Skip to Main content Skip to Navigation

inria-00607733v1  Conference papers
Eimear ByrneMarcus GreferathJens ZumbragelJaume Pernas. Algebraic Decoding of Negacyclic Codes over Z4
WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.101-110
hal-00670926v1  Conference papers
Stephan PfletschingerDavid Declercq. Non-binary coding for vector channels
SPAWC'11, Jun 2011, San Fransisco, CA,, United States
hal-01281016v1  Journal articles
Mehdi BennisSamir PerlazaPol BlascoHan ZhuH. Vincent Poor. Self-Organization in Small Cell Networks: A Reinforcement Learning Approach
IEEE Transactions on Wireless Communications, Institute of Electrical and Electronics Engineers, 2013, 12 (7), pp.3202-3212. ⟨10.1109/TWC.2013.060513.120959⟩
hal-03230482v1  Reports
Sadaf Ul ZuhraSamir PerlazaEitan Altman. Simultaneous Information and Energy Transmission with Finite Constellations
[Research Report] RR-9409, Inria Sophia Antipolis - Méditerranée. 2021, pp.17
hal-00585262v1  Journal articles
Grégory BerhuyFrédérique Oggier. On the existence of perfect space-time codes
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2009, 55 (5), pp.2078-2082. ⟨10.1109/TIT.2009.2016033⟩
hal-00707765v1  Journal articles
Arun Kumar SinghPetros EliaJoakim Jalden. Achieving a Vanishing SNR Gap to Exact Lattice Decoding at a Subexponential Complexity
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2012, 58 (6), pp.3692-3707. ⟨10.1109/TIT.2012.2190709⟩
hal-00807327v1  Journal articles
Paul de KerretDavid Gesbert. Degrees of Freedom of the Network MIMO Channel With Distributed CSI
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2012, pp.6806 - 6824. ⟨10.1109/TIT.2012.2210026⟩
hal-01256489v1  Journal articles
Namig GuliyevVugar Ismailov. A single hidden layer feedforward network with only one neuron in the hidden layer can approximate any univariate function
Neural Computation, Massachusetts Institute of Technology Press (MIT Press), 2016, 28 (7), pp.1289-1304. ⟨10.1162/NECO_a_00849⟩
hal-00710290v3  Journal articles
Alexander ZehSergey Bezzateev. A New Bound on the Minimum Distance of Cyclic Codes Using Small-Minimum-Distance Cyclic Codes
Designs, Codes and Cryptography, Springer Verlag, 2012, pp.229-246
ujm-00664911v1  Conference papers
Rosemberg SilvaPierre-Louis CayrelRichard Lindner. A Lattice-Based Batch Identification Scheme
IEEE Information Theory Workshop (ITW 2011), Oct 2011, paraty, Brazil. pp.215 - 219
hal-01088433v1  Conference papers
Irene Márquez-CorbellaRuud Pellikaan. Error-correcting pairs: a new approach to code-based cryptography
20th Conference on Applications of Computer Algebra (ACA 2014), Jul 2014, New York, United States
hal-01088432v1  Conference papers
Natalia DückIrene Márquez-CorbellaEdgar Martínez-Moro. On the fan associated to a linear code
4th ICMCTA - Fourth International Castle Meeting on Coding Theory and Applications, Sep 2014, Palmela, Portugal
hal-01076846v1  Conference papers
Asanka NuwanpriyaHo Siu-WaiChung Shue Chen. Angle Diversity Receiver for Indoor MIMO Visible Light Communications
IEEE Global Communications Conference, Dec 2014, Texas, United States
hal-00647609v1  Conference papers
Alexander ZehChristian Senger. A link between Guruswami-Sudan's list-decoding and decoding of interleaved Reed-Solomon codes
IEEE International Symposium on Information Theory (ISIT), Jun 2010, Austin, United States. pp.1198-1202, ⟨10.1109/ISIT.2010.5513427⟩
hal-00647618v1  Conference papers
Alexander ZehSabine KampfMartin Bossert. On the Equivalence of Sudan-Decoding and Decoding via Virtual Extension to an Interleaved Reed-Solomon Code
International ITG Conference on Source and Channel Coding (SCC), Jan 2010, Siegen, Germany. pp.1-6
hal-00647597v1  Conference papers
Alexander ZehWenhui Li. Decoding Reed-Solomon codes up to the Sudan radius with the Euclidean algorithm
IEEE International Symposium on Information Theory and its Applications (ISITA), Oct 2010, Taichung, Taiwan. pp.986-990, ⟨10.1109/ISITA.2010.5649520⟩
hal-00647605v1  Conference papers
Christian SengerSteffen SchoberTong MaoAlexander Zeh. End-to-End algebraic network coding for wireless TCP/IP networks
IEEE International Conference on Telecommunications (ICT), Jul 2010, Doha, Qatar. pp.607-612, ⟨10.1109/ICTEL.2010.5478841⟩
hal-00537139v2  Conference papers
Benjamin MathonPatrick BasFrançois CayreBenoît Macq. Considering Security and Robustness Constraints for Watermark-based Tardos Fingerprinting
MMSP 2010 - IEEE International Workshop on Multimedia Signal Processing, Oct 2010, Saint-Malo, France. pp.46-51, ⟨10.1109/MMSP.2010.5661992⟩
hal-00639547v1  Journal articles
Boris RyabkoDaniil Ryabko. Asymptotically Optimal Perfect Steganographic Systems
Problems of Information Transmission, MAIK Nauka/Interperiodica, 2009, 45 (2), pp.184-190. ⟨10.1134/S0032946009020094⟩
hal-00639562v1  Conference papers
Boris RyabkoDaniil Ryabko. Using Kolmogorov Complexity for Understanding Some Limitations on Steganography
IEEE International Symposium on Information Theory, 2009, seoul, South Korea. pp.2733-2736
hal-00639482v1  Conference papers
Boris RyabkoDaniil Ryabko. Confidence Sets in Time-Series Filtering
IEEE International Symposium on Information Theory, Jul 2011, St. Petersburg, Russia. pp.2436-2438