- Home
- Video search
We found 35 result.
IEEE ITW 2021, Virtually from Kanazawa, Japan
Tutorial Lecture
Private Information RetrievalSecrecyCoded Computing
IEEE ITW 2020, Riva del Garda, Italy
Plenary Lecture
ITW Plenary LecturePlenary Lecture
IEEE ISIT 2020, Los Angeles (Virtual)
Plenary Lecture
Video image begins at 0:30
ISIT Plenary LecturePlenary LectureInformation Theory in Biology
IEEE ITW 2020, Riva del Garda, Italy
Plenary Lecture
ITW Plenary LecturePlenary Lecture
IEEE ITW 2020, Riva del Garda, Italy
Plenary Lecture
ITW Plenary LecturePlenary Lecture
IEEE ITW 2020, Riva del Garda, Italy
Plenary Lecture
ITW Plenary LecturePlenary Lecture
IEEE ITW 2020, Riva del Garda, Italy
Plenary Lecture
ITW Plenary LecturePlenary Lecture
IEEE ITW 2020, Riva del Garda, Italy
Plenary Lecture
ITW Plenary LecturePlenary Lecture
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
Random WalkHigh dimensional expander Hypergraphs
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
EstimationHypothesis TestingDistributed SystemsSecrecy
IEEE ISIT 2020, Los Angeles (Virtual)
Tutorial Lecture
Video image begins at 0:30
TutorialCoded Computing
IEEE ISIT 2020, Los Angeles (Virtual)
Tutorial Lecture
Video image begins at 0:10
TutorialBlockchain
IEEE ITW 2021, Virtually from Kanazawa, Japan
Tutorial Lecture
Polar CodesCoding Theory
Alexios Balatsoukas-Stimming's full lecture at the 2020 European School of Information Theory Stuttgart, Germany
Polar Codes
2nd place of the 2022 Information Theoretic Duets Competition
Polar CodesCoding Theory
Winner of the ISIT 2021 Student Video Contest
Students: Mohammad Ishtiyaq Qureshi and Olusola Odeyomihttps://2021.ieee-isit.org/Challenge.asp
Blockchain
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
EstimationHypothesis TestingDistributed SystemsSecrecy
IEEE ISIT 2020, Los Angeles (Virtual)
Plenary Lecture
Video image begins at 0:31
ISIT Plenary LecturePlenary LectureOptimization
IEEE ISIT 2020, Los Angeles (Virtual)
Plenary Lecture
Video begins at 0:30
ISIT Plenary LecturePlenary LectureMachine LearningCoding Theory
The IEEE Information Theory Society presents an overview of Adi Shamir's 1979 paper on secret sharing. This is part of our series on the greatest…
Secrecy
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
Random WalkHigh dimensional expander Hypergraphs
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
Random WalkHigh dimensional expander Hypergraphs
Swanand Kadhe's full lecture at the 2020 European School of Information Theory Stuttgart, Germany
BlockchainCoding Theory
Winner of the ISIT 2021 Student Video Contest
Students: Yuxin Liu and Sarah Bahanshalhttps://2021.ieee-isit.org/Challenge.asp
LDPC CodesPolar Codes
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
EstimationHypothesis TestingDistributed SystemsSecrecy
ISIT 2021, Melbourne, Victoria, AustraliaPlenary Lecture
ISIT Plenary LecturePlenary Lecture
IEEE ISIT 2020, Los Angeles (Virtual)
Plenary Lecture
Video image begins at 0:15
ISIT Plenary LecturePlenary Lecture
2021 Shannon Lecture
Alon Orlitsky
Melbourne, Victoria, Australia
ISIT Plenary LecturePlenary LectureShannon Lectures
ISIT 2021, Melbourne, Victoria, AustraliaPlenary Lecture
ISIT Plenary LecturePlenary Lecture
ISIT 2021, Melbourne, Victoria, AustraliaPlenary Lecture
ISIT Plenary LecturePlenary LectureBroadcast Channels