Search Results - "Kliewer, Jorg"

Refine Results
  1. 1

    RELDEC: Reinforcement Learning-Based Decoding of Moderate Length LDPC Codes by Habib, Salman, Beemer, Allison, Kliewer, Jorg

    Published in IEEE transactions on communications (01-10-2023)
    “…In this work we propose RELDEC, a novel approach for sequential decoding of moderate length low-density parity-check (LDPC) codes. The main idea behind RELDEC…”
    Get full text
    Journal Article
  2. 2

    Error correction for low power sensors in asynchronous communication by Yi, Chen, Kliewer, Jörg

    Published in Signal processing (01-05-2021)
    “…•Novel forward error correction schemes for sensor communication based on these sampling strategiesasynchronous sampling strategies, i.e., sampling via level…”
    Get full text
    Journal Article
  3. 3

    Strong Converses are Just Edge Removal Properties by Kosut, Oliver, Kliewer, Jorg

    Published in IEEE transactions on information theory (01-06-2019)
    “…This paper explores the relationship between two ideas in the network information theory: edge removal and strong converses. Edge removal properties state that…”
    Get full text
    Journal Article
  4. 4

    Communication Efficient Secret Sharing by Wentao Huang, Langberg, Michael, Kliewer, Jorg, Bruck, Jehoshua

    Published in IEEE transactions on information theory (01-12-2016)
    “…A secret sharing scheme is a method to store information securely and reliably. Particularly, in a threshold secret sharing scheme, a secret is encoded into n…”
    Get full text
    Journal Article
  5. 5

    Secure Distributed Storage: Optimal Trade-Off Between Storage Rate and Privacy Leakage by Chou, Remi A., Kliewer, Jorg

    Published in IEEE transactions on information theory (01-05-2024)
    “…Consider the problem of storing data in a distributed manner over T servers. Specifically, the data needs to (i) be recoverable from any <inline-formula>…”
    Get full text
    Journal Article
  6. 6

    Equivalence for Networks With Adversarial State by Kosut, Oliver, Kliewer, Jorg

    Published in IEEE transactions on information theory (01-07-2017)
    “…We address the problem of finding the capacity of noisy networks with either independent point-to-point compound channels (CC) or arbitrarily varying channels…”
    Get full text
    Journal Article
  7. 7

    Analysis and Enumeration of Absorbing Sets for Non-Binary Graph-Based Codes by Amiri, Behzad, Kliewer, Jorg, Dolecek, Lara

    Published in IEEE transactions on communications (01-02-2014)
    “…In this work, we first provide the definition of absorbing sets for linear channel codes over non-binary alphabets. In a graphical representation of a…”
    Get full text
    Journal Article
  8. 8

    Straggler- and Adversary-Tolerant Secure Distributed Matrix Multiplication Using Polynomial Codes by Byrne, Eimear, Gnilke, Oliver W, Kliewer, Jörg

    Published in Entropy (Basel, Switzerland) (31-01-2023)
    “…Large matrix multiplications commonly take place in large-scale machine-learning applications. Often, the sheer size of these matrices prevent carrying out the…”
    Get full text
    Journal Article
  9. 9

    Design of Network Codes for Multiple-User Multiple-Relay Wireless Networks by Ming Xiao, Kliewer, J., Skoglund, M.

    Published in IEEE transactions on communications (01-12-2012)
    “…We investigate the design of network codes for multiple-user multiple-relay (MUMR) wireless networks with slow fading (quasi-static) channels. In these…”
    Get full text
    Journal Article
  10. 10

    Matrix Multiplication with Straggler Tolerance in Coded Elastic Computing via Lagrange Code by Zhong, Xi, Kliewer, Jorg, Ji, Mingyue

    “…In cloud computing systems, elastic events and stragglers increase the uncertainty of the system, leading to computation delays. Coded elastic computing (CEC)…”
    Get full text
    Conference Proceeding
  11. 11

    Asymmetric Error Correction and Flash-Memory Rewriting Using Polar Codes by En Gad, Eyal, Yue Li, Kliewer, Jorg, Langberg, Michael, Jiang, Anxiao Andrew, Bruck, Jehoshua

    Published in IEEE transactions on information theory (01-07-2016)
    “…We propose efficient coding schemes for two communication settings: 1) asymmetric channels and 2) channels with an informed encoder. These settings are…”
    Get full text
    Journal Article
  12. 12

    Quantifying Neuronal Information Flow in Response to Frequency and Intensity Changes in the Auditory Cortex by Mehta, Ketan, Kliewer, Jorg, Ihlefeld, Antje

    “…Studies increasingly show that behavioral relevance alters the population representation of sensory stimuli in the sensory cortices. However, the mechanisms…”
    Get full text
    Conference Proceeding Journal Article
  13. 13

    On Secure Network Coding With Nonuniform or Restricted Wiretap Sets by Tao Cui, Ho, T., Kliewer, J.

    Published in IEEE transactions on information theory (01-01-2013)
    “…The secrecy capacity of a network, for a given collection of permissible wiretap sets, is the maximum rate of communication such that observing links in any…”
    Get full text
    Journal Article
  14. 14

    Memoryless relay strategies for two-way relay channels by Tao Cui, Ho, T., Kliewer, J.

    Published in IEEE transactions on communications (01-10-2009)
    “…We propose relaying strategies for uncoded two-way relay channels, where two terminals transmit simultaneously to each other with the help of a relay. In…”
    Get full text
    Journal Article
  15. 15

    Coding Schemes for Achieving Strong Secrecy at Negligible Cost by Chou, Remi A., Vellambi, Badri N., Bloch, Matthieu R., Kliewer, Jorg

    Published in IEEE transactions on information theory (01-03-2017)
    “…We study the problem of achieving strong secrecy over wiretap channels at negligible cost, in the sense of maintaining the overall communication rate of the…”
    Get full text
    Journal Article
  16. 16

    Straggler-Resilient Differentially Private Decentralized Learning by Yakimenka, Yauhen, Weng, Chung-Wei, Lin, Hsuan-Yin, Rosnes, Eirik, Kliewer, Jorg

    “…We consider the straggler problem in decentralized learning over a logical ring while preserving user data privacy. Especially, we extend the recently proposed…”
    Get full text
    Journal Article
  17. 17

    A Code and Rate Equivalence Between Secure Network and Index Coding by Ong, Lawrence, Vellambi, Badri N., Kliewer, Jorg, Yeoh, Phee Lep

    “…Establishing code equivalences between index coding and network coding provides important insights for code design. Previous works showed an equivalence…”
    Get full text
    Journal Article
  18. 18

    Strong coordination over a three-terminal relay network by Bloch, Matthieu R., Kliewer, Jorg

    “…We study the problem of strong coordination in a three-terminal relay network, in which agents communicate to ensure that their actions follow a joint behavior…”
    Get full text
    Conference Proceeding
  19. 19

    Joint design of channel and network coding for star networks connected by binary symmetric channels by Koller, Christian, Haenggi, Martin, Kliewer, Jorg, Costello, Daniel J.

    Published in IEEE transactions on communications (01-01-2014)
    “…In a network application, channel coding alone is not sufficient to reliably transmit a message of finite length K from a source to one or more destinations as…”
    Get full text
    Journal Article
  20. 20

    Communication Protocols for N-way All-Cast Relay Networks by Tao Cui, Kliewer, J., Ho, T.

    Published in IEEE transactions on communications (01-11-2012)
    “…We consider communication protocols for N-way all-cast relay networks, which comprise N source terminals such that each source terminal demands messages from…”
    Get full text
    Journal Article