default search action
16th CWIT 2019: Hamilton, ON, Canada
- 16th Canadian Workshop on Information Theory, CWIT 2019, Hamilton, ON, Canada, June 2-5, 2019. IEEE 2019, ISBN 978-1-7281-0954-1
- Shengtian Yang, Jun Chen:
Extremal Results for the Relative-Entropy Ratio of Collinear Probability Distributions. 1-6 - Fedor I. Ivanov, Pavel S. Rybin, Valentin B. Afanassiev:
On the Performance of Slotted Vector-Disjunctive Channel. 1-5 - Greg Harrington, Fady Alajaji, Bahman Gharesifard:
Infection-Curing Games over Polya Contagion Networks. 1-6 - Shahrzad Kiani, Nuwan S. Ferdinand, Stark C. Draper:
Hierarchical coded matrix multiplication. 1-6 - Monirosharieh Vameghestahbanati, Ian D. Marsland, Ramy H. Gohary, Halim Yanikomeroglu:
Key Performance Indicators in Multidimensional Constellations for Uplink SCMA Systems. 1-6 - Mehrshad Kafi, Sorina Dumitrescu:
Index Assignment Optimized for Partial Encryption. 1-6 - Mohammad Kazem Izadinasab, Oussama Damen:
Reduced Complexity Ordering in Subspace MIMO Detection Algorithms. 1-5 - Zhenyu Zhang, Anas Chaaban:
On the Capacity of the Two-User IM/DD Interference Channel. 1-6 - Tianrui Xiao, Ashish Khisti:
Maximal Information Leakage based Privacy Preserving Data Disclosure Mechanisms. 1-6 - Ammar Alhosainy, Ramy H. Gohary, Ioannis Lambadaris:
A Soft Metric for Assessing the Compliance of WLAN Devices. 1-6 - Mahdi Khojastehnia, Sergey Loyka, François Gagnon:
Massive MIMO Channels Under the Joint Power Constraints. 1-6 - Subhajit Majhi, Meysam Shahrbaf Motlagh, Patrick Mitran:
On Source-Channel Communication over Multiple-Access Interference Relay Channels with Phase Uncertainties. 1-5 - Younes Sadat-Nejad, Soosan Beheshti:
Automated EEG Source Error Thresholding (AESET) in L2-Regularization Inverse Problems. 1-5 - Alvin Y. Sukmadji, Umberto Martínez-Peñas, Frank R. Kschischang:
Zipper Codes: Spatially-Coupled Product-Like Codes with Iterative Algebraic Decoding. 1-6 - Abdallah S. Ghazy, Steve Hranilovic, Mohammad Ali Khalighi:
Angular MIMO for Underwater Wireless Optical Communications: Channel Modelling and Capacity. 1-6 - Mahdi Shamsi, Faizan Rahman, Soosan Beheshti:
Correct Number of Clusters (CNC) Description Length in Arbitrary Shape Clustering. 1-4 - Amir K. Khandani, Ehsan Bateni:
A Practical, Provably Unbreakable Approach to Physical Layer Security. 1-6 - Jina Zhen, Anzhong Wong, Jian-Kang Zhang, Kon Max Wong:
An Optimal Finite Alphabet NOMA Scheme for Two-User Uplink Channels. 1-5 - Susanna E. Rumsey, Stark C. Draper, Frank R. Kschischang:
Information Storage in Multilayer Resistive Memories. 1-6 - Ghassan M. Kraidy:
Performance Analysis of Low Density Parity-Check Codes over the Bernoulli-Gaussian Channel. 1-5 - Morteza Soltani, Zouheir Rezki, Anas Chaaban:
Sum-Capacity-Achieving Distributions in the Input-Dependent Gaussian Noise Optical Multiple Access Channel with Peak and Average Intensity Constraints. 1-6 - Mahdi Naghshvarian Jahromi, Shiva Kumar, M. Jamal Deen:
Cognitive decision making for the long-haul fiber optic communication systems. 1-5 - Reza Rafie Borujeny, Frank R. Kschischang:
A Bounded-Noise Model for Nondispersive Optical Fiber. 1-5 - Ghassan M. Kraidy, Hassan Hamad:
Performance analysis of turbo codes over the Bernoulli-Gaussian impulsive noise channel. 1-5 - Salime Bameri, Ramy H. Gohary:
Performance Analysis of a Perfect SI Cancellation Scheme for Differential Channel-Unaware TWRNs. 1-6 - Kangdi Shi, Xiaohong Liu, Muhammad Alrabeiah, Xintong Guo, Jie Lin, Huan Liu, Jun Chen:
Image Retrieval via Canonical Correlation Analysis. 1-6 - Jian-Jia Weng, Fady Alajaji, Tamás Linder:
Capacity of Generalized Discrete-Memoryless Push-to-Talk Two-Way Channels. 1-6 - Phillip B. Oni, Steven D. Blostein:
Optimal Node Density for Multi-RAT Coexistence in Unlicensed Spectrum. 1-6 - Dania Elzouki, Sorina Dumitrescu, Jun Chen:
Lattice-based Robust Distributed Source Coding for Three Correlated Sources. 1-6 - Saeed Rezazadeh, Fady Alajaji, Wai-Yip Chan:
Scalar Quantizer Design for Two-Way Channels. 1-6 - En-Hui Yang, Xin-Wen Wu:
On Optimal Information-Theoretically Secure Key Management. 1-6 - Faten Ben Abdallah, Mohamed Lassaad Ammari, Paul Fortier:
Performance Analysis of Adaptive Modulation in MIMO-MRC Systems with Transmit Beamforming over Rayleigh Product Channels. 1-4 - Hossein Safi, Akbar Dargahi, Julian Cheng:
Performance Analysis of FSO MIMO Multiplexing Links with Beam Wander and Nonzero Boresight Pointing Errors. 1-6 - Mahdi Naghshvarianjahromi, Shiva Kumar, M. Jamal Deen:
Smart long-haul fiber optic communication systems using brain-like intelligence. 1-6 - Malek Safieh, Jürgen Freudenberger:
Address space partitioning for the parallel dictionary LZW data compression algorithm. 1-6 - Wahiba Abid, Sébastien Roy, Mohamed L. Ammari:
Analysis for Massive MIMO Systems with Two-Layer Linear Receive Processing. 1-6 - Mahsa Salmani, Foad Sohrabi, Timothy N. Davidson, Wei Yu:
Multiple Access Binary Computation Offloading via Reinforcement Learning. 1-6 - Nima Akbarzadeh, Aditya Mahajan:
Dynamic spectrum access under partial observations: A restless bandit approach. 1-6 - Abhin Shah, Nikhil Karamchandani, Suhas N. Diggavi:
Coded Caching: Global vs Local Content Popularity. 1-6 - Fatemeh Kazemi, Esmaeil Karimi, Anoosheh Heidarzadeh, Alex Sprintson:
Multi-Server Private Information Retrieval with Coded Side Information. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.