- Home
- Video search
We found 16 result.
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
EstimationHypothesis TestingDistributed SystemsSecrecy
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
EstimationHypothesis TestingDistributed SystemsSecrecy
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
EstimationHypothesis TestingDistributed SystemsSecrecy
IEEE ITW 2021, Virtually from Kanazawa, Japan
Plenary Lecture
Coding TheoryDistributed Systems
ISIT 2023, Taipei, Taiwan
Meet the Shannon Awardee
Shannon Award
IEEE ISIT 2020, Los Angeles (Virtual)
Plenary Lecture
Video image begins at 0:31
ISIT Plenary LecturePlenary LectureOptimization
2013 ISIT Plenary Lecture
Lossless Source Coding Algorithms
Frans M.J. Willems
Eindhoven University of Technology
ISIT Plenary LectureSource Coding
IEEE ITW 2021, Virtually from Kanazawa, Japan
Tutorial Lecture
Storage
Meet the Shannon Lecturer -- An Interview to Alon Orlitsky.
By Student and Outreach Subcommittee
OutreachShannon AwardInterview
Information Theory Society presents how the Lempel-Ziv lossless compression algorithm works. It was published in 1978 and improved by Welch in 1984…
Source CodingCoding Theory
The IEEE Information Theory Society presents an overview of Adi Shamir's 1979 paper on secret sharing. This is part of our series on the greatest…
Secrecy
Plenary Talk
2022 North American School of Information Theory
UCLA, Los Angeles, August 16-19, 2022.
Machines learningDistributed LearningDistributed Systems
Plenary Talk
2022 North American School of Information Theory
UCLA, Los Angeles, August 16-19, 2022.
Machines learningDistributed LearningDistributed Systems
2007 Shannon Lecture
Sergio Verdu (Princeton University)
Shannon AwardShannon LecturesISIT Plenary Lecture
ISIT 2021, Melbourne, Victoria, Australia
Meet the Shannon Awardee
Shannon Award
IEEE ITW 2021, Virtually from Kanazawa, Japan
Tutorial Lecture
Private Information RetrievalSecrecyCoded Computing