Search

Your search keyword '"Duffy, Ken"' showing total 42 results

Search Constraints

Start Over You searched for: Author "Duffy, Ken" Remove constraint Author: "Duffy, Ken" Topic computer science - information theory Remove constraint Topic: computer science - information theory
42 results on '"Duffy, Ken"'

Search Results

1. Soft-output Guessing Codeword Decoding

2. Near-Optimal Generalized Decoding of Polar-like Codes

3. Soft-output (SO) GRAND and Iterative Decoding to Outperform LDPCs

4. Upgrade error detection to prediction with GRAND

5. PEOPL: Characterizing Privately Encoded Open Datasets with Public Labels

6. Using channel correlation to improve decoding -- ORBGRAND-AI

7. GRAND-EDGE: A Universal, Jamming-resilient Algorithm with Error-and-Erasure Decoding

8. Soft detection physical layer insecurity

9. Physical layer insecurity

10. GRAND-assisted Optimal Modulation

11. A General Security Approach for Soft-information Decoding against Smart Bursty Jammers

12. Soft decoding without soft demapping with ORBGRAND

13. Block turbo decoding with ORBGRAND

14. GRAND for Fading Channels using Pseudo-soft Information

15. Soft-input, soft-output joint detection and GRAND

16. On the Role of Quantization of Soft Information in GRAND

17. AES as Error Correction: Cryptosystems for Reliable Communication

18. Ordered Reliability Bits Guessing Random Additive Noise Decoding

19. Partial Encryption after Encoding for Security and Reliability in Data Systems

20. CRC Codes as Error Correction Codes

21. A Coding Theory Perspective on Multiplexed Molecular Profiling of Biological Tissues

22. Keep the bursts and ditch the interleavers

23. Noise Recycling

24. Soft Maximum Likelihood Decoding using GRAND

25. Ordered Reliability Bits Guessing Random Additive Noise Decoding

26. 5G NR CA-Polar Maximum Likelihood Decoding by GRAND

27. Guessing random additive noise decoding with symbol reliability information (SRGRAND)

28. Capacity-achieving Guessing Random Additive Noise Decoding (GRAND)

29. A Characterization of Guesswork on Swiftly Tilting Curves

30. Guesswork Subject to a Total Entropy Budget

31. Privacy with Estimation Guarantees

32. Principal Inertia Components and Applications

33. A Perspective on Future Research Directions in Information Theory

34. Hiding Symbols and Functions: New Metrics and Constructions for Information-Theoretic Security

35. Optimization-Based Linear Network Coding for General Connections of Continuous Flows

36. A Linear Network Code Construction for General Integer Connections Based on the Constraint Satisfaction Problem

37. Multi-user guesswork and brute force security

38. Guessing a password over a wireless channel (on the effect of noise non-uniformity)

39. Bounds on inference

40. Brute force searching, the typical set and Guesswork

41. Lists that are smaller than their parts: A coding approach to tunable secrecy

42. Guesswork, large deviations and Shannon entropy

Catalog

Books, media, physical & digital resources