Proceedings of 1994 IEEE International Symposium on Information Theory最新文献

筛选
英文 中文
On the information rate of perfect secret sharing schemes 论完美秘密共享方案的信息率
Proceedings of 1994 IEEE International Symposium on Information Theory Pub Date : 1995-09-01 DOI: 10.1109/ISIT.1994.395104
M. van Dijk
{"title":"On the information rate of perfect secret sharing schemes","authors":"M. van Dijk","doi":"10.1109/ISIT.1994.395104","DOIUrl":"https://doi.org/10.1109/ISIT.1994.395104","url":null,"abstract":"We present a method to derive information theoretical upper bounds on the information rate and average information rate of perfect secret sharing schemes. One of the applications is that in perfect secret sharing schemes for some access structures the shares need to be impractically large.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123839167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Minimal cryptosystems and defining subliminal-freeness 最小密码系统和定义阈下自由
Proceedings of 1994 IEEE International Symposium on Information Theory Pub Date : 1994-12-01 DOI: 10.1109/ISIT.1994.394671
Y. Desmedt, M. Yung
{"title":"Minimal cryptosystems and defining subliminal-freeness","authors":"Y. Desmedt, M. Yung","doi":"10.1109/ISIT.1994.394671","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394671","url":null,"abstract":"Previous definitions of subliminal-freeness lack an important aspect, as we discuss. We illustrate what was missing. To fix the old definition we introduce the concept of minimal cryptosystems.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125761951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Repeated communication and Ramsey graphs 重复交流和拉姆齐图
Proceedings of 1994 IEEE International Symposium on Information Theory Pub Date : 1994-12-01 DOI: 10.1109/ISIT.1994.394703
N. Alon, A. Orlitsky
{"title":"Repeated communication and Ramsey graphs","authors":"N. Alon, A. Orlitsky","doi":"10.1109/ISIT.1994.394703","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394703","url":null,"abstract":"Studies the savings afforded by repeated use in two zero-error communication problems. 1. Channel coding: proving a correspondence between Ramsey numbers and independence numbers of normal graph powers, the authors show that some channels can communicate exponentially more bits in two uses than they can in one use, and that this is essentially the largest possible increase. Using probabilistic constructions of self-complementary Ramsey graphs, the authors show that similar results hold even when the number of transmissible bits is large relative to the channel's size. 2. Dual-source coding: using probabilistic colorings of directed line graphs, the authors show that there are dual sources where communicating one instance requires arbitrarily many bits, yet communicating many instances requires at most two bits per instance. For dual sources where the number of bits required for a single instance is comparable to the source's size, they employ probabilistic constructions of self-complementary Ramsey graphs that are also Cayley graphs to show that conveying two instances may require only a logarithmic number of additional bits over that needed to convey one instance.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125693321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
Prefixes and the entropy rate for long-range sources 长程源的前缀和熵率
Proceedings of 1994 IEEE International Symposium on Information Theory Pub Date : 1994-12-01 DOI: 10.1109/ISIT.1994.394774
Ioannis Kontoyiannis, Y. Suhov
{"title":"Prefixes and the entropy rate for long-range sources","authors":"Ioannis Kontoyiannis, Y. Suhov","doi":"10.1109/ISIT.1994.394774","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394774","url":null,"abstract":"The asymptotic a.s.-relation H=lim/sub n/spl rarr//spl infin//[(nlogn)/(/spl Sigma//sub i=1//sup n/L/sub i//sup n/(X))] is derived for any finite-valued stationary ergodic process X=(X/sub n/, n/spl isin/Z) that satisfies a Doeblin-type condition: there exists r/spl ges/1 such that ess/sub x/inf P(X/sub n+1/|x/sub /spl rarr//spl infin/,n/)/spl ges//spl alpha/>0. Here, H is the entropy rate of the process X, and L/sub i//sup n/(X) is the length of a shortest prefix in X which is initiated at time i and is not repeated among the prefixes initiated at times j, 1/spl les/i/spl ne/J/spl les/n. The validity of this limiting result was established by Shields in 1989 for i.i.d. processes and also for irreducible aperiodic Markov chains. Under our new condition, we prove that this holds for a wider class of processes, that may have infinite memory.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130409173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Optimal detection based on adaptive array antenna in spatial and temporal domains 基于自适应阵列天线的空域和时域最优检测
Proceedings of 1994 IEEE International Symposium on Information Theory Pub Date : 1994-12-01 DOI: 10.1109/ISIT.1994.394995
R. Kohno, M. Nagatsuka, H. Imai
{"title":"Optimal detection based on adaptive array antenna in spatial and temporal domains","authors":"R. Kohno, M. Nagatsuka, H. Imai","doi":"10.1109/ISIT.1994.394995","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394995","url":null,"abstract":"This paper derives a generalized matched filter in spatial and temporal domains using an adaptive array antenna. The matched filter provides the optimal transfer function so as to maximize SINR (signal to interference-plus-noise ratio) in the array output. Moreover, if the generalized matched filter is followed by maximum likelihood sequence estimator in order to utilize memory in the channel, a generalized optimal receiver based on array antenna can be realized.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114811613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Bayes coding algorithm using context tree 使用上下文树的贝叶斯编码算法
Proceedings of 1994 IEEE International Symposium on Information Theory Pub Date : 1994-12-01 DOI: 10.1109/ISIT.1994.394633
T. Matsushima, S. Hirasawa
{"title":"A Bayes coding algorithm using context tree","authors":"T. Matsushima, S. Hirasawa","doi":"10.1109/ISIT.1994.394633","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394633","url":null,"abstract":"The context tree weighting (CTW) algorithm [Willems et al., 1993] has high compressibility for universal coding with respect to FSMX sources. The present authors propose an algorithm by reinterpreting the CTW algorithm from the viewpoint of Bayes coding. This algorithm can be applied to a wide class of prior distribution for finite alphabet FSMX sources. The algorithm is regarded as both a generalized version of the CTW procedure and a practical algorithm using a context tree of the adaptive Bayes coding which has been studied in Mataushima et al. (1991). Moreover, the proposed algorithm is free from underflow which frequently occurs in the CTW procedure.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126647387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Efficacy of adaptive signal processing algorithms 自适应信号处理算法的有效性
Proceedings of 1994 IEEE International Symposium on Information Theory Pub Date : 1994-12-01 DOI: 10.1109/ISIT.1994.394846
G. Moustakides
{"title":"Efficacy of adaptive signal processing algorithms","authors":"G. Moustakides","doi":"10.1109/ISIT.1994.394846","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394846","url":null,"abstract":"A method for theoretically comparing a class of adaptive estimation algorithms is presented. The method consists in defining for each algorithm in the class a quantity (the efficacy) that is theoretically computable, that depends only on the statistics of the data. The larger the efficacy the better the algorithm performs.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126503963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Inferring probabilistic acyclic automata using the minimum description length principle 利用最小描述长度原理推断概率无循环自动机
Proceedings of 1994 IEEE International Symposium on Information Theory Pub Date : 1994-12-01 DOI: 10.1109/ISIT.1994.394627
Y. Singer, Naftali Tishby
{"title":"Inferring probabilistic acyclic automata using the minimum description length principle","authors":"Y. Singer, Naftali Tishby","doi":"10.1109/ISIT.1994.394627","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394627","url":null,"abstract":"The use of Rissanen's (1978) minimum description length principle for the construction of probabilistic acyclic automata (PAA) is explored. We propose a learning algorithm for a PAA that is adaptive both in the structure and the dimension of the model. The proposed algorithm was tested on synthetic data as well as on real pattern recognition problems.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132136878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Subliminal-free sharing schemes 无意识的共享计划
Proceedings of 1994 IEEE International Symposium on Information Theory Pub Date : 1994-12-01 DOI: 10.1109/ISIT.1994.395105
Y. Desmedt
{"title":"Subliminal-free sharing schemes","authors":"Y. Desmedt","doi":"10.1109/ISIT.1994.395105","DOIUrl":"https://doi.org/10.1109/ISIT.1994.395105","url":null,"abstract":"Since Simmons (1984) discussed the fact that a secret message, which he called a subliminal channel, can be hidden inside the authenticator, many subliminal-free cryptosystems have been presented. We present a subliminal-free key distribution phase for a secret sharing scheme with a general access structure and discuss subliminal-free recomputation.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"28 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133424921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance analysis of overlapping multi-pulse pulse position modulation (OMPPM) in noisy photon counting channel 噪声光子计数信道中重叠多脉冲脉冲位置调制(OMPPM)性能分析
Proceedings of 1994 IEEE International Symposium on Information Theory Pub Date : 1994-12-01 DOI: 10.1109/ISIT.1994.394890
T. Ohtsuki, I. Sasase, S. Mori
{"title":"Performance analysis of overlapping multi-pulse pulse position modulation (OMPPM) in noisy photon counting channel","authors":"T. Ohtsuki, I. Sasase, S. Mori","doi":"10.1109/ISIT.1994.394890","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394890","url":null,"abstract":"Summary form only given. Overlapping multi-pulse pulse position modulation (OMPPM) is a modulation scheme to achieve a higher throughput than other conventional modulation schemes. Ohtsuki, Sasase and Mori (see Conf. Rec. ICC'93, p.1123-1127, 1993) analyzed OPPM in a noiseless photon counting channel and showed that it outperforms other conventional modulations. The optical channel is often modeled by a noiseless photon counting channel, but noise due to background and/or detector dark currents exists in a practical optical channel. However, the performance of OMPPM in a noisy photon counting channel has not been clarified. The article analyzes the cutoff rate performance of OMPPM in a noisy photon counting channel.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133707194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信