Zobrazeno 1 - 10
of 43
pro vyhledávání: '"Schieler, Curt"'
Autor:
Wang, Jade, Bilyeu, Bryan, Boroson, Don, Caplan, Dave, Riesing, Kat, Robinson, Bryan, Schieler, Curt, Johnson, Michael D., Blackburn, Lindy, Haworth, Kari, Houston, Janice, Issaoun, Sara, Palumbo, Daniel, Richards, Elliot, Srinivasan, Ranjani, Weintroub, Jonathan, Marrone, Dan
The Black Hole Explorer (BHEX) is a mission concept that can dramatically improve state-of-the-art astronomical very long baseline interferometry (VLBI) imaging resolution by extending baseline distances to space. To support these scientific goals, a
Externí odkaz:
http://arxiv.org/abs/2406.09572
Autor:
Sasián, José, Castle, Kenneth R., Gilbert, Noah C., Bilyeu, Bryan C., Brown, Joshua J., Chang, Jesse S., Crompton, David R., Garg, Ajay S., Horvath, Andrew J., Petrilli, Lawrence J., Reeve, Robert S., Riesing, Kathleen M., Robinson, Bryan S., Schieler, Curt M., Schue, Miyoung P., Scozzafava, Joseph J., Wang, Jade P.
Publikováno v:
Proceedings of SPIE; September 2024, Vol. 13133 Issue: 1 p131330E-131330E-16, 13001687p
Autor:
Schieler, Curt, Cuff, Paul
We introduce a new measure of information-theoretic secrecy based on rate-distortion theory and study it in the context of the Shannon cipher system. Whereas rate-distortion theory is traditionally concerned with a single reconstruction sequence, in
Externí odkaz:
http://arxiv.org/abs/1410.2881
Autor:
Schieler, Curt, Cuff, Paul
Let $X^n\in\mathcal{X}^n$ be a sequence drawn from a discrete memoryless source, and let $Y^n\in\mathcal{Y}^n$ be the corresponding reconstruction sequence that is output by a good rate-distortion code. This paper establishes a property of the joint
Externí odkaz:
http://arxiv.org/abs/1307.7770
Autor:
Schieler, Curt, Cuff, Paul
Publikováno v:
IEEE Trans. on Inf. Theory, 60(12):7584-605, December, 2014
Secrecy in communication systems is measured herein by the distortion that an adversary incurs. The transmitter and receiver share secret key, which they use to encrypt communication and ensure distortion at an adversary. A model is considered in whi
Externí odkaz:
http://arxiv.org/abs/1305.3905
Imperfect secrecy in communication systems is investigated. Instead of using equivocation as a measure of secrecy, the distortion that an eavesdropper incurs in producing an estimate of the source sequence is examined. The communication system consis
Externí odkaz:
http://arxiv.org/abs/1210.1549
Autor:
Schieler, Curt, Cuff, Paul
A secret key can be used to conceal information from an eavesdropper during communication, as in Shannon's cipher system. Most theoretical guarantees of secrecy require the secret key space to grow exponentially with the length of communication. Here
Externí odkaz:
http://arxiv.org/abs/1205.3853
Autor:
Coyle, Laura E., Matsuura, Shuji, Perrin, Marshall D., Wang, Jade, Bilyeu, Bryan, Boroson, Don, Caplan, Dave, Riesing, Kat, Robinson, Bryan, Schieler, Curt, Johnson, Michael D., Blackburn, Lindy, Haworth, Kari, Houston, Janice, Issaoun, Sara, Palumbo, Daniel, Richards, Elliot, Srinivasan, Ranjani, Weintraub, Jonathan, Marrone, Dan
Publikováno v:
Proceedings of SPIE; August 2024, Vol. 13092 Issue: 1 p130926W-130926W-7, 1178342p
Autor:
Cuff, Paul, Schieler, Curt
We consider a new fundamental question regarding the point-to-point memoryless channel. The source-channel separation theorem indicates that random codebook construction for lossy source compression and channel coding can be independently constructed
Externí odkaz:
http://arxiv.org/abs/1110.0425
Publikováno v:
Proceedings of SPIE; March 2024, Vol. 12877 Issue: 1 p128771A-128771A-17, 12748347p