Wednesday, May 7, 2014 |
|
---|---|
Location: Central Auditorium | |
Opening Ceremony | 08:30-09:00 |
Gerhard Kramer (Keynote Speaker)
Title: Network Coding and Edge-Cut Bounds for Line Networks |
09:00-10:00 |
Break | 10:00-10:15 |
Robert Schober (Keynote speaker)
Title: How much can we gain by exploiting buffers in wireless relay networks? |
10:15-11:15 |
Break | 11:15-11:30 |
Young-Han Kim (Invited Talk)
Title: Index Coding Via Random Coding |
11:30-12:05 |
Deniz Gunduz (Invited Talk)
Title: Zero-Delay Joint Source-Channel Coding |
12:05-12:40 |
Lunch | 12:40-14:00 |
Location: Kahrouba Hall | |
Tara Javidi (Invited Talk)
Title: Information Acquisition, Controlled Sensing, and Active Hypothesis Testing |
14:00-14:35 |
Salman Beigi (Invited Talk)
Title: Maximal Entanglement - A New Measure of Entanglement |
14:35-15:10 |
Break | 15:10-15:30 |
Sessions 1-2, Location: Kahrouba Hall/Bargh 4, EE Dept. | |
S1. Shannon Theory (I), Kahrouba Hall | 15:30-17:10 |
S2. Communication Theory, Bargh 4 | 15:30-17:10 |
Break and visit of some departmental labs | |
Banquet |
Thursday , May 8, 2014 |
|
---|---|
Location: Central Auditorium | |
David Tse (Keynote speaker)
Title: Information Theory for High Throughput Sequencing |
09:00-10:00 |
Break | 10:00-10:15 |
Behnaam Aazhang (Keynote speaker)
Title: Real-Time Network Modulation for Intractable Epilepsy |
10:15-11:15 |
Break | 11:15-11:30 |
Masoumeh Nasiri-Kenari (Invited Talk)
Title: Diffusion Based Molecular Communication: Efficient Modulator and Simple near Optimal Receiver |
11:30-12:05 |
Melda Yuksel (Invited Talk)
Title: Maximum-Weight Scheduling with Hierarchical Modulation |
12:05-12:40 |
Lunch | 12:40-14:00 |
Sessions 3-6, Location: Kahrouba Hall/Bargh 4, EE Dept. | |
S3. Shannon Theory (II), Bargh 4 | 14:00-15:20 |
S4. Coding and Communication Theory, Kahrouba Hall | 14:00-15:20 |
Break | 15:20-15:40 |
S5. Shannon Theory (III), Kahrouba Hall | 15:40-17:00 |
S6. Applications of Information Theory, Bargh 4 | 15:40-16:40 |
Closing Ceremony |
Sessions |
|
---|---|
S1. Shannon Theory (I) | |
Colluding Eavesdroppers in Large Cooperative Wireless Networks
Mahtab Mirmohseni and Panagiotis (Panos) Papadimitratos |
15:30-15:50 |
An Application of a Wringing Lemma to the Multiple Access Channel with Cooperative Encoders Shirin Saeedi Bidokhti and Gerhard Kramer |
15:50-16:10 |
Convexity of Fisher Information with Respect to Gaussian Perturbation
Fan Cheng and Yanlin Geng |
16:10-16:30 |
From Source Model to Quantum Key Distillation: An Improved Upper Bound
Kamran Keykhosravi, Majid Mahzoon, Amin Gohari and Mohammad Reza Aref |
16:30-16:50 |
Wiretap Channel with Strictly Causal Side Information At Encoder
Amir Sonee and Ghosheh Abed Hodtani |
16:50-17:10 |
S2. Communication Theory | |
Resource Allocation Using Fragmented-Spectrum Synchronous OFDM-CDMA in Cognitive Radio Networks Farhad Akhoundi, Jawad Salehi and Omid Poursaeed |
15:30-15:50 |
On the Implemetation Aspects of Adaptive Power Control Algorithms in Free-Space Optical Communications Navid Bani Hassan and Mehdi Matinfar |
15:50-16:10 |
Outage Analysis of Uplink Open Access Two-tier Networks
Zolfa Zeinalpour and Shirin Jalali |
16:10-16:30 |
Optimizing Sensing Duration for Multiple Secondary Users in Cognitive Radio Networks Ashkan Esmaeili and Saeed Mashhadi |
16:30-16:50 |
Spectrum Leasing with Disjoint Secondary User Selection in Cognitive Radio Networks Ali R. Haqiqatnejad, Kamal Shahtalebi and Amir R. Forouzan |
16:50-17:10 |
S3. Shannon Theory (II) | |
Stabilization of Noisy Plants Over a Gaussian Interference Channel
Ali A. Zaidi, Tobias J. Oechtering and Mikael Skoglund |
14:00-14:20 |
A Game-Theoretic Approach Based on Pricing Scheme on the Two-User Gaussian Interference Channel Atena Ebrahim Khani and Babak Seyfe |
14:20-14:40 |
Two-way Writing on Dirty Paper in the Presence of Noise-dependent Interference Narges Monemizadeh, Mostafa Monemizadeh and Ghosheh Abed Hodtani |
14:40-15:00 |
Nested Lattice Codes for the State-Dependent Gaussian Interference Channel with A Common Message Shahab Ghasemi-Goojani and Hamid Behroozi |
15:00-15:20 |
S4. Coding and Communication Theory | |
Phase Retrieval of Sparse L-ary Signals From Magnitudes of Their Fourier Transform Mohsen Shabanian Borujeni; Farzad Parvaresh |
14:00-14:20 |
Compute-and-Forward for the Interference Channel: Diversity Precoding
Ehsan Ebrahimi Khaleghi and Jean-Claude Belfiore |
14:20-14:40 |
Reduction of Encoding Delay in Compression of Binary Sources Using Turbo Codes: A Two-Stage Algorithm Javad Haghighat; Fabrice Labeau; David Plant |
14:40-15:00 |
A Note on the Redundancy of Reversible Variable Length Codes
Sayed Jalal Zahabi and Mohammadali Khosravifard |
15:00-15:20 |
S5. Shannon Theory (III) | |
The Generalized MAC with Partial State and Message Cooperation
Mohammad Javad Emadi, Majid Nasiri Khormuji, Mikael Skoglund and Mohammad Reza Aref |
15:40-16:00 |
Random Coding Bound for E-capacity Region of the Relay Channel with Confidential Messages Nasrin Afshar, Bahareh Akhbari and Mohammad Reza Aref |
16:00-16:20 |
Maximizing the Minimum Achievable Secrecy Rate in a Two-User Gaussian Interference Channel Meysam Mirzaee; Soroush Akhlaghi |
16:20-16:40 |
An Achievable Scheme for the One-Receiver, Two-Eavesdropper Broadcast Channel Sadaf Salehkalaibar; Mohammad Reza Aref |
16:40-17:00 |
S6. Applications of Information Theory | |
Improving the Capacity of Cooperative SC-FDMA Systems with Frequency Domain Equalization Ali Karimi and Maryam Sabbaghian |
15:40-16:00 |
Bounds on Compressed Voice Channel Capacity
Mehdi Boloursaz, Reza Kazemi, Babak Barazandeh and Ferydon Behnia |
16:00-16:20 |
Finite-SNR Diversity-Multiplexing Tradeoff of Linear Dispersion Coded MISO Systems Ali Kuhestani and Abbas Mohammadi |
16:20-16:40 |