Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,958,048 papers from all fields of science
Search
Sign In
Create Free Account
Mutual information
Known as:
Average Mutual Information
, Transinformation
, Mutual entropy
Expand
In probability theory and information theory, the mutual information (MI) of two random variables is a measure of the mutual dependence between the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Athanasios Papoulis
Binary number
Brown clustering
Cluster analysis
Expand
Broader (1)
Information theory
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Coding for Trusted Storage in Untrusted Networks
Paulo F. Oliveira
,
L. Lima
,
T. Vinhoza
,
J. Barros
,
M. Médard
IEEE Transactions on Information Forensics and…
2012
Corpus ID: 9127767
We focus on the problem of secure distributed storage over multiple untrusted clouds or networks. Our main contribution is a low…
Expand
2009
2009
Filtering spam e-mail from mixed arabic and english messages: a comparison of machine learning techniques
A. El-Halees
˜The œinternational Arab journal of information…
2009
Corpus ID: 14456017
Spam is one of the main problems in emails communications. As the volume of non-english language spam increases, little work is…
Expand
2008
2008
Secure Transmission with Multiple Antennas: The MIMOME Channel
A. Khisti
,
G. Wornell
2008
Corpus ID: 18058170
— The Gaussian wiretap channel model is studied when there are multiple antennas at the sender, the receiver and the eavesdropper…
Expand
Highly Cited
2008
Highly Cited
2008
Theoretical analysis of an information-based quality measure for image fusion
Yin Chen
,
Z. Xue
,
Rick S. Blum
Information Fusion
2008
Corpus ID: 205431872
Highly Cited
2007
Highly Cited
2007
On PHY and MAC Performance of 3G-LTE in a Multi-Hop Cellular Environment
R. Schoenen
,
B. Walke
International Conference on Wireless…
2007
Corpus ID: 17900654
Next generation cellular radio systems will exceed the limitations of UMTS. The convergence of data and voice traffic will be…
Expand
Highly Cited
2006
Highly Cited
2006
Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method
T. Ignatenko
,
G. Schrijen
,
B. Škorić
,
P. Tuyls
,
F. Willems
IEEE International Symposium on Information…
2006
Corpus ID: 14357912
We propose methods to estimate the secrecy-rate of fuzzy sources (e.g. biometrics and physical unclonable functions (PUFs)) using…
Expand
Highly Cited
2005
Highly Cited
2005
Computer Vision for Biomedical Image Applications, First International Workshop, CVBIA 2005, Beijing, China, October 21, 2005, Proceedings
Yanxi Liu
,
Tianzi Jiang
,
Changshui Zhang
Computer Vision for Biomedical Image Applications
2005
Corpus ID: 12216067
2005
2005
Experiments in Mental Face Retrieval
Yuchun Fang
,
D. Geman
International Conference on Audio- and Video…
2005
Corpus ID: 16153703
We propose a relevance feedback system for retrieving a mental face picture from a large image database. This scenario differs…
Expand
Highly Cited
1997
Highly Cited
1997
Noise-enhanced capacity via stochastic resonance in an asymmetric binary channel
F. Chapeau-Blondeau
1997
Corpus ID: 52219193
A nonlinear system is considered where an aperiodic binary input signal is added to an arbitrarily distributed noise and compared…
Expand
Highly Cited
1995
Highly Cited
1995
A study on spatially induced "virtual force" with an information theoretic investigation of human performance
D. Repperger
,
C. Phillips
,
T. Chelette
IEEE Transactions on Systems, Man and Cybernetics
1995
Corpus ID: 11534200
Present virtual reality (VR) systems present powerful graphical information with human interaction capability but may be missing…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE