Search
Selected: All

The price of ignorance: The impact of side-information on delay for lossless source-coding

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Private Key Capacity Region for Three Terminals

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Pros and Cons of Compressive Sensing for Wideband Signal Acquisition: Noise Folding vs. Dynamic Range

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Quadratic Gaussian Rate-Distortion Function for Source Uncorrelated Distortions

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The quantization of the attention function under a Bayes information theoretic model

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Rate Loss of Single-Letter Characterization: The "Dirty" Multiple Access Channel

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Rate-Distortion Function for Product of Two Sources with Side-Information at Decoders

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The rates of convergence for generalized entropy of the normalized sums of IID random variables

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Re-Encoding Transformation in Algebraic List-Decoding of Reed-Solomon Codes

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Relationship between Tsallis Statistics, the Fourier Transform, and Nonlinear Coupling

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Relay-Eavesdropper Channel: Cooperation for Secrecy

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The restricted isometry property for time-frequency structured random matrices

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Role of Feedback in Two-way Secure Communications

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Russian effort in establishing large atomic and molecular databases

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Second Law and Informatics

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Second Law as a Cause of the Evolution

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The second weight of generalized Reed-Muller codes in most cases

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Secrecy Capacity for a 3-Receiver Broadcast Channel with Degraded Message Sets

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Secrecy Capacity of the MIMO Wiretap Channel

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

The Secrecy Capacity Region of the Degraded Vector Gaussian Broadcast Channel

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.