Â鶹´«Ã½AV

Posters

ESIT2015 Poster Program

Ìý

Day 1: Monday 20.04.2015

14:00 – 15:30 ÌýPoster Session 1/3

Ìý Coding Theory

RELIABILITY OF ERASURE CODED STORAGE SYSTEMS

ÌýA. Campello

NONLINEAR CODE DESIGN FOR JOINT ENERGY AND INFORMATION TRANSFER

M. Dabirnia and T.M. Duman

EMBEDDING DISTANCES INTO THE HAMMING CUBE

R.G.L. D'Oliveira and M. Firer

DISPLACEMENT CONVEXITY - A FRAMEWORK FOR THE ANALYSIS OF SPATIALLY COUPLED CODES

R. El-Khatib, N. Macris, and R. Urbanke

SPARSE REGRESSION CODES

A. Greig, R. Venkataramanan, and C. Rush

ON ENHANCING THE MINIMUM HAMMING DISTANCES OF POLAR CODES

A. Hadi andÌý E. Alsusa

PERFECT CODES IN A n LATTICES

M. KovaÄević

Ìý Cryptography and Security

KEY MANAGEMENT FOR COMPRESSIVE SENSING BASED CRYPTOGRAPHIC MECHANISMS

R. A. Djeujo

ON THE SECRECY EXPONENT OF THE WIRE-TAP CHANNEL

M.B. Parizi and E. Telatar

MODES OF OPERATION FOR COMPRESSIVE SENSING BASED ENCRYPTION

R. Fay and C. Ruland

A MULTI-LAYER IMAGE REPRESENTATION APPROACH: JOINT IMAGE COMPRESSION-ENCRYPTION

S. Ferdowsi, S. Voloshynovskiy, and D. Kostadinov

COGNITIVE RADIO NETWORKS WITH SECRECY

P.-H. Lin, F. Gabry, R. Thobaben, E. Jorswieck, and M. Skoglund

INFORMATION THEORETIC PRIVACY FOR SMART METERS

G. Giaconi and D. Gündüz

BROADCAST CHANNELS WITH PRIVACY LEAKAGE CONSTRAINTS

Z. Goldfeld, G. Kramer, and H.H. Permuter

Ìý Multiuser Information Theory

CHANNEL RESOLVABILITY CODES BASED ON CONCATENATION AND SPARSE LINEAR ENCODING

ÌýR.A. Amjad

THE MULTICAST COGNITIVE INTERFERENCE CHANNEL

M. Benammar, P. Piantanida, and S. Shamai (Shitz)

GAUSSIAN JOINT SOURCE-CHANNEL CODING FOR THE STRONG INTERFERENCE CHANNEL

I.Estella-Aguerri and D.z Gündüz

POWER LIMITED BROADCAST NETWORKS IN LINE-OF-SIGHT ENVIRONMENT

S. Haddad and O. Lévêque

Ìý Source Coding

STARGEEN: A STATISTICAL REFERENCE-BASED GENOME COMPRESSION ALGORITHM

F. Farhadzadeh and F.M.J. Willems

DISTORTION MINIMIZATION IN MULTITERMINAL SOURCE CODING WITH ENERGY HARVESTING DEVICES

R. Gangula, D. Gündüz, and D Gesbert

ON TWO TERMINAL INTERACTIVE SOURCE CODING FOR FUNCTION COMPUTATION WITH SIDE INFORMATION

M.A. Moussa and A. Zaidi

SOURCE CODING FOR DISTRIBUTED STORAGE

M.T. Vu, T.J. Oechtering, and M. Skoglund

Ìý Wireless Communication and Networks

ONE-BIT MASSIVE MIMO: CHANNEL ESTIMATION AND HIGH-ORDER MODULATIONS

S. Jacobsson, G. Durisi, M. Coldrey, U. Gustavsson, and C. Studer

MASSIVE MIMO TRANSMITTER DESIGN

M. Jäger

DISTRIBUTED WIDEBAND SPECTRUM SENSING

T. Kealy, O. Johnson, and R. J Piechocki

DATA DISSEMINATION PROBLEM IN WIRELESS NETWORKS

I. Kubjas and V. Skachek

BLOCK FADING CHANNELS AT FINITE BLOCKLENGTH

A.L. Serrano and T. Koch

COOPERATIVE SLOTTED ALOHA FOR MULTI-BASE STATION SYSTEMS WITH MULTIPACKET RECEPTION

A. Mastilovic, D. Vukobratovic, D. Bajovic, and D. Jakovetic

DISTRIBUTED STORAGE ALLOCATIONS FOR NEIGHBORHOOD-BASED DATA ACCESS

D. Jakovetić, A. Minja, D. Bajović, and D. Vukobratović

Ìý

Day 4: Thursday 23.04.2015

14:00 – 15:30 ÌýPoster Session 2/3

Ìý Coding Theory

ON CODES IN l 1 METRIC, CORRECTING FIXED NUMBER OF ERRORS

S. Kruglik

THE IMPROVED TURBO-DECODING MESSAGE-PASSING ALGORITHM AND CORRESPONDING DECODER FOR LDPC CODES

L. Lao

EFFICIENT REALIZATION OF PROBABILISTIC GRADIENT DESCENT BIT-FLIPPING DECODERS

K. Le, D. Declercq, F. Ghaffari, C. Spagnol, E. Popovici, P. Ivanis, B. Vasic

HARDWARE-OPTIMIZED DECODERS FOR LDPC CODES

Y. Liu, P.M. Olmos, and T. Koch

COMBINATORIAL METRICS AND DECODING BEYOND HALF THE MINIMUM DISTANCE

M.H. Mohamed and M. Bossert

UNIFIED SCALING OF POLAR CODES: ERROR EXPONENT, SCALING EXPONENT, MODERATE DEVIATIONS, AND ERROR FLOORS

M. Mondelli, S.H. Hassani, and R. Urbanke

Ìý Cryptography and Security

COMPOUND BIOMETRIC AUTHENTICATION

A.Grigorescu and H. Boche

TRANSFORM CODING FOR PHYSICAL UNCLONABLE FUNCTIONS (PUFS)

O. Günlü and O. İşcan

SECRECY CONSTRAINED NETWORKS WITH KNOWN AND UNKNOWN EAVESDROPPERS

M. Amir, T. Khattab, T. Elfouly, and A. Mohamed

PRIVACY-PRESERVING GENOME ANALYSIS

C.J. Kusters and T. Ignatenko

PRIVACY ON HYPOTHESIS TESTING

Z. Li, T.J. Oechtering, J. Jaldén, and M. Skoglund

SECURE NETWORK CODING AGAINST POLLUTION ATTACKS AND ITS APPLICATION TO CLOUD STORAGE SYSTEMS

M. Ma, Z. Erkin, and J. Weber

ALGEBRAIC GEOMETRY AND SECRET SHARING SCHEMES

U. Martínez-Peñas

ÌýDetection and Estimation

PROBABILISTIC MODELLING OF ONE-SIDED AND TWO-SIDED CONTEXTS

S. Berghout

NEURAL NETWORK PERFORMANCES IMPROVED BY SYNAPTIC NOISE

E. Coyac, V. Gripon, and C. Langlais

DISTRIBUTED BINARY DETECTION WITH A UNIDIRECTIONAL COMMUNICATION LINK

G. Katz, P. Piantanida, R. Couillet, and M. Debbah

MULTILEVEL VECTOR QUANTIZATION (MVQ) FOR FACE RECOGNITION

D.Ìý Kostadinov

Multiuser Information Theory

CAPACITY REGIONS OF 2-USER BROADCAST PACKET ERASURE CHANNELS WITH FEEDBACK AND MEMORY

M. Heindlmaier and S.S. Bidokhti

INSTANTANEOUS RELAYING FOR THE 3-WAY RELAY CHANNEL WITH CIRCULAR MESSAGE EXCHANGES

B. Matthiesen and E.A. Jorswieck

CACHING OF (A PAIR OF) GAUSSIANS

G. J. Op ’t Veld, and M.C. Gastpar

ON THE CAPACITY OF VECTOR GAUSSIAN CHANNELS WITH BOUNDED INPUTS

B. Rassouli and B. Clerckx

Ìý Wireless Communication and Networks

ADVANCED BUS SIGNALING METHODS IN MIRCROGRIDS

M. Angjelichinoski, C. Stefanovic, and P. Popovski

PERFORMANCE ANALYSIS AND DEMONSTRATION OF RANDOM CODED COOPERATION NETWORKS USING 802.11 APPLICATION FRAMEWORK

M.M. Azari, S. Pollin, and F. Rosas

PROTOCOLS, MESSAGES AND INFORMATION THEORY BASED ON TRACE ANALYSIS FOR MOBILE NETWORK

B.S.Salim

EXPECTATION PROPAGATION SOFT INFERENCE FOR MASSIVE MIMO SYSTEMS

J. Céspedes, P.M. Olmos, M. Sánchez-Fernández, and F. P. Cruz

MULTI-RECEIVER ALOHA SYSTEMS – A SURVEY AND NEW RESULTS

F. Clazzer

FINITE-BLOCKLENGTH ANALYSIS OF THE ARQ-PROTOCOL THROUGHPUT OVER THE GAUSSIAN COLLISION CHANNEL

R. Devassy, G. Durisi, P.Popovski, and E. G. Ström

Ìý

Day 4: Thursday 23.04.2015

16:00 – 17:30 ÌýPoster Session 3/3

ÌýCoding Theory

ERGODIC THEORY MEETS POLARIZATION: A FOUNDATION OF POLARIZATION THEORY

R. Nasser

FPGA DESIGN OF HIGH THROUGHPUT LDPC DECODER BASED ON IMPRECISE OFFSET MIN-SUM DECODING

T. Nguyen-Ly, K. Le, F. Ghaffari, A. Amaricai, O. Boncalo, V. Savin, and D. Declercq

SYNDROME DECODING: THE POSET CASE

J.A. Pinheiro

CAPACITY AND CODING FOR THE ERASURE CHANNEL WITH FEEDBACK ANDA NO-ADJACENT-ONES INPUT CONSTRAINT

O. Sabag, H. Permuter, N. Kashyap

POLYNOMIALLY SOLVABLE INSTANCES OF THE SHORTEST AND CLOSEST VECTOR PROBLEMS

S. Sahraei and M. Gastpar

FINITE-LENGTH SCALING OF CONVOLUTIONAL LDPC CODES

M. Stinner and P. Olmos

BINARY PUZZLES AS AN ERASURE DECODING PROBLEM

P.H. Utomo and R. Pellikaan

Ìý Cryptography and Security

HYPOTHESIS TESTING. COMMUNICATION AND SECURITY CONSTRAINTS

M. Mhanna and P. Piantanida

ON ERROR CORRECTION FOR PHYSICAL UNCLONABLE FUNCTIONS

S. Müelich, S. Puchinger, M. Bossert, M. Hiller, and G. Sigl

BINARY TRANSMISSIONS OVER GAUSSIAN WIRETAP CHANNEL UNDER SOFT/HARD DECISION DECODING

C. Qi, Y. Chen, A. J. Han Vinck, and X. Tang

SECURE TRANSMISSION USING AN UNTRUSTED RELAY WITH SCALED COMPUTE-AND-FORWARD

Z.Ren, J.Goseling, J.Weber, and M. Gastpar

RESILIENT TRUE RANDOM NUMBER GENERATORS. THE DESIGN AND SECURITY ANALYSIS

M. Skorski

WIRETAP CHANNEL: MESSAGES UNTRACEABILITY FOR FREE?

O. Trushina

COMPRESSIVE SENSING BASED IMAGE AUTHENTICATION

T. Wu and C. Ruland

Ìý Multiuser Information Theory

THE GAUSSIAN CHANNEL WITH INTERMITTENT FEEDBACK

L. Palzer

NOISY CHANNEL-OUTPUT FEEDBACK CAPACITY OF THE LINEAR DETERMINISTIC INTERFERENCE CHANNEL

V. Quintero, S.M. Perlaza, and J.-M. Gorce

UNDERSTANDING HIGH-ORDER CORRELATIONS USING A SYNERGY-BASED DECOMPOSITION OF THE TOTAL ENTROPY

F. Rosas, V. Ntranos, C. Ellison, M. Verhelst, and S.Pollin

Ìý Network Coding

LIST AND PROBABILISTIC UNIQUE DECODING OF FOLDED SUBSPACE CODES

H. Bartz and V. Sidorenko

PERFORMANCE ANALYSIS OF RANDOM LINEAR NETWORK CODING IN TWO-SOURCE SINGLE-RELAY NETWORKS

A.S. Khan and I. Chatzigeorgiou

DECODING DELAY IN NETWORK CODED MULTIPATH TRANSMISSIONS

B. Serbetci, J. Goseling, J.-K. van Ommeren, and R.J. Boucherie

Ìý Various Topics

NETWORKS OF NEURAL CLIQUES AS ASSOCIATIVE MEMORIES

A.A. Mofrad and M.G. Parker

LINEAR TIME ALGORITHM FOR OPTIMAL FEED-LINK PLACEMENT

M. Savić and M. Stojaković

CONSTANT COMPOSITION DISTRIBUTION MATCHING

P. Schulte

Ìý Wireless Communication and Networks

PERFORMANCE MEASURES FOR BROADCASTING IN WIRELESS SENSOR NETWORKS

M. Mitici, J. Goseling, M. de Graaf, J.-K. van Ommeren, and R.J. Boucherie

ROBUST EXTENDED MATCHING ALGORITHM FOR MULTICARRIER COMMUNICATIONS

Y. Sabucu, A.E. Pusane, and G.K. Kurt

ON THE SYNERGISTIC BENEFITS OF ALTERNATING CSIT FOR SISO X CHANNEL

A. Wagdy, A. Elkeyi, T. Khattab, M. Nafie

THE SQUARE-ROOT CHANNEL

A.Tsiatmas, F.M.J.Willems, and C.P.M.J. Baggen

VARIABLE-POWER SCHEDULING OF ENERGY HARVESTING SENSORS FOR PERPETUAL TARGET COVERAGE

Q. Yang and D. Gündüz

OPTIMUM POWER CONTROL AT FINITE BLOCKLENGTH

W. Yang, G. Caire, G. Durisi, and Y. Polyanskiy

Ìý

Ìý