نتایج جستجو برای: rate equivocation
تعداد نتایج: 960563 فیلتر نتایج به سال:
The cognitive interference channel with confidential messages is studied. Similarly to the classical two-user interference channel, the cognitive interference channel consists of two transmitters whose signals interfere at the two receivers. It is assumed that there is a common message source (message 1) known to both transmitters, and an additional independent message source (message 2) known ...
Among the incidental features of Nāgārjuna’s philosophy that have captured my attention over the years, there are two in particular that I wish to discuss in this paper. The first observation is that his philosophical writings seem to have fascinated a large number of modern scholars of Buddhism; this hardly requires demonstration. The second observation is that Nāgārjuna’s writings had relativ...
A polar coding scheme is introduced in this paper for the wire-tap channel. It is shown that the provided scheme achieves the entire rate-equivocation region for the case of symmetric and degraded wire-tap channel, where the weak notion of secrecy is assumed. For the particular case of binary erasure wire-tap channel, an alternative proof is given. The case of general non-degraded wire-tap chan...
Information embedding on actions is a new channel model in which a specific decoder is used to observe the actions taken by the encoder and retrieve part of the message intended for the receiver. We revisit this model and consider a different scenario where a secrecy constraint is imposed. By adding a wiretapper in the model, we aim to send the confidential message to the receiver and keep it s...
We group the existing variants of the familiar set-theoretical and truththeoretical paradoxes into two classes: connective paradoxes, which can in principle be ascribed to the presence of a contracting connective of some sort, and structural paradoxes, where at most the faulty use of a structural inference rule can possibly be blamed. We impute the former to an equivocation over the meaning of ...
Paul, L. A. (2014. Transformative Experience. Oxford University Press) argues that one cannot rationally decide whether to have a transformative experience by trying form judgments, in advance, about (i) what it would feel like experience, and (ii) the subjective value of having such an experience. The problem is if you haven’t had then know like, need assess its value. However, earlier work I ...
Abstract— A generalized multiple access channel (GMAC) with one confidential message set is studied, where two users (users 1 and 2) attempt to transmit common information to a destination, and user 1 also has confidential information intended for the destination. Moreover, user 1 wishes to keep its confidential information as secret as possible from user 2. A deterministic GMAC is first studie...
We consider a Shannon cipher system for memoryless sources, in which distortion is allowed at the legitimate decoder. The source is compressed using a rate distortion code secured by a shared key, which satisfies a constraint on the compression rate, as well as a constraint on the exponential rate of the excess-distortion probability at the legitimate decoder. Secrecy is measured by the exponen...
The problem of hiding data routes in a wireless network from eavesdroppers is considered. Using Shannon’s equivocation as a measure of anonymity of routes, scheduling and relaying protocols are designed to guarantee anonymity. A duality of this problem to information-theoretic rate-distortion is used to maximize network throughput for any specified level of anonymity. The achievability of this ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید