• No results found

optimal entropy-constrained scalar quantizers

Entropy Density and Mismatch in High-Rate Scalar Quantization with Rényi Entropy Constraint

Entropy Density and Mismatch in High-Rate Scalar Quantization with Rényi Entropy Constraint

... R´enyi entropy constraint of order α ∈ (0, ...(R´enyi) entropy-constrained quantization since (near) optimal quantizers can have an arbitrarily large number of levels in any bounded ...

12

Entropy-constrained scalar quantization with a lossy-compressed bit

Entropy-constrained scalar quantization with a lossy-compressed bit

... (2)—uniform quantizers are asymptotically optimal as the allowed distortion D ...the scalar uniform quantizer—reduces the gap to the rate distortion function of the source below Equation ...the ...

12

Low-resolution scalar quantization for Gaussian sources and squared error

Low-resolution scalar quantization for Gaussian sources and squared error

... of entropy-constrained scalar quantization in the low-rate ...output entropy of any scalar quantizer with mean- squared error D or ...the optimal rate-distortion per- formanceof ...

9

Error bounds for high-resolution quantization with Rényi - α - entropy constraints

Error bounds for high-resolution quantization with Rényi - α - entropy constraints

... Shannon entropy of the ...designing entropy-constrained scalar quantizers for the exponential and Laplace ...if optimal entropy- constrained quantizers ...

16

Risk-Constrained Reinforcement Learning with Percentile Risk Criteria

Risk-Constrained Reinforcement Learning with Percentile Risk Criteria

... In many sequential decision-making problems one is interested in minimizing an expected cumula- tive cost while taking into account risk, i.e., increased awareness of events of small probability and high consequences. ...

51

Papers in Modern Economic Growth Theory

Papers in Modern Economic Growth Theory

... the constrained planner considers individual taxes that are state dependent, that is, they depend on the individual’s current asset and ...on optimal policy will have prescriptions that depend on the ...

275

Algebraic Techniques in Coding Theory: Entropy Vectors, Frames, and Constrained Coding

Algebraic Techniques in Coding Theory: Entropy Vectors, Frames, and Constrained Coding

... The problem of constructing error-correcting codes with constrained encoding has been addressed by a variety of authors. Dau et al. [28–30] considered the problem of finding linear MDS codes with ...

155

Pseudospectral Optimal Control of Active Magnetic Bearing Systems

Pseudospectral Optimal Control of Active Magnetic Bearing Systems

... nonlinear optimal control. Nonlinear optimal control satises any of the desirable constraints and is also suitable for nonlinear systems ...the optimal control method on how the system varies, either ...

7

Privacy  Amplification  with  Asymptotically  Optimal  Entropy  Loss

Privacy Amplification with Asymptotically Optimal Entropy Loss

... To obtain a privacy amplification protocol from an authentication protocol, we follow the approach of [24]. Here we provide a very high-level intuition. Alice uses the authentication protocol to simply authenticate a ...

26

A linear programming approach to constrained nonstationary infinite horizon Markov decision processes

A linear programming approach to constrained nonstationary infinite horizon Markov decision processes

... studied constrained MDPs, as far as we know, alge- braic characterization of extreme points of CILPs that represent constrained MDPs with countably infinite number of states was not studied ...K-randomized ...

23

New approaches to describing admissibility of solutions
          of scalar conservation laws with discontinuous flux*,**

New approaches to describing admissibility of solutions of scalar conservation laws with discontinuous flux*,**

... adapted entropy inequalities or the underlying ...adapted entropy inequalities. As we already know, germs and adapted entropy inequalities are convenient technical tools that permit to assess ...

26

Comparison of PID methods for networked control systems

Comparison of PID methods for networked control systems

... 1) Numerical example: Consider the first order system with time delay process in (2). To determine the values of η, a, K and the PID parameters, a constrained optimisation problem has been solved using fmincon to ...

6

Numerical methods for conservation laws and related equations. Siddhartha Mishra

Numerical methods for conservation laws and related equations. Siddhartha Mishra

... Next, we repeat the experiments with the rarefaction initial data (4.17). The error vs. number of mesh points and error vs. run time is plotted in Figure 4.12 (c) and (d), respectively. The figures show that the Roe ...

99

Robust Path Planning and Feedback Design under Stochastic Uncertainty

Robust Path Planning and Feedback Design under Stochastic Uncertainty

... globally optimal robust path found by RobustNonconvexMain for two different obstacle maps with a maximum probability of failure of ...the optimal robust solution is close to the optimal nonrobust ...

12

The elusive welfare economics of price stability as a monetary policy objective: why New Keynesian central bankers should validate core inflation

The elusive welfare economics of price stability as a monetary policy objective: why New Keynesian central bankers should validate core inflation

... of price setting models) are ad-hoc, in the sense of not being derived as decision rules of purposefully acting agents starting from acceptable primitive assumptions (tastes, tech- nology, endowments, information, ...

74

Foliation by area constrained Willmore spheres near a non degenerate critical point of the scalar curvature

Foliation by area constrained Willmore spheres near a non degenerate critical point of the scalar curvature

... Let us emphasize that all the aforementioned results concern Willmore immersions into the Euclidean space, or equivalently into a round sphere due to the conformal invariance. The literature about Willmore immersions ...

24

Frequency weighted optimal Hankel-norm approximation of scalar linear systems

Frequency weighted optimal Hankel-norm approximation of scalar linear systems

... the optimal Hankel-norm approximation technique to the modified system- The modification is now "undone" by multiplying the resulting approximation by the image of the frequency weighting under the inverse ...

61

Speech Spectral Quantizers for Wideband Speech Coding

Speech Spectral Quantizers for Wideband Speech Coding

... Informal listening tests were conducted, in order to verify the objective results obtained in the previous section. In the test, the 38-bit SNVQ[36,41] scheme was compared to the 41-bit Memoryless SVQ benchmarker. The ...

11

Iterative Solution of Mesh Constrained Optimal Control Problems with Two Level Mesh Approximations of Parabolic State Equation

Iterative Solution of Mesh Constrained Optimal Control Problems with Two Level Mesh Approximations of Parabolic State Equation

... linear-quadratical optimal control problem of a system go- verned by parabolic equation with distributed in right-hand side control and control and state ...the optimal control ...

11

A Review on Transient Stability Constrained Optimal Power Flow

A Review on Transient Stability Constrained Optimal Power Flow

... Second, transient stability constraints are included into the optimal power flow model, which determines a new improved operating condition. Stability analysis is performed again to check that the new operating ...

6

Show all 10000 documents...

Related subjects