Search Results - "Proceedings IEEE International Symposium on Information Theory"
-
1
Information-theoretic analysis of information hiding
Published in IEEE transactions on information theory (01-03-2003)“…An information-theoretic analysis of information hiding is presented, forming the theoretical basis for design of information-hiding systems. Information…”
Get full text
Journal Article -
2
Delay-optimal computation task scheduling for mobile-edge computing systems
Published in 2016 IEEE International Symposium on Information Theory (ISIT) (01-07-2016)“…Mobile-edge computing (MEC) emerges as a promising paradigm to improve the quality of computation experience for mobile devices. Nevertheless, the design of…”
Get full text
Conference Proceeding Journal Article -
3
Analyzing the turbo decoder using the Gaussian approximation
Published in IEEE transactions on information theory (01-02-2001)“…We introduce a simple technique for analyzing the iterative decoder that is broadly applicable to different classes of codes defined over graphs in certain…”
Get full text
Journal Article -
4
Information projections revisited
Published in IEEE transactions on information theory (01-06-2003)“…The goal of this paper is to complete results available about I-projections, reverse I-projections, and their generalized versions, with focus on linear and…”
Get full text
Journal Article -
5
To code or not to code: Dilemmas in analysing think-aloud protocols in learning strategies research
Published in System (Linköping) (01-04-2014)“…Analysis of qualitative data depends on the overall design and the nature of the research questions. Specifically, the approach to coding and analysis should…”
Get full text
Journal Article -
6
Hardness of approximating the minimum distance of a linear code
Published in IEEE transactions on information theory (01-01-2003)“…We show that the minimum distance d of a linear code is not approximable to within any constant factor in random polynomial time (RP), unless nondeterministic…”
Get full text
Journal Article -
7
Optimizing age-of-information in a multi-class queueing system
Published in 2015 IEEE International Symposium on Information Theory (ISIT) (01-06-2015)“…We consider the age-of-information in a multi-class M/G/1 queueing system, where each class generates packets containing status information. Age of information…”
Get full text
Conference Proceeding Journal Article -
8
Lazy is timely: Status updates by an energy harvesting source
Published in 2015 IEEE International Symposium on Information Theory (ISIT) (01-06-2015)“…A source submits status updates to a service facility for delivery to a monitor. Each update requires energy and the source is powered by a stochastic energy…”
Get full text
Conference Proceeding Journal Article -
9
Exact thresholds and optimal codes for the binary-symmetric channel and Gallager's decoding algorithm A
Published in IEEE transactions on information theory (01-09-2004)“…We show that for the case of the binary-symmetric channel and Gallager's decoding algorithm A the threshold can, in many cases, be determined analytically…”
Get full text
Journal Article -
10
Optimizing data freshness, throughput, and delay in multi-server information-update systems
Published in 2016 IEEE International Symposium on Information Theory (ISIT) (01-07-2016)“…In this work, we investigate the design of information-update systems, where incoming update packets are forwarded to a remote destination through multiple…”
Get full text
Conference Proceeding Journal Article -
11
Algebraic structure of quasicyclic codes
Published in Discrete Applied Mathematics (15-07-2001)“…We use Gröbner bases of modules as a tool in the construction and classification of quasicyclic codes. Whereas previous studies have been mainly concerned with…”
Get full text
Journal Article -
12
Multiple-antenna signal constellations for fading channels
Published in IEEE transactions on information theory (01-09-2001)“…In this correspondence, we show that the problem of designing efficient multiple-antenna signal constellations for fading channels can be related to the…”
Get full text
Journal Article -
13
Age of information: The gamma awakening
Published in 2016 IEEE International Symposium on Information Theory (ISIT) (01-07-2016)“…We consider a scenario where a monitor is interested in being up to date with respect to the status of some system which is not directly accessible to this…”
Get full text
Conference Proceeding Journal Article -
14
Interleaver design for turbo codes
Published in IEEE journal on selected areas in communications (01-05-2001)“…The performance of a turbo code with short block length depends critically on the interleaver design. There are two major criteria in the design of an…”
Get full text
Journal Article -
15
Age-of-information in the presence of error
Published in 2016 IEEE International Symposium on Information Theory (ISIT) (01-07-2016)“…We consider the peak age-of-information (PAoI) in an M/M/1 queueing system with packet delivery error, i.e., update packets can get lost during transmissions…”
Get full text
Conference Proceeding Journal Article -
16
A Binary Linear Functional-Repair Regenerating Code on 72 Coding Spaces Related to PG(2, 8)
Published in Proceedings / IEEE International Symposium on Information Theory (07-07-2024)“…Only a single example is known of a regenerating code with both small field size and efficient repair, and with parameters in a corner point on the cutset…”
Get full text
Conference Proceeding -
17
Quantum State Compression with Polar Codes
Published in Proceedings / IEEE International Symposium on Information Theory (07-07-2024)“…In the quantum compression scheme proposed by Schumacher, Alice compresses a message that Bob decompresses. In that approach, there is some probability of…”
Get full text
Conference Proceeding -
18
Asymptotically Optimal Codes Correcting One Substring Edit
Published in Proceedings / IEEE International Symposium on Information Theory (07-07-2024)“…The substring edit error is the operation of replacing a substring \boldsymbol{u} of \boldsymbol{x} with another string \boldsymbol{v} , where the lengths of…”
Get full text
Conference Proceeding -
19
On SDoF of multi-receiver wiretap channel with alternating CSIT
Published in 2016 IEEE International Symposium on Information Theory (ISIT) (01-07-2016)“…We study the problem of secure transmission over a Gaussian multi-input single-output (MISO) two receiver channel with an external eavesdropper, under the…”
Get full text
Conference Proceeding Journal Article -
20
Cache-aided interference channels
Published in 2015 IEEE International Symposium on Information Theory (ISIT) (01-06-2015)“…Over the past decade, the bulk of wireless traffic has shifted from speech to content. This shift creates the opportunity to cache part of the content in…”
Get full text
Conference Proceeding Journal Article