Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:3499280

zbMath1154.94001MaRDI QIDQ3499280

Raymond W. Yeung

Publication date: 29 May 2008


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (51)

Information anatomy of stochastic equilibriaOn Slepian-Wolf theorem with interactionImproving the linear programming technique in the search for lower bounds in secret sharingNetwork encoding complexity: exact values, bounds, and inequalitiesInconsistency-tolerant reasoning over linear probabilistic knowledge basesTwo properties of prefix codes and uniquely decodable codesTsallis mutual information for document classificationSmoothed noise contrastive mutual information neural estimationComputational mechanics of input-output processes: structured transformations and the \(\epsilon\)-transducerEstimations of \(f\)- and Rényi divergences by using a cyclic refinement of the Jensen's inequalityEntropy and compression: a simple proof of an inequality of Khinchin-Ornstein-ShieldsComputation of channel capacity based on self-concordant functionsGeometry of EM and related iterative algorithmsSpanoids---An Abstraction of Spanning Structures, and a Barrier for LCCsInformation-theoretic interpretation of quantum formalismThe entropic approach to causal correlationsOptimal Control and Signaling Strategies of Control-Coding Capacity of General Decision Models: Applications to Gaussian Models and Decentralized StrategiesEXISTENCE OF -ANALOGS OF STEINER SYSTEMSOn the Inequalities of Projected Volumes and the Constructible RegionNeural network coding of natural images with applications to pure mathematicsAn efficient homomorphic aggregate signature scheme based on latticeCommon information, matroid representation, and secret sharing for matroid portsUnnamed ItemPartial monotonicity of entropy revisitedComputational tools for solving a marginal problem with applications in Bell non-locality and causal modelingExact decoding probability of random linear network coding for combinatorial networksSecure multi-source network coding scheme with lattice signatureCausal structures from entropic information: geometry and novel scenariosSecurity risk during the transient in a key exchange protocol using random signals and feedbackInfinite Shannon entropySecret-Sharing Schemes: A SurveyExtending Swerdlow's hypothesis: statistical models of mitochondrial deterioration and agingNondestructive estimation of the eigenvectors of mixed stateEnvironmental induction of neurodevelopmental disordersOn Slepian–Wolf Theorem with InteractionSequential Convex Programming for Computing Information-Theoretic Minimal Partitions: Nonconvex Nonsmooth OptimizationA polynomial-time fragment of epistemic probabilistic argumentationUnique information via dependency constraintsNetwork coding in undirected graphs is either very helpful or not helpful at allInformation of interactions in complex systemsInteraction information: linear and nonlinear interpretationsDimensionally sharp inequalities for the linear entropyIdentifying functional thermodynamics in autonomous Maxwellian ratchetsRobust entanglement distribution via quantum network codingContribution of Frantisek Matus to the research on conditional independenceViolations of the Ingleton inequality and revising the four-atom conjectureCharacterisation of conditional independence structures for polymatroids using vanishing setsOn typical encodings of multivariate ergodic sourcesTropical probability theory and an application to the entropic coneNetwork information flowProbabilistic Reasoning in the Description Logic $$\mathcal {ALCP}$$ with the Principle of Maximum Entropy




This page was built for publication: