Âé¶¹´«Ã½AV
Skip to main content
Secondary Menu
Search
Search
User account menu
Sign in
Main navigation
Âé¶¹´«Ã½AV
Âé¶¹´«Ã½AV Transactions on Information Theory
Âé¶¹´«Ã½AV Journal on Selected Areas in Information Theory
Âé¶¹´«Ã½AV BITS the Information Theory Magazine
Âé¶¹´«Ã½AV Information Theory Society Newsletter
Conferences
Âé¶¹´«Ã½AV International Symposium on Information Theory
Âé¶¹´«Ã½AV Information Theory Workshop
Schools of Information Theory
Calendar of Upcoming Events
Information for Organizers
Videos
Membership
About Us
Become a Member
Chapters
Distinguished Lecturer Program
Awards
Awards
Awards Booklets
Make a Nomination
Âé¶¹´«Ã½AV Fellows
Golden Jubilee Awards
Chapter of the Year Award
Community
Board of Governors
Committees
BoG Meetings
BoG Meeting Minutes
Governing Documents
Society Administrator
Diversity & Inclusion
Outreach
Volunteer
News
News
Job Board
Submit an Announcement
Subscribe to the Mailing List
Help
Search
Search
Search
Secondary Menu
Search
Search
User account menu
Sign in
Home
ITSOC search
Home
ITSOC search
We found 203 result.
Sort by
Relevance
Alphabetically
Date (newest first)
Apply
Introduction To The Information Theory Of Covert Communication
Unsourced Multiple Access (UMAC): Information Theory And Coding
Iterative Decoding of LDPC Codes and Channel Polarization
Estimation and Hypothesis Testing under Information Constraints (Part 3/3)
Finite-Blocklength Schemes in Information Theory (1/3)
Finite-Blocklength Schemes in Information Theory (2/3)
Tree archeology: Root finding and broadcasting
Coded Computing
With Purpose: Information Flow In The Era Of Hyperspecialization
Universaility
A Graphical-Model-Based Approach To Quantum Information Processing
Gone Fishin'
Fundamentals Of Blockchain Systems
Meet the Shannon Lecturer (Trailer) - Alon Orlitsky
Concentration Inequalities and The Entropy Method
Deep learning and information theory: An Emerging Interface
Completely Random Measures for Bayesian Nonparametrics
Morse Code
Claude Shannon: A Mathematical Theory of Communication
What is a bit?
From 3T to 5G: Theory and Practice of Cooperation in Wireless Networks
Information Theory and High-Dimensional Bayes Computation
Active Methods: Learning as you go and as fast as you can - Part 1
Polar Codes: Origins to 5G and Beyond - Part 2
An Information Theoretic Perspective on Database and Graph Matching - Part 2
Networks
Active Methods: Learning as you go and as fast as you can - Part 2
Community-Aware Group Testing
Information Theoretic Foundations for Data Science - Part 1
D&I March 2022 BoG Report
Distributed Function Retrieval: A Storage And Privacy Prospective
Part 7 of 8: Introduction to Information Theory and Network Coding
Part 5 of 8: Introduction to Information Theory and Network Coding
Part 3 of 8: Introduction to Information Theory and Network Coding
Part 1 of 3: Bitcoin and Blockchains
Learning from Humans How to Improve Lossy Data Compression
Communication and Sensing: From Compressed Sampling to Model-based Deep Learning
On Weight Distribution of Polar Codes
On Dynamics-Informed Blending of Machine Learning and Game Theory
Information in Small Bits - Chapter 2
Folded Codes and Streaming Codes
Blockchains and Differential Privacy
Fair Machine Learning via Information Theory (3/3)
Fair Machine Learning via Information Theory (2/3)
Fair Machine Learning via Information Theory (1/3)
Estimation and Hypothesis Testing under Information Constraints (Part 2/3)
Locally-Testable and Locally-Decodable Codes (2/3)
Code-Based Cryptography
Communication and Sensing: From Compressed Sampling to Model-based Deep Learning
Sum Of Squares — Where Are We, And Where To Go?
Neural Augmentation In Wireless Communication
Deep Learning Applications in Communications
Quantum Information Theory
Codes, Metrics, and Applications
Golay, Heisenberg and Weyl
What Do We Know About Matrix Estimation?
Nanoscale Information Processing
Lossless Source Coding Algorithms
The Audacity of Throughput - A Trilogy of Rates
Randomized Dimensionality Reduction: A New Framework for Signal Processing and Communications
ISIT 2016: Interview with Alexander Holevo
Hamming and low density parity check codes
How Recommender Systems Work
Secret Sharing Explained Visually
How space-time codes work (MIMO)
Learning Low-rank Functions With Neural Networks
ISIT2024 - Meet the Shannon Lecturer Andrew R. Barron
ISIT2023 - Meet the Shannon Lecturer Rüdiger Urbanke
Information bottlenecks in emerging distributed systems - Part 2
Teaching IT
Guidance from Information Theory – an engineering perspective
Optimal Estimation
Common Information: Old And New
Schools 2023 February BoG Report
Part 8 of 8: Introduction to Information Theory and Network Coding
Part 4 of 8: Introduction to Information Theory and Network Coding
Active Learning for Classification with Abstention
Channel Coding
The Bit Player Movie Trailer
Fundamental Trade-Offs between Privacy and Utility in Data Sharing (3/3)
Locally-Testable and Locally-Decodable Codes (3/3)
Estimation and Hypothesis Testing under Information Constraints (1/3)
Mutual Information in Machine Learning (1/3)
Private Computation with Applications to Machine Learning
Design and Decoding of Polar Codes with Large Kernels
Some Topics on Information Theoretic Security
Coded Caching: Past, Present, Future
ISIT2021 Welcome Message
Coded String Reconstruction Problems
DNA Sequencing in the 21st Century: Algorithms and Estimation
Randomness - A Computational Complexity View
Private Information Retrieval
Deep Learning for Inverse Problems
The Laplacian Matrices of Graphs
To Infinity and Beyond: New Frontiers in Wireless Information Theory
Interview to Shannon Awardee Janós Körner
Communication-Efficient and Privacy-Preserving Distributed Learning
Channel capacity (baud rate)
Codes: (Always) at Your Service
A few options go a long way: List decoding and applications
Load More