Year |
Citation |
Score |
2021 |
Jinan R, Parag P, Tyagi H. Tracking an Auto-Regressive Process with Limited Communication per Unit Time. Entropy (Basel, Switzerland). 23. PMID 33804092 DOI: 10.3390/e23030347 |
0.306 |
|
2020 |
Mayekar P, Parag P, Tyagi H. Optimal Source Codes for Timely Updates Ieee Transactions On Information Theory. 66: 3714-3731. DOI: 10.1109/Tit.2020.2983151 |
0.33 |
|
2020 |
Tyagi H, Watanabe S. Strong Converse Using Change of Measure Arguments Ieee Transactions On Information Theory. 66: 689-703. DOI: 10.1109/Tit.2019.2953877 |
0.384 |
|
2020 |
Sudan M, Tyagi H, Watanabe S. Communication for Generating Correlation: A Unifying Survey Ieee Transactions On Information Theory. 66: 5-37. DOI: 10.1109/Tit.2019.2946364 |
0.383 |
|
2018 |
Tyagi H, Viswanath P, Watanabe S. Interactive Communication for Data Exchange Ieee Transactions On Information Theory. 64: 26-37. DOI: 10.1109/Tit.2017.2769124 |
0.455 |
|
2017 |
Tyagi H, Watanabe S. Universal Multiparty Data Exchange and Secret Key Agreement Ieee Transactions On Information Theory. 63: 4057-4074. DOI: 10.1109/Tit.2017.2694850 |
0.394 |
|
2016 |
Tyagi H, Venkatakrishnan S, Viswanath P, Watanabe S. Information complexity density and simulation of protocols Itcs 2016 - Proceedings of the 2016 Acm Conference On Innovations in Theoretical Computer Science. 381-391. DOI: 10.1109/Tit.2017.2746859 |
0.416 |
|
2015 |
Tyagi H, Watanabe S. Converses for Secret Key Agreement and Secure Computing Ieee Transactions On Information Theory. 61: 4809-4827. DOI: 10.1109/Tit.2015.2457926 |
0.512 |
|
2014 |
Hayashi M, Tyagi H, Watanabe S. Secret key agreement: General capacity and second-order asymptotics Ieee International Symposium On Information Theory - Proceedings. 1136-1140. DOI: 10.1109/Tit.2016.2567440 |
0.425 |
|
2013 |
Tyagi H. Common information and secret key capacity Ieee Transactions On Information Theory. 59: 5627-5640. DOI: 10.1109/Tit.2013.2264355 |
0.431 |
|
2013 |
Tyagi H, Narayan P. How many queries will resolve common randomness? Ieee International Symposium On Information Theory - Proceedings. 3165-3169. DOI: 10.1109/Tit.2013.2262496 |
0.573 |
|
2013 |
Tyagi H. Distributed function computation with confidentiality Ieee Journal On Selected Areas in Communications. 31: 691-701. DOI: 10.1109/Jsac.2013.130407 |
0.487 |
|
2012 |
Tyagi H. Distributed computing with privacy Ieee International Symposium On Information Theory - Proceedings. 1157-1161. DOI: 10.1109/ISIT.2012.6283035 |
0.424 |
|
2011 |
Tyagi H, Narayan P, Gupta P. When is a function securely computable? Ieee International Symposium On Information Theory - Proceedings. 2876-2880. DOI: 10.1109/Tit.2011.2165807 |
0.575 |
|
2011 |
Tyagi H. Minimal public communication for maximum rate secret key generation Ieee International Symposium On Information Theory - Proceedings. 578-582. DOI: 10.1109/ISIT.2011.6034195 |
0.356 |
|
2010 |
Tyagi H, Narayan P, Gupta P. Secure computing Ieee International Symposium On Information Theory - Proceedings. 2612-2616. DOI: 10.1109/ISIT.2010.5513720 |
0.557 |
|
2009 |
Tyagi H, Narayan P. The gelfand-pinsker channel: Strong converse and upper bound for the reliability function Ieee International Symposium On Information Theory - Proceedings. 1954-1957. DOI: 10.1109/ISIT.2009.5205656 |
0.514 |
|
Show low-probability matches. |