Skip to main content
Secondary Menu
IEEE Home
IEEE Xplore Digital Library
IEEE Standards
IEEE Spectrum
More Sites
Search
Search
User account menu
Sign in
Main navigation
Publications
IEEE Transactions on Information Theory
IEEE BITS the Information Theory Magazine
IEEE Information Theory Society Newsletter
Conferences
IEEE International Symposium on Information Theory
IEEE Information Theory Workshop
Schools of Information Theory
Calendar of Upcoming Events
Information for Organizers
Videos
Membership
About Us
Become a Member
Chapters
Distinguished Lecturer Program
Awards
Awards
Make a Nomination
IEEE Fellows
Golden Jubilee Awards
Chapter of the Year Award
Community
Board of Governors
Committees
BoG Meetings
BoG Meeting Minutes
Governing Documents
Diversity & Inclusion
Outreach
Thomas: Teaching Resources
Volunteer
News
News
Job Board
Submit an Announcement
Subscribe to the Mailing List
Help
Search
Search
Search
Secondary Menu
IEEE Home
IEEE Xplore Digital Library
IEEE Standards
IEEE Spectrum
More Sites
Search
Search
User account menu
Sign in
Home
ITSOC search
Home
ITSOC search
We found 173 result.
Sort by
Relevance
Alphabetically
Date (newest first)
Apply
Claude Shannon: A Mathematical Theory of Communication
Tree archeology: Root finding and broadcasting
Schools 2023 June BoG Report
Iterative Decoding of LDPC Codes and Channel Polarization
Polar Codes: Origins to 5G and Beyond - Part 1
Information Theoretic Foundations for Data Science - Part 2
Information bottlenecks in emerging distributed systems - Part 1
An Information Theoretic Perspective on Database and Graph Matching - Part 1
Information in Small Bits - Chapter 3
Data Driven Algorithm Design
Information-directed Exploration in Bandits and Reinforcement Learning
Meet the Shannon Lecturer (Trailer) - Alon Orlitsky
Gone Fishin'
Coded Computing
Fundamentals Of Blockchain Systems
Universaility
With Purpose: Information Flow In The Era Of Hyperspecialization
A Graphical-Model-Based Approach To Quantum Information Processing
Recent Advances In Reinforcement Learning Theory
Introduction To The Information Theory Of Covert Communication
Unsourced Multiple Access (UMAC): Information Theory And Coding
Estimation and Hypothesis Testing under Information Constraints (Part 3/3)
Finite-Blocklength Schemes in Information Theory (1/3)
Finite-Blocklength Schemes in Information Theory (2/3)
ISIT-2014: On The Mathematics of Distinguishable Difference
Concentration Inequalities and The Entropy Method
Completely Random Measures for Bayesian Nonparametrics
It’s Easier to Approximate
Source Coding and Simulation
Blockchains and Differential Privacy
Folded Codes and Streaming Codes
On Dynamics-Informed Blending of Machine Learning and Game Theory
Learning from Humans How to Improve Lossy Data Compression
Communication and Sensing: From Compressed Sampling to Model-based Deep Learning
On Weight Distribution of Polar Codes
Part 1 of 3: Bitcoin and Blockchains
Part 3 of 8: Introduction to Information Theory and Network Coding
Part 5 of 8: Introduction to Information Theory and Network Coding
Part 7 of 8: Introduction to Information Theory and Network Coding
Community-Aware Group Testing
Active Methods: Learning as you go and as fast as you can - Part 1
Active Methods: Learning as you go and as fast as you can - Part 2
Polar Codes: Origins to 5G and Beyond - Part 2
Information Theoretic Foundations for Data Science - Part 1
An Information Theoretic Perspective on Database and Graph Matching - Part 2
D&I March 2022 BoG Report
Meet the Shannon Lecturer Rüdiger Urbanke
Information in Small Bits - Chapter 2
Neural Augmentation In Wireless Communication
Sum Of Squares — Where Are We, And Where To Go?
Distributed Function Retrieval: A Storage And Privacy Prospective
Communication and Sensing: From Compressed Sampling to Model-based Deep Learning
Code-Based Cryptography
Estimation and Hypothesis Testing under Information Constraints (Part 2/3)
Locally-Testable and Locally-Decodable Codes (2/3)
Fair Machine Learning via Information Theory (1/3)
Fair Machine Learning via Information Theory (2/3)
Fair Machine Learning via Information Theory (3/3)
ISIT 2016: Interview with Alexander Holevo
Lossless Source Coding Algorithms
Networks
The Audacity of Throughput - A Trilogy of Rates
Randomized Dimensionality Reduction: A New Framework for Signal Processing and Communications
Golay, Heisenberg and Weyl
Quantum Information Theory
Deep Learning Applications in Communications
Nanoscale Information Processing
What Do We Know About Matrix Estimation?
Codes, Metrics, and Applications
How space-time codes work (MIMO)
Hamming and low density parity check codes
Secret Sharing Explained Visually
How Recommender Systems Work