ESIT2015 Poster Program
Ìý
Day 1: Monday 20.04.2015
14:00 – 15:30 ÌýPoster Session 1/3
Ìý Coding Theory
RELIABILITY OF ERASURE CODED STORAGE SYSTEMS
ÌýA. Campello
NONLINEAR CODE DESIGN FOR JOINT ENERGY AND INFORMATION TRANSFER
M. Dabirnia and T.M. Duman
EMBEDDING DISTANCES INTO THE HAMMING CUBE
R.G.L. D'Oliveira and M. Firer
DISPLACEMENT CONVEXITY - A FRAMEWORK FOR THE ANALYSIS OF SPATIALLY COUPLED CODES
R. El-Khatib, N. Macris, and R. Urbanke
SPARSE REGRESSION CODES
A. Greig, R. Venkataramanan, and C. Rush
ON ENHANCING THE MINIMUM HAMMING DISTANCES OF POLAR CODES
A. Hadi andÌý E. Alsusa
PERFECT CODES IN A n LATTICES
M. KovaÄević
Ìý Cryptography and Security
KEY MANAGEMENT FOR COMPRESSIVE SENSING BASED CRYPTOGRAPHIC MECHANISMS
R. A. Djeujo
ON THE SECRECY EXPONENT OF THE WIRE-TAP CHANNEL
M.B. Parizi and E. Telatar
MODES OF OPERATION FOR COMPRESSIVE SENSING BASED ENCRYPTION
R. Fay and C. Ruland
A MULTI-LAYER IMAGE REPRESENTATION APPROACH: JOINT IMAGE COMPRESSION-ENCRYPTION
S. Ferdowsi, S. Voloshynovskiy, and D. Kostadinov
COGNITIVE RADIO NETWORKS WITH SECRECY
P.-H. Lin, F. Gabry, R. Thobaben, E. Jorswieck, and M. Skoglund
INFORMATION THEORETIC PRIVACY FOR SMART METERS
G. Giaconi and D. Gündüz
BROADCAST CHANNELS WITH PRIVACY LEAKAGE CONSTRAINTS
Z. Goldfeld, G. Kramer, and H.H. Permuter
Ìý Multiuser Information Theory
CHANNEL RESOLVABILITY CODES BASED ON CONCATENATION AND SPARSE LINEAR ENCODING
ÌýR.A. Amjad
THE MULTICAST COGNITIVE INTERFERENCE CHANNEL
M. Benammar, P. Piantanida, and S. Shamai (Shitz)
GAUSSIAN JOINT SOURCE-CHANNEL CODING FOR THE STRONG INTERFERENCE CHANNEL
I.Estella-Aguerri and D.z Gündüz
POWER LIMITED BROADCAST NETWORKS IN LINE-OF-SIGHT ENVIRONMENT
S. Haddad and O. Lévêque
Ìý Source Coding
STARGEEN: A STATISTICAL REFERENCE-BASED GENOME COMPRESSION ALGORITHM
F. Farhadzadeh and F.M.J. Willems
DISTORTION MINIMIZATION IN MULTITERMINAL SOURCE CODING WITH ENERGY HARVESTING DEVICES
R. Gangula, D. Gündüz, and D Gesbert
ON TWO TERMINAL INTERACTIVE SOURCE CODING FOR FUNCTION COMPUTATION WITH SIDE INFORMATION
M.A. Moussa and A. Zaidi
SOURCE CODING FOR DISTRIBUTED STORAGE
M.T. Vu, T.J. Oechtering, and M. Skoglund
Ìý Wireless Communication and Networks
ONE-BIT MASSIVE MIMO: CHANNEL ESTIMATION AND HIGH-ORDER MODULATIONS
S. Jacobsson, G. Durisi, M. Coldrey, U. Gustavsson, and C. Studer
MASSIVE MIMO TRANSMITTER DESIGN
M. Jäger
DISTRIBUTED WIDEBAND SPECTRUM SENSING
T. Kealy, O. Johnson, and R. J Piechocki
DATA DISSEMINATION PROBLEM IN WIRELESS NETWORKS
I. Kubjas and V. Skachek
BLOCK FADING CHANNELS AT FINITE BLOCKLENGTH
A.L. Serrano and T. Koch
COOPERATIVE SLOTTED ALOHA FOR MULTI-BASE STATION SYSTEMS WITH MULTIPACKET RECEPTION
A. Mastilovic, D. Vukobratovic, D. Bajovic, and D. Jakovetic
DISTRIBUTED STORAGE ALLOCATIONS FOR NEIGHBORHOOD-BASED DATA ACCESS
D. Jakovetić, A. Minja, D. Bajović, and D. Vukobratović
Ìý
Day 4: Thursday 23.04.2015
14:00 – 15:30 ÌýPoster Session 2/3
Ìý Coding Theory
ON CODES IN l 1 METRIC, CORRECTING FIXED NUMBER OF ERRORS
S. Kruglik
THE IMPROVED TURBO-DECODING MESSAGE-PASSING ALGORITHM AND CORRESPONDING DECODER FOR LDPC CODES
L. Lao
EFFICIENT REALIZATION OF PROBABILISTIC GRADIENT DESCENT BIT-FLIPPING DECODERS
K. Le, D. Declercq, F. Ghaffari, C. Spagnol, E. Popovici, P. Ivanis, B. Vasic
HARDWARE-OPTIMIZED DECODERS FOR LDPC CODES
Y. Liu, P.M. Olmos, and T. Koch
COMBINATORIAL METRICS AND DECODING BEYOND HALF THE MINIMUM DISTANCE
M.H. Mohamed and M. Bossert
UNIFIED SCALING OF POLAR CODES: ERROR EXPONENT, SCALING EXPONENT, MODERATE DEVIATIONS, AND ERROR FLOORS
M. Mondelli, S.H. Hassani, and R. Urbanke
Ìý Cryptography and Security
COMPOUND BIOMETRIC AUTHENTICATION
A.Grigorescu and H. Boche
TRANSFORM CODING FOR PHYSICAL UNCLONABLE FUNCTIONS (PUFS)
O. Günlü and O. İşcan
SECRECY CONSTRAINED NETWORKS WITH KNOWN AND UNKNOWN EAVESDROPPERS
M. Amir, T. Khattab, T. Elfouly, and A. Mohamed
PRIVACY-PRESERVING GENOME ANALYSIS
C.J. Kusters and T. Ignatenko
PRIVACY ON HYPOTHESIS TESTING
Z. Li, T.J. Oechtering, J. Jaldén, and M. Skoglund
SECURE NETWORK CODING AGAINST POLLUTION ATTACKS AND ITS APPLICATION TO CLOUD STORAGE SYSTEMS
M. Ma, Z. Erkin, and J. Weber
ALGEBRAIC GEOMETRY AND SECRET SHARING SCHEMES
U. MartÃnez-Peñas
ÌýDetection and Estimation
PROBABILISTIC MODELLING OF ONE-SIDED AND TWO-SIDED CONTEXTS
S. Berghout
NEURAL NETWORK PERFORMANCES IMPROVED BY SYNAPTIC NOISE
E. Coyac, V. Gripon, and C. Langlais
DISTRIBUTED BINARY DETECTION WITH A UNIDIRECTIONAL COMMUNICATION LINK
G. Katz, P. Piantanida, R. Couillet, and M. Debbah
MULTILEVEL VECTOR QUANTIZATION (MVQ) FOR FACE RECOGNITION
D.Ìý Kostadinov
Multiuser Information Theory
CAPACITY REGIONS OF 2-USER BROADCAST PACKET ERASURE CHANNELS WITH FEEDBACK AND MEMORY
M. Heindlmaier and S.S. Bidokhti
INSTANTANEOUS RELAYING FOR THE 3-WAY RELAY CHANNEL WITH CIRCULAR MESSAGE EXCHANGES
B. Matthiesen and E.A. Jorswieck
CACHING OF (A PAIR OF) GAUSSIANS
G. J. Op ’t Veld, and M.C. Gastpar
ON THE CAPACITY OF VECTOR GAUSSIAN CHANNELS WITH BOUNDED INPUTS
B. Rassouli and B. Clerckx
Ìý Wireless Communication and Networks
ADVANCED BUS SIGNALING METHODS IN MIRCROGRIDS
M. Angjelichinoski, C. Stefanovic, and P. Popovski
PERFORMANCE ANALYSIS AND DEMONSTRATION OF RANDOM CODED COOPERATION NETWORKS USING 802.11 APPLICATION FRAMEWORK
M.M. Azari, S. Pollin, and F. Rosas
PROTOCOLS, MESSAGES AND INFORMATION THEORY BASED ON TRACE ANALYSIS FOR MOBILE NETWORK
B.S.Salim
EXPECTATION PROPAGATION SOFT INFERENCE FOR MASSIVE MIMO SYSTEMS
J. Céspedes, P.M. Olmos, M. Sánchez-Fernández, and F. P. Cruz
MULTI-RECEIVER ALOHA SYSTEMS – A SURVEY AND NEW RESULTS
F. Clazzer
FINITE-BLOCKLENGTH ANALYSIS OF THE ARQ-PROTOCOL THROUGHPUT OVER THE GAUSSIAN COLLISION CHANNEL
R. Devassy, G. Durisi, P.Popovski, and E. G. Ström
Ìý
Day 4: Thursday 23.04.2015
16:00 – 17:30 ÌýPoster Session 3/3
ÌýCoding Theory
ERGODIC THEORY MEETS POLARIZATION: A FOUNDATION OF POLARIZATION THEORY
R. Nasser
FPGA DESIGN OF HIGH THROUGHPUT LDPC DECODER BASED ON IMPRECISE OFFSET MIN-SUM DECODING
T. Nguyen-Ly, K. Le, F. Ghaffari, A. Amaricai, O. Boncalo, V. Savin, and D. Declercq
SYNDROME DECODING: THE POSET CASE
J.A. Pinheiro
CAPACITY AND CODING FOR THE ERASURE CHANNEL WITH FEEDBACK ANDA NO-ADJACENT-ONES INPUT CONSTRAINT
O. Sabag, H. Permuter, N. Kashyap
POLYNOMIALLY SOLVABLE INSTANCES OF THE SHORTEST AND CLOSEST VECTOR PROBLEMS
S. Sahraei and M. Gastpar
FINITE-LENGTH SCALING OF CONVOLUTIONAL LDPC CODES
M. Stinner and P. Olmos
BINARY PUZZLES AS AN ERASURE DECODING PROBLEM
P.H. Utomo and R. Pellikaan
Ìý Cryptography and Security
HYPOTHESIS TESTING. COMMUNICATION AND SECURITY CONSTRAINTS
M. Mhanna and P. Piantanida
ON ERROR CORRECTION FOR PHYSICAL UNCLONABLE FUNCTIONS
S. Müelich, S. Puchinger, M. Bossert, M. Hiller, and G. Sigl
BINARY TRANSMISSIONS OVER GAUSSIAN WIRETAP CHANNEL UNDER SOFT/HARD DECISION DECODING
C. Qi, Y. Chen, A. J. Han Vinck, and X. Tang
SECURE TRANSMISSION USING AN UNTRUSTED RELAY WITH SCALED COMPUTE-AND-FORWARD
Z.Ren, J.Goseling, J.Weber, and M. Gastpar
RESILIENT TRUE RANDOM NUMBER GENERATORS. THE DESIGN AND SECURITY ANALYSIS
M. Skorski
WIRETAP CHANNEL: MESSAGES UNTRACEABILITY FOR FREE?
O. Trushina
COMPRESSIVE SENSING BASED IMAGE AUTHENTICATION
T. Wu and C. Ruland
Ìý Multiuser Information Theory
THE GAUSSIAN CHANNEL WITH INTERMITTENT FEEDBACK
L. Palzer
NOISY CHANNEL-OUTPUT FEEDBACK CAPACITY OF THE LINEAR DETERMINISTIC INTERFERENCE CHANNEL
V. Quintero, S.M. Perlaza, and J.-M. Gorce
UNDERSTANDING HIGH-ORDER CORRELATIONS USING A SYNERGY-BASED DECOMPOSITION OF THE TOTAL ENTROPY
F. Rosas, V. Ntranos, C. Ellison, M. Verhelst, and S.Pollin
Ìý Network Coding
LIST AND PROBABILISTIC UNIQUE DECODING OF FOLDED SUBSPACE CODES
H. Bartz and V. Sidorenko
PERFORMANCE ANALYSIS OF RANDOM LINEAR NETWORK CODING IN TWO-SOURCE SINGLE-RELAY NETWORKS
A.S. Khan and I. Chatzigeorgiou
DECODING DELAY IN NETWORK CODED MULTIPATH TRANSMISSIONS
B. Serbetci, J. Goseling, J.-K. van Ommeren, and R.J. Boucherie
Ìý Various Topics
NETWORKS OF NEURAL CLIQUES AS ASSOCIATIVE MEMORIES
A.A. Mofrad and M.G. Parker
LINEAR TIME ALGORITHM FOR OPTIMAL FEED-LINK PLACEMENT
M. Savić and M. Stojaković
CONSTANT COMPOSITION DISTRIBUTION MATCHING
P. Schulte
Ìý Wireless Communication and Networks
PERFORMANCE MEASURES FOR BROADCASTING IN WIRELESS SENSOR NETWORKS
M. Mitici, J. Goseling, M. de Graaf, J.-K. van Ommeren, and R.J. Boucherie
ROBUST EXTENDED MATCHING ALGORITHM FOR MULTICARRIER COMMUNICATIONS
Y. Sabucu, A.E. Pusane, and G.K. Kurt
ON THE SYNERGISTIC BENEFITS OF ALTERNATING CSIT FOR SISO X CHANNEL
A. Wagdy, A. Elkeyi, T. Khattab, M. Nafie
THE SQUARE-ROOT CHANNEL
A.Tsiatmas, F.M.J.Willems, and C.P.M.J. Baggen
VARIABLE-POWER SCHEDULING OF ENERGY HARVESTING SENSORS FOR PERPETUAL TARGET COVERAGE
Q. Yang and D. Gündüz
OPTIMUM POWER CONTROL AT FINITE BLOCKLENGTH
W. Yang, G. Caire, G. Durisi, and Y. Polyanskiy
Ìý
Ìý