pith. machine review for the scientific record. sign in

archive

Every paper Pith has read. Search by title, abstract, or pith.

586 papers in math.IT · page 1

  1. math.NA 2026-05-13 reviewed
    CUR local error filters perturbations invisible to selected rows and columns

    Revisiting CUR Perturbation Analysis: A Local Tangent-Space Expansion

    Longxiu Huang

  2. cs.IT 2026-05-13 reviewed
    List decoder spots polar-code information sets from raw signals

    Blind Recognition of Polar Codes Using Successive Cancellation List Decoding

    Changwei Tu +3

  3. cs.IT 2026-05-13 reviewed
    Fixed weights boost product code decoding by 0.23 dB

    Decoding Product Codes and Staircase Codes with Iteration-Independent Weighting Coefficients

    Andreas Stra{\ss}hofer

  4. cs.IT 2026-05-13 reviewed
    Explicit left ideals for skew polycyclic codes over chain rings

    Skew Polycyclic Codes over $\frac{\mathbb{F}_{p^m}[u]}{\langle u^t \rangle}$

    Akanksha Tiwari +1

  5. cs.IT 2026-05-13 reviewed
    Ternary maximal self-orthogonal codes of length 25 classified

    Classification of ternary maximal self-orthogonal codes of length 25

    Makoto Araya +1

  6. cs.IT 2026-05-13 reviewed
    Annulus-modulated transceiver reaches full DoF in RIS symbiotic radios

    Grouped Annulus-Modulated Transceiver Is Almost Full DoF-Achieving for RIS-Assisted Symbiotic Radios Over Spatial-Correlated Channels

    Jianfeng Shi +7

  7. cs.IT 2026-05-13 reviewed
    Continuous apertures reshape wireless signal theory

    Electromagnetic Signal and Information Theory: A Continuous-Aperture Array Perspective

    Chongjun Ouyang +6

  8. cs.IT 2026-05-12 reviewed
    This paper derives an improved lower bound of order sqrt(n log log n) on the support size…

    An Improved Lower Bound on Support Size of Capacity-Achieving Inputs for the Binomial Channel: Extended version

    Alex Dytso +2

  9. cs.IT 2026-05-12 reviewed
    Exact repair achieves optimal storage and bandwidth in quantum storage

    Simultaneously Minimizing Storage and Bandwidth Under Exact Repair With Quantum Entanglement

    Alptug Aytekin +3

  10. math.CO 2026-05-12 reviewed
    Field multiplication symmetric tensor rank matches its Gabidulin code rank

    Symmetric Tensor Decompositions over Finite Fields

    Ferdinando Zullo +1

  11. cs.IT 2026-05-12 reviewed
    Finite-field angular metric yields unique projective decoding

    Angle Between Two Vectors over Finite Fields and an Application to Projective Unique Decoding

    Kamil Otal

  12. cs.IT 2026-05-12 reviewed
    Secure key rate equals d-ℓ in d-vertex-connected networks

    Secure (Multiple) Key-Cast over Networks: Multiple Eavesdropping Nodes

    Michael Langberg +1

  13. cs.IT 2026-05-12 reviewed
    CNN spots boundaries in overlapping wireless commands

    A Deep Learning-based Receiver for Asynchronous Grant-Free Random Access in Control-to-Control Networks

    Dania De Crescenzo +5

  14. cs.IT 2026-05-12 reviewed
    Link failures cap LEO capacity scalability at O(1/n)

    Capacity Scalability of LEO Constellations With Dynamic Link Failures

    Min Sheng +1

  15. cs.IT 2026-05-12 reviewed
    Framework extends non-GRS MDS-NMDS codes via deep holes

    A framework for constructing non-GRS MDS-NMDS codes from deep holes and its application

    Kwok-Yan Lam +3

  16. cs.IT 2026-05-12 reviewed
    Exact Hamming distances derived for binary polycyclic codes from trinomials

    On the Hamming Distance and LCD Properties of Binary Polycyclic Codes and Their Duals

    Pramod Kumar Kewat +1

  17. eess.SP 2026-05-12 reviewed
    Beamspace sorting yields SNR from one mmWave sample

    Low-Complexity Blind SNR Estimator for mmWave Multi-Antenna Communications

    Hanyoung Park +2

  18. cs.RO 2026-05-12 reviewed
    QOED focuses robot exploration on identifiable parameters

    Learning What Matters: Adaptive Information-Theoretic Objectives for Robot Exploration

    Jionghao Wang +4

  19. cs.IT 2026-05-12 reviewed
    Node failures scale wireless capacity and delay with sqrt of reliable nodes

    On Capacity and Delay of Wireless Networks with Node Failures

    Jiandong Li +3

  20. cs.IT 2026-05-12 reviewed
    Adversarial test error bounds match exponentially in S

    Memory Constrained Adversarial Hypothesis Testing

    Malhar A. Managoli +1

  21. cs.LG 2026-05-12 reviewed
    Complex neurons beat simple ones under fixed parameters

    Scaling Laws and Tradeoffs in Recurrent Networks of Expressive Neurons

    Aaron Spieler +2

  22. cs.IT 2026-05-12 reviewed
    CR2 router matches full-info LLM decisions with device signals only

    CR^2: Cost-Aware Risk-Controlled Routing for Wireless Device-Edge LLM Inference

    Jiangchao Yao +6

  23. cs.IT 2026-05-12 reviewed
    Conditional subadditivity tightens Szász and Fischer matrix bounds

    From Submodularity to Matrix Determinants: Strengthening Han's, Sz\'asz's, and Fischer's Inequalities

    Gowtham R. Kurri +3

  24. cs.IT 2026-05-12 reviewed
    Explicit generators classify all constacyclic codes of length np^s

    Constacyclic codes of length $np^s$ over $\frac{\mathbb{F}_{p^m}[u]}{\langle u^t\rangle}$: Torsions and Cardinalities

    Akanksha Tiwari +2

  25. cs.LG 2026-05-12 reviewed
    KL divergence with teacher constraint yields SSL batch centering

    Information theoretic underpinning of self-supervised learning by clustering

    Josef Kittler +2

  26. cs.IT 2026-05-12 reviewed
    Ternary sum entropy maximized by mostly binary variables

    Maximum Entropy of Sums of Independent Ternary Random Variables

    Mladen Kova\v{c}evi\'c

  27. cs.IT 2026-05-12 reviewed
    Polar complexity enables lossless codes approaching source entropy

    Polar Complexity: A New Descriptive Complexity with Applications to Source and Joint Source-Channel Coding

    Xiao Ma +1

  28. cs.IT 2026-05-12 reviewed
    Random coding gives exact finite-length bound for empirical coordination

    Empirical coordination in the finite blocklength regime: an achievability result---Extended version

    Giulia Cervia +2

  29. eess.SP 2026-05-12 reviewed
    Midpoint chirp choice makes AFDM waveforms continuous and lower in OOBE

    Stepped Frequency Division Multiplexing: A Jump-Free Continuous-Time AFDM Waveform

    Yewen Cao +1

  30. math.PR 2026-05-12 reviewed
    Explicit measure makes entropy fifth derivative positive

    A Counterexample to the Gaussian Completely Monotone Conjecture

    Mark Sellke +1

  31. cs.IT 2026-05-12 reviewed
    Constacyclic DFT extends cyclic square methods to Schur products

    Schur Products of Constacyclic Codes via the Constacyclic Discrete Fourier Transform

    Peifeng Lin

  32. cs.IT 2026-05-12 reviewed
    Heterogeneous quantization matches full-precision MIMO detection with fewer bits

    Performance of QUBO-Formulated MIMO Detection Under Hardware Precision Constraints

    Elisabetta Valiante +3

  33. eess.SP 2026-05-12 reviewed
    Group symmetries unify all standard signal transforms

    Unification of Signal Transform Theory

    Mitchell A. Thornton

  34. cs.LG 2026-05-12 reviewed
    VIB metrics reach 95.3% AUROC for MNIST OOD detection

    VNDUQE: Information-Theoretic Novelty Detection using Deep Variational Information Bottleneck

    Aryan Gondkar +2

  35. cs.IT 2026-05-12 reviewed
    Floating-point entropy stays nearly constant under scaling

    The Entropy of Floating-Point Numbers

    Anant Sahai +3

  36. cs.IT 2026-05-12 reviewed
    Spatially coupled codes deliver strong performance for future systems

    Recent Advances in Spatially Coupled Codes: Overview and Outlook

    Jinhong Yuan +4

  37. math.NT 2026-05-12 reviewed
    Structural conditions give explicit permutation quadrinomials over F_{q^2}

    Explicit determination of a class of permutation rational functions in any characteristic

    Deng Tang +1

  38. cs.IT 2026-05-12 reviewed
    Decoder fixes deletions plus insertions in quantum codes

    Decoding Algorithm to Composite Errors Consisting of Deletions and Insertions for Quantum Deletion-Correcting Codes Based on Quantum Reed-Solomon Codes

    Ken Nakamura +2

  39. cs.AI 2026-05-12 reviewed
    Vector codebook cuts KV cache to 34x compression at 0.95 similarity

    FibQuant: Universal Vector Quantization for Random-Access KV-Cache Compression

    Namyoon Lee +1

  40. cs.IT 2026-05-12 reviewed
    Rational functions produce better optimal LRCs than polynomials

    Beyond Polynomials: Optimal Locally Recoverable Codes from Good Rational Functions

    Chunming Tang +3

  41. cs.IT 2026-05-12 reviewed
    Infinite families of optimal codes with positive Griesmer defects

    Optimal Codes with Positive Griesmer Defects, Related Optimal and Almost Optimal LRC Codes

    Hao Chen +2

  42. cs.IT 2026-05-12 reviewed
    Polar codes gain exact leakage certification for public coordinate subsets

    RankGuardPolar Private Public Finite Length Polar Codes with Rank-Certified Leakage

    Bella Bose +2

  43. cs.IT 2026-05-12 reviewed
    Outputs alone recover channel parameters and optimal inputs

    Parameter Estimation of Mutual Information Maximized Channels

    Bella Bose +2

  44. cond-mat.stat-mech 2026-05-11 reviewed
    FRG treats noise-to-signal ratio as temperature for anomaly detection

    Field Theory of Data: Anomaly Detection via the Functional Renormalization Group. The 2D Ising Model as a Benchmark

    Dine Ousmane Samary +3

  45. cs.IT 2026-05-11 reviewed
    Synthesize likelihoods to meet accuracy bounds with minimal prior deviation

    Sensor Design for Accuracy-Bounded Estimation via Maximum-Entropy Likelihood Synthesis

    Raktim Bhattacharya

  46. quant-ph 2026-05-11 reviewed
    3D Hamiltonian encodes qubit for exponential time at finite temperature

    A passive self-correcting quantum memory in three dimensions

    Margarita Davydova +2

  47. cs.IT 2026-05-11 reviewed
    Fountain codes bound DNA random access at π/4

    Random Access Expectation in DNA Storage and Fountain Codes

    Christoph Hofmeister +2

  48. cs.IT 2026-05-11 reviewed
    Flexible privacy sets yield PIR capacity bounds on path and cycle graphs

    Private Information Retrieval With Arbitrary Privacy Requirements for Graph-Based Storage

    Mohamed Nomeir +2

  49. cs.LG 2026-05-11 reviewed
    Neural weight norm equals Kolmogorov complexity

    Neural Weight Norm = Kolmogorov Complexity

    Tiberiu Musat

  50. cs.IT 2026-05-11 reviewed
    Local privacy multiplies PIR capacity on graph unions

    Local Private Information Retrieval: A New Privacy Perspective for Graph-Based Replicated Systems

    Mohamed Nomeir +2