نتایج جستجو برای: side information

تعداد نتایج: 1339897  

2003
Aviv Rosenzweig Yossef Steinberg Shlomo Shamai Shitz

We consider an i.i.d. state-dependent channel with partial (rate limited) channel state information (CSI) at the transmitter (CSIT) and full CSI at the receiver (CSIR). The CSIT comprises a non-causal rate limited part, which is communicated by a third party (a genie) over a way-side channel, and may also include outputs of a deterministic scalar quantizer of the state. A single letter expressi...

2009
Emmanuel Prouff Robert P. McEvoy

The use of random permutation tables as a side-channel attack countermeasure was recently proposed by Coron [6]. The countermeasure operates by ensuring that during the execution of an algorithm, each intermediate variable that is handled is in a permuted form described by the random permutation tables. In this paper, we examine the application of this countermeasure to the AES algorithm as des...

1998
Joel Ratsaby Vitaly Maiorov

We set up a theoretical framework for learning from examples and side information which enables us to compute the tradeoo between the sample complexity and information complexity for learning a target function in a Sobolev functional class F. We use the notion of the n th minimal radius of information of Traub et. al. 23] and combine it with VC-theory to deene a new quantity I n;d (F) which mea...

2013
Philip S. Yu Yuchen Zhao

Graph clustering becomes an important problem due to emerging applications involving the web, social networks and bio-informatics. Recently, many such applications generate data in the form of streams. Clustering massive, dynamic graph streams is significantly challenging because of the complex structures of graphs and computational difficulties of continuous data. Meanwhile, a large volume of ...

Journal: :JSW 2013
Xianmin Yu Rangding Wang Diqun Yan

MP3Stego is a typical steganographic tool for MP3 audio, which embeds secret message into MP3 audio according to the parity of the block length. In this work, we present a steganalytic method to attack MP3Stego. The big_values inside information is considered to extract the steganalytic feature. Re-compression calibration has been applied in order to improve the feature's sensitivity. Experimen...

1999
Ingemar J. Cox Matt L. Miller Andrew L. McKellips

Several authors have drawn comparison between embedded signaling or watermarking and communications, especially spread spectrum communications. We examine the similarities and differences between watermarking and traditional communications. Our comparison suggests that watermarking most closely resembles communications with side information at the transmitter and or detector, a configuration or...

Journal: :CoRR 2017
Aditya Modi Nan Jiang Satinder P. Singh Ambuj Tewari

We consider a reinforcement learning (RL) setting in which the agent interacts with a sequence of episodic MDPs. At the start of each episode the agent has access to some side-information or context that determines the dynamics of the MDP for that episode. Our setting is motivated by applications in healthcare where baseline measurements of a patient at the start of a treatment episode form the...

2006
Ali Ghodsi Boushehri

In this thesis, I look at three problems with important applications in data processing. Incorporating side information, provided by the user or derived from data, is a main theme of each of these problems. This thesis makes a number of contributions. The first is a technique for combining different embedding objectives, which is then exploited to incorporate side information expressed in terms...

2017
Dror Baron Anna Ma Deanna Needell Cynthia Rush Tina Woolf

In information theory, side information (SI) is often used to increase the efficiency of communication systems. This work lays the framework for a class of Bayes-optimal signal recovery algorithms referred to as conditional approximate message passing (CAMP) that make use of available SI. CAMP involves a linear inverse problem, where noisy, linear measurements acquire an unknown input vector us...

Journal: :CoRR 2010
Son Hoang Dau Vitaly Skachek Yeow Meng Chee

Security aspects of the Index Coding with Side Information (ICSI) problem are investigated. Building on the results of Bar-Yossef et al. (2006), the properties of linear coding schemes for the ICSI problem are further explored. The notion of weak security, considered by Bhattad and Narayanan (2005) in the context of network coding, is generalized to block security. It is shown that the coding s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید