نتایج جستجو برای: rate equivocation

تعداد نتایج: 960563  

Journal: :IBM Journal of Research and Development 1963
Jay Manton Berger Benoit B. Mandelbrot

This paper proposes a new mathematical model to describe the distribution of the occurrence of errors in data transmission on telephone lines. We suggest: a) that the statistics of telephone errors can be described in terms of an error probability depending solely on the time elapsed since the last occurrence of an error; b) that the distribution of inter-error intervals can be well approximate...

2012
Amir reza Fazli Mohammad Eghbali

In this study, information theory is used to provide both theoretical and practical analysis of security offered by watermarking and data hiding techniques based on wavelet transform. In this context, security level is defined as the equivocation of the secret parameters. On the theoretical side, the measure of security is estimated by means of information theory tools for all possible attacks....

Journal: :CoRR 2014
Sudhakar Prasad

The inverse relation between mutual information (MI) and Bayesian error is sharpened by deriving finite sequences of upper and lower bounds on MI in terms of the minimum probability of error (MPE) and related Bayesian quantities. The well known Fano upper bound and Feder-Merhav lower bound on equivocation are tightened by including a succession of posterior probabilities starting at the largest...

1995
Walter Block

In his seminal article, Coase (1960) turned the world of economics upside down. I t might even be said that with one (longish) stroke of the pen, he created the entirely new sub-discipline of Law and Economics; and that he did so out of the ashes of a t least one part of the traditional field as i t stood before his onslaught: that occupied by Pigou (1932). Previously, the view of the professio...

2012
Deborah Mayo Aris Spanos David Cox

The goal of this article is to provide a new clarification and critique of Birnbaum’s (1962) well-known argument purporting to show that principles of sufficiency and (weak) conditionality entail the (strong) likelihood principle. The argument has long been held as a significant result for the foundations of statistics. Not only do all of the familiar frequentist sampling theory notions violate...

Journal: :Medicine, health care, and philosophy 2009
Maël Lemoine

If the healthy and the pathological are not merely judgments qualifiers, but real phenomena, it must be possible to define both of them positively, which, in this context, means as factual contraries. On the other hand, only a privative definition, either of the pathological as 'non-healthy', or of the healthy as 'non-pathological', can rationally circumscribe all possible states of an organism...

Journal: :Entropy 2015
Bin Dai Zheng Ma Linman Yu

In this paper, the general wiretap channel with channel state information (CSI) at the transmitter and noiseless feedback is investigated, where the feedback is from the legitimate receiver to the transmitter, and the CSI is available at the transmitter in a causal or noncausal manner. The capacity-equivocation regions are determined for this model in both causal and noncausal cases, and the re...

2003
Robert F. Hadley

Connectionist-minded philosophers, including Clark and van Gelder, have espoused the merits of viewing hiddenlayer, context-sensitive representations as possessing semantic content, where this content is partially revealed via the representations' position in vector space. In recent work, Bodén and Niklasson have incorporated a variant of this view within their conception of semantic systematic...

Journal: :CoRR 2013
Xun Gong Negar Kiyavash Parv Venkitasubramaniam

Timing side channels in two-user schedulers are studied. When two users share a scheduler, one user may learn the other user’s behavior from patterns of service timings. We measure the information leakage of the resulting timing side channel in schedulers serving a legitimate user and a malicious attacker, using a privacy metric defined as the Shannon equivocation of the user’s job density. We ...

2012
Amir Reza Fazli Mohammad Eghbali Hamid Alinejad-Rokny

This study presents a novel watermarking algorithm for improving the security and robustness of hiding audio data in an image. Multi resolution discrete wavelet transform is used for embedding the audio watermark in an image. In this context, security is quantified from an information theoretic point of view by means of the equivocation and information leakage of the secret parameters. The sele...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید