نتایج جستجو برای: correlated side information

تعداد نتایج: 1567149  

2017
Vivek F. Farias Andrew A. Li

Product and content personalization is now ubiquitous in e-commerce. There is typically too little available transactional data for this task. As such, companies today seek to use a variety of information on the interactions between a product and a customer to drive personalization decisions. We formalize this problem as one of recovering a large-scale matrix, with side information in the form ...

2006
Bin Dai Yuan Luo

The wiretap channel put forward by Wyner for many years. In this paper, we consider the situation that the wiretapper can not only view the channel output via a second noisy channel, but also can get some side information about the codeword that transmitted in the main noisy channel. The designer tries to build the encoder-decoder in such a way as to maximize the transmission rate R, and the eq...

Journal: :AMIA ... Annual Symposium proceedings. AMIA Symposium 2013
Ping Zhang Fei Wang Jianying Hu Robert Sorrentino

Therapeutic indications and drug side-effects are both measureable human behavioral or physiological changes in response to the treatment. In modern drug development, both inferring potential therapeutic indications and identifying clinically important drug side-effects are challenging tasks. Previous studies have utilized either chemical structures or protein targets to predict indications and...

Journal: :CoRR 2011
Kyatsandra G. Nagananda Chandra R. Murthy Shalinee Kishore

In this paper, we derive information-theoretic performance limits for secure and reliable communications over the general two-user discrete memoryless broadcast channel with side-information at the transmitter. The sender wishes to broadcast two independent messages to two receivers, under the constraint that each message should be kept confidential from the unintended receiver. Furthermore, th...

Journal: :IEEE Trans. Information Theory 1996
Thomas M. Cover Erik Ordentlich

We present a sequential investment algorithm, the -weighted universal portfolio with side-information, which achieves, to rst order in the exponent, the same wealth as the best side-information dependent investment strategy (the best state-constant rebalanced portfolio) determined in hindsight from observed market and side-information outcomes. This is an individual sequence result which shows ...

2012
Gábor Bartók Csaba Szepesvári

In a partial-monitoring problem in every round a learner chooses an action, simultaneously an opponent chooses an outcome, then the learner suffers some loss and receives some feedback. The goal of the learner is to minimize his (unobserved) cumulative loss. In this paper we explore a variant of this problem where in every round, before the learner makes his decision, he receives some side-info...

Journal: :Journal of multivariate analysis 2012
Ao Yuan Wenqing He Binhuan Wang Gengsheng Qin

In this paper we study U-statistics with side information incorporated using the method of empirical likelihood. Some basic properties of the proposed statistics are investigated. We find that by implementing the side information properly, the proposed U-statistics can have smaller asymptotic variance than the existing U-statistics in the literature. The proposed U-statistics can achieve asympt...

2014
Ehsan Ebrahimi Targhi

The Index Coding problem has attracted a considerable amount of attention in the recent years. The problem is motivated by several applications in wireless networking and distributed computing. An instance of the index coding problem includes a sender that holds an input x = (x1, x2, . . . , xn) ∈ {0, 1} and communicates with n receivers R1, . . . , Rn using wireless broadcast channel. Each rec...

2015
Kazuo Sakiyama Takanori Machida Arisa Matsubara Yunfeng Kuai Yu-ichi Hayashi Takaaki Mizuki Noriyuki Miura Makoto Nagata

Authentication based on cryptographic protocols is a key technology for recent security systems. However, the so-called relay attack where a malicious attacker tries to assume the role of the prover, is known to be a serious threat even for the cryptographically-secure authentication systems. This paper proposes a new authentication method that utilizes the side channel that already exists in m...

Journal: :CAIS 2012
Monideepa Tarafdar Ashish Gupta John D'Arcy Ofir Turel Mary Czerwinski

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید