Monday, May 21
Mr. Hengjie Yang | A Convolutional-Code-Specific Redesign of the 3GPP 8, 12, and 16-bit CRC Codes | ||||||||
Kenneth S. Palacio-Baus | Error Exponents for Two-Way AWGN Channels at Zero-Rate | ||||||||
Ardhendu Tripathy | Zero-error function computation on a directed acyclic network | ||||||||
Ahmad Golmohammadi | Joint Source-Channel Coding with Concatenated Spatially Coupled LDPC Codes | ||||||||
Zhen Chen | The Asymptotic Capacity of Private Search | ||||||||
Ahmed A. Zewail | A wiretap channel with a cache | ||||||||
Ramy E. Ali | Multi-version Coding with Side Information | ||||||||
Hassan Zivari-Fard | Two-Transmitter Two-Receiver with Confidential Messages | ||||||||
PINAR SEN | Optimal Achievable Rate Region for Computation with Homologous Codes | ||||||||
Amir Asadi | Generalization bounds with mutual information | ||||||||
Andrew Nemec | Hybrid Codes | ||||||||
Michelle Facina | Accurate Log-Normal Approximation to the Signal-to-Interference Ratio in Massive MIMO Systems | ||||||||
Navid (Esmaeil) Karimi | Fast Localization of Multiple Users in Mm-Wave Cells | ||||||||
Nazanin Takbiri | A Unified Framework for IoT privacy | ||||||||
Vamsi | A coupled compressive sensing for unsourced multiple access | ||||||||
Fatima Ahsan | Reducing Latency in LTE RACH, by the size of Texas | ||||||||
Sung-En Chiu | Sequential Search for mmWave Initial Access | ||||||||
Dennis Ogbe | Transcoding: A New Strategy for Relay Channels | ||||||||
Yahya Ezzeldin | Capacity Results for mmWave Relay Networks | ||||||||
Ramin Soltani | Covert communication over packet channels | ||||||||
Keerthi Arumugam | Covert communication over relay channel | ||||||||
Joe Young | Information Theoretic Analysis of Neural Recordings | ||||||||
Abbas Khalili | On MIMO Channel Capacity with Output Quantization Constraints | ||||||||
Ke Li | Privacy Against Matching under Anonymization and Obfuscation in the Gaussian Case | ||||||||
Md Atiqul Islam | A Comprehensive Self-interference Model for Single-antenna Full-duplex Communication Systems |
Tuesday, May 22
Roberto Machado | Metrics that respect the support |
Narayanan | Synthesis of Logical Operators for Quantum Computers using Stabilizer Codes |
Anusha Lalitha | Active Learning for Real-time Tracking of Dynamic Targets |
Mehrdad | Quantum Covert Key Generation |
Jack Wang | QG-Net: A Data-Driven Question Generation Model for Educational Content |
Alireza | Training Probabilistic Spiking Neural Networks with First-to-spike Decoding |
Marwen Zorgui | Distributed storage: Coding and Algorithms |
Jingbo Liu | Rejection Sampling and Noncausal Sampling Under Moment Constraints |
Vipul Gupta | A More Practical Matrix Multiplication for the Cloud |
Nadia Kazemi | Achievable Service Rates in Coded Distributed Storage |
Bharadwaj Satchidanandan | Securable and Unsecurable Subspaces of a Linear Stochastic System |
Semih Yagli | Exact Soft-Covering Exponent |
Michal Yemini | Hidden Markov Bandits with Linear Rewards |
Sudha Yellapantula | Analysis of brain dynamics in a language task using information theoretic graphs |
Yugandhar | On the optimality of the greedy policy for the sequential scalar measurement problem in signal-plus-noise models. |
Angie Forero | Nonlinear Adaptive Estimation by Kernel Parallel Hyperslab Projection Along Affine Subspaces with kernel least mean square-Surprise Criterion Algorithm |
Nicholas Woolsey | Practical Device-To-Device (D2D) Wireless Caching Networks |
Xiang Zhang | On Reducing the Packetization Complexity of Cache-aided Interference Management |
Abdelrahman Ibrahim | Device-to-Device Coded Caching with Heterogeneous Cache Sizes |
Arun | The Trade-off between Privacy and Fidelity via Ehrhart Theory |
LEI ZHENG | Coded Caching Scheme Design with Directional Antenna Coverage |
Negar Erfanian | Extracting Qualitative Information from Dynamics of Epileptic Data as an Approach for Seizure Prediction |
Mohamed Nafea | The Caching Broadcast Channel with a Wire and Cache Tapping Adversary of Type II |
Srilakshmi Pattabiraman | Leveraging the Greed in Social Learning |
Nirmal Shende | Point Process Entropy |