Search Results - "Kliewer, Jorg"
-
1
RELDEC: Reinforcement Learning-Based Decoding of Moderate Length LDPC Codes
Published in IEEE transactions on communications (01-10-2023)“…In this work we propose RELDEC, a novel approach for sequential decoding of moderate length low-density parity-check (LDPC) codes. The main idea behind RELDEC…”
Get full text
Journal Article -
2
Error correction for low power sensors in asynchronous communication
Published in Signal processing (01-05-2021)“…•Novel forward error correction schemes for sensor communication based on these sampling strategiesasynchronous sampling strategies, i.e., sampling via level…”
Get full text
Journal Article -
3
Strong Converses are Just Edge Removal Properties
Published in IEEE transactions on information theory (01-06-2019)“…This paper explores the relationship between two ideas in the network information theory: edge removal and strong converses. Edge removal properties state that…”
Get full text
Journal Article -
4
Communication Efficient Secret Sharing
Published in IEEE transactions on information theory (01-12-2016)“…A secret sharing scheme is a method to store information securely and reliably. Particularly, in a threshold secret sharing scheme, a secret is encoded into n…”
Get full text
Journal Article -
5
Secure Distributed Storage: Optimal Trade-Off Between Storage Rate and Privacy Leakage
Published in IEEE transactions on information theory (01-05-2024)“…Consider the problem of storing data in a distributed manner over T servers. Specifically, the data needs to (i) be recoverable from any <inline-formula>…”
Get full text
Journal Article -
6
Equivalence for Networks With Adversarial State
Published in IEEE transactions on information theory (01-07-2017)“…We address the problem of finding the capacity of noisy networks with either independent point-to-point compound channels (CC) or arbitrarily varying channels…”
Get full text
Journal Article -
7
Analysis and Enumeration of Absorbing Sets for Non-Binary Graph-Based Codes
Published in IEEE transactions on communications (01-02-2014)“…In this work, we first provide the definition of absorbing sets for linear channel codes over non-binary alphabets. In a graphical representation of a…”
Get full text
Journal Article -
8
Straggler- and Adversary-Tolerant Secure Distributed Matrix Multiplication Using Polynomial Codes
Published in Entropy (Basel, Switzerland) (31-01-2023)“…Large matrix multiplications commonly take place in large-scale machine-learning applications. Often, the sheer size of these matrices prevent carrying out the…”
Get full text
Journal Article -
9
Design of Network Codes for Multiple-User Multiple-Relay Wireless Networks
Published in IEEE transactions on communications (01-12-2012)“…We investigate the design of network codes for multiple-user multiple-relay (MUMR) wireless networks with slow fading (quasi-static) channels. In these…”
Get full text
Journal Article -
10
Matrix Multiplication with Straggler Tolerance in Coded Elastic Computing via Lagrange Code
Published in ICC 2023 - IEEE International Conference on Communications (28-05-2023)“…In cloud computing systems, elastic events and stragglers increase the uncertainty of the system, leading to computation delays. Coded elastic computing (CEC)…”
Get full text
Conference Proceeding -
11
Asymmetric Error Correction and Flash-Memory Rewriting Using Polar Codes
Published in IEEE transactions on information theory (01-07-2016)“…We propose efficient coding schemes for two communication settings: 1) asymmetric channels and 2) channels with an informed encoder. These settings are…”
Get full text
Journal Article -
12
Quantifying Neuronal Information Flow in Response to Frequency and Intensity Changes in the Auditory Cortex
Published in 2018 52nd Asilomar Conference on Signals, Systems, and Computers (01-10-2018)“…Studies increasingly show that behavioral relevance alters the population representation of sensory stimuli in the sensory cortices. However, the mechanisms…”
Get full text
Conference Proceeding Journal Article -
13
On Secure Network Coding With Nonuniform or Restricted Wiretap Sets
Published in IEEE transactions on information theory (01-01-2013)“…The secrecy capacity of a network, for a given collection of permissible wiretap sets, is the maximum rate of communication such that observing links in any…”
Get full text
Journal Article -
14
Memoryless relay strategies for two-way relay channels
Published in IEEE transactions on communications (01-10-2009)“…We propose relaying strategies for uncoded two-way relay channels, where two terminals transmit simultaneously to each other with the help of a relay. In…”
Get full text
Journal Article -
15
Coding Schemes for Achieving Strong Secrecy at Negligible Cost
Published in IEEE transactions on information theory (01-03-2017)“…We study the problem of achieving strong secrecy over wiretap channels at negligible cost, in the sense of maintaining the overall communication rate of the…”
Get full text
Journal Article -
16
Straggler-Resilient Differentially Private Decentralized Learning
Published in IEEE journal on selected areas in information theory (2024)“…We consider the straggler problem in decentralized learning over a logical ring while preserving user data privacy. Especially, we extend the recently proposed…”
Get full text
Journal Article -
17
A Code and Rate Equivalence Between Secure Network and Index Coding
Published in IEEE journal on selected areas in information theory (01-03-2021)“…Establishing code equivalences between index coding and network coding provides important insights for code design. Previous works showed an equivalence…”
Get full text
Journal Article -
18
Strong coordination over a three-terminal relay network
Published in 2014 IEEE Information Theory Workshop (ITW 2014) (01-11-2014)“…We study the problem of strong coordination in a three-terminal relay network, in which agents communicate to ensure that their actions follow a joint behavior…”
Get full text
Conference Proceeding -
19
Joint design of channel and network coding for star networks connected by binary symmetric channels
Published in IEEE transactions on communications (01-01-2014)“…In a network application, channel coding alone is not sufficient to reliably transmit a message of finite length K from a source to one or more destinations as…”
Get full text
Journal Article -
20
Communication Protocols for N-way All-Cast Relay Networks
Published in IEEE transactions on communications (01-11-2012)“…We consider communication protocols for N-way all-cast relay networks, which comprise N source terminals such that each source terminal demands messages from…”
Get full text
Journal Article