首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   19篇
  免费   0篇
无线电   18篇
自动化技术   1篇
  2006年   2篇
  2005年   1篇
  2004年   2篇
  2003年   1篇
  2002年   1篇
  2001年   1篇
  1998年   1篇
  1996年   1篇
  1995年   1篇
  1994年   1篇
  1993年   3篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1988年   1篇
排序方式: 共有19条查询结果,搜索用时 15 毫秒
1.
Repeated communication and Ramsey graphs   总被引:2,自引:0,他引:2  
We study the savings afforded by repeated use in two zero-error communication problems. We show that for some random sources, communicating one instance requires arbitrarily many bits, but communicating multiple instances requires roughly 1 bit per instance. We also exhibit sources where the number of bits required for a single instance is comparable to the source's size, but two instances require only a logarithmic number of additional bits. We relate this problem to that of communicating information over a channel. Known results imply that some channels can communicate exponentially more bits in two uses than they can in one use  相似文献   
2.
The communication complexity of a two-variable function f(x,y) is the number of information bits two communicators need to exchange to compute f when, initially, each knows only one of the variables. There are several communication-complexity measures corresponding to whether (1) the worst case or average number of bits is considered, (2) computation errors are allowed and (3) randomization is allowed. Tight bounds are provided for the typical behavior of all bounded-error communication-complexity measures of Boolean functions. In the present work, the authors formally define the deterministic model. They describe randomized protocols and compare them to deterministic ones. They both survey previous work and describe original results  相似文献   
3.
We study the potential merits of vector quantization and show that there can be an arbitrary discrepancy between the worst case rates required for scalar and vector quantization. Specifically, we describe a random variable and a distortion measure where quantization of a single instance to within a given distortion requires an arbitrarily large number of bits in the worst case, but quantization of multiple independent instances to within the same distortion requires an arbitrarily small number of bits per instance in the worst case. We relate this discrepancy to expander graphs, representation- and cover-numbers of set systems, and a problem studied by Slepian, Wolf, and Wyner (1973)  相似文献   
4.
Recent work has considered encoding a string by separately conveying its symbols and its pattern-the order in which the symbols appear. It was shown that the patterns of independent and identically distributed (i.i.d.) strings can be losslessly compressed with diminishing per-symbol redundancy. In this correspondence, the pattern redundancy of distributions with memory is considered. Close lower and upper bounds are established on the pattern redundancy of strings generated by Hidden Markov models (HMMs) with a small number of states, showing in particular that their per-symbol pattern redundancy diminishes with increasing string length. The upper bounds are obtained by analyzing the growth rate of the number of multidimensional integer partitions, and the lower bounds, using Hayman's theorem  相似文献   
5.
We establish a further connection between one-way communication where a sender conveys information to a receiver who has related information, and error-correction coding where a sender attempts to communicate reliably over a noisy channel. Using this connection we obtain three results on the two problems. We derive an often-tight lower bound on the number of bits required for one-way communication based on the largest code for the corresponding error-correction problem. We construct an error-correcting code whose minimum distance properties are similar to those of Bose-Chaudhuri-Hocquenghem (BCH) codes based on a one-way communication protocol for set reconciliation. Finally, we prove that one-way communication is suboptimal for a large class of Hamming-distance problems.  相似文献   
6.
Using communication complexity concepts and techniques, we derive linear (Ω(n)) and almost-linear (Ω(n/logn)) lower bounds on the size of circuits implementing certain functions. Our approach utilizes only basic features of the gates used, hence the bounds hold for general families of gates of which the symmetric and threshold gates are special cases. Each of the bounds derived is shown to be tight for some functions and some applications to threshold circuit complexity are indicated. The results generalize and in some cases strengthen recent results  相似文献   
7.
Two parties, each holding one input of a two-variable function, communicate in order to determine the value of the function. Each party wants to expose as little of its input as possible to the other party. The authors prove tight bounds on the minimum amount of information about the individual inputs that must be revealed in the computation of most functions and of some specific ones. They also show that a computation that reveals little information about the individual inputs may require many more message exchanges than a more revealing computation  相似文献   
8.
For pt.I see ibid., vol.36, no.5, p.1111-26, (1990). The author defines the chromatic-decomposition number of a hypergraph and shows that, under general conditions, it determines the two message complexity. This result is then used to provide that two messages are not optimal. Protocols, complexities, and the characteristic hypergraph of (X,Y) are defined. The playoffs problem is described. Although similar in appearance to the league problem given in an example, it is shown that its two-message complexity is about twice as high as its three-message complexity. The author proves a high lower bound on the chromatic-decomposition number of the playoffs problem's characteristic hypergraph showing that the problem has a high two-message complexity, and that allowing more than two messages may decrease the number of transmitted bits by a factor of two. A technique that improves the lower bound for the chromatic-decomposition number of the playoffs problem is described. However, this improved lower bound does not suffice to increase the provable gap between two and three message complexities  相似文献   
9.
We study the redundancy of three approaches to compression of independent and identically distributed (i.i.d.) strings over large, possibly infinite, alphabets: standard compression of the string itself and compression of the string's shape and pattern, which describe its symbols' relative magnitude and precedence, respectively. We determine the rate at which per-symbol standard redundancy increases to infinity as the alphabet size increases, show that the maximum per-symbol shape redundancy is between 0.027 and 1, and compare these to results showing that per-symbol pattern redundancy diminishes to zero for all alphabet sizes. We relate these concepts to ordered and unordered partitions of integers and sets, and use this framework to explore relations between several combinatorial quantities, including the Bell, Fubini, and second-type Stirling numbers.  相似文献   
10.
Zero-error information theory   总被引:2,自引:0,他引:2  
The problem of error-free transmission capacity of a noisy channel was posed by Shannon in 1956 and remains unsolved, Nevertheless, partial results for this and similar channel and source coding problems have had a considerable impact on information theory, computer science, and mathematics. We review the techniques, results, information measures, and challenges encountered in this ongoing quest  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号