Publication | Date of Publication | Type |
---|
Semantic Private Information Retrieval | 2022-07-13 | Paper |
Coded Distributed Computing With Partial Recovery | 2022-05-30 | Paper |
Private Set Intersection: A Multi-Message Symmetric Private Information Retrieval Perspective | 2022-05-30 | Paper |
Age of Information in G/G/1/1 Systems: Age Expressions, Bounds, Special Cases, and Optimization | 2022-02-17 | Paper |
The Capacity of Private Information Retrieval With Private Side Information Under Storage Constraints | 2020-09-29 | Paper |
The Capacity of Private Information Retrieval From Heterogeneous Uncoded Caching Databases | 2020-09-29 | Paper |
Private Information Retrieval Through Wiretap Channel II: Privacy Meets Security | 2020-09-29 | Paper |
Asymmetry Hurts: Private Information Retrieval Under Asymmetric Traffic Constraints | 2020-01-28 | Paper |
The Capacity of Private Information Retrieval With Partially Known Private Side Information | 2020-01-28 | Paper |
Noisy Private Information Retrieval: On Separability of Channel Coding and Information Retrieval | 2020-01-28 | Paper |
Age-Minimal Transmission for Energy Harvesting Sensors With Finite Batteries: Online Policies | 2020-01-28 | Paper |
Fundamental Limits of Cache-Aided Private Information Retrieval With Unknown and Uncoded Prefetching | 2019-07-19 | Paper |
The Capacity of Private Information Retrieval from Byzantine and Colluding Databases | 2019-01-28 | Paper |
Secure Degrees of Freedom Region of Static and Time-Varying Gaussian MIMO Interference Channel | 2019-01-18 | Paper |
Multi-Message Private Information Retrieval: Capacity Results and Near-Optimal Schemes | 2018-09-19 | Paper |
Deaf Cooperation and Relay Selection Strategies for Secure Communication in Multiple Relay Networks | 2018-08-22 | Paper |
Optimal Energy Allocation for Energy Harvesting Transmitters With Hybrid Energy Storage and Processing Cost | 2018-08-22 | Paper |
The Capacity of Private Information Retrieval From Coded Databases | 2018-06-27 | Paper |
Secure Degrees of Freedom of the Multiple Access Wiretap Channel With Multiple Antennas | 2018-06-27 | Paper |
The Binary Energy Harvesting Channel With a Unit-Sized Battery | 2017-09-21 | Paper |
Secure Degrees of Freedom Region of the Two-User MISO Broadcast Channel With Alternating CSIT | 2017-09-08 | Paper |
Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel | 2017-08-08 | Paper |
Outer Bounds for Multiple-Access Channels With Feedback Using Dependence Balance | 2017-08-08 | Paper |
Mutual Information Games in Multiuser Channels With Correlated Jamming | 2017-08-08 | Paper |
Secure Degrees of Freedom of One-Hop Wireless Networks With No Eavesdropper CSIT | 2017-07-27 | Paper |
The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel | 2017-07-27 | Paper |
A New Data Processing Inequality and Its Applications in Distributed Source and Channel Coding | 2017-07-27 | Paper |
Secrecy in Cooperative Relay Broadcast Channels | 2017-07-27 | Paper |
An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel | 2017-07-12 | Paper |
Ergodic Secret Alignment | 2017-07-12 | Paper |
Capacity of a Class of Diamond Channels | 2017-07-12 | Paper |
Dependence Balance Based Outer Bounds for Gaussian Networks With Cooperation and Feedback | 2017-07-12 | Paper |
Wiretap Channels: Implications of the More Capable Condition and Cyclic Shift Symmetry | 2017-06-08 | Paper |
Multi-Receiver Wiretap Channel With Public and Confidential Messages | 2017-06-08 | Paper |
Secure Source Coding With a Helper | 2017-06-08 | Paper |
An Outer Bound for the Gaussian MIMO Broadcast Channel With Common and Private Messages | 2017-06-08 | Paper |
Achieving AWGN Capacity Under Stochastic Energy Harvesting | 2017-06-08 | Paper |
Capacity Region of Gaussian MIMO Broadcast Channels With Common and Confidential Messages | 2017-06-08 | Paper |
Degraded Compound Multi-Receiver Wiretap Channels | 2017-06-08 | Paper |
Capacity-Equivocation Region of the Gaussian MIMO Wiretap Channel | 2017-06-08 | Paper |
Secure Lossy Transmission of Vector Gaussian Sources | 2017-06-08 | Paper |
An Outer Bound for the Vector Gaussian CEO Problem | 2017-05-16 | Paper |
Secure Degrees of Freedom of One-Hop Wireless Networks | 2017-05-16 | Paper |
Secure Degrees of Freedom Regions of Multiple Access and Interference Channels: The Polytope Structure | 2017-04-28 | Paper |
Gaussian Wiretap Channel With Amplitude and Variance Constraints | 2017-04-28 | Paper |
Secure Degrees of Freedom of <inline-formula> <tex-math notation="LaTeX">$K$ </tex-math></inline-formula>-User Gaussian Interference Channels: A Unified View | 2017-04-28 | Paper |
The Capacity Region of a Class of Discrete Degraded Interference Channels | 2009-02-24 | Paper |
Optimum Power Control for CDMA With Deterministic Sequences in Fading Channels | 2008-12-21 | Paper |
Ergodic Sum Capacity Maximization for CDMA: Optimum Resource Allocation | 2008-12-21 | Paper |
Standard and Quasi-Standard Stochastic Power Control Algorithms | 2008-12-21 | Paper |
Optimal Sequences and Sum Capacity of Symbol Asynchronous CDMA Systems | 2008-12-21 | Paper |
User Capacity of Asynchronous CDMA Systems With Matched Filter Receivers and Optimum Signature Sequences | 2008-12-21 | Paper |
Scaling Laws for Dense Gaussian Sensor Networks and the Order Optimality of Separation | 2008-12-21 | Paper |
Interference management for CDMA systems through power control, multiuser detection, and beamforming | 2003-06-19 | Paper |
Iterative construction of optimum signature sequence sets in synchronous CDMA systems | 2002-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4359347 | 1997-10-08 | Paper |