Sciweavers

JMLR
2012
12 years 1 months ago
Hierarchical Relative Entropy Policy Search
Many real-world problems are inherently hierarchically structured. The use of this structure in an agent’s policy may well be the key to improved scalability and higher performa...
Christian Daniel, Gerhard Neumann, Jan Peters
EMNLP
2011
12 years 11 months ago
Entire Relaxation Path for Maximum Entropy Problems
We discuss and analyze the problem of finding a distribution that minimizes the relative entropy to a prior distribution while satisfying max-norm constraints with respect to an ...
Moshe Dubiner, Yoram Singer
CORR
2011
Springer
156views Education» more  CORR 2011»
13 years 3 months ago
From joint convexity of quantum relative entropy to a concavity theorem of Lieb
This paper provides a succinct proof of a 1973 theorem of Lieb that establishes the concavity of a certain trace function. The development relies on a deep result from quantum info...
Joel A. Tropp
CCE
2011
13 years 6 months ago
Computational energy-based redesign of robust proteins
The robustness of a system is a property that pervades all aspects of Nature. The ability of a system to adapt itself to perturbations due to internal and external agents, to agin...
Giovanni Stracquadanio, Giuseppe Nicosia
TIT
2010
121views Education» more  TIT 2010»
13 years 6 months ago
Mismatched estimation and relative entropy
A random variable with distribution P is observed in Gaussian noise and is estimated by a minimum meansquare estimator that assumes that the distribution is Q. This paper shows tha...
Sergio Verdú
CORR
2011
Springer
234views Education» more  CORR 2011»
13 years 6 months ago
Mutual Information, Relative Entropy, and Estimation in the Poisson Channel
Let X be a non-negative random variable and let the conditional distribution of a random variable Y , given X, be Poisson(γ · X), for a parameter γ ≥ 0. We identify a natural...
Rami Atar, Tsachy Weissman
IJNSEC
2007
193views more  IJNSEC 2007»
13 years 11 months ago
Statistical Attack Resilient Data Hiding
In this paper, we propose a discrete cosine transform (DCT) based spread spectrum data-hiding algorithm that is resilient to statistical attacks. Unlike other spread spectrum base...
Palak K. Amin, Ning Liu, Koduvayur P. Subbalakshmi
SSWMC
2004
14 years 24 days ago
Steganalysis of block-structured stegotext
We study a detection-theoretic approach to steganalysis. The relative entropy between covertext and stegotext determines the steganalyzer's difficulty in discriminating them,...
Ying Wang, Pierre Moulin
COLT
2006
Springer
14 years 1 months ago
Can Entropic Regularization Be Replaced by Squared Euclidean Distance Plus Additional Linear Constraints
There are two main families of on-line algorithms depending on whether a relative entropy or a squared Euclidean distance is used as a regularizer. The difference between the two f...
Manfred K. Warmuth
COLT
1995
Springer
14 years 3 months ago
A Comparison of New and Old Algorithms for a Mixture Estimation Problem
We investigate the problem of estimating the proportion vector which maximizes the likelihood of a given sample for a mixture of given densities. We adapt a framework developed for...
David P. Helmbold, Yoram Singer, Robert E. Schapir...