Sciweavers

TIT
2010
85views Education» more  TIT 2010»
13 years 7 months ago
Typical peak sidelobe level of binary sequences
Noga Alon, Simon Litsyn, Alexander Shpunt
TIT
2010
82views Education» more  TIT 2010»
13 years 7 months ago
Symmetry breaking in soft clustering decoding of neural codes
Albert E. Parker, Alexander G. Dimitrov, Tom&aacut...
TIT
2010
91views Education» more  TIT 2010»
13 years 7 months ago
Physics of the shannon limits
We provide a simple physical interpretation, in the context of the second law of thermodynamics, to the information inequality (a.k.a. the Gibbs' inequality, which is also equ...
Neri Merhav
TIT
2010
136views Education» more  TIT 2010»
13 years 7 months ago
The approximate capacity of the many-to-one and one-to-many Gaussian interference channels
Recently, Etkin, Tse, and Wang found the capacity region of the two-user Gaussian interference channel to within 1 bit/s/Hz. A natural goal is to apply this approach to the Gaussia...
Guy Bresler, Abhay Parekh, David N. C. Tse
TIT
2010
124views Education» more  TIT 2010»
13 years 7 months ago
On the capacity of the precision-resolution system
Arguably, the most prominent constrained system in storage applications is the (d; k)-run-length limited (RLL) system, where every binary sequence obeys the constraint that every t...
Moshe Schwartz, Jehoshua Bruck
TIT
2010
118views Education» more  TIT 2010»
13 years 7 months ago
Joint sampling distribution between actual and estimated classification errors for linear discriminant analysis
Error estimation must be used to find the accuracy of a designed classifier, an issue that is critical in biomarker discovery for disease diagnosis and prognosis in genomics and p...
Amin Zollanvari, Ulisses Braga-Neto, Edward R. Dou...
TIT
2010
130views Education» more  TIT 2010»
13 years 7 months ago
Pseudo-random functions and parallelizable modes of operations of a block cipher
This paper considers the construction and analysis of pseudo-random functions (PRFs) with specific reference to modes of operations of a block cipher. In the context of message aut...
Palash Sarkar
TIT
2010
88views Education» more  TIT 2010»
13 years 7 months ago
Zero-rate feedback can achieve the empirical capacity
The utility of limited feedback for coding over an individual sequence of DMCs is investigated. This study complements recent results showing how limited or noisy feedback can boos...
Krishnan Eswaran, Anand D. Sarwate, Anant Sahai, M...
TIT
2010
114views Education» more  TIT 2010»
13 years 7 months ago
Convergence of min-sum message-passing for convex optimization
Abstract--We establish that the min-sum messagepassing algorithm and its asynchronous variants converge for a large class of unconstrained convex optimization problems, generalizin...
Ciamac Cyrus Moallemi, Benjamin Van Roy
TIT
2010
173views Education» more  TIT 2010»
13 years 7 months ago
Asymptotic critical transmission radius for k-connectivity in wireless ad hoc networks
A range assignment to the nodes in a wireless ad hoc network induces a topology in which there is an edge between two nodes if and only if both of them are within each other's...
Peng-Jun Wan, Chih-Wei Yi, Lixin Wang