


default search action
Information Theory and Applications 2012: San Diego, CA, USA
- 2012 Information Theory and Applications Workshop, ITA 2012, San Diego, CA, USA, February 5-10, 2012. IEEE 2012, ISBN 978-1-4673-1473-2

- Alan Barbieri, Peter Gaal, Stefan Geirhofer, Tingfang Ji, Durga Malladi, Yongbin Wei, F. Xue:

Coordinated downlink multi-point communications in heterogeneous cellular networks. 7-16 - Robert W. Heath Jr.

, Marios Kountouris
:
Modeling heterogeneous network interference. 17-22 - David Declercq, Bane Vasic, Shiva Kumar Planjery, Erbao Li:

Finite alphabet iterative decoders approaching maximum likelihood performance on the Binary Symmetric Channel. 23-32 - Torleiv Kløve:

On some linear codes that are proper for error detection. 33-38 - En-Hui Yang, Jin Meng:

Non-asymptotic equipartition properties for independent and identically distributed sources. 39-46 - Lav R. Varshney, Pulkit Grover

, Anant Sahai:
Securing inductively-coupled communication. 47-53 - Ozgur Oyman, Sarabjot Singh:

On capacity-quality tradeoffs in HTTP adaptive streaming over LTE networks. 54-55 - Xinmiao Zhang, Richard Shi, James A. Ritcey:

On the implementation of modified fuzzy vault for biometric encryption. 56-61 - Paul Cuff:

A class of log-optimal utility functions. 62-63 - Yang Yang, Zixiang Xiong:

A hybrid random-structured coding scheme for the Gaussian two-terminal source coding problem under a covariance matrix distortion constraint. 64-68 - Tanumay Datta, N. Ashok Kumar, Ananthanarayanan Chockalingam, B. Sundar Rajan:

A novel MCMC algorithm for near-optimal detection in large-scale uplink mulituser MIMO systems. 69-77 - Shlomo Shamai:

MMSE interference in Gaussian channels. 78-114 - Haralabos C. Papadopoulos, Sayandev Mukherjee, Sean A. Ramprashad:

Semi-blind MU-MIMO based on limited features of the user multi-path intensity profiles. 115-122 - Angel E. Lozano

, Jeffrey G. Andrews, Robert W. Heath Jr.
:
On the limitations of cooperation in wireless networks. 123-130 - Sy-Quoc Le, Ravi Tandon, Mehul Motani

, H. Vincent Poor:
On linear deterministic interference channels with partial feedback. 131-136 - Guang Yang, Angela I. Barbero

, Eirik Rosnes, Øyvind Ytrehus:
Error correction on an insertion/deletion channel applying codes from RFID standards. 137-142 - Zhao Yi, Stefano Soatto, Maneesh Dewan, Yiqiang Zhan:

Information Forests. 143-146 - Jason D. Ellis, Michael A. Juang, Michael B. Pursley:

Analytical evaluation of adaptive coding for Markov models of Nakagami fading. 147-151 - Shurui Huang, Aditya Ramamoorthy:

On the multiple unicast capacity of 3-source, 3-terminal directed acyclic networks. 152-159 - Randall Dougherty, Christopher F. Freiling, Kenneth Zeger:

Achievable rate regions for network coding. 160-167 - Byungju Lee, Sunho Park

, Byonghyo Shim
:
Transmission capacity of wireless ad hoc network with non-parametric linear MMSE receiver. 168-171 - Yuval Kochman, Gregory W. Wornell

:
On high-efficiency optical communication and key distribution. 172-179 - Jungwon Lee, Hyukjoon Kwon, Inyup Kang:

Interference mitigation in MIMO interference channel via successive single-user soft decoding. 180-185 - Jerry D. Gibson, Ying-Yi Li:

Rate distortion performance bounds for wideband speech. 186-191 - Dariush Divsalar, Lara Dolecek:

On the typical minimum distance of protograph-based non-binary LDPC codes. 192-198 - Chinmay S. Vaze, Mahesh K. Varanasi:

Beamforming and aligned interference neutralization achieve the degrees of freedom region of the 2×2×2 MIMO interference network. 199-203 - Qiuju Diao, Wei Zhou, Shu Lin, Khaled A. S. Abdel-Ghaffar:

A transform approach for constructing quasi-cyclic Euclidean geometry LDPC codes. 204-211 - Longbo Huang, Jean C. Walrand, Kannan Ramchandran:

Optimal smart grid tariffs. 212-220 - Ömer Faruk Tekin, Tracey Ho, Hongyi Yao, Sidharth Jaggi:

On erasure correction coding for streaming. 221-226 - Keke Liu, Qin Huang, Shu Lin, Khaled A. S. Abdel-Ghaffar:

Quasi-cyclic LDPC codes: Construction and rank analysis of their parity-check matrices. 227-233 - Dinesh Ramasamy, Sriram Venkateswaran, Upamanyu Madhow:

Compressive adaptation of large steerable arrays. 234-239 - Kaya Tutuncuoglu, Aylin Yener:

Communicating with energy harvesting transmitters and receivers. 240-245 - Raymond W. Yeung:

A unification of network coding and routing. 246-248 - Nicolò Michelusi

, Kostas Stamatiou, Michele Zorzi:
On optimal transmission policies for energy harvesting devices. 249-254 - Bertrand M. Hochwald, David James Love:

Minimizing exposure to electromagnetic radiation in portable devices. 255-261 - Hugo Sousa-Pinto, Daniel Enrique Lucani

, João Barros
:
Hide and code: Session anonymity in wireless line networks with coded packets. 262-268 - Vincent Gripon, Claude Berrou:

Nearly-optimal associative memories based on distributed constant weight codes. 269-273 - Barlas Oguz, Venkat Anantharam:

Long range dependent Markov chains with applications. 274-280 - Chung Chan

:
From secret key agreement to matroidal undirected network. 281-290 - Amin Karbasi, Stratis Ioannidis

, Laurent Massoulié:
Hot or not: Interactive content search using comparisons. 291-297 - Masataka Goto

, Jun Ogata, Kazuyoshi Yoshii
, Hiromasa Fujihara, Matthias Mauch, Tomoyasu Nakano
:
PodCastle and songle: Crowdsourcing-based web services for spoken document retrieval and active music listening. 298-299 - Fatemeh Fazel, Maryam Fazel, Milica Stojanovic:

Random access sensor networks: Field reconstruction from incomplete data. 300-305 - Erik Agrell, Alex Alvarado

:
First-order asymptotics of the BICM mutual information: Uniform vs. nonuniform distributions. 306-310 - Gianluigi Ferrari

, Marco Martalò
, Andrea Abrardo, Riccardo Raheli
:
Orthogonal multiple access and information fusion: How many observations are needed? 311-320 - Gaurav S. Kasbekar, Saswati Sarkar:

Spectrum white space trade in Cognitive Radio Networks. 321-330 - Dmitri V. Truhachev:

Achieving gaussian multiple access channel capacity with spatially coupled sparse graph multi-user modulation. 331-337 - Ramachandran Rajesh

, Deekshith P. K., Vinod Sharma:
Capacity of a Gaussian MAC with energy harvesting transmit nodes. 338-343 - Dayu Huang, Sean P. Meyn:

Optimality of coincidence-based goodness of fit test for sparse sample problems. 344-346 - Krishna P. Jagannathan

, Libin Jiang, Eytan H. Modiano:
On scheduling algorithms robust to heavy-tailed traffic. 347-351 - Yi Gai, Bhaskar Krishnamachari:

Online learning algorithms for stochastic water-filling. 352-356 - Xinchen Zhang, Martin Haenggi

:
ALOHA performs optimal power control in Poisson networks. 357-362 - Keqin Liu, Qing Zhao:

Online learning for stochastic linear optimization problems. 363-367 - Sang-Woon Jeon, Chien-Yi Wang, Michael Gastpar:

Approximate ergodic capacity of a class of fading 2 × 2 × 2 Networks. 368-373 - B. T. Swapna, Atilla Eryilmaz, Ness B. Shroff:

Dynamic pricing strategies for social networks in the presence of externalities. 374-381 - Anna C. Gilbert, Brett Hemenway, Atri Rudra, Martin J. Strauss, Mary Wootters:

Recovering simple signals. 382-391 - Dmitri V. Truhachev, David G. M. Mitchell, Michael Lentmaier, Daniel J. Costello Jr.:

New codes on graphs constructed by connecting spatially coupled chains. 392-397 - Kyeongjun Ko, Jungwoo Lee

:
Regenerative hierarchical codebooks for limited channel feedback in MIMO systems. 398-400 - Pooya Monajemi, Richa Sahasrabudhe, John D. Villasenor:

Scheduling in heterogeneous cellular networks with mobility. 401-406 - Max Welling, Ian Porteous, Kenichi Kurihara:

Exchangeable inconsistent priors for Bayesian posterior inference. 407-414 - Joohwan Kim, R. Srikant:

Peer-to-peer streaming over dynamic random Hamilton cycles. 415-419 - Baris I. Erkmen, Bruce E. Moision, Samuel Dolinar, Kevin M. Birnbaum, Dariush Divsalar:

Approaching the ultimate limits of communication efficiency with a photon-counting detector. 420-427

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














