au.\*:("KHISTI, Ashish")
Results 1 to 18 of 18
Selection :
Private Broadcasting Over Independent Parallel ChannelsKHISTI, Ashish; TIE LIU.IEEE transactions on information theory. 2014, Vol 60, Num 9, pp 5173-5187, issn 0018-9448, 15 p.Article
Artificial-Noise Alignment for Secure Multicast using Multiple AntennasKHISTI, Ashish; DONGYE ZHANG.IEEE communications letters. 2013, Vol 17, Num 8, pp 1568-1571, issn 1089-7798, 4 p.Article
Secure Transmission With Multiple Antennas Part II: The MIMOME Wiretap ChannelKHISTI, Ashish; WORNELL, Gregory W.IEEE transactions on information theory. 2010, Vol 56, Num 11, pp 5515-5532, issn 0018-9448, 18 p.Article
On Modulo-Sum Computation Over an Erasure Multiple-Access ChannelKHISTI, Ashish; HERN, Brett; NARAYANAN, Krishna et al.IEEE transactions on information theory. 2013, Vol 59, Num 7, pp 4129-4138, issn 0018-9448, 10 p.Article
Secret-Key Generation Using Correlated Sources and ChannelsKHISTI, Ashish; DIGGAVI, Suhas N; WORNELL, Gregory W et al.IEEE transactions on information theory. 2012, Vol 58, Num 2, pp 652-670, issn 0018-9448, 19 p.Article
Ergodic Secret Message Capacity of the Wiretap Channel with Finite-Rate FeedbackREZKI, Zouheir; KHISTI, Ashish; ALOUINI, Mohamed-Slim et al.IEEE transactions on wireless communications. 2014, Vol 13, Num 6, pp 3364-3379, issn 1536-1276, 16 p.Article
MIMO Broadcast Channel with an Unknown Eavesdropper: Secrecy Degrees of FreedomXIANG HE; KHISTI, Ashish; YENER, Aylin et al.IEEE transactions on communications. 2014, Vol 62, Num 1, pp 246-255, issn 0090-6778, 10 p.Article
MIMO Multiple Access Channel With an Arbitrarily Varying Eavesdropper: Secrecy Degrees of FreedomXIANG HE; KHISTI, Ashish; YENER, Aylin et al.IEEE transactions on information theory. 2013, Vol 59, Num 8, pp 4733-4745, issn 0018-9448, 13 p.Article
Fundamental limits and scaling behavior of cooperative multicasting in wireless networksKHISTI, Ashish; EREZ, Uri; WORNELL, Gregory W et al.IEEE transactions on information theory. 2006, Vol 52, Num 6, pp 2762-2770, issn 0018-9448, 9 p.Article
Zero-Delay Sequential Transmission of Markov Sources Over Burst Erasure ChannelsETEZADI, Farrokh; KHISTI, Ashish; TROTT, Mitchell et al.IEEE transactions on information theory. 2014, Vol 60, Num 8, pp 4584-4613, issn 0018-9448, 30 p.Conference Paper
QoE-Driven Cache Management for HTTP Adaptive Bit Rate Streaming Over Wireless NetworksWEIWEN ZHANG; YONGGANG WEN; ZHENZHONG CHEN et al.IEEE transactions on multimedia. 2013, Vol 15, Num 6, pp 1431-1445, issn 1520-9210, 15 p.Article
On the coding-spreading tradeoff and intra-cell frequency planning in uplink CDMA systemsKHISTI, Ashish; TROTT, Mitchell.IEEE Global Telecommunications Conference. 2004, pp 252-256, isbn 0-7803-8794-5, 5 p.Conference Paper
Writing on many pieces of dirty paper at once : The binary caseKHISTI, Ashish; EREZ, Uri; WORNELL, Gregory et al.IEEE International Symposium on Information Theory. 2004, isbn 0-7803-8280-3, 1Vol, p. 535Conference Paper
Carbon copying onto dirty paperKHISTI, Ashish; EREZ, Uri; LAPIDOTH, Amos et al.IEEE transactions on information theory. 2007, Vol 53, Num 5, pp 1814-1827, issn 0018-9448, 14 p.Article
Lattice Strategies for the Dirty Multiple Access ChannelPHILOSOF, Tal; ZAMIR, Ram; EREZ, Uri et al.IEEE transactions on information theory. 2011, Vol 57, Num 8, pp 5006-5035, issn 0018-9448, 30 p.Article
Opportunistic Cooperative Diversity with Feedback and Cheap RadiosBLETSAS, Aggelos; KHISTI, Ashish; WIN, Moe Z et al.IEEE transactions on wireless communications. 2008, Vol 7, Num 5, pp 1823-1827, issn 1536-1276, 5 p., 2Article
Interference Alignment for the Multiantenna Compound Wiretap ChannelKHISTI, Ashish.IEEE transactions on information theory. 2011, Vol 57, Num 5, pp 2976-2993, issn 0018-9448, 18 p.Article
Secure Broadcasting Over Fading ChannelsKHISTI, Ashish; TCHAMKERTEN, Asian; WOMELL, Gregory W et al.IEEE transactions on information theory. 2008, Vol 54, Num 6, pp 2453-2469, issn 0018-9448, 17 p.Article