Sciweavers

TIT
2011
98views more  TIT 2011»
13 years 6 months ago
Information Rates for Multiantenna Systems With Unknown Fading
—This work first presents a general technique to compute tight upper and lower bounds on the information rate of a multiuser Rayleigh fading channel with no Channel State Inform...
Krishnan Padmanabhan, Sundeep Venkatraman, Oliver ...
TIT
2011
111views more  TIT 2011»
13 years 6 months ago
Counting Partial Spread Functions in Eight Variables
Abstract. In this note we report the following computational results on partial spread functions in 8 variables: (i) the numbers of equivalence classes of partial spread functions ...
Philippe Langevin, Xiang-dong Hou
TIT
2011
119views more  TIT 2011»
13 years 6 months ago
Redundancy-Related Bounds for Generalized Huffman Codes
— This paper presents new lower and upper bounds for the compression rate of binary prefix codes optimized over memoryless sources according to various nonlinear codeword length...
Michael B. Baer
TIT
2011
140views more  TIT 2011»
13 years 6 months ago
Sequential Quantile Prediction of Time Series
Motivated by a broad range of potential applications, we address the quantile prediction problem of real-valued time series. We present a sequential quantile forecasting model bas...
Gérard Biau, Benoît Patra
TIT
2011
125views more  TIT 2011»
13 years 6 months ago
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
Abstract. In 1998, Blaze, Bleumer, and Strauss proposed a cryptographic primitive called proxy re-encryption, in which a proxy transforms – without seeing the corresponding plain...
Benoît Libert, Damien Vergnaud
TIT
2011
134views more  TIT 2011»
13 years 6 months ago
Estimating Heavy-Tail Exponents Through Max Self-Similarity
: In this paper, a novel approach to the problem of estimating the heavy–tail exponent α > 0 of a distribution is proposed. It is based on the fact that block–maxima of siz...
Stilian Stoev, George Michailidis, Murad S. Taqqu
TIT
2011
115views more  TIT 2011»
13 years 6 months ago
Wireless Network Information Flow: A Deterministic Approach
Amir Salman Avestimehr, Suhas N. Diggavi, David N....
TIT
2011
126views more  TIT 2011»
13 years 6 months ago
The Return of the Cryptographic Boomerang
—The boomerang analysis, together with its offspring the amplified boomerang analysis and the rectangle analysis, are techniques that are widely used in the analysis of block ci...
Sean Murphy
TIT
2011
120views more  TIT 2011»
13 years 6 months ago
The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel
In this paper, we consider the Gaussian multiple-input multiple-output (MIMO) multi-receiver wiretap channel in which a transmitter wants to have confidential communication with ...
Ersen Ekrem, Sennur Ulukus
TIT
2011
113views more  TIT 2011»
13 years 6 months ago
Asymptotic Capacity and Optimal Precoding in MIMO Multi-Hop Relay Networks
A multi-hop relaying system is analyzed where data sent by a multi-antenna source is relayed by successive multi-antenna relays until it reaches a multi-antenna destination. Assum...
Nadia Fawaz, Keyvan Zarifi, Mérouane Debbah...