Skip to main content

Secondary Menu

  • IEEE Home
  • IEEE Xplore Digital Library
  • IEEE Standards
  • IEEE Spectrum
  • More Sites

User account menu

Sign in
Home

Main navigation

  • Publications
    • IEEE Transactions on Information Theory
    • IEEE Journal on Selected Areas in Information Theory
    • IEEE BITS the Information Theory Magazine
    • IEEE Information Theory Society Newsletter
  • Conferences
    • IEEE International Symposium on Information Theory
    • IEEE Information Theory Workshop
    • Schools of Information Theory
    • Calendar of Upcoming Events
    • Information for Organizers
  • Videos
  • Membership
    • About Us
    • Become a Member
    • Chapters
    • Distinguished Lecturer Program
  • Awards
    • Awards
    • Make a Nomination
    • IEEE Fellows
    • Golden Jubilee Awards
    • Chapter of the Year Award
  • Community
    • Board of Governors
    • Committees
    • BoG Meetings
    • BoG Meeting Minutes
    • Governing Documents
    • Diversity & Inclusion
    • Outreach
  • News
    • News
    • Job Board
    • Submit an Announcement
    • Subscribe to the Mailing List
    • Help

Search

IEEE Logo

Secondary Menu

  • IEEE Home
  • IEEE Xplore Digital Library
  • IEEE Standards
  • IEEE Spectrum
  • More Sites

User account menu

Sign in
IEEE Logo
  1. Home
  2. Videos

Featured Videos

Deep learning and information ...
Finite-Blocklength Schemes in ...
Random Walk on High Dimensiona...
Information, Compression, Lear...
Coded Computing
Information in Small Bits - Ch...
Design and Decoding of Polar C...
Secret Sharing Explained Visua...
Fundamental Trade-Offs between...
Common Information: Old And Ne...
Deep Learning Applications in ...
Part 2 of 3: Bitcoin and Block...
Understanding Generative Adver...
Bias And Unfairness In Data Fr...
Guidance from Information Theo...
Finite-Blocklength Schemes in ...
Learning from Humans How to Im...
ISIT2021 Promo Video January
What Do We Know About Matrix E...
Estimation and Hypothesis Test...
Information in Small Bits - Ch...
Gone Fishin'
Channel Coding
On Dynamics-Informed Blending ...
Golay, Heisenberg and Weyl
Mutual Information in Machine...
Explicit and Implicit Inductiv...
Coding for Distributed Informa...
Fundamental Trade-Offs between...
Modeling and Optimization of L...
Locally-Testable and Locally-D...
Codes, Metrics, and Applicatio...
Concentration Inequalities and...
Private Information Retrieval
Private Set Intersection
From Constrained Signaling to ...
Channel capacity (baud rate)
Part 8 of 8: Introduction to I...
Morse Code
Mutual Information in Machine...
Coded String Reconstruction Pr...
Interview with Shannon Awardee...
The Asymptotic Equipartition P...
Broadcast Channels - What&#039...
Digital Presence Committee, Ma...
Fundamentals Of Blockchain Sys...
Benign Overfitting
Machine-Learning Based Approac...
Shannon Lectures

Shannon Lectures

Information: From Theory to Practice
ISIT Plenary LectureShannon Lectures
Teaching IT
Shannon AwardShannon LecturesISIT Plenary Lecture
Information, Compression, Learning, Life
ISIT Plenary LecturePlenary LectureShannon Lectures
Quantum Information's Birth, Growth, And Significance
Shannon LecturesQuantum Information Theory
Plenary Lectures and Tutorials

ISIT 2022, Espoo, Finland

Communication and Sensing: From Compressed…
ISIT Plenary Lecture...
Learning from Humans How to Improve Lossy Data Compression
ISIT Plenary Lecture...
Information: From Theory to Practice
ISIT Plenary LectureShannon Lectures...
On Dynamics-Informed Blending of Machine Learning and Game…
ISIT Plenary Lecture...

ISIT 2021, Melbourne, Australia

Folded Codes and Streaming Codes
Folded CodesStreaming CodesCoding Theory...
Blockchains and Differential Privacy
Blockchain...
Iterative Decoding of LDPC Codes and Channel Polarization
LDPC CodesPolar Codes...
Unsourced Multiple Access (UMAC): Information Theory And…
Tutorial...

ITW 2020, Riva del Garda, Italy

Diversity vs. Parallelism in Distributed Computing with…
ITW Plenary LecturePlenary Lecture...
Information-directed Exploration in Bandits and…
ITW Plenary LecturePlenary Lecture...
The generalization error of overparametrized…
ITW Plenary LecturePlenary Lecture...
Data Driven Algorithm Design
ITW Plenary LecturePlenary Lecture...

ESIT 2020, Stuttgart, Germany

Spatially Coupled LDPC Codes - Theory and Applications
LDPC Codes...
Making Blockchains Scalable and Efficient - the Power of Codes…
BlockchainCoding Theory...
Communication-Efficient and Privacy-Preserving…
Distributed Learning...
Deep Learning for Inverse Problems
Deep Learning...

ISIT 2020, Los Angeles, California

The Asymptotic Equipartition Property
Coding Theory...
The Asymptotic Equipartition Property
Coding Theory...
Channel Coding
Coding TheoryChannel Coding...
Quantum Information's Birth, Growth, And Significance
Shannon LecturesQuantum Information Theory...

Art of the Problem

How Recommender Systems Work
Recommender SystemsApplications...
Secret Sharing Explained Visually
Secrecy...
The Beauty of Lempel-Ziv Compression
Source CodingCoding Theory...
Hamming and low density parity check codes
LDPC CodesCoding Theory...

Student Video Contest

Binary Hypothesis Testing with Deterministic Machine
...
Private Set Intersection
...
On Weight Distribution of Polar Codes
Polar CodesCoding Theory...
Active Learning for Classification with Abstention
...

Subscribe to Our Mailing List

Receive announcements about conferences, news, job openings and more by subscribing to our mailing list.

SUBSCRIBE

Footer menu

  • Home
  • Contact
  • Accessibility
  • Nondiscrimination Policy
  • IEEE Privacy Policy
  • Help
© Copyright 2021 IEEE – All rights reserved. Use of this website signifies your agreement to the IEEE Terms and Conditions.
A not-for-profit organization, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.