[图书][B] Information theory: coding theorems for discrete memoryless systems

I Csiszár, J Körner - 2011 - books.google.com
Csiszár and Körner's book is widely regarded as a classic in the field of information theory,
providing deep insights and expert treatment of the key theoretical issues. It includes in …

The method of types [information theory]

I Csiszár - IEEE Transactions on Information Theory, 1998 - ieeexplore.ieee.org
The method of types is one of the key technical tools in Shannon theory, and this tool is
valuable also in other fields. In this paper, some key applications are presented in sufficient …

Reliable communication under channel uncertainty

A Lapidoth, P Narayan - IEEE transactions on Information …, 1998 - ieeexplore.ieee.org
In many communication situations, the transmitter and the receiver must be designed without
a complete knowledge of the probability law governing the channel over which transmission …

Arbitrarily varying multiple-access channels. I. Ericson's symmetrizability is adequate, Gubner's conjecture is true

R Ahlswede, N Cai - IEEE Transactions on Information Theory, 1999 - ieeexplore.ieee.org
In 1981 Jahn used the elimination technique of the first author to determine the average
errors capacity region of an arbitrarily varying multiple-access channel (AVMAC), when this …

[PDF][PDF] Robust and adaptive communication under uncertain interference

AD Sarwate - 2008 - eecs.berkeley.edu
Anand Dilip Sarwate Doctor of Philosophy in Engineering—Electrical Engineering and
Computer Sciences and the Designated Emphasis in Communication, Computation, and …

Codes for Adversaries: Between Worst-Case and Average-Case Jamming

BK Dey, S Jaggi, M Langberg… - … and Trends® in …, 2024 - nowpublishers.com
Over the last 70 years, information theory and coding has enabled communication
technologies that have had an astounding impact on our lives. This is possible due to the …

The arbitrarily varying multiple-access channel with conferencing encoders

M Wiese, H Boche - IEEE transactions on information theory, 2012 - ieeexplore.ieee.org
We derive the capacity region of arbitrarily varying multiple-access channels (AV-MACs)
with conferencing encoders for both deterministic and random coding. For a complete …

Multiple access channels with byzantine users

N Sangwan, M Bakshi, BK Dey… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
Communication over a three-user multiple access channel (MAC) is studied when any one
of the users may behave adversarially. The capacity region is characterized for randomized …

Authentication and partial message correction over adversarial multiple-access channels

A Beemer, E Graves, J Kliewer… - 2020 IEEE Conference …, 2020 - ieeexplore.ieee.org
In this paper, we present results on the authentication capacity region for the two-user
arbitrarily-varying multipleaccess channel. We first consider a standard definition of …

On the deterministic-code capacity of the two-user discrete memoryless arbitrarily varying general broadcast channel with degraded message sets

E Hof, SI Bross - IEEE transactions on information theory, 2006 - ieeexplore.ieee.org
An inner bound on the deterministic-code capacity region of the two-user discrete
memoryless arbitrarily varying general broadcast channel (AVGBC) was characterized by …