Toward massive, ultrareliable, and low-latency wireless communication with short packets

G Durisi, T Koch, P Popovski - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
Most of the recent advances in the design of high-speed wireless systems are based on
information-theoretic principles that demonstrate how to efficiently transmit long data …

Coding in diffusion-based molecular nanonetworks: A comprehensive survey

P Hofmann, JA Cabrera, R Bassoli, M Reisslein… - IEEE …, 2023 - ieeexplore.ieee.org
Diffusion-based molecular nanonetworks exploit the diffusion of molecules, eg, in free space
or in blood vessels, for the purpose of communication. This article comprehensively surveys …

Decentralized multi-player multi-armed bandits with no collision information

C Shi, W Xiong, C Shen, J Yang - … Conference on Artificial …, 2020 - proceedings.mlr.press
The decentralized stochastic multi-player multi-armed bandit (MP-MAB) problem, where the
collision information is not available to the players, is studied in this paper. Building on the …

Bayesian -Ary Hypothesis Testing: The Meta-Converse and Verdú-Han Bounds Are Tight

G Vazquez-Vilar, AT Campo… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
Two alternative exact characterizations of the minimum error probability of Bayesian M-ary
hypothesis testing are derived. The first expression corresponds to the error probability of an …

On no-sensing adversarial multi-player multi-armed bandits with collision communications

C Shi, C Shen - IEEE Journal on Selected Areas in Information …, 2021 - ieeexplore.ieee.org
We study the notoriously difficult no-sensing adversarial multi-player multi-armed bandits
(MP-MAB) problem from a new perspective. Instead of focusing on the hardness of multiple …

Rational memory with decay

N Neligh - Journal of Economic Behavior & Organization, 2024 - Elsevier
Historically, economic models of memory have neglected a pivotal aspect: decay, the
established notion that memories deteriorate over time, resulting in a loss of fidelity. In this …

Weak flip codes and their optimality on the binary erasure channel

HY Lin, SM Moser, PN Chen - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper investigates fundamental properties of nonlinear binary codes by looking at the
codebook matrix not row-wise (codewords), but column-wise. The family of weak flip codes …

Transmission of a bit over a discrete Poisson channel with memory

N Ahmadypour, A Gohari - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
A coding scheme for transmission of a bit maps a given bit to a sequence of channel inputs
(called the codeword associated with the transmitted bit). In this paper, we study the problem …

Analysis of error-detection schemes in diffusion-based molecular communication

A Einolghozati, F Fekri - IEEE Journal on Selected Areas in …, 2016 - ieeexplore.ieee.org
Despite recent advances in molecular communication among bio agents, the design of
reliable communication schemes remains an open problem. One of the requirements is to …

An Attackability Perspective on No-Sensing Adversarial Multi-player Multi-armed Bandits

C Shi, C Shen - 2021 IEEE International Symposium on …, 2021 - ieeexplore.ieee.org
In this work, we study the no-sensing adversarial multi-player multi-armed bandits problem.
A new dimension of hardness, called attackability, is introduced, which is orthogonal to the …