Search

Your search keyword '"[INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT]"' showing total 3,449 results

Search Constraints

Start Over You searched for: Descriptor "[INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT]" Remove constraint Descriptor: "[INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT]"
3,449 results on '"[INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT]"'

Search Results

1. Fundamental Limits of Combinatorial Multi-Access Caching

2. Five-weight codes from three-valued correlation of M-sequences

3. On the dimension and structure of the square of the dual of a Goppa code

4. On strongly walk regular graphs, triple sum sets and their codes

5. Order selection with confidence for finite mixture models

6. Bornes de généralisation : quand l'information mutuelle rencontre les bornes PAC-Bayésiennes et désintégrées

7. The Evolution of Federated Learning-Based Intrusion Detection and Mitigation: A Survey

8. Covering Radius of Melas Codes

9. Complementary Graph Entropy, AND Product, and Disjoint Union of Graphs

10. Analysis of the Relative Entropy Asymmetry in the Regularization of Empirical Risk Minimization

11. On the Validation of Gibbs Algorithms: Training Datasets, Test Datasets and their Aggregation

12. PREDICTING CNN LEARNING ACCURACY USING CHAOS MEASUREMENT

13. Model Fingerprinting with Benign Inputs

14. Minimisation du Risque Empirique avec Régularisation par Entropie Relative de Type-II

15. Jeux 2 × 2 à Somme Nulle avec Engagements et Observations Bruitées

16. Coded Caching in Networks With Heterogeneous User Activity

17. Algebraic techniques for decoding Reed-Solomon codes and cryptanalyzing McEliece-like cryptosystems

18. On Time-Frequency Synchronization in LoRa System: From Analysis to Near-Optimal Algorithm

19. On the Global Optimality of Whittle’s Index Policy for Minimizing the Age of Information

20. Finite sample inference for empirical Bayesian methods

21. Vector Coded Caching Substantially Boosts MU-MIMO: Pathloss, CSI and Power-allocation Considerations

22. Modélisation du coût total de la propriété du logiciel dans Virtual Network Functions

23. Exploitation des dépendances entre labels pour la classification de textes multi-labels par le biais de transformeurs

24. A New Code Based Signature Scheme for Blockchain Technology

25. DNA code from cyclic and skew cyclic codes over F 4 [v]/⟨v 3 ⟩

26. Two families of strongly walk regular graphs from three-weight codes over Z 4 *

27. Wireless Channel Charting: Theory, Practice, and Applications

28. The limited-memory recursive variational Gaussian approximation (L-RVGA)

29. CNN Aided Weighted Interpolation for Channel Estimation in Vehicular Communications

30. Suavização de SPLINES DO MOVIMENTO DO PREDADOR APEX: ESTRATÉGIAS DE MODELAGEM FUNCIONAL PARA EXPLORAR O COMPORTAMENTO ANIMAL E AS INTERAÇÕES SOCIAIS

31. The Geometry of Off-the-Grid Compressed Sensing

32. On the Capacity Enlargement of Gaussian Broadcast Channels With Passive Noisy Feedback

33. Power-Estimation Trade-off of Vector-valued Witsenhausen Counterexample with Causal Decoder

34. A Gröbner basis approach to m-dimensional skew (consta-) cyclic codes: Dedicated to André Leroy on his retirement

35. Predictive analysis of learning data, in distance learning situations

36. Coordination et Communication Stratégique

37. Federated Learning as enabler for Collaborative Security between not Fully-Trusting Distributed Parties

38. Information-Energy Regions in the Finite Block-Length Regime with Finite Channel Inputs

39. Information-Energy Trade-offs with EH Non-linearities in the Finite Block-Length Regime with Finite Constellations

40. Multi-User Linearly Separable Computation: A Coding Theoretic Approach

41. A Hierarchy of Efficient Bounds on Quantum Capacities Exploiting Symmetry

42. FEAT: Fair Coordinated Iterative Water-Filling Algorithm

43. Semantic alignment for multi-item compression

44. A new regularization for retinex decomposition of low-light images

45. Quadratic residue codes, rank three groups and PBIBDs

46. Exathlon

47. On Best-Arm Identification with a Fixed Budget in Non-Parametric Multi-Armed Bandits

48. La véritable (et méconnue) théorie de l'information de Shannon

49. Codage de source zéro-erreur pour un réseau de Gray-Wyner lorsque l'information adjacente peut être présente

50. Reconstruction de Phase Garantie par Descente Miroir

Catalog

Books, media, physical & digital resources