Skip to main content
Secondary Menu
IEEE Home
IEEE Xplore Digital Library
IEEE Standards
IEEE Spectrum
More Sites
Search
Search
User account menu
Sign in
Main navigation
Publications
IEEE Transactions on Information Theory
IEEE BITS the Information Theory Magazine
IEEE Information Theory Society Newsletter
Conferences
IEEE International Symposium on Information Theory
IEEE Information Theory Workshop
Schools of Information Theory
Calendar of Upcoming Events
Information for Organizers
Videos
Membership
About Us
Become a Member
Chapters
Distinguished Lecturer Program
Awards
Awards
Make a Nomination
IEEE Fellows
Golden Jubilee Awards
Chapter of the Year Award
Community
Board of Governors
Committees
BoG Meetings
BoG Meeting Minutes
Governing Documents
Diversity & Inclusion
Outreach
Thomas: Teaching Resources
Volunteer
News
News
Job Board
Submit an Announcement
Subscribe to the Mailing List
Help
Search
Search
Search
Secondary Menu
IEEE Home
IEEE Xplore Digital Library
IEEE Standards
IEEE Spectrum
More Sites
Search
Search
User account menu
Sign in
Home
ITSOC search
Home
ITSOC search
We found 358 result.
Sort by
Relevance
Alphabetically
Date (newest first)
Apply
Duality-Based Bounds on Channel Capacity
Error Control for Network Coding
Generalized Minimum Distance Decoding with Arbitrary Error/Erasure Tradeoff
Information Loss in Deterministic Systems
Cooperative Diversity in Wireless Networks: Algorithms and Architectures
Model-Centric Approach to Discrete-Time Signal Processing for Dense Wavelength-Division Multiplexing Systems
Recurrence and Waiting Times in Stationary Processes, and their Applications in Data Compression
Information Theoretic Methods in Probability and Statistics
Strengthened Monotonicity of Relative Entropy via Pinched Petz Recovery Map
Consistency Thresholds for the Planted Bisection Model
Quantum Blahut-Arimoto Algorithms
Approximate quantum Markov chains
Reed–Muller Codes Achieve Capacity on Erasure Channels
Multiple Support Recovery Using Very Few Measurements Per Sample
Blockchains and Differential Privacy
Folded Codes and Streaming Codes
On Dynamics-Informed Blending of Machine Learning and Game Theory
Learning from Humans How to Improve Lossy Data Compression
Communication and Sensing: From Compressed Sampling to Model-based Deep Learning
On Weight Distribution of Polar Codes
Part 1 of 3: Bitcoin and Blockchains
Part 3 of 8: Introduction to Information Theory and Network Coding
Part 5 of 8: Introduction to Information Theory and Network Coding
Part 7 of 8: Introduction to Information Theory and Network Coding
Community-Aware Group Testing
Active Methods: Learning as you go and as fast as you can - Part 1
Active Methods: Learning as you go and as fast as you can - Part 2
Polar Codes: Origins to 5G and Beyond - Part 2
Information Theoretic Foundations for Data Science - Part 1
An Information Theoretic Perspective on Database and Graph Matching - Part 2
D&I March 2022 BoG Report
Meet the Shannon Lecturer Rüdiger Urbanke
Information in Small Bits - Chapter 2
Neural Augmentation In Wireless Communication
Sum Of Squares — Where Are We, And Where To Go?
Distributed Function Retrieval: A Storage And Privacy Prospective
Communication and Sensing: From Compressed Sampling to Model-based Deep Learning
Code-Based Cryptography
Estimation and Hypothesis Testing under Information Constraints (Part 2/3)
Locally-Testable and Locally-Decodable Codes (2/3)
Fair Machine Learning via Information Theory (1/3)
Fair Machine Learning via Information Theory (2/3)
Fair Machine Learning via Information Theory (3/3)
ISIT 2016: Interview with Alexander Holevo
Lossless Source Coding Algorithms
Networks
The Audacity of Throughput - A Trilogy of Rates
Randomized Dimensionality Reduction: A New Framework for Signal Processing and Communications
Golay, Heisenberg and Weyl
Quantum Information Theory
Deep Learning Applications in Communications
Nanoscale Information Processing
What Do We Know About Matrix Estimation?
Codes, Metrics, and Applications
How space-time codes work (MIMO)
Hamming and low density parity check codes
Secret Sharing Explained Visually
How Recommender Systems Work