Reed-Solomon based nonbinary LDPC codes
Juane Li, Keke Liu, Shu Lin, Ghaffar, Khaled Abdel
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Get full text
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Conference Proceeding
Low-complexity quantization of discrete memoryless channels
Zhang, Jiuyang Alan, Kurkoski, Brian M.
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Get full text
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Conference Proceeding
A dynamic programming algorithm to construct optimal code trees of AIFV codes
Iwata, Ken-ichi, Yamamoto, Hirosuke
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Get full text
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Conference Proceeding
Error-trapping decoding for cyclic codes over symbol-pair read channels
Morii, Masakatu, Hirotomo, Masanori, Takita, Makoto
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Get full text
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Conference Proceeding
On normalized belief of Gaussian BP in correlated large MIMO channels
Takahashi, Takumi, Ibi, Shinsuke, Ohgane, Takeo, Sampei, Seiichi
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Get full text
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Conference Proceeding
Avoiding trapping sets in SC-LDPC codes under windowed decoding
Beemer, Allison, Kelley, Christine A.
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Get full text
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Conference Proceeding
Effective construction of compression-based feature space
Koga, Hisashi, Nakajima, Yuji, Toda, Takahisa
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Get full text
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Conference Proceeding
Evaluation of overflow probability of Bayes code in moderate deviation regime
Saito, Shota, Matsushima, Toshiyasu
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Get full text
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Conference Proceeding
On secure communication over the multiple access channel
Yanling Chen, Koyluoglu, O. Ozan, Vinck, A. J. Han
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Get full text
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Conference Proceeding
Exponent function for asymmetric broadcast channels at rates outside the capacity region
Oohama, Yasutada
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Get full text
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Conference Proceeding
Small secret exponent attacks on RSA with unbalanced prime factors
Takayasu, Atsushi, Kunihiro, Noboru
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Get full text
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Conference Proceeding
Improved delivery rate-cache capacity trade-off for centralized coded caching
Amiri, Mohammad Mohammadi, Gunduz, Deniz
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Get full text
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Conference Proceeding
Average secrecy capacity of free-space optical communication systems with on-off keying modulation and threshold detection
Jinxiao Zhu, Yin Chen, Sasaki, Masahide
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Get full text
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Conference Proceeding
On the stationary distribution of asymmetric numeral systems
Yokoo, Hidetoshi
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Get full text
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Conference Proceeding
Formalization of coding theory using lean
Hagiwara, Manabu, Nakano, Kyosuke, Kong, Justin
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Get full text
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Conference Proceeding
Nonexistence of perfect permutation codes in the Ulam metric
Kong, Justin, Hagiwara, Manabu
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Get full text
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Conference Proceeding
Reliability function and strong converse of biometrical identification systems
Yachongka, Vamoua, Yagi, Hideki
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Get full text
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2016)
Conference Proceeding