| 2015 | 2015 IEEE Information Theory Workshop, ITW 2015, Jerusalem, Israel, April 26 - May 1, 2015 |
| 2015 | A comparison of skewed and orthogonal lattices in Gaussian wiretap channels. Alex Karrila, Camilla Hollanti |
| 2015 | A constrained-dictionary version of LZ78 asymptotically achieves the finite-state compressibility with a distortion measure. Jacob Ziv |
| 2015 | A new coding method for a multiple-access system with a large number of active users. Alexey A. Frolov, Victor V. Zyablov |
| 2015 | ADMM decoding of error correction codes: From geometries to algorithms. Xishuo Liu, Stark C. Draper |
| 2015 | Achievable and converse bounds over a general channel and general decoding metric. Nir Elkayam, Meir Feder |
| 2015 | Achieving secrecy capacity of the wiretap channel and broadcast channel with a confidential component. Talha Cihad Gülcü, Alexander Barg |
| 2015 | Approximation algorithms for erasure correcting Data Exchange. Muxi Yan, Alex Sprintson |
| 2015 | Asymmetric Lee distance codes: New bounds and constructions. Ryan Gabrys, Han Mao Kiah, Olgica Milenkovic |
| 2015 | Asymptotic distance properties of protograph-based spatially coupled LDPC codes over GF(q). Kechao Huang, David G. M. Mitchell, Xiao Ma, Daniel J. Costello Jr. |
| 2015 | Boosting output distributions in finite blocklength channel coding converse bounds. Oliver Kosut |
| 2015 | Bounds for complexity of syndrome decoding for poset metrics. Marcelo Firer, Jerry Anderson Pinheiro |
| 2015 | Broadcast channels with cooperation: Capacity and duality for the semi-deterministic case. Ziv Goldfeld, Haim H. Permuter, Gerhard Kramer |
| 2015 | CEO problem for belief sharing. Aditya Vempaty, Lav R. Varshney |
| 2015 | Caching-aided coded multicasting with multiple random requests. Mingyue Ji, Antonia M. Tulino, Jaime Llorca, Giuseppe Caire |
| 2015 | Can feedback increase the capacity of the energy harvesting channel? Dor Shaviv, Ayfer Özgür, Haim H. Permuter |
| 2015 | Capacity of Binary State Symmetric Channel with and without feedback and transmission cost. Christos K. Kourtellaris, Charalambos D. Charalambous |
| 2015 | Capacity of deterministic, half-duplex, line networks with two sources. Gerhard Kramer |
| 2015 | Capacity of the (1, ∞)-RLL input-constrained erasure channel with feedback. Oron Sabag, Haim H. Permuter, Navin Kashyap |
| 2015 | Capacity region continuity of the compound broadcast channel with confidential messages. Andrea Grigorescu, Holger Boche, Rafael F. Schaefer, H. Vincent Poor |
| 2015 | Capacity results for the Multicast Cognitive Interference Channel. Meryem Benammar, Pablo Piantanida, Shlomo Shamai |
| 2015 | Capacity scaling in noncoherent wideband massive SIMO systems. Mainak Chowdhury, Alexandros Manolakos, Felipe Gómez-Cuba, Elza Erkip, Andrea J. Goldsmith |
| 2015 | Codes for DNA storage channels. Han Mao Kiah, Gregory J. Puleo, Olgica Milenkovic |
| 2015 | Codes for RAID solutions based upon SSDs. Alexander Vardy, Eitan Yaakobi |
| 2015 | Coding for network-coded slotted ALOHA. Shenghao Yang, Yi Chen, Soung Chang Liew, Lizhao You |
| 2015 | Combinatorial channels from partially ordered sets. Daniel Cullina, Negar Kiyavash |
| 2015 | Compute-and-forward using nested linear codes for the Gaussian MAC. Jingge Zhu, Michael Gastpar |
| 2015 | Conditioning and covariance on caterpillars. Sarah R. Allen, Ryan O'Donnell |
| 2015 | Conferencing in Wyner's asymmetric interference network: Effect of number of rounds. Michèle A. Wigger, Roy Timo, Shlomo Shamai |
| 2015 | Coordinating partially-informed agents over state-dependent networks. Benjamin Larrousse, Samson Lasaulce, Michèle A. Wigger |
| 2015 | Cross-packing lattices for the Rician fading channel. Amin Sakzad, Anna-Lena Trautmann, Emanuele Viterbo |
| 2015 | Cyclic codes and algebraic immunity of Boolean functions. Sihem Mesnager, Gérard D. Cohen |
| 2015 | Cyclic linear binary locally repairable codes. Pengfei Huang, Eitan Yaakobi, Hironori Uchikawa, Paul H. Siegel |
| 2015 | Deep learning and the information bottleneck principle. Naftali Tishby, Noga Zaslavsky |
| 2015 | Degraded broadcast channel: Secrecy outside of a bounded range. Shaofeng Zou, Yingbin Liang, Lifeng Lai, Shlomo Shamai |
| 2015 | Design of LDPC codes for the q-ary partial erasure channel. Rami Cohen, Yuval Cassuto |
| 2015 | Distortion-transmission trade-off in real-time transmission of Markov sources. Jhelum Chakravorty, Aditya Mahajan |
| 2015 | Distributed storage allocations for neighborhood-based data access. Dusan Jakovetic, Aleksandar Minja, Dragana Bajovic, Dejan Vukobratovic |
| 2015 | Encoding and decoding algorithms for LP-decodable multipermutation codes. Xishuo Liu, Stark C. Draper |
| 2015 | Erasure/list random coding error exponents are not universally achievable. Nir Weinberger, Wasim Huleihel, Neri Merhav |
| 2015 | Error correction through language processing. Anxiao Jiang, Yue Li, Jehoshua Bruck |
| 2015 | Exponential rates of convergence for waiting times and generalized AEP. Ayush Jain, Rakesh Kumar Bansal |
| 2015 | File updates under random/arbitrary insertions and deletions. Qiwen Wang, Viveck R. Cadambe, Sidharth Jaggi, Moshe Schwartz, Muriel Médard |
| 2015 | Gaussian estimation under attack uncertainty. Tara Javidi, Yonatan Kaspi, Himanshu Tyagi |
| 2015 | Gaussian joint source-channel coding for the strong interference channel. Inaki Estella Aguerri, Deniz Gündüz |
| 2015 | Greedy MaxCut algorithms and their information content. Yatao Bian, Alexey Gronskiy, Joachim M. Buhmann |
| 2015 | Harmonic analysis of binary functions. Jean-Claude Belfiore, Yi Hong, Emanuele Viterbo |
| 2015 | Improved layered regenerating codes characterizing the exact-repair storage-repair bandwidth tradeoff for certain parameter sets. Kaushik Senthoor, Birenjith Sasidharan, P. Vijay Kumar |
| 2015 | Information-theory-friendly models for fiber-optic channels: A primer. Erik Agrell, Giuseppe Durisi, Pontus Johannisson |
| 2015 | Lattice index coding for the broadcast channel. Natarajan Lakshmi Prasad, Yi Hong, Emanuele Viterbo |
| 2015 | Multihop virtual full-duplex relay channels. Song-Nam Hong, Ivana Maric, Dennis Hui, Giuseppe Caire |
| 2015 | Nested lattice codes for secure bidirectional relaying with asymmetric channel gains. Shashank Vatedka, Navin Kashyap |
| 2015 | New directions in information theoretic security: Benefits of bidirectional signaling. Aylin Yener |
| 2015 | Non-adaptive group testing with inhibitors. Abhinav Ganesan, Sidharth Jaggi, Venkatesh Saligrama |
| 2015 | Non-asymptotic covering lemmas. Sergio Verdú |
| 2015 | Non-binary GLD codes and their lattices. Nicola di Pietro, Nour Basha, Joseph Jean Boutros |
| 2015 | Non-locality distillation as cryptographic game. Gilles Brassard, Benno Salwey, Stefan Wolf |
| 2015 | Oblivious transfer over OFDM and MIMO channels. Jithin Ravi, Bikash Kumar Dey, Emanuele Viterbo |
| 2015 | On MMSE properties of optimal codes for the Gaussian wiretap channel. Ronit Bustin, Rafael F. Schaefer, H. Vincent Poor, Shlomo Shamai |
| 2015 | On adaptive linear programming decoding of ternary linear codes. Eirik Rosnes, Michael Helmling |
| 2015 | On complexity and randomness of Markov-chain prediction. Joel Ratsaby |
| 2015 | On compute-and-forward with feedback. Or Ordentlich, Uri Erez, Bobak Nazer |
| 2015 | On the capacity of multihop device-to-device caching networks. Sang-Woon Jeon, Song-Nam Hong, Mingyue Ji, Giuseppe Caire |
| 2015 | On the distortion-energy tradeoff for zero-delay transmission of a Gaussian source over the AWGN channel. Erman Koken, Ertem Tuncel, Deniz Gündüz |
| 2015 | On the noisy feedback capacity of Gaussian broadcast channels. Sibi Raj B. Pillai, Vinod M. Prabhakaran |
| 2015 | On the transmission of a bivariate Gaussian source over the Gaussian broadcast channel with feedback. Yonathan Murin, Yonatan Kaspi, Ron Dabora, Deniz Gündüz |
| 2015 | One-to-one lossless codes in the variable input-length regime: Back to Kraft's inequality. Marcelo J. Weinberger |
| 2015 | Optimal linear and cyclic locally repairable codes over small fields. Alexander Zeh, Eitan Yaakobi |
| 2015 | Point-wise analysis of redundancy in SWLZ algorithm for φ-mixing sources. Ayush Jain, Rakesh Kumar Bansal |
| 2015 | Polar codes for magnetic recording channels. Aman Bhatia, Veeresh Taranalli, Paul H. Siegel, Shafa Dahandeh, Anantha Raman Krishnan, Patrick Lee, Dahua Qin, Moni Sharma, Teik Yeo |
| 2015 | Polar coding for the broadcast channel with confidential messages. Remi A. Chou, Matthieu R. Bloch |
| 2015 | Polar coding for the general wiretap channel. Yi-Peng Wei, Sennur Ulukus |
| 2015 | Powers of codes and applications to cryptography. Ignacio Cascudo |
| 2015 | Refined upper bounds on stopping redundancy of binary linear codes. Yauhen Yakimenka, Vitaly Skachek |
| 2015 | Secrecy degrees of freedom of the two-user MISO broadcast channel with mixed CSIT. Zhao Wang, Ming Xiao, Mikael Skoglund, H. Vincent Poor |
| 2015 | Secrecy-good polar lattices with optimal shaping for the Gaussian wiretap channels. Ling Liu, Yanfei Yan, Cong Ling |
| 2015 | Secret-key cryptography from ideal primitives: A systematic overview. Peter Gazi, Stefano Tessaro |
| 2015 | Secure transmission using an untrusted relay with scaled compute-and-forward. Zhijie Ren, Jasper Goseling, Jos H. Weber, Michael Gastpar |
| 2015 | Security in locally repairable storage. Abhishek Agarwal, Arya Mazumdar |
| 2015 | Separation architectures for lossy compression. Ying-zong Huang, Gregory W. Wornell |
| 2015 | Some "goodness" properties of LDA lattices. Shashank Vatedka, Navin Kashyap |
| 2015 | Stochastic interpretation for the Arimoto algorithm. Sergey Tridenski, Ram Zamir |
| 2015 | Sub-Nyquist sampling achieves optimal rate-distortion. Alon Kipnis, Andrea J. Goldsmith, Yonina C. Eldar |
| 2015 | Subset-universal lossy compression. Or Ordentlich, Ofer Shayevitz |
| 2015 | Talking reliably, secretly, and efficiently: A "complete" characterization. Qiaosheng Eric Zhang, Swanand Kadhe, Mayank Bakshi, Sidharth Jaggi, Alex Sprintson |
| 2015 | The AWGN BC with MAC feedback: A reduction to noiseless feedback via interaction. Assaf Ben-Yishai, Ofer Shayevitz |
| 2015 | The Gaussian Interference Channel with lack of codebook knowledge at one receiver: Symmetric capacity to within a gap with a PAM input. Alex Dytso, Daniela Tuninetti, Natasha Devroye |
| 2015 | The approximate optimality of simple schedules for half-duplex multi-relay networks. Martina Cardone, Daniela Tuninetti, Raymond Knopp |
| 2015 | The two-way multi-relay channel. Jonathan Ponniah, Liang-Liang Xie, Panganamala Ramana Kumar |
| 2015 | Throughput scaling for random hybrid wireless networks with physical-layer network coding. Yunyan Chang, Slawomir Stanczak, Chan Zhou |
| 2015 | Tight bounds for symmetric divergence measures and a new inequality relating f-divergences. Igal Sason |
| 2015 | Transmitting k samples over the Gaussian channel: Energy-distortion tradeoff. Victoria Kostina, Yury Polyanskiy, Sergio Verdú |
| 2015 | Unique factorization and controllability of tail-biting trellis realizations via controller granule decompositions. G. David Forney Jr. |
| 2015 | Upper bound on function computation in directed acyclic networks. Cupjin Huang, Zihan Tan, Shenghao Yang |
| 2015 | Upper bound on the capacity of a cascade of nonlinear and noisy channels. Gerhard Kramer, Mansoor I. Yousefi, Frank R. Kschischang |
| 2015 | Upper bound on the capacity of discrete-time Wiener phase noise channels. Luca Barletta, Gerhard Kramer |
| 2015 | WOM codes with uninformed encoder. Michal Horovitz, Eitan Yaakobi |
| 2015 | Zero-error function computation through a bidirectional relay. Jithin Ravi, Bikash Kumar Dey |
| 2015 | Zero-latency zero-error codes for parallel asynchronous channels with arbitrary skews. Shlomo Engelberg, Osnat Keren |