Results 11 to 20 of about 22,452,588 (375)
Metacognitive Information Theory. [PDF]
The capacity that subjects have to rate confidence in their choices is a form of metacognition, and can be assessed according to bias, sensitivity and efficiency. Rich networks of domain-specific and domain-general regions of the brain are involved in the rating, and are associated with its quality and its use for regulating the processes of thinking ...
Dayan P.
europepmc +6 more sources
INFORMATION THEORY rests on the fundamental observation that information and uncertainty are related (Shannon and Weaver, 1949). Intuitively, a code can be used to send information from one agent (the transmitter) to another (the receiver) or a channel ...
Rongmei Li +3 more
openaire +2 more sources
Information Theory in Game Theory [PDF]
Information theory, as the mathematics of communication and storage of information, and game theory, as the mathematics of adversarial and cooperative strategic behaviour, are each successful fields of research on their own. [...]
MHR Khouzani, Pasquale Malacaria
doaj +4 more sources
Quantum Differential Privacy: An Information Theory Perspective [PDF]
Differential privacy has been an exceptionally successful concept when it comes to providing provable security guarantees for classical computations. More recently, the concept was generalized to quantum computations.
Christoph Hirche +2 more
semanticscholar +1 more source
Information Theory With Kernel Methods [PDF]
We consider the analysis of probability distributions through their associated covariance operators from reproducing kernel Hilbert spaces. We show that the von Neumann entropy and relative entropy of these operators are intimately related to the usual ...
F. Bach
semanticscholar +1 more source
Dataset for file fragment classification of video file formats
Objectives File fragment classification of video file formats is a topic of interest in network forensics. There are some publicly available datasets for file fragments of various file types such as textual, audio, and image file formats.
Narges Sadeghi +2 more
doaj +1 more source
Analysis of tree algorithm for collision resolution [PDF]
For the tree algorithm introduced by [Cap79] and [TsMi78] let $L_N$ denote the expected collision resolution time given the collision multiplicity $N$. If $L(z)$ stands for the Poisson transform of $L_N$, then we show that $L_N - L(N) ≃ 1.29·10^-4 \cos ...
Laszlo Gyorfi, Sándor Gyori
doaj +1 more source
Channel Hardening in Massive MIMO: Model Parameters and Experimental Assessment
Reliability is becoming increasingly important for many applications envisioned for future wireless systems. A technology that could improve reliability in these systems is massive MIMO (Multiple-Input Multiple-Output).
Sara Willhammar +3 more
doaj +1 more source
Stealthy Secret Key Generation
In order to make a warden, Willie, unaware of the existence of meaningful communications, there have been different schemes proposed including covert and stealth communications.
Pin-Hsun Lin +3 more
doaj +1 more source
CNNPRE: A CNN-Based Protocol Reverse Engineering Method
Given the growth in computer networks and Internet usage, the traditional network environment has evolved into a more intricate system. Many applications utilize unknown communication protocols, for which the specification documentation is not available.
Javad Garshasbi, Mehdi Teimouri
doaj +1 more source

