Sciweavers

3143 search results - page 200 / 629
» Minimization of entropy functionals
Sort
View
JCS
2008
93views more  JCS 2008»
15 years 4 months ago
On the Bayes risk in information-hiding protocols
Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be reg...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
NN
2006
Springer
127views Neural Networks» more  NN 2006»
15 years 4 months ago
The asymptotic equipartition property in reinforcement learning and its relation to return maximization
We discuss an important property called the asymptotic equipartition property on empirical sequences in reinforcement learning. This states that the typical set of empirical seque...
Kazunori Iwata, Kazushi Ikeda, Hideaki Sakai
JUCS
2002
90views more  JUCS 2002»
15 years 3 months ago
How Large is the Set of Disjunctive Sequences?
: We consider disjunctive sequences, that is, infinite sequences (-words) having all finite words as infixes. It is shown that the set of all disjunctive sequences can be described...
Ludwig Staiger
RSA
2008
81views more  RSA 2008»
15 years 3 months ago
Analyzing linear mergers
Mergers are functions that transform k (possibly dependent) random sources into a single random source, in a way that ensures that if one of the input sources has minentropy rate ...
Zeev Dvir, Ran Raz
CDC
2010
IEEE
150views Control Systems» more  CDC 2010»
14 years 11 months ago
Nonlinear hybrid system identification with kernel models
Abstract-- This paper focuses on the identification of nonlinear hybrid systems involving unknown nonlinear dynamics. The proposed method extends the framework of [1] by introducin...
Fabien Lauer, Gérard Bloch, René Vid...