We gratefully acknowledge support from
the Simons Foundation and member institutions.

Information Theory

Authors and titles for recent submissions, skipping first 57

[ total of 72 entries: 1-25 | 8-32 | 33-57 | 58-72 ]
[ showing 25 entries per page: fewer | more | all ]

Fri, 5 Dec 2025 (continued, showing last 1 of 15 entries)

[58]  arXiv:2512.04345 (cross-list from quant-ph) [pdf, ps, other]
Title: The operator layer cake theorem is equivalent to Frenkel's integral formula
Comments: This note is related to arXiv:2208.12194, arXiv:2507.06232, and arXiv:2507.07065
Subjects: Quantum Physics (quant-ph); Information Theory (cs.IT); Mathematical Physics (math-ph); Functional Analysis (math.FA)

Thu, 4 Dec 2025

[59]  arXiv:2512.04077 [pdf, ps, other]
Title: Semi-Markov Decision Process Framework for Age of Incorrect Information Minimization
Subjects: Information Theory (cs.IT); Signal Processing (eess.SP); Systems and Control (eess.SY)
[60]  arXiv:2512.04020 [pdf, ps, other]
Title: On topological and algebraic structures of categorical random variables
Comments: 18 pages
Subjects: Information Theory (cs.IT)
[61]  arXiv:2512.03872 [pdf, ps, other]
Title: Movable Signals with Dual-Polarized Fixed Intelligent Surfaces: Beyond Diagonal Reflection Matrices
Comments: Submitted to IEEE for publication
Subjects: Information Theory (cs.IT); Signal Processing (eess.SP)
[62]  arXiv:2512.03719 [pdf, ps, other]
Title: Over-the-Air Federated Learning: Rethinking Edge AI Through Signal Processing
Subjects: Information Theory (cs.IT); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[63]  arXiv:2512.03612 [pdf, ps, other]
Title: Expected Confidence Dependency: A Novel Rough Set-Based Approach to Feature Selection
Comments: 33 pages, 5 figures
Subjects: Information Theory (cs.IT)
[64]  arXiv:2512.03518 [pdf, ps, other]
Title: From Reliability to Security: How RIS-Assisted Adaptive SM and SSK Enhances Wireless Systems
Comments: Submitted in IEEE journals
Subjects: Information Theory (cs.IT)
[65]  arXiv:2512.03326 [pdf, ps, other]
Title: Generalized Orthogonal Approximate Message-Passing for Sublinear Sparsity
Authors: Keigo Takeuchi
Comments: Long version of a manuscript submitted to IEEE Trans. Inf. Theory
Subjects: Information Theory (cs.IT)
[66]  arXiv:2512.03241 [pdf, ps, other]
Title: Multi-Source M/G/1/1 Queues with Probabilistic Preemption
Subjects: Information Theory (cs.IT)
[67]  arXiv:2512.03117 [src]
Title: Strengthening Han's Fourier Entropy-Influence Inequality via an Information-Theoretic Proof
Comments: The result has already appeared in Claim 4.1 "A Note on the Entropy Influence Conjecture" by N. Keller, E. Mossel, and T. Schlank, on arXiv eprint: arXiv:1105.2651
Subjects: Information Theory (cs.IT)
[68]  arXiv:2512.03096 [pdf, ps, other]
Title: CFO-Robust Detection for 5G PRACH under Fading Channels: Analytical Modeling and Performance Evaluation
Comments: 13 pages, 11 figures, journal
Subjects: Information Theory (cs.IT); Probability (math.PR)
[69]  arXiv:2512.03977 (cross-list from eess.SY) [pdf, ps, other]
Title: An Information Theory of Finite Abstractions and their Fundamental Scalability Limits
Subjects: Systems and Control (eess.SY); Information Theory (cs.IT); Dynamical Systems (math.DS); Optimization and Control (math.OC)
[70]  arXiv:2512.03767 (cross-list from eess.SY) [pdf, ps, other]
Title: CaFTRA: Frequency-Domain Correlation-Aware Feedback-Free MIMO Transmission and Resource Allocation for 6G and Beyond
Subjects: Systems and Control (eess.SY); Information Theory (cs.IT)
[71]  arXiv:2512.03487 (cross-list from cs.DC) [pdf, ps, other]
Title: Double-Edge-Assisted Computation Offloading and Resource Allocation for Space-Air-Marine Integrated Networks
Authors: Zhen Wang, Bin Lin, Qiang (John)Ye
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT)
[72]  arXiv:2512.03361 (cross-list from cs.CR) [pdf, ps, other]
Title: Rethinking Security in Semantic Communication: Latent Manipulation as a New Threat
Authors: Zhiyuan Xi, Kun Zhu
Comments: 8 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[ total of 72 entries: 1-25 | 8-32 | 33-57 | 58-72 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)