Wednesday, May 7, 2014 |
|
|---|---|
| Location: Central Auditorium | |
| Opening Ceremony | 08:30-09:00 |
| Gerhard Kramer (Keynote Speaker)
Title: Network Coding and Edge-Cut Bounds for Line Networks |
09:00-10:00 |
| Break | 10:00-10:15 |
| Robert Schober (Keynote speaker)
Title: How much can we gain by exploiting buffers in wireless relay networks? |
10:15-11:15 |
| Break | 11:15-11:30 |
| Young-Han Kim (Invited Talk)
Title: Index Coding Via Random Coding |
11:30-12:05 |
| Deniz Gunduz (Invited Talk)
Title: Zero-Delay Joint Source-Channel Coding |
12:05-12:40 |
| Lunch | 12:40-14:00 |
| Location: Kahrouba Hall | |
| Tara Javidi (Invited Talk)
Title: Information Acquisition, Controlled Sensing, and Active Hypothesis Testing |
14:00-14:35 |
| Salman Beigi (Invited Talk)
Title: Maximal Entanglement - A New Measure of Entanglement |
14:35-15:10 |
| Break | 15:10-15:30 |
| Sessions 1-2, Location: Kahrouba Hall/Bargh 4, EE Dept. | |
| S1. Shannon Theory (I), Kahrouba Hall | 15:30-17:10 |
| S2. Communication Theory, Bargh 4 | 15:30-17:10 |
| Break and visit of some departmental labs | |
| Banquet | |
Thursday , May 8, 2014 |
|
|---|---|
| Location: Central Auditorium | |
| David Tse (Keynote speaker)
Title: Information Theory for High Throughput Sequencing |
09:00-10:00 |
| Break | 10:00-10:15 |
| Behnaam Aazhang (Keynote speaker)
Title: Real-Time Network Modulation for Intractable Epilepsy |
10:15-11:15 |
| Break | 11:15-11:30 |
| Masoumeh Nasiri-Kenari (Invited Talk)
Title: Diffusion Based Molecular Communication: Efficient Modulator and Simple near Optimal Receiver |
11:30-12:05 |
| Melda Yuksel (Invited Talk)
Title: Maximum-Weight Scheduling with Hierarchical Modulation |
12:05-12:40 |
| Lunch | 12:40-14:00 |
| Sessions 3-6, Location: Kahrouba Hall/Bargh 4, EE Dept. | |
| S3. Shannon Theory (II), Bargh 4 | 14:00-15:20 |
| S4. Coding and Communication Theory, Kahrouba Hall | 14:00-15:20 |
| Break | 15:20-15:40 |
| S5. Shannon Theory (III), Kahrouba Hall | 15:40-17:00 |
| S6. Applications of Information Theory, Bargh 4 | 15:40-16:40 |
| Closing Ceremony | |
Sessions |
|
|---|---|
| S1. Shannon Theory (I) | |
| Colluding Eavesdroppers in Large Cooperative Wireless Networks
Mahtab Mirmohseni and Panagiotis (Panos) Papadimitratos |
15:30-15:50 |
| An Application of a Wringing Lemma to the Multiple Access Channel with Cooperative Encoders Shirin Saeedi Bidokhti and Gerhard Kramer |
15:50-16:10 |
| Convexity of Fisher Information with Respect to Gaussian Perturbation
Fan Cheng and Yanlin Geng |
16:10-16:30 |
| From Source Model to Quantum Key Distillation: An Improved Upper Bound
Kamran Keykhosravi, Majid Mahzoon, Amin Gohari and Mohammad Reza Aref |
16:30-16:50 |
| Wiretap Channel with Strictly Causal Side Information At Encoder
Amir Sonee and Ghosheh Abed Hodtani |
16:50-17:10 |
| S2. Communication Theory | |
| Resource Allocation Using Fragmented-Spectrum Synchronous OFDM-CDMA in Cognitive Radio Networks Farhad Akhoundi, Jawad Salehi and Omid Poursaeed |
15:30-15:50 |
| On the Implemetation Aspects of Adaptive Power Control Algorithms in Free-Space Optical Communications Navid Bani Hassan and Mehdi Matinfar |
15:50-16:10 |
| Outage Analysis of Uplink Open Access Two-tier Networks
Zolfa Zeinalpour and Shirin Jalali |
16:10-16:30 |
| Optimizing Sensing Duration for Multiple Secondary Users in Cognitive Radio Networks Ashkan Esmaeili and Saeed Mashhadi |
16:30-16:50 |
| Spectrum Leasing with Disjoint Secondary User Selection in Cognitive Radio Networks Ali R. Haqiqatnejad, Kamal Shahtalebi and Amir R. Forouzan |
16:50-17:10 |
| S3. Shannon Theory (II) | |
| Stabilization of Noisy Plants Over a Gaussian Interference Channel
Ali A. Zaidi, Tobias J. Oechtering and Mikael Skoglund |
14:00-14:20 |
| A Game-Theoretic Approach Based on Pricing Scheme on the Two-User Gaussian Interference Channel Atena Ebrahim Khani and Babak Seyfe |
14:20-14:40 |
| Two-way Writing on Dirty Paper in the Presence of Noise-dependent Interference Narges Monemizadeh, Mostafa Monemizadeh and Ghosheh Abed Hodtani |
14:40-15:00 |
| Nested Lattice Codes for the State-Dependent Gaussian Interference Channel with A Common Message Shahab Ghasemi-Goojani and Hamid Behroozi |
15:00-15:20 |
| S4. Coding and Communication Theory | |
| Phase Retrieval of Sparse L-ary Signals From Magnitudes of Their Fourier Transform Mohsen Shabanian Borujeni; Farzad Parvaresh |
14:00-14:20 |
| Compute-and-Forward for the Interference Channel: Diversity Precoding
Ehsan Ebrahimi Khaleghi and Jean-Claude Belfiore |
14:20-14:40 |
| Reduction of Encoding Delay in Compression of Binary Sources Using Turbo Codes: A Two-Stage Algorithm Javad Haghighat; Fabrice Labeau; David Plant |
14:40-15:00 |
| A Note on the Redundancy of Reversible Variable Length Codes
Sayed Jalal Zahabi and Mohammadali Khosravifard |
15:00-15:20 |
| S5. Shannon Theory (III) | |
| The Generalized MAC with Partial State and Message Cooperation
Mohammad Javad Emadi, Majid Nasiri Khormuji, Mikael Skoglund and Mohammad Reza Aref |
15:40-16:00 |
| Random Coding Bound for E-capacity Region of the Relay Channel with Confidential Messages Nasrin Afshar, Bahareh Akhbari and Mohammad Reza Aref |
16:00-16:20 |
| Maximizing the Minimum Achievable Secrecy Rate in a Two-User Gaussian Interference Channel Meysam Mirzaee; Soroush Akhlaghi |
16:20-16:40 |
| An Achievable Scheme for the One-Receiver, Two-Eavesdropper Broadcast Channel Sadaf Salehkalaibar; Mohammad Reza Aref |
16:40-17:00 |
| S6. Applications of Information Theory | |
| Improving the Capacity of Cooperative SC-FDMA Systems with Frequency Domain Equalization Ali Karimi and Maryam Sabbaghian |
15:40-16:00 |
| Bounds on Compressed Voice Channel Capacity
Mehdi Boloursaz, Reza Kazemi, Babak Barazandeh and Ferydon Behnia |
16:00-16:20 |
| Finite-SNR Diversity-Multiplexing Tradeoff of Linear Dispersion Coded MISO Systems Ali Kuhestani and Abbas Mohammadi |
16:20-16:40 |
