IZS 2016 Conference Program
Tuesday, March 1
16:00 – 18:00 |
|
Registration desk open |
Wednesday, March 2
07:30 |
|
Registration desk opens |
08:25 |
|
Opening address |
08:30 – 09:30 |
|
Keynote Lecture by Martin Bossert (Universität Ulm) |
|
|
Coffee break |
10:00 – 12:00 |
|
Session 1: Topics in Shannon Theory |
|
|
Lunch break |
13:20 – 15:00 |
|
Session 2: Invited Session: Codes on Graphs and Lattices |
|
|
Coffee break |
15:30 – 16:50 |
|
Session 3: Invited Session: Wireless Communication (with emphasis on |
|
|
Finite Blocklength Information Theory) |
|
|
Short break |
17:00 – 18:00 |
|
Session 4: Privacy and Secrecy |
Thursday, March 3
08:30 – 09:30 |
|
Keynote Lecture by Shlomo Shamai (Shitz) (Technion) |
|
|
Coffee break |
10:00 – 12:00 |
|
Session 5: Communication Techniques |
|
|
Lunch break |
13:20 – 15:00 |
|
Session 6: Invited Session: Information Theoretic Security |
|
|
Coffee break |
15:30 – 17:30 |
|
Session 7: Network Information Theory |
19:00 – end |
|
Conference Banquet at Restaurant Belvoirpark |
Friday, March 4
08:30 – 09:30 |
|
Keynote Lecture by Prakash Narayan (University of Maryland) |
|
|
Coffee break |
10:00 – 12:00 |
|
Session 8: Coding Techniques |
|
|
Lunch break |
13:20 – 15:00 |
|
Session 9: Invited Session: Shannon Theory |
|
|
Coffee break |
15:30 – 16:50 |
|
Session 10: Invited Session: Hypothesis Testing and Converse Bounds |
All talks are 20 min.
Keynote Lecture (Wednesday 08:30 – 09:30)
Session 1: Topics in Shannon Theory (Wednesday 10:00 – 12:00)
Chaired by Yuval Kochman (Hebrew University of Jerusalem)
-
Channel Detection in Coded Communication
N. Weinberger, N. Merhav
-
A Converse for Lossy Source Coding in the Finite Blocklength Regime
L. Palzer, R. Timo
-
Frequency Hopping does not Increase Anti-Jamming Resilience of Wireless Channels
M. Wiese, P. Papadimitratos
-
Tracking Unstable Autoregressive Sources over Discrete Memoryless Channels
R. Timo, B. N. Vellambi, A. Grant, K. D. Nguyen
-
Strong Converse for General Compound Channels
S. Loyka, C. D. Charalambous
-
Refined Error Probability Approximations in Quasi-Static Erasure Channels
J. Font-Segura, A. Martinez, A. Guillén i Fàbregas
Session 2: Codes on Graphs and Lattices (Wednesday 13:20 – 15:00)
Invited Session by Joseph J. Boutros (Texas A & M University at Qatar)
-
A Deterministic Construction and Density Evolution Analysis for Generalized Product Codes
C. Häger, H. D. Pfister, A. Graell i Amat, F. Brännström, E. Agrell
-
Locally Repairable Codes with Availability and Hierarchy: Matroid Theory via Examples
R. Freij-Hollanti, T. Westerbäck, C. Hollanti
-
Reed-Muller Codes: Thresholds and Weight Distribution
M. Mondelli, S. Kudekar, S. Kumar, H. D. Pfister, E. Şaşoğlu, R. Urbanke
-
From LDPC Codes to LDA Lattices: A Capacity Result
N. di Pietro, G. Zémor, J. J. Boutros
-
Multilevel Coded Modulation and Lattice Construction D
R. Zamir
Session 3: Wireless Communication (with emphasis on Finite Blocklength Information Theory) (Wednesday 15:30 – 16:50)
Invited Session by Giuseppe Durisi (Chalmers University of Technology)
-
Design Considerations for Downlink Broadcast Frame with Short Data Packets
K. F. Trillingsgaard, P. Popovski
-
The Dispersion of Nearest-Neighbor Decoding for Additive Non-Gaussian Channels
J. Scarlett, V. Y. F. Tan, G. Durisi
-
Resource-Aware Incremental Redundancy in Feedback and Broadcast
R. D. Wesel, K. Vakilinia, S. V. S. Ranganathan, T. Mu, D. Divsalar
-
A Beta-Beta Achievability Bound with Applications
W. Yang, A. Collins, G. Durisi, Y. Polyanskiy, H. V. Poor
Session 4: Privacy and Secrecy (Wednesday 17:00 – 18:00)
Chaired by Roy Timo (Technische Universität München)
-
Pairwise Secret Key Agreement based on Location-derived Common Randomness
S. Salimi, P. Papadimitratos
-
Strong Secrecy for Cooperative Broadcast Channels
Z. Goldfeld, G. Kramer, H. H. Permuter, P. Cuff
-
Context Trees for Privacy-Preserving Modeling of Genetic Data
L. Kusters, T. Ignatenko
Keynote Lecture (Thursday 08:30 – 09:30)
Session 5: Communication Techniques (Thursday 10:00 – 12:00)
Chaired by Richard Wesel (University of California, Los Angeles)
-
Hybrid DF-CF-DT for Buffer-Aided Relaying
M. Shaqfeh, A. Zafar, H. Alnuweiri, M.-S. Alouini
-
Extended Delivery Time Analysis for Opportunistic Secondary Packet Transmission without Work-preserving
M. Usman, H.-C. Yang, M.-S. Alouini
-
Beamforming towards Regions of Interest for Multi-Site Mobile Networks
P. Hurley, M. Simeoni
-
EXIT Chart Analysis of the UMTS Turbo Code in VLF Channels
A. Hamilton
-
Channel Vector Subspace Estimation from Sample Covariance of Low-Dimensional Projections
S. Haghighatshoar, G. Caire
-
Factorization Approaches in Lattice-Reduction-Aided and Integer-Forcing Equalization
R. F. H. Fischer, M. Cyran, S. Stern
Session 6: Information Theoretic Security (Thursday 13:20 – 15:00)
Invited Session by Ashish Khisti (University of Toronto)
-
Recent Results on Broadcast Networks with Layered Decoding and Secrecy: An Overview
S. Zou, Y. Liang, L. Lai, H. V. Poor, S. Shamai
-
Semantic Security using a Stronger Soft-Covering Lemma
P. Cuff, Z. Goldfeld, H. H. Permuter
-
The Gap to Practical MIMO Wiretap Codes
A. Khina, Y. Kochman, A. Khisti
-
On Secure Broadcasting Over Parallel Channels with Independent Secret Keys
R. F. Schaefer, A. Khisti, H. V. Poor
-
Privacy Preserving Rechargeable Battery Policies for Smart Metering Systems
S. Li, A. Khisti, A. Mahajan
Session 7: Network Information Theory (Thursday 15:30 – 17:30)
Chaired by Elza Erkip (New York University)
-
A Rate-Distortion Approach to Caching
R. Timo, S. Saeedi Bidokhti, M. Wigger, B. C. Geiger
-
Improving on the Cut-Set Bound via a Geometric Analysis of Typical Sets
X. Wu, A. Özgür
-
The Capacity of the State-Dependent Semideterministic Relay Channel
R. Kolte, A. Özgür, H. H. Permuter
-
Random Coding Error Exponents for the Two-User Interference Channel
W. Huleihel, N. Merhav
-
A Necessary and Sufficient Condition for the Asymptotic Tightness of the Shannon Lower Bound
T. Koch
-
Rate-Distortion of a Heegard-Berger Problem with Common Reconstruction Constraint
M. Benammar, A. Zaidi
Keynote Lecture (Friday 08:30 – 09:30)
Session 8: Coding Techniques (Friday 10:00 – 12:00)
Chaired by Erik Agrell (Chalmers University of Technology)
-
On the Burst Erasure Correctability of Spatially Coupled LDPC Ensembles
N. Rengaswamy, L. Schmalen, V. Aref
-
The Fractality of Polar Codes
B. C. Geiger
-
Sampling Algorithms for Lattice Gaussian Codes
A. Campello, J.-C. Belfiore
-
Fixed-Energy Random Coding with Rescaled Codewords at the Transmitter
D. Fehr, J. Scarlett, A. Martinez
-
Quantization and LLR Computation for Physical Layer Security
O. Graur, N. Islam, A. Filip, W. Henkel
-
An Importance Sampling Algorithm for the Ising Model with Strong Couplings
M. Molkaraie
Session 9: Shannon Theory (Friday 13:20 – 15:00)
Invited Session by Anelia Somekh-Baruch (Bar-Ilan University)
-
Capacity Scaling Bounds in Wideband Cellular Networks
F. Gómez-Cuba, S. Rangan, E. Erkip, F. J. González-Castaño
-
On the Secrecy Capacity of the Z-Interference Channel
R. Bustin, M. Vaezi, R. F. Schaefer, H. V. Poor
-
Two Applications of the Gaussian Poincaré Inequality in the Shannon Theory
S. L. Fong, V. Y. F. Tan
-
Cooperation Strategies for the Broadcast and Multiple Access Channels
Y. Steinberg
-
Mismatched Decoding: DMC and General Channels
A. Somekh-Baruch
Session 10: Hypothesis Testing and Converse Bounds (Friday 15:30 – 16:50)
Invited Session by Albert Guillén i Fàbregas (Universitat Pompeu Fabra, Barcelona)
Back to the IZS 2016 home page.
|