Michael Langberg

Orcid: 0000-0002-7470-0718

According to our database1, Michael Langberg authored at least 155 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Competitive Channel-Capacity.
IEEE Trans. Inf. Theory, July, 2024

Minimizing the Alphabet Size in Codes With Restricted Error Sets.
IEEE Trans. Inf. Theory, June, 2024

Codes for Adversaries: Between Worst-Case and Average-Case Jamming.
Found. Trends Commun. Inf. Theory, 2024

Characterizing positive-rate key-cast (and multicast network coding) with eavesdropping nodes.
CoRR, 2024

Dynamic D2D-Assisted Federated Learning over O-RAN: Performance Analysis, MAC Scheduler, and Asymmetric User Selection.
CoRR, 2024

Competitive Analysis of Arbitrary Varying Channels.
Proceedings of the IEEE International Symposium on Information Theory, 2024

Characterizing positive-rate secure multicast network coding with eavesdropping nodes.
Proceedings of the IEEE International Symposium on Information Theory, 2024

Nobody Expects a Differential Equation: Minimum Energy-Per-Bit for the Gaussian Relay Channel with Rank-1 Linear Relaying.
Proceedings of the IEEE International Symposium on Information Theory, 2024

Computationally Efficient Codes for Strongly Dobrushin-Stambler Nonsymmetrizable Oblivious AVCs.
Proceedings of the IEEE International Symposium on Information Theory, 2024

2023
Multiple Key-cast over Networks.
CoRR, 2023

Computationally Efficient Codes for Adversarial Binary-Erasure Channels.
Proceedings of the IEEE International Symposium on Information Theory, 2023

Perfect vs. Independent Feedback in the Multiple-Access Channel.
Proceedings of the IEEE International Symposium on Information Theory, 2023

2022
Latency and Alphabet Size in the Context of Multicast Network Coding.
IEEE Trans. Inf. Theory, 2022

Network Coding Multicast Key-Capacity.
Proceedings of the IEEE Information Theory Workshop, 2022

The Capacity of Causal Adversarial Channels.
Proceedings of the IEEE International Symposium on Information Theory, 2022

On the Benefit of Cooperation in Relay Networks.
Proceedings of the IEEE International Symposium on Information Theory, 2022

Group Testing on General Set-Systems.
Proceedings of the IEEE International Symposium on Information Theory, 2022

2021
Reduced-Rank L1-Norm Principal-Component Analysis With Performance Guarantees.
IEEE Trans. Signal Process., 2021

Negligible Cooperation: Contrasting the Maximal- and Average-Error Cases.
IEEE Trans. Inf. Theory, 2021

The Birthday Problem and Zero-Error List Codes.
IEEE Trans. Inf. Theory, 2021

Beyond Capacity: The Joint Time-Rate Region.
CoRR, 2021

Edge removal in undirected networks.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Every Bit Counts: Second-Order Analysis of Cooperation in the Multiple-Access Channel.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Minimizing the Alphabet Size in Codes with Restricted Error Sets.
Proceedings of the IEEE International Symposium on Information Theory, 2021

2020
The Edge-Removal Problem's Connections to the Zero-Error and $\delta$ -Dependence Problems in Network Coding.
IEEE Trans. Inf. Theory, 2020

Towards an Operational Definition of Group Network Codes.
CoRR, 2020

Minimizing the alphabet size of erasure codes with restricted decoding sets.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Symmetrizability for Myopic AVCs.
Proceedings of the IEEE International Symposium on Information Theory, 2020

2019
Sufficiently Myopic Adversaries Are Blind.
IEEE Trans. Inf. Theory, 2019

The Capacity of Online (Causal) $q$ -Ary Error-Erasure Channels.
IEEE Trans. Inf. Theory, 2019

H-wise Independence.
Chic. J. Theor. Comput. Sci., 2019

Topology Dependent Bounds For FAQs.
Proceedings of the 38th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, 2019

A Local Perspective on the Edge Removal Problem.
Proceedings of the IEEE International Symposium on Information Theory, 2019

The Interplay of Causality and Myopia in Adversarial Channel Models.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Secure Network Coding in the Setting in Which a Non-Source Node May Generate Random Keys.
Proceedings of the IEEE International Symposium on Information Theory, 2019

2018
Can Negligible Rate Increase Network Reliability?
IEEE Trans. Inf. Theory, 2018

The Unbounded Benefit of Encoder Cooperation for the $k$ -User MAC.
IEEE Trans. Inf. Theory, 2018

Single-Unicast Secure Network Coding and Network Error Correction are as Hard as Multiple-Unicast Network Coding.
IEEE Trans. Inf. Theory, 2018

Can Negligible Cooperation Increase Network Capacity? The Average-Error Case.
CoRR, 2018

Can Negligihle Cooperation Increase Capacity? The Average-Error Case.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Quadratically Constrained Channels with Causal Adversaries.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Trade-offs between Rate and Security in Linear Multicast Network Coding.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

2017
Coding for the ℓ<sub>∞</sub>-Limited Permutation Channel.
IEEE Trans. Inf. Theory, 2017

A code equivalence between streaming network coding and streaming index coding.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

The benefit of encoder cooperation in the presence of state information.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Two-way interference channels with jammers.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Non-linear cyclic codes that attain the Gilbert-Varshamov bound.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

The effect of removing a network communication edge: Group network codes.
Proceedings of the 55th Annual Allerton Conference on Communication, 2017

2016
Graph Coloring.
Encyclopedia of Algorithms, 2016

Communication Efficient Secret Sharing.
IEEE Trans. Inf. Theory, 2016

Asymmetric Error Correction and Flash-Memory Rewriting Using Polar Codes.
IEEE Trans. Inf. Theory, 2016

Tight Network Topology Dependent Bounds on Rounds of Communication.
Electron. Colloquium Comput. Complex., 2016

The Unbounded Benefit of Encoder Cooperation for the $k$-User MAC (Extended Version).
CoRR, 2016

Can Negligible Cooperation Increase Network Reliability? (Extended Version).
CoRR, 2016

The benefit of a 1-bit jump-start, and the necessity of stochastic encoding, in jamming channels.
CoRR, 2016

On tightness of an entropic region outer bound for network coding and the edge removal property.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Can negligible cooperation increase network reliability?
Proceedings of the IEEE International Symposium on Information Theory, 2016

A characterization of the capacity region for network coding with dependent sources.
Proceedings of the IEEE International Symposium on Information Theory, 2016

A bit of delay is sufficient and stochastic encoding is necessary to overcome online adversarial erasures.
Proceedings of the IEEE International Symposium on Information Theory, 2016

On the Capacity Advantage of a Single Bit.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

2015
A Characterization of the Number of Subsequences Obtained via the Deletion Channel.
IEEE Trans. Inf. Theory, 2015

Coded Cooperative Data Exchange Problem for General Topologies.
IEEE Trans. Inf. Theory, 2015

An Equivalence Between Network Coding and Index Coding.
IEEE Trans. Inf. Theory, 2015

The Multivariate Covering Lemma and its Converse.
CoRR, 2015

On the Cost and Benefit of Cooperation (Extended Version).
CoRR, 2015

A Characterization of the Capacity of Online (causal) Binary Channels.
Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, 2015

On the fundamental limits of caching in combination networks.
Proceedings of the 16th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2015

On an equivalence of the reduction of k-unicast to 2-unicast capacity and the edge removal property.
Proceedings of the IEEE International Symposium on Information Theory, 2015

On the cost and benefit of cooperation.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Coding for the ℓ∞-limited permutation channel.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Connecting multiple-unicast and network error correction: Reduction and unachievability.
Proceedings of the IEEE International Symposium on Information Theory, 2015

2014
Network Codes Resilient to Jamming and Eavesdropping.
IEEE/ACM Trans. Netw., 2014

On the Power of Cooperation: Can a Little Help a Lot? (Extended Version).
CoRR, 2014

Is there a canonical network for network information theory?
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

Linear capacity equivalence between multiple multicast and multiple unicast.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Graph theory versus minimum rank for index coding.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

On the power of cooperation: Can a little help a lot?
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Reverse edge cut-set bounds for secure network coding.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Polar coding for noisy write-once memories.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Single-source/sink network error correction is as hard as multiple-unicast.
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

2013
Trajectory Codes for Flash Memory.
IEEE Trans. Inf. Theory, 2013

Generalized Gray Codes for Local Rank Modulation.
IEEE Trans. Inf. Theory, 2013

Upper Bounds on the Capacity of Binary Channels With Causal Adversaries.
IEEE Trans. Inf. Theory, 2013

Codes Against Online Adversaries: Large Alphabets.
IEEE Trans. Inf. Theory, 2013

Communicating the Sum of Sources Over a Network.
IEEE J. Sel. Areas Commun., 2013

Zero vs. epsilon Error in Interference Channels.
CoRR, 2013

On secure network coding with uniform wiretap sets.
Proceedings of the International Symposium on Network Coding, 2013

Routing for security in networks with adversarial nodes.
Proceedings of the International Symposium on Network Coding, 2013

Zero vs. ε error in interference channels.
Proceedings of the 2013 IEEE Information Theory Workshop, 2013

Outer bounds and a functional study of the edge removal problem.
Proceedings of the 2013 IEEE Information Theory Workshop, 2013

Error correcting code for flash memories.
Proceedings of the 2013 Information Theory and Applications Workshop, 2013

Sequence reconstruction for Grassmann graphs and permutations.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Information-theoretic study of voting systems.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

On a capacity equivalence between network and index coding and the edge removal problem.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Local graph coloring and index coding.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Joint rewriting and error correction in write-once memories.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

On a capacity equivalence between multiple multicast and multiple unicast.
Proceedings of the 51st Annual Allerton Conference on Communication, 2013

2012
Edge distribution in generalized graph products
CoRR, 2012

f-Sensitivity Distance Oracles and Routing Schemes.
Algorithmica, 2012

Source coding for dependent sources.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012

On linear index coding for random graphs.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Improved upper bounds on the capacity of binary channels with causal adversaries.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

2011
On the Hardness of Approximating the Network Coding Capacity.
IEEE Trans. Inf. Theory, 2011

Constant-Weight Gray Codes for Local Rank Modulation.
IEEE Trans. Inf. Theory, 2011

A unified framework for approximating and clustering data.
Proceedings of the 43rd ACM Symposium on Theory of Computing, 2011

Beating the Gilbert-Varshamov bound for online channels.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

On the complementary Index Coding problem.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Index coding with outerplanar side information.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Finding Sparse Solutions for the Index Coding Problem.
Proceedings of the Global Communications Conference, 2011

Network coding: Is zero error always possible?
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

2010
Clustering lines in high-dimensional space: Classification of incomplete data.
ACM Trans. Algorithms, 2010

Approximating Maximum Subgraphs without Short Cycles.
SIAM J. Discret. Math., 2010

Fault Tolerant Spanners for General Graphs.
SIAM J. Comput., 2010

Realtime Classification for Encrypted Traffic.
Proceedings of the Experimental Algorithms, 9th International Symposium, 2010

Universal epsilon-approximators for Integrals.
Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms, 2010

Communicating the sum of sources in a 3-sources/3-terminals network; revisited.
Proceedings of the IEEE International Symposium on Information Theory, 2010

Data movement and aggregation in flash memories.
Proceedings of the IEEE International Symposium on Information Theory, 2010

Coding against delayed adversaries.
Proceedings of the IEEE International Symposium on Information Theory, 2010

One-shot capacity of discrete channels.
Proceedings of the IEEE International Symposium on Information Theory, 2010

<i>f</i>-Sensitivity Distance Oracles and Routing Schemes.
Proceedings of the Algorithms, 2010

2009
Network Coding: A Computational Perspective.
IEEE Trans. Inf. Theory, 2009

Contraction and Expansion of Convex Sets.
Discret. Comput. Geom., 2009

The Dense k Subgraph problem
CoRR, 2009

Communicating the sum of sources in a 3-sources/3-terminals network.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Binary causal-adversary channels.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Universal rewriting in constrained memories.
Proceedings of the IEEE International Symposium on Information Theory, 2009

On the multiple unicast network coding, conjecture.
Proceedings of the 47th Annual Allerton Conference on Communication, 2009

Data movement in flash memories.
Proceedings of the 47th Annual Allerton Conference on Communication, 2009

Codes against online adversaries.
Proceedings of the 47th Annual Allerton Conference on Communication, 2009

2008
Graph Coloring.
Proceedings of the Encyclopedia of Algorithms - 2008 Edition, 2008

Optimal Universal Schedules for Discrete Broadcast.
IEEE Trans. Inf. Theory, 2008

Oblivious Communication Channels and Their Capacity.
IEEE Trans. Inf. Theory, 2008

Resilient Network Coding in the Presence of Byzantine Adversaries.
IEEE Trans. Inf. Theory, 2008

Analysis of Incomplete Data and an Intrinsic-Dimension Helly Theorem.
Discret. Comput. Geom., 2008

"Real" Slepian-Wolf Codes
CoRR, 2008

"Real" Slepian-Wolf codes.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Adversarial models and resilient schemes for network coding.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

2007
The multi-multiway cut problem.
Theor. Comput. Sci., 2007

Distributed broadcasting and mapping protocols in directed anonymous networks.
Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, 2007

Resilient network codes in the presence of eavesdropping Byzantine adversaries.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Resilient Network Coding in the Presence of Byzantine Adversaries.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

2006
The encoding complexity of network coding.
IEEE Trans. Inf. Theory, 2006

The RPR<sup>2</sup> rounding technique for semidefinite programs.
J. Algorithms, 2006

Oblivious channels.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Approximation Algorithms for Graph Homomorphism Problems.
Proceedings of the Approximation, 2006

2005
Staleness vs. waiting time in universal discrete broadcast.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

Correction of adversarial errors in networks.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

2004
Graphs with Tiny Vector Chromatic Numbers and Huge Chromatic Numbers.
SIAM J. Comput., 2004

Private Codes or Succinct Random Codes That Are (Almost) Perfect.
Proceedings of the 45th Symposium on Foundations of Computer Science (FOCS 2004), 2004

2003
Testing the independence number of hypergraphs
Electron. Colloquium Comput. Complex., 2003

The ROBDD Size of Simple CNF Formulas.
Proceedings of the Correct Hardware Design and Verification Methods, 2003

2001
Approximation Algorithms for Maximization Problems Arising in Graph Partitioning.
J. Algorithms, 2001

A note on approximating Max-Bisection on regular graphs.
Inf. Process. Lett., 2001

2000
Improved Approximation of MAX-CUT on Graphs of Bounded Degree
Electron. Colloquium Comput. Complex., 2000

On the hardness of approximating <i>N P</i> witnesses.
Proceedings of the Approximation Algorithms for Combinatorial Optimization, 2000


  Loading...