default search action
ITW 2022: Mumbai, India
- IEEE Information Theory Workshop, ITW 2022, Mumbai, India, November 1-9, 2022. IEEE 2022, ISBN 978-1-6654-8341-4
- Jian Lu, Yinfei Xu, Shuo Shao:
Functional Privacy for Distributed Function Computation. 1-6 - Mohammad Amin Zarrabian, Ni Ding, Parastoo Sadeghi:
Asymmetric Local Information Privacy and the Watchdog Mechanism. 7-12 - Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund:
Bounds for Privacy-Utility Trade-off with Per-letter Privacy Constraints and Non-zero Leakage. 13-18 - Zitan Chen:
Rack-aware MSR codes with optimal access. 19-24 - Hoover H. F. Yin, Mehrdad Tahernia:
Multi-Phase Recoding for Batched Network Coding. 25-30 - Jiajun Chen, Chi Wan Sung:
Weakly Secure Coded Distributed Computing with Group-based Function Assignment. 31-36 - Teng-Hui Huang, Aly El Gamal, Hesham El Gamal:
On The Multi-View Information Bottleneck Representation. 37-42 - Xuetong Wu, Jonathan H. Manton, Uwe Aickelin, Jingge Zhu:
Fast Rate Generalization Error Bounds: Variations on a Theme. 43-48 - Xinyi Tong, Jian Xu, Shao-Lun Huang:
An Information-theoretic Method for Collaborative Distributed Learning with Limited Communication. 49-54 - Sadaf ul Zuhra, Samir M. Perlaza, H. Vincent Poor, Mikael Skoglund:
Information-Energy Trade-offs with EH Non-linearities in the Finite Block-Length Regime with Finite Constellations. 55-60 - Nguyen Minh Tran, Muhammad Miftahul Amri, Je Hyeon Park, Ghafar Ramadhan Faqih, Dong In Kim, Kae Won Choi:
Beam Splitting Technique for Reconfigurable Intelligent Surface-Aided Simultaneous Wireless Information and Power Transfer Applications. 61-65 - Nizar Khalfet, Ghassan M. Kraidy, Constantinos Psomas, Ioannis Krikidis:
Information-Energy Capacity Region for IRS-aided SWIPT Systems. 66-70 - Lampros Gavalakis, Ioannis Kontoyiannis:
Information-theoretic de Finetti-style theorems. 71-76 - Lan V. Truong, Josep Font-Segura, Giuseppe Cocco, Albert Guillén i Fàbregas:
Convergence in Distribution of the Error Exponent of Random Codes at Zero Rate. 77-82 - Anelia Somekh-Baruch:
New Upper Bounds on the Mismatch Capacity and the Mismatched Reliability Function. 83-88 - Yi-Sheng Su:
Robust Private Information Retrieval with Optimal Server Computation. 89-94 - Zhusheng Wang, Sennur Ulukus:
Digital Blind Box: Random Symmetric Private Information Retrieval. 95-100 - Alejandro Gomez-Leos, Anoosheh Heidarzadeh:
Single-Server Private Information Retrieval With Side Information Under Arbitrary Popularity Profiles. 101-106 - Yiwen Wang, Jifan Liang, Xiao Ma:
Local Constraint-Based Ordered Statistics Decoding for Short Block Codes. 107-112 - Adrián Torres-Martín, Mercè Villanueva:
Partial permutation decoding for ℤ8-linear Hadamard codes. 113-118 - Amirreza Asadzadeh, Masoud Barakatain, Jeebak Mitra, Frank R. Kschischang, Stark C. Draper:
Randomized Scheduling of ADMM-LP Decoding Based on Geometric Priors. 119-124 - Valentinian Lungu, Ioannis Papageorgiou, Ioannis Kontoyiannis:
Bayesian Change-Point Detection via Context-Tree Weighting. 125-130 - Parham Boroumand, Albert Guillén i Fàbregas:
Composite Neyman-Pearson Hypothesis Testing with a Known Hypothesis. 131-136 - Sujay Bhatt, Guanhua Fang, Ping Li, Gennady Samorodnitsky:
Regret Analysis for RL using Renewal Bandit Feedback. 137-142 - Okko Makkonen, Camilla Hollanti:
General Framework for Linear Secure Distributed Matrix Multiplication with Byzantine Servers. 143-148 - Hiram H. López, Gretchen L. Matthews, Daniel Valvo:
Secure MatDot codes: a secure, distributed matrix multiplication scheme. 149-154 - Roberto Assis Machado, Felice Manganiello:
Root of Unity for Secure Distributed Matrix Multiplication: Grid Partition Case. 155-159 - Ankur Mallick, Gauri Joshi:
Rateless Sum-Recovery Codes For Distributed Non-Linear Computations. 160-165 - Federico Brunero, Petros Elia:
On the Optimality of Coded Caching With Heterogeneous User Profiles. 166-171 - Apurve K. Pandey, Monolina Dutta, Anoop Thomas:
Decentralized Coded Caching for Shared Caches using Erasure Coding. 172-177 - Antonino Favano, Marco Ferrari, Maurizio Magarini, Luca Barletta:
The Capacity of Fading Vector Gaussian Channels Under Amplitude Constraints on Antenna Subsets. 178-183 - Charalambos D. Charalambous, Stelios Louka, Sergey Loyka:
A Riccati-Lyapunov Approach to Nonfeedback Capacity of MIMO Gaussian Channels Driven by Stable and Uns table Noise. 184-189 - Mehdi Karbalayghareh, Aria Nosratinia:
Interaction of Pilot Reuse and Channel State Feedback under Coherence Disparity. 190-195 - Simeng Zheng, Paul H. Siegel:
Code-Aware Storage Channel Modeling via Machine Learning. 196-201 - Ron M. Roth:
Fault-Tolerant Neuromorphic Computing on Nanoscale Crossbar Architectures. 202-207 - Xiangwu Zuo, Anxiao Andrew Jiang, Netanel Raviv, Paul H. Siegel:
Symbolic Regression for Data Storage with Side Information. 208-213 - Marvin Xhemrishi, Maximilian Egger, Rawad Bitar:
Efficient Private Storage of Sparse Machine Learning Data. 214-219 - Sagi Marcovich, Eitan Yaakobi:
The Zero Cubes Free and Cubes Unique Multidimensional Constraints. 220-225 - Onur Günlü, Rafael F. Schaefer, Holger Boche, H. Vincent Poor:
Secure and Private Source Coding with Private Key and Decoder Side Information. 226-231 - Vamoua Yachongka, Hideki Yagi, Hideki Ochiai:
Secret-Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels. 232-237 - Boris Ryabko:
Using data compression and randomisation to build an unconditionally secure short key cipher. 238-242 - Marvin Geiselhart, Ahmed Elkelesh, Jannis Clausius, Stephan ten Brink:
A Polar Subcode Approach to Belief Propagation List Decoding. 243-248 - Mohammad Rowshan, Son Hoang Dau, Emanuele Viterbo:
Improving the Error Coefficient of Polar Codes. 249-254 - Mohammad Rowshan, Jinhong Yuan:
Fast Enumeration of Minimum Weight Codewords of PAC Codes. 255-260 - Haiwen Cao, Pascal O. Vontobel:
Sparse Regression Codes for MIMO Detection. 261-266 - Yuhao Liu, Teng Fu, Jean Barbier, Tianqi Hou:
Sparse superposition codes with rotational invariant coding matrices for memoryless channels. 267-272 - Guojun Chen, Yinfei Xu, Tiecheng Song, Jing Hu:
An Extremal Inequality With Application to Gray-Wyner System. 273-278 - Yong Xiao, Xu Zhang, Yingyu Li, Guangming Shi, Tamer Basar:
Rate-Distortion Theory for Strategic Semantic Communication. 279-284 - Rony Bou Rouphael, Maël Le Treust:
Strategic Communication with Cost-Dependent Decoders via the Gray-Wyner Network. 285-290 - Qi Cao, Qiaoqiao Zhou:
On the Zero-Error Capacity of the Chemical Residual Channel. 291-296 - Haider Al Kim, Kai-Jie Chan:
Codes for Preventing Zeros at Partially Defective Memory Positions. 297-302 - Vladimir Edemskiy, Sergey Garbar:
The linear complexity of sequences with low autocorrelation from interleaved technique and period pq. 303-308 - Shao-Lun Huang:
Communicating Type Classes Through Channels: An Information Geometric View. 309-314 - Yizhu Wang, Tao Guo, Bo Bai, Wei Han:
The Estimation-Compression Separation in Semantic Communication Systems. 315-320 - Barak Amihood, Asaf Cohen:
Covertly Controlling a Linear System. 321-326 - Jinzhe Pan, Wai Ho Mow:
Angular Domain-Based Importance Sampling Estimator for Linear Block Codes over the AWGN Channel with M-PSK Modulation. 327-331 - Yuan Li, Xianbin Wang, Huazi Zhang, Jun Wang, Wen Tong, Guiying Yan, Zhiming Ma:
Deterministic Identification over Channels without CSI. 332-337 - Wenyi Shi, Shuqin Pang, Wenyi Zhang:
Linear Shrinkage Receiver for Slow Fading Channels under Imperfect Channel State Information. 338-343 - Deheng Yuan, Tao Guo, Bo Bai, Wei Han:
Lossy Computing with Side Information via Multi-Hypergraphs. 344-349 - Mahmoud Hegazy, Cheuk Ting Li:
Randomized Quantization with Exact Error Distribution. 350-355 - Neil Ashim Mehta, Pulkit Grover:
Efficient interventions in a neural circuit from observations: an information-theoretic study. 356-361 - Ämin Baumeler, Carla Rieger, Stefan Wolf:
Thermodynamics as Combinatorics: A Toy Theory. 362-367 - Hangmei Rao, Ligong Wang:
An Extensible Covert Communication Scheme Over the AWGN Channel With Feedback. 368-373 - Seyed Reza Hoseini Najarkolaei, Narges Kazempour, Mohammad Reza Aref, Deniz Gündüz:
Information Theoretically Private and Secure Distributed Voting Without a Trusted Authority. 374-379 - Yashas Malur Saidutta, Faramarz Fekri, Afshin Abdi:
A Machine Learning Framework for Privacy-Aware Distributed Functional Compression over AWGN Channels. 380-385 - Serhat Bakirtas, Elza Erkip:
Seeded Database Matching Under Noisy Column Repetitions. 386-391 - Jixiang Zhang, Yinfei Xu:
On Age of Information for Discrete Time Status Updating System With Infinite Size. 392-397 - Priyanka Kaswan, Sennur Ulukus:
Susceptibility of Age of Gossip to Timestomping. 398-403 - Lijia Yang, Li Chen:
Low-Latency Ordered Statistics Decoding of BCH Codes. 404-409 - Sajani Vithana, Sennur Ulukus:
Private Federated Submodel Learning with Sparsification. 410-415 - Ruowan Ji, Anoosheh Heidarzadeh, Krishna R. Narayanan:
Sparse Random Khatri-Rao Product Codes for Distributed Matrix Multiplication. 416-421 - Michael Langberg, Michelle Effros:
Network Coding Multicast Key-Capacity. 422-427 - Ali Khalesi, Petros Elia:
Multi-User Linearly Separable Computation: A Coding Theoretic Approach. 428-433 - Chenglin Fan, Ping Li:
Metric Nearness with Minimum Distortion: Optimal and Approximation. 434-439 - Hrayr Harutyunyan, Greg Ver Steeg, Aram Galstyan:
Formal limitations of sample-wise information-theoretic generalization bounds. 440-445 - Xue Zheng, Parinaz Naghizadeh, Aylin Yener:
DiPLe: Learning Directed Collaboration Graphs for Peer-to-Peer Personalized Learning. 446-451 - Xavier Coiteux-Roy, Stefan Wolf:
Unconditional Proofs-of-Work and Other Possibilities of Thermodynamic Cryptography. 452-457 - Atefeh Gilani, Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar:
An Alphabet of Leakage Measures. 458-463 - Hassan ZivariFard, Rémi A. Chou:
Secure Data Storage Resilient Against Compromised Users via an Access Structure. 464-469 - Bernhard Haeupler, Amirbehshad Shahrasbi:
Rate-Distance Trade-offs for List-Decodable Insertion-Deletion Codes. 470-475 - Gökberk Erdogan, Georg Maringer, Nikita Polyanskii:
Signature Codes for a Noisy Adder Multiple Access Channel. 476-481 - Vlad-Florin Dragoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso:
Integer Syndrome Decoding in the Presence of Noise. 482-487 - Julien du Crest, Mehdi Mhalla, Valentin Savin:
Stabilizer Inactivation for Message-Passing Decoding of Quantum LDPC Codes. 488-493 - Sarah Brandsen, Avijit Mandal, Henry D. Pfister:
Belief Propagation with Quantum Messages for Symmetric Classical-Quantum Channels. 494-499 - Michael R. Grace, Saikat Guha:
Perturbation Theory for Quantum Information. 500-505 - Shi-Yuan Wang, Tuna Erdogan, Uzi Pereg, Matthieu R. Bloch:
Joint Quantum Communication and Sensing. 506-511 - Charul Rajput, Maheshanand Bhaintwal:
A subclass of LRC codes with intersecting recovering sets. 512-516 - Irina E. Bocharova, Boris D. Kudryashov, Sander Mikelsaar:
Irregular Generalized LDPC codes in Practical Communication Scenarios. 517-522 - Dipak Kumar Bhunia, Cristina Fernández-Córdoba, Mercè Villanueva:
On the Classification of ZpZp2 Generalized Hadamard Codes. 523-528 - U. S. S. Sasanka, V. Lalitha:
Tamo-Barg Codes with Efficient Local Repair. 529-534 - Mustapha Hamad, Michèle A. Wigger, Mireille Sarkiss:
Strong Converses using Change of Measure and Asymptotic Markov Chains. 535-540 - Satyajit Thakor, Dauood Saleem:
A Quasi-Uniform Approach to Characterizing the Boundary of the Almost Entropic Region. 541-545 - Michael Dikshtein, Nir Weinberger, Shlomo Shamai Shitz:
On Information Bottleneck for Gaussian Processes. 546-551 - Jaswanthi Mandalapu, Krishna P. Jagannathan:
The Classical Capacity of Quantum Jackson Networks with Waiting Time-Dependent Erasures. 552-557 - Shuche Wang, Van Khu Vu, Vincent Y. F. Tan:
Codes for the Asymmetric Damerau-Levenshtein Distance. 558-563 - Shubhransh Singhvi, Omer Sabary, Daniella Bar-Lev, Eitan Yaakobi:
The Input and Output Entropies of the k-Deletion/Insertion Channel with Small Radii. 564-569 - Luca G. Tallini, Nawaf Alqwaifly, Bella Bose:
Efficient Systematic Deletions/Insertions of 0's Error Control Codes *. 570-575 - Stefano Della Fiore, Marco Dalai, Ugo Vaccaro:
Achievable Rates and Algorithms for Group Testing with Runlength Constraints. 576-581 - Sourbh Bhadane, Aaron B. Wagner, Johannes Ballé:
Do Neural Networks Compress Manifolds Optimally? 582-587 - Mohammad Hossein Amani, Simone Bombari, Marco Mondelli, Rattana Pukdee, Stefano Rini:
Sharp asymptotics on the compression of two-layer neural networks. 588-593 - Fengzhuo Zhang, Anshoo Tandon, Vincent Y. F. Tan:
Active-LATHE: An Active Learning Algorithm for Boosting the Error Exponent for Learning Homogeneous Ising Trees. 594-599 - Navneet Agrawal, Yuqin Qiu, Matthias Frey, Igor Bjelakovic, Setareh Maghsudi, Slawomir Stanczak, Jingge Zhu:
A Learning-Based Approach to Approximate Coded Computation. 600-605 - Ralf R. Müller:
Linear Computation Coding Inspired by the Lempel-Ziv Algorithm. 606-611 - Shobhit Bhatnagar, Vinayak Ramkumar, P. Vijay Kumar:
Rate-Optimal Streaming Codes with Smaller Field Size Under Less-Stringent Decoding-Delay Requirements. 612-617 - Athreya Chandramouli, Abhinav Vaishya, Prasad Krishnan:
Coded Data Rebalancing for Distributed Data Storage Systems with Cyclic Storage. 618-623 - V Arvind Rameshwar, Navin Kashyap:
Linear Runlength-Limited Subcodes of Reed-Muller Codes and Coding Schemes for Input-Constrained BMS Channels. 624-629 - Anisha Banerjee, Andreas Lenz, Antonia Wachter-Zeh:
Sequential Decoding of Convolutional Codes for Synchronization Errors. 630-635 - Mladen Kovacevic, Dejan Vukobratovic:
Optimal Error-Detecting Codes for General Asymmetric Channels via Sperner Theory. 636-641 - Chia-Yu Hsu, Ching-Fang Li, I-Hsiang Wang:
On Universal Sequential Classification from Sequentially Observed Empirical Statistics. 642-647 - Karthik Periyapattana Narayana Prasad, Kota Srinivas Reddy, Vincent Y. F. Tan:
Best Restless Markov Arm Identification. 648-653 - K. V. Harsha, Jithin Ravi, Tobias Koch:
Second-Order Asymptotics of Hoeffding-Like Hypothesis Tests. 654-659 - Shibsankar Das, Krishna Gopal Benerjee, Adrish Banerjee:
On DNA Codes Over the Non-Chain Ring ℤ4 +uℤ4 +u2ℤ4 with u3 =1. 660-665 - Yuwen Huang, Pascal O. Vontobel:
On the Relationship Between the Minimum of the Bethe Free Energy Function of a Factor Graph and Sum-Product Algorithm Fixed Points. 666-671 - Kit Shing Ng, Pascal O. Vontobel:
Double-Cover-Based Analysis of the Bethe Permanent of Non-negative Matrices. 672-677 - Elizabath Peter, K. K. Krishnan Namboodiri, B. Sundar Rajan:
Shared Cache Coded Caching Schemes with known User-to-Cache Association Profile using Placement Delivery Arrays. 678-683 - Ativ Joshi, Abhishek Sinha:
Universal Caching. 684-689 - Mallikharjuna Chinnapadamala, B. Sundar Rajan:
Security and Privacy in Cache-Aided Linear Function Retrieval for Multi-Access Coded Caching. 690-695 - Tulasi Sowjanya B., Visvesh Subramanian, Prasad Krishnan:
Bounding the Optimal Length of Pliable Index Coding via a Hypergraph-based Approach. 696-701 - Anjana Ambika Mahesh, B. Sundar Rajan:
Minrank of Embedded Index Coding Problems and its Relation to Connectedness of a Bipartite Graph. 702-707 - Yauhen Yakimenka, Chung-Wei Weng, Hsuan-Yin Lin, Eirik Rosnes, Jörg Kliewer:
Straggler-Resilient Differentially-Private Decentralized Learning. 708-713 - Sarah A. Obead, Jörg Kliewer:
Multi-Message Pliable Private Information Retrieval. 714-719 - Matthias Frey, Igor Bjelakovic, Janis Nötzel, Slawomir Stanczak:
Semantic Security with Infinite Dimensional Quantum Eavesdropping Channel. 720-725 - Praneeth Kumar Vippathalla, Chung Chan, Navin Kashyap, Qiaoqiao Zhou:
Positivity of Secret Key Capacity for Hypergraphical Sources with a Linear Wiretapper. 726-731 - Amitalok J. Budkuley, Pranav Joshi, Manideep Mamindlapally, Anuj Kumar Yadav:
Commitment over Unreliable Noisy Channels: When Awareness Meets Control. 732-737 - Canran Wang, Netanel Raviv:
All-to-All Encode in Synchronous Systems. 738-743 - Canran Wang, Netanel Raviv:
Breaking Blockchain's Communication Barrier with Coded Computation. 744-749 - Derya Malak:
Fractional Graph Coloring for Functional Compression with Side Information. 750-755 - Alexander Mariona, Homa Esfahanizadeh, Rafael G. L. D'Oliveira, Muriel Médard:
A Bivariate Invariance Principle. 756-761 - Rami Ezzine, Moritz Wiese, Christian Deppe, Holger Boche:
A General Formula for Uniform Common Randomness Capacity. 762-767 - Reka Inovan, Emre Telatar:
Safety in Numbers: Asymptotic Analysis of a Monitoring Problem. 768-773
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.