This is a page with all possible (non-custom) blocks
Used to be "Covid-19 updates"
Awards
Aaron D. Wyner Distinguished Service Award
The Aaron D. Wyner Distinguished Service Award honors an individual who has shown outstanding leadership in, and provided long-standing, exceptional service to, the Information Theory community.
Claude E. Shannon Award
The Claude E. Shannon Award is the highest honor from the IEEE Information Theory Society. The award has been instituted to honor consistent and profound contributions to the field of information theory.
Communications Society & Information Theory Society Joint Paper Award
The Communications Society & Information Theory Society Joint Paper Award recognizes outstanding papers that lie at the intersection of communications and information theory.
Goldsmith Lecturer
The Goldsmith Lecturer Program was established with a generous gift of Dr. Andrea Goldsmith in 2019. The Goldsmith Lecture will be delivered by an early-career woman researcher at one of the ITSoc’s Schools of Information Theory, held for the benefit of students and postdoctoral researchers.
Information Theory Society Paper Award
The Information Theory Society Paper Award is given annually for an outstanding publication in the fields of interest to the Society appearing anywhere during the preceding four calendar years.
Jack Keil Wolf ISIT Student Paper Award
The IEEE Jack Keil Wolf ISIT Student Paper Award is given to up to 3 outstanding papers for which a student is the principal author and presenter.
James L. Massey Research & Teaching Award for Young Scholars
The James L. Massey Research & Teaching Award for Young Scholars recognizes outstanding achievement in research and teaching by young scholars in the Information Theory community.
Padovani Lecturer
The Padovani Lecturer Program was established with a generous gift of Dr. Roberto Padovani in 2009. The Padovani Lecture will be delivered by an outstanding member of the Information Theory community at one of the ITSoc’s Schools of Information Theory, held for the benefit of students and postdoctoral researchers.
Thomas M. Cover Dissertation Award
The IEEE Information Theory Society Thomas M. Cover Dissertation Award is awarded annually to the author of an outstanding doctoral dissertation contributing to the mathematical foundations of any of the information sciences within the purview of the Society.
Awards
Distinguished Lecturers
The Distinguished Lecturers program promotes interest in information theory by supporting chapters who wish to invite prominent information theory researchers to give talks at their events.
Conferences
Jobs Board
Test create jobs es
University of texas
Lorem ipsum.... This excerpt is the tweet for social media. The title is not included in the tweet.
Nov 30, 2023
Postdoctoral Researcher Position on Information Theory and Codings
Bilkent University New
Immediate openings for postdocs on insertion/deletion channels and DNA storage at Bilkent…
Mar 3, 2023
Postdoc Positions in Wireless Communications
University of Hawaii
Department of Electrical and Computer Engineering at University of Hawaii is looking for two…
Feb 22, 2023
News
Test News Ex
This excerpt is the tweet for social media. The title is not included in the tweet.
Nov 30, 2023
some random new tests
Mar 27, 2023
Robert Calderbank - USC Viterbi Lecture, Thursday March 2, 2023
Robert Calderbank of Duke University will give the 2023 USC Viterbi Lecture on Thursday, March 2,…
Feb 28, 2023
Submission Deadline Approaching: JSAIT Issue on Role of Freshness and Semantic Measures
Call for Papers for JSAIT Issue on the Role of Freshness and Semantic Measures in the Transmission…
Feb 17, 2023
News
Board of Governors Election
Voting is open for the BoG Election.
Aug 28, 2012
Deadline Extended - IEEE Signal Processing Magazine, Special Issue on Cyber-security and Privacy
The submission date for the white paper for IEEE SPM special issue on cyber-security and privacy has been extended to Tuesday September 4, 2012
Aug 28, 2012
September 2012 Issue of the Newsletter
Annual IT awards announced. Summary of 2011 Shannon Lecture. President's Column. BOG meeting minutes. Historian and Puzzle Columns.
Aug 27, 2012
September 2012 Issue of the Newsletter
Annual IT Awards Announced. Summary of 2011 Shannon Lecture. President's Column. IT BOG Minutes.
Aug 26, 2012
Memorial for Thomas Cover at Stanford University on Friday, October 12, 2012
The Departments of Electrical Engineering and Statistics are planning a memorial gathering to celebrate Tom Cover's life.
Aug 14, 2012
Call for Papers - Signal Processing Magazine
Special Issue on on Signal Processing for Cyber‐security and Privacy
Aug 1, 2012
Transactions on Information Theory: Policy regarding reviewing
The Board of Governors of the IEEE Information Theory Society passed a resolution regarding reviewing duties for the Transactions at its July 1, 2012, meeting.
Jul 13, 2012
Creation of the Thomas M. Cover Dissertation Award
The creation of the Thomas M. Cover Dissertation Award was announced during the awards luncheon at ISIT.
Jul 11, 2012
2012 IEEE Medals and 2012 IEEE Fellows
Several members of the Information Theory community have been awarded IEEE Medals and promoted to IEEE Fellows.
Jul 11, 2012
2012 Aaron D. Wyner Distinguished Service Award
Ezio Biglieri has been selected as the recipient of the 2012 Aaron D. Wyner Distinguished Service Award.
Jul 11, 2012
2013 Claude E. Shannon Award
Katalin Marton has been selected as the recipient of the 2013 Information Theory Society Claude E. Shannon award.
Jul 9, 2012
2012 ISIT Student Paper Awards
Three papers received the Student Paper Award at ISIT 2012, Cambridge, MA
Jul 7, 2012
Tom Cover Memorial Session at ISIT
A memorial session will be organized at the IEEE International Symposium on Information Theory, Massachusetts Institute of Technology, Kresge Auditorium on Monday, July 2, 2012 from 8pm to 9:30pm .
Jun 17, 2012
2012 IEEE Communications Society and Information Theory Society Joint Paper Award
The 2012 IEEE Communications Society and Information Theory Society Joint Paper Award has been awarded.
Jun 12, 2012
IT Society Mentoring Network, Call For Participation
Would you be interested in becoming a mentor or mentee in the IT
society's mentoring network?
Jun 7, 2012
Lecturer (Assistant Professor) position at University of Cambridge, UK
The Department of Engineering at the University of Cambridge is looking to appoint a University Lecturer (Assistant Professor) at the intersection of Digital Communications and Signal Processing, including Information Theory.
May 30, 2012
Call for Nominations - 2013 Marconi Prize
The Marconi Society, the premier organization recognizing the achievements of living scientists in the field of communications science and the Internet, is seeking nominations for its
2013 Marconi Prize, given to individuals who have made a significant contribution to the advancement of communications for the benefit of mankind through scientific or technological discoveries or innovations.
May 11, 2012
Research Fellows in Wireless Communications
Two research fellow positions in wireless communications open at Macquarie University, Sydney Australia. Candidates with active research profiles in wireless communications, with strong backgrounds in communications theory, are encouraged to apply. Research fellows will work with Stephen Hanly and his group. Closing date: June 1, 2012.
May 5, 2012
Pagination
Past meeting
Test meeting
Displayed on listing pages and announcements.
Test meeting
Displayed on listing pages and announcements.
Test meeting
Displayed on listing pages and announcements.
Test Meeting
Lorem Ipsum .... Displayed on listing pages and announcements.
BOG Meeting - Hybrid Meeting @ ITA 2023, San Diego, California
This will be a hybrid meeting in person and on zoom in conjunction with ITA 2023.
BOG Meeting - October 2022 - 2023 test
This will be a virtual meeting on zoom. BoG members and approved presenters will receive an invite to the meeting.
BOG Meeting - Hybrid Meeting @ ISIT 2022, Espoo, Finland
This will be a hybrid meeting in person and on zoom in conjunction with ISIT 2022.
BOG Meeting - March 2022
This will be a virtual meeting on zoom. BoG members and approved presenters will receive an invite to the meeting.
BOG Meeting - November 2021
This will be a virtual meeting on zoom. BoG members and approved presenters will receive an invite to the meeting.
BOG Meeting - June 2021
The second BOG meeting of 2021 will be held virtually on zoom. BOG members and approved presenters will receive an invite to the meeting.
BOG Meeting - March 2021
This will be a virtual meeting on zoom. BoG members and approved presenters will have received an invite to the meeting.
BOG Meeting @ New Brunswick, NJ - 2019
The third BoG Meeting of 2019 will take place at Rutgers University, New Brunswick, NJ.
BoG Meeting @ Chicago, IL 2015
Meeting will be held right after Allerton
BoG Meeting @ ISIT 2015, Hong Kong
Annual Meeting of the Information Theory Society
BoG Meeting - GlobalMeet
The BoG Meeting will be held via GlobalMeet on Saturday, September 20 (7:00 AM Pacific Time).
BoG Meeting @ ITA 2014, San Diego, CA
First BoG meeting of 2014
BoG Meeting @ ITA 2013, San Diego, CA
First BoG meeting of 2013
BoG meeting @ ITW 2012, Lausanne
Last BoG meeting of 2012.
BoG meeting @ ISIT 2012, Cambridge, MA
BoG meeting July 2012.
IT BoG meeting @ ITA 2012, UCSD
Meeting of the Board of Governors
BoG Meeting @ ITW 2011, Paraty, Brazil
The third BoG meeting of 2011 will take place on ***Monday*** October 17, in Paraty Brazil, in conjunction with ITW 2011, starting at about 6:00pm with a buffet dinner at the restaurant Banana de Terra (one block away from the conference center).
BoG Meeting @ ISIT 2011, St. Petersburg, Russia
The annual BoG meeting will take place on Sunday July 31, at the ISIT 2011 conference hotel, starting at 12:00 noon **sharp** with a buffet lunch. The meeting room is "Green 6+7" and will be clearly indicated at the registration desk, operational from Sunday July 31, morning. Please follow the signs and/or ask the registration desk in order to get to the lunch and meeting.
BoG Meeting, ISIT 2010
Annual meeting of the IEEE Information Theory Society Board of Governors. All are welcome to attend. Some portions of the meeting will be conducted in camera. The formal part of the meeting will commence at 12:45pm.
BoG Meeting, La Jolla, CA, 2010
First Board of Governors' meeting of 2010.
BoG Meeting, ITW Taormina 2009
The final BoG meeting of 2009. Dinner will be served at 6:30 and the meeting will start shortly thereafter. Everyone is welcome to attend. Meeting will be held in the Saletta Belvedere room of the Villa Diodoro (workshop hotel).
BoG Meeting, ISIT 2009
Annual meeting of the Information Theory Society BOGs. Everyone is welcome to attend all or part of the meeting. The meeting will be preceeded by lunch at 12:15, with the formal meeting starting at 1pm, ending at 5:30pm.
Research In Information Theory
Selected papers on information theory from our journals and conferences
IEEE JSAIT on the Information Theory Magazine
Shannon Bounds for Quadratic Rate-Distortion Problems
The Shannon lower bound has been the subject of several important contributions by Berger. This paper surveys Shannon bounds on rate-distortion problems under mean-squared error distortion with a particular emphasis on Berger’s techniques. Moreover, as a new result, the Gray-Wyner network is added to the canon of settings for which such bounds are known. In the Shannon bounding technique, elegant lower bounds are expressed in terms of the source entropy power.
IEEE JSAIT on the Information Theory Magazine
Computation of Binary Arithmetic Sum Over an Asymmetric Diamond Network
In this paper, the problem of zero-error network function computation is considered, where in a directed acyclic network, a single sink node is required to compute with zero error a function of the source messages that are separately generated by multiple source nodes. From the information-theoretic point of view, we are interested in the fundamental computing capacity, which is defined as the average number of times that the function can be computed with zero error for one use of the network.
IEEE JSAIT on the Information Theory Magazine
Low-Complexity Coding Techniques for Cloud Radio Access Networks
The problem of coding for the uplink and downlink of cloud radio access networks (C-RAN’s) with K users and L relays is considered. It is shown that low-complexity coding schemes that achieve any point in the rate-fronthaul region of joint coding and compression can be constructed starting from at most 4(K+L)-2 point-to-point codes designed for symmetric channels. This reduces the seemingly hard task of constructing good codes for C-RAN’s to the much better understood task of finding good codes for single-user channels.
IEEE JSAIT on the Information Theory Magazine
Erratum to “LightVeriFL: A Lightweight and Verifiable Secure Aggregation for Federated Learning”
This article addresses errors in [1]. Equation (2) contained an error wherein x was not bold. It is corrected below.
IEEE JSAIT on the Information Theory Magazine
JPEG Compliant Compression for DNN Vision
Conventional image compression techniques are primarily developed for the human visual system. However, with the extensive use of deep neural networks (DNNs) for computer vision, more and more images will be consumed by DNN-based intelligent machines, which makes it crucial to develop image compression techniques customized for DNN vision while being JPEG compliant. In this paper, we revisit the JPEG rate distortion theory for DNN vision. First, we propose a novel distortion measure, dubbed the sensitivity weighted error (SWE), for DNN vision.
IEEE JSAIT on the Information Theory Magazine
Throughput and Latency Analysis for Line Networks With Outage Links
Wireless communication links suffer from outage events caused by fading and interference. To facilitate a tractable analysis of network communication throughput and latency, we propose an outage link model to represent a communication link in the slow fading phenomenon. For a line-topology network with outage links, we study three types of intermediate network node schemes: random linear network coding, store-and-forward, and hop-by-hop retransmission. We provide the analytical formulas for the maximum throughputs and the end-to-end latency for each scheme.
IEEE JSAIT on the Information Theory Magazine
Addressing GAN Training Instabilities via Tunable Classification Losses
Generative adversarial networks (GANs), modeled as a zero-sum game between a generator (G) and a discriminator (D), allow generating synthetic data with formal guarantees. Noting that D is a classifier, we begin by reformulating the GAN value function using class probability estimation (CPE) losses. We prove a two-way correspondence between CPE loss GANs and f-GANs which minimize f-divergences. We also show that all symmetric f-divergences are equivalent in convergence.
IEEE JSAIT on the Information Theory Magazine
Information Velocity of Cascaded Gaussian Channels With Feedback
We consider a line network of nodes, connected by additive white noise channels, equipped with local feedback. We study the velocity at which information spreads over this network. For transmission of a data packet, we give an explicit positive lower bound on the velocity, for any packet size. Furthermore, we consider streaming, that is, transmission of data packets generated at a given average arrival rate. We show that a positive velocity exists as long as the arrival rate is below the individual Gaussian channel capacity, and provide an explicit lower bound.
IEEE JSAIT on the Information Theory Magazine
Long-Term Fairness in Sequential Multi-Agent Selection with Positive Reinforcement
While much of the rapidly growing literature on fair decision-making focuses on metrics for one-shot decisions, recent work has raised the intriguing possibility of designing sequential decision-making to positively impact long-term social fairness. In selection processes such as college admissions or hiring, biasing slightly towards applicants from under-represented groups is hypothesized to provide positive feedback that increases the pool of under-represented applicants in future selection rounds, thus enhancing fairness in the long term.
IEEE JSAIT on the Information Theory Magazine
Controlled privacy leakage propagation throughout overlapping grouped learning
Federated Learning (FL) is the standard protocol for collaborative learning. In FL, multiple workers jointly train a shared model. They exchange model updates calculated on their data, while keeping the raw data itself local. Since workers naturally form groups based on common interests and privacy policies, we are motivated to extend standard FL to reflect a setting with multiple, potentially overlapping groups.
Videos on Information Theory
Find tutorials, lectures, keynotes and technical presentations on information theory