Sciweavers

113
Voted
TIT
2016
40views Education» more  TIT 2016»
9 years 11 months ago
Upper Bound on List-Decoding Radius of Binary Codes
—Consider the problem of packing Hamming balls of a given relative radius subject to the constraint that they cover any point of the ambient Hamming space with multiplicity at mo...
Yury Polyanskiy
121
Voted
TIT
2016
34views Education» more  TIT 2016»
9 years 11 months ago
Semiconstrained Systems
Abstract—When transmitting information over a noisy channel, two approaches are common: assuming the channel errors are independent of the transmitted content and devising an err...
Ohad Elishco, Tom Meyerovitch, Moshe Schwartz
107
Voted
TIT
2016
40views Education» more  TIT 2016»
9 years 11 months ago
Bounds for Permutation Rate-Distortion
—We study the rate-distortion relationship in the set of permutations endowed with the Kendall τ-metric and the Chebyshev metric. Our study is motivated by the application of pe...
Farzad Farnoud Hassanzadeh, Moshe Schwartz, Jehosh...
107
Voted
TIT
2016
44views Education» more  TIT 2016»
9 years 11 months ago
Codes for Partially Stuck-At Memory Cells
—This paper studies a new model of stuck-at memory cells which is motivated by the defect model of multi-level cells in non-volatile memories such as flash memories and phase ch...
Antonia Wachter-Zeh, Eitan Yaakobi
120
Voted
TIT
2016
53views Education» more  TIT 2016»
9 years 11 months ago
On Asymptotic Incoherence and Its Implications for Compressed Sensing of Inverse Problems
Recently, it has been shown that incoherence is an unrealistic assumption for compressed sensing when applied to infinite-dimensional inverse problems. Instead, the key property ...
Alexander Daniel Jones, Ben Adcock, Anders C. Hans...
118
Voted
TIT
2016
38views Education» more  TIT 2016»
9 years 11 months ago
Sampling and Reconstruction of Operators
We study the recovery of operators with bandlimited Kohn-Nirenberg symbol from the action of such operators on a weighted impulse train, a procedure we refer to as operator sampli...
Götz E. Pfander, David Francis Walnut
125
Voted
TIT
2016
55views Education» more  TIT 2016»
9 years 11 months ago
Folding Alternant and Goppa Codes With Non-Trivial Automorphism Groups
The main practical limitation of the McEliece public-key encryption scheme is probably the size of its key. A famous trend to overcome this issue is to focus on subclasses of alte...
Jean-Charles Faugère, Ayoub Otmani, Ludovic...
118
Voted
TIT
2016
50views Education» more  TIT 2016»
9 years 11 months ago
Non-Negative Principal Component Analysis: Message Passing Algorithms and Sharp Asymptotics
Principal component analysis (PCA) aims at estimating the direction of maximal variability of a high-dimensional dataset. A natural question is: does this task become easier, and ...
Andrea Montanari, Emile Richard
TIST
2016
52views Education» more  TIST 2016»
9 years 11 months ago
Gaussian Processes for Independence Tests with Non-iid Data in Causal Inference
Seth R. Flaxman, Daniel B. Neill, Alexander J. Smo...