Sciweavers

TIT
2010
150views Education» more  TIT 2010»
13 years 6 months ago
Information-theoretic key agreement of multiple terminals: part I
This is the first part of a two-part paper on information-theoretically secure secret key agreement. In this part, we study the secrecy problem under the widely studied source mod...
Amin Aminzadeh Gohari, Venkat Anantharam
TIT
2010
141views Education» more  TIT 2010»
13 years 6 months ago
Distributed averaging via lifted Markov chains
Abstract--Motivated by applications of distributed linear estimation, distributed control, and distributed optimization, we consider the question of designing linear iterative algo...
Kyomin Jung, Devavrat Shah, Jinwoo Shin
TIT
2010
96views Education» more  TIT 2010»
13 years 6 months ago
Codes for asymmetric limited-magnitude errors with application to multilevel flash memories
Several physical effects that limit the reliability and performance of multilevel flash memories induce errors that have low magnitudes and are dominantly asymmetric. This paper st...
Yuval Cassuto, Moshe Schwartz, Vasken Bohossian, J...
TIT
2010
114views Education» more  TIT 2010»
13 years 6 months ago
The balanced unicast and multicast capacity regions of large wireless networks
We consider the question of determining the scaling of the n2 -dimensional balanced unicast and the n2n dimensional balanced multicast capacity regions of a wireless network with ...
Urs Niesen, Piyush Gupta, Devavrat Shah
TIT
2010
123views Education» more  TIT 2010»
13 years 6 months ago
Outage exponents of block-fading channels with power allocation
Power allocation is studied for fixed-rate transmission over block-fading channels with arbitrary continuous fading distributions and perfect transmitter and receiver channel state...
Khoa D. Nguyen, Albert Guillen i Fabregas, Lars K....
TIT
2010
158views Education» more  TIT 2010»
13 years 6 months ago
Belief propagation, Dykstra's algorithm, and iterated information projections
Belief propagation is shown to be an instance of a hybrid between two projection algorithms in the convex programming literature: Dykstra's algorithm with cyclic Bregman proje...
John MacLaren Walsh, Phillip A. Regalia
TIT
2010
148views Education» more  TIT 2010»
13 years 6 months ago
Compressed genotyping
Abstract--Over the past three decades we have steadily increased our knowledge on the genetic basis of many severe disorders. Nevertheless, there are still great challenges in appl...
Yaniv Erlich, Assaf Gordon, Michael Brand, Gregory...
TIT
2010
108views Education» more  TIT 2010»
13 years 6 months ago
Optimal pairings
In this paper we introduce the concept of an optimal pairing, which by definition can be computed using only log2 r/(k) basic Miller iterations, with r the order of the groups invo...
Frederik Vercauteren