IEEE Journal on Selected Areas in Information Theory, Volume 3 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 3, Number 1, March 2022

Elza Erkip
, Giuseppe Durisi
, Robert W. Heath Jr.
, Thomas L. Marzetta
, Petar Popovski
, Meixia Tao, Sennur Ulukus
:
Editorial Issue on "Information Theoretic Foundations of Future Communication Systems". 2-4

Benjamin M. Zaidel
, Ori Shental
, Shlomo Shamai Shitz
:
Regular Sparse NOMA: Ultimate Performance in Closed Form. 5-20

Kuan Hsieh
, Cynthia Rush, Ramji Venkataramanan
:
Near-Optimal Coding for Many-User Multiple Access Channels. 21-36

Sarthak Jain
, Martina Cardone
, Soheil Mohajer
:
Optimality of Energy-Efficient Scheduling and Relaying for Half-Duplex Relay Networks. 37-53

Felipe Gómez-Cuba
:
The SIMO Block Rayleigh Fading Channel Capacity Scaling With Number of Antennas, Bandwidth, and Coherence Length. 54-68

Vinayak Suresh
, Eric Ruzomberka
, Chih-Chun Wang
, David J. Love
:
Causal Adversarial Channels With Feedback Snooping. 69-84

Baturalp Buyukates
, Melih Bastopcu
, Sennur Ulukus
:
Version Age of Information in Clustered Gossip Networks. 85-97

Mohamed A. Abd-Elmagid
, Harpreet S. Dhillon
:
Age of Information in Multi-source Updating Systems Powered by Energy Harvesting. 98-112

Hamdi Joudeh
, Frans M. J. Willems
:
Joint Communication and Binary State Detection. 113-124

Xiangxiang Xu
, Shao-Lun Huang
:
On Distributed Learning With Constant Communication Bits. 125-134

Nishant Mehrotra
, Ashutosh Sabharwal
:
When Does Multipath Improve Imaging Resolution? 135-146

Aditya Narayan Ravi
, Alireza Vahid
, Ilan Shomorony:
Coded Shotgun Sequencing. 147-159
Volume 3, Number 2, June 2022

Mohammad Ali Maddah-Ali
, Salman Avestimehr, Ravi Tandon, Changho Suh, Ayfer Özgür, Chao Tian, Tara Javidi
, Giuseppe Caire:
Guest Editorial. 161

Farzan Farnia
, Amirhossein Reisizadeh
, Ramtin Pedarsani
, Ali Jadbabaie
:
An Optimal Transport Approach to Personalized Federated Learning. 162-171

Xinghan Wang
, Anusha Lalitha
, Tara Javidi
, Farinaz Koushanfar
:
Peer-to-Peer Variational Federated Learning Over Arbitrary Graphs. 172-182

Rajarshi Saha
, Mert Pilanci
, Andrea J. Goldsmith
:
Efficient Randomized Subspace Embeddings for Distributed Optimization Under a Communication Budget. 183-196

Amirhossein Reisizadeh
, Isidoros Tziotis, Hamed Hassani
, Aryan Mokhtari
, Ramtin Pedarsani
:
Straggler-Resilient Federated Learning: Leveraging the Interplay Between Statistical Accuracy and System Heterogeneity. 197-205

Jinho Choi
:
Communication-Efficient Distributed SGD Using Random Access for Over-the-Air Computation. 206-216

Shubham K. Jha
, Prathamesh Mayekar
, Himanshu Tyagi
:
Fundamental Limits of Over-the-Air Optimization: Are Analog Schemes Optimal? 217-228

Animesh Sakorikar
, Lele Wang
:
Soft BIBD and Product Gradient Codes. 229-240

Anindya Bijoy Das
, Aditya Ramamoorthy
:
A Unified Treatment of Partial Stragglers and Sparse Matrices in Coded Matrix Computation. 241-256

Jinbao Zhu
, Songze Li
:
A Systematic Approach Towards Efficient Private Matrix Multiplication. 257-274

Christoph Hofmeister
, Rawad Bitar
, Marvin Xhemrishi
, Antonia Wachter-Zeh
:
Secure Private and Adaptive Matrix Multiplication Beyond the Singleton Bound. 275-285

Shahrzad Kiani
, Stark C. Draper
:
Successive Approximation Coding for Distributed Matrix Multiplication. 286-305

Lev Tauz
, Lara Dolecek
:
Variable Coded Batch Matrix Multiplication. 306-320

Yinbin Ma
, Daniela Tuninetti
:
A General Coded Caching Scheme for Scalar Linear Function Retrieval. 321-336

Ruida Zhou
, Chao Tian
, Hua Sun
, James S. Plank
:
Two-Level Private Information Retrieval. 337-349

Zhusheng Wang
, Sennur Ulukus
:
Symmetric Private Information Retrieval at the Private Information Retrieval Rate. 350-361

Shreya Gupta, Bh. Rekha Devi, V. Lalitha
:
On Rack-Aware Cooperative Regenerating Codes and Epsilon-MSCR Codes. 362-378

Hua Sun
:
Compound Secure Groupcast: Key Assignment for Selected Broadcasting. 379-389

Maiki Fujita, Takeshi Koshiba
, Kenji Yasunaga
:
Perfectly Secure Message Transmission Against Rational Adversaries. 390-404

Canran Wang
, Netanel Raviv
:
Breaking Blockchain's Communication Barrier With Coded Computation. 405-421

Amir Behrouzi-Far
, Emina Soljanin
:
Balanced Nonadaptive Redundancy Scheduling. 422-430
Volume 3, Number 3, September 2022

Paul Hand, Reinhard Heckel, Jonathan Scarlett
:
Guest Editorial. 432

Jonathan Scarlett
, Reinhard Heckel
, Miguel R. D. Rodrigues
, Paul Hand, Yonina C. Eldar
:
Theoretical Perspectives on Deep Learning Methods in Inverse Problems. 433-453

Chen Xu
, Xiuyuan Cheng, Yao Xie
:
Invertible Neural Networks for Graph Prediction. 454-467

Shirin Shoushtari
, Jiaming Liu
, Yuyang Hu
, Ulugbek S. Kamilov
:
Deep Model-Based Architectures for Inverse Problems Under Mismatched Priors. 468-480

Jonathan Sauder
, Martin Genzel
, Peter Jung
:
Gradient-Based Learning of Discrete Structured Measurement Operators for Signal Recovery. 481-492

Alireza Naderi
, Yaniv Plan
:
Sparsity-Free Compressed Sensing With Applications to Generative Priors. 493-501

Aaron Berk
, Simone Brugiapaglia
, Babhru Joshi
, Yaniv Plan
, Matthew Scott
, Özgür Yilmaz:
A Coherence Parameter Characterizing Generative Compressed Sensing With Fourier Measurements. 502-512

Huan Liu
, George Zhang
, Jun Chen
, Ashish Khisti
:
Cross-Domain Lossy Compression as Entropy Constrained Optimal Transport. 513-527

Saurav K. Shastri
, Rizwan Ahmad, Christopher A. Metzler
, Philip Schniter
:
Denoising Generalized Expectation-Consistent Approximation for MR Image Recovery. 528-542

Brandon Y. Feng
, Mingyang Xie, Christopher A. Metzler
:
TurbuGAN: An Adversarial Learning Approach to Spatially-Varying Multiframe Blind Deconvolution With Applications to Imaging Through Turbulence. 543-556

Akash S. Doshi
, Manan Gupta
, Jeffrey G. Andrews
:
Over-the-Air Design of GAN Training for mmWave MIMO Channel Estimation. 557-573

Karl Chahine
, Rajesh K. Mishra
, Hyeji Kim
:
Inventing Codes for Channels With Active Feedback via Deep Learning. 574-586

Emre Ozfatura
, Yulin Shao
, Alberto G. Perotti
, Branislav M. Popovic
, Deniz Gündüz
:
All You Need Is Feedback: Communication With Block Attention Feedback Codes. 587-602
Volume 3, Number 4, December 2022

Meir Feder, Tsachy Weissman:
Editorial Modern Compression. 604

Daniel Severo
, James Townsend, Ashish Khisti
, Alireza Makhzani, Karen Ullrich:
Compressing Multisets With Large Alphabets. 605-615

Kengo Hashimoto
, Ken-ichi Iwata
:
Optimality of Huffman Code in the Class of 1-Bit Delay Decodable Codes. 616-625

Maryam Hosseini, Narayana Santhanam
:
Tail Redundancy and its Characterization of Compression of Memoryless Sources. 626-638

Shubham K. Jha
:
Universal Gaussian Quantization With Side-Information Using Polar Lattices. 639-650

Aviv Adler, Jennifer Tang
, Yury Polyanskiy
:
Efficient Representation of Large-Alphabet Probability Distributions. 651-663

Eric Lei
, Hamed Hassani
, Shirin Saeedi Bidokhti
:
Neural Estimation of the Rate-Distortion Function With Applications to Operational Source Coding. 674-686

Nirmal V. Shende
, Aaron B. Wagner
:
Functional Covering of Point Processes. 687-698

Rony Bou Rouphael
, Maël Le Treust
:
Strategic Successive Refinement With Interdependent Decoders Cost Functions. 699-710

Shashank Vatedka
, Venkat Chandar, Aslan Tchamkerten
:
Local Decoding in Distributed Compression. 711-719

Tze-Yang Tung
, David Burth Kurka
, Mikolaj Jankowski
, Deniz Gündüz
:
DeepJSCC-Q: Constellation Constrained Deep Joint Source-Channel Coding. 720-731

Sourya Basu
, Lav R. Varshney
:
Universal and Succinct Source Coding of Deep Neural Networks. 732-745

Payam Delgosha
, Venkat Anantharam
:
A Universal Low Complexity Compression Algorithm for Sparse Marked Graphs. 746-758

Travis C. Cuvelier
, Takashi Tanaka
, Robert W. Heath Jr.
:
Time-Invariant Prefix Coding for LQG Control. 759-772

Osama A. Hanna
, Lin F. Yang, Christina Fragouli
:
Compression for Multi-Arm Bandits. 773-788

Francesco Pase
, Deniz Gündüz
, Michele Zorzi
:
Rate-Constrained Remote Contextual Bandits. 789-802

Yucheng Liu
, Lawrence Ong
, Parastoo Sadeghi
, Sarah Johnson
, Jörg Kliewer, Phee Lep Yeoh
:
Information Leakage in Index Coding With Sensitive and Nonsensitive Messages. 803-814

Berivan Isik
, Tsachy Weissman:
Lossy Compression of Noisy Data for Private and Data-Efficient Learning. 815-823

Sourya Basu
, Daewon Seo
, Lav R. Varshney
:
Hypergraph-Based Source Codes for Function Computation Under Maximal Distortion. 824-838

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







