default search action
IEEE Transactions on Information Theory, Volume 71
Volume 71, Number 1, January 2025
- Han Xu, Yinfei Xu, Tiecheng Song:
Moment Analysis of Age-Dependent Gossip Networks. 1-22 - Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Byzantine Multiple Access Channels - Part II: Communication With Adversary Identification. 23-60 - Mohsen Heidari, Achilleas Anastasopoulos, S. Sandeep Pradhan:
On the Reliability Function of Discrete Memoryless Multiple-Access Channel With Feedback. 61-89 - Jason M. Altschuler, Sinho Chewi:
Shifted Composition I: Harnack and Reverse Transport Inequalities. 90-113 - Chaofeng Guan, Ruihu Li, Jingjie Lv, Zhi Ma:
Symplectic Self-Orthogonal Quasi-Cyclic Codes. 114-124 - Utkarsh Gupta, Hessam Mahdavifar:
A New Algebraic Approach for String Reconstruction From Substring Compositions. 125-137 - Yanyan Dong, Shenghao Yang:
On Optimal Finite-Length Block Codes of Size Four for Binary Symmetric Channels. 138-166 - Jamison R. Ebert, Jean-François Chamberland, Krishna R. Narayanan:
Sparse Regression LDPC Codes. 167-191 - Daniella Bar-Lev, Omer Sabary, Ryan Gabrys, Eitan Yaakobi:
Cover Your Bases: How to Minimize the Sequencing Coverage in DNA Storage Systems. 192-218 - Shitao Li, Minjia Shi, San Ling:
An Open Problem and a Conjecture on Binary Linear Complementary Pairs of Codes. 219-226 - Han Cai, Ying Miao, Moshe Schwartz, Xiaohu Tang:
Repairing Schemes for Tamo-Barg Codes. 227-243 - Keshav Goyal, Duc Tu Dao, Mladen Kovacevic, Han Mao Kiah:
Gilbert-Varshamov Bound for Codes in L₁ Metric Using Multivariate Analytic Combinatorics. 244-262 - Yansheng Wu, Cunsheng Ding, Tingfang Chen:
When Does the Extended Code of an MDS Code Remain MDS? 263-272 - Shitao Li, Minjia Shi, San Ling:
A Mass Formula for Linear Codes With Prescribed Hull Dimension and Related Classification. 273-286 - Xu Pan, San Ling, Hongwei Liu, Bocong Chen:
On the b-Symbol Distances of Matrix Product Codes, Constacyclic Codes, and Reed-Muller Codes. 287-296 - André Chailloux, Thomas Debris-Alazard:
New Solutions to Delsarte's Dual Linear Programs. 297-316 - Aida Abiad, Alexander L. Gavrilyuk, Antonina P. Khramova, Ilia Ponomarenko:
A Linear Programming Bound for Sum-Rank Metric Codes. 317-329 - Chunyu Gan, Chengju Li, Sihem Mesnager, Conghui Xie, Haiyan Zhou:
Improved Lower Bounds on the Minimum Distances of the Dual Codes of Primitive Narrow-Sense BCH Codes. 330-347 - Vinayak Ramkumar, Myna Vajha, M. Nikhil Krishnan:
Streaming Codes for Three-Node Relay Networks With Burst Erasures. 348-359 - Lintao Li, Wei Chen, Petar Popovski, Khaled B. Letaief:
Reliability-Latency-Rate Tradeoff in Low-Latency Communications With Finite-Blocklength Coding. 360-389 - Mathias Hockmann:
Analysis of the Sparse Super Resolution Limit Using the Cramér-Rao Lower Bound. 390-395 - Nicholas R. Olson, Jeffrey G. Andrews:
A Matrix Exponential Generalization of the Laplace Transform of Poisson Shot Noise. 396-412 - Fei Shi, Yu Ning, Qi Zhao, Xiande Zhang:
Bounds on k-Uniform Quantum States. 413-425 - Adam Wills, Ting-Chun Lin, Min-Hsiu Hsieh:
Tradeoff Constructions for Quantum Locally Testable Codes. 426-458 - Sreejith Sreekumar, Mario Berta:
Limit Distribution Theory for Quantum Divergences. 459-484 - Eric Kubischta, Ian Teixeira:
Permutation-Invariant Quantum Codes With Transversal Generalized Phase Gates. 485-498 - Martianus Frederic Ezerman, Markus Grassl, San Ling, Ferruh Özbudak, Buket Özkaya:
Characterization of Nearly Self-Orthogonal Quasi-Twisted Codes and Related Quantum Codes. 499-517 - Ke Li, Yongsheng Yao:
Reliable Simulation of Quantum Channels: The Error Exponent. 518-529 - Joseph M. Renes:
Tight Lower Bound on the Error Exponent of Classical-Quantum Channels. 530-538 - Arpan Mukherjee, Ali Tajer:
Efficient Best Arm Identification in Stochastic Bandits: Beyond β-Optimality. 539-564 - Sagnik Nandy, Subhabrata Sen:
Bayes Optimal Learning in High-Dimensional Linear Regression With Network Side Information. 565-591 - Ankit Pensia, Amir-Reza Asadi, Varun S. Jog, Po-Ling Loh:
Simple Binary Hypothesis Testing Under Local Differential Privacy and Communication Constraints. 592-617 - Eray Can Elumar, Cem Tekin, Osman Yagan:
Multi-Armed Bandits With Costly Probes. 618-643 - Ananya Appan, Anirudh Chandramouli, Ashish Choudhury:
Network Agnostic Perfectly Secure Multiparty Computation Against General Adversaries. 644-682 - Hua Sun:
Secure Groupcast: Extra-Entropic Structure and Linear Feasibility. 683-697 - Jay Cheng, Hsin-Hung Chou, Ling-Chieh Chang, Shin-Shiang Huang, Hsueh-Wen Tseng, Cheng-Hao Yang:
On Constructions of Optical Priority Queues Under a Priority-Based Routing Policy. 698-736 - Andrzej K. Brodzik:
Almost Two-Valued Periodic Golay Sequence Pairs Derived From the Legendre Symbol. 737-751 - Sezel Alkan, Nurdagül Anbar, Tekgül Kalayci, Wilfried Meidl:
Bent Partition, Vectorial Dual-Bent Function, and LP-Packing Constructions. 752-767 - Xiao-Xin Zhao, Zhong-Xiao Wang, Qun-Xiong Zheng, Deng Tang, Wen-Feng Qi:
On a Type of Linear Structures of NFSR Sequences. 768-782 - Neri Merhav:
Universal Slepian-Wolf Coding for Individual Sequences. 783-796 - Kengo Hashimoto, Ken-ichi Iwata:
Optimal Codes in the Class of 2-Bit Delay Decodable Codes. 797-832 - Yossi Marciano, Neri Merhav:
Optimal Signals and Detectors Based on Correlation and Energy. 833-846
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.