Proceedings of 1994 Workshop on Information Theory and Statistics

27-29 Oct. 1994

Filter Results

Displaying Results 1 - 25 of 89
  • Proceedings of 1994 Workshop on Information Theory and Statistics

    Publication Year: 1994
    Request permission for commercial reuse | PDF file iconPDF (476 KB)
    Freely Available from IEEE
  • Tree-structured clustered probability models for texture

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (32 KB)

    Summary form only given, as follows. A cluster-based probability model has been found to perform extremely well at capturing the complex structures in natural textures (e.g., better than Markov random field models). Its success is mainly due to its ability to handle high dimensionality, via large conditioning neighborhoods over multiple scales, and to generalize salient characteristics from limite... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coding for noisy feasible channels

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (65 KB)

    Summary form only given. The author proves a constructive version of Shannon's fundamental theorem of information theory. The new theorem holds for any feasible channel. A channel is feasible provided it is computable by a polynomial time computation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coding for distributed computation

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    Summary form only given. The author describes analogous coding theorems for the more general, interactive, communications required in computation. In this case the bits transmitted in the protocol are not known to the processors in advance but are determined dynamically. First he shows that any interactive protocol of length T between two processors connected by a noiseless channel can be simulate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tracking long-range dependencies with wavelets

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB)

    Long-range dependent processes exhibit features, such as 1/f spectra, for which wavelets offer versatile tools and provide a unifying framework. This efficiency is demonstrated on both continuous processes, point processes and filtered point processes. The fractal shot noise model is also considered. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mismatched encoding in rate distortion theory

    Publication Year: 1994
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (71 KB)

    Summary form only given. A length n block code C of size 2/sup nR/ over a finite alphabet /spl chi//spl circ//sub 0/ is used to encode a memoryless source over a finite alphabet /spl chi/. A length n source sequence x is described by the index i of the codeword x/spl circ//sub 0/(i) that is nearest to x according to the single-letter distortion function d/sub 0/(x,x/spl circ//sub 0/). Based on the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nonparametric kernel estimation for error density

    Publication Year: 1994
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (53 KB)

    Summary form only given. Consider a linear model, y/sub i/=x'/sub i//spl beta/+e/sub i/, i=1,2,..., x'/sub i/s are p(/spl ges/1) dimension known vectors and /spl beta/(/spl isin/R/spl deg/) is an unknown parametric vector and e/sub i/ are assumed i.i.d.r.v.'s from a common unknown density function f(x) with med (e/sub i/)=0. Based on LAD (least absolute deviations) estimator /spl beta//spl tilde/ ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discussion of a statistical channel

    Publication Year: 1994
    Cited by:  Papers (5)
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1994
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • Minimal randomness and information theory

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    This is a tutorial survey of recent information theoretic results dealing with the minimal randomness necessary for the generation of random processes with prescribed distributions View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural networks for error correction of Hamming codes

    Publication Year: 1994
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    A comparative analysis of three neural network models: backpropagation (BPP), bidirectional associative memory (BAM) and holographic associative memory (HAM); and a classical method for error-correction is presented. Each method is briefly described, results are reported and finally some advantages are concluded View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bayes risk-weighted vector quantization

    Publication Year: 1994
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB)

    Lossy compression and classification algorithms both attempt to reduce a large collection of possible observations into a few representative categories so as to preserve essential information. A framework for combining classification and compression into one or two quantizers is described along with some examples and related to other quantizer-based classification schemes View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image coding via bintree segmentation and texture VQ

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    Image compression is often approached from an angle of statistical image classification. For instance, VQ-based image coding methods compress image data by classifying image blocks into representative two-dimensional patterns (codewords) that statistically approximate the original data. Another image compression approach that naturally relates to image classification is segmentation-based image co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bandwidth choice and convergence rates in density estimation with long-range dependent data

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    The authors discuss the optimal bandwidth choice and optimal convergence rates for density estimation with dependent data, as the amount of information in the sample is altered by adjusting the range of dependence. They assume that data are observed from a stationary stochastic process that may be taken to be an unknown function of a Gaussian process View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New distortion measures for speech processing

    Publication Year: 1994
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    New distortion measures are derived from a recently proposed characterization function of stationary time series and are shown to be more robust than some commonly-used distortion measures such as the Kullback-Leibler spectral divergence in speech processing View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the theory and application of universal classification to signal detection

    Publication Year: 1994
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB)

    The authors apply methods of universal classification to the problem of classifying one of M deterministic signals in the presence of dependent non-Gaussian noise View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information theory and statistics

    Publication Year: 1994
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    The main theorems in information theory and statistics are put in context, the differences are discussed, and some of the open research problems are mentioned. The author demonstrates some of the points of intersection of information theory and statistics, and discuss some problems in physics and computer science that require a rigorous probabilistic treatment View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tree-based models for speech and language

    Publication Year: 1994
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB)

    Several applications of statistical tree-based modelling are described to problems in speech and language, including prediction of possible phonetic realizations, segment duration modelling in speech synthesis and end of sentence detection in text analysis View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wavelet vector quantization with matching pursuit

    Publication Year: 1994
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    To compute the optimal expansion of signals in redundant dictionary of waveforms is an NP complete problem. We introduce a greedy-algorithm, called matching pursuit, that performs a sub-optimal expansion. This algorithm can be interpreted as a shape-gain multistage vector quantization. The waveforms are chosen iteratively in order to best match the signal structures. Matching pursuits are general ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The role of approximation and smoothness spaces in compression and noise removal

    Publication Year: 1994
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    A brief discussion is given of the role of approximation and smoothness spaces in algorithms for noise removal and compression. The discussion is limited to cases where approximation takes place in a Hilbert space although the theory applies in far greater generality View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characteristics of a statistical fuzzy grade-of-membership model in the context of unsupervised data clustering

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    We have elucidated the position of Woodbury's (1974) statistical fuzzy grade-of-membership (GoM) model in the unsupervised clustering domain. This implementation of the model is shown to operate not only on multivariate categorical data, but on permuted, or encoded, data as well View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The asymptotic normality of global errors for a histogram based density estimate

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    The paper considers a sequence of i.i.d. real valued random variables with common unknown density and examines the histogram estimate. It addresses the problem of estimating an unknown probability density function in information divergence View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sample path description of Gauss Markov random fields

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    We provide a characterization of Gauss Markov random fields in terms of partial differential equations with random forcing term. Our method consists of obtaining a concrete representation of an abstract stochastic partial differential equation using some results from the theory of vector measures View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting regularity in point processes generated by humans

    Publication Year: 1994
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    Detecting minefields in the presence of clutter is an important challenge for the Navy. Mine-fields have point patterns that tend to be regular for a variety of reasons including strategic doctrine, safety, tactical efficiency, and perhaps most intriguing the human element. For example, humans have a tendency to make lottery number selections, a one-dimensional discrete point process, in a non-uni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantization theory and EC-CELP advantages at low bit rates

    Publication Year: 1994
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    The goal of this work is to analyze the advantages of the recently introduced entropy-constrained code-excited linear predictive (EC-CELP) quantization. The analysis is at low rates in comparison with other EC quantization schemes. Based on N-th order rate-distortion function (RDF), EC quantization theory, and empirical methods, RDF memory gain and empirical space-filling gain (dimensionality N) a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.