Movatterモバイル変換


[0]ホーム

URL:


Schloss Dagstuhl - Leibniz Center for Informatics
For some weeks now, the dblp team has been receiving anexceptionally high number of support and error correction requests from the community. While we are grateful and happy to process all incoming emails, please assume thatit will currently take us several weeks to read and address your request. Most importantly,please refrain from sending your request multiple times. This will not advance your issue and will only complicate and extend the time required to address it. Thank you for your understanding.
Joint Declaration:The freedom of science is at the heart of liberal, democratic societies. Without this freedom, it is impossible for scientific efforts to be geared toward gaining knowledge and facts. It is therefore extremely worrying that the scientific freedom is coming under increasing pressure in various regions of the world.(read more)
search dblp
search dblp

default search action

Authors:
  • no matches
  • waiting...
Venues:
  • no matches
  • waiting...
Publications:
  • no matches
  • waiting...
clear
ask others

ask others

ISIT 2012: Cambridge, MA, USA

SPARQL queries 

run query for this table of contents

or build your own?

Refine list

note

refinements active!

zoomed in on?? of?? records

    view refined list in

    export refined list as

    showing all?? records

    Source Coding with Side Information

    Multiple Access Codes

    Two-Unicast Networks

    Secrecy Modesl in Wiretap Channels

    List Decoding and Reed-Solomon Codes

    Combinatorical Problems in Coding

    Gaussian Channels

    Information Theoretic Tools and Properties

    Theory of Quantum Error Correction

    Network Source Coding with Side Information

    Variations on Broadcast Channels

    Multi-Hop Multi-Flow Wireless Networks

    Wiretap Channels with Feedback, Side Information, and Common Messaes

    Reed-Muller Codes

    Constrained Coding

    Capacity of Gaussian Channels

    Distributed Detection and Estimation

    Quantum Codes from Classical Codes

    Lossy Source Coding

    Three-Receiver Broadcast Channels

    *-and-Forward Relaying

    Secure Communications

    Spatially-Coupled Coding

    Codes and Their Applications

    Deletion Channels

    Directed Information, Common Information, and Divergence

    Communication Problems in Quantum Optics

    TheSlepian-Wolf and CEO Problems

    Capacity of Broadcast Channels

    Connectivity and Interference

    Structured Codes

    Codes and Graphs

    Identifying Codes and Power Line Communications

    Capacity of Finite-Alphabet Channels

    Information and Estimation

    Quantum Channels in Network Information Theory

    Coding for L1 Distance and Asymmetric Errors

    Multiterminal Source Coding

    Relay Channels

    Energy-Efficient Communication

    Finite Blocklength Analysis

    Boolean Functions and Related Topics

    Continuous Time Channels and Shannon Ordering

    Prediction and Estimation

    Secrecy in Quantum Communications

    Finite Blocklength Analysis for Source Coding

    Code Design for Relay Channels

    Energy Harvesting

    Distributed Applications

    Coding for Flash Memories

    Sequences:Theory and Applications

    Tools for Bounding Capacity

    Probability and Estimation

    Tools for Quantum Information Theory

    Lossless and Universal Source Coding

    Relay Channels in Wireless Networks

    Cellular Networks

    Secrecy in Computation and Communication

    Regenerating Codes

    Sequences and Their Properties

    Approximate Belief Propagation

    Information Inequalities

    Compressive Sensing

    Network Coding:Code Design and Resource Allocation

    Relay Strategies for Network Communications

    Energy Issues in Communication Systems

    Multiple Description Coding

    WOM Codes

    New Sequence Constructions

    Communication Theory

    Estimation and Detection

    Sampling and Signaling

    Network Coding:Security and Reliability

    Relaying over Interference Networks

    Degrees of Freedom and Scaling

    Joint Source-Channel Codes

    Linear Codes and UEP Codes

    Synchrony and Perfect Secrecy

    Medium Access Control

    Portfolios and Estimation

    Compressive Sensing and Phase Transitions

    Network Coding:Capadity and Bounds

    Multiple Access Channels with Side Information

    MIMO Capacity

    Coding with Lattices

    Rateless Codes

    Secret Key Generation and Sharing

    Cognitive Channels

    Group Testing and Detection

    Compressive Sensing and Algorithms

    Interference Channels with Delayed CSI

    Network Coding for Multiple Unicast Sessions

    Deterministic Models

    Joint Source-Channel Coding in Networks

    Polar Codes:Theory and Practice

    Authentication and Signatures

    Message Passing Algorithms

    Patterns, Estimation, Hypothesis Testing

    L1-Regularized Least Squares and Frames

    Network Coding for Wireless

    Interference Alignment

    Deterministic Channels

    Classical and Adversarial Joint Source-Channel Coding

    Polar Codes over Non-Binary Alphabets

    Cryptanalysis and Distributed Guessing

    Fading Channels

    Hypothesis Testing

    L1-Regularized Least Squares and Sparsity

    Index Coding

    Interference Channels

    MIMO Precoding

    Gaussian Wiretap Channels

    Analysis of LDPC Codes

    Convolutional and Turbo Codes

    Communication Systems

    Coded Modulation

    Fourier Subsampling

    Network Erasure Correction

    Subspace Interference Alignment and Feasibility Conditions

    Multiple-Antenna Broadcast Channels

    Game Theory

    New Constructions of LDPC Codes

    Applications of Codes in Cryptography

    Topics in Shannon Theory

    High-Dimensional Inference

    Data Exchange and Gathering

    Opportunistic and Relay-Aided Interference Alignment

    Topics in MIMO

    Delay and Distributed Scheduling

    Decoding Algorithms for Codes on Graphs

    Fundamental Limits on Complexity

    Tree Learning

    Strings, Sorting, and Biology

    Coded Storage and Caching

    Gaussian Interference Channels

    MIMO Coding

    Delay and Deadline Constrained Communication

    Decoding Techniques for LDPC Codes

    Cyclic Codes and Symbol-Pair Codes

    Feedback

    Error Exponents

    Information Theory in Biology

    Rank-Modulation Coding

    Communication and Computation over Multiple Access Channels

    MIMO Equalization, Diversity and Optimization

    Comunication Models

    Cyclic and Quasicyclic LDPC Codes

    Codes over Rings

    Interference Channels with Feedback

    manage site settings

    To protect your privacy, all features that rely on external API calls from your browser areturned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more informationsee our F.A.Q.

    Unpaywalled article links

    Add open access links fromunpaywall.org to the list of external document links (if available).

    load links from unpaywall.org

    Privacy notice: By enabling the option above, your browser will contact the API ofunpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theUnpaywall privacy policy.

    Archived links via Wayback Machine

    For web page which are no longer available, try to retrieve content from theweb.archive.org of the Internet Archive (if available).

    load content from archive.org

    Privacy notice: By enabling the option above, your browser will contact the API ofarchive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theInternet Archive privacy policy.

    Reference lists

    Add a list of references fromcrossref.org,opencitations.net, andsemanticscholar.org to record detail pages.

    load references from crossref.org and opencitations.net

    Privacy notice: By enabling the option above, your browser will contact the APIs ofcrossref.org,opencitations.net, andsemanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theCrossref privacy policy and theOpenCitations privacy policy, as well as theAI2 Privacy Policy covering Semantic Scholar.

    Citation data

    Add a list of citing articles fromopencitations.net andsemanticscholar.org to record detail pages.

    load citations from opencitations.net

    Privacy notice: By enabling the option above, your browser will contact the API ofopencitations.net andsemanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theOpenCitations privacy policy as well as theAI2 Privacy Policy covering Semantic Scholar.

    OpenAlex data

    Load additional information about publications fromopenalex.org.

    load data from openalex.org

    Privacy notice: By enabling the option above, your browser will contact the API ofopenalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given byOpenAlex.

    w3c valid html last updated on 2025-07-18 00:42 CEST by thedblp team

    cc zero all metadata released asopen data underCC0 1.0 license

    see also:Terms of Use |Privacy Policy |Imprint

    dblp was originally created in 1993 at:

    University of Trier  

    since 2018, dblp has been operated and maintained by:

    Schloss Dagstuhl - Leibniz Center for Informatics  

    the dblp computer science bibliography is funded and supported by:

    BMBF  RLP  SL  Leibniz  DFG  NFDI  

    [8]ページ先頭

    ©2009-2025 Movatter.jp