Sciweavers

109
Voted
TIT
2008
187views more  TIT 2008»
15 years 3 days ago
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
Abstract--In the bounded-storage model (BSM) for information-theoretic secure encryption and key agreement, one makes use of a random string R whose length t is greater than the as...
Stefan Dziembowski, Ueli M. Maurer
TIT
2008
149views more  TIT 2008»
15 years 3 days ago
An Improved Bound on the List Error Probability and List Distance Properties
A new upper bound on the list error probability is presented. This bound is derived by combining the techniques for obtaining the tangential union bound with an improved bound on t...
Irina E. Bocharova, Rolf Johannesson, Boris D. Kud...
110
Voted
TIT
2008
119views more  TIT 2008»
15 years 17 days ago
Bit-Level Equalization and Soft Detection for Gray-Coded Multilevel Modulation
This paper investigates iterative soft-in soft-out (SISO) detection in coded multiple access channels, with Gray-coded M-ary quadrature amplitude modulation (QAM) for the channel ...
Darryl Dexu Lin, Teng Joon Lim
TIT
2008
109views more  TIT 2008»
15 years 17 days ago
Statistical Analysis of Bayes Optimal Subset Ranking
Abstract--The ranking problem has become increasingly important in modern applications of statistical methods in automated decision making systems. In particular, we consider a for...
David Cossock, Tong Zhang
88
Voted
TIT
2008
123views more  TIT 2008»
15 years 17 days ago
Geometric Upper Bounds on Rates of Variable-Basis Approximation
In this paper, approximation by linear combinations of an increasing number n of computational units with adjustable parameters (such as perceptrons and radial basis functions) is ...
Vera Kurková, Marcello Sanguineti
TIT
2008
93views more  TIT 2008»
15 years 17 days ago
Aspects of Pairing Inversion
Abstract. We discuss some applications of the pairing inversion problem and outline some potential approaches for solving it. Our analysis of these approaches gives further evidenc...
Steven D. Galbraith, Florian Hess, Frederik Vercau...
TIT
2008
78views more  TIT 2008»
15 years 17 days ago
New Binary Sequences With Optimal Autocorrelation Magnitude
New binary sequences of period
Nam Yul Yu, Guang Gong
74
Voted
TIT
2008
86views more  TIT 2008»
15 years 17 days ago
A One-to-One Code and Its Anti-Redundancy
One-to-one codes are "one shot" codes that assign a distinct codeword to source symbols and are not necessarily prefix codes (more generally, uniquely decodable). For ex...
Wojciech Szpankowski
112
Voted
TIT
2008
83views more  TIT 2008»
15 years 17 days ago
The Information Lost in Erasures
Abstract--We consider sources and channels with memory observed through erasure channels. In particular, we examine the impact of sporadic erasures on the fundamental limits of los...
Sergio Verdú, Tsachy Weissman
80
Voted
TIT
2008
76views more  TIT 2008»
15 years 17 days ago
On the Role of Estimate-and-Forward With Time Sharing in Cooperative Communication
In this paper, we focus on the general relay channel. We investigate the application of the estimate-and-forward (EAF) relaying scheme to different scenarios. Specifically, we stud...
Ron Dabora, Sergio D. Servetto