Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Loading…
AND-OR tree analysis of distributed LT codes
Sejdinovic, D., Piechocki, R.J., Doufexi, A.
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Get full text
Conference Proceeding
Loading…
Optimal amplify and forward strategy for two-way relay channel with multiple relays
Vaze, R., Heath, R.W.
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Get full text
Conference Proceeding
Loading…
Distortion-rate functions for quantized compressive sensing
Wei Dai, Hoa Vinh Pham, Milenkovic, O.
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Get full text
Conference Proceeding
Loading…
Universal weakly secure network coding
Silva, D., Kschischang, F.R.
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Get full text
Conference Proceeding
Loading…
Capacity region of the deterministic multi-pair bi-directional relay network
Avestimehr, A.S., Khajehnejad, M.A., Sezgin, A., Hassibi, B.
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Get full text
Conference Proceeding
Loading…
M-user cooperative wireless communications based on nonbinary network codes
Ming Xiao, Skoglund, M.
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Get full text
Conference Proceeding
Loading…
K-user interference channels: Achievable secrecy rate and degrees of freedom
Xiang He, Yener, A.
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Get full text
Conference Proceeding
Loading…
Secure bits through queues
Dunn, B.P., Bloch, M., Laneman, J.N.
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Get full text
Conference Proceeding
Loading…
Downlink scheduling using compressed sensing
Bhaskaran, S.R., Davis, L., Grant, A., Hanly, S., Tune, P.
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Get full text
Conference Proceeding
Loading…
Approximate capacity of the symmetric half-duplex Gaussian butterfly network
Avestimehr, A.S., Ho, T.
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Get full text
Conference Proceeding
Loading…
On a theory of network equivalence
Koetter, R., Effros, M., Medard, M.
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Get full text
Conference Proceeding
Loading…
A game theoretic approach to network coding
Marden, J.R., Effros, M.
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Get full text
Conference Proceeding
Loading…
Analog network coding mappings in Gaussian multiple-access two-hop channels
Sha Yao, Skoglund, M.
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Get full text
Conference Proceeding
Loading…
Harnessing bursty interference
Khude, N., Prabhakaran, V., Viswanath, P.
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Get full text
Conference Proceeding
Loading…
On the capacity of multisource non-coherent network coding
Mohajer, S., Jafari, M., Diggavi, S.N., Fragouli, C.
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Get full text
Conference Proceeding
Loading…
Three-user MIMO MACs with cooperation
Wigger, M.A., Kramer, G.
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Get full text
Conference Proceeding
Loading…
Recent results on pattern maximum likelihood
Acharya, J., Orlitsky, A., Pan, S.
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Get full text
Conference Proceeding
Loading…
Queueing performance under Network Coding
Abdelrahman, O.H., Gelenbe, E.
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Get full text
Conference Proceeding
Loading…
Three-user cognitive channels with cumulative message sharing: An achievable rate region
Nagananda, K.G., Murthy, C.R.
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Get full text
Conference Proceeding
Loading…
Optimized training and feedback for MIMO downlink channels
Kobayashi, M., Jindal, N., Caire, G.
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Published in 2009 IEEE Information Theory Workshop on Networking and Information Theory (01.06.2009)
Get full text
Conference Proceeding