Movatterモバイル変換


[0]ホーム

URL:


Schloss Dagstuhl - Leibniz Center for Informatics
For some weeks now, the dblp team has been receiving anexceptionally high number of support and error correction requests from the community. While we are grateful and happy to process all incoming emails, please assume thatit will currently take us several weeks to read and address your request. Most importantly,please refrain from sending your request multiple times. This will not advance your issue and will only complicate and extend the time required to address it. Thank you for your understanding.
Joint Declaration:The freedom of science is at the heart of liberal, democratic societies. Without this freedom, it is impossible for scientific efforts to be geared toward gaining knowledge and facts. It is therefore extremely worrying that the scientific freedom is coming under increasing pressure in various regions of the world.(read more)
search dblp
search dblp

default search action

Authors:
  • no matches
  • waiting...
Venues:
  • no matches
  • waiting...
Publications:
  • no matches
  • waiting...
clear
ask others

ask others

ISIT 2014: Honolulu, HI, USA

SPARQL queries 

run query for this table of contents

or build your own?

Refine list

note

refinements active!

zoomed in on?? of?? records

    view refined list in

    export refined list as

    showing all?? records

    Lossy Source Coding

    Wiretap Channel

    Caching for Wireless

    Ad Hoc Networks

    Network Information Theory 1

    Fundamentals of Network Coding

    Polar Coding

    Classical-Quantum Channels

    Quantization

    MIMO Wiretap Channel

    Approximate Message Passage

    Wireless Networks

    Network Information Theory 2

    Index Coding 1

    Polar Coding - Theory and Practice

    Quantum Sensing and Measurements

    Renyi Entropy and f-divergence

    Degrees of Freedom

    Topics in Secrecy 1

    Coding and Communication Theory

    Network Information Theory 3

    Index Coding 2

    Applications of Spatially Coupled Codes

    Quantum Protocols

    Hypothesis Testing

    Multiterminal Source Coding 1

    Secrecy Measures

    MIMO Channels

    Relay Networks

    Interference

    Locally Repairable Codes

    Pseudocodewords, Trapping Sets and Instantons

    Quantum Shannon Theory

    Sequential Detection

    Multiterminal Source Coding 2

    Network Security

    Energy Harvesting 1

    Interference Channels 1

    Emerging Problems in Network Coding and Distributed Storage

    Analysis of Spatially Coupled Codes

    Quantum Error Control Codes 1

    Information Theoretic Approaches to Prediction

    Multiterminal Source Coding 3

    Coding Schemes for Secrecy

    Energy Harvesting 2

    Cellular Networks

    Interference Channels 2

    Distributed Storage - Repair and Generation 1

    Interdisciplinary Coding Theory

    Quantum Error Control Codes 2

    Markov Models and Estimation

    Interdisciplinary Information Theory

    Secret-Key Capacity

    Resource Allocation and Energy Harvesting

    Cooperative Communications

    Interference Alignment

    Generalized Sphere Packing Bound:Applications

    Problems in Bioinformatics and Neuroscience

    Sampling and Sensing

    Distributed Lossless Source Coding

    Reed-Solomon Codes for Secrecy

    Scheduling and Power Control

    Cognitive Radios

    Interference Channel with Cooperation

    Algebraic Coding Theory 1

    Quantum Communication and Security

    Estimation and Statistical Physics

    Joint Source-Channel Coding

    Cryptography and Secrecy

    Modulation and Demodulation

    Wireless Network Protocols

    Interference Management for Cellular

    Calculus

    Applications of Polar Coding Techniques

    Sequences

    Density and Model Estimation

    Source-Channel Coding with Finite Blocklength

    Biometrics & Cryptography

    Topics in Wireless Communications

    Interference Channels 3

    Topics in Coding and Communications

    Sequences & Functions over Finite Fields

    Approximation Algorithms and Signal Processing

    Lossless Universal Source Coding

    Finite Blocklength Capacity

    MIMO Multiple Access Channels With Low-Rate Feedback

    Relaying Schemes

    Discrete Memoryless Broadcast Channels 1

    Topics in Distributed Storage

    Applications of Codes on Graphs in Communications

    Nonlinear Compressed Sensing

    Graphical Models and Inference

    Source Coding

    Finite Blocklength & Fading Channels

    Coding For Flash Memories

    Relay Channels

    Discrete Memoryless Broadcast Channels 2

    Topics in Network Coding 1

    Rateless Code Design

    Dimensionality Reduction

    Information-Estimation Relationships

    Distributed Information Processing

    Jamming, Collusion, Privacy

    Coding for Memories On the Capacity of Write-Constrained Memories

    Topics in Learning

    Dirty Paper Coding

    Topics in Network Coding 2

    Spatially Coupled Systems

    Lattice Codes

    Group Testing

    Sequential Transmission & Feedback

    Topics in Secrecy 2

    Rank Modulation Codes

    Topics in Networks

    Continuous-Time Information Theory

    Distributed Storage - Repair and Generation 2

    Non-Binary LDPC Codes

    Information Measures

    Lossless Compression

    Finite Blocklength & Error Exponents

    Uplink and Downlink

    Gaussian Channel with Feedback

    Broadcast Channels with Imperfect CSI

    Decoding and Encoding Algorithms for Algebraic Codes

    Analysis of Iterative Decoding Algorithms

    Topics in Signal Processing

    Markov Fields Types and Tilings

    Successive Refinement

    Finite Blocklength Source Coding

    Backhaul Design for Cellular Systems

    Multi-way Relay Channel

    Two-user IC

    Deletion Correction in Permutations

    Topics in LDPC and Turbo Coding

    Optical Communications

    Information Inequalities

    Rate Distortion for Gaussian Sources

    Variations on Channel Capacity

    Fading Channels

    Capacity Approximation

    Multiple Access Channel

    Algebraic Coding Theory 2

    Decoding of Polar Codes

    Linear Inverse Problems 1

    Information Theory & Statistics

    Variations on Lossy Source Coding

    Capacity with Constraints or Mismatch

    MIMO Systems

    Variations on MAC

    Code Distance and Weight Enumerators

    LDPC and Turbo Code Analysis

    Linear Inverse Problems 2

    manage site settings

    To protect your privacy, all features that rely on external API calls from your browser areturned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more informationsee our F.A.Q.

    Unpaywalled article links

    Add open access links fromunpaywall.org to the list of external document links (if available).

    load links from unpaywall.org

    Privacy notice: By enabling the option above, your browser will contact the API ofunpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theUnpaywall privacy policy.

    Archived links via Wayback Machine

    For web page which are no longer available, try to retrieve content from theweb.archive.org of the Internet Archive (if available).

    load content from archive.org

    Privacy notice: By enabling the option above, your browser will contact the API ofarchive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theInternet Archive privacy policy.

    Reference lists

    Add a list of references fromcrossref.org,opencitations.net, andsemanticscholar.org to record detail pages.

    load references from crossref.org and opencitations.net

    Privacy notice: By enabling the option above, your browser will contact the APIs ofcrossref.org,opencitations.net, andsemanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theCrossref privacy policy and theOpenCitations privacy policy, as well as theAI2 Privacy Policy covering Semantic Scholar.

    Citation data

    Add a list of citing articles fromopencitations.net andsemanticscholar.org to record detail pages.

    load citations from opencitations.net

    Privacy notice: By enabling the option above, your browser will contact the API ofopencitations.net andsemanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theOpenCitations privacy policy as well as theAI2 Privacy Policy covering Semantic Scholar.

    OpenAlex data

    Load additional information about publications fromopenalex.org.

    load data from openalex.org

    Privacy notice: By enabling the option above, your browser will contact the API ofopenalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given byOpenAlex.

    w3c valid html last updated on 2025-07-18 00:42 CEST by thedblp team

    cc zero all metadata released asopen data underCC0 1.0 license

    see also:Terms of Use |Privacy Policy |Imprint

    dblp was originally created in 1993 at:

    University of Trier  

    since 2018, dblp has been operated and maintained by:

    Schloss Dagstuhl - Leibniz Center for Informatics  

    the dblp computer science bibliography is funded and supported by:

    BMBF  RLP  SL  Leibniz  DFG  NFDI  

    [8]ページ先頭

    ©2009-2025 Movatter.jp