IEEE Transactions on Information Theory
- Vol: 22 Issue: 1
- Vol: 22 Issue: 2
- Vol: 22 Issue: 3
- Vol: 22 Issue: 4
- Vol: 22 Issue: 5
- Vol: 22 Issue: 6
- Vol: 21 Issue: 1
- Vol: 21 Issue: 2
- Vol: 21 Issue: 3
- Vol: 21 Issue: 4
- Vol: 21 Issue: 5
- Vol: 21 Issue: 6
- Vol: 20 Issue: 1
- Vol: 20 Issue: 2
- Vol: 20 Issue: 3
- Vol: 20 Issue: 4
- Vol: 20 Issue: 5
- Vol: 20 Issue: 6
- Vol: 19 Issue: 1
- Vol: 19 Issue: 2
- Vol: 19 Issue: 3
- Vol: 19 Issue: 4
- Vol: 19 Issue: 5
- Vol: 19 Issue: 6
- Vol: 18 Issue: 1
- Vol: 18 Issue: 2
- Vol: 18 Issue: 3
- Vol: 18 Issue: 4
- Vol: 18 Issue: 5
- Vol: 18 Issue: 6
- Vol: 17 Issue: 1
- Vol: 17 Issue: 2
- Vol: 17 Issue: 3
- Vol: 17 Issue: 4
- Vol: 17 Issue: 5
- Vol: 17 Issue: 6
- Vol: 16 Issue: 1
- Vol: 16 Issue: 2
- Vol: 16 Issue: 3
- Vol: 16 Issue: 4
- Vol: 16 Issue: 5
- Vol: 16 Issue: 6
- Vol: 25 Issue: 1
- Vol: 25 Issue: 2
- Vol: 25 Issue: 3
- Vol: 25 Issue: 4
- Vol: 25 Issue: 5
- Vol: 25 Issue: 6
- Vol: 24 Issue: 1
- Vol: 24 Issue: 2
- Vol: 24 Issue: 3
- Vol: 24 Issue: 4
- Vol: 24 Issue: 5
- Vol: 24 Issue: 6
- Vol: 23 Issue: 1
- Vol: 23 Issue: 2
- Vol: 23 Issue: 3
- Vol: 23 Issue: 4
- Vol: 23 Issue: 5
- Vol: 23 Issue: 6
- Vol: 47 Issue: 1
- Vol: 47 Issue: 2
- Vol: 47 Issue: 3
- Vol: 47 Issue: 4
- Vol: 47 Issue: 5
- Vol: 47 Issue: 6
- Vol: 47 Issue: 7
- Vol: 36 Issue: 1
- Vol: 36 Issue: 2
- Vol: 36 Issue: 3
- Vol: 36 Issue: 4
- Vol: 36 Issue: 5
- Vol: 36 Issue: 6
- Vol: 46 Issue: 1
- Vol: 46 Issue: 2
- Vol: 46 Issue: 3
- Vol: 46 Issue: 4
- Vol: 46 Issue: 5
- Vol: 46 Issue: 6
- Vol: 46 Issue: 7
- Vol: 33 Issue: 1
- Vol: 33 Issue: 2
- Vol: 33 Issue: 3
- Vol: 33 Issue: 4
- Vol: 33 Issue: 5
- Vol: 33 Issue: 6
- Vol: 32 Issue: 1
- Vol: 32 Issue: 2
- Vol: 32 Issue: 3
- Vol: 32 Issue: 4
- Vol: 32 Issue: 5
- Vol: 32 Issue: 6
- Vol: 31 Issue: 1
- Vol: 31 Issue: 2
- Vol: 31 Issue: 3
- Vol: 31 Issue: 4
- Vol: 31 Issue: 5
- Vol: 31 Issue: 6
- Vol: 30 Issue: 1
- Vol: 30 Issue: 2
- Vol: 30 Issue: 3
- Vol: 30 Issue: 4
- Vol: 30 Issue: 5
- Vol: 30 Issue: 6
- Vol: 29 Issue: 1
- Vol: 29 Issue: 2
- Vol: 29 Issue: 3
- Vol: 29 Issue: 4
- Vol: 29 Issue: 5
- Vol: 29 Issue: 6
- Vol: 28 Issue: 1
- Vol: 28 Issue: 2
- Vol: 28 Issue: 3
- Vol: 28 Issue: 4
- Vol: 28 Issue: 5
- Vol: 28 Issue: 6
- Vol: 27 Issue: 1
- Vol: 27 Issue: 2
- Vol: 27 Issue: 3
- Vol: 27 Issue: 4
- Vol: 27 Issue: 5
- Vol: 27 Issue: 6
- Vol: 26 Issue: 1
- Vol: 26 Issue: 2
- Vol: 26 Issue: 3
- Vol: 26 Issue: 4
- Vol: 26 Issue: 5
- Vol: 26 Issue: 6
- Vol: 35 Issue: 1
- Vol: 35 Issue: 2
- Vol: 35 Issue: 3
- Vol: 35 Issue: 4
- Vol: 35 Issue: 5
- Vol: 35 Issue: 6
- Vol: 34 Issue: 1
- Vol: 34 Issue: 2
- Vol: 34 Issue: 3
- Vol: 34 Issue: 4
- Vol: 34 Issue: 5 Part: 1
- Vol: 34 Issue: 6
- Vol: 58 Issue: 1
- Vol: 58 Issue: 2
- Vol: 58 Issue: 3
- Vol: 58 Issue: 4
- Vol: 58 Issue: 5
- Vol: 58 Issue: 6
- Vol: 58 Issue: 7
- Vol: 58 Issue: 8
- Vol: 58 Issue: 9
- Vol: 58 Issue: 10
- Vol: 58 Issue: 11
- Vol: 58 Issue: 12
- Vol: 57 Issue: 1
- Vol: 57 Issue: 2
- Vol: 57 Issue: 3
- Vol: 57 Issue: 4
- Vol: 57 Issue: 5
- Vol: 57 Issue: 6
- Vol: 57 Issue: 7
- Vol: 57 Issue: 8
- Vol: 57 Issue: 9
- Vol: 57 Issue: 10
- Vol: 57 Issue: 11
- Vol: 57 Issue: 12
- Vol: 56 Issue: 1
- Vol: 56 Issue: 2
- Vol: 56 Issue: 3
- Vol: 56 Issue: 4
- Vol: 56 Issue: 5
- Vol: 56 Issue: 6
- Vol: 56 Issue: 7
- Vol: 56 Issue: 8
- Vol: 56 Issue: 9
- Vol: 56 Issue: 10
- Vol: 56 Issue: 11
- Vol: 56 Issue: 12
- Vol: 55 Issue: 1
- Vol: 55 Issue: 2
- Vol: 55 Issue: 3
- Vol: 55 Issue: 4
- Vol: 55 Issue: 5
- Vol: 55 Issue: 6
- Vol: 55 Issue: 7
- Vol: 55 Issue: 8
- Vol: 55 Issue: 9
- Vol: 55 Issue: 10
- Vol: 55 Issue: 11
- Vol: 55 Issue: 12
- Vol: 44 Issue: 1
- Vol: 44 Issue: 2
- Vol: 44 Issue: 3
- Vol: 44 Issue: 4
- Vol: 44 Issue: 5
- Vol: 44 Issue: 6
- Vol: 44 Issue: 7
- Vol: 54 Issue: 1
- Vol: 54 Issue: 2
- Vol: 54 Issue: 3
- Vol: 54 Issue: 4
- Vol: 54 Issue: 5
- Vol: 54 Issue: 6
- Vol: 54 Issue: 7
- Vol: 54 Issue: 8
- Vol: 54 Issue: 9
- Vol: 54 Issue: 10
- Vol: 54 Issue: 11
- Vol: 54 Issue: 12
- Vol: 43 Issue: 1
- Vol: 43 Issue: 2
- Vol: 43 Issue: 3
- Vol: 43 Issue: 4
- Vol: 43 Issue: 5
- Vol: 43 Issue: 6
- Vol: 53 Issue: 1
- Vol: 53 Issue: 2
- Vol: 53 Issue: 3
- Vol: 53 Issue: 4
- Vol: 53 Issue: 5
- Vol: 53 Issue: 6
- Vol: 53 Issue: 7
- Vol: 53 Issue: 8
- Vol: 53 Issue: 9
- Vol: 53 Issue: 10
- Vol: 53 Issue: 11
- Vol: 53 Issue: 12
- Vol: 42 Issue: 1
- Vol: 42 Issue: 2
- Vol: 42 Issue: 3
- Vol: 42 Issue: 4
- Vol: 42 Issue: 5
- Vol: 42 Issue: 6 Part: 1
- Vol: 42 Issue: 6 Part: 2
- Vol: 52 Issue: 1
- Vol: 52 Issue: 2
- Vol: 52 Issue: 3
- Vol: 52 Issue: 4
- Vol: 52 Issue: 5
- Vol: 52 Issue: 6
- Vol: 52 Issue: 7
- Vol: 52 Issue: 8
- Vol: 52 Issue: 9
- Vol: 52 Issue: 10
- Vol: 52 Issue: 11
- Vol: 52 Issue: 12
- Vol: 41 Issue: 1
- Vol: 41 Issue: 2
- Vol: 41 Issue: 3
- Vol: 41 Issue: 4
- Vol: 41 Issue: 5
- Vol: 41 Issue: 6 Part: 1
- Vol: 41 Issue: 6 Part: 2
- Vol: 51 Issue: 1
- Vol: 51 Issue: 2
- Vol: 51 Issue: 3
- Vol: 51 Issue: 4
- Vol: 51 Issue: 5
- Vol: 51 Issue: 6
- Vol: 51 Issue: 7
- Vol: 51 Issue: 8
- Vol: 51 Issue: 9
- Vol: 51 Issue: 10
- Vol: 51 Issue: 11
- Vol: 51 Issue: 12
- Vol: 40 Issue: 1
- Vol: 40 Issue: 2
- Vol: 40 Issue: 3
- Vol: 40 Issue: 4
- Vol: 40 Issue: 5
- Vol: 40 Issue: 6
- Vol: 50 Issue: 1
- Vol: 50 Issue: 2
- Vol: 50 Issue: 3
- Vol: 50 Issue: 4
- Vol: 50 Issue: 5
- Vol: 50 Issue: 6
- Vol: 50 Issue: 7
- Vol: 50 Issue: 8
- Vol: 50 Issue: 9
- Vol: 50 Issue: 10
- Vol: 50 Issue: 11
- Vol: 50 Issue: 12
- Vol: 39 Issue: 1
- Vol: 39 Issue: 2
- Vol: 39 Issue: 3
- Vol: 39 Issue: 4
- Vol: 39 Issue: 5
- Vol: 39 Issue: 6
- Vol: 49 Issue: 1
- Vol: 49 Issue: 2
- Vol: 49 Issue: 3
- Vol: 49 Issue: 4
- Vol: 49 Issue: 5
- Vol: 49 Issue: 6
- Vol: 49 Issue: 7
- Vol: 49 Issue: 8
- Vol: 49 Issue: 9
- Vol: 49 Issue: 10
- Vol: 49 Issue: 11
- Vol: 49 Issue: 12
- Vol: 38 Issue: 1
- Vol: 38 Issue: 2
- Vol: 38 Issue: 3
- Vol: 38 Issue: 4
- Vol: 38 Issue: 5
- Vol: 38 Issue: 6
- Vol: 48 Issue: 1
- Vol: 48 Issue: 2
- Vol: 48 Issue: 3
- Vol: 48 Issue: 4
- Vol: 48 Issue: 5
- Vol: 48 Issue: 6
- Vol: 48 Issue: 7
- Vol: 48 Issue: 8
- Vol: 48 Issue: 9
- Vol: 48 Issue: 10
- Vol: 48 Issue: 11
- Vol: 48 Issue: 12
- Vol: 37 Issue: 1
- Vol: 37 Issue: 2
- Vol: 37 Issue: 3
- Vol: 37 Issue: 4
- Vol: 37 Issue: 5
- Vol: 37 Issue: 6
- Vol: 45 Issue: 1
- Vol: 45 Issue: 2
- Vol: 45 Issue: 3
- Vol: 45 Issue: 4
- Vol: 45 Issue: 5
- Vol: 45 Issue: 6
- Vol: 45 Issue: 7
- Vol: 64 Issue: 1
- Vol: 64 Issue: 2
- Vol: 64 Issue: 3
- Vol: 64 Issue: 4 Part: 1
- Vol: 64 Issue: 4 Part: 2
- Vol: 63 Issue: 1
- Vol: 63 Issue: 2
- Vol: 63 Issue: 3
- Vol: 63 Issue: 4
- Vol: 63 Issue: 5
- Vol: 63 Issue: 6
- Vol: 63 Issue: 7
- Vol: 63 Issue: 8
- Vol: 63 Issue: 9
- Vol: 63 Issue: 10
- Vol: 63 Issue: 11
- Vol: 63 Issue: 12
- Vol: 62 Issue: 1
- Vol: 62 Issue: 2
- Vol: 62 Issue: 3
- Vol: 62 Issue: 4
- Vol: 62 Issue: 5
- Vol: 62 Issue: 6
- Vol: 62 Issue: 7
- Vol: 62 Issue: 8
- Vol: 62 Issue: 9
- Vol: 62 Issue: 10
- Vol: 62 Issue: 11
- Vol: 62 Issue: 12
- Vol: 61 Issue: 1
- Vol: 61 Issue: 2
- Vol: 61 Issue: 3
- Vol: 61 Issue: 4
- Vol: 61 Issue: 5
- Vol: 61 Issue: 6
- Vol: 61 Issue: 7
- Vol: 61 Issue: 8
- Vol: 61 Issue: 9
- Vol: 61 Issue: 10
- Vol: 61 Issue: 11
- Vol: 61 Issue: 12
- Vol: 60 Issue: 1
- Vol: 60 Issue: 2
- Vol: 60 Issue: 3
- Vol: 60 Issue: 4
- Vol: 60 Issue: 5
- Vol: 60 Issue: 6
- Vol: 60 Issue: 7
- Vol: 60 Issue: 8
- Vol: 60 Issue: 9
- Vol: 60 Issue: 10
- Vol: 60 Issue: 11
- Vol: 60 Issue: 12
- Vol: 59 Issue: 1
- Vol: 59 Issue: 2
- Vol: 59 Issue: 3
- Vol: 59 Issue: 4
- Vol: 59 Issue: 5
- Vol: 59 Issue: 6
- Vol: 59 Issue: 7
- Vol: 59 Issue: 8
- Vol: 59 Issue: 9
- Vol: 59 Issue: 10
- Vol: 59 Issue: 11
- Vol: 59 Issue: 12
- Vol: 15 Issue: 1
- Vol: 15 Issue: 2
- Vol: 15 Issue: 3
- Vol: 15 Issue: 4
- Vol: 15 Issue: 5
- Vol: 15 Issue: 6
- Vol: 22 Issue: 1
- Vol: 22 Issue: 2
- Vol: 22 Issue: 3
- Vol: 22 Issue: 4
- Vol: 22 Issue: 5
- Vol: 22 Issue: 6
- Vol: 21 Issue: 1
- Vol: 21 Issue: 2
- Vol: 21 Issue: 3
- Vol: 21 Issue: 4
- Vol: 21 Issue: 5
- Vol: 21 Issue: 6
- Vol: 20 Issue: 1
- Vol: 20 Issue: 2
- Vol: 20 Issue: 3
- Vol: 20 Issue: 4
- Vol: 20 Issue: 5
- Vol: 20 Issue: 6
- Vol: 19 Issue: 1
- Vol: 19 Issue: 2
- Vol: 19 Issue: 3
- Vol: 19 Issue: 4
- Vol: 19 Issue: 5
- Vol: 19 Issue: 6
- Vol: 18 Issue: 1
- Vol: 18 Issue: 2
- Vol: 18 Issue: 3
- Vol: 18 Issue: 4
- Vol: 18 Issue: 5
- Vol: 18 Issue: 6
- Vol: 17 Issue: 1
- Vol: 17 Issue: 2
- Vol: 17 Issue: 3
- Vol: 17 Issue: 4
- Vol: 17 Issue: 5
- Vol: 17 Issue: 6
- Vol: 16 Issue: 1
- Vol: 16 Issue: 2
- Vol: 16 Issue: 3
- Vol: 16 Issue: 4
- Vol: 16 Issue: 5
- Vol: 16 Issue: 6
- Vol: 25 Issue: 1
- Vol: 25 Issue: 2
- Vol: 25 Issue: 3
- Vol: 25 Issue: 4
- Vol: 25 Issue: 5
- Vol: 25 Issue: 6
- Vol: 24 Issue: 1
- Vol: 24 Issue: 2
- Vol: 24 Issue: 3
- Vol: 24 Issue: 4
- Vol: 24 Issue: 5
- Vol: 24 Issue: 6
- Vol: 23 Issue: 1
- Vol: 23 Issue: 2
- Vol: 23 Issue: 3
- Vol: 23 Issue: 4
- Vol: 23 Issue: 5
- Vol: 23 Issue: 6
- Vol: 47 Issue: 1
- Vol: 47 Issue: 2
- Vol: 47 Issue: 3
- Vol: 47 Issue: 4
- Vol: 47 Issue: 5
- Vol: 47 Issue: 6
- Vol: 47 Issue: 7
- Vol: 36 Issue: 1
- Vol: 36 Issue: 2
- Vol: 36 Issue: 3
- Vol: 36 Issue: 4
- Vol: 36 Issue: 5
- Vol: 36 Issue: 6
- Vol: 46 Issue: 1
- Vol: 46 Issue: 2
- Vol: 46 Issue: 3
- Vol: 46 Issue: 4
- Vol: 46 Issue: 5
- Vol: 46 Issue: 6
- Vol: 46 Issue: 7
- Vol: 33 Issue: 1
- Vol: 33 Issue: 2
- Vol: 33 Issue: 3
- Vol: 33 Issue: 4
- Vol: 33 Issue: 5
- Vol: 33 Issue: 6
- Vol: 32 Issue: 1
- Vol: 32 Issue: 2
- Vol: 32 Issue: 3
- Vol: 32 Issue: 4
- Vol: 32 Issue: 5
- Vol: 32 Issue: 6
- Vol: 31 Issue: 1
- Vol: 31 Issue: 2
- Vol: 31 Issue: 3
- Vol: 31 Issue: 4
- Vol: 31 Issue: 5
- Vol: 31 Issue: 6
- Vol: 30 Issue: 1
- Vol: 30 Issue: 2
- Vol: 30 Issue: 3
- Vol: 30 Issue: 4
- Vol: 30 Issue: 5
- Vol: 30 Issue: 6
- Vol: 29 Issue: 1
- Vol: 29 Issue: 2
- Vol: 29 Issue: 3
- Vol: 29 Issue: 4
- Vol: 29 Issue: 5
- Vol: 29 Issue: 6
- Vol: 28 Issue: 1
- Vol: 28 Issue: 2
- Vol: 28 Issue: 3
- Vol: 28 Issue: 4
- Vol: 28 Issue: 5
- Vol: 28 Issue: 6
- Vol: 27 Issue: 1
- Vol: 27 Issue: 2
- Vol: 27 Issue: 3
- Vol: 27 Issue: 4
- Vol: 27 Issue: 5
- Vol: 27 Issue: 6
- Vol: 26 Issue: 1
- Vol: 26 Issue: 2
- Vol: 26 Issue: 3
- Vol: 26 Issue: 4
- Vol: 26 Issue: 5
- Vol: 26 Issue: 6
- Vol: 35 Issue: 1
- Vol: 35 Issue: 2
- Vol: 35 Issue: 3
- Vol: 35 Issue: 4
- Vol: 35 Issue: 5
- Vol: 35 Issue: 6
- Vol: 34 Issue: 1
- Vol: 34 Issue: 2
- Vol: 34 Issue: 3
- Vol: 34 Issue: 4
- Vol: 34 Issue: 5 Part: 1
- Vol: 34 Issue: 6
- Vol: 58 Issue: 1
- Vol: 58 Issue: 2
- Vol: 58 Issue: 3
- Vol: 58 Issue: 4
- Vol: 58 Issue: 5
- Vol: 58 Issue: 6
- Vol: 58 Issue: 7
- Vol: 58 Issue: 8
- Vol: 58 Issue: 9
- Vol: 58 Issue: 10
- Vol: 58 Issue: 11
- Vol: 58 Issue: 12
- Vol: 57 Issue: 1
- Vol: 57 Issue: 2
- Vol: 57 Issue: 3
- Vol: 57 Issue: 4
- Vol: 57 Issue: 5
- Vol: 57 Issue: 6
- Vol: 57 Issue: 7
- Vol: 57 Issue: 8
- Vol: 57 Issue: 9
- Vol: 57 Issue: 10
- Vol: 57 Issue: 11
- Vol: 57 Issue: 12
- Vol: 56 Issue: 1
- Vol: 56 Issue: 2
- Vol: 56 Issue: 3
- Vol: 56 Issue: 4
- Vol: 56 Issue: 5
- Vol: 56 Issue: 6
- Vol: 56 Issue: 7
- Vol: 56 Issue: 8
- Vol: 56 Issue: 9
- Vol: 56 Issue: 10
- Vol: 56 Issue: 11
- Vol: 56 Issue: 12
- Vol: 55 Issue: 1
- Vol: 55 Issue: 2
- Vol: 55 Issue: 3
- Vol: 55 Issue: 4
- Vol: 55 Issue: 5
- Vol: 55 Issue: 6
- Vol: 55 Issue: 7
- Vol: 55 Issue: 8
- Vol: 55 Issue: 9
- Vol: 55 Issue: 10
- Vol: 55 Issue: 11
- Vol: 55 Issue: 12
- Vol: 44 Issue: 1
- Vol: 44 Issue: 2
- Vol: 44 Issue: 3
- Vol: 44 Issue: 4
- Vol: 44 Issue: 5
- Vol: 44 Issue: 6
- Vol: 44 Issue: 7
- Vol: 54 Issue: 1
- Vol: 54 Issue: 2
- Vol: 54 Issue: 3
- Vol: 54 Issue: 4
- Vol: 54 Issue: 5
- Vol: 54 Issue: 6
- Vol: 54 Issue: 7
- Vol: 54 Issue: 8
- Vol: 54 Issue: 9
- Vol: 54 Issue: 10
- Vol: 54 Issue: 11
- Vol: 54 Issue: 12
- Vol: 43 Issue: 1
- Vol: 43 Issue: 2
- Vol: 43 Issue: 3
- Vol: 43 Issue: 4
- Vol: 43 Issue: 5
- Vol: 43 Issue: 6
- Vol: 53 Issue: 1
- Vol: 53 Issue: 2
- Vol: 53 Issue: 3
- Vol: 53 Issue: 4
- Vol: 53 Issue: 5
- Vol: 53 Issue: 6
- Vol: 53 Issue: 7
- Vol: 53 Issue: 8
- Vol: 53 Issue: 9
- Vol: 53 Issue: 10
- Vol: 53 Issue: 11
- Vol: 53 Issue: 12
- Vol: 42 Issue: 1
- Vol: 42 Issue: 2
- Vol: 42 Issue: 3
- Vol: 42 Issue: 4
- Vol: 42 Issue: 5
- Vol: 42 Issue: 6 Part: 1
- Vol: 42 Issue: 6 Part: 2
- Vol: 52 Issue: 1
- Vol: 52 Issue: 2
- Vol: 52 Issue: 3
- Vol: 52 Issue: 4
- Vol: 52 Issue: 5
- Vol: 52 Issue: 6
- Vol: 52 Issue: 7
- Vol: 52 Issue: 8
- Vol: 52 Issue: 9
- Vol: 52 Issue: 10
- Vol: 52 Issue: 11
- Vol: 52 Issue: 12
- Vol: 41 Issue: 1
- Vol: 41 Issue: 2
- Vol: 41 Issue: 3
- Vol: 41 Issue: 4
- Vol: 41 Issue: 5
- Vol: 41 Issue: 6 Part: 1
- Vol: 41 Issue: 6 Part: 2
- Vol: 51 Issue: 1
- Vol: 51 Issue: 2
- Vol: 51 Issue: 3
- Vol: 51 Issue: 4
- Vol: 51 Issue: 5
- Vol: 51 Issue: 6
- Vol: 51 Issue: 7
- Vol: 51 Issue: 8
- Vol: 51 Issue: 9
- Vol: 51 Issue: 10
- Vol: 51 Issue: 11
- Vol: 51 Issue: 12
- Vol: 40 Issue: 1
- Vol: 40 Issue: 2
- Vol: 40 Issue: 3
- Vol: 40 Issue: 4
- Vol: 40 Issue: 5
- Vol: 40 Issue: 6
- Vol: 50 Issue: 1
- Vol: 50 Issue: 2
- Vol: 50 Issue: 3
- Vol: 50 Issue: 4
- Vol: 50 Issue: 5
- Vol: 50 Issue: 6
- Vol: 50 Issue: 7
- Vol: 50 Issue: 8
- Vol: 50 Issue: 9
- Vol: 50 Issue: 10
- Vol: 50 Issue: 11
- Vol: 50 Issue: 12
- Vol: 39 Issue: 1
- Vol: 39 Issue: 2
- Vol: 39 Issue: 3
- Vol: 39 Issue: 4
- Vol: 39 Issue: 5
- Vol: 39 Issue: 6
- Vol: 49 Issue: 1
- Vol: 49 Issue: 2
- Vol: 49 Issue: 3
- Vol: 49 Issue: 4
- Vol: 49 Issue: 5
- Vol: 49 Issue: 6
- Vol: 49 Issue: 7
- Vol: 49 Issue: 8
- Vol: 49 Issue: 9
- Vol: 49 Issue: 10
- Vol: 49 Issue: 11
- Vol: 49 Issue: 12
- Vol: 38 Issue: 1
- Vol: 38 Issue: 2
- Vol: 38 Issue: 3
- Vol: 38 Issue: 4
- Vol: 38 Issue: 5
- Vol: 38 Issue: 6
- Vol: 48 Issue: 1
- Vol: 48 Issue: 2
- Vol: 48 Issue: 3
- Vol: 48 Issue: 4
- Vol: 48 Issue: 5
- Vol: 48 Issue: 6
- Vol: 48 Issue: 7
- Vol: 48 Issue: 8
- Vol: 48 Issue: 9
- Vol: 48 Issue: 10
- Vol: 48 Issue: 11
- Vol: 48 Issue: 12
- Vol: 37 Issue: 1
- Vol: 37 Issue: 2
- Vol: 37 Issue: 3
- Vol: 37 Issue: 4
- Vol: 37 Issue: 5
- Vol: 37 Issue: 6
- Vol: 45 Issue: 1
- Vol: 45 Issue: 2
- Vol: 45 Issue: 3
- Vol: 45 Issue: 4
- Vol: 45 Issue: 5
- Vol: 45 Issue: 6
- Vol: 45 Issue: 7
- Vol: 64 Issue: 1
- Vol: 64 Issue: 2
- Vol: 64 Issue: 3
- Vol: 64 Issue: 4 Part: 1
- Vol: 64 Issue: 4 Part: 2
- Vol: 63 Issue: 1
- Vol: 63 Issue: 2
- Vol: 63 Issue: 3
- Vol: 63 Issue: 4
- Vol: 63 Issue: 5
- Vol: 63 Issue: 6
- Vol: 63 Issue: 7
- Vol: 63 Issue: 8
- Vol: 63 Issue: 9
- Vol: 63 Issue: 10
- Vol: 63 Issue: 11
- Vol: 63 Issue: 12
- Vol: 62 Issue: 1
- Vol: 62 Issue: 2
- Vol: 62 Issue: 3
- Vol: 62 Issue: 4
- Vol: 62 Issue: 5
- Vol: 62 Issue: 6
- Vol: 62 Issue: 7
- Vol: 62 Issue: 8
- Vol: 62 Issue: 9
- Vol: 62 Issue: 10
- Vol: 62 Issue: 11
- Vol: 62 Issue: 12
- Vol: 61 Issue: 1
- Vol: 61 Issue: 2
- Vol: 61 Issue: 3
- Vol: 61 Issue: 4
- Vol: 61 Issue: 5
- Vol: 61 Issue: 6
- Vol: 61 Issue: 7
- Vol: 61 Issue: 8
- Vol: 61 Issue: 9
- Vol: 61 Issue: 10
- Vol: 61 Issue: 11
- Vol: 61 Issue: 12
- Vol: 60 Issue: 1
- Vol: 60 Issue: 2
- Vol: 60 Issue: 3
- Vol: 60 Issue: 4
- Vol: 60 Issue: 5
- Vol: 60 Issue: 6
- Vol: 60 Issue: 7
- Vol: 60 Issue: 8
- Vol: 60 Issue: 9
- Vol: 60 Issue: 10
- Vol: 60 Issue: 11
- Vol: 60 Issue: 12
- Vol: 59 Issue: 1
- Vol: 59 Issue: 2
- Vol: 59 Issue: 3
- Vol: 59 Issue: 4
- Vol: 59 Issue: 5
- Vol: 59 Issue: 6
- Vol: 59 Issue: 7
- Vol: 59 Issue: 8
- Vol: 59 Issue: 9
- Vol: 59 Issue: 10
- Vol: 59 Issue: 11
- Vol: 59 Issue: 12
- Vol: 15 Issue: 1
- Vol: 15 Issue: 2
- Vol: 15 Issue: 3
- Vol: 15 Issue: 4
- Vol: 15 Issue: 5
- Vol: 15 Issue: 6
Volume 56 Issue 8 • Aug. 2010
Sponsor
Filter Results
Previous Titles
- ( 1955 - 1962 ) IRE Transactions on Information Theory
- ( 1953 - 1954 ) Transactions of the IRE Professional Group on Information Theory
-
-
IEEE Transactions on Information Theory publication information
|
PDF (42 KB)
-
On Rate of Convergence of Statistical Estimation of Stationary Ergodic Processes
Publication Year: 2010, Page(s):3637 - 3641
Cited by: Papers (6)Stationary ergodic processes with finite alphabets are approximated by finite memory processes based on an n-length realization of the process. Under the assumptions of summable continuity rate and non-nullness, a rate of convergence in d̅-distance is obtained, with explicit constants. Asymptotically, as n → ∞, the result is near the optimum. View full abstract»
-
Consistent Estimation of Non-bandlimited Spectral Density From Uniformly Spaced Samples
Publication Year: 2010, Page(s):3642 - 3659
Cited by: Papers (3)In the matter of selection of sample time points for the estimation of the power spectral density of a continuous time stationary stochastic process, irregular sampling schemes such as Poisson sampling are often preferred over regular (uniform) sampling. A major reason for this preference is the well-known problem of inconsistency of estimators based on regular sampling, when the underlying power ... View full abstract»
-
Tighter Bounds on the Capacity of Finite-State Channels Via Markov Set-Chains
Publication Year: 2010, Page(s):3660 - 3691
Cited by: Papers (5)The theory of Markov set-chains is applied to derive upper and lower bounds on the capacity of finite-state channels that are tighter than the classic bounds by Gallager. The new bounds coincide and yield single-letter capacity characterizations for a class of channels with the state process known at the receiver, including channels whose long-term marginal state distribution is independent of the... View full abstract»
-
The
Publication Year: 2010, Page(s):3692 - 3699 -Vertex Transfer Matrix and Accurate Estimation of Channel Capacity$1$
Cited by: Papers (4)The notion of a 1-vertex transfer matrix for multidimensional codes is introduced. It is shown that the capacity of such codes, or the topological entropy, can be expressed as the limit of the logarithm of spectral radii of 1-vertex transfer matrices. Storage and computations using the 1-vertex transfer matrix are much smaller than storage and computations needed for the standard transfer matrix. ... View full abstract»
-
Secure Communications With Insecure Feedback: Breaking the High-SNR Ceiling
Publication Year: 2010, Page(s):3700 - 3711
Cited by: Papers (1)A multiple-antenna Gaussian wiretap channel in which the number of antennas at the source is not greater than that at the eavesdropper is considered. Without feedback, the secrecy capacity over such a channel generally converges to a constant at high signal-to-noise ratio (SNR). A half-duplex secure protocol allowing the destination to actively transfer random keys in the form of known interferenc... View full abstract»
-
Mismatched Estimation and Relative Entropy
Publication Year: 2010, Page(s):3712 - 3720
Cited by: Papers (43)A random variable with distribution P is observed in Gaussian noise and is estimated by a mismatched minimum mean-square estimator that assumes that the distribution is Q, instead of P . This paper shows that the integral over all signal-to-noise ratios (SNRs) of the excess mean-square estimation error incurred by the mismatched estimator is twice the relative entropy D(P ||Q) (in nats). This repr... View full abstract»
-
Rényi Information Dimension: Fundamental Limits of Almost Lossless Analog Compression
Publication Year: 2010, Page(s):3721 - 3748
Cited by: Papers (73)In Shannon theory, lossless source coding deals with the optimal compression of discrete sources. Compressed sensing is a lossless coding strategy for analog sources by means of multiplication by real-valued matrices. In this paper we study almost lossless analog compression for analog memoryless sources in an information-theoretic framework, in which the compressor or decompressor is constrained ... View full abstract»
-
Moment Balancing Templates for Spectral Null Codes
Publication Year: 2010, Page(s):3749 - 3753
Cited by: Papers (1)The generalized moment balancing templates for spectral null codes are investigated in this paper. A new approach based on the insertion of a determined number of vectors at determinate indices of a spectral null code word, is found to balance the moment of the code word. Moment balanced code words preserve the spectral null properties and can guarantee the correction of one insertion or one delet... View full abstract»
-
Performance Bounds for Erasure, List, and Decision Feedback Schemes With Linear Block Codes
Publication Year: 2010, Page(s):3754 - 3778
Cited by: Papers (16)A message independence property and some new performance upper bounds are derived in this work for erasure, list, and decision-feedback schemes with linear block codes transmitted over memoryless symmetric channels. Similar to the classical work of Forney, this work is focused on the derivation of some Gallager-type bounds on the achievable tradeoffs for these coding schemes, where the main novelt... View full abstract»
-
Classification of Binary Constant Weight Codes
Publication Year: 2010, Page(s):3779 - 3785
Cited by: Papers (11)A binary code C ⊆ F2n with minimum distance at least d and codewords of Hamming weight w is called an (n,d,w) constant weight code. The maximum size of an (n,d,w) constant weight code is denoted by A(n,d,w), and codes of this size are said to be optimal. In a computer-aided approach,... View full abstract»
-
Coding Schemes for Noiseless and Noisy Asynchronous CDMA Systems
Publication Year: 2010, Page(s):3786 - 3792
Cited by: Papers (2)Novel coding schemes for noiseless and noisy asynchronous code division multiple access (A-CDMA) systems are presented in this paper. The schemes use Wu-Chang spreading code, block interleaver, and synchronizable channel codes to support A-CDMA communications with random delays. For the noiseless case, each active user generates one of M messages, M = ⌊(2T-D -1)/(D + 1)⌋ ,... View full abstract»
-
Throughput Scaling of Wireless Networks With Random Connections
Publication Year: 2010, Page(s):3793 - 3806
Cited by: Papers (10)This work studies the throughput scaling laws of ad hoc wireless networks in the limit of a large number of nodes. A random connections model is assumed in which the channel connections between the nodes are drawn independently from a common distribution. Transmitting nodes are subject to an on-off strategy, and receiving nodes employ conventional single-user decoding. The following results are pr... View full abstract»
-
Cooperation With an Untrusted Relay: A Secrecy Perspective
Publication Year: 2010, Page(s):3807 - 3827
Cited by: Papers (163)We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help. For this scenario, an interesting question is whether the relay node should be deployed at all. That is, whether cooperation with an untrusted relay node can ever be beneficial. We first provide an achievable secrecy rate for the general... View full abstract»
-
Exploiting Cooperative Advantages in Slotted ALOHA Random Access Networks
Publication Year: 2010, Page(s):3828 - 3846
Cited by: Papers (7)In cooperative systems, users achieve spatial diversity and multihop gains by transmitting packets over multiple independent fading paths provided by their partners. Most previous works on cooperative communications focus on the physical layer aspects such as coding, modulation, and transceiver signal processing techniques. In this work, we study the advantages of user cooperation from a MAC layer... View full abstract»
-
On the Broadcast Capacity of Wireless Networks With Cooperative Relays
Publication Year: 2010, Page(s):3847 - 3861
Cited by: Papers (22)A fundamental problem in wireless networks is determining the broadcast capacity, i.e., the maximum data transfer rate from a given node to every other node in a relay network. This paper studies the scaling of the broadcast capacity for a network with a single source and N destinations, of which f(N) are randomly selected to also act as relays. In high-density networks (i.e., the node density goe... View full abstract»
-
Efficient Network Code Design for Cyclic Networks
Publication Year: 2010, Page(s):3862 - 3878
Cited by: Papers (17)This paper introduces an efficient polynomial-time code construction algorithm for cyclic networks, which achieves the optimal multicast rate. Until this work, no explicit capacity-achieving polynomial-time code construction for cyclic networks has been known. This new construction algorithm has the additional advantage that as sinks are added or removed from the network, it can modify the ... View full abstract»
-
Pairwise Intersession Network Coding on Directed Networks
Publication Year: 2010, Page(s):3879 - 3900
Cited by: Papers (46)When there exists only a single multicast session in a directed acyclic/cyclic network, the existence of a network coding solution is characterized by the classic min-cut/max-flow theorem. For the case of more than one coexisting sessions, network coding also demonstrates throughput improvement over noncoded solutions. This paper proposes pairwise intersession network coding, which allows for arbi... View full abstract»
-
Functional Compression Through Graph Coloring
Publication Year: 2010, Page(s):3901 - 3917
Cited by: Papers (20)Motivated by applications to sensor networks and privacy preserving databases, we consider the problem of functional compression. The objective is to separately compress possibly correlated discrete sources such that an arbitrary but fixed deterministic function of those sources can be computed given the compressed data from each source. We consider both the lossless and lossy computation of a fun... View full abstract»
-
A Dynamic Programming Approach to Length-Limited Huffman Coding: Space Reduction With the Monge Property
Publication Year: 2010, Page(s):3918 - 3929
Cited by: Papers (1)The “state-of-the-art” in length-limited Huffman coding (LLHC) algorithms is the Θ(nD)-time, Θ(n)-space one of Hirschberg and Larmore, where n is the size of the code and D ≤ n is the length restriction on the codewords. This is a very clever, very problem specific, technique. This paper presents a simple dynamic-programming (DP... View full abstract»
-
On Successive Refinement for the Kaspi/Heegard–Berger Problem
Publication Year: 2010, Page(s):3930 - 3945
Cited by: Papers (1)Consider a source that produces independent copies of a triplet of jointly distributed random variables {Xi,Yi,Zi }z =1∞. The process {Xi} is observed at the encoder, and is supposed to be reproduced at two decoders, decoder Y and decoder Z, where {Yi} and {Zi} are observed... View full abstract»
-
On the Sum Rate of Gaussian Multiterminal Source Coding: New Proofs and Results
Publication Year: 2010, Page(s):3946 - 3960
Cited by: Papers (35)We show that the lower bound on the sum rate of the direct and indirect Gaussian multiterminal source coding problems can be derived in a unified manner by exploiting the semidefinite partial order of the distortion covariance matrices associated with the minimum mean squared error (MMSE) estimation and the so-called reduced optimal linear estimation, through which an intimate connection between t... View full abstract»
-
Distinct Difference Configurations: Multihop Paths and Key Predistribution in Sensor Networks
Publication Year: 2010, Page(s):3961 - 3972
Cited by: Papers (10)A distinct difference configuration is a set of points in Z2 with the property that the vectors (difference vectors) connecting any two of the points are all distinct. Many specific examples of these configurations have been previously studied: the class of distinct difference configurations includes both Costas arrays and sonar sequences, for example. Motivated by an application of the... View full abstract»
-
Information-Theoretic Key Agreement of Multiple Terminals—Part I
Publication Year: 2010, Page(s):3973 - 3996
Cited by: Papers (46)We study the problem of information-theoretically secure secret key agreement under the well-known source model and channel model. In both of these models, multiple terminals wish to create a shared secret key that is secure from a passive eavesdropper. The terminals have access to a noiseless public communication channel and an additional resource that depends on the model. In the source model, t... View full abstract»
Aims & Scope
IEEE Transactions on Information Theory publishes papers concerned with the transmission, processing, and utilization of information.
Meet Our Editors
Editor-in-Chief
Prakash Narayan
Department of Electrical and Computer Engineering