Skip to main content

Secondary Menu

  • IEEE Home
  • IEEE Xplore Digital Library
  • IEEE Standards
  • IEEE Spectrum
  • More Sites

User account menu

Sign in
Home Home

Search

IEEE Logo Itsoc Logo Itsoc Logo Itsoc Logo

Secondary Menu

  • IEEE Home
  • IEEE Xplore Digital Library
  • IEEE Standards
  • IEEE Spectrum
  • More Sites

User account menu

Sign in
IEEE Logo Itsoc Logo
We found 43 results
A Playful Sketch of the Quantum Cryptography Protocol BB84 [About the Cover]

This drawing was a blueprint for a small quilt that was added to the mathematics/art installation Mathemalchemy (about which more information can be found at mathemalchemy.org).

Dec 1, 2023
b8716b33a3fe7329735e3bd04527332c/portrait
Robert Calderbank
READ MORE ACCESS ARTICLE
-
No $((n,K,d<127))$ Code Can Violate the Quantum Hamming Bound

It is well-known that nondegenerate quantum error correcting codes (QECCs) are constrained by a quantum version of the Hamming bound. Whether degenerate codes also obey such a bound, however, remains a long-standing question with practical implications for the efficacy of QECCs. We employ a combination of previously derived bounds on QECCs to demonstrate tha...

Dec 2, 2023
Profile
Emanuel Dallas
University of Southern California, Los Angeles, CA, USA
,
Profile
Faidon Andreadakis
University of Southern California, Los Angeles, CA, USA
,
Profile
Daniel Lidar
University of Southern California, Los Angeles, CA, USA
READ MORE ACCESS ARTICLE
aaa
From the Editor-in-Chief

This new venture was made possible by generous support from the Board of Governors of the IT Society, and I appreciate their vision and leadership.  IEEE BITS looks to publish tutorial articles that view vibrant research areas like machine learning, wireless, quantum information science, and blockchains through an information-theoretic lens. We are supporte...

Feb 10, 2022
b8716b33a3fe7329735e3bd04527332c/portrait
Robert Calderbank
READ MORE ACCESS ARTICLE
 Privacy
A Survey on Statistical, Information, and Estimation—Theoretic Views on Privacy

Privacy has become an emerging challenge in both information theory and computer science due to massive (centralized) collection of user data. In this article, we overview privacy-preserving mechanisms and metrics from the lenses of information theory, and unify different privacy metrics, including f-divergences, Rényi divergences, and differential privacy (...

Feb 11, 2022
Profile
Hsiang Hsu
Harvard University
,
Profile
Natalia Martinez
Duke University
,
Profile
Martin Bertran
Duke University,
,
Profile
Guillermo Sapiro
Duke University
,
Profile
Flavio P Calmon
Harvard University
,
READ MORE ACCESS ARTICLE
  Group Testing
Group Testing for Community Infections

Group testing is the technique of pooling together diagnostic samples in order to increase the efficiency of medical testing. Traditionally, works in group testing assume that the infections are i.i.d. However, contagious diseases like COVID-19 are governed by community spread and hence the infections are correlated. This survey presents an overview of recen...

Feb 11, 2022
Profile
Pavlos Nikolopoulos
EPFL
,
Profile
Sundara Rajan Srinivasavaradhan
University of California, Los Angeles
,
rimg_christina1
Christina Fragouli
UCLA
,
c64734d27e0566123d42edaf0faad254
Suhas Diggavi
,
READ MORE ACCESS ARTICLE

Pagination

  • « First First page
  • ‹ Previous page
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • › Next page
  • Last » Last page

Submit

We welcome article, column and special issue proposals.

SUBMIT A MANUSCRIPT

Contact Us

Question or feedback for BITS? Get in touch with us below.

CONTACT

Sign Up for Updates

SUBSCRIBE

Footer menu

  • Home
  • Contact
  • Accessibility
  • Nondiscrimination Policy
  • IEEE Privacy Policy
  • Help
© Copyright 2021 IEEE – All rights reserved. Use of this website signifies your agreement to the IEEE Terms and Conditions.
A not-for-profit organization, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.