首页 > 最新文献

IEEE BITS the Information Theory Magazine最新文献

英文 中文
(Re)discovering Laws of Music Theory Using Information Lattice Learning (二)利用信息点阵学习发现音乐理论规律
Pub Date : 2022-10-01 DOI: 10.1109/MBITS.2022.3205288
Haizi Yu, L. Varshney, Heinrich Taube, James A. Evans
Information lattice learning (ILL) is a novel framework for knowledge discovery based on group-theoretic and information-theoretic foundations, which can rediscover the rules of music as known in the canon of music theory and also discover new rules that have remained unexamined. Such probabilistic rules are further demonstrated to be human-interpretable. ILL itself is a rediscovery and generalization of Shannon’s lattice theory of information, where probability measures are not given but are learned from training data. This article explains the basics of the ILL framework, including both how to construct a lattice-structured abstraction universe that specifies the structural possibilities of rules, and how to find the most informative rules by performing statistical learning through an iterative student–teacher algorithmic architecture that optimizes information functionals. The ILL framework is finally shown to support both pedagogy and novel patterns of music co-creativity.
信息晶格学习(Information lattice learning, ILL)是一种基于群论和信息论基础的知识发现新框架,它可以重新发现音乐理论经典中已知的音乐规则,也可以发现尚未被研究的新规则。这种概率规则被进一步证明是人类可解释的。ILL本身是对Shannon的格信息理论的重新发现和推广,其中概率度量不是给定的,而是从训练数据中学习的。本文解释了ILL框架的基础知识,包括如何构建指定规则结构可能性的格状结构抽象域,以及如何通过优化信息功能的迭代学生-教师算法架构执行统计学习来找到信息量最大的规则。最后,研究表明,ILL框架既支持音乐共同创造的教学法,也支持音乐共同创造的新模式。
{"title":"(Re)discovering Laws of Music Theory Using Information Lattice Learning","authors":"Haizi Yu, L. Varshney, Heinrich Taube, James A. Evans","doi":"10.1109/MBITS.2022.3205288","DOIUrl":"https://doi.org/10.1109/MBITS.2022.3205288","url":null,"abstract":"Information lattice learning (ILL) is a novel framework for knowledge discovery based on group-theoretic and information-theoretic foundations, which can rediscover the rules of music as known in the canon of music theory and also discover new rules that have remained unexamined. Such probabilistic rules are further demonstrated to be human-interpretable. ILL itself is a rediscovery and generalization of Shannon’s lattice theory of information, where probability measures are not given but are learned from training data. This article explains the basics of the ILL framework, including both how to construct a lattice-structured abstraction universe that specifies the structural possibilities of rules, and how to find the most informative rules by performing statistical learning through an iterative student–teacher algorithmic architecture that optimizes information functionals. The ILL framework is finally shown to support both pedagogy and novel patterns of music co-creativity.","PeriodicalId":448036,"journal":{"name":"IEEE BITS the Information Theory Magazine","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116411540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IEEE BITS Editorial Board IEEE BITS编辑委员会
Pub Date : 2022-10-01 DOI: 10.1109/mbits.2022.3217879
{"title":"IEEE BITS Editorial Board","authors":"","doi":"10.1109/mbits.2022.3217879","DOIUrl":"https://doi.org/10.1109/mbits.2022.3217879","url":null,"abstract":"","PeriodicalId":448036,"journal":{"name":"IEEE BITS the Information Theory Magazine","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132351817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Use and Misuse of Machine Learning in Anthropology 机器学习在人类学中的应用与误用
Pub Date : 2022-09-06 DOI: 10.1109/MBITS.2022.3205143
J. Calder, Reed Coil, J. A. Melton, P. Olver, G. Tostevin, K. Yezzi-Woodley
Machine learning (ML), being now widely accessible to the research community at large, has fostered a proliferation of new and striking applications of these emergent mathematical techniques across a wide range of disciplines. In this article, we will focus on a particular case study: the field of paleoanthropology, which seeks to understand the evolution of the human species based on biological (e.g., bones, genetics) and cultural (e.g., stone tools) evidence. As we will show, the easy availability of ML algorithms and lack of expertise on their proper use among the anthropological research community has led to the foundational misapplications that have appeared throughout the literature. The resulting unreliable results not only undermine efforts to legitimately incorporate ML into anthropological research, but produce potentially faulty understandings about our human evolutionary and behavioral past. The aim of this article is to provide a brief introduction to some of the ways in which ML has been applied within paleoanthropology; we also include a survey of some basic ML algorithms for those who are not fully conversant with the field, which remains under active development. We discuss a series of missteps, errors, and violations of correct protocols of ML methods that appear disconcertingly often within the accumulating body of anthropological literature. These mistakes include the use of outdated algorithms and practices; inappropriate testing/training splits, sample composition, and textual explanations; as well as an absence of transparency due to the lack of data/code sharing, and the subsequent limitations imposed on independent replication. We assert that expanding samples, sharing data and code, re-evaluating approaches to peer review, and, most importantly, developing interdisciplinary teams that include experts in ML are all necessary for the progress in future research incorporating ML within anthropology and beyond.
机器学习(ML)现在被广泛地应用于研究界,促进了这些新兴数学技术在广泛学科领域的新和惊人应用的扩散。在这篇文章中,我们将专注于一个特定的案例研究:古人类学领域,它试图根据生物(如骨骼、遗传学)和文化(如石器)证据来理解人类物种的进化。正如我们将展示的那样,机器学习算法的容易获得性以及在人类学研究界缺乏正确使用机器学习算法的专业知识,导致了在整个文献中出现的基本错误应用。由此产生的不可靠的结果不仅破坏了将ML合法纳入人类学研究的努力,而且对我们人类进化和行为的过去产生了潜在的错误理解。这篇文章的目的是提供一个简短的介绍,其中ML已在古人类学中应用的一些方式;我们还为那些不完全熟悉该领域的人提供了一些基本ML算法的调查,这些算法仍在积极发展中。我们讨论了一系列的失误,错误和违反正确的ML方法协议,这些方法在人类学文献的积累中经常令人不安地出现。这些错误包括使用过时的算法和实践;不恰当的测试/训练分割、样本组成和文本解释;以及由于缺乏数据/代码共享而缺乏透明度,以及随后对独立复制施加的限制。我们断言,扩大样本,共享数据和代码,重新评估同行评审的方法,最重要的是,发展包括机器学习专家在内的跨学科团队,对于将机器学习纳入人类学内外的未来研究进展都是必要的。
{"title":"Use and Misuse of Machine Learning in Anthropology","authors":"J. Calder, Reed Coil, J. A. Melton, P. Olver, G. Tostevin, K. Yezzi-Woodley","doi":"10.1109/MBITS.2022.3205143","DOIUrl":"https://doi.org/10.1109/MBITS.2022.3205143","url":null,"abstract":"Machine learning (ML), being now widely accessible to the research community at large, has fostered a proliferation of new and striking applications of these emergent mathematical techniques across a wide range of disciplines. In this article, we will focus on a particular case study: the field of paleoanthropology, which seeks to understand the evolution of the human species based on biological (e.g., bones, genetics) and cultural (e.g., stone tools) evidence. As we will show, the easy availability of ML algorithms and lack of expertise on their proper use among the anthropological research community has led to the foundational misapplications that have appeared throughout the literature. The resulting unreliable results not only undermine efforts to legitimately incorporate ML into anthropological research, but produce potentially faulty understandings about our human evolutionary and behavioral past. The aim of this article is to provide a brief introduction to some of the ways in which ML has been applied within paleoanthropology; we also include a survey of some basic ML algorithms for those who are not fully conversant with the field, which remains under active development. We discuss a series of missteps, errors, and violations of correct protocols of ML methods that appear disconcertingly often within the accumulating body of anthropological literature. These mistakes include the use of outdated algorithms and practices; inappropriate testing/training splits, sample composition, and textual explanations; as well as an absence of transparency due to the lack of data/code sharing, and the subsequent limitations imposed on independent replication. We assert that expanding samples, sharing data and code, re-evaluating approaches to peer review, and, most importantly, developing interdisciplinary teams that include experts in ML are all necessary for the progress in future research incorporating ML within anthropology and beyond.","PeriodicalId":448036,"journal":{"name":"IEEE BITS the Information Theory Magazine","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131832253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
No $((n,K,d< 127))$ Code Can Violate the Quantum Hamming Bound 没有$((n,K,d< 127))$代码可以违反量子汉明界
Pub Date : 2022-08-25 DOI: 10.1109/MBITS.2023.3262219
E. Dallas, Faidon Andreadakis, Daniel A. Lidar
It is well-known that nondegenerate quantum error correcting codes (QECCs) are constrained by a quantum version of the Hamming bound. Whether degenerate codes also obey such a bound, however, remains a long-standing question with practical implications for the efficacy of QECCs. We employ a combination of previously derived bounds on QECCs to demonstrate that a subset of all codes must obey the quantum Hamming bound. Specifically, we combine an analytical bound due to Rains with a numerical bound due to Li and Xing to show that no $((n,K,d))$((n,K,d)) code with $d< 127$d<127 can violate the quantum Hamming bound.
众所周知,非简并量子纠错码(QECCs)受到量子版汉明界的约束。然而,简并码是否也遵守这样的界限,仍然是一个长期存在的问题,对QECCs的有效性具有实际意义。我们使用先前导出的QECCs界的组合来证明所有码的子集必须服从量子汉明界。具体地说,我们将Rains的解析界与Li和Xing的数值界结合起来,证明$((n,K,d))$((n,K,d)) $($d<127 $d<127)的码不能违反量子汉明界。
{"title":"No $((n,K,d< 127))$ Code Can Violate the Quantum Hamming Bound","authors":"E. Dallas, Faidon Andreadakis, Daniel A. Lidar","doi":"10.1109/MBITS.2023.3262219","DOIUrl":"https://doi.org/10.1109/MBITS.2023.3262219","url":null,"abstract":"It is well-known that nondegenerate quantum error correcting codes (QECCs) are constrained by a quantum version of the Hamming bound. Whether degenerate codes also obey such a bound, however, remains a long-standing question with practical implications for the efficacy of QECCs. We employ a combination of previously derived bounds on QECCs to demonstrate that a subset of all codes must obey the quantum Hamming bound. Specifically, we combine an analytical bound due to Rains with a numerical bound due to Li and Xing to show that no $((n,K,d))$((n,K,d)) code with $d< 127$d<127 can violate the quantum Hamming bound.","PeriodicalId":448036,"journal":{"name":"IEEE BITS the Information Theory Magazine","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121933733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Conservation Laws and Quantum Error Correction: Toward a Generalized Matching Decoder 守恒定律与量子纠错:一种广义匹配解码器
Pub Date : 2022-07-13 DOI: 10.1109/MBITS.2023.3246025
Benjamin J. Brown
Decoding algorithms are essential to fault-tolerant quantum-computing architectures. In this perspective we explore decoding algorithms for the surface code; a prototypical quantum low-density parity-check code that underlies many of the leading efforts to demonstrate scalable quantum computing. Central to our discussion is the minimum-weight perfect-matching decoder. The decoder works by exploiting underlying structure that arises due to materialized symmetries among surface-code stabilizer elements. By concentrating on these symmetries, we begin to address the question of how a minimum-weight perfect-matching decoder might be generalized for other families of codes. We approach this question first by investigating examples of matching decoders for other codes. These include decoding algorithms that have been specialized to correct for noise models that demonstrate a particular structure or bias with respect to certain codes. In addition to this, we propose a systematic way of constructing a minimum-weight perfect-matching decoder for codes with certain characteristic properties. The properties we make use of are common among topological codes. We discuss the broader applicability of the proposal, and we suggest some questions we can address that may show us how to design a generalized matching decoder for arbitrary stabilizer codes.
解码算法对于容错量子计算架构至关重要。从这个角度来看,我们探索解码算法的表面代码;一个典型的量子低密度奇偶校验代码,它是展示可扩展量子计算的许多主要努力的基础。我们讨论的核心是最小权重完美匹配解码器。解码器的工作原理是利用由于表面编码稳定元件之间的物化对称而产生的底层结构。通过关注这些对称性,我们开始解决如何将最小权重完美匹配解码器推广到其他编码族的问题。我们首先通过研究其他代码的匹配解码器的示例来解决这个问题。其中包括专门用于纠正噪声模型的解码算法,这些模型显示出与某些代码相关的特定结构或偏差。除此之外,我们还提出了一种系统的方法来构造具有特定特征属性的码的最小权值完美匹配解码器。我们使用的属性在拓扑码中是通用的。我们讨论了该提议的更广泛的适用性,并提出了一些我们可以解决的问题,这些问题可能会告诉我们如何为任意稳定码设计一个广义匹配解码器。
{"title":"Conservation Laws and Quantum Error Correction: Toward a Generalized Matching Decoder","authors":"Benjamin J. Brown","doi":"10.1109/MBITS.2023.3246025","DOIUrl":"https://doi.org/10.1109/MBITS.2023.3246025","url":null,"abstract":"Decoding algorithms are essential to fault-tolerant quantum-computing architectures. In this perspective we explore decoding algorithms for the surface code; a prototypical quantum low-density parity-check code that underlies many of the leading efforts to demonstrate scalable quantum computing. Central to our discussion is the minimum-weight perfect-matching decoder. The decoder works by exploiting underlying structure that arises due to materialized symmetries among surface-code stabilizer elements. By concentrating on these symmetries, we begin to address the question of how a minimum-weight perfect-matching decoder might be generalized for other families of codes. We approach this question first by investigating examples of matching decoders for other codes. These include decoding algorithms that have been specialized to correct for noise models that demonstrate a particular structure or bias with respect to certain codes. In addition to this, we propose a systematic way of constructing a minimum-weight perfect-matching decoder for codes with certain characteristic properties. The properties we make use of are common among topological codes. We discuss the broader applicability of the proposal, and we suggest some questions we can address that may show us how to design a generalized matching decoder for arbitrary stabilizer codes.","PeriodicalId":448036,"journal":{"name":"IEEE BITS the Information Theory Magazine","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125107323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Welcome to the First Issue of IEEE BITS 欢迎来到第一期IEEE BITS
Pub Date : 2021-09-01 DOI: 10.1109/mbits.2021.3134881
R. Calderbank
{"title":"Welcome to the First Issue of IEEE BITS","authors":"R. Calderbank","doi":"10.1109/mbits.2021.3134881","DOIUrl":"https://doi.org/10.1109/mbits.2021.3134881","url":null,"abstract":"","PeriodicalId":448036,"journal":{"name":"IEEE BITS the Information Theory Magazine","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125832123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Friends in Comment—A Conversation With Regina Barzilay 评论中的朋友——与Regina Barzilay的对话
Pub Date : 2021-09-01 DOI: 10.1109/mbits.2021.3132470
M. Medard
{"title":"Friends in Comment—A Conversation With Regina Barzilay","authors":"M. Medard","doi":"10.1109/mbits.2021.3132470","DOIUrl":"https://doi.org/10.1109/mbits.2021.3132470","url":null,"abstract":"","PeriodicalId":448036,"journal":{"name":"IEEE BITS the Information Theory Magazine","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130534365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Virtual Year: Perspectives of JKW Best Paper Awardees 虚拟年:JKW最佳论文获奖者的观点
Pub Date : 2021-09-01 DOI: 10.1109/mbits.2021.3129565
Martina Cardon
{"title":"The Virtual Year: Perspectives of JKW Best Paper Awardees","authors":"Martina Cardon","doi":"10.1109/mbits.2021.3129565","DOIUrl":"https://doi.org/10.1109/mbits.2021.3129565","url":null,"abstract":"","PeriodicalId":448036,"journal":{"name":"IEEE BITS the Information Theory Magazine","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127394282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Theory at the U.S. National Science Foundation 信息理论在美国国家科学基金会
Pub Date : 2021-09-01 DOI: 10.1109/mbits.2021.3134450
P. Regalia
{"title":"Information Theory at the U.S. National Science Foundation","authors":"P. Regalia","doi":"10.1109/mbits.2021.3134450","DOIUrl":"https://doi.org/10.1109/mbits.2021.3134450","url":null,"abstract":"","PeriodicalId":448036,"journal":{"name":"IEEE BITS the Information Theory Magazine","volume":"160 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129024850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shannon, Euler, and Mazes 香农,欧拉和迷宫
Pub Date : 2021-08-01 DOI: 10.1109/mbits.2021.3097878
R. Gallager
One of Claude Shannon’s best remembered “toys” was his maze-solving machine, created by partitions on a rectangular grid. A mechanical mouse was started at one point in the maze with the task of finding cheese at another point. Relays under the board guided successive moves, each of which were taken in the first open counterclockwise direction from the previous move. In belated honor of Shannon’s centenary and of amnesia in the mouse at age 70, we compare this deterministic search strategy with a random search requiring no memory. For simplicity, the rectangular grid with partitions is replaced by a finite connected graph. A maze is then a graph with some given destination node. The worst case required number of steps to find the cheese for deterministic searches and the expected number for random searches are remarkably similar, each being, for example, $|mathcal {E}^2|$|E2| taken over all graphs of $|mathcal {E}|$|E| edges. Finally, we demonstrate a simple improvement to the above algorithms that generates an Eulerian cycle on the directed edges of $G$G, i.e., a walk on $G$G of $2|mathcal {E}|$2|E| steps that traverses each edge in $G$G exactly once in each direction before returning to the starting point.
克劳德·香农(Claude Shannon)最令人难忘的“玩具”之一是他的解迷宫机器,它是由矩形网格上的隔板制成的。一只机械老鼠从迷宫的一个点开始,任务是在另一个点找到奶酪。棋盘下的继电器引导连续的动作,每一步都是在第一个开放的逆时针方向上进行的。为了纪念香农的百年诞辰和70岁小鼠的失忆症,我们将这种确定性搜索策略与不需要记忆的随机搜索策略进行比较。为简单起见,将带有分区的矩形网格替换为有限连通图。因此,迷宫是一个具有特定目标节点的图。在最坏的情况下,确定性搜索找到奶酪所需的步数和随机搜索的期望步数非常相似,例如,每个步数都是$|mathcal {E}^2|$|E2|,它占据了$|mathcal {E}|$|E|边的所有图。最后,我们演示了对上述算法的一个简单改进,该算法在$G$G的有向边上生成欧拉循环,即$G$G上的$2|mathcal {E}|$2|E|步,在返回到起点之前,在$G$G的每个方向上遍历$G$G的每个边。
{"title":"Shannon, Euler, and Mazes","authors":"R. Gallager","doi":"10.1109/mbits.2021.3097878","DOIUrl":"https://doi.org/10.1109/mbits.2021.3097878","url":null,"abstract":"One of Claude Shannon’s best remembered “toys” was his maze-solving machine, created by partitions on a rectangular grid. A mechanical mouse was started at one point in the maze with the task of finding cheese at another point. Relays under the board guided successive moves, each of which were taken in the first open counterclockwise direction from the previous move. In belated honor of Shannon’s centenary and of amnesia in the mouse at age 70, we compare this deterministic search strategy with a random search requiring no memory. For simplicity, the rectangular grid with partitions is replaced by a finite connected graph. A maze is then a graph with some given destination node. The worst case required number of steps to find the cheese for deterministic searches and the expected number for random searches are remarkably similar, each being, for example, $|mathcal {E}^2|$|E2| taken over all graphs of $|mathcal {E}|$|E| edges. Finally, we demonstrate a simple improvement to the above algorithms that generates an Eulerian cycle on the directed edges of $G$G, i.e., a walk on $G$G of $2|mathcal {E}|$2|E| steps that traverses each edge in $G$G exactly once in each direction before returning to the starting point.","PeriodicalId":448036,"journal":{"name":"IEEE BITS the Information Theory Magazine","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128784340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE BITS the Information Theory Magazine
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1