IEEE TRANSACTIONS ON INFORMATION THEORY - Journal - Bridge of Knowledge

Search

IEEE TRANSACTIONS ON INFORMATION THEORY

ISSN:

0018-9448

eISSN:

1557-9654

Disciplines
(Field of Science):

  • architecture and urban planning (Engineering and Technology)
  • information and communication technology (Engineering and Technology)
  • biomedical engineering (Engineering and Technology)
  • social communication and media studies (Social studies)
  • management and quality studies (Social studies)
  • computer and information sciences (Natural sciences)

Ministry points: Help

Ministry points - current year
Year Points List
Year 2024 200 Ministry scored journals list 2024
Ministry points - previous years
Year Points List
2024 200 Ministry scored journals list 2024
2023 200 Ministry Scored Journals List
2022 200 Ministry Scored Journals List 2019-2022
2021 200 Ministry Scored Journals List 2019-2022
2020 200 Ministry Scored Journals List 2019-2022
2019 200 Ministry Scored Journals List 2019-2022
2018 40 A
2017 40 A
2016 35 A
2015 40 A
2014 40 A
2013 40 A
2012 45 A
2011 45 A
2010 32 A

Model:

Hybrid - transformation agreement

Points CiteScore:

Points CiteScore - current year
Year Points
Year 2022 5.8
Points CiteScore - previous years
Year Points
2022 5.8
2021 6.2
2020 6.3
2019 6.5
2018 5.6
2017 5.7
2016 6
2015 5.8
2014 6.5
2013 7.1
2012 6.8
2011 6.7

Impact Factor:

Log in to see the Impact Factor.

Filters

total: 10

  • Category
  • Year
  • Options

clear Chosen catalog filters disabled

Catalog Journals

Year 2021
Year 2017
  • Amplifying the Randomness of Weak Sources Correlated With Devices
    Publication

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2017

    The problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...

    Full text to download in external service

Year 2016
  • Types of Markov Fields and Tilings
    Publication

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2016

    The method of types is one of the most popular techniques in information theory and combinatorics. However, thus far the method has been mostly applied to one-dimensional Markov processes, and it has not been thoroughly studied for general Markov fields. Markov fields over a finite alphabet of size m ≥ 2 can be viewed as models for multi-dimensional systems with local interactions. The locality of these interactions is represented...

    Full text available to download

Year 2014
Year 2013
  • Average Redundancy of the Shannon Code for Markov Sources
    Publication

    It is known that for memoryless sources, the average and maximal redundancy of fixed–to–variable length codes, such as the Shannon and Huffman codes, exhibit two modes of behavior for long blocks. It either converges to a limit or it has an oscillatory pattern, depending on the irrationality or rationality, respectively, of certain parameters that depend on the source. In this paper, we extend these findings, concerning the Shannon...

    Full text to download in external service

Year 2010
  • A few steps more towards NPT bound entanglement
    Publication

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2010

    In this paper, existence of bound entangled states with nonpositive partial transpose (NPT) is considered. As one knows, existence of such states would in particular imply nonadditivity of distillable entanglement. Moreover, it would rule out a simple mathematical description of the set of distillable states. The particular state, known to be 1-copy nondistillable and supposed to be bound entangled, is considered. The problem of...

    Full text to download in external service

Year 2009
  • General paradigm for distilling classical key from quantum states
    Publication

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2009

    In this paper, we develop a formalism for distilling aclassical key from a quantum state in a systematic way, expandingon our previous work on a secure key from bound entanglement(Horodecki et al., 2005). More detailed proofs, discussion, andexamples are provided of the main results. Namely, we demonstratethat all quantum cryptographic protocols can be recast in away which looks like entanglement theory, with the only changebeing...

    Full text to download in external service

  • Squashed entanglement for multipartite states and entanglement measures based on the mixed convex roof
    Publication
    • D. Yang
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • J. Oppenheim
    • W. Song

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2009

    New measures of multipartite entanglement are constructedbased on two definitions of multipartite information anddifferent methods of optimizing over extensions of the states. Oneis a generalization of the squashed entanglement where one takesthe mutual information of parties conditioned on the state's extensionand takes the infimum over such extensions. Additivity ofthe multipartite squashed entanglement is proved for both versionsof...

    Full text to download in external service

Year 2008

seen 539 times