首页 > 最新文献

IEEE BITS the Information Theory Magazine最新文献

英文 中文
Shannon, Euler, and Mazes 香农,欧拉和迷宫
Pub Date : 2021-08-01 DOI: 10.1109/mbits.2021.3097878
R. Gallager
One of Claude Shannon’s best remembered “toys” was his maze-solving machine, created by partitions on a rectangular grid. A mechanical mouse was started at one point in the maze with the task of finding cheese at another point. Relays under the board guided successive moves, each of which were taken in the first open counterclockwise direction from the previous move. In belated honor of Shannon’s centenary and of amnesia in the mouse at age 70, we compare this deterministic search strategy with a random search requiring no memory. For simplicity, the rectangular grid with partitions is replaced by a finite connected graph. A maze is then a graph with some given destination node. The worst case required number of steps to find the cheese for deterministic searches and the expected number for random searches are remarkably similar, each being, for example, $|mathcal {E}^2|$|E2| taken over all graphs of $|mathcal {E}|$|E| edges. Finally, we demonstrate a simple improvement to the above algorithms that generates an Eulerian cycle on the directed edges of $G$G, i.e., a walk on $G$G of $2|mathcal {E}|$2|E| steps that traverses each edge in $G$G exactly once in each direction before returning to the starting point.
克劳德·香农(Claude Shannon)最令人难忘的“玩具”之一是他的解迷宫机器,它是由矩形网格上的隔板制成的。一只机械老鼠从迷宫的一个点开始,任务是在另一个点找到奶酪。棋盘下的继电器引导连续的动作,每一步都是在第一个开放的逆时针方向上进行的。为了纪念香农的百年诞辰和70岁小鼠的失忆症,我们将这种确定性搜索策略与不需要记忆的随机搜索策略进行比较。为简单起见,将带有分区的矩形网格替换为有限连通图。因此,迷宫是一个具有特定目标节点的图。在最坏的情况下,确定性搜索找到奶酪所需的步数和随机搜索的期望步数非常相似,例如,每个步数都是$|mathcal {E}^2|$|E2|,它占据了$|mathcal {E}|$|E|边的所有图。最后,我们演示了对上述算法的一个简单改进,该算法在$G$G的有向边上生成欧拉循环,即$G$G上的$2|mathcal {E}|$2|E|步,在返回到起点之前,在$G$G的每个方向上遍历$G$G的每个边。
{"title":"Shannon, Euler, and Mazes","authors":"R. Gallager","doi":"10.1109/mbits.2021.3097878","DOIUrl":"https://doi.org/10.1109/mbits.2021.3097878","url":null,"abstract":"One of Claude Shannon’s best remembered “toys” was his maze-solving machine, created by partitions on a rectangular grid. A mechanical mouse was started at one point in the maze with the task of finding cheese at another point. Relays under the board guided successive moves, each of which were taken in the first open counterclockwise direction from the previous move. In belated honor of Shannon’s centenary and of amnesia in the mouse at age 70, we compare this deterministic search strategy with a random search requiring no memory. For simplicity, the rectangular grid with partitions is replaced by a finite connected graph. A maze is then a graph with some given destination node. The worst case required number of steps to find the cheese for deterministic searches and the expected number for random searches are remarkably similar, each being, for example, $|mathcal {E}^2|$|E2| taken over all graphs of $|mathcal {E}|$|E| edges. Finally, we demonstrate a simple improvement to the above algorithms that generates an Eulerian cycle on the directed edges of $G$G, i.e., a walk on $G$G of $2|mathcal {E}|$2|E| steps that traverses each edge in $G$G exactly once in each direction before returning to the starting point.","PeriodicalId":448036,"journal":{"name":"IEEE BITS the Information Theory Magazine","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128784340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Statistical, Information, and Estimation—Theoretic Views on Privacy 关于隐私的统计、信息和估计理论观点综述
Pub Date : 2021-08-01 DOI: 10.1109/MBITS.2021.3108124
Hsiang Hsu, Natalia Martínez, M. Bertrán, Guillermo Sapiro, F. Calmon
Privacy has become an emerging challenge in both information theory and computer science due to massive (centralized) collection of user data. In this article, we overview privacy-preserving mechanisms and metrics from the lenses of information theory, and unify different privacy metrics, including f-divergences, Rényi divergences, and differential privacy (DP), in terms of the probability likelihood ratio (and its logarithm). We review recent progress on the design of privacy-preserving mechanisms according to the privacy metrics in computer science, where DP is the standard privacy notion which controls the output shift given small input perturbation, and information theory, where the privacy is guaranteed by minimizing information leakage. In particular, for DP, we include its important variants (e.g., Rényi DP, Pufferfish privacy) and properties, discuss its connections with information-theoretic quantities, and provide the operational interpretations of its additive noise mechanisms. For information-theoretic privacy, we cover notable frameworks, including the privacy funnel, originated from rate-distortion theory and information bottleneck, to privacy guarantee against statistical inference/guessing, and information obfuscation on samples and features. Finally, we discuss the implementations of these privacy-preserving mechanisms in current data-driven machine learning scenarios, including deep learning, information obfuscation, federated learning, and dataset sharing.
由于用户数据的大量(集中)收集,隐私已成为信息理论和计算机科学中的一个新兴挑战。在本文中,我们从信息论的角度概述了隐私保护机制和度量,并根据概率似然比(及其对数)统一了不同的隐私度量,包括f-散度、rsamunyi散度和差分隐私(DP)。本文回顾了计算机科学中隐私度量和信息论中隐私保护机制设计的最新进展,其中DP是在给定小输入扰动下控制输出位移的标准隐私概念,信息论中通过最小化信息泄漏来保证隐私。特别地,对于DP,我们包括了它的重要变体(例如,rnyi DP, Pufferfish privacy)和属性,讨论了它与信息论量的联系,并提供了其加性噪声机制的操作解释。在信息论隐私方面,我们介绍了一些著名的框架,包括源于率失真理论和信息瓶颈的隐私漏斗,针对统计推断/猜测的隐私保证,以及样本和特征的信息混淆。最后,我们讨论了这些隐私保护机制在当前数据驱动的机器学习场景中的实现,包括深度学习、信息混淆、联邦学习和数据集共享。
{"title":"A Survey on Statistical, Information, and Estimation—Theoretic Views on Privacy","authors":"Hsiang Hsu, Natalia Martínez, M. Bertrán, Guillermo Sapiro, F. Calmon","doi":"10.1109/MBITS.2021.3108124","DOIUrl":"https://doi.org/10.1109/MBITS.2021.3108124","url":null,"abstract":"Privacy has become an emerging challenge in both information theory and computer science due to massive (centralized) collection of user data. In this article, we overview privacy-preserving mechanisms and metrics from the lenses of information theory, and unify different privacy metrics, including f-divergences, Rényi divergences, and differential privacy (DP), in terms of the probability likelihood ratio (and its logarithm). We review recent progress on the design of privacy-preserving mechanisms according to the privacy metrics in computer science, where DP is the standard privacy notion which controls the output shift given small input perturbation, and information theory, where the privacy is guaranteed by minimizing information leakage. In particular, for DP, we include its important variants (e.g., Rényi DP, Pufferfish privacy) and properties, discuss its connections with information-theoretic quantities, and provide the operational interpretations of its additive noise mechanisms. For information-theoretic privacy, we cover notable frameworks, including the privacy funnel, originated from rate-distortion theory and information bottleneck, to privacy guarantee against statistical inference/guessing, and information obfuscation on samples and features. Finally, we discuss the implementations of these privacy-preserving mechanisms in current data-driven machine learning scenarios, including deep learning, information obfuscation, federated learning, and dataset sharing.","PeriodicalId":448036,"journal":{"name":"IEEE BITS the Information Theory Magazine","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115434439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IEEE Signal Processing Magazine IEEE信号处理杂志
Pub Date : 2021-08-01 DOI: 10.1109/mbits.2021.3116479
SAR has become a valuable tool for civilian remote sensing applications as well as for military surveillance and reconnaissance. SAR operations can take place in all weather and times. SAR data can provide key information about the scene which can be extracted e.g. from the polarimetric features, the phase variation over time, and the reflectivity dependency on frequency. A wide variety of airand space based sensors for long and short range operation has been realized, operating at frequencies extending from VHF to the upper millimeter wave region. Spectacular missions like the Shuttle Radar Topographic Mission, the TanDEM-X satellite pair and the COSMO/SkyMed constellation have underscored the unique and important role of SAR. In addition to the basic SAR modes, acrossand along track interferometry have been established. Multi-band operations and the full polarimetric scattering matrix have been effectively utilized.
{"title":"IEEE Signal Processing Magazine","authors":"","doi":"10.1109/mbits.2021.3116479","DOIUrl":"https://doi.org/10.1109/mbits.2021.3116479","url":null,"abstract":"SAR has become a valuable tool for civilian remote sensing applications as well as for military surveillance and reconnaissance. SAR operations can take place in all weather and times. SAR data can provide key information about the scene which can be extracted e.g. from the polarimetric features, the phase variation over time, and the reflectivity dependency on frequency. A wide variety of airand space based sensors for long and short range operation has been realized, operating at frequencies extending from VHF to the upper millimeter wave region. Spectacular missions like the Shuttle Radar Topographic Mission, the TanDEM-X satellite pair and the COSMO/SkyMed constellation have underscored the unique and important role of SAR. In addition to the basic SAR modes, acrossand along track interferometry have been established. Multi-band operations and the full polarimetric scattering matrix have been effectively utilized.","PeriodicalId":448036,"journal":{"name":"IEEE BITS the Information Theory Magazine","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122881102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine-Proving of Entropy Inequalities 熵不等式的机器证明
Pub Date : 2021-08-01 DOI: 10.1109/mbits.2021.3123197
R. Yeung, Cheuk Ting Li
The entropy function plays a central role in information theory. Constraints on the entropy function in the form of inequalities, viz. entropy inequalities (often conditional on certain Markov conditions imposed by the problem under consideration), are indispensable tools for proving converse coding theorems. In this expository article, we give an overview of this fundamental subject. After presenting a geometrical framework for the entropy function, we explain how an entropy inequality can be formulated, with or without constraints on the entropy function. Among all entropy inequalities, Shannon-type inequalities, namely those implied by the nonnegativity of Shannon’s information measures, are best understood. The main focus of this article is the verification of Shannon-type inequalities, which in fact can be formulated as a linear programming problem. ITIP, a software package developed for this purpose, as well as two of its variants, AITIP and PSITIP, are discussed. This article ends with a discussion on the hardness of verifying entropy inequalities in general.
熵函数在信息论中起着核心作用。以不等式形式对熵函数的约束,即熵不等式(通常以所考虑的问题所施加的某些马尔可夫条件为条件),是证明反向编码定理不可或缺的工具。在这篇说明性的文章中,我们对这一基本主题进行概述。在给出熵函数的几何框架之后,我们解释了熵不等式是如何表述的,有或没有对熵函数的约束。在所有的熵不等式中,香农型不等式,即香农信息测度的非负性所隐含的不等式,是最容易理解的。本文的主要重点是验证香农型不等式,它实际上可以表述为线性规划问题。本文讨论了为此目的开发的软件包ITIP及其两个变体AITIP和PSITIP。本文最后讨论了一般情况下验证熵不等式的难度。
{"title":"Machine-Proving of Entropy Inequalities","authors":"R. Yeung, Cheuk Ting Li","doi":"10.1109/mbits.2021.3123197","DOIUrl":"https://doi.org/10.1109/mbits.2021.3123197","url":null,"abstract":"The entropy function plays a central role in information theory. Constraints on the entropy function in the form of inequalities, viz. entropy inequalities (often conditional on certain Markov conditions imposed by the problem under consideration), are indispensable tools for proving converse coding theorems. In this expository article, we give an overview of this fundamental subject. After presenting a geometrical framework for the entropy function, we explain how an entropy inequality can be formulated, with or without constraints on the entropy function. Among all entropy inequalities, Shannon-type inequalities, namely those implied by the nonnegativity of Shannon’s information measures, are best understood. The main focus of this article is the verification of Shannon-type inequalities, which in fact can be formulated as a linear programming problem. ITIP, a software package developed for this purpose, as well as two of its variants, AITIP and PSITIP, are discussed. This article ends with a discussion on the hardness of verifying entropy inequalities in general.","PeriodicalId":448036,"journal":{"name":"IEEE BITS the Information Theory Magazine","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122569693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
6G: The Personal Tactile Internet—And Open Questions for Information Theory 6G:个人触觉互联网——信息理论的开放性问题
Pub Date : 2021-08-01 DOI: 10.1109/mbits.2021.3118662
G. Fettweis, H. Boche
The initial vision of cellular communications was to deliver ubiquitous voice communications to anyone anywhere. In a simplified view, 1G delivered voice services for business customers, and only 2G for consumers. Next, this also initiated the appetite for cellular data, for which 3G was designed. However, Blackberry delivered business smartphones, and 4G made smartphones a consumer device. The promise of 5G is to start the Tactile Internet, to control real and virtual objects in real-time via cellular. However, the hype around 5G is, again, focusing on business customers, in particular in the context of campus networks. Consequently, 6G must provide an infrastructure to enable remote-controlled mobile robotic solutions for everyone—the Personal Tactile Internet. Which role can information and communication theory play in this context, and what are the big challenges ahead?
蜂窝通信的最初设想是向任何地方的任何人提供无处不在的语音通信。简单地说,1G为企业客户提供语音服务,2G为消费者提供语音服务。其次,这也引发了对蜂窝数据的需求,3G就是为此而设计的。然而,黑莓推出了商务智能手机,4G则让智能手机成为了消费设备。5G的承诺是开启触觉互联网,通过蜂窝实时控制真实和虚拟物体。然而,围绕5G的炒作再次聚焦于商业客户,尤其是在校园网的背景下。因此,6G必须提供一个基础设施,为每个人提供远程控制的移动机器人解决方案——个人触觉互联网。在这种情况下,信息与传播理论可以发挥什么作用?未来的重大挑战是什么?
{"title":"6G: The Personal Tactile Internet—And Open Questions for Information Theory","authors":"G. Fettweis, H. Boche","doi":"10.1109/mbits.2021.3118662","DOIUrl":"https://doi.org/10.1109/mbits.2021.3118662","url":null,"abstract":"The initial vision of cellular communications was to deliver ubiquitous voice communications to anyone anywhere. In a simplified view, 1G delivered voice services for business customers, and only 2G for consumers. Next, this also initiated the appetite for cellular data, for which 3G was designed. However, Blackberry delivered business smartphones, and 4G made smartphones a consumer device. The promise of 5G is to start the Tactile Internet, to control real and virtual objects in real-time via cellular. However, the hype around 5G is, again, focusing on business customers, in particular in the context of campus networks. Consequently, 6G must provide an infrastructure to enable remote-controlled mobile robotic solutions for everyone—the Personal Tactile Internet. Which role can information and communication theory play in this context, and what are the big challenges ahead?","PeriodicalId":448036,"journal":{"name":"IEEE BITS the Information Theory Magazine","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115515423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Joy Thomas: Legacy, Foundation and the IT Society Joy Thomas:遗产、基金会和IT社会
Pub Date : 2021-08-01 DOI: 10.1109/mbits.2021.3108946
S. Diggavi, A. Gamal, I. Kontoyiannis, A. Paranjpe, Murali Subbarao
In this article, we commemorate Joy Thomas, who sadly passed away in 2020. Joy is best known for his seminal textbook Elements of Information Theory, coauthored with his Ph.D. advisor the late Thomas Cover. We also catalog some of Joy’s technical contributions to information theory and to its practice. Joy also made an impact on industry through several successful startups. In recognition of Joy’s contribution to the exposition of information theory, the IEEE Information Theory Society Board of Governors has agreed to establish the Joy Thomas IEEE Information Theory Society Tutorial Paper Award. The Joy Thomas Foundation, established to honor Joy’s legacy of excellence and giving back, will sponsor this award.
在这篇文章中,我们纪念乔伊·托马斯,他在2020年不幸去世。乔伊最为人所知的是他的开创性教科书《信息论要素》(Elements of Information Theory),这本书是他与已故的博士导师托马斯·盖伊(Thomas Cover)合著的。我们还列出了乔伊对信息理论及其实践的一些技术贡献。乔伊还通过几家成功的创业公司对行业产生了影响。为了表彰Joy在阐述信息理论方面的贡献,IEEE信息理论学会理事会同意设立Joy Thomas IEEE信息理论学会指导论文奖。乔伊·托马斯基金会(Joy Thomas Foundation)将赞助这一奖项,该基金会的成立是为了纪念乔伊的卓越遗产和回馈社会。
{"title":"Joy Thomas: Legacy, Foundation and the IT Society","authors":"S. Diggavi, A. Gamal, I. Kontoyiannis, A. Paranjpe, Murali Subbarao","doi":"10.1109/mbits.2021.3108946","DOIUrl":"https://doi.org/10.1109/mbits.2021.3108946","url":null,"abstract":"In this article, we commemorate Joy Thomas, who sadly passed away in 2020. Joy is best known for his seminal textbook Elements of Information Theory, coauthored with his Ph.D. advisor the late Thomas Cover. We also catalog some of Joy’s technical contributions to information theory and to its practice. Joy also made an impact on industry through several successful startups. In recognition of Joy’s contribution to the exposition of information theory, the IEEE Information Theory Society Board of Governors has agreed to establish the Joy Thomas IEEE Information Theory Society Tutorial Paper Award. The Joy Thomas Foundation, established to honor Joy’s legacy of excellence and giving back, will sponsor this award.","PeriodicalId":448036,"journal":{"name":"IEEE BITS the Information Theory Magazine","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128035557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE INFORMATION THEORY SOCIETY PRESENTS 信息论社会呈现
Pub Date : 2021-08-01 DOI: 10.1109/mbits.2021.3102337
{"title":"THE INFORMATION THEORY SOCIETY PRESENTS","authors":"","doi":"10.1109/mbits.2021.3102337","DOIUrl":"https://doi.org/10.1109/mbits.2021.3102337","url":null,"abstract":"","PeriodicalId":448036,"journal":{"name":"IEEE BITS the Information Theory Magazine","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128240304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compressed Ultrasound Imaging: From Sub-Nyquist Rates to Super Resolution 压缩超声成像:从亚奈奎斯特速率到超分辨率
Pub Date : 2021-07-23 DOI: 10.1109/mbits.2021.3103144
O. Drori, Alon Mamistvalov, Oren Solomon, Yonina C. Eldar
Medical ultrasound imaging is an ongoing research field for digital signal processing. Following decades of developement in the analogue domain, the introduction of high power computation has led to increased activity and research in the fields of digital signal processing, and, most recently, in machine learning, for the sake of delivering higher quality imaging, while reducing the size of the data required to acquire, process, display and, recently, wirelessly transmit the data to remote devices. An overview of the basics of ultrasound acquisition and imaging is given, followed by a presentation of its limitations and challenges. An in-depth explanation about the development and algorithmics of the methods designed to address each of these challenges follows, with an introduction of the outstanding tasks and issues posed in each field, and their potential applications and benefits to modern healthcare.
医学超声成像是数字信号处理的一个新兴研究领域。在模拟领域几十年的发展之后,高功率计算的引入导致了数字信号处理领域的活动和研究的增加,最近,在机器学习领域,为了提供更高质量的成像,同时减少采集、处理、显示所需的数据大小,最近,无线传输数据到远程设备。概述了超声采集和成像的基础知识,随后介绍了其局限性和挑战。下面将深入解释旨在解决这些挑战的方法的开发和算法,并介绍每个领域中提出的突出任务和问题,以及它们对现代医疗保健的潜在应用和益处。
{"title":"Compressed Ultrasound Imaging: From Sub-Nyquist Rates to Super Resolution","authors":"O. Drori, Alon Mamistvalov, Oren Solomon, Yonina C. Eldar","doi":"10.1109/mbits.2021.3103144","DOIUrl":"https://doi.org/10.1109/mbits.2021.3103144","url":null,"abstract":"Medical ultrasound imaging is an ongoing research field for digital signal processing. Following decades of developement in the analogue domain, the introduction of high power computation has led to increased activity and research in the fields of digital signal processing, and, most recently, in machine learning, for the sake of delivering higher quality imaging, while reducing the size of the data required to acquire, process, display and, recently, wirelessly transmit the data to remote devices. An overview of the basics of ultrasound acquisition and imaging is given, followed by a presentation of its limitations and challenges. An in-depth explanation about the development and algorithmics of the methods designed to address each of these challenges follows, with an introduction of the outstanding tasks and issues posed in each field, and their potential applications and benefits to modern healthcare.","PeriodicalId":448036,"journal":{"name":"IEEE BITS the Information Theory Magazine","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133673095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Publications of Information Theory Society 信息理论学会刊物
Pub Date : 1900-01-01 DOI: 10.1109/mbits.2021.3111537
Wei-ZhouLuandShun-Zheng Yu
{"title":"Publications of Information Theory Society","authors":"Wei-ZhouLuandShun-Zheng Yu","doi":"10.1109/mbits.2021.3111537","DOIUrl":"https://doi.org/10.1109/mbits.2021.3111537","url":null,"abstract":"","PeriodicalId":448036,"journal":{"name":"IEEE BITS the Information Theory Magazine","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115669298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Q&A: Meir Feder on Using Information Theory's Concepts to Solve Complex Problems Across Disciplines 问答:Meir Feder关于使用信息论的概念来解决跨学科的复杂问题
Pub Date : 1900-01-01 DOI: 10.1109/mbits.2023.3263813
U. Thomas, M. Feder
{"title":"Q&A: Meir Feder on Using Information Theory's Concepts to Solve Complex Problems Across Disciplines","authors":"U. Thomas, M. Feder","doi":"10.1109/mbits.2023.3263813","DOIUrl":"https://doi.org/10.1109/mbits.2023.3263813","url":null,"abstract":"","PeriodicalId":448036,"journal":{"name":"IEEE BITS the Information Theory Magazine","volume":"28 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120860827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE BITS the Information Theory Magazine
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1