
Practical implementation of identification codes
Identification is a communication paradigm that promises some exponentia...
read it

Deterministic Identification Over Poisson Channels
Deterministic identification (DI) for the discretetime Poisson channel,...
read it

The Computational and Latency Advantage of Quantum Communication Networks
This article summarises the current status of classical communication ne...
read it

Outage Common Randomness Capacity Characterization of MultipleAntenna Slow Fading Channels
We investigate the problem of common randomness (CR) generation from dis...
read it

Welfare Measure for Resource Allocation with Algorithmic Implementation: Beyond Average and MaxMin
In this work, we propose an axiomatic approach for measuring the perform...
read it

On the SemiDecidability of Remote State Estimation and Stabilization via Noisy Communication Channels
We consider the task of remote state estimation and stabilization of dis...
read it

Identification over the Gaussian Channel in the Presence of Feedback
We analyze message identification via Gaussian channels with noiseless f...
read it

Common Randomness Generation over Slow Fading Channels
This paper analyzes the problem of common randomness (CR) generation fro...
read it

Mosaics of combinatorial designs for informationtheoretic security
We study security functions which can serve to establish semantic securi...
read it

Computability of the Channel Reliability Function and Related Bounds
The channel reliability function is an important tool that characterizes...
read it

Quantum Broadcast Channels with Cooperating Decoders: An InformationTheoretic Perspective on Quantum Repeaters
Communication over a quantum broadcast channel with cooperation between ...
read it

On Information Asymmetry in Competitive MultiAgent Reinforcement Learning: Convergence and Optimality
In this work, we study the system of interacting noncooperative two Ql...
read it

Coordinated Online Learning for MultiAgent Systems with Coupled Constraints and Perturbed Utility Observations
Competitive noncooperative online decisionmaking agents whose actions ...
read it

On the Effectiveness of Fekete's Lemma
Fekete's lemma is a well known combinatorial result pertaining to number...
read it

Deterministic Identification Over Fading Channels
Deterministic identification (DI) is addressed for Gaussian channels wit...
read it

Computability of the ZeroError Capacity of Noisy Channels
Zeroerror capacity plays an important role in a whole range of operatio...
read it

Deterministic Identification Over Channels with Power Constraints
Identification capacity is developed without randomization at neither th...
read it

Shannon Meets Turing: NonComputability and NonApproximability of the Finite State Channel Capacity
The capacity of finite state channels (FSCs) has been established as the...
read it

Quantum Channel State Masking
Communication over a quantum channel that depends on a quantum state is ...
read it

ResourceAware Control via Dynamic Pricing for Congestion Game with FiniteTime Guarantees
Congestion game is a widely used model for modern networked applications...
read it

Computability of the ZeroError capacity with Kolmogorov Oracle
The zeroerror capacity of a discrete classical channel was first define...
read it

Semantic Security for Quantum Wiretap Channels
We determine the semantic security capacity for quantum wiretap channels...
read it

Arbitrarily Varying Wiretap Channels with NonCausal Side Information at the Jammer
We investigate the Arbitrarily Varying Wiretap Channel (AVWC) with nonc...
read it

Universal superposition codes: capacity regions of compound quantum broadcast channel with confidential messages
We derive universal codes for transmission of broadcast and confidential...
read it

Pricing Mechanism for Resource Sustainability in Competitive Online Learning MultiAgent Systems
In this paper, we consider the problem of resource congestion control fo...
read it

Robust Online Learning for Resource Allocation – Beyond Euclidean Projection and Dynamic Fit
Onlinelearning literature has focused on designing algorithms that ensu...
read it

SemiDecentralized Coordinated Online Learning for Continuous Games with Coupled Constraints via Augmented Lagrangian
We consider a class of concave continuous games in which the correspondi...
read it

Message transmission over classical quantum channels with a Jammer with side information; correlation as resource and common randomness generating
In this paper we analyze the capacity of a general model for arbitrarily...
read it

The Simultaneous Identification Capacity of the ClassicalQuantum Multiple Access Channel
Here we discuss message identification, a problem formalized by Rudolf A...
read it

Semantic Security and the SecondLargest Eigenvalue of Biregular Graphs
It is investigated how to achieve semantic security for the wiretap chan...
read it

Simultaneous transmission of classical and quantum information under channel uncertainty and jamming attacks
We derive universal codes for simultaneous transmission of classical mes...
read it

UltraReliable Communication over Arbitrarily Varying Channels under BlockRestricted Jamming
UltraReliable Communication (URC) is examined in an informationtheoret...
read it

Message Transmission over Classical Quantum Channels with a Jammer with Side Information: Message Transmission Capacity and Resources
In this paper we propose a new model for arbitrarily varying classicalq...
read it

Secure and Robust Identification via ClassicalQuantum Channels
We study the identification capacity of classicalquantum channels ("cq...
read it

Fully Quantum Arbitrarily Varying Channels: Random Coding Capacity and Capacity Dichotomy
We consider a model of communication via a fully quantum jammer channel ...
read it

Universal random codes: Capacity regions of the compound quantum multipleaccess channel with one classical and one quantum sender
We consider the compound memoryless quantum multipleaccess channel (QMA...
read it

Secret Message Transmission over Quantum Channels under Adversarial Quantum Noise: Secrecy Capacity and SuperActivation
We determine the secrecy capacities of arbitrarily varying quantum chann...
read it
Holger Boche
is this you? claim profile