Sciweavers

TIT
2010
110views Education» more  TIT 2010»
13 years 7 months ago
On network interference management
We study two building-block models of interference-limited wireless networks, motivated by the problem of joint Peer-to-Peer and Wide Area Network design. In the first case, a sin...
Aleksandar Jovicic, Hua Wang, Pramod Viswanath
TIT
2010
129views Education» more  TIT 2010»
13 years 7 months ago
Two-way source coding with a helper
Consider the two-way rate-distortion problem in which a helper sends a common limited-rate message to both users based on side information at its disposal. We characterize the reg...
Haim H. Permuter, Yossef Steinberg, Tsachy Weissma...
TIT
2010
146views Education» more  TIT 2010»
13 years 7 months ago
Information propagation speed in mobile and delay tolerant networks
Abstract--The goal of this paper is to increase our understanding of the fundamental performance limits of mobile and Delay Tolerant Networks (DTNs), where end-to-end multi-hop pat...
Philippe Jacquet, Bernard Mans, Georgios Rodolakis
TIT
2010
122views Education» more  TIT 2010»
13 years 7 months ago
Biological information as set-based complexity
The significant and meaningful fraction of all the potential information residing in the molecules and structures of living systems is unknown. Sets of random molecular sequences o...
David J. Galas, Matti Nykter, Gregory W. Carter, N...
TIT
2010
114views Education» more  TIT 2010»
13 years 7 months ago
Duality for poset codes
Allan De Oliveira Moura, Marcelo Firer
TIT
2010
136views Education» more  TIT 2010»
13 years 7 months ago
The existence of concatenated codes list-decodable up to the hamming bound
We prove that binary linear concatenated codes with an outer algebraic code (specifically, a folded Reed-Solomon code) and independently and randomly chosen linear inner codes ach...
Venkatesan Guruswami, Atri Rudra
TIT
2010
170views Education» more  TIT 2010»
13 years 7 months ago
Correcting charge-constrained errors in the rank-modulation scheme
We investigate error-correcting codes for a the rank-modulation scheme with an application to flash memory devices. In this scheme, a set of n cells stores information in the permu...
Anxiao Jiang, Moshe Schwartz, Jehoshua Bruck
TIT
2010
101views Education» more  TIT 2010»
13 years 7 months ago
Separation principles in wireless networking
A general wireless networking problem is formulated whereby end-to-end user rates, routes, link capacities, transmitpower, frequency and power resources are jointly optimized acros...
Alejandro Ribeiro, Georgios B. Giannakis
TIT
2010
70views Education» more  TIT 2010»
13 years 7 months ago
A lower bound on the optimum distance profiles of the second-order Reed-Muller codes
In this paper, we give a lower bound for the optimum distance profiles of the second-order Reed
Yanling Chen, A. J. Han Vinck
TIT
2010
85views Education» more  TIT 2010»
13 years 7 months ago
Sparse non-Gaussian component analysis
Elmar Diederichs, Anatoli Juditsky, Vladimir Spoko...