We gratefully acknowledge support from
the Simons Foundation and member institutions.

Information Theory

Authors and titles for cs.IT in Apr 2016, skipping first 50

[ total of 305 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | ... | 301-305 ]
[ showing 25 entries per page: fewer | more | all ]
[51]  arXiv:1604.02058 [pdf, ps, other]
Title: Sufficient Conditions for Existence of $J_α(X + \sqrt[α]ηN)$
Subjects: Information Theory (cs.IT)
[52]  arXiv:1604.02109 [pdf, ps, other]
Title: Dictator Functions Maximize Mutual Information
Comments: accepted for publication in the Annals of Applied Probability; 8 pages, 1 figure
Subjects: Information Theory (cs.IT); Probability (math.PR)
[53]  arXiv:1604.02234 [pdf, other]
Title: A Unified Theory of Multiple-Access and Interference Channels via Approximate Capacity Regions for the MAC-IC-MAC
Subjects: Information Theory (cs.IT)
[54]  arXiv:1604.02333 [pdf, ps, other]
Title: Information Theoretic Caching: The Multi-User Case
Comments: Submitted to IEEE Trans. Inf. Theory and presented in part at ITA 2016. 43 pages, 8 figures
Subjects: Information Theory (cs.IT)
[55]  arXiv:1604.02347 [pdf, ps, other]
Title: Ladder and Subdivision of Ladder Graphs with Pendant Edges are Odd Graceful
Authors: M.I.Moussa (Faculty of Informatics, Benha University, Egypt), E.M.Badr (Faculty of Informatics, Benha University, Egypt)
Comments: 8 pages, 2 figures
Subjects: Information Theory (cs.IT)
[56]  arXiv:1604.02442 [pdf, ps, other]
Title: On the Secrecy Capacity Region of the 2-user Z Interference Channel with Unidirectional Transmitter Cooperation
Comments: 13 pages, 10 figures, submitted to transaction on information forensic and security
Subjects: Information Theory (cs.IT)
[57]  arXiv:1604.02468 [pdf, ps, other]
Title: Outer Bounds on the Secrecy Capacity Region of the 2-user Z Interference Channel With Unidirectional Transmitter Cooperation
Comments: 13 pages, 10 figures, submitted to IEEE transactions on information forensics and security. arXiv admin note: text overlap with arXiv:1604.02442
Subjects: Information Theory (cs.IT)
[58]  arXiv:1604.02475 [pdf, other]
Title: Performance Limits for Noisy Multi-Measurement Vector Problems
Comments: 11 pages, 6 figures
Journal-ref: IEEE Transactions on Signal Processing, Volume: 65, Issue: 9 Pages: 2444 - 2454 (2017)
Subjects: Information Theory (cs.IT); Distributed, Parallel, and Cluster Computing (cs.DC)
[59]  arXiv:1604.02511 [pdf, ps, other]
Title: Optimal Design of Compact Receive Array in Industrial Wireless Sensor Networks
Comments: 5 page, 8 figures, accepted by VTC Spring 2016
Subjects: Information Theory (cs.IT)
[60]  arXiv:1604.02517 [pdf, other]
Title: Throughput Maximization for Mobile Relaying Systems
Comments: 14 pages, 9 figures, submitted for possible journal publications
Subjects: Information Theory (cs.IT)
[61]  arXiv:1604.02518 [pdf, other]
Title: Wirelessly Powered Backscatter Communication Networks: Modeling, Coverage and Capacity
Comments: 7 pages, 7 figures, submitted to IEEE GLOBECOM 2016
Subjects: Information Theory (cs.IT)
[62]  arXiv:1604.02519 [pdf, other]
Title: Multiuser Resource Allocation for Mobile-Edge Computation Offloading
Comments: double column, submitted to 2016 Globecom
Subjects: Information Theory (cs.IT)
[63]  arXiv:1604.02602 [pdf, other]
Title: Can Uplink Transmissions Survive in Full-duplex Cellular Environments?
Comments: Accepted in EW2016
Subjects: Information Theory (cs.IT)
[64]  arXiv:1604.02659 [pdf, other]
Title: Sub-Nyquist Cyclostationary Detection for Cognitive Radio
Subjects: Information Theory (cs.IT)
[65]  arXiv:1604.02683 [pdf, ps, other]
Title: The Intensity Matching Approach: A Tractable Stochastic Geometry Approximation to System-Level Analysis of Cellular Networks
Comments: Submitted for Journal Publication
Subjects: Information Theory (cs.IT)
[66]  arXiv:1604.02706 [pdf, other]
Title: Secure M-PSK Communication via Directional Modulation
Subjects: Information Theory (cs.IT)
[67]  arXiv:1604.02723 [pdf, other]
Title: CaSCADE: Compressed Carrier and DOA Estimation
Subjects: Information Theory (cs.IT)
[68]  arXiv:1604.02730 [pdf, ps, other]
Title: Construction methods for generalized bent functions
Comments: 15 pages
Subjects: Information Theory (cs.IT)
[69]  arXiv:1604.02742 [pdf, ps, other]
Title: Sequential Necessary and Sufficient Conditions for Capacity Achieving Distributions of Channels with Memory and Feedback
Comments: 57 pages, 9 figures, part of the paper was accepted for publication in the proceedings of the IEEE International Symposium on Information Theory (ISIT), Barcelona, Spain 10-15 July, 2016 (Date of submission of the conference paper: 25/1/2016)
Subjects: Information Theory (cs.IT)
[70]  arXiv:1604.02752 [pdf, other]
Title: Performance Trade-Offs in Multi-Processor Approximate Message Passing
Comments: 5 pages, 2 figures, to appear at 2016 IEEE International Symposium on Information Theory (ISIT2016)
Subjects: Information Theory (cs.IT); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[71]  arXiv:1604.02769 [pdf, ps, other]
Title: Computable performance guarantees for compressed sensing matrices
Subjects: Information Theory (cs.IT)
[72]  arXiv:1604.02781 [pdf, other]
Title: Dual-Timescale Spectrum Management in Small-Cell Wireless Networks
Comments: 30 pages, 5 figures
Subjects: Information Theory (cs.IT)
[73]  arXiv:1604.02825 [pdf, other]
Title: Optical Fiber MIMO Channel Model and its Analysis
Comments: Accepted to ISIT 2016, Barcelona Spain
Subjects: Information Theory (cs.IT)
[74]  arXiv:1604.02830 [pdf, ps, other]
Title: Decomposing generalized bent and hyperbent functions
Comments: 24 pages
Subjects: Information Theory (cs.IT)
[75]  arXiv:1604.02852 [pdf, other]
Title: Full-Duplex Cellular Networks: It Works!
Subjects: Information Theory (cs.IT)
[ total of 305 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | ... | 301-305 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)