Suhas N. Diggavi

According to our database1, Suhas N. Diggavi authored at least 250 papers between 1995 and 2021.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2013, "For contributions to wireless networks and systems".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Data Encoding for Byzantine-Resilient Distributed Optimization.
IEEE Trans. Inf. Theory, 2021

Distortion-Based Lightweight Security for Cyber-Physical Systems.
IEEE Trans. Autom. Control., 2021

Shuffled Model of Federated Learning: Privacy, Accuracy and Communication Trade-Offs.
IEEE J. Sel. Areas Inf. Theory, 2021

Secure State-Reconstruction Over Networks Subject to Attacks.
IEEE Control. Syst. Lett., 2021

QuPeL: Quantized Personalization with Applications to Federated Learning.
CoRR, 2021

Group testing for connected communities.
Proceedings of the 24th International Conference on Artificial Intelligence and Statistics, 2021

Shuffled Model of Differential Privacy in Federated Learning.
Proceedings of the 24th International Conference on Artificial Intelligence and Statistics, 2021

2020
Generalized Degrees of Freedom of Noncoherent Diamond Networks.
IEEE Trans. Inf. Theory, 2020

Generalized Degrees Freedom of Noncoherent MIMO Channels With Asymmetric Link Strengths.
IEEE Trans. Inf. Theory, 2020

SLATE: A Secure Lightweight Entity Authentication Hardware Primitive.
IEEE Trans. Inf. Forensics Secur., 2020

On Distributed Quantization for Classification.
IEEE J. Sel. Areas Inf. Theory, 2020

Successive Refinement of Privacy.
IEEE J. Sel. Areas Inf. Theory, 2020

Qsparse-Local-SGD: Distributed SGD With Quantization, Sparsification, and Local Computations.
IEEE J. Sel. Areas Inf. Theory, 2020

Quantizing data for distributed learning.
CoRR, 2020

Group testing for overlapping communities.
CoRR, 2020

Shuffled Model of Federated Learning: Privacy, Communication and Accuracy Trade-offs.
CoRR, 2020

Community aware group testing.
CoRR, 2020

Distortion based Light-weight Security for Cyber-Physical Systems.
CoRR, 2020

Byzantine-Resilient High-Dimensional SGD with Local Iterations on Heterogeneous Data.
CoRR, 2020

Coded Caching for Heterogeneous Wireless Networks.
CoRR, 2020

Algorithms for reconstruction over single and multiple deletion channels.
CoRR, 2020

Byzantine-Resilient SGD in High Dimensions on Heterogeneous Data.
CoRR, 2020

SQuARM-SGD: Communication-Efficient Momentum SGD for Decentralized Optimization.
CoRR, 2020

Securing state reconstruction under sensor and actuator attacks: Theory and design.
Autom., 2020

Equivalence of ML decoding to a continuous optimization problem.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Hiding Identities: Estimation Under Local Differential Privacy.
Proceedings of the IEEE International Symposium on Information Theory, 2020

On Byzantine-Resilient High-Dimensional Stochastic Gradient Descent.
Proceedings of the IEEE International Symposium on Information Theory, 2020

"Wireless Paint": Code Design for 3D Orientation Estimation with Backscatter Arrays.
Proceedings of the IEEE International Symposium on Information Theory, 2020

SPARQ-SGD: Event-Triggered and Compressed Communication in Decentralized Optimization.
Proceedings of the 59th IEEE Conference on Decision and Control, 2020

2019
Redundancy Techniques for Straggler Mitigation in Distributed Optimization and Learning.
J. Mach. Learn. Res., 2019

Using mm-Waves for Secret Key Establishment.
IEEE Commun. Lett., 2019

SPARQ-SGD: Event-Triggered and Compressed Communication in Decentralized Stochastic Optimization.
CoRR, 2019

Securing State Estimation Under Sensor and Actuator Attacks: Theory and Design.
CoRR, 2019

Differentially Private Consensus-Based Distributed Optimization.
CoRR, 2019

Symbolwise MAP for Multiple Deletion Channels.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Quantizing Signals for Linear Classification.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Data Encoding Methods for Byzantine-Resilient Distributed Optimization.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Byzantine-Tolerant Distributed Coordinate Descent.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Coded Caching: Global vs Local Content Popularity.
Proceedings of the 16th Canadian Workshop on Information Theory, 2019

2018
Models and Information-Theoretic Bounds for Nanopore Sequencing.
IEEE Trans. Inf. Theory, 2018

Degrees of Freedom of Cache-Aided Wireless Interference Networks.
IEEE Trans. Inf. Theory, 2018

Design and Analysis of Stability-Guaranteed PUFs.
IEEE Trans. Inf. Forensics Secur., 2018

Approximate Capacity of Fast Fading Interference Channels With no Instantaneous CSIT.
IEEE Trans. Commun., 2018

Caching With Partial Adaptive Matching.
IEEE J. Sel. Areas Commun., 2018

Energy-Efficiency Gains of Caching for Interference Channels.
IEEE Commun. Lett., 2018

On the Generalized Degrees of Freedom of Noncoherent Interference Channel.
CoRR, 2018

Implementation and Analysis of Stable PUFs Using Gate Oxide Breakdown.
CoRR, 2018

Leveraging mm-Wave Communication for Security.
CoRR, 2018

On Capacity of Non-Coherent Diamond Networks.
CoRR, 2018

Toward an Internet of Battlefield Things: A Resilience Perspective.
Computer, 2018

On Maximum Likelihood Reconstruction over Multiple Deletion Channels.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Privacy-Utility Trade-off of Linear Regression under Random Projections and Additive Noise.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018


Sybil attack resilient traffic networks: a physics-based trust propagation approach.
Proceedings of the 9th ACM/IEEE International Conference on Cyber-Physical Systems, 2018

Protecting the Privacy of Networked Multi-Agent Systems Controlled over the Cloud.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Distorting an Adversary's View in Cyber-Physical Systems.
Proceedings of the 57th IEEE Conference on Decision and Control, 2018

Data Encoding for Byzantine-Resilient Distributed Gradient Descent.
Proceedings of the 56th Annual Allerton Conference on Communication, 2018

2017
Enhancing Multiuser MIMO Through Opportunistic D2D Cooperation.
IEEE Trans. Wirel. Commun., 2017

Matched Multiuser Gaussian Source Channel Communications via Uncoded Schemes.
IEEE Trans. Inf. Theory, 2017

Harnessing Bursty Interference in Multicarrier Systems With Output Feedback.
IEEE Trans. Inf. Theory, 2017

Wiretapped Oblivious Transfer.
IEEE Trans. Inf. Theory, 2017

Coded Caching for Multi-level Popularity and Access.
IEEE Trans. Inf. Theory, 2017

Multi-Party Secret Key Agreement Over State-Dependent Wireless Broadcast Channels.
IEEE Trans. Inf. Forensics Secur., 2017

Secure State Estimation Against Sensor Attacks in the Presence of Noise.
IEEE Trans. Control. Netw. Syst., 2017

Approximate capacity of Fading Gaussian Interference Channels with Point-to-Point codes.
CoRR, 2017

Straggler Mitigation in Distributed Optimization Through Data Encoding.
Proceedings of the Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, 2017

Caching with partial matching under Zipf demands.
Proceedings of the 2017 IEEE Information Theory Workshop, 2017

The effect of bias on the guesswork of hash functions.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

A distortion based approach for protecting inferences.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

On capacity of noncoherent MIMO with asymmetric link strengths.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Encoded distributed optimization.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Coded caching with partial adaptive matching.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

An SMT-based approach to secure state estimation under sensor and actuator attacks.
Proceedings of the 56th IEEE Annual Conference on Decision and Control, 2017

Implementation of stable PUFs using gate oxide breakdown.
Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, 2017

2016
Hierarchical Coded Caching.
IEEE Trans. Inf. Theory, 2016

An LP Characterization of the Secret-message Capacity of Three Erasure Networks With Feedback.
IEEE Trans. Inf. Theory, 2016

Capacity Results for Multicasting Nested Message Sets Over Combination Networks.
IEEE Trans. Inf. Theory, 2016

Password Cracking: The Effect of Bias on the Average Guesswork of Hash Functions.
CoRR, 2016

Attack Resilience and Recovery using Physical Challenge Response Authentication for Active Sensors Under Integrity Attacks.
CoRR, 2016

Consistency in the face of change: an adaptive approach to physical layer cooperation.
CoRR, 2016

Approximately achieving the feedback interference channel capacity with point-to-point codes.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Rate and delay for coded caching with carrier aggregation.
Proceedings of the IEEE International Symposium on Information Theory, 2016

A layered caching architecture for the interference channel.
Proceedings of the IEEE International Symposium on Information Theory, 2016

LEDPUF: Stability-guaranteed physical unclonable functions through locally enhanced defectivity.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

System identification in the presence of adversarial outputs.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

Secure system identification.
Proceedings of the 54th Annual Allerton Conference on Communication, 2016

2015
When Are Dynamic Relaying Strategies Necessary in Half-Duplex Wireless Networks?
IEEE Trans. Inf. Theory, 2015

Gaussian Interference Channel With Intermittent Feedback.
IEEE Trans. Inf. Theory, 2015

Secret Communication Over Broadcast Erasure Channels With State-Feedback.
IEEE Trans. Inf. Theory, 2015

Secure Network Coding With Erasures and Feedback.
IEEE Trans. Inf. Theory, 2015

Hierarchical routing over dynamic wireless networks.
Random Struct. Algorithms, 2015

Wireless Network Security: Building on Erasures.
Proc. IEEE, 2015

An Approximation Approach to Network Information Theory.
Found. Trends Commun. Inf. Theory, 2015

Secure state estimation: Optimal guarantees against sensor attacks in the presence of noise.
Proceedings of the IEEE International Symposium on Information Theory, 2015

On the oblivious transfer capacity of the degraded wiretapped binary erasure channel.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Opportunistic scheduling for full-duplex uplink-downlink networks.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Effect of number of users in multi-level coded caching.
Proceedings of the IEEE International Symposium on Information Theory, 2015

On degrees-of-freedom of multi-user MIMO full-duplex network.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Content caching and delivery over heterogeneous wireless networks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Rate splitting is approximately optimal for fading Gaussian interference channels.
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015

2014
Optimality and Approximate Optimality of Source-Channel Separation in Networks.
IEEE Trans. Inf. Theory, 2014

Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks.
IEEE Trans. Autom. Control., 2014

Coded Caching for Heterogeneous Wireless Networks with Multi-level Access.
CoRR, 2014

On the oblivious transfer capacity region of the binary erasure broadcast channel.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

Harnessing bursty interference in multicarrier systems with feedback.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

The oblivious transfer capacity of the wiretapped binary erasure channel.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Multi-level coded caching.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Triangle network secrecy.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

QUILT: A Decode/Quantize-Interleave-Transmit approach to cooperative relaying.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Secure state estimation and control using multiple (insecure) observers.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

Feedback through overhearing.
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

2013
Approximately Achieving Gaussian Relay Network Capacity With Lattice-Based QMF Codes.
IEEE Trans. Inf. Theory, 2013

The Approximate Capacity of the Gaussian $N$-Relay Diamond Network.
IEEE Trans. Inf. Theory, 2013

Computation over Mismatched Channels.
IEEE J. Sel. Areas Commun., 2013

Interference channels with bursty traffic and delayed feedback.
Proceedings of the 14th IEEE Workshop on Signal Processing Advances in Wireless Communications, 2013

Securing broadcast against dishonest receivers.
Proceedings of the International Symposium on Network Coding, 2013

Quantize-map-forward (QMF) relaying: an experimental study.
Proceedings of the Fourteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2013

Creating secrets out of erasures.
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013

On degrees-of-freedom of full-duplex uplink/downlink channel.
Proceedings of the 2013 IEEE Information Theory Workshop, 2013

Exploiting common randomness: A resource for network secrecy.
Proceedings of the 2013 IEEE Information Theory Workshop, 2013

Bursty interference channel with feedback.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Opportunistic interference management for multicarrier systems.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Using feedback for secrecy over graphs.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Interference channel with intermittent feedback.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Coding with encoding uncertainty.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

A block Markov encoding scheme for broadcasting nested message sets.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Exchanging pairwise secrets efficiently.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

An achievable rate region for Gaussian interference channel with intermittent feedback.
Proceedings of the 51st Annual Allerton Conference on Communication, 2013

On uplink/downlink full-duplex networks.
Proceedings of the 2013 Asilomar Conference on Signals, 2013

2012
On the Maximum Achievable Sum-Rate With Successive Decoding in Interference Channels.
IEEE Trans. Inf. Theory, 2012

Subspace Properties of Network Coding and Their Applications.
IEEE Trans. Inf. Theory, 2012

Secret-Key Generation Using Correlated Sources and Channels.
IEEE Trans. Inf. Theory, 2012

On multicasting nested message sets over combination networks.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012

Towards integrating Quantize-Map-Forward relaying into LTE.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012

On degrees of freedom of layered two unicast networks with delayed CSIT.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Dynamic QMF for half-duplex relay networks.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Broadcasting private messages securely.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Is non-unique decoding necessary?
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

On interactive secrecy over erasure networks.
Proceedings of the 5th International Symposium on Communications, 2012

Creating shared secrets out of thin air.
Proceedings of the 11th ACM Workshop on Hot Topics in Networks, 2012

Security for control systems under sensor and actuator attacks.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

Convex optimization for precoder design in MIMO interference networks.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
The Achievable Distortion Region of Sending a Bivariate Gaussian Source on the Gaussian Broadcast Channel.
IEEE Trans. Inf. Theory, 2011

Approximate Characterizations for the Gaussian Source Broadcast Distortion Region.
IEEE Trans. Inf. Theory, 2011

On the Capacity of Noncoherent Network Coding.
IEEE Trans. Inf. Theory, 2011

Approximate Capacity of a Class of Gaussian Interference-Relay Networks.
IEEE Trans. Inf. Theory, 2011

Wireless Network Information Flow: A Deterministic Approach.
IEEE Trans. Inf. Theory, 2011

Secret-Key Agreement With Channel State Information at the Transmitter.
IEEE Trans. Inf. Forensics Secur., 2011

On Successive Refinement of Diversity for Fading ISI Channels.
IEEE Trans. Commun., 2011

Secure Capacity Region for Erasure Broadcast Channels with Feedback
CoRR, 2011

Exchanging Secrets without Using Cryptography
CoRR, 2011

Randomized Algorithms for Comparison-based Search.
Proceedings of the Advances in Neural Information Processing Systems 24: 25th Annual Conference on Neural Information Processing Systems 2011. Proceedings of a meeting held 12-14 December 2011, 2011

Graph-based codes for Quantize-Map-and-Forward relaying.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

Secret message capacity of erasure broadcast channels with feedback.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

On the sum-capacity with successive decoding in interference channels.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Group secret key agreement over state-dependent wireless broadcast channels.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

A remark on secret-key generation over correlated fading channels.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

On the parallel relay wire-tap network.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

Secure state-estimation for dynamical systems under active adversaries.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

2010
Asymmetric multilevel diversity coding and asymmetric Gaussian multiple descriptions.
IEEE Trans. Inf. Theory, 2010

Network resource allocation for competing multiple description transmissions.
IEEE Trans. Commun., 2010

Joint identity-message coding.
IEEE J. Sel. Areas Commun., 2010

Approximate Capacity of Gaussian Interference-Relay Networks with Weak Cross Links
CoRR, 2010

Gaussian diamond network with adversarial jammer.
Proceedings of the 2010 IEEE Information Theory Workshop, 2010

Facebrowsing: Search and navigation through comparisons.
Proceedings of the Information Theory and Applications Workshop, 2010

The achievable distortion region of bivariate Gaussian source on Gaussian broadcast channel.
Proceedings of the IEEE International Symposium on Information Theory, 2010

On cooperative secrecy for discrete memoryless relay networks.
Proceedings of the IEEE International Symposium on Information Theory, 2010

Approximately achieving Gaussian relay network capacity with lattice codes.
Proceedings of the IEEE International Symposium on Information Theory, 2010

2009
Approximating the Gaussian multiple description rate region under symmetric distortion constraints.
IEEE Trans. Inf. Theory, 2009

Multiple description coding for stationary Gaussian sources.
IEEE Trans. Inf. Theory, 2009

Optimal Rate-Reliability-Delay Tradeoff in Networks with Composite Links.
IEEE Trans. Commun., 2009

Linear diversity-embedding STBC: design issues and applications.
IEEE Trans. Commun., 2009

Network coding for undirected information exchange.
IEEE Commun. Lett., 2009

Approximate Nearest Neighbor Search through Comparisons
CoRR, 2009

On the capacity of multisource non-coherent network coding.
Proceedings of the 2009 IEEE Information Theory Workshop, 2009

Capacity of deterministic Z-chain relay-interference network.
Proceedings of the 2009 IEEE Information Theory Workshop, 2009

A deterministic approach to wireless network error correction.
Proceedings of the 2009 IEEE Information Theory Workshop, 2009

Approximate characterizations for the Gaussian broadcasting distortion region.
Proceedings of the IEEE International Symposium on Information Theory, 2009

On the capacity of non-coherent network coding.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Approximate capacity of a class of Gaussian relay-interference networks.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Secret key agreement using asymmetry in channel state knowledge.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Lossy source coding with Gaussian or erased side-information.
Proceedings of the IEEE International Symposium on Information Theory, 2009

On Cooperative Wireless Network Secrecy.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Identity Aware Sensor Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

The Interference-Multiple-Access Channel.
Proceedings of IEEE International Conference on Communications, 2009

2008
Successive Refinement Via Broadcast: Optimizing Expected Distortion of a Gaussian Source Over a Gaussian Fading Channel.
IEEE Trans. Inf. Theory, 2008

Side-Information Scalable Source Coding.
IEEE Trans. Inf. Theory, 2008

Multiuser Successive Refinement and Multiple Description Coding.
IEEE Trans. Inf. Theory, 2008

Embedded Rank Distance Codes for ISI Channels.
IEEE Trans. Inf. Theory, 2008

Diversity Embedded Space-Time Codes.
IEEE Trans. Inf. Theory, 2008

Introduction to the Issue on MIMO-Optimized Transmission Systems for Delivering Data and Rich Content.
IEEE J. Sel. Top. Signal Process., 2008

Diversity Embedded Codes: Theory and Practice.
IEEE J. Sel. Top. Signal Process., 2008

Transmission Techniques for Relay-Interference Networks
CoRR, 2008

Noncoherent multisource network coding.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Asymmetric Gaussian multiple descriptions and asymmetric multilevel diversity coding.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Secret-key generation with correlated sources and noisy channels.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Successive refinement of diversity for fading ISI MISO channels.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Approximate capacity of Gaussian relay networks.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

On the Symmetric Gaussian Multiple Description Rate-Distortion Function.
Proceedings of the 2008 Data Compression Conference (DCC 2008), 2008

Asymmetric Multi-level Diversity Coding.
Proceedings of the 2008 Data Compression Conference (DCC 2008), 2008

2007
On Multistage Successive Refinement for Wyner-Ziv Source Coding With Degraded Side Informations.
IEEE Trans. Inf. Theory, 2007

Wireless Network Information Flow
CoRR, 2007

A Deterministic Approach to Wireless Relay Networks
CoRR, 2007

Expected Distortion for Gaussian Source with a Broadcast Transmission Strategy over a Fading Channel.
Proceedings of the IEEE Information Theory Workshop on Information Theory for Wireless Networks, 2007

Subspace Properties of Randomized Network Coding.
Proceedings of the IEEE Information Theory Workshop on Information Theory for Wireless Networks, 2007

Rank Distance Codes for ISI channels.
Proceedings of the IEEE Information Theory Workshop on Information Theory for Wireless Networks, 2007

A Deterministic Model for Wreless Relay Networks an its Capacity.
Proceedings of the IEEE Information Theory Workshop on Information Theory for Wireless Networks, 2007

On Scalable Source Coding With Decoder Side Informations.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Capacity Upper Bounds for the Deletion Channel.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Robust Geo-Routing on Embeddings of Dynamic Wireless Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Multiple Description Coding for Stationary and Ergodic Sources.
Proceedings of the 2007 Data Compression Conference (DCC 2007), 2007

2006
On information transmission over a finite buffer channel.
IEEE Trans. Inf. Theory, 2006

On opportunistic codes and broadcast codes with degraded message sets.
Proceedings of the 2006 IEEE Information Theory Workshop, 2006

On the Role of Encoder Side-Information in Source Coding for Multiple Decoders.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

2005
Nonintersecting subspaces based on finite alphabets.
IEEE Trans. Inf. Theory, 2005

Even One-Dimensional Mobility Increases the Capacity of Wireless Networks.
IEEE Trans. Inf. Theory, 2005

Parallel scheduling problems in next generation wireless networks.
Networks, 2005

Construction and analysis of a new quaternionic space-time code for 4 transmit antennas.
Commun. Inf. Syst., 2005

Fundamental limits of diversity-embedded codes over fading channels.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

Efficient String Matching Algorithms for Combinatorial Universal Denoising.
Proceedings of the 2005 Data Compression Conference (DCC 2005), 2005

2004
Great expectations: the value of spatial diversity in wireless networks.
Proc. IEEE, 2004

On multiple description source coding with decoder side information.
Proceedings of the 2004 IEEE Information Theory Workshop, 2004

Construction and analysis of a new 4 x 4 orthogonal space-time block code.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

Space-time signaling based on Kerdock and Delsafte-Goethals codes.
Proceedings of IEEE International Conference on Communications, 2004

2003
Algebraic properties of space-time block codes in intersymbol interference multiple-access channels.
IEEE Trans. Inf. Theory, 2003

Efficient Max-Norm Distance Computation for Reliable Voxelization.
Proceedings of the First Eurographics Symposium on Geometry Processing, 2003

LHP: an end-to-end reliable transport protocol over wireless data networks.
Proceedings of IEEE International Conference on Communications, 2003

Multiuser joint equalization and decoding of space-time codes.
Proceedings of IEEE International Conference on Communications, 2003

Diversity-embedded space-time codes.
Proceedings of the Global Telecommunications Conference, 2003

Diversity Embedding in Multiple Antenna Communications.
Proceedings of the Advances in Network Information Theory, 2003

Diversity order of space-time block codes in inter-symbol interference multiple-access channels.
Proceedings of the Multiantenna Channels: Capacity, 2003

2002
Intercarrier interference in MIMO OFDM.
IEEE Trans. Signal Process., 2002

Asymmetric multiple description lattice vector quantizers.
IEEE Trans. Inf. Theory, 2002

Prefiltered space-time M-BCJR equalizer for frequency-selective channels.
IEEE Trans. Commun., 2002

Guard sequence optimization for block transmission over linear frequency-selective channels.
IEEE Trans. Commun., 2002

Differential space-time coding for frequency-selective channels.
IEEE Commun. Lett., 2002

Estimation of fast fading channels in OFDM.
Proceedings of the 2002 IEEE Wireless Communications and Networking Conference Record, 2002

2001
The worst additive noise under a covariance constraint.
IEEE Trans. Inf. Theory, 2001

On achievable performance of spatial diversity fading channels.
IEEE Trans. Inf. Theory, 2001

Maximum throughput loss of noisy ISI channels due to narrow-band interference.
IEEE Commun. Lett., 2001

2000
Worst-case narrow-band interference over noisy dispersive channels.
Proceedings of the IEEE International Conference on Acoustics, 2000

Guard sequence optimization for block transmission over linear dispersive channels.
Proceedings of the Global Telecommunications Conference, 2000. GLOBECOM 2000, San Francisco, CA, USA, 27 November, 2000

Design of Asymmetric Multiple Description Lattice Vector Quantizers.
Proceedings of the Data Compression Conference, 2000

1999
An interference suppression scheme with joint channel-data estimation.
IEEE J. Sel. Areas Commun., 1999

On multiple access communications using spatial diversity.
Proceedings of the 1999 IEEE Wireless Communications and Networking Conference, 1999

1998
Joint channel-data estimation with interference suppression.
Proceedings of the 1998 IEEE International Conference on Communications, 1998

1997
Analysis of Multicarrier Transmission in Time-Varying Channels.
Proceedings of the 1997 IEEE International Conference on Communications: Towards the Knowledge Millennium, 1997

1996
A frame-work for joint source-channel coding of images over time-varying wireless channels.
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996

1995
Convergence models for Rosenblatt's perceptron learning algorithm.
IEEE Trans. Signal Process., 1995


  Loading...