 2015
- 1
-
Transmitting k samples over the Gaussian channel: Energy-distortion tradeoffKostina, Victoria / Polyanskiy, Yury / Verdu, Sergio et al. | 2015
- 1
-
Deep learning and the information bottleneck principleTishby, Naftali / Zaslavsky, Noga et al. | 2015
- 1
-
One-to-one lossless codes in the variable input-length regime: Back to Kraft's inequalityWeinberger, Marcelo J. et al. | 2015
- 1
-
Codes for DNA storage channelsKiah, Han Mao / Puleo, Gregory J. / Milenkovic, Olgica et al. | 2015
- 1
-
Nested lattice codes for secure bidirectional relaying with asymmetric channel gainsVatedka, Shashank / Kashyap, Navin et al. | 2015
- 1
-
Caching-aided coded multicasting with multiple random requestsJi, Mingyue / Tulino, Antonia / Llorca, Jaime / Caire, Giuseppe et al. | 2015
- 1
-
Copyright page| 2015
- 1
-
Unique factorization and controllability of tail-biting trellis realizations via controller granule decompositionsForney, G. David et al. | 2015
- 1
-
Upper bound on function computation in directed acyclic networksHuang, Cupjin / Tan, Zihan / Yang, Shenghao et al. | 2015
- 1
-
Encoding and decoding algorithms for LP-decodable multipermutation codesLiu, Xishuo / Draper, Stark C. et al. | 2015
- 1
-
On the capacity of multihop device-to-device caching networksJeon, Sang-Woon / Hong, Song-Nam / Ji, Mingyue / Caire, Giuseppe et al. | 2015
- 1
-
File updates under random/arbitrary insertions and deletionsWang, Qiwen / Cadambe, Viveck / Jaggi, Sidharth / Schwartz, Moshe / Medard, Muriel et al. | 2015
- 1
-
Secure transmission using an untrusted relay with scaled compute-and-forwardRen, Zhijie / Goseling, Jasper / Weber, Jos H. / Gastpar, Michael et al. | 2015
- 1
-
Approximation algorithms for erasure correcting Data ExchangeYan, Muxi / Sprintson, Alex et al. | 2015
- 1
-
Stochastic interpretation for the Arimoto algorithmTridenski, Sergey / Zamir, Ram et al. | 2015
- 1
-
Harmonic analysis of binary functionsBelfiore, Jean-Claude / Yi Hong, / Viterbo, Emanuele et al. | 2015
- 1
-
Distortion-transmission trade-off in real-time transmission of Markov sourcesChakravorty, Jhelum / Mahajan, Aditya et al. | 2015
- 1
-
Boosting output distributions in finite blocklength channel coding converse boundsKosut, Oliver et al. | 2015
- 1
-
Polar codes for magnetic recording channelsBhatia, Aman / Taranalli, Veeresh / Siegel, Paul H. / Dahandeh, Shafa / Krishnan, Anantha Raman / Lee, Patrick / Dahua Qin, / Sharma, Moni / Yeo, Teik et al. | 2015
- 1
-
Coding for network-coded slotted ALOHAYang, Shenghao / Chen, Yi / Liew, Soung Chang / You, Lizhao et al. | 2015
- 1
-
Compute-and-forward using nested linear codes for the Gaussian MACZhu, Jingge / Gastpar, Michael et al. | 2015
- 1
-
Gaussian joint source-channel coding for the strong interference channelAguerri, Inaki Estella / Gunduz, Deniz et al. | 2015
- 1
-
Secrecy degrees of freedom of the two-user MISO broadcast channel with mixed CSITWang, Zhao / Xiao, Ming / Skoglund, Mikael / Poor, H. Vincent et al. | 2015
- 1
-
On MMSE properties of optimal codes for the Gaussian wiretap channelBustin, Ronit / Schaefer, Rafael F. / Poor, H. Vincent / Shamai, Shlomo et al. | 2015
- 1
-
The AWGN BC with MAC feedback: A reduction to noiseless feedback via interactionBen-Yishai, Assaf / Shayevitz, Ofer et al. | 2015
- 1
-
On the distortion-energy tradeoff for zero-delay transmission of a Gaussian source over the AWGN channelKoken, Erman / Tuncel, Ertem / Gunduz, Deniz et al. | 2015
- 1
-
On the transmission of a bivariate Gaussian source over the Gaussian broadcast channel with feedbackMurin, Yonathan / Kaspi, Yonatan / Dabora, Ron / Gunduz, Deniz et al. | 2015
- 1
-
WOM codes with uninformed encoderHorovitz, Michal / Yaakobi, Eitan et al. | 2015
- 1
-
Non-adaptive group testing with inhibitorsGanesan, Abhinav / Jaggi, Sidharth / Saligrama, Venkatesh et al. | 2015
- 1
-
Zero-error function computation through a bidirectional relayRavi, Jithin / Dey, Bikash Kumar et al. | 2015
- 1
-
Improved layered regenerating codes characterizing the exact-repair storage-repair bandwidth tradeoff for certain parameter setsSenthoor, Kaushik / Sasidharan, Birenjith / Kumar, P. Vijay et al. | 2015
- 1
-
Distributed storage allocations for neighborhood-based data accessJakovetic, Dusan / Minja, Aleksandar / Bajovic, Dragana / Vukobratovic, Dejan et al. | 2015
- 1
-
Powers of codes and applications to cryptographyCascudo, Ignacio et al. | 2015
- 1
-
Codes for RAID solutions based upon SSDsVardy, Alexander / Yaakobi, Eitan et al. | 2015
- 1
-
Combinatorial channels from partially ordered setsCullina, Daniel / Kiyavash, Negar et al. | 2015
- 1
-
Separation architectures for lossy compressionHuang, Ying-zong / Wornell, Gregory W. et al. | 2015
- 1
-
Upper bound on the capacity of a cascade of nonlinear and noisy channelsKramer, Gerhard / Yousefi, Mansoor I. / Kschischang, Frank R. et al. | 2015
- 1
-
CEO problem for belief sharingVempaty, Aditya / Varshney, Lav R. et al. | 2015
- 1
-
Degraded broadcast channel: Secrecy outside of a bounded rangeZou, Shaofeng / Liang, Yingbin / Lai, Lifeng / Shamai, Shlomo et al. | 2015
- 1
-
Sub-Nyquist sampling achieves optimal rate-distortionKipnis, Alon / Goldsmith, Andrea J. / Eldar, Yonina C. et al. | 2015
- 1
-
Security in locally repairable storageAgarwal, Abhishek / Mazumdar, Arya et al. | 2015
- 1
-
On the noisy feedback capacity of Gaussian broadcast channelsPillai, Sibi Raj B. / Prabhakaran, Vinod M. et al. | 2015
- 1
-
Non-binary GLD codes and their latticesdi Pietro, Nicola / Basha, Nour / Boutros, Joseph J. et al. | 2015
- 1
-
Subset-universal lossy compressionOrdentlich, Or / Shayevitz, Ofer et al. | 2015
- 1
-
ADMM decoding of error correction codes: From geometries to algorithmsLiu, Xishuo / Draper, Stark C. et al. | 2015
- 1
-
Asymmetric Lee distance codes: New bounds and constructionsGabrys, Ryan / Kiah, Han Mao / Milenkovic, Olgica et al. | 2015