-
1
-
-
46849120830
-
Communication via decentralized processing
-
July;.
-
Sanderovich A, Shamai S, Steinberg Y, Kramer G,. Communication via decentralized processing. IEEE Transactions on Information Theory July 2008; 54 (7): 3008-3023.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.7
, pp. 3008-3023
-
-
Sanderovich, A.1
Shamai, S.2
Steinberg, Y.3
Kramer, G.4
-
2
-
-
68249154931
-
Uplink macro diversity of limited backhaul cellular network
-
August;.
-
Sanderovich A, Somekh O, Poor V, Shamai S,. Uplink macro diversity of limited backhaul cellular network. IEEE Transactions on Information Theory August 2009; 55 (8): 3457-3478.
-
(2009)
IEEE Transactions on Information Theory
, vol.55
, Issue.8
, pp. 3457-3478
-
-
Sanderovich, A.1
Somekh, O.2
Poor, V.3
Shamai, S.4
-
3
-
-
70349622772
-
Distributed MIMO, receiver-achievable rates and upper bounds
-
October;.
-
Sanderovich A, Shamai S, Steinberg Y,. Distributed MIMO, receiver-achievable rates and upper bounds. IEEE Transactions on Information Theory October 2009; 55 (10): 4419-4438.
-
(2009)
IEEE Transactions on Information Theory
, vol.55
, Issue.10
, pp. 4419-4438
-
-
Sanderovich, A.1
Shamai, S.2
Steinberg, Y.3
-
4
-
-
0028384931
-
Error bounds for the Euclidean channel subject to intentional jamming
-
March;.
-
Hedby G,. Error bounds for the Euclidean channel subject to intentional jamming. IEEE Transactions on Information Theory March 1994; 40 (2): 594-600.
-
(1994)
IEEE Transactions on Information Theory
, vol.40
, Issue.2
, pp. 594-600
-
-
Hedby, G.1
-
5
-
-
45249101530
-
The general Gaussian multiple-access and two-way wire-tap channels: Achievable rates and cooperative jamming
-
June;.
-
Tekin E, Yener A,. The general Gaussian multiple-access and two-way wire-tap channels: achievable rates and cooperative jamming. IEEE Transactions on Information Theory June 2008; 54 (6): 2735-2751.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
6
-
-
70349659513
-
Generalized relaying in the presence of interference
-
October
-
Maric I, Dabora R, Goldsmith A,. Generalized relaying in the presence of interference. 42nd Asilomar Conference on Signals, Systems and Computers,October 2008; 1579-1582.
-
(2008)
42nd Asilomar Conference on Signals, Systems and Computers
, pp. 1579-1582
-
-
Maric, I.1
Dabora, R.2
Goldsmith, A.3
-
7
-
-
52349119652
-
On the capacity of the interference channel with a relay
-
Maric I, Dabora R, Goldsmith A,. On the capacity of the interference channel with a relay. IEEE International Symposium on Information Theory, Toronto, Ontario, Canada,July 2008; 554-558.
-
(2008)
IEEE International Symposium on Information Theory, Toronto, Ontario, Canada,July
, pp. 554-558
-
-
Maric, I.1
Dabora, R.2
Goldsmith, A.3
-
8
-
-
67249091366
-
Interference forwarding in multiuser networks
-
November
-
Dabora R, Maric I, Goldsmith A,. Interference forwarding in multiuser networks. IEEE Global Telecommunications Conference, GLOBECOM 2008,November 2008; 1-5.
-
(2008)
IEEE Global Telecommunications Conference, GLOBECOM 2008
, pp. 1-5
-
-
Dabora, R.1
Maric, I.2
Goldsmith, A.3
-
9
-
-
70449482714
-
Interference channel aided by an infrastructure relay
-
Seoul, S. Korea, June
-
Sahin O, Simeone O, Erkip E,. Interference channel aided by an infrastructure relay. IEEE International Symposium on Information Theory, Seoul, S. Korea, June 2009; 2023-2027.
-
(2009)
IEEE International Symposium on Information Theory
, pp. 2023-2027
-
-
Sahin, O.1
Simeone, O.2
Erkip, E.3
-
10
-
-
79955514024
-
Interference mitigation through limited receiver cooperation
-
May;.
-
Wang I-H, Tse DNC,. Interference mitigation through limited receiver cooperation. IEEE Transactions on Information Theory May 2011; 57 (5): 2913-2940.
-
(2011)
IEEE Transactions on Information Theory
, vol.57
, Issue.5
, pp. 2913-2940
-
-
Wang, I.-H.1
Tse, D.N.C.2
-
12
-
-
51349105010
-
Structured random codes and sensor network coding theorems
-
Nazer B, Gastpar M,. Structured random codes and sensor network coding theorems. Proceedings of the 2008 International Zurich Seminar on Communications, Zurich, Switzerland, March 2008.
-
(2008)
Proceedings of the 2008 International Zurich Seminar on Communications, Zurich, Switzerland, March
-
-
Nazer, B.1
Gastpar, M.2
-
13
-
-
46749133815
-
Lattice for distributed source coding: Jointly Gaussian sources and reconstruction of a linear function
-
July. Available.
-
Krithivasan D, Pradhan S,. Lattice for distributed source coding: jointly Gaussian sources and reconstruction of a linear function. IEEE Transactions on Information Theory July 2007. Available:.
-
(2007)
IEEE Transactions on Information Theory
-
-
Krithivasan, D.1
Pradhan, S.2
-
14
-
-
51649110961
-
Lattice strategies for the dirty multiple access channel
-
June
-
Philosof T, Khisti A, Erez U, Zamir R,. Lattice strategies for the dirty multiple access channel. Proceedings of IEEE International Symposium Info Theory (ISIT2007), Nice, France,June 2007; 386-390.
-
(2007)
Proceedings of IEEE International Symposium Info Theory (ISIT2007), Nice, France
, pp. 386-390
-
-
Philosof, T.1
Khisti, A.2
Erez, U.3
Zamir, R.4
-
15
-
-
0028384933
-
On coding without restrictions for the AWGN channel
-
March.
-
Poltyrev G,. On coding without restrictions for the AWGN channel. IEEE Transactions on Information Theory March 1994; 40: 409-417.
-
(1994)
IEEE Transactions on Information Theory
, vol.40
, pp. 409-417
-
-
Poltyrev, G.1
-
16
-
-
5144221013
-
Achieving 1 2 log (1 + S N R) on the AWGN channel with lattice encoding and decoding
-
October;.
-
Erez U, Zamir R,. Achieving 1 2 log (1 + S N R) on the AWGN channel with lattice encoding and decoding. IEEE Transactions on Information Theory October 2004; 50 (10): 2293-2314.
-
(2004)
IEEE Transactions on Information Theory
, vol.50
, Issue.10
, pp. 2293-2314
-
-
Erez, U.1
Zamir, R.2
-
17
-
-
0036611624
-
Nested linear/lattice codes for structured multiterminal binning
-
DOI 10.1109/TIT.2002.1003821, PII S0018944802048022
-
Zamir R, Shamai S, Erez U,. Nested linear/lattice codes for structured multiterminal binning. IEEE Transactions on Information Theory June 2002; 48 (6): 1250-1276. (Pubitemid 34759844)
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.6
, pp. 1250-1276
-
-
Zamir, R.1
Shamai, S.2
Erez, U.3
-
19
-
-
0020098638
-
Voronoi regions of lattices, second moments of polytopes, and quantization
-
Conway JH, Sloane NJA,. Voronoi regions of lattices, second moments of polytopes, and quantization. IEEE Transactions on Information Theory March 1982; IT-28: 211-226. (Pubitemid 12499774)
-
(1982)
IEEE Transactions on Information Theory
, vol.IT-28
, Issue.2 PART 1
, pp. 211-226
-
-
Conway, J.H.1
Sloane, N.J.A.2
-
20
-
-
52349084536
-
Compute-and-forward: Harnessing interference through structured codes
-
July
-
Nazer B, Gastpar M,. Compute-and-forward: harnessing interference through structured codes. IEEE International Symposium on Information Theory, Toronto, Ontario, Canada,July 2008.
-
(2008)
IEEE International Symposium on Information Theory, Toronto, Ontario, Canada
-
-
Nazer, B.1
Gastpar, M.2
-
21
-
-
80052097654
-
Helpers for cleaning dirty papers
-
Stadthaus, Ulm, Germany, January
-
Mallik S, Koetter R,. Helpers for cleaning dirty papers. 7th International ITG Conference on Source and Channel Coding (SCC2008), Stadthaus, Ulm, Germany,January 2008.
-
(2008)
7th International ITG Conference on Source and Channel Coding (SCC2008)
-
-
Mallik, S.1
Koetter, R.2
-
22
-
-
51849128316
-
The rate loss of single letter characterization for the dirty multiple access channel
-
Philosof T, Zamir R,. The rate loss of single letter characterization for the dirty multiple access channel. IEEE Information Theory Workshop (ITW2008), Proto, Portugal, May 2008.
-
(2008)
IEEE Information Theory Workshop (ITW2008), Proto, Portugal, May
-
-
Philosof, T.1
Zamir, R.2
-
23
-
-
0018442936
-
How to encode the module-two sum of binary sources
-
Kröner J, Marton K,. How to encode the module-two sum of binary sources. IEEE Transactions on Information Theory March 1979; IT-25 (2): 219-221. (Pubitemid 9443306)
-
(1979)
IEEE Trans Inf Theory
, vol.IT-25
, Issue.2
, pp. 219-221
-
-
Koerner Janos1
Marton Katalin2
-
25
-
-
84940643430
-
A deterministic approach to wireless relay networks
-
Avestimehr S, Diggavi S, Tse D,. A deterministic approach to wireless relay networks. Proceedings of Allerton Conference on Communication, Control, and Computing, Urbana, IL, September 2007.
-
(2007)
Proceedings of Allerton Conference on Communication, Control, and Computing, Urbana, IL, September
-
-
Avestimehr, S.1
Diggavi, S.2
Tse, D.3
-
26
-
-
78651245339
-
Multipoint decentralized processing of interfered Gaussian channel: Scaling laws
-
November
-
Sanderovich A, Peleg M, Shamai S,. Multipoint decentralized processing of interfered Gaussian channel: scaling laws. Proceedings of 26th IEEE Convention of Electrical and Electronics Engineers in Israel, Eilat, IL,November 2010.
-
(2010)
Proceedings of 26th IEEE Convention of Electrical and Electronics Engineers in Israel, Eilat, IL
-
-
Sanderovich, A.1
Peleg, M.2
Shamai, S.3
|