Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2010.Cataloged from student PDF version of thesis.Includes bibliographical references (p. 201-212).Sparse graph codes were first introduced by Gallager over 40 years ago. Over the last two decades, such codes have been the subject of intense research, and capacity approaching sparse graph codes with low complexity encoding and decoding algorithms have been designed for many channels. Motivated by the success of sparse graph codes for channel coding, we explore the use of sparse graph codes for four other problems related to compression, sensing, and security. First, we construct locally encodable and decodable source codes for a sim...
We consider code design for Wyner’s wiretap channel. Optimal coding schemes for this channel require...
Distributed compression involves compressing multiple data sources by exploiting the underlying corr...
textThe importance of constructing reliable and efficient methods for securing digital information i...
Sparse graph codes were first introduced by Gallager over 40 years ago. Over the last two decades, s...
Compressed Sensing (CS) methods using sparse binary measurement matrices and iterative message-passi...
Compressed sensing methods using sparse measure- ment matrices and iterative message-passing recover...
Modern coding theory is based on the foundation of the sparse codes on graphs, such as the low-densi...
Abstract—In this paper, we study joint network coding and distributed source coding of inter-node de...
Thesis (M. Eng. and S.B.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering an...
This dissertation presents a systematic exposition on finite-block-length coding theory and practice...
Rapid advances in sensor technologies have fueled massive torrents of data streaming across networks...
Abstract—We propose a scheme to implement lossy data compression for discrete equiprobable sources u...
In this paper, we analyze the information theoretic lower bound on the necessary number of samples n...
Mathematical coding theory addresses the problem of transmitting information reliably and efficientl...
In this paper, we demonstrate some applications of compressive sensing over networks. We make a conn...
We consider code design for Wyner’s wiretap channel. Optimal coding schemes for this channel require...
Distributed compression involves compressing multiple data sources by exploiting the underlying corr...
textThe importance of constructing reliable and efficient methods for securing digital information i...
Sparse graph codes were first introduced by Gallager over 40 years ago. Over the last two decades, s...
Compressed Sensing (CS) methods using sparse binary measurement matrices and iterative message-passi...
Compressed sensing methods using sparse measure- ment matrices and iterative message-passing recover...
Modern coding theory is based on the foundation of the sparse codes on graphs, such as the low-densi...
Abstract—In this paper, we study joint network coding and distributed source coding of inter-node de...
Thesis (M. Eng. and S.B.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering an...
This dissertation presents a systematic exposition on finite-block-length coding theory and practice...
Rapid advances in sensor technologies have fueled massive torrents of data streaming across networks...
Abstract—We propose a scheme to implement lossy data compression for discrete equiprobable sources u...
In this paper, we analyze the information theoretic lower bound on the necessary number of samples n...
Mathematical coding theory addresses the problem of transmitting information reliably and efficientl...
In this paper, we demonstrate some applications of compressive sensing over networks. We make a conn...
We consider code design for Wyner’s wiretap channel. Optimal coding schemes for this channel require...
Distributed compression involves compressing multiple data sources by exploiting the underlying corr...
textThe importance of constructing reliable and efficient methods for securing digital information i...