Technical Program

Alternative Views
Complete Proceedings

Download Complete Proceedings

186 MB Zip Archive
Available from 21 June 2020 through 3 July 2020
 

Algebraic and Combinatorial Coding Theory

Attend  A.1: Algebraic Coding Theory I
Attend  A.2: Algebraic Coding Theory II
Attend  A.3: Combinatorics and Information Theory
Attend  A.4: Combinatorial Coding Theory I
Attend  A.5: Combinatorial Coding Theory II
 

Coded and Distributed Computation

Attend  D.1: Coded Computation
Attend  D.2: Coding for Specialized Computations
Attend  D.3: Distributed Matrix Multiplication
 

Coding for Communications

Attend  C.1: Coding for Communications I
Attend  C.2: Coding for Communications II
Attend  C.3: Iterative Decoding
Attend  C.4: LDPC Codes
Attend  C.5: List Decoding
Attend  C.6: Polar Codes I
Attend  C.7: Polar Codes II
Attend  C.8: Spatially Coupled Codes
Attend  C.9: Streaming Codes
Attend  C.10: Topics in Coding Theory
 

Coding for Storage and Memories

Attend  M.1: Codes for Distributed Storage I
Attend  M.2: Codes for Distributed Storage II
Attend  M.3: Codes for Distributed Storage III
Attend  M.4: Codes for Distributed Storage IV
Attend  M.5: Coding for Storage and Memories I
Attend  M.6: Coding for Storage and Memories II
Attend  M.7: Insertion Deletion Substitution Codes I
Attend  M.8: Insertion Deletion Substitution Codes II
Attend  M.9: Topics in Coding for Storage and Memories
 

Cryptography, Security and Privacy

Attend  P.1: Covert Communications
Attend  P.2: Cryptography
Attend  P.3: Information Privacy I
Attend  P.4: Information Privacy II
Attend  P.5: Information Theoretic Security I
Attend  P.6: Information Theoretic Security II
Attend  P.7: Information Theoretic Security III
Attend  P.8: Private Information Retrieval I
Attend  P.9: Private Information Retrieval II
Attend  P.10: Private Information Retrieval III
Attend  P.11: Topics in Privacy and Cryptography
 

Detection and Estimation

Attend  E.1: Detection Theory
Attend  E.2: Detection and Applications
Attend  E.3: Estimation Theory
Attend  E.4: Estimation and Applications
Attend  E.5: Hypothesis Testing I
Attend  E.6: Hypothesis Testing II
 

Graphs, Games, Sparsity, and Signal Processing

Attend  G.1: Graph Analytics
Attend  G.2: Game Theory
Attend  G.3: Compressed Sensing
Attend  G.4: Group Testing and Sparse Codes
Attend  G.5: Signal Processing
 

Industry Track

IND-1: 5G and Its Evolution Towards 6G
IND-2: Distributed Learning over Wireless Edge
IND-3: Finite Block Length Information Theory: Application to 5G System Design
IND-4: Selected Topics on Deep-Learning Based Communication System Design
 

Network Information Theory

Attend  I.1: Broadcast Channel I
Attend  I.2: Broadcast Channel II
Attend  I.3: Interference Channel I
Attend  I.4: Interference Channel II
Attend  I.5: Network Information Theory
Attend  I.6: Relay Channel
 

Networking and Network Coding

Attend  N.1: Network Coding I
Attend  N.2: Network Coding II
Attend  N.3: Coded Caching I
Attend  N.4: Coded Caching II
Attend  N.5: Index Coding
Attend  N.6: Age of Information I
Attend  N.7: Age of Information II
Attend  N.8: Timely Updates
 

Quantum Systems, Codes, and Information

Attend  Q.1: Quantum Communication
Attend  Q.2: Quantum Compression
Attend  Q.3: Quantum Error Correcting Codes and Decoding
Attend  Q.4: Quantum Information Theory
Attend  Q.5: Quantum Key Distribution
Attend  Q.6: Quantum Networks
Attend  Q.7: Quantum Security
 

Shannon Theory

Attend  S.1: Capacity Computation
Attend  S.2: Channel Capacity
Attend  S.3: Channels with Feedback
Attend  S.4: Channels with State
Attend  S.5: Error Exponents
Attend  S.6: Finite-blocklength Analysis
Attend  S.7: Guessing
Attend  S.8: Information Inequalities
Attend  S.9: Information Measures I
Attend  S.10: Information Measures II
Attend  S.11: Renyi Entropy
Attend  S.12: Second-order Analysis
Attend  S.13: Topics in Shannon Theory
 

Source Coding

Attend  O.1: Data Compression
Attend  O.2: Lossy Source Coding
Attend  O.3: Multi-terminal Source Coding I
Attend  O.4: Multi-terminal Source Coding II
Attend  O.5: Topics in Source Coding
 

Statistics and Learning Theory

Attend  L.1: Application-Specific Learning
Attend  L.2: Classification
Attend  L.3: Distributed Learning Performance Analysis
Attend  L.4: Distribution Learning
Attend  L.5: Federated Learning
Attend  L.6: Gradient-Based Distributed Learning
Attend  L.7: High-dimensional Statistics
Attend  L.8: Learning and Message-Passing
Attend  L.9: Learning Methods and Networks
Attend  L.10: Learning Theory I
Attend  L.11: Learning Theory II
Attend  L.12: Multi-Arm Bandits
Attend  L.13: Online, Active, and Transfer Learning
 

Topics in Information Theory

Attend  T.1: Complexity and Computation Theory
Attend  T.2: Information and Control
Attend  T.3: Information Theory and Biology
Attend  T.4: Sequences
 

Wireless Communications

Attend  W.1: Cellular Networks
Attend  W.2: Intelligent Surface
Attend  W.3: Random Access I
Attend  W.4: Random Access II
Attend  W.5: Wireless Communications
 

Plan Ahead

IEEE ISIT 2021

2021 IEEE International Symposium on Information Theory

11-16 July 2021 | Melbourne, Victoria, Australia

Visit Website!