Abstract—When transmitting information over a noisy channel, two approaches are common: assuming the channel errors are independent of the transmitted content and devising an err...
—We study the rate-distortion relationship in the set of permutations endowed with the Kendall τ-metric and the Chebyshev metric. Our study is motivated by the application of pe...
—This paper studies a new model of stuck-at memory cells which is motivated by the defect model of multi-level cells in non-volatile memories such as flash memories and phase ch...
Recently, it has been shown that incoherence is an unrealistic assumption for compressed sensing when applied to infinite-dimensional inverse problems. Instead, the key property ...
Alexander Daniel Jones, Ben Adcock, Anders C. Hans...
We study the recovery of operators with bandlimited Kohn-Nirenberg symbol from the action of such operators on a weighted impulse train, a procedure we refer to as operator sampli...
The main practical limitation of the McEliece public-key encryption scheme is probably the size of its key. A famous trend to overcome this issue is to focus on subclasses of alte...
Principal component analysis (PCA) aims at estimating the direction of maximal variability of a high-dimensional dataset. A natural question is: does this task become easier, and ...
Computer vision and artificial intelligence research has long danced around the subject of causality: vision researchers use causal relationships to aid action detection, and AI ...