LEADER 02368oam 2200481zu 450 001 9910130691703321 005 20241212220425.0 010 $a9781467325790 010 $a1467325791 010 $a9781467325783 010 $a1467325783 035 $a(CKB)3420000000000882 035 $a(SSID)ssj0000781175 035 $a(PQKBManifestationID)12363857 035 $a(PQKBTitleCode)TC0000781175 035 $a(PQKBWorkID)10803389 035 $a(PQKB)11195760 035 $a(NjHacI)993420000000000882 035 $a(EXLCZ)993420000000000882 100 $a20160829d2012 uy 101 0 $aeng 135 $aur||||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$a2012 IEEE International Symposium on Information Theory Proceedings 210 31$a[Place of publication not identified]$cIEEE$d2012 215 $a1 online resource 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a9781467325806 311 08$a1467325805 327 $a2012 IEEE International Symposium on Information Theory Proceedings [copyright notice] -- Program -- Technical program committee -- Committees -- Data processing lower bounds for scalar lossy source codes with side information at the decoder -- Graph-based code design for quadratic-Gaussian Wyner-Ziv problem with arbitrary side information -- Source coding with delayed side information -- A compression algorithm using mis-aligned side-information -- Construction of MIMO MAC codes achieving the pigeon hole bound -- On the sum-capacity of Gaussian MAC with peak constraint -- Expurgation for discrete multiple-access channels via linear codes -- Simpler achievable rate regions for multiaccess with finite blocklength -- On two unicast wireless networks with destination-to-source feedback -- On degrees of freedom of layered two unicast networks with delayed CSIT -- On the sum secure degrees of freedom of two-unicast layered wireless networks. 606 $aInformation theory$vCongresses 606 $aInformation theory$xData processing 615 0$aInformation theory 615 0$aInformation theory$xData processing. 676 $a003.54 702 $aIEEE Staff 801 0$bPQKB 906 $aPROCEEDING 912 $a9910130691703321 996 $a2012 IEEE International Symposium on Information Theory Proceedings$92522232 997 $aUNINA