نتایج جستجو برای: rate equivocation

تعداد نتایج: 960563  

Journal: :IEEE Trans. Information Theory 1986
Hirosuke Yamamoto

permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. 387 Ahsfruct-The source coding problem is considered for secret sharing communication systems (SSCs's) with two or three chann...

Journal: :Trans. Emerging Telecommunications Technologies 2016
Hamid G. Bafghi Babak Seyfe Mahtab Mirmohseni Mohammad Reza Aref

The secrecy problem in the state-dependent cognitive interference channel is considered in this paper. In our model, there are a primary and a secondary (cognitive) transmitter-receiver pairs, in which the cognitive transmitter has the message of the primary one as side information. In addition, the channel is affected by a channel state sequence which is estimated partially at the cognitive tr...

Journal: :IACR Cryptology ePrint Archive 2003
Andreas J. Winter Anderson C. A. Nascimento Hideki Imai

In extension of the bit commitment task and following work initiated by Crépeau and Kilian, we introduce and solve the problem of characterising the optimal rate at which a discrete memoryless channel can be used for bit commitment. It turns out that the answer is very intuitive: it is the maximum equivocation of the channel (after removing trivial redundancy), even when unlimited noiseless bid...

Journal: :IEEE Trans. Information Theory 1979
Rolf J. Blom

The equlvocatloo or the key ror a simple substitution cipbcr is upper and lower bounded, wben the message source is memoryless. lbe bounds are sbown to be expooentlally tight. lbe results are compared with randoro cipbering. lt is observed that tbe exponentlsJ bebavior or tbe equivocatlon or the key is DO( determioed by tbe redundancy in tbe message source, but by tbc symbol probabilities wbicb...

Journal: :IEEE Transactions on Information Theory 1984

2006
Bin Dai Yuan Luo

The wiretap channel put forward by Wyner for many years. In this paper, we consider the situation that the wiretapper can not only view the channel output via a second noisy channel, but also can get some side information about the codeword that transmitted in the main noisy channel. The designer tries to build the encoder-decoder in such a way as to maximize the transmission rate R, and the eq...

2012
Thomas Forster

An argument often given for adopting the Axiom of Choice as an axiom is that it has a lot of obviously true consequences. This looks like a legitimate application of the practice of Inference to the Best Explanation. However, the standard examples of obvious-truths-following-from-AC all turn out, on closer inspection, to involve a fallacy of equivocation.

2015
GEORGE BEALER Mark McCullagh

The paper, which begins with a brief summary of my anti-functionalist ‘Argument from Self-consciousness’, has two main goals. First, to show that this argument is not guilty of a Fregean equivocation regarding embedded mental predicates, as has been suggested by Mark McCullagh and others. Second, to show the argument cannot be avoided by weakening the psychological theory upon which reductive f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید