Sciweavers

TIT
2010
87views Education» more  TIT 2010»
12 years 11 months ago
Silence-based communication
We consider a power-efficient communication model for wireless sensor networks where silence is used to convey information. We study the average-case and worstcase complexities of ...
Anand K. Dhulipala, Christina Fragouli, Alon Orlit...
TIT
2010
121views Education» more  TIT 2010»
12 years 11 months ago
Mismatched estimation and relative entropy
A random variable with distribution P is observed in Gaussian noise and is estimated by a minimum meansquare estimator that assumes that the distribution is Q. This paper shows tha...
Sergio Verdú
TIT
2010
140views Education» more  TIT 2010»
12 years 11 months ago
Capacity regions and sum-rate capacities of vector Gaussian interference channels
The capacity regions of vector, or multiple
Xiaohu Shang, Biao Chen, Gerhard Kramer, H. Vincen...
TIT
2010
118views Education» more  TIT 2010»
12 years 11 months ago
On integer values of Kloosterman sums
Abstract. In this note we use Carlitz's lifting formula for Kloosterman sums and some results from the theory of cyclotomic fields to show that a Kloosterman sum over a finite...
Keijo Petteri Kononen, Marko Juhani Rinta-Aho, Kei...
TIT
2010
124views Education» more  TIT 2010»
12 years 11 months ago
Storage coding for wear leveling in flash memories
NAND flash memories are currently the most widely used type of flash memories. In a NAND flash memory, although a cell block consists of many pages, to rewrite one page, the whole ...
Anxiao Jiang, Robert Mateescu, Eitan Yaakobi, Jeho...
TIT
2010
105views Education» more  TIT 2010»
12 years 11 months ago
Multigroup ML decodable collocated and distributed space-time block codes
In this paper, collocated and distributed space-time block codes (DSTBCs) which admit multigroup maximum-likelihood (ML) decoding are studied. First, the collocated case is conside...
G. Susinder Rajan, B. Sundar Rajan
TIT
2010
100views Education» more  TIT 2010»
12 years 11 months ago
Successive refinement of vector sources under individual distortion criteria
The well-known successive refinement scenario is extended to vector sources where individual distortion constraints are posed on every vector component. This extension is then util...
Jayanth Nayak, Ertem Tuncel, Deniz Gündü...
TIT
2010
150views Education» more  TIT 2010»
12 years 11 months ago
Information-theoretic key agreement of multiple terminals: part I
This is the first part of a two-part paper on information-theoretically secure secret key agreement. In this part, we study the secrecy problem under the widely studied source mod...
Amin Aminzadeh Gohari, Venkat Anantharam
TIT
2010
141views Education» more  TIT 2010»
12 years 11 months ago
Distributed averaging via lifted Markov chains
Abstract--Motivated by applications of distributed linear estimation, distributed control, and distributed optimization, we consider the question of designing linear iterative algo...
Kyomin Jung, Devavrat Shah, Jinwoo Shin