Nicolas Sendrier Finding the permutation between equivalent linear codes: The support splitting algorithm. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1193-1203 [Journal]
Te Sun Han Weak variable-length source coding. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1217-1226 [Journal]
Serap A. Savari A probabilistic approach to some asymptotics in noiseless communication. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1246-1262 [Journal]
Udar Mittal, Nam Phamdo Duality theorems for joint source-channel coding. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1263-1275 [Journal]
Benjamin Belzer Bounds on the a priori index crossover probabilities for trellis-based channel codes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1276-1291 [Journal]
Erik Ordentlich, Ron M. Roth Two-dimensional weight-constrained codes through enumeration bounds. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1292-1301 [Journal]
Dan Boneh, Glenn Durfee Cryptanalysis of RSA with private key d less than N0.292. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1339- [Journal]
Ueli M. Maurer Authentication theory and hypothesis testing. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1350-1356 [Journal]
Oren Somekh, Shlomo Shamai Shannon-theoretic approach to a Gaussian cellular multiple-access channel with fading. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1401-1425 [Journal]
Kiran, David N. C. Tse Effective interference and effective bandwidth of linear multiuser receivers in asynchronous CDMA systems. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1426-1447 [Journal]
Lei Wei, Honghui Qi Near-optimal limited-search detection on ISI/CDMA channels and decoding of long convolutional codes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1459-1482 [Journal]
Giulio Colavolpe, Riccardo Raheli Theoretical analysis and performance limits of noncoherent sequence detection of coded PSK. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1483-1494 [Journal]
Aleksandar Kavcic, José M. F. Moura Matrices with banded inverses: Inversion algorithms and factorization of Gauss-Markov processes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1495-1509 [Journal]
Yaron Shany, Yair Be'ery Linear tail-biting trellises, the square-root bound, and applications for Reed-Muller codes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1514-1523 [Journal]
Yaron Shany, Yair Be'ery Bounds on the state complexity of codes from the Hermitian function field and its subfields. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1523-1527 [Journal]
Chaoping Xing, San Ling A class of linear codes with good parameters from algebraic curves. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1527-1532 [Journal]
Patrick Solé Towers of function fields and iterated means. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1532-1535 [Journal]
Hao Chen On the minimum distances of Schubert codes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1535-1538 [Journal]
Xiao Ma, Xin-mei Wang On the minimal interpolation problem and decoding RS codes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1573-1580 [Journal]
Michael Schmidt, Gerhard Fettweis On memory redundancy in the BCJR algorithm for nonrecursive shift register processes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1580-1584 [Journal]
Jos H. Weber, Khaled A. S. Abdel-Ghaffar Guaranteed error correction rate for a simple concatenated coding scheme with single-trial decoding. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1590-1597 [Journal]
Flemming Topsøe Some inequalities for information divergence and related measures of discrimination. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1602-1609 [Journal]
Uri Erez, Ram Zamir Noise prediction for channels with side information at the transmitter. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1610-1617 [Journal]
Tamás Linder On the training distortion of vector quantizers. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1617-1623 [Journal]
Maurizio Magarini, Arnaldo Spalvieri Optimization of distributed detection systems under the minimum average misclassification risk criterion. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1649-1653 [Journal]
Steven Kay Sufficiency, classification, and the class-specific feature theorem. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1654-1658 [Journal]
Jean-Jacques Fuchs, Bernard Delyon Minimal L1-norm reconstruction function for oversampled signals: Applications to time-delay estimation. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1666-1673 [Journal]
Tommy Guess, Mahesh K. Varanasi Error exponents for maximum-likelihood and successive decoders for the Gaussian CDMA channel. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1683-1691 [Journal]
Shinya Matsufuji, Kyoki Imamura A spread-spectrum communication system protecting information data from interception. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1691-1695 [Journal]
Cédric Villani A short proof of the "Concavity of entropy power". [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1695-1696 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP