ESIT2015 Poster Program
泭
Day 1: Monday 20.04.2015
14:00 15:30 泭Poster Session 1/3
泭 Coding Theory
RELIABILITY OF ERASURE CODED STORAGE SYSTEMS
泭A. Campello
NONLINEAR CODE DESIGN FOR JOINT ENERGY AND INFORMATION TRANSFER
M. Dabirnia and T.M. Duman
EMBEDDING DISTANCES INTO THE HAMMING CUBE
R.G.L. D'Oliveira and M. Firer
DISPLACEMENT CONVEXITY - A FRAMEWORK FOR THE ANALYSIS OF SPATIALLY COUPLED CODES
R. El-Khatib, N. Macris, and R. Urbanke
SPARSE REGRESSION CODES
A. Greig, R. Venkataramanan, and C. Rush
ON ENHANCING THE MINIMUM HAMMING DISTANCES OF POLAR CODES
A. Hadi and泭 E. Alsusa
PERFECT CODES IN A n LATTICES
M. Kovaevi
泭 Cryptography and Security
KEY MANAGEMENT FOR COMPRESSIVE SENSING BASED CRYPTOGRAPHIC MECHANISMS
R. A. Djeujo
ON THE SECRECY EXPONENT OF THE WIRE-TAP CHANNEL
M.B. Parizi and E. Telatar
MODES OF OPERATION FOR COMPRESSIVE SENSING BASED ENCRYPTION
R. Fay and C. Ruland
A MULTI-LAYER IMAGE REPRESENTATION APPROACH: JOINT IMAGE COMPRESSION-ENCRYPTION
S. Ferdowsi, S. Voloshynovskiy, and D. Kostadinov
COGNITIVE RADIO NETWORKS WITH SECRECY
P.-H. Lin, F. Gabry, R. Thobaben, E. Jorswieck, and M. Skoglund
INFORMATION THEORETIC PRIVACY FOR SMART METERS
G. Giaconi and D. G羹nd羹z
BROADCAST CHANNELS WITH PRIVACY LEAKAGE CONSTRAINTS
Z. Goldfeld, G. Kramer, and H.H. Permuter
泭 Multiuser Information Theory
CHANNEL RESOLVABILITY CODES BASED ON CONCATENATION AND SPARSE LINEAR ENCODING
泭R.A. Amjad
THE MULTICAST COGNITIVE INTERFERENCE CHANNEL
M. Benammar, P. Piantanida, and S. Shamai (Shitz)
GAUSSIAN JOINT SOURCE-CHANNEL CODING FOR THE STRONG INTERFERENCE CHANNEL
I.Estella-Aguerri and D.z G羹nd羹z
POWER LIMITED BROADCAST NETWORKS IN LINE-OF-SIGHT ENVIRONMENT
S. Haddad and O. L矇v礙que
泭 Source Coding
STARGEEN: A STATISTICAL REFERENCE-BASED GENOME COMPRESSION ALGORITHM
F. Farhadzadeh and F.M.J. Willems
DISTORTION MINIMIZATION IN MULTITERMINAL SOURCE CODING WITH ENERGY HARVESTING DEVICES
R. Gangula, D. G羹nd羹z, and D Gesbert
ON TWO TERMINAL INTERACTIVE SOURCE CODING FOR FUNCTION COMPUTATION WITH SIDE INFORMATION
M.A. Moussa and A. Zaidi
SOURCE CODING FOR DISTRIBUTED STORAGE
M.T. Vu, T.J. Oechtering, and M. Skoglund
泭 Wireless Communication and Networks
ONE-BIT MASSIVE MIMO: CHANNEL ESTIMATION AND HIGH-ORDER MODULATIONS
S. Jacobsson, G. Durisi, M. Coldrey, U. Gustavsson, and C. Studer
MASSIVE MIMO TRANSMITTER DESIGN
M. J瓣ger
DISTRIBUTED WIDEBAND SPECTRUM SENSING
T. Kealy, O. Johnson, and R. J Piechocki
DATA DISSEMINATION PROBLEM IN WIRELESS NETWORKS
I. Kubjas and V. Skachek
BLOCK FADING CHANNELS AT FINITE BLOCKLENGTH
A.L. Serrano and T. Koch
COOPERATIVE SLOTTED ALOHA FOR MULTI-BASE STATION SYSTEMS WITH MULTIPACKET RECEPTION
A. Mastilovic, D. Vukobratovic, D. Bajovic, and D. Jakovetic
DISTRIBUTED STORAGE ALLOCATIONS FOR NEIGHBORHOOD-BASED DATA ACCESS
D. Jakoveti, A. Minja, D. Bajovi, and D. Vukobratovi
泭
Day 4: Thursday 23.04.2015
14:00 15:30 泭Poster Session 2/3
泭 Coding Theory
ON CODES IN l 1 METRIC, CORRECTING FIXED NUMBER OF ERRORS
S. Kruglik
THE IMPROVED TURBO-DECODING MESSAGE-PASSING ALGORITHM AND CORRESPONDING DECODER FOR LDPC CODES
L. Lao
EFFICIENT REALIZATION OF PROBABILISTIC GRADIENT DESCENT BIT-FLIPPING DECODERS
K. Le, D. Declercq, F. Ghaffari, C. Spagnol, E. Popovici, P. Ivanis, B. Vasic
HARDWARE-OPTIMIZED DECODERS FOR LDPC CODES
Y. Liu, P.M. Olmos, and T. Koch
COMBINATORIAL METRICS AND DECODING BEYOND HALF THE MINIMUM DISTANCE
M.H. Mohamed and M. Bossert
UNIFIED SCALING OF POLAR CODES: ERROR EXPONENT, SCALING EXPONENT, MODERATE DEVIATIONS, AND ERROR FLOORS
M. Mondelli, S.H. Hassani, and R. Urbanke
泭 Cryptography and Security
COMPOUND BIOMETRIC AUTHENTICATION
A.Grigorescu and H. Boche
TRANSFORM CODING FOR PHYSICAL UNCLONABLE FUNCTIONS (PUFS)
O. G羹nl羹 and O. 襤can
SECRECY CONSTRAINED NETWORKS WITH KNOWN AND UNKNOWN EAVESDROPPERS
M. Amir, T. Khattab, T. Elfouly, and A. Mohamed
PRIVACY-PRESERVING GENOME ANALYSIS
C.J. Kusters and T. Ignatenko
PRIVACY ON HYPOTHESIS TESTING
Z. Li, T.J. Oechtering, J. Jald矇n, and M. Skoglund
SECURE NETWORK CODING AGAINST POLLUTION ATTACKS AND ITS APPLICATION TO CLOUD STORAGE SYSTEMS
M. Ma, Z. Erkin, and J. Weber
ALGEBRAIC GEOMETRY AND SECRET SHARING SCHEMES
U. Mart穩nez-Pe簽as
泭Detection and Estimation
PROBABILISTIC MODELLING OF ONE-SIDED AND TWO-SIDED CONTEXTS
S. Berghout
NEURAL NETWORK PERFORMANCES IMPROVED BY SYNAPTIC NOISE
E. Coyac, V. Gripon, and C. Langlais
DISTRIBUTED BINARY DETECTION WITH A UNIDIRECTIONAL COMMUNICATION LINK
G. Katz, P. Piantanida, R. Couillet, and M. Debbah
MULTILEVEL VECTOR QUANTIZATION (MVQ) FOR FACE RECOGNITION
D.泭 Kostadinov
Multiuser Information Theory
CAPACITY REGIONS OF 2-USER BROADCAST PACKET ERASURE CHANNELS WITH FEEDBACK AND MEMORY
M. Heindlmaier and S.S. Bidokhti
INSTANTANEOUS RELAYING FOR THE 3-WAY RELAY CHANNEL WITH CIRCULAR MESSAGE EXCHANGES
B. Matthiesen and E.A. Jorswieck
CACHING OF (A PAIR OF) GAUSSIANS
G. J. Op t Veld, and M.C. Gastpar
ON THE CAPACITY OF VECTOR GAUSSIAN CHANNELS WITH BOUNDED INPUTS
B. Rassouli and B. Clerckx
泭 Wireless Communication and Networks
ADVANCED BUS SIGNALING METHODS IN MIRCROGRIDS
M. Angjelichinoski, C. Stefanovic, and P. Popovski
PERFORMANCE ANALYSIS AND DEMONSTRATION OF RANDOM CODED COOPERATION NETWORKS USING 802.11 APPLICATION FRAMEWORK
M.M. Azari, S. Pollin, and F. Rosas
PROTOCOLS, MESSAGES AND INFORMATION THEORY BASED ON TRACE ANALYSIS FOR MOBILE NETWORK
B.S.Salim
EXPECTATION PROPAGATION SOFT INFERENCE FOR MASSIVE MIMO SYSTEMS
J. C矇spedes, P.M. Olmos, M. S獺nchez-Fern獺ndez, and F. P. Cruz
MULTI-RECEIVER ALOHA SYSTEMS A SURVEY AND NEW RESULTS
F. Clazzer
FINITE-BLOCKLENGTH ANALYSIS OF THE ARQ-PROTOCOL THROUGHPUT OVER THE GAUSSIAN COLLISION CHANNEL
R. Devassy, G. Durisi, P.Popovski, and E. G. Str繹m
泭
Day 4: Thursday 23.04.2015
16:00 17:30 泭Poster Session 3/3
泭Coding Theory
ERGODIC THEORY MEETS POLARIZATION: A FOUNDATION OF POLARIZATION THEORY
R. Nasser
FPGA DESIGN OF HIGH THROUGHPUT LDPC DECODER BASED ON IMPRECISE OFFSET MIN-SUM DECODING
T. Nguyen-Ly, K. Le, F. Ghaffari, A. Amaricai, O. Boncalo, V. Savin, and D. Declercq
SYNDROME DECODING: THE POSET CASE
J.A. Pinheiro
CAPACITY AND CODING FOR THE ERASURE CHANNEL WITH FEEDBACK ANDA NO-ADJACENT-ONES INPUT CONSTRAINT
O. Sabag, H. Permuter, N. Kashyap
POLYNOMIALLY SOLVABLE INSTANCES OF THE SHORTEST AND CLOSEST VECTOR PROBLEMS
S. Sahraei and M. Gastpar
FINITE-LENGTH SCALING OF CONVOLUTIONAL LDPC CODES
M. Stinner and P. Olmos
BINARY PUZZLES AS AN ERASURE DECODING PROBLEM
P.H. Utomo and R. Pellikaan
泭 Cryptography and Security
HYPOTHESIS TESTING. COMMUNICATION AND SECURITY CONSTRAINTS
M. Mhanna and P. Piantanida
ON ERROR CORRECTION FOR PHYSICAL UNCLONABLE FUNCTIONS
S. M羹elich, S. Puchinger, M. Bossert, M. Hiller, and G. Sigl
BINARY TRANSMISSIONS OVER GAUSSIAN WIRETAP CHANNEL UNDER SOFT/HARD DECISION DECODING
C. Qi, Y. Chen, A. J. Han Vinck, and X. Tang
SECURE TRANSMISSION USING AN UNTRUSTED RELAY WITH SCALED COMPUTE-AND-FORWARD
Z.Ren, J.Goseling, J.Weber, and M. Gastpar
RESILIENT TRUE RANDOM NUMBER GENERATORS. THE DESIGN AND SECURITY ANALYSIS
M. Skorski
WIRETAP CHANNEL: MESSAGES UNTRACEABILITY FOR FREE?
O. Trushina
COMPRESSIVE SENSING BASED IMAGE AUTHENTICATION
T. Wu and C. Ruland
泭 Multiuser Information Theory
THE GAUSSIAN CHANNEL WITH INTERMITTENT FEEDBACK
L. Palzer
NOISY CHANNEL-OUTPUT FEEDBACK CAPACITY OF THE LINEAR DETERMINISTIC INTERFERENCE CHANNEL
V. Quintero, S.M. Perlaza, and J.-M. Gorce
UNDERSTANDING HIGH-ORDER CORRELATIONS USING A SYNERGY-BASED DECOMPOSITION OF THE TOTAL ENTROPY
F. Rosas, V. Ntranos, C. Ellison, M. Verhelst, and S.Pollin
泭 Network Coding
LIST AND PROBABILISTIC UNIQUE DECODING OF FOLDED SUBSPACE CODES
H. Bartz and V. Sidorenko
PERFORMANCE ANALYSIS OF RANDOM LINEAR NETWORK CODING IN TWO-SOURCE SINGLE-RELAY NETWORKS
A.S. Khan and I. Chatzigeorgiou
DECODING DELAY IN NETWORK CODED MULTIPATH TRANSMISSIONS
B. Serbetci, J. Goseling, J.-K. van Ommeren, and R.J. Boucherie
泭 Various Topics
NETWORKS OF NEURAL CLIQUES AS ASSOCIATIVE MEMORIES
A.A. Mofrad and M.G. Parker
LINEAR TIME ALGORITHM FOR OPTIMAL FEED-LINK PLACEMENT
M. Savi and M. Stojakovi
CONSTANT COMPOSITION DISTRIBUTION MATCHING
P. Schulte
泭 Wireless Communication and Networks
PERFORMANCE MEASURES FOR BROADCASTING IN WIRELESS SENSOR NETWORKS
M. Mitici, J. Goseling, M. de Graaf, J.-K. van Ommeren, and R.J. Boucherie
ROBUST EXTENDED MATCHING ALGORITHM FOR MULTICARRIER COMMUNICATIONS
Y. Sabucu, A.E. Pusane, and G.K. Kurt
ON THE SYNERGISTIC BENEFITS OF ALTERNATING CSIT FOR SISO X CHANNEL
A. Wagdy, A. Elkeyi, T. Khattab, M. Nafie
THE SQUARE-ROOT CHANNEL
A.Tsiatmas, F.M.J.Willems, and C.P.M.J. Baggen
VARIABLE-POWER SCHEDULING OF ENERGY HARVESTING SENSORS FOR PERPETUAL TARGET COVERAGE
Q. Yang and D. G羹nd羹z
OPTIMUM POWER CONTROL AT FINITE BLOCKLENGTH
W. Yang, G. Caire, G. Durisi, and Y. Polyanskiy
泭
泭