Sunday, June 26 |
Time |
Room AB |
Room U5 |
Room U6 |
Room U7 |
Room U9 |
Room U356 |
Room U358 |
Room U4 |
Room U1 |
Room U3 |
Room U8 |
09:30-12:30 |
|
|
|
|
|
|
|
T3: Information-Theoretic Tools for Responsible Machine Learning |
T1: Causal Inference: Past, Present and (maybe) Future |
T2: Advancement in Coding for Privacy and Security in Distributed Systems​ |
|
14:00-16:00 |
|
|
|
|
|
|
|
|
T5: Information Inequalities: Facets of Entropy and Automated Reasoning by Optimization |
T4: Universal Decoding by Guessing Random Additive Noise Decoding - GRAND |
|
16:00-17:00 |
|
|
|
|
|
|
|
T6: Model-based Deep Learning |
|
17:00-19:00 |
|
|
|
|
|
|
|
|
|
|
19:00-21:00 |
Welcome Reception (Espoo cultural center) |
Monday, June 27 |
Time |
Room AB |
Room U5 |
Room U6 |
Room U7 |
Room U9 |
Room U356 |
Room U358 |
Room U4 |
Room U1 |
Room U3 |
Room U8 |
08:30-09:30 |
P1: Plenary: Yonina Eldar |
|
|
|
|
|
|
|
|
|
|
09:50-11:10 |
|
A.1: Coding Theory, Decoding I |
B.1: Network Coding I |
C.1: DNA and Data Storage I |
D.1: Source Coding and Data Compression I |
|
F.1: Quantum I |
G.1: Distributed Learning I |
H.1: Fundamentals of Machine Learning I |
I.1: Age of Information I |
J.1: Probability and Entropy I |
11:40-13:00 |
|
A.2: Coding Theory, Decoding II |
|
C.2: DNA and Data Storage II |
D.2: Source Coding and Data Compression II |
|
F.2: Quantum II |
|
H.2: Fundamentals of Machine Learning II |
I.2: Covert Systems |
J.2: Probability and Entropy II |
14:30-15:50 |
|
A.3: Sequences I |
B.3: LDPC I |
C.3: Private Information Retrieval I |
|
|
|
G.3: Optimization and Machine Learning I |
H.3: Statistics and Machine Learning I |
I.3: Learning and Detection for Communications |
J.3: Feedback Capacity |
16:20-18:00 |
|
A.4: Sequences II |
B.4: LDPC II |
C.4: Coded Computing IV |
D.4: Rate Distortion |
E.4: Privacy I |
F.4: Cryptography I |
G.4: Optimization and Machine Learning II |
H.4: Statistics and Machine Learning II |
I.4: Wireless Networks |
J.4: Algorithmic Approaches to Information Inequalities |
18:00-19:30 |
WITHITS (Hall A) |
|
|
|
|
|
|
|
|
|
|
Tuesday, June 28 |
Time |
Room AB |
Room U5 |
Room U6 |
Room U7 |
Room U9 |
Room U356 |
Room U358 |
Room U4 |
Room U1 |
Room U3 |
Room U8 |
08:30-09:30 |
P2: Plenary: Michael Jordan |
|
|
|
|
|
|
|
|
|
|
09:50-11:10 |
|
A.5: Randomness and Algorithms |
B.5: Insertions and Deletions I |
C.5: Coded Computing I |
|
E.5: Information Theoretic Security I |
|
G.5: Group Testing I |
H.5: Estimation I |
I.5: New Directions in Age of Information |
J.5: Information Inequalities |
11:40-13:00 |
|
A.6: Alex Vardy Special Session |
B.6: Insertions and Deletions II |
C.6: Coded Computing II |
|
E.6: Information Theoretic Security II |
F.6: Quantum III |
G.6: Group Testing II |
H.6: Estimation II |
I.6: Topics in Coded Caching I |
J.6: Broadcast Channels |
14:30-15:50 |
|
A.7: Graphs and Codes |
B.7: Message Passing I |
C.7: Coded Computing III |
|
E.7: Information Theoretic Security III |
|
G.7: Over-the-Air Federated Learning |
H.7: Estimation III |
I.7: Topics in Coded Caching II |
J.7: Capacity, Error Exponents and Reliability I |
16:20-18:00 |
|
A.8: Constrained Coding |
B.8: Message Passing II |
C.8: Private or Secure Coded Caching |
D.8: Multi-User Source Coding |
|
F.8: Cryptography II |
G.8: Distributed Learning II |
H.8: Fundamentals of Machine Learning III |
I.8: Multi-Antenna Coded Caching |
J.8: Capacity, Error Exponents and Reliability II |
18:00-19:30 |
Awards event |
|
|
|
|
|
|
|
|
|
|
Wednesday, June 29 |
Time |
Room AB |
Room U5 |
Room U6 |
Room U7 |
Room U9 |
Room U356 |
Room U358 |
Room U4 |
Room U1 |
Room U3 |
Room U8 |
08:30-09:30 |
P3: Plenary: Bengt Holmström |
|
|
|
|
|
|
|
|
|
|
09:50-11:10 |
R: Recent Results Poster Session |
A.9: Codes, Graphs and Curves |
B.9: Network Coding II |
|
D.9: Signal Processing I |
E.9: Privacy II |
|
G.9: Bandits I |
H.9: Statistics and Machine Learning III |
I.9: Multi-Access Coded Caching |
J.9: Boolean Functions |
11:40-13:00 |
|
A.10: Reed-Muller Codes |
B.10: GRAND |
C.10: DNA and Data Storage III |
D.10: Signal Processing II |
E.10: Privacy III |
F.10: Quantum IV |
G.10: Bandits II |
H.10: Quickest (Sequential) Change Detection |
I.10: Optical Communications |
J.10: Relay Channels |
Thursday, June 30 |
Time |
Room AB |
Room U5 |
Room U6 |
Room U7 |
Room U9 |
Room U356 |
Room U358 |
Room U4 |
Room U1 |
Room U3 |
Room U8 |
08:30-09:30 |
P4: Shannon Lecture: Raymond Yeung |
|
|
|
|
|
|
|
|
|
|
09:50-11:00 |
|
A.11: Coding Theory I |
B.11: Permutation Channels and Codes |
|
|
E.11: Privacy IV |
|
G.11: Fairness and Privacy in Federated Learning |
H.11: Detection I |
I.11: Age of Information II |
J.11: Finite Blocklengths |
11:40-13:00 |
|
A.12: Coding Theory II |
B.12: Polar Coding I |
C.12: MDS Codes and Distributed Storage I |
|
E.12: Privacy V |
F.12: Quantum V |
G.12: New Directions in Group Testing |
H.12: Detection II |
I.12: MIMO I |
J.12: Second and Third Order Asymptotics |
14:30-15:50 |
|
A.13: List Decoding I |
B.13: Polar Coding II |
C.13: MDS Codes and Distributed Storage II |
D.13: Signal Processing III |
|
F.13: Quantum VI |
G.13: Machine Learning for Communications and Coding I |
H.13: Bottleneck, Generalization and Leakage |
I.13: MIMO II |
J.13: Capacity I |
16:20-18:00 |
|
A.14: List Decoding II |
B.14: Polar Coding III |
C.14: MDS Codes and Distributed Storage III |
D.14: Signal Processing IV |
E.14: Secret Key |
|
G.14: Machine Learning for Communications and Coding II |
H.14: Distributed Detection and Estimation |
I.14: MIMO III |
J.14: Capacity II |
19:00-22:00 |
Banquet Dinner (Pikku-Finlandia, Helsinki) |
Friday, July 1 |
Time |
Room AB |
Room U5 |
Room U6 |
Room U7 |
Room U9 |
Room U356 |
Room U358 |
Room U4 |
Room U1 |
Room U3 |
Room U8 |
08:30-09:30 |
P5: Plenary: Tsachy Weissman |
|
|
|
|
|
|
|
|
|
|
09:50-11:10 |
|
A.15: Coding Theory, Decoding III |
B.15: Network Coding III |
C.15: Private Information Retrieval II |
|
E.15: Privacy VI |
|
|
|
I.15: Multiple Access I |
J.15: Information Measures I |
11:40-13:00 |
|
A.16: Coding Theory, Decoding IV |
|
C.16: Adversarial Systems |
|
|
F.16: Quantum VII |
G.16: Testing and Estimation |
H.16: Fundamentals of Machine Learning IV |
I.16: Multiple Access II |
J.16: Information Measures II |
14:30-15:50 |
|
A.17: Coding Theory III |
B.17: Coding for Communications |
C.17: MDS Codes and Distributed Storage IV |
D.17: Sparsity |
|
|
|
H.17: Statistics and Machine Learning IV |
I.17: Age of Information III |
J.17: Capacity, Error Exponents and Reliability III |
16:20-17:40 |
|
A.18: Lattice Codes |
B.18: Index Coding |
C.18: MDS Codes and Distributed Storage V |
D.18: Compressive Sensing |
|
|
|
H.18: Hypothesis Testing |
I.18: Joint Coding, Communication and Processing |
J.18: Guessing |