By Topic

Proceedings of 1994 Workshop on Information Theory and Statistics

27-29 Oct. 1994

Filter Results

Displaying Results 1 - 25 of 89
  • Proceedings of 1994 Workshop on Information Theory and Statistics

    Publication Year: 1994
    Request permission for commercial reuse | PDF file iconPDF (476 KB)
    Freely Available from IEEE
  • Tree-structured clustered probability models for texture

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (32 KB)

    Summary form only given, as follows. A cluster-based probability model has been found to perform extremely well at capturing the complex structures in natural textures (e.g., better than Markov random field models). Its success is mainly due to its ability to handle high dimensionality, via large conditioning neighborhoods over multiple scales, and to generalize salient characteristics from limite... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coding for noisy feasible channels

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (65 KB)

    Summary form only given. The author proves a constructive version of Shannon's fundamental theorem of information theory. The new theorem holds for any feasible channel. A channel is feasible provided it is computable by a polynomial time computation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coding for distributed computation

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    Summary form only given. The author describes analogous coding theorems for the more general, interactive, communications required in computation. In this case the bits transmitted in the protocol are not known to the processors in advance but are determined dynamically. First he shows that any interactive protocol of length T between two processors connected by a noiseless channel can be simulate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tracking long-range dependencies with wavelets

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB)

    Long-range dependent processes exhibit features, such as 1/f spectra, for which wavelets offer versatile tools and provide a unifying framework. This efficiency is demonstrated on both continuous processes, point processes and filtered point processes. The fractal shot noise model is also considered. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mismatched encoding in rate distortion theory

    Publication Year: 1994
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (71 KB)

    Summary form only given. A length n block code C of size 2/sup nR/ over a finite alphabet /spl chi//spl circ//sub 0/ is used to encode a memoryless source over a finite alphabet /spl chi/. A length n source sequence x is described by the index i of the codeword x/spl circ//sub 0/(i) that is nearest to x according to the single-letter distortion function d/sub 0/(x,x/spl circ//sub 0/). Based on the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nonparametric kernel estimation for error density

    Publication Year: 1994
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (53 KB)

    Summary form only given. Consider a linear model, y/sub i/=x'/sub i//spl beta/+e/sub i/, i=1,2,..., x'/sub i/s are p(/spl ges/1) dimension known vectors and /spl beta/(/spl isin/R/spl deg/) is an unknown parametric vector and e/sub i/ are assumed i.i.d.r.v.'s from a common unknown density function f(x) with med (e/sub i/)=0. Based on LAD (least absolute deviations) estimator /spl beta//spl tilde/ ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discussion of a statistical channel

    Publication Year: 1994
    Cited by:  Papers (5)
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1994
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • Minimum complexity regression estimation with weakly dependent observations

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    Given N strongly mixing observations {Xi,Yi} i=1N, we estimate the regression function f*(x)=E[Y1|X1=x], x∈ℜd from a class of neural networks, using certain minimum complexity regression estimation schemes. We establish a rate of convergence for the integrated mean squared error between the proposed regression es... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiresolution models for random fields and their use in statistical image processing

    Publication Year: 1994
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB)

    We describe a probabilistic framework for optimal multiresolution processing and analysis of spatial phenomena. Our developed multiresolution (MR) models are useful in describing random processes and fields. The scale recursive nature of the resulting models, leads to extremely efficient algorithms for optimal estimation and likelihood calculation. These models, which are described, have also prov... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SNR estimation and blind equalization (deconvolution) using the kurtosis

    Publication Year: 1994
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    The underlying mathematical problem of both, SNR estimation and blind equalization, is the sum of random processes. It can be shown that it is sufficient to describe the random processes as well as their sum by a shape factor of the p.d.f., the kurtosis, which includes the second and fourth order moment View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New distortion measures for speech processing

    Publication Year: 1994
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    New distortion measures are derived from a recently proposed characterization function of stationary time series and are shown to be more robust than some commonly-used distortion measures such as the Kullback-Leibler spectral divergence in speech processing View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characteristics of a statistical fuzzy grade-of-membership model in the context of unsupervised data clustering

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    We have elucidated the position of Woodbury's (1974) statistical fuzzy grade-of-membership (GoM) model in the unsupervised clustering domain. This implementation of the model is shown to operate not only on multivariate categorical data, but on permuted, or encoded, data as well View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wavelet vector quantization with matching pursuit

    Publication Year: 1994
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    To compute the optimal expansion of signals in redundant dictionary of waveforms is an NP complete problem. We introduce a greedy-algorithm, called matching pursuit, that performs a sub-optimal expansion. This algorithm can be interpreted as a shape-gain multistage vector quantization. The waveforms are chosen iteratively in order to best match the signal structures. Matching pursuits are general ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Markov model in mobile communication channel

    Publication Year: 1994
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    An adaptive Markov model with three states for the mobile communication channel is studied and simulated. The error sequence describing the long burst error characteristics of the model channel is generated on a computer. A test method using a threshold technique is given to verify the accuracy of the adaptive channel model View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural processing of information

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    A model is proposed in which the neuron serves as an information channel. An application of the Shannon information measures of entropy and mutual information taken together in the context of the proposed model lead to the Hopfield neuron model with a conditionalized Hebbian learning rule and sigmoidal transfer characteristic View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting regularity in point processes generated by humans

    Publication Year: 1994
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    Detecting minefields in the presence of clutter is an important challenge for the Navy. Mine-fields have point patterns that tend to be regular for a variety of reasons including strategic doctrine, safety, tactical efficiency, and perhaps most intriguing the human element. For example, humans have a tendency to make lottery number selections, a one-dimensional discrete point process, in a non-uni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The finite-sample risk of the k-nearest-neighbor classifier under the Lp metric

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    The finite-sample risk of the k-nearest neighbor classifier that uses an L2 distance function is examined. For a family of classification problems with smooth distributions in Rn, the risk can be represented as an asymptotic expansion in inverse powers of the n-th root of the reference-sample size. The leading coefficients of this expansion suggest that the Euclidean or L View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimation and prediction for (mostly Gaussian) Markov fields in the continuum

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    We present a survey of design problems and results that arise in the prediction and parameter estimation of stochastic partial differential equations (SPDES). The aim is to better understand some unavoidable errors that occur in the discretization of SPDEs, and available methods for minimizing these errors View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Greedy growing of tree-structured classification rules using a composite splitting criterion

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB)

    We establish the Bayes risk consistency of an unsupervised greedy-growing algorithm that produces tree-structured classifiers from labeled training vectors. The algorithm employs a composite splitting criterion equal to a weighted sum of Bayes risk and Euclidean distortion View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shannon-Hartley entropy ratio under Zipf law

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    We find a formula for Shannon's-Hartley's entropy Ratio of a text governed by the Zipf law. The formula is in a good agreement with real texts. It is asymptotically 1/2+loglog|D|/log|D||D| being the size of the text's dictionary, lim|D|=∞. It means that a word to variable length code might significantly outperform a word to fixed length one for large dictionaries only View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wavelet transform based ECG data compression with desired reconstruction signal quality

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    This paper proposes a new coding strategy by which the desired quality of reproduced signal can be guaranteed with the minimum cost of coding rate. The idea was successfully introduced to the DOWT-based coding system for the ECG compression application View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nonparametric estimation of a class of smooth functions

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB)

    The problem of recovering bandlimited signals from noisy data is considered. Whittaker-Shannon cardinal expansions based estimates involving sampling windows and truncation of higher frequencies are introduced. Weak and strong pointwise convergence properties of the proposed estimates are derived View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Markov chains and random walks in data communication receivers

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    In many data communication receivers up/down counters are used as a critical part of the processing to determine whether the symbol timing and/or carrier phase tracking phase-locked loops are in-lock or out-of-lock, and it is necessary to calculate the various probabilities for true and false indications of in-lock or out-of-lock. A random walk along a line (which is viewed as a Markov chain) is a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.