Results 11 to 20 of about 16,404,119 (364)
Stealthy Secret Key Generation
In order to make a warden, Willie, unaware of the existence of meaningful communications, there have been different schemes proposed including covert and stealth communications.
Pin-Hsun Lin+3 more
doaj +1 more source
Information Theory in Neuroscience [PDF]
This is the Editorial article summarizing the scope and contents of the Special Issue, Information Theory in Neuroscience.
Eugenio Piasini, Stefano Panzeri
openaire +5 more sources
Constructor theory of information [PDF]
We propose a theory of information expressed solely in terms of which transformations of physical systems are possible and which are impossible—i.e. in constructor-theoretic terms. It includes conjectured, exact laws of physics expressing the regularities that allow information to be physically instantiated.
David Deutsch, Chiara Marletto
openaire +5 more sources
Group testing: an information theory perspective [PDF]
The group testing problem concerns discovering a small number of defective items within a large population by performing tests on pools of items. A test is positive if the pool contains at least one defective, and negative if it contains no defectives ...
Matthew Aldridge+2 more
semanticscholar +1 more source
CNNPRE: A CNN-Based Protocol Reverse Engineering Method
Given the growth in computer networks and Internet usage, the traditional network environment has evolved into a more intricate system. Many applications utilize unknown communication protocols, for which the specification documentation is not available.
Javad Garshasbi, Mehdi Teimouri
doaj +1 more source
In visible light communication systems, the ability to suppress interference caused by other light sources is a major benefit towards performance improvements.
Adrian Krohn+4 more
doaj +1 more source
Application of information theory in systems biology
Over recent years, new light has been shed on aspects of information processing in cells. The quantification of information, as described by Shannon’s information theory, is a basic and powerful tool that can be applied to various fields, such as ...
Shinsuke Uda
semanticscholar +1 more source
Structured channel covariance estimation from limited samples for large antenna arrays
In massive multiuser multiple antenna systems, the knowledge of the users’ channel covariance matrix is crucial for minimum mean square error channel estimation in the uplink and it plays an important role in several multiuser beamforming schemes in the ...
Tianyu Yang+3 more
doaj +1 more source
Fundamental and speculative components of the cryptocurrency pricing dynamics
The driving forces behind cryptoassets’ price dynamics are often perceived as being dominated by speculative factors and inherent bubble-bust episodes. Fundamental components are believed to have a weak, if any, role in the price-formation process.
Jiri Kukacka, Ladislav Kristoufek
doaj +1 more source
Optical channel decorrelation is a key aspect in designing a multi-user visible light communication system. As light-emitting diodes (LEDs) are commonly used for illumination and data transmission in such a system simultaneously, the interference between
Adrian Krohn+2 more
doaj +1 more source