The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
Displaying 1261 –
1280 of
1507
This paper examines appropriate protocols for high speed multiple access communication systems where the bandwidth is divided into two separate asymmetric channels. Both channels operate using slotted non-persistent CSMA or CSMA/CD techniques. Free stations access the first channel while all retransmissions occur in the second channel. We define the stability regions and the rules for optimal bandwidth allocation among the two channels for improvement of the system performance in case of infinite...
The paper deals with the stability of the fundamental equation of information of multiplicative type. It is proved that the equation in question is stable in the sense of Hyers and Ulam under some assumptions. This result is applied to prove the stability of a system of functional equations that characterizes the recursive measures of information of multiplicative type.
The paper solves the problem of minimization of the Kullback divergence between a partially known and a completely known probability distribution.
It considers two probability distributions of a random vector on a sample space of dimensions. One of the distributions is known, the other is known only partially. Namely, only the conditional probability distributions of given are known for . Our objective is to determine the remaining conditional probability distributions of given such...
We study how iterated convolutions of probability measures compare under stochastic domination. We give necessary and sufficient conditions for the existence of an integer n such that μ*n is stochastically dominated by ν*n for two given probability measures μ and ν. As a consequence we obtain a similar theorem on the majorization order for vectors in Rd. In particular we prove results about catalysis in quantum information theory.
In the last years, a relation between bounded real functions of one variable and two-valued probabilistic functions defined on the complex plane has been established through the introduction of the Sigma-Transform concept.The paper presents an extension of the concept of Sigma-Transform, giving rise to the diagonal Sigma-Transform and the Striped Sigma-Transform which, when combined, allow a formal treatment of the Multichannel Stochastic Signal Codification. An application of the method to error...
In this paper, we determine all the normal forms of Hermitian matrices over finite group rings , where , is a commutative -group with order . Furthermore, using the normal forms of Hermitian matrices, we study the structure of unitary group over through investigating its BN-pair and order. As an application, we construct a Cartesian authentication code and compute its size parameters.
This report examines important issues pertaining to the different ways of affecting the information security of file objects under information attacks through methods of compression. Accordingly, the report
analyzes the three-way relationships which may exist among a selected set
of attacks, methods and objects. Thus, a methodology is proposed for evaluation of information security, and a coefficient of information security is created. With respects to this coefficient, using different criteria...
The notion of g-locality was introduced in order to generalize the branching one. This notion seems to represent the characteristic property of the entropies which can be utilized in the inquiring processes.In this paper we have characterized all the g-local entropies by determining the whole class of the locality laws.
Currently displaying 1261 –
1280 of
1507