• No results found

non-information theoretic approach

An Information Theoretic Approach to Estimating Willingness To Pay for River Recreation Site Attributes

An Information Theoretic Approach to Estimating Willingness To Pay for River Recreation Site Attributes

... an information theoretic econometric approach to analyzing the willingness to pay for river recreation site attributes, using a new ML-MPD binary response estimator for dichotomous CV ...or ...

34

An information theoretic approach for knowledge representation using Petri nets

An information theoretic approach for knowledge representation using Petri nets

... a non-negative value interpreted as its relative plausibility, as will be discussed in the next ...of information about ...subtracting information about the state variable ...

8

Subgraph Covers- An Information Theoretic Approach to Motif Analysis in Networks

Subgraph Covers- An Information Theoretic Approach to Motif Analysis in Networks

... The amount by which G can be compressed is a measure how non-random G is. Therefore, the motifs contained in the Σ-optimal cover correspond to the motifs with respect to which the graph maximally deviates from a ...

133

Quaternion Information Theoretic Learning Adaptive Algorithms for Nonlinear Adaptive

Quaternion Information Theoretic Learning Adaptive Algorithms for Nonlinear Adaptive

... SIG approach is applied to quaternion adaptive filtering for three different ...or non-Gaussian signal and noise environments due to ITL ...quaternion non-Gaussian signal and noise environments ...

181

On the Common Structure of the Primitive Ontology Approach and the Information-Theoretic Interpretation of Quantum Theory

On the Common Structure of the Primitive Ontology Approach and the Information-Theoretic Interpretation of Quantum Theory

... quantum information-theoretic interpretation of quantum theory (QIT) was fully formulated by Bub and Pitowsky [9], but had its origins in earlier work of Clifton, Bub, and Halvorson [10], Bub [7] and [8], ...

15

An information-theoretic, all-scales approach to comparing networks

An information-theoretic, all-scales approach to comparing networks

... C. elegans connectome The network taken from the nervous system of the nematode C. elegans. This multiplex network consists of 279 nodes representing non-pharyngeal neurons and 5,863 links representing electrical ...

15

Predicting the Profit Potential of a Microeconomic Process: An Information Theoretic/Thermodynamic Approach

Predicting the Profit Potential of a Microeconomic Process: An Information Theoretic/Thermodynamic Approach

... The major intuitive insight that waste elimination by process improvement drove faster lead time was due to Henry Ford. The Model T originally sold for $850 and took 14 days to produce. Process improvement eliminated ...

18

Categorical Database Information-Theoretic Approach of Outlier Detection Model

Categorical Database Information-Theoretic Approach of Outlier Detection Model

... ABSTRACT: Outlier detection system discovers the novel or rare events, anomalies, vicious actions, exceptional phenomena. It is mandatory to find these anomalies in data mining because the presence of these objects ...

8

Predicting stock market movements using network science: an information theoretic approach

Predicting stock market movements using network science: an information theoretic approach

... mutual information as our network link weights. The mutual information mea- sures the amount of information of a variable given the information of another variable, and is better at capturing ...

14

An Information Theoretic Approach to Automatic Evaluation of Summaries

An Information Theoretic Approach to Automatic Evaluation of Summaries

... Proceedings of the Human Language Technology Conference of the North American Chapter of the ACL, pages 463–470, New York, June 2006.c©2006 Association for Computational Linguistics.[r] ...

8

Robust Information-Theoretic Private Information Retrieval

Robust Information-Theoretic Private Information Retrieval

... Private Information Retrieval (PIR) protocol allows a user to retrieve a data item of its choice from a database, such that the servers storing the database do not gain information on the identity of the ...

14

System Theoretic Approach To Cybersecurity

System Theoretic Approach To Cybersecurity

... Safety critical entities can include encryption technology,. hardware components (AP, servers, etc.), data[r] ...

58

Long  Term  Confidentiality:  a  Survey

Long Term Confidentiality: a Survey

... and non- orthogonal to the states of the other ...case, information reconciliation and privacy amplification (over the classical channel) are employed to agree on a highly secure ...

21

An Information Theoretic Approach for Energy Efficient Collaborative Tracking in Wireless Sensor Networks

An Information Theoretic Approach for Energy Efficient Collaborative Tracking in Wireless Sensor Networks

... record information about presence of the objects being detected by the ...network information, and reconfiguration and maintenance of a convoy tree incurs considerable computational and communication ...

14

What happens in crashes? a non equilibrium, value theoretic approach to liquidity preference

What happens in crashes? a non equilibrium, value theoretic approach to liquidity preference

... Speculative profits, liquidity preference, and the need for a concept of value The rate of return mK of any asset depends on the money of account m.. Changes in price therefore offer a r[r] ...

14

How To Predict A Person'S Behavior

How To Predict A Person'S Behavior

... The main disadvantage of the POMDP approach is that, as seen above, estimating the state assumes perfect knowledge of the underlying model. Al- gorithms that try to learn the dynamics require, at minimum, an ...

11

Information Theoretic Graph Kernels

Information Theoretic Graph Kernels

... With this scenario, Kashima et al. [22] have proposed a random walk kernel by com- paring pairs of isomorphic random walks in a pair of graphs. The main drawback of the random walk kernel is the notorious tottering ...

159

An information-theoretic treatment of quantum dichotomies

An information-theoretic treatment of quantum dichotomies

... The remainder of the paper is structured as follows. After introducing the relevant one-shot divergences and their properties in Section 2, we establish our main technical re- sults in Section 3. First, in Section 3.1 we ...

18

An Information-Theoretic Analysis of Thompson Sampling

An Information-Theoretic Analysis of Thompson Sampling

... Agrawal and Goyal (2013a) provided the first “distribution independent” bound for Thompson sampling. They showed that when Thompson sampling is executed with an independent uniform prior and rewards are binary the ...

30

Nonextensive Information Theoretic Kernels on Measures

Nonextensive Information Theoretic Kernels on Measures

... classic information theoretic quantities, such as (Shannon’s) mutual information and the Jensen- Shannon (JS) ...nonextensive information theoretic kernels on probability measures, ...

41

Show all 10000 documents...

Related subjects