Search Results - "Dey, Bikash Kumar"
-
1
On Network Coding for Sum-Networks
Published in IEEE transactions on information theory (01-01-2012)“…A directed acyclic network is considered where all the terminals need to recover the sum of the symbols generated at all the sources. We call such a network a…”
Get full text
Journal Article -
2
Upper Bounds on the Capacity of Binary Channels With Causal Adversaries
Published in IEEE transactions on information theory (01-06-2013)“…In this paper, we consider the communication of information in the presence of a causal adversarial jammer. In the setting under study, a sender wishes to…”
Get full text
Journal Article -
3
An MMSE Strategy at Relays With Partial CSI for a Multi-Layer Relay Network
Published in IEEE transactions on signal processing (15-01-2014)“…We consider a relay network with a single source-destination pair and multiple layers of relays between them. We assume that these layers sequentially relay…”
Get full text
Journal Article -
4
Codes Against Online Adversaries: Large Alphabets
Published in IEEE transactions on information theory (01-06-2013)“…In this paper, we consider the communication of information in the presence of an online adversarial jammer. In the setting under study, a sender wishes to…”
Get full text
Journal Article -
5
Estimating network link characteristics using packet-pair dispersion: A discrete-time queueing theoretic analysis
Published in Computer networks (Amsterdam, Netherlands : 1999) (01-04-2011)“…We present a queueing theoretic analysis of packet-dispersion based probing. The links are modeled as independent discrete-time queues with i.i.d. arrivals. We…”
Get full text
Journal Article -
6
A Channel Coding Perspective of Collaborative Filtering
Published in IEEE transactions on information theory (01-04-2011)“…We consider the problem of collaborative filtering from a channel coding perspective. We model the underlying rating matrix as a finite alphabet matrix with…”
Get full text
Journal Article -
7
On existence of good self-dual quasi-cyclic codes
Published in IEEE transactions on information theory (01-08-2004)“…For a long time, asymptotically good self-dual codes have been known to exist. Asymptotically good 2-quasicyclic codes of rate 1/2 have also been known to…”
Get full text
Journal Article -
8
Sufficiently Myopic Adversaries Are Blind
Published in IEEE transactions on information theory (01-09-2019)“…We consider a communication problem in which a sender, Alice, wishes to communicate with a receiver, Bob, over a channel controlled by an adversarial jammer,…”
Get full text
Journal Article -
9
Byzantine Multiple Access Channels - Part II: Communication With Adversary Identification
Published in IEEE transactions on information theory (27-09-2024)“…We introduce the problem of determining the identity of a byzantine user (internal adversary) in a communication system. We consider a two-user discrete…”
Get full text
Journal Article -
10
Function Computation Through a Bidirectional Relay
Published in IEEE transactions on information theory (01-02-2019)“…We consider a function computation problem in a three-node wireless network. Nodes A and B observe two correlated sources <inline-formula> <tex-math…”
Get full text
Journal Article -
11
Byzantine Multiple Access Channels-Part I: Reliable Communication
Published in IEEE transactions on information theory (01-04-2024)“…We study communication over a Multiple Access Channel (MAC) where users can possibly be adversarial. The receiver is unaware of the identity of the adversarial…”
Get full text
Journal Article -
12
Fundamental Limits of Demand-Private Coded Caching
Published in IEEE transactions on information theory (01-06-2022)“…We consider the coded caching problem with an additional privacy constraint that a user should not get any information about the demands of the other users. We…”
Get full text
Journal Article -
13
The Interplay of Causality and Myopia in Adversarial Channel Models
Published in 2019 IEEE International Symposium on Information Theory (ISIT) (01-07-2019)“…The difference in capacity formulae between worst-case and average-case channel noise models has been part of information theory since the early days of the…”
Get full text
Conference Proceeding -
14
Private Index Coding
Published in IEEE transactions on information theory (01-03-2022)“…We study the fundamental problem of index coding under an additional privacy constraint that requires each receiver to learn nothing more about the collection…”
Get full text
Journal Article -
15
Oblivious Transfer Over Wireless Channels
Published in IEEE transactions on communications (01-03-2016)“…We consider the problem of oblivious transfer (OT) over OFDM and MIMO wireless communication systems where only the receiver knows the channel state…”
Get full text
Journal Article -
16
Communication in the Presence of a State-Aware Adversary
Published in IEEE transactions on information theory (01-11-2017)“…We study communication systems over the state-dependent channels in the presence of a malicious state-aware jamming adversary. The channel has a memoryless…”
Get full text
Journal Article -
17
Wiretapped Oblivious Transfer
Published in IEEE transactions on information theory (01-04-2017)“…In this paper, we study the problem of obtaining 1-of-2 string oblivious transfer (OT) between users Alice and Bob, in the presence of a passive eavesdropper…”
Get full text
Journal Article -
18
Distributed Rate Adaptation and Power Control in Fading Multiple Access Channels
Published in IEEE transactions on information theory (01-10-2015)“…Traditionally, the capacity region of a coherent fading multiple access channel (MAC) is analyzed in two popular contexts. In the first, a centralized system…”
Get full text
Journal Article -
19
Network Flows for Function Computation
Published in IEEE journal on selected areas in communications (01-04-2013)“…We consider in-network computation of an arbitrary function over an arbitrary communication network. A network with capacity constraints on the links is given…”
Get full text
Journal Article -
20
Identification over Permutation Channels
Published 15-05-2024“…We study message identification over a q-ary uniform permutation channel, where the transmitted vector is permuted by a permutation chosen uniformly at random…”
Get full text
Journal Article