Row/Column Replacement for the Control of Hard Defects in Semiconductor RAM's
IEEE Transactions on Computers
Equivocations for homophonic ciphers
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Optimal separations between concurrent-write parallel machines
STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
Learning and robust learning of product distributions
COLT '93 Proceedings of the sixth annual conference on Computational learning theory
Lower bounds for PAC learning with queries
COLT '93 Proceedings of the sixth annual conference on Computational learning theory
Size of shares and probability of cheating in threshold schemes
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
Entropy-based subspace clustering for mining numerical data
KDD '99 Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining
On the power of Las Vegas for one-way communication complexity, OBDDs, and finite automata
Information and Computation
Joint Source-Channel Coding Using Variable-Length Codes
Problems of Information Transmission
Epsilon-entropy of an Ellipsoid in a Hamming Space
Problems of Information Transmission
On Limits of Wireless Communications in a Fading Environment when UsingMultiple Antennas
Wireless Personal Communications: An International Journal
Lower bounds for collusion-secure fingerprinting
SODA '03 Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms
On the Size of Shares for Secret Sharing Schemes
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
On the Information Rate of Secret Sharing Schemes (Extended Abstract)
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
A Generalized Class of Boosting Algorithms Based on Recursive Decoding Models
MCS '01 Proceedings of the Second International Workshop on Multiple Classifier Systems
Universal coding for arbitrarily varying sources and for hierarchies of model classes
DCC '95 Proceedings of the Conference on Data Compression
Zero-Error Source Coding with Maximum Distortion Criterion
DCC '02 Proceedings of the Data Compression Conference
Intrinsic generalization analysis of low dimensional representations
Neural Networks - 2003 Special issue: Advances in neural networks research IJCNN'03
Extremal Relations between Additive Loss Functions and the Kolmogorov Complexity
Problems of Information Transmission
A Note on Counting Very Different Sequences
Combinatorics, Probability and Computing
Self-Similarity Bounds for Locally Thin Set Families
Combinatorics, Probability and Computing
Combinatorics, Probability and Computing
Combinatorics, Probability and Computing
Discrete Isoperimetric Inequalities and the Probability of a Decoding Error
Combinatorics, Probability and Computing
An information-theoretic model for steganography
Information and Computation
Relative information of type s, Csiszár's f-divergence, and information inequalities
Information Sciences—Informatics and Computer Science: An International Journal
A New Relaying Scheme for Cheap Wireless Relay Nodes
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Optimal channel rate allocation for multimedia communication over fading wireless channels
WMuNeP '05 Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling
On the Number of Hamiltonian Cycles in a Tournament
Combinatorics, Probability and Computing
Local chromatic number and Sperner capacity
Journal of Combinatorial Theory Series B
On the influence of the variable ordering for algorithmic learning using OBDDs
Information and Computation
The largest strongly consecutive repeat-free code
Journal of Combinatorial Theory Series A
The multicast capacity of deterministic relay networks with no interference
IEEE/ACM Transactions on Networking (TON) - Special issue on networking and information theory
Random matrix theory and wireless communications
Communications and Information Theory
Information theory and statistics: a tutorial
Communications and Information Theory
Geometric programming for communication systems
Communications and Information Theory
Performance analysis of linear codes under maximum-likelihood decoding: a tutorial
Communications and Information Theory
An upper bound for the largest Lyapunov exponent of a Markovian product of nonnegative matrices
Theoretical Computer Science
On inequalities between mutual information and variation
Problems of Information Transmission
Foundations and Trends® in Networking
Splitting the BLOSUM score into numbers of biological significance
EURASIP Journal on Bioinformatics and Systems Biology
Foundations and Trends® in Networking
Reliability criteria in information theory and in statistical hypothesis testing
Foundations and Trends in Communications and Information Theory
Random Structures & Algorithms
Mutual information, variation, and Fano's inequality
Problems of Information Transmission
Topics in Multi-User Information Theory
Foundations and Trends in Communications and Information Theory
Multiaccess channels with state known to some encoders and independent messages
EURASIP Journal on Wireless Communications and Networking - Theory and Applications in Multiuser/Multiterminal Communications
Jamming games in fast-fading wireless channels
International Journal of Autonomous and Adaptive Communications Systems
A class of optimal constant composition codes from GDRPs
Designs, Codes and Cryptography
On types of growth for graph-different permutations
Journal of Combinatorial Theory Series A
Universal Coding for Correlated Sources with Complementary Delivery
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Change (Detection) You Can Believe in: Finding Distributional Shifts in Data Streams
IDA '09 Proceedings of the 8th International Symposium on Intelligent Data Analysis: Advances in Intelligent Data Analysis VIII
Universal Estimation of Information Measures for Analog Sources
Foundations and Trends in Communications and Information Theory
Lossy distributed source coding using graphs
IEEE Communications Letters
On the outage capacity of a practical decoder accounting for channel estimation inaccuracies
IEEE Transactions on Communications
Identical-capacity channel decomposition for design of universal LDPC codes
IEEE Transactions on Communications
Relations between random coding exponents and the statistical physics of random codes
IEEE Transactions on Information Theory
Analysis of a mixed strategy for multiple relay networks
IEEE Transactions on Information Theory
Universal simulation with fidelity criteria
IEEE Transactions on Information Theory
On the capacity of the discrete-time poisson channel
IEEE Transactions on Information Theory
Tracking stopping times through noisy observations
IEEE Transactions on Information Theory
Distributed MIMO receiver: achievable rates and upper bounds
IEEE Transactions on Information Theory
A Neyman-Pearson approach to universal erasure and list decoding
IEEE Transactions on Information Theory
Communication under strong asynchronism
IEEE Transactions on Information Theory
Capacity of cognitive interference channels with and without secrecy
IEEE Transactions on Information Theory
Capacity bounds for the Gaussian interference channel
IEEE Transactions on Information Theory
Authentication over noisy channels
IEEE Transactions on Information Theory
Exact characterization of the minimax loss in error exponents of universal decoders
IEEE Transactions on Information Theory
Linear-codes-based lossless joint source-channel coding for multiple-access channels
IEEE Transactions on Information Theory
Error exponents for asymmetric two-user discrete memoryless source-channel coding systems
IEEE Transactions on Information Theory
Nonlinear sparse-graph codes for lossy compression
IEEE Transactions on Information Theory
Capacity/storage tradeoff in high-dimensional identification systems
IEEE Transactions on Information Theory
The error exponent of variable-length codes over Markov channels with feedback
IEEE Transactions on Information Theory
On the loss of single-letter characterization: the dirty multiple access channel
IEEE Transactions on Information Theory
Capacity region of the finite-state multiple-access channel with and without feedback
IEEE Transactions on Information Theory
On complementary graph entropy
IEEE Transactions on Information Theory
Random-coding lower bounds for the error exponent of joint quantization and watermarking systems
IEEE Transactions on Information Theory
Classical capacities of compound and averaged quantum channels
IEEE Transactions on Information Theory
Feedback capacity of the compound channel
IEEE Transactions on Information Theory
Source and channel coding for correlated sources over multiuser channels
IEEE Transactions on Information Theory
On the duality between Slepian-Wolf coding and channel coding under mismatched decoding
IEEE Transactions on Information Theory
Rateless coding for arbitrary channel mixtures with decoder channel state information
IEEE Transactions on Information Theory
Outage behavior of discrete memoryless channels under channel estimation errors
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Pattern Recognition Letters
Some fundamental coding theoretic limits of unequal error protection
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
On secrecy capacity per unit cost
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Identification over multiple databases
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
A strong converse for a collection of network source coding problems
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Bounds and capacity results for the cognitive Z-interference channel
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Secrecy generation for multiple input multiple output channel models
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Evaluation of Marton's inner bound for the general broadcast channel
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Binary causal-adversary channels
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
The secrecy capacity of the semi-deterministic broadcast channel
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Comments on "broadcast channels with arbitrarily correlated sources"
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Correlated sources over broadcast channels
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
Sum capacity of multi-source linear finite-field relay networks with fading
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
Ergodic interference alignment
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
The Gelfand-Pinsker channel: strong converse and upper bound for the reliability function
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
Strong converse for Gel'fand-Pinsker channel
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
Capacity of compound state-dependent channels with states known at the transmitter
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
Coding for the bidirectional broadcast channel with random states known at the encoder
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
Asynchronous Slepian-Wolf code design
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
Improved Slepian-Wolf exponents via Witsenhausen's rate
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
On arbitrarily varying Markov source coding and hypothesis LAO testing by non-informed statistician
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
Source coding with a side information 'vending machine' at the decoder
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
Two lossy source coding problems with causal side-information
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
The Gray-Wyner network with a limited-rate helper to the encoder and decoders
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
Closed forms of the achievable rate region for Wyner's source coding systems
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
On feedback in network source coding
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
A new capacity upper bound for "relay-with-delay" channel
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 1
On the interplay between Shannon's information measures and reliability criteria
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 1
Coding theorem for general stationary memoryless channel based on hash property
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 1
Compressed sensing over finite fields
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 1
Mutual information of several random variables and its estimation via variation
Problems of Information Transmission
On the capacity of finite state multiple access channels with asymmetric partial state feedback
WiOPT'09 Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Iterative approximate linear programming decoding of LDPC codes with linear complexity
IEEE Transactions on Information Theory
Information spectrum approach to second-order coding rate in channel coding
IEEE Transactions on Information Theory
Capacity regions and bounds for a class of Z-interference channels
IEEE Transactions on Information Theory
Coding and common reconstruction
IEEE Transactions on Information Theory
Biometric systems: privacy and secrecy aspects
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
On the discontinuity of the Shannon information measures
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Unequal error protection: an information-theoretic perspective
IEEE Transactions on Information Theory
On the linear codebook-level duality between Slepian-Wolf coding and channel coding
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
The equivalence between Slepian-Wolf coding and channel coding under density evolution
IEEE Transactions on Communications
An impossibility result on graph secret sharing
Designs, Codes and Cryptography
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
General short computational secret sharing schemes
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Bandwidth optimal steganography secure against adaptive chosen stegotext attacks
IH'06 Proceedings of the 8th international conference on Information hiding
Good error correcting output codes for adaptive multiclass learning
MCS'03 Proceedings of the 4th international conference on Multiple classifier systems
IEEE Transactions on Information Theory
Channel simulation with quantum side information
IEEE Transactions on Information Theory
Universal source coding over generalized complementary delivery networks
IEEE Transactions on Information Theory
LDPC code design for asynchronous Slepian-Wolf coding
IEEE Transactions on Communications
AAECC'07 Proceedings of the 17th international conference on Applied algebra, algebraic algorithms and error-correcting codes
When do only sources need to compute? on functional compression in tree networks
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Compound relay channel with informed relay and destination
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
The lossy one-helper conjecture is false
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Interference alignment at finite SNR: general message sets
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Capacity region of a state dependent degraded broadcast channel with noncausal transmitter CSI
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Arbitrary jamming can preclude secure communication
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Lower bounds on the capacity of the relay channel with states at the source
EURASIP Journal on Wireless Communications and Networking
Coding strategies for bidirectional relaying for arbitrarily varying channels
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
The interference-multiple-access channel
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Zero-rate feedback can achieve the empirical capacity
IEEE Transactions on Information Theory
Error exponents of optimum decoding for the interference channel
IEEE Transactions on Information Theory
Anthropic correction of information estimates and its application to neural coding
IEEE Transactions on Information Theory - Special issue on information theory in molecular biology and neuroscience
Variations on information embedding in multiple access and broadcast channels
IEEE Transactions on Information Theory
Cooperative relaying with state available noncausally at the relay
IEEE Transactions on Information Theory
Variable-rate channel capacity
IEEE Transactions on Information Theory
Hash property and fixed-rate universal coding theorems
IEEE Transactions on Information Theory
Two-way source coding with a helper
IEEE Transactions on Information Theory
A graph-based distributed reconstruction source coding with correlated messages
IEEE Communications Letters
Achieving the rate-distortion bound with low-density generator matrix codes
IEEE Transactions on Communications
Generalizing capacity: new definitions and capacity theorems for composite channels
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
IEEE Transactions on Communications
Mismatched estimation and relative entropy
IEEE Transactions on Information Theory
Rényi information dimension: fundamental limits of almost lossless analog compression
IEEE Transactions on Information Theory
Performance bounds for erasure, list and decision feedback schemes with linear block codes
IEEE Transactions on Information Theory
Information-theoretic key agreement of multiple terminals: part I
IEEE Transactions on Information Theory
Information-theoretic key agreement of multiple terminal: part II: channel model
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Twice-universal simulation of Markov sources and individual sequences
IEEE Transactions on Information Theory
The relationship between causal and noncausal mismatched estimation in continuous-time AWGN channels
IEEE Transactions on Information Theory
Group codes outperform binary-coset codes on nonbinary symmetric memoryless channels
IEEE Transactions on Information Theory
Information theoretic bounds for compressed sensing
IEEE Transactions on Information Theory
A linear encoding approach to index assignment in lossy source-channel coding
IEEE Transactions on Information Theory
Optimal coding strategies for bidirectional broadcast channels under channel uncertainty
IEEE Transactions on Communications
Power allocation in distributed detection with wireless sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Capacity of channels with action-dependent states
IEEE Transactions on Information Theory
Achievable error exponents for channels with side information: erasure and list decoding
IEEE Transactions on Information Theory
On information divergence measures and a unified typicality
IEEE Transactions on Information Theory
The interplay between entropy and variational distance
IEEE Transactions on Information Theory
On multipath fading channels at high SNR
IEEE Transactions on Information Theory
Interference channels with correlated receiver side information
IEEE Transactions on Information Theory
Linear universal decoding for compound channels
IEEE Transactions on Information Theory
Limited-rate channel state feedback for multicarrier block fading channels
IEEE Transactions on Information Theory
Multiple multicasts with the help of a relay
IEEE Transactions on Information Theory
Single-ballot risk-limiting audits using convex optimization
EVT/WOTE'10 Proceedings of the 2010 international conference on Electronic voting technology/workshop on trustworthy elections
Saddle-point properties and nash equilibria for channel games
EURASIP Journal on Advances in Signal Processing - Special issue on game theory in signal processing and communications
Hardness Amplification Proofs Require Majority
SIAM Journal on Computing
Limits on entropic uncertainty relations for 3 and more MUBs
Quantum Information & Computation
Generalization of a Pinsker problem
Problems of Information Transmission
MESA: maximum entropy by simulated annealing
UAI'92 Proceedings of the Eighth international conference on Uncertainty in artificial intelligence
Efficient shape indexing using an information theoretic representation
CIVR'05 Proceedings of the 4th international conference on Image and Video Retrieval
Some contributions to the minimum representation problem of key systems
FoIKS'06 Proceedings of the 4th international conference on Foundations of Information and Knowledge Systems
Capacity-based random codes cannot achieve strong secrecy over symmetric wiretap channels
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools
Secure distributed lossless compression with side information at the eavesdropper
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools
Designs, Codes and Cryptography
General Theory of Information Transfer and Combinatorics
General Theory of Information Transfer and Combinatorics
Watermarking identification codes with related topics on common randomness
General Theory of Information Transfer and Combinatorics
Notes on conditions for successive refinement of information
General Theory of Information Transfer and Combinatorics
Bounds of E-capacity for multiple-access channel with random parameter
General Theory of Information Transfer and Combinatorics
Codes with the identifiable parent property and the multiple-access channel
General Theory of Information Transfer and Combinatorics
General Theory of Information Transfer and Combinatorics
Estimating with randomized encoding the joint empirical distribution in a correlated source
General Theory of Information Transfer and Combinatorics
General Theory of Information Transfer and Combinatorics
On logarithmically asymptotically optimal testing of hypotheses and identification
General Theory of Information Transfer and Combinatorics
On concepts of performance parameters for channels
General Theory of Information Transfer and Combinatorics
Search with noisy and delayed responses
General Theory of Information Transfer and Combinatorics
Biometric Security from an Information-Theoretical Perspective
Foundations and Trends in Communications and Information Theory
Complexity-compression tradeoffs in lossy compression via efficient random codebooks and databases
Problems of Information Transmission
Information Theory, Combinatorics, and Search Theory
Capacity results for arbitrarily varying wiretap channels
Information Theory, Combinatorics, and Search Theory
Classical-Quantum arbitrarily varying wiretap channel
Information Theory, Combinatorics, and Search Theory
Information Theory, Combinatorics, and Search Theory
Multiple objects: error exponents in hypotheses testing and identification
Information Theory, Combinatorics, and Search Theory
Family complexity and VC-Dimension
Information Theory, Combinatorics, and Search Theory
Search for sparse active inputs: a review
Information Theory, Combinatorics, and Search Theory
Information Theory, Combinatorics, and Search Theory
Hi-index | 4.15 |