IZS 2012 Conference ProgramTuesday, February 28
Wednesday, February 29
Thursday, March 1
Friday, March 2
All talks are 20 min. Keynote Lecture (Wednesday 09:00 – 10:00)
Progress on Relaying and Noisy Network Coding
Session 1: Network Information Theory (Wednesday 10:20 – 12:00)
The Multiple Access Channel with Correlated Sources and Cribbing Encoders
The Source Coding Side of Secrecy
A Comparative Study of Cooperation for the Two-User Interference Channel
Refinement of the Random Coding Bound
Source Coding with Side-Information at the Receivers and an Application
Session 2: Shannon Theory (Wednesday 13:20 – 15:00)
On Gaussian Channels with MMSE Interference
On the Gaussian Listening-Helper Source-Coding Problem
Upper-Bounding Rate Distortion Functions based on the Minimum Mean-Square Error
On the Information Loss in Memoryless Systems: The Multivariate Case
One-Bit Quantizers for Fading Channels
Session 3: Information Theory, Statistics, and Probability (Wednesday 15:30 – 16:50)
Model Switching and other Unconventional Fun with Experts
Some Old and New Relations between Information and Estimation
Polar Martingales of Maximal Spread
Sumset Differential Entropy Bounds
Keynote Lecture (Thursday 09:00 – 10:00)
Spatial Multiplexing and MIMO for Fiber Capacities beyond 100 Tb/s
Session 4: Coding Theory (Thursday 10:20 – 12:00)
Latest and Greatest on Spatially Coupled Codes
Coding Theory and Compressed Sensing through Convex Relaxations
Hybrid Coding
Polar Coding
Competitive Classification
Session 5: Coding I (Thursday 13:20 – 15:00)
Polar Codes for the Deterministic Broadcast Channel
Polar Codes for Coordination in Cascade Networks
Polar Codes for Degraded Relay Channels
Unambiguous Decoding of Generalized Reed–Solomon Codes beyond Half the Minimum Distance
Iteration-Constrained Design of IRA Codes
Session 6: Coding II (Thursday 15:30 – 17:10)
The Relation between Block Length and Reliability for a Cascade of AWGN Links
Secure Multiplex Coding over Interference Channel with Confidential Messages
Polymer Expansions for Cycle LDPC Codes
Factoring Linear Trellises
Information Theoretic Authentication and Secrecy Codes in the Splitting Model
Keynote Lecture (Friday 09:00 – 10:00)
Why is Wyner-Ziv coding for video so difficult?
Session 7: Streaming, Relaying, and Rateless-Coding (Friday 10:20 – 12:00)
Anti-Structure Problems
Real-Time Coding of Markov Sources over Erasure Channels: When is Binning Optimal?
Spinal Codes
SuperNyquist Rateless Coding for Intersymbol Interference Channels
Successive Compute-and-Forward
Session 8: Coding for Wireless Communication (Friday 13:20 – 15:00)
What are Good Coding Schemes for Multicast in Heterogeneous Wireless Networks?
Tunable Sparse Network Coding
Coding for Wireless Communications
The Flatness Factor in Lattice Network Coding: Design Criterion and Decoding Algorithm
Wideband non-coherent Wireless Communications
Session 9: Communication Theory (Friday 15:30 – 17:10)
Analysis of the Stochastic Channel Model by Saleh & Valenzuela via the Theory of Point Processes
Low-Complexity Soft-Output Detection for Impulse-Radio Ultra-Wideband Systems via Combining Multiple Observations
Amplify-and-Forward versus Decode-and-Forward Relaying: Which Is Better?
Complexity Analysis for ML-based Sphere Decoder Achieving a Vanishing Performance-Gap to Brute-Force ML Decoding
Symbol-by-Symbol APP Decoding based on Supercode Decoding
|