We introduce the problem of determining the identity of a byzantine user...
We study a secret sharing problem with three secrets where the secrets a...
We study the Chernoff-Stein exponent of the following binary hypothesis
...
We study communication over a Multiple Access Channel (MAC) where users ...
We study communication with consensus over a broadcast channel - the
rec...
We propose a communication model, that we call compound arbitrarily vary...
We introduce the problem of determining the identity of a byzantine user...
We study the problem of simulating a two-user multiple access channel ov...
We study the fundamental problem of index coding under an additional pri...
We study private two-terminal hypothesis testing with simple hypotheses ...
We consider a two-user secure computation problem in which Alice and Bob...
We study a distributed sampling problem where a set of processors want t...
We study communication over multiple access channels (MAC) where one of ...
We consider interactive computation of randomized functions between two ...
A hybrid communication network with a common analog signal and an indepe...
We study a lossy source coding problem for an arbitrarily varying remote...
Two processors output correlated sequences using the help of a coordinat...