


default search action
ISIT 2015: Hong Kong, China
- IEEE International Symposium on Information Theory, ISIT 2015, Hong Kong, China, June 14-19, 2015. IEEE 2015, ISBN 978-1-4673-7704-1

Mo-AM1-1: List Decoding 1
- Lin-Zhi Shen

, Fang-Wei Fu:
The list decoding error probability of linear codes over the erasure channel. 1-5 - Netanel Raviv, Antonia Wachter-Zeh:

Some Gabidulin codes cannot be list decoded efficiently at any radius. 6-10 - Hannes Bartz

, Vladimir Sidorenko
:
List and probabilistic unique decoding of folded subspace codes. 11-15 - Alexander Zeh, Ron M. Roth:

Improved burst error correction via list decoding quasi-cyclic codes. 16-20
Mo-AM1-2: Cooperative MACS
- Ritesh Kolte

, Ayfer Özgür
, Haim H. Permuter
:
State-dependent multiple-access channels with partially cribbing encoders. 21-25 - Tal Kopetz, Haim H. Permuter

, Shlomo Shamai
:
Cooperative multiple access channels with oblivious encoders. 26-30 - Yi Ouyang, Demosthenis Teneketzis:

A common information-based multiple access protocol achieving full throughput. 31-35 - Parham Noorzad, Michelle Effros, Michael Langberg:

On the cost and benefit of cooperation. 36-40
Mo-AM1-3: LPDC and Spatially Coupled LDPC Codes
- Walter Nitzold, Gerhard P. Fettweis, Michael Lentmaier:

Rate-compatible spatially-coupled LDPC code ensembles with nearly-regular degree distributions. 41-45 - Xuan He, Liang Zhou, Junyi Du, Zhiping Shi:

The multi-step PEG and ACE constrained PEG algorithms can design the LDPC codes with better cycle-connectivity. 46-50 - Behzad Amiri, Amirhossein Reisizadeh, Jörg Kliewer, Lara Dolecek:

Optimized array-based spatially-coupled LDPC Codes: An absorbing set approach. 51-55 - Lei M. Zhang, Dmitri V. Truhachev, Frank R. Kschischang

:
Spatially-coupled split-component codes with bounded-distance component decoding. 56-60
Mo-AM1-4: Topics in Coding and Information Theory
- Paolo Minero, Massimo Franceschetti:

Anytime capacity of Markov channels. 61-65 - Abhinav Ganesan, Sidharth Jaggi

, Venkatesh Saligrama
:
Learning immune-defectives graph through group tests. 66-70 - Audrey Tixier:

Blind identification of an unknown interleaved convolutional code. 71-75 - Morteza Varasteh, Deniz Gündüz

, Ertem Tuncel
:
Delay limited transmission of a uniform source over an AWGN channel. 76-80
Mo-AM1-5: Error Exponents 1
- Yuta Sakai

, Ken-ichi Iwata
:
Feasible regions of symmetric capacity and Gallager's E0 function for ternary-input discrete memoryless channels. 81-85 - Jonathan Scarlett, Alfonso Martinez

, Albert Guillen i Fabregas:
The likelihood decoder: Error exponents and mismatch. 86-90 - Junya Honda:

Exact asymptotics for the random coding error probability. 91-95 - Seçkin Anil Yildirim

, Alfonso Martinez
, Albert Guillen i Fabregas:
Achievable rates and exponents for asynchronous communication with ML decoding. 96-100
Mo-AM1-6: Gaussian Channels and Secrecy
- Nir Shlezinger

, Daniel Zahavi, Yonathan Murin, Ron Dabora:
The secrecy capacity of MIMO Gaussian channels with finite memory. 101-105 - Si-Hyeon Lee

, Ashish Khisti
:
The degraded Gaussian diamond-wiretap channel. 106-110 - Hao Ge, Ruijie Xu, Randall A. Berry

:
Secure signaling games for Gaussian multiple access wiretap channels. 111-115 - Sanket Satpathy, Paul W. Cuff:

Gaussian secure source coding and Wyner's Common Information. 116-120
Mo-AM1-7: Capacity in Energy Harvesting Communications
- Varun S. Jog, Venkat Anantharam:

A geometric analysis of the AWGN channel with a (σ, ρ)-power constraint. 121-125 - Wei Mao, Babak Hassibi:

New capacity upper bounds and coding aspects for some channels with causal CSIT. 126-130 - Dor Shaviv

, Phan-Minh Nguyen, Ayfer Özgür
:
Capacity of the energy harvesting channel with a finite battery. 131-135 - Dor Shaviv

, Ayfer Özgür
:
Capacity of the AWGN channel with random battery recharges. 136-140
Mo-AM1-8: Changepoint Detection and Estimation
- Cheng-Der Fuh, Yajun Mei:

Quickest change detection and Kullback-Leibler divergence for two-state hidden Markov models. 141-145 - Taposh Banerjee, Hamed Firouzi, Alfred O. Hero III:

Non-parametric quickest change detection for large scale random matrices. 146-150 - Yong Sheng Soh, Venkat Chandrasekaran:

High-dimensional change-point estimation: Combining filtering with convex optimization. 151-155 - Ehsan Ebrahimzadeh, Aslan Tchamkerten:

Sequential detection of transient changes in stochastic systems under a sampling constraint. 156-160
Mo-AM1-9: Ad Hoc and Wireless Networks
- An Liu, Vincent K. N. Lau:

On the improvement of scaling laws for wireless ad hoc networks with physical layer caching. 161-165 - Philippe Jacquet:

Optimized outage capacity in random wireless networks in uniform and fractal maps. 166-170 - Serj Haddad

, Olivier Lévêque:
On the broadcast capacity of large wireless networks at low SNR. 171-175 - Yu Zhang, Zhaoyang Zhang, Li Ping, Xiaoming Chen, Caijun Zhong

:
Capacity scaling of relay networks with successive relaying. 176-180
Mo-AM2-1: Algebra for Coding
- Li Xiao, Xiang-Gen Xia:

A robust Chinese Remainder Theorem with applications in error correction coding. 181-185 - Pascale Charpin, Sihem Mesnager, Sumanta Sarkar:

On involutions of finite fields. 186-190 - Lu Wei

, Renaud-Alexandre Pitaval, Jukka Corander, Olav Tirkkonen
:
On the volume of a metric ball in unitary group. 191-195 - Hugues Randriambololona:

Linear independence of rank 1 matrices and the dimension of *-products of codes. 196-200
Mo-AM2-2: Gaussian Interference Channels
- Lan V. Truong

, Hirosuke Yamamoto
:
On the capacity of symmetric Gaussian interference channels with feedback. 201-205 - Xiaohu Shang:

Partial capacity boundary of parallel Gaussian Z interference channels. 206-210 - Junyoung Nam:

Upper bounds on the sum capacity of the K-user Gaussian interference channel. 211-215 - Ruchen Duan, Yingbin Liang, Shlomo Shamai

:
State-dependent Gaussian Z-interference channel: Capacity results. 216-220
Mo-AM2-3: Finite Length Analysis of Polar Codes
- Hsien-Ping Lin, Shu Lin

, Khaled A. S. Abdel-Ghaffar:
Binary nonlinear kernels of maximum exponents of polar codes of dimensions up to sixteen. 221-225 - Dina Goldin, David Burshtein:

On the finite length scaling of ternary polar codes. 226-230 - Min Ye, Alexander Barg:

Polar codes using dynamic kernels. 231-235 - Jing Guo, Albert Guillen i Fabregas:

Efficient sphere decoding of polar codes. 236-240
Mo-AM2-4: application Specific Codes
- Yeow Meng Chee

, Fei Gao, Samuel Tien Ho Teo, Hui Zhang:
Combinatorial systematic switch codes. 241-245 - Ohad Elishco

, Tom Meyerovitch, Moshe Schwartz
:
Semiconstrained systems. 246-250 - Thomas Mittelholzer, Thomas P. Parnell, Nikolaos Papandreou, Haralampos Pozidis:

Symmetry-based subproduct codes. 251-255 - Igor V. Zhilin

, Pavel S. Rybin
, Victor V. Zyablov
:
High-rate codes for high-reliability data transmission. 256-260
Mo-AM2-5: Source-Channel Coding 1
- Andrew J. Young, Yury Polyanskiy:

Converse and duality results for combinatorial source-channel coding in binary Hamming spaces. 261-265 - Roy Timo, Michèle A. Wigger:

Slepian-wolf coding for broadcasting with cooperative base-stations. 266-270 - Arya Mazumdar, Ankit Singh Rawat

:
On adversarial joint source channel coding. 271-275 - Victoria Kostina

, Yury Polyanskiy, Sergio Verdú:
Joint source-channel coding with feedback. 276-280
Mo-AM2-6: Capacity and Equivocation Aspects of Secrecy
- Masahito Hayashi

, Vincent Yan Fu Tan:
Equivocations and exponents under various Rényi information measures. 281-285 - Peng Xu, Zhiguo Ding, Xuchu Dai:

The private key capacity of a cooperative pairwise-independent network. 286-290 - Huishuai Zhang, Yingbin Liang, Lifeng Lai:

Secret key capacity: Talk or keep silent? 291-295 - Manuj Mukherjee

, Navin Kashyap:
The communication complexity of achieving SK capacity in a class of PIN models. 296-300
Mo-AM2-7: Finite Blocklength Analysis 1
- Mohammad Hossein Yassaee:

One-shot achievability via fidelity. 301-305 - Ryo Nomura

, Hideki Yagi:
Information spectrum approach to fixed-length lossy source coding problem with some excess distortion probability. 306-310 - Silas L. Fong

, Vincent Y. F. Tan:
Asymptotic expansions for the AWGN channel with feedback under a peak power constraint. 311-315
Mo-AM2-8: Advances in Signal Processing
- Or Ordentlich, Uri Erez:

Performance analysis and optimal filter design for sigma-delta modulation via duality with DPCM. 321-325 - Lukas Bruderer, Hampus Malmberg

, Hans-Andrea Loeliger:
Deconvolution of weakly-sparse signals and dynamical-system identification by Gaussian message passing. 326-330 - Jun Chen

, Fei Wang, Jianjiang Zhou:
The metrication of LPI radar waveforms based on the asymptotic spectral distribution of wigner matrices. 331-335 - Mojtaba Soltanalian

, Babak Hassibi:
Beyond semidefinite relaxation: Basis banks and computationally enhanced guarantees. 336-340
Mo-AM2-9: Fading Channels 1
- Juan Manuel Romero-Jerez, Francisco Javier López-Martínez:

On the distribution of the squared norm of non-circular complex Gaussian random variables with applications. 341-345 - Nadhir Ben Rached, Abla Kammoun, Mohamed-Slim Alouini

, Raúl Tempone
:
A unified simulation approach for the fast outage capacity evaluation over generalized fading channels. 346-350 - Khoa D. Nguyen

, Roy Timo, Lars K. Rasmussen:
Causal-CSIT rate adaptation for block-fading channels. 351-355 - Adriano Pastore, Michael Gastpar:

A unified view on nearest-neighbor decoding rates for noncoherent and semicoherent fading channels. 356-360
Mo-PM1-1: Network Coding for Multiple Unicasts
- Wentao Huang, Michael Langberg, Jörg Kliewer:

Connecting multiple-unicast and network error correction: Reduction and unachievability. 361-365 - Kai Cai, Guangyue Han:

On network coding advantage for multiple unicast networks. 366-370 - Ming Fai Wong, Michelle Effros, Michael Langberg:

On an equivalence of the reduction of k-unicast to 2-unicast capacity and the edge removal property. 371-375 - Jayant Apte, John MacLaren Walsh:

Symmetry in network coding. 376-380 - Karthikeyan Shanmugam

, Megasthenis Asteris, Alexandros G. Dimakis:
On approximating the sum-rate for multiple-unicasts. 381-385
Mo-PM1-2: Broadcast Channels
- Behzad Asadi, Lawrence Ong

, Sarah J. Johnson
:
A unified scheme for two-receiver broadcast channels with receiver message side information. 386-390 - Ronit Bustin, Rafael F. Schaefer, H. Vincent Poor

, Shlomo Shamai
:
On MMSE properties of "good" and "bad" codes for the Gaussian broadcast channel. 391-395 - Jin Sima, Wei Chen:

Multicasting messages over Gaussian broadcast channels with receiver message side information. 396-400 - Sina Lashgari, Ravi Tandon, Amir Salman Avestimehr:

A general outer bound for MISO broadcast channel with heterogeneous CSIT. 401-405 - Michael Heindlmaier, Shirin Saeedi Bidokhti:

Capacity regions of two-user broadcast erasure channels with feedback and hidden memory. 406-410
Mo-PM1-3: LDPC Code Analysis
- Louay Bazzi, Hani Audah:

Impact of redundant checks on the LP decoding thresholds of LDPC codes. 411-415 - Juane Li, Shu Lin

, Khaled A. S. Abdel-Ghaffar:
Improved message-passing algorithm for counting short cycles in bipartite graphs. 416-420 - David G. M. Mitchell, Michael Lentmaier, Ali Emre Pusane, Daniel J. Costello Jr.:

Approximating decoding thresholds of punctured LDPC code ensembles on the AWGN channel. 421-425 - Francisco Javier Cuadros Romero

, Brian M. Kurkoski:
Decoding LDPC codes with mutual information-maximizing lookup tables. 426-430 - Sudarsan V. S. Ranganathan, Dariush Divsalar, Richard D. Wesel:

On the girth of (3, L) quasi-cyclic LDPC codes based on complete protographs. 431-435
Mo-PM1-4: Lattice Codes 1
- Roope Vehkalahti

, Laura Luzzi:
Number field lattices achieve Gaussian and Rayleigh channel capacity within a constant gap. 436-440 - Ahmed Hindy, Aria Nosratinia

:
Achieving the ergodic capacity with lattice codes. 441-445 - Laura Luzzi, Roope Vehkalahti

:
Division algebra codes achieve MIMO block fading channel capacity within a constant gap. 446-450 - Jinming Wen, Xiao-Wen Chang:

A modified KZ reduction algorithm. 451-455 - Mayur Punekar, Joseph Jean Boutros, Ezio Biglieri:

A Poltyrev outage limit for lattices. 456-460
Mo-PM1-5: Source-Channel Coding 2
- Shraga I. Bross, Yaron Laufer:

Necessary condition for sending a bivariate Gaussian source over the "asymmetric" Gaussian MAC. 461-465 - Maël Le Treust:

Empirical coordination with two-sided state information and correlated source and state. 466-470 - Maël Le Treust:

Empirical coordination with channel feedback and strictly causal or causal encoding. 471-475 - Chao Tian, Jun Chen, Suhas N. Diggavi, Shlomo Shamai

:
Matched multiuser Gaussian source-channel communications via uncoded schemes. 476-480 - Erman Koken, Ertem Tuncel

, Deniz Gündüz
:
On the asymptotic distortion-energy tradeoff for zero-delay transmission of a Gaussian source over the AWGN channel. 481-485
Mo-PM1-6: Boolean Functions and Cryptography
- Tianze Wang, Meicheng Liu, Shangwei Zhao, Dongdai Lin:

Construction of cubic rotation symmetric bent functions in power-of-two variables. 486-490 - Baofeng Wu

, Jia Zheng, Dongdai Lin:
Constructing Boolean functions with (potentially) optimal algebraic immunity based on multiplicative decompositions of finite fields. 491-495 - Meicheng Liu, Dongdai Lin, Wenhao Wang:

Searching cubes for testing Boolean functions and its application to Trivium. 496-500 - Chia-Jung Lee, Satyanarayana V. Lokam, Shi-Chun Tsai, Ming-Chuan Yang

:
Restrictions of nondegenerate Boolean functions and degree lower bounds over different rings. 501-505 - Baofeng Wu

, Dongdai Lin:
On the dual of generalized Boolean bent functions over ℤ4. 506-510
Mo-PM1-7: Topics in Shannon Theory 1
- Venkat Chandar, Aslan Tchamkerten:

Asynchronous capacity per unit cost under a receiver sampling constraint. 511-515 - Sergey Loyka, Charalambos D. Charalambous

:
A general formula for compound channel capacity. 516-520 - Christos K. Kourtellaris, Charalambos D. Charalambous

, Joseph J. Boutros:
Nonanticipative transmission for sources and channels with memory. 521-525 - Anelia Somekh-Baruch:

On mismatched list decoding. 526-530 - Anelia Somekh-Baruch:

Multi-letter converse bounds for the mismatched discrete memoryless channel with an additive metric. 531-535
Mo-PM1-8: Algorithms for Compressed Sensing
- Chao-Bing Song, Shu-Tao Xia, Xin-Ji Liu:

Subspace thresholding pursuit: A reconstruction algorithm for compressed sensing. 536-540 - Xiaochen Zhao, Wei Dai:

On joint recovery of sparse signals with common supports. 541-545 - Pan Li, Wei Dai, Huadong Meng, Xiqin Wang:

On recovery of sparse signals with block structures. 546-550 - Siddhartha Satpathi, Luca Baldassarre, Volkan Cevher:

Sparse group covers and greedy tree approximations. 551-555 - Christos Thrampoulidis, Babak Hassibi:

Isotropically random orthogonal matrices: Performance of LASSO and minimum conic singular values. 556-560
Mo-PM1-9: Physical-Layer Network Coding
- Yihua Tan, Xiaojun Yuan

:
Compute-compress-and-forward. 561-565 - Yu-Chih Huang

, Krishna R. Narayanan, Ping-Chung Wang:
Adaptive compute-and-forward with lattice codes over algebraic integers. 566-570 - Shwan Ashrafi, Chen Feng

, Sumit Roy, Frank R. Kschischang
:
Slotted ALOHA with compute-and-forward. 571-575 - Islam El Bakoury, Bobak Nazer:

The impact of channel variation on integer-forcing receivers. 576-580 - Islam El Bakoury, Wenbo He, Bobak Nazer:

Integer-forcing interference alignment: Iterative optimization via aligned lattice reduction. 581-585
Mo-PM2-1: Topics in Network Coding 1
- Eli Ben-Sasson, Tuvi Etzion, Ariel Gabizon, Netanel Raviv:

Subspace polynomials and cyclic subspace codes. 586-590 - Srikanth B. Pai, B. Sundar Rajan:

On the bounds of certain maximal linear codes in a projective space. 591-595 - Natarajan Lakshmi Prasad

, Yi Hong
, Emanuele Viterbo
:
Capacity of coded index modulation. 596-600 - Bin Wang, Haibin Kan, Kenneth W. Shum:

Hermitian codes in distributed storage systems with optimal error-correcting capacity. 601-605 - Ardhendu Tripathy

, Aditya Ramamoorthy:
Capacity of sum-networks for different message alphabets. 606-610
Mo-PM2-2: The X-Channel
- Praneeth Kumar Vippathalla

, Srikrishna Bhashyam
:
On the sum capacity of the Gaussian x channel in the mixed interference regime. 611-615 - Zhao Wang, Ming Xiao

, Mikael Skoglund, H. Vincent Poor
:
Secrecy degrees of freedom of wireless X networks using artificial noise alignment. 616-620 - Abhinav Ganesan, Koteshwar Pavan Srinath:

Interference aligned space-time transmission with diversity for the 2 × 2 X-Network. 621-625 - Jingjing Zhang, Dirk T. M. Slock, Petros Elia

:
Achieving the DoF limits of the SISO X channel with imperfect-quality CSIT. 626-630 - Songze Li, David T. H. Kao, Amir Salman Avestimehr:

Rover-to-orbiter communication in Mars: Taking advantage of the varying topology. 631-635
Mo-PM2-3: Coding for Memory
- Zhiying Wang

, Han Mao Kiah, Yuval Cassuto:
Optimal binary switch codes with small query size. 636-640 - Hessam Mahdavifar, Alexander Vardy

:
Explicit capacity achieving codes for defective memories. 641-645 - Eyal En Gad, Wentao Huang, Yue Li, Jehoshua Bruck

:
Rewriting flash memories by message passing. 646-650 - Meysam Asadi, Erich F. Haratsch, Aleksandar Kavcic, Narayana P. Santhanam:

Write process modeling in MLC flash memories using renewal theory. 651-655 - Rami Cohen, Yuval Cassuto:

Algorithms and throughput analysis for MDS-coded switches. 656-660
Mo-PM2-4: Big Data Analytics
- Shao-Lun Huang, Lizhong Zheng:

A spectrum decomposition to the feature spaces and the application to big data analytics. 661-665 - Anders Høst-Madsen, Elyas Sabeti:

Atypical information theory for real-valued data. 666-670 - Pejman Khadivi, Ravi Tandon, Naren Ramakrishnan

:
Online denoising of discrete noisy data. 671-675 - Diego Mesa, Sanggyun Kim, Todd P. Coleman:

A scalable framework to transform samples from one continuous distribution to another. 676-680 - Sanggyun Kim, Diego Mesa, Todd P. Coleman:

Efficient total probability prediction via convex optimization and optimal transport. 681-685
Mo-PM2-5: Distributed Quantum Protocols
- Walter O. Krawec:

Security proof of a semi-quantum key distribution protocol. 686-690 - Masahito Hayashi

, Masaki Owari
:
Tight asymptotic bounds on local hypothesis testing between a pure bipartite state and the white noise state. 691-695 - Hiroaki Sasaki, Ryutaroh Matsumoto

, Tomohiko Uyematsu:
Key rate of the B92 quantum key distribution protocol with finite qubits. 696-699 - Eyuri Wakakuwa, Akihito Soeda, Mio Murao

:
Markovianizing cost of tripartite quantum states. 700-704 - Eyuri Wakakuwa, Akihito Soeda, Mio Murao

:
A coding theorem for bipartite unitaries in distributed quantum computation. 705-709
Mo-PM2-6: Key Generation and Distribution
- Jingbo Liu, Paul W. Cuff, Sergio Verdú:

Secret key generation with one communicator and a one-shot converse via hypercontractivity. 710-714 - Huishuai Zhang, Yingbin Liang, Lifeng Lai, Shlomo Shamai

:
Two-key generation for a cellular model with a helper. 715-719 - Wenwen Tu, Lifeng Lai:

On the simulatability condition in key generation over a non-authenticated public channel. 720-724 - Mitsugu Iwamoto, Junji Shikata:

Constructions of symmetric-key encryption with guessing secrecy. 725-729 - Christoph Pacher

, Philipp Grabenweger, Jesús Martínez-Mateo
, Vicente Martín:
An information reconciliation protocol for secret-key agreement with small leakage. 730-734
Mo-PM2-7: Information Measures
- Rami Atar, Neri Merhav:

Information-theoretic applications of the logarithmic probability comparison bound. 735-739 - Peter Harremoës

:
Lattices with non-Shannon inequalities. 740-744 - Siu-Wai Ho

, Sergio Verdú:
Convexity/concavity of renyi entropy and α-mutual information. 745-749 - Peng Xu, Mokshay M. Madiman:

The norm of the Fourier series operator. 750-754 - Jingbo Liu, Paul W. Cuff, Sergio Verdú:

Resolvability in Eγ with applications to lossy compression and wiretap channels. 755-759
Mo-PM2-8: Topics in Detection and Estimation 1
- Yanting Ma, Dror Baron

, Ahmad Beirami:
Mismatched estimation in large linear systems. 760-764 - Javad Heydari, Ali Tajer:

Quickest linear search over correlated sequences. 765-769 - Sirin Nitinawarat, Venugopal V. Veeravalli:

Universal quickest outlier detection and isolation. 770-774 - Ehsan Variani, Kamel Lahouel, Avner Bar-Hen, Bruno Jedynak:

NON-adaptive policies for 20 questions target localization. 775-778 - Pierre Moulin, Patrick R. Johnstone:

Strong large deviations for Rao test score and GLRT in exponential families. 779-783
Mo-PM2-9: Queueing
- Wonju Lee, Osvaldo Simeone

, Joonhyuk Kang, Sundeep Rangan, Petar Popovski
:
HARQ buffer management: An information-theoretic view. 784-788 - AmirEmad Ghassami, Xun Gong, Negar Kiyavash:

Capacity limit of queueing timing channel in shared FCFS schedulers. 789-793 - Matha Deghel, Mohamad Assaad, Mérouane Debbah:

Queueing stability and CSI probing of a TDD wireless network with interference alignment. 794-798 - Mustafa Ozmen, Mustafa Cenk Gursoy:

Energy efficiency in multiple-antenna channels with markov arrivals and queueing constraints. 799-803
Tu-AM1-SP1: Semi-Plenary Session 1A
- Chandra Chekuri

, Sudeep Kamath, Sreeram Kannan, Pramod Viswanath:
Delay-constrained unicast and the triangle-cast problem. 804-808 - Mohammad Ali Maddah-Ali, Urs Niesen:

Cache-aided interference channels. 809-813 - Han Mao Kiah, Gregory J. Puleo, Olgica Milenkovic:

Codes for DNA sequence profiles. 814-818 - Yuval Cassuto, Koby Crammer:

In-memory hamming similarity computation in resistive arrays. 819-823
Tu-AM1-SP2: Semi-Plenary Session 1B
- Yihong Wu, Pengkun Yang:

Optimal entropy estimation on large alphabets via best polynomial approximation. 824-828 - Varun S. Jog, Venkat Anantharam:

On the geometry of convex typical sets. 829-833 - Hyeji Kim, Benjamin Nachman, Abbas El Gamal:

Superposition coding is almost always optimal for the Poisson broadcast channel. 834-838 - Jiantao Jiao, Kartik Venkat, Yanjun Han, Tsachy Weissman:

Maximum Likelihood Estimation of information measures. 839-843
Tu-AM2-1: Regenerating Codes 1
- Chao Tian, Tie Liu:

Multilevel diversity coding with regeneration. 844-848 - Imad Ahmad

, Chih-Chun Wang:
When locally repairable codes meet regenerating codes - What if some helpers are unavailable. 849-853 - Ximing Fu

, Zhiqing Xiao, Shenghao Yang:
Overhead-free in-place recovery and repair schemes of XOR-based regenerating codes. 854-858 - N. Prakash, M. Nikhil Krishnan

:
The storage-repair-bandwidth trade-off of exact repair linear regenerating codes for the case d = k = n - 1. 859-863
Tu-AM2-2: Interference Alignment 1
- Jingwen Bai, Suhas N. Diggavi, Ashutosh Sabharwal:

On degrees-of-freedom of multi-user MIMO full-duplex network. 864-868 - Sang-Woon Jeon, Sung Ho Chae, Sung Hoon Lim

:
Degrees of freedom of full-duplex multiantenna cellular networks. 869-873 - Vasilis Ntranos, Mohammad Ali Maddah-Ali, Giuseppe Caire:

Cooperation alignment for distributed interference management. 874-878 - Kaniska Mohanty, Mahesh K. Varanasi:

The degrees of freedom region of the 3-User MIMO cyclic Z-interference channel with perfect and delayed CSIT. 879-883
Tu-AM2-3: Spatially-Coupled Codes
- Eirik Rosnes:

On the minimum distance of array-based spatially-coupled low-density parity-check codes. 884-888 - Markus Stinner, Pablo M. Olmos:

Finite-length performance of multi-edge protograph-based spatially coupled LDPC codes. 889-893 - Kechao Huang, Xiao Ma, Daniel J. Costello Jr.:

EXIT chart analysis of block markov superposition transmission of short codes. 894-898 - Masaru Fukushima, Takuya Okazaki, Kenta Kasai:

Spatially-coupled MacKay-Neal codes universally achieve the symmetric information rate of arbitrary generalized erasure channels with memory. 899-903
Tu-AM2-4: Sequence Assembly and DNA Storage
- Farzad Farnoud, Moshe Schwartz

, Jehoshua Bruck
:
A stochastic model for genomic interspersed duplication. 904-908 - Ryan Gabrys, Han Mao Kiah, Olgica Milenkovic:

Asymmetric Lee distance codes for DNA-based storage. 909-913 - Govinda M. Kamath, Eren Sasoglu, David N. C. Tse:

Optimal haplotype assembly from high-throughput mate-pair reads. 914-918 - Ilan Shomorony, Thomas A. Courtade, David N. C. Tse:

Do read errors matter for genome assembly? 919-923
Tu-AM2-5: Error Exponents 2
- Yasutada Oohama, Yutaka Jitsumatsu:

A new iterative algorithm for computing the optimal exponent of correct decoding for discrete memoryless channels. 924-928 - Gonzalo Vazquez-Vilar, Alfonso Martinez

, Albert Guillen i Fabregas:
A derivation of the cost-constrained sphere-packing exponent. 929-933 - Venkat Anantharam, François Baccelli:

On error exponents for a dimension-matched vector MAC with additive noise. 934-938 - Yasutada Oohama:

Strong converse exponent for degraded broadcast channels at rates outside the capacity region. 939-943
Tu-AM2-6: Information Theoretic Security
- Parthajit Mohapatra, Chandra R. Murthy

:
Capacity of the deterministic z-interference channel with unidirectional transmitter cooperation and secrecy constraints. 944-948 - Prakash Narayan, Himanshu Tyagi, Shun Watanabe

:
Common randomness for secure computing. 949-953 - Athanasios Papadopoulos, László Czap, Christina Fragouli:

LP formulations for secrecy over erasure networks with feedback. 954-958 - Yvo Desmedt, Kirill Morozov:

Parity Check based redistribution of secret shares. 959-963
Tu-AM2-7: Topics in Shannon Theory 2
- Taehyung J. Lim, Massimo Franceschetti:

Bits of Kolmogorov and Shannon in a deterministic setting. 964-968 - Yonatan Kaspi, Ofer Shayevitz, Tara Javidi

:
Searching for multiple targets with measurement dependent noise. 969-973 - Qi Chen, Fan Cheng, Tie Liu, Raymond W. Yeung:

A marginal characterization of entropy functions for conditional mutually independent random variables (with application to Wyner's common information). 974-978 - Benjamin Larrousse, Samson Lasaulce, Michèle A. Wigger:

Coordination in state-dependent distributed networks: The two-agent case. 979-983
Tu-AM2-8: Applications of Compressed Sensing 1
- Yuanxin Li, Yuejie Chi

:
Super-resolution of mutually interfering signals. 984-988 - Ramtin Pedarsani, Kangwook Lee, Kannan Ramchandran:

Capacity-approaching PhaseCode for low-complexity compressive phase retrieval. 989-993 - Francesco Renna

, Liming Wang, Xin Yuan
, Jianbo Yang, Galen Reeves, A. Robert Calderbank, Lawrence Carin
, Miguel R. D. Rodrigues:
Classification and reconstruction of compressed GMM signals with side information. 994-998 - Erwin Riegler, Georg Tauböck

:
Almost lossless analog compression without phase information. 999-1003
Tu-AM2-9: Cellular Networks
- Maria Gregori, Jesús Gómez-Vilardebó

, Javier Matamoros, Deniz Gündüz
:
Joint transmission and caching policy design for energy minimization in the wireless backhaul link. 1004-1008 - Radha Krishna Ganti

, Martin Haenggi:
SIR asymptotics in general cellular network models. 1009-1013 - Zhengchuan Chen, Pingyi Fan

, Tao Li, Khaled Ben Letaief
:
On the cooperation gain in 5g heterogeneous networking systems. 1014-1018 - Can Karakus, Suhas N. Diggavi:

Opportunistic scheduling for full-duplex uplink-downlink networks. 1019-1023
Tu-PM1-1: Index Coding
- Chandra Thapa

, Lawrence Ong
, Sarah J. Johnson
:
A new index coding scheme exploiting interlinked cycles. 1024-1028 - Anoop Thomas, B. Sundar Rajan:

Error correcting index codes and matroids. 1029-1033 - Fatemeh Arbabjolfaei, Young-Han Kim:

Structural properties of index coding capacity using fractional graph theory. 1034-1038 - Anoop Thomas, B. Sundar Rajan:

Vector linear error correcting index codes and discrete polymatroids. 1039-1043 - R. Kavitha, B. Sundar Rajan:

On the number of optimal index codes. 1044-1048
Tu-PM1-2: Degrees of Freedom in Networks
- Tang Liu, Daniela Tuninetti

, Sae-Young Chung:
On the DoF of two-user interference channel with an instantaneous relay. 1049-1053 - Hua Sun, Syed Ali Jafar

:
On the separability of GDoF region for parallel Gaussian TIN optimal interference networks. 1054-1058 - Sunghyun Kim, I-Hsiang Wang, Changho Suh

:
A relay can increase degrees of freedom in bursty mimo interference networks. 1059-1063 - Yao Wang, Mahesh K. Varanasi:

Degrees of freedom region of the MIMO two-transmit, two-receive network with General message sets. 1064-1068 - Jinyuan Chen, Andrea Goldsmith, Ayfer Özgür

, Sheng Yang:
Degrees of freedom of the MIMO interference channel with parallel multicasting. 1069-1073
Tu-PM1-3: Design of LDPC Codes
- Anatoly Khina

, Yair Yona, Uri Erez:
LDPC code ensembles that universally achieve capacity under BP decoding: A simple derivation. 1074-1078 - Madiagne Diouf, David Declercq, Samuel Ouya

, Bane Vasic:
A PEG-like LDPC code design avoiding short trapping sets. 1079-1083 - Shahrouz Sharifi, Ahmet Korhan Tanc

, Tolga Mete Duman:
LDPC code design for binary-input binary-output Z interference channels. 1084-1088 - Fabian Steiner, Georg Böcherer, Gianluigi Liva:

Protograph-based LDPC code design for bit-metric decoding. 1089-1093 - Min Zhu, Yun Wei, Baoming Bai, Xiao Ma:

Nonbinary Kite codes: A family of nonbinary rate-compatible LDPC codes. 1094-1098
Tu-PM1-4: Quantum Codes
- Ryuhei Mori

:
Holographic transformation, belief propagation and loop calculus for generalized probabilistic theories. 1099-1103 - Markus Grassl

, Martin Rötteler
:
Quantum MDS codes over small fields. 1104-1108 - Arjun Bhagoji

, Pradeep Kiran Sarvepalli
:
Equivalence of 2D color codes (without translational symmetry) to surface codes. 1109-1113 - Yuichiro Fujiwara:

Global stabilizer quantum error correction with combinatorial arrays. 1114-1118 - Martin Suchara

, Andrew W. Cross, Jay M. Gambetta:
Leakage suppression in the toric code. 1119-1123
Tu-PM1-5: Energy Harvesting Communications
- Anshoo Tandon

, Mehul Motani
, Lav R. Varshney:
Real-time simultaneous energy and information transfer. 1124-1128 - Omur Ozel, Sennur Ulukus, Pulkit Grover

:
Optimal scheduling for energy harvesting transmitters under temperature constraints. 1129-1133 - Jingxian Wu

, Israel Akingeneye, Jing Yang
:
Optimum sensing of a time-varying random event with energy harvesting power sources. 1134-1138 - Rajeev Gangula, Deniz Gündüz

, David Gesbert
:
Distributed compression and transmission with energy harvesting sensors. 1139-1143 - Hajar Mahdavi-Doost, Roy D. Yates:

Hybrid ARQ in block-fading channels with an energy harvesting receiver. 1144-1148
Tu-PM1-6: Wiretap Channel 1
- Wanyao Zhao, Ashish Khisti:

Gaussian wiretap channel with shared keys between transmitter and helpers. 1149-1153 - Germán Bassi

, Pablo Piantanida, Shlomo Shamai
:
On the capacity of the wiretap channel with generalized feedback. 1154-1158 - Mohamed S. Nafea, Aylin Yener:

Wiretap channel II with a noisy main channel. 1159-1163 - Bikash Kumar Dey, Sidharth Jaggi

, Michael Langberg:
Sufficiently myopic adversaries are blind. 1164-1168 - Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas N. Diggavi:

On the oblivious transfer capacity of the degraded wiretapped binary erasure channel. 1169-1173
Tu-PM1-7: Information Theory and Statistics
- Varun S. Jog, Po-Ling Loh:

On model misspecification and KL separation for Gaussian graphical models. 1174-1178 - Mehdi Molkaraie:

An importance sampling scheme for models in a strong external field. 1179-1183 - Alaa Saade, Marc Lelarge, Florent Krzakala

, Lenka Zdeborová:
Spectral detection in the censored block model. 1184-1188 - Matthew L. Malloy, Scott Alfeld, Paul Barford:

Contamination estimation via convex relaxations. 1189-1193 - Amir Sani, Alessandro Lazaric, Daniil Ryabko:

The replacement bootstrap for dependent data. 1194-1198
Tu-PM1-8: Pattern Recognition and Learning
- Daniil Ryabko, Boris Ryabko:

Predicting the outcomes of every process for which an asymptotically accurate stationary predictor exists is impossible. 1204-1206 - Michael Tschannen, Helmut Bölcskei:

Nonparametric nearest neighbor random process clustering. 1207-1211 - Thomas Wiatowski, Helmut Bölcskei:

Deep convolutional neural networks based on semi-discrete frames. 1212-1216 - Zhizhong Li

, Deli Zhao, Zhouchen Lin, Edward Y. Chang:
Determining step sizes in geometric optimization algorithms. 1217-1221
Tu-PM1-9: Massive MIMO 1
- Chuili Kong, Caijun Zhong

, Anastasios K. Papazafeiropoulos
, Michail Matthaiou
, Zhaoyang Zhang
:
Effect of channel aging on the sum rate of uplink massive MIMO systems. 1222-1226 - Charles Jeon, Ramina Ghods

, Arian Maleki, Christoph Studer:
Optimality of large MIMO detection via approximate message passing. 1227-1231 - Ada S. Y. Poon, David N. C. Tse:

Does superdirectivity increase the degrees of freedom in wireless channels? 1232-1236 - Chao-Kai Wen

, Shi Jin, Kai-Kit Wong, Chang-Jen Wang
, Gang Wu
:
Joint cHANNEL-AND-dATA estimation for large-MIMO systems with low-precision ADCs. 1237-1241 - Erdem Koyuncu

, Hamid Jafarkhani
:
Interleaving training and limited feedback for point-to-point massive multiple-antenna systems. 1242-1246
Tu-PM2-1: Locally Repairable Codes 1
- Natalia Silberstein, Alexander Zeh:

Optimal binary locally repairable codes via anticodes. 1247-1251 - Alexander Barg, Itzhak Tamo, Serge G. Vladut:

Locally recoverable codes on algebraic curves. 1252-1256 - Birenjith Sasidharan

, Gaurav Kumar Agarwal
, P. Vijay Kumar:
Codes with hierarchical locality. 1257-1261 - Itzhak Tamo, Alexander Barg, Sreechakra Goparaju, A. Robert Calderbank:

Cyclic LRC codes and their subfield subcodes. 1262-1266
Tu-PM2-2: Relay Networks 1
- Martina Cardone, Daniela Tuninetti

, Raymond Knopp:
Gaussian MIMO half-duplex relay networks: Approximate optimality of simple schedules. 1267-1271 - Yanying Chen, Natasha Devroye:

On the optimality of Colour-and-Forward relaying for a class of zero-error primitive relay channels. 1272-1276 - Si-Hyeon Lee

, Sae-Young Chung:
A unified approach for network information theory. 1277-1281 - Xiugang Wu, Liang-Liang Xie, Ayfer Özgür

:
Upper bounds on the capacity of symmetric primitive relay channels. 1282-1286
Tu-PM2-3: On Polarization and Polar Code Construction
- Narayanan Rengaswamy

, Henry D. Pfister
:
Cyclic polar codes. 1287-1291 - Kasra Vakilinia, Dariush Divsalar, Richard D. Wesel:

RCA analysis of the polar codes and the use of feedback to aid polarization at short blocklengths. 1292-1296 - Ido Tal:

On the construction of polar codes for channels with moderate input alphabet sizes. 1297-1301
Tu-PM2-4: Coding for Memory and Distributed Storage
- Wael Halbawi, Matthew Thill, Babak Hassibi:

Coding with constraints: Minimum distance bounds and systematic constructions. 1302-1306 - Tadashi Wadayama, Taisuke Izumi, Hirotaka Ono

:
Subgraph domatic problem and writing capacity of memory devices with restricted state transitions. 1307-1311 - Tetsuya Kobayashi, Hiroyoshi Morita, Akiko Manada:

On rate tradeoffs for erasable write-once memory codes. 1312-1316 - Qi Cao, Ning Cai, Wangmei Guo:

Zero-error capacity of binary channels with 1-memory. 1317-1321
Tu-PM2-5: Information Theory for Biology 1
- Hans-Andrea Loeliger, Sarah Neff:

Pulse-domain signal parsing and neural computation. 1322-1326 - Nicolò Michelusi

, Urbashi Mitra:
Capacity of bacterial cables via Electron-transfer under full-CSI. 1327-1331 - Arash Einolghozati, Faramarz Fekri

:
Rate-distortion in molecular signal sensing with ligand receptors. 1332-1336 - Erik C. Johnson, Douglas L. Jones, Rama Ratnam

:
Minimum squared-error, energy-constrained encoding by adaptive threshold models of neurons. 1337-1341
Tu-PM2-6: Secrecy in Broadcast Channels 1
- Ziv Goldfeld, Gerhard Kramer

, Haim H. Permuter
:
Cooperative broadcast channels with a secret message. 1342-1346 - Yanling Chen, Onur Ozan Koyluoglu, Aydin Sezgin

:
On the individual secrecy rate region for the broadcast channel with an external eavesdropper. 1347-1351 - Manoj Mishra, Tanmay Sharma, Bikash Kumar Dey, Vinod M. Prabhakaran:

Private data transfer over a broadcast channel. 1352-1356 - Shaofeng Zou, Yingbin Liang, Lifeng Lai, Shlomo Shamai

:
Rate splitting and sharing for degraded broadcast channel with secrecy outside a bounded range. 1357-1361
Tu-PM2-7: Estimation of Distributions and Their Functionals
- Yuichi Kaji:

Bounds on the entropy of multinomial distribution. 1362-1366 - Yanjun Han, Jiantao Jiao, Tsachy Weissman:

Does dirichlet prior smoothing solve the Shannon entropy estimation problem? 1367-1371 - Yanjun Han, Jiantao Jiao, Tsachy Weissman:

Adaptive estimation of Shannon entropy. 1372-1376 - Farzan Farnia

, Meisam Razaviyayn, Sreeram Kannan, David Tse:
Minimum HGR correlation principle: From marginals to joint distribution. 1377-1381
Tu-PM2-8: Streaming and Zero-Delay Source Coding
- Richard G. Wood, Tamás Linder, Serdar Yüksel:

Optimality of Walrand-Varaiya type policies and approximation results for zero delay coding of Markov sources. 1382-1386 - Jhelum Chakravorty, Aditya Mahajan:

Distortion-transmission trade-off in real-time transmission of Gauss-Markov sources. 1387-1391 - Farrokh Etezadi, Ashish Khisti

, Jun Chen:
Price of perfection: Limited prediction for streaming over erasure channels. 1392-1396 - Farrokh Etezadi, Ashish Khisti:

Delay-constrained streaming of Gauss-Markov sources over erasure channels. 1397-1401
Tu-PM2-9: Scheduling in Wireless Networks
- Matthew Johnston, Eytan H. Modiano:

Scheduling over time varying channels with hidden state information. 1402-1406 - Matthew Johnston, Eytan H. Modiano:

A new look at wireless scheduling with delayed information. 1407-1411 - Bo Zhou

, Ying Cui, Meixia Tao:
Optimal dynamic multicast scheduling for cache-enabled content-centric wireless networks. 1412-1416 - Wenbo He, Chen Feng, Corina I. Ionita, Bobak Nazer:

Collision scheduling for cellular networks. 1417-1421
We-AM1-SP1: Semi-Plenary Session 2A
- Marco Mondelli

, Rüdiger L. Urbanke, Seyed Hamed Hassani:
Unified scaling of polar codes: Error exponent, scaling exponent, moderate deviations, and error floors. 1422-1426 - Rajai Nasser, Emre Telatar:

Fourier analysis of MAC polarization. 1427-1431 - Mohammad Mahdi Mojahedian, Amin Gohari, Mohammad Reza Aref:

Perfectly secure index coding. 1432-1436 - Christopher G. Blake, Frank R. Kschischang

:
Scaling Rules for the Energy of Decoder Circuits. 1437-1441
We-AM1-SP2: Semi-Plenary Session 2B
- Bruce E. Hajek

, Yihong Wu, Jiaming Xu:
Achieving exact cluster recovery threshold via semidefinite programming. 1442-1446 - Masahito Hayashi

, Marco Tomamichel
:
Correlation detection and an operational interpretation of the Rényi mutual information. 1447-1451 - Hiroki Koga:

On a partition of a finite set and its relationships to encoding tasks and the Rényi entropy. 1452-1456 - Jingbo Liu, Paul Cuff, Sergio Verdú:

One-shot mutual covering lemma and Marton's inner bound with a common message. 1457-1461
We-AM2-1: Distributed Storage
- Netanel Raviv, Tuvi Etzion:

Distributed storage systems based on intersecting subspace codes. 1462-1466 - Swanand Kadhe

, Emina Soljanin
, Alex Sprintson:
Analyzing the download time of availability codes. 1467-1471 - Salim El Rouayheb, Sreechakra Goparaju, Han Mao Kiah, Olgica Milenkovic:

Synchronizing edits in distributed storage networks. 1472-1476 - Ankit Singh Rawat

, Zhao Song, Alexandros G. Dimakis, Anna Gál:
Batch codes through dense graphs without short cycles. 1477-1481 - Brijesh Kumar Rai

, Vommi Dhoorjati, Lokesh Saini, Amit K. Jha:
On adaptive distributed storage systems. 1482-1486
We-AM2-2: Interference Alignment 2
- Subhashini Krishnasamy, Urs Niesen, Piyush Gupta:

On the scaling of interference alignment under delay and power constraints. 1487-1491 - Marc Torrellas, Adrian Agustin

, Josep Vidal:
Retrospective Interference Alignment for the MIMO interference broadcast channel. 1492-1496 - Mohammad Ali Khojastepour, Mohammad Farajzadeh-Tehrani

:
A sufficient condition for interference alignment. 1497-1501 - Aly El Gamal, Navid Naderializadeh

, Amir Salman Avestimehr:
When does an ensemble of matrices with randomly scaled rows lose rank? 1502-1506 - Muryong Kim, Sriram Vishwanath:

Layered lattice coding for the symmetric Gaussian X channel. 1507-1511
We-AM2-3: Applications of Polar Codes
- Remi A. Chou

, Matthieu R. Bloch, Jörg Kliewer:
Polar coding for empirical and strong coordination via distribution approximation. 1512-1516 - Runxin Wang, Junya Honda, Hirosuke Yamamoto

, Rongke Liu:
FV polar coding for lossy compression with an improved exponent. 1517-1521 - Salman Salamatian, Muriel Médard, Emre Telatar:

A Successive Description property of Monotone-Chain Polar Codes for Slepian-Wolf coding. 1522-1526 - David Burshtein:

Coding for asymmetric side information channels with applications to polar codes. 1527-1531 - Lele Wang:

Polar coding for relay channels. 1532-1536
We-AM2-4: Construction of Sequences
- Ki-Hyeon Park, Hong-Yeop Song, Dae San Kim:

Families of perfect polyphase sequences from the array structure of Fermat-Quotient sequences and Frank-Zadoff sequences. 1537-1540 - Serdar Boztas

, Seda Kahraman, Ferruh Özbudak
, Eda Tekin
:
A generalized construction for perfect autocorrelation sequences. 1541-1545 - Jin-Ho Chung, Kyeongcheol Yang:

Three new families of optimal variable-weight optical orthogonal codes. 1546-1550 - Yang Yang, Xiaohu Tang, Zhengchun Zhou

:
Binary sequences with optimal odd periodic autocorrelation. 1551-1554 - Yang Yang, Xiaohu Tang, Zhengchun Zhou

:
Binary signature set with optimal odd periodic total squared correlation. 1555-1559
We-AM2-5: Multi-Terminal Source Coding 1
- Neri Merhav:

Statistical physics of random binning. 1560-1564 - Nir Weinberger, Neri Merhav:

Optimum trade-offs between error exponent and excess-rate exponent of Slepian-Wolf coding. 1565-1569 - Tomohiko Uyematsu, Tetsunao Matsuta:

Source coding with side information at the decoder revisited. 1570-1574 - Yasutada Oohama:

Exponent function for one helper source coding problem at rates outside the rate region. 1575-1579 - Farhad Shirani Chaharsooghi

, Mohsen Heidari, S. Sandeep Pradhan:
New lattice codes for multiple-descriptions. 1580-1584
We-AM2-6: Security in Various Settings
- Annina Bracher, Eran Hof, Amos Lapidoth:

Guessing Attacks on Distributed-Storage Systems. 1585-1589 - Hugues Mercier, Maxime Augier, Arjen K. Lenstra:

STEP-archival: Storage integrity and anti-tampering using data entanglement. 1590-1594 - Marcel Fernandez, Grigory Kabatiansky, José Moreira:

Almost IPP-codes or provably secure digital fingerprinting codes. 1595-1599 - V. Sriram Siddhardh Nadendla

, Yunghsiang Sam Han, Pramod K. Varshney:
Information-dispersal games for security in cognitive-radio networks. 1600-1604 - Maggie Mhanna, Pablo Piantanida:

On secure distributed hypothesis testing. 1605-1609
We-AM2-7: Information Measures and Statistics
- Igal Sason:

On the Rényi divergence and the joint range of relative entropies. 1610-1614 - Josep Font-Segura

, Jaume Riba
, Gregori Vázquez
:
Sphericity minimum description length: Asymptotic performance under unknown noise variance. 1615-1619 - Mehrdad Khatami

, Mohsen Bahrami, Bane Vasic:
Symmetric information rate estimation and bit aspect ratio optimization for TDMR using Generalized Belief Propagation. 1620-1624 - Jae Oh Woo, Mokshay M. Madiman:

A discrete entropy power inequality for uniform distributions. 1625-1629 - Dmitri S. Pavlichin:

Nearest symmetric distributions. 1630-1634
We-AM2-8: Compressed Sensing and Sparsity
- Thibault Lesieur, Florent Krzakala

, Lenka Zdeborová:
Phase transitions in sparse PCA. 1635-1639 - Sundeep Rangan, Alyson K. Fletcher, Philip Schniter, Ulugbek S. Kamilov:

Inference for Generalized Linear Models via alternating directions and Bethe Free Energy minimization. 1640-1644 - Xiao Li, Sameer Pawar, Kannan Ramchandran:

Sub-linear time compressed sensing using sparse-graph codes. 1645-1649 - Ruiyang Song, Yao Xie, Sebastian Pokutta:

Sequential sensing with model mismatch. 1650-1654 - Kishore Jaganathan, Yonina C. Eldar, Babak Hassibi:

Phase retrieval with masks using convex optimization. 1655-1659
We-AM2-9: Optical Communication and Networking
- Qun Zhang, Terence H. Chan

:
A spectral domain noise model for optical fibre channels. 1660-1664 - Si-Hui Tan

, Zachary Dutton, Ranjith Nair, Saikat Guha:
Finite codelength analysis of the sequential waveform nulling receiver for M-ary PSK. 1665-1670 - Yan-Yu Zhang

, Hong-Yi Yu, Jian-Kang Zhang, Yi-Jun Zhu, Jin-Long Wang, Tao Wang:
Full large-scale diversity space codes for MIMO optical wireless communications. 1671-1675 - Sander Wahls

, H. Vincent Poor
:
Fast inverse nonlinear Fourier transform for generating multi-solitons in optical fiber. 1676-1680 - Longbo Huang, Eytan H. Modiano:

Optimizing age-of-information in a multi-class queueing system. 1681-1685
Th-AM1-1: Coded Caching
- Jinbei Zhang, Xiaojun Lin, Chih-Chun Wang, Xinbing Wang:

Coded caching for files with distinct file sizes. 1686-1690 - Avik Sengupta, Ravi Tandon, T. Charles Clancy:

Improved approximation of storage-rate tradeoff for caching via new outer bounds. 1691-1695 - Hooshang Ghasemi, Aditya Ramamoorthy:

Improved lower bounds for coded caching. 1696-1700 - Jad Hachem, Nikhil Karamchandani, Suhas N. Diggavi:

Effect of number of users in multi-level coded caching. 1701-1705
Th-AM1-2: Treating Interference as Noise
- Chunhua Geng, Syed Ali Jafar

:
On the optimality of treating interference as noise for K-user compound interference channels. 1706-1710 - Shuo Li, Yu-Chih Huang

, Tie Liu, Henry D. Pfister
:
On the limits of treating interference as noise for two-user symmetric Gaussian interference channels. 1711-1715 - Alex Dytso

, Daniela Tuninetti
, Natasha Devroye:
i.i.d. mixed inputs and treating interference as noise are gDoF optimal for the symmetric Gaussian two-user interference channel. 1716-1720 - Xinping Yi, Giuseppe Caire:

On the optimality of treating interference as noise: A combinatorial optimization perspective. 1721-1725
Th-AM1-3: Coding for Flash Memory 1
- Faruk Göloglu

, Jüri Lember, Ago-Erik Riet
, Vitaly Skachek:
New bounds for permutation codes in Ulam metric. 1726-1730 - Moshe Schwartz

, Pascal O. Vontobel
:
Bounds on the size of balls over permutations with the infinity metric. 1731-1735 - Sarit Buzaglo, Paul H. Siegel, Eitan Yaakobi:

Coding schemes for inter-cell interference in flash memory. 1736-1740 - Yeow Meng Chee

, Van Khu Vu, Xiande Zhang:
Permutation codes correcting a single burst deletion I: Unstable deletions. 1741-1745
Th-AM1-4: Analysis of Coding Systems
- Stanislav Krajci

, Chin-Fu Liu, Ladislav Mikes, Stefan M. Moser:
Performance analysis of Fano coding. 1746-1750 - Po-Ning Chen

, Hsuan-Yin Lin, Stefan M. Moser:
Nonlinear codes outperform the best linear codes on the binary erasure channel. 1751-1755 - Jia Liu, Xiao Ma:

Improved Hamming sphere bounds on the MLD performance of binary linear codes. 1756-1760 - Jun Yang, Fady Alajaji, Glen Takahara:

On bounding the union probability. 1761-1765
Th-AM1-5: Multi-Terminal Source Coding 2
- Shigeaki Kuzuoka, Shun Watanabe

:
A dichotomy of functions in distributed coding: An information spectral approach. 1766-1770 - Leonardo Rey Vega

, Pablo Piantanida, Alfred O. Hero III:
On the rate-distortion regions for interactive source coding. 1771-1775 - Chien-Yi Wang, Sung Hoon Lim

, Michael Gastpar:
Information-theoretic caching. 1776-1780 - Yinfei Xu, Jun Chen, Qiao Wang:

On the sum rate of multiple description coding with tree-structured distortion constraints. 1781-1785
Th-AM1-6: Privacy
- Masahito Hayashi

, Toyohiro Tsurumaru:
More efficient privacy amplification with less random seeds. 1786-1790 - Kittipong Kittichokechai, Giuseppe Caire:

Secret key-based authentication with a privacy constraint. 1791-1795 - Flávio P. Calmon, Ali Makhdoumi, Muriel Médard:

Fundamental limits of perfect privacy. 1796-1800 - Murat A. Erdogdu, Nadia Fawaz

:
Privacy-utility trade-off under continual observation. 1801-1805
Th-AM1-7: Finite Blocklength Analysis 2
- Himanshu Tyagi, Pramod Viswanath, Shun Watanabe

:
Interactive communication for data exchange. 1806-1810 - Tetsunao Matsuta, Tomohiko Uyematsu:

Non-asymptotic bounds for fixed-length lossy compression. 1811-1815 - Yucel Altug, H. Vincent Poor

, Sergio Verdú:
On fixed-length channel coding with feedback in the moderate deviations regime. 1816-1820 - Masahito Hayashi

, Vincent Yan Fu Tan:
Erasure and undetected error probabilities in the moderate deviations regime. 1821-1825
Th-AM1-8: Matrix Completion
- Brian Lois, Namrata Vaswani

:
Online matrix completion and online robust PCA. 1826-1830 - Yuanming Shi

, Jun Zhang, Khaled Ben Letaief
:
Low-rank matrix completion via Riemannian pursuit for topological interference management. 1831-1835 - Erwin Riegler, David Stotz, Helmut Bölcskei:

Information-theoretic limits of matrix completion. 1836-1840 - Yang Cao, Yao Xie:

Poisson matrix completion. 1841-1845
Th-AM1-9: Cognitive Communication and Sensor Networks
- Diana Maamari, Daniela Tuninetti

, Natasha Devroye:
On the sum-capacity of the cognitive interference channel with cognitive-only message sharing. 1846-1850 - Osama Amin

, Walid Abediseid
, Mohamed-Slim Alouini
:
Outage performance of cognitive radio systems with Improper Gaussian signaling. 1851-1855 - Sang-Woon Jeon, Bang Chul Jung

:
Opportunistic in-network computation for wireless sensor networks. 1856-1860 - Jing Yue, Zihuai Lin

, Guoqiang Mao
, Branka Vucetic
:
Design and performance analysis of network code division multiplexing for wireless sensor networks. 1861-1865
Th-AM2-1: Locally Repairable Codes 2
- Anyu Wang

, Zhifang Zhang, Mulan Liu:
Achieving arbitrary locality and availability in binary codes. 1866-1870 - Pengfei Huang, Eitan Yaakobi, Hironori Uchikawa, Paul H. Siegel:

Linear locally repairable codes with availability. 1871-1875 - Junyu Chen, Kenneth W. Shum, Quan Yu, Chi Wan Sung:

Sector-disk codes and partial MDS codes with up to three global parities. 1876-1880 - Balaji Srinivasan Babu, P. Vijay Kumar:

On partial maximally-recoverable and maximally-recoverable codes. 1881-1885
Th-AM2-2: Multiway Relay Channels
- Lawrence Ong

:
Capacity results for the multi-way relay channel with common messages. 1886-1890 - Lawrence Ong

:
The half-duplex Gaussian two-way relay channel with direct links. 1891-1895 - Mehdi Ashraphijuo, Vaneet Aggarwal

, Xiaodong Wang:
Capacity of two-way linear deterministic diamond channel. 1896-1900 - Shih-Chun Lin

, I-Hsiang Wang:
On two-pair two-way relay channel with an intermittently available relay. 1901-1905
Th-AM2-3: LDPC Code Encoding and Analysis
- Chu-Hsiang Huang, Yao Li, Lara Dolecek:

Adaptive error correction coding scheme for computations in the noisy min-sum decoder. 1906-1910 - Takayuki Nozaki

:
Parallel encoding algorithm for LDPC codes based on block-diagonalization. 1911-1915 - Pavel Panteleev:

Fast systematic encoding of quasi-cyclic codes using the Chinese remainder theorem. 1916-1920 - Jossy Sayir

, Joned Sarwar:
An investigation of SUDOKU-inspired non-linear codes with local constraints. 1921-1925
Th-AM2-4: Combinatorial Coding Theory
- Louay Bazzi:

Weight distribution of cosets of small codes with good dual properties. 1926-1930 - Yeow Meng Chee

, Yang Li, Xiande Zhang:
Spectrum of sizes for perfect burst deletion-correcting codes. 1931-1935 - Michael Langberg, Moshe Schwartz

, Eitan Yaakobi:
Coding for the ℓ∞-limited permutation channel. 1936-1940 - Son Hoang Dau

, Wentu Song, Chau Yuen:
Weakly secure MDS codes for simple multiple access networks. 1941-1945
Th-AM2-5: Information Theory for Biology 2
- Siddharth Jain, Farzad Farnoud, Jehoshua Bruck

:
Capacity and expressiveness of genomic tandem duplication. 1946-1950 - Gholamali Aminian, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari, Faramarz Fekri

:
On the capacity of level and type modulations in Molecular communication with ligand receptors. 1951-1955 - Hessam Mahdavifar, Ahmad Beirami:

Diffusion channel with Poisson reception process: capacity results and applications. 1956-1960 - Toby Berger, Mustafa Sungkar:

Design of efficient channels with given input statistics. 1961-1965
Th-AM2-6: Secrecy in Broadcast Channels 2
- Pritam Mukherjee, Ravi Tandon, Sennur Ulukus:

Secrecy for MISO broadcast channels with heterogeneous CSIT. 1966-1970 - Rafael F. Schaefer, Ashish Khisti

, H. Vincent Poor
:
How to use independent secret keys for secure broadcasting of common messages. 1971-1975 - Sheng Yang, Mari Kobayashi:

Secure communication in K-user multi-antenna broadcast channel with state feedback. 1976-1980 - Anatoly Khina

, Yuval Kochman, Ashish Khisti
:
The confidential MIMO broadcast capacity: A simple derivation. 1981-1985
Th-AM2-7: Universal Source Coding
- Shota Saito

, Nozomi Miya, Toshiyasu Matsushima:
Fundamental limit and pointwise asymptotics of the Bayes code for Markov sources. 1986-1990 - Ayush Jain, Rakesh Kumar Bansal:

On redundancy rate of FDLZ algorithm and its variants. 1991-1995 - Nematollah Iri, Oliver Kosut:

Third-order coding rate for universal compression of Markov sources. 1996-2000 - Moein Falahatgar, Ashkan Jafarpour, Alon Orlitsky, Venkatadheeraj Pichapati, Ananda Theertha Suresh:

Universal compression of power-law distributions. 2001-2005
Th-AM2-8: Topics in Compressed Sensing
- Ayaka Sakata

, Yoshiyuki Kabashima:
Replica symmetric bound for restricted isometry constant. 2006-2010 - Zai Yang

, Lihua Xie
, Petre Stoica:
Generalized Vandermonde decomposition and its use for multi-dimensional super-resolution. 2011-2015 - Cynthia Rush

, Adam Greig, Ramji Venkataramanan:
Capacity-achieving Sparse Regression Codes via approximate message passing decoding. 2016-2020 - Christos Thrampoulidis, Ashkan Panahi

, Babak Hassibi:
Asymptotically exact error analysis for the generalized equation-LASSO. 2021-2025
Th-AM2-9: Cooperative Communication
- Hsiao-feng Lu:

Optimal distributed codes with delay four and constant decoding complexity. 2026-2030 - Bin Qian, Wai Ho Mow:

A Markov error modeling approach to distributed turbo coding. 2031-2035 - Paul de Kerret, David Gesbert

, Umer Salim:
Regularized ZF in cooperative broadcast channels under distributed CSIT: A large system analysis. 2036-2040 - Muhammed Faruk Gencel, Maryam Eslami Rasekh, Upamanyu Madhow:

Distributed transmit beamforming with one bit feedback revisited: How noise limits scaling. 2041-2045
Th-PM1-1: Regenerating Codes 2
- Natalia Silberstein, Tuvi Etzion:

Optimal fractional repetition codes and fractional repetition batch codes. 2046-2050 - Birenjith Sasidharan

, Gaurav Kumar Agarwal, P. Vijay Kumar:
A high-rate MSR code with polynomial sub-packetization level. 2051-2055 - Soheil Mohajer, Ravi Tandon:

New bounds on the (n, k, d) storage systems with exact repair. 2056-2060 - Mehran Elyasi, Soheil Mohajer, Ravi Tandon:

Linear exact repair rate region of (k + 1, k, k) distributed storage systems: A new approach. 2061-2065
Th-PM1-2: Structured Codes
- Jingge Zhu

, Michael Gastpar:
On lattice codes for Gaussian interference channels. 2066-2070 - Arun Padakandla, S. Sandeep Pradhan:

Coset codes for communicating over non-additive channels. 2071-2075 - Anne Savard

, Claudio Weidmann:
Lattice coding for the Gaussian one- and two-way relay channels with correlated noises. 2076-2080 - Mohsen Heidari, Farhad Shirani Chaharsooghi

, S. Sandeep Pradhan:
Beyond group capacity in multi-terminal communications. 2081-2085
Th-PM1-3: Coding for Flash Memory 2
- Evyatar Hemo, Yuval Cassuto:

A constraint scheme for correcting massive asymmetric magnitude-1 errors in multi-level NVMs. 2086-2090 - Eitan Yaakobi, Alexander Yucovich, Gal Maor, Gala Yadgar

:
When do WOM codes improve the erasure factor in flash memories? 2091-2095 - Frederic Sala, Clayton Schoeny, Dariush Divsalar, Lara Dolecek:

Asymmetric error-correcting codes for Flash memories in high-radiation environments. 2096-2100 - Clayton Schoeny, Frederic Sala, Lara Dolecek:

Analysis and coding schemes for the flash normal-laplace mixture channel. 2101-2105
Th-PM1-4: Applications of Coding Theory
- Guanghui Song, Jun Cheng:

Low-complexity coding scheme to approach multiple-access channel capacity. 2106-2110 - Rana Ali Amjad, Gerhard Kramer

:
Channel resolvability codes based on concatenation and sparse linear encoding. 2111-2115 - Jayadev Acharya, Clément L. Canonne

, Gautam Kamath
:
Adaptive estimation in weighted group testing. 2116-2120 - Mina Karzand, Lav R. Varshney:

Communication strategies for low-latency trading. 2121-2125
Th-PM1-5: Topics in Network Information Theory
- Meryem Benammar, Pablo Piantanida, Shlomo Shamai

:
On Multiple Description coding for the Multicast Cognitive Interference Channel. 2126-2130 - Matías Vera, Leonardo Rey Vega

, Pablo Piantanida:
The two-way cooperative Information Bottleneck. 2131-2135 - Louis Tan, Kaveh Mahdaviani, Ashish Khisti, Emina Soljanin

:
Coding for source-broadcasting over erasure channels with feedback. 2136-2140 - Mainak Chowdhury, Alon Kipnis

, Andrea Goldsmith:
Reliable uncoded communication in the quantized SIMO MAC. 2141-2145
Th-PM1-6: Fading and Arbitrarily Varying Wiretap Channel
- Moritz Wiese, Janis Noetzel, Holger Boche:

The arbitrarily varying wiretap channel - communication under uncoordinated attacks. 2146-2150 - Janis Noetzel, Moritz Wiese, Holger Boche:

The arbitrarily varying wiretap channel - secret randomness, stability and super-activation. 2151-2155 - Marwen Zorgui

, Zouheir Rezki
, Basel Alomair
, Mohamed-Slim Alouini
:
Secret-key agreement over spatially correlated fast-fading multiple-antenna channels with public discussion. 2156-2160 - Hongbo Si, Onur Ozan Koyluoglu, Sriram Vishwanath:

Achieving secrecy without any instantaneous CSI: polar coding for fading wiretap channels. 2161-2165
Th-PM1-7: Lossy Source Coding
- Albert No, Tsachy Weissman:

Universality of logarithmic loss in lossy compression. 2166-2170 - Badri N. Vellambi

, Matthieu R. Bloch, Remi A. Chou
, Jörg Kliewer:
Lossless and lossy source compression with near-uniform output: Is common randomness always required? 2171-2175 - Basak Guler, Ebrahim MolavianJazi, Aylin Yener:

Remote source coding with two-sided information. 2176-2180 - Hideki Yagi, Ryo Nomura

:
Variable-length coding with epsilon-fidelity criteria for general sources. 2181-2185
Th-PM1-8: Dictionary Learning and Subspace Classification
- Haroon Raja, Waheed U. Bajwa:

A convergence analysis of distributed dictionary learning based on the K-SVD algorithm. 2186-2190 - Daniel L. Pimentel-Alarcón, Nigel Boston, Robert D. Nowak:

Deterministic conditions for subspace identifiability from incomplete sampling. 2191-2195 - Hailong Shi, Hao Zhang, Xiqin Wang:

A volume correlation subspace detector for signals buried in unknown clutter. 2196-2200 - Jure Sokolic, Francesco Renna

, A. Robert Calderbank, Miguel R. D. Rodrigues:
Mismatch in the classification of linear subspaces: Upper bound to the probability of error. 2201-2205
Th-PM1-9: Topics in Game Theory & Control
- Husheng Li:

Entropy reduction via communications in cyber physical systems: How to feed maxwell's demon? 2206-2210 - Arnob Ghosh, Saswati Sarkar:

Pricing for profit in internet of things. 2211-2215 - Faisal Alotaibi

, Sameh Hosny
, Hesham El Gamal, Atilla Eryilmaz:
A game theoretic approach to content trading in proactive wireless networks. 2216-2220 - Gireeja Ranade

, Anant Sahai:
Control capacity. 2221-2225
Th-PM2-1: List Decoding 2
- Nir Weinberger, Neri Merhav:

Simplified erasure/list decoding. 2226-2230 - Yury Polyanskiy:

Upper bound on list-decoding radius of binary codes. 2231-2235 - Arkady G. D'yachkov, Ilya V. Vorobyev

, Nikita Polyanskii
, Vladislav Yu. Shchukin:
Symmetric disjunctive list-decoding codes. 2236-2240
Th-PM2-2: Gaussian Relay Networks
- Yuhan Zhou, Yinfei Xu, Jun Chen, Wei Yu

:
Optimality of gaussian fronthaul compression for uplink MIMO cloud radio access networks. 2241-2245 - Song-Nam Hong

, Ivana Maric, Dennis Hui, Giuseppe Caire:
On the achievable rates of multihop virtual full-duplex relay channels. 2246-2250 - Thomas A. Courtade, Ayfer Özgür

:
Approximate capacity of Gaussian relay networks: Is a sublinear gap to the cutset bound plausible? 2251-2255
Th-PM2-3: On the Ising Model
- Artyom Sharov, Ron M. Roth:

On the capacity of generalized Ising channels. 2256-2260 - Chun Lam Chan, Mahdi Jafari Siavoshani, Sidharth Jaggi, Navin Kashyap, Pascal O. Vontobel:

Generalized belief propagation for estimating the partition function of the 2D Ising model. 2261-2265 - Ali Al-Bashabsheh, Pascal O. Vontobel:

The ising model: Kramers-Wannier duality and normal factor graphs. 2266-2270
Th-PM2-4: Streaming
- Rafid Mahmood, Ahmed Badr, Ashish Khisti

:
Convolutional codes with maximum column sum rank for network streaming. 2271-2275 - Ahmed Badr, Rafid Mahmood, Ashish Khisti:

Embedded MDS codes for multicast streaming. 2276-2280 - Kaveh Mahdaviani, Ashish Khisti

, Gauri Joshi, Gregory W. Wornell
:
Playback delay in on-demand streaming communication with feedback. 2281-2285
Th-PM2-5: Estimation of Distributions and Dirty Paper Coding
- Stefano Rini, Shlomo Shamai

:
On the dirty paper channel with fast fading dirt. 2286-2290 - Yanjun Han, Jiantao Jiao, Tsachy Weissman:

Minimax estimation of discrete distributions. 2291-2295 - Jiantao Jiao, Kartik Venkat, Yanjun Han, Tsachy Weissman:

Minimax estimation of information measures. 2296-2300
Th-PM2-6: Wiretap Channel 2
- Dajiang Chen, Shaoquan Jiang, Zhiguang Qin:

Message Authentication Code over a wiretap channel. 2301-2305 - Wei Kang, Nan Liu:

A permutation-based code for the wiretap channel. 2306-2310 - Pritam Mukherjee, Sennur Ulukus:

Secure degrees of freedom of the multiple access wiretap channel with no eavesdropper CSI. 2311-2315
Th-PM2-7: Capacity Bounds
- Radha Krishna Ganti

, Andrew Thangaraj, Arijit Mondal:
Approximation of capacity for ISI channels with one-bit output quantization. 2316-2320 - Andrew Thangaraj, Gerhard Kramer

, Georg Bocherer:
Capacity upper bounds for discrete-time amplitude-constrained AWGN channels. 2321-2325 - Luca Barletta, Gerhard Kramer

:
Lower bound on the capacity of continuous-time Wiener phase noise channels. 2326-2330
Th-PM2-8: Information-Theoretic Approaches to Compressed Sensing
- Jonathan Scarlett, Volkan Cevher

:
Limits on support recovery with probabilistic models: An information-theoretic framework. 2331-2335 - Yuxin Chen, Changho Suh

, Andrea J. Goldsmith:
Information recovery from pairwise measurements: A shannon-theoretic approach. 2336-2340 - Liming Wang, Jiaji Huang, Xin Yuan

, Volkan Cevher, Miguel R. D. Rodrigues, A. Robert Calderbank, Lawrence Carin
:
A concentration-of-measure inequality for multiple-measurement models. 2341-2345
Th-PM2-9: Fading Channels 2
- Lu Wei

:
Ergodic capacity of spatially correlated multi-cluster scattering MIMO channels. 2346-2350 - Felipe Gómez-Cuba

, Jinfeng Du, Muriel Médard, Elza Erkip
:
Bandwidth occupancy of non-coherent wideband fading channels. 2351-2355 - Maice Costa, Stefan Valentin

, Anthony Ephremides:
On the age of Channel State Information for non-reciprocal wireless links. 2356-2360
Fr-AM1-SP1: Semi-Plenary Session 3A
- Adiseshu Hari, Urs Niesen, Gordon T. Wilfong:

Optimal path encoding for software-defined networks. 2361-2365 - Or Ordentlich, Ofer Shayevitz:

A VC-dimension-based outer bound on the zero-error capacity of the binary adder channel. 2366-2370 - David T. H. Kao, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:

Blind index coding. 2371-2375
Fr-AM1-SP2: Semi-Plenary Session 3b
- Aolin Xu, Maxim Raginsky:

Converses for distributed estimation via strong data processing inequalities. 2376-2380 - Salman Beigi, Amin Gohari

:
On the duality of additivity and tensorization. 2381-2385 - Marco Tomamichel

, Mark M. Wilde
, Andreas J. Winter
:
Strong converse rates for quantum communication. 2386-2390
Fr-AM2-1: Algebraic Codes
- Jiyou Li, Daqing Wan, Jun Zhang:

On the minimum distance of elliptic curve codes. 2391-2395 - Jiun-Hung Yu

, Hans-Andrea Loeliger:
Decoding of interleaved Reed-Solomon codes via simultaneous partial inverses. 2396-2400 - Daniel Augot, Françoise Levy-dit-Vehel

, Man Cuong Ngô
:
Information sets of Multiplicity codes. 2401-2405 - Haiyang Liu, Daeyeoul Kim, Yang Li

, Aaron Z. Jia:
On the separating redundancy of extended Hamming codes. 2406-2410 - Wei Zhou, Shu Lin

, Khaled A. S. Abdel-Ghaffar:
On the maximum true burst correcting capability of primitive Fire codes. 2411-2415
Fr-AM2-2: Interference Channels and Networks
- Chandra Nair, Lingxiao Xia, Mehdi Yazdanpanah:

Sub-optimality of Han-Kobayashi achievable region for interference channels. 2416-2420 - Alireza Vahid, A. Robert Calderbank:

Impact of local delayed CSIT on the capacity region of the two-user interference channel. 2421-2425 - Paula Aquilina, Tharmalingam Ratnarajah:

Topological interference management for interference broadcast channels with alternating connectivity. 2426-2430 - Meghana Bande, Aly El Gamal, Venugopal V. Veeravalli:

Flexible backhaul design with cooperative transmission in cellular interference networks. 2431-2435 - Ehsan Ebrahimzadeh, Kamyar Moshksar, Amir K. Khandani:

Outage analysis for two-user parallel Gaussian interference channels. 2436-2440
Fr-AM2-3: Polarization Theory
- Erdal Arikan:

A packing lemma for polar codes. 2441-2445 - Joseph M. Renes

, David Sutter
, Seyed Hamed Hassani:
Alignment of polarized sets. 2446-2450 - Rajai Nasser:

Ergodic theory meets polarization I: A foundation of polarization theory. 2451-2455 - Rajai Nasser:

Ergodic theory meets polarization II: A foundation of polarization theory for MACs. 2456-2460 - Emmanuel Abbe, Yuval Wigderson:

High-Girth matrices and polarization. 2461-2465
Fr-AM2-4: Lattice Codes 2
- Anne-Maria Ernvall-Hytönen, B. A. Sethuraman:

Counterexample to the generalized belfiore-solé secrecy function conjecture for l-modular lattices. 2466-2469 - Zheng Wang, Cong Ling:

Independent Metropolis-Hastings-Klein algorithm for lattice Gaussian sampling. 2470-2474 - Parisa Babaheidarian, Somayeh Salimi:

Compute-and-forward can buy secrecy cheap. 2475-2479 - Hiroyoshi Morita:

Nearest-neighbor error correcting codes on a hexagonal signal constellation. 2480-2484 - Yu-Chih Huang

:
Lattice index codes from algebraic number fields. 2485-2489
Fr-AM2-5: Feedback
- Lars Palzer:

Signaling over the Gaussian channel with intermittent feedback. 2490-2494 - Annina Bracher, Michèle A. Wigger:

Feedback and partial message side-information on the semideterministic broadcast channel. 2495-2499 - Assaf Ben-Yishai, Ofer Shayevitz:

The Gaussian channel with noisy feedback: improving reliability via interaction. 2500-2504 - Kasper Fløe Trillingsgaard, Wei Yang, Giuseppe Durisi

, Petar Popovski
:
Broadcasting a common message with variable-length stop-feedback codes. 2505-2509 - Yasutada Oohama:

Strong converse theorems for degraded broadcast channels with feedback. 2510-2514
Fr-AM2-6: Security and Channels
- Saurabh Shintre, Virgil D. Gligor, João Barros:

Optimal strategies for side-channel leakage in FCFS packet schedulers. 2515-2519 - Eva C. Song, Paul W. Cuff, H. Vincent Poor

:
Joint source-channel secrecy using hybrid coding. 2520-2524 - Ligong Wang, Gregory W. Wornell

, Lizhong Zheng:
Limits of low-probability-of-detection communication over a discrete memoryless channel. 2525-2529 - Qiaosheng Eric Zhang

, Swanand Kadhe
, Mayank Bakshi
, Sidharth Jaggi, Alex Sprintson:
Coding against a limited-view adversary: The effect of causality and feedback. 2530-2534 - Matthieu R. Bloch:

A channel resolvability perspective on stealth communications. 2535-2539
Fr-AM2-7: Topics in Shannon Theory 3
- Amos Lapidoth, Christoph Pfister:

A method for the construction of optimal task encoders. 2540-2544 - Silas L. Fong

, Vincent Y. F. Tan:
Strong converse theorems for classes of multimessage multicast networks: A Rényi divergence approach. 2545-2549 - Sudeep Kamath, Chandra Nair:

The strong data processing constant for sums of i.i.d. random variables. 2550-2552 - Shuhang Wu, Shuangqing Wei, Yue Wang, Ramachandran Vaidyanathan, Jian Yuan, Xiqin Wang:

Detection of graph structures via communications over a multiaccess Boolean channel. 2553-2557 - Flávio P. Calmon, Yury Polyanskiy, Yihong Wu:

Strong data processing inequalities in power-constrained Gaussian channels. 2558-2562
Fr-AM2-8: Applications of Compressed Sensing 2
- Jaeseok Lee, Byonghyo Shim

:
Greedy tree search for Internet of Things signal detection. 2563-2567 - Céline Aubel, Helmut Bölcskei:

Density criteria for the identification of linear time-varying systems. 2568-2572 - Xu Chen, Dongning Guo:

Robust sublinear complexity Walsh-Hadamard transform with arbitrary sparse support. 2573-2577 - Zeinab Zeinalkhani, Amir H. Banihashemi:

Low-complexity detection of zero blocks in wideband spectrum sensing. 2578-2582 - Dong Yin, Kangwook Lee, Ramtin Pedarsani, Kannan Ramchandran:

Fast and robust compressive phase retrieval with sparse-graph codes. 2583-2587
Fr-AM2-9: Massive MIMO 2
- Qurrat-Ul-Ain Nadeem

, Abla Kammoun, Mérouane Debbah, Mohamed-Slim Alouini
:
On the mutual information of 3D massive MIMO systems: An asymptotic approach. 2588-2592 - Zhong Zheng, Lu Wei

, Roland Speicher, Ralf R. Müller, Jyri Hämäläinen, Jukka Corander:
On the finite-SNR Diversity-Multiplexing Tradeoff in large Rayleigh product channels. 2593-2597 - Zhanzhan Zhang, Zhiyong Chen, Manyuan Shen, Bin Xia, Ling Luo:

Achievable rate analysis for multi-pair two-way massive MIMO full-duplex relay systems. 2598-2602 - Sudip Biswas

, Jiang Xue, Faheem Ahmad Khan
, Tharmalingam Ratnarajah:
On the capacity of correlated massive MIMO systems using stochastic geometry. 2603-2607 - Hong Yang, Thomas L. Marzetta:

On existence of power controls for Massive MIMO. 2608-2612
Fr-PM1-1: Topics in Network Coding 2
- Nitzan Adler, Yuval Cassuto:

Low-delay erasure-correcting codes with optimal average delay. 2613-2617 - Ni Ding

, Rodney A. Kennedy
, Parastoo Sadeghi
:
Estimating minimum sum-rate for cooperative data exchange. 2618-2622 - Wentao Huang, Ting Wang, Xin Hu, Jiyong Jang, Theodoros Salonidis:

Rateless and pollution-attack-resilient network coding. 2623-2627 - Mark Shifrin

, Asaf Cohen, Olga Weisman, Omer Gurewitz:
Coded retransmission in wireless networks via abstract MDPs: Theory and algorithms. 2628-2632 - Qifu Tyler Sun, Xiaolong Yang, Keping Long, Zongpeng Li:

Constructing multicast networks where vector linear coding outperforms scalar linear coding. 2633-2637
Fr-PM1-2: Broadcast and Multiple Access
- Lóránt Farkas, Tamás Kói

:
Controlled asynchronism improves error exponent. 2638-2642 - Rick Fritschek

, Gerhard Wunder:
Constant-gap sum-capacity approximation of the deterministic interfering multiple access channel. 2643-2647 - Jaemin Han, Chih-Chun Wang:

General capacity region for the fully-connected 3-node packet erasure network. 2648-2652 - Yossef Steinberg

:
Instances of the relay-broadcast channel and cooperation strategies. 2653-2657 - Henry P. Romero, Mahesh K. Varanasi:

Polymatroidal structure in the multiple access channel with general message sets. 2658-2662
Fr-PM1-3: Decoding of LDPC Codes
- Xishuo Liu, Stark C. Draper

:
ADMM decoding on trapping sets. 2663-2667 - Ahmed A. Emran, Maha Elsabrouty, Osamu Muta, Hiroshi Furukawa:

Optimized quantization and scaling of layered LDPC scaled min-sum decoder. 2668-2672 - Alexey A. Frolov

, Victor V. Zyablov
:
On the multiple threshold decoding of LDPC codes over GF(q). 2673-2677 - Saeid Haghighatshoar, Amin Karbasi, Amir Hesam Salavati:

Asynchronous decoding of LDPC codes over BEC. 2678-2682 - Pablo M. Olmos, David G. M. Mitchell

, Daniel J. Costello Jr.:
Analyzing the finite-length performance of generalized LDPC codes. 2683-2687
Fr-PM1-4: Sequences
- Qichun Wang, Chik How Tan:

New bounds on the imbalance of a half-l-sequence. 2688-2691 - Zi Long Liu

, Yong Liang Guan
, Su Hu, Udaya Parampalli
:
Optimal spectrally-constrained sequences. 2692-2696 - Domingo Gómez-Pérez

, Tom Høholdt, Oscar Moreno, Ivelisse Rubio:
Linear complexity for multidimensional arrays - a numerical invariant. 2697-2701 - Frederic Sala, Ryan Gabrys, Clayton Schoeny, Lara Dolecek:

Three novel combinatorial theorems for the insertion/deletion channel. 2702-2706 - Serdar Boztas

, Ferruh Özbudak
, Eda Tekin
:
Correlation distribution of a new sequence family. 2707-2711
Fr-PM1-5: Energy Harvesting in Fading and Multiuser Channels
- Zhe Wang, Xiaodong Wang, Vaneet Aggarwal

:
Energy-subchannel allocation for energy harvesting nodes in frequency-selective channels. 2712-2716 - Zhe Wang, Vaneet Aggarwal

, Xiaodong Wang:
Energy-bandwidth allocation in multiple orthogonal broadcast channels with energy harvesting. 2717-2721 - Omur Ozel, Kaya Tutuncuoglu, Sennur Ulukus, Aylin Yener:

The binary energy harvesting channel with on-off fading. 2722-2726 - Jing Yang

, Jingxian Wu
:
Online throughput maximization in an energy harvesting multiple access channel with fading. 2727-2731 - Berk Gurakan, Sennur Ulukus:

Energy harvesting cooperative diamond channel. 2732-2736
Fr-PM1-6: Cryptography and Secure Computing
- Deepesh Data, Vinod M. Prabhakaran:

On coding for secure computing. 2737-2741 - Himanshu Tyagi, Shun Watanabe

:
Impossibility bounds for secure computing. 2742-2746 - Adrien Hauteville, Jean-Pierre Tillich:

New algorithms for decoding in the rank metric and an attack on the LRPC cryptosystem. 2747-2751 - Simona Samardjiska, Danilo Gligoroski:

Approaching maximum embedding efficiency on small covers using Staircase-Generator codes. 2752-2756 - Ahmad Beirami, A. Robert Calderbank, Ken R. Duffy

, Muriel Médard:
Quantifying computational security subject to source constraints, guesswork and inscrutability. 2757-2761
Fr-PM1-7: Quantum Shannon Theory
- Min-Hsiu Hsieh

, Shun Watanabe
:
Source compression with a quantum helper. 2762-2766 - David Sutter

, Volkher B. Scholz
, Renato Renner:
Approximate degradable quantum channels. 2767-2771 - Nilanjana Datta, Marco Tomamichel

, Mark M. Wilde
:
Second-order coding rates for entanglement-assisted communication. 2772-2776 - Cyril J. Stark, Aram W. Harrow

:
Compressibility of positive semidefinite factorizations and quantum models. 2777-2781 - Christoph Hirche

, Ciara Morgan:
An improved rate region for the classical-quantum broadcast channel. 2782-2786
Fr-PM1-8: Message Passing and Hypothesis Testing
- Tadashi Wadayama, Taisuke Izumi, Kazushi Mimura:

Bitwise MAP estimation for group testing based on holographic transformation. 2787-2791 - Wenwen Zhao, Lifeng Lai:

Distributed testing with zero-rate compression. 2792-2796 - Gil Katz, Pablo Piantanida, Romain Couillet, Mérouane Debbah:

On the necessity of binning for the distributed hypothesis testing problem. 2797-2801 - Arise Kuriya, Toshiyuki Tanaka:

Performance degradation of AMP for small-sized problems. 2802-2806 - Burak Çakmak

, Ole Winther
, Bernard H. Fleury:
S-AMP for non-linear observation models. 2807-2811
Fr-PM1-9: Topics in Wireless Networks
- Yi Zhong, Wenyi Zhang, Martin Haenggi:

Stability analysis of static Poisson networks. 2812-2816 - Yueping Wu, Ying Cui, Bruno Clerckx:

User-centric interference nulling in downlink multi-antenna heterogeneous networks. 2817-2821 - Jubin Jose, Chong Li, Xinzhou Wu, Lei Ying

, Kai Zhu:
Distributed rate and power control in DSRC. 2822-2826 - Heecheol Yang, Wonjae Shin, Jungwoo Lee

:
Grouping based blind interference alignment for K-user MISO interference channels. 2827-2831 - Michael Farag, Bobak Nazer:

Matching alignment. 2832-2836
Fr-PM2-1: Topics in Distributed Storage
- Ryan Gabrys, Farzad Farnoud:

Reconciling similar sets of data. 2837-2841 - Terence H. Chan

, Siu-Wai Ho
, Hirosuke Yamamoto
:
Private information retrieval for coded storage. 2842-2846 - Rawad Bitar, Salim El Rouayheb:

Securing data against limited-knowledge adversaries in distributed storage systems. 2847-2851 - Arman Fazeli

, Alexander Vardy
, Eitan Yaakobi:
Codes for distributed PIR with low storage overhead. 2852-2856
Fr-PM2-2: Relay Networks 2
- Silas L. Fong

:
Cut-set bound for multimessage multicast networks with independent channels and zero-delay edges. 2857-2861 - Nan Liu, Wei Kang:

The multiple access diamond channel with caching relays. 2862-2866 - Mohit Thakur, Gerhard Kramer

:
Quasi-concavity for Gaussian multicast relay channels. 2867-2869 - Si-Hyeon Lee

, Sae-Young Chung:
Noisy network coding with partial DF. 2870-2874
Fr-PM2-3: Weight Distribution and Minimum Distance of LDPC Codes
- Giuliano Garrammone, David Declercq, Marc P. C. Fossorier:

Weight distributions of non-binary multi-edge type LDPC code ensembles. 2875-2879 - Francisco Lázaro Blasco, Enrico Paolini

, Gianluigi Liva, Gerhard Bauch:
On the weight distribution of fixed-rate Raptor codes. 2880-2884 - Alexey A. Frolov

:
An upper bound on the minimum distance of LDPC codes over GF(q). 2885-2888 - Tarik Benaddi, Charly Poulliat, Marie-Laure Boucheret, Benjamin Gadat, Guy Lesthievent:

Ensemble weight enumerators for protographs: A proof of Abu Surra's conjecture and a continuous relaxation for a faster enumeration. 2889-2893
Fr-PM2-4: Topics in Coding Theory
- Arkady G. D'yachkov, Ilya V. Vorobyev

, Nikita Polyanskii
, Vladislav Yu. Shchukin:
Cover-free codes and separating system codes. 2894-2898 - Arkady G. D'yachkov, Ilya V. Vorobyev

, Nikita Polyanskii
, Vladislav Yu. Shchukin:
Almost cover-free codes and designs. 2899-2903 - Venkata Gandikota

, Badih Ghazi, Elena Grigorescu
:
On the NP-hardness of bounded distance decoding of Reed-Solomon codes. 2904-2908 - Huang-Chang Lee, Guan-Xuan Huang, Chung-Hsuan Wang, Yeong-Luh Ueng

:
Iterative soft-decision decoding of Reed-Solomon codes using informed dynamic scheduling. 2909-2913
Fr-PM2-5: Topics in Detection and Estimation 2
- Sabina Zejnilovic, João Xavier, João Gomes, Bruno Sinopoli:

Selecting observers for source localization via error exponents. 2914-2918 - Wasim Huleihel, Neri Merhav:

Universal decoding for Gaussian intersymbol interference channels. 2919-2923 - Jaeho Lee, Maxim Raginsky, Pierre Moulin:

On MMSE estimation from quantized observations in the nonasymptotic regime. 2924-2928 - Shaunak Mishra, Yasser Shoukry

, Nikhil Karamchandani, Suhas N. Diggavi, Paulo Tabuada
:
Secure state estimation: Optimal guarantees against sensor attacks in the presence of noise. 2929-2933
Fr-PM2-6: Security and Correlation
- Daming Cao

, Wei Kang:
Message authentication with correlated sources. 2934-2938 - Cheuk Ting Li

, Abbas El Gamal:
Maximal correlation secrecy. 2939-2943 - Ali Makhdoumi, Flávio P. Calmon, Muriel Médard:

Forgot your password: Correlation dilution. 2944-2948 - Reevana Balmahoon, Ling Cheng:

Information leakage of heterogeneous encoded correlated sequences over an eavesdropped channel. 2949-2953
Fr-PM2-7: Finite Blocklength Analysis 3
- Jonathan Scarlett, Alfonso Martinez

, Albert Guillen i Fabregas:
Refinements of the third-order term in the fixed error asymptotics of constant-composition codes. 2954-2958 - Wei Yang, Giuseppe Durisi

, Yury Polyanskiy:
Minimum energy to send k bits over Rayleigh-fading channels. 2959-2963 - Jonathan Scarlett, Vincent Y. F. Tan:

Second-order asymptotics for the discrete memoryless MAC with degraded message sets. 2964-2968 - Hideki Yagi, Te Sun Han, Ryo Nomura

:
First- and second-order coding theorems for mixed memoryless channels with general mixture. 2969-2973
Fr-PM2-8: Data Compression
- Takahiro Ota, Hiroyoshi Morita:

On a two-dimensional antidictionary construction using suffix tries. 2974-2978 - Ashwin Pananjady, Thomas A. Courtade:

Compressing sparse sequences under local decodability constraints. 2979-2983 - Arya Mazumdar, Venkat Chandar, Gregory W. Wornell

:
Local recovery in data compression for general sources. 2984-2988 - Mehryar Mohri, Michael Riley, Ananda Theertha Suresh:

Automata and graph compression. 2989-2993
Fr-PM2-9: Topics in Wireless Communiction
- Yi-Sheng Su, Chung-Hsuan Wang, Huei-Yun Siao:

On unequal missing protection of the grouping of RFID tags. 2994-2998 - Wonseok Jeon, Sae-Young Chung:

Improving degrees of freedom of wireless channels using superdirectivity. 2999-3003 - Alfonso Martinez

, Li Peng, Alex Alvarado
, Albert Guillen i Fabregas:
Improved information rates for bit-interleaved coded modulation. 3004-3007 - Roy D. Yates:

Lazy is timely: Status updates by an energy harvesting source. 3008-3012

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














