Skip to main content

Secondary Menu

  • IEEE Home
  • IEEE Xplore Digital Library
  • IEEE Standards
  • IEEE Spectrum
  • More Sites

User account menu

Sign in
Home

Main navigation

  • Publications
    • IEEE Transactions on Information Theory
    • IEEE Journal on Selected Areas in Information Theory
    • IEEE BITS the Information Theory Magazine
    • IEEE Information Theory Society Newsletter
  • Conferences
    • IEEE International Symposium on Information Theory
    • IEEE Information Theory Workshop
    • Schools of Information Theory
    • Calendar of Upcoming Events
    • Information for Organizers
  • Videos
  • Membership
    • About Us
    • Become a Member
    • Chapters
    • Distinguished Lecturer Program
  • Awards
    • Awards
    • Make a Nomination
    • IEEE Fellows
    • Golden Jubilee Awards
    • Chapter of the Year Award
  • Community
    • Board of Governors
    • Committees
    • BoG Meetings
    • BoG Meeting Minutes
    • Governing Documents
    • Diversity & Inclusion
  • News
    • News
    • Job Board
    • Submit an Announcement
    • Subscribe to the Mailing List
    • Help

Search

IEEE Logo

Secondary Menu

  • IEEE Home
  • IEEE Xplore Digital Library
  • IEEE Standards
  • IEEE Spectrum
  • More Sites

User account menu

Sign in
IEEE Logo
  1. Home
  2. Video search
  1. Home
  2. Video search
We found 56 result.
Golay, Heisenberg and Weyl
2008 ISIT Plenary Lecture Golay, Heisenberg and Weyl Professor Robert Calderbank Princeton University
ISIT Plenary Lecture
From Two to Infinity: Information Theory and Statistics for Large Alphabets
2008 ISIT Plenary Lecture From Two to Infinity: Information Theory and Statistics for Large Alphabets Professor Alon Orlitsky University of…
ISIT Plenary Lecture
How internet communication works: Network Coding
Information Theory Society presents a brief history of internet communication and packet switched networks leading to the idea of network coding.…
Network Coding
From Constrained Signaling to Network Interference Alignment via an Information-Estimation Perspective
2011 Shannon Lecture From Constrained Signaling to Network Interference Alignment via an Information-Estimation Perspective Shlomo Shamai (Shitz)…
Shannon Lectures
Randomness - A Computational Complexity View
2008 ISIT Plenary Talk Randomness - A Computational Complexity View Professor Avi Wigderson Institute for Advanced Study Princeton University
ISIT Plenary Lecture
Channel capacity (baud rate)
Source Coding and Simulation
2008 Shannon Lecture Source Coding and Simulation Professor Robert M. Gray Stanford University
Shannon LecturesISIT Plenary Lecture
Quantum Information Theory
David Sutter's full lecture at the 2020 European School of Information Theory Stuttgart, Germany
Quantum Information Theory
Deep Learning Applications in Communications
Jakob Hoydis' (supported by Sebastian Cammerer, Sebastian Dörner and Tim Uhlemann) full lecture at the 2020 European School of Information Theory…
Deep LearningMachine Learning
Neural Augmentation In Wireless Communication
IEEE ISIT 2020, Los Angeles (Virtual) Plenary Lecture Video begins at 0:30
ISIT Plenary LecturePlenary LectureMachine LearningCoding Theory
Sum Of Squares — Where Are We, And Where To Go?
IEEE ISIT 2020, Los Angeles (Virtual) Plenary Lecture Video image begins at 0:31
ISIT Plenary LecturePlenary LectureOptimization
What is a Markov chain?
What motivated the concept of Markov chains & Markov models? Featuring Plato's theory of forms, Jacob Bernoulli's weak law of large numbers and…
The Beauty of Lempel-Ziv Compression
Information Theory Society presents how the Lempel-Ziv lossless compression algorithm works. It was published in 1978  and improved by Welch in 1984…
Source CodingCoding
Quantum Information's Birth, Growth, And Significance
IEEE ISIT 2020, Los Angeles (Virtual) Shannon Lecture Video image begins at 0:31
Shannon LecturesQuantum Information Theory
Coded String Reconstruction Problems
IEEE ISIT 2020, Los Angeles (Virtual) Plenary Lecture Video image begins at 0:30
ISIT Plenary LecturePlenary LectureInformation Theory in Biology
Channel Coding
Winner of the ISIT 2020 Student Video Contest Students: Jeongmin Chae and Minoh Jeong  
Coding TheoryChannel Coding
Morse Code
Morse Code Simulator: https://www.khanacademy.org/math/appl...​
What is a bit?
How can we quantify/measure an information source? We introduce the ideas of Nyquist & Hartley using a simple game involving yes/no questions. It…
Claude Shannon: A Mathematical Theory of Communication
Claude Shannon demonstrated how to generate "english looking" text using Markov chains and how this gives a satisfactory representation of the…
Coded Computing
IEEE ISIT 2020, Los Angeles (Virtual) Tutorial Lecture Video image begins at 0:30
TutorialCoded Computing
Fundamentals Of Blockchain Systems
IEEE ISIT 2020, Los Angeles (Virtual) Tutorial Lecture Video image begins at 0:10
TutorialBlockchain
Gone Fishin'
IEEE ISIT 2020, Los Angeles (Virtual) Plenary Lecture Video image begins at 0:15
ISIT Plenary LecturePlenary Lecture
Efficient Decoding of Polar Codes - Algorithms and Implementations
Alexios Balatsoukas-Stimming's full lecture at the 2020 European School of Information Theory Stuttgart, Germany
Polar Codes
Spatially Coupled LDPC Codes - Theory and Applications
Laurent Schmalen's short lecture at the 2020 European School of Information Theory Stuttgart, Germany
LDPC Codes
Making Blockchains Scalable and Efficient - the Power of Codes
Swanand Kadhe's full lecture at the 2020 European School of Information Theory Stuttgart, Germany
BlockchainCoding Theory
Machine-Learning Based Approaches To Coding
IEEE ISIT 2020, Los Angeles (Virtual) Tutorial Lecture Video image begins at 0:35.
TutorialMachine LearningCoding Theory
The Asymptotic Equipartition Property
Winner of the ISIT 2020 Student Video Contest Student: Jordi Borras and Francesc Molina
Coding Theory
The Asymptotic Equipartition Property
Winner of the ISIT 2020 Student Video Contest Students: Wael Alghamdi, Madeleine Barowsky, Boriana Gjura and Hao Wang
Coding Theory
Deep Learning for Inverse Problems
Reinhard Heckel's short lecture at the 2020 European School of Information Theory Stuttgart, Germany
Deep Learning
Private Information Retrieval
Sennur Ulukus's full lecture at the 2020 European School of Information Theory Stuttgart, Germany
Private Information Retrieval
Communication-Efficient and Privacy-Preserving Distributed Learning
Ayfer Özgür's full lecture at the 2020 European School of Information Theory Stuttgart, Germany
Distributed Learning
How space-time codes work (MIMO)
Coding
Hamming and low density parity check codes
Information Theory Society presents the key concepts needed to understand low-density parity-check codes (LDPC codes). It's a blend of repetition…
LDPC CodesCoding
Secret Sharing Explained Visually
The IEEE Information Theory Society presents an overview of Adi Shamir's 1979 paper on secret sharing. This is part of our series on the greatest…
Secrecy
How Recommender Systems Work
  The key insights behind content and collaborative filtering (Matrix Factorization). How Amazon, Netflix, Facebook and others predict what you will…
Recommender SystemsApplications
Fundamental Trade-Offs between Privacy and Utility in Data Sharing (2/3)
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong Lecture
Data sharingPrivacy
Finite-Blocklength Schemes in Information Theory (3/3)
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong Lecture
Information theoryCoding TheoryFinite blocklength
Random Walk on High Dimensional Expanders (2/3)
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong Lecture
Random WalkHigh dimensional expander Hypergraphs
Locally-Testable and Locally-Decodable Codes (1/3)
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong Lecture
Coding TheoryLocally-testable codesLocally-decodable codes
Fundamental Trade-Offs between Privacy and Utility in Data Sharing (3/3)
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong Lecture
Data sharingPrivacy
Estimation and Hypothesis Testing under Information Constraints (1/3)
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong Lecture
EstimationHypothesis TestingDistributed SystemsSecrecy
Mutual Information in Machine Learning (1/3)
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong Lecture
Mutual information Machines learning Estimation
Locally-Testable and Locally-Decodable Codes (3/3)
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong Lecture
Coding TheoryLocally-testable codesLocally-decodable codes
Fair Machine Learning via Information Theory (1/3)
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong Lecture
Machine LearningInformation theoryFairness
Fair Machine Learning via Information Theory (2/3)
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong Lecture
Machine LearningInformation theoryFairness
Fair Machine Learning via Information Theory (3/3)
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong Lecture
Machine LearningInformation theoryFairness
Estimation and Hypothesis Testing under Information Constraints (Part 2/3)
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong Lecture
EstimationHypothesis TestingDistributed SystemsSecrecy
Locally-Testable and Locally-Decodable Codes (2/3)
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong Lecture
Coding TheoryLocally-testable codesLocally-decodable codes
Fundamental Trade-Offs between Privacy and Utility in Data Sharing (1/3)
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong Lecture
Data sharingPrivacy
Mutual Information in Machine Learning (2/3)
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong Lecture
Mutual information Machines learning Estimation
Mutual Information in Machine Learning (3/3)
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong Lecture
Mutual information Machines learning Estimation
Random Walk on High Dimensional Expanders (1/3)
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong Lecture
Random WalkHigh dimensional expander Hypergraphs
Random Walk on High Dimensional Expanders (3/3)
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong Lecture
Random WalkHigh dimensional expander Hypergraphs
Finite-Blocklength Schemes in Information Theory (1/3)
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong Lecture
Information theoryCoding TheoryFinite blocklength
Finite-Blocklength Schemes in Information Theory (2/3)
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong Lecture
Information theoryCoding TheoryFinite blocklength
Estimation and Hypothesis Testing under Information Constraints (Part 3/3)
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong Lecture
EstimationHypothesis TestingDistributed SystemsSecrecy

Type

  • 1

Topics

  • Annual Shannon Memorial Lecture
  • (-) Art of the Problem
  • (-) CSCIT 2021
  • (-) ESIT 2020, Stuttgart, Germany
  • Information in Small Bits
  • Interview
  • ISIT 2006, Nice France
  • (-) ISIT 2008, Toronto, Canada
  • ISIT 2010, Austin, Texas
  • (-) ISIT 2011, Saint-Petersburg, Russia
  • ISIT 2012, Cambridge, MA, USA
  • ISIT 2013, Istanbul, Turkey
  • ISIT 2014, Honolulu, HI, USA
  • ISIT 2016, Barcelona, Spain
  • ISIT 2017, Aachen, Germany
  • ISIT 2018, Vail, CO
  • (-) ISIT 2020, Los Angeles, California
  • ISIT 2021, Melbourne, Australia
  • ISIT 2022, Espoo, Finland
  • IT Society
  • ITW 2020, Riva del Garda, Italy
  • ITW 2021, Kanazawa, Japan
  • Shannon Lectures
  • Student Video Contest

Tags

  • Applications
  • Blockchain
  • Broadcast Channels
  • Channel Coding
  • Coded Computing
  • Coding
  • Coding Theory
  • Cryptography
  • Data sharing
  • Deep Learning
  • Distributed Learning
  • Distributed Systems
  • Estimation
  • Estimation
  • Fairness
  • Finite blocklength
  • Folded Codes
  • Generative Adversarial Networks
  • High dimensional expander
  • Hypergraphs
  • Hypothesis Testing
  • Information in Small Bits
  • Information theory
  • Information Theory in Biology
  • Interview
  • ISIT Awards Event
  • ISIT Plenary Lecture
  • ITW Plenary Lecture
  • LDPC Codes
  • Locally-decodable codes
  • Locally-testable codes
  • Low Latency
  • Machine Learning
  • Machines learning
  • Mutual information
  • Network Coding
  • Optimization
  • Outreach
  • Plenary Lecture
  • Polar Codes
  • Privacy
  • Private Information Retrieval
  • Quantum Information Theory
  • Random Walk
  • Recommender Systems
  • Secrecy
  • Shannon Award
  • Shannon Lectures
  • Signal Processing
  • Source Coding
  • Storage
  • Streaming Codes
  • Tutorial

Subscribe to Our Mailing List

Receive announcements about conferences, news, job openings and more by subscribing to our mailing list.

SUBSCRIBE

Footer menu

  • Home
  • Contact
  • Accessibility
  • Nondiscrimination Policy
  • IEEE Privacy Policy
  • Help
© Copyright 2021 IEEE – All rights reserved. Use of this website signifies your agreement to the IEEE Terms and Conditions.
A not-for-profit organization, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.