Sciweavers

TIT
2016
39views Education» more  TIT 2016»
10 years 14 days ago
Secure Degrees of Freedom Regions of Multiple Access and Interference Channels: The Polytope Structure
—In this paper, we determine the entire secure degrees of freedom (s.d.o.f.) regions of the K-user Gaussian multiple access (MAC) wiretap channel and the K-user interference chan...
Jianwei Xie, Sennur Ulukus
TIT
2016
48views Education» more  TIT 2016»
10 years 14 days ago
Opportunistic Detection Rules: Finite and Asymptotic Analysis
—Opportunistic detection rules (ODRs) are variants of fixed-sample-size detection rules in which the statistician is allowed to make an early decision on the alternative hypothe...
Wenyi Zhang, George V. Moustakides, H. Vincent Poo...
TIT
2016
37views Education» more  TIT 2016»
10 years 14 days ago
Dissipation of Information in Channels With Input Constraints
One of the basic tenets in information theory, the data processing inequality states that output divergence does not exceed the input divergence for any channel. For channels with...
Yury Polyanskiy, Yihong Wu 0001
TIT
2016
45views Education» more  TIT 2016»
10 years 14 days ago
Optimal Families of Perfect Polyphase Sequences From the Array Structure of Fermat-Quotient Sequences
—We show that a p-ary polyphase sequence of period p2 from the Fermat quotients is perfect. That is, its periodic autocorrelation is zero for all non-trivial phase shifts. We cal...
Ki-Hyeon Park, Hong-Yeop Song, Dae San Kim, Solomo...
TIT
2016
46views Education» more  TIT 2016»
10 years 14 days ago
Capacity of Non-Malleable Codes
Mahdi Cheraghchi, Venkatesan Guruswami