Search Results - "Proceedings IEEE International Symposium on Information Theory"

Refine Results
  1. 1

    Information-theoretic analysis of information hiding by Moulin, P., O'Sullivan, J.A.

    Published in IEEE transactions on information theory (01-03-2003)
    “…An information-theoretic analysis of information hiding is presented, forming the theoretical basis for design of information-hiding systems. Information…”
    Get full text
    Journal Article
  2. 2

    Delay-optimal computation task scheduling for mobile-edge computing systems by Juan Liu, Yuyi Mao, Jun Zhang, Letaief, Khaled B.

    “…Mobile-edge computing (MEC) emerges as a promising paradigm to improve the quality of computation experience for mobile devices. Nevertheless, the design of…”
    Get full text
    Conference Proceeding Journal Article
  3. 3

    Analyzing the turbo decoder using the Gaussian approximation by El Gamal, H., Hammons, A.R.

    Published in IEEE transactions on information theory (01-02-2001)
    “…We introduce a simple technique for analyzing the iterative decoder that is broadly applicable to different classes of codes defined over graphs in certain…”
    Get full text
    Journal Article
  4. 4

    Information projections revisited by Csiszar, I., Matus, F.

    Published in IEEE transactions on information theory (01-06-2003)
    “…The goal of this paper is to complete results available about I-projections, reverse I-projections, and their generalized versions, with focus on linear and…”
    Get full text
    Journal Article
  5. 5

    To code or not to code: Dilemmas in analysing think-aloud protocols in learning strategies research by Gu, Yongqi

    Published in System (Linköping) (01-04-2014)
    “…Analysis of qualitative data depends on the overall design and the nature of the research questions. Specifically, the approach to coding and analysis should…”
    Get full text
    Journal Article
  6. 6

    Hardness of approximating the minimum distance of a linear code by Dumer, I., Micciancio, D., Sudan, M.

    Published in IEEE transactions on information theory (01-01-2003)
    “…We show that the minimum distance d of a linear code is not approximable to within any constant factor in random polynomial time (RP), unless nondeterministic…”
    Get full text
    Journal Article
  7. 7

    Optimizing age-of-information in a multi-class queueing system by Longbo Huang, Modiano, Eytan

    “…We consider the age-of-information in a multi-class M/G/1 queueing system, where each class generates packets containing status information. Age of information…”
    Get full text
    Conference Proceeding Journal Article
  8. 8

    Lazy is timely: Status updates by an energy harvesting source by Yates, Roy D.

    “…A source submits status updates to a service facility for delivery to a monitor. Each update requires energy and the source is powered by a stochastic energy…”
    Get full text
    Conference Proceeding Journal Article
  9. 9

    Exact thresholds and optimal codes for the binary-symmetric channel and Gallager's decoding algorithm A by Bazzi, L., Richardson, T.J., Urbanke, R.L.

    Published in IEEE transactions on information theory (01-09-2004)
    “…We show that for the case of the binary-symmetric channel and Gallager's decoding algorithm A the threshold can, in many cases, be determined analytically…”
    Get full text
    Journal Article
  10. 10

    Optimizing data freshness, throughput, and delay in multi-server information-update systems by Bedewy, Ahmed M., Yin Sun, Shroff, Ness B.

    “…In this work, we investigate the design of information-update systems, where incoming update packets are forwarded to a remote destination through multiple…”
    Get full text
    Conference Proceeding Journal Article
  11. 11

    Algebraic structure of quasicyclic codes by Lally, Kristine, Fitzpatrick, Patrick

    Published in Discrete Applied Mathematics (15-07-2001)
    “…We use Gröbner bases of modules as a tool in the construction and classification of quasicyclic codes. Whereas previous studies have been mainly concerned with…”
    Get full text
    Journal Article
  12. 12

    Multiple-antenna signal constellations for fading channels by Agrawal, D., Richardson, T.J., Urbanke, R.L.

    Published in IEEE transactions on information theory (01-09-2001)
    “…In this correspondence, we show that the problem of designing efficient multiple-antenna signal constellations for fading channels can be related to the…”
    Get full text
    Journal Article
  13. 13

    Age of information: The gamma awakening by Najm, Elie, Nasser, Rajai

    “…We consider a scenario where a monitor is interested in being up to date with respect to the status of some system which is not directly accessible to this…”
    Get full text
    Conference Proceeding Journal Article
  14. 14

    Interleaver design for turbo codes by Sadjadpour, H.R., Sloane, N.J.A., Salehi, M., Nebe, G.

    “…The performance of a turbo code with short block length depends critically on the interleaver design. There are two major criteria in the design of an…”
    Get full text
    Journal Article
  15. 15

    Age-of-information in the presence of error by Chen, Kun, Huang, Longbo

    “…We consider the peak age-of-information (PAoI) in an M/M/1 queueing system with packet delivery error, i.e., update packets can get lost during transmissions…”
    Get full text
    Conference Proceeding Journal Article
  16. 16

    A Binary Linear Functional-Repair Regenerating Code on 72 Coding Spaces Related to PG(2, 8) by Ke, Junming, Hollmann, Henk D.L., Riet, Ago-Erik

    “…Only a single example is known of a regenerating code with both small field size and efficient repair, and with parameters in a corner point on the cutset…”
    Get full text
    Conference Proceeding
  17. 17

    Quantum State Compression with Polar Codes by Weinberg, Jack, Mandal, Avijit, Pfister, Henry D.

    “…In the quantum compression scheme proposed by Schumacher, Alice compresses a message that Bob decompresses. In that approach, there is some probability of…”
    Get full text
    Conference Proceeding
  18. 18

    Asymptotically Optimal Codes Correcting One Substring Edit by Li, Yuting, Tang, Yuanyuan, Lou, Hao, Gabrys, Ryan, Farnoud, Farzad

    “…The substring edit error is the operation of replacing a substring \boldsymbol{u} of \boldsymbol{x} with another string \boldsymbol{v} , where the lengths of…”
    Get full text
    Conference Proceeding
  19. 19

    On SDoF of multi-receiver wiretap channel with alternating CSIT by Awan, Zohaib Hassan, Zaidi, Abdellatif, Sezgin, Aydin

    “…We study the problem of secure transmission over a Gaussian multi-input single-output (MISO) two receiver channel with an external eavesdropper, under the…”
    Get full text
    Conference Proceeding Journal Article
  20. 20

    Cache-aided interference channels by Maddah-Ali, Mohammad Ali, Niesen, Urs

    “…Over the past decade, the bulk of wireless traffic has shifted from speech to content. This shift creates the opportunity to cache part of the content in…”
    Get full text
    Conference Proceeding Journal Article