skip to main content
Skip header Section
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)July 2006
Publisher:
  • Wiley-Interscience
  • 605 Third Avenue New York, NY
  • United States
ISBN:978-0-471-24195-9
Published:01 July 2006
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. ACM
    Li W (2024). Optimizing with Attractor: A Tutorial, ACM Computing Surveys, 56:9, (1-41), Online publication date: 31-Oct-2024.
  2. ACM
    Feng S, Jing B, Zhu Y and Tong H (2024). ArieL: Adversarial Graph Contrastive Learning, ACM Transactions on Knowledge Discovery from Data, 18:4, (1-22), Online publication date: 31-May-2024.
  3. ACM
    Li D, Jin R, Liu Z, Ren B, Gao J and Liu Z (2023). On Item-Sampling Evaluation for Recommender System, ACM Transactions on Recommender Systems, 2:1, (1-36), Online publication date: 31-Mar-2024.
  4. Kanabar M and Scarlett J (2024). Mismatched Rate-Distortion Theory: Ensembles, Bounds, and General Alphabets, IEEE Transactions on Information Theory, 70:3, (1525-1539), Online publication date: 1-Mar-2024.
  5. Shirani F and Pradhan S (2024). A Structured Coding Framework for Communication and Computation Over Continuous Networks, IEEE Transactions on Information Theory, 70:3, (1629-1651), Online publication date: 1-Mar-2024.
  6. Hörmann F and Bartz H (2024). Interpolation-based decoding of folded variants of linearized and skew Reed–Solomon codes, Designs, Codes and Cryptography, 92:3, (553-586), Online publication date: 1-Mar-2024.
  7. Zhang L, Karakasidis G, Odnoblyudova A, Dogruel L, Tian Y and Jung A (2024). Explainable empirical risk minimization, Neural Computing and Applications, 36:8, (3983-3996), Online publication date: 1-Mar-2024.
  8. ACM
    Blass E and Noubir G (2023). Forward Security with Crash Recovery for Secure Logs, ACM Transactions on Privacy and Security, 27:1, (1-28), Online publication date: 29-Feb-2024.
  9. Fuh C, Wang C and Pai C (2024). Markov chain importance sampling for minibatches, Machine Language, 113:2, (789-814), Online publication date: 1-Feb-2024.
  10. Duan Z, Lu M, Ma J, Huang Y, Ma Z and Zhu F (2024). QARV: Quantization-Aware ResNet VAE for Lossy Image Compression, IEEE Transactions on Pattern Analysis and Machine Intelligence, 46:1, (436-450), Online publication date: 1-Jan-2024.
  11. Orabona F and Jun K (2024). Tight Concentrations and Confidence Sequences From the Regret of Universal Portfolio, IEEE Transactions on Information Theory, 70:1, (436-455), Online publication date: 1-Jan-2024.
  12. Loyka S and Merhav N (2024). The Secrecy Capacity of the Wiretap Channel With Additive Noise and Rate-Limited Help, IEEE Transactions on Information Theory, 70:1, (189-205), Online publication date: 1-Jan-2024.
  13. Galbraith N and Kpotufe S (2024). Classification Tree Pruning Under Covariate Shift, IEEE Transactions on Information Theory, 70:1, (456-481), Online publication date: 1-Jan-2024.
  14. Li J, Wang P, Yan Z, Yang Y and Zeng K (2024). BGKey: Group Key Generation for Backscatter Communications Among Multiple Devices, IEEE Transactions on Information Forensics and Security, 19, (2470-2486), Online publication date: 1-Jan-2024.
  15. Amihood B and Cohen A (2024). Covertly Controlling a Linear System, IEEE Transactions on Information Forensics and Security, 19, (2651-2663), Online publication date: 1-Jan-2024.
  16. Gronowski A, Paul W, Alajaji F, Gharesifard B and Burlina P (2024). Classification Utility, Fairness, and Compactness via Tunable Information Bottleneck and Rényi Measures, IEEE Transactions on Information Forensics and Security, 19, (1630-1645), Online publication date: 1-Jan-2024.
  17. Hien L, Zhao R and Haskell W (2024). An Inexact Primal-Dual Smoothing Framework for Large-Scale Non-Bilinear Saddle Point Problems, Journal of Optimization Theory and Applications, 200:1, (34-67), Online publication date: 1-Jan-2024.
  18. Soflaei M, Zhang R, Guo H, Al-Bashabsheh A and Mao Y (2023). Information Bottleneck and Aggregated Learning, IEEE Transactions on Pattern Analysis and Machine Intelligence, 45:12, (14807-14820), Online publication date: 1-Dec-2023.
  19. Mahmood A and Wagner A (2023). Minimax Rate-Distortion, IEEE Transactions on Information Theory, 69:12, (7712-7737), Online publication date: 1-Dec-2023.
  20. Navarro J, Buono F and Arevalillo J (2023). A New Separation Index and Classification Techniques Based on Shannon Entropy, Methodology and Computing in Applied Probability, 25:4, Online publication date: 1-Dec-2023.
  21. Tam M and Uteda D (2023). Bregman-Golden Ratio Algorithms for Variational Inequalities, Journal of Optimization Theory and Applications, 199:3, (993-1021), Online publication date: 1-Dec-2023.
  22. Soize C (2023). Probabilistic learning constrained by realizations using a weak formulation of Fourier transform of probability measures, Computational Statistics, 38:4, (1879-1925), Online publication date: 1-Dec-2023.
  23. Günther M, Brendel A and Kellermann W (2023). Microphone utility estimation in acoustic sensor networks using single-channel signal features, EURASIP Journal on Audio, Speech, and Music Processing, 2023:1, Online publication date: 24-Nov-2023.
  24. Weinberger N and Yemini M (2023). Multi-Armed Bandits With Self-Information Rewards, IEEE Transactions on Information Theory, 69:11, (7160-7184), Online publication date: 1-Nov-2023.
  25. Guo J, Prayuda A, Prasetyo H and Seshathiri S (2023). Deep Learning-Based Image Retrieval With Unsupervised Double Bit Hashing, IEEE Transactions on Circuits and Systems for Video Technology, 33:11, (7050-7065), Online publication date: 1-Nov-2023.
  26. Jin R, Hu J, Min G and Mills J (2023). Lightweight Blockchain-Empowered Secure and Efficient Federated Edge Learning, IEEE Transactions on Computers, 72:11, (3314-3325), Online publication date: 1-Nov-2023.
  27. ACM
    Papagiannopoulos K, Glamočanin O, Azouaoui M, Ros D, Regazzoni F and Stojilović M (2023). The Side-channel Metrics Cheat Sheet, ACM Computing Surveys, 55:10, (1-38), Online publication date: 31-Oct-2023.
  28. ACM
    Mohan A, Liu Y, Foster N, Kappé T and Kozen D (2023). Formal Abstractions for Packet Scheduling, Proceedings of the ACM on Programming Languages, 7:OOPSLA2, (1338-1362), Online publication date: 16-Oct-2023.
  29. Sun Z and Zou S (2023). Kernel Robust Hypothesis Testing, IEEE Transactions on Information Theory, 69:10, (6619-6638), Online publication date: 1-Oct-2023.
  30. Khalilsarai M, Song Y, Yang T and Caire G (2023). FDD Massive MIMO Channel Training: Optimal Rate-Distortion Bounds and the Spectral Efficiency of “One-Shot” Schemes, IEEE Transactions on Wireless Communications, 22:9, (6018-6032), Online publication date: 1-Sep-2023.
  31. Rammal M, Diggavi S and Sabharwal A (2023). Coded Estimation: Design of Backscatter Array Codes for 3D Orientation Estimation, IEEE Transactions on Wireless Communications, 22:9, (5844-5854), Online publication date: 1-Sep-2023.
  32. Li L, Chen R and Zhou J (2023). Distribution Decomposition and Sum-Capacity Results of Two-User Optical Intensity Multiple Access Channels, IEEE Transactions on Information Theory, 69:9, (5532-5549), Online publication date: 1-Sep-2023.
  33. Vippathalla P and Kashyap N (2023). The Secure Storage Capacity of a DNA Wiretap Channel Model, IEEE Transactions on Information Theory, 69:9, (5550-5569), Online publication date: 1-Sep-2023.
  34. Seshadri A, Leditzky F, Siddhu V and Smith G (2023). On the Separation of Correlation-Assisted Sum Capacities of Multiple Access Channels, IEEE Transactions on Information Theory, 69:9, (5805-5844), Online publication date: 1-Sep-2023.
  35. Liu X and Venkataramanan R (2023). Sketching Sparse Low-Rank Matrices With Near-Optimal Sample- and Time-Complexity Using Message Passing, IEEE Transactions on Information Theory, 69:9, (6071-6097), Online publication date: 1-Sep-2023.
  36. Vera M, Rey Vega L and Piantanida P (2023). The role of mutual information in variational classifiers, Machine Language, 112:9, (3105-3150), Online publication date: 1-Sep-2023.
  37. Liu G, Liu Y, Zhou Y and Gao Y Recovering Multi-prime RSA Keys with Erasures and Errors Information Security Practice and Experience, (266-283)
  38. ACM
    Li W, Wang C, Xiong H and Lai J HomoGCL: Rethinking Homophily in Graph Contrastive Learning Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, (1341-1352)
  39. De Cabrera F and Riba J (2023). Regularized Estimation of Information via Canonical Correlation Analysis on a Finite-Dimensional Feature Space, IEEE Transactions on Information Theory, 69:8, (5135-5150), Online publication date: 1-Aug-2023.
  40. Duan Z, Ma Z and Zhu F (2023). Unified Architecture Adaptation for Compressed Domain Semantic Inference, IEEE Transactions on Circuits and Systems for Video Technology, 33:8, (4108-4121), Online publication date: 1-Aug-2023.
  41. Wimmer L, Sale Y, Hofman P, Bischl B and Hüllermeier E Quantifying aleatoric and epistemic uncertainty in machine learning Proceedings of the Thirty-Ninth Conference on Uncertainty in Artificial Intelligence, (2282-2292)
  42. Margossian C and Saul L The shrinkage-delinkage trade-off Proceedings of the Thirty-Ninth Conference on Uncertainty in Artificial Intelligence, (1358-1367)
  43. Hochsprung T, Wahl J, Gerhardus A, Ninad U and Runge J Increasing effect sizes of pairwise conditional independence tests between random vectors Proceedings of the Thirty-Ninth Conference on Uncertainty in Artificial Intelligence, (879-889)
  44. Wu C, Wang Y, Grama A and Szpankowski W Learning functional distributions with private labels Proceedings of the 40th International Conference on Machine Learning, (37728-37744)
  45. Wang Z and Mao Y Tighter information-theoretic generalization bounds from supersamples Proceedings of the 40th International Conference on Machine Learning, (36111-36137)
  46. Shevchenko A, Kögler K, Hassani H and Mondelli M Fundamental limits of two-layer autoencoders, and achieving them with gradient methods Proceedings of the 40th International Conference on Machine Learning, (31151-31209)
  47. Salgia S and Zhao Q Distributed linear bandits under communication constraints Proceedings of the 40th International Conference on Machine Learning, (29845-29875)
  48. Lee J, Honda J, Chiang C and Sugiyama M Optimality of Thompson sampling with noninformative priors for pareto bandits Proceedings of the 40th International Conference on Machine Learning, (18810-18851)
  49. Nguyen H (2023). The Effect of Auditor's Personal Characteristics on Professional Judgment and Ethics in Auditing, International Journal of Knowledge and Systems Science, 14:1, (1-15), Online publication date: 21-Jul-2023.
  50. De Santis A and Masucci B New Results on Distributed Secret Sharing Protocols Data and Applications Security and Privacy XXXVII, (51-68)
  51. Viola E New Sampling Lower Bounds via the Separator Proceedings of the conference on Proceedings of the 38th Computational Complexity Conference, (1-23)
  52. Merhav N (2023). D-Semifaithful Codes That are Universal Over Both Memoryless Sources and Distortion Measures, IEEE Transactions on Information Theory, 69:7, (4746-4757), Online publication date: 1-Jul-2023.
  53. Tang J and Polyanskiy Y (2023). Capacity of Noisy Permutation Channels, IEEE Transactions on Information Theory, 69:7, (4145-4162), Online publication date: 1-Jul-2023.
  54. Qiu M, Huang Y and Yuan J (2023). Downlink Transmission With Heterogeneous URLLC Services: Discrete Signaling With Single-User Decoding, IEEE Journal on Selected Areas in Communications, 41:7, (2261-2277), Online publication date: 1-Jul-2023.
  55. Gupta P and Ghosh D (2023). User Fairness and QoS Aware based Effective Resource Allocation for Downlink NOMA Cellular Systems, Wireless Personal Communications: An International Journal, 131:2, (991-1012), Online publication date: 1-Jul-2023.
  56. Becher K, Lagodzinski J, Parra-Arnau J and Strufe T Analysis and Prevention of Averaging Attacks Against Obfuscation Protocols Applied Cryptography and Network Security, (451-475)
  57. ACM
    Saha S, Ghentiyala S, Lu S, Bang L and Bultan T (2023). Obtaining Information Leakage Bounds via Approximate Model Counting, Proceedings of the ACM on Programming Languages, 7:PLDI, (1488-1509), Online publication date: 6-Jun-2023.
  58. Lan Q, Zeng Q, Popovski P, Gündüz D and Huang K (2023). Progressive Feature Transmission for Split Classification at the Wireless Edge, IEEE Transactions on Wireless Communications, 22:6, (3837-3852), Online publication date: 1-Jun-2023.
  59. Bountrogiannis K, Tzagkarakis G and Tsakalides P (2023). Distribution Agnostic Symbolic Representations for Time Series Dimensionality Reduction and Online Anomaly Detection, IEEE Transactions on Knowledge and Data Engineering, 35:6, (5752-5766), Online publication date: 1-Jun-2023.
  60. Ling Y and Scarlett J (2023). Multi-Bit Relaying Over a Tandem of Channels, IEEE Transactions on Information Theory, 69:6, (3511-3524), Online publication date: 1-Jun-2023.
  61. Mahmood A and Wagner A (2023). Lossy Compression With Universal Distortion, IEEE Transactions on Information Theory, 69:6, (3552-3573), Online publication date: 1-Jun-2023.
  62. Liu H, Rush C and Baron D (2023). Rigorous State Evolution Analysis for Approximate Message Passing With Side Information, IEEE Transactions on Information Theory, 69:6, (3989-4013), Online publication date: 1-Jun-2023.
  63. Ryabko B (2023). Unconditionally secure short key ciphers based on data compression and randomization, Designs, Codes and Cryptography, 91:6, (2201-2212), Online publication date: 1-Jun-2023.
  64. ACM
    Nguyen H and Noubir G JaX: Detecting and Cancelling High-power Jammers Using Convolutional Neural Network Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, (293-304)
  65. Choi J (2023). Rare-Event Analysis of Packet-Level Coding for URLLC via Virtual Queue, IEEE Transactions on Wireless Communications, 22:5, (2962-2974), Online publication date: 1-May-2023.
  66. Lu Y and Jafar S (2023). On Single Server Private Information Retrieval With Private Coded Side Information, IEEE Transactions on Information Theory, 69:5, (3263-3284), Online publication date: 1-May-2023.
  67. Huang T, Gamal A and Gamal H (2023). A Linearly Convergent Douglas-Rachford Splitting Solver for Markovian Information-Theoretic Optimization Problems, IEEE Transactions on Information Theory, 69:5, (3372-3399), Online publication date: 1-May-2023.
  68. ACM
    Bauwens* B and Zimand M (2022). Universal almost Optimal Compression and Slepian-wolf Coding in Probabilistic Polynomial Time, Journal of the ACM, 70:2, (1-33), Online publication date: 30-Apr-2023.
  69. ACM
    Zhu H, Cheung Y and Xie L Stability and Efficiency of Personalised Cultural Markets Proceedings of the ACM Web Conference 2023, (3447-3455)
  70. Zhang Z, Yuksel M and Yanikomeroglu H (2023). Faster-Than-Nyquist Signaling for MIMO Communications, IEEE Transactions on Wireless Communications, 22:4, (2379-2392), Online publication date: 1-Apr-2023.
  71. Mauro F, Candan K and Sapino M (2023). Tensor-Train Decomposition in the Presence of Interval-Valued Data, IEEE Transactions on Knowledge and Data Engineering, 35:4, (4267-4280), Online publication date: 1-Apr-2023.
  72. Tamir R (2023). Entropy Rate Bounds of Integer-Valued Processes via Second-Order Statistics, IEEE Transactions on Information Theory, 69:4, (2120-2134), Online publication date: 1-Apr-2023.
  73. ACM
    Zhao Z, Morrison A, Fletcher C and Torrellas J Untangle: A Principled Framework to Design Low-Leakage, High-Performance Dynamic Partitioning Schemes Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3, (771-788)
  74. Nakahira Y, Ferragut A and Wierman A (2023). Generalized Exact Scheduling, Operations Research, 71:2, (433-470), Online publication date: 1-Mar-2023.
  75. Tabilo Alvarez J, Ramírez-Correa P and Diallo S (2023). A Brief Review of Systems, Cybernetics, and Complexity, Complexity, 2023, Online publication date: 1-Jan-2023.
  76. Hua Y, Liang Q and Rahman M (2023). Secure Degree of Freedom of Wireless Networks Using Collaborative Pilots, IEEE Transactions on Signal Processing, 71, (3755-3771), Online publication date: 1-Jan-2023.
  77. Vidal Alegría J and Rusek F (2023). Trade-Offs in Decentralized Multi-Antenna Architectures: Sparse Combining Modules for WAX Decomposition, IEEE Transactions on Signal Processing, 71, (2879-2894), Online publication date: 1-Jan-2023.
  78. Bernardo N, Zhu J, Eldar Y and Evans J (2023). Design and Analysis of Hardware-Limited Non-Uniform Task-Based Quantizers, IEEE Transactions on Signal Processing, 71, (1551-1562), Online publication date: 1-Jan-2023.
  79. Hua Y (2023). Generalized Channel Probing and Generalized Pre-Processing for Secret Key Generation, IEEE Transactions on Signal Processing, 71, (1067-1082), Online publication date: 1-Jan-2023.
  80. Sun Z and Zou S (2023). Quickest Anomaly Detection in Sensor Networks With Unlabeled Samples, IEEE Transactions on Signal Processing, 71, (873-887), Online publication date: 1-Jan-2023.
  81. Almahorg K and Gohary R (2023). Maximum Likelihood Detection in Single-Input Double-Output Non-Gaussian Barrage-Jammed Systems, IEEE Transactions on Signal Processing, 71, (979-994), Online publication date: 1-Jan-2023.
  82. Gao C, Liu D, Li L and Wu F (2023). Towards Task-Generic Image Compression: A Study of Semantics-Oriented Metrics, IEEE Transactions on Multimedia, 25, (721-735), Online publication date: 1-Jan-2023.
  83. Zhang C, Lou Z, Zhou Q and Hu S (2023). Multi-View Clustering via Triplex Information Maximization, IEEE Transactions on Image Processing, 32, (4299-4313), Online publication date: 1-Jan-2023.
  84. Diamant R, Tomasin S, Ardizzon F, Eccher D and Casari P (2023). Secret Key Generation From Route Propagation Delays for Underwater Acoustic Networks, IEEE Transactions on Information Forensics and Security, 18, (3318-3333), Online publication date: 1-Jan-2023.
  85. Thaleiser S and Enzner G (2023). Binaural-Projection Multichannel Wiener Filter for Cue-Preserving Binaural Speech Enhancement, IEEE/ACM Transactions on Audio, Speech and Language Processing, 31, (3730-3745), Online publication date: 1-Jan-2023.
  86. Savas Y, Ahmadi M, Tanaka T and Topcu U Entropy-Regularized Stochastic Games 2019 IEEE 58th Conference on Decision and Control (CDC), (5955-5962)
  87. Avin C, Mondal K and Schmid S (2022). Push-Down Trees: Optimal Self-Adjusting Complete Trees, IEEE/ACM Transactions on Networking, 30:6, (2419-2432), Online publication date: 1-Dec-2022.
  88. Ozsoy S, Hamdan S, Arik S, Yuret D and Erdogan A Self-supervised learning with an information maximization criterion Proceedings of the 36th International Conference on Neural Information Processing Systems, (35240-35253)
  89. Bengs V, Hüllermeier E and Waegeman W Pitfalls of epistemic uncertainty quantification through loss minimisation Proceedings of the 36th International Conference on Neural Information Processing Systems, (29205-29216)
  90. Zhu S, Xie L, Zhang M, Gao R and Xie Y Distributionally robust weighted k-nearest neighbors Proceedings of the 36th International Conference on Neural Information Processing Systems, (29088-29100)
  91. Subramanian V, Arya R and Sahai A Generalization for multiclass classification with overparameterized linear models Proceedings of the 36th International Conference on Neural Information Processing Systems, (23479-23494)
  92. Chen Y, Zhang Y, Bian Y, Yang H, Ma K, Xie B, Liu T, Han B and Cheng J Learning causally invariant representations for out-of-distribution generalization on graphs Proceedings of the 36th International Conference on Neural Information Processing Systems, (22131-22148)
  93. Qin C, Wen Z, Lu X and Van Roy B An analysis of ensemble sampling Proceedings of the 36th International Conference on Neural Information Processing Systems, (21602-21614)
  94. Sefidgaran M, Chor R and Zaidi A Rate-distortion theoretic bounds on generalization error for distributed learning Proceedings of the 36th International Conference on Neural Information Processing Systems, (19687-19702)
  95. Zhang Y and Weinberger N Mean estimation in high-dimensional binary Markov Gaussian mixture models Proceedings of the 36th International Conference on Neural Information Processing Systems, (19673-19686)
  96. Goldfeld Z, Greenewald K, Nuradha T and Reeves G k-sliced mutual information Proceedings of the 36th International Conference on Neural Information Processing Systems, (15982-15995)
  97. Bravo-Hermsdorff G, Busa-Fekete R, Ghavamzadeh M, Medina A and Syed U Private and communication-efficient algorithms for entropy estimation Proceedings of the 36th International Conference on Neural Information Processing Systems, (15382-15393)
  98. Sener O and Koltun V Domain generalization without excess empirical risk Proceedings of the 36th International Conference on Neural Information Processing Systems, (13380-13391)
  99. Dziedzic A, Duan H, Kaleem M, Dhawan N, Guan J, Cattan Y, Boenisch F and Papernot N Dataset inference for self-supervised models Proceedings of the 36th International Conference on Neural Information Processing Systems, (12058-12070)
  100. Komiyama J, Tsuchiya T and Honda J Minimax optimal algorithms for fixed-budget best arm identification Proceedings of the 36th International Conference on Neural Information Processing Systems, (10393-10404)
  101. Ngampruetikorn V and Schwab D Information bottleneck theory of high-dimensional regression Proceedings of the 36th International Conference on Neural Information Processing Systems, (9784-9796)
  102. Guinet G, Amin S and Jaillet P Effective dimension in bandit problems under censorship Proceedings of the 36th International Conference on Neural Information Processing Systems, (5243-5255)
  103. Jeon H and Van Roy B An information-theoretic framework for deep learning Proceedings of the 36th International Conference on Neural Information Processing Systems, (3279-3291)
  104. ACM
    Ito A, Ueno R and Homma N On the Success Rate of Side-Channel Attacks on Masked Implementations Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, (1521-1535)
  105. ACM
    Kumar H, Mahindru R and Kar D Metadata-based retrieval for resolution recommendation in AIOps Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (1379-1389)
  106. Masure L, Rioul O and Standaert F A Nearly Tight Proof of Duc et al.’s Conjectured Security Bound for Masked Implementations Smart Card Research and Advanced Applications, (69-81)
  107. Naor M and Oved N Bet-or-Pass: Adversarially Robust Bloom Filters Theory of Cryptography, (777-808)
  108. ACM
    Hu S, Geng R, Cheng Z, Zhang C, Zou G, Lou Z and Ye Y A Parameter-free Multi-view Information Bottleneck Clustering Method by Cross-view Weighting Proceedings of the 30th ACM International Conference on Multimedia, (3792-3800)
  109. Jeyakumar P, Malar E, Srinitha S, Muthuchidambaranathan P and Ramesh A (2022). Hybrid Beamforming in Large-scale Antenna Array for 5G Indoor Communication Network Deployments, Wireless Personal Communications: An International Journal, 126:3, (2513-2532), Online publication date: 1-Oct-2022.
  110. Charalambides N, Pilanci M and Hero A Secure Linear MDS Coded Matrix Inversion 2022 58th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1-8)
  111. Mohan S, Al-Hamdani H and Almamori A (2022). Cyclotomic Construction of Sparse Code Multiple Access With Improved Diversity, International Journal of Interdisciplinary Telecommunications and Networking, 14:1, (1-11), Online publication date: 22-Sep-2022.
  112. ACM
    Chai D, Wang L, Chen K and Yang Q (2022). Efficient Federated Matrix Factorization Against Inference Attacks, ACM Transactions on Intelligent Systems and Technology, 13:4, (1-20), Online publication date: 31-Aug-2022.
  113. ACM
    Shenoy J, Liu Z, Tao B, Kabelac Z and Vasisht D RF-protect Proceedings of the ACM SIGCOMM 2022 Conference, (588-600)
  114. Balestra C, Huber F, Mayr A and Müller E Unsupervised Features Ranking via Coalitional Game Theory for Categorical Data Big Data Analytics and Knowledge Discovery, (97-111)
  115. ACM
    Liu Q and Ge T RL2: A Call for Simultaneous Representation Learning and Rule Learning for Graph Streams Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, (1109-1119)
  116. ACM
    Ling C, Jiang J, Wang J and Liang Z Source Localization of Graph Diffusion via Variational Autoencoders for Graph Inverse Problems Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, (1010-1020)
  117. ACM
    Chakrabarti D Avoiding Biases due to Similarity Assumptions in Node Embeddings Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, (56-65)
  118. Eskandari S (2022). Multi-label feature selection using geometric series of relevance matrix, The Journal of Supercomputing, 78:12, (14402-14418), Online publication date: 1-Aug-2022.
  119. Mücke S and Piatkowski N Quantum- Inspired Structure- Preserving Probabilistic Inference 2022 IEEE Congress on Evolutionary Computation (CEC), (1-9)
  120. ACM
    Wang Y, Chakravarthula P, Sun Q and Chen B (2022). Joint neural phase retrieval and compression for energy- and computation-efficient holography on the edge, ACM Transactions on Graphics, 41:4, (1-16), Online publication date: 1-Jul-2022.
  121. ACM
    Qu Z, Li M, De Goes F and Jiang C (2022). The power particle-in-cell method, ACM Transactions on Graphics, 41:4, (1-13), Online publication date: 1-Jul-2022.
  122. Boche H, Schaefer R and Poor H Capacity-Achieving Input Distributions: Algorithmic Computability and Approximability 2022 IEEE International Symposium on Information Theory (ISIT), (2774-2779)
  123. Lei E, Hassani H and Bidokhti S Neural Estimation of the Rate-Distortion Function for Massive Datasets 2022 IEEE International Symposium on Information Theory (ISIT), (608-613)
  124. Kamatsuka A, Yoshida T and Matsushima T A Generalization of the Stratonovich’s Value of Information and Application to Privacy-Utility Trade-off 2022 IEEE International Symposium on Information Theory (ISIT), (1999-2004)
  125. Stavrou P and Kountouris M A Rate Distortion Approach to Goal-Oriented Communication 2022 IEEE International Symposium on Information Theory (ISIT), (590-595)
  126. Tang J and Polyanskiy Y Capacity of Noisy Permutation Channels 2022 IEEE International Symposium on Information Theory (ISIT), (1987-1992)
  127. Iwata K and Yamamoto H Joint Coding for Discrete Sources and Finite-State Noiseless Channels 2022 IEEE International Symposium on Information Theory (ISIT), (3327-3332)
  128. Goukhshtein M, Draper S and Mitra J Rate-Energy Optimal Probabilistic Shaping Using Linear Codes 2022 IEEE International Symposium on Information Theory (ISIT), (790-795)
  129. Pase F, Gündüz D and Zorzi M Remote Contextual Bandits 2022 IEEE International Symposium on Information Theory (ISIT), (1665-1670)
  130. Pernice F, Li R and Wootters M Efficient Capacity-Achieving Codes for General Repeat Channels 2022 IEEE International Symposium on Information Theory (ISIT), (3097-3102)
  131. ACM
    Guo Q and Tripunitara M The Secrecy Resilience of Access Control Policies and Its Application to Role Mining Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies, (115-126)
  132. Gómez-Rodellar A, Gómez-Vilda P, Ferrández-Vicente J and Tsanas A Characterizing Masseter Surface Electromyography on EEG-Related Frequency Bands in Parkinson’s Disease Neuromotor Dysarthria Artificial Intelligence in Neuroscience: Affective Analysis and Health Applications, (219-228)
  133. Coffin H, Abraham I, Sartoretti G, Dillstrom T and Choset H Multi-Agent Dynamic Ergodic Search with Low-Information Sensors 2022 International Conference on Robotics and Automation (ICRA), (11480-11486)
  134. ACM
    Bogatinovski J, Nedelkoski S, Acker A, Cardoso J and Kao O QuLog Proceedings of the 30th IEEE/ACM International Conference on Program Comprehension, (275-286)
  135. Domanovitz E, Philosof T and Khina A The Information Velocity of Packet-Erasure Links IEEE INFOCOM 2022 - IEEE Conference on Computer Communications, (190-199)
  136. Chakrabarti D (2022). Robust linear classification from limited training data, Machine Language, 111:5, (1621-1649), Online publication date: 1-May-2022.
  137. ACM
    Li Q, Peng H, Li J, Xia C, Yang R, Sun L, Yu P and He L (2022). A Survey on Text Classification: From Traditional to Deep Learning, ACM Transactions on Intelligent Systems and Technology, 13:2, (1-41), Online publication date: 30-Apr-2022.
  138. ACM
    Hashimoto K, Tsumagari N and Ushio T (2022). Collaborative Rover-copter Path Planning and Exploration with Temporal Logic Specifications Based on Bayesian Update Under Uncertain Environments, ACM Transactions on Cyber-Physical Systems, 6:2, (1-24), Online publication date: 30-Apr-2022.
  139. ACM
    Feng S, Jing B, Zhu Y and Tong H Adversarial Graph Contrastive Learning with Information Regularization Proceedings of the ACM Web Conference 2022, (1362-1371)
  140. Javaheri Javid M Aesthetic Evaluation of Experimental Stimuli Using Spatial Complexity and Kolmogorov Complexity Artificial Intelligence in Music, Sound, Art and Design, (117-130)
  141. Solorio-Fernández S, Carrasco-Ochoa J and Martínez-Trinidad J (2022). A survey on feature selection methods for mixed data, Artificial Intelligence Review, 55:4, (2821-2846), Online publication date: 1-Apr-2022.
  142. Toth C, Helic D and Geiger B (2022). Synwalk: community detection via random walk modelling, Data Mining and Knowledge Discovery, 36:2, (739-780), Online publication date: 1-Mar-2022.
  143. Belakaria S, Deshwal A and Doppa J (2021). Output Space Entropy Search Framework for Multi-Objective Bayesian Optimization, Journal of Artificial Intelligence Research, 72, (667-715), Online publication date: 4-Jan-2022.
  144. Carr S, Jansen N and Topcu U (2021). Task-Aware Verifiable RNN-Based Policies for Partially Observable Markov Decision Processes, Journal of Artificial Intelligence Research, 72, (819-847), Online publication date: 4-Jan-2022.
  145. Lin J, Liu Y and Cleland-Huang J (2021). Information retrieval versus deep learning approaches for generating traceability links in bilingual projects, Empirical Software Engineering, 27:1, Online publication date: 1-Jan-2022.
  146. Singh S and Bansal M (2021). Performance analysis of non‐orthogonal multiple access assisted cooperative relay system with channel estimation errors and imperfect successive interference cancellation, Transactions on Emerging Telecommunications Technologies, 32:12, Online publication date: 8-Dec-2021.
  147. Watanabe S and Yasunaga K Bit Security as Computational Cost for Winning Games with High Probability Advances in Cryptology – ASIACRYPT 2021, (161-188)
  148. Łazęcka M, Mielniczuk J and Teisseyre P (2021). Estimating the class prior for positive and unlabelled data via logistic regression, Advances in Data Analysis and Classification, 15:4, (1039-1068), Online publication date: 1-Dec-2021.
  149. Yang K, Gluck J, Perkins D, Ridgway R and Médard M Over-the-Air Testing of Impulsive Frequency Shift Keying Modulation MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM), (151-156)
  150. Rahman M, Ranjbar M, Tran N and Pham K Optimal Signaling Schemes of 2- User Gaussian Mixture Multiple-Access Channels with 1-bit ADC MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM), (13-18)
  151. Hamad M, Wigger M and Sarkiss M Optimal Exponents in Cascaded Hypothesis Testing under Expected Rate Constraints 2021 IEEE Information Theory Workshop (ITW), (1-6)
  152. Salehkalaibar S and Tan V Distributed Sequential Hypothesis Testing With Zero-Rate Compression 2021 IEEE Information Theory Workshop (ITW), (1-5)
  153. Xu X and Huang S On Distributed Hypothesis Testing with Constant-Bit Communication Constraints 2021 IEEE Information Theory Workshop (ITW), (1-6)
  154. Lev O and Khina A Energy-limited Joint Source–Channel Coding via Analog Pulse Position Modulation 2021 IEEE Information Theory Workshop (ITW), (1-6)
  155. Pardo R, Rafnsson W, Probst C and Wąsowski A Privug: Using Probabilistic Programming for Quantifying Leakage in Privacy Risk Analysis Computer Security – ESORICS 2021, (417-438)
  156. Liu Y, Yamada M, Tsai Y, Le T, Salakhutdinov R and Yang Y LSMI-Sinkhorn: Semi-supervised Mutual Information Estimation with Optimal Transport Machine Learning and Knowledge Discovery in Databases. Research Track, (655-670)
  157. Iswarya N and Jayashree L (2021). A Survey on Successive Interference Cancellation Schemes in Non-Orthogonal Multiple Access for Future Radio Access, Wireless Personal Communications: An International Journal, 120:2, (1057-1078), Online publication date: 1-Sep-2021.
  158. Mohammad R and Alsmadi M (2021). Intrusion detection using Highest Wins feature selection algorithm, Neural Computing and Applications, 33:16, (9805-9816), Online publication date: 1-Aug-2021.
  159. ACM
    Gilbert S, Newport C, Vaidya N and Weaver A Contention Resolution with Predictions Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing, (127-137)
  160. Vigneaux J Entropy Under Disintegrations Geometric Science of Information, (340-349)
  161. Baig M, Elassy K, Høst-Madsen A, Ohta A, Shiroma W and Nosratinia A (2021). Leveraging discrete modulation and liquid metal antennas for interference reduction, EURASIP Journal on Wireless Communications and Networking, 2021:1, Online publication date: 14-Jul-2021.
  162. Kadhe S, Rajaraman N and Ramchandran K FastShare: Scalable Secret Sharing by Leveraging Locality 2021 IEEE International Symposium on Information Theory (ISIT), (1118-1123)
  163. Bahanshal S and Chaaban A A Binary Decomposition and Transmission Schemes for the Peak-Constrained IM/DD Channel 2021 IEEE International Symposium on Information Theory (ISIT), (3103-3108)
  164. Pastore A, Lim S, Feng C, Nazer B and Gastpar M A Discretization Approach to Compute–Forward 2021 IEEE International Symposium on Information Theory (ISIT), (2208-2213)
  165. Liu J, Zhang W and Poor H A Rate-Distortion Framework for Characterizing Semantic Information 2021 IEEE International Symposium on Information Theory (ISIT), (2894-2899)
  166. Yakimenka Y, Lin H, Rosnes E and Kliewer J Optimal Rate-Distortion-Leakage Tradeoff for Single-Server Information Retrieval 2021 IEEE International Symposium on Information Theory (ISIT), (2262-2267)
  167. Feng S and Yang J Adaptive Surveillance Testing for Efficient Infection Rate Estimation 2021 IEEE International Symposium on Information Theory (ISIT), (884-889)
  168. Ozfatura E, Ozfatura K and Gündüz D Time-Correlated Sparsification for Communication-Efficient Federated Learning 2021 IEEE International Symposium on Information Theory (ISIT), (461-466)
  169. Weng J, Alajaji F and Linder T An Information Bottleneck Problem with Rényi's Entropy 2021 IEEE International Symposium on Information Theory (ISIT), (2489-2494)
  170. Ma S and Wigger M First- and Second-Moment Constrained Gaussian Channels 2021 IEEE International Symposium on Information Theory (ISIT), (432-437)
  171. Su P, Huang Y, Lin S, Wang I and Wang C Random Linear Streaming Codes in the Finite Memory Length and Decoding Deadline Regime 2021 IEEE International Symposium on Information Theory (ISIT), (730-735)
  172. Ben-Yishai A and Ordentlich O Constructing Multiclass Classifiers using Binary Classifiers Under Log-Loss 2021 IEEE International Symposium on Information Theory (ISIT), (2435-2440)
  173. Huang T and el Gamal A A Provably Convergent Information Bottleneck Solution via ADMM 2021 IEEE International Symposium on Information Theory (ISIT), (43-48)
  174. Bernardo N, Zhu J and Evans J Is Phase Shift Keying Optimal for Channels with Phase-Quantized Output? 2021 IEEE International Symposium on Information Theory (ISIT), (634-639)
  175. Adler A, Tang J and Polyanskiy Y Quantization of Random Distributions under KL Divergence 2021 IEEE International Symposium on Information Theory (ISIT), (2762-2767)
  176. Palacio-Baus K and Devroye N Achievable Error Exponents for Two-Way AWGN Channels 2021 IEEE International Symposium on Information Theory (ISIT), (2078-2083)
  177. Iwata K and Yamamoto H AIVF Codes Based on Iterative Algorithm and Dynamic Programming 2021 IEEE International Symposium on Information Theory (ISIT), (2018-2023)
  178. Robin J and Erkip E Capacity Bounds and User Identification Costs in Rayleigh-Fading Many-Access Channel 2021 IEEE International Symposium on Information Theory (ISIT), (2477-2482)
  179. Kramer G Divergence Scaling for Distribution Matching 2021 IEEE International Symposium on Information Theory (ISIT), (1159-1163)
  180. Le Treust M and Oechtering T Continuous Random Variable Estimation is not Optimal for the Witsenhausen Counterexample 2021 IEEE International Symposium on Information Theory (ISIT), (1889-1894)
  181. Ahn S, Chen W and Özgür A Adaptive Group Testing on Networks with Community Structure 2021 IEEE International Symposium on Information Theory (ISIT), (1242-1247)
  182. Merhav N On Error Exponents of Encoder-Assisted Communication Systems 2021 IEEE International Symposium on Information Theory (ISIT), (918-923)
  183. Xu X and Huang S An Information Theoretic Framework for Distributed Learning Algorithms 2021 IEEE International Symposium on Information Theory (ISIT), (314-319)
  184. Sarmasarkar S, Reddy K and Karamchandani N Query Complexity of Heavy Hitter Estimation 2021 IEEE International Symposium on Information Theory (ISIT), (2900-2905)
  185. Dumer I and Gharavi N Codes approaching the Shannon limit with polynomial complexity per information bit 2021 IEEE International Symposium on Information Theory (ISIT), (238-243)
  186. Urman Y and Burshtein D Efficient Maximum Likelihood Decoding of Polar Codes Over the Binary Erasure Channel 2021 IEEE International Symposium on Information Theory (ISIT), (1600-1605)
  187. Liang J, Ke C and Honorio J Information Theoretic Limits of Exact Recovery in Sub-hypergraph Models for Community Detection 2021 IEEE International Symposium on Information Theory (ISIT), (2578-2583)
  188. Saito S and Matsushima T Evaluation of Error Probability of Classification Based on the Analysis of the Bayes Code: Extension and Example 2021 IEEE International Symposium on Information Theory (ISIT), (1445-1450)
  189. Lapidoth A, Marti G and Yan Y Other Helper Capacities 2021 IEEE International Symposium on Information Theory (ISIT), (1272-1277)
  190. ACM
    Pandurangan G, Robinson P and Scquizzato M (2021). On the Distributed Complexity of Large-Scale Graph Computations, ACM Transactions on Parallel Computing, 8:2, (1-28), Online publication date: 30-Jun-2021.
  191. ACM
    Damiani M, Hachem F, Quadri C, Rossini M and Gaito S (2020). On Location Relevance and Diversity in Human Mobility Data, ACM Transactions on Spatial Algorithms and Systems, 7:2, (1-38), Online publication date: 30-Jun-2021.
  192. ACM
    Konrad C Frequent Elements with Witnesses in Data Streams Proceedings of the 40th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (83-95)
  193. ACM
    Pettie S and Wang D Information theoretic limits of cardinality estimation: Fisher meets Shannon Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing, (556-569)
  194. Wu C and Li W (2021). Enhancing intrusion detection with feature selection and neural network, International Journal of Intelligent Systems, 36:7, (3087-3105), Online publication date: 28-May-2021.
  195. ACM
    Larsson D, Maity D and Tsiotras P Information-theoretic abstractions for resource-constrained agents via mixed-integer linear programming Proceedings of the Workshop on Computation-Aware Algorithmic Design for Cyber-Physical Systems, (1-6)
  196. Mattenet A, Davidson I, Nijssen S and Schaus P (2021). Generic Constraint-based Block Modeling using Constraint Programming, Journal of Artificial Intelligence Research, 70, (597-630), Online publication date: 1-May-2021.
  197. Karbowski J (2021). Energetics of stochastic BCM type synaptic plasticity and storing of accurate information, Journal of Computational Neuroscience, 49:2, (71-106), Online publication date: 1-May-2021.
  198. Hamad M, Wigger M and Sarkiss M Cooperative Multi-Sensor Detection under Variable-Length Coding 2020 IEEE Information Theory Workshop (ITW), (1-5)
  199. Sarkar A (2021). Deep Learning Guided Double Hidden Layer Neural Synchronization Through Mutual Learning, Neural Processing Letters, 53:2, (1355-1384), Online publication date: 1-Apr-2021.
  200. Yaghoobi T (2021). Selection of optimal software reliability growth model using a diversity index, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 25:7, (5339-5353), Online publication date: 1-Apr-2021.
  201. Bender S, Dörpinghaus M and Fettweis G (2021). On the achievable rate of bandlimited continuous-time AWGN channels with 1-bit output quantization, EURASIP Journal on Wireless Communications and Networking, 2021:1, Online publication date: 11-Mar-2021.
  202. ACM
    Viola E (2021). AC0 Unpredictability, ACM Transactions on Computation Theory, 13:1, (1-8), Online publication date: 1-Mar-2021.
  203. Qian L, Chi X, Zhao L, Obeed M and Chaaban A (2021). User-Centric Secure Cell Formation for Visible Light Networks With Statistical Delay Guarantees, IEEE Transactions on Wireless Communications, 20:3, (1831-1846), Online publication date: 1-Mar-2021.
  204. Zhang N, Mohri M and Hoffman J (2021). Multiple-source adaptation theory and algorithms, Annals of Mathematics and Artificial Intelligence, 89:3-4, (237-270), Online publication date: 1-Mar-2021.
  205. Ganesan G Achieving Positive Rates with Predetermined Dictionaries Algorithms and Discrete Applied Mathematics, (385-396)
  206. Eshratifar A, Abrishami M and Pedram M (2021). JointDNN: An Efficient Training and Inference Engine for Intelligent Mobile Cloud Computing Services, IEEE Transactions on Mobile Computing, 20:2, (565-576), Online publication date: 1-Feb-2021.
  207. Biswas D and Iglesias P (2021). Sensitivity minimization, biological homeostasis and information theory, Biological Cybernetics, 115:1, (103-113), Online publication date: 1-Feb-2021.
  208. Kim C (2021). Bayesian mechanics of perceptual inference and motor control in the brain, Biological Cybernetics, 115:1, (87-102), Online publication date: 1-Feb-2021.
  209. Dementiev Y, Ignatiev A, Sidelnik V, Smal A and Ushakov M New Bounds on the Half-Duplex Communication Complexity SOFSEM 2021: Theory and Practice of Computer Science, (233-248)
  210. Zhang X, Centenaro M, Tomasin S, Benvenuto N, Luo X and Yang S (2019). A study on CSI feedback schemes exploiting feedforward information in FDD cellular systems, Transactions on Emerging Telecommunications Technologies, 32:1, Online publication date: 13-Jan-2021.
  211. Robinson P Being fast means being chatty Proceedings of the Thirty-Second Annual ACM-SIAM Symposium on Discrete Algorithms, (2105-2120)
  212. Roychowdhury S Color Space Exploration of Paintings Using a Novel Probabilistic Divergence Pattern Recognition. ICPR International Workshops and Challenges, (577-588)
  213. Song S, Chen X, Tang Z, Todo Y and Maex R (2021). A Two-Stage Method Based on Multiobjective Differential Evolution for Gene Selection, Computational Intelligence and Neuroscience, 2021, Online publication date: 1-Jan-2021.
  214. Alegría J, Rusek F and Edfors O (2021). Trade-Offs in Decentralized Multi-Antenna Architectures: The WAX Decomposition, IEEE Transactions on Signal Processing, 69, (3627-3641), Online publication date: 1-Jan-2021.
  215. Aubry A, Braca P, d’Afflisio E, De Maio A, Millefiori L and Willett P (2021). Optimal Opponent Stealth Trajectory Planning Based on an Efficient Optimization Technique, IEEE Transactions on Signal Processing, 69, (270-283), Online publication date: 1-Jan-2021.
  216. Guo F and Richardson T (2020). Chernoff-Type Concentration of Empirical Probabilities in Relative Entropy, IEEE Transactions on Information Theory, 67:1, (549-558), Online publication date: 1-Jan-2021.
  217. Sutter D, Fawzi O and Renner R (2020). Bounds on Lyapunov Exponents via Entropy Accumulation, IEEE Transactions on Information Theory, 67:1, (10-24), Online publication date: 1-Jan-2021.
  218. Zhu Q, Chen M, Wong C and Wu M (2020). Adaptive Multi-Trace Carving for Robust Frequency Tracking in Forensic Applications, IEEE Transactions on Information Forensics and Security, 16, (1174-1189), Online publication date: 1-Jan-2021.
  219. Xie N, Chen C and Ming Z (2021). Security Model of Authentication at the Physical Layer and Performance Analysis over Fading Channels, IEEE Transactions on Dependable and Secure Computing, 18:1, (253-268), Online publication date: 1-Jan-2021.
  220. Nelus A and Martin R (2021). Privacy-Preserving Audio Classification Using Variational Information Feature Extraction, IEEE/ACM Transactions on Audio, Speech and Language Processing, 29, (2864-2877), Online publication date: 1-Jan-2021.
  221. Jati A, Nadarajan A, Peri R, Mundnich K, Feng T, Girault B and Narayanan S (2021). Temporal Dynamics of Workplace Acoustic Scenes: Egocentric Analysis and Prediction, IEEE/ACM Transactions on Audio, Speech and Language Processing, 29, (756-769), Online publication date: 1-Jan-2021.
  222. Lu Y, Cheng P, Chen Z, Mow W, Li Y and Vucetic B (2020). Deep Multi-Task Learning for Cooperative NOMA: System Design and Principles, IEEE Journal on Selected Areas in Communications, 39:1, (61-78), Online publication date: 1-Jan-2021.
  223. Bazan G, Goedtel A, Scalassara P and Endo W (2021). Rotor fault diagnosis of frequency inverter fed or line-connected induction motors using mutual information, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 25:2, (1309-1324), Online publication date: 1-Jan-2021.
  224. Cavezza D, Alrajeh D and György A (2020). A Weakness Measure for GR(1) Formulae, Formal Aspects of Computing, 33:1, (27-63), Online publication date: 1-Jan-2021.
  225. ACM
    Ashtiani H, Ben-David S, Harvey N, Liaw C, Mehrabian A and Plan Y (2020). Near-optimal Sample Complexity Bounds for Robust Learning of Gaussian Mixtures via Compression Schemes, Journal of the ACM, 67:6, (1-42), Online publication date: 31-Dec-2021.
  226. Jurkiewicz M An Approximation of the Zero Error Capacity by a Greedy Algorithm Combinatorial Optimization and Applications, (91-104)
  227. Yu S, Lu Y and Chen W Computation-Aided Data Transmission for Remote Reconstruction of Trajectories of Dynamical Systems GLOBECOM 2020 - 2020 IEEE Global Communications Conference, (1-6)
  228. Hassanpour S, Wübben D and Dekorsy A Generalized Distributed Information Bottleneck for Fronthaul Rate Reduction at the Cloud-RANs Uplink GLOBECOM 2020 - 2020 IEEE Global Communications Conference, (1-6)
  229. Lee C, Barnes L and Özgür A Over-the-Air Statistical Estimation GLOBECOM 2020 - 2020 IEEE Global Communications Conference, (1-6)
  230. Pang B, Han T, Nijkamp E, Zhu S and Wu Y Learning latent space energy-based prior model Proceedings of the 34th International Conference on Neural Information Processing Systems, (21994-22008)
  231. Wieser M, Parbhoo S, Wieczorek A and Roth V Inverse learning of symmetries Proceedings of the 34th International Conference on Neural Information Processing Systems, (18004-18015)
  232. Eysenbach B, Geng X, Levine S and Salakhutdinov R Rewriting history with inverse RL Proceedings of the 34th International Conference on Neural Information Processing Systems, (14783-14795)
  233. Rimanic L, Renggli C, Li B and Zhang C On convergence of nearest neighbor classifiers over feature transformations Proceedings of the 34th International Conference on Neural Information Processing Systems, (12521-12532)
  234. Yu Y, Chan K, You C, Song C and Ma Y Learning diverse and discriminative representations via the principle of maximal coding rate reduction Proceedings of the 34th International Conference on Neural Information Processing Systems, (9422-9434)
  235. Jadbabaie A, Makur A and Shah D Estimation of skill distribution from a tournament Proceedings of the 34th International Conference on Neural Information Processing Systems, (8418-8429)
  236. Moulos V Finite-time analysis of round-robin kullback-leibler upper confidence bounds for optimal adaptive allocation with multiple plays and Markovian rewards Proceedings of the 34th International Conference on Neural Information Processing Systems, (7863-7874)
  237. Jia Y, Ye C and Cui Y (2020). Analysis and Optimization of an Intelligent Reflecting Surface-Assisted System With Interference, IEEE Transactions on Wireless Communications, 19:12, (8068-8082), Online publication date: 1-Dec-2020.
  238. Liang Q, Liu D and Hu J (2020). Secure Degrees of Freedom of MIMO Two-Way Wiretap Channel With no CSI Anywhere, IEEE Transactions on Wireless Communications, 19:12, (7927-7941), Online publication date: 1-Dec-2020.
  239. Molina-Coronado B, Mori U, Mendiburu A and Miguel-Alonso J (2020). Survey of Network Intrusion Detection Methods From the Perspective of the Knowledge Discovery in Databases Process, IEEE Transactions on Network and Service Management, 17:4, (2451-2479), Online publication date: 1-Dec-2020.
  240. Salek F, Hsieh M and Fonollosa J (2020). Single-Serving Quantum Broadcast Channel With Common, Individualized, and Confidential Messages, IEEE Transactions on Information Theory, 66:12, (7752-7771), Online publication date: 1-Dec-2020.
  241. Cho K, Lee S and Tan V (2020). Throughput Scaling of Covert Communication Over Wireless Adhoc Networks, IEEE Transactions on Information Theory, 66:12, (7684-7701), Online publication date: 1-Dec-2020.
  242. Huang Z, Radunovic B, Vojnovic M and Zhang Q (2020). Communication complexity of approximate maximum matching in the message-passing model, Distributed Computing, 33:6, (515-531), Online publication date: 1-Dec-2020.
  243. ACM
    Singh S, Yadav S and Mishra S Secrecy Capacity of Diffusive Molecular Communication Under Biological Spherical Environment Proceedings of the 1st ACM International Workshop on Nanoscale Computing, Communication, and Applications, (33-38)
  244. ACM
    Gu J, Luo C, Qin S, Qiao B, Lin Q, Zhang H, Li Z, Dang Y, Cai S, Wu W, Zhou Y, Chintalapati M and Zhang D Efficient incident identification from multi-dimensional issue reports via meta-heuristic search Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (292-303)
  245. Bourne J, Goodell M, He X, Steiner J and Leang K (2021). Decentralized Multi-agent information-theoretic control for target estimation and localization, International Journal of Robotics Research, 39:13, (1525-1548), Online publication date: 1-Nov-2020.
  246. Hu L, Hu P, Luo X, Yuan X and You Z (2020). Incorporating the Coevolving Information of Substrates in Predicting HIV-1 Protease Cleavage Sites, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 17:6, (2017-2028), Online publication date: 1-Nov-2020.
  247. Zhou H and Wen J (2020). Dynamic feature selection method with minimum redundancy information for linear data, Applied Intelligence, 50:11, (3660-3677), Online publication date: 1-Nov-2020.
  248. Cansever D Security Games with Insider Threats Decision and Game Theory for Security, (502-505)
  249. Hucke D, Lohrey M and Benkner L A Comparison of Empirical Tree Entropies String Processing and Information Retrieval, (232-246)
  250. Ek-Chacón E and Molino-Minero-Re E LSTM Classification under Changes in Sequences Order Advances in Soft Computing, (3-20)
  251. Méric H and Péricart L (2020). Performance evaluation of a DVB‐S2 system with a digital optical feeder link, International Journal of Satellite Communications and Networking, 38:6, (463-479), Online publication date: 5-Oct-2020.
  252. Chen C, Wang Z and Li W (2020). Tracking Dynamics of Opinion Behaviors with a Content-Based Sequential Opinion Influence Model, IEEE Transactions on Affective Computing, 11:4, (627-639), Online publication date: 1-Oct-2020.
  253. Gómez P, Londral A, Gómez A, Palacios D and Rodellar V (2018). Monitoring ALS from speech articulation kinematics, Neural Computing and Applications, 32:20, (15801-15812), Online publication date: 1-Oct-2020.
  254. ACM
    Ahsen M, Chun Y, Grishin A, Grishina G, Stolovitzky G, Pandey G and Bunyavanich S NeTFactor, a framework for identifying transcriptional regulators of gene expression-based biomarkers Proceedings of the 11th ACM International Conference on Bioinformatics, Computational Biology and Health Informatics, (1-13)
  255. Anagnostides I, Fotakis D and Patsilinakos P Asymptotically Optimal Communication in Simple Mechanisms Algorithmic Game Theory, (17-31)
  256. Modaresi S, Sauré D and Vielma J (2020). Learning in Combinatorial Optimization, Operations Research, 68:5, (1585-1604), Online publication date: 1-Sep-2020.
  257. Yu K, Liu L, Li J, Ding W and Le T (2020). Multi-Source Causal Feature Selection, IEEE Transactions on Pattern Analysis and Machine Intelligence, 42:9, (2240-2256), Online publication date: 1-Sep-2020.
  258. Zheng S, Cagnazzo M and Kieffer M (2020). Channel Impulsive Noise Mitigation for Linear Video Coding Schemes, IEEE Transactions on Circuits and Systems for Video Technology, 30:9, (3196-3209), Online publication date: 1-Sep-2020.
  259. Wu X, Cai Y, Li Q, Xu J and Leung H (2020). Combining weighted category-aware contextual information in convolutional neural networks for text classification, World Wide Web, 23:5, (2815-2834), Online publication date: 1-Sep-2020.
  260. Lin M, Ji R, Liu H, Sun X, Chen S and Tian Q (2020). Hadamard Matrix Guided Online Hashing, International Journal of Computer Vision, 128:8-9, (2279-2306), Online publication date: 1-Sep-2020.
  261. Feyzi F (2020). CGT-FL: using cooperative game theory to effective fault localization in presence of coincidental correctness, Empirical Software Engineering, 25:5, (3873-3927), Online publication date: 1-Sep-2020.
  262. Bloem P and de Rooij S (2020). Large-scale network motif analysis using compression, Data Mining and Knowledge Discovery, 34:5, (1421-1453), Online publication date: 1-Sep-2020.
  263. Angelelli M, Ciavolino E and Pasca P (2019). Streaming generalized cross entropy, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 24:18, (13837-13851), Online publication date: 1-Sep-2020.
  264. Corallo A, Fortunato L, Massafra A, Pasca P, Angelelli M, Hobbs M, Al-Nasser A, Al-Omari A and Ciavolino E (2019). Sentiment analysis of expectation and perception of MILANO EXPO2015 in twitter data: a generalized cross entropy approach, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 24:18, (13597-13607), Online publication date: 1-Sep-2020.
  265. Turowski K, Magner A and Szpankowski W (2020). Compression of Dynamic Graphs Generated by a Duplication Model, Algorithmica, 82:9, (2687-2707), Online publication date: 1-Sep-2020.
  266. Estiri H, Vasey S and Murphy S Transitive Sequential Pattern Mining for Discrete Clinical Data Artificial Intelligence in Medicine, (414-424)
  267. ACM
    Pennerath F, Mandros P and Vreeken J Discovering Approximate Functional Dependencies using Smoothed Mutual Information Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (1254-1264)
  268. ACM
    Belth C, Zheng X and Koutra D Mining Persistent Activity in Continually Evolving Networks Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (934-944)
  269. Gadelha M, RoyChowdhury A, Sharma G, Kalogerakis E, Cao L, Learned-Miller E, Wang R and Maji S Label-Efficient Learning on Point Clouds Using Approximate Convex Decompositions Computer Vision – ECCV 2020, (473-491)
  270. Nijkamp E, Pang B, Han T, Zhou L, Zhu S and Wu Y Learning Multi-layer Latent Variable Model via Variational Optimization of Short Run MCMC for Approximate Inference Computer Vision – ECCV 2020, (361-378)
  271. Tavassolipour M, Motahari S and Shalmani M (2020). Learning of Gaussian Processes in Distributed and Communication Limited Systems, IEEE Transactions on Pattern Analysis and Machine Intelligence, 42:8, (1928-1941), Online publication date: 1-Aug-2020.
  272. ACM
    Assadi S, Kol G and Oshman R Lower Bounds for Distributed Sketching of Maximal Matchings and Maximal Independent Sets Proceedings of the 39th Symposium on Principles of Distributed Computing, (79-88)
  273. Affeldt R, Garrigue J and Saikawa T Formal Adventures in Convex and Conical Spaces Intelligent Computer Mathematics, (23-38)
  274. Stephenson M, Anderson D, Khalifa A, Levine J, Renz J, Togelius J and Salge C A Continuous Information Gain Measure to Find the Most Discriminatory Problems for AI Benchmarking 2020 IEEE Congress on Evolutionary Computation (CEC), (1-8)
  275. Domke J Provable smoothness guarantees for black-box variational inference Proceedings of the 37th International Conference on Machine Learning, (2587-2596)
  276. ACM
    Fritschek R, Schaefer R and Wunder G Deep learning based wiretap coding via mutual information estimation Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning, (74-79)
  277. Gao H, Xiao K, Xia B and Chen Z (2020). Mutual Information Analysis of Mixed-ADC MIMO Systems Over Rayleigh Channels Based on Random Matrix Theory, IEEE Transactions on Wireless Communications, 19:7, (4894-4906), Online publication date: 1-Jul-2020.
  278. Chen J and Shu T (2020). Statistical Modeling and Analysis on the Confidentiality of Indoor VLC Systems, IEEE Transactions on Wireless Communications, 19:7, (4744-4757), Online publication date: 1-Jul-2020.
  279. Kawakita M and Takeuchi J (2020). Minimum Description Length Principle in Supervised Learning With Application to Lasso, IEEE Transactions on Information Theory, 66:7, (4245-4269), Online publication date: 1-Jul-2020.
  280. He H, Zhou L and Tan V (2020). Distributed Detection With Empirically Observed Statistics, IEEE Transactions on Information Theory, 66:7, (4349-4367), Online publication date: 1-Jul-2020.
  281. Wu H, Zhang Y, Liao X, Shen Y and Jiang X (2020). On covert throughput performance of two-way relay covert wireless communications, Wireless Networks, 26:5, (3275-3289), Online publication date: 1-Jul-2020.
  282. ACM
    Narayanan P and Shan C (2020). Symbolic Disintegration with a Variety of Base Measures, ACM Transactions on Programming Languages and Systems, 42:2, (1-60), Online publication date: 30-Jun-2020.
  283. ACM
    Liu Y, Lin J and Cleland-Huang J Traceability Support for Multi-Lingual Software Projects Proceedings of the 17th International Conference on Mining Software Repositories, (443-454)
  284. d’Amore F, Clementi A and Natale E Phase Transition of a Non-linear Opinion Dynamics with Noisy Interactions Structural Information and Communication Complexity, (255-272)
  285. Xu A Continuity of Generalized Entropy 2020 IEEE International Symposium on Information Theory (ISIT), (2246-2251)
  286. Alhejji M and Smith G A Tight Uniform Continuity Bound for Equivocation 2020 IEEE International Symposium on Information Theory (ISIT), (2270-2274)
  287. Liu S and Motani M Exploring Unique Relevance for Mutual Information based Feature Selection 2020 IEEE International Symposium on Information Theory (ISIT), (2747-2752)
  288. Cho J, Hwang G and Suh C A Fair Classifier Using Mutual Information 2020 IEEE International Symposium on Information Theory (ISIT), (2521-2526)
  289. Cho K and Lee S Treating Interference as Noise is Optimal for Covert Communication over Interference Channels 2020 IEEE International Symposium on Information Theory (ISIT), (816-821)
  290. Jain S, Farnoud F, Schwartz M and Bruck J Coding for Optimized Writing Rate in DNA Storage 2020 IEEE International Symposium on Information Theory (ISIT), (711-716)
  291. Pereg U and Steinberg Y The Arbitrarily Varying Channel with Colored Gaussian Noise 2020 IEEE International Symposium on Information Theory (ISIT), (2097-2102)
  292. Hanson E, Katariya V, Datta N and Wilde M Guesswork with Quantum Side Information: Optimal Strategies and Aspects of Security 2020 IEEE International Symposium on Information Theory (ISIT), (1984-1989)
  293. Urman Y and Burshtein D Feedback Channel Communication with Low Precision Arithmetic 2020 IEEE International Symposium on Information Theory (ISIT), (2067-2072)
  294. Sen P, Gastpar M and Kim Y Successive Refinement to Caching for Dynamic Requests 2020 IEEE International Symposium on Information Theory (ISIT), (1711-1716)
  295. Cicalese F and Rossi E On D-ary Fano Codes 2020 IEEE International Symposium on Information Theory (ISIT), (2365-2370)
  296. Ronquillo N and Javidi T Measurement Dependent Noisy Search with Stochastic Coefficients 2020 IEEE International Symposium on Information Theory (ISIT), (2079-2084)
  297. Yamamoto H, Imaeda K, Hashimoto K and Iwata K A Universal Data Compression Scheme based on the AIVF Coding Techniques 2020 IEEE International Symposium on Information Theory (ISIT), (2360-2364)
  298. Saito S and Matsushima T Evaluation of Error Probability of Classification Based on the Analysis of the Bayes Code 2020 IEEE International Symposium on Information Theory (ISIT), (2510-2514)
  299. Shkel Y and Vincent Poor H A compression perspective on secrecy measures 2020 IEEE International Symposium on Information Theory (ISIT), (995-1000)
  300. Zaidi A Hypothesis Testing Against Independence Under Gaussian Noise 2020 IEEE International Symposium on Information Theory (ISIT), (1289-1294)
  301. Leemans S and Polyvyanyy A Stochastic-Aware Conformance Checking: An Entropy-Based Approach Advanced Information Systems Engineering, (217-233)
  302. Teisseyre P, Mielniczuk J and Dąbrowski M Testing the Significance of Interactions in Genetic Studies Using Interaction Information and Resampling Technique Computational Science – ICCS 2020, (511-524)
  303. Abiodun E, Jantan A, Abiodun O and Arshad H (2020). Reinforcing the Security of Instant Messaging Systems Using an Enhanced Honey Encryption Scheme: The Case of WhatsApp, Wireless Personal Communications: An International Journal, 112:4, (2533-2556), Online publication date: 1-Jun-2020.
  304. Liu J, Wang J, Nie W, Su Y and Liu A (2019). An End-to-End Perceptual Quality Assessment Method via Score Distribution Prediction, Neural Processing Letters, 51:3, (2123-2137), Online publication date: 1-Jun-2020.
  305. Avin C, Mondal K and Schmid S (2019). Demand-aware network designs of bounded degree, Distributed Computing, 33:3-4, (311-325), Online publication date: 1-Jun-2020.
  306. Shamasundar B, Theagarajan L and Chockalingam A Capacity Analysis of Time-Indexed Media-based Modulation 2020 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  307. ACM
    Jocys Z, Pouryazdan A and Roggen D Multimodal fusion of IMUs and EPS body-worn sensors for scratch recognition Proceedings of the 14th EAI International Conference on Pervasive Computing Technologies for Healthcare, (325-335)
  308. Dinur I On the Streaming Indistinguishability of a Random Permutation and a Random Function Advances in Cryptology – EUROCRYPT 2020, (433-460)
  309. Ciba M, Bestel R, Nick C, de Arruda G, Peron T, Henrique C, Costa L, Rodrigues F and Thielemann C (2020). Comparison of Different Spike Train Synchrony Measures Regarding Their Robustness to Erroneous Data From Bicuculline-Induced Epileptiform Activity, Neural Computation, 32:5, (887-911), Online publication date: 1-May-2020.
  310. Halbersberg D, Wienreb M and Lerner B (2020). Joint maximization of accuracy and information for learning the structure of a Bayesian network classifier, Machine Language, 109:5, (1039-1099), Online publication date: 1-May-2020.
  311. ACM
    Yan X, Lou Z, Hu S and Ye Y (2020). Multi-task Information Bottleneck Co-clustering for Unsupervised Cross-view Human Action Categorization, ACM Transactions on Knowledge Discovery from Data, 14:2, (1-23), Online publication date: 30-Apr-2020.
  312. ACM
    Berdahl E and Blandino M Modeling a Musician Performing on a Digital Musical Instrument as a Communications Channel Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, (1-7)
  313. Clark M and Psounis K (2020). Optimizing Primary User Privacy in Spectrum Sharing Systems, IEEE/ACM Transactions on Networking, 28:2, (533-546), Online publication date: 1-Apr-2020.
  314. Zheng Z, Peng Y, Wu F, Tang S and Chen G (2020). ARETE: On Designing Joint Online Pricing and Reward Sharing Mechanisms for Mobile Data Markets, IEEE Transactions on Mobile Computing, 19:4, (769-787), Online publication date: 1-Apr-2020.
  315. ACM
    Kim Y, Butail S, Tscholl M, Liu L and Wang Y An exploratory approach to measuring collaborative engagement in child robot interaction Proceedings of the Tenth International Conference on Learning Analytics & Knowledge, (209-217)
  316. Bania P (2020). An Information Based Approach to Stochastic Control Problems, International Journal of Applied Mathematics and Computer Science, 30:1, (23-34), Online publication date: 1-Mar-2020.
  317. Salmani M and Davidson T (2020). Uplink resource allocation for multiple access computational offloading, Signal Processing, 168:C, Online publication date: 1-Mar-2020.
  318. Shahee S and Ananthakumar U (2019). An effective distance based feature selection approach for imbalanced data, Applied Intelligence, 50:3, (717-745), Online publication date: 1-Mar-2020.
  319. ACM
    Assadi S (2020). Combinatorial Auctions Do Need Modest Interaction, ACM Transactions on Economics and Computation, 8:1, (1-23), Online publication date: 29-Feb-2020.
  320. Zhao S, Qu Z, Luo Z, Lu Z and Liu Y Comb decoding towards collision-free WiFi Proceedings of the 17th Usenix Conference on Networked Systems Design and Implementation, (933-952)
  321. Nekouei E, Nair G, Alpcan T and Evans R (2020). Sample Complexity of Solving Non-Cooperative Games, IEEE Transactions on Information Theory, 66:2, (1261-1280), Online publication date: 1-Feb-2020.
  322. Samorodnitsky A (2020). An Upper Bound on $\ell_q$ Norms of Noisy Functions, IEEE Transactions on Information Theory, 66:2, (742-748), Online publication date: 1-Feb-2020.
  323. Camps Moreno E, Martínez-Moro E and Sarmiento Rosales E (2020). Vardøhus Codes: Polar Codes Based on Castle Curves Kernels, IEEE Transactions on Information Theory, 66:2, (1007-1022), Online publication date: 1-Feb-2020.
  324. Zhang Q, Hu L and Gow J (2019). Output Feedback Stabilization for MIMO Semi-linear Stochastic Systems with Transient Optimisation, International Journal of Automation and Computing, 17:1, (83-95), Online publication date: 1-Feb-2020.
  325. Solorio-Fernández S, Carrasco-Ochoa J and Martínez-Trinidad J (2019). A review of unsupervised feature selection methods, Artificial Intelligence Review, 53:2, (907-948), Online publication date: 1-Feb-2020.
  326. García-Lamont F, Cervantes J, López-Chau A and Yee-Rendón A (2018). Automatic computing of number of clusters for color image segmentation employing fuzzy c-means by extracting chromaticity features of colors, Pattern Analysis & Applications, 23:1, (59-84), Online publication date: 1-Feb-2020.
  327. Lotfollahi M, Jafari Siavoshani M, Shirali Hossein Zade R and Saberian M (2019). Deep packet: a novel approach for encrypted traffic classification using deep learning, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 24:3, (1999-2012), Online publication date: 1-Feb-2020.
  328. Mestrah Y, Savard A, Goupil A, Gellé G and Clavier L (2020). An Unsupervised LLR Estimation with unknown Noise Distribution, EURASIP Journal on Wireless Communications and Networking, 2020:1, Online publication date: 28-Jan-2020.
  329. ACM
    Aggarwal A, Dani V, Hayes T and Saia J A Scalable Algorithm for Multiparty Interactive Communication with Private Channels Proceedings of the 21st International Conference on Distributed Computing and Networking, (1-15)
  330. Hacine-Gharbi A, Ravier P and Nait-Meziane M (2020). Relevant harmonics selection based on mutual information for electrical appliances identification, International Journal of Computer Applications in Technology, 62:2, (102-115), Online publication date: 1-Jan-2020.
  331. Huber A, Anumula J and Liu S (2020). Optimal Sampling of Parametric Families, Neural Computation, 32:1, (261-279), Online publication date: 1-Jan-2020.
  332. Klein B, Hoel E and Xu Y (2020). The Emergence of Informative Higher Scales in Complex Networks, Complexity, 2020, Online publication date: 1-Jan-2020.
  333. Bi R, Chen Q, Chen L, Xiong J, Wu D and Liu X (2020). A Privacy-Preserving Personalized Service Framework through Bayesian Game in Social IoT, Wireless Communications & Mobile Computing, 2020, Online publication date: 1-Jan-2020.
  334. Soheili M, Moghadam A, Dehghan M and Natella R (2020). Statistical Analysis of the Performance of Rank Fusion Methods Applied to a Homogeneous Ensemble Feature Ranking, Scientific Programming, 2020, Online publication date: 1-Jan-2020.
  335. Siegenfeld A, Bar-Yam Y and Gershenson C (2020). An Introduction to Complex Systems Science and Its Applications, Complexity, 2020, Online publication date: 1-Jan-2020.
  336. ACM
    Saad F, Freer C, Rinard M and Mansinghka V (2019). Optimal approximate sampling from discrete probability distributions, Proceedings of the ACM on Programming Languages, 4:POPL, (1-31), Online publication date: 1-Jan-2020.
  337. Osipov D (2020). An Upper Bound on Error Probability in Communication Systems with Single-User Reception Based on Order Statistics, Automation and Remote Control, 81:1, (107-117), Online publication date: 1-Jan-2020.
  338. Huang T, Shlezinger N, Xu X, Liu Y and Eldar Y (2020). MAJoRCom: A Dual-Function Radar Communication System Using Index Modulation, IEEE Transactions on Signal Processing, 68, (3423-3438), Online publication date: 1-Jan-2020.
  339. Grossi E, Lops M and Venturino L (2020). Joint Design of Surveillance Radar and MIMO Communication in Cluttered Environments, IEEE Transactions on Signal Processing, 68, (1544-1557), Online publication date: 1-Jan-2020.
  340. Kumari P, Vorobyov S and Heath R (2020). Adaptive Virtual Waveform Design for Millimeter-Wave Joint Communication–Radar, IEEE Transactions on Signal Processing, 68, (715-730), Online publication date: 1-Jan-2020.
  341. Sudan M, Tyagi H and Watanabe S (2019). Communication for Generating Correlation: A Unifying Survey, IEEE Transactions on Information Theory, 66:1, (5-37), Online publication date: 1-Jan-2020.
  342. Russo D and Zou J (2019). How Much Does Your Data Exploration Overfit? Controlling Bias via Information Usage, IEEE Transactions on Information Theory, 66:1, (302-323), Online publication date: 1-Jan-2020.
  343. Roffe J, Zohren S, Horsman D and Chancellor N (2019). Quantum Codes From Classical Graphical Models, IEEE Transactions on Information Theory, 66:1, (130-146), Online publication date: 1-Jan-2020.
  344. Aldaghri N and Mahdavifar H (2020). Physical Layer Secret Key Generation in Static Environments, IEEE Transactions on Information Forensics and Security, 15, (2692-2705), Online publication date: 1-Jan-2020.
  345. Zhou L (2020). Multiple Private Key Generation for Continuous Memoryless Sources With a Helper, IEEE Transactions on Information Forensics and Security, 15, (2629-2640), Online publication date: 1-Jan-2020.
  346. Zewail A and Yener A (2019). Device-to-Device Secure Coded Caching, IEEE Transactions on Information Forensics and Security, 15, (1513-1524), Online publication date: 1-Jan-2020.
  347. de Dieu Mutangana J and Tandon R (2019). Blind MIMO Cooperative Jamming: Secrecy via ISI Heterogeneity Without CSIT, IEEE Transactions on Information Forensics and Security, 15, (447-461), Online publication date: 1-Jan-2020.
  348. Soltani R, Goeckel D, Towsley D and Houmansadr A (2019). Fundamental Limits of Invisible Flow Fingerprinting, IEEE Transactions on Information Forensics and Security, 15, (345-360), Online publication date: 1-Jan-2020.
  349. Wang W, Yona Y, Wu Y, Diggavi S and Gupta P (2019). SLATE: A Secure Lightweight Entity Authentication Hardware Primitive, IEEE Transactions on Information Forensics and Security, 15, (276-285), Online publication date: 1-Jan-2020.
  350. Ghasemzadeh H and Arjmandi M (2020). Toward Optimum Quantification of Pathology-Induced Noises: An Investigation of Information Missed by Human Auditory System, IEEE/ACM Transactions on Audio, Speech and Language Processing, 28, (519-528), Online publication date: 1-Jan-2020.
  351. Amini J, Hendriks R, Heusdens R, Guo M and Jensen J (2019). Rate-Constrained Noise Reduction in Wireless Acoustic Sensor Networks, IEEE/ACM Transactions on Audio, Speech and Language Processing, 28, (1-12), Online publication date: 1-Jan-2020.
  352. Zhang Z and Parhi K (2019). M3U: Minimum Mean Minimum Uncertainty Feature Selection for Multiclass Classification, Journal of Signal Processing Systems, 92:1, (9-22), Online publication date: 1-Jan-2020.
  353. Muralidharan A and Mostofi Y (2019). Statistics of the distance traveled until successful connectivity for unmanned vehicles, Autonomous Robots, 44:1, (25-42), Online publication date: 1-Jan-2020.
  354. Cheng S, Jin K and Yan L (2019). Extensions of Self-Improving Sorters, Algorithmica, 82:1, (88-106), Online publication date: 1-Jan-2020.
  355. Guo Q, Johansson T and Löndahl C (2019). Solving LPN Using Covering Codes, Journal of Cryptology, 33:1, (1-33), Online publication date: 1-Jan-2020.
  356. ACM
    Li R and Heidrich W (2019). Hierarchical and view-invariant light field segmentation by maximizing entropy rate on 4D ray graphs, ACM Transactions on Graphics, 38:6, (1-15), Online publication date: 31-Dec-2020.
  357. Wang L (2019). On Gaussian covert communication in continuous time, EURASIP Journal on Wireless Communications and Networking, 2019:1, Online publication date: 27-Dec-2019.
  358. Chen J and Shu T Impact of Multiple Reflections on Secrecy Capacity of Indoor VLC System Information and Communications Security, (105-123)
  359. Steeg G, Harutyunyan H, Moyer D and Galstyan A Fast structure learning with modular regularization Proceedings of the 33rd International Conference on Neural Information Processing Systems, (15593-15603)
  360. Gong W, Tschiatschek S, Turner R, Nowozin S, Hernández-Lobato J and Zhang C Icebreaker Proceedings of the 33rd International Conference on Neural Information Processing Systems, (14820-14831)
  361. Lhéritier A and Cazals F Low-complexity nonparametric Bayesian online prediction with universal guarantees Proceedings of the 33rd International Conference on Neural Information Processing Systems, (14581-14590)
  362. Nguyen V, Shafieezadeh-Abadeh S, Yue M, Kuhn D and Wiesemann W Calculating optimistic likelihoods using (geodesically) convex optimization Proceedings of the 33rd International Conference on Neural Information Processing Systems, (13943-13954)
  363. Belghazi M, Oquab M, Lecun Y and Lopez-Paz D Learning about an exponential amount of conditional distributions Proceedings of the 33rd International Conference on Neural Information Processing Systems, (13710-13721)
  364. Liu Y, Liu J, Zhang Z, Zhu L and Li A REM Proceedings of the 33rd International Conference on Neural Information Processing Systems, (12938-12948)
  365. Ito S Submodular function minimization with noisy evaluation oracle Proceedings of the 33rd International Conference on Neural Information Processing Systems, (12103-12113)
  366. Pinot R, Meunier L, Araujo A, Kashima H, Yger F, Gouy-Pailler C and Atif J Theoretical evidence for adversarial robustness through randomization Proceedings of the 33rd International Conference on Neural Information Processing Systems, (11860-11870)
  367. Levy D and Duchi J Necessary and sufficient geometries for gradient methods Proceedings of the 33rd International Conference on Neural Information Processing Systems, (11495-11505)
  368. Zhao S, Wang Y, Yang Z and Cai D Region mutual information loss for semantic segmentation Proceedings of the 33rd International Conference on Neural Information Processing Systems, (11117-11127)
  369. Hao Y and Orlitsky A Unified sample-optimal property estimation in near-linear time Proceedings of the 33rd International Conference on Neural Information Processing Systems, (11106-11116)
  370. Hao Y and Orlitsky A The broad optimality of profile maximum likelihood Proceedings of the 33rd International Conference on Neural Information Processing Systems, (10991-11003)
  371. Ziyin L, Wang Z, Liang P, Salakhutdinov R, Morency L and Ueda M Deep gamblers Proceedings of the 33rd International Conference on Neural Information Processing Systems, (10623-10633)
  372. Chen L, Esfandiari H, Fu T and Mirrokni V Locality-sensitive hashing for f-Divergences and Kreĭn kernels Proceedings of the 33rd International Conference on Neural Information Processing Systems, (10044-10054)
  373. Dai H, Li C, Coley C, Dai B and Song L Retrosynthesis prediction with conditional graph logic network Proceedings of the 33rd International Conference on Neural Information Processing Systems, (8872-8882)
  374. Aubin B, Loureiro B, Maillard A, Krzakala F and Zdeborová L The spiked matrix model with generative priors Proceedings of the 33rd International Conference on Neural Information Processing Systems, (8366-8377)
  375. Leibfried F, Pascual-Díaz S and Grau-Moya J A unified bellman optimality principle combining reward maximization and empowerment Proceedings of the 33rd International Conference on Neural Information Processing Systems, (7869-7880)
  376. Belakaria S, Deshwal A and Doppa J Max-value entropy search for multi-objective Bayesian optimization Proceedings of the 33rd International Conference on Neural Information Processing Systems, (7825-7835)
  377. Huang Z, Huang Z, Wang Y and Yi K Optimal sparsity-sensitive bounds for distributed mean estimation Proceedings of the 33rd International Conference on Neural Information Processing Systems, (6371-6381)
  378. Chaabouni R, Kharitonov E, Dupoux E and Baroni M Anti-efficient encoding in emergent communication Proceedings of the 33rd International Conference on Neural Information Processing Systems, (6293-6303)
  379. Wang S, Zeng Y, Liu X, Zhu E, Yin J, Xu C and Kloft M Effective end-to-end unsupervised outlier detection via inlier priority of discriminative network Proceedings of the 33rd International Conference on Neural Information Processing Systems, (5962-5975)
  380. Moulos V Optimal best Markovian arm identification with fixed confidence Proceedings of the 33rd International Conference on Neural Information Processing Systems, (5605-5614)
  381. Nijkamp E, Hill M, Zhu S and Wu Y Learning non-convergent non-persistent short-run MCMC toward energy-based model Proceedings of the 33rd International Conference on Neural Information Processing Systems, (5232-5242)
  382. Brekelmans R, Moyer D, Galstyan A and Steeg G Exact rate-distortion in autoencoders via echo noise Proceedings of the 33rd International Conference on Neural Information Processing Systems, (3889-3900)
  383. Ho J, Lohn E and Abbeel P Compression with flows via local bits-back coding Proceedings of the 33rd International Conference on Neural Information Processing Systems, (3879-3888)
  384. Ginart A, Guan M, Valiant G and Zou J Making AI forget you Proceedings of the 33rd International Conference on Neural Information Processing Systems, (3518-3531)
  385. Lu X and Roy B Information-theoretic confidence bounds for reinforcement learning Proceedings of the 33rd International Conference on Neural Information Processing Systems, (2461-2470)
  386. Ding J, Calderbank R and Tarokh V Gradient information for representation and modeling Proceedings of the 33rd International Conference on Neural Information Processing Systems, (2396-2405)
  387. Palma G, Kiani B and Lloyd S Random deep neural networks are biased towards simple functions Proceedings of the 33rd International Conference on Neural Information Processing Systems, (1964-1976)
  388. Saha A and Gopalan A Combinatorial bandits with relative feedback Proceedings of the 33rd International Conference on Neural Information Processing Systems, (985-995)
  389. Gao Z, Han Y, Ren Z and Zhou Z Batched multi-armed bandits problem Proceedings of the 33rd International Conference on Neural Information Processing Systems, (503-513)
  390. Li Z, Fresacher M and Scarlett J Learning Erdős-Rényi random graphs via edge detecting queries Proceedings of the 33rd International Conference on Neural Information Processing Systems, (404-414)
  391. Domke J and Sheldon D Divide and couple Proceedings of the 33rd International Conference on Neural Information Processing Systems, (339-349)
  392. Matsumoto R (2019). Classical access structures of ramp secret sharing based on quantum stabilizer codes, Quantum Information Processing, 19:1, Online publication date: 6-Dec-2019.
  393. Haghi A, Mohammadizadeh N and Khandani A (2019). Delay in Cooperative Communications: Achieving Higher Multiplexing Gain in Gaussian Interference Channels With Full-Duplex Transmitters, IEEE Transactions on Information Theory, 65:12, (8250-8272), Online publication date: 1-Dec-2019.
  394. Banawan K and Ulukus S (2019). Noisy Private Information Retrieval: On Separability of Channel Coding and Information Retrieval, IEEE Transactions on Information Theory, 65:12, (8232-8249), Online publication date: 1-Dec-2019.
  395. Bollauf M, Zamir R and Costa S (2019). Multilevel Constructions: Coding, Packing and Geometric Uniformity, IEEE Transactions on Information Theory, 65:12, (7669-7681), Online publication date: 1-Dec-2019.
  396. Timo R, Vellambi B, Grant A and Nguyen K (2019). Tracking Unstable Autoregressive Sources Over Discrete Memoryless Channels, IEEE Transactions on Information Theory, 65:12, (8140-8163), Online publication date: 1-Dec-2019.
  397. Ghebrechristos H and Alaghband G Information Theory-Based Curriculum Learning Factory to Optimize Training Pattern Recognition, (409-423)
  398. ACM
    Shi Z, Newsham G, Chen L and Gunay H Evaluation of Clustering and Time Series Features for Point Type Inference in Smart Building Retrofit Proceedings of the 6th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation, (111-120)
  399. Yang M and Gong G Lempel-Ziv Compression with Randomized Input-Output for Anti-compression Side-Channel Attacks Under HTTPS/TLS Foundations and Practice of Security, (117-136)
  400. Brighente A, Formaggio F, Di Nunzio G and Tomasin S (2019). Machine Learning for In-Region Location Verification in Wireless Networks, IEEE Journal on Selected Areas in Communications, 37:11, (2490-2502), Online publication date: 1-Nov-2019.
  401. Śmieja M, Hajto K and Tabor J (2019). Efficient mixture model for clustering of sparse high dimensional binary data, Data Mining and Knowledge Discovery, 33:6, (1583-1624), Online publication date: 1-Nov-2019.
  402. ACM
    Greer T, Ma B, Sachs M, Habibi A and Narayanan S A Multimodal View into Music's Effect on Human Neural, Physiological, and Emotional Experience Proceedings of the 27th ACM International Conference on Multimedia, (167-175)
  403. Larsson N Run-Length Encoding in a Finite Universe String Processing and Information Retrieval, (355-371)
  404. Bappy J, Paul S, Tuncel E and Roy-Chowdhury A (2019). Exploiting Typicality for Selecting Informative and Anomalous Samples in Videos, IEEE Transactions on Image Processing, 28:10, (5214-5226), Online publication date: 1-Oct-2019.
  405. Kumar Arumugam K and Bloch M (2019). Embedding Covert Information in Broadcast Communications, IEEE Transactions on Information Forensics and Security, 14:10, (2787-2801), Online publication date: 1-Oct-2019.
  406. Chopra R, Murthy C and Annavajjala R (2019). Physical Layer Security in Wireless Sensor Networks Using Distributed Co-Phasing, IEEE Transactions on Information Forensics and Security, 14:10, (2662-2675), Online publication date: 1-Oct-2019.
  407. Kaynia M, Buratti C and Verdone R (2019). On the performance of wireless ad hoc networks using bandwidth partitioning, Wireless Networks, 25:7, (4215-4229), Online publication date: 1-Oct-2019.
  408. Duc A, Faust S and Standaert F (2019). Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version, Journal of Cryptology, 32:4, (1263-1297), Online publication date: 1-Oct-2019.
  409. Andriambolamalala N and Ravelomanana V Energy Efficient Naming in Beeping Networks Ad-Hoc, Mobile, and Wireless Networks, (355-369)
  410. Wang Z and Honorio J Reconstructing a Bounded-Degree Directed Tree Using Path Queries 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (506-513)
  411. Xu X and Huang S On the Asymptotic Sample Complexity of HGR Maximal Correlation Functions in Semi-supervised Learning 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (879-886)
  412. Chandak S, Ji H, Tatwawadi K, Lau B, Mardia J, Kubit M, Neu J, Griffin P, Wootters M and Weissman T Improved read/write cost tradeoff in DNA-based data storage using LDPC codes 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (147-156)
  413. Cohen A, Shlezinger N, Eldar Y and Médard M Serial Quantization for Representing Sparse Signals 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (987-994)
  414. Cho J and Suh C Wasserstein GAN Can Perform PCA 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (895-901)
  415. Bayat F and Wei S Information Bottleneck Problem Revisited 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (40-47)
  416. Royyan M, Vehkapera M, Charalambous T and Wichman R Adaptive Coded Modulation for Stabilization of Wireless Networked Control Systems over Binary Erasure Channels 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (48-55)
  417. Belfodil A, Duivesteijn W, Plantevit M, Cazalens S and Lamarre P DEvIANT: Discovering Significant Exceptional (Dis-)Agreement Within Groups Machine Learning and Knowledge Discovery in Databases, (3-20)
  418. Sanchez-Fernandez A, Fuente M and Sainz-Palmero G Decentralized DPCA Model for Large-Scale Processes Monitoring 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), (625-632)
  419. Tavory A Determining Principal Component Cardinality Through the Principle of Minimum Description Length Machine Learning, Optimization, and Data Science, (655-666)
  420. Ahn J, Simeone O and Kang J Wireless Federated Distillation for Distributed Edge Learning with Heterogeneous Data 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), (1-6)
  421. Zhang Z and Parhi K (2019). MUSE: Minimum Uncertainty and Sample Elimination Based Binary Feature Selection, IEEE Transactions on Knowledge and Data Engineering, 31:9, (1750-1764), Online publication date: 1-Sep-2019.
  422. Hadar U and Shayevitz O (2019). Distributed Estimation of Gaussian Correlations, IEEE Transactions on Information Theory, 65:9, (5323-5338), Online publication date: 1-Sep-2019.
  423. Vrana P and Christandl M (2019). Distillation of Greenberger–Horne–Zeilinger States by Combinatorial Methods, IEEE Transactions on Information Theory, 65:9, (5945-5958), Online publication date: 1-Sep-2019.
  424. Vigneaux J (2019). Information Theory With Finite Vector Spaces, IEEE Transactions on Information Theory, 65:9, (5674-5687), Online publication date: 1-Sep-2019.
  425. Wang J, Ge H, Lin M, Wang J, Dai J and Alouini M (2019). On the Secrecy Rate of Spatial Modulation-Based Indoor Visible Light Communications, IEEE Journal on Selected Areas in Communications, 37:9, (2087-2101), Online publication date: 1-Sep-2019.
  426. Lee S, Bang J and Kim J (2019). Two-particle indistinguishability and identification of boson and fermion species: a Fisher information approach, Quantum Information Processing, 18:9, (1-13), Online publication date: 1-Sep-2019.
  427. Crowder T and Lanzagorta M (2019). Quantum information processing in the neighborhood of a black hole, Natural Computing: an international journal, 18:3, (549-561), Online publication date: 1-Sep-2019.
  428. Malinovsky Y (2019). Sterrett Procedure for the Generalized Group Testing Problem, Methodology and Computing in Applied Probability, 21:3, (829-840), Online publication date: 1-Sep-2019.
  429. Sechidis K, Azzimonti L, Pocock A, Corani G, Weatherall J and Brown G (2022). Efficient feature selection using shrinkage estimators, Machine Language, 108:8-9, (1261-1286), Online publication date: 1-Sep-2019.
  430. ACM
    Roussel R, Cani M, Léon J and Mitra N (2019). Designing chain reaction contraptions from causal graphs, ACM Transactions on Graphics, 38:4, (1-14), Online publication date: 31-Aug-2019.
  431. ACM
    Parker L, Yoo P, Asyhari T, Chermak L, Jhi Y and Taha K DEMISe Proceedings of the 14th International Conference on Availability, Reliability and Security, (1-10)
  432. Grigorescu A and Boche H Differential Power Analysis Attacks from an Information-Theoretic Perspective 2019 IEEE Information Theory Workshop (ITW), (1-5)
  433. Lenz A, Siegel P, Wachter-Zeh A and Yaakobi E An Upper Bound on the Capacity of the DNA Storage Channel 2019 IEEE Information Theory Workshop (ITW), (1-5)
  434. Huang S and Xu X On The Sample Complexity of HGR Maximal Correlation Functions 2019 IEEE Information Theory Workshop (ITW), (1-5)
  435. Sharifian S and Safavi-Naini R A Modular Semantically Secure Wiretap Code with Shared Key for Weakly Symmetric Channels 2019 IEEE Information Theory Workshop (ITW), (1-5)
  436. Watanabe S and Han T Interval Algorithm for Random Number Generation: Information Spectrum Approach 2019 IEEE Information Theory Workshop (ITW), (1-5)
  437. Wu X, Ozgur A, Peleg M and Shitz S New Upper Bounds on the Capacity of Primitive Diamond Relay Channels 2019 IEEE Information Theory Workshop (ITW), (1-5)
  438. Akyol E On Optimal Jamming in Strategic Communication 2019 IEEE Information Theory Workshop (ITW), (1-5)
  439. Nikbakht H, Wigger M, Hachem W and Shitz S Mixed Delay Constraints on a Fading C-RAN Uplink 2019 IEEE Information Theory Workshop (ITW), (1-5)
  440. Berg T, Shayevitz O, Kim Y and Wang L Some Results on Distributed Source Simulation with no Communication 2019 IEEE Information Theory Workshop (ITW), (1-5)
  441. Haghifam M, Tant V and Khisti A Sequential Classification with Empirically Observed Statistics 2019 IEEE Information Theory Workshop (ITW), (1-5)
  442. Greenberg G and Shomorony I The Metagenomic Binning Problem: Clustering Markov Sequences 2019 IEEE Information Theory Workshop (ITW), (1-5)
  443. Yang W, Huang T, Zeng J, Yang G, Cai J, Chen L, Mishra S and Liu Y Mining Player In-game Time Spending Regularity for Churn Prediction in Free Online Games 2019 IEEE Conference on Games (CoG), (1-8)
  444. Bronchain O, Hendrickx J, Massart C, Olshevsky A and Standaert F Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations Advances in Cryptology – CRYPTO 2019, (713-737)
  445. Murakami T and Kawamoto Y Utility-optimized local differential privacy mechanisms for distribution estimation Proceedings of the 28th USENIX Conference on Security Symposium, (1877-1894)
  446. Wang J and Geng X Classification with label distribution learning Proceedings of the 28th International Joint Conference on Artificial Intelligence, (3712-3718)
  447. Ghasemi M and Topcu U Perception-aware point-based value iteration for partially observable Markov decision processes Proceedings of the 28th International Joint Conference on Artificial Intelligence, (2371-2377)
  448. ACM
    Vreeken J and Yamanishi K Modern MDL meets Data Mining Insights, Theory, and Practice Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (3229-3230)
  449. ACM
    Meir U, Minzer D and Oshman R Can Distributed Uniformity Testing Be Local? Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, (228-237)
  450. ACM
    Berger J, Harb M, Abualhaol I, Tekse A, Abielmona R and Petriu E A mixed framework to support heterogeneous collection asset scheduling Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1606-1614)
  451. Cho K, Lee S and Tan V Throughput Scaling of Covert Communication over Wireless Adhoc Networks 2019 IEEE International Symposium on Information Theory (ISIT), (2164-2168)
  452. Bhattacharya S and Banerjee A A method to find the volume of a sphere in the Lee metric, and its applications 2019 IEEE International Symposium on Information Theory (ISIT), (872-876)
  453. Bleuler C, Lapidoth A and Pfister C Gambling and Rényi Divergence 2019 IEEE International Symposium on Information Theory (ISIT), (2214-2218)
  454. Yang S, Wang J, Dong Y and Zhang Y On the Capacity Scalability of Line Networks with Buffer Size Constraints 2019 IEEE International Symposium on Information Theory (ISIT), (1507-1511)
  455. Liao J, Sankar L, Kosut O and Calmon F Robustness of Maximal α-Leakage to Side Information 2019 IEEE International Symposium on Information Theory (ISIT), (642-646)
  456. Chérisey É, Guilley S, Rioul O and Piantanida P An Information-Theoretic Model for Side-Channel Attacks in Embedded Hardware 2019 IEEE International Symposium on Information Theory (ISIT), (310-315)
  457. Graves E, Ning Q and Basu P An information theoretic model for summarization, and some basic results 2019 IEEE International Symposium on Information Theory (ISIT), (502-506)
  458. Kuzuoka S On the Conditional Smooth Rényi Entropy and Its Application in Guessing 2019 IEEE International Symposium on Information Theory (ISIT), (647-651)
  459. Renes J Privacy Amplification, Lossy Compression, and their Duality to Channel Coding 2019 IEEE International Symposium on Information Theory (ISIT), (2144-2148)
  460. Wiegart T, Prinz T, Steiner F and Yuan P Design of Polar Codes for Parallel Channels with an Average Power Constraint 2019 IEEE International Symposium on Information Theory (ISIT), (1942-1946)
  461. Yagli S, Dytso A, Poor H and Shamai Shitz S An Upper Bound on the Number of Mass Points in the Capacity Achieving Distribution for the Amplitude Constrained Additive Gaussian Channel 2019 IEEE International Symposium on Information Theory (ISIT), (1907-1911)
  462. Muramatsu J and Miyake S Stochastic Decision with Stationary Memoryless Sequence 2019 IEEE International Symposium on Information Theory (ISIT), (902-906)
  463. Graczyk R and Lapidoth A Two-Stage Guessing 2019 IEEE International Symposium on Information Theory (ISIT), (475-479)
  464. Collet J (2019). An Exact Expression for the Gap in the Data Processing Inequality for $f$ -Divergences, IEEE Transactions on Information Theory, 65:7, (4387-4391), Online publication date: 1-Jul-2019.
  465. Barmpalias G and Lewis-Pye A (2019). Compression of Data Streams Down to Their Information Content, IEEE Transactions on Information Theory, 65:7, (4471-4485), Online publication date: 1-Jul-2019.
  466. Chen X and Leith D (2019). Multi-destination aggregation with binary symmetric broadcast channel based coding in 802.11 WLANs, Wireless Networks, 25:5, (2201-2216), Online publication date: 1-Jul-2019.
  467. Yang R, Jiang Y, Mathews S, Housworth E, Hahn M and Radivojac P (2019). A new class of metrics for learning on real-valued and structured data, Data Mining and Knowledge Discovery, 33:4, (995-1016), Online publication date: 1-Jul-2019.
  468. ACM
    Assadi S, Karpov N and Zhang Q Distributed and Streaming Linear Programming in Low Dimensions Proceedings of the 38th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (236-253)
  469. Friedjungová M, Jiřina M and Vašata D Missing Features Reconstruction and Its Impact on Classification Accuracy Computational Science – ICCS 2019, (207-220)
  470. Rizvi B, Belatreche A and Bouridane A A Dendritic Cell Immune System Inspired Approach for Stock Market Manipulation Detection 2019 IEEE Congress on Evolutionary Computation (CEC), (3325-3332)
  471. Desmedt Y and Piper F (2019). Perfect Anonymity, IEEE Transactions on Information Theory, 65:6, (3990-3997), Online publication date: 1-Jun-2019.
  472. Yu L and Tan V (2019). Simulation of Random Variables Under Rényi Divergence Measures of All Orders, IEEE Transactions on Information Theory, 65:6, (3349-3383), Online publication date: 1-Jun-2019.
  473. Zheng L (2019). Using mutual information as a cocitation similarity measure, Scientometrics, 119:3, (1695-1713), Online publication date: 1-Jun-2019.
  474. Mazumdar S, Dutta S and Guha P (2019). Sharma---Mittal quantum discord, Quantum Information Processing, 18:6, (1-26), Online publication date: 1-Jun-2019.
  475. Dagan Y, Filmus Y, Gabizon A and Moran S (2019). Twenty (Short) Questions, Combinatorica, 39:3, (597-626), Online publication date: 1-Jun-2019.
  476. Huang X, McGill S, Williams B, Fletcher L and Rosman G Uncertainty-Aware Driver Trajectory Prediction at Urban Intersections 2019 International Conference on Robotics and Automation (ICRA), (9718-9724)
  477. Jaeger J and Tessaro S Tight Time-Memory Trade-Offs for Symmetric Encryption Advances in Cryptology – EUROCRYPT 2019, (467-497)
  478. Yao Y, Zhao J and Wu L (2019). Cognitive Design of Radar Waveform and the Receive Filter for Multitarget Parameter Estimation, Journal of Optimization Theory and Applications, 181:2, (684-705), Online publication date: 1-May-2019.
  479. Shamasundar B and Chockalingam A Capacity Analysis and Structured Sparse Detection of Generalized Media-based Modulation 2019 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  480. Ganji M and Jafarkhani H Time Asynchronous NOMA for Downlink Transmission 2019 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  481. Lee M, Molisch A, Sastry N and Raman A (2019). Individual Preference Probability Modeling and Parameterization for Video Content in Wireless Caching Networks, IEEE/ACM Transactions on Networking, 27:2, (676-690), Online publication date: 1-Apr-2019.
  482. Poon L Extracting Access Patterns with Hierarchical Latent Tree Analysis: An Empirical Study on an Undergraduate Programming Course Integrated Uncertainty in Knowledge Modelling and Decision Making, (380-392)
  483. Martínez-Peñas U (2019). Universal secure rank-metric coding schemes with optimal communication overheads, Cryptography and Communications, 11:2, (147-166), Online publication date: 1-Mar-2019.
  484. Fernandes G, Rodrigues J, Carvalho L, Al-Muhtadi J and Proença M (2019). A comprehensive survey on network anomaly detection, Telecommunications Systems, 70:3, (447-489), Online publication date: 1-Mar-2019.
  485. Sharma V and Banerjee S (2019). Analysis of atmospheric effects on satellite-based quantum communication, Quantum Information Processing, 18:3, (1-24), Online publication date: 1-Mar-2019.
  486. ACM
    Chattopadhyay S, Beck M, Rezine A and Zeller A (2019). Quantifying the Information Leakage in Cache Attacks via Symbolic Execution, ACM Transactions on Embedded Computing Systems, 18:1, (1-27), Online publication date: 28-Feb-2019.
  487. ACM
    Kong Y and Schoenebeck G (2019). An Information Theoretic Framework For Designing Information Elicitation Mechanisms That Reward Truth-telling, ACM Transactions on Economics and Computation, 7:1, (1-33), Online publication date: 23-Feb-2019.
  488. ACM
    Tian S and Szefer J Temporal Thermal Covert Channels in Cloud FPGAs Proceedings of the 2019 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, (298-303)
  489. Yalcin A, Yuksel M and Bahceci I (2019). Downlink MU-MIMO With QoS Aware Transmission, IEEE Transactions on Wireless Communications, 18:2, (969-982), Online publication date: 1-Feb-2019.
  490. Diamant R, Casari P and Tomasin S (2019). Cooperative Authentication in Underwater Acoustic Sensor Networks, IEEE Transactions on Wireless Communications, 18:2, (954-968), Online publication date: 1-Feb-2019.
  491. Anshu A, Jain R and Warsi N (2019). Building Blocks for Communication Over Noisy Quantum Networks, IEEE Transactions on Information Theory, 65:2, (1287-1306), Online publication date: 1-Feb-2019.
  492. Gao Y, Zhu C, Li S and Yang T (2019). Source Distortion Temporal Propagation Analysis for Random-Access Hierarchical Video Coding Optimization, IEEE Transactions on Circuits and Systems for Video Technology, 29:2, (546-559), Online publication date: 1-Feb-2019.
  493. ACM
    Wolf L, Galanti T and Hazan T A Formal Approach to Explainability Proceedings of the 2019 AAAI/ACM Conference on AI, Ethics, and Society, (255-261)
  494. Durmus A, Majewski S and Miasojedow B (2021). Analysis of langevin monte carlo via convex optimization, The Journal of Machine Learning Research, 20:1, (2666-2711), Online publication date: 1-Jan-2019.
  495. De Candido O, Jedda H, Mezghani A, Swindlehurst A and Nossek J (2019). Reconsidering Linear Transmit Signal Processing in 1-Bit Quantized Multi-User MISO Systems, IEEE Transactions on Wireless Communications, 18:1, (254-267), Online publication date: 1-Jan-2019.
  496. Liu L, Yuen C, Guan Y, Li Y and Huang C (2019). Gaussian Message Passing for Overloaded Massive MIMO-NOMA, IEEE Transactions on Wireless Communications, 18:1, (210-226), Online publication date: 1-Jan-2019.
  497. Ma S, Li H, He Y, Yang R, Lu S, Cao W and Li S (2019). Capacity Bounds and Interference Management for Interference Channel in Visible Light Communication Networks, IEEE Transactions on Wireless Communications, 18:1, (182-193), Online publication date: 1-Jan-2019.
  498. Medvidovic N (2019). Editorial, IEEE Transactions on Software Engineering, 45:1, (1-1), Online publication date: 1-Jan-2019.
  499. Zhou C, Tham C and Motani M (2018). Finding Decomposable Models for Efficient Distributed Inference over Sensor Networks, IEEE Transactions on Mobile Computing, 18:1, (70-83), Online publication date: 1-Jan-2019.
  500. Bistritz I and Leshem A (2018). Game Theoretic Dynamic Channel Allocation for Frequency-Selective Interference Channels, IEEE Transactions on Information Theory, 65:1, (330-353), Online publication date: 1-Jan-2019.
  501. Yoshida M, Fujiwara T and Fossorier M (2018). Optimal Uniform Secret Sharing, IEEE Transactions on Information Theory, 65:1, (436-443), Online publication date: 1-Jan-2019.
  502. Zhu J, Lim S and Gastpar M (2018). Communication Versus Computation: Duality for Multiple-Access Channels and Source Coding, IEEE Transactions on Information Theory, 65:1, (292-301), Online publication date: 1-Jan-2019.
  503. Amini J, Hendriks R, Heusdens R, Guo M and Jensen J (2019). Asymmetric Coding for Rate-Constrained Noise Reduction in Binaural Hearing Aids, IEEE/ACM Transactions on Audio, Speech and Language Processing, 27:1, (154-167), Online publication date: 1-Jan-2019.
  504. Hermelin M, Cho J and Nyberg K (2019). Multidimensional Linear Cryptanalysis, Journal of Cryptology, 32:1, (1-34), Online publication date: 1-Jan-2019.
  505. Liu Y, Liang Y and Cui S (2018). Data-Driven Nonparametric Existence and Association Problems, IEEE Transactions on Signal Processing, 66:24, (6377-6389), Online publication date: 15-Dec-2018.
  506. de Chérisey E, Guilley S and Rioul O Confused yet Successful: Information Security and Cryptology, (533-553)
  507. Randrianantenaina I, Kaneko M, Dahrouj H, ElSawy H and Alouini M Joint Scheduling and Power Adaptation in NOMA-Based Fog-Radio Access Networks 2018 IEEE Global Communications Conference (GLOBECOM), (1-6)
  508. Hoffman J, Mohri M and Zhang N Algorithms and theory for multiple-source adaptation Proceedings of the 32nd International Conference on Neural Information Processing Systems, (8256-8266)
  509. Acharya J, Bhattacharyya A, Daskalakis C and Kandasamy S Learning and testing causal models with interventions Proceedings of the 32nd International Conference on Neural Information Processing Systems, (9469-9481)
  510. Marques A, Lam R and Willcox K Contour location via entropy reduction leveraging multiple information sources Proceedings of the 32nd International Conference on Neural Information Processing Systems, (5223-5233)
  511. Mainsah B, Kalika D, Collins L, Liu S and Throckmorton C Information-based adaptive stimulus selection to optimize communication efficiency in brain-computer interfaces Proceedings of the 32nd International Conference on Neural Information Processing Systems, (4825-4835)
  512. Gamarnik D and Zadik I High dimensional linear regression using lattice basis reduction Proceedings of the 32nd International Conference on Neural Information Processing Systems, (1847-1857)
  513. Asaad S, Rabiei A and Müller R (2018). Massive MIMO With Antenna Selection: Fundamental Limits and Applications, IEEE Transactions on Wireless Communications, 17:12, (8502-8516), Online publication date: 1-Dec-2018.
  514. Xu H and Sun L (2018). Encryption Over the Air: Securing Two-Way Untrusted Relaying Systems Through Constellation Overlapping, IEEE Transactions on Wireless Communications, 17:12, (8268-8282), Online publication date: 1-Dec-2018.
  515. Boda V and Narayan P (2018). Universal Sampling Rate Distortion, IEEE Transactions on Information Theory, 64:12, (7742-7758), Online publication date: 1-Dec-2018.
  516. Singha S and Shenoy P (2018). An adaptive heuristic for feature selection based on complementarity, Machine Language, 107:12, (2027-2071), Online publication date: 1-Dec-2018.
  517. Nagarjuna K and Siegel P Universal Polar Coding for Asymmetric Channels 2018 IEEE Information Theory Workshop (ITW), (1-5)
  518. Tahmasebi B, Maddah-Ali M and Motahari S Information Theory of Mixed Population Genome-Wide Association Studies 2018 IEEE Information Theory Workshop (ITW), (1-5)
  519. Dar Y, Elad M and Bruckstein A (2018). Restoration by Compression, IEEE Transactions on Signal Processing, 66:22, (5833-5847), Online publication date: 15-Nov-2018.
  520. Gupta N, Dhurandher S and Woungang I (2018). Subcarriers assignment scheme for multiple secondary users in OFDMA‐based IEEE 802.22 WRAN, Transactions on Emerging Telecommunications Technologies, 29:11, Online publication date: 13-Nov-2018.
  521. Jost D, Maurer U and Ribeiro J Information-Theoretic Secret-Key Agreement: The Asymptotically Tight Relation Between the Secret-Key Rate and the Channel Quality Ratio Theory of Cryptography, (345-369)
  522. WANG W, Yang L and Zhang Q (2018). Resonance-Based Secure Pairing for Wearables, IEEE Transactions on Mobile Computing, 17:11, (2607-2618), Online publication date: 1-Nov-2018.
  523. Wang C, Saeedi Bidokhti S and Wigger M (2018). Improved Converses and Gap Results for Coded Caching, IEEE Transactions on Information Theory, 64:11, (7051-7062), Online publication date: 1-Nov-2018.
  524. Burin A and Shayevitz O (2018). Reducing Guesswork via an Unreliable Oracle, IEEE Transactions on Information Theory, 64:11, (6941-6953), Online publication date: 1-Nov-2018.
  525. Saeedi Bidokhti S, Wigger M and Timo R (2018). Noisy Broadcast Networks With Receiver Caching, IEEE Transactions on Information Theory, 64:11, (6996-7016), Online publication date: 1-Nov-2018.
  526. Sakai Y Generalized Fano-Type Inequality for Countably Infinite Systems with List-Decoding 2018 International Symposium on Information Theory and Its Applications (ISITA), (727-731)
  527. Murakami T A Succinct Model for Re-identification of Mobility Traces Based on Small Training Data 2018 International Symposium on Information Theory and Its Applications (ISITA), (164-168)
  528. Letzepis N A Finite Block Length Achievability Bound for Low Probability of Detection Communication 2018 International Symposium on Information Theory and Its Applications (ISITA), (752-756)
  529. Eto M, Kawakita M and Takeuchi J Asymptotic Behavior of Typical Sets and the Smallest High Probability Set 2018 International Symposium on Information Theory and Its Applications (ISITA), (717-721)
  530. Affeldt R, Garrigue J and Saikawa T Examples of Formal Proofs about Data Compression 2018 International Symposium on Information Theory and Its Applications (ISITA), (633-637)
  531. Sinha A, Mohapatra P, Lee J and Quek T On the Secrecy Capacity of 2-user Gaussian Interference Channel with Independent Secret Keys 2018 International Symposium on Information Theory and Its Applications (ISITA), (663-667)
  532. Miya N, Yoshida T and Jinushi H A Consideration on Classification of Extended Binary Memoryless Sources Under Which Distinct Huffman Codes Are Constructed 2018 International Symposium on Information Theory and Its Applications (ISITA), (540-544)
  533. ACM
    Van Gysel C, de Rijke M and Kanoulas E Mix 'n Match Proceedings of the 27th ACM International Conference on Information and Knowledge Management, (1373-1382)
  534. Tajer A and Zohdy M Resource Allocation under Sequential Resource Access: Theory and Application 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (767-773)
  535. Magner A and Padakandla A Network Archaeology via Epidemic Processes: The Case of Growing Trees 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (879-886)
  536. Chen J Secure Communication over Interference Channel: To Jam or Not to Jam? 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1120-1127)
  537. Afşer H and Deliç H (2018). Polar Codes with Higher-Order Memory, Problems of Information Transmission, 54:4, (301-328), Online publication date: 1-Oct-2018.
  538. Chraiti M, Ghrayeb A and Assi C (2018). A NOMA Scheme for a Two-User MISO Downlink Channel With Unknown CSIT, IEEE Transactions on Wireless Communications, 17:10, (6775-6789), Online publication date: 1-Oct-2018.
  539. Dabaghchian M, Alipour-Fanid A, Zeng K, Wang Q and Auer P (2018). Online Learning With Randomized Feedback Graphs for Optimal PUE Attacks in Cognitive Radio Networks, IEEE/ACM Transactions on Networking, 26:5, (2268-2281), Online publication date: 1-Oct-2018.
  540. Keshmiri S, Sumioka H, Yamazaki R, Okubo M and Ishiguro H Similarity of the Impact of Humanoid and In-Person Communications on Frontal Brain Activity of Older People 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), (2286-2291)
  541. Alimardani M, Keshmiri S, Sumioka H and Hiraki K Classification of EEG signals for a hypnotrack BCI system 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), (240-245)
  542. Almasizadeh J and Abdollahi Azgomi M (2018). A probabilistic model for anonymity analysis of anonymous communication networks, Telecommunications Systems, 69:2, (171-186), Online publication date: 1-Oct-2018.
  543. Case A (2018). Bounded Turing Reductions and Data Processing Inequalities for Sequences, Theory of Computing Systems, 62:7, (1586-1598), Online publication date: 1-Oct-2018.
  544. Ma L, Sbert M and Feixas M Gaze Information Channel Advances in Multimedia Information Processing – PCM 2018, (575-585)
  545. ACM
    Cohen D, O'Connor B and Croft W Understanding the Representational Power of Neural Retrieval Models Using NLP Tasks Proceedings of the 2018 ACM SIGIR International Conference on Theory of Information Retrieval, (67-74)
  546. ACM
    Sakkaff Z, Immaneni A and Pierobon M Applying molecular communication theory to estimate information loss in cell signal transduction Proceedings of the 5th ACM International Conference on Nanoscale Computing and Communication, (1-7)
  547. Gelles R, Paskin-Cherniavsky A and Zikas V Secure Two-Party Computation over Unreliable Channels Security and Cryptography for Networks, (445-463)
  548. Mantel H, Schickel J, Weber A and Weber F How Secure Is Green IT? The Case of Software-Based Energy Side Channels Computer Security, (218-239)
  549. Banaee H, Schaffernicht E and Loutfi A (2019). Data-driven conceptual spaces, Journal of Artificial Intelligence Research, 63:1, (691-742), Online publication date: 1-Sep-2018.
  550. Chen J, Wang F, Zhou J, Li L, Crookes D and Zhou H (2018). Short-Time Velocity Identification and Coherent-Like Detection of Ultrahigh Speed Targets, IEEE Transactions on Signal Processing, 66:18, (4811-4825), Online publication date: 1-Sep-2018.
  551. Yang W, Collins A, Durisi G, Polyanskiy Y and Poor H (2018). Beta–Beta Bounds, IEEE Transactions on Information Theory, 64:9, (6236-6256), Online publication date: 1-Sep-2018.
  552. Charalambous C, Kourtellaris C and Loyka S (2018). Capacity Achieving Distributions and Separation Principle for Feedback Gaussian Channels With Memory, IEEE Transactions on Information Theory, 64:9, (6384-6418), Online publication date: 1-Sep-2018.
  553. Bhattacharya S and Nandi M (2018). A note on the chi-square method, Cryptography and Communications, 10:5, (935-957), Online publication date: 1-Sep-2018.
  554. Bernuy F and Ruiz-Del-Solar J (2018). Topological Semantic Mapping and Localization in Urban Road Scenarios, Journal of Intelligent and Robotic Systems, 92:1, (19-32), Online publication date: 1-Sep-2018.
  555. Guckelsberger C, Salge C and Togelius J New And Surprising Ways to Be Mean 2018 IEEE Conference on Computational Intelligence and Games (CIG), (1-8)
  556. Gong C, Gao Q and Xu Z (2018). Signal Detection for Superposition Transmission Protocols for Optical Wireless Scattering Broadcast Channel, IEEE Transactions on Wireless Communications, 17:8, (5480-5493), Online publication date: 1-Aug-2018.
  557. Ma S, Xu J and Zhang C (2018). Automatic identification of cited text spans, Scientometrics, 116:2, (1303-1330), Online publication date: 1-Aug-2018.
  558. Pimentel J, Alvim M, Campos M and Macharet D (2018). Information-Driven Rapidly-Exploring Random Tree for Efficient Environment Exploration, Journal of Intelligent and Robotic Systems, 91:2, (313-331), Online publication date: 1-Aug-2018.
  559. Budhathoki K and Vreeken J (2018). Origo, Knowledge and Information Systems, 56:2, (285-307), Online publication date: 1-Aug-2018.
  560. Hu J and Pei J (2018). Subspace multi-clustering, Knowledge and Information Systems, 56:2, (257-284), Online publication date: 1-Aug-2018.
  561. ACM
    Fischer O, Meir U and Oshman R Distributed Uniformity Testing Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, (455-464)
  562. Freeman R and Pennock D An axiomatic view of the parimutuel consensus wagering mechanism Proceedings of the 27th International Joint Conference on Artificial Intelligence, (254-260)
  563. ACM
    Pandurangan G, Robinson P and Scquizzato M On the Distributed Complexity of Large-Scale Graph Computations Proceedings of the 30th on Symposium on Parallelism in Algorithms and Architectures, (405-414)
  564. Freeman R and Pennock D An Axiomatic View of the Parimutuel Consensus Wagering Mechanism Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, (1936-1938)
  565. ACM
    Fouché E, Eckert A and Böhm K In-database analytics with ibmdbpy Proceedings of the 30th International Conference on Scientific and Statistical Database Management, (1-4)
  566. Hamadouche A, Kouadri A and Bensmail A (2018). Kernelized relative entropy for direct fault detection in industrial rotary kilns, International Journal of Adaptive Control and Signal Processing, 32:7, (967-979), Online publication date: 3-Jul-2018.
  567. Souza I, Alcoforado M and Rocha V (2018). Turbo decoding of simple product codes in a two user binary adder channel employing the Bahl---Cocke---Jelinek---Raviv algorithm, Telecommunications Systems, 68:3, (513-521), Online publication date: 1-Jul-2018.
  568. ACM
    Ji S, Shao J, Agun D and Yang T Privacy-aware Ranking with Tree Ensembles on the Cloud The 41st International ACM SIGIR Conference on Research & Development in Information Retrieval, (315-324)
  569. ACM
    Suárez-García E, Landin A, Valcarce D and Barreiro Á Term Association Measures for Memory-based Recommender Systems Proceedings of the 5th Spanish Conference on Information Retrieval, (1-8)
  570. ACM
    Chakraborty D, Kamma L and Larsen K Tight cell probe bounds for succinct Boolean matrix-vector multiplication Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, (1297-1306)
  571. Weinberger N and Kochman Y On the Reliability Function of Distributed Hypothesis Testing Under Optimal Detection 2018 IEEE International Symposium on Information Theory (ISIT), (1066-1070)
  572. Vera M, Piantanida P and Vega L The Role of the Information Bottleneck in Representation Learning 2018 IEEE International Symposium on Information Theory (ISIT), (1580-1584)
  573. Chaaban A, Rezki Z and Alouini M MIMO Optical Intensity Channels with Peak Intensity Constraints: Low-SNR Capacity 2018 IEEE International Symposium on Information Theory (ISIT), (1360-1364)
  574. Zhou J, Liu F and Cheng L (2018). Image authentication using distributed arithmetic coding, Multimedia Tools and Applications, 77:12, (15505-15520), Online publication date: 1-Jun-2018.
  575. Kayal S (2018). On Weighted Generalized Cumulative Residual Entropy of Order n , Methodology and Computing in Applied Probability, 20:2, (487-503), Online publication date: 1-Jun-2018.
  576. Paul G and Ray S (2018). On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers, Designs, Codes and Cryptography, 86:6, (1211-1247), Online publication date: 1-Jun-2018.
  577. ACM
    Ngo H Worst-Case Optimal Join Algorithms Proceedings of the 37th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (111-124)
  578. ACM
    Lutz J and Lutz N (2018). Algorithmic Information, Plane Kakeya Sets, and Conditional Dimension, ACM Transactions on Computation Theory, 10:2, (1-22), Online publication date: 23-May-2018.
  579. ACM
    Chiang F and Gairola D (2018). InfoClean, Journal of Data and Information Quality, 9:4, (1-26), Online publication date: 22-May-2018.
  580. ACM
    Zhai J, Yan C, Wang S, Zhou D, Zhou H and Zeng X (2018). An Efficient Non-Gaussian Sampling Method for High Sigma SRAM Yield Analysis, ACM Transactions on Design Automation of Electronic Systems, 23:3, (1-23), Online publication date: 18-Apr-2018.
  581. Hassanpour S, Wübben D and Dekorsy A On the equivalence of double maxima and KL-means for information bottleneck-based source coding 2018 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  582. Xu D, Ren P, Ritcey J, He H and Xu Q ICA-based channel estimation and identification against pilot spoofing attack for OFDM systems 2018 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  583. Arzani B, Ciraci S, Chamon L, Zhu Y, Liu H, Padhye J, Loo B and Outhred G 007 Proceedings of the 15th USENIX Conference on Networked Systems Design and Implementation, (419-435)
  584. ACM
    da Nóbrega T, Pires C, Araújo T and Mestre D Blind attribute pairing for privacy-preserving record linkage Proceedings of the 33rd Annual ACM Symposium on Applied Computing, (557-564)
  585. ACM
    Zitouni M, Akbarinia R, Yahia S and Masseglia F Maximally informative k-itemset mining from massively distributed data streams Proceedings of the 33rd Annual ACM Symposium on Applied Computing, (502-509)
  586. Jonckheere M and Prabhu B (2018). Asymptotics of insensitive load balancing and blocking phases, Queueing Systems: Theory and Applications, 88:3-4, (243-278), Online publication date: 1-Apr-2018.
  587. Dong B, Lin M and Park H (2018). Integer Matrix Approximation and Data Mining, Journal of Scientific Computing, 75:1, (198-224), Online publication date: 1-Apr-2018.
  588. ACM
    Boyar J, Favrholdt L, Kudahl C, Larsen K and Mikkelsen J (2017). Online Algorithms with Advice, ACM Computing Surveys, 50:2, (1-34), Online publication date: 31-Mar-2018.
  589. He F, Mao T, Hu T and Shu L (2018). A new type of change-detection scheme based on the window-limited weighted likelihood ratios, Expert Systems with Applications: An International Journal, 94:C, (149-163), Online publication date: 15-Mar-2018.
  590. Chen Y, Bayesteh A, Wu Y, Ren B, Kang S, Sun S, Xiong Q, Qian C, Yu B, Ding Z, Wang S, Han S, Hou X, Lin H, Visoz R and Razavi R (2018). Toward the Standardization of Non-Orthogonal Multiple Access for Next Generation Wireless Networks, IEEE Communications Magazine, 56:3, (19-27), Online publication date: 1-Mar-2018.
  591. ACM
    Braverman M, Efremenko K, Gelles R and Haeupler B (2017). Constant-Rate Coding for Multiparty Interactive Communication Is Impossible, Journal of the ACM, 65:1, (1-41), Online publication date: 28-Feb-2018.
  592. Balado F and Haughton D (2018). Asymptotically Optimum Perfect Universal Steganography of Finite Memoryless Sources, IEEE Transactions on Information Theory, 64:2, (1199-1216), Online publication date: 1-Feb-2018.
  593. El Gheche M, Chierchia G and Pesquet J (2018). Proximity Operators of Discrete Information Divergences, IEEE Transactions on Information Theory, 64:2, (1092-1104), Online publication date: 1-Feb-2018.
  594. Hayashi M and Tan V (2018). Minimum Rates of Approximate Sufficient Statistics, IEEE Transactions on Information Theory, 64:2, (875-888), Online publication date: 1-Feb-2018.
  595. Wu X and Ozgur A (2018). Cut-Set Bound is Loose for Gaussian Relay Networks, IEEE Transactions on Information Theory, 64:2, (1023-1037), Online publication date: 1-Feb-2018.
  596. Said S, Hajri H, Bombrun L and Vemuri B (2018). Gaussian Distributions on Riemannian Symmetric Spaces, IEEE Transactions on Information Theory, 64:2, (752-772), Online publication date: 1-Feb-2018.
  597. Khina A, Kochman Y and Khisti A (2018). The MIMO Wiretap Channel Decomposed, IEEE Transactions on Information Theory, 64:2, (1046-1063), Online publication date: 1-Feb-2018.
  598. Austrin P, Kaski P, Koivisto M and Nederlof J (2018). Sharper Upper Bounds for Unbalanced Uniquely Decodable Code Pairs, IEEE Transactions on Information Theory, 64:2, (1368-1373), Online publication date: 1-Feb-2018.
  599. Assadi S and Khanna S Tight bounds on the round complexity of the distributed maximum coverage problem Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, (2412-2431)
  600. Braverman M, Mao J and Weinberg S On simultaneous two-player combinatorial auctions Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, (2256-2273)
  601. Sinha M Lower bounds for approximating the matching polytope Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, (1585-1604)
  602. (2018). Causal feature selection method based on extended Markov blanket, International Journal of Wireless and Mobile Computing, 15:4, (310-317), Online publication date: 1-Jan-2018.
  603. Abdul Haleem M and Ur-Rahman M (2018). On the Capacity and Transmission Techniques of Massive MIMO Systems, Wireless Communications & Mobile Computing, 2018, Online publication date: 1-Jan-2018.
  604. Shim K, An B and Chowdhury M (2018). Exploiting Opportunistic Scheduling for Physical-Layer Security in Multitwo User NOMA Networks, Wireless Communications & Mobile Computing, 2018, Online publication date: 1-Jan-2018.
  605. Wilson S and Mohan C (2018). An Information Bottleneck Approach to Optimize the Dictionary of Visual Data, IEEE Transactions on Multimedia, 20:1, (96-106), Online publication date: 1-Jan-2018.
  606. Tsiligkaridis T (2018). Decentralized adaptive search using the noisy 20 questions framework in time-varying networks, Signal Processing, 142:C, (330-339), Online publication date: 1-Jan-2018.
  607. Xie N, Zhang S, Zhang L and Wang H (2018). Multi-pair two-way relaying systems with physical layer network coding, Wireless Networks, 24:1, (195-208), Online publication date: 1-Jan-2018.
  608. Yang C and Kumar M On the transient performance of Monte Carlo simulations for initial uncertainty forecasting 2017 IEEE 56th Annual Conference on Decision and Control (CDC), (1669-1674)
  609. Ryabko D Independence clustering (without a matrix) Proceedings of the 31st International Conference on Neural Information Processing Systems, (4016-4026)
  610. Scarlett J and Cevher V Phase transitions in the pooled data problem Proceedings of the 31st International Conference on Neural Information Processing Systems, (376-384)
  611. Cai M, Laneman J and Hochwald B Carrier Aggregation for Phased-Array Analog Beamforming with Beam Squint GLOBECOM 2017 - 2017 IEEE Global Communications Conference, (1-7)
  612. Zou D, Gong C, Wang K and Xu Z Characterization of a Practical Photon Counting Receiver in Optical Scattering Communication GLOBECOM 2017 - 2017 IEEE Global Communications Conference, (1-6)
  613. Li H Does Feedback Control Always Reduce Entropy/Communication Requirement in Smart Grid? GLOBECOM 2017 - 2017 IEEE Global Communications Conference, (1-6)
  614. Zhang C and Luo Y Approximating the Differential Entropy of Gaussian Mixtures GLOBECOM 2017 - 2017 IEEE Global Communications Conference, (1-6)
  615. Solorio-Fernndez S, Martnez-Trinidad J and Carrasco-Ochoa J (2017). A new Unsupervised Spectral Feature Selection Method for mixed data, Pattern Recognition, 72:C, (314-326), Online publication date: 1-Dec-2017.
  616. Wang K, Zhang B, Wang X and Dai L (2017). A Novel Low-Complexity Precoding Algorithm for MIMO Cognitive Radio Systems, Wireless Personal Communications: An International Journal, 97:4, (5077-5088), Online publication date: 1-Dec-2017.
  617. Farràs O, Hansen T, Kaced T and Padró C (2017). On the Information Ratio of Non-perfect Secret Sharing Schemes, Algorithmica, 79:4, (987-1013), Online publication date: 1-Dec-2017.
  618. ACM
    Dutta S, Liu X, Biswas A, Shen H and Chen J Pointwise information guided visual analysis of time-varying multi-fields SIGGRAPH Asia 2017 Symposium on Visualization, (1-8)
  619. Mostafa A and Lampe L (2017). On Linear Precoding for the Two-User MISO Broadcast Channel With Confidential Messages and Per-Antenna Constraints, IEEE Transactions on Signal Processing, 65:22, (6053-6068), Online publication date: 15-Nov-2017.
  620. ACM
    Guo S, Chen C, Liu Y, Xu K and Chiu D It Can be Cheaper Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, (146-155)
  621. Buscemi F Comparison of noisy channels and reverse data-processing theorems 2017 IEEE Information Theory Workshop (ITW), (489-493)
  622. Rottenstreich O and Cassuto Y Optimal compression of element pairs in fixed-width memories 2017 IEEE Information Theory Workshop (ITW), (156-160)
  623. Stavrou P, Østergaard J, Charalambous C and Derpich M An upper bound to zero-delay rate distortion via Kalman filtering for vector Gaussian sources 2017 IEEE Information Theory Workshop (ITW), (534-538)
  624. Khina A, Kostina V, Khisti A and Hassibi B Sequential coding of Gauss-Markov sources with packet erasures and feedback 2017 IEEE Information Theory Workshop (ITW), (529-530)
  625. Weng J, Alajaji F and Linder T Lossy transmission of correlated sources over two-way channels 2017 IEEE Information Theory Workshop (ITW), (354-358)
  626. Moser S, Wang L and Wigger M Asymptotic high-SNR capacity of MISO optical intensity channels 2017 IEEE Information Theory Workshop (ITW), (86-90)
  627. Fong S and Tan V A tight upper bound on the second-order coding rate of parallel Gaussian channels with feedback 2017 IEEE Information Theory Workshop (ITW), (76-80)
  628. Zheng J, Jiang Z and Chellappa R (2017). Submodular Attribute Selection for Visual Recognition, IEEE Transactions on Pattern Analysis and Machine Intelligence, 39:11, (2242-2255), Online publication date: 1-Nov-2017.
  629. Koh Y and Kim C (2017). Unsupervised Primary Object Discovery in Videos Based on Evolutionary Primary Object Modeling With Reliable Object Proposals, IEEE Transactions on Image Processing, 26:11, (5203-5216), Online publication date: 1-Nov-2017.
  630. Choi J (2017). Physical Layer Security for Channel-Aware Random Access With Opportunistic Jamming, IEEE Transactions on Information Forensics and Security, 12:11, (2699-2711), Online publication date: 1-Nov-2017.
  631. Sterkenburg T (2017). A Generalized Characterization of Algorithmic Probability, Theory of Computing Systems, 61:4, (1337-1352), Online publication date: 1-Nov-2017.
  632. ACM
    Liu C, Liu Z, Wei W and Niu R Research of Packet Classification on Network Protocols by Entropy Theory Proceedings of the 2017 International Conference on Wireless Communications, Networking and Applications, (166-171)
  633. Lipor J, Wong B, Scavia D, Kerkez B and Balzano L (2017). Distance-Penalized Active Learning Using Quantile Search, IEEE Transactions on Signal Processing, 65:20, (5453-5465), Online publication date: 15-Oct-2017.
  634. Rüegg T, Hassan Y and Wittneben A Low complexity resource allocation for QF VMIMO receivers with a shared backhaul 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), (1-7)
  635. Honorio J On the sample complexity of learning graphical games 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (830-836)
  636. Wang C, Love D and Ogbe D Transcoding: A new strategy for relay channels 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (450-454)
  637. Shaeiri Z, Karami M and Aghagolzadeh A (2017). Enhancing the fundamental limits of sparsity pattern recovery, Digital Signal Processing, 69:C, (275-285), Online publication date: 1-Oct-2017.
  638. Chen Z, Ding Z, Dai X and Zhang R (2017). An Optimization Perspective of the Superiority of NOMA Compared to Conventional OMA, IEEE Transactions on Signal Processing, 65:19, (5191-5202), Online publication date: 1-Oct-2017.
  639. Weinberger N and Merhav N (2017). Channel Detection in Coded Communication, IEEE Transactions on Information Theory, 63:10, (6364-6392), Online publication date: 1-Oct-2017.
  640. Painsky A, Rosset S and Feder M (2017). Large Alphabet Source Coding Using Independent Component Analysis, IEEE Transactions on Information Theory, 63:10, (6514-6529), Online publication date: 1-Oct-2017.
  641. Wang Q, Jaggi S, Médard M, Cadambe V and Schwartz M (2017). File Updates Under Random/Arbitrary Insertions and Deletions, IEEE Transactions on Information Theory, 63:10, (6487-6513), Online publication date: 1-Oct-2017.
  642. Fanti G, Kairouz P, Oh S, Ramchandran K and Viswanath P (2017). Hiding the Rumor Source, IEEE Transactions on Information Theory, 63:10, (6679-6713), Online publication date: 1-Oct-2017.
  643. Yu L, Huang Z, Shen F, Song J, Shen H and Zhou X (2017). Bilinear Optimized Product Quantization for Scalable Visual Content Analysis, IEEE Transactions on Image Processing, 26:10, (5057-5069), Online publication date: 1-Oct-2017.
  644. Al-Qudah Z, Al-Hawary L, Alrwashdeh M and Al Bataineh M (2017). Parallel Relay Network with Orthogonal Components, Wireless Personal Communications: An International Journal, 96:3, (4869-4884), Online publication date: 1-Oct-2017.
  645. Zhou L, Liu Q, Wang Y and Li H (2017). Secure group information exchange scheme for vehicular ad hoc networks, Personal and Ubiquitous Computing, 21:5, (903-910), Online publication date: 1-Oct-2017.
  646. ACM
    Chattopadhyay S, Beck M, Rezine A and Zeller A Quantifying the information leak in cache attacks via symbolic execution Proceedings of the 15th ACM-IEEE International Conference on Formal Methods and Models for System Design, (25-35)
  647. Bidgoli N, Maugey T and Roumy A Correlation model selection for interactive video communication 2017 IEEE International Conference on Image Processing (ICIP), (2184-2188)
  648. Jin J, Zheng Y, Chen W and Xiao C (2017). Generalized Quadratic Matrix Programming: A Unified Framework for Linear Precoding With Arbitrary Input Distributions, IEEE Transactions on Signal Processing, 65:18, (4887-4901), Online publication date: 15-Sep-2017.
  649. Liu X and Jafarkhani H (2017). Downlink Non-Orthogonal Multiple Access With Limited Feedback, IEEE Transactions on Wireless Communications, 16:9, (6151-6164), Online publication date: 1-Sep-2017.
  650. Cao H, Tian H, Cai J, Alfa A and Huang S (2017). Dynamic Load-Balancing Spectrum Decision for Heterogeneous Services Provisioning in Multi-Channel Cognitive Radio Networks, IEEE Transactions on Wireless Communications, 16:9, (5911-5924), Online publication date: 1-Sep-2017.
  651. Gu Y and Goodman N (2017). Information-Theoretic Compressive Sensing Kernel Optimization and Bayesian Cramér–Rao Bound for Time Delay Estimation, IEEE Transactions on Signal Processing, 65:17, (4525-4537), Online publication date: 1-Sep-2017.
  652. Mao W and Hassibi B (2017). Capacity Analysis of Discrete Energy Harvesting Channels, IEEE Transactions on Information Theory, 63:9, (5850-5885), Online publication date: 1-Sep-2017.
  653. Yang Y, Kar S and Grover P (2017). Graph Codes for Distributed Instant Message Collection in an Arbitrary Noisy Broadcast Network, IEEE Transactions on Information Theory, 63:9, (6059-6084), Online publication date: 1-Sep-2017.
  654. Ubaru S, Mazumdar A and Saad Y (2017). Low Rank Approximation and Decomposition of Large Matrices Using Error Correcting Codes, IEEE Transactions on Information Theory, 63:9, (5544-5558), Online publication date: 1-Sep-2017.
  655. Park S, Yu N and Lee H (2017). An Information-Theoretic Study for Joint Sparsity Pattern Recovery With Different Sensing Matrices, IEEE Transactions on Information Theory, 63:9, (5559-5571), Online publication date: 1-Sep-2017.
  656. Hou C, Jiao Y, Nie F, Luo T and Zhou Z (2017). 2D Feature Selection by Sparse Matrix Regression, IEEE Transactions on Image Processing, 26:9, (4255-4268), Online publication date: 1-Sep-2017.
  657. Gao Y, Zhu C, Li S and Yang T (2017). Temporally Dependent Rate-Distortion Optimization for Low-Delay Hierarchical Video Coding, IEEE Transactions on Image Processing, 26:9, (4457-4470), Online publication date: 1-Sep-2017.
  658. Zhang L, Shan L and Wang J (2017). Optimal feature selection using distance-based discrete firefly algorithm with mutual information criterion, Neural Computing and Applications, 28:9, (2795-2808), Online publication date: 1-Sep-2017.
  659. Steeg G, Gao S, Reing K and Galstyan A Sifting common information from many variables Proceedings of the 26th International Joint Conference on Artificial Intelligence, (2885-2892)
  660. ACM
    Yin Z, Chang K and Zhang R DeepProbe Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (2131-2139)
  661. ACM
    Hallac D, Vare S, Boyd S and Leskovec J Toeplitz Inverse Covariance-Based Clustering of Multivariate Time Series Data Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (215-223)
  662. Domke J A divergence bound for hybrids of MCMC and variational inference and an application to Langevin dynamics and SGVI Proceedings of the 34th International Conference on Machine Learning - Volume 70, (1029-1038)
  663. Asadi K and Littman M An alternative softmax operator for reinforcement learning Proceedings of the 34th International Conference on Machine Learning - Volume 70, (243-252)
  664. Acharya J, Das H, Orlitsky A and Suresh A A unified maximum likelihood approach for estimating symmetric properties of discrete distributions Proceedings of the 34th International Conference on Machine Learning - Volume 70, (11-21)
  665. Cao Y, Tao M, Xu F and Liu K (2017). Fundamental Storage-Latency Tradeoff in Cache-Aided MIMO Interference Networks, IEEE Transactions on Wireless Communications, 16:8, (5061-5076), Online publication date: 1-Aug-2017.
  666. Le Treust M (2017). Joint Empirical Coordination of Source and Channel, IEEE Transactions on Information Theory, 63:8, (5087-5114), Online publication date: 1-Aug-2017.
  667. Yang Y, Grover P and Kar S (2017). Rate Distortion for Lossy In-Network Linear Function Computation and Consensus: Distortion Accumulation and Sequential Reverse Water-Filling, IEEE Transactions on Information Theory, 63:8, (5179-5206), Online publication date: 1-Aug-2017.
  668. Calmon F, Makhdoumi A, Médard M, Varia M, Christiansen M and Duffy K (2017). Principal Inertia Components and Applications, IEEE Transactions on Information Theory, 63:8, (5011-5038), Online publication date: 1-Aug-2017.
  669. Nam J (2017). On the High-SNR Capacity of the Gaussian Interference Channel and New Capacity Bounds, IEEE Transactions on Information Theory, 63:8, (5266-5285), Online publication date: 1-Aug-2017.
  670. Belhadj Amor S, Perlaza S, Krikidis I and Poor H (2017). Feedback Enhances Simultaneous Wireless Information and Energy Transmission in Multiple Access Channels, IEEE Transactions on Information Theory, 63:8, (5244-5265), Online publication date: 1-Aug-2017.
  671. Pan C, Zhu H, Gomes N and Wang J (2017). Joint User Selection and Energy Minimization for Ultra-Dense Multi-channel C-RAN With Incomplete CSI, IEEE Journal on Selected Areas in Communications, 35:8, (1809-1824), Online publication date: 1-Aug-2017.
  672. Boviz D, Chen C and Yang S (2017). Effective Design of Multi-User Reception and Fronthaul Rate Allocation in 5G Cloud RAN, IEEE Journal on Selected Areas in Communications, 35:8, (1825-1836), Online publication date: 1-Aug-2017.
  673. (2017). Probabilistic spectrum sensing data falsification attack in cognitive radio networks, Signal Processing, 137:C, (1-9), Online publication date: 1-Aug-2017.
  674. Du R, Kuang D, Drake B and Park H (2017). DC-NMF, Journal of Global Optimization, 68:4, (777-798), Online publication date: 1-Aug-2017.
  675. Podolskii V (2017). Bounds in Ontology-Based Data Access via Circuit Complexity, Theory of Computing Systems, 61:2, (464-493), Online publication date: 1-Aug-2017.
  676. ACM
    Block K, Narain S and Noubir G An autonomic and permissionless Android covert channel Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, (184-194)
  677. Wu Y, Ng D, Wen C, Schober R and Lozano A (2017). Low-Complexity MIMO Precoding for Finite-Alphabet Signals, IEEE Transactions on Wireless Communications, 16:7, (4571-4584), Online publication date: 1-Jul-2017.
  678. Gherekhloo S and Sezgin A (2017). Latency-Limited Broadcast Channel With Cache-Equipped Helpers, IEEE Transactions on Wireless Communications, 16:7, (4192-4203), Online publication date: 1-Jul-2017.
  679. Chadha A and Andreopoulos Y (2017). Voronoi-Based Compact Image Descriptors: Efficient Region-of-Interest Retrieval With VLAD and Deep-Learning-Based Descriptors, IEEE Transactions on Multimedia, 19:7, (1596-1608), Online publication date: 1-Jul-2017.
  680. Ghasemi H and Ramamoorthy A (2017). Improved Lower Bounds for Coded Caching, IEEE Transactions on Information Theory, 63:7, (4388-4413), Online publication date: 1-Jul-2017.
  681. Chen J, Jiang F and Lee Swindlehurst A (2017). The Gaussian CEO Problem for Scalar Sources With Arbitrary Memory, IEEE Transactions on Information Theory, 63:7, (4286-4297), Online publication date: 1-Jul-2017.
  682. Braun G, Guzmán C and Pokutta S (2017). Lower Bounds on the Oracle Complexity of Nonsmooth Convex Optimization via Information Theory, IEEE Transactions on Information Theory, 63:7, (4709-4724), Online publication date: 1-Jul-2017.
  683. Lim S, Kim K and Kim Y (2017). Distributed Decode–Forward for Relay Networks, IEEE Transactions on Information Theory, 63:7, (4103-4118), Online publication date: 1-Jul-2017.
  684. Tyagi H and Watanabe S (2017). Universal Multiparty Data Exchange and Secret Key Agreement, IEEE Transactions on Information Theory, 63:7, (4057-4074), Online publication date: 1-Jul-2017.
  685. Khoshnevisan M and Laneman J (2017). Intermittent Communication, IEEE Transactions on Information Theory, 63:7, (4089-4102), Online publication date: 1-Jul-2017.
  686. Tutuncuoglu K, Ozel O, Yener A and Ulukus S (2017). The Binary Energy Harvesting Channel With a Unit-Sized Battery, IEEE Transactions on Information Theory, 63:7, (4240-4256), Online publication date: 1-Jul-2017.
  687. Fong S and Tan V (2017). Achievable Rates for Gaussian Degraded Relay Channels With Non-Vanishing Error Probabilities, IEEE Transactions on Information Theory, 63:7, (4183-4201), Online publication date: 1-Jul-2017.
  688. Weinberger N and Merhav N (2017). Simplified Erasure/List Decoding, IEEE Transactions on Information Theory, 63:7, (4218-4239), Online publication date: 1-Jul-2017.
  689. Weinberger N and Shayevitz O (2017). On the Optimal Boolean Function for Prediction Under Quadratic Loss, IEEE Transactions on Information Theory, 63:7, (4202-4217), Online publication date: 1-Jul-2017.
  690. Chen C and Peng W (2017). Intra Line Copy for HEVC Screen Content Intra-Picture Prediction, IEEE Transactions on Circuits and Systems for Video Technology, 27:7, (1568-1579), Online publication date: 1-Jul-2017.
  691. Ding H, Fang Y, Huang X, Pan M, Li P and Glisic S (2017). Cognitive Capacity Harvesting Networks: Architectural Evolution Toward Future Cognitive Radio Networks, IEEE Communications Surveys & Tutorials, 19:3, (1902-1923), Online publication date: 1-Jul-2017.
  692. Liu Y, Liu J, Argyriou A and Ci S (2017). Cross-layer optimized authentication and error control for wireless 3D medical video streaming over LTE, Journal of Visual Communication and Image Representation, 46:C, (208-218), Online publication date: 1-Jul-2017.
  693. Parra-Arnau J, Mármol F, Rebollo-Monedero D and Forné J (2017). Shall I post this now? Optimized, delay-based privacy protection in social networks, Knowledge and Information Systems, 52:1, (113-145), Online publication date: 1-Jul-2017.
  694. Egho E, Gay D, Boullé M, Voisine N and Clérot F (2017). A user parameter-free approach for mining robust sequential classification rules, Knowledge and Information Systems, 52:1, (53-81), Online publication date: 1-Jul-2017.
  695. Goukhshtein M, Boufounos P, Koike-Akino T and Draper S Distributed coding of multispectral images 2017 IEEE International Symposium on Information Theory (ISIT), (3230-3234)
  696. Sason I and Verdú S Arimoto-Rényi conditional entropy and Bayesian hypothesis testing 2017 IEEE International Symposium on Information Theory (ISIT), (2965-2969)
  697. Pereg U and Steinberg Y The arbitrarily varying channel under constraints with causal side information at the encoder 2017 IEEE International Symposium on Information Theory (ISIT), (2805-2809)
  698. Coleman T Dynamical systems, ergodicity, and posterior matching 2017 IEEE International Symposium on Information Theory (ISIT), (2678-2682)
  699. Sakai Y and Iwata K Optimal quantization of B-DMCs maximizing α-mutual information with monge property 2017 IEEE International Symposium on Information Theory (ISIT), (2668-2672)
  700. Zhang W and Huang L On OR many-access channels 2017 IEEE International Symposium on Information Theory (ISIT), (2638-2642)
  701. Mao W, Diggavi S and Kannan S Models and information-theoretic bounds for nanopore sequencing 2017 IEEE International Symposium on Information Theory (ISIT), (2458-2462)
  702. Barik A, Honorio J and Tawarmalani M Information theoretic limits for linear prediction with graph-structured sparsity 2017 IEEE International Symposium on Information Theory (ISIT), (2348-2352)
  703. Liu X and Jafarkhani H Two-user downlink non-orthogonal multiple access with limited feedback 2017 IEEE International Symposium on Information Theory (ISIT), (2288-2292)
  704. Bracher A, Lapidoth A and Pfister C Distributed task encoding 2017 IEEE International Symposium on Information Theory (ISIT), (1993-1997)
  705. Yamamoto H and Hara S Application of Yamamoto-Itoh coding scheme to discrete memoryless broadcast channels 2017 IEEE International Symposium on Information Theory (ISIT), (1878-1882)
  706. Hucke D and Lohrey M Universal tree source coding using grammar-based compression 2017 IEEE International Symposium on Information Theory (ISIT), (1753-1757)
  707. Muramatsu J and Miyake S On the error probability of stochastic decision and stochastic decoding 2017 IEEE International Symposium on Information Theory (ISIT), (1643-1647)
  708. Bose B, Elarief N and Tallini L On codes achieving zero error capacities in limited magnitude error channels 2017 IEEE International Symposium on Information Theory (ISIT), (1386-1390)
  709. Michelusi N Optimal secondary access in retransmission based primary networks via chain decoding 2017 IEEE International Symposium on Information Theory (ISIT), (1187-1191)
  710. Sen P and Kim Y Homologous codes for multiple access channels 2017 IEEE International Symposium on Information Theory (ISIT), (874-878)
  711. Liao J, Sankar L, Calmon F and Tan V Hypothesis testing under maximal leakage privacy constraints 2017 IEEE International Symposium on Information Theory (ISIT), (779-783)
  712. Reeves G Two-moment inequalities for Rényi entropy and mutual information 2017 IEEE International Symposium on Information Theory (ISIT), (664-668)
  713. Chaaban A, Sezgin A and Alouini M On the degrees-of-freedom of the MIMO three-way channel with intermittent connectivity 2017 IEEE International Symposium on Information Theory (ISIT), (546-550)
  714. Moser S, Mylonakis M, Wang L and Wigger M Asymptotic capacity results for MIMO wireless optical communication 2017 IEEE International Symposium on Information Theory (ISIT), (536-540)
  715. Dytso A, Bustin R, Poor H and Shitz S On additive channels with generalized Gaussian noise 2017 IEEE International Symposium on Information Theory (ISIT), (426-430)
  716. Song L, Alajaji F and Linder T On the capacity of burst noise-erasure channels with and without feedback 2017 IEEE International Symposium on Information Theory (ISIT), (206-210)
  717. Cai M, Laneman J and Hochwald B Beamforming codebook compensation for beam squint with channel capacity constraint 2017 IEEE International Symposium on Information Theory (ISIT), (76-80)
  718. Cicalese F, Gargane L and Vaccare U H(X) vs. H(f (X)) 2017 IEEE International Symposium on Information Theory (ISIT), (51-55)
  719. Noorzad P, Effros M and Langberg M The benefit of encoder cooperation in the presence of state information 2017 IEEE International Symposium on Information Theory (ISIT), (41-45)
  720. ACM
    Cevher V, Kapralov M, Scarlett J and Zandieh A An adaptive sublinear-time block sparse fourier transform Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, (702-715)
  721. ACM
    Han Y, Sun W and Zheng B (2017). COMPRESS, ACM Transactions on Database Systems, 42:2, (1-49), Online publication date: 1-Jun-2017.
  722. Jacobsson S, Durisi G, Coldrey M, Gustavsson U and Studer C (2017). Throughput Analysis of Massive MIMO Uplink With Low-Resolution ADCs, IEEE Transactions on Wireless Communications, 16:6, (4038-4051), Online publication date: 1-Jun-2017.
  723. Aghdam S and Duman T (2017). Joint Precoder and Artificial Noise Design for MIMO Wiretap Channels With Finite-Alphabet Inputs Based on the Cut-Off Rate, IEEE Transactions on Wireless Communications, 16:6, (3913-3923), Online publication date: 1-Jun-2017.
  724. Li Q, Gesbert D and Gresset N (2017). Cooperative Channel Estimation for Coordinated Transmission With Limited Backhaul, IEEE Transactions on Wireless Communications, 16:6, (3688-3699), Online publication date: 1-Jun-2017.
  725. Allen T, Tajer A and Al-Dhahir N (2017). Secure Alamouti MAC Transmissions, IEEE Transactions on Wireless Communications, 16:6, (3674-3687), Online publication date: 1-Jun-2017.
  726. Herbold S, Harms P and Grabowski J (2017). Combining usage-based and model-based testing for service-oriented architectures in the industrial practice, International Journal on Software Tools for Technology Transfer (STTT), 19:3, (309-324), Online publication date: 1-Jun-2017.
  727. Contreras L and Mayol-Cuevas W O-POCO: Online point cloud compression mapping for visual odometry and SLAM 2017 IEEE International Conference on Robotics and Automation (ICRA), (4509-4514)
  728. ACM
    Song S, Wang Y and Chaudhuri K Pufferfish Privacy Mechanisms for Correlated Data Proceedings of the 2017 ACM International Conference on Management of Data, (1291-1306)
  729. ACM
    Assadi S Tight Space-Approximation Tradeoff for the Multi-Pass Streaming Set Cover Problem Proceedings of the 36th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (321-335)
  730. ACM
    Grining K and Klonowski M Towards Extending Noiseless Privacy Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, (546-560)
  731. Hu S and Shayevitz O (2017). The $\rho $ -Capacity of a Graph, IEEE Transactions on Information Theory, 63:4, (2241-2253), Online publication date: 1-Apr-2017.
  732. Xu A and Raginsky M (2017). Information-Theoretic Lower Bounds for Distributed Function Computation, IEEE Transactions on Information Theory, 63:4, (2314-2337), Online publication date: 1-Apr-2017.
  733. Wu X, Ozgiur A and Xie L (2017). Improving on the Cut-Set Bound via Geometric Analysis of Typical Sets, IEEE Transactions on Information Theory, 63:4, (2254-2277), Online publication date: 1-Apr-2017.
  734. Moulin P (2017). The Log-Volume of Optimal Codes for Memoryless Channels, Asymptotically Within a Few Nats, IEEE Transactions on Information Theory, 63:4, (2278-2313), Online publication date: 1-Apr-2017.
  735. Weinberger N and Merhav N (2017). A Large Deviations Approach to Secure Lossy Compression, IEEE Transactions on Information Theory, 63:4, (2533-2559), Online publication date: 1-Apr-2017.
  736. Le Caillec J, Itani A, Guriot D and Rakotondratsimba Y (2017). Stock Picking by Probability–Possibility Approaches, IEEE Transactions on Fuzzy Systems, 25:2, (333-349), Online publication date: 1-Apr-2017.
  737. Parra-Arnau J (2017). Pay-per-tracking, Information Sciences: an International Journal, 385:C, (96-124), Online publication date: 1-Apr-2017.
  738. Kleber N and Laneman J Tracking of a Frequency-Hopping Interferer in an OFDM System 2017 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  739. Jalali S and Poor H Minimum entropy pursuit: Noise analysis 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (6100-6104)
  740. Cao P and Oechtering T Optimal transmit strategy for MIMO channels with joint sum and per-antenna power constraints 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (3569-3573)
  741. Jia S and Aazhang B (2017). Signaling Design of Two-Way MIMO Full-Duplex Channel, IEEE Transactions on Wireless Communications, 16:3, (1619-1632), Online publication date: 1-Mar-2017.
  742. He L, Wang J, Song J and Hanzo L (2017). On the Multi-User Multi-Cell Massive Spatial Modulation Uplink, IEEE Transactions on Wireless Communications, 16:3, (1437-1451), Online publication date: 1-Mar-2017.
  743. Pereg U and Tal I (2017). Channel Upgradation for Non-Binary Input Alphabets and MACs, IEEE Transactions on Information Theory, 63:3, (1410-1424), Online publication date: 1-Mar-2017.
  744. Lim T and Franceschetti M (2017). Information Without Rolling Dice, IEEE Transactions on Information Theory, 63:3, (1349-1363), Online publication date: 1-Mar-2017.
  745. Xu A and Raginsky M (2017). Information-Theoretic Lower Bounds on Bayes Risk in Decentralized Estimation, IEEE Transactions on Information Theory, 63:3, (1580-1600), Online publication date: 1-Mar-2017.
  746. Fukuda M and Gour G (2017). Additive Bounds of Minimum Output Entropies for Unital Channels and an Exact Qubit Formula, IEEE Transactions on Information Theory, 63:3, (1818-1828), Online publication date: 1-Mar-2017.
  747. Wadayama T (2017). Nonadaptive Group Testing Based on Sparse Pooling Graphs, IEEE Transactions on Information Theory, 63:3, (1525-1534), Online publication date: 1-Mar-2017.
  748. Mukherjee P, Xie J and Ulukus S (2017). Secure Degrees of Freedom of One-Hop Wireless Networks With No Eavesdropper CSIT, IEEE Transactions on Information Theory, 63:3, (1898-1922), Online publication date: 1-Mar-2017.
  749. Sánchez-Nielsen E, Chávez-Gutiérrez F, Lorenzo-Navarro J and Castrillón-Santana M (2017). A multimedia system to produce and deliver video fragments on demand on parliamentary websites, Multimedia Tools and Applications, 76:5, (6281-6307), Online publication date: 1-Mar-2017.
  750. Pascoal C, Oliveira M, Pacheco A and Valadas R (2017). Theoretical evaluation of feature selection methods based on mutual information, Neurocomputing, 226:C, (168-181), Online publication date: 22-Feb-2017.
  751. Do T, Oechtering T, Kim S, Skoglund M and Peters G (2017). Uplink Waveform Channel With Imperfect Channel State Information and Finite Constellation Input, IEEE Transactions on Wireless Communications, 16:2, (1107-1119), Online publication date: 1-Feb-2017.
  752. Chopra R, Murthy C and Annavajjala R (2017). Multistream Distributed Cophasing, IEEE Transactions on Signal Processing, 65:4, (1042-1057), Online publication date: 1-Feb-2017.
  753. Wigger M, Timo R and Shamai Shitz S (2017). Conferencing in Wyner’s Asymmetric Interference Network, IEEE Transactions on Information Theory, 63:2, (1199-1226), Online publication date: 1-Feb-2017.
  754. Gulcu T and Barg A (2017). Achieving Secrecy Capacity of the Wiretap Channel and Broadcast Channel With a Confidential Component, IEEE Transactions on Information Theory, 63:2, (1311-1324), Online publication date: 1-Feb-2017.
  755. Han W, Rajan P, Frazier P and Jedynak B (2017). Bayesian Group Testing Under Sum Observations, IEEE Transactions on Information Theory, 63:2, (915-933), Online publication date: 1-Feb-2017.
  756. Sabag O, Permuter H and Cohen A (2017). Lossless Coding of Correlated Sources With Actions, IEEE Transactions on Information Theory, 63:2, (1237-1252), Online publication date: 1-Feb-2017.
  757. Kaur A and Singh C (2017). Contrast enhancement for cephalometric images using wavelet-based modified adaptive histogram equalization, Applied Soft Computing, 51:C, (180-191), Online publication date: 1-Feb-2017.
  758. ACM
    Qu Y, Xu J and Yu S Privacy preserving in big data sets through multiple shuffle Proceedings of the Australasian Computer Science Week Multiconference, (1-8)
  759. Ollivier Y, Arnold L, Auger A and Hansen N (2017). Information-geometric optimization algorithms, The Journal of Machine Learning Research, 18:1, (564-628), Online publication date: 1-Jan-2017.
  760. Anjos G, Castanheira D, Silva A, Gameiro A, Gomes M, Vilela J and Pinchera D (2017). Joint Design of Massive MIMO Precoder and Security Scheme for Multiuser Scenarios under Reciprocal Channel Conditions, Wireless Communications & Mobile Computing, 2017, Online publication date: 1-Jan-2017.
  761. Choi J, Chang S and Chan V (2017). Cross-Layer Routing and Scheduling for Onboard Processing Satellites with Phased Array Antenna, IEEE Transactions on Wireless Communications, 16:1, (180-192), Online publication date: 1-Jan-2017.
  762. Rey Vega L, Piantanida P and Hero A (2017). The Three-Terminal Interactive Lossy Source Coding Problem, IEEE Transactions on Information Theory, 63:1, (532-562), Online publication date: 1-Jan-2017.
  763. Keziou A and Regnault P (2017). Semiparametric Estimation of Mutual Information and Related Criteria, IEEE Transactions on Information Theory, 63:1, (57-71), Online publication date: 1-Jan-2017.
  764. Scarlett J, Tan V and Durisi G (2017). The Dispersion of Nearest-Neighbor Decoding for Additive Non-Gaussian Channels, IEEE Transactions on Information Theory, 63:1, (81-92), Online publication date: 1-Jan-2017.
  765. Al Haija A and Tellambura C (2017). Small-Macro Cell Cooperation for HetNet Uplink Transmission, IEEE Journal on Selected Areas in Communications, 35:1, (118-135), Online publication date: 1-Jan-2017.
  766. Psarrakos G and Toomaj A (2017). On the generalized cumulative residual entropy with applications in actuarial science, Journal of Computational and Applied Mathematics, 309:C, (186-199), Online publication date: 1-Jan-2017.
  767. Chandrasekaran V and Shah P (2017). Relative entropy optimization and its applications, Mathematical Programming: Series A and B, 161:1-2, (1-32), Online publication date: 1-Jan-2017.
  768. Cocco G, Angelone M and Pèrez-Neira A (2017). Co-channel interference cancelation at the user terminal in multibeam satellite systems, International Journal of Satellite Communications and Networking, 35:1, (45-65), Online publication date: 1-Jan-2017.
  769. ACM
    Ganor A, Kol G and Raz R (2016). Exponential Separation of Information and Communication for Boolean Functions, Journal of the ACM, 63:5, (1-31), Online publication date: 20-Dec-2016.
  770. Lahouti F and Hassibi B Fundamental limits of budget-fidelity trade-off in label crowdsourcing Proceedings of the 30th International Conference on Neural Information Processing Systems, (5065-5073)
  771. Hazan E and Ma T A non-generative framework and convex relaxations for unsupervised learning Proceedings of the 30th International Conference on Neural Information Processing Systems, (3314-3322)
  772. Onken A and Panzeri S Mixed vine copulas as joint models of spike counts and local field potentials Proceedings of the 30th International Conference on Neural Information Processing Systems, (1333-1341)
  773. Orabona F and Pál D Coin betting and parameter-free online learning Proceedings of the 30th International Conference on Neural Information Processing Systems, (577-585)
  774. Ratnam V, Molisch A and Papadopoulos H (2016). MIMO Systems With Restricted Pre/Post-Coding—Capacity Analysis Based on Coupled Doubly Correlated Wishart Matrices, IEEE Transactions on Wireless Communications, 15:12, (8537-8550), Online publication date: 1-Dec-2016.
  775. Yang Y, Zhou J, Duan F, Liu F and Cheng L (2016). Wave atom transform based image hashing using distributed source coding, Journal of Information Security and Applications, 31:C, (75-82), Online publication date: 1-Dec-2016.
  776. Kharratzadeh M and Shultz T (2016). Neural implementation of probabilistic models of cognition, Cognitive Systems Research, 40:C, (99-113), Online publication date: 1-Dec-2016.
  777. Nguyen H On Evidential Measures of Support for Reasoning with Integrated Uncertainty: A Lesson from the Ban of P-values in Statistical Inference Integrated Uncertainty in Knowledge Modelling and Decision Making, (3-15)
  778. Sani L, Amoretti M, Vicari E, Mordonini M, Pecori R, Roli A, Villani M, Cagnoni S and Serra R Efficient Search of Relevant Structures in Complex Systems AI*IA 2016 Advances in Artificial Intelligence, (35-48)
  779. Dang Z, Fischer T, Hutton W, Ibarra O and Li Q (2016). Quantifying communication in synchronized languages, Theoretical Computer Science, 654:C, (33-44), Online publication date: 22-Nov-2016.
  780. Liu T and Yang C (2016). Genie Tree and Degrees of Freedom of the Symmetric MIMO Interfering Broadcast Channel, IEEE Transactions on Signal Processing, 64:22, (5914-5929), Online publication date: 15-Nov-2016.
  781. Mbol F, Robert J and Sadighian A An Efficient Approach to Detect TorrentLocker Ransomware in Computer Systems Cryptology and Network Security, (532-541)
  782. Demirtas A, Reibman A and Jafarkhani H (2016). Full-Reference Video Quality Estimation for Videos With Different Spatial Resolutions, IEEE Transactions on Circuits and Systems for Video Technology, 26:11, (1988-2000), Online publication date: 1-Nov-2016.
  783. Lima J and de Souza R (2016). Closed-form Hermite-Gaussian-like number-theoretic transform eigenvectors, Signal Processing, 128:C, (409-416), Online publication date: 1-Nov-2016.
  784. Fraissinet-Tachet M, Schmitt M, Wen Z and Kuijper A (2016). Multi-Camera Piecewise Planar Object Tracking with Mutual Information, Journal of Mathematical Imaging and Vision, 56:3, (591-602), Online publication date: 1-Nov-2016.
  785. Assem H, Xu L, Buda T and O'sullivan D (2016). Machine learning as a service for enabling Internet of Things and People, Personal and Ubiquitous Computing, 20:6, (899-914), Online publication date: 1-Nov-2016.
  786. Brody J, Chakrabarti A, Kondapally R, Woodruff D and Yaroslavtsev G (2016). Certifying Equality With Limited Interaction, Algorithmica, 76:3, (796-845), Online publication date: 1-Nov-2016.
  787. Braun G and Pokutta S (2016). Common Information and Unique Disjointness, Algorithmica, 76:3, (597-629), Online publication date: 1-Nov-2016.
  788. Jain R, Pereszlényi A and Yao P (2016). A Direct Product Theorem for Two-Party Bounded-Round Public-Coin Communication Complexity, Algorithmica, 76:3, (720-748), Online publication date: 1-Nov-2016.
  789. Komargodski I, Naor M and Yogev E How to Share a Secret, Infinitely Proceedings, Part II, of the 14th International Conference on Theory of Cryptography - Volume 9986, (485-514)
  790. ACM
    Bielova N Short Paper: Dynamic leakage Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, (83-88)
  791. ACM
    Silva R, Gomes G, Alvim M and Gonçalves M Compression-Based Selective Sampling for Learning to Rank Proceedings of the 25th ACM International on Conference on Information and Knowledge Management, (247-256)
  792. ACM
    Cuff P and Yu L Differential Privacy as a Mutual Information Constraint Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, (43-54)
  793. Wu P and Pan L (2016). Multi-objective community detection method by integrating users' behavior attributes, Neurocomputing, 210:C, (13-25), Online publication date: 19-Oct-2016.
  794. Cao N, Choi S, Masazade E and Varshney P (2016). Sensor Selection for Target Tracking in Wireless Sensor Networks With Uncertainty, IEEE Transactions on Signal Processing, 64:20, (5191-5204), Online publication date: 15-Oct-2016.
  795. ACM
    Berdahl E, Blandino M, Baker D and Shanahan D An Approach for Using Information Theory to Investigate Continuous Control of Analog Sensors by Humans Proceedings of the Audio Mostly 2016, (85-90)
  796. ACM
    Li R and Patras P WiHaul Proceedings of the 3rd Workshop on Hot Topics in Wireless, (56-60)
  797. Wang S, Zhang L, Li Y, Wang J and Oki E (2016). Multiuser MIMO Transmission Aided by Massive One-Bit Magnitude Measurements, IEEE Transactions on Wireless Communications, 15:10, (7058-7073), Online publication date: 1-Oct-2016.
  798. He B, Zhou X and Swindlehurst A (2016). On Secrecy Metrics for Physical Layer Security Over Quasi-Static Fading Channels, IEEE Transactions on Wireless Communications, 15:10, (6913-6924), Online publication date: 1-Oct-2016.
  799. Zhang R, Yang L and Hanzo L (2016). Performance Analysis of Non-Linear Generalized Pre-Coding Aided Spatial Modulation, IEEE Transactions on Wireless Communications, 15:10, (6731-6741), Online publication date: 1-Oct-2016.
  800. Meymandpour R and Davis J (2016). A semantic similarity measure for linked data, Knowledge-Based Systems, 109:C, (276-293), Online publication date: 1-Oct-2016.
  801. Leeuwen M, Bie T, Spyropoulou E and Mesnage C (2016). Subjective interestingness of subgraph patterns, Machine Language, 105:1, (41-75), Online publication date: 1-Oct-2016.
  802. Kostina V, Peres Y, Rácz M and Ranade G Rate-limited control of systems with uncertain gain 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1189-1196)
  803. Martínez-Peñas U and Matsumoto R Unifying notions of generalized weights for universal security on wire-tap networks 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (800-807)
  804. Exposito V, Yang S and Gresset N A two-round interactive receiver cooperation scheme for multicast channels 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (695-702)
  805. Han D, Mo Y, Wu J and Shi L (2016). An Opportunistic Sensor Scheduling Solution to Remote State Estimation Over Multiple Channels, IEEE Transactions on Signal Processing, 64:18, (4905-4917), Online publication date: 15-Sep-2016.
  806. Teisseyre P (2016). Feature ranking for multi-label classification using Markov networks, Neurocomputing, 205:C, (439-454), Online publication date: 12-Sep-2016.
  807. Cai S and Lau V (2016). MIMO Precoding for Networked Control Systems with Energy Harvesting Sensors, IEEE Transactions on Signal Processing, 64:17, (4469-4478), Online publication date: 1-Sep-2016.
  808. Deng Y, Bao F, Deng X, Wang R, Kong Y and Dai Q (2016). Deep and Structured Robust Information Theoretic Learning for Image Analysis, IEEE Transactions on Image Processing, 25:9, (4209-4221), Online publication date: 1-Sep-2016.
  809. Taranalli V, Uchikawa H and Siegel P (2016). On the Capacity of the Beta-Binomial Channel Model for Multi-Level Cell Flash Memories, IEEE Journal on Selected Areas in Communications, 34:9, (2312-2324), Online publication date: 1-Sep-2016.
  810. (2016). Planning for robotic exploration based on forward simulation, Robotics and Autonomous Systems, 83:C, (15-31), Online publication date: 1-Sep-2016.
  811. Clever D, Harant M, Koch H, Mombaur K and Endres D (2016). A novel approach for the generation of complex humanoid walking sequences based on a combination of optimal control and learning of movement primitives, Robotics and Autonomous Systems, 83:C, (287-298), Online publication date: 1-Sep-2016.
  812. Maxhuni A, Muñoz-Meléndez A, Osmani V, Perez H, Mayora O and Morales E (2016). Classification of bipolar disorder episodes based on analysis of voice and motor activity of patients, Pervasive and Mobile Computing, 31:C, (50-66), Online publication date: 1-Sep-2016.
  813. Katzur A and Kamps U (2016). Classification into Kullback-Leibler balls in exponential families, Journal of Multivariate Analysis, 150:C, (75-90), Online publication date: 1-Sep-2016.
  814. Navarrete J, Viejo D and Cazorla M (2016). Color smoothing for RGB-D data using entropy information, Applied Soft Computing, 46:C, (361-380), Online publication date: 1-Sep-2016.
  815. Bepari D, Bojja A, Kumar B and Mitra D (2016). A Spectral Distance Based Power Control Scheme for Capacity Enhancement of OFDM Cognitive Radio, Wireless Personal Communications: An International Journal, 90:1, (157-173), Online publication date: 1-Sep-2016.
  816. ACM
    Boyar J, Favrholdt L, Kudahl C, Larsen K and Mikkelsen J (2016). Online Algorithms with Advice: A Survey, ACM SIGACT News, 47:3, (93-129), Online publication date: 31-Aug-2016.
  817. Salmerón A, Madsen A, Jensen F, Langseth H, Nielsen T, Ramos-López D, Martínez A and Masegosa A Parallel filter-based feature selection based on balanced incomplete block designs Proceedings of the Twenty-second European Conference on Artificial Intelligence, (743-750)
  818. ACM
    Gao Y and Parameswaran A Squish Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (1575-1584)
  819. ACM
    Wei Y, Zheng Y and Yang Q Transfer Knowledge between Cities Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (1905-1914)
  820. ACM
    Bertens R, Vreeken J and Siebes A Keeping it Short and Simple Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (735-744)
  821. Simonini G, Bergamaschi S and Jagadish H (2016). BLAST, Proceedings of the VLDB Endowment, 9:12, (1173-1184), Online publication date: 1-Aug-2016.
  822. Nencioni G, Sastry N, Tyson G, Badrinarayanan V, Karamshuk D, Chandaria J, Crowcroft J, Nencioni G, Sastry N, Tyson G, Badrinarayanan V, Karamshuk D, Chandaria J and Crowcroft J (2016). SCORE, IEEE/ACM Transactions on Networking, 24:4, (2429-2442), Online publication date: 1-Aug-2016.
  823. Tadrous J, Eryilmaz A, El Gamal H, Tadrous J, Eryilmaz A and El Gamal H (2016). Joint Smart Pricing and Proactive Content Caching for Mobile Services, IEEE/ACM Transactions on Networking, 24:4, (2357-2371), Online publication date: 1-Aug-2016.
  824. Shuai W, Maillé P and Pelov A (2016). Charging Electric Vehicles in the Smart City: A Survey of Economy-Driven Approaches, IEEE Transactions on Intelligent Transportation Systems, 17:8, (2089-2106), Online publication date: 1-Aug-2016.
  825. Liu Y, Feng J, Simeone O, Tang J, Wen Z, Haimovich A and Zhou M (2016). Topology Discovery for Linear Wireless Networks With Application to Train Backbone Inauguration, IEEE Transactions on Intelligent Transportation Systems, 17:8, (2159-2170), Online publication date: 1-Aug-2016.
  826. Goswami K, Lee J, Jang K, Kim B and Kwon K (2016). Entropy difference-based early skip detection technique for high-efficiency video coding, Journal of Real-Time Image Processing, 12:2, (237-245), Online publication date: 1-Aug-2016.
  827. ACM
    Alon N, Braverman M, Efremenko K, Gelles R and Haeupler B Reliable Communication over Highly Connected Noisy Networks Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, (165-173)
  828. ACM
    Mangaravite V and Santos R On Information-Theoretic Document-Person Associations for Expert Search in Academia Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval, (925-928)
  829. Shi Y, Zhang J and Letaief K (2016). Low-Rank Matrix Completion for Topological Interference Management by Riemannian Pursuit, IEEE Transactions on Wireless Communications, 15:7, (4703-4717), Online publication date: 1-Jul-2016.
  830. Wang W and Zhang W (2016). Signal Shaping and Precoding for MIMO Systems Using Lattice Codes, IEEE Transactions on Wireless Communications, 15:7, (4625-4634), Online publication date: 1-Jul-2016.
  831. Chen R, Li C, Li J and Cai X (2016). Performance of Vector Perturbation MU-MIMO Systems in a Composite Fading Channel, Wireless Personal Communications: An International Journal, 89:1, (135-147), Online publication date: 1-Jul-2016.
  832. Vijayan K and Murty K (2016). Epoch Extraction by Phase Modelling of Speech Signals, Circuits, Systems, and Signal Processing, 35:7, (2584-2609), Online publication date: 1-Jul-2016.
  833. ACM
    Wang W, Ying L and Zhang J (2016). The Value of Privacy, ACM SIGMETRICS Performance Evaluation Review, 44:1, (249-260), Online publication date: 30-Jun-2016.
  834. ACM
    Jonckheere M and Prabhu B (2016). Asymptotics of Insensitive Load Balancing and Blocking Phases, ACM SIGMETRICS Performance Evaluation Review, 44:1, (311-322), Online publication date: 30-Jun-2016.
  835. Strouse D and Schwab D The deterministic information bottleneck Proceedings of the Thirty-Second Conference on Uncertainty in Artificial Intelligence, (696-705)
  836. ACM
    Assadi S, Khanna S and Li Y Tight bounds for single-pass streaming complexity of the set cover problem Proceedings of the forty-eighth annual ACM symposium on Theory of Computing, (698-711)
  837. ACM
    Wang W, Ying L and Zhang J The Value of Privacy Proceedings of the 2016 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Science, (249-260)
  838. ACM
    Jonckheere M and Prabhu B Asymptotics of Insensitive Load Balancing and Blocking Phases Proceedings of the 2016 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Science, (311-322)
  839. Memarzadeh M and Pozzi M (2016). Integrated Inspection Scheduling and Maintenance Planning for Infrastructure Systems, Computer-Aided Civil and Infrastructure Engineering, 31:6, (403-415), Online publication date: 1-Jun-2016.
  840. Ghosh A and Sarkar S (2016). Quality-sensitive price competition in secondary market spectrum oligopoly, IEEE/ACM Transactions on Networking, 24:3, (1894-1907), Online publication date: 1-Jun-2016.
  841. Nasser R and Telatar E (2016). Polar Codes for Arbitrary DMCs and Arbitrary MACs, IEEE Transactions on Information Theory, 62:6, (2917-2936), Online publication date: 1-Jun-2016.
  842. Moshksar K and Khandani A (2016). Arbitrarily Tight Bounds on Differential Entropy of Gaussian Mixtures, IEEE Transactions on Information Theory, 62:6, (3340-3354), Online publication date: 1-Jun-2016.
  843. Dytso A, Tuninetti D and Devroye N (2016). Interference as Noise: Friend or Foe?, IEEE Transactions on Information Theory, 62:6, (3561-3596), Online publication date: 1-Jun-2016.
  844. Soni A, Jain S, Haupt J and Gonella S (2016). Noisy Matrix Completion Under Sparse Factor Models, IEEE Transactions on Information Theory, 62:6, (3636-3661), Online publication date: 1-Jun-2016.
  845. Tan L, Li Y, Khisti A and Soljanin E (2016). Successive Segmentation-Based Coding for Broadcasting Over Erasure Channels, IEEE Transactions on Information Theory, 62:6, (3026-3038), Online publication date: 1-Jun-2016.
  846. Ivanov M, Häger C, Brännström F, Graell i Amat A, Alvarado A and Agrell E (2016). On the Information Loss of the Max-Log Approximation in BICM Systems, IEEE Transactions on Information Theory, 62:6, (3011-3025), Online publication date: 1-Jun-2016.
  847. Xu P, Ding Z, Dai X and Karagiannidis G (2016). Simultaneously Generating Secret and Private Keys in a Cooperative Pairwise-Independent Network, IEEE Transactions on Information Forensics and Security, 11:6, (1139-1150), Online publication date: 1-Jun-2016.
  848. Diyanat A, Khonsari A and Shariatpanahi S (2016). A Dummy-Based Approach for Preserving Source Rate Privacy, IEEE Transactions on Information Forensics and Security, 11:6, (1321-1332), Online publication date: 1-Jun-2016.
  849. Taghia J and Martin R (2016). A frequency-domain adaptive line enhancer with step-size control based on mutual information for harmonic noise reduction, IEEE/ACM Transactions on Audio, Speech and Language Processing, 24:6, (1140-1154), Online publication date: 1-Jun-2016.
  850. (2016). Models, statistics, and rates of binary correlated sources, Physical Communication, 19:C, (70-80), Online publication date: 1-Jun-2016.
  851. Audhkhasi K, Osoba O and Kosko B (2016). Noise-enhanced convolutional neural networks, Neural Networks, 78:C, (15-23), Online publication date: 1-Jun-2016.
  852. Bueno M, Hommersom A, Lucas P, Lappenschaar M and Janzing J (2016). Understanding disease processes by partitioned dynamic Bayesian networks, Journal of Biomedical Informatics, 61:C, (283-297), Online publication date: 1-Jun-2016.
  853. ACM
    Ahmadinejad S, Fong P and Safavi-Naini R Privacy and Utility of Inference Control Mechanisms for Social Computing Applications Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, (829-840)
  854. ACM
    de Niz D, Nam M and Delange J Behavioral complexity quantification (Becom-Q) Proceedings of the 7th International Workshop on Emerging Trends in Software Metrics, (29-35)
  855. Gao Y, Toni F, Wang H and Xu F Argumentation-Based Multi-Agent Decision Making with Privacy Preserved Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, (1153-1161)
  856. Khurana D, Maji H and Sahai A Secure Computation from Elastic Noisy Channels Proceedings, Part II, of the 35th Annual International Conference on Advances in Cryptology --- EUROCRYPT 2016 - Volume 9666, (184-212)
  857. ACM
    Sarker H, Tyburski M, Rahman M, Hovsepian K, Sharmin M, Epstein D, Preston K, Furr-Holden C, Milam A, Nahum-Shani I, al'Absi M and Kumar S Finding Significant Stress Episodes in a Discontinuous Time Series of Rapidly Varying Mobile Sensor Data Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, (4489-4501)
  858. Li Q, Yu M, Pandharipande A, Ge X, Zhang J and Zhang J (2016). Performance of Virtual Full-Duplex Relaying on Cooperative Multi-path Relay Channels, IEEE Transactions on Wireless Communications, 15:5, (3628-3642), Online publication date: 1-May-2016.
  859. Jamali V, Michalopoulos D, Uysal M and Schober R (2016). Link Allocation for Multiuser Systems With Hybrid RF/FSO Backhaul: Delay-Limited and Delay-Tolerant Designs, IEEE Transactions on Wireless Communications, 15:5, (3281-3295), Online publication date: 1-May-2016.
  860. Choi J (2016). On the Power Allocation for MIMO-NOMA Systems With Layered Transmissions, IEEE Transactions on Wireless Communications, 15:5, (3226-3237), Online publication date: 1-May-2016.
  861. Li Q, Yu M, Pandharipande A and Ge X (2016). Outage Analysis of Co-Operative Two-Path Relay Channels, IEEE Transactions on Wireless Communications, 15:5, (3157-3169), Online publication date: 1-May-2016.
  862. Chaaban A, Rezki Z and Alouini M (2016). On the Capacity of the Intensity-Modulation Direct-Detection Optical Broadcast Channel, IEEE Transactions on Wireless Communications, 15:5, (3114-3130), Online publication date: 1-May-2016.
  863. Nadendla V and Varshney P (2016). Design of Binary Quantizers for Distributed Detection Under Secrecy Constraints, IEEE Transactions on Signal Processing, 64:10, (2636-2648), Online publication date: 1-May-2016.
  864. Jiang S (2016). Group Key Agreement with Local Connectivity, IEEE Transactions on Dependable and Secure Computing, 13:3, (326-339), Online publication date: 1-May-2016.
  865. Gurakan B and Ulukus S (2016). Cooperative Diamond Channel With Energy Harvesting Nodes, IEEE Journal on Selected Areas in Communications, 34:5, (1604-1617), Online publication date: 1-May-2016.
  866. Mahzoon M, Li C, Li X and Grover P (2016). Energy-Constrained Distributed Learning and Classification by Exploiting Relative Relevance of Sensors’ Data, IEEE Journal on Selected Areas in Communications, 34:5, (1417-1430), Online publication date: 1-May-2016.
  867. ACM
    Bartolini D, Miedl P and Thiele L On the capacity of thermal covert channels in multicores Proceedings of the Eleventh European Conference on Computer Systems, (1-16)
  868. Zuo Z, Wang X, Eichmann D and Zhao K Research Collaborations in Multidisciplinary Institutions Proceedings of the 25th International Conference Companion on World Wide Web, (443-448)
  869. Chaaban A and Sezgin A (2016). Multi-Hop Relaying: An End-to-End Delay Analysis, IEEE Transactions on Wireless Communications, 15:4, (2552-2561), Online publication date: 1-Apr-2016.
  870. Zhang W, Moustakides G and Poor H (2016). Opportunistic Detection Rules: Finite and Asymptotic Analysis, IEEE Transactions on Information Theory, 62:4, (2140-2152), Online publication date: 1-Apr-2016.
  871. Bustin R, Schaefer R, Poor H and Shamai Shitz S (2016). On the SNR-Evolution of the MMSE Function of Codes for the Gaussian Broadcast and Wiretap Channels, IEEE Transactions on Information Theory, 62:4, (2070-2091), Online publication date: 1-Apr-2016.
  872. Song E, Cuff P and Poor H (2016). The Likelihood Encoder for Lossy Compression, IEEE Transactions on Information Theory, 62:4, (1836-1849), Online publication date: 1-Apr-2016.
  873. Thakor S, Grant A and Chan T (2016). Cut-Set Bounds on Network Information Flow, IEEE Transactions on Information Theory, 62:4, (1850-1865), Online publication date: 1-Apr-2016.
  874. Müller M and Pastena M (2016). A Generalization of Majorization that Characterizes Shannon Entropy, IEEE Transactions on Information Theory, 62:4, (1711-1720), Online publication date: 1-Apr-2016.
  875. Simmons D, Coon J and Warsi N (2016). Capacity and Power Scaling Laws for Finite Antenna MIMO Amplify-and-Forward Relay Networks, IEEE Transactions on Information Theory, 62:4, (1993-2008), Online publication date: 1-Apr-2016.
  876. Xie J and Ulukus S (2016). Secure Degrees of Freedom Regions of Multiple Access and Interference Channels: The Polytope Structure, IEEE Transactions on Information Theory, 62:4, (2044-2069), Online publication date: 1-Apr-2016.
  877. Maugey T, Petrazzuoli G, Frossard P, Cagnazzo M and Pesquet-Popescu B (2016). Reference View Selection in DIBR-Based Multiview Coding, IEEE Transactions on Image Processing, 25:4, (1808-1819), Online publication date: 1-Apr-2016.
  878. Aminlou A, Hashemi M, Gabbouj M, Zeng B and Fatemi O (2016). New R-D Optimization Criterion for Fast Mode Decision Algorithms in Video Coding and Transrating, IEEE Transactions on Circuits and Systems for Video Technology, 26:4, (696-710), Online publication date: 1-Apr-2016.
  879. Dai B and Yu W (2016). Energy Efficiency of Downlink Transmission Strategies for Cloud Radio Access Networks, IEEE Journal on Selected Areas in Communications, 34:4, (1037-1050), Online publication date: 1-Apr-2016.
  880. Workman T, Fiszman M, Cairelli M, Nahl D and Rindflesch T (2016). Spark, an application based on Serendipitous Knowledge Discovery, Journal of Biomedical Informatics, 60:C, (23-37), Online publication date: 1-Apr-2016.
  881. Javid M, Blackwell T, Zimmer R and Al-Rifaie M Correlation Between Human Aesthetic Judgement and Spatial Complexity Measure Proceedings of the 5th International Conference on Evolutionary and Biologically Inspired Music, Sound, Art and Design - Volume 9596, (79-91)
  882. ACM
    Teutsch J and Zimand M (2016). A Brief on Short Descriptions, ACM SIGACT News, 47:1, (42-67), Online publication date: 10-Mar-2016.
  883. Thakoor K (2016). Cognitive Mechanisms Underlying the Classification of Reduced Dimensionality, Information Rich Image Representations, IEEE Intelligent Systems, 31:2, (9-20), Online publication date: 1-Mar-2016.
  884. Harmouche J, Delpha C and Diallo D (2016). Incipient fault amplitude estimation using KL divergence with a probabilistic approach, Signal Processing, 120:C, (1-7), Online publication date: 1-Mar-2016.
  885. Gossner O, Hernández P and Peretz R (2016). The complexity of interacting automata, International Journal of Game Theory, 45:1-2, (461-496), Online publication date: 1-Mar-2016.
  886. Saghafian S and Tomlin B (2016). The Newsvendor under Demand Ambiguity, Operations Research, 64:1, (167-185), Online publication date: 1-Feb-2016.
  887. Iyengar A, Siegel P and Wolf J (2016). On the Capacity of Channels With Timing Synchronization Errors, IEEE Transactions on Information Theory, 62:2, (793-810), Online publication date: 1-Feb-2016.
  888. Wang P and Safavi-Naini R (2016). A Model for Adversarial Wiretap Channels, IEEE Transactions on Information Theory, 62:2, (970-983), Online publication date: 1-Feb-2016.
  889. Kopetz T, Permuter H and Shamai S (2016). Multiple Access Channels With Combined Cooperation and Partial Cribbing, IEEE Transactions on Information Theory, 62:2, (825-848), Online publication date: 1-Feb-2016.
  890. Daugman J (2016). Information Theory and the IrisCode, IEEE Transactions on Information Forensics and Security, 11:2, (400-409), Online publication date: 1-Feb-2016.
  891. Naini F, Unnikrishnan J, Thiran P and Vetterli M (2016). Where You Are Is Who You Are: User Identification by Matching Statistics, IEEE Transactions on Information Forensics and Security, 11:2, (358-372), Online publication date: 1-Feb-2016.
  892. Arikan E (2016). On the Origin of Polar Coding, IEEE Journal on Selected Areas in Communications, 34:2, (209-223), Online publication date: 1-Feb-2016.
  893. Lazaro F, Paolini E, Liva G and Bauch G (2016). Distance Spectrum of Fixed-Rate Raptor Codes With Linear Random Precoders, IEEE Journal on Selected Areas in Communications, 34:2, (422-436), Online publication date: 1-Feb-2016.
  894. ACM
    Tyagi H, Venkatakrishnan S, Viswanath P and Watanabe S Information Complexity Density and Simulation of Protocols Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, (381-391)
  895. Lysyak A and Ryabko B (2016). Time series prediction based on data compression methods, Problems of Information Transmission, 52:1, (92-99), Online publication date: 1-Jan-2016.
  896. Gülcü T and Barg A (2016). Interactive function computation via polar coding, Problems of Information Transmission, 52:1, (66-91), Online publication date: 1-Jan-2016.
  897. Warsi N (2016). Simple one-shot bounds for various source coding problems using smooth Rényi quantities, Problems of Information Transmission, 52:1, (39-65), Online publication date: 1-Jan-2016.
  898. Pulliyakode S, Kalyani S and Narendran K (2016). Rate Prediction and Selection in LTE Systems Using Modified Source Encoding Techniques, IEEE Transactions on Wireless Communications, 15:1, (416-429), Online publication date: 1-Jan-2016.
  899. Beirami A, Sardari M and Fekri F (2016). Wireless Network Compression Via Memory-Enabled Overhearing Helpers, IEEE Transactions on Wireless Communications, 15:1, (176-190), Online publication date: 1-Jan-2016.
  900. Sason I (2015). On the Rényi Divergence, Joint Range of Relative Entropies, and a Channel Coding Theorem, IEEE Transactions on Information Theory, 62:1, (23-34), Online publication date: 1-Jan-2016.
  901. Sutter D, Sutter T, Mohajerin Esfahani P and Renner R (2015). Efficient Approximation of Quantum Channel Capacities, IEEE Transactions on Information Theory, 62:1, (578-598), Online publication date: 1-Jan-2016.
  902. Gherekhloo S, Chaaban A, Di C and Sezgin A (2015). (Sub-)Optimality of Treating Interference as Noise in the Cellular Uplink With Weak Interference, IEEE Transactions on Information Theory, 62:1, (322-356), Online publication date: 1-Jan-2016.
  903. Schulte P and Bocherer G (2015). Constant Composition Distribution Matching, IEEE Transactions on Information Theory, 62:1, (430-434), Online publication date: 1-Jan-2016.
  904. Du J, Medard M, Xiao M and Skoglund M (2015). Scalable Capacity Bounding Models for Wireless Networks, IEEE Transactions on Information Theory, 62:1, (208-229), Online publication date: 1-Jan-2016.
  905. Kojima M and Komaki F (2015). Relations Between the Conditional Normalized Maximum Likelihood Distributions and the Latent Information Priors, IEEE Transactions on Information Theory, 62:1, (539-553), Online publication date: 1-Jan-2016.
  906. Ebrahimzadeh Saffar H, Badiei Khuzani M and Mitran P (2015). Time-Asynchronous Gaussian Multiple Access Relay Channel With Correlated Sources, IEEE Transactions on Information Theory, 62:1, (309-321), Online publication date: 1-Jan-2016.
  907. Hou J and Kramer G (2015). Short Message Noisy Network Coding With a Decode–Forward Option, IEEE Transactions on Information Theory, 62:1, (89-107), Online publication date: 1-Jan-2016.
  908. Fan B, Leng S and Yang K (2016). A dynamic bandwidth allocation algorithm in mobile networks with big data of users and networks, IEEE Network: The Magazine of Global Internetworking, 30:1, (6-10), Online publication date: 1-Jan-2016.
  909. Adian M and Aghaeinia H (2016). Low complexity resource allocation in MIMOźOFDMźbased cooperative cognitive radio networks, Transactions on Emerging Telecommunications Technologies, 27:1, (92-100), Online publication date: 1-Jan-2016.
  910. Adian M and Aghaeinia H (2016). A two-level cooperative game-based approach for joint relay selection and distributed resource allocation in MIMO-OFDM-based cooperative cognitive radio networks, Transactions on Emerging Telecommunications Technologies, 27:1, (34-50), Online publication date: 1-Jan-2016.
  911. El-Hajj A and Dawy Z (2016). Joint dynamic switching point configuration and resource allocation in TDD-OFDMA networks, Transactions on Emerging Telecommunications Technologies, 27:1, (17-33), Online publication date: 1-Jan-2016.
  912. Roy A, Chakraborty R and Naskar R Reversible Color Image Watermarking in the YCoCg-R Color Space Proceedings of the 11th International Conference on Information Systems Security - Volume 9478, (480-498)
  913. Choudhury A Asynchronous Error-Decodable Secret-Sharing and Its Application Proceedings of the 11th International Conference on Information Systems Security - Volume 9478, (364-377)
  914. Javaheri Javid M, Zimmer R, Ursyn A and Al-Rifaie M A Quantitative Approach for Detecting Symmetries and Complexity in 2D Plane Proceedings of the Fourth International Conference on Theory and Practice of Natural Computing - Volume 9477, (150-160)
  915. ACM
    Krejtz K, Duchowski A, Szmidt T, Krejtz I, González Perilli F, Pires A, Vilaro A and Villalobos N (2015). Gaze Transition Entropy, ACM Transactions on Applied Perception, 13:1, (1-20), Online publication date: 10-Dec-2015.
  916. Bergel I, Perets Y and Shamai S (2015). Uplink Downlink Rate Balancing in Cooperating Cellular Networks, IEEE Transactions on Signal Processing, 63:23, (6272-6284), Online publication date: 1-Dec-2015.
  917. Tadrous J, Eryilmaz A and Gamal H (2015). Proactive content download and user demand shaping for data networks, IEEE/ACM Transactions on Networking, 23:6, (1917-1930), Online publication date: 1-Dec-2015.
  918. Toscani G (2015). A Strengthened Entropy Power Inequality for Log-Concave Densities, IEEE Transactions on Information Theory, 61:12, (6550-6559), Online publication date: 1-Dec-2015.
  919. Hayashi M and Tan V (2015). Asymmetric Evaluations of Erasure and Undetected Error Probabilities, IEEE Transactions on Information Theory, 61:12, (6560-6577), Online publication date: 1-Dec-2015.
  920. Chaaban A and Sezgin A (2015). Cyclic Communication and the Inseparability of MIMO Multi-Way Relay Channels, IEEE Transactions on Information Theory, 61:12, (6734-6750), Online publication date: 1-Dec-2015.
  921. Natarajan L, Yi Hong and Viterbo E (2015). Lattice Index Coding, IEEE Transactions on Information Theory, 61:12, (6505-6525), Online publication date: 1-Dec-2015.
  922. Reani A and Merhav N (2015). Universal Quantization for Separate Encodings and Joint Decoding of Correlated Sources, IEEE Transactions on Information Theory, 61:12, (6465-6474), Online publication date: 1-Dec-2015.
  923. Ruchen Duan , Yingbin Liang , Khisti A and Shitz S (2015). State-Dependent Parallel Gaussian Networks With a Common State-Cognitive Helper, IEEE Transactions on Information Theory, 61:12, (6680-6699), Online publication date: 1-Dec-2015.
  924. Kittichokechai K, Oechtering T, Skoglund M and Yeow-Khiang Chia (2015). Secure Source Coding With Action-Dependent Side Information, IEEE Transactions on Information Theory, 61:12, (6444-6464), Online publication date: 1-Dec-2015.
  925. Quinn C, Kiyavash N and Coleman T (2015). Directed Information Graphs, IEEE Transactions on Information Theory, 61:12, (6887-6909), Online publication date: 1-Dec-2015.
  926. Bachega L, Hariharan S, Bouman C and Shroff N (2015). Distributed Signal Decorrelation and Detection in Multi View Camera Networks Using the Vector Sparse Matrix Transform, IEEE Transactions on Image Processing, 24:12, (6011-6024), Online publication date: 1-Dec-2015.
  927. Xiangyuan Lan , Ma A, Yuen P and Chellappa R (2015). Joint Sparse Representation and Robust Feature-Level Fusion for Multi-Cue Visual Tracking, IEEE Transactions on Image Processing, 24:12, (5826-5841), Online publication date: 1-Dec-2015.
  928. Naval S, Laxmi V, Rajarajan M, Gaur M and Conti M (2015). Employing Program Semantics for Malware Detection, IEEE Transactions on Information Forensics and Security, 10:12, (2591-2604), Online publication date: 1-Dec-2015.
  929. Orhan O and Erkip E (2015). Energy Harvesting Two-Hop Communication Networks, IEEE Journal on Selected Areas in Communications, 33:12, (2658-2670), Online publication date: 1-Dec-2015.
  930. Arafa A and Ulukus S (2015). Optimal Policies for Wireless Networks With Energy Harvesting Transmitters and Receivers: Effects of Decoding Costs, IEEE Journal on Selected Areas in Communications, 33:12, (2611-2625), Online publication date: 1-Dec-2015.
  931. Kunihiro N An Improved Attack for Recovering Noisy RSA Secret Keys and Its Countermeasure Proceedings of the 9th International Conference on Provable Security - Volume 9451, (61-81)
  932. Mao B, Hu W, Althoff A, Matai J, Oberg J, Mu D, Sherwood T and Kastner R Quantifying Timing-Based Information Flow in Cryptographic Hardware Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, (552-559)
  933. Sheikholeslami A, Goeckel D and Pishro-Nik H (2015). Jamming Based on an Ephemeral Key to Obtain Everlasting Security in Wireless Environments, IEEE Transactions on Wireless Communications, 14:11, (6072-6081), Online publication date: 1-Nov-2015.
  934. Phan-Minh Nguyen and Armand M (2015). On Capacity Formulation With Stationary Inputs and Application to a Bit-Patterned Media Recording Channel Model, IEEE Transactions on Information Theory, 61:11, (5906-5930), Online publication date: 1-Nov-2015.
  935. Fan Cheng and Yanlin Geng (2015). Higher Order Derivatives in Costa’s Entropy Power Inequality, IEEE Transactions on Information Theory, 61:11, (5892-5905), Online publication date: 1-Nov-2015.
  936. Yanjun Han , Jiantao Jiao and Weissman T (2015). Minimax Estimation of Discrete Distributions Under $\ell _{1}$ Loss, IEEE Transactions on Information Theory, 61:11, (6343-6354), Online publication date: 1-Nov-2015.
  937. Aghajan A and Khosravifard M (2015). Optimal Codes With Limited Kraft Sum, IEEE Transactions on Information Theory, 61:11, (6385-6394), Online publication date: 1-Nov-2015.
  938. Yemini M, Somekh-Baruch A and Leshem A (2015). Asynchronous Transmission Over Single-User State-Dependent Channels, IEEE Transactions on Information Theory, 61:11, (5854-5867), Online publication date: 1-Nov-2015.
  939. Host-Madsen A (2015). Deterministic-Coding Capacity of Networks in the Low-Power Regime, IEEE Transactions on Information Theory, 61:11, (6091-6106), Online publication date: 1-Nov-2015.
  940. Kaspi Y and Merhav N (2015). Zero-Delay and Causal Secure Source Coding, IEEE Transactions on Information Theory, 61:11, (6238-6250), Online publication date: 1-Nov-2015.
  941. Meyer F, Wymeersch H, Frohle M and Hlawatsch F (2015). Distributed Estimation With Information-Seeking Control in Agent Networks, IEEE Journal on Selected Areas in Communications, 33:11, (2439-2456), Online publication date: 1-Nov-2015.
  942. ACM
    Zafarani R, Tang L and Liu H (2015). User Identification Across Social Media, ACM Transactions on Knowledge Discovery from Data, 10:2, (1-30), Online publication date: 26-Oct-2015.
  943. ACM
    Pradhan N, Deolalikar V and Li K Atypical Queries in eCommerce Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, (1767-1770)
  944. ACM
    Sellam T, Müller E and Kersten M Semi-Automated Exploration of Data Warehouses Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, (1321-1330)
  945. ACM
    Zafarani R and Liu H 10 Bits of Surprise Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, (423-431)
  946. ACM
    Theodorakopoulos G The Same-Origin Attack against Location Privacy Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, (49-53)
  947. Jianhua Mo and Heath R (2015). Capacity Analysis of One-Bit Quantized MIMO Systems With Transmitter Channel State Information, IEEE Transactions on Signal Processing, 63:20, (5498-5512), Online publication date: 1-Oct-2015.
  948. Huleihel W, Merhav N and Shamai S (2015). On Compressive Sensing in Coding Problems: A Rigorous Approach, IEEE Transactions on Information Theory, 61:10, (5727-5744), Online publication date: 1-Oct-2015.
  949. Braun G and Pokutta S (2015). The Matching Problem Has No Fully Polynomial Size Linear Programming Relaxation Schemes, IEEE Transactions on Information Theory, 61:10, (5754-5764), Online publication date: 1-Oct-2015.
  950. Mitran P (2015). On a Markov Lemma and Typical Sequences for Polish Alphabets, IEEE Transactions on Information Theory, 61:10, (5342-5356), Online publication date: 1-Oct-2015.
  951. Benammar M and Piantanida P (2015). Secrecy Capacity Region of Some Classes of Wiretap Broadcast Channels, IEEE Transactions on Information Theory, 61:10, (5564-5582), Online publication date: 1-Oct-2015.
  952. Asadi B, Ong L and Johnson S (2015). Optimal Coding Schemes for the Three-Receiver AWGN Broadcast Channel With Receiver Message Side Information, IEEE Transactions on Information Theory, 61:10, (5490-5503), Online publication date: 1-Oct-2015.
  953. Shkel Y, Tan V and Draper S (2015). Unequal Message Protection: Asymptotic and Non-Asymptotic Tradeoffs, IEEE Transactions on Information Theory, 61:10, (5396-5416), Online publication date: 1-Oct-2015.
  954. Ihn-Jung Baik and Sae-Young Chung (2015). Causal Relay Networks, IEEE Transactions on Information Theory, 61:10, (5432-5440), Online publication date: 1-Oct-2015.
  955. Carmon Y and Shamai S (2015). Lower Bounds and Approximations for the Information Rate of the ISI Channel, IEEE Transactions on Information Theory, 61:10, (5417-5431), Online publication date: 1-Oct-2015.
  956. Ozel O, Ekrem E and Ulukus S (2015). Gaussian Wiretap Channel With Amplitude and Variance Constraints, IEEE Transactions on Information Theory, 61:10, (5553-5563), Online publication date: 1-Oct-2015.
  957. Ignatenko T and Willems F (2015). Fundamental Limits for Privacy-Preserving Biometric Identification Systems That Support Authentication, IEEE Transactions on Information Theory, 61:10, (5583-5594), Online publication date: 1-Oct-2015.
  958. Amuru S and Buehrer R (2015). Optimal Jamming Against Digital Modulation, IEEE Transactions on Information Forensics and Security, 10:10, (2212-2224), Online publication date: 1-Oct-2015.
  959. Shanshan Zhang , Bauckhage C, Klein D and Cremers A (2015). Exploring Human Vision Driven Features for Pedestrian Detection, IEEE Transactions on Circuits and Systems for Video Technology, 25:10, (1709-1720), Online publication date: 1-Oct-2015.
  960. ACM
    Tune P and Roughan M (2015). Spatiotemporal Traffic Matrix Synthesis, ACM SIGCOMM Computer Communication Review, 45:4, (579-592), Online publication date: 22-Sep-2015.
  961. Schreiter J, Nguyen-Tuong D, Eberts M, Bischoff B, Markert H and Toussaint M Safe exploration for active learning with Gaussian processes Proceedings of the 2015th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part III, (133-149)
  962. Czarnecki W, Jozefowicz R and Tabor J Maximum Entropy Linear Manifold for learning discriminative low-dimensional representation Proceedings of the 2015th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part I, (52-57)
  963. Sechidis K and Brown G Markov blanket discovery in positive-unlabelled and semi-supervised data Proceedings of the 2015th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part I, (351-366)
  964. Bai Y, Snyder J, Peshkin M and MacIver M (2015). Finding and identifying simple objects underwater with active electrosense, International Journal of Robotics Research, 34:10, (1255-1277), Online publication date: 1-Sep-2015.
  965. Pad P and Unser M (2015). Optimality of Operator-Like Wavelets for Representing Sparse AR(1) Processes, IEEE Transactions on Signal Processing, 63:18, (4827-4837), Online publication date: 1-Sep-2015.
  966. Yamada M, Sigal L, Raptis M, Toyoda M, Chang Y and Sugiyama M (2015). Cross-Domain Matching with Squared-Loss Mutual Information, IEEE Transactions on Pattern Analysis and Machine Intelligence, 37:9, (1764-1776), Online publication date: 1-Sep-2015.
  967. Dongliang He , Chong Luo , Cuiling Lan , Feng Wu and Wenjun Zeng (2015). Structure-Preserving Hybrid Digital-Analog Video Delivery in Wireless Networks, IEEE Transactions on Multimedia, 17:9, (1658-1670), Online publication date: 1-Sep-2015.
  968. Kuzuoka S and Watanabe S (2015). A Dichotomy of Functions in Distributed Coding: An Information Spectral Approach, IEEE Transactions on Information Theory, 61:9, (5028-5041), Online publication date: 1-Sep-2015.
  969. Prasad S (2015). Bayesian Error-Based Sequences of Statistical Information Bounds, IEEE Transactions on Information Theory, 61:9, (5052-5062), Online publication date: 1-Sep-2015.
  970. Wei Yang , Caire G, Durisi G and Polyanskiy Y (2015). Optimum Power Control at Finite Blocklength, IEEE Transactions on Information Theory, 61:9, (4598-4615), Online publication date: 1-Sep-2015.
  971. Chien-Yi Wang , Sang-Woon Jeon and Gastpar M (2015). Interactive Computation of Type-Threshold Functions in Collocated Gaussian Networks, IEEE Transactions on Information Theory, 61:9, (4765-4775), Online publication date: 1-Sep-2015.
  972. Saldi N, Linder T and Yuksel S (2015). Output Constrained Lossy Source Coding With Limited Common Randomness, IEEE Transactions on Information Theory, 61:9, (4984-4998), Online publication date: 1-Sep-2015.
  973. En-Hui Yang and Jin Meng (2015). New Nonasymptotic Channel Coding Theorems for Structured Codes, IEEE Transactions on Information Theory, 61:9, (4534-4553), Online publication date: 1-Sep-2015.
  974. Kumar M and Sundaresan R (2015). Minimization Problems Based on Relative $\alpha $ -Entropy I: Forward Projection, IEEE Transactions on Information Theory, 61:9, (5063-5080), Online publication date: 1-Sep-2015.
  975. Laarhoven T (2015). Asymptotics of Fingerprinting and Group Testing: Tight Bounds From Channel Capacities, IEEE Transactions on Information Forensics and Security, 10:9, (1967-1980), Online publication date: 1-Sep-2015.
  976. Honghai Yu and Moulin P (2015). SNR Maximization Hashing, IEEE Transactions on Information Forensics and Security, 10:9, (1927-1938), Online publication date: 1-Sep-2015.
  977. Misra S, Pamnany K and Aluru S (2015). Parallel Mutual Information Based Construction of Genome-Scale Networks on the Intel®Xeon Phi™ Coprocessor, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 12:5, (1008-1020), Online publication date: 1-Sep-2015.
  978. Mostafa A and Lampe L (2015). Physical-Layer Security for MISO Visible Light Communication Channels, IEEE Journal on Selected Areas in Communications, 33:9, (1806-1818), Online publication date: 1-Sep-2015.
  979. Zoppis I, Dondi R, Borsani M, Gianazza E, Chinello C, Magni F and Mauri G (2015). Robust Conclusions in Mass Spectrometry Analysis, Procedia Computer Science, 51:C, (683-692), Online publication date: 1-Sep-2015.
  980. ACM
    Kayes I, Kourtellis N, Quercia D, Iamnitchi A and Bonchi F Cultures in Community Question Answering Proceedings of the 26th ACM Conference on Hypertext & Social Media, (175-184)
  981. Nguyen B, Ngo H, Kim J and Kim J Publishing Graph Data with Subgraph Differential Privacy Revised Selected Papers of the 16th International Workshop on Information Security Applications - Volume 9503, (134-145)
  982. ACM
    Tune P and Roughan M Spatiotemporal Traffic Matrix Synthesis Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, (579-592)
  983. ACM
    Yi J, Zhang L, Yang T, Liu W and Wang J An Efficient Semi-Supervised Clustering Algorithm with Sequential Constraints Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (1405-1414)
  984. ACM
    Shah N, Koutra D, Zou T, Gallagher B and Faloutsos C TimeCrunch Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (1055-1064)
  985. Xuemin Hong , Chao Zheng , Jing Wang , Jianghong Shi and Cheng-Xiang Wang (2015). Optimal Resource Allocation and EE-SE Trade-Off in Hybrid Cognitive Gaussian Relay Channels, IEEE Transactions on Wireless Communications, 14:8, (4170-4181), Online publication date: 1-Aug-2015.
  986. Wei Han , An Liu and Lau V (2015). Degrees of Freedom in Cached MIMO Relay Networks, IEEE Transactions on Signal Processing, 63:15, (3986-3997), Online publication date: 1-Aug-2015.
  987. Akyol E, Rose K and Basar T (2015). Optimal Zero-Delay Jamming Over an Additive Noise Channel, IEEE Transactions on Information Theory, 61:8, (4331-4344), Online publication date: 1-Aug-2015.
  988. Jie Xing , Berger T, Sungkar M and Levy W (2015). Energy Efficient Neurons With Generalized Inverse Gaussian Conditional and Marginal Hitting Times, IEEE Transactions on Information Theory, 61:8, (4390-4398), Online publication date: 1-Aug-2015.
  989. Jinyuan Chen , Elia P and Jafar S (2015). On the Two-User MISO Broadcast Channel With Alternating CSIT: A Topological Perspective, IEEE Transactions on Information Theory, 61:8, (4345-4366), Online publication date: 1-Aug-2015.
  990. Yi Wang , Lipeng Wang , Yiu-Ming Cheung and Yuen P (2015). Learning Compact Binary Codes for Hash-Based Fingerprint Indexing, IEEE Transactions on Information Forensics and Security, 10:8, (1603-1616), Online publication date: 1-Aug-2015.
  991. ACM
    Solomon J, de Goes F, Peyré G, Cuturi M, Butscher A, Nguyen A, Du T and Guibas L (2015). Convolutional wasserstein distances, ACM Transactions on Graphics, 34:4, (1-11), Online publication date: 27-Jul-2015.
  992. de França F and Coelho A (2015). A biclustering approach for classification with mislabeled data, Expert Systems with Applications: An International Journal, 42:12, (5065-5075), Online publication date: 15-Jul-2015.
  993. Feinerman O and Korman A Clock Synchronization and Estimation in Highly Dynamic Networks Post-Proceedings of the 22nd International Colloquium on Structural Information and Communication Complexity - Volume 9439, (16-30)
  994. ACM
    Case A and Lutz J (2015). Mutual Dimension, ACM Transactions on Computation Theory, 7:3, (1-26), Online publication date: 9-Jul-2015.
  995. McIver A, Morgan C and Rabehaja T Abstract Hidden Markov Models Proceedings of the 2015 30th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), (597-608)
  996. Smith G Recent Developments in Quantitative Information Flow (Invited Tutorial) Proceedings of the 2015 30th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), (23-31)
  997. Chen W, Cao Y, Wang H and Feng Y (2015). Minimum guesswork discrimination between quantum states, Quantum Information & Computation, 15:9-10, (737-758), Online publication date: 1-Jul-2015.
  998. Orhan O, Gunduz D and Erkip E (2015). Source-Channel Coding Under Energy, Delay, and Buffer Constraints, IEEE Transactions on Wireless Communications, 14:7, (3836-3849), Online publication date: 1-Jul-2015.
  999. Aref V, Macris N and Vuffray M (2015). Approaching the Rate-Distortion Limit With Spatial Coupling, Belief Propagation, and Decimation, IEEE Transactions on Information Theory, 61:7, (3954-3979), Online publication date: 1-Jul-2015.
  1000. Sy-Quoc Le , Tandon R, Motani M and Poor H (2015). Approximate Capacity Region for the Symmetric Gaussian Interference Channel With Noisy Feedback, IEEE Transactions on Information Theory, 61:7, (3737-3762), Online publication date: 1-Jul-2015.
  1001. Fong S and Yeung R (2015). Cut-Set Bounds for Networks With Zero-Delay Nodes, IEEE Transactions on Information Theory, 61:7, (3837-3850), Online publication date: 1-Jul-2015.
  1002. Naghshvar M, Javidi T and Chaudhuri K (2015). Bayesian Active Learning With Non-Persistent Noise, IEEE Transactions on Information Theory, 61:7, (4080-4098), Online publication date: 1-Jul-2015.
  1003. Kurihara J, Matsumoto R and Uyematsu T (2015). Relative Generalized Rank Weight of Linear Codes and Its Applications to Network Coding, IEEE Transactions on Information Theory, 61:7, (3912-3936), Online publication date: 1-Jul-2015.
  1004. Zibaeenejad A (2015). Key Generation Over Wiretap Models With Non-Causal Side Information, IEEE Transactions on Information Forensics and Security, 10:7, (1456-1471), Online publication date: 1-Jul-2015.
  1005. Manohar R (2015). Comparing Stochastic and Deterministic Computing, IEEE Computer Architecture Letters, 14:2, (119-122), Online publication date: 1-Jul-2015.
  1006. Depatla S, Muralidharan A and Mostofi Y (2015). Occupancy Estimation Using Only WiFi Power Measurements, IEEE Journal on Selected Areas in Communications, 33:7, (1381-1393), Online publication date: 1-Jul-2015.
  1007. ACM
    Su Y, Wang Y and Agrawal G In-Situ Bitmaps Generation and Efficient Data Analysis based on Bitmaps Proceedings of the 24th International Symposium on High-Performance Parallel and Distributed Computing, (61-72)
  1008. ACM
    Bresler G Efficiently Learning Ising Models on Arbitrary Graphs Proceedings of the forty-seventh annual ACM symposium on Theory of Computing, (771-782)
  1009. Silvestre C, Cardoso M and Figueiredo M (2015). Feature selection for clustering categorical data with an embedded modelling approach, Expert Systems: The Journal of Knowledge Engineering, 32:3, (444-453), Online publication date: 1-Jun-2015.
  1010. Junbiao Pang , Fei Jia , Chunjie Zhang , Weigang Zhang , Qingming Huang and Baocai Yin (2015). Unsupervised Web Topic Detection Using A Ranked Clustering-Like Pattern Across Similarity Cascades, IEEE Transactions on Multimedia, 17:6, (843-853), Online publication date: 1-Jun-2015.
  1011. Yassaee M, Gohari A and Aref M (2015). Channel Simulation via Interactive Communications, IEEE Transactions on Information Theory, 61:6, (2964-2982), Online publication date: 1-Jun-2015.
  1012. Ray A, Sanghavi S and Shakkottai S (2015). Improved Greedy Algorithms for Learning Graphical Models, IEEE Transactions on Information Theory, 61:6, (3457-3468), Online publication date: 1-Jun-2015.
  1013. Salimi A, Tie Liu and Shuguang Cui (2015). Generalized Cut-Set Bounds for Broadcast Networks, IEEE Transactions on Information Theory, 61:6, (2983-2996), Online publication date: 1-Jun-2015.
  1014. Kheradmand S, Khosravifard M and Aaron Gulliver T (2015). The Redundancy of an Optimal Binary Fix-Free Code Is Not Greater Than 1 bit, IEEE Transactions on Information Theory, 61:6, (3549-3558), Online publication date: 1-Jun-2015.
  1015. Kuzuoka S and Watanabe S (2015). An Information-Spectrum Approach to Weak Variable-Length Source Coding With Side-Information, IEEE Transactions on Information Theory, 61:6, (3559-3573), Online publication date: 1-Jun-2015.
  1016. Naghibi F, Salimi S and Skoglund M (2015). The CEO Problem With Secrecy Constraints, IEEE Transactions on Information Forensics and Security, 10:6, (1234-1249), Online publication date: 1-Jun-2015.
  1017. Skoric B (2015). Tally-Based Simple Decoders for Traitor Tracing and Group Testing, IEEE Transactions on Information Forensics and Security, 10:6, (1221-1233), Online publication date: 1-Jun-2015.
  1018. Sonee A and Hodtani G (2015). On the Secrecy Rate Region of Multiple-Access Wiretap Channel With Noncausal Side Information, IEEE Transactions on Information Forensics and Security, 10:6, (1151-1166), Online publication date: 1-Jun-2015.
  1019. Fangming Ye , Zhaobo Zhang , Chakrabarty K and Xinli Gu (2015). Information-Theoretic Syndrome Evaluation, Statistical Root-Cause Analysis, and Correlation-Based Feature Selection for Guiding Board-Level Fault Diagnosis, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 34:6, (1014-1026), Online publication date: 1-Jun-2015.
  1020. Pohl D, Bouchachia A and Hellwagner H (2015). Social media for crisis management, Multimedia Tools and Applications, 74:11, (3901-3932), Online publication date: 1-Jun-2015.
  1021. Koutra D, Kang U, Vreeken J and Faloutsos C (2015). Summarizing and understanding large graphs, Statistical Analysis and Data Mining, 8:3, (183-202), Online publication date: 1-Jun-2015.
  1022. Zhiyuan Jiang , Molisch A, Caire G and Zhisheng Niu (2015). Achievable Rates of FDD Massive MIMO Systems With Spatial Channel Correlation, IEEE Transactions on Wireless Communications, 14:5, (2868-2882), Online publication date: 1-May-2015.
  1023. Yu Zheng , Xinmu Wang and Bhunia S (2015). SACCI: Scan-Based Characterization Through Clock Phase Sweep for Counterfeit Chip Detection, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 23:5, (831-841), Online publication date: 1-May-2015.
  1024. Tsiligkaridis T, Sadler B and Hero A (2015). On Decentralized Estimation With Active Queries, IEEE Transactions on Signal Processing, 63:10, (2610-2622), Online publication date: 1-May-2015.
  1025. Zahabi S and Khosravifard M (2015). On the Penalty of Optimal Fix-Free Codes, IEEE Transactions on Information Theory, 61:5, (2776-2787), Online publication date: 1-May-2015.
  1026. Yudong Chen (2015). Incoherence-Optimal Matrix Completion, IEEE Transactions on Information Theory, 61:5, (2909-2923), Online publication date: 1-May-2015.
  1027. Effros M, El Rouayheb S and Langberg M (2015). An Equivalence Between Network Coding and Index Coding, IEEE Transactions on Information Theory, 61:5, (2478-2487), Online publication date: 1-May-2015.
  1028. Jianwei Xie and Ulukus S (2015). Secure Degrees of Freedom of $K$ -User Gaussian Interference Channels: A Unified View, IEEE Transactions on Information Theory, 61:5, (2647-2661), Online publication date: 1-May-2015.
  1029. Tan V and Tomamichel M (2015). The Third-Order Term in the Normal Approximation for the AWGN Channel, IEEE Transactions on Information Theory, 61:5, (2430-2438), Online publication date: 1-May-2015.
  1030. Duchi J, Jordan M, Wainwright M and Wibisono A (2015). Optimal Rates for Zero-Order Convex Optimization: The Power of Two Function Evaluations, IEEE Transactions on Information Theory, 61:5, (2788-2806), Online publication date: 1-May-2015.
  1031. Ingber A, Courtade T and Weissman T (2015). Compression for Quadratic Similarity Queries, IEEE Transactions on Information Theory, 61:5, (2729-2747), Online publication date: 1-May-2015.
  1032. Li G, Bennis M and Yu G (2015). Full duplex communications [Guest Editorial], IEEE Communications Magazine, 53:5, (90-90), Online publication date: 1-May-2015.
  1033. ACM
    Pavlovic D Towards a science of trust Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, (1-9)
  1034. ACM
    Hiller M, Yu M and Pehl M Systematic Low Leakage Coding for Physical Unclonable Functions Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, (155-166)
  1035. ACM
    Ma C and Yau D On Information-theoretic Measures for Quantifying Privacy Protection of Time-series Data Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, (427-438)
  1036. Aghajan A, Zahabi S, Khosravifard M and Gulliver T (2015). On the source-channel separation theorem for infinite source alphabets, Problems of Information Transmission, 51:2, (200-204), Online publication date: 1-Apr-2015.
  1037. Iftikhar S, Kamran M and Anwar Z (2015). RRW—A Robust and Reversible Watermarking Technique for Relational Data, IEEE Transactions on Knowledge and Data Engineering, 27:4, (1132-1145), Online publication date: 1-Apr-2015.
  1038. Nokleby M, Rodrigues M and Calderbank R (2015). Discrimination on the Grassmann Manifold: Fundamental Limits of Subspace Classifiers, IEEE Transactions on Information Theory, 61:4, (2133-2147), Online publication date: 1-Apr-2015.
  1039. Weinberger N and Merhav N (2015). Optimum Tradeoffs Between the Error Exponent and the Excess-Rate Exponent of Variable-Rate Slepian–Wolf Coding, IEEE Transactions on Information Theory, 61:4, (2165-2190), Online publication date: 1-Apr-2015.
  1040. Bardhan B, Garcia-Patron R, Wilde M and Winter A (2015). Strong Converse for the Classical Capacity of Optical Quantum Communication Channels, IEEE Transactions on Information Theory, 61:4, (1842-1850), Online publication date: 1-Apr-2015.
  1041. Carmon Y, Shamai S and Weissman T (2015). Comparison of the Achievable Rates in OFDM and Single Carrier Modulation with I.I.D. Inputs, IEEE Transactions on Information Theory, 61:4, (1795-1818), Online publication date: 1-Apr-2015.
  1042. Naghshvar M, Javidi T and Wigger M (2015). Extrinsic Jensen–Shannon Divergence: Applications to Variable-Length Coding, IEEE Transactions on Information Theory, 61:4, (2148-2164), Online publication date: 1-Apr-2015.
  1043. Jalali S and Effros M (2015). Separation of Source-Network Coding and Channel Coding in Wireline Networks, IEEE Transactions on Information Theory, 61:4, (1524-1538), Online publication date: 1-Apr-2015.
  1044. Ji Ni and Rockett P (2015). Tikhonov Regularization as a Complexity Measure in Multiobjective Genetic Programming, IEEE Transactions on Evolutionary Computation, 19:2, (157-166), Online publication date: 1-Apr-2015.
  1045. Kongfeng Zhu , Chengqing Li , Asari V and Saupe D (2015). No-Reference Video Quality Assessment Based on Artifact Measurement and Statistical Analysis, IEEE Transactions on Circuits and Systems for Video Technology, 25:4, (533-546), Online publication date: 1-Apr-2015.
  1046. Yanjiao Chen , Kaishun Wu and Qian Zhang (2015). From QoS to QoE: A Tutorial on Video Quality Assessment, IEEE Communications Surveys & Tutorials, 17:2, (1126-1165), Online publication date: 1-Apr-2015.
  1047. Simpson S (2015). Symbolic Dynamics, Theory of Computing Systems, 56:3, (527-543), Online publication date: 1-Apr-2015.
  1048. Atashpendar A, Roscoe A and Ryan P Information Leakage Due to Revealing Randomly Selected Bits Revised Selected Papers of the 23rd International Workshop on Security Protocols XXIII - Volume 9379, (325-341)
  1049. GhasemiGol M and Ghaemi-Bafghi A (2015). E-correlator, Security and Communication Networks, 8:5, (822-836), Online publication date: 25-Mar-2015.
  1050. ACM
    Waters A, Tinapple D and Baraniuk R BayesRank Proceedings of the Second (2015) ACM Conference on Learning @ Scale, (177-183)
  1051. Wei L, Pados D, Batalama S, Hu R and Medley M (2015). Optimal multiuser spread-spectrum data hiding in digital images, Security and Communication Networks, 8:4, (540-549), Online publication date: 10-Mar-2015.
  1052. Rui Yin , Guanding Yu , Huazi Zhang , Zhaoyang Zhang and Li G (2015). Pricing-Based Interference Coordination for D2D Communications in Cellular Networks, IEEE Transactions on Wireless Communications, 14:3, (1519-1532), Online publication date: 1-Mar-2015.
  1053. Junan Zhu , Baron D and Duarte M (2015). Recovery From Linear Measurements With Complexity-Matching Universal Signal Estimation, IEEE Transactions on Signal Processing, 63:6, (1512-1527), Online publication date: 1-Mar-2015.
  1054. Jiangfan Zhang , Blum R, Xuanxuan Lu and Conus D (2015). Asymptotically Optimum Distributed Estimation in the Presence of Attacks, IEEE Transactions on Signal Processing, 63:5, (1086-1101), Online publication date: 1-Mar-2015.
  1055. Reeb D and Wolf M (2015). Tight Bound on Relative Entropy by Entropy Difference, IEEE Transactions on Information Theory, 61:3, (1458-1473), Online publication date: 1-Mar-2015.
  1056. Gupte N and Jia Wang (2015). Secure Power Grid Simulation on Cloud, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 34:3, (422-432), Online publication date: 1-Mar-2015.
  1057. Jessa M (2015). On the Quality of Random Sequences Produced with a Combined Random Bit Generator, IEEE Transactions on Computers, 64:3, (791-804), Online publication date: 1-Mar-2015.
  1058. Lin Y and Johnson E (2015). Network testing [Series Editorial], IEEE Communications Magazine, 53:3, (172-172), Online publication date: 1-Mar-2015.
  1059. Tutuncuoglu K, Yener A and Ulukus S (2015). Optimum Policies for an Energy Harvesting Transmitter Under Energy Storage Losses, IEEE Journal on Selected Areas in Communications, 33:3, (467-481), Online publication date: 1-Mar-2015.
  1060. dos Santos T and Zárate L (2015). Categorical data clustering, Expert Systems with Applications: An International Journal, 42:3, (1247-1260), Online publication date: 15-Feb-2015.
  1061. ACM
    Nguyen T, Lauw H and Tsaparas P Review Synthesis for Micro-Review Summarization Proceedings of the Eighth ACM International Conference on Web Search and Data Mining, (169-178)
  1062. Dulek B, Ozdemir O, Varshney P and Wei Su (2015). Distributed Maximum Likelihood Classification of Linear Modulations Over Nonidentical Flat Block-Fading Gaussian Channels, IEEE Transactions on Wireless Communications, 14:2, (724-737), Online publication date: 1-Feb-2015.
  1063. Chepuri S and Leus G (2015). Sparsity-Promoting Sensor Selection for Non-Linear Measurement Models, IEEE Transactions on Signal Processing, 63:3, (684-698), Online publication date: 1-Feb-2015.
  1064. Guoquan Huang , Ke Zhou , Trawny N and Roumeliotis S (2015). A Bank of Maximum A Posteriori (MAP) Estimators for Target Tracking, IEEE Transactions on Robotics, 31:1, (85-103), Online publication date: 1-Feb-2015.
  1065. Sason I (2015). Tight Bounds for Symmetric Divergence Measures and a Refined Bound for Lossless Source Coding, IEEE Transactions on Information Theory, 61:2, (701-707), Online publication date: 1-Feb-2015.
  1066. Somekh-Baruch A (2015). On Achievable Rates and Error Exponents for Channels With Mismatched Decoding, IEEE Transactions on Information Theory, 61:2, (727-740), Online publication date: 1-Feb-2015.
  1067. Chaaban A and Sezgin A (2015). The Approximate Capacity Region of the Gaussian Y-Channel via the Deterministic Approach, IEEE Transactions on Information Theory, 61:2, (939-962), Online publication date: 1-Feb-2015.
  1068. Watanabe S and Oohama Y (2015). The Optimal Use of Rate-Limited Randomness in Broadcast Channels With Confidential Messages, IEEE Transactions on Information Theory, 61:2, (983-995), Online publication date: 1-Feb-2015.
  1069. Zahavi D, Lili Zhang , Maric I, Dabora R, Goldsmith A and Shuguang Cui (2015). Diversity-Multiplexing Tradeoff for the Interference Channel With a Relay, IEEE Transactions on Information Theory, 61:2, (963-982), Online publication date: 1-Feb-2015.
  1070. Shuhang Wu , Shuangqing Wei , Yue Wang , Vaidyanathan R and Jian Yuan (2015). Partition Information and its Transmission Over Boolean Multi-Access Channels, IEEE Transactions on Information Theory, 61:2, (1010-1027), Online publication date: 1-Feb-2015.
  1071. Grover P (2015). Information Friction and Its Implications on Minimum Energy Required for Communication, IEEE Transactions on Information Theory, 61:2, (895-907), Online publication date: 1-Feb-2015.
  1072. ACM
    Braverman M and Mao J Simulating Noisy Channel Interaction Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, (21-30)
  1073. Braun G and Pokutta S The matching polytope does not admit fully-polynomial size relaxation schemes Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete algorithms, (837-846)
  1074. Shamir O (2015). The sample complexity of learning linear predictors with the squared loss, The Journal of Machine Learning Research, 16:1, (3475-3486), Online publication date: 1-Jan-2015.
  1075. Vapnik V and Izmailov R (2015). V-matrix method of solving statistical inference problems, The Journal of Machine Learning Research, 16:1, (1683-1730), Online publication date: 1-Jan-2015.
  1076. Berend D and Kontorovich A (2015). A finite sample analysis of the Naive Bayes classifier, The Journal of Machine Learning Research, 16:1, (1519-1545), Online publication date: 1-Jan-2015.
  1077. Pokarowski P and Mielniczuk J (2015). Combined l1 and greedy l0 penalized least squares for linear model selection, The Journal of Machine Learning Research, 16:1, (961-992), Online publication date: 1-Jan-2015.
  1078. Wang L, Wong K, Wang H and Qin Y (2015). MIMO radar adaptive waveform design for extended target recognition, International Journal of Distributed Sensor Networks, 2015, (84-84), Online publication date: 1-Jan-2015.
  1079. Ryabko B (2015). The Vernam cipher is robust to small deviations from randomness, Problems of Information Transmission, 51:1, (82-86), Online publication date: 1-Jan-2015.
  1080. Ghaffar R, Knopp R and Pin-Han Ho (2015). Low Complexity BICM MIMO OFDM Demodulator, IEEE Transactions on Wireless Communications, 14:1, (558-569), Online publication date: 1-Jan-2015.
  1081. ACM
    Duchi J, Jordan M and Wainwright M (2014). Privacy Aware Learning, Journal of the ACM, 61:6, (1-57), Online publication date: 17-Dec-2014.
  1082. ACM
    Figueiredo F, Almeida J, Gonçalves M and Benevenuto F (2014). On the Dynamics of Social Media Popularity, ACM Transactions on Internet Technology, 14:4, (1-23), Online publication date: 17-Dec-2014.
  1083. ACM
    Zhang T and Lee R New models of cache architectures characterizing information leakage from cache side channels Proceedings of the 30th Annual Computer Security Applications Conference, (96-105)
  1084. Mairal J, Bach F and Ponce J (2014). Sparse Modeling for Image and Vision Processing, Foundations and Trends® in Computer Graphics and Vision, 8:2-3, (85-283), Online publication date: 1-Dec-2014.
  1085. Tourbabin V and Rafaely B (2014). Theoretical framework for the optimization of microphone array configuration for humanoid robot audition, IEEE/ACM Transactions on Audio, Speech and Language Processing, 22:12, (1803-1814), Online publication date: 1-Dec-2014.
  1086. Watanabe Y and Shikata J Timed-Release Secret Sharing Schemes with Information Theoretic Security Cryptography and Information Security in the Balkans, (219-236)
  1087. ACM
    Miettinen P and Vreeken J (2014). MDL4BMF, ACM Transactions on Knowledge Discovery from Data, 8:4, (1-31), Online publication date: 7-Oct-2014.
  1088. Liu X, Xia Y, Wang Y and Ren J (2014). Discovering anomaly on the basis of flow estimation of alert feature distribution, Security and Communication Networks, 7:10, (1570-1581), Online publication date: 1-Oct-2014.
  1089. Kunihiro N and Honda J RSA Meets DPA Proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems --- CHES 2014 - Volume 8731, (261-278)
  1090. ACM
    Shahriar H and Haddad H Content Provider Leakage Vulnerability Detection in Android Applications Proceedings of the 7th International Conference on Security of Information and Networks, (359-366)
  1091. Skudlarek S and Yamamoto H (2014). Unsupervised anomaly detection within non-numerical sequence data by average index difference, with application to masquerade detection, Applied Stochastic Models in Business and Industry, 30:5, (632-656), Online publication date: 1-Sep-2014.
  1092. Levine D and How J Quantifying nonlocal informativeness in high-dimensional, loopy Gaussian graphical models Proceedings of the Thirtieth Conference on Uncertainty in Artificial Intelligence, (487-495)
  1093. Crescenzo G, Cook D, Mcintosh A and Panagos E Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database Proceedings of the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy XXVIII - Volume 8566, (339-355)
  1094. Ignatenko T and Petković M AU2EU Proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Securing the Internet of Things - Volume 8501, (180-189)
  1095. ACM
    Nguyen H, Müller E, Andritsos P and Böhm K Detecting correlated columns in relational databases with mixed data types Proceedings of the 26th International Conference on Scientific and Statistical Database Management, (1-12)
  1096. ACM
    Laarhoven T Capacities and capacity-achieving decoders for various fingerprinting games Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, (123-134)
  1097. ACM
    Sherman M, Clark G, Yang Y, Sugrim S, Modig A, Lindqvist J, Oulasvirta A and Roos T User-generated free-form gestures for authentication Proceedings of the 12th annual international conference on Mobile systems, applications, and services, (176-189)
  1098. ACM
    Dekel O, Ding J, Koren T and Peres Y Bandits with switching costs Proceedings of the forty-sixth annual ACM symposium on Theory of computing, (459-467)
  1099. ACM
    Gupte N and Wang J Securely outsourcing power grid simulation on cloud Proceedings of the 24th edition of the great lakes symposium on VLSI, (225-226)
  1100. Wang J, Guan L, Liu L and Zha D Implementing a Covert Timing Channel Based on Mimic Function Proceedings of the 10th International Conference on Information Security Practice and Experience - Volume 8434, (247-261)
  1101. Livi L, Rizzi A and Sadeghian A (2014). Optimized dissimilarity space embedding for labeled graphs, Information Sciences: an International Journal, 266, (47-64), Online publication date: 1-May-2014.
  1102. Palmieri F, Fiore U and Castiglione A (2014). A distributed approach to network anomaly detection based on independent component analysis, Concurrency and Computation: Practice & Experience, 26:5, (1113-1129), Online publication date: 10-Apr-2014.
  1103. Islam Z, Rahman M and Mehler A Readability Classification of Bangla Texts Proceedings of the 15th International Conference on Computational Linguistics and Intelligent Text Processing - Volume 8404, (507-518)
  1104. Wilde M and Winter A (2014). Strong converse for the classical capacity of the pure-loss bosonic channel, Problems of Information Transmission, 50:2, (117-132), Online publication date: 1-Apr-2014.
  1105. Hiller M and Sigl G Increasing the efficiency of syndrome coding for PUFs with helper data compression Proceedings of the conference on Design, Automation & Test in Europe, (1-6)
  1106. ACM
    Cooper V Student research abstract Proceedings of the 29th Annual ACM Symposium on Applied Computing, (1695-1696)
  1107. Lai H, Albrecht A and Steinhöfel K Robust Signature Discovery for Affymetrix GeneChip$$^\circledR $$ Cancer Classification Revised Selected Papers of the 6th International Conference on Agents and Artificial Intelligence - Volume 8946, (329-345)
  1108. Thomas S, Adams B, Hassan A and Blostein D (2014). Studying software evolution using topic models, Science of Computer Programming, 80:PB, (457-479), Online publication date: 1-Feb-2014.
  1109. Ahmedin A, Pandit K, Ghosal D and Ghosh A Exploiting Scalable Video Coding for Content Aware Downlink Video Delivery over LTE Proceedings of the 15th International Conference on Distributed Computing and Networking - Volume 8314, (423-437)
  1110. Saeed A, Al-Hamadi A, Niese R and Elzobi M (2014). Frame-Based facial expression recognition using geometrical features, Advances in Human-Computer Interaction, 2014, (4-4), Online publication date: 1-Jan-2014.
  1111. Ofli F, Chaudhry R, Kurillo G, Vidal R and Bajcsy R (2014). Sequence of the most informative joints (SMIJ), Journal of Visual Communication and Image Representation, 25:1, (24-38), Online publication date: 1-Jan-2014.
  1112. Malligarjunan R (2014). Transient behaviour and entropy measures on an inventory system with two demand classes, Applied Mathematics and Computation, 226, (738-753), Online publication date: 1-Jan-2014.
  1113. Mclaughlin J and Clark J Filtered Nonlinear Cryptanalysis of Reduced-Round Serpent, and the Wrong-Key Randomization Hypothesis Proceedings of the 14th IMA International Conference on Cryptography and Coding - Volume 8308, (120-140)
  1114. Renes J, Renner R and Sutter D Efficient One-Way Secret-Key Agreement and Private Channel Coding via Polarization Part I of the Proceedings of the 19th International Conference on Advances in Cryptology - ASIACRYPT 2013 - Volume 8269, (194-213)
  1115. Fuller B, Meng X and Reyzin L Computational Fuzzy Extractors Part I of the Proceedings of the 19th International Conference on Advances in Cryptology - ASIACRYPT 2013 - Volume 8269, (174-193)
  1116. Iwamoto M and Shikata J Information Theoretic Security for Encryption Based on Conditional Rényi Entropies Information Theoretic Security, (103-121)
  1117. Guo T, Liu F, Wu C, Yang C, Wang W and Ren Y Threshold Secret Image Sharing Information and Communications Security, (404-412)
  1118. Bous G and Pirlot M Learning Multicriteria Utility Functions with Random Utility Models Algorithmic Decision Theory, (101-115)
  1119. ACM
    Hiller M, Weiner M, Rodrigues Lima L, Birkner M and Sigl G Breaking through fixed PUF block limitations with differential sequence coding and convolutional codes Proceedings of the 3rd international workshop on Trustworthy embedded devices, (43-54)
  1120. Peretz R (2013). Correlation through bounded recall strategies, International Journal of Game Theory, 42:4, (867-890), Online publication date: 1-Nov-2013.
  1121. Yoshida T (2013). Rectifying the representation learned by Non-negative Matrix Factorization, International Journal of Knowledge-based and Intelligent Engineering Systems, 17:4, (279-290), Online publication date: 1-Oct-2013.
  1122. ACM
    Lin K, Zhuang X, Goudeseune C, King S, Hasegawa-Johnson M and Huang T (2013). Saliency-maximized audio visualization and efficient audio-visual browsing for faster-than-real-time human acoustic event detection, ACM Transactions on Applied Perception, 10:4, (1-16), Online publication date: 1-Oct-2013.
  1123. Trepode N, de Farias C and Barrera J (2013). A pattern-oriented specification of gene network inference processes, Computers in Biology and Medicine, 43:10, (1415-1427), Online publication date: 1-Oct-2013.
  1124. ACM
    Adib F and Katabi D (2013). See through walls with WiFi!, ACM SIGCOMM Computer Communication Review, 43:4, (75-86), Online publication date: 19-Sep-2013.
  1125. ACM
    Othman A, Pennock D, Reeves D and Sandholm T (2013). A Practical Liquidity-Sensitive Automated Market Maker, ACM Transactions on Economics and Computation, 1:3, (1-25), Online publication date: 1-Sep-2013.
  1126. Wen Y, Ray A and Phoha S (2013). Hilbert space formulation of symbolic systems for signal representation and analysis, Signal Processing, 93:9, (2594-2611), Online publication date: 1-Sep-2013.
  1127. Bortolussi L and Sanguinetti G Learning and designing stochastic processes from logical constraints Proceedings of the 10th international conference on Quantitative Evaluation of Systems, (89-105)
  1128. ACM
    Claret G, Rajamani S, Nori A, Gordon A and Borgström J Bayesian inference using data flow analysis Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, (92-102)
  1129. ACM
    Adib F and Katabi D See through walls with WiFi! Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, (75-86)
  1130. ACM
    Zafarani R and Liu H Connecting users across social media sites Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, (41-49)
  1131. ACM
    Hallak A, Di-Castro D and Mannor S Model selection in markovian processes Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, (374-382)
  1132. Peretz R (2013). Learning Cycle Length Through Finite Automata, Mathematics of Operations Research, 38:3, (526-534), Online publication date: 1-Aug-2013.
  1133. Varadarajan K and Vincze M Parallel deep learning with suggestive activation for object category recognition Proceedings of the 9th international conference on Computer Vision Systems, (354-363)
  1134. ACM
    Nadakuditi R and Markov I (2013). On bottleneck analysis in stochastic stream processing, ACM Transactions on Design Automation of Electronic Systems, 18:3, (1-20), Online publication date: 1-Jul-2013.
  1135. Li C, Liu Q, Liu J and Lu H (2013). Ordinal regularized manifold feature extraction for image ranking, Signal Processing, 93:6, (1651-1661), Online publication date: 1-Jun-2013.
  1136. Holzer R, Meer H and Ruiz C Emergence of Global Speed Patterns in a Traffic Scenario Revised Selected Papers of 7th IFIP TC 6 International Workshop on Self-Organizing Systems - Volume 8221, (39-53)
  1137. Garcia S, Rodrigues J, Santos S, Pratas D, Afreixo V, Bastos C, Ferreira P and Pinho A (2013). A Genomic Distance for Assembly Comparison Based on Compressed Maximal Exact Matches, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 10:3, (793-798), Online publication date: 1-May-2013.
  1138. Peres R, Aranha C and Pedreira C (2013). Optimized bi-dimensional data projection for clustering visualization, Information Sciences: an International Journal, 232, (104-115), Online publication date: 1-May-2013.
  1139. Jiang X, Ji Z, Wang S, Mohammed N, Cheng S and Ohno-Machado L (2013). Differential-Private Data Publishing Through Component Analysis, Transactions on Data Privacy, 6:1, (19-34), Online publication date: 1-Apr-2013.
  1140. ACM
    Zenil H and Marshall J (2013). Ubiquity symposium: Evolutionary computation and the processes of life, Ubiquity, 2013:April, (1-16), Online publication date: 1-Apr-2013.
  1141. ACM
    Frank M, Buhman J and Basin D (2013). Role Mining with Probabilistic Models, ACM Transactions on Information and System Security, 15:4, (1-28), Online publication date: 1-Apr-2013.
  1142. ACM
    Nichols J, Zhou M, Yang H, Kang J and Sun X Analyzing the quality of information solicited from targeted strangers on social media Proceedings of the 2013 conference on Computer supported cooperative work, (967-976)
  1143. ACM
    Zhao M and Zhu S (2013). Abstract painting with interactive control of perceptual entropy, ACM Transactions on Applied Perception, 10:1, (1-21), Online publication date: 1-Feb-2013.
  1144. Chu W, Huang C and Chen C (2013). Gender classification from unaligned facial images using support subspaces, Information Sciences: an International Journal, 221, (98-109), Online publication date: 1-Feb-2013.
  1145. Kang L, Wu L and Yang Y (2013). A novel unsupervised approach for multilevel image clustering from unordered image collection, Frontiers of Computer Science: Selected Publications from Chinese Universities, 7:1, (69-82), Online publication date: 1-Feb-2013.
  1146. Ashkan A and Clarke C (2013). Impact of query intent and search context on clickthrough behavior in sponsored search, Knowledge and Information Systems, 34:2, (425-452), Online publication date: 1-Feb-2013.
  1147. Molinaro M, Woodruff D and Yaroslavtsev G Beating the direct sum theorem in communication complexity with implications for sketching Proceedings of the twenty-fourth annual ACM-SIAM symposium on Discrete algorithms, (1738-1756)
  1148. Deppe C Rudolf Ahlswede 1938-2010 Information Theory, Combinatorics, and Search Theory, (735-738)
  1149. Czabarka É, Marsili M and Székely L Threshold functions for distinct parts Information Theory, Combinatorics, and Search Theory, (463-471)
  1150. Haroutunian E and Hakobyan P Multiple objects Information Theory, Combinatorics, and Search Theory, (313-345)
  1151. Chaaban A, Sezgin A and Tuninetti D Achieving net feedback gain in the linear-deterministic butterfly network with a full-duplex relay Information Theory, Combinatorics, and Search Theory, (167-208)
  1152. Chen Z (2013). An overview of bayesian methods for neural spike train analysis, Computational Intelligence and Neuroscience, 2013, (1-1), Online publication date: 1-Jan-2013.
  1153. Gawrychowski P and Gagie T (2013). Minimax trees in linear time with applications, European Journal of Combinatorics, 34:1, (82-90), Online publication date: 1-Jan-2013.
  1154. Ferrie C, Granade C and Cory D (2013). How to best sample a periodic probability distribution, or on the accuracy of Hamiltonian finding strategies, Quantum Information Processing, 12:1, (611-623), Online publication date: 1-Jan-2013.
  1155. Cheung Y and Jia H Unsupervised Feature Selection with Feature Clustering Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 01, (9-15)
  1156. Yoshida T Influence of erroneous pairwise constraints in semi-supervised clustering Proceedings of the 8th international conference on Active Media Technology, (43-52)
  1157. ACM
    Mampaey M, Vreeken J and Tatti N (2012). Summarizing data succinctly with the most informative itemsets, ACM Transactions on Knowledge Discovery from Data, 6:4, (1-42), Online publication date: 1-Dec-2012.
  1158. Bertoni G, Daemen J, Debande N, Le T, Peeters M and Van Assche G Power Analysis of Hardware Implementations Protected with Secret Sharing Proceedings of the 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops, (9-16)
  1159. Corniaux C and Ghodosi H An information-theoretically secure threshold distributed oblivious transfer protocol Proceedings of the 15th international conference on Information Security and Cryptology, (184-201)
  1160. Chen J, Liu X and Lyu S Boosting with side information Proceedings of the 11th Asian conference on Computer Vision - Volume Part I, (563-577)
  1161. ACM
    Meymandpour R and Davis J Recommendations using linked data Proceedings of the 5th Ph.D. workshop on Information and knowledge, (75-82)
  1162. Lee S and Vishwanath S (2012). Boolean functions over nano-fabrics, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 20:11, (2054-2065), Online publication date: 1-Nov-2012.
  1163. Ashlock W and Datta S (2012). Distinguishing Endogenous Retroviral LTRs from SINE Elements Using Features Extracted from Evolved Side Effect Machines, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 9:6, (1676-1689), Online publication date: 1-Nov-2012.
  1164. Neme A, Hernández S and Carrión V Identification of the minimal set of attributes that maximizes the information towards the author of a political discourse Proceedings of the 11th Mexican international conference on Advances in Computational Intelligence - Volume Part II, (81-90)
  1165. Ahmadi H and Safavi-Naini R Message transmission and key establishment Proceedings of the 5th international conference on Foundations and Practice of Security, (78-94)
  1166. Mir D Information-Theoretic foundations of differential privacy Proceedings of the 5th international conference on Foundations and Practice of Security, (374-381)
  1167. Kontonasios K and DeBie T Formalizing complex prior information to quantify subjective interestingness of frequent pattern sets Proceedings of the 11th international conference on Advances in Intelligent Data Analysis, (161-171)
  1168. Yadav S, Reddy A, Reddy A and Ranjan S (2012). Detecting algorithmically generated domain-flux attacks with DNS traffic analysis, IEEE/ACM Transactions on Networking, 20:5, (1663-1677), Online publication date: 1-Oct-2012.
  1169. Gioran C and Kontoyiannis I (2012). Complexity-compression tradeoffs in lossy compression via efficient random codebooks and databases, Problems of Information Transmission, 48:4, (376-394), Online publication date: 1-Oct-2012.
  1170. Boreale M and Paolini M Worst- and average-case privacy breaches in randomization mechanisms Proceedings of the 7th IFIP TC 1/WG 202 international conference on Theoretical Computer Science, (72-86)
  1171. ACM
    Kluver D, Nguyen T, Ekstrand M, Sen S and Riedl J How many bits per rating? Proceedings of the sixth ACM conference on Recommender systems, (99-106)
  1172. Alonso F, Bueso M and Angulo J (2012). Effect of Data Transformations on Predictive Risk Indicators, Methodology and Computing in Applied Probability, 14:3, (705-716), Online publication date: 1-Sep-2012.
  1173. Kontonasios K, Spyropoulou E and De Bie T (2012). Knowledge discovery interestingness measures based on unexpectedness, Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 2:5, (386-399), Online publication date: 1-Sep-2012.
  1174. ACM
    Gudipati A, Pereira S and Katti S AutoMAC Proceedings of the 18th annual international conference on Mobile computing and networking, (5-16)
  1175. ACM
    Wong F, Sen S and Chiang M Why watching movie tweets won't tell the whole story? Proceedings of the 2012 ACM workshop on Workshop on online social networks, (61-66)
  1176. ACM
    Chan J, Liu W, Leckie C, Bailey J and Ramamohanarao K SeqiBloc Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, (651-659)
  1177. ACM
    Tatti N and Vreeken J The long and the short of it Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, (462-470)
  1178. Shi L and Setchi R (2012). User-oriented ontology-based clustering of stored memories, Expert Systems with Applications: An International Journal, 39:10, (9730-9742), Online publication date: 1-Aug-2012.
  1179. Zens R, Stanton D and Xu P A systematic comparison of phrase table pruning techniques Proceedings of the 2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning, (972-983)
  1180. Broder J and Rusmevichientong P (2012). Dynamic Pricing Under a General Parametric Choice Model, Operations Research, 60:4, (965-980), Online publication date: 1-Jul-2012.
  1181. ACM
    Zhang X, Ward T and Mcloone S (2012). An information-based dynamic extrapolation model for networked virtual environments, ACM Transactions on Multimedia Computing, Communications, and Applications, 8:3, (1-19), Online publication date: 1-Jul-2012.
  1182. Galbally J, Fierrez J, Ortega-Garcia J and Plamondon R (2012). Synthetic on-line signature generation. Part II, Pattern Recognition, 45:7, (2622-2632), Online publication date: 1-Jul-2012.
  1183. Chu Z, Widjaja I and Wang H Detecting social spam campaigns on twitter Proceedings of the 10th international conference on Applied Cryptography and Network Security, (455-472)
  1184. ACM
    Netrapalli P and Sanghavi S Learning the graph of epidemic cascades Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer Systems, (211-222)
  1185. ACM
    Hua N, Lall A, Li B and Xu J Towards optimal error-estimating codes through the lens of Fisher information analysis Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer Systems, (125-136)
  1186. ACM
    Netrapalli P and Sanghavi S (2012). Learning the graph of epidemic cascades, ACM SIGMETRICS Performance Evaluation Review, 40:1, (211-222), Online publication date: 7-Jun-2012.
  1187. ACM
    Hua N, Lall A, Li B and Xu J (2012). Towards optimal error-estimating codes through the lens of Fisher information analysis, ACM SIGMETRICS Performance Evaluation Review, 40:1, (125-136), Online publication date: 7-Jun-2012.
  1188. Chaltseva A and Osipov E On passive characterization of aggregated traffic in wireless networks Proceedings of the 10th international conference on Wired/Wireless Internet Communication, (282-289)
  1189. Lang K Practical algorithms for generating a random ordering of the elements of a weighted set Proceedings of the 6th international conference on Fun with Algorithms, (270-281)
  1190. ACM
    Jung S, Choi Y and Kim J Variability-aware, discrete optimization for analog circuits Proceedings of the 49th Annual Design Automation Conference, (536-541)
  1191. Tian Y, Lawall J and Lo D Identifying Linux bug fixing patches Proceedings of the 34th International Conference on Software Engineering, (386-396)
  1192. ACM
    Sen P and Darabi S (2012). On filtering the noise from the random parameters in Monte Carlo rendering, ACM Transactions on Graphics, 31:3, (1-15), Online publication date: 31-May-2012.
  1193. ACM
    Zhang X, Ward T and Mcloone S (2012). Comparison of predictive contract mechanisms from an information theory perspective, ACM Transactions on Multimedia Computing, Communications, and Applications, 8:2, (1-18), Online publication date: 1-May-2012.
  1194. Zoppis I, Gianazza E, Borsani M, Chinello C, Mainini V, Galbusera C, Ferrarese C, Galimberti G, Sorbi S, Borroni B, Magni F, Antoniotti M and Mauri G (2012). Mutual Information Optimization for Mass Spectra Data Alignment, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 9:3, (934-939), Online publication date: 1-May-2012.
  1195. ACM
    Ma S, Cao Y, Huai J and Wo T Distributed graph pattern matching Proceedings of the 21st international conference on World Wide Web, (949-958)
  1196. ACM
    Firouzbakht K, Noubir G and Salehi M On the capacity of rate-adaptive packetized wireless communication links under jamming Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, (3-14)
  1197. ACM
    Ilyas M and Radha H (2012). A dynamic programming approach to maximizing a statistical measure of the lifetime of sensor networks, ACM Transactions on Sensor Networks, 8:2, (1-21), Online publication date: 1-Mar-2012.
  1198. ACM
    Cui W, Qu H, Zhou H, Zhang W and Skiena S (2012). Watch the Story Unfold with TextWheel, ACM Transactions on Intelligent Systems and Technology, 3:2, (1-17), Online publication date: 1-Feb-2012.
  1199. Robert J, Otrok H, Quttoum A and Boukhris R (2012). A distributed resource management model for Virtual Private Networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 56:2, (927-939), Online publication date: 1-Feb-2012.
  1200. ACM
    Rinott R, Carmeli B, Kent C, Maman Y, Rubin Y and Slonim N Utilizing assigned treatments as labels for supervised machine learning in clinical decision support Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium, (493-502)
  1201. Maiga A, Baudais J and Hélard J (2012). Bit rate optimization with MMSE detector for multicast LP-OFDM systems, Journal of Electrical and Computer Engineering, 2012, (4-4), Online publication date: 1-Jan-2012.
  1202. ACM
    Ioannides C and Eder K (2012). Coverage-Directed Test Generation Automated by Machine Learning -- A Review, ACM Transactions on Design Automation of Electronic Systems, 17:1, (1-21), Online publication date: 1-Jan-2012.
  1203. Verma P and Yadava R Genetic algorithm assisted enhancement in pattern recognition efficiency of radial basis neural network Proceedings of the Second international conference on Swarm, Evolutionary, and Memetic Computing - Volume Part I, (257-264)
  1204. Chen H AF or DF, and how to configure an optimal mixed AF-DF relay system? Proceedings of the Third international conference on Future Generation Information Technology, (17-18)
  1205. ACM
    Floor P, Kim A, Ramstad T, Balasingham I, Wernersson N and Skoglund M Transmitting multiple correlated gaussian sources over a Gaussian MAC using delay-free mappings Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, (1-5)
  1206. ACM
    Liu M, Liu K and Ye X Find the intrinsic space for multiclass classification Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, (1-5)
  1207. ACM
    Li R, Yu J and Liu J Link prediction Proceedings of the 20th ACM international conference on Information and knowledge management, (1147-1156)
  1208. ACM
    Zhang D, Askarov A and Myers A Predictive mitigation of timing channels in interactive systems Proceedings of the 18th ACM conference on Computer and communications security, (563-574)
  1209. ACM
    Haas J, Hu Y and Laurenti N Low-cost mitigation of privacy loss due to radiometric identification Proceedings of the Eighth ACM international workshop on Vehicular inter-networking, (31-40)
  1210. ACM
    Rahman A, Shpungin H and Williamson C (2011). Poster, ACM SIGMETRICS Performance Evaluation Review, 39:2, (76-76), Online publication date: 15-Sep-2011.
  1211. Parra-Arnau J, Rebollo-Monedero D and Forné J A privacy-protecting architecture for collaborative filtering via forgery and suppression of ratings Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security, (42-57)
  1212. Yang N, Peng J, Chen Y and Tang C Early prediction of temporal sequences based on information transfer Proceedings of the 12th international conference on Web-age information management, (542-553)
  1213. Boreale M, Pampaloni F and Paolini M Quantitative information flow, with a view Proceedings of the 16th European conference on Research in computer security, (588-606)
  1214. ACM
    Hamacher K and Katzenbeisser S Public security Proceedings of the 2011 New Security Paradigms Workshop, (115-124)
  1215. Espinoza B and Smith G Min-Entropy leakage of channels in cascade Proceedings of the 8th international conference on Formal Aspects of Security and Trust, (70-84)
  1216. Alvim M, Andrés M, Chatzikokolakis K, Degano P and Palamidessi C Differential privacy Proceedings of the 8th international conference on Formal Aspects of Security and Trust, (39-54)
  1217. Cohen A, Dolev S and Leshem G Sensor fusion Proceedings of the 7th international conference on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities, (42-56)
  1218. Tatti N and Vreeken J Comparing apples and oranges Proceedings of the 2011 European conference on Machine learning and knowledge discovery in databases - Volume Part III, (398-413)
  1219. Tatti N and Vreeken J Comparing apples and oranges measuring differences between data mining results Proceedings of the 2011th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part III, (398-413)
  1220. Simeon M and Hilderman R GENCCS Proceedings of the 7th international conference on Machine learning and data mining in pattern recognition, (140-154)
  1221. ACM
    Kremer H, Kranen P, Jansen T, Seidl T, Bifet A, Holmes G and Pfahringer B An effective evaluation measure for clustering on evolving data streams Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, (868-876)
  1222. ACM
    Miettinen P and Vreeken J Model order selection for boolean matrix factorization Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, (51-59)
  1223. Gueguen L and Soille P Frequent and dependent connectivities Proceedings of the 10th international conference on Mathematical morphology and its applications to image and signal processing, (120-131)
  1224. Yang L, Dang Z and Fischer T (2011). Information gain of black-box testing, Formal Aspects of Computing, 23:4, (513-539), Online publication date: 1-Jul-2011.
  1225. Ogino H and Yoshida T Topic graph based non-negative matrix factorization for transfer learning Proceedings of the 19th international conference on Foundations of intelligent systems, (260-269)
  1226. Zeng Y, He X, Xiang Y and Mao H Dynamic ordering-based search algorithm for markov blanket discovery Proceedings of the 15th Pacific-Asia conference on Advances in knowledge discovery and data mining - Volume Part II, (420-431)
  1227. Madhok V and Datta A Quantum Discord in Quantum Information Theory — From Strong Subadditivity to the Mother Protocol Revised Selected Papers of the 6th Conference on Theory of Quantum Computation, Communication, and Cryptography - Volume 6745, (188-197)
  1228. Ahmadi H and Safavi-Naini R Common randomness and secret key capacities of two-way channels Proceedings of the 5th international conference on Information theoretic security, (76-93)
  1229. Renna F, Laurenti N and Poor H Achievable secrecy rates for wiretap OFDM with QAM constellations Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, (679-686)
  1230. Villard J and Piantanida P Secure distributed lossless compression with side information at the eavesdropper Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, (665-672)
  1231. Baracca P, Laurenti N and Tomasin S Physical layer authentication over an OFDM fading wiretap channel Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, (648-657)
  1232. Luzzi L and Bloch M Capacity-based random codes cannot achieve strong secrecy over symmetric wiretap channels Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, (641-647)
  1233. Mertikopoulos P, Belmega E, Moustakas A and Lasaulce S Dynamic power allocation games in parallel multiple access channels Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, (332-341)
  1234. Dierks S, İşcan O and Hausl C Network coding schemes for the multiple-access relay channel Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, (141-150)
  1235. Carvalho A and Larson K A truth serum for sharing rewards The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 2, (635-642)
  1236. Ziebart B, Bagnell J and Dey A Maximum causal entropy correlated equilibria for Markov games The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 1, (207-214)
  1237. Han M, Liang Z and Li D (2011). Sparse kernel density estimations and its application in variable selection based on quadratic Renyi entropy, Neurocomputing, 74:10, (1664-1672), Online publication date: 1-May-2011.
  1238. Zhang R, Zhang Y and Fang Y (2011). AOS, Wireless Networks, 17:4, (843-859), Online publication date: 1-May-2011.
  1239. ACM
    Larson M, Soleymani M, Serdyukov P, Rudinac S, Wartena C, Murdock V, Friedland G, Ordelman R and Jones G Automatic tagging and geotagging in video collections and communities Proceedings of the 1st ACM International Conference on Multimedia Retrieval, (1-8)
  1240. Alomair B, Lazos L and Poovendran R (2011). Securing low-cost RFID systems: An unconditionally secure approach, Journal of Computer Security, 19:2, (229-257), Online publication date: 1-Apr-2011.
  1241. Alomair B, Lazos L and Poovendran R (2011). Securing low-cost RFID systems: An unconditionally secure approach, Journal of Computer Security, 19:2, (229-257), Online publication date: 1-Apr-2011.
  1242. ACM
    Ashkan A and Clarke C On the informativeness of cascade and intent-aware effectiveness measures Proceedings of the 20th international conference on World wide web, (407-416)
  1243. Boreale M, Pampaloni F and Paolini M Asymptotic information leakage under one-try attacks Proceedings of the 14th international conference on Foundations of software science and computational structures: part of the joint European conferences on theory and practice of software, (396-410)
  1244. Holzer R and de Meer H Methods for approximations of quantitative measures in self-organizing systems Proceedings of the 5th international conference on Self-organizing systems, (1-15)
  1245. Dehmer M and Mowshowitz A (2011). A history of graph entropy measures, Information Sciences: an International Journal, 181:1, (57-78), Online publication date: 1-Jan-2011.
  1246. Chaudhuri K and Dasgupta S Rates of convergence for the cluster tree Proceedings of the 23rd International Conference on Neural Information Processing Systems - Volume 1, (343-351)
  1247. Lyu S Divisive normalization Proceedings of the 23rd International Conference on Neural Information Processing Systems - Volume 2, (1522-1530)
  1248. ACM
    Chu Z, Gianvecchio S, Wang H and Jajodia S Who is tweeting on Twitter Proceedings of the 26th Annual Computer Security Applications Conference, (21-30)
  1249. ACM
    Evfimievski A, Fagin R and Woodruff D (2010). Epistemic privacy, Journal of the ACM, 58:1, (1-45), Online publication date: 1-Dec-2010.
  1250. Sacristán-Murga D and Pascual-Iserte A (2010). Differential feedback of MIMO channel gram matrices based on geodesic curves, IEEE Transactions on Wireless Communications, 9:12, (3714-3727), Online publication date: 1-Dec-2010.
  1251. Vazquez-Vilar G, Mosquera C and Jayaweera S (2010). Primary user enters the game, IEEE Transactions on Wireless Communications, 9:12, (3625-3629), Online publication date: 1-Dec-2010.
  1252. Gulati K, Evans B, Andrews J and Tinsley K (2010). Statistics of co-channel interference in a field of Poisson and Poisson-Poisson clustered interferers, IEEE Transactions on Signal Processing, 58:12, (6207-6222), Online publication date: 1-Dec-2010.
  1253. Agarwal M, Guo D and Honig M (2010). Limited-rate channel state feedback for multicarrier block fading channels, IEEE Transactions on Information Theory, 56:12, (6116-6132), Online publication date: 1-Dec-2010.
  1254. Ho S and Yeung R (2010). The interplay between entropy and variational distance, IEEE Transactions on Information Theory, 56:12, (5906-5929), Online publication date: 1-Dec-2010.
  1255. Ho S and Yeung R (2010). On information divergence measures and a unified typicality, IEEE Transactions on Information Theory, 56:12, (5893-5905), Online publication date: 1-Dec-2010.
  1256. Yang T, Yuan J and Zhang W (2010). Recovering cooperative multiplexing gain in wireless relay networks, IEEE Transactions on Communications, 58:12, (3538-3549), Online publication date: 1-Dec-2010.
  1257. Mailing A, Crivelli T and Cernuschi-Frías B Model distribution dependant complexity estimation on textures Proceedings of the 6th international conference on Advances in visual computing - Volume Part III, (271-279)
  1258. Li X Maximum-information storage system Proceedings of the International Conference on Computer-Aided Design, (39-46)
  1259. ACM
    Yang L, Dang Z, Fischer T, Kim M and Tan L Entropy and software systems Proceedings of the FSE/SDP workshop on Future of software engineering research, (427-432)
  1260. Rusmevichientong P, Shen Z and Shmoys D (2010). Dynamic Assortment Optimization with a Multinomial Logit Choice Model and Capacity Constraint, Operations Research, 58:6, (1666-1680), Online publication date: 1-Nov-2010.
  1261. Subramanian V (2010). Large Deviations of Max-Weight Scheduling Policies on Convex Rate Regions, Mathematics of Operations Research, 35:4, (881-910), Online publication date: 1-Nov-2010.
  1262. ACM
    Yadav S, Reddy A, Reddy A and Ranjan S Detecting algorithmically generated malicious domain names Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, (48-61)
  1263. Li H and Han Z (2010). Catch me if you can, IEEE Transactions on Wireless Communications, 9:11, (3554-3565), Online publication date: 1-Nov-2010.
  1264. Tan V, Sanghavi S, Fisher J and Willsky A (2010). Learning graphical models for hypothesis testing and classification, IEEE Transactions on Signal Processing, 58:11, (5481-5495), Online publication date: 1-Nov-2010.
  1265. Wang F, Dong K and Deng X Algorithmic trading strategy optimization based on mutual information entropy based clustering Proceedings of the 5th international conference on Advances in computation and intelligence, (252-260)
  1266. Høst E and Østvold B Canonical method names for Java Proceedings of the Third international conference on Software language engineering, (226-245)
  1267. Bartók G, Pál D and Szepesvári C Toward a classification of finite partial-monitoring games Proceedings of the 21st international conference on Algorithmic learning theory, (224-238)
  1268. Yang L, Hanneke S and Carbonell J Bayesian active learning using arbitrary binary valued queries Proceedings of the 21st international conference on Algorithmic learning theory, (50-58)
  1269. Baciu G, Zheng D and Hu J (2010). Entropy-Based Fabric Weave Pattern Indexing and Classification, International Journal of Cognitive Informatics and Natural Intelligence, 4:4, (76-92), Online publication date: 1-Oct-2010.
  1270. Akçakaya M and Nehorai A (2010). MIMO radar detection and adaptive design under a phase synchronization mismatch, IEEE Transactions on Signal Processing, 58:10, (4994-5005), Online publication date: 1-Oct-2010.
  1271. Ramírez D, Vía J, Santamaría I and Scharf L (2010). Detection of spatially correlated Gaussian time series, IEEE Transactions on Signal Processing, 58:10, (5006-5015), Online publication date: 1-Oct-2010.
  1272. Wang J, Liang J and Muhaidat S (2010). On the distortion exponents of layered broadcast transmission in multi-relay cooperative networks, IEEE Transactions on Signal Processing, 58:10, (5340-5352), Online publication date: 1-Oct-2010.
  1273. Shang X, Chen B, Kramer G and Poor H (2010). Capacity regions and sum-rate capacities of vector Gaussian interference channels, IEEE Transactions on Information Theory, 56:10, (5030-5044), Online publication date: 1-Oct-2010.
  1274. Marijan M, Demirkol I, Maričić D, Sharma G and Ignjatović Ž (2010). Adaptive sensing and optimal power allocation for wireless video sensors with sigma-delta imager, IEEE Transactions on Image Processing, 19:10, (2540-2550), Online publication date: 1-Oct-2010.
  1275. Damiani C, Kauffman S, Serra R, Villani M and Colacci A Information transfer among coupled random boolean networks Proceedings of the 9th international conference on Cellular automata for research and industry, (1-11)
  1276. Cai Q, Fang Y, Luo J and Dai W A novel metrics based on information bottleneck principle for face retrieval Proceedings of the 11th Pacific Rim conference on Advances in multimedia information processing: Part I, (404-413)
  1277. Mampaey M and Vreeken J Summarising data by clustering items Proceedings of the 2010 European conference on Machine learning and knowledge discovery in databases: Part II, (321-336)
  1278. Mampaey M and Vreeken J Summarising data by clustering items Proceedings of the 2010th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part II, (321-336)
  1279. Tang B, Tang J and Peng Y (2010). MIMO radar waveform design in colored noise based on information theory, IEEE Transactions on Signal Processing, 58:9, (4684-4697), Online publication date: 1-Sep-2010.
  1280. Quevedo D, Ahlén A and Østergaard J (2010). Energy efficient state estimation with wireless sensors through the use of predictive power control and coding, IEEE Transactions on Signal Processing, 58:9, (4811-4823), Online publication date: 1-Sep-2010.
  1281. Cuff P, Permuter H and Cover T (2010). Coordination capacity, IEEE Transactions on Information Theory, 56:9, (4181-4206), Online publication date: 1-Sep-2010.
  1282. Mohajer S, Tian C and Diggavi S (2010). Asymmetric multilevel diversity coding and asymmetric Gaussian multiple descriptions, IEEE Transactions on Information Theory, 56:9, (4367-4387), Online publication date: 1-Sep-2010.
  1283. Rebollo-Monedero D and Forné J (2010). Optimized query forgery for private information retrieval, IEEE Transactions on Information Theory, 56:9, (4631-4642), Online publication date: 1-Sep-2010.
  1284. Merhav N (2010). Physics of the shannon limits, IEEE Transactions on Information Theory, 56:9, (4274-4285), Online publication date: 1-Sep-2010.
  1285. Parra-Arnau J, Rebollo-Monedero D and Forné J A privacy-preserving architecture for the semantic web based on tag suppression Proceedings of the 7th international conference on Trust, privacy and security in digital business, (58-68)
  1286. Yoshida T A graph model for clustering based on mutual information Proceedings of the 11th Pacific Rim international conference on Trends in artificial intelligence, (339-350)
  1287. Williams P and Beer R Information dynamics of evolved agents Proceedings of the 11th international conference on Simulation of adaptive behavior: from animals to animats, (38-49)
  1288. Yoshida T and Okatani K A graph-based projection approach for semi-supervised clustering Proceedings of the 11th international conference on Knowledge management and acquisition for smart systems and services, (1-13)
  1289. Checkoway S, Sarwate A and Shacham H Single-ballot risk-limiting audits using convex optimization Proceedings of the 2010 international conference on Electronic voting technology/workshop on trustworthy elections, (1-13)
  1290. Zeng Y and Doshi P (2010). Model identification in interactive influence diagrams using mutual information, Web Intelligence and Agent Systems, 8:3, (313-327), Online publication date: 1-Aug-2010.
  1291. ACM
    Ackermann M, Blömer J and Sohler C (2010). Clustering for metric and nonmetric distance measures, ACM Transactions on Algorithms, 6:4, (1-26), Online publication date: 1-Aug-2010.
  1292. Raginsky M, Willett R, Harmany Z and Marcia R (2010). Compressed sensing performance bounds under Poisson noise, IEEE Transactions on Signal Processing, 58:8, (3990-4002), Online publication date: 1-Aug-2010.
  1293. Bixio L, Oliveri G, Ottonello M, Raffetto M and Regazzoni C (2010). Cognitive radios with multiple antennas exploiting spatial opportunities, IEEE Transactions on Signal Processing, 58:8, (4453-4459), Online publication date: 1-Aug-2010.
  1294. Vojnović M, Gupta V, Karagiannis T and Gkantsidis C (2010). Sampling strategies for epidemic-style information dissemination, IEEE/ACM Transactions on Networking, 18:4, (1013-1025), Online publication date: 1-Aug-2010.
  1295. Yu C and Sharma G (2010). Camera scheduling and energy allocation for lifetime maximization in user-centric visual sensor networks, IEEE Transactions on Image Processing, 19:8, (2042-2055), Online publication date: 1-Aug-2010.
  1296. Vega-Pons S, Correa-Morris J and Ruiz-Shulcloper J (2010). Weighted partition consensus via kernels, Pattern Recognition, 43:8, (2712-2724), Online publication date: 1-Aug-2010.
  1297. ACM
    Cai D, Zhang C and He X Unsupervised feature selection for multi-cluster data Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, (333-342)
  1298. Rosen R A K-provers parallel repetition theorem for a version of no-signaling model Proceedings of the 16th annual international conference on Computing and combinatorics, (23-33)
  1299. Happe J and Berger J CoUAV Proceedings of the 2010 Summer Computer Simulation Conference, (86-93)
  1300. Grossi R, Orlandi A and Raman R Optimal trade-offs for succinct string indexes Proceedings of the 37th international colloquium conference on Automata, languages and programming, (678-689)
  1301. Kim H and Goodman N (2010). Power control strategy for distributed multiple-hypothesis detection, IEEE Transactions on Signal Processing, 58:7, (3751-3764), Online publication date: 1-Jul-2010.
  1302. Su H and El Gamal A (2010). Distributed lossy averaging, IEEE Transactions on Information Theory, 56:7, (3422-3437), Online publication date: 1-Jul-2010.
  1303. Effros M, Goldsmith A and Liang Y (2010). Generalizing capacity, IEEE Transactions on Information Theory, 56:7, (3069-3087), Online publication date: 1-Jul-2010.
  1304. Yu Y (2010). Squeezing the Arimoto-Blahut algorithm for faster convergence, IEEE Transactions on Information Theory, 56:7, (3149-3157), Online publication date: 1-Jul-2010.
  1305. Kolchinsky A, Abi-Haidar A, Kaur J, Hamed A and Rocha L (2010). Classification of Protein-Protein Interaction Full-Text Documents Using Text and Citation Network Features, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 7:3, (400-411), Online publication date: 1-Jul-2010.
  1306. Zhang D, Ni J, Zeng Q, Lee D and Huang J Security analysis of ISS watermarking using natural scene statistics Proceedings of the 12th international conference on Information hiding, (235-248)
  1307. ACM
    Nadakuditi R and Markov I On the costs and benefits of stochasticity in stream processing Proceedings of the 47th Design Automation Conference, (320-325)
  1308. ACM
    Zhao M and Zhu S Sisley the abstract painter Proceedings of the 8th International Symposium on Non-Photorealistic Animation and Rendering, (99-107)
  1309. Houllier M and Luo Y Information distances over clusters Proceedings of the 7th international conference on Advances in Neural Networks - Volume Part I, (355-364)
  1310. Rastrow A, Jelinek F, Sethy A and Ramabhadran B Unsupervised model adaptation using information-theoretic criterion Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics, (190-197)
  1311. Stibor T A study of detecting computer viruses in real-infected files in the n-gram representation with machine learning methods Proceedings of the 23rd international conference on Industrial engineering and other applications of applied intelligent systems - Volume Part I, (509-519)
  1312. Sen S and Nehorai A (2010). OFDM MIMO radar with mutual-information waveform design for low-grazing angle tracking, IEEE Transactions on Signal Processing, 58:6, (3152-3162), Online publication date: 1-Jun-2010.
  1313. Siegl C and Fischer R (2010). Asymptotic performance analysis and successive selected mapping for PAR reduction in OFDM, IEEE Transactions on Signal Processing, 58:6, (3228-3237), Online publication date: 1-Jun-2010.
  1314. Permuter H, Steinberg Y and Weissman T (2010). Two-way source coding with a helper, IEEE Transactions on Information Theory, 56:6, (2905-2919), Online publication date: 1-Jun-2010.
  1315. Verdú S and Shamai S (2010). Variable-rate channel capacity, IEEE Transactions on Information Theory, 56:6, (2651-2667), Online publication date: 1-Jun-2010.
  1316. Fertonani D and Duman T (2010). Novel bounds on the capacity of the binary deletion channel, IEEE Transactions on Information Theory, 56:6, (2753-2765), Online publication date: 1-Jun-2010.
  1317. Calderero F and Marques F (2010). Region merging techniques using information theory statistical measures, IEEE Transactions on Image Processing, 19:6, (1567-1586), Online publication date: 1-Jun-2010.
  1318. Haitner I, Holenstein T, Reingold O, Vadhan S and Wee H Universal one-way hash functions via inaccessible entropy Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques, (616-637)
  1319. Yu S, Thapngam T, Wei S and Zhou W Efficient web browsing with perfect anonymity using page prefetching Proceedings of the 10th international conference on Algorithms and Architectures for Parallel Processing - Volume Part I, (1-12)
  1320. Paisley J, Liao X and Carin L (2010). Active learning and basis selection for kernel-based linear models, IEEE Transactions on Signal Processing, 58:5, (2686-2700), Online publication date: 1-May-2010.
  1321. Tan V, Anandkumar A and Willsky A (2010). Learning Gaussian tree models, IEEE Transactions on Signal Processing, 58:5, (2701-2714), Online publication date: 1-May-2010.
  1322. Adell J, Lekuona A and Yu Y (2010). Sharp bounds on the entropy of the poisson law and related quantities, IEEE Transactions on Information Theory, 56:5, (2299-2306), Online publication date: 1-May-2010.
  1323. Muramatsu J and Miyake S (2010). Hash property and coding theorems for sparse matrices and maximum-likelihood coding, IEEE Transactions on Information Theory, 56:5, (2143-2167), Online publication date: 1-May-2010.
  1324. Nguyen K, Fàbregas A and Rasmussen L (2010). Outage exponents of block-fading channels with power allocation, IEEE Transactions on Information Theory, 56:5, (2373-2381), Online publication date: 1-May-2010.
  1325. Wang X and Gao N (2010). Stochastic resource allocation over fading multiple access and broadcast channels, IEEE Transactions on Information Theory, 56:5, (2382-2391), Online publication date: 1-May-2010.
  1326. Karlsson J and Skoglund M (2010). Optimized low-delay source-channel-relay mappings, IEEE Transactions on Communications, 58:5, (1397-1404), Online publication date: 1-May-2010.
  1327. Chen T and Wu C (2010). Compression-unimpaired batch-image encryption combining vector quantization and index compression, Information Sciences: an International Journal, 180:9, (1690-1701), Online publication date: 1-May-2010.
  1328. Bühler J and Wunder G On capacity computation for the two-user binary multiple-access channel Proceedings of the 33rd IEEE conference on Sarnoff, (180-184)
  1329. ACM
    Li F, Barabas J and Santos A Information processing for live photo mosaic with a group of wireless image sensors Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, (58-69)
  1330. ACM
    Kapoor A, Lee B, Tan D and Horvitz E Interactive optimization for steering machine classification Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (1343-1352)
  1331. De Stefano C, Fontanella F, Marrocco C and di Freca A A hybrid evolutionary algorithm for bayesian networks learning Proceedings of the 2010 international conference on Applications of Evolutionary Computation - Volume Part I, (221-230)
  1332. Lee K, Yener A and He X (2010). Resource allocation for the multiband relay channel, EURASIP Journal on Wireless Communications and Networking, 2010, (1-13), Online publication date: 1-Apr-2010.
  1333. Belmega E, Djeumou B and Lasaulce S (2010). Power allocation games in interference relay channels, EURASIP Journal on Wireless Communications and Networking, 2010, (1-20), Online publication date: 1-Apr-2010.
  1334. Weeraddana P, Codreanu M, Latva-aho M and Ephremides A (2010). On the effect of self-interference cancelation in multihop wireless networks, EURASIP Journal on Wireless Communications and Networking, 2010, (1-10), Online publication date: 1-Apr-2010.
  1335. Makki B, Beygi L and Eriksson T (2010). Channel capacity bounds in the presence of quantized channel state information, EURASIP Journal on Wireless Communications and Networking, 2010, (1-15), Online publication date: 1-Apr-2010.
  1336. Razavi S and Giurcäneanu C (2010). A novel method for improving fairness over multiaccess channels, EURASIP Journal on Wireless Communications and Networking, 2010, (1-10), Online publication date: 1-Apr-2010.
  1337. García-Zambrana A, Castillo-Vázquez C and Castillo-Vázquez B (2010). On the capacity of FSO links over gamma-gamma atmospheric turbulence channels using OOK signaling, EURASIP Journal on Wireless Communications and Networking, 2010, (1-11), Online publication date: 1-Apr-2010.
  1338. Marano S, Matta V and Mazzarella F (2010). Refining decisions after losing data, IEEE Transactions on Signal Processing, 58:4, (1980-1990), Online publication date: 1-Apr-2010.
  1339. Anantharam V (2010). Counterexamples to a proposed stam inequality on finite groups, IEEE Transactions on Information Theory, 56:4, (1825-1827), Online publication date: 1-Apr-2010.
  1340. Jalali S, Verdú S and Weissman T (2010). A universal scheme for Wyner-Ziv coding of discrete sources, IEEE Transactions on Information Theory, 56:4, (1737-1750), Online publication date: 1-Apr-2010.
  1341. Yazdi S, Savari S, Kramer G, Carlson K and Farnoud F (2010). On the multimessage capacity region for undirected ring networks, IEEE Transactions on Information Theory, 56:4, (1930-1947), Online publication date: 1-Apr-2010.
  1342. Riegler E and Taricco G (2010). Asymptotic statistics of the mutual information for spatially correlated rician fading MIMO channels with interference, IEEE Transactions on Information Theory, 56:4, (1542-1559), Online publication date: 1-Apr-2010.
  1343. Ong L, Johnson S and Kellett C (2010). An optimal coding strategy for the binary multi-way relay channel, IEEE Communications Letters, 14:4, (330-332), Online publication date: 1-Apr-2010.
  1344. Liu L, Zhu F, Chen C, Yan X, Han J, Yu P and Yang S Mining diversity on networks Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part I, (384-398)
  1345. ACM
    Termehchy A and Winslett M Keyword search for data-centric XML collections with long text fields Proceedings of the 13th International Conference on Extending Database Technology, (537-548)
  1346. Morlot F, Elayoubi S and Baccelli F An interaction-based mobility model for dynamic hot spot analysis Proceedings of the 29th conference on Information communications, (2294-2302)
  1347. Hejazi S and Liang B Throughput analysis of multiple access relay channel under collision model Proceedings of the 29th conference on Information communications, (1756-1764)
  1348. Visweswaran S and Cooper G (2010). Learning Instance-Specific Predictive Models, The Journal of Machine Learning Research, 11, (3333-3369), Online publication date: 1-Mar-2010.
  1349. Joung J and Sayed A (2010). Multiuser two-way amplify-and-forward relay processing and power control methods for beamforming systems, IEEE Transactions on Signal Processing, 58:3, (1833-1846), Online publication date: 1-Mar-2010.
  1350. Merhav N, Guo D and Shamai S (2010). Statistical physics of signal estimation in Gaussian noise, IEEE Transactions on Information Theory, 56:3, (1400-1416), Online publication date: 1-Mar-2010.
  1351. Pérez-Cruz F, Rodrigues M and Verdú S (2010). MIMO Gaussian channels with arbitrary inputs, IEEE Transactions on Information Theory, 56:3, (1070-1084), Online publication date: 1-Mar-2010.
  1352. Tulino A, Caire G, Shamai S and Verdú S (2010). Capacity of channels with frequency-selective and time-selective fading, IEEE Transactions on Information Theory, 56:3, (1187-1215), Online publication date: 1-Mar-2010.
  1353. Tang G and Nehorai A (2010). Performance analysis for sparse support recovery, IEEE Transactions on Information Theory, 56:3, (1383-1399), Online publication date: 1-Mar-2010.
  1354. Wang F, Yang C, Lin Z, Li Y and Yuan Y (2010). Hybrid sampling on mutual information entropy-based clustering ensembles for optimizations, Neurocomputing, 73:7-9, (1457-1464), Online publication date: 1-Mar-2010.
  1355. Dian J (2010). A meaning based information theory - informalogical space, Information Sciences: an International Journal, 180:6, (984-994), Online publication date: 1-Mar-2010.
  1356. Hermelin M and Nyberg K Dependent linear approximations Proceedings of the 2010 international conference on Topics in Cryptology, (318-333)
  1357. Gierlichs B, Batina L, Preneel B and Verbauwhede I Revisiting higher-order DPA attacks Proceedings of the 2010 international conference on Topics in Cryptology, (221-234)
  1358. Hamdi K (2010). A useful lemma for capacity analysis of fading interference channels, IEEE Transactions on Communications, 58:2, (411-416), Online publication date: 1-Feb-2010.
  1359. Van Wijngaarden A and Immink K (2010). Construction of maximum run-length limited codes using sequence replacement techniques, IEEE Journal on Selected Areas in Communications, 28:2, (200-207), Online publication date: 1-Feb-2010.
  1360. Chang W, Chung S and Lee Y (2010). Achievable rates for cognitive radios opportunistically permitting excessive secondary-to-primary interference, IEEE Transactions on Wireless Communications, 9:2, (674-683), Online publication date: 1-Feb-2010.
  1361. Berger T and Levy W (2010). A mathematical theory of energy efficient neural computation and communication, IEEE Transactions on Information Theory, 56:2, (852-874), Online publication date: 1-Feb-2010.
  1362. Aghagolzadeh M, Eldawlatly S and Oweiss K (2010). Synergistic coding by cortical neural ensembles, IEEE Transactions on Information Theory, 56:2, (875-889), Online publication date: 1-Feb-2010.
  1363. McDonnell M, Burkitt A, Grayden D, Meffin H and Grant A (2010). A channel model for inferring the optimal number of electrodes for future cochlear implants, IEEE Transactions on Information Theory, 56:2, (928-940), Online publication date: 1-Feb-2010.
  1364. Gastpar M, Gill P, Huth A and Theunissen F (2010). Anthropic correction of information estimates and its application to neural coding, IEEE Transactions on Information Theory, 56:2, (890-900), Online publication date: 1-Feb-2010.
  1365. Johnson D (2010). Information theory and neural information processing, IEEE Transactions on Information Theory, 56:2, (653-666), Online publication date: 1-Feb-2010.
  1366. Suksompong P and Berger T (2010). Capacity analysis for integrate-and-fire neurons with descending action potential thresholds, IEEE Transactions on Information Theory, 56:2, (838-851), Online publication date: 1-Feb-2010.
  1367. Dehmer M and Mowshowitz A (2010). Inequalities for entropy-based measures of network information content, Applied Mathematics and Computation, 215:12, (4263-4271), Online publication date: 1-Feb-2010.
  1368. Tabatabaei Yazdi S and Savari S A max-flow/min-cut algorithm for a class of wireless networks Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (1209-1226)
  1369. Choi Y Fast algorithm for optimal compression of graphs Proceedings of the Meeting on Algorithm Engineering & Expermiments, (34-46)
  1370. ACM
    Hieu C, Bang Y, Kim J, Kim Y and Hong C A multi-rate routing protocol with connection entropy for mobile ad hoc networks Proceedings of the 4th International Conference on Uniquitous Information Management and Communication, (1-5)
  1371. Sexton T, Lusina P and DeVries C Remote sampler Proceedings of the 2010 IEEE conference on Radio and wireless symposium, (601-604)
  1372. Naeem M and Lee D A joint symbol detection algorithm efficient at low SNR for a multi-device STBC-MIMO system Proceedings of the 2010 IEEE conference on Radio and wireless symposium, (440-443)
  1373. Wo T, Noemm M, Hao D and Hoeher P (2010). Iterative processing for superposition mapping, Journal of Electrical and Computer Engineering, 2010, (1-13), Online publication date: 1-Jan-2010.
  1374. Zhao H, Zhou X, Yang Y and Wang W (2010). Hierarchical modulation with vector rotation for E-MBMS transmission in LTE systems, Journal of Electrical and Computer Engineering, 2010, (1-10), Online publication date: 1-Jan-2010.
  1375. Lai J and Ford J (2010). Relative entropy rate based multiple hidden Markov model approximation, IEEE Transactions on Signal Processing, 58:1, (165-174), Online publication date: 1-Jan-2010.
  1376. Kim Y (2010). Feedback capacity of stationary Gaussian channels, IEEE Transactions on Information Theory, 56:1, (57-85), Online publication date: 1-Jan-2010.
  1377. Akçakaya M and Tarokh V (2010). Shannon-theoretic limits on noisy compressive sampling, IEEE Transactions on Information Theory, 56:1, (492-504), Online publication date: 1-Jan-2010.
  1378. Kwitt R and Uhl A (2010). Lightweight probabilistic texture retrieval, IEEE Transactions on Image Processing, 19:1, (241-253), Online publication date: 1-Jan-2010.
  1379. Frazee J and Beaver D Vagueness is rational under uncertainty Proceedings of the 17th Amsterdam colloquium conference on Logic, language and meaning, (153-162)
  1380. Abgrall C, Strinati E and Belfiore J Inter-cell interference mitigation allocation for half-duplex relays based cooperation Proceedings of the 2nd IFIP conference on Wireless days, (155-160)
  1381. Chen S, Yeh C and Huang W Transmission Rate Enhancement for Scalable H.264/AVC Video over MIMO Wireless Systems Proceedings of the 10th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing, (55-64)
  1382. Speidel U A note on the estimation of string complexity for short strings Proceedings of the 7th international conference on Information, communications and signal processing, (627-631)
  1383. Shimizu T, Matsumoto T, Murata H, Yamamoto K and Yoshida S Code design for joint decoding of correlated sources using algebraic network coding over AWGN channels Proceedings of the 7th international conference on Information, communications and signal processing, (244-248)
  1384. Chen H and Malacaria P The optimum leakage principle for analyzing multi-threaded programs Proceedings of the 4th international conference on Information theoretic security, (177-193)
  1385. ACM
    Cong L, Lu G, Chen Y, Deng B and Li X What level of estimating accuracy does TCP need and can TCP achieve Proceedings of the 5th international student workshop on Emerging networking experiments and technologies, (21-22)
  1386. Wang T, Leus G and Huang L (2009). Ranging energy optimization for robust sensor positioning based on semidefinite programming, IEEE Transactions on Signal Processing, 57:12, (4777-4787), Online publication date: 1-Dec-2009.
  1387. Walsh J, Weber S and Maina C (2009). Optimal rate, IEEE Transactions on Information Theory, 55:12, (5491-5510), Online publication date: 1-Dec-2009.
  1388. Ardestanizadeh E, Franceschetti M, Javidi T and Kim Y (2009). Wiretap channel with secure rate-limited feedback, IEEE Transactions on Information Theory, 55:12, (5353-5361), Online publication date: 1-Dec-2009.
  1389. Merhav N (2009). Joint source channel coding via statistical mechanics, IEEE Transactions on Information Theory, 55:12, (5382-5393), Online publication date: 1-Dec-2009.
  1390. Simeone O, Somekh O, Poor H and Shamai S (2009). Distributed MIMO systems for nomadic applications over a symmetric interference channel, IEEE Transactions on Information Theory, 55:12, (5558-5574), Online publication date: 1-Dec-2009.
  1391. Yu Y (2009). Monotonic convergence in an information-theoretic law of small numbers, IEEE Transactions on Information Theory, 55:12, (5412-5422), Online publication date: 1-Dec-2009.
  1392. Moli-Sánchez L, Rodríguez-Alonso A and Seco-Granados G (2009). Performance analysis of quantum cryptography protocols in optical earth-satellite and intersatellite links, IEEE Journal on Selected Areas in Communications, 27:9, (1582-1590), Online publication date: 1-Dec-2009.
  1393. Yang T, Yuan J and Shi Z Rate optimization for IDMA systems with iterative multi-user decoding Proceedings of the 28th IEEE conference on Global telecommunications, (6282-6286)
  1394. Marsch P and Fettweis G On downlink network MIMO under a constrained backhaul and imperfect channel knowledge Proceedings of the 28th IEEE conference on Global telecommunications, (5059-5064)
  1395. Grieger M, Marsch P, Fettweis G and Cioffi J On the performance of compressed interference forwarding for uplink base station cooperation Proceedings of the 28th IEEE conference on Global telecommunications, (5031-5036)
  1396. Popovski P and Utkovski Z On the secondary capacity of the communication protocols Proceedings of the 28th IEEE conference on Global telecommunications, (4993-4999)
  1397. Hong J and Li V Impact of information on network performance - an information-theoretic perspective Proceedings of the 28th IEEE conference on Global telecommunications, (3540-3545)
  1398. Souihli O and Ohtsuki T Cooperative diversity can mitigate keyhole effects in wireless MIMO systems Proceedings of the 28th IEEE conference on Global telecommunications, (3205-3210)
  1399. Gulati K, Chopra A, Evans B and Tinsley K Statistical modeling of co-channel interference Proceedings of the 28th IEEE conference on Global telecommunications, (3152-3157)
  1400. Toumpakaris D and Lee J The gap approximation for Gaussian multiple access channels Proceedings of the 28th IEEE conference on Global telecommunications, (2825-2830)
  1401. Deshpande N and Rajan B Constellation constrained capacity of two-user broadcast channels Proceedings of the 28th IEEE conference on Global telecommunications, (2723-2728)
  1402. Nikjah R and Beaulieu N Exact capacity analysis of rate adaptive power nonadaptive multibranch multihop decode-and-forward relaying networks Proceedings of the 28th IEEE conference on Global telecommunications, (1822-1829)
  1403. Emad A and Beaulieu N On the performance of bit-synchronizers in an ISI channel and a related lower bound Proceedings of the 28th IEEE conference on Global telecommunications, (1551-1556)
  1404. Lu P and Yang H Vector perturbation precoding for MIMO broadcast channel with quantized channel feedback Proceedings of the 28th IEEE conference on Global telecommunications, (878-882)
  1405. Rajesh R and Sharma V Joint source-channel coding over a fading multiple access channel with partial channel state information Proceedings of the 28th IEEE conference on Global telecommunications, (616-622)
  1406. Rajesh R and Sharma V Distributed joint source-channel coding for functions over a multiple access channel Proceedings of the 28th IEEE conference on Global telecommunications, (609-615)
  1407. ACM
    Frank M, Streich A, Basin D and Buhmann J A probabilistic approach to hybrid role mining Proceedings of the 16th ACM conference on Computer and communications security, (101-111)
  1408. Atif J and Darbon J Copula-set measures on topographic maps for change detection Proceedings of the 16th IEEE international conference on Image processing, (2845-2848)
  1409. Mao J, Bulan O, Sharma G and Datta S Device temporal forensics Proceedings of the 16th IEEE international conference on Image processing, (1485-1488)
  1410. Bandoh Y, Ohbayashi H, Takamura S, Kamikura K and Yashima Y Mathematical analysis of the energy compaction affected by the dimensionality of Karhunen-Lòeve transform Proceedings of the 16th IEEE international conference on Image processing, (21-24)
  1411. ElSalamouny E, Sassone V and Nielsen M HMM-based trust model Proceedings of the 6th international conference on Formal Aspects in Security and Trust, (21-35)
  1412. ACM
    Termehchy A and Winslett M Effective, design-independent XML keyword search Proceedings of the 18th ACM conference on Information and knowledge management, (107-116)
  1413. ACM
    Ashkan A and Clarke C Characterizing commercial intent Proceedings of the 18th ACM conference on Information and knowledge management, (67-76)
  1414. Rüngeler M, Schotsch B and Vary P Properties and performance bounds of linear analog block codes Proceedings of the 43rd Asilomar conference on Signals, systems and computers, (962-966)
  1415. Uppal M, Liu Z, Stankovic V and Xiong Z (2009). Compress-forward coding with BPSK modulation for the half-duplex Gaussian relay channel, IEEE Transactions on Signal Processing, 57:11, (4467-4481), Online publication date: 1-Nov-2009.
  1416. Meloni A, Ripoli A, Positano V and Landini L (2009). Mutual information preconditioning improves structure learning of Bayesian networks from medical databases, IEEE Transactions on Information Technology in Biomedicine, 13:6, (984-989), Online publication date: 1-Nov-2009.
  1417. Etkin R and Ordentlich E (2009). The degrees-of-freedom of the K-user Gaussian interference channel is discontinuous at rational channel coefficients, IEEE Transactions on Information Theory, 55:11, (4932-4946), Online publication date: 1-Nov-2009.
  1418. Yazdani R and Ardakani M (2009). Linear LLR approximation for iterative decoding on wireless channels, IEEE Transactions on Communications, 57:11, (3278-3287), Online publication date: 1-Nov-2009.
  1419. Hamdi K (2009). On the statistics of signal-to-interference plus noise ratio in wireless communications, IEEE Transactions on Communications, 57:11, (3199-3204), Online publication date: 1-Nov-2009.
  1420. Zhang X, Ward T and Mcloone S Exploring an Information Framework for Consistency Maintenance in Distributed Interactive Applications Proceedings of the 2009 13th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, (121-128)
  1421. Kherani A, Muthaiah S, Padhy S and Bhattacharya D Reliable and secure broadcast communication over resource constrained systems Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools, (1-10)
  1422. Guillory A and Bilmes J Average-case active learning with costs Proceedings of the 20th international conference on Algorithmic learning theory, (141-155)
  1423. Zhou X, Sadeghi P, Lamahewa T and Durrani S (2009). Design guidelines for training-based MIMO systems with feedback, IEEE Transactions on Signal Processing, 57:10, (4014-4026), Online publication date: 1-Oct-2009.
  1424. Lapidoth A, Moser S and Wigger M (2009). On the capacity of free-space optical intensity channels, IEEE Transactions on Information Theory, 55:10, (4449-4461), Online publication date: 1-Oct-2009.
  1425. Hutchenson D and Noneaker D (2009). New closed-form bounds on the performance of coding in correlated Rayleigh fading, IEEE Transactions on Communications, 57:10, (2923-2931), Online publication date: 1-Oct-2009.
  1426. Keshavarz H, Xie L and Mazumdar R (2009). User capacity scaling laws for fading multiple-access channels, IEEE Transactions on Wireless Communications, 8:9, (4498-4507), Online publication date: 1-Sep-2009.
  1427. Dembski W and Marks R (2009). Conservation of information in search, IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans, 39:5, (1051-1061), Online publication date: 1-Sep-2009.
  1428. Xenoulis K and Kalouptsidis N (2009). Improvement of Gallager upper bound and its variations for discrete channels, IEEE Transactions on Information Theory, 55:9, (4204-4210), Online publication date: 1-Sep-2009.
  1429. Pinto P, Giorgetti A, Win M and Chiani M (2009). A stochastic geometry approach to coexistence in heterogeneous wireless networks, IEEE Journal on Selected Areas in Communications, 27:7, (1268-1282), Online publication date: 1-Sep-2009.
  1430. Deschacht K and Moens M Semi-supervised semantic role labeling using the latent words language model Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing: Volume 1 - Volume 1, (21-29)
  1431. Sarkas N, Bansal N, Das G and Koudas N (2009). Measure-driven keyword-query expansion, Proceedings of the VLDB Endowment, 2:1, (121-132), Online publication date: 1-Aug-2009.
  1432. Alishahi K, Marvasti F, Aref V and Pad P (2009). Bounds on the sum capacity of synchronous binary CDMA channels, IEEE Transactions on Information Theory, 55:8, (3577-3593), Online publication date: 1-Aug-2009.
  1433. Franceschetti M, Migliore M and Minero P (2009). The capacity of wireless networks, IEEE Transactions on Information Theory, 55:8, (3413-3424), Online publication date: 1-Aug-2009.
  1434. Tian C, Mohajer S and Diggavi S (2009). Approximating the Gaussian multiple description rate region under symmetric distortion constraints, IEEE Transactions on Information Theory, 55:8, (3869-3891), Online publication date: 1-Aug-2009.
  1435. Lutz J A Divergence Formula for Randomness and Dimension Proceedings of the 5th Conference on Computability in Europe: Mathematical Theory and Computational Practice, (342-351)
  1436. Adami D, Callegari C, Giordano S, Pagano M and Russo F On the use of compression algorithms for the classification of IP flows Proceedings of the 12th international conference on Symposium on Performance Evaluation of Computer & Telecommunication Systems, (355-360)
  1437. ACM
    Wang F, Lin Z, Yang C and Li Y SGMIEC Proceedings of the 11th Annual conference on Genetic and evolutionary computation, (1821-1822)
  1438. Lasaulce S, Hayel Y, El Azouzi R and Debbah M (2009). Introducing hierarchy in energy games, IEEE Transactions on Wireless Communications, 8:7, (3833-3843), Online publication date: 1-Jul-2009.
  1439. Kim H, Wang J, Cai P and Cui S (2009). Detection outage and detection diversity in a homogeneous distributed sensor network, IEEE Transactions on Signal Processing, 57:7, (2875-2881), Online publication date: 1-Jul-2009.
  1440. Calvo E, Vidal J and Fonollosa J (2009). Optimal resource allocation in relay-assisted cellular networks with partial CSI, IEEE Transactions on Signal Processing, 57:7, (2809-2823), Online publication date: 1-Jul-2009.
  1441. Zhong Y, Alajaji F and Linder T (2009). Random-coding lower bounds for the error exponent of joint quantization and watermarking systems, IEEE Transactions on Information Theory, 55:7, (3264-3283), Online publication date: 1-Jul-2009.
  1442. Annapureddy V and Veeravalli V (2009). Gaussian interference networks, IEEE Transactions on Information Theory, 55:7, (3032-3050), Online publication date: 1-Jul-2009.
  1443. Elia P, Vinodh K, Anand M and Kumar P (2009). D-MG tradeoff and optimal codes for a class of AF and DF cooperative communication protocols, IEEE Transactions on Information Theory, 55:7, (3161-3185), Online publication date: 1-Jul-2009.
  1444. Van Dijck G, Van Vaerenbergh J and Van Hulle M (2009). Posterior probability profiles for the automated assessment of the recovery of patients with stroke from activity of daily living tasks, Artificial Intelligence in Medicine, 46:3, (233-249), Online publication date: 1-Jul-2009.
  1445. Varna A and Wu M Modeling and analysis of content identification Proceedings of the 2009 IEEE international conference on Multimedia and Expo, (1528-1531)
  1446. ACM
    Wu J, Xiong H and Chen J Adapting the right measures for K-means clustering Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, (877-886)
  1447. Hayashi K, Fujii T, Kaneko M, Sakai H and Okada Y Transmit beamforming and power allocation for downlink OFDMA systems Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, (441-447)
  1448. Gagie T On the Value of Multiple Read/Write Streams for Data Compression Proceedings of the 20th Annual Symposium on Combinatorial Pattern Matching - Volume 5577, (68-77)
  1449. Manfredi V, Kurose J, Malouch N, Zhang C and Zink M Separation of sensor control and data in closed-loop sensor networks Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks, (162-170)
  1450. ACM
    Qi Y, Hoshyar R and Tafazolli R Efficient hybrid relaying schemes with limited feedback Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, (754-758)
  1451. ACM
    Alvarado A, Agrell E and Svensson A On the capacity of BICM with QAM constellations Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, (573-579)
  1452. Thimm M Measuring inconsistency in probabilistic knowledge bases Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence, (530-537)
  1453. Lyu S Interpretation and generalization of score matching Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence, (359-366)
  1454. Zhang J, Armand M and Kam P A mutual information approach for comparing LLR metrics for iterative decoders Proceedings of the 2009 IEEE international conference on Communications, (2075-2079)
  1455. Tam W and Lok T Rate allocation for the multi-source downlink channel with minimax optimization Proceedings of the 2009 IEEE international conference on Communications, (2033-2037)
  1456. Truong K, Weber S and Heath R Transmission capacity of two-way communication in wireless ad hoc networks Proceedings of the 2009 IEEE international conference on Communications, (1637-1641)
  1457. Ho C, Gowda K and Sun S A generalized two-way relay channel with private information for the relay Proceedings of the 2009 IEEE international conference on Communications, (1588-1593)
  1458. Kuehn V and Vorkoeper S Information combining for relay networks Proceedings of the 2009 IEEE international conference on Communications, (1568-1572)
  1459. Trivellato M and Benvenuto N Cross-layer design of networked control systems Proceedings of the 2009 IEEE international conference on Communications, (108-112)
  1460. Freudenberg J and Middleton R Stabilization and performance over a Gaussian communication channel for a plant with time delay Proceedings of the 2009 conference on American Control Conference, (2148-2153)
  1461. Napp N, Thorsley D and Klavins E Hidden Markov models for non-well-mixed reaction networks Proceedings of the 2009 conference on American Control Conference, (737-744)
  1462. ACM
    Bělinová Z Measuring of organization in traffic systems Proceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship, (1-6)
  1463. Simeone O, Gündüz D, Poor H, Goldsmith A and Shamai S (2009). Compound multiple-access channels with partial cooperation, IEEE Transactions on Information Theory, 55:6, (2425-2441), Online publication date: 1-Jun-2009.
  1464. Moser S (2009). The fading number of multiple-input multiple-output fading channels with memory, IEEE Transactions on Information Theory, 55:6, (2716-2755), Online publication date: 1-Jun-2009.
  1465. Kitsos C and Tavoularis N (2009). Logarithmic Sobolev inequalities for information measures, IEEE Transactions on Information Theory, 55:6, (2554-2561), Online publication date: 1-Jun-2009.
  1466. Nielsen F and Nock R (2009). Sided and symmetrized Bregman centroids, IEEE Transactions on Information Theory, 55:6, (2882-2904), Online publication date: 1-Jun-2009.
  1467. Popovski P and Simeone O (2009). Wireless secrecy in cellular systems with infrastructure-aided cooperation, IEEE Transactions on Information Forensics and Security, 4:2, (242-256), Online publication date: 1-Jun-2009.
  1468. Rojas Domínguez A and Nandi A (2009). Toward breast cancer diagnosis based on automated segmentation of masses in mammograms, Pattern Recognition, 42:6, (1138-1148), Online publication date: 1-Jun-2009.
  1469. Brito I, Meisels A, Meseguer P and Zivan R (2009). Distributed constraint satisfaction with partially known constraints, Constraints, 14:2, (199-234), Online publication date: 1-Jun-2009.
  1470. ACM
    Viola E Bit-probe lower bounds for succinct data structures Proceedings of the forty-first annual ACM symposium on Theory of computing, (475-482)
  1471. ACM
    Guo Z, Huang J, Wang B, Cui J, Zhou S and Willett P A practical joint network-channel coding scheme for reliable communication in wireless networks Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing, (279-288)
  1472. Zhang G and Suh I Integration of a prediction mechanism with a sensor model Proceedings of the 2009 IEEE international conference on Robotics and Automation, (1430-1435)
  1473. Chen X, Zhang L, Huang Y, Shan X and Ren Y A Novel Scheme of Multi-node Cooperation in Wireless Networks Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference, (342-349)
  1474. Boileau J and Renes J Optimal state merging without decoupling Proceedings of the 4th international conference on Theory of Quantum Computation, Communication, and Cryptography, (76-84)
  1475. Dai W, Rider B and Liu Y (2009). Joint beamforming for multiaccess MIMO systems with finite rate feedback, IEEE Transactions on Wireless Communications, 8:5, (2618-2628), Online publication date: 1-May-2009.
  1476. Nguyen K, i Fàbregas A and Rasmussen L (2009). Power allocation for block-fading channels with arbitrary input constellations, IEEE Transactions on Wireless Communications, 8:5, (2514-2523), Online publication date: 1-May-2009.
  1477. Gupta A and Verdú S (2009). Nonlinear sparse-graph codes for lossy compression, IEEE Transactions on Information Theory, 55:5, (1961-1975), Online publication date: 1-May-2009.
  1478. Watanabe Y and Kamoi K (2009). A formulation of the channel capacity of multiple-access channel, IEEE Transactions on Information Theory, 55:5, (2083-2096), Online publication date: 1-May-2009.
  1479. Sung C, Shum K and Ng C (2009). Fair resource allocation for the Gaussian broadcast channel with ISI, IEEE Transactions on Communications, 57:5, (1381-1389), Online publication date: 1-May-2009.
  1480. Mantel H and Sudbrock H Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels Formal Aspects in Security and Trust, (67-81)
  1481. Hanlen L, Smith D, Zhang J and Lewis D Key-sharing via channel randomness in narrowband body area networks Proceedings of the Fourth International Conference on Body Area Networks, (1-6)
  1482. Zhong Y, Alajaji F and Campbell L (2009). Error exponents for asymmetric two-user discrete memoryless source-channel coding systems, IEEE Transactions on Information Theory, 55:4, (1487-1518), Online publication date: 1-Apr-2009.
  1483. Moon T, Gunther J and Kupin J (2009). Sinkhorn solves Sudoku, IEEE Transactions on Information Theory, 55:4, (1741-1746), Online publication date: 1-Apr-2009.
  1484. Wang Y, Alajaji F and Linder T (2009). Hybrid digital-analog coding with bandwidth compression for Gaussian source-channel pairs, IEEE Transactions on Communications, 57:4, (997-1012), Online publication date: 1-Apr-2009.
  1485. Smith G On the Foundations of Quantitative Information Flow Proceedings of the 12th International Conference on Foundations of Software Science and Computational Structures - Volume 5504, (288-302)
  1486. Merhav N (2009). The generalized random energy model and its application to the statistical physics of ensembles of hierarchical codes, IEEE Transactions on Information Theory, 55:3, (1250-1268), Online publication date: 1-Mar-2009.
  1487. Fragouli C (2009). An overview of network coding for dynamically changing networks, International Journal of Autonomous and Adaptive Communications Systems, 2:1, (1-23), Online publication date: 1-Mar-2009.
  1488. Babadi B, Kalouptsidis N and Tarokh V (2009). Asymptotic achievability of the Cramér-Rao bound for noisy compressive sampling, IEEE Transactions on Signal Processing, 57:3, (1233-1236), Online publication date: 1-Mar-2009.
  1489. Aleksic M, Razaghi P and Yu W (2009). Capacity of a class of modulo-sum relay channels, IEEE Transactions on Information Theory, 55:3, (921-930), Online publication date: 1-Mar-2009.
  1490. Tian C, Vaishampayan V and Sloane N (2009). A coding algorithm for constant weight vectors, IEEE Transactions on Information Theory, 55:3, (1051-1060), Online publication date: 1-Mar-2009.
  1491. Zhong Y, Alajaji F and Campbell L (2009). Joint source-channel coding excess distortion exponent for some memoryless continuous-alphabet systems, IEEE Transactions on Information Theory, 55:3, (1296-1319), Online publication date: 1-Mar-2009.
  1492. ACM
    Viola E (2009). Guest Column, ACM SIGACT News, 40:1, (27-44), Online publication date: 28-Feb-2009.
  1493. Oldewurtel F, Riihijärvi J and Mühönen P Impact of correlation in node locations on the performance of distributed compression Proceedings of the Sixth international conference on Wireless On-Demand Network Systems and Services, (125-132)
  1494. Hakala R and Nyberg K (2009). A multidimensional linear distinguishing attack on the Shannon cipher, International Journal of Applied Cryptography, 1:3, (161-168), Online publication date: 1-Feb-2009.
  1495. Liang Y, Somekh-Baruch A, Poor H, Shamai S and Verdú S (2009). Capacity of cognitive interference channels with and without secrecy, IEEE Transactions on Information Theory, 55:2, (604-619), Online publication date: 1-Feb-2009.
  1496. Amaudruz A and Fragouli C Combinatorial algorithms for wireless information flow Proceedings of the twentieth annual ACM-SIAM symposium on Discrete algorithms, (555-564)
  1497. Viola E (2009). On the Power of Small-Depth Computation, Foundations and Trends® in Theoretical Computer Science, 5:1, (1-72), Online publication date: 1-Jan-2009.
  1498. Chaporkar P, Kansanen K and Müller R (2009). On the delay-energy tradeoff in multiuser fading channels, EURASIP Journal on Wireless Communications and Networking, 2009, (1-14), Online publication date: 1-Jan-2009.
  1499. Razaghi P and Yu W (2009). Parity forwarding for multiple-relay networks, IEEE Transactions on Information Theory, 55:1, (158-173), Online publication date: 1-Jan-2009.
  1500. Merhav N and Weinberger M (2009). Universal simulation with fidelity criteria, IEEE Transactions on Information Theory, 55:1, (292-302), Online publication date: 1-Jan-2009.
  1501. Tam W, Lok T and Wong T (2009). Flow optimization in parallel relay networks with cooperative relaying, IEEE Transactions on Wireless Communications, 8:1, (278-287), Online publication date: 1-Jan-2009.
  1502. Zola J, Aluru M and Aluru S Parallel information theory based construction of gene regulatory networks Proceedings of the 15th international conference on High performance computing, (336-349)
  1503. Holzer R, Meer H and Bettstetter C On Autonomy and Emergence in Self-Organizing Systems Proceedings of the 3rd International Workshop on Self-Organizing Systems, (157-169)
  1504. Zeng Y and Doshi P An Information-Theoretic Approach to Model Identification in Interactive Influence Diagrams Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 02, (224-230)
  1505. ACM
    Seo J and Croft W Blog site search using resource selection Proceedings of the 17th ACM conference on Information and knowledge management, (1053-1062)
  1506. ACM
    Chen K, Pao H and Chang H Game bot identification based on manifold learning Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support for Games, (21-26)
  1507. Hayel Y, Lasaulce S, El-Azouzi R and Debbah M Introducing hierarchy in energy-efficient power control games Proceedings of the 3rd International Conference on Performance Evaluation Methodologies and Tools, (1-10)
  1508. ACM
    Tune P and Veitch D Towards optimal sampling for flow size estimation Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, (243-256)
  1509. Holzer R and de Meer H On modeling of self-organizing systems Proceedings of the 2nd International Conference on Autonomic Computing and Communication Systems, (1-6)
  1510. Antal P, Millinghoffer A, Hullám G, Szalai C and Falus A A Bayesian view of challenges in feature selection Proceedings of the 2008 International Conference on New Challenges for Feature Selection in Data Mining and Knowledge Discovery - Volume 4, (74-89)
  1511. ACM
    Yen L, Saerens M, Mantrach A and Shimbo M A family of dissimilarity measures between nodes generalizing both the shortest-path and the commute-time distances Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, (785-793)
  1512. ACM
    Wu J, Xiong H and Chen J SAIL Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, (740-748)
  1513. Gierlichs B, Batina L, Tuyls P and Preneel B Mutual Information Analysis Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems, (426-442)
  1514. Zhang Y and Ren K Towards address privacy in mobile ad hoc networks Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, (1-7)
  1515. Hermelin M, Cho J and Nyberg K Multidimensional Linear Cryptanalysis of Reduced Round Serpent Proceedings of the 13th Australasian conference on Information Security and Privacy, (203-215)
  1516. Morcos H, Atia G, Bestavros A and Matta I An Information Theoretic Framework for Field Monitoring Using Autonomously Mobile Sensors Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems, (332-345)
  1517. Zhang X, Ward T and McLoone S (2008). Towards an information model of consistency maintenance in distributed interactive applications, International Journal of Computer Games Technology, 2008, (1-10), Online publication date: 20-Jan-2008.
  1518. Ackermann M, Blömer J and Sohler C Clustering for metric and non-metric distance measures Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms, (799-808)
  1519. Drissi N, Chonavel T and Boucher J (2008). Generalized cumulative residual entropy for distributions with unrestricted supports, Research Letters in Signal Processing, 2008, (1-5), Online publication date: 1-Jan-2008.
  1520. Simeone O, Somekh O, Kramer G, Poor H and Shamai S (2008). Throughput of cellular systems with conferencing mobiles and cooperative base stations, EURASIP Journal on Wireless Communications and Networking, 2008, (1-14), Online publication date: 1-Jan-2008.
  1521. Ikeda K and Iwata K Information Geometry and Information Theory in Machine Learning Neural Information Processing, (295-304)
  1522. ACM
    Xu T and Cai Y Location anonymity in continuous location-based services Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems, (1-8)
  1523. Van Dijck G, Van Vaerenbergh J and Van Hulle M Information theoretic derivations for causality detection Proceedings of the 17th international conference on Artificial neural networks, (159-168)
  1524. Yeredor A ICA in Boolean XOR mixtures Proceedings of the 7th international conference on Independent component analysis and signal separation, (827-835)
  1525. Journée M, Absil P and Sepulchre R Optimization on the orthogonal group for independent component analysis Proceedings of the 7th international conference on Independent component analysis and signal separation, (57-64)
  1526. ACM
    Adamczyk P, Hafiz M, Balaguer F and Robinson C Network congestion control at the application layer Proceedings of the 14th Conference on Pattern Languages of Programs, (1-15)
  1527. ACM
    Kashyap A, Sengupta S, Bhatia R and Kodialam M (2007). Two-phase routing, scheduling and power control for wireless mesh networks with variable traffic, ACM SIGMETRICS Performance Evaluation Review, 35:1, (85-96), Online publication date: 12-Jun-2007.
  1528. ACM
    Dahmouni H, Vaton S and Rossé D A markovian signature-based approach to IP traffic classification Proceedings of the 3rd annual ACM workshop on Mining network data, (29-34)
  1529. ACM
    Kashyap A, Sengupta S, Bhatia R and Kodialam M Two-phase routing, scheduling and power control for wireless mesh networks with variable traffic Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, (85-96)
  1530. Ong S and Vadhan S Zero Knowledge and Soundness Are Symmetric Proceedings of the 26th annual international conference on Advances in Cryptology, (187-209)
  1531. Nikjah R and Beaulieu N On Jamming Capacity of General Multiuser CDMA Systems Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (191-196)
  1532. Karande S, Misra K and Radha H (2007). Survival of the fittest, Advances in Multimedia, 2007:1, (8-8), Online publication date: 1-Jan-2007.
  1533. Parshin V, Paradzinets A and Chen L Multimodal data fusion for video scene segmentation Proceedings of the 8th international conference on Visual Information and Information Systems, (279-289)
  1534. Meng Y and Wang Z Contextual Multi-armed Bandit Based Pricing Scheme for Cooperative D2D Communications 2020 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  1535. Huynh N, Hoang D, Nguyen D, Dutkiewicz E and Mueck M Defeating Smart and Reactive Jammers with Unlimited Power 2020 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  1536. Awan H and Chou C Demodulation of reaction shift keying signals in molecular communication network with protein kinase receiver circuit 2016 IEEE Wireless Communications and Networking Conference, (1-6)
  1537. Yao L, Mei J, Long H, Zhao L and Zheng K A novel multi-user grouping scheme for downlink non-orthogonal multiple access systems 2016 IEEE Wireless Communications and Networking Conference, (1-6)
  1538. Liu J, Xu W, Jin S and Dong X RF-chain constrained multi-pair massive MIMO relaying using hybrid precoding and detection 2016 IEEE Wireless Communications and Networking Conference, (1-6)
  1539. Banawan K, Ulukus S, Wang P and Henz B Multiband jamming strategies with minimum rate constraints 2016 IEEE Wireless Communications and Networking Conference, (1-6)
  1540. Tabib W, Whittaker R and Michael N Efficient multi-sensor exploration using dependent observations and conditional mutual information 2016 IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR), (42-47)
  1541. Kan Z, Ton C, McCourt M, Curtis J, Doucette E and Mehta S Mutual Information Based Risk-Aware Active Sensing in an Urban Environment 2015 IEEE International Conference on Systems, Man, and Cybernetics, (1178-1183)
  1542. Zorgui M, Rezki Z and Alouini M On achievable rates of interference and cognitive channels with a relay 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), (17-22)
  1543. Cataltepe Z, Ekmekci U, Cataltepe T and Kelebek I Online feature selected semi-supervised decision trees for network intrusion detection NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, (1085-1088)
  1544. White P, Buehrer R and Headley W FHSS Signal Separation using Constrained Clustering MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM), (159-164)
  1545. Camilo M, Moura D and Salles R Combined Interference and Communications Strategy as a Defense Mechanism in Cognitive Radio Military Networks MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM), (113-118)
  1546. Guan B and Goeckel D Achievable Information-Theoretic Secrecy in the Presence of a Radar MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM), (476-481)
  1547. Park J and Doherty J A steganographic approach for covert waveform design MILCOM 2016 - 2016 IEEE Military Communications Conference, (180-185)
  1548. Hannon M, Shaung Feng , Hyuck Kwon and Khanh Pham Jamming statistics-dependent frequency hopping MILCOM 2016 - 2016 IEEE Military Communications Conference, (138-143)
  1549. Elmahdy A, El-Keyi A, Mohasseb Y, ElBatt T, Nafie M and Seddik K Asymmetric degrees of freedom of the full-duplex MIMO 3-way channel 2016 IEEE Information Theory Workshop (ITW), (469-473)
  1550. de Kerret P, Gesbert D, Zhang J and Elia P Optimally bridging the gap from delayed to perfect CSIT in the K-user MISO BC 2016 IEEE Information Theory Workshop (ITW), (300-304)
  1551. Palzer L and Timo R A lower bound for the rate-distortion function of spike sources that is asymptotically tight 2016 IEEE Information Theory Workshop (ITW), (101-105)
  1552. Spanakis C, Mathioudakis E, Kampanis N, Tsiknakis M and Marias K A new approach in image registration 2016 IEEE International Conference on Imaging Systems and Techniques (IST), (449-453)
  1553. AlSuwaidi A, Veys C, Hussey M, Grieve B and Yin H Hyperspectral selection based algorithm for plant classification 2016 IEEE International Conference on Imaging Systems and Techniques (IST), (395-400)
  1554. Varasteh M, Simeone O and Gündüz D Joint source-channel coding with one-bit ADC front end 2016 IEEE International Symposium on Information Theory (ISIT), (3062-3066)
  1555. Li W, Bassi F and Kieffer M Sparse random linear network coding for data compression in WSNs 2016 IEEE International Symposium on Information Theory (ISIT), (2729-2733)
  1556. Tsiligkaridis T Asynchronous decentralized algorithms for the noisy 20 questions problem 2016 IEEE International Symposium on Information Theory (ISIT), (2699-2703)
  1557. Villacrés G and Koch T Wireless networks of bounded capacity 2016 IEEE International Symposium on Information Theory (ISIT), (2584-2588)
  1558. Jalali S and Poor H Universal compressed sensing 2016 IEEE International Symposium on Information Theory (ISIT), (2369-2373)
  1559. Rezagah F, Jalali S, Erkip E and Poor H Rate-distortion dimension of stochastic processes 2016 IEEE International Symposium on Information Theory (ISIT), (2079-2083)
  1560. Güler B, Gündüz D and Yener A On lossy transmission of correlated sources over a multiple access channel 2016 IEEE International Symposium on Information Theory (ISIT), (2009-2013)
  1561. de Kerret P and Gesbert D Network MIMO: Transmitters with no CSI can still be very useful 2016 IEEE International Symposium on Information Theory (ISIT), (1466-1470)
  1562. Kumar M and Sason I On projections of the Rényi divergence on generalized convex sets 2016 IEEE International Symposium on Information Theory (ISIT), (1123-1127)
  1563. Pichler G, Piantanida P and Matz G Distributed information-theoretic biclustering 2016 IEEE International Symposium on Information Theory (ISIT), (1083-1087)
  1564. Sima J and Chen W Polar codes for broadcast channels with receiver message side information and noncausal state available at the encoder 2016 IEEE International Symposium on Information Theory (ISIT), (993-997)
  1565. Li B, Wei S, Wang Y and Yuan J Chernoff information of bottleneck Gaussian trees 2016 IEEE International Symposium on Information Theory (ISIT), (970-974)
  1566. Huang P, Siegel P and Yaakobi E Performance of flash memories with different binary labelings: A multi-user perspective 2016 IEEE International Symposium on Information Theory (ISIT), (955-959)
  1567. Chen Z, Jaggi S and Langberg M The capacity of online (causal) q-ary error-erasure channels 2016 IEEE International Symposium on Information Theory (ISIT), (915-919)
  1568. Dey B, Jaggi S, Langberg M and Sarwate A A bit of delay is sufficient and stochastic encoding is necessary to overcome online adversarial erasures 2016 IEEE International Symposium on Information Theory (ISIT), (880-884)
  1569. Baccelli F and Woo J On the entropy and mutual information of point processes 2016 IEEE International Symposium on Information Theory (ISIT), (695-699)
  1570. Zhu J, Beirami A and Baron D Performance trade-offs in multi-processor approximate message passing 2016 IEEE International Symposium on Information Theory (ISIT), (680-684)
  1571. Reeves G and Pfister H The replica-symmetric prediction for compressed sensing with Gaussian matrices is exact 2016 IEEE International Symposium on Information Theory (ISIT), (665-669)
  1572. Pavlichin D and Weissman T Chained Kullback-Leibler divergences 2016 IEEE International Symposium on Information Theory (ISIT), (580-584)
  1573. Weinberger N and Shayevitz O On the optimal boolean function for prediction under quadratic loss 2016 IEEE International Symposium on Information Theory (ISIT), (495-499)
  1574. Hachem J, Niesen U and Diggavi S A layered caching architecture for the interference channel 2016 IEEE International Symposium on Information Theory (ISIT), (415-419)
  1575. Yang Q and Gündüz D Centralized coded caching for heterogeneous lossy requests 2016 IEEE International Symposium on Information Theory (ISIT), (405-409)
  1576. Magner A, Kihara D and Szpankowski W The Boltzmann sequence-structure channel 2016 IEEE International Symposium on Information Theory (ISIT), (255-259)
  1577. Li H Data driven quickest change detection: An algorithmic complexity approach 2016 IEEE International Symposium on Information Theory (ISIT), (21-25)
  1578. Silva J and Piantanida P Almost lossless variable-length source coding on countably infinite alphabets 2016 IEEE International Symposium on Information Theory (ISIT), (1-5)
  1579. Al-Ebraheemy O, Chaaban A, Al-Naffouri T and Alouini M Capacity bounds for the 2-user Gaussian IM-DD optical multiple-access channel 2016 IEEE International Symposium on Circuits and Systems (ISCAS), (2823-2826)
  1580. Neopane O, Das S, Arias-Castro E and Kreutz-Delgado K A nonparametric framework for quantifying generative inference on neuromorphic systems 2016 IEEE International Symposium on Circuits and Systems (ISCAS), (1346-1349)
  1581. Tabib W, Corah M, Michael N and Whittaker R Computationally efficient information-theoretic exploration of pits and caves 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), (3722-3727)
  1582. Vestergaard R, Lucani D and Zhang Q A Randomly Accessible Lossless Compression Scheme for Time-Series Data IEEE INFOCOM 2020 - IEEE Conference on Computer Communications, (2145-2154)
  1583. Viseras A, Wiedemann T, Manss C, Magel L, Mueller J, Shutin D and Merino L Decentralized multi-agent exploration with online-learning of Gaussian processes 2016 IEEE International Conference on Robotics and Automation (ICRA), (4222-4229)
  1584. Young S and Taubman D Rate-distortion optimized optical flow estimation 2015 IEEE International Conference on Image Processing (ICIP), (1677-1681)
  1585. Han P, Zhu J, Niu R and Baron D Multi-processor approximate message passing using lossy compression 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (6240-6244)
  1586. Li Y and Veeravalli V Outlying sequence detection in large datasets: Comparison of universal hypothesis testing and clustering 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (6180-6184)
  1587. Dey S, Madikeri S and Motlicek P Information theoretic clustering for unsupervised domain-adaptation 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (5580-5584)
  1588. Ligo J, Moustakides G and Veeravalli V Rate analysis for detection of sparse mixtures 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (4244-4248)
  1589. Wang Z, Babu P and Palomar D Optimal design of constant-modulus channel training sequences 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (3901-3905)
  1590. Calvo-Fullana M, Matamoros J, Antón-Haro C and Fosson S Sparsity-promoting sensor selection with energy harvesting constraints 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (3766-3770)
  1591. Nissel R and Rupp M On pilot-symbol aided channel estimation in FBMC-OQAM 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (3681-3685)
  1592. Kim J and Yoon J Honey chatting: A novel instant messaging system robust to eavesdropping over communication 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (2184-2188)
  1593. Karimzadeh M and Vu M Short Blocklength Priority-Based Coding for Unequal Error Protection in the AWGN Channel 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
  1594. Vestergaard R, Zhang Q and Lucani D Lossless Compression of Time Series Data with Generalized Deduplication 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
  1595. Mitev M, Chorti A, Belmega E and Reed M Man-in-the-Middle and Denial of Service Attacks in Wireless Secret Key Generation 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
  1596. Lameiro C, Santamaria I and Schreier P Benefits of Improper Signaling for Overlay Cognitive Radio 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
  1597. Cao W, Dytso A, Fauss M, Feng G and Poor H Robust Waterfilling for Approximately Gaussian Inputs 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
  1598. Xu Q, Sanyang M and Kaban A Large scale continuous EDA using mutual information 2016 IEEE Congress on Evolutionary Computation (CEC), (3718-3725)
  1599. Zhou J, Ji Z, Zhu Z and He S Metabolomics biomarker discovery using multimodal memetic algorithm and multivariate mutual information based feature selection 2016 IEEE Congress on Evolutionary Computation (CEC), (3193-3199)
  1600. Haghi A, Mohammadizadeh N and Khandani A Delay in cooperative communications: Higher multiplexing gain in Gaussian interference channels with full-duplex transmitters 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1486-1493)
  1601. Kiamari M and Avestimehr A Are generalized cut-set bounds tight for the deterministic interference channel? 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1430-1437)
  1602. Makur A and Zheng L Bounds between contraction coefficients 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1422-1429)
  1603. Chung H, Sadler B and Hero A Bounds on variance for symmetric unimodal distributions 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1235-1240)
  1604. Hassanzadeh P, Erkip E, Llorca J and Tulino A Distortion-memory tradeoffs in cache-aided wireless video delivery 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1150-1157)
  1605. Pokutta S Information theory and polyhedral combinatorics 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1119-1126)
  1606. Kidambi R and Kannan S On Shannon capacity and causal estimation 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (988-992)
  1607. Shkel Y, Tan V and Draper S Second-order coding rate for m-class source-channel codes 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (620-626)
  1608. Ramamoorthy S and Sinha M On the communication complexity of greater-than 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (442-444)
  1609. Pichler G, Piantanida P and Matz G Distributed information-theoretic biclustering of two memoryless sources 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (426-433)
  1610. Hsieh C and Barmish B On Kelly betting: Some limitations 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (165-172)
  1611. Nedich A and Minh Do Foreword 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1-1)
  1612. Liu Y, Jiang L, Yang D, Liu Y, Zhao J and Liu H Analysis on the joint independence of hand and wrist 2016 IEEE International Conference on Advanced Intelligent Mechatronics (AIM), (31-37)
  1613. Bruneau N, Guilley S, Heuser A, Marion D and Rioul O Less is More Cryptographic Hardware and Embedded Systems -- CHES 2015, (22-41)
  1614. Bolognesi T Single-Step and Asymptotic Mutual Information in Bipartite Boolean Nets From Software Engineering to Formal Methods and Tools, and Back, (519-530)
Contributors
  • Stanford University
  • IBM Research - Almaden

Recommendations

Alessandro Berni

This new edition of a classic textbook, fresh off the press 15 years after its first release, provides a through reorganization of previous material, as well as additional information on topics like universal source coding, network information theory, and portfolio theory. The contents are divided into 16 chapters, providing a progression of information theory concepts designed to be taught to undergraduate or graduate students in two quarters. Chapters 1 through 9 include the concepts of entropy and mutual information, the asymptotic equipartition property, data compression, and channel capacity (including the Gaussian channel). Chapters 10 to 16 cover more advanced (and applied) topics, including rate distortion, method of types, Kolmogorov complexity, network information theory, universal source coding, and portfolio theory. A final chapter presents a handy summary of the inequalities of information theory, as well as their relationship to inequalities in matrix and probability theory. Although the authors assume that readers already have a background in probability science, theorems and concepts of information theory are preceded by examples that trigger intuition, in order to focus the reader's attention on the more rigorous treatment of the topic that follows. Each chapter also contains a brief and effective introductory summary, a substantial number of examples and exercises (this new edition contains 200 new problems), and a historical summary, to offer a perspective on the concepts just discussed in the broader picture of information theory. The bibliographical section at the end of the book lists more than 600 references, including both classic material (such as Shannon's seminal work) and recent contributions to the field. Cover and Thomas have been successful in communicating the richness and power of information theory beyond its classical applications to communications systems, providing a comprehensive discussion of its relationship to computer science (Kolmogorov complexity), economics (portfolio theory and Kelly gambling), physics (thermodynamics and quantum information theory), and statistics (hypothesis testing and Fisher information). This topic is not an easy one, but the authors have successfully created a gradual and comprehensive treatment that will be of interest both to beginners, to bring them up to speed, and to experts, to give new hindsight and to broaden the scope of their knowledge. This book is recommended reading, both as a textbook and as a reference. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.