• No results found

Information Theory (Mathematics)

Cores of Cooperative Games in Information Theory

Cores of Cooperative Games in Information Theory

... game theory in communications, although with different emphases and applications in ...network information theory, distributed inference, and robust ...

12

Information Theory and Knowledge Gathering

Information Theory and Knowledge Gathering

... statistics, information theory and economic decision processes forced me pass down this dangerous ...for information based on the needs of the communication engineers at Bell Telephone Labs and thus ...

36

Unification of quantum information theory

Unification of quantum information theory

... non theory and the unification of all of noiseless quantum Shannon ...quantum information theory: sharing entangled states between a sender and a ...quantum information theory and give ...

82

On a Functional Equation Related to Information Theory

On a Functional Equation Related to Information Theory

... The main aim of this paper is to obtain the general solutions of the functional equation (1.3) without imposing any regularity condition on the mappings appearing in it. To do so, the general solutions of the functional ...

15

Frequency Value Grammar and Information Theory

Frequency Value Grammar and Information Theory

... calculations relying on one way forward n-grams first utilized by Shannon (1993) and later adopted by others does not represent the upper-bound. This is an important point since using only the Shannon one way forward ...

15

Entropy Region and Network Information Theory

Entropy Region and Network Information Theory

... multiuser information theory problems are still ...network information theory problems by studying the capacity region of networks through the entropy ...

259

Complexity over Uncertainty in Generalized Representational
Information Theory (GRIT): A Structure-Sensitive General
Theory of Information

Complexity over Uncertainty in Generalized Representational Information Theory (GRIT): A Structure-Sensitive General Theory of Information

... no theory, until CIT and GIST, has been able to accurately predict the very robust orderings of as many category structure families (84 in total; over 5000 sets of objects ranging in size from one to ...

30

Quantum Fisher Information: Theory and Applications

Quantum Fisher Information: Theory and Applications

... Fisher Information. Fisher Information, in fact, is defined as a physical criterion, while providing some very interesting results in solving problems related to some large ...Physical Information ...

15

Probabilistic Methods In Information Theory

Probabilistic Methods In Information Theory

... communication theory, just to name a ...of information conveyed by the message increases as the amount of uncertainty as to what message actually will be produced becomes greater ...of information ...

48

Information Theory and Stock Market

Information Theory and Stock Market

... Investing on a stock market is one of the ways that people let their money work for them. There are many kinds of stock investing. A popular one is investing on mutual funds. The mutual funds are operated by a ...

10

Generalization of the Levinson inequality with applications to information theory

Generalization of the Levinson inequality with applications to information theory

... The presented work is organized as follows: in Sect. 2, Levinson’s inequality for the 3- convex function is generalized by using two Green functions defined by (10) and (12). In Sect. 3, Čebyšev-, Grüss- and ...

18

New Prospects for Information Theory in Arts Research

New Prospects for Information Theory in Arts Research

... of Information Theory is a method of quantifying ...communicate information efficiently through a channel of limited capacity in the presence of ...the theory is that the quantity of ...

13

Information theory of firm

Information theory of firm

... the information theory of firm, introduces the concept of firm as an operating system, which controls the firm’s operation by the means of the information resources processing, in an analogy with the ...

186

Introduction to Quantum Logical Information Theory: Talk

Introduction to Quantum Logical Information Theory: Talk

... of information-as-distinctions generalizes to quantum information ...of information. ...And we ought to develop a theory of information which generalizes the theory of ...

8

Information Theory Model for Radiation

Information Theory Model for Radiation

... An Information Theory Radiation Model (ITRM) for radiation emitted by a black body passing through a scat- tering medium is ...mation Theory was used to derive this ...the Information was ...

7

An Information Theory of Language (Digital Linguistics)

An Information Theory of Language (Digital Linguistics)

... linguistic information is available in interactive electronic ...linguistic information, which can be immediately accessed, downloaded or converted into speech ...

14

Relating Thermodynamics to Information Theory: The Equality of Free Energy and Mutual Information

Relating Thermodynamics to Information Theory: The Equality of Free Energy and Mutual Information

... asymptotic limit of long times, we prove that every component of this linear operator vanishes; thus, asymptotically, the reecaled free energy and the rereferenced mutual information bec[r] ...

97

Consumer Behaviour and Asymmetric Information Theory

Consumer Behaviour and Asymmetric Information Theory

... Regarding to the fact that all sellers try to persuade consumers that they offer the equal (i.e. best) quality and consumers cannot recognize differences, the market will form the uniform price that will correspond to ...

7

Some background on information theory

Some background on information theory

... quanta are photons. In the brain, quantization abounds: most neurons do not generate continuous analog volt- ages but rather communicate with one another through stereotyped pulses or spikes, and even if the voltages ...

18

Algorithmic  Information  Theory  for  Obfuscation  Security

Algorithmic Information Theory for Obfuscation Security

... We now proceed to show that it is possible to achieve obfuscation security according to our defi- nitions, but restricted to a passive adversary, that is, one that does not realize transformations over the in- tercepted ...

12

Show all 10000 documents...

Related subjects