咨询与建议

限定检索结果

文献类型

  • 2 篇 会议

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 电气工程
    • 2 篇 计算机科学与技术...

主题

  • 2 篇 markov processes
  • 2 篇 secure lossy sou...
  • 2 篇 source coding
  • 1 篇 secure lossy tra...
  • 1 篇 rate distortion ...
  • 1 篇 gaussian vector ...
  • 1 篇 transmission rat...
  • 1 篇 distortion
  • 1 篇 distortion crite...
  • 1 篇 optimization
  • 1 篇 random variables
  • 1 篇 wireless sensor ...
  • 1 篇 covariance matri...
  • 1 篇 vector gaussian ...
  • 1 篇 rate distortion ...
  • 1 篇 decoding
  • 1 篇 action dependent...
  • 1 篇 action sequence
  • 1 篇 outer bound
  • 1 篇 security

机构

  • 1 篇 royal inst techn...
  • 1 篇 univ maryland de...

作者

  • 1 篇 kittichokechai k...
  • 1 篇 oechtering tobia...
  • 1 篇 ulukus sennur
  • 1 篇 ekrem ersen
  • 1 篇 skoglund mikael

语言

  • 2 篇 英文
检索条件"主题词=secure lossy source coding problem"
2 条 记 录,以下是1-10 订阅
排序:
secure source coding with Action-dependent Side Information
Secure Source Coding with Action-dependent Side Information
收藏 引用
IEEE International Symposium on Information Theory (ISIT)
作者: Kittichokechai, Kittipong Oechtering, Tobias J. Skoglund, Mikael Royal Inst Technol KTH Sch Elect Engn Stockholm Sweden
We consider a secure lossy source coding problem with the presence of an eavesdropper who has access to the source description. An encoder wants to compress the source in such a way that the intended decoder can recon... 详细信息
来源: 评论
secure lossy Transmission of Vector Gaussian sources
Secure Lossy Transmission of Vector Gaussian Sources
收藏 引用
IEEE International Symposium on Information Theory (ISIT)
作者: Ekrem, Ersen Ulukus, Sennur Univ Maryland Dept Elect & Comp Engn College Pk MD 20742 USA
We study the secure lossy transmission of a Gaussian vector source to a legitimate user in the presence of an eavesdropper, where both the legitimate user and the eavesdropper have Gaussian vector side information. Th... 详细信息
来源: 评论