Abstract is missing.
- Group testing with unreliable elementsArya Mazumdar, Soheil Mohajer. 1-3 [doi]
- Minimal realization problem for Hidden Markov ModelsQingqing Huang, Rong Ge, Sham Kakade, Munther A. Dahleh. 4-11 [doi]
- Remote estimation games over shared networksMarcos M. Vasconcelos, Nuno C. Martins. 12-18 [doi]
- Asynchronous incremental block-coordinate descentArda Aytekin, Hamid Reza Feyzmahdavian, Mikael Johansson. 19-24 [doi]
- Optimized path planning for electric vehicle routing and chargingMahnoosh Alizadeh, Hoi-To Wai, Anna Scaglione, Andrea J. Goldsmith, Yueyue Fan, Tara Javidi. 25-32 [doi]
- Anomaly detection over independent processes: Switching with memoryKobi Cohen, Qing Zhao. 33-37 [doi]
- Contract design for frequency regulation by aggregations of commercial buildingsMaximilian Balandat, Frauke Oldewurtel, Mo Chen, Claire Tomlin. 38-45 [doi]
- Active target defense differential gameMeir Pachter, Eloy Garcia, David W. Casbeer. 46-53 [doi]
- Rating and matching in peer review systemsYuanzhang Xiao, Florian Dörfler, Mihaela van der Schaar. 54-61 [doi]
- Optimal contract design for energy procurementHamidreza Tavafoghi, Demosthenis Teneketzis. 62-69 [doi]
- Electricity pooling markets with elastic demand: A mechanism design approachMohammad Rasouli 0001, Demosthenis Teneketzis. 70-75 [doi]
- A novel correlation model for universal compression of parametric sourcesAhmad Beirami, Faramarz Fekri. 76-82 [doi]
- Randomized source coding with limited common randomnessNaci Saldi, Tamás Linder, Serdar Yüksel. 83-87 [doi]
- Rateless lossy compression via the extremesAlbert No, Tsachy Weissman. 88-92 [doi]
- Information friction limits on computationPooja Vyavahare, Majid Mahzoon, Pulkit Grover, Nutan Limaye, D. Manjunath. 93-100 [doi]
- The capacity of non-identical adaptive group testingThomas Kealy, Oliver Johnson, Robert J. Piechocki. 101-108 [doi]
- Active target detection with navigation costs: A randomized benchmarkSunav Choudhary, Dhruva Kartik, Naveen Kumar, Srikanth Narayanan, Urbashi Mitra. 109-115 [doi]
- Estimation and tracking of time-varying channels in OFDM systemsMilica Stojanovic, Sayedamirhossein Tadayon. 116-122 [doi]
- Self-synchronizing signal parsing with spiking feature-detection filtersHans-Andrea Loeliger, Sarah Neff, Christoph Reller. 123-128 [doi]
- Least favorable distributions to facilitate the design of detection systems with sensors at deterministic locationsBenedito J. B. Fonseca Jr.. 129-136 [doi]
- On competitive provisioning of ad-supported cloud servicesJayakrishnan Nair, Vijay G. Subramanian, Adam Wierman. 137-139 [doi]
- Incentive mechanism and protocol design for crowdsourcing systemsHong Xie, John C. S. Lui, Joe Wenjie Jiang, Wei Chen. 140-147 [doi]
- Strong converse for a degraded wiretap channel via active hypothesis testingMasahito Hayashi, Himanshu Tyagi, Shun Watanabe. 148-151 [doi]
- The Gaussian channel with noisy feedback: Near-capacity performance via simple interactionAssaf Ben-Yishai, Ofer Shayevitz. 152-159 [doi]
- Using relative-relevance of data pieces for efficient communication, with an application to Neural data acquisitionMajid Mahzoon, Hassan Albalawi, Xin Li 0001, Pulkit Grover. 160-166 [doi]
- Capacity region of the reciprocal deterministic 3-way channel via Δ-Y transformationHenning Maier, Anas Chaaban, Rudolf Mathar, Aydin Sezgin. 167-174 [doi]
- On the diversity-multiplexing tradeoff of secret-key agreement over multiple-antenna channelsMarwen Zorgui, Zouheir Rezki, Basel Alomair, Mohamed-Slim Alouini. 175-182 [doi]
- Gaussian MIMO wiretap channel under receiver side power constraintsKarim A. Banawan, Sennur Ulukus. 183-190 [doi]
- On capacity regions of two-receiver broadcast packet erasure channels with feedback and memoryMichael Heindlmaier, Navid Reyhanian, Shirin Saeedi Bidokhti. 191-198 [doi]
- Optimal spectrum management for the two-user Gaussian interference channel: Avoidance or cancellation?Khalid Zeineddine, Michael L. Honig, Shirish Nagaraj. 199-205 [doi]
- Impact of end-user decisions on pricing in wireless networks under a multiple-user-single-provider settingYingxiang Yang, Narayan B. Mandayam. 206-212 [doi]
- No regrets: Distributed power control under time-varying channels and QoS requirementsIoannis Stiakogiannakis, Panayotis Mertikopoulos, Corinne Touati. 213-220 [doi]
- A bit-error based capture model for EPCglobal RFID systemsAndreas Schantin, Christoph Ruland. 221-226 [doi]
- Compute-and-Forward: Finding the best equationSaeid Sahraei, Michael Gastpar. 227-233 [doi]
- Downlink resource allocation under time-varying interference: Fairness and throughput optimalityRavi Kiran Raman, Krishna Jagannathan. 234-241 [doi]
- Differentially private distributed protocol for electric vehicle chargingShuo Han, Ufuk Topcu, George J. Pappas. 242-249 [doi]
- On the relationship between queues and multipliersVíctor Valls, Douglas J. Leith. 250-255 [doi]
- Dimensionality reduction of affine variational inequalities using random projectionsBharat Prabhakar, Ankur A. Kulkarni. 256-263 [doi]
- Distributed subgradient-push online convex optimization on time-varying directed graphsMohammad Akbari, Bahman Gharesifard, Tamás Linder. 264-269 [doi]
- Broadcast-based distributed alternating direction method of multipliersAli Makhdoumi, Asuman E. Ozdaglar. 270-277 [doi]
- Overlap graph clustering via successive removalAvik Ray, Javad Ghaderi, Sujay Sanghavi, Sanjay Shakkottai. 278-285 [doi]
- Distributed consensus with mixed time/communication bandwidth performance metricsFederico Rossi, Marco Pavone. 286-293 [doi]
- A botnet detection gameBraden Soper, John Musacchio. 294-303 [doi]
- Computing with 10, 000-bit wordsPentti Kanerva. 304-310 [doi]
- A framework for machine vision based on neuro-mimetic front end processing and clusteringEmre Akbas, Aseem Wadhwa, Miguel P. Eckstein, Upamanyu Madhow. 311-318 [doi]
- Enabling hardware relaxations through statistical learningZhuo Wang, Naveen Verma. 319-326 [doi]
- Online scheduling for energy efficiency in real-time wireless networksShuai Zuo, I-Hong Hou. 327-334 [doi]
- Average cost optimal threshold strategies for remote estimation with communication costJhelum Chakravorty, Aditya Mahajan. 335-342 [doi]
- On the use of model-free linear feedback to trade stock: Two open research problemsShirzad Malekpour, B. Ross Barmish. 343-349 [doi]
- Study of the brain functional network using synthetic dataSomayeh Sojoudi, John Doyle. 350-357 [doi]
- Feedback through overhearingJinyuan Chen, Ayfer Özgür, Suhas N. Diggavi. 358-365 [doi]
- On the symmetric K-user linear deterministic interference channels with limited feedbackMehdi Ashraphijuo, Vaneet Aggarwal, Xiaodong Wang. 366-371 [doi]
- Transmitter cooperation in interference channel with delayed CSITSina Lashgari, Amir Salman Avestimehr. 378-384 [doi]
- Active learning from uncertain crowd annotationsYan Yan, Rómer Rosales, Glenn Fung, Jennifer G. Dy. 385-392 [doi]
- Botnet detection using social graph analysisJing Wang, Ioannis Ch. Paschalidis. 393-400 [doi]
- Throughput optimal routing in overlay networksGeorgios S. Paschos, Eytan Modiano. 401-408 [doi]
- Bayesian regression and BitcoinDevavrat Shah, Kang Zhang. 409-414 [doi]
- How to utilize caching to improve spectral efficiency in device-to-device wireless networksNavid Naderializadeh, David T.-H. Kao, Amir Salman Avestimehr. 415-422 [doi]
- Single-source/sink network error correction is as hard as multiple-unicastWentao Huang, Tracey Ho, Michael Langberg, Jörg Kliewer. 423-430 [doi]
- New bounds for distributed storage systems with secure repairRavi Tandon, Soheil Mohajer. 431-436 [doi]
- Multi-server private information retrieval over unsynchronized databasesGiulia C. Fanti, Kannan Ramchandran. 437-444 [doi]
- On a weakly secure regenerating code construction for minimum storage regimeSwanand Kadhe, Alex Sprintson. 445-452 [doi]
- Repair-efficient distributed storage codes with heterogeneous reliability requirementsChao Tian. 453-458 [doi]
- When and by how much can helper node selection improve regenerating codes?Imad Ahmad, Chih-Chun Wang. 459-466 [doi]
- Sufficient statistics for multi-agent decision problemsJeffrey N. Wu, Sanjay Lall. 467-474 [doi]
- Distributed coordination for economic dispatch with varying load and generator commitmentAshish Cherukuri, Jorge Cortés. 475-482 [doi]
- Context-adaptive big data stream miningCem Tekin, Luca Canzian, Mihaela van der Schaar. 483-490 [doi]
- Randomized pricing for the optimal coordination of opportunistic agentsOzgur Dalkilic, Atilla Eryilmaz, Xiaojun Lin. 491-498 [doi]
- Sparse binary matrices as efficient associative memoriesVincent Gripon, Vitaly Skachek, Michael Rabbat. 499-504 [doi]
- Coding for secure write-efficient memoriesQing Li, Anxiao Jiang. 505-512 [doi]
- Writing on dirty flash memoryYongjune Kim, B. V. K. Vijaya Kumar. 513-520 [doi]
- Low delay random linear coding over a streamMohammad Karzand, Douglas J. Leith. 521-528 [doi]
- Near real-time rateless coding with a constrained feedback budgetMorteza Hashemi, Ari Trachtenberg. 529-536 [doi]
- Towards cloud sensing enabled target localizationNianxia Cao, Swastik Brahma, Pramod K. Varshney. 537-544 [doi]
- Controlled sensing and event based communication for remote estimationEmrah Akyol, Urbashi Mitra, Ashutosh Nayyar. 545-549 [doi]
- Thermodynamic costs in implementing Kalman-Bucy filtersHenrik Sandberg, Jean-Charles Delvenne, Nigel J. Newton, Sanjoy K. Mitter. 550-555 [doi]
- Eminence grise coalitions in opinion dynamicsSadegh Bolouki, Milad Siami, Roland P. Malhamé, Nader Motee. 556-562 [doi]
- Isn't hybrid ARQ sufficient?Michael Heindlmaier, Emina Soljanin. 563-568 [doi]
- On multi-version coding for distributed storageZhiying Wang, Viveck R. Cadambe. 569-575 [doi]
- Use of erasure code for low latency cloud storageGuanfeng Liang, Ulas C. Kozat. 576-581 [doi]
- Real-time decentralized voltage control in distribution networksNa Li, Guannan Qu, Munther A. Dahleh. 582-588 [doi]
- Efficient convex relaxation for stochastic optimal distributed control problemAbdulrahman Kalbat, Ramtin Madani, Ghazal Fazelnia, Javad Lavaei. 589-596 [doi]
- Control configuration design for a class of structural bilinear systemsSupratim Ghosh, Justin Ruths. 597-604 [doi]
- Localized distributed optimal control with output feedback and communication delaysYuh-Shyan Wang, Nikolai Matni. 605-612 [doi]
- Demand shaping in cellular networksXinyang Zhou, Lijun Chen. 621-628 [doi]
- A priority queue model for competition with shared spectrumChang Liu, Randall A. Berry. 629-636 [doi]
- Combating curse of dimensionality in resilient plant monitoring systems: Overlapping decomposition and knowledge fusionHumberto E. Garcia, Semyon M. Meerkov, Maruthi T. Ravichandran. 637-642 [doi]
- An experts learning approach to mobile service offloadingCem Tekin, Mihaela van der Schaar. 643-650 [doi]
- Sum-networks from undirected graphs: Construction and capacity analysisArdhendu Tripathy, Aditya Ramamoorthy. 651-658 [doi]
- Can a noisy encoder be used to communicate reliably?Yaoqing Yang, Pulkit Grover, Soummya Kar. 659-666 [doi]
- Asymmetric Compute-and-Forward: Going beyond one hopYihua Tan, Xiaojun Jenny Yuan, Soung Chang Liew, Aleksandar Kavcic. 667-674 [doi]
- Sign-compute-resolve for random accessJasper Goseling, Cedomir Stefanovic, Petar Popovski. 675-682 [doi]
- Scheduling in densified networks: Algorithms and performanceSharayu Moharir, Subhashini Krishnasamy, Sanjay Shakkottai. 683-690 [doi]
- A deterministic view on the capacity of bandlimited functionsTaehyung J. Lim, Massimo Franceschetti. 691-698 [doi]
- Efficient statistics: Extracting information from IID observationsShao-Lun Huang, Anuran Makur, Fabian Kozynski, Lizhong Zheng. 699-706 [doi]
- Must one learn the channel to communicate at capacity?Yuguang Gao, Aaron B. Wagner. 707-714 [doi]
- Feasibility of power system structure preserving linear transformations for the AC optimal power flow problemDan Wu, Bernard C. Lesieutre, Parmesh Ramanathan. 715-722 [doi]
- Toward a scalable chance-constrained formulation for unit commitment to manage high penetration of variable generationMaria Gabriela Martinez, C. Lindsay Anderson. 723-730 [doi]
- Optimal load-side control for frequency regulation in smart gridsEnrique Mallada, Changhong Zhao, Steven H. Low. 731-738 [doi]
- Distributed stopping for average consensus using double linear iterative strategiesNicolaos Manitara, Christoforos N. Hadjicostis. 739-746 [doi]
- Information spectrum approach to strong converse theorems for degraded wiretap channelsVincent Y. F. Tan, Matthieu R. Bloch. 747-754 [doi]
- A rate-distortion based secrecy system with side information at the decodersEva C. Song, Paul Cuff, H. Vincent Poor. 755-762 [doi]
- An extremal inequality for long Markov chainsThomas A. Courtade, Jiantao Jiao. 763-770 [doi]
- Asymptotic capacity of a random channelTobias Sutter, David Sutter, John Lygeros. 771-778 [doi]
- Ergodic capacity under channel distribution uncertaintySergey Loyka, Charalambos D. Charalambous, Ioanna Ioannou. 779-784 [doi]
- Partial decode-Forward relaying for the Gaussian two-hop relay networkJing Li, Young-Han Kim 0001. 785-788 [doi]
- How to achieve the capacity of asymmetric channelsMarco Mondelli, Rüdiger L. Urbanke, Seyed Hamed Hassani. 789-796 [doi]
- On the scaling exponent of binary polarization kernelsArman Fazeli, Alexander Vardy. 797-804 [doi]
- Universal source polarization and an application to a multi-user problemMin Ye, Alexander Barg. 805-812 [doi]
- Concatenations of polar codes with outer BCH codes and convolutional codesYing Wang, Krishna R. Narayanan. 813-819 [doi]
- Interactive function computation via polar codingTalha Cihad Gulcu, Alexander Barg. 820-827 [doi]
- LP-decodable multipermutation codesXishuo Liu, Stark C. Draper. 828-835 [doi]
- Unsupervised nonparametric anomaly detection: A kernel methodShaofeng Zou, Yingbin Liang, H. Vincent Poor, Xinghua Shi. 836-841 [doi]
- PhaseCode: Fast and efficient compressive phase retrieval based on sparse-graph codesRamtin Pedarsani, Kangwook Lee, Kannan Ramchandran. 842-849 [doi]
- Distributed stochastic optimization and learningOhad Shamir, Nathan Srebro. 850-857 [doi]
- Info-greedy sequential adaptive compressed sensingGábor Braun, Sebastian Pokutta, Yao Xie. 858-865 [doi]
- Estimating structured signals in sparse noise: A precise noise sensitivity analysisChristos Thrampoulidis, Babak Hassibi. 866-873 [doi]
- Gaussian distortion-rate function under sub-nyquist nonuniform samplingAlon Kipnis, Andrea J. Goldsmith, Yonina C. Eldar. 874-880 [doi]
- Sensitivity analysis in RIPless compressed sensingAbdolreza Abdolhosseini Moghadam, Mohammad Aghagolzadeh, Hayder Radha. 881-888 [doi]
- On information-theoretic metrics for symmetric-key encryption and privacyFlávio du Pin Calmon, Mayank Varia, Muriel Médard. 889-894 [doi]
- Multi-terminal networks with an untrusted relayAhmed A. Zewail, Mohamed S. Nafea, Aylin Yener. 895-902 [doi]
- A rate-disortion perspective on local differential privacyAnand D. Sarwate, Lalitha Sankar. 903-908 [doi]
- Achievable schemes and limits for local recovery on a graphArya Mazumdar. 909-913 [doi]
- Finite length analysis of caching-aided coded multicastingKarthikeyan Shanmugam, Mingyue Ji, Antonia Maria Tulino, Jaime Llorca, Alexandros G. Dimakis. 914-920 [doi]
- Chop and roll: Improving the cutset boundSudeep Kamath, Young Han Kim. 921-927 [doi]
- An algorithm for simultaneous partial inversesJiun-Hung Yu, Hans-Andrea Loeliger. 928-935 [doi]
- Stability analysis of networked control systems with unknown inputsAhmad F. Taha, Ahmed Elmahdi, Jitesh H. Panchal, Dengfeng Sun. 936-942 [doi]
- Dynamic economic dispatch among strategic generators with storage systemsWenyuan Tang, Rahul Jain 0002. 943-950 [doi]
- Strategic resource allocation for competitive influence in social networksAntonia Maria Masucci, Alonso Silva. 951-958 [doi]
- A convex approach to consensus on SO(n)Nikolai Matni, Matanya B. Horowitz. 959-966 [doi]
- Optimizing the service policy of a wireless access point on the move with renewable energyElif Tugce Ceran, Tugce Erkilic, Elif Uysal-Biyikoglu, Tolga Girici, Kemal Leblebicioglu. 967-974 [doi]
- Two-user degraded broadcast channel with channel state information at transmitter and message side information at receiversLin Song, Haiyang Xin, Xiaojun Yuan, Tie Liu. 975-980 [doi]
- Linear relaying for Gaussian diamond networksYi Xu, Young Han Kim. 981-986 [doi]
- Colour-and-Forward: Relaying "what the destination needs" in the zero-error primitive relay channelYanying Chen, Sara Shahi, Natasha Devroye. 987-995 [doi]
- Dependence balance outer bounds for the discrete memoryless two-way multiple access broadcast channelSaeed Hajizadeh, Natasha Devroye. 996-1003 [doi]
- The compound secrecy capacity of a class of non-degraded MIMO Gaussian channelsRafael F. Schaefer, Sergey Loyka. 1004-1010 [doi]
- Social game for building energy efficiency: Incentive designLillian J. Ratliff, Ming Jin, Ioannis C. Konstantakopoulos, Costas J. Spanos, S. Shankar Sastry. 1011-1018 [doi]
- Equivalence of graphical lasso and thresholding for sparse graphsSomayeh Sojoudi. 1019-1025 [doi]
- Optimal kinodynamic motion planning in environments with unexpected obstaclesBeth L. Boardman, Troy Harden, Sonia Martínez. 1026-1032 [doi]
- Multivariable algebraic loops with complementarity constraints enforcing some KKT conditionsAmbrose A. Adegbege, William Paul Heath. 1033-1039 [doi]
- Identification of faults using sparse optimizationGuangyu Feng, Ali Abur. 1040-1045 [doi]
- Decentralized control of DC-segmented power systemsJosh A. Taylor, Luca Scardovi. 1046-1050 [doi]
- On market dynamics of electric vehicle diffusionZhe Yu, Shanjun Li, Lang Tong. 1051-1057 [doi]
- Direct load control for electricity market risk management via risk-limiting dynamic contractsInsoon Yang, Duncan S. Callaway, Claire J. Tomlin. 1058-1063 [doi]
- Promises of conic relaxation for contingency-constrained optimal power flow problemRamtin Madani, Morteza Ashraphijuo, Javad Lavaei. 1064-1071 [doi]
- On the secrecy capacity region of a class of parallel Wiretap Broadcast ChannelMeryem Benammar, Pablo Piantanida. 1072-1077 [doi]
- Covert single-hop communication in a wireless network with distributed artificial noise generationRamin Soltani, Boulat A. Bash, Dennis Goeckel, Saikat Guha, Don Towsley. 1078-1085 [doi]
- On the relation between identifiability, differential privacy, and mutual-information privacyWeina Wang, Lei Ying, Junshan Zhang. 1086-1092 [doi]
- A unifying approach for the identification of application-driven stealthy attacks on mobile CPSVu Nguyen, Mina Guirguis, George Atia. 1093-1101 [doi]
- Budget balance or voluntary participation? Incentivizing investments in interdependent security gamesParinaz Naghizadeh, Mingyan Liu. 1102-1109 [doi]
- Data locality in MapReduce: A network perspectiveWeina Wang, Lei Ying. 1110-1117 [doi]
- An analytical approach to study cascading failures in finite-size random geometric networksAli Eslami, Chuan Huang, Junshan Zhang, Shuguang Cui. 1118-1125 [doi]
- Fundamental performance limits of chaotic-map random number generatorsAhmad Beirami, Hamid Nejati, Sergio Callegari. 1126-1131 [doi]
- Right buffer sizing matters: Stability, queuing delay and traffic burstiness in compound TCPDebayani Ghosh, Krishna Jagannathan, Gaurav Raina. 1132-1139 [doi]
- On source-channel coding over Gaussian sensor networks for path planningEmrah Akyol, Urbashi Mitra. 1140-1147 [doi]
- Learning graphical models from the Glauber dynamicsGuy Bresler, David Gamarnik, Devavrat Shah. 1148-1155 [doi]
- Joint control and compressed sensing for dynamic spectrum access in agile wireless networksNicolò Michelusi, Urbashi Mitra. 1156-1162 [doi]
- Network evolution with incomplete information and learningJie Xu 0001, Simpson Zhang, Mihaela van der Schaar. 1163-1168 [doi]
- Heavy tail influencers and stochastic bounded confidence stabilityFrançois Baccelli, Avhishek Chatterjee, Sriram Vishwanath. 1169-1173 [doi]
- Store-forward and its implications for proportional schedulingNeil S. Walton. 1174-1181 [doi]
- Multi-party set reconciliation using characteristic polynomialsAnudhyan Boral, Michael Mitzenmacher. 1182-1187 [doi]
- Highly compact virtual maximum likelihood sketches for counting big network dataZhen Mo, Yan Qiao, Shigang Chen, Tao Li. 1188-1195 [doi]
- Scheduling tasks with precedence constraints on multiple serversRamtin Pedarsani, Jean C. Walrand, Yuan Zhong. 1196-1203 [doi]
- BATS: Network coding in actionShenghao Yang, Raymond W. Yeung, Jay H. F. Cheung, Hoover H. F. Yin. 1204-1211 [doi]
- Joint estimation and detection against independenceGil Katz, Pablo Piantanida, Romain Couillet, Mérouane Debbah. 1220-1227 [doi]
- Uniformly reweighted APP decoder for memory efficient decoding of LDPC CodesVelimir Ilic, Elsa Dupraz, David Declercq, Bane Vasic. 1228-1232 [doi]
- Communicating lists over a noisy channelMustafa Anil Kocak, Elza Erkip. 1233-1237 [doi]
- Fast near-optimal subnetwork selection in layered relay networksRitesh Kolte, Ayfer Özgür. 1238-1245 [doi]
- Distributed testing against independence with multiple terminalsWenwen Zhao, Lifeng Lai. 1246-1251 [doi]
- Degrees of freedom in fading channels with memory: Achievability through nonlinear decodingMina Karzand, Lizhong Zheng. 1252-1259 [doi]
- The DoF of the asymmetric MIMO interference channel with square direct link channel matricesTang Liu, Daniela Tuninetti, Syed Ali Jafar. 1260-1266 [doi]
- Information integrity in lossy source coding with side informationEric Graves, Tan F. Wong. 1267-1271 [doi]
- Notes on information-theoretic privacyShahab Asoodeh, Fady Alajaji, Tamás Linder. 1272-1278 [doi]
- The privacy/security tradeoff across jointly designed linear authentication systemsAdina Goldberg, Stark C. Draper. 1279-1286 [doi]
- Two shannon-type problems on secure multi-party computationsEun Jee Lee, Emmanuel Abbe. 1287-1293 [doi]
- Connectivity in secure wireless sensor networks under transmission constraintsJun Zhao 0007, Osman Yagan, Virgil D. Gligor. 1294-1301 [doi]
- Information leakage for correlated sources with compromised source symbols over wiretap channel IIReevana Balmahoon, A. J. Han Vinck, Ling Cheng 0001. 1302-1308 [doi]
- Two-way function computationSeiyun Shin, Changho Suh. 1309-1316 [doi]
- Efficient pooling against strategic adversary with applications in anonymous and reliable networkingAnoosheh Heidarzadeh, Shiyu Zhao, Tracey Ho, Michelle Effros. 1317-1324 [doi]
- Multiuser broadcast erasure channel with feedback and side information, and related index coding resultsAthanasios Papadopoulos, Leonidas Georgiadis. 1325-1332 [doi]
- Network embedding operations preserving the insufficiency of linear network codesCongduan Li, Steven Weber, John MacLaren Walsh. 1333-1340 [doi]
- Secret message capacity of a line networkAthanasios Papadopoulos, László Czap, Christina Fragouli. 1341-1348 [doi]
- Efficient interpolation-based decoding of interleaved subspace and Gabidulin codesHannes Bartz, Antonia Wachter-Zeh. 1349-1356 [doi]
- Row-correlation function: A new approach to complementary code matricesGregory E. Coxson, Brooke Logan, Hieu D. Nguyen. 1357-1361 [doi]
- Quantum communication over bit flip channels using entangled bipartite and tripartite statesAnkur Raina, Shayan Garani Srinivasa. 1368-1375 [doi]