• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • Contact Us
  • Schedule
  • Posters
  • Videos
  • Reading Material
  • Organizers
  • Pictures

2018 North-American School of Information Theory

Texas A&M University College of Engineering

Posters

Monday, May 21

Mr. Hengjie Yang A Convolutional-Code-Specific Redesign of the 3GPP 8, 12, and 16-bit CRC Codes  
Kenneth S. Palacio-Baus Error Exponents for Two-Way AWGN Channels at Zero-Rate      
Ardhendu Tripathy Zero-error function computation on a directed acyclic network      
Ahmad Golmohammadi Joint Source-Channel Coding with Concatenated Spatially Coupled LDPC Codes  
Zhen Chen The Asymptotic Capacity of Private Search          
Ahmed A. Zewail A wiretap channel with a cache             
Ramy E. Ali Multi-version Coding with Side Information          
Hassan Zivari-Fard Two-Transmitter Two-Receiver with Confidential Messages      
PINAR SEN Optimal Achievable Rate Region for Computation with Homologous Codes    
Amir Asadi Generalization bounds with mutual information        
Andrew Nemec Hybrid Codes              
Michelle Facina Accurate Log-Normal Approximation to the Signal-to-Interference Ratio in Massive MIMO Systems
Navid (Esmaeil) Karimi Fast Localization of Multiple Users in Mm-Wave Cells        
Nazanin Takbiri A Unified Framework for IoT privacy          
Vamsi A coupled compressive sensing for unsourced multiple access      
Fatima Ahsan Reducing Latency in LTE RACH, by the size of Texas        
Sung-En Chiu Sequential Search for mmWave Initial Access        
Dennis Ogbe Transcoding: A New Strategy for Relay Channels        
Yahya Ezzeldin Capacity Results for mmWave Relay Networks        
Ramin Soltani Covert communication over packet channels          
Keerthi Arumugam Covert communication over relay channel          
Joe Young Information Theoretic Analysis of Neural Recordings        
Abbas Khalili On MIMO Channel Capacity with Output Quantization Constraints      
Ke Li Privacy Against Matching under Anonymization and Obfuscation in the Gaussian Case  
Md Atiqul Islam A Comprehensive Self-interference Model for Single-antenna Full-duplex Communication Systems  

 

 

Tuesday, May 22

 

 

Roberto Machado Metrics that respect the support
Narayanan Synthesis of Logical Operators for Quantum Computers using Stabilizer Codes
Anusha Lalitha Active Learning for Real-time Tracking of Dynamic Targets
Mehrdad Quantum Covert Key Generation
Jack Wang QG-Net: A Data-Driven Question Generation Model for Educational Content
Alireza Training Probabilistic Spiking Neural Networks with First-to-spike Decoding
Marwen Zorgui Distributed storage: Coding and Algorithms
Jingbo Liu Rejection Sampling and Noncausal Sampling Under Moment Constraints
Vipul Gupta A More Practical Matrix Multiplication for the Cloud
Nadia Kazemi Achievable Service Rates in Coded Distributed Storage
Bharadwaj Satchidanandan Securable and Unsecurable Subspaces of a Linear Stochastic System
Semih Yagli Exact Soft-Covering Exponent
Michal Yemini Hidden Markov Bandits with Linear Rewards
Sudha Yellapantula Analysis of brain dynamics in a language task using information theoretic graphs
Yugandhar On the optimality of the greedy policy for the sequential scalar measurement problem in signal-plus-noise models. 
Angie Forero  Nonlinear Adaptive Estimation by Kernel Parallel Hyperslab Projection Along Affine Subspaces with kernel least mean square-Surprise Criterion Algorithm
Nicholas Woolsey Practical Device-To-Device (D2D) Wireless Caching Networks
Xiang Zhang On Reducing the Packetization Complexity of Cache-aided Interference Management 
Abdelrahman Ibrahim Device-to-Device Coded Caching with Heterogeneous Cache Sizes
Arun The Trade-off between Privacy and Fidelity via Ehrhart Theory
LEI ZHENG Coded Caching Scheme Design with Directional Antenna Coverage
Negar Erfanian Extracting Qualitative Information from Dynamics of Epileptic Data as an Approach for Seizure Prediction
Mohamed Nafea The Caching Broadcast Channel with a Wire and Cache Tapping Adversary of Type II
Srilakshmi Pattabiraman Leveraging the Greed in Social Learning
Nirmal Shende Point Process Entropy

 

 

© 2016–2023 2018 North-American School of Information Theory Log in

Texas A&M Engineering Experiment Station Logo
  • Home
  • Contact Us
  • Schedule
  • Posters
  • Videos
  • Reading Material
  • Organizers
  • Pictures
  • State of Texas
  • Open Records
  • Risk, Fraud & Misconduct Hotline
  • Statewide Search
  • Site Links & Policies
  • Accommodations
  • Environmental Health, Safety & Security
  • Employment