Skip to main content
Secondary Menu
IEEE Home
IEEE Xplore Digital Library
IEEE Standards
IEEE Spectrum
More Sites
Search
Search
User account menu
Sign in
Main navigation
Publications
IEEE Transactions on Information Theory
IEEE Journal on Selected Areas in Information Theory
IEEE BITS the Information Theory Magazine
IEEE Information Theory Society Newsletter
Conferences
IEEE International Symposium on Information Theory
IEEE Information Theory Workshop
Schools of Information Theory
Calendar of Upcoming Events
Information for Organizers
Videos
Membership
About Us
Become a Member
Chapters
Distinguished Lecturer Program
Awards
Awards
Make a Nomination
IEEE Fellows
Golden Jubilee Awards
Chapter of the Year Award
Community
Board of Governors
Committees
BoG Meetings
BoG Meeting Minutes
Governing Documents
Society Administrator
Diversity & Inclusion
Outreach
Thomas: Teaching Resources
Volunteer
News
News
Job Board
Submit an Announcement
Subscribe to the Mailing List
Help
Search
Search
Search
Secondary Menu
IEEE Home
IEEE Xplore Digital Library
IEEE Standards
IEEE Spectrum
More Sites
Search
Search
User account menu
Sign in
Home
ITSOC search
Home
ITSOC search
We found 220 result.
Sort by
Relevance
Alphabetically
Date (newest first)
Apply
Part 2 of 3: Bitcoin and Blockchains
Part 1 of 8: Introduction to Information Theory and Network Coding
Part 2 of 8: Introduction to Information Theory and Network Coding
Active Methods: Learning as you go and as fast as you can - Part 3
Interview with the Shannon Awardee - David Tse
Signal Analysis Helping Art Historians and Conservators
Codes for Distributed Storage — Asking More of an Old Friend
From Constrained Signaling to Network Interference Alignment via an Information-Estimation Perspective
Coding for Noisy Networks
Digital Presence Committee, March 2022 BoG Report
Private Set Intersection
Part 3 of 3: Bitcoin and Blockchains
Part 6 of 8: Introduction to Information Theory and Network Coding
D&I October 2022 BoG Report
Building the Information Theory Society Together
What is a Markov chain?
The Beauty of Lempel-Ziv Compression
An Introduction to Quantum Computation
The generalization error of overparametrized models: Insights from exact asymptotics
Information in Small Bits - Chapter 1
Quantum Information's Birth, Growth, And Significance
Benign Overfitting
Information, Compression, Learning, Life
Broadcast Channels - What's New
Bias And Unfairness In Data From People: Challenges, Models, Solutions, And Open Problems
Short Packets over Wireless Fading Networks
Coding for Distributed Information Systems: Adversarial Sources and Approximated Decoding
Random Walk on High Dimensional Expanders (2/3)
Finite-Blocklength Schemes in Information Theory (3/3)
Locally-Testable and Locally-Decodable Codes (1/3)
Fundamental Trade-Offs between Privacy and Utility in Data Sharing (2/3)
ISIT2021 Promo Video January
Three Recent Examples of the Effectiveness of Convex Programming in the Information Sciences
Distance-Divergence Inequalities
High Dimensional Classification with Invariant Deep Networks
Musing upon Information Theory
Combinatorial Reasoning in Information Theory
Facets of Entropy
From Two to Infinity: Information Theory and Statistics for Large Alphabets
Efficient Decoding of Polar Codes - Algorithms and Implementations
Making Blockchains Scalable and Efficient - the Power of Codes
Spatially Coupled LDPC Codes - Theory and Applications
Deep learning and information theory: An Emerging Interface
The Classical Capacity of a Quantum Channel
From 3T to 5G: Theory and Practice of Cooperation in Wireless Networks
Morse Code
What is a bit?
Claude Shannon: A Mathematical Theory of Communication
Tree archeology: Root finding and broadcasting
Data Driven Algorithm Design
Information-directed Exploration in Bandits and Reinforcement Learning
Meet the Shannon Lecturer (Trailer) - Alon Orlitsky
Gone Fishin'
Coded Computing
Fundamentals Of Blockchain Systems
Universaility
With Purpose: Information Flow In The Era Of Hyperspecialization
A Graphical-Model-Based Approach To Quantum Information Processing
Recent Advances In Reinforcement Learning Theory
Introduction To The Information Theory Of Covert Communication
Unsourced Multiple Access (UMAC): Information Theory And Coding
Estimation and Hypothesis Testing under Information Constraints (Part 3/3)
Finite-Blocklength Schemes in Information Theory (1/3)
Finite-Blocklength Schemes in Information Theory (2/3)
Iterative Decoding of LDPC Codes and Channel Polarization
Polar Codes: Origins to 5G and Beyond - Part 1
Information Theoretic Foundations for Data Science - Part 2
Information bottlenecks in emerging distributed systems - Part 1
An Information Theoretic Perspective on Database and Graph Matching - Part 1
Information in Small Bits - Chapter 3
Schools 2023 June BoG Report
ISIT-2014: On The Mathematics of Distinguishable Difference
Concentration Inequalities and The Entropy Method
Completely Random Measures for Bayesian Nonparametrics
It’s Easier to Approximate
Source Coding and Simulation
Blockchains and Differential Privacy
Folded Codes and Streaming Codes
On Dynamics-Informed Blending of Machine Learning and Game Theory
Learning from Humans How to Improve Lossy Data Compression
Communication and Sensing: From Compressed Sampling to Model-based Deep Learning
On Weight Distribution of Polar Codes
Part 1 of 3: Bitcoin and Blockchains
Part 3 of 8: Introduction to Information Theory and Network Coding
Part 5 of 8: Introduction to Information Theory and Network Coding
Part 7 of 8: Introduction to Information Theory and Network Coding
Community-Aware Group Testing
Active Methods: Learning as you go and as fast as you can - Part 1
Active Methods: Learning as you go and as fast as you can - Part 2
Polar Codes: Origins to 5G and Beyond - Part 2
Information Theoretic Foundations for Data Science - Part 1
An Information Theoretic Perspective on Database and Graph Matching - Part 2
D&I March 2022 BoG Report
Meet the Shannon Lecturer Rüdiger Urbanke
Nanoscale Information Processing
What Do We Know About Matrix Estimation?
Codes, Metrics, and Applications
How space-time codes work (MIMO)
Hamming and low density parity check codes
Secret Sharing Explained Visually
Load More