共查询到20条相似文献,搜索用时 15 毫秒
1.
Robert Jenssen Torbj?rn Eltoft Deniz Erdogmus Jose C. Principe 《The Journal of VLSI Signal Processing》2006,45(1-2):49-65
In this paper, we discuss some equivalences between two recently introduced statistical learning schemes, namely Mercer kernel
methods and information theoretic methods. We show that Parzen window-based estimators for some information theoretic cost
functions are also cost functions in a corresponding Mercer kernel space. The Mercer kernel is directly related to the Parzen
window. Furthermore, we analyze a classification rule based on an information theoretic criterion, and show that this corresponds
to a linear classifier in the kernel space. By introducing a weighted Parzen window density estimator, we also formulate the
support vector machine in this information theoretic perspective.
相似文献
相似文献
2.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》2008,54(6):2405-2407
The 26 papers and six items of correspondence in this special issue focus on information theoretic security. The papers and items of correspondence are summarized here. 相似文献
3.
This paper reports a brief review of the key elements for WDM transport networks. In particular, the transmission aspects, the basic elements of WDM networking, and the issues relating to failure restoration and network management are taken into account. 相似文献
4.
Caire G. Kumar K.R. 《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》2007,95(12):2274-2298
In wireless/mobile communications, terminals adapt their rate and transmit power or, more in general, their coding and modulation scheme, depending on the time-varying channel conditions. This paper presents, in a tutorial form, the information theoretic framework underlying such ldquoadaptive modulationrdquo techniques. First, we review fading channel models, channel state information assumptions, and related capacity results. Then, we treat the case of input power constraint, where the optimal input distribution is Gaussian. Finally, we address the case of discrete modulations. In order to treat the latter, we make use of the recently developed method of ldquomercury-waterfillingrdquo, based on the relationship between mutual information and minimum mean-square error (MMSE) estimation of the channel input from the channel output. While the traditional design of adaptive modulation schemes based on uncoded bit-error rate (BER) involves the optimization over a discrete set of signal constellations, when powerful (i.e., capacity approaching) coding schemes are used the corresponding adaptive coded modulation design becomes surprisingly simple. The regime of very powerful coding is justified by the use of modern coding schemes, such as turbo codes and low-density parity-check codes, able to perform close to channel capacity at very small BER. 相似文献
5.
Learning from Examples with Information Theoretic Criteria 总被引:3,自引:0,他引:3
Jose C. Principe Dongxin Xu Qun Zhao John W. Fisher III 《The Journal of VLSI Signal Processing》2000,26(1-2):61-77
This paper discusses a framework for learning based on information theoretic criteria. A novel algorithm based on Renyi's quadratic entropy is used to train, directly from a data set, linear or nonlinear mappers for entropy maximization or minimization. We provide an intriguing analogy between the computation and an information potential measuring the interactions among the data samples. We also propose two approximations to the Kulback-Leibler divergence based on quadratic distances (Cauchy-Schwartz inequality and Euclidean distance). These distances can still be computed using the information potential. We test the newly proposed distances in blind source separation (unsupervised learning) and in feature extraction for classification (supervised learning). In blind source separation our algorithm is capable of separating instantaneously mixed sources, and for classification the performance of our classifier is comparable to the support vector machines (SVMs). 相似文献
6.
7.
Photonic Network Communications - 相似文献
8.
9.
《Networking, IEEE/ACM Transactions on》2005,13(4):881-894
WDM networks adapt to the changes in traffic by reconfiguring the virtual topology. Though reconfiguration is done with the objective of utilizing resources efficiently, the resulting disruption in traffic is a cause for concern. Hence, policies are formed to decide on the time (i.e., when) to trigger reconfiguration and the new virtual topology that is most beneficial to the network. We present a simple, general and flexible framework, based on the two conflicting objectives of efficient resource utilization and minimizing traffic disruption, to evaluate reconfiguration policies. Instead of re-determining the reconfiguration policy whenever the traffic changes, we present Incremental Clustering Algorithm (ICA) to pre-plan the reconfiguration policy for a fully predictable finite sequence of traffic matrices. Since full predictability of such a sequence is not possible in practice, we learn the traffic sequences in order to probabilistically predict the future ones. From an information theoretic point of view, we quantify the predictability of traffic sequences and the number of times the reconfiguration policy is re-determined for any WDM network. To optimally predict the future traffic sequences and to incur optimal cost in the re-determination of the reconfiguration policy, we propose Universal Reconfiguration Management System (URMS). A Prediction-based Incremental Clustering Algorithm (PICA) that extends ICA is used by URMS to predict the reconfiguration policy. Within URMS, the probabilities are assigned to the traffic sequences by the prediction schemes of LZ78. We performed extensive simulations to study the effectiveness and efficiency of URMS when compared to the fully predictable and totally unpredictable models. The performance of URMS improves with learning and nearly achieves the performance of a fully predictable model. 相似文献
10.
11.
13.
14.
Safavi-Naini R. Wild P.R. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2008,54(6):2426-2436
Authentication codes provide message integrity guarantees in an information theoretic sense within a symmetric key setting. Information theoretic bounds on the success probability of an adversary who has access to previously authenticated messages have been derived by Simmons and Rosenbaum, among others. In this paper, we consider a strong attack scenario where the adversary is adaptive and has access to authentication and verification oracles. We derive information theoretic bounds on the success probability of the adversary and on the key size of the code. This brings the study of unconditionally secure authentication systems on a par with the study of computationally secure ones. We characterize the codes that meet these bounds and compare our result with the earlier ones. 相似文献
15.
分析了各种电子信息媒体(电脑、电话、广播电视)的特点、介绍了利用有线电视网传送大量公众信息的信息电视概念,信息电视的信息内容、准交互工的检索方式以及优质低价的功能特点,给出了信息电视系统的组成方案,并对信息电视的应用前景作了分析和预测。 相似文献
16.
17.
In relay-assisted cooperative com-munication, relay nodes help forwarding the information of a source node in case of link failure between the source and a destination. Although user cooperation improves the over-all efficiency of the network, it requires incen-tive to stimulate potential relay nodes to assist the source by forwarding its data to the desti-nation. Moreover, the potential relays are bet-ter informed than the source about their chan-nel conditions to destination, which results in asymmetric information between the source and the relays. In this paper, we study the problem of lack of forwarding incentive in cooperative communication when channel state information of relays is private infor-mation and not known by the source. To tackle this problem, we apply the principle of contract theory to a cooperative wireless system. Source first designs incentive compatible and individually rational contract, consisting of a set of power-credit pairs. Then it broadcasts contract items to nearby nodes. Once the source node receives reply messages from the volunteer relays, it chooses one or more relays based on its re-quirements and communication starts. Simulation results show how credit assignment works in order to stimulate relays to cooperate and prevents relays from cheating behavior. 相似文献
18.
《IEEE transactions on circuits and systems. I, Regular papers》2008,55(8):2310-2321
19.
20.
对策论方法在信息网络资源分配中的应用 总被引:5,自引:0,他引:5
在研究复杂信息网络的资源分配问题时,网络资源提供者和用户之间对资源的使用存在不同的优化目标,导致对资源分配策略存在多种评价准则。为便于网络管理者进行分布式的资源管理和计费,采用对策论模型分析用户对资源的竞争和处理网络传输拥塞正日益受到广泛的重视。本文首先指出资源分配和计费管理的几个主要难点,比较了中心化与非中心化控制策略的差别,而后综述了采用对策论模型进行资源分配和管理的优点,重点讨论了在非中心化条件下对策均衡解与资源利用效率以及网络计费管理策略之间的关系,最后对基于对策论模型的信息网络流量控制与管理策略进行总体评述。 相似文献