Himanshu Tyagi, Ph.D. - Publications

Affiliations: 
2013 Electrical and Computer Engineering University of Maryland, College Park, College Park, MD 

17 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2021 Jinan R, Parag P, Tyagi H. Tracking an Auto-Regressive Process with Limited Communication per Unit Time. Entropy (Basel, Switzerland). 23. PMID 33804092 DOI: 10.3390/e23030347  0.306
2020 Mayekar P, Parag P, Tyagi H. Optimal Source Codes for Timely Updates Ieee Transactions On Information Theory. 66: 3714-3731. DOI: 10.1109/Tit.2020.2983151  0.33
2020 Tyagi H, Watanabe S. Strong Converse Using Change of Measure Arguments Ieee Transactions On Information Theory. 66: 689-703. DOI: 10.1109/Tit.2019.2953877  0.384
2020 Sudan M, Tyagi H, Watanabe S. Communication for Generating Correlation: A Unifying Survey Ieee Transactions On Information Theory. 66: 5-37. DOI: 10.1109/Tit.2019.2946364  0.383
2018 Tyagi H, Viswanath P, Watanabe S. Interactive Communication for Data Exchange Ieee Transactions On Information Theory. 64: 26-37. DOI: 10.1109/Tit.2017.2769124  0.455
2017 Tyagi H, Watanabe S. Universal Multiparty Data Exchange and Secret Key Agreement Ieee Transactions On Information Theory. 63: 4057-4074. DOI: 10.1109/Tit.2017.2694850  0.394
2016 Tyagi H, Venkatakrishnan S, Viswanath P, Watanabe S. Information complexity density and simulation of protocols Itcs 2016 - Proceedings of the 2016 Acm Conference On Innovations in Theoretical Computer Science. 381-391. DOI: 10.1109/Tit.2017.2746859  0.416
2015 Tyagi H, Watanabe S. Converses for Secret Key Agreement and Secure Computing Ieee Transactions On Information Theory. 61: 4809-4827. DOI: 10.1109/Tit.2015.2457926  0.512
2014 Hayashi M, Tyagi H, Watanabe S. Secret key agreement: General capacity and second-order asymptotics Ieee International Symposium On Information Theory - Proceedings. 1136-1140. DOI: 10.1109/Tit.2016.2567440  0.425
2013 Tyagi H. Common information and secret key capacity Ieee Transactions On Information Theory. 59: 5627-5640. DOI: 10.1109/Tit.2013.2264355  0.431
2013 Tyagi H, Narayan P. How many queries will resolve common randomness? Ieee International Symposium On Information Theory - Proceedings. 3165-3169. DOI: 10.1109/Tit.2013.2262496  0.573
2013 Tyagi H. Distributed function computation with confidentiality Ieee Journal On Selected Areas in Communications. 31: 691-701. DOI: 10.1109/Jsac.2013.130407  0.487
2012 Tyagi H. Distributed computing with privacy Ieee International Symposium On Information Theory - Proceedings. 1157-1161. DOI: 10.1109/ISIT.2012.6283035  0.424
2011 Tyagi H, Narayan P, Gupta P. When is a function securely computable? Ieee International Symposium On Information Theory - Proceedings. 2876-2880. DOI: 10.1109/Tit.2011.2165807  0.575
2011 Tyagi H. Minimal public communication for maximum rate secret key generation Ieee International Symposium On Information Theory - Proceedings. 578-582. DOI: 10.1109/ISIT.2011.6034195  0.356
2010 Tyagi H, Narayan P, Gupta P. Secure computing Ieee International Symposium On Information Theory - Proceedings. 2612-2616. DOI: 10.1109/ISIT.2010.5513720  0.557
2009 Tyagi H, Narayan P. The gelfand-pinsker channel: Strong converse and upper bound for the reliability function Ieee International Symposium On Information Theory - Proceedings. 1954-1957. DOI: 10.1109/ISIT.2009.5205656  0.514
Show low-probability matches.