default search action
Sidharth Jaggi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j26]Qiaosheng Eric Zhang, Swanand Kadhe, Mayank Bakshi, Sidharth Jaggi, Alex Sprintson:
Optimal Information Security Against Limited-View Adversaries: Beyond MDS Codes. IEEE Trans. Commun. 71(12): 7206-7217 (2023) - [j25]Xiwei Cheng, Sidharth Jaggi, Qiaoqiao Zhou:
Generalized Group Testing. IEEE Trans. Inf. Theory 69(3): 1413-1451 (2023) - [c83]Sijie Li, Prasad Krishnan, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate:
Computationally Efficient Codes for Adversarial Binary-Erasure Channels. ISIT 2023: 228-233 - [i62]Hang Su, Borislav Dzodzo, Changlun Li, Danyang Zhao, Hao Geng, Yunxiang Li, Sidharth Jaggi, Helen Meng:
Learning Analytics from Spoken Discussion Dialogs in Flipped Classroom. CoRR abs/2301.12399 (2023) - 2022
- [j24]Yihan Zhang, Shashank Vatedka, Sidharth Jaggi, Anand D. Sarwate:
Quadratically Constrained Myopic Adversarial Channels. IEEE Trans. Inf. Theory 68(8): 4901-4948 (2022) - [c82]Xiwei Cheng, Sidharth Jaggi, Qiaoqiao Zhou:
Generalized Group Testing. AISTATS 2022: 10777-10835 - [c81]Pranav Joshi, Amritakshya Purkayastha, Yihan Zhang, Amitalok J. Budkuley, Sidharth Jaggi:
On the Capacity of Additive AVCs with Feedback. ISIT 2022: 504-509 - [c80]Yihan Zhang, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate:
The Capacity of Causal Adversarial Channels. ISIT 2022: 2523-2528 - [c79]Anuj Kumar Yadav, Mohammadreza Alimohammadi, Yihan Zhang, Amitalok J. Budkuley, Sidharth Jaggi:
New Results on AVCs with Omniscient and Myopic Adversaries. ISIT 2022: 2535-2540 - [i61]Yihan Zhang, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate:
The Capacity of Causal Adversarial Channels. CoRR abs/2205.06708 (2022) - 2021
- [j23]Sijie Li, Rawad Bitar, Sidharth Jaggi, Yihan Zhang:
Network Coding With Myopic Adversaries. IEEE J. Sel. Areas Inf. Theory 2(4): 1108-1119 (2021) - [j22]Qiaosheng Eric Zhang, Mayank Bakshi, Sidharth Jaggi:
Covert Communication Over Adversarially Jammed Channels. IEEE Trans. Inf. Theory 67(9): 6096-6121 (2021) - [c78]Sijie Li, Rawad Bitar, Sidharth Jaggi, Yihan Zhang:
Network Coding with Myopic Adversaries. ISIT 2021: 72-77 - [c77]Yihan Zhang, Sidharth Jaggi, Amitalok J. Budkuley:
Tight List-Sizes for Oblivious AVCs under Constraints. ISIT 2021: 1439-1444 - [i60]Sijie Li, Rawad Bitar, Sidharth Jaggi, Yihan Zhang:
Network Coding with Myopic Adversaries. CoRR abs/2102.09885 (2021) - [i59]Xiwei Cheng, Sidharth Jaggi, Qiaoqiao Zhou:
Generalized Non-adaptive Group Testing. CoRR abs/2102.10256 (2021) - 2020
- [j21]Jianhan Song, Qiaosheng Eric Zhang, Swanand Kadhe, Mayank Bakshi, Sidharth Jaggi:
Stealthy Communication Over Adversarially Jammed Multipath Networks. IEEE Trans. Commun. 68(12): 7473-7484 (2020) - [j20]Qiaosheng Eric Zhang, Mayank Bakshi, Sidharth Jaggi:
Covert Communication With Polynomial Computational Complexity. IEEE Trans. Inf. Theory 66(3): 1354-1384 (2020) - [c76]Yihan Zhang, Amitalok J. Budkuley, Sidharth Jaggi:
Generalized List Decoding. ITCS 2020: 51:1-51:83 - [c75]Rawad Bitar, Sidharth Jaggi:
Communication Efficient Secret Sharing in the Presence of Malicious Adversary. ISIT 2020: 548-553 - [c74]Yihan Zhang, Shashank Vatedka, Sidharth Jaggi:
Quadratically Constrained Two-way Adversarial Channels. ISIT 2020: 1587-1592 - [c73]Amitalok J. Budkuley, Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate, Carol Wang:
Symmetrizability for Myopic AVCs. ISIT 2020: 2103-2107 - [c72]Qinghua Devon Ding, Sidharth Jaggi, Shashank Vatedka, Yihan Zhang:
Empirical Properties of Good Channel Codes. ISIT 2020: 2337-2342 - [c71]Yihan Zhang, Amitalok J. Budkuley, Sidharth Jaggi:
Generalized List Decoding. ITA 2020: 51 - [i58]Qiaosheng Eric Zhang, Matthieu R. Bloch, Mayank Bakshi, Sidharth Jaggi:
Undetectable Radios: Covert Communication under Spectral Mask Constraints. CoRR abs/2001.01201 (2020) - [i57]Yihan Zhang, Shashank Vatedka, Sidharth Jaggi:
Quadratically Constrained Two-way Adversarial Channels. CoRR abs/2001.02575 (2020) - [i56]Rawad Bitar, Sidharth Jaggi:
Communication Efficient Secret Sharing in the Presence of Malicious Adversary. CoRR abs/2002.03374 (2020) - [i55]Yihan Zhang, Sidharth Jaggi, Amitalok J. Budkuley:
Tight List-Sizes for Oblivious AVCs under Constraints. CoRR abs/2009.03788 (2020)
2010 – 2019
- 2019
- [j19]Venkata Gandikota, Elena Grigorescu, Sidharth Jaggi, Samson Zhou:
Nearly Optimal Sparse Group Testing. IEEE Trans. Inf. Theory 65(5): 2760-2773 (2019) - [j18]Zitan Chen, Sidharth Jaggi, Michael Langberg:
The Capacity of Online (Causal) $q$ -Ary Error-Erasure Channels. IEEE Trans. Inf. Theory 65(6): 3384-3411 (2019) - [j17]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg:
Sufficiently Myopic Adversaries Are Blind. IEEE Trans. Inf. Theory 65(9): 5718-5736 (2019) - [c70]Sagnik Bhattacharya, Amitalok J. Budkuley, Sidharth Jaggi:
Shared Randomness in Arbitrarily Varying Channels. ISIT 2019: 627-631 - [c69]Xishi Nicholas Wang, Amitalok J. Budkuley, Andrej Bogdanov, Sidharth Jaggi:
When are large codes possible for AVCs? ISIT 2019: 632-636 - [c68]Qiaosheng Eric Zhang, Matthieu R. Bloch, Mayank Bakshi, Sidharth Jaggi:
Undetectable Radios: Covert Communication under Spectral Mask Constraints. ISIT 2019: 992-996 - [c67]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate, Carol Wang:
The Interplay of Causality and Myopia in Adversarial Channel Models. ISIT 2019: 1002-1006 - [i54]Yihan Zhang, Amitalok J. Budkuley, Sidharth Jaggi:
Generalized List Decoding. CoRR abs/1909.04264 (2019) - 2018
- [j16]Qiwen Wang, Sidharth Jaggi:
End-to-End Error-Correcting Codes on Networks With Worst-Case Bit Errors. IEEE Trans. Inf. Theory 64(6): 4467-4479 (2018) - [c66]Yihan Zhang, Shashank Vatedka, Sidharth Jaggi, Anand D. Sarwate:
Quadratically Constrained Myopic Adversarial Channels. ISIT 2018: 611-615 - [c65]Amitalok J. Budkuley, Sidharth Jaggi:
Communication over an Arbitrarily Varying Channel under a State-Myopic Encoder. ISIT 2018: 616-620 - [c64]Tongxin Li, Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate:
Quadratically Constrained Channels with Causal Adversaries. ISIT 2018: 621-625 - [c63]Jianhan Song, Qiaosheng Eric Zhang, Mayank Bakshi, Sidharth Jaggi, Swanand Kadhe:
Multipath Stealth Communication with Jammers. ISIT 2018: 761-765 - [c62]Abhishek Agarwal, Sidharth Jaggi, Arya Mazumdar:
Novel Impossibility Results for Group-Testing. ISIT 2018: 2579-2583 - [c61]Alejandro Cohen, Asaf Cohen, Sidharth Jaggi, Omer Gurewitz:
Secure Adaptive Group Testing. ISIT 2018: 2589-2593 - [c60]Amitalok J. Budkuley, Bikash Kumar Dey, Sidharth Jaggi, Vinod M. Prabhakaran:
On the Rate Distortion Function of Arbitrarily Varying Remote Sources. ITW 2018: 1-5 - [c59]Qiaosheng Eric Zhang, Mayank Bakshi, Sidharth Jaggi:
Covert Communication over Adversarially Jammed Channels. ITW 2018: 1-5 - [i53]Abhishek Agarwal, Sidharth Jaggi, Arya Mazumdar:
Novel Impossibility Results for Group-Testing. CoRR abs/1801.02701 (2018) - [i52]Alejandro Cohen, Asaf Cohen, Sidharth Jaggi, Omer Gurewitz:
Secure Adaptive Group Testing. CoRR abs/1801.04735 (2018) - [i51]Yihan Zhang, Shashank Vatedka, Sidharth Jaggi, Anand D. Sarwate:
Quadratically Constrained Myopic Adversarial Channels. CoRR abs/1801.05951 (2018) - [i50]Amitalok J. Budkuley, Sidharth Jaggi:
Communication over an Arbitrarily Varying Channel under a State-Myopic Encoder. CoRR abs/1804.10221 (2018) - [i49]Qiaosheng Eric Zhang, Mayank Bakshi, Sidharth Jaggi:
Covert Communication over Adversarially Jammed Channels. CoRR abs/1805.02426 (2018) - [i48]Jianhan Song, Qiaosheng Eric Zhang, Swanand Kadhe, Mayank Bakshi, Sidharth Jaggi:
Multipath Stealth Communication with Jammers. CoRR abs/1805.03095 (2018) - [i47]Tongxin Li, Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate:
Quadratically Constrained Channels with Causal Adversaries. CoRR abs/1805.03319 (2018) - [i46]Amitalok J. Budkuley, Bikash Kumar Dey, Sidharth Jaggi, Vinod M. Prabhakaran:
Arbitrarily Varying Remote Sources. CoRR abs/1809.04464 (2018) - 2017
- [j15]Sheng Cai, Mohammad Jahangoshahi, Mayank Bakshi, Sidharth Jaggi:
Efficient Algorithms for Noisy Group Testing. IEEE Trans. Inf. Theory 63(4): 2113-2136 (2017) - [j14]Abhinav Ganesan, Sidharth Jaggi, Venkatesh Saligrama:
Learning Immune-Defectives Graph Through Group Tests. IEEE Trans. Inf. Theory 63(5): 3010-3028 (2017) - [j13]Qiwen Wang, Sidharth Jaggi, Muriel Médard, Viveck R. Cadambe, Moshe Schwartz:
File Updates Under Random/Arbitrary Insertions and Deletions. IEEE Trans. Inf. Theory 63(10): 6487-6513 (2017) - [c58]Sidharth Jaggi, Michael Langberg:
Two-way interference channels with jammers. ISIT 2017: 491-495 - [i45]Venkata Gandikota, Elena Grigorescu, Sidharth Jaggi, Samson Zhou:
Nearly Optimal Sparse Group Testing. CoRR abs/1708.03429 (2017) - 2016
- [j12]Mayank Bakshi, Sidharth Jaggi, Sheng Cai, Minghua Chen:
SHO-FA: Robust Compressive Sensing With Order-Optimal Complexity, Measurements, and Bits. IEEE Trans. Inf. Theory 62(12): 7419-7444 (2016) - [c57]Venkata Gandikota, Elena Grigorescu, Sidharth Jaggi, Samson Zhou:
Nearly optimal sparse group testing. Allerton 2016: 401-408 - [c56]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate:
A bit of delay is sufficient and stochastic encoding is necessary to overcome online adversarial erasures. ISIT 2016: 880-884 - [c55]Zitan Chen, Sidharth Jaggi, Michael Langberg:
The capacity of online (causal) q-ary error-erasure channels. ISIT 2016: 915-919 - [c54]Peida Tian, Sidharth Jaggi, Mayank Bakshi, Oliver Kosut:
Arbitrarily varying networks: Capacity-achieving computationally efficient codes. ISIT 2016: 2139-2143 - [c53]Qiaosheng Eric Zhang, Mayank Bakshi, Sidharth Jaggi:
Computationally efficient deniable communication. ISIT 2016: 2234-2238 - [i44]Zitan Chen, Sidharth Jaggi, Michael Langberg:
The Capacity of Online (Causal) $q$-ary Error-Erasure Channels. CoRR abs/1602.00276 (2016) - [i43]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate:
The benefit of a 1-bit jump-start, and the necessity of stochastic encoding, in jamming channels. CoRR abs/1602.02384 (2016) - [i42]Peida Tian, Sidharth Jaggi, Mayank Bakshi, Oliver Kosut:
Arbitrarily Varying Networks: Capacity-achieving Computationally Efficient Codes. CoRR abs/1605.01834 (2016) - [i41]Qiaosheng Eric Zhang, Mayank Bakshi, Sidharth Jaggi:
Computationally Efficient Deniable Communication. CoRR abs/1607.02014 (2016) - [i40]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg:
Sufficiently Myopic Adversaries are Blind. CoRR abs/1610.01287 (2016) - 2015
- [c52]Swanand Kadhe, Alex Sprintson, Qiaosheng Eric Zhang, Mayank Bakshi, Sidharth Jaggi:
Reliable and secure communication over adversarial multipath networks: A survey. ICICS 2015: 1-5 - [c51]Abhinav Ganesan, Sidharth Jaggi, Venkatesh Saligrama:
Learning immune-defectives graph through group tests. ISIT 2015: 66-70 - [c50]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg:
Sufficiently myopic adversaries are blind. ISIT 2015: 1164-1168 - [c49]Chun Lam Chan, Mahdi Jafari Siavoshani, Sidharth Jaggi, Navin Kashyap, Pascal O. Vontobel:
Generalized belief propagation for estimating the partition function of the 2D Ising model. ISIT 2015: 2261-2265 - [c48]Qiaosheng Eric Zhang, Swanand Kadhe, Mayank Bakshi, Sidharth Jaggi, Alex Sprintson:
Coding against a limited-view adversary: The effect of causality and feedback. ISIT 2015: 2530-2534 - [c47]Abhinav Ganesan, Sidharth Jaggi, Venkatesh Saligrama:
Non-adaptive group testing with inhibitors. ITW 2015: 1-5 - [c46]Qiwen Wang, Viveck R. Cadambe, Sidharth Jaggi, Moshe Schwartz, Muriel Médard:
File updates under random/arbitrary insertions and deletions. ITW 2015: 1-5 - [c45]Qiaosheng Eric Zhang, Swanand Kadhe, Mayank Bakshi, Sidharth Jaggi, Alex Sprintson:
Talking reliably, secretly, and efficiently: A "complete" characterization. ITW 2015: 1-5 - [c44]Mahed Abroshan, Amin Aminzadeh Gohari, Sidharth Jaggi:
Zero error coordination. ITW Fall 2015: 202-206 - [c43]Zitan Chen, Sidharth Jaggi, Michael Langberg:
A Characterization of the Capacity of Online (causal) Binary Channels. STOC 2015: 287-296 - [i39]Qiwen Wang, Viveck R. Cadambe, Sidharth Jaggi, Moshe Schwartz, Muriel Médard:
File Updates Under Random/Arbitrary Insertions And Deletions. CoRR abs/1502.07830 (2015) - [i38]Abhinav Ganesan, Sidharth Jaggi, Venkatesh Saligrama:
Learning Immune-Defectives Graph through Group Tests. CoRR abs/1503.00555 (2015) - [i37]Qiaosheng Eric Zhang, Swanand Kadhe, Mayank Bakshi, Sidharth Jaggi, Alex Sprintson:
Coding against a Limited-view Adversary: The Effect of Causality and Feedback. CoRR abs/1504.05984 (2015) - [i36]Mahed Abroshan, Amin Aminzadeh Gohari, Sidharth Jaggi:
Zero Error Coordination. CoRR abs/1505.01110 (2015) - [i35]Qiwen Wang, Sidharth Jaggi:
End-to-End Error-Correcting Codes on Networks with Worst-Case Symbol Errors. CoRR abs/1510.03060 (2015) - 2014
- [j11]Chun Lam Chan, Sidharth Jaggi, Venkatesh Saligrama, Samar Agnihotri:
Non-Adaptive Group Testing: Explicit Bounds and Novel Algorithms. IEEE Trans. Inf. Theory 60(5): 3019-3035 (2014) - [j10]Hongyi Yao, Danilo Silva, Sidharth Jaggi, Michael Langberg:
Network Codes Resilient to Jamming and Eavesdropping. IEEE/ACM Trans. Netw. 22(6): 1978-1987 (2014) - [c42]Sheng Cai, Mayank Bakshi, Sidharth Jaggi, Minghua Chen:
FRANTIC: A Fast Reference-based Algorithm for Network Tomography via compressive sensing. COMSNETS 2014: 1-7 - [c41]Swanand Kadhe, Sidharth Jaggi, Mayank Bakshi, Alex Sprintson:
Reliable, deniable, and hidable communication over multipath networks. ISIT 2014: 611-615 - [c40]Sheng Cai, Mayank Bakshi, Sidharth Jaggi, Minghua Chen:
SUPER: Sparse signals with unknown phases efficiently recovered. ISIT 2014: 2007-2011 - [c39]Tongxin Li, Chun Lam Chan, Wenhao Huang, Tarik Kaced, Sidharth Jaggi:
Group testing with prior statistics. ISIT 2014: 2346-2350 - [c38]Pak Hou Che, Mayank Bakshi, Chung Chan, Sidharth Jaggi:
Reliable, deniable and hidable communication. ITA 2014: 1-10 - [c37]Pak Hou Che, Mayank Bakshi, Chung Chan, Sidharth Jaggi:
Reliable deniable communication with channel uncertainty. ITW 2014: 30-34 - [c36]Pak Hou Che, Swanand Kadhe, Mayank Bakshi, Chung Chan, Sidharth Jaggi, Alex Sprintson:
Reliable, deniable and hidable communication: A quick survey. ITW 2014: 227-231 - [i34]Tongxin Li, Chun Lam Chan, Wenhao Huang, Tarik Kaced, Sidharth Jaggi:
Group Testing with Prior Statistics. CoRR abs/1401.3667 (2014) - [i33]Sheng Cai, Mayank Bakshi, Sidharth Jaggi, Minghua Chen:
SUPER: Sparse signals with Unknown Phases Efficiently Recovered. CoRR abs/1401.4269 (2014) - [i32]Swanand Kadhe, Sidharth Jaggi, Mayank Bakshi, Alex Sprintson:
Reliable, Deniable, and Hidable Communication over Multipath Networks. CoRR abs/1401.4451 (2014) - [i31]Abhinav Ganesan, Javad Ebrahimi, Sidharth Jaggi, Venkatesh Saligrama:
Non-Adaptive Group Testing with Inhibitors. CoRR abs/1410.8440 (2014) - [i30]Zitan Chen, Sidharth Jaggi, Michael Langberg:
A characterization of the capacity of online (causal) binary channels. CoRR abs/1412.6376 (2014) - 2013
- [j9]Amir Hamed Mohsenian Rad, Jianwei Huang, Vincent W. S. Wong, Sidharth Jaggi, Robert Schober:
Inter-Session Network Coding with Strategic Users: A Game-Theoretic Analysis of the Butterfly Network. IEEE Trans. Commun. 61(4): 1473-1484 (2013) - [j8]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg:
Codes Against Online Adversaries: Large Alphabets. IEEE Trans. Inf. Theory 59(6): 3304-3316 (2013) - [j7]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate:
Upper Bounds on the Capacity of Binary Channels With Causal Adversaries. IEEE Trans. Inf. Theory 59(6): 3753-3763 (2013) - [j6]Amin Aminzadeh Gohari, Shenghao Yang, Sidharth Jaggi:
Beyond the Cut-Set Bound: Uncertainty Computations in Network Coding With Correlated Sources. IEEE Trans. Inf. Theory 59(9): 5708-5722 (2013) - [c35]Sheng Cai, Mohammad Jahangoshahi, Mayank Bakshi, Sidharth Jaggi:
GROTESQUE: Noisy Group Testing (Quick and Efficient). Allerton 2013: 1234-1241 - [c34]Wentao Huang, Tracey Ho, Hongyi Yao, Sidharth Jaggi:
Rateless resilient network coding against byzantine adversaries. INFOCOM 2013: 265-269 - [c33]Farzin Haddadpour, Mahdi Jafari Siavoshani, Mayank Bakshi, Sidharth Jaggi:
On AVCs with quadratic constraints. ISIT 2013: 271-275 - [c32]Pak Hou Che, Mayank Bakshi, Sidharth Jaggi:
Reliable deniable communication: Hiding messages in noise. ISIT 2013: 2945-2949 - [c31]Chun Lam Chan, Sheng Cai, Mayank Bakshi, Sidharth Jaggi, Venkatesh Saligrama:
Stochastic threshold group testing. ITW 2013: 1-5 - [c30]Pak Hou Che, Minghua Chen, Tracey Ho, Sidharth Jaggi, Michael Langberg:
Routing for security in networks with adversarial nodes. NetCod 2013: 1-6 - [i29]Wentao Huang, Tracey Ho, Hongyi Yao, Sidharth Jaggi:
Rateless Resilient Network Coding Against Byzantine Adversaries. CoRR abs/1301.2860 (2013) - [i28]Farzin Haddadpour, Mahdi Jafari Siavoshani, Mayank Bakshi, Sidharth Jaggi:
On AVCs with Quadratic Constraints. CoRR abs/1301.6345 (2013) - [i27]Pak Hou Che, Minghua Chen, Tracey Ho, Sidharth Jaggi, Michael Langberg:
Routing for Security in Networks with Adversarial Nodes. CoRR abs/1303.0141 (2013) - [i26]Chun Lam Chan, Sheng Cai, Mayank Bakshi, Sidharth Jaggi, Venkatesh Saligrama:
Near-Optimal Stochastic Threshold Group Testing. CoRR abs/1304.6027 (2013) - [i25]Pak Hou Che, Mayank Bakshi, Sidharth Jaggi:
Reliable Deniable Communication: Hiding Messages in Noise. CoRR abs/1304.6693 (2013) - [i24]Sheng Cai, Mohammad Jahangoshahi, Mayank Bakshi, Sidharth Jaggi:
GROTESQUE: Noisy Group Testing (Quick and Efficient). CoRR abs/1307.2811 (2013) - [i23]Sheng Cai, Mayank Bakshi, Sidharth Jaggi, Minghua Chen:
FRANTIC: A Fast Reference-based Algorithm for Network Tomography via Compressive Sensing. CoRR abs/1312.0825 (2013) - 2012
- [j5]Hongyi Yao, Sidharth Jaggi, Minghua Chen:
Passive Network Tomography for Erroneous Networks: A Network Coding Approach. IEEE Trans. Inf. Theory 58(9): 5922-5940 (2012) - [c29]Mayank Bakshi, Sidharth Jaggi, Sheng Cai, Minghua Chen:
SHO-FA: Robust compressive sensing with order-optimal complexity, measurements, and bits. Allerton Conference 2012: 786-793 - [c28]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate:
Improved upper bounds on the capacity of binary channels with causal adversaries. ISIT 2012: 681-685 - [c27]Chun Lam Chan, Sidharth Jaggi, Venkatesh Saligrama, Samar Agnihotri:
Non-adaptive group testing: Explicit bounds and novel algorithms. ISIT 2012: 1837-1841 - [c26]Samar Agnihotri, Sidharth Jaggi, Minghua Chen:
Analog network coding in general SNR regime. ISIT 2012: 2052-2056 - [c25]Ömer Faruk Tekin, Tracey Ho, Hongyi Yao, Sidharth Jaggi:
On erasure correction coding for streaming. ITA 2012: 221-226 - [c24]Samar Agnihotri, Sidharth Jaggi, Minghua Chen:
Analog network coding in general SNR regime: Performance of network simplification. ITW 2012: 632-636 - [c23]Samar Agnihotri, Sidharth Jaggi, Minghua Chen:
Analog network coding in general SNR regime: Performance of a greedy scheme. NetCod 2012: 137-142 - [i22]Chun Lam Chan, Sidharth Jaggi, Venkatesh Saligrama, Samar Agnihotri:
Non-adaptive Group Testing: Explicit bounds and novel algorithms. CoRR abs/1202.0206 (2012) - [i21]Samar Agnihotri, Sidharth Jaggi, Minghua Chen:
Analog Network Coding in General SNR Regime. CoRR abs/1202.0372 (2012) - [i20]Sheng Cai, Jihang Ye, Minghua Chen, Jianxin Yan, Sidharth Jaggi:
Secure Compressed Reading in Smart Grids. CoRR abs/1202.5202 (2012) - [i19]Samar Agnihotri, Sidharth Jaggi, Minghua Chen:
Analog Network Coding in General SNR Regime: Performance of A Greedy Scheme. CoRR abs/1203.2297 (2012) - [i18]Samar Agnihotri, Sidharth Jaggi, Minghua Chen:
Analog Network Coding in General SNR Regime: Performance of Network Simplification. CoRR abs/1204.2150 (2012) - [i17]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate:
Upper Bounds on the Capacity of Binary Channels with Causal Adversaries. CoRR abs/1204.2587 (2012) - [i16]Mayank Bakshi, Sidharth Jaggi, Sheng Cai, Minghua Chen:
SHO-FA: Robust compressive sensing with order-optimal complexity, measurements, and bits. CoRR abs/1207.2335 (2012) - 2011
- [j4]Theodoros K. Dikaliotis, Tracey Ho, Sidharth Jaggi, Svitlana Vyetrenko, Hongyi Yao, Michelle Effros, Jörg Kliewer, Elona Erez:
Multiple-Access Network Information-Flow and Correction Codes. IEEE Trans. Inf. Theory 57(2): 1067-1079 (2011) - [c22]Chun Lam Chan, Pak Hou Che, Sidharth Jaggi, Venkatesh Saligrama:
Non-adaptive probabilistic group testing with noisy measurements: Near-optimal bounds with efficient algorithms. Allerton 2011: 1832-1839 - [c21]Tracey Ho, Sidharth Jaggi, Svitlana Vyetrenko, Lingxiao Xia:
Universal and robust distributed network codes. INFOCOM 2011: 766-774 - [c20]Amin Aminzadeh Gohari, Shenghao Yang, Sidharth Jaggi:
Beyond the cut-set bound: Uncertainty computations in network coding with correlated sources. ISIT 2011: 598-602 - [c19]Qifu Tyler Sun, Sidharth Jaggi, Shuo-Yen Robert Li:
Delay invariant convolutional network codes. ISIT 2011: 2492-2496 - [c18]Samar Agnihotri, Sidharth Jaggi, Minghua Chen:
Amplify-and-forward in wireless relay networks. ITW 2011: 311-315 - [c17]Qiwen Wang, Sidharth Jaggi, Shuo-Yen Robert Li:
Binary error correcting network codes. ITW 2011: 498-502 - [i15]Theodoros K. Dikaliotis, Hongyi Yao, Amir Salman Avestimehr, Sidharth Jaggi, Tracey Ho:
Low-Complexity Near-Optimal Codes for Gaussian Relay Networks. CoRR abs/1102.5138 (2011) - [i14]Amin Aminzadeh Gohari, Shenghao Yang, Sidharth Jaggi:
Beyond the Cut Set Bound: Uncertainty Computations in Network Coding with Correlated Sources. CoRR abs/1103.3596 (2011) - [i13]Samar Agnihotri, Sidharth Jaggi, Minghua Chen:
Amplify-and-Forward in Wireless Relay Networks. CoRR abs/1105.2760 (2011) - [i12]Chun Lam Chan, Pak Hou Che, Sidharth Jaggi, Venkatesh Saligrama:
Non-adaptive probabilistic group testing with noisy measurements: Near-optimal bounds with efficient algorithms. CoRR abs/1107.4540 (2011) - [i11]Qiwen Wang, Sidharth Jaggi, Shuo-Yen Robert Li:
Binary Error Correcting Network Codes. CoRR abs/1108.2393 (2011) - 2010
- [c16]Hongyi Yao, Sidharth Jaggi, Minghua Chen:
Network Coding Tomography for Network Failures. INFOCOM 2010: 91-95 - [c15]Yaping Li, Hongyi Yao, Minghua Chen, Sidharth Jaggi, Alon Rosen:
RIPPLE Authentication for Network Coding. INFOCOM 2010: 2258-2266 - [c14]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate:
Coding against delayed adversaries. ISIT 2010: 285-289 - [c13]Mayank Bakshi, Sidharth Jaggi, Michelle Effros:
Concatenated Polar codes. ISIT 2010: 918-922 - [c12]Hongyi Yao, Theodoros K. Dikaliotis, Sidharth Jaggi, Tracey Ho:
Multi-source operator channels: Efficient capacity-achieving codes. ITW 2010: 1-5 - [i10]Mayank Bakshi, Sidharth Jaggi, Michelle Effros:
Concatenated Polar Codes. CoRR abs/1001.2545 (2010) - [i9]Hongyi Yao, Theodoros K. Dikaliotis, Sidharth Jaggi, Tracey Ho:
Multiple Access Network Information-flow And Correction codes. CoRR abs/1001.2603 (2010) - [i8]Hongyi Yao, Danilo Silva, Sidharth Jaggi, Michael Langberg:
Network Codes Resilient to Jamming and Eavesdropping. CoRR abs/1001.3714 (2010) - [i7]Tracey Ho, Sidharth Jaggi, Svitlana Vyetrenko, Lingxiao Xia:
Universal and Robust Distributed Network Codes. CoRR abs/1008.0045 (2010) - [i6]Theodoros K. Dikaliotis, Tracey Ho, Sidharth Jaggi, Svitlana Vyetrenko, Hongyi Yao, Michelle Effros, Jörg Kliewer, Elona Erez:
Multiple-access Network Information-flow and Correction Codes. CoRR abs/1012.0112 (2010)
2000 – 2009
- 2009
- [c11]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg:
Codes against online adversaries. Allerton 2009: 1169-1176 - [c10]Amir Hamed Mohsenian Rad, Jianwei Huang, Vincent W. S. Wong, Sidharth Jaggi, Robert Schober:
A Game-Theoretic Analysis of Inter-Session Network Coding. ICC 2009: 1-6 - [c9]Sidharth Jaggi, Ziyu Shao, Shuo-Yen Robert Li:
To code or not to code: Rate optimality in node-capacitated networks. ISIT 2009: 1779-1783 - [c8]Michael Langberg, Sidharth Jaggi, Bikash Kumar Dey:
Binary causal-adversary channels. ISIT 2009: 2723-2727 - [i5]Michael Langberg, Sidharth Jaggi, Bikash Kumar Dey:
Binary Causal-Adversary Channels. CoRR abs/0901.1853 (2009) - [i4]Amir Hamed Mohsenian Rad, Jianwei Huang, Vincent W. S. Wong, Sidharth Jaggi, Robert Schober:
Inter-Session Network Coding with Strategic Users: A Game-Theoretic Analysis of Network Coding. CoRR abs/0904.2921 (2009) - [i3]Hongyi Yao, Sidharth Jaggi, Minghua Chen:
Network coding tomography for network failures. CoRR abs/0908.0711 (2009) - 2008
- [j3]Anthony Ephremides, Sidharth Jaggi, Tracey Ho, Brooke Shrader, Sae-Young Chung:
Network coding. J. Commun. Networks 10(4): 367-370 (2008) - [j2]Sidharth Jaggi, Michael Langberg, Sachin Katti, Tracey Ho, Dina Katabi, Muriel Médard, Michelle Effros:
Resilient Network Coding in the Presence of Byzantine Adversaries. IEEE Trans. Inf. Theory 54(6): 2596-2603 (2008) - [c7]Sagar Shenvi, Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg:
"Real" Slepian-Wolf codes. ISIT 2008: 1423-1427 - [i2]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg:
"Real" Slepian-Wolf Codes. CoRR abs/0810.1424 (2008) - [i1]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg:
Codes against Online Adversaries. CoRR abs/0811.2850 (2008) - 2007
- [c6]Vishal Doshi, Devavrat Shah, Muriel Médard, Sidharth Jaggi:
Distributed Functional Compression through Graph Coloring. DCC 2007: 93-102 - [c5]Sidharth Jaggi, Michael Langberg, Sachin Katti, Tracey Ho, Dina Katabi, Muriel Médard:
Resilient Network Coding in the Presence of Byzantine Adversaries. INFOCOM 2007: 616-624 - [c4]Sidharth Jaggi, Michael Langberg:
Resilient network codes in the presence of eavesdropping Byzantine adversaries. ISIT 2007: 541-545 - 2006
- [c3]Sidharth Jaggi, Yuval Cassuto, Michelle Effros:
Low Complexity Encoding for Network Codes. ISIT 2006: 40-44 - 2005
- [j1]Sidharth Jaggi, Peter Sanders, Philip A. Chou, Michelle Effros, Sebastian Egner, Kamal Jain, Ludo M. G. M. Tolhuizen:
Polynomial time algorithms for multicast network code construction. IEEE Trans. Inf. Theory 51(6): 1973-1982 (2005) - [c2]Sidharth Jaggi, Michael Langberg, Tracey Ho, Michelle Effros:
Correction of adversarial errors in networks. ISIT 2005: 1455-1459 - 2004
- [c1]Sidharth Jaggi, Michelle Effros:
Communication and distributional complexity of joint probability mass functions. ISIT 2004: 365
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-08 19:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint