callback( { "result":{ "query":"information* loss*", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"345.32" }, "completions":{ "@total":"15", "@computed":"15", "@sent":"0" }, "hits":{ "@total":"750", "@computed":"750", "@sent":"750", "@first":"0", "hit":[{ "@score":"2", "@id":"4116", "info":{"authors":{"author":[{"@pid":"302/7480","text":"Qifeng Wan"},{"@pid":"129/2913","text":"Xuanhua Xu"},{"@pid":"90/2562-7","text":"Jing Han 0007"}]},"title":"A dimensionality reduction method for large-scale group decision-making using TF-IDF feature similarity and information loss entropy.","venue":"Appl. Soft Comput.","volume":"150","pages":"111039","year":"2024","type":"Journal Articles","access":"closed","key":"journals/asc/WanXH24","doi":"10.1016/J.ASOC.2023.111039","ee":"https://doi.org/10.1016/j.asoc.2023.111039","url":"https://dblp.org/rec/journals/asc/WanXH24"}, "url":"URL#4116" }, { "@score":"2", "@id":"27864", "info":{"authors":{"author":[{"@pid":"91/5153","text":"Meng Zhu"},{"@pid":"29/4943","text":"Weidong Min"},{"@pid":"00/3003","text":"Junwei Han"},{"@pid":"76/4122","text":"Qing Han"},{"@pid":"348/5338","text":"Shimiao Cui"}]},"title":"Improved channel attention methods via hierarchical pooling and reducing information loss.","venue":"Pattern Recognit.","volume":"148","pages":"110148","year":"2024","type":"Journal Articles","access":"closed","key":"journals/pr/ZhuMHHC24","doi":"10.1016/J.PATCOG.2023.110148","ee":"https://doi.org/10.1016/j.patcog.2023.110148","url":"https://dblp.org/rec/journals/pr/ZhuMHHC24"}, "url":"URL#27864" }, { "@score":"2", "@id":"57245", "info":{"authors":{"author":[{"@pid":"228/4651","text":"Buu Phan"},{"@pid":"84/5679","text":"Ashish Khisti"},{"@pid":"144/6942","text":"Christos Louizos"}]},"title":"Importance Matching Lemma for Lossy Compression with Side Information.","venue":"CoRR","volume":"abs/2401.02609","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2401-02609","doi":"10.48550/ARXIV.2401.02609","ee":"https://doi.org/10.48550/arXiv.2401.02609","url":"https://dblp.org/rec/journals/corr/abs-2401-02609"}, "url":"URL#57245" }, { "@score":"2", "@id":"57477", "info":{"authors":{"author":[{"@pid":"69/1798","text":"Xin He"},{"@pid":"206/6179","text":"Longhui Wei"},{"@pid":"123/2869","text":"Lingxi Xie"},{"@pid":"78/1467-1","text":"Qi Tian 0001"}]},"title":"Incorporating Visual Experts to Resolve the Information Loss in Multimodal Large Language Models.","venue":"CoRR","volume":"abs/2401.03105","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2401-03105","doi":"10.48550/ARXIV.2401.03105","ee":"https://doi.org/10.48550/arXiv.2401.03105","url":"https://dblp.org/rec/journals/corr/abs-2401-03105"}, "url":"URL#57477" }, { "@score":"2", "@id":"63687", "info":{"authors":{"author":[{"@pid":"230/7743","text":"Jan Trienes"},{"@pid":"347/2026","text":"Sebastian Joseph"},{"@pid":"160/1725","text":"Jörg Schlötterer"},{"@pid":"47/5048","text":"Christin Seifert"},{"@pid":"220/2020","text":"Kyle Lo"},{"@pid":"32/1213","text":"Wei Xu"},{"@pid":"00/8247","text":"Byron C. Wallace"},{"@pid":"148/9553","text":"Junyi Jessy Li"}]},"title":"InfoLossQA: Characterizing and Recovering Information Loss in Text Simplification.","venue":"CoRR","volume":"abs/2401.16475","year":"2024","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2401-16475","doi":"10.48550/ARXIV.2401.16475","ee":"https://doi.org/10.48550/arXiv.2401.16475","url":"https://dblp.org/rec/journals/corr/abs-2401-16475"}, "url":"URL#63687" }, { "@score":"2", "@id":"129978", "info":{"authors":{"author":[{"@pid":"75/905","text":"Wenbin Zhu"},{"@pid":"76/3358","text":"Rui Liang"},{"@pid":"122/1673","text":"Jiangxin Yang"},{"@pid":"122/1650","text":"Yanlong Cao"},{"@pid":"250/6894","text":"Guizhong Fu"},{"@pid":"91/7629","text":"Yanpeng Cao"}]},"title":"A sub-region Unet for weak defects segmentation with global information and mask-aware loss.","venue":"Eng. Appl. Artif. Intell.","volume":"122","pages":"106011","year":"2023","type":"Journal Articles","access":"closed","key":"journals/eaai/ZhuLYCFC23","doi":"10.1016/J.ENGAPPAI.2023.106011","ee":"https://doi.org/10.1016/j.engappai.2023.106011","url":"https://dblp.org/rec/journals/eaai/ZhuLYCFC23"}, "url":"URL#129978" }, { "@score":"2", "@id":"131540", "info":{"authors":{"author":[{"@pid":"354/6923","text":"Mike Königs"},{"@pid":"178/0689","text":"Bernd Löhlein"}]},"title":"Lumped model for the calculation of harmonic eddy current losses in permanent magnets for homogeneous flux distributions considering eddy current reaction flux.","venue":"Elektrotech. Informationstechnik","volume":"140","number":"5","pages":"488-496","year":"2023","type":"Journal Articles","access":"open","key":"journals/ei/KonigsL23","doi":"10.1007/S00502-023-01147-Z","ee":"https://doi.org/10.1007/s00502-023-01147-z","url":"https://dblp.org/rec/journals/ei/KonigsL23"}, "url":"URL#131540" }, { "@score":"2", "@id":"132843", "info":{"authors":{"author":[{"@pid":"83/5211","text":"Vladimir V. Aristov"},{"@pid":"365/0712","text":"Alexey V. Karnaukhov"},{"@pid":"315/0756","text":"Anatoly S. Buchelnikov"},{"@pid":"71/7479","text":"Vladimir F. Levchenko"},{"@pid":"185/8359","text":"Yury D. Nechipurenko"}]},"title":"The Degradation and Aging of Biological Systems as a Process of Information Loss and Entropy Increase.","venue":"Entropy","volume":"25","number":"7","pages":"1067","year":"2023","type":"Journal Articles","access":"open","key":"journals/entropy/AristovKBLN23","doi":"10.3390/E25071067","ee":"https://doi.org/10.3390/e25071067","url":"https://dblp.org/rec/journals/entropy/AristovKBLN23"}, "url":"URL#132843" }, { "@score":"2", "@id":"132962", "info":{"authors":{"author":[{"@pid":"292/6794","text":"Pisin Chen"},{"@pid":"364/9646","text":"Misao Sasaki"},{"@pid":"364/8526","text":"Dong-han Yeom"},{"@pid":"365/0439","text":"Junggi Yoon"}]},"title":"Tunneling between Multiple Histories as a Solution to the Information Loss Paradox.","venue":"Entropy","volume":"25","number":"12","pages":"1663","year":"2023","type":"Journal Articles","access":"open","key":"journals/entropy/ChenSYY23","doi":"10.3390/E25121663","ee":"https://doi.org/10.3390/e25121663","url":"https://dblp.org/rec/journals/entropy/ChenSYY23"}, "url":"URL#132962" }, { "@score":"2", "@id":"133260", "info":{"authors":{"author":[{"@pid":"204/8756","text":"Rainer Hollerbach"},{"@pid":"46/1120","text":"Eun-Jin Kim"}]},"title":"Effects of Stochastic Noises on Limit-Cycle Oscillations and Power Losses in Fusion Plasmas and Information Geometry.","venue":"Entropy","volume":"25","number":"4","pages":"664","year":"2023","type":"Journal Articles","access":"open","key":"journals/entropy/HollerbachK23","doi":"10.3390/E25040664","ee":"https://doi.org/10.3390/e25040664","url":"https://dblp.org/rec/journals/entropy/HollerbachK23"}, "url":"URL#133260" }, { "@score":"2", "@id":"147738", "info":{"authors":{"author":[{"@pid":"87/3443","text":"Ao Wang"},{"@pid":"290/6616","text":"Yu-Zhen Wei"},{"@pid":"209/9986","text":"Zongyi Li"},{"@pid":"35/994","text":"Min Jiang"}]},"title":"Research on information lossless teleportation via the W states.","venue":"IET Quantum Commun.","volume":"4","number":"4","pages":"200-207","year":"2023","type":"Journal Articles","access":"closed","key":"journals/iet-qtc/WangWLJ23","doi":"10.1049/QTC2.12062","ee":"https://doi.org/10.1049/qtc2.12062","url":"https://dblp.org/rec/journals/iet-qtc/WangWLJ23"}, "url":"URL#147738" }, { "@score":"2", "@id":"154576", "info":{"authors":{"author":[{"@pid":"173/4795","text":"Asma Rani"},{"@pid":"17/1557","text":"Navneet Goyal"},{"@pid":"g/ShashiKGadia","text":"Shashi K. Gadia"}]},"title":"Provenance Framework for Multi-Depth Querying Using Zero-Information Loss Database.","venue":"Int. J. Inf. Technol. Decis. Mak.","volume":"22","number":"5","pages":"1693-1742","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijitdm/RaniGG23","doi":"10.1142/S0219622022500845","ee":"https://doi.org/10.1142/S0219622022500845","url":"https://dblp.org/rec/journals/ijitdm/RaniGG23"}, "url":"URL#154576" }, { "@score":"2", "@id":"160562", "info":{"authors":{"author":[{"@pid":"162/3143","text":"Yuzhu Wu"},{"@pid":"76/2452","text":"Yuan Gao"},{"@pid":"85/7433","text":"Bowen Zhang"},{"@pid":"p/WitoldPedrycz","text":"Witold Pedrycz"}]},"title":"Minimum information-loss transformations to support heterogeneous group decision making in a distributed linguistic context.","venue":"Inf. Fusion","volume":"89","pages":"437-451","year":"2023","type":"Journal Articles","access":"closed","key":"journals/inffus/WuGZP23","doi":"10.1016/J.INFFUS.2022.07.009","ee":"https://doi.org/10.1016/j.inffus.2022.07.009","url":"https://dblp.org/rec/journals/inffus/WuGZP23"}, "url":"URL#160562" }, { "@score":"3", "@id":"160585", "info":{"authors":{"author":[{"@pid":"45/3144","text":"Lisheng Xu"},{"@pid":"95/4452","text":"Haoran Zhang"},{"@pid":"153/7840","text":"Jiaole Wang"},{"@pid":"33/2805","text":"Ang Li"},{"@pid":"86/4211-2","text":"Shuang Song 0002"},{"@pid":"44/3343","text":"Hongliang Ren 0001"},{"@pid":"82/3116-2","text":"Lin Qi 0002"},{"@pid":"60/955","text":"Jason Jianjun Gu"},{"@pid":"m/MaxQHMeng","text":"Max Q.-H. Meng"}]},"title":"Information loss challenges in surgical navigation systems: From information fusion to AI-based approaches.","venue":"Inf. Fusion","volume":"92","pages":"13-36","year":"2023","type":"Journal Articles","access":"closed","key":"journals/inffus/XuZWLSRQGM23","doi":"10.1016/J.INFFUS.2022.11.015","ee":"https://doi.org/10.1016/j.inffus.2022.11.015","url":"https://dblp.org/rec/journals/inffus/XuZWLSRQGM23"}, "url":"URL#160585" }, { "@score":"2", "@id":"165972", "info":{"authors":{"author":[{"@pid":"281/1243","text":"Yuan-Wei Lv"},{"@pid":"26/1407","text":"Guang-Hong Yang"}]},"title":"Centralized and distributed adaptive cubature information filters for multi-sensor systems with unknown probability of measurement loss.","venue":"Inf. Sci.","volume":"630","pages":"173-189","year":"2023","type":"Journal Articles","access":"closed","key":"journals/isci/LvY23","doi":"10.1016/J.INS.2023.02.035","ee":"https://doi.org/10.1016/j.ins.2023.02.035","url":"https://dblp.org/rec/journals/isci/LvY23"}, "url":"URL#165972" }, { "@score":"2", "@id":"183384", "info":{"authors":{"author":[{"@pid":"153/8321","text":"Abhishek Kumar Jha"},{"@pid":"89/11294-10","text":"Saurabh Kumar 0010"}]},"title":"'Don't Fool Me, as It Is Your Loss' ? Impact of Deception on Information Privacy.","venue":"J. Organ. Comput. Electron. Commer.","volume":"33","number":"3-4","pages":"117-132","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jocec/JhaK23","doi":"10.1080/10919392.2023.2253086","ee":"https://doi.org/10.1080/10919392.2023.2253086","url":"https://dblp.org/rec/journals/jocec/JhaK23"}, "url":"URL#183384" }, { "@score":"2", "@id":"244720", "info":{"authors":{"author":[{"@pid":"01/8558-2","text":"Ying Shen 0002"},{"@pid":"83/7577","text":"Zheng-Guang Wu"},{"@pid":"29/3191-1","text":"Peng Shi 0001"},{"@pid":"89/5615","text":"Bo Chen"}]},"title":"$\\mathcal {H}_{\\infty }$ Control of Constrained Markov Jump Systems With Intermittent Mode Information Loss.","venue":"IEEE Trans. Autom. Control.","volume":"68","number":"12","pages":"8052-8058","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tac/ShenWSC23","doi":"10.1109/TAC.2023.3258453","ee":"https://doi.org/10.1109/TAC.2023.3258453","url":"https://dblp.org/rec/journals/tac/ShenWSC23"}, "url":"URL#244720" }, { "@score":"2", "@id":"261644", "info":{"authors":{"author":[{"@pid":"119/1949","text":"Haoqian Huang"},{"@pid":"02/5906","text":"Shuang Zhang"},{"@pid":"18/5410-10","text":"Di Wang 0010"},{"@pid":"l/KVLing","text":"Keck Voon Ling"},{"@pid":"56/2849-3","text":"Fan Liu 0003"},{"@pid":"90/7668","text":"Xiufeng He"}]},"title":"A Novel Bayesian-Based Adaptive Algorithm Applied to Unobservable Sensor Measurement Information Loss for Underwater Navigation.","venue":"IEEE Trans. Instrum. Meas.","volume":"72","pages":"1-12","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tim/HuangZWLLH23","doi":"10.1109/TIM.2023.3326162","ee":"https://doi.org/10.1109/TIM.2023.3326162","url":"https://dblp.org/rec/journals/tim/HuangZWLLH23"}, "url":"URL#261644" }, { "@score":"2", "@id":"261825", "info":{"authors":{"author":[{"@pid":"87/660","text":"Yan Li"},{"@pid":"89/2278","text":"Meiqin Liu"},{"@pid":"72/1947","text":"Senlin Zhang"},{"@pid":"64/8083","text":"Ronghao Zheng"},{"@pid":"29/8069","text":"Jian Lan"},{"@pid":"203/3673","text":"Shanling Dong"}]},"title":"Sparse Feature Points Extraction-Based Localization With Partial Information Loss in UWSNs.","venue":"IEEE Trans. Instrum. Meas.","volume":"72","pages":"1-13","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tim/LiLZZLD23","doi":"10.1109/TIM.2023.3259046","ee":"https://doi.org/10.1109/TIM.2023.3259046","url":"https://dblp.org/rec/journals/tim/LiLZZLD23"}, "url":"URL#261825" }, { "@score":"2", "@id":"263685", "info":{"authors":{"author":[{"@pid":"236/3205","text":"Chunbo Lang"},{"@pid":"69/1215-3","text":"Gong Cheng 0003"},{"@pid":"317/0371","text":"Binfei Tu"},{"@pid":"66/190-28","text":"Chao Li 0028"},{"@pid":"00/3003","text":"Junwei Han"}]},"title":"Retain and Recover: Delving Into Information Loss for Few-Shot Segmentation.","venue":"IEEE Trans. Image Process.","volume":"32","pages":"5353-5365","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tip/LangCTLH23","doi":"10.1109/TIP.2023.3315555","ee":"https://doi.org/10.1109/TIP.2023.3315555","url":"https://dblp.org/rec/journals/tip/LangCTLH23"}, "url":"URL#263685" }, { "@score":"2", "@id":"277914", "info":{"authors":{"author":[{"@pid":"342/8951","text":"Yuanming Fang"},{"@pid":"120/1631-1","text":"Xuxun Liu 0001"},{"@pid":"128/3410","text":"Zhetao Li"},{"@pid":"27/1570-1","text":"Lin Cui 0001"},{"@pid":"21/10364","text":"Kaimin Wei"},{"@pid":"209/6073","text":"Qingyong Deng"}]},"title":"Efficient Congestion Control With Information Loss Minimization for Vehicular Ad Hoc Networks.","venue":"IEEE Trans. Veh. Technol.","volume":"72","number":"3","pages":"3879-3888","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tvt/FangLLCWD23","doi":"10.1109/TVT.2022.3218152","ee":"https://doi.org/10.1109/TVT.2022.3218152","url":"https://dblp.org/rec/journals/tvt/FangLLCWD23"}, "url":"URL#277914" }, { "@score":"2", "@id":"311174", "info":{"authors":{"author":[{"@pid":"118/6873","text":"Ping-Chia Huang"},{"@pid":"38/6190","text":"Yueh-Li Chen"},{"@pid":"301/7716","text":"Yi-Syuan Liou"},{"@pid":"265/5610","text":"Bing-Chen Tsai"},{"@pid":"115/6981","text":"Chun-Chieh Wu"},{"@pid":"16/5668","text":"Winston H. Hsu"}]},"title":"STAMINA (Spatial-Temporal Aligned Meteorological INformation Attention) and FPL (Focal Precip Loss): Advancements in Precipitation Nowcasting for Heavy Rainfall Events.","venue":"CIKM","pages":"854-863","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/cikm/HuangCLTWH23","doi":"10.1145/3583780.3615069","ee":"https://doi.org/10.1145/3583780.3615069","url":"https://dblp.org/rec/conf/cikm/HuangCLTWH23"}, "url":"URL#311174" }, { "@score":"2", "@id":"330812", "info":{"authors":{"author":[{"@pid":"364/9734","text":"Omer Raza"},{"@pid":"58/6170","text":"Michael Lawson"},{"@pid":"329/2334","text":"Fedi Zouari"},{"@pid":"329/3151","text":"Eddie C. Wong"},{"@pid":"138/7564","text":"Russell W. Chan"},{"@pid":"06/5143","text":"Peng Cao"}]},"title":"CycleGAN with mutual information loss constraint generates structurally aligned CT images from functional EIT images.","venue":"EMBC","pages":"1-4","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/embc/RazaLZWCC23","doi":"10.1109/EMBC40787.2023.10340711","ee":"https://doi.org/10.1109/EMBC40787.2023.10340711","url":"https://dblp.org/rec/conf/embc/RazaLZWCC23"}, "url":"URL#330812" }, { "@score":"2", "@id":"331359", "info":{"authors":{"author":[{"@pid":"317/0518","text":"Ahmed Alajrami"},{"@pid":"227/2313","text":"Katerina Margatina"},{"@pid":"118/9116","text":"Nikolaos Aletras"}]},"title":"Understanding the Role of Input Token Characters in Language Models: How Does Information Loss Affect Performance?","venue":"EMNLP","pages":"9085-9108","year":"2023","type":"Conference and Workshop Papers","access":"open","key":"conf/emnlp/AlajramiMA23","ee":"https://aclanthology.org/2023.emnlp-main.563","url":"https://dblp.org/rec/conf/emnlp/AlajramiMA23"}, "url":"URL#331359" }, { "@score":"2", "@id":"336710", "info":{"authors":{"author":[{"@pid":"223/5846","text":"Jiahui Wei"},{"@pid":"59/8757","text":"Elsa Dupraz"},{"@pid":"13/2481","text":"Philippe Mary"}]},"title":"Asymptotic and Non-Asymptotic Rate-Loss Bounds for Linear Regression with Side Information.","venue":"EUSIPCO","pages":"1275-1279","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/eusipco/WeiDM23","doi":"10.23919/EUSIPCO58844.2023.10289952","ee":"https://doi.org/10.23919/EUSIPCO58844.2023.10289952","url":"https://dblp.org/rec/conf/eusipco/WeiDM23"}, "url":"URL#336710" }, { "@score":"2", "@id":"371792", "info":{"authors":{"author":[{"@pid":"161/3545","text":"Weixuan Chen"},{"@pid":"10/9659","text":"Qianqian Yang"}]},"title":"Efficient Pruning Method for Learned Lossy Image Compression Models Based on Side Information.","venue":"ICIP","pages":"3464-3468","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icip/ChenY23","doi":"10.1109/ICIP49359.2023.10222822","ee":"https://doi.org/10.1109/ICIP49359.2023.10222822","url":"https://dblp.org/rec/conf/icip/ChenY23"}, "url":"URL#371792" }, { "@score":"2", "@id":"372074", "info":{"authors":{"author":[{"@pid":"147/1580","text":"Fang Long"},{"@pid":"51/8843","text":"Yuan-Gen Wang"}]},"title":"Image Inpainting with Information Loss Reduction and Texture-Structure Feature Fusion.","venue":"ICIP","pages":"1170-1174","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icip/LongW23","doi":"10.1109/ICIP49359.2023.10222164","ee":"https://doi.org/10.1109/ICIP49359.2023.10222164","url":"https://dblp.org/rec/conf/icip/LongW23"}, "url":"URL#372074" }, { "@score":"2", "@id":"393524", "info":{"authors":{"author":[{"@pid":"177/9333","text":"Fabio Massimo Zennaro"},{"@pid":"88/2484","text":"Paolo Turrini"},{"@pid":"31/1929","text":"Theodoros Damoulas"}]},"title":"Quantifying Consistency and Information Loss for Causal Abstraction Learning.","venue":"IJCAI","pages":"5750-5757","year":"2023","type":"Conference and Workshop Papers","access":"open","key":"conf/ijcai/ZennaroTD23","doi":"10.24963/IJCAI.2023/638","ee":"https://doi.org/10.24963/ijcai.2023/638","url":"https://dblp.org/rec/conf/ijcai/ZennaroTD23"}, "url":"URL#393524" }, { "@score":"2", "@id":"421849", "info":{"authors":{"author":[{"@pid":"09/6710","text":"Aditya Singh"},{"@pid":"282/7363","text":"Yash Dixit"},{"@pid":"88/5193","text":"Rajesh M. Hegde"}]},"title":"Information Loss Minimization in FANET-Aided Rechargeable IoT Networks Using Q-Learning.","venue":"NCC","pages":"1-6","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/ncc/SinghDH23","doi":"10.1109/NCC56989.2023.10067958","ee":"https://doi.org/10.1109/NCC56989.2023.10067958","url":"https://dblp.org/rec/conf/ncc/SinghDH23"}, "url":"URL#421849" }, { "@score":"2", "@id":"426305", "info":{"authors":{"author":[{"@pid":"252/5004","text":"Arman Zharmagambetov"},{"@pid":"133/4801","text":"Brandon Amos"},{"@pid":"163/7788","text":"Aaron M. Ferber"},{"@pid":"241/7690","text":"Taoan Huang"},{"@pid":"30/5718","text":"Bistra Dilkina"},{"@pid":"t/YuandongTian","text":"Yuandong Tian"}]},"title":"Landscape Surrogate: Learning Decision Losses for Mathematical Optimization Under Partial Information.","venue":"NeurIPS","year":"2023","type":"Conference and Workshop Papers","access":"open","key":"conf/nips/ZharmagambetovA23","ee":"http://papers.nips.cc/paper_files/paper/2023/hash/574f145eac328cc4aaf9358e27120eb5-Abstract-Conference.html","url":"https://dblp.org/rec/conf/nips/ZharmagambetovA23"}, "url":"URL#426305" }, { "@score":"2", "@id":"430192", "info":{"authors":{"author":[{"@pid":"235/1489","text":"Haotian Chen"},{"@pid":"26/4189","text":"Han Zhang"},{"@pid":"344/7246","text":"Houjing Guo"},{"@pid":"344/7463","text":"Shuchang Yi"},{"@pid":"236/5186","text":"Bingsheng Chen"},{"@pid":"89/558","text":"Xiangdong Zhou"}]},"title":"SALAS: Supervised Aspect Learning Improves Abstractive Multi-document Summarization Through Aspect Information Loss.","venue":"ECML/PKDD","pages":"55-70","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/pkdd/ChenZGYCZ23","doi":"10.1007/978-3-031-43421-1_4","ee":"https://doi.org/10.1007/978-3-031-43421-1_4","url":"https://dblp.org/rec/conf/pkdd/ChenZGYCZ23"}, "url":"URL#430192" }, { "@score":"3", "@id":"437490", "info":{"authors":{"author":[{"@pid":"237/0533","text":"Kevin Feichtinger"},{"@pid":"257/9837","text":"Chico Sundermann"},{"@pid":"04/7056","text":"Thomas Thüm"},{"@pid":"r/RickRabister","text":"Rick Rabiser"}]},"title":"It's Your Loss: Classifying Information Loss During Variability Model Roundtrip Transformations.","venue":"Software Engineering","pages":"51-52","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/se/FeichtingerSTR23","ee":"https://dl.gi.de/handle/20.500.12116/40076","url":"https://dblp.org/rec/conf/se/FeichtingerSTR23"}, "url":"URL#437490" }, { "@score":"2", "@id":"442694", "info":{"authors":{"author":[{"@pid":"355/9944","text":"Güzide Miray Perihanoglu"},{"@pid":"165/9332","text":"Himmet Karaman"}]},"title":"Geographic Information Systems (GIS) and Random Forests Regression-Based Approach for Path Loss Prediction in the Campus Environment.","venue":"SIU","pages":"1-4","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/siu/PerihanogluK23","doi":"10.1109/SIU59756.2023.10223770","ee":"https://doi.org/10.1109/SIU59756.2023.10223770","url":"https://dblp.org/rec/conf/siu/PerihanogluK23"}, "url":"URL#442694" }, { "@score":"2", "@id":"452505", "info":{"authors":{"author":[{"@pid":"93/6234","text":"Hong Li"},{"@pid":"86/489","text":"Kai Huang"},{"@pid":"17/10372","text":"Jinbei Zhang"},{"@pid":"117/4384","text":"Kechao Cai"},{"@pid":"85/2836","text":"Xiaoxia Huang"}]},"title":"Exploiting the Overheard Information of Coded Caching for Heterogeneous Lossy Channels.","venue":"VTC Fall","pages":"1-6","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/vtc/LiHZCH23","doi":"10.1109/VTC2023-FALL60731.2023.10333542","ee":"https://doi.org/10.1109/VTC2023-Fall60731.2023.10333542","url":"https://dblp.org/rec/conf/vtc/LiHZCH23"}, "url":"URL#452505" }, { "@score":"2", "@id":"457046", "info":{"authors":{"author":[{"@pid":"310/5654","text":"Frederick M. Chache"},{"@pid":"47/11048","text":"Sean Maxon"},{"@pid":"67/1444","text":"Ram M. Narayanan"},{"@pid":"45/235","text":"Ramesh Bharadwaj"}]},"title":"Effects of Lossy Compression on the Age of Information in a Low Power Network.","venue":"WoWMoM","pages":"382-387","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/wowmom/ChacheMNB23","doi":"10.1109/WOWMOM57956.2023.00068","ee":"https://doi.org/10.1109/WoWMoM57956.2023.00068","url":"https://dblp.org/rec/conf/wowmom/ChacheMNB23"}, "url":"URL#457046" }, { "@score":"4", "@id":"462076", "info":{"authors":{"author":[{"@pid":"81/11205","text":"Juan Antonio Lossio-Ventura"},{"@pid":"119/6669","text":"Jorge Valverde-Rebaza"},{"@pid":"119/9158","text":"Eduardo Díaz"},{"@pid":"61/11335","text":"Hugo Alatrista-Salas"}]},"title":"Information Management and Big Data - 9th Annual International Conference, SIMBig 2022, Lima, Peru, November 16-18, 2022, Proceedings","venue":["SIMBig","Communications in Computer and Information Science"],"volume":"1837","publisher":"Springer","year":"2023","type":"Editorship","key":"conf/simbig/2022","doi":"10.1007/978-3-031-35445-8","ee":"https://doi.org/10.1007/978-3-031-35445-8","url":"https://dblp.org/rec/conf/simbig/2022"}, "url":"URL#462076" }, { "@score":"2", "@id":"467773", "info":{"authors":{"author":[{"@pid":"338/9303","text":"Alexej Schelle"},{"@pid":"25/10994","text":"Hannes Lüling"}]},"title":"Information loss from dimensionality reduction in 5D-Gaussian spectral data.","venue":"CoRR","volume":"abs/2301.11923","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2301-11923","doi":"10.48550/ARXIV.2301.11923","ee":"https://doi.org/10.48550/arXiv.2301.11923","url":"https://dblp.org/rec/journals/corr/abs-2301-11923"}, "url":"URL#467773" }, { "@score":"2", "@id":"493267", "info":{"authors":{"author":[{"@pid":"177/9333","text":"Fabio Massimo Zennaro"},{"@pid":"88/2484","text":"Paolo Turrini"},{"@pid":"31/1929","text":"Theodoros Damoulas"}]},"title":"Quantifying Consistency and Information Loss for Causal Abstraction Learning.","venue":"CoRR","volume":"abs/2305.04357","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2305-04357","doi":"10.48550/ARXIV.2305.04357","ee":"https://doi.org/10.48550/arXiv.2305.04357","url":"https://dblp.org/rec/journals/corr/abs-2305-04357"}, "url":"URL#493267" }, { "@score":"2", "@id":"495019", "info":{"authors":{"author":[{"@pid":"347/2155","text":"Ivan Butakov"},{"@pid":"347/2137","text":"Aleksander Tolmachev"},{"@pid":"347/2088","text":"Sofia Malanchuk"},{"@pid":"347/3149","text":"Anna Neopryatnaya"},{"@pid":"54/9671","text":"Alexey A. Frolov"},{"@pid":"43/8436","text":"Kirill V. Andreev"}]},"title":"Information Bottleneck Analysis of Deep Neural Networks via Lossy Compression.","venue":"CoRR","volume":"abs/2305.08013","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2305-08013","doi":"10.48550/ARXIV.2305.08013","ee":"https://doi.org/10.48550/arXiv.2305.08013","url":"https://dblp.org/rec/journals/corr/abs-2305-08013"}, "url":"URL#495019" }, { "@score":"3", "@id":"498126", "info":{"authors":{"author":[{"@pid":"347/8411","text":"Aleksei Cherkasov"},{"@pid":"216/9784","text":"Kirill M. Gerke"},{"@pid":"267/1692","text":"Aleksey Khlyupin"}]},"title":"Towards effective information content assessment: analytical derivation of information loss in the reconstruction of random fields with model uncertainty.","venue":"CoRR","volume":"abs/2305.13870","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2305-13870","doi":"10.48550/ARXIV.2305.13870","ee":"https://doi.org/10.48550/arXiv.2305.13870","url":"https://dblp.org/rec/journals/corr/abs-2305-13870"}, "url":"URL#498126" }, { "@score":"2", "@id":"498854", "info":{"authors":{"author":[{"@pid":"259/1906","text":"Linxuan Pan"},{"@pid":"22/2796","text":"Shenghui Song 0001"}]},"title":"Local SGD Accelerates Convergence by Exploiting Second Order Information of the Loss Function.","venue":"CoRR","volume":"abs/2305.15013","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2305-15013","doi":"10.48550/ARXIV.2305.15013","ee":"https://doi.org/10.48550/arXiv.2305.15013","url":"https://dblp.org/rec/journals/corr/abs-2305-15013"}, "url":"URL#498854" }, { "@score":"2", "@id":"512226", "info":{"authors":{"author":[{"@pid":"23/2981","text":"Yufei Guo"},{"@pid":"173/0446","text":"Yuanpei Chen"},{"@pid":"94/905","text":"Liwen Zhang"},{"@pid":"206/0894","text":"Xiaode Liu"},{"@pid":"171/0531","text":"Xinyi Tong"},{"@pid":"332/6163","text":"Yuanyuan Ou"},{"@pid":"01/8502","text":"Xuhui Huang"},{"@pid":"22/6672","text":"Zhe Ma"}]},"title":"Reducing Information Loss for Spiking Neural Networks.","venue":"CoRR","volume":"abs/2307.04356","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2307-04356","doi":"10.48550/ARXIV.2307.04356","ee":"https://doi.org/10.48550/arXiv.2307.04356","url":"https://dblp.org/rec/journals/corr/abs-2307-04356"}, "url":"URL#512226" }, { "@score":"2", "@id":"514326", "info":{"authors":{"author":[{"@pid":"252/5004","text":"Arman Zharmagambetov"},{"@pid":"133/4801","text":"Brandon Amos"},{"@pid":"163/7788","text":"Aaron M. Ferber"},{"@pid":"241/7690","text":"Taoan Huang"},{"@pid":"30/5718","text":"Bistra Dilkina"},{"@pid":"t/YuandongTian","text":"Yuandong Tian"}]},"title":"Landscape Surrogate: Learning Decision Losses for Mathematical Optimization Under Partial Information.","venue":"CoRR","volume":"abs/2307.08964","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2307-08964","doi":"10.48550/ARXIV.2307.08964","ee":"https://doi.org/10.48550/arXiv.2307.08964","url":"https://dblp.org/rec/journals/corr/abs-2307-08964"}, "url":"URL#514326" }, { "@score":"2", "@id":"525731", "info":{"authors":{"author":[{"@pid":"25/1484","text":"Lossan Bonde"},{"@pid":"355/5864","text":"Severin Dembele"}]},"title":"High Accuracy Location Information Extraction from Social Network Texts Using Natural Language Processing.","venue":"CoRR","volume":"abs/2308.16615","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2308-16615","doi":"10.48550/ARXIV.2308.16615","ee":"https://doi.org/10.48550/arXiv.2308.16615","url":"https://dblp.org/rec/journals/corr/abs-2308-16615"}, "url":"URL#525731" }, { "@score":"2", "@id":"535847", "info":{"authors":{"author":[{"@pid":"358/6188","text":"Eslam Abdelaleem"},{"@pid":"83/5659","text":"Ilya Nemenman"},{"@pid":"356/6954","text":"K. Michael Martini"}]},"title":"Deep Variational Multivariate Information Bottleneck - A Framework for Variational Losses.","venue":"CoRR","volume":"abs/2310.03311","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2310-03311","doi":"10.48550/ARXIV.2310.03311","ee":"https://doi.org/10.48550/arXiv.2310.03311","url":"https://dblp.org/rec/journals/corr/abs-2310-03311"}, "url":"URL#535847" }, { "@score":"2", "@id":"542873", "info":{"authors":{"author":[{"@pid":"317/0518","text":"Ahmed Alajrami"},{"@pid":"227/2313","text":"Katerina Margatina"},{"@pid":"118/9116","text":"Nikolaos Aletras"}]},"title":"Understanding the Role of Input Token Characters in Language Models: How Does Information Loss Affect Performance?","venue":"CoRR","volume":"abs/2310.17271","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2310-17271","doi":"10.48550/ARXIV.2310.17271","ee":"https://doi.org/10.48550/arXiv.2310.17271","url":"https://dblp.org/rec/journals/corr/abs-2310-17271"}, "url":"URL#542873" }, { "@score":"2", "@id":"550820", "info":{"authors":{"author":[{"@pid":"50/1836","text":"Hua Zheng"},{"@pid":"66/7818","text":"Kuang-Hung Liu"},{"@pid":"175/1542","text":"Igor Fedorov"},{"@pid":"76/1584","text":"Xin Zhang"},{"@pid":"06/1416","text":"Wen-Yen Chen"},{"@pid":"21/6891","text":"Wei Wen"}]},"title":"SiGeo: Sub-One-Shot NAS via Information Theory and Geometry of Loss Landscape.","venue":"CoRR","volume":"abs/2311.13169","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2311-13169","doi":"10.48550/ARXIV.2311.13169","ee":"https://doi.org/10.48550/arXiv.2311.13169","url":"https://dblp.org/rec/journals/corr/abs-2311-13169"}, "url":"URL#550820" }, { "@score":"2", "@id":"564748", "info":{"title":"Efficient Partitioning Method of Large-Scale Public Safety Spatio-Temporal Data based on Information Loss Constraints.","venue":"CoRR","volume":"abs/2306.12857","year":"2023","type":"Withdrawn Items","access":"withdrawn","key":"journals/corr/abs-2306-12857","doi":"10.48550/ARXIV.2306.12857","ee":"https://doi.org/10.48550/arXiv.2306.12857","url":"https://dblp.org/rec/journals/corr/abs-2306-12857"}, "url":"URL#564748" }, { "@score":"2", "@id":"571475", "info":{"authors":{"author":[{"@pid":"28/9766-1","text":"Amjad Ali 0001"},{"@pid":"316/5049","text":"Faiz Jillani"},{"@pid":"316/4946","text":"Rabbiah Zaheer"},{"@pid":"154/0713","text":"Ahmad Karim"},{"@pid":"316/4929","text":"Yasser Obaid Alharbi"},{"@pid":"314/6420","text":"Mohammad Salih Alsaffar"},{"@pid":"126/0574","text":"Khalid Alhamazani"}]},"title":"Practically Implementation of Information Loss: Sensitivity, Risk by Different Feature Selection Techniques.","venue":"IEEE Access","volume":"10","pages":"27643-27654","year":"2022","type":"Journal Articles","access":"open","key":"journals/access/AliJZKAAA22","doi":"10.1109/ACCESS.2022.3152963","ee":"https://doi.org/10.1109/ACCESS.2022.3152963","url":"https://dblp.org/rec/journals/access/AliJZKAAA22"}, "url":"URL#571475" }, { "@score":"2", "@id":"586526", "info":{"authors":{"author":[{"@pid":"161/3479","text":"Elham Ghanbari"},{"@pid":"50/2756","text":"Azadeh Shakery"}]},"title":"A Learning to rank framework based on cross-lingual loss function for cross-lingual information retrieval.","venue":"Appl. Intell.","volume":"52","number":"3","pages":"3156-3174","year":"2022","type":"Journal Articles","access":"closed","key":"journals/apin/GhanbariS22","doi":"10.1007/S10489-021-02592-Z","ee":"https://doi.org/10.1007/s10489-021-02592-z","url":"https://dblp.org/rec/journals/apin/GhanbariS22"}, "url":"URL#586526" }, { "@score":"2", "@id":"595179", "info":{"authors":{"author":[{"@pid":"154/9147","text":"Qiusha Min"},{"@pid":"10/5630-119","text":"Xin Wang 0119"},{"@pid":"95/6229","text":"Bo Huang"},{"@pid":"226/3972","text":"Zhongwei Zhou"}]},"title":"Lossless medical image compression based on anatomical information and deep neural networks.","venue":"Biomed. Signal Process. Control.","volume":"74","pages":"103499","year":"2022","type":"Journal Articles","access":"closed","key":"journals/bspc/MinWHZ22","doi":"10.1016/J.BSPC.2022.103499","ee":"https://doi.org/10.1016/j.bspc.2022.103499","url":"https://dblp.org/rec/journals/bspc/MinWHZ22"}, "url":"URL#595179" }, { "@score":"2", "@id":"622819", "info":{"authors":{"author":[{"@pid":"256/7703","text":"Jerzy Król"},{"@pid":"61/4262","text":"Torsten Asselmeyer-Maluga"}]},"title":"Categorical Smoothness of 4-Manifolds from Quantum Symmetries and the Information Loss Paradox.","venue":"Entropy","volume":"24","number":"3","pages":"391","year":"2022","type":"Journal Articles","access":"open","key":"journals/entropy/KrolA22","doi":"10.3390/E24030391","ee":"https://doi.org/10.3390/e24030391","url":"https://dblp.org/rec/journals/entropy/KrolA22"}, "url":"URL#622819" }, { "@score":"2", "@id":"642583", "info":{"authors":{"author":[{"@pid":"173/4795","text":"Asma Rani"},{"@pid":"17/1557","text":"Navneet Goyal"},{"@pid":"g/ShashiKGadia","text":"Shashi K. Gadia"}]},"title":"Big social data provenance framework for Zero-Information Loss Key-Value Pair (KVP) Database.","venue":"Int. J. Data Sci. Anal.","volume":"14","number":"1","pages":"65-87","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijdsa/RaniGG22","doi":"10.1007/S41060-021-00287-9","ee":"https://doi.org/10.1007/s41060-021-00287-9","url":"https://dblp.org/rec/journals/ijdsa/RaniGG22"}, "url":"URL#642583" }, { "@score":"2", "@id":"648967", "info":{"authors":{"author":[{"@pid":"293/1228","text":"Zelong Kong"},{"@pid":"50/9969","text":"Yongquan Chen"},{"@pid":"25/3029","text":"Xinping Guan"},{"@pid":"136/9406","text":"Xinyi Le"}]},"title":"Realizing balanced object detection through prior location scale information and repulsive loss.","venue":"Neurocomputing","volume":"490","pages":"380-389","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijon/KongCGL22","doi":"10.1016/J.NEUCOM.2021.11.105","ee":"https://doi.org/10.1016/j.neucom.2021.11.105","url":"https://dblp.org/rec/journals/ijon/KongCGL22"}, "url":"URL#648967" }, { "@score":"2", "@id":"655670", "info":{"authors":{"author":[{"@pid":"26/1546","text":"Erick Delage"},{"@pid":"139/2644","text":"Shaoyan Guo"},{"@pid":"63/7058","text":"Huifu Xu"}]},"title":"Shortfall Risk Models When Information on Loss Function Is Incomplete.","venue":"Oper. Res.","volume":"70","number":"6","pages":"3511-3518","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ior/DelageGX22","doi":"10.1287/OPRE.2021.2212","ee":"https://doi.org/10.1287/opre.2021.2212","url":"https://dblp.org/rec/journals/ior/DelageGX22"}, "url":"URL#655670" }, { "@score":"2", "@id":"656542", "info":{"authors":{"author":[{"@pid":"214/6570","text":"Abdallah Jarwan"},{"@pid":"140/8297","text":"Ayman I. Sabbah"},{"@pid":"45/2301","text":"Mohamed Ibnkahla"}]},"title":"Information-Oriented Traffic Management for Energy-Efficient and Loss-Resilient IoT Systems.","venue":"IEEE Internet Things J.","volume":"9","number":"10","pages":"7388-7403","year":"2022","type":"Journal Articles","access":"closed","key":"journals/iotj/JarwanSI22","doi":"10.1109/JIOT.2021.3132925","ee":"https://doi.org/10.1109/JIOT.2021.3132925","url":"https://dblp.org/rec/journals/iotj/JarwanSI22"}, "url":"URL#656542" }, { "@score":"2", "@id":"658191", "info":{"authors":{"author":[{"@pid":"49/2607","text":"Sulin Pang"},{"@pid":"44/740","text":"Jiaqi Wang"},{"@pid":"278/4876","text":"Lianhu Xia"}]},"title":"Information matching model and multi-angle tracking algorithm for loan loss-linking customers based on the family mobile social-contact big data network.","venue":"Inf. Process. Manag.","volume":"59","number":"1","pages":"102742","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ipm/PangWX22","doi":"10.1016/J.IPM.2021.102742","ee":"https://doi.org/10.1016/j.ipm.2021.102742","url":"https://dblp.org/rec/journals/ipm/PangWX22"}, "url":"URL#658191" }, { "@score":"2", "@id":"658709", "info":{"authors":{"author":[{"@pid":"57/1151","text":"Xin Xiong"},{"@pid":"275/2483","text":"Xunkai Li"},{"@pid":"226/6096","text":"Youpeng Hu"},{"@pid":"43/8496","text":"Yixuan Wu"},{"@pid":"95/578-3","text":"Jian Yin 0003"}]},"title":"Handling information loss of graph convolutional networks in collaborative filtering.","venue":"Inf. Syst.","volume":"109","pages":"102051","year":"2022","type":"Journal Articles","access":"closed","key":"journals/is/XiongLHWY22","doi":"10.1016/J.IS.2022.102051","ee":"https://doi.org/10.1016/j.is.2022.102051","url":"https://dblp.org/rec/journals/is/XiongLHWY22"}, "url":"URL#658709" }, { "@score":"2", "@id":"664220", "info":{"authors":{"author":[{"@pid":"180/2481","text":"Athanasios Kiourtis"},{"@pid":"180/2533","text":"Argyro Mavrogiorgou"},{"@pid":"85/4341","text":"Dimosthenis Kyriazis"}]},"title":"Health information exchange through a Device-to-Device protocol supporting lossless encoding and decoding.","venue":"J. Biomed. Informatics","volume":"134","pages":"104199","year":"2022","type":"Journal Articles","access":"closed","key":"journals/jbi/KiourtisMK22","doi":"10.1016/J.JBI.2022.104199","ee":"https://doi.org/10.1016/j.jbi.2022.104199","url":"https://dblp.org/rec/journals/jbi/KiourtisMK22"}, "url":"URL#664220" }, { "@score":"2", "@id":"667162", "info":{"authors":{"author":[{"@pid":"119/4786","text":"Josu Doncel"},{"@pid":"18/338","text":"Mohamad Assaad"}]},"title":"Age of information in a decentralized network of parallel queues with routing and packets losses.","venue":"J. Commun. Networks","volume":"24","number":"1","pages":"17-20","year":"2022","type":"Journal Articles","access":"closed","key":"journals/jcn/DoncelA22","doi":"10.23919/JCN.2020.000036","ee":"https://doi.org/10.23919/JCN.2020.000036","url":"https://dblp.org/rec/journals/jcn/DoncelA22"}, "url":"URL#667162" }, { "@score":"2", "@id":"670452", "info":{"authors":{"author":[{"@pid":"188/7759-96","text":"Chao Wang 0096"},{"@pid":"70/2881","text":"Huijin Fan"},{"@pid":"21/2715-13","text":"Lei Liu 0013"},{"@pid":"72/6811-32","text":"Bo Wang 0032"},{"@pid":"246/7550","text":"Zhongtao Cheng"}]},"title":"Robust finite-time asynchronous control for nonlinear Markov jump systems with partial mode information and random packet loss.","venue":"J. Frankl. Inst.","volume":"359","number":"12","pages":"6061-6079","year":"2022","type":"Journal Articles","access":"closed","key":"journals/jfi/WangF00C22","doi":"10.1016/J.JFRANKLIN.2022.06.010","ee":"https://doi.org/10.1016/j.jfranklin.2022.06.010","url":"https://dblp.org/rec/journals/jfi/WangF00C22"}, "url":"URL#670452" }, { "@score":"2", "@id":"690807", "info":{"authors":{"author":[{"@pid":"150/7250","text":"Thodoris Lykouris"},{"@pid":"s/KarthikSridharan","text":"Karthik Sridharan"},{"@pid":"t/EvaTardos","text":"Éva Tardos"}]},"title":"Small-Loss Bounds for Online Learning with Partial Information.","venue":"Math. Oper. Res.","volume":"47","number":"3","pages":"2186-2218","year":"2022","type":"Journal Articles","access":"closed","key":"journals/mor/LykourisST22","doi":"10.1287/MOOR.2021.1204","ee":"https://doi.org/10.1287/moor.2021.1204","url":"https://dblp.org/rec/journals/mor/LykourisST22"}, "url":"URL#690807" }, { "@score":"2", "@id":"693167", "info":{"authors":{"author":[{"@pid":"246/6852","text":"Chi Wei"},{"@pid":"98/6530","text":"Shaobin Huang"},{"@pid":"147/5827","text":"Rongsheng Li"}]},"title":"Enhance text-to-SQL model performance with information sharing and reweight loss.","venue":"Multim. Tools Appl.","volume":"81","number":"11","pages":"15205-15217","year":"2022","type":"Journal Articles","access":"closed","key":"journals/mta/WeiHL22","doi":"10.1007/S11042-022-12573-0","ee":"https://doi.org/10.1007/s11042-022-12573-0","url":"https://dblp.org/rec/journals/mta/WeiHL22"}, "url":"URL#693167" }, { "@score":"2", "@id":"693177", "info":{"authors":{"author":[{"@pid":"52/328","text":"Di Wu"},{"@pid":"03/5747","text":"Sheng Liu"},{"@pid":"302/6051","text":"Hongfang Sun"},{"@pid":"173/0791","text":"Lanyong Zhang"}]},"title":"Short-message communication Lossy data compression algorithm for BeiDou-3 satellite information transmission.","venue":"Multim. Tools Appl.","volume":"81","number":"9","pages":"12833-12855","year":"2022","type":"Journal Articles","access":"closed","key":"journals/mta/WuLSZ22","doi":"10.1007/S11042-022-12467-1","ee":"https://doi.org/10.1007/s11042-022-12467-1","url":"https://dblp.org/rec/journals/mta/WuLSZ22"}, "url":"URL#693177" }, { "@score":"2", "@id":"693334", "info":{"authors":{"author":[{"@pid":"290/1481","text":"Lijie Zhai"},{"@pid":"330/2477","text":"Duanhai Sheng"}]},"title":"Image information loss estimation of video stream based on improved SPIHT algorithm.","venue":"Multim. Tools Appl.","volume":"81","number":"25","pages":"36275-36291","year":"2022","type":"Journal Articles","access":"closed","key":"journals/mta/ZhaiS22","doi":"10.1007/S11042-021-11572-X","ee":"https://doi.org/10.1007/s11042-021-11572-x","url":"https://dblp.org/rec/journals/mta/ZhaiS22"}, "url":"URL#693334" }, { "@score":"2", "@id":"706510", "info":{"authors":{"author":[{"@pid":"296/6609","text":"Benjamin Desef"},{"@pid":"68/8412","text":"Martin B. Plenio"}]},"title":"Optimizing quantum codes with an application to the loss channel with partial erasure information.","venue":"Quantum","volume":"6","pages":"667","year":"2022","type":"Journal Articles","access":"open","key":"journals/quantum/DesefP22","doi":"10.22331/Q-2022-03-11-667","ee":"https://doi.org/10.22331/q-2022-03-11-667","url":"https://dblp.org/rec/journals/quantum/DesefP22"}, "url":"URL#706510" }, { "@score":"2", "@id":"717376", "info":{"authors":{"author":[{"@pid":"42/3130","text":"Richard Dosselmann"},{"@pid":"h/HowardJHamilton","text":"Howard J. Hamilton"}]},"title":"Limiting sensitive values in an anonymized table while reducing information loss via p-proportion.","venue":"Secur. Priv.","volume":"5","number":"3","year":"2022","type":"Journal Articles","access":"closed","key":"journals/sap/DosselmannH22","doi":"10.1002/SPY2.202","ee":"https://doi.org/10.1002/spy2.202","url":"https://dblp.org/rec/journals/sap/DosselmannH22"}, "url":"URL#717376" }, { "@score":"2", "@id":"725952", "info":{"authors":{"author":[{"@pid":"193/6951","text":"Carlos Alexandre Gouvea da Silva"},{"@pid":"130/4148","text":"Carlos Marcelo Pedroso"}]},"title":"Packet Loss Characterization Using Cross Layer Information and HMM for Wi-Fi Networks.","venue":"Sensors","volume":"22","number":"22","pages":"8592","year":"2022","type":"Journal Articles","access":"open","key":"journals/sensors/SilvaP22","doi":"10.3390/S22228592","ee":"https://doi.org/10.3390/s22228592","url":"https://dblp.org/rec/journals/sensors/SilvaP22"}, "url":"URL#725952" }, { "@score":"2", "@id":"727812", "info":{"authors":{"author":[{"@pid":"130/4398","text":"Jimin Yu"},{"@pid":"20/5998","text":"Tao Wu"},{"@pid":"76/1584","text":"Xin Zhang"},{"@pid":"10/4661-211","text":"Wei Zhang 0211"}]},"title":"An Efficient Lightweight SAR Ship Target Detection Network with Improved Regression Loss Function and Enhanced Feature Information Expression.","venue":"Sensors","volume":"22","number":"9","pages":"3447","year":"2022","type":"Journal Articles","access":"open","key":"journals/sensors/YuWZZ22","doi":"10.3390/S22093447","ee":"https://doi.org/10.3390/s22093447","url":"https://dblp.org/rec/journals/sensors/YuWZZ22"}, "url":"URL#727812" }, { "@score":"2", "@id":"732312", "info":{"authors":{"author":[{"@pid":"173/4795","text":"Asma Rani"},{"@pid":"17/1557","text":"Navneet Goyal"},{"@pid":"g/ShashiKGadia","text":"Shashi K. Gadia"}]},"title":"Social data provenance framework based on zero-information loss graph database.","venue":"Soc. Netw. Anal. Min.","volume":"12","number":"1","pages":"72","year":"2022","type":"Journal Articles","access":"closed","key":"journals/snam/RaniGG22","doi":"10.1007/S13278-022-00889-6","ee":"https://doi.org/10.1007/s13278-022-00889-6","url":"https://dblp.org/rec/journals/snam/RaniGG22"}, "url":"URL#732312" }, { "@score":"2", "@id":"735213", "info":{"authors":{"author":[{"@pid":"90/567","text":"Qin Wu"},{"@pid":"312/3520","text":"Shuting Miao"},{"@pid":"43/2840","text":"Zhilei Chai"},{"@pid":"92/4520","text":"Guodong Guo"}]},"title":"Fine-Grained Image Classification With Global Information and Adaptive Compensation Loss.","venue":"IEEE Signal Process. Lett.","volume":"29","pages":"36-40","year":"2022","type":"Journal Articles","access":"closed","key":"journals/spl/WuMCG22","doi":"10.1109/LSP.2021.3123453","ee":"https://doi.org/10.1109/LSP.2021.3123453","url":"https://dblp.org/rec/journals/spl/WuMCG22"}, "url":"URL#735213" }, { "@score":"2", "@id":"736481", "info":{"authors":{"author":[{"@pid":"234/8545","text":"Jayam Patel"},{"@pid":"284/8276","text":"Prajankya Sonar"},{"@pid":"18/2729","text":"Carlo Pinciroli"}]},"title":"On multi-human multi-robot remote interaction: a study of transparency, inter-human communication, and information loss in remote interaction.","venue":"Swarm Intell.","volume":"16","number":"2","pages":"107-142","year":"2022","type":"Journal Articles","access":"closed","key":"journals/swarm/PatelSP22","doi":"10.1007/S11721-021-00209-2","ee":"https://doi.org/10.1007/s11721-021-00209-2","url":"https://dblp.org/rec/journals/swarm/PatelSP22"}, "url":"URL#736481" }, { "@score":"2", "@id":"750627", "info":{"authors":{"author":[{"@pid":"180/8434","text":"Dandan Gao"},{"@pid":"18/7060","text":"Nengmin Wang"},{"@pid":"18/4625-10","text":"Bin Jiang 0010"},{"@pid":"181/2794-7","text":"Jie Gao 0007"},{"@pid":"70/2539","text":"Zhen Yang"}]},"title":"Value of Information Sharing in Online Retail Supply Chain Considering Product Loss.","venue":"IEEE Trans. Engineering Management","volume":"69","number":"5","pages":"2155-2172","year":"2022","type":"Journal Articles","access":"closed","key":"journals/tem/GaoWJGY22","doi":"10.1109/TEM.2020.3004885","ee":"https://doi.org/10.1109/TEM.2020.3004885","url":"https://dblp.org/rec/journals/tem/GaoWJGY22"}, "url":"URL#750627" }, { "@score":"2", "@id":"751309", "info":{"authors":{"author":[{"@pid":"81/8610","text":"Decui Liang"},{"@pid":"163/7854","text":"Yuanyuan Fu"},{"@pid":"12/1328","text":"Zeshui Xu"},{"@pid":"328/2912","text":"Wanting Tang"}]},"title":"Loss Function Information Fusion and Decision Rule Deduction of Three-Way Decision by Constructing Interval-Valued $q$-Rung Orthopair Fuzzy Integral.","venue":"IEEE Trans. Fuzzy Syst.","volume":"30","number":"9","pages":"3645-3660","year":"2022","type":"Journal Articles","access":"closed","key":"journals/tfs/LiangFXT22","doi":"10.1109/TFUZZ.2021.3119758","ee":"https://doi.org/10.1109/TFUZZ.2021.3119758","url":"https://dblp.org/rec/journals/tfs/LiangFXT22"}, "url":"URL#751309" }, { "@score":"2", "@id":"756301", "info":{"authors":{"author":[{"@pid":"119/3574","text":"Matthew Bradbury"},{"@pid":"45/4421","text":"Arshad Jhumka"}]},"title":"Quantifying Source Location Privacy Routing Performance via Divergence and Information Loss.","venue":"IEEE Trans. Inf. Forensics Secur.","volume":"17","pages":"3890-3905","year":"2022","type":"Journal Articles","access":"closed","key":"journals/tifs/BradburyJ22","doi":"10.1109/TIFS.2022.3217385","ee":"https://doi.org/10.1109/TIFS.2022.3217385","url":"https://dblp.org/rec/journals/tifs/BradburyJ22"}, "url":"URL#756301" }, { "@score":"2", "@id":"756507", "info":{"authors":{"author":[{"@pid":"158/2705","text":"Chung-Wei Weng"},{"@pid":"155/0034","text":"Yauhen Yakimenka"},{"@pid":"134/9785","text":"Hsuan-Yin Lin"},{"@pid":"96/6263","text":"Eirik Rosnes"},{"@pid":"39/4721","text":"Jörg Kliewer"}]},"title":"Generative Adversarial User Privacy in Lossy Single-Server Information Retrieval.","venue":"IEEE Trans. Inf. Forensics Secur.","volume":"17","pages":"3495-3510","year":"2022","type":"Journal Articles","access":"closed","key":"journals/tifs/WengYLRK22","doi":"10.1109/TIFS.2022.3203320","ee":"https://doi.org/10.1109/TIFS.2022.3203320","url":"https://dblp.org/rec/journals/tifs/WengYLRK22"}, "url":"URL#756507" }, { "@score":"2", "@id":"775151", "info":{"authors":{"author":[{"@pid":"336/1894","text":"Nalini Santosh Jagtap"},{"@pid":"74/8327","text":"Sudeep D. Thepade"}]},"title":"High-quality image multi-focus fusion to address ringing and blurring artifacts without loss of information.","venue":"Vis. Comput.","volume":"38","number":"12","pages":"4353-4371","year":"2022","type":"Journal Articles","access":"closed","key":"journals/vc/JagtapT22","doi":"10.1007/S00371-021-02300-5","ee":"https://doi.org/10.1007/s00371-021-02300-5","url":"https://dblp.org/rec/journals/vc/JagtapT22"}, "url":"URL#775151" }, { "@score":"3", "@id":"788164", "info":{"authors":{"author":[{"@pid":"95/657","text":"Jorge Silva"},{"@pid":"136/5327","text":"Felipe A. Tobar"}]},"title":"On the Interplay between Information Loss and Operation Loss in Representations for Classification.","venue":"AISTATS","pages":"4853-4871","year":"2022","type":"Conference and Workshop Papers","access":"open","key":"conf/aistats/SilvaT22","ee":"https://proceedings.mlr.press/v151/silva22b.html","url":"https://dblp.org/rec/conf/aistats/SilvaT22"}, "url":"URL#788164" }, { "@score":"2", "@id":"815409", "info":{"authors":{"author":[{"@pid":"330/0449","text":"Dasol Han"},{"@pid":"131/4824","text":"Jaewook Yoo"},{"@pid":"274/9571","text":"Dokwan Oh"}]},"title":"SeeThroughNet: Resurrection of Auxiliary Loss by Preserving Class Probability Information.","venue":"CVPR","pages":"4453-4462","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/cvpr/HanYO22","doi":"10.1109/CVPR52688.2022.00442","ee":"https://doi.org/10.1109/CVPR52688.2022.00442","url":"https://dblp.org/rec/conf/cvpr/HanYO22"}, "url":"URL#815409" }, { "@score":"2", "@id":"815971", "info":{"authors":{"author":[{"@pid":"179/8822","text":"Qiankun Liu"},{"@pid":"211/5776","text":"Zhentao Tan"},{"@pid":"92/1489-1","text":"Dongdong Chen 0001"},{"@pid":"52/9077-1","text":"Qi Chu 0001"},{"@pid":"176/5470","text":"Xiyang Dai"},{"@pid":"45/6977","text":"Yinpeng Chen"},{"@pid":"137/2150","text":"Mengchen Liu"},{"@pid":"66/6740","text":"Lu Yuan"},{"@pid":"96/5144","text":"Nenghai Yu"}]},"title":"Reduce Information Loss in Transformers for Pluralistic Image Inpainting.","venue":"CVPR","pages":"11337-11347","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/cvpr/LiuTC0DCLYY22","doi":"10.1109/CVPR52688.2022.01106","ee":"https://doi.org/10.1109/CVPR52688.2022.01106","url":"https://dblp.org/rec/conf/cvpr/LiuTC0DCLYY22"}, "url":"URL#815971" }, { "@score":"2", "@id":"817558", "info":{"authors":{"author":[{"@pid":"258/6414","text":"Yintao He"},{"@pid":"276/2130","text":"Songyun Qu"},{"@pid":"94/3104-1","text":"Ying Wang 0001"},{"@pid":"13/2692-17","text":"Bing Li 0017"},{"@pid":"70/576-1","text":"Huawei Li 0001"},{"@pid":"37/5372-1","text":"Xiaowei Li 0001"}]},"title":"InfoX: an energy-efficient ReRAM accelerator design with information-lossless low-bit ADCs.","venue":"DAC","pages":"97-102","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/dac/HeQ00L022","doi":"10.1145/3489517.3530396","ee":"https://doi.org/10.1145/3489517.3530396","url":"https://dblp.org/rec/conf/dac/HeQ00L022"}, "url":"URL#817558" }, { "@score":"2", "@id":"822682", "info":{"authors":{"author":[{"@pid":"23/2981","text":"Yufei Guo"},{"@pid":"173/0446","text":"Yuanpei Chen"},{"@pid":"94/905","text":"Liwen Zhang"},{"@pid":"331/2745","text":"YingLei Wang"},{"@pid":"206/0894","text":"Xiaode Liu"},{"@pid":"171/0531","text":"Xinyi Tong"},{"@pid":"332/6163","text":"Yuanyuan Ou"},{"@pid":"01/8502","text":"Xuhui Huang"},{"@pid":"22/6672","text":"Zhe Ma"}]},"title":"Reducing Information Loss for Spiking Neural Networks.","venue":"ECCV","pages":"36-52","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/eccv/GuoCZWLTOHM22","doi":"10.1007/978-3-031-20083-0_3","ee":"https://doi.org/10.1007/978-3-031-20083-0_3","url":"https://dblp.org/rec/conf/eccv/GuoCZWLTOHM22"}, "url":"URL#822682" }, { "@score":"2", "@id":"827274", "info":{"authors":{"author":[{"@pid":"329/1800","text":"Jaganth Nivas Asok Kumar"},{"@pid":"119/2707","text":"Joseph T. Francis"}]},"title":"Improved Grip Force Prediction Using a Loss Function that Penalizes Reward Related Neural Information.","venue":"EMBC","pages":"2336-2339","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/embc/KumarF22","doi":"10.1109/EMBC48229.2022.9871920","ee":"https://doi.org/10.1109/EMBC48229.2022.9871920","url":"https://dblp.org/rec/conf/embc/KumarF22"}, "url":"URL#827274" }, { "@score":"2", "@id":"848842", "info":{"authors":{"author":[{"@pid":"61/10819","text":"Elad Domanovitz"},{"@pid":"249/9390","text":"Daniel Severo 0001"},{"@pid":"84/5679","text":"Ashish Khisti"},{"@pid":"82/2790-1","text":"Wei Yu 0001"}]},"title":"Data-Driven Optimization for Zero-Delay Lossy Source Coding with Side Information.","venue":"ICASSP","pages":"5203-5207","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/icassp/DomanovitzSKY22","doi":"10.1109/ICASSP43922.2022.9747823","ee":"https://doi.org/10.1109/ICASSP43922.2022.9747823","url":"https://dblp.org/rec/conf/icassp/DomanovitzSKY22"}, "url":"URL#848842" }, { "@score":"2", "@id":"869817", "info":{"authors":{"author":[{"@pid":"293/2506","text":"Cunjun Wang"},{"@pid":"54/10134","text":"Zili Xu"},{"@pid":"125/8189","text":"Jun Wang"},{"@pid":"58/6692","text":"Song Yan"}]},"title":"A Multiple VAEs-based Information Fusion Framework With Mutual-KL Loss for Intelligent Fault Diagnosis and Toward OoD Detection.","venue":"ICPHM","pages":"188-197","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/icphm/WangXWY22","doi":"10.1109/ICPHM53196.2022.9815704","ee":"https://doi.org/10.1109/ICPHM53196.2022.9815704","url":"https://dblp.org/rec/conf/icphm/WangXWY22"}, "url":"URL#869817" }, { "@score":"2", "@id":"897875", "info":{"authors":{"author":[{"@pid":"320/8309","text":"Deheng Yuan"},{"@pid":"43/56","text":"Tao Guo"},{"@pid":"10/4008-1","text":"Bo Bai 0001"},{"@pid":"82/1911-4","text":"Wei Han 0004"}]},"title":"Lossy Computing with Side Information via Multi-Hypergraphs.","venue":"ITW","pages":"344-349","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/itw/YuanGBH22","doi":"10.1109/ITW54588.2022.9965914","ee":"https://doi.org/10.1109/ITW54588.2022.9965914","url":"https://dblp.org/rec/conf/itw/YuanGBH22"}, "url":"URL#897875" }, { "@score":"2", "@id":"906528", "info":{"authors":{"author":[{"@pid":"281/9944","text":"Tewodros Weldebirhan Arega"},{"@pid":"69/2940","text":"Stéphanie Bricq"},{"@pid":"70/6285","text":"Fabrice Mériaudeau"}]},"title":"Using Polynomial Loss and Uncertainty Information for Robust Left Atrial and Scar Quantification and Segmentation.","venue":"LAScarQS@MICCAI","pages":"133-144","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/miccai/AregaBM22","doi":"10.1007/978-3-031-31778-1_13","ee":"https://doi.org/10.1007/978-3-031-31778-1_13","url":"https://dblp.org/rec/conf/miccai/AregaBM22"}, "url":"URL#906528" }, { "@score":"2", "@id":"907367", "info":{"authors":{"author":[{"@pid":"248/5491","text":"Dominik Jens Elias Waibel"},{"@pid":"315/0642","text":"Scott Atwell"},{"@pid":"60/9032","text":"Matthias Meier"},{"@pid":"99/11011","text":"Carsten Marr"},{"@pid":"119/8860","text":"Bastian Rieck"}]},"title":"Capturing Shape Information with Multi-scale Topological Loss Terms for 3D Reconstruction.","venue":"MICCAI","pages":"150-159","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/miccai/WaibelAMMR22","doi":"10.1007/978-3-031-16440-8_15","ee":"https://doi.org/10.1007/978-3-031-16440-8_15","url":"https://dblp.org/rec/conf/miccai/WaibelAMMR22"}, "url":"URL#907367" }, { "@score":"2", "@id":"913785", "info":{"authors":{"author":[{"@pid":"295/8180","text":"Hanzhang Zhou"},{"@pid":"m/KezhiMao","text":"Kezhi Mao"}]},"title":"Document-Level Event Argument Extraction by Leveraging Redundant Information and Closed Boundary Loss.","venue":"NAACL-HLT","pages":"3041-3052","year":"2022","type":"Conference and Workshop Papers","access":"open","key":"conf/naacl/ZhouM22","doi":"10.18653/V1/2022.NAACL-MAIN.222","ee":"https://doi.org/10.18653/v1/2022.naacl-main.222","url":"https://dblp.org/rec/conf/naacl/ZhouM22"}, "url":"URL#913785" }, { "@score":"3", "@id":"916017", "info":{"authors":{"author":[{"@pid":"23/2981","text":"Yufei Guo"},{"@pid":"173/0446","text":"Yuanpei Chen"},{"@pid":"94/905","text":"Liwen Zhang"},{"@pid":"206/0894","text":"Xiaode Liu"},{"@pid":"331/2745","text":"YingLei Wang"},{"@pid":"01/8502","text":"Xuhui Huang"},{"@pid":"22/6672","text":"Zhe Ma"}]},"title":"IM-Loss: Information Maximization Loss for Spiking Neural Networks.","venue":"NeurIPS","year":"2022","type":"Conference and Workshop Papers","access":"open","key":"conf/nips/GuoCZLWHM22","ee":"http://papers.nips.cc/paper_files/paper/2022/hash/010c5ba0cafc743fece8be02e7adb8dd-Abstract-Conference.html","url":"https://dblp.org/rec/conf/nips/GuoCZLWHM22"}, "url":"URL#916017" }, { "@score":"2", "@id":"918950", "info":{"authors":{"author":[{"@pid":"138/2055","text":"Haoran Sun"},{"@pid":"65/4423","text":"Chen Chen"},{"@pid":"153/0735","text":"Lantian Li"},{"@pid":"40/3934-13","text":"Dong Wang 0013"}]},"title":"Cycleflow: Purify Information Factors by Cycle Loss.","venue":"Odyssey","pages":"271-278","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/odyssey/SunCLW22","doi":"10.21437/ODYSSEY.2022-38","ee":"https://doi.org/10.21437/Odyssey.2022-38","url":"https://dblp.org/rec/conf/odyssey/SunCLW22"}, "url":"URL#918950" }, { "@score":"2", "@id":"922807", "info":{"authors":{"author":[{"@pid":"73/237","text":"Fan Li"},{"@pid":"93/2803","text":"Yufei Zha"},{"@pid":"126/8027","text":"Lichao Zhang"},{"@pid":"21/1048-5","text":"Peng Zhang 0005"},{"@pid":"94/6317","text":"Lang Chen"}]},"title":"Information Lossless Multi-modal Image Generation for RGB-T Tracking.","venue":"PRCV","pages":"671-683","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/prcv/LiZZZC22","doi":"10.1007/978-3-031-18916-6_53","ee":"https://doi.org/10.1007/978-3-031-18916-6_53","url":"https://dblp.org/rec/conf/prcv/LiZZZC22"}, "url":"URL#922807" }, { "@score":"2", "@id":"923085", "info":{"authors":{"author":[{"@pid":"300/5602","text":"Tiantian Qi"},{"@pid":"16/3618","text":"Song Qiu"},{"@pid":"57/2405","text":"Li Sun"},{"@pid":"56/11346","text":"Zhuang Liu"},{"@pid":"95/573","text":"Mingsong Chen"},{"@pid":"332/2615","text":"Yue Lyu"}]},"title":"A Vehicle Re-ID Algorithm Based on Channel Correlation Self-attention and Lstm Local Information Loss.","venue":"PRICAI","pages":"488-500","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/pricai/QiQSLCL22","doi":"10.1007/978-3-031-20865-2_36","ee":"https://doi.org/10.1007/978-3-031-20865-2_36","url":"https://dblp.org/rec/conf/pricai/QiQSLCL22"}, "url":"URL#923085" }, { "@score":"3", "@id":"937757", "info":{"authors":{"author":[{"@pid":"237/0533","text":"Kevin Feichtinger"},{"@pid":"257/9837","text":"Chico Sundermann"},{"@pid":"04/7056","text":"Thomas Thüm"},{"@pid":"r/RickRabister","text":"Rick Rabiser"}]},"title":"It's your loss: classifying information loss during variability model roundtrip transformations.","venue":"SPLC","pages":"67-78","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/splc/FeichtingerSTR22","doi":"10.1145/3546932.3546990","ee":"https://doi.org/10.1145/3546932.3546990","url":"https://dblp.org/rec/conf/splc/FeichtingerSTR22"}, "url":"URL#937757" }, { "@score":"2", "@id":"940755", "info":{"authors":{"author":[{"@pid":"84/3338","text":"Kwanghee Choi"},{"@pid":"213/8232","text":"Siyeong Lee"}]},"title":"Combating the instability of mutual information-based losses via regularization.","venue":"UAI","pages":"411-421","year":"2022","type":"Conference and Workshop Papers","access":"open","key":"conf/uai/ChoiL22","ee":"https://proceedings.mlr.press/v180/choi22a.html","url":"https://dblp.org/rec/conf/uai/ChoiL22"}, "url":"URL#940755" }, { "@score":"4", "@id":"954991", "info":{"authors":{"author":[{"@pid":"81/11205","text":"Juan Antonio Lossio-Ventura"},{"@pid":"119/6669","text":"Jorge Valverde-Rebaza"},{"@pid":"119/9158","text":"Eduardo Díaz"},{"@pid":"118/8594","text":"Denisse Muñante"},{"@pid":"255/6764","text":"Carlos Gavidia-Calderon"},{"@pid":"149/9198","text":"Alan Demétrius Baria Valejo"},{"@pid":"61/11335","text":"Hugo Alatrista-Salas"}]},"title":"Information Management and Big Data - 8th Annual International Conference, SIMBig 2021, Virtual Event, December 1-3, 2021, Proceedings","venue":["SIMBig","Communications in Computer and Information Science"],"volume":"1577","publisher":"Springer","year":"2022","type":"Editorship","key":"conf/simbig/2021","doi":"10.1007/978-3-031-04447-2","ee":"https://doi.org/10.1007/978-3-031-04447-2","url":"https://dblp.org/rec/conf/simbig/2021"}, "url":"URL#954991" }, { "@score":"2", "@id":"955967", "info":{"authors":{"author":{"@pid":"119/1949","text":"Haoqian Huang"}},"title":"Data (Non-Gaussian Noises and Measurement Information Loss).","venue":"IEEE DataPort","publisher":"IEEE DataPort","year":"2022","type":"Data and Artifacts","access":"closed","key":"data/10/Huang22g","doi":"10.21227/FXVT-X045","ee":"https://doi.org/10.21227/fxvt-x045","url":"https://dblp.org/rec/data/10/Huang22g"}, "url":"URL#955967" }, { "@score":"2", "@id":"969619", "info":{"authors":{"author":[{"@pid":"248/5491","text":"Dominik Jens Elias Waibel"},{"@pid":"315/0642","text":"Scott Atwell"},{"@pid":"60/9032","text":"Matthias Meier"},{"@pid":"99/11011","text":"Carsten Marr"},{"@pid":"119/8860","text":"Bastian Rieck"}]},"title":"Capturing Shape Information with Multi-Scale Topological Loss Terms for 3D Reconstruction.","venue":"CoRR","volume":"abs/2203.01703","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2203-01703","doi":"10.48550/ARXIV.2203.01703","ee":"https://doi.org/10.48550/arXiv.2203.01703","url":"https://dblp.org/rec/journals/corr/abs-2203-01703"}, "url":"URL#969619" }, { "@score":"2", "@id":"971639", "info":{"authors":{"author":[{"@pid":"132/0431","text":"Chunyu Li"},{"@pid":"73/9371","text":"Jiajia Ding"},{"@pid":"315/8988","text":"Xing hu"},{"@pid":"88/898","text":"Fan Wang"}]},"title":"Information retrieval for label noise document ranking by bag sampling and group-wise loss.","venue":"CoRR","volume":"abs/2203.06408","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2203-06408","doi":"10.48550/ARXIV.2203.06408","ee":"https://doi.org/10.48550/arXiv.2203.06408","url":"https://dblp.org/rec/journals/corr/abs-2203-06408"}, "url":"URL#971639" }, { "@score":"2", "@id":"981656", "info":{"authors":{"author":[{"@pid":"15/5997","text":"Ming Lu"},{"@pid":"09/2949","text":"Zhan Ma"}]},"title":"High-Efficiency Lossy Image Coding Through Adaptive Neighborhood Information Aggregation.","venue":"CoRR","volume":"abs/2204.11448","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2204-11448","doi":"10.48550/ARXIV.2204.11448","ee":"https://doi.org/10.48550/arXiv.2204.11448","url":"https://dblp.org/rec/journals/corr/abs-2204-11448"}, "url":"URL#981656" }, { "@score":"2", "@id":"985125", "info":{"authors":{"author":[{"@pid":"179/8822","text":"Qiankun Liu"},{"@pid":"211/5776","text":"Zhentao Tan"},{"@pid":"92/1489-1","text":"Dongdong Chen 0001"},{"@pid":"52/9077-1","text":"Qi Chu 0001"},{"@pid":"176/5470","text":"Xiyang Dai"},{"@pid":"45/6977","text":"Yinpeng Chen"},{"@pid":"137/2150","text":"Mengchen Liu"},{"@pid":"66/6740","text":"Lu Yuan"},{"@pid":"96/5144","text":"Nenghai Yu"}]},"title":"Reduce Information Loss in Transformers for Pluralistic Image Inpainting.","venue":"CoRR","volume":"abs/2205.05076","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2205-05076","doi":"10.48550/ARXIV.2205.05076","ee":"https://doi.org/10.48550/arXiv.2205.05076","url":"https://dblp.org/rec/journals/corr/abs-2205-05076"}, "url":"URL#985125" }, { "@score":"2", "@id":"985486", "info":{"authors":{"author":[{"@pid":"29/1971","text":"Yutaka Jitsumatsu"},{"@pid":"75/4228","text":"Yasutada Oohama"}]},"title":"A Family of Algorithms for Computing Information-Theoretic Forms of Strong Converse Exponents in Channel Coding and Lossy Source Coding.","venue":"CoRR","volume":"abs/2205.06027","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2205-06027","doi":"10.48550/ARXIV.2205.06027","ee":"https://doi.org/10.48550/arXiv.2205.06027","url":"https://dblp.org/rec/journals/corr/abs-2205-06027"}, "url":"URL#985486" }, { "@score":"2", "@id":"986445", "info":{"authors":{"author":[{"@pid":"320/8309","text":"Deheng Yuan"},{"@pid":"43/56","text":"Tao Guo"},{"@pid":"10/4008-1","text":"Bo Bai 0001"},{"@pid":"82/1911-4","text":"Wei Han 0004"}]},"title":"Lossy Computing with Side Information via Multi-Hypergraphs.","venue":"CoRR","volume":"abs/2205.08262","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2205-08262","doi":"10.48550/ARXIV.2205.08262","ee":"https://doi.org/10.48550/arXiv.2205.08262","url":"https://dblp.org/rec/journals/corr/abs-2205-08262"}, "url":"URL#986445" }, { "@score":"2", "@id":"995225", "info":{"authors":{"author":[{"@pid":"285/5263","text":"Mohammad Saeed Masiha"},{"@pid":"49/11141","text":"Amin Gohari"},{"@pid":"16/4129","text":"Mohammad Hossein Yassaee"}]},"title":"Supermodular f-divergences and bounds on lossy compression and generalization error with mutual f-information.","venue":"CoRR","volume":"abs/2206.11042","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2206-11042","doi":"10.48550/ARXIV.2206.11042","ee":"https://doi.org/10.48550/arXiv.2206.11042","url":"https://dblp.org/rec/journals/corr/abs-2206-11042"}, "url":"URL#995225" }, { "@score":"2", "@id":"1006799", "info":{"authors":{"author":[{"@pid":"326/9017","text":"Luke Thorburn"},{"@pid":"17/1211","text":"Maria Polukarov"},{"@pid":"30/6089","text":"Carmine Ventre"}]},"title":"Information Loss in Euclidean Preference Models.","venue":"CoRR","volume":"abs/2208.08160","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2208-08160","doi":"10.48550/ARXIV.2208.08160","ee":"https://doi.org/10.48550/arXiv.2208.08160","url":"https://dblp.org/rec/journals/corr/abs-2208-08160"}, "url":"URL#1006799" }, { "@score":"3", "@id":"1023134", "info":{"authors":{"author":[{"@pid":"287/4780","text":"Kieran A. Murphy"},{"@pid":"68/10745","text":"Dani S. Bassett"}]},"title":"Characterizing information loss in a chaotic double pendulum with the Information Bottleneck.","venue":"CoRR","volume":"abs/2210.14220","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2210-14220","doi":"10.48550/ARXIV.2210.14220","ee":"https://doi.org/10.48550/arXiv.2210.14220","url":"https://dblp.org/rec/journals/corr/abs-2210-14220"}, "url":"URL#1023134" }, { "@score":"2", "@id":"1051143", "info":{"authors":{"author":[{"@pid":"225/6841","text":"Agnaldo Aparecido Esmael"},{"@pid":"288/1915","text":"Hugo Helito da Silva"},{"@pid":"288/2506","text":"Tuo Ji"},{"@pid":"s/RicardodaSilvaTorres","text":"Ricardo da Silva Torres"}]},"title":"Non-Technical Loss Detection in Power Grid Using Information Retrieval Approaches: A Comparative Study.","venue":"IEEE Access","volume":"9","pages":"40635-40648","year":"2021","type":"Journal Articles","access":"open","key":"journals/access/EsmaelSJT21","doi":"10.1109/ACCESS.2021.3064858","ee":"https://doi.org/10.1109/ACCESS.2021.3064858","url":"https://dblp.org/rec/journals/access/EsmaelSJT21"}, "url":"URL#1051143" }, { "@score":"2", "@id":"1051743", "info":{"authors":{"author":[{"@pid":"207/5569","text":"Abhijit Guha"},{"@pid":"217/5437","text":"Debabrata Samanta"},{"@pid":"67/1836","text":"Amit Banerjee"},{"@pid":"294/6752","text":"Daksh Agarwal"}]},"title":"A Deep Learning Model for Information Loss Prevention From Multi-Page Digital Documents.","venue":"IEEE Access","volume":"9","pages":"80451-80465","year":"2021","type":"Journal Articles","access":"open","key":"journals/access/GuhaSBA21","doi":"10.1109/ACCESS.2021.3084841","ee":"https://doi.org/10.1109/ACCESS.2021.3084841","url":"https://dblp.org/rec/journals/access/GuhaSBA21"}, "url":"URL#1051743" }, { "@score":"2", "@id":"1055803", "info":{"authors":{"author":[{"@pid":"341/7141-4","text":"Yuichi Nakamura 0004"},{"@pid":"43/2020","text":"Hiroaki Nishi"}]},"title":"Digital Watermarking for Anonymized Data With Low Information Loss.","venue":"IEEE Access","volume":"9","pages":"130570-130585","year":"2021","type":"Journal Articles","access":"open","key":"journals/access/NakamuraN21","doi":"10.1109/ACCESS.2021.3110984","ee":"https://doi.org/10.1109/ACCESS.2021.3110984","url":"https://dblp.org/rec/journals/access/NakamuraN21"}, "url":"URL#1055803" }, { "@score":"2", "@id":"1085261", "info":{"title":"Lossy-Context Surprisal: An Information-Theoretic Model of Memory Effects in Sentence Processing.","venue":"Cogn. Sci.","volume":"45","number":"5","year":"2021","type":"Journal Articles","access":"closed","key":"journals/cogsci/X21","doi":"10.1111/COGS.12990","ee":"https://doi.org/10.1111/cogs.12990","url":"https://dblp.org/rec/journals/cogsci/X21"}, "url":"URL#1085261" }, { "@score":"2", "@id":"1093548", "info":{"authors":{"author":[{"@pid":"21/2769","text":"Ebaa Fayyoumi"},{"@pid":"284/5646","text":"Omar Alhuniti"}]},"title":"Recursive Genetic Micro-Aggregation Technique: Information Loss, Disclosure Risk and Scoring Index.","venue":"Data","volume":"6","number":"5","pages":"53","year":"2021","type":"Journal Articles","access":"open","key":"journals/data/FayyoumiA21","doi":"10.3390/DATA6050053","ee":"https://doi.org/10.3390/data6050053","url":"https://dblp.org/rec/journals/data/FayyoumiA21"}, "url":"URL#1093548" }, { "@score":"2", "@id":"1097483", "info":{"authors":{"author":[{"@pid":"50/5250","text":"Sridhar Balasubramanian"},{"@pid":"278/3469","text":"Niklas Langmaack"},{"@pid":"134/4521","text":"Markus Henke"}]},"title":"Evaluation and loss estimation of a high-speed permanent magnet synchronous machine with hairpin windings for high-volume fuel cell applications.","venue":"Elektrotech. Informationstechnik","volume":"138","number":"6","pages":"415-423","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ei/Balasubramanian21","doi":"10.1007/S00502-021-00914-0","ee":"https://doi.org/10.1007/s00502-021-00914-0","url":"https://dblp.org/rec/journals/ei/Balasubramanian21"}, "url":"URL#1097483" }, { "@score":"2", "@id":"1099450", "info":{"authors":{"author":[{"@pid":"257/2465","text":"James Fullwood"},{"@pid":"229/7300","text":"Arthur J. Parzygnat"}]},"title":"The Information Loss of a Stochastic Map.","venue":"Entropy","volume":"23","number":"8","pages":"1021","year":"2021","type":"Journal Articles","access":"open","key":"journals/entropy/FullwoodP21","doi":"10.3390/E23081021","ee":"https://doi.org/10.3390/e23081021","url":"https://dblp.org/rec/journals/entropy/FullwoodP21"}, "url":"URL#1099450" }, { "@score":"2", "@id":"1104393", "info":{"authors":{"author":[{"@pid":"293/5462","text":"Amrita Bhandari"},{"@pid":"06/10464","text":"K. C. Tiwari"}]},"title":"Loss of target information in full pixel and subpixel target detection in hyperspectral data with and without dimensionality reduction.","venue":"Evol. Syst.","volume":"12","number":"2","pages":"239-254","year":"2021","type":"Journal Articles","access":"closed","key":"journals/evs/BhandariT21","doi":"10.1007/S12530-019-09265-W","ee":"https://doi.org/10.1007/s12530-019-09265-w","url":"https://dblp.org/rec/journals/evs/BhandariT21"}, "url":"URL#1104393" }, { "@score":"2", "@id":"1134382", "info":{"authors":{"author":[{"@pid":"138/5240","text":"Jingjing Tang"},{"@pid":"06/428","text":"Yiwei He"},{"@pid":"83/2547","text":"Yingjie Tian 0001"},{"@pid":"65/5552","text":"Dalian Liu"},{"@pid":"84/5885","text":"Gang Kou"},{"@pid":"180/6299","text":"Fawaz E. Alsaadi"}]},"title":"Coupling loss and self-used privileged information guided multi-view transfer learning.","venue":"Inf. Sci.","volume":"551","pages":"245-269","year":"2021","type":"Journal Articles","access":"closed","key":"journals/isci/TangHTLKA21","doi":"10.1016/J.INS.2020.11.007","ee":"https://doi.org/10.1016/j.ins.2020.11.007","url":"https://dblp.org/rec/journals/isci/TangHTLKA21"}, "url":"URL#1134382" }, { "@score":"2", "@id":"1134968", "info":{"authors":{"author":[{"@pid":"41/7627","text":"Chenglong Zhang"},{"@pid":"62/4566","text":"Nan Feng"},{"@pid":"04/8074","text":"Jianjian Chen"},{"@pid":"51/5839","text":"Dahui Li"},{"@pid":"02/1225","text":"Minqiang Li"}]},"title":"Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities.","venue":"Inf. Syst. Frontiers","volume":"23","number":"3","pages":"773-790","year":"2021","type":"Journal Articles","access":"closed","key":"journals/isf/ZhangFCLL21","doi":"10.1007/S10796-020-10009-4","ee":"https://doi.org/10.1007/s10796-020-10009-4","url":"https://dblp.org/rec/journals/isf/ZhangFCLL21"}, "url":"URL#1134968" }, { "@score":"2", "@id":"1157263", "info":{"authors":{"author":[{"@pid":"75/6627","text":"Ke Li"},{"@pid":"154/9502","text":"Fanyin Zhou"},{"@pid":"59/5464-11","text":"Zhiyong Li 0011"},{"@pid":"27/9999","text":"Xiao Yao"},{"@pid":"259/6231","text":"Yashu Zhang"}]},"title":"Predicting loss given default using post-default information.","venue":"Knowl. Based Syst.","volume":"224","pages":"107068","year":"2021","type":"Journal Articles","access":"closed","key":"journals/kbs/LiZLYZ21","doi":"10.1016/J.KNOSYS.2021.107068","ee":"https://doi.org/10.1016/j.knosys.2021.107068","url":"https://dblp.org/rec/journals/kbs/LiZLYZ21"}, "url":"URL#1157263" }, { "@score":"3", "@id":"1160101", "info":{"authors":{"author":{"@pid":"89/6764-63","text":"Bin Li 0063"}},"title":"Separating Information About Cash Flows from Information About Risk in Losses.","venue":"Manag. Sci.","volume":"67","number":"6","pages":"3570-3595","year":"2021","type":"Journal Articles","access":"closed","key":"journals/mansci/Li21","doi":"10.1287/MNSC.2020.3597","ee":"https://doi.org/10.1287/mnsc.2020.3597","url":"https://dblp.org/rec/journals/mansci/Li21"}, "url":"URL#1160101" }, { "@score":"2", "@id":"1166055", "info":{"authors":{"author":[{"@pid":"147/2414","text":"Narima Zermi"},{"@pid":"281/9921","text":"Amine Khaldi"},{"@pid":"286/9674","text":"Med Redouane Kafi"},{"@pid":"152/4918","text":"Kahlessenane Fares"},{"@pid":"286/9752","text":"Salah Euschi"}]},"title":"A lossless DWT-SVD domain watermarking for medical information security.","venue":"Multim. Tools Appl.","volume":"80","number":"16","pages":"24823-24841","year":"2021","type":"Journal Articles","access":"closed","key":"journals/mta/ZermiKKFE21","doi":"10.1007/S11042-021-10712-7","ee":"https://doi.org/10.1007/s11042-021-10712-7","url":"https://dblp.org/rec/journals/mta/ZermiKKFE21"}, "url":"URL#1166055" }, { "@score":"2", "@id":"1166311", "info":{"authors":{"author":[{"@pid":"164/1048","text":"Om Prakash Singh"},{"@pid":"10/7647-1","text":"Amit Kumar Singh 0001"}]},"title":"A robust information hiding algorithm based on lossless encryption and NSCT-HD-SVD.","venue":"Mach. Vis. Appl.","volume":"32","number":"4","pages":"101","year":"2021","type":"Journal Articles","access":"closed","key":"journals/mva/SinghS21","doi":"10.1007/S00138-021-01227-0","ee":"https://doi.org/10.1007/s00138-021-01227-0","url":"https://dblp.org/rec/journals/mva/SinghS21"}, "url":"URL#1166311" }, { "@score":"2", "@id":"1175607", "info":{"authors":{"author":[{"@pid":"311/8059","text":"Angus Leung"},{"@pid":"118/5027","text":"Dror Cohen"},{"@pid":"311/7348","text":"Bruno van Swinderen"},{"@pid":"59/4564","text":"Naotsugu Tsuchiya"}]},"title":"Integrated information structure collapses with anesthetic loss of conscious arousal in Drosophila melanogaster.","venue":"PLoS Comput. Biol.","volume":"17","number":"2","year":"2021","type":"Journal Articles","access":"open","key":"journals/ploscb/LeungCST21","doi":"10.1371/JOURNAL.PCBI.1008722","ee":"https://doi.org/10.1371/journal.pcbi.1008722","url":"https://dblp.org/rec/journals/ploscb/LeungCST21"}, "url":"URL#1175607" }, { "@score":"2", "@id":"1178534", "info":{"authors":{"author":[{"@pid":"285/4124","text":"Xing-Bo Pan"},{"@pid":"21/1244","text":"Gang Xu"},{"@pid":"24/1320","text":"Zongpeng Li"},{"@pid":"145/2839","text":"Xiu-Bo Chen"},{"@pid":"33/5774","text":"Yi-Xian Yang"}]},"title":"Quantum network coding without loss of information.","venue":"Quantum Inf. Process.","volume":"20","number":"2","pages":"65","year":"2021","type":"Journal Articles","access":"closed","key":"journals/qip/PanXLCY21","doi":"10.1007/S11128-020-02966-1","ee":"https://doi.org/10.1007/s11128-020-02966-1","url":"https://dblp.org/rec/journals/qip/PanXLCY21"}, "url":"URL#1178534" }, { "@score":"2", "@id":"1204507", "info":{"authors":{"author":[{"@pid":"22/4613","text":"Feng Yang"},{"@pid":"301/5570","text":"Guixin Dong"},{"@pid":"23/8313","text":"Chaoran Cui"},{"@pid":"85/6319","text":"Xiaojie Li"},{"@pid":"301/5508","text":"Yaxi Su"},{"@pid":"94/458","text":"Yilong Yin"}]},"title":"Digital Currency Illegal Behavior Detection Based on Mutual Information Prior Loss.","venue":"Sci. Program.","volume":"2021","pages":"9954204:1-9954204:8","year":"2021","type":"Journal Articles","access":"open","key":"journals/sp/YangDCLSY21","doi":"10.1155/2021/9954204","ee":"https://doi.org/10.1155/2021/9954204","url":"https://dblp.org/rec/journals/sp/YangDCLSY21"}, "url":"URL#1204507" }, { "@score":"2", "@id":"1206593", "info":{"authors":{"author":[{"@pid":"173/7859","text":"Lars Fritsche"},{"@pid":"221/1936","text":"Jens Kosiol"},{"@pid":"s/AndySchurr","text":"Andy Schürr"},{"@pid":"t/GabrieleTaentzer","text":"Gabriele Taentzer"}]},"title":"Avoiding unnecessary information loss: correct and efficient model synchronization based on triple graph grammars.","venue":"Int. J. Softw. Tools Technol. Transf.","volume":"23","number":"3","pages":"335-368","year":"2021","type":"Journal Articles","access":"closed","key":"journals/sttt/FritscheKST21","doi":"10.1007/S10009-020-00588-7","ee":"https://doi.org/10.1007/s10009-020-00588-7","url":"https://dblp.org/rec/journals/sttt/FritscheKST21"}, "url":"URL#1206593" }, { "@score":"2", "@id":"1226725", "info":{"authors":{"author":[{"@pid":"255/4776","text":"Lampros Gavalakis"},{"@pid":"74/5935","text":"Ioannis Kontoyiannis"}]},"title":"Fundamental Limits of Lossless Data Compression With Side Information.","venue":"IEEE Trans. Inf. Theory","volume":"67","number":"5","pages":"2680-2692","year":"2021","type":"Journal Articles","access":"closed","key":"journals/tit/GavalakisK21","doi":"10.1109/TIT.2021.3062614","ee":"https://doi.org/10.1109/TIT.2021.3062614","url":"https://dblp.org/rec/journals/tit/GavalakisK21"}, "url":"URL#1226725" }, { "@score":"2", "@id":"1236637", "info":{"authors":{"author":[{"@pid":"194/7013","text":"Wensheng Lin"},{"@pid":"01/4301","text":"Lixin Li"},{"@pid":"50/567","text":"Jinhong Yuan"},{"@pid":"83/514","text":"Zhu Han 0001"},{"@pid":"65/5662","text":"Markku J. Juntti"},{"@pid":"25/1696","text":"Tad Matsumoto"}]},"title":"Cooperative Lossy Communications in Unmanned Aerial Vehicle Networks: Age-of-Information With Outage Probability.","venue":"IEEE Trans. Veh. Technol.","volume":"70","number":"10","pages":"10105-10120","year":"2021","type":"Journal Articles","access":"closed","key":"journals/tvt/LinLYHJM21","doi":"10.1109/TVT.2021.3103103","ee":"https://doi.org/10.1109/TVT.2021.3103103","url":"https://dblp.org/rec/journals/tvt/LinLYHJM21"}, "url":"URL#1236637" }, { "@score":"2", "@id":"1237905", "info":{"authors":{"author":{"@pid":"162/7056","text":"Louise Fryer"}},"title":"Accessing access: the importance of pre-visit information to the attendance of people with sight loss at live audio described events.","venue":"Univers. Access Inf. Soc.","volume":"20","number":"4","pages":"717-728","year":"2021","type":"Journal Articles","access":"open","key":"journals/uais/Fryer21","doi":"10.1007/S10209-020-00737-4","ee":"https://doi.org/10.1007/s10209-020-00737-4","url":"https://dblp.org/rec/journals/uais/Fryer21"}, "url":"URL#1237905" }, { "@score":"2", "@id":"1242602", "info":{"authors":{"author":[{"@pid":"47/5816","text":"Zhigang Song"},{"@pid":"300/5533","text":"Jiazhao Chai"},{"@pid":"29/4708","text":"Wenqian Shang"},{"@pid":"300/5417","text":"Guo Yuning"}]},"title":"Transformer-IC: The Solution to Information Loss.","venue":"ICIS","pages":"97-101","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACISicis/SongCSY21","doi":"10.1109/ICIS51600.2021.9516861","ee":"https://doi.org/10.1109/ICIS51600.2021.9516861","url":"https://dblp.org/rec/conf/ACISicis/SongCSY21"}, "url":"URL#1242602" }, { "@score":"2", "@id":"1254371", "info":{"authors":{"author":[{"@pid":"213/3578","text":"Alankrita Bhatt"},{"@pid":"93/524-1","text":"Young-Han Kim 0001"}]},"title":"Sequential prediction under log-loss with side information.","venue":"ALT","pages":"340-344","year":"2021","type":"Conference and Workshop Papers","access":"open","key":"conf/alt/Bhatt021","ee":"http://proceedings.mlr.press/v132/bhatt21a.html","url":"https://dblp.org/rec/conf/alt/Bhatt021"}, "url":"URL#1254371" }, { "@score":"2", "@id":"1262675", "info":{"authors":{"author":[{"@pid":"194/5523","text":"Brandon Foggo"},{"@pid":"156/4072","text":"Nanpeng Yu"}]},"title":"Analyzing Data Selection Techniques with Tools from the Theory of Information Losses.","venue":"IEEE BigData","pages":"7-16","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/bigdataconf/FoggoY21","doi":"10.1109/BIGDATA52589.2021.9671861","ee":"https://doi.org/10.1109/BigData52589.2021.9671861","url":"https://dblp.org/rec/conf/bigdataconf/FoggoY21"}, "url":"URL#1262675" }, { "@score":"2", "@id":"1275169", "info":{"authors":{"author":[{"@pid":"176/0675","text":"Oleksandra S. Bulgakova"},{"@pid":"03/2436","text":"Viktor Mashkov"},{"@pid":"176/0470","text":"Viacheslav V. Zosimov"},{"@pid":"315/8251","text":"Pavlo Popravkin"}]},"title":"Risk of Information Loss using JWT token (short paper).","venue":"CITRisk","pages":"292-299","year":"2021","type":"Conference and Workshop Papers","access":"open","key":"conf/citrisk/BulgakovaMZP21","ee":"https://ceur-ws.org/Vol-3101/Short21.pdf","url":"https://dblp.org/rec/conf/citrisk/BulgakovaMZP21"}, "url":"URL#1275169" }, { "@score":"2", "@id":"1276089", "info":{"authors":{"author":[{"@pid":"208/0679","text":"Jialing Zhang"},{"@pid":"44/10763","text":"Jiaxi Chen"},{"@pid":"168/0707","text":"Xiaoyan Zhuo"},{"@pid":"208/0743","text":"Aekyeung Moon"},{"@pid":"47/6171-1","text":"Seung Woo Son 0001"}]},"title":"DPZ: Improving Lossy Compression Ratio with Information Retrieval on Scientific Data.","venue":"CLUSTER","pages":"320-331","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/cluster/ZhangCZMS21","doi":"10.1109/CLUSTER48925.2021.00056","ee":"https://doi.org/10.1109/Cluster48925.2021.00056","url":"https://dblp.org/rec/conf/cluster/ZhangCZMS21"}, "url":"URL#1276089" }, { "@score":"2", "@id":"1277182", "info":{"authors":{"author":[{"@pid":"173/4795","text":"Asma Rani"},{"@pid":"17/1557","text":"Navneet Goyal"},{"@pid":"g/ShashiKGadia","text":"Shashi K. Gadia"}]},"title":"Provenance Framework for Twitter Data using Zero-Information Loss Graph Database.","venue":"COMAD/CODS","pages":"74-82","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/comad/RaniGG21","doi":"10.1145/3430984.3431014","ee":"https://doi.org/10.1145/3430984.3431014","url":"https://dblp.org/rec/conf/comad/RaniGG21"}, "url":"URL#1277182" }, { "@score":"2", "@id":"1293807", "info":{"authors":{"author":[{"@pid":"277/3949","text":"Sara Papi"},{"@pid":"266/8121","text":"Marco Gaido"},{"@pid":"95/3678","text":"Matteo Negri"},{"@pid":"96/4886","text":"Marco Turchi"}]},"title":"Speechformer: Reducing Information Loss in Direct Speech Translation.","venue":"EMNLP","pages":"1698-1706","year":"2021","type":"Conference and Workshop Papers","access":"open","key":"conf/emnlp/PapiGNT21","doi":"10.18653/V1/2021.EMNLP-MAIN.127","ee":"https://doi.org/10.18653/v1/2021.emnlp-main.127","url":"https://dblp.org/rec/conf/emnlp/PapiGNT21"}, "url":"URL#1293807" }, { "@score":"2", "@id":"1312425", "info":{"authors":{"author":[{"@pid":"190/6982","text":"Amina Asif"},{"@pid":"08/10535","text":"Muhammad Dawood"},{"@pid":"45/10683","text":"Fayyaz ul Amir Afsar Minhas"}]},"title":"A Generalized Meta-loss Function for Distillation Based Learning Using Privileged Information for Classification and Regression.","venue":"ICANN","pages":"534-545","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/icann/AsifDM21","doi":"10.1007/978-3-030-86365-4_43","ee":"https://doi.org/10.1007/978-3-030-86365-4_43","url":"https://dblp.org/rec/conf/icann/AsifDM21"}, "url":"URL#1312425" }, { "@score":"2", "@id":"1319004", "info":{"authors":{"author":[{"@pid":"183/1698","text":"Michael Y. Kpiebaareh"},{"@pid":"63/4185","text":"Wei-Ping Wu"},{"@pid":"228/2326","text":"Charles R. Haruna"},{"@pid":"229/7805","text":"Lawrence Tandoh"},{"@pid":"183/9416","text":"Brighter Agyemang"}]},"title":"A Graph-Based Opinion Mining Approach for Reducing Information Loss and Overload in Product Reviews Analysis.","venue":"ICCDA","pages":"143-148","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/iccda/KpiebaarehWHTA21","doi":"10.1145/3456529.3456561","ee":"https://doi.org/10.1145/3456529.3456561","url":"https://dblp.org/rec/conf/iccda/KpiebaarehWHTA21"}, "url":"URL#1319004" }, { "@score":"2", "@id":"1324557", "info":{"authors":{"author":[{"@pid":"231/1744","text":"Jiahuan Ren"},{"@pid":"87/6853-1","text":"Zhao Zhang 0001"},{"@pid":"139/1570","text":"Jicong Fan"},{"@pid":"70/2140-2","text":"Haijun Zhang 0002"},{"@pid":"13/8698","text":"Mingliang Xu"},{"@pid":"93/6765-1","text":"Meng Wang 0001"}]},"title":"Robust Low-rank Deep Feature Recovery in CNNs: Toward Low Information Loss and Fast Convergence.","venue":"ICDM","pages":"529-538","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/RenZFZXW21","doi":"10.1109/ICDM51629.2021.00064","ee":"https://doi.org/10.1109/ICDM51629.2021.00064","url":"https://dblp.org/rec/conf/icdm/RenZFZXW21"}, "url":"URL#1324557" }, { "@score":"2", "@id":"1342612", "info":{"authors":{"author":[{"@pid":"310/1020","text":"Vikas Thammanna Gowda"},{"@pid":"b/RajivBagai","text":"Rajiv Bagai"},{"@pid":"310/0577","text":"Gerald Spilinek"},{"@pid":"310/0824","text":"Spandana Vitalapura"}]},"title":"Efficient Near-Optimal t-Closeness With Low Information Loss.","venue":"IDAACS","pages":"494-498","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/idaacs/GowdaBSV21","doi":"10.1109/IDAACS53288.2021.9661004","ee":"https://doi.org/10.1109/IDAACS53288.2021.9661004","url":"https://dblp.org/rec/conf/idaacs/GowdaBSV21"}, "url":"URL#1342612" }, { "@score":"2", "@id":"1360622", "info":{"authors":{"author":[{"@pid":"167/6308","text":"Fredrik Hellström"},{"@pid":"12/3405","text":"Giuseppe Durisi"}]},"title":"Fast-Rate Loss Bounds via Conditional Information Measures with Applications to Neural Networks.","venue":"ISIT","pages":"952-957","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/HellstromD21","doi":"10.1109/ISIT45174.2021.9517731","ee":"https://doi.org/10.1109/ISIT45174.2021.9517731","url":"https://dblp.org/rec/conf/isit/HellstromD21"}, "url":"URL#1360622" }, { "@score":"2", "@id":"1365318", "info":{"authors":{"author":[{"@pid":"97/9989","text":"Shuai Huang"},{"@pid":"89/10652","text":"D. H. Sun"},{"@pid":"67/1336-10","text":"Min Zhao 0010"},{"@pid":"305/2922","text":"Z. C. Liu"},{"@pid":"49/4402","text":"S. H. Wang"},{"@pid":"159/8580","text":"Y. H. You"}]},"title":"Consensus-based Distributed Cooperative Control for Mixed Vehicle Group Systems with Packet Losses and Information Uncertainty in the Vicinity of Traffic Signal Light.","venue":"ITSC","pages":"3623-3628","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/itsc/HuangSZLWY21","doi":"10.1109/ITSC48978.2021.9564804","ee":"https://doi.org/10.1109/ITSC48978.2021.9564804","url":"https://dblp.org/rec/conf/itsc/HuangSZLWY21"}, "url":"URL#1365318" }, { "@score":"2", "@id":"1393303", "info":{"authors":{"author":[{"@pid":"151/1415","text":"Francesco Basciani"},{"@pid":"171/1962","text":"Daniele Di Pompeo"},{"@pid":"r/DavideDiRuscio","text":"Davide Di Ruscio"},{"@pid":"72/11439","text":"Ludovico Iovino"},{"@pid":"p/AlfonsoPierantonio","text":"Alfonso Pierantonio"}]},"title":"Integrating semantic reasoning in information loss-based transformation chain rankers.","venue":"SAC","pages":"1494-1503","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BascianiPRIP21","doi":"10.1145/3412841.3442024","ee":"https://doi.org/10.1145/3412841.3442024","url":"https://dblp.org/rec/conf/sac/BascianiPRIP21"}, "url":"URL#1393303" }, { "@score":"2", "@id":"1395493", "info":{"authors":{"author":[{"@pid":"217/6974","text":"Florian Thaeter"},{"@pid":"r/RReischuk","text":"Rüdiger Reischuk"}]},"title":"Scalable k-anonymous Microaggregation: Exploiting the Tradeoff between Computational Complexity and Information Loss.","venue":"SECRYPT","pages":"87-98","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/secrypt/ThaeterR21","doi":"10.5220/0010536600870098","ee":"https://doi.org/10.5220/0010536600870098","url":"https://dblp.org/rec/conf/secrypt/ThaeterR21"}, "url":"URL#1395493" }, { "@score":"4", "@id":"1419807", "info":{"authors":{"author":[{"@pid":"81/11205","text":"Juan Antonio Lossio-Ventura"},{"@pid":"119/6669","text":"Jorge Carlos Valverde-Rebaza"},{"@pid":"119/9158","text":"Eduardo Díaz"},{"@pid":"61/11335","text":"Hugo Alatrista-Salas"}]},"title":"Information Management and Big Data - 7th Annual International Conference, SIMBig 2020, Lima, Peru, October 1-3, 2020, Proceedings","venue":["SIMBig","Communications in Computer and Information Science"],"volume":"1410","publisher":"Springer","year":"2021","type":"Editorship","key":"conf/simbig/2020","doi":"10.1007/978-3-030-76228-5","ee":"https://doi.org/10.1007/978-3-030-76228-5","url":"https://dblp.org/rec/conf/simbig/2020"}, "url":"URL#1419807" }, { "@score":"2", "@id":"1426724", "info":{"authors":{"author":[{"@pid":"234/8545","text":"Jayam Patel"},{"@pid":"284/8276","text":"Prajankya Sonar"},{"@pid":"18/2729","text":"Carlo Pinciroli"}]},"title":"On Multi-Human Multi-Robot Remote Interaction: A Study of Transparency, Inter-Human Communication, and Information Loss in Remote Interaction.","venue":"CoRR","volume":"abs/2102.02351","year":"2021","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2102-02351","ee":"https://arxiv.org/abs/2102.02351","url":"https://dblp.org/rec/journals/corr/abs-2102-02351"}, "url":"URL#1426724" }, { "@score":"2", "@id":"1428700", "info":{"authors":{"author":[{"@pid":"213/3578","text":"Alankrita Bhatt"},{"@pid":"93/524-1","text":"Young-Han Kim 0001"}]},"title":"Sequential prediction under log-loss with side information.","venue":"CoRR","volume":"abs/2102.06855","year":"2021","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2102-06855","ee":"https://arxiv.org/abs/2102.06855","url":"https://dblp.org/rec/journals/corr/abs-2102-06855"}, "url":"URL#1428700" }, { "@score":"2", "@id":"1460580", "info":{"authors":{"author":[{"@pid":"257/2465","text":"James Fullwood"},{"@pid":"229/7300","text":"Arthur J. Parzygnat"}]},"title":"The information loss of a stochastic map.","venue":"CoRR","volume":"abs/2107.01975","year":"2021","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2107-01975","ee":"https://arxiv.org/abs/2107.01975","url":"https://dblp.org/rec/journals/corr/abs-2107-01975"}, "url":"URL#1460580" }, { "@score":"2", "@id":"1473406", "info":{"authors":{"author":[{"@pid":"277/3949","text":"Sara Papi"},{"@pid":"266/8121","text":"Marco Gaido"},{"@pid":"95/3678","text":"Matteo Negri"},{"@pid":"96/4886","text":"Marco Turchi"}]},"title":"Speechformer: Reducing Information Loss in Direct Speech Translation.","venue":"CoRR","volume":"abs/2109.04574","year":"2021","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2109-04574","ee":"https://arxiv.org/abs/2109.04574","url":"https://dblp.org/rec/journals/corr/abs-2109-04574"}, "url":"URL#1473406" }, { "@score":"2", "@id":"1475242", "info":{"authors":{"author":[{"@pid":"301/9906","text":"Guillermo Grande"},{"@pid":"67/6586","text":"Dhruv Batra"},{"@pid":"192/1393","text":"Erik Wijmans"}]},"title":"Realistic PointGoal Navigation via Auxiliary Losses and Information Bottleneck.","venue":"CoRR","volume":"abs/2109.08677","year":"2021","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2109-08677","ee":"https://arxiv.org/abs/2109.08677","url":"https://dblp.org/rec/journals/corr/abs-2109-08677"}, "url":"URL#1475242" }, { "@score":"2", "@id":"1482700", "info":{"authors":{"author":[{"@pid":"138/2055","text":"Haoran Sun"},{"@pid":"65/4423","text":"Chen Chen"},{"@pid":"153/0735","text":"Lantian Li"},{"@pid":"40/3934-13","text":"Dong Wang 0013"}]},"title":"CycleFlow: Purify Information Factors by Cycle Loss.","venue":"CoRR","volume":"abs/2110.09928","year":"2021","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2110-09928","ee":"https://arxiv.org/abs/2110.09928","url":"https://dblp.org/rec/journals/corr/abs-2110-09928"}, "url":"URL#1482700" }, { "@score":"2", "@id":"1492964", "info":{"authors":{"author":[{"@pid":"89/2640","text":"Chunlin Ji"},{"@pid":"308/2890","text":"Hanchu Shen"},{"@pid":"182/4445","text":"Zhan Xiong"},{"@pid":"21/3047","text":"Feng Chen"},{"@pid":"273/2667","text":"Meiying Zhang"},{"@pid":"306/3097","text":"Huiwen Yang"}]},"title":"Prototypical Model with Novel Information-theoretic Loss Function for Generalized Zero Shot Learning.","venue":"CoRR","volume":"abs/2112.03134","year":"2021","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2112-03134","ee":"https://arxiv.org/abs/2112.03134","url":"https://dblp.org/rec/journals/corr/abs-2112-03134"}, "url":"URL#1492964" }, { "@score":"3", "@id":"1497635", "info":{"authors":{"author":[{"@pid":"13/10857","text":"Jorge F. Silva"},{"@pid":"136/5327","text":"Felipe A. Tobar"},{"@pid":"309/9227","text":"Mario Vicuña"},{"@pid":"309/9219","text":"Felipe Cordova"}]},"title":"Studying the Interplay between Information Loss and Operation Loss in Representations for Classification.","venue":"CoRR","volume":"abs/2112.15238","year":"2021","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2112-15238","ee":"https://arxiv.org/abs/2112.15238","url":"https://dblp.org/rec/journals/corr/abs-2112-15238"}, "url":"URL#1497635" }, { "@score":"2", "@id":"1503190", "info":{"authors":{"author":{"@pid":"134/5942","text":"Jiachun Liao"}},"title":"Quantifying Information Leakage via Adversarial Loss Functions: Theory and Practice.","year":"2020","type":"Books and Theses","access":"closed","key":"phd/basesearch/Liao20","ee":"https://hdl.handle.net/2286/R.I.57087","url":"https://dblp.org/rec/phd/basesearch/Liao20"}, "url":"URL#1503190" }, { "@score":"2", "@id":"1511634", "info":{"authors":{"author":[{"@pid":"236/1044","text":"Hanqing Ding"},{"@pid":"38/10130","text":"Qingqing Liu"},{"@pid":"273/6077","text":"Zihang Ding"},{"@pid":"97/3265","text":"Jin Xu"},{"@pid":"87/5809-7","text":"Zhe Zhang 0007"},{"@pid":"57/1406","text":"Weihua Liu"},{"@pid":"154/4870","text":"Xueyan Chen"}]},"title":"Low Complexity Iterative Receiver With Lossless Information Transfer for Non-Binary LDPC Coded PDMA System.","venue":"IEEE Access","volume":"8","pages":"150964-150973","year":"2020","type":"Journal Articles","access":"open","key":"journals/access/DingLDXZLC20","doi":"10.1109/ACCESS.2020.3016697","ee":"https://doi.org/10.1109/ACCESS.2020.3016697","url":"https://dblp.org/rec/journals/access/DingLDXZLC20"}, "url":"URL#1511634" }, { "@score":"2", "@id":"1513941", "info":{"authors":{"author":[{"@pid":"119/1949","text":"Haoqian Huang"},{"@pid":"208/8113","text":"Jiacheng Tang"},{"@pid":"36/2259","text":"Bo Zhang"},{"@pid":"87/6328","text":"Jianfeng Chen"},{"@pid":"124/0291","text":"Jiajin Zhang"},{"@pid":"71/6574-4","text":"Xiang Song 0004"}]},"title":"A Novel Nonlinear Algorithm for Non-Gaussian Noises and Measurement Information Loss in Underwater Navigation.","venue":"IEEE Access","volume":"8","pages":"118472-118484","year":"2020","type":"Journal Articles","access":"open","key":"journals/access/HuangTZCZS20","doi":"10.1109/ACCESS.2020.3004871","ee":"https://doi.org/10.1109/ACCESS.2020.3004871","url":"https://dblp.org/rec/journals/access/HuangTZCZS20"}, "url":"URL#1513941" }, { "@score":"2", "@id":"1522775", "info":{"authors":{"author":[{"@pid":"49/3800","text":"Lu Wang"},{"@pid":"w/ChaoliWang-2","text":"Chaoli Wang 0002"},{"@pid":"40/1928","text":"Zhanquan Sun"},{"@pid":"34/1910-9","text":"Sheng Chen 0009"}]},"title":"An Improved Dice Loss for Pneumothorax Segmentation by Mining the Information of Negative Areas.","venue":"IEEE Access","volume":"8","pages":"167939-167949","year":"2020","type":"Journal Articles","access":"open","key":"journals/access/WangWSC20","doi":"10.1109/ACCESS.2020.3020475","ee":"https://doi.org/10.1109/ACCESS.2020.3020475","url":"https://dblp.org/rec/journals/access/WangWSC20"}, "url":"URL#1522775" }, { "@score":"2", "@id":"1531037", "info":{"authors":{"author":[{"@pid":"278/4514","text":"Sri Vanamalla Venkataraman"},{"@pid":"278/4334","text":"Dereje Asfaw"}]},"title":"Buyback contract under asymmetric information about retailer's loss aversion nature.","venue":"Ann. Oper. Res.","volume":"295","number":"1","pages":"385-409","year":"2020","type":"Journal Articles","access":"closed","key":"journals/anor/VenkataramanA20","doi":"10.1007/S10479-020-03707-4","ee":"https://doi.org/10.1007/s10479-020-03707-4","url":"https://dblp.org/rec/journals/anor/VenkataramanA20"}, "url":"URL#1531037" }, { "@score":"2", "@id":"1534504", "info":{"authors":{"author":{"@pid":"258/1241","text":"Tamar Israeli"}},"title":"Losing information is like losing an arm: employee reactions to data loss.","venue":"Behav. Inf. Technol.","volume":"39","number":"12","pages":"1297-1307","year":"2020","type":"Journal Articles","access":"closed","key":"journals/behaviourIT/Israeli20","doi":"10.1080/0144929X.2019.1662487","ee":"https://doi.org/10.1080/0144929X.2019.1662487","url":"https://dblp.org/rec/journals/behaviourIT/Israeli20"}, "url":"URL#1534504" }, { "@score":"2", "@id":"1547557", "info":{"authors":{"author":[{"@pid":"169/3172","text":"Richard Futrell"},{"@pid":"93/5649","text":"Edward Gibson"},{"@pid":"23/90","text":"Roger P. Levy"}]},"title":"Lossy-Context Surprisal: An Information-Theoretic Model of Memory Effects in Sentence Processing.","venue":"Cogn. Sci.","volume":"44","number":"3","year":"2020","type":"Journal Articles","access":"open","key":"journals/cogsci/FutrellGL20","doi":"10.1111/COGS.12814","ee":"https://doi.org/10.1111/cogs.12814","url":"https://dblp.org/rec/journals/cogsci/FutrellGL20"}, "url":"URL#1547557" }, { "@score":"2", "@id":"1555168", "info":{"authors":{"author":[{"@pid":"275/9643","text":"Maryam Moghimi"},{"@pid":"72/2175","text":"Herbert W. Corley"}]},"title":"Information Loss Due to the Data Reduction of Sample Data from Discrete Distributions.","venue":"Data","volume":"5","number":"3","pages":"84","year":"2020","type":"Journal Articles","access":"open","key":"journals/data/MoghimiC20","doi":"10.3390/DATA5030084","ee":"https://doi.org/10.3390/data5030084","url":"https://dblp.org/rec/journals/data/MoghimiC20"}, "url":"URL#1555168" }, { "@score":"2", "@id":"1558357", "info":{"authors":{"author":{"@pid":"82/1911","text":"Wei Han"}},"title":"The analysis on Chinese e-commerce tax losses based on the perspective of information asymmetry.","venue":"Electron. Commer. Res.","volume":"20","number":"3","pages":"651-677","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ecr/Han20","doi":"10.1007/S10660-018-9318-7","ee":"https://doi.org/10.1007/s10660-018-9318-7","url":"https://dblp.org/rec/journals/ecr/Han20"}, "url":"URL#1558357" }, { "@score":"2", "@id":"1560472", "info":{"authors":{"author":[{"@pid":"255/4776","text":"Lampros Gavalakis"},{"@pid":"74/5935","text":"Ioannis Kontoyiannis"}]},"title":"Sharp Second-Order Pointwise Asymptotics for Lossless Compression with Side Information.","venue":"Entropy","volume":"22","number":"6","pages":"705","year":"2020","type":"Journal Articles","access":"open","key":"journals/entropy/GavalakisK20","doi":"10.3390/E22060705","ee":"https://doi.org/10.3390/e22060705","url":"https://dblp.org/rec/journals/entropy/GavalakisK20"}, "url":"URL#1560472" }, { "@score":"2", "@id":"1560707", "info":{"authors":{"author":[{"@pid":"04/7145","text":"Jan Kozak"},{"@pid":"117/6144","text":"Krzysztof Kania"},{"@pid":"00/8002","text":"Przemyslaw Juszczuk"}]},"title":"Permutation Entropy as a Measure of Information Gain/Loss in the Different Symbolic Descriptions of Financial Data.","venue":"Entropy","volume":"22","number":"3","pages":"330","year":"2020","type":"Journal Articles","access":"open","key":"journals/entropy/KozakKJ20","doi":"10.3390/E22030330","ee":"https://doi.org/10.3390/e22030330","url":"https://dblp.org/rec/journals/entropy/KozakKJ20"}, "url":"URL#1560707" }, { "@score":"2", "@id":"1560873", "info":{"authors":{"author":[{"@pid":"115/7231","text":"Chiara Marletto"},{"@pid":"48/4904","text":"Vlatko Vedral"},{"@pid":"260/5026","text":"Salvatore Virzì"},{"@pid":"260/5240","text":"Enrico Rebufello"},{"@pid":"245/5773","text":"Alessio Avella"},{"@pid":"260/5109","text":"Fabrizio Piacentini"},{"@pid":"06/8035","text":"Marco Gramegna"},{"@pid":"84/9644","text":"Ivo Pietro Degiovanni"},{"@pid":"81/8034","text":"Marco Genovese"}]},"title":"Non-Monogamy of Spatio-Temporal Correlations and the Black Hole Information Loss Paradox.","venue":"Entropy","volume":"22","number":"2","pages":"228","year":"2020","type":"Journal Articles","access":"open","key":"journals/entropy/MarlettoVVRAPGD20","doi":"10.3390/E22020228","ee":"https://doi.org/10.3390/e22020228","url":"https://dblp.org/rec/journals/entropy/MarlettoVVRAPGD20"}, "url":"URL#1560873" }, { "@score":"2", "@id":"1560929", "info":{"authors":{"author":[{"@pid":"224/3244","text":"Ayan Mitra"},{"@pid":"283/2383","text":"Pritam Chattopadhyay"},{"@pid":"67/1220","text":"Goutam Paul 0001"},{"@pid":"94/3674","text":"Vasilios Zarikas"}]},"title":"Binary Black Hole Information Loss Paradox and Future Prospects.","venue":"Entropy","volume":"22","number":"12","pages":"1387","year":"2020","type":"Journal Articles","access":"open","key":"journals/entropy/MitraCPZ20","doi":"10.3390/E22121387","ee":"https://doi.org/10.3390/e22121387","url":"https://dblp.org/rec/journals/entropy/MitraCPZ20"}, "url":"URL#1560929" }, { "@score":"2", "@id":"1580385", "info":{"authors":{"author":{"@pid":"121/2690","text":"Shian Wang"}},"title":"The image classification algorithm research using class information loss and joint structural similarity.","venue":"Int. J. Inf. Commun. Technol.","volume":"16","number":"3","pages":"203-213","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijict/Wang20","doi":"10.1504/IJICT.2020.106313","ee":"https://doi.org/10.1504/IJICT.2020.106313","url":"https://dblp.org/rec/journals/ijict/Wang20"}, "url":"URL#1580385" }, { "@score":"2", "@id":"1588330", "info":{"authors":{"author":[{"@pid":"67/4008","text":"Jing Xiao"},{"@pid":"69/5308","text":"Xiuli Wang"},{"@pid":"142/3143","text":"Hengjie Zhang"}]},"title":"Managing classification-based consensus in social network group decision making: An optimization-based approach with minimum information loss.","venue":"Inf. Fusion","volume":"63","pages":"74-87","year":"2020","type":"Journal Articles","access":"closed","key":"journals/inffus/XiaoWZ20a","doi":"10.1016/J.INFFUS.2020.05.008","ee":"https://doi.org/10.1016/j.inffus.2020.05.008","url":"https://dblp.org/rec/journals/inffus/XiaoWZ20a"}, "url":"URL#1588330" }, { "@score":"2", "@id":"1588740", "info":{"authors":{"author":[{"@pid":"14/5109","text":"Jerry D. Gibson"},{"@pid":"236/4069","text":"Hoontaek Oh"}]},"title":"Mutual Information Loss in Pyramidal Image Processing.","venue":"Inf.","volume":"11","number":"6","pages":"322","year":"2020","type":"Journal Articles","access":"open","key":"journals/information/GibsonO20","doi":"10.3390/INFO11060322","ee":"https://doi.org/10.3390/info11060322","url":"https://dblp.org/rec/journals/information/GibsonO20"}, "url":"URL#1588740" }, { "@score":"2", "@id":"1640024", "info":{"authors":{"author":[{"@pid":"48/3107","text":"Belgin Ergenç Bostanoglu"},{"@pid":"213/2364","text":"Ahmet Cumhur Öztürk"}]},"title":"Minimizing information loss in shared data: Hiding frequent patterns with multiple sensitive support thresholds.","venue":"Stat. Anal. Data Min.","volume":"13","number":"4","pages":"309-323","year":"2020","type":"Journal Articles","access":"closed","key":"journals/sadm/BostanogluO20","doi":"10.1002/SAM.11458","ee":"https://doi.org/10.1002/sam.11458","url":"https://dblp.org/rec/journals/sadm/BostanogluO20"}, "url":"URL#1640024" }, { "@score":"2", "@id":"1653923", "info":{"authors":{"author":[{"@pid":"81/8039","text":"S. Meysam Mousavi"},{"@pid":"216/2861","text":"Nazanin Foroozesh"},{"@pid":"10/3054","text":"Edmundas Kazimieras Zavadskas"},{"@pid":"46/4969","text":"Jurgita Antucheviciene"}]},"title":"A new soft computing approach for green supplier selection problem with interval type-2 trapezoidal fuzzy statistical group decision and avoidance of information loss.","venue":"Soft Comput.","volume":"24","number":"16","pages":"12313-12327","year":"2020","type":"Journal Articles","access":"closed","key":"journals/soco/MousaviFZA20","doi":"10.1007/S00500-020-04675-4","ee":"https://doi.org/10.1007/s00500-020-04675-4","url":"https://dblp.org/rec/journals/soco/MousaviFZA20"}, "url":"URL#1653923" }, { "@score":"2", "@id":"1654950", "info":{"authors":{"author":[{"@pid":"19/7453-2","text":"Yufeng Zhou 0002"},{"@pid":"72/1022","text":"Yufeng Li"},{"@pid":"43/3166","text":"Zhi Li"}]},"title":"A Grey Target Group Decision Method with Dual Hesitant Fuzzy Information considering Decision-Maker's Loss Aversion.","venue":"Sci. Program.","volume":"2020","pages":"8930387:1-8930387:10","year":"2020","type":"Journal Articles","access":"open","key":"journals/sp/ZhouLL20","doi":"10.1155/2020/8930387","ee":"https://doi.org/10.1155/2020/8930387","url":"https://dblp.org/rec/journals/sp/ZhouLL20"}, "url":"URL#1654950" }, { "@score":"2", "@id":"1655368", "info":{"authors":{"author":[{"@pid":"92/2834-3","text":"Lin Gao 0003"},{"@pid":"89/1512","text":"Giorgio Battistelli"},{"@pid":"68/5289","text":"Luigi Chisci"}]},"title":"Multiobject Fusion With Minimum Information Loss.","venue":"IEEE Signal Process. Lett.","volume":"27","pages":"201-205","year":"2020","type":"Journal Articles","access":"closed","key":"journals/spl/GaoBC20","doi":"10.1109/LSP.2019.2963817","ee":"https://doi.org/10.1109/LSP.2019.2963817","url":"https://dblp.org/rec/journals/spl/GaoBC20"}, "url":"URL#1655368" }, { "@score":"2", "@id":"1665586", "info":{"authors":{"author":{"@pid":"66/10823","text":"Robin Lamarche-Perrin"}},"title":"An information-theoretic framework for the lossy compression of link streams.","venue":"Theor. Comput. Sci.","volume":"806","pages":"90-115","year":"2020","type":"Journal Articles","access":"closed","key":"journals/tcs/Lamarche-Perrin20","doi":"10.1016/J.TCS.2018.12.009","ee":"https://doi.org/10.1016/j.tcs.2018.12.009","url":"https://dblp.org/rec/journals/tcs/Lamarche-Perrin20"}, "url":"URL#1665586" }, { "@score":"2", "@id":"1669013", "info":{"authors":{"author":[{"@pid":"95/10342","text":"Qunming Wang"},{"@pid":"s/WenzhongShi","text":"Wenzhong Shi"},{"@pid":"74/41","text":"Peter M. Atkinson"}]},"title":"Information Loss-Guided Multi-Resolution Image Fusion.","venue":"IEEE Trans. Geosci. Remote. Sens.","volume":"58","number":"1","pages":"45-57","year":"2020","type":"Journal Articles","access":"open","key":"journals/tgrs/WangSA20","doi":"10.1109/TGRS.2019.2930764","ee":"https://doi.org/10.1109/TGRS.2019.2930764","url":"https://dblp.org/rec/journals/tgrs/WangSA20"}, "url":"URL#1669013" }, { "@score":"2", "@id":"1676697", "info":{"authors":{"author":[{"@pid":"194/5523","text":"Brandon Foggo"},{"@pid":"156/4072","text":"Nanpeng Yu"},{"@pid":"38/5467-2","text":"Jie Shi 0002"},{"@pid":"208/9418","text":"Yuanqi Gao"}]},"title":"Information Losses in Neural Classifiers From Sampling.","venue":"IEEE Trans. Neural Networks Learn. Syst.","volume":"31","number":"10","pages":"4073-4083","year":"2020","type":"Journal Articles","access":"closed","key":"journals/tnn/FoggoYSG20","doi":"10.1109/TNNLS.2019.2952029","ee":"https://doi.org/10.1109/TNNLS.2019.2952029","url":"https://dblp.org/rec/journals/tnn/FoggoYSG20"}, "url":"URL#1676697" }, { "@score":"2", "@id":"1679837", "info":{"authors":{"author":[{"@pid":"194/5523","text":"Brandon Foggo"},{"@pid":"156/4072","text":"Nanpeng Yu"}]},"title":"Improving Supervised Phase Identification Through the Theory of Information Losses.","venue":"IEEE Trans. Smart Grid","volume":"11","number":"3","pages":"2337-2346","year":"2020","type":"Journal Articles","access":"closed","key":"journals/tsg/FoggoY20","doi":"10.1109/TSG.2019.2952080","ee":"https://doi.org/10.1109/TSG.2019.2952080","url":"https://dblp.org/rec/journals/tsg/FoggoY20"}, "url":"URL#1679837" }, { "@score":"2", "@id":"1680886", "info":{"authors":{"author":[{"@pid":"92/2834-3","text":"Lin Gao 0003"},{"@pid":"89/1512","text":"Giorgio Battistelli"},{"@pid":"68/5289","text":"Luigi Chisci"}]},"title":"Fusion of Labeled RFS Densities With Minimum Information Loss.","venue":"IEEE Trans. Signal Process.","volume":"68","pages":"5855-5868","year":"2020","type":"Journal Articles","access":"closed","key":"journals/tsp/GaoBC20","doi":"10.1109/TSP.2020.3028496","ee":"https://doi.org/10.1109/TSP.2020.3028496","url":"https://dblp.org/rec/journals/tsp/GaoBC20"}, "url":"URL#1680886" }, { "@score":"2", "@id":"1700125", "info":{"authors":{"author":[{"@pid":"25/4181","text":"Olga V. Patterson"},{"@pid":"24/6461","text":"Samir Gupta"},{"@pid":"148/4146","text":"Andrew Gawron"},{"@pid":"289/4772","text":"Tonya Kaltenbach"},{"@pid":"289/4625","text":"Ranier Bustamante"},{"@pid":"61/2115","text":"Lin Liu"},{"@pid":"200/4590","text":"Daniel W. Denhalter"},{"@pid":"289/4661","text":"Ashley Earles"},{"@pid":"11/4887","text":"Scott L. DuVall"}]},"title":"Linking Polyps to Jars: information loss across colonoscopy and pathology reports.","venue":"AMIA","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/amia/PattersonGGKBLD20","ee":"https://knowledge.amia.org/72332-amia-1.4602255/t005-1.4604904/t005-1.4604905/3410814-1.4605272/3414573-1.4605269","url":"https://dblp.org/rec/conf/amia/PattersonGGKBLD20"}, "url":"URL#1700125" }, { "@score":"2", "@id":"1708360", "info":{"authors":{"author":[{"@pid":"188/4247","text":"Seyed Mehdi Iranmanesh"},{"@pid":"213/7369","text":"Ali Dabouei"},{"@pid":"45/4884","text":"Nasser M. Nasrabadi"}]},"title":"Attribute Adaptive Margin Softmax Loss using Privileged Information.","venue":"BMVC","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/bmvc/IranmaneshDN20","ee":"https://www.bmvc2020-conference.com/assets/papers/0561.pdf","url":"https://dblp.org/rec/conf/bmvc/IranmaneshDN20"}, "url":"URL#1708360" }, { "@score":"2", "@id":"1708416", "info":{"authors":{"author":[{"@pid":"236/4857","text":"Sanghyeon Na"},{"@pid":"218/5252","text":"Seungjoo Yoo"},{"@pid":"07/2074","text":"Jaegul Choo"}]},"title":"Multimodal Image Translation with Stochastic Style Representations and Mutual Information Loss.","venue":"BMVC","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/bmvc/NaYC20","ee":"https://www.bmvc2020-conference.com/assets/papers/0115.pdf","url":"https://dblp.org/rec/conf/bmvc/NaYC20"}, "url":"URL#1708416" }, { "@score":"2", "@id":"1716514", "info":{"authors":{"author":[{"@pid":"274/8778","text":"Yanhui Pan"},{"@pid":"169/8356","text":"Xiaohong Guo"},{"@pid":"274/8677","text":"Haichen Lin"},{"@pid":"274/8700","text":"Shengjun Luo"}]},"title":"Lossless Compression Method for Rocket Telemetry Data based on Reorganizing Frame Information.","venue":"CIPAE","pages":"130-133","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/cipae/PanGLL20","doi":"10.1145/3419635.3419671","ee":"https://doi.org/10.1145/3419635.3419671","url":"https://dblp.org/rec/conf/cipae/PanGLL20"}, "url":"URL#1716514" }, { "@score":"2", "@id":"1725429", "info":{"authors":{"author":[{"@pid":"247/6386","text":"Mete Kemertas"},{"@pid":"70/8027","text":"Leila Pishdad"},{"@pid":"39/253","text":"Konstantinos G. Derpanis"},{"@pid":"84/1969","text":"Afsaneh Fazly"}]},"title":"RankMI: A Mutual Information Maximizing Ranking Loss.","venue":"CVPR","pages":"14350-14359","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/cvpr/KemertasPDF20","doi":"10.1109/CVPR42600.2020.01437","ee":"https://openaccess.thecvf.com/content_CVPR_2020/html/Kemertas_RankMI_A_Mutual_Information_Maximizing_Ranking_Loss_CVPR_2020_paper.html","url":"https://dblp.org/rec/conf/cvpr/KemertasPDF20"}, "url":"URL#1725429" }, { "@score":"2", "@id":"1732280", "info":{"authors":{"author":[{"@pid":"261/3747","text":"Malik Boudiaf"},{"@pid":"220/5733","text":"Jérôme Rony"},{"@pid":"146/3631","text":"Imtiaz Masud Ziko"},{"@pid":"86/2306","text":"Eric Granger"},{"@pid":"81/4503","text":"Marco Pedersoli"},{"@pid":"44/1416","text":"Pablo Piantanida"},{"@pid":"68/4478","text":"Ismail Ben Ayed"}]},"title":"A Unifying Mutual Information View of Metric Learning: Cross-Entropy vs. Pairwise Losses.","venue":"ECCV","pages":"548-564","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/eccv/BoudiafRZGPPA20","doi":"10.1007/978-3-030-58539-6_33","ee":"https://doi.org/10.1007/978-3-030-58539-6_33","url":"https://dblp.org/rec/conf/eccv/BoudiafRZGPPA20"}, "url":"URL#1732280" }, { "@score":"2", "@id":"1752926", "info":{"authors":{"author":[{"@pid":"265/5190","text":"Michael D. Sankur"},{"@pid":"145/6584","text":"Maxime Baudette"},{"@pid":"137/8568","text":"Jason S. MacDonald"},{"@pid":"208/9409","text":"Daniel B. Arnold"}]},"title":"Batch Measurement Extremum Seeking Control of Distributed Energy Resources to Account for Communication Delays and Information Loss.","venue":"HICSS","pages":"1-10","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/hicss/SankurBMA20","ee":"https://hdl.handle.net/10125/64114","url":"https://dblp.org/rec/conf/hicss/SankurBMA20"}, "url":"URL#1752926" }, { "@score":"2", "@id":"1756803", "info":{"authors":{"author":[{"@pid":"60/10216","text":"Hanwei Wu"},{"@pid":"96/8132","text":"Ather Gattami"},{"@pid":"f/MarkusFlierl","text":"Markus Flierl"}]},"title":"Conditional mutual information-based contrastive loss for financial time series forecasting.","venue":"ICAIF","pages":"9:1-9:7","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaif/WuGF20","doi":"10.1145/3383455.3422550","ee":"https://doi.org/10.1145/3383455.3422550","url":"https://dblp.org/rec/conf/icaif/WuGF20"}, "url":"URL#1756803" }, { "@score":"2", "@id":"1769654", "info":{"authors":{"author":[{"@pid":"77/6612","text":"Chin-Feng Lee"},{"@pid":"13/6551","text":"Jau-Ji Shen"},{"@pid":"271/1228","text":"Zih-Cyuan Chao"},{"@pid":"242/5583","text":"Somya Agrawal"}]},"title":"An Improved Lossless Information Hiding in SMVQ Compressed Images.","venue":"ICFET","pages":"119-124","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfet/LeeSCA20","doi":"10.1145/3404709.3404764","ee":"https://doi.org/10.1145/3404709.3404764","url":"https://dblp.org/rec/conf/icfet/LeeSCA20"}, "url":"URL#1769654" }, { "@score":"2", "@id":"1772970", "info":{"authors":{"author":[{"@pid":"293/1962","text":"Xiangqi Xiao"},{"@pid":"56/2875","text":"Rui Huang"},{"@pid":"287/9939","text":"Maotao Yang"},{"@pid":"05/3933","text":"Liang Yang"},{"@pid":"293/1446","text":"Yanjiao Huang"},{"@pid":"293/1437","text":"Wencheng Xiao"}]},"title":"Research on High Loss Area Governance Method Based on Monitoring and Information Dynamic Adaptive Processing Technology.","venue":"ICITEE","pages":"39-42","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/icitee/XiaoHYYHX20","doi":"10.1145/3452940.3453502","ee":"https://doi.org/10.1145/3452940.3453502","url":"https://dblp.org/rec/conf/icitee/XiaoHYYHX20"}, "url":"URL#1772970" }, { "@score":"2", "@id":"1795427", "info":{"authors":{"author":[{"@pid":"178/5284","text":"Marshall Ball"},{"@pid":"12/9528","text":"Elette Boyle"},{"@pid":"139/0602","text":"Akshay Degwekar"},{"@pid":"178/5250","text":"Apoorvaa Deshpande"},{"@pid":"r/AlonRosen","text":"Alon Rosen"},{"@pid":"v/VinodVaikuntanathan","text":"Vinod Vaikuntanathan"},{"@pid":"161/6306","text":"Prashant Nalini Vasudevan"}]},"title":"Cryptography from Information Loss.","venue":"ITCS","pages":"81:1-81:27","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/innovations/BallBDDRVV20","doi":"10.4230/LIPICS.ITCS.2020.81","ee":"https://doi.org/10.4230/LIPIcs.ITCS.2020.81","url":"https://dblp.org/rec/conf/innovations/BallBDDRVV20"}, "url":"URL#1795427" }, { "@score":"3", "@id":"1803227", "info":{"authors":{"author":[{"@pid":"20/5385","text":"Masahiro Hashimoto"},{"@pid":"257/6227","text":"Ryo Morishima"},{"@pid":"43/2020","text":"Hiroaki Nishi"}]},"title":"Low-Information-Loss Anonymization of Trajectory Data Considering Map Information.","venue":"ISIE","pages":"499-504","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/isie/HashimotoMN20","doi":"10.1109/ISIE45063.2020.9152438","ee":"https://doi.org/10.1109/ISIE45063.2020.9152438","url":"https://dblp.org/rec/conf/isie/HashimotoMN20"}, "url":"URL#1803227" }, { "@score":"2", "@id":"1803552", "info":{"authors":{"author":[{"@pid":"255/4776","text":"Lampros Gavalakis"},{"@pid":"74/5935","text":"Ioannis Kontoyiannis"}]},"title":"Lossless Data Compression with Side Information: Nonasymptotics and Dispersion.","venue":"ISIT","pages":"2179-2183","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/GavalakisK20","doi":"10.1109/ISIT44484.2020.9174326","ee":"https://doi.org/10.1109/ISIT44484.2020.9174326","url":"https://dblp.org/rec/conf/isit/GavalakisK20"}, "url":"URL#1803552" }, { "@score":"2", "@id":"1810615", "info":{"authors":{"author":[{"@pid":"03/10742","text":"Tianwen Chen"},{"@pid":"w/RaymondChiWingWong","text":"Raymond Chi-Wing Wong"}]},"title":"Handling Information Loss of Graph Neural Networks for Session-based Recommendation.","venue":"KDD","pages":"1172-1180","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ChenW20","doi":"10.1145/3394486.3403170","ee":"https://doi.org/10.1145/3394486.3403170","url":"https://dblp.org/rec/conf/kdd/ChenW20"}, "url":"URL#1810615" }, { "@score":"2", "@id":"1813875", "info":{"authors":{"author":[{"@pid":"266/1027","text":"Mustafa Ocal"},{"@pid":"27/8885","text":"Mark A. Finlayson"}]},"title":"Evaluating Information Loss in Temporal Dependency Trees.","venue":"LREC","pages":"2148-2156","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/lrec/OcalF20","ee":"https://aclanthology.org/2020.lrec-1.263/","url":"https://dblp.org/rec/conf/lrec/OcalF20"}, "url":"URL#1813875" }, { "@score":"2", "@id":"1819914", "info":{"authors":{"author":[{"@pid":"19/8783","text":"Yunan Liu"},{"@pid":"63/5422","text":"Liang Zhao"},{"@pid":"34/3535","text":"Shanshan Zhang"},{"@pid":"y/JianYang3","text":"Jian Yang 0003"}]},"title":"Hybrid Resolution Network Using Edge Guided Region Mutual Information Loss for Human Parsing.","venue":"ACM Multimedia","pages":"1670-1678","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/mm/LiuZZY20","doi":"10.1145/3394171.3413831","ee":"https://doi.org/10.1145/3394171.3413831","url":"https://dblp.org/rec/conf/mm/LiuZZY20"}, "url":"URL#1819914" }, { "@score":"2", "@id":"1823326", "info":{"authors":{"author":[{"@pid":"282/0956","text":"Diana S. Dmitrieva"},{"@pid":"282/0693","text":"Valeria M. Pilipova"},{"@pid":"206/6764","text":"Roman V. Davydov"},{"@pid":"282/1399","text":"Elena I. Andreeva"},{"@pid":"149/2936","text":"Vadim V. Davydov"},{"@pid":"227/1043","text":"Vasiliy Yu. Rud"}]},"title":"Fiber-Optical Communication Line with a System for Compensation of Radiation-Induced Losses During the Transmission of Information.","venue":"NEW2AN/ruSMART","pages":"348-356","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/new2an/DmitrievaPDADR20","doi":"10.1007/978-3-030-65729-1_30","ee":"https://doi.org/10.1007/978-3-030-65729-1_30","url":"https://dblp.org/rec/conf/new2an/DmitrievaPDADR20"}, "url":"URL#1823326" }, { "@score":"4", "@id":"1862343", "info":{"authors":{"author":[{"@pid":"81/11205","text":"Juan Antonio Lossio-Ventura"},{"@pid":"48/6304","text":"Nelly Condori-Fernández"},{"@pid":"119/6669","text":"Jorge Carlos Valverde-Rebaza"}]},"title":"Information Management and Big Data - 6th International Conference, SIMBig 2019, Lima, Peru, August 21-23, 2019, Proceedings","venue":["SIMBig","Communications in Computer and Information Science"],"volume":"1070","publisher":"Springer","year":"2020","type":"Editorship","key":"conf/simbig/2019","doi":"10.1007/978-3-030-46140-9","ee":"https://doi.org/10.1007/978-3-030-46140-9","url":"https://dblp.org/rec/conf/simbig/2019"}, "url":"URL#1862343" }, { "@score":"2", "@id":"1868241", "info":{"authors":{"author":[{"@pid":"119/4786","text":"Josu Doncel"},{"@pid":"18/338","text":"Mohamad Assaad"}]},"title":"Age of Information in a Decentralized Network of Parallel Queues with Routing and Packets Losses.","venue":"CoRR","volume":"abs/2002.01696","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2002-01696","ee":"https://arxiv.org/abs/2002.01696","url":"https://dblp.org/rec/journals/corr/abs-2002-01696"}, "url":"URL#1868241" }, { "@score":"2", "@id":"1870662", "info":{"authors":{"author":[{"@pid":"60/10216","text":"Hanwei Wu"},{"@pid":"96/8132","text":"Ather Gattami"},{"@pid":"f/MarkusFlierl","text":"Markus Flierl"}]},"title":"Conditional Mutual information-based Contrastive Loss for Financial Time Series Forecasting.","venue":"CoRR","volume":"abs/2002.07638","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2002-07638","ee":"https://arxiv.org/abs/2002.07638","url":"https://dblp.org/rec/journals/corr/abs-2002-07638"}, "url":"URL#1870662" }, { "@score":"2", "@id":"1888546", "info":{"authors":{"author":[{"@pid":"255/4776","text":"Lampros Gavalakis"},{"@pid":"74/5935","text":"Ioannis Kontoyiannis"}]},"title":"Sharp Second-Order Pointwise Asymptotics for Lossless Compression with Side Information.","venue":"CoRR","volume":"abs/2005.10823","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2005-10823","ee":"https://arxiv.org/abs/2005.10823","url":"https://dblp.org/rec/journals/corr/abs-2005-10823"}, "url":"URL#1888546" }, { "@score":"2", "@id":"1889900", "info":{"authors":{"author":[{"@pid":"173/7859","text":"Lars Fritsche"},{"@pid":"221/1936","text":"Jens Kosiol"},{"@pid":"s/AndySchurr","text":"Andy Schürr"},{"@pid":"t/GabrieleTaentzer","text":"Gabriele Taentzer"}]},"title":"Avoiding Unnecessary Information Loss: Correct and Efficient Model Synchronization Based on Triple Graph Grammars.","venue":"CoRR","volume":"abs/2005.14510","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2005-14510","ee":"https://arxiv.org/abs/2005.14510","url":"https://dblp.org/rec/journals/corr/abs-2005-14510"}, "url":"URL#1889900" }, { "@score":"2", "@id":"1895011", "info":{"authors":{"author":[{"@pid":"264/9695","text":"Yaolong Wang"},{"@pid":"19/2900-2","text":"Mingqing Xiao 0002"},{"@pid":"52/5716-30","text":"Chang Liu 0030"},{"@pid":"186/8255","text":"Shuxin Zheng"},{"@pid":"l/TieYanLiu","text":"Tie-Yan Liu"}]},"title":"Modeling Lost Information in Lossy Image Compression.","venue":"CoRR","volume":"abs/2006.11999","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2006-11999","ee":"https://arxiv.org/abs/2006.11999","url":"https://dblp.org/rec/journals/corr/abs-2006-11999"}, "url":"URL#1895011" }, { "@score":"2", "@id":"1904041", "info":{"authors":{"author":[{"@pid":"49/1208","text":"Elio D. Di Claudio"},{"@pid":"271/8220","text":"Paolo Giannitrapani"},{"@pid":"81/3095","text":"Giovanni Jacovitti"}]},"title":"Predicting the Blur Visual Discomfort for Natural Scenes by the Loss of Positional Information.","venue":"CoRR","volume":"abs/2008.01429","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2008-01429","ee":"https://arxiv.org/abs/2008.01429","url":"https://dblp.org/rec/journals/corr/abs-2008-01429"}, "url":"URL#1904041" }, { "@score":"2", "@id":"1904683", "info":{"authors":{"author":[{"@pid":"247/1101","text":"Philip Sperl"},{"@pid":"122/3548","text":"Konstantin Böttinger"}]},"title":"Optimizing Information Loss Towards Robust Neural Networks.","venue":"CoRR","volume":"abs/2008.03072","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2008-03072","ee":"https://arxiv.org/abs/2008.03072","url":"https://dblp.org/rec/journals/corr/abs-2008-03072"}, "url":"URL#1904683" }, { "@score":"2", "@id":"1909565", "info":{"authors":{"author":[{"@pid":"188/4247","text":"Seyed Mehdi Iranmanesh"},{"@pid":"213/7369","text":"Ali Dabouei"},{"@pid":"45/4884","text":"Nasser M. Nasrabadi"}]},"title":"Attribute Adaptive Margin Softmax Loss using Privileged Information.","venue":"CoRR","volume":"abs/2009.01972","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2009-01972","ee":"https://arxiv.org/abs/2009.01972","url":"https://dblp.org/rec/journals/corr/abs-2009-01972"}, "url":"URL#1909565" }, { "@score":"2", "@id":"1912690", "info":{"authors":{"author":[{"@pid":"252/3294","text":"Xinyu Zuo"},{"@pid":"90/7879","text":"Yubo Chen 0001"},{"@pid":"42/4903","text":"Kang Liu 0001"},{"@pid":"47/2026-1","text":"Jun Zhao 0001"}]},"title":"Event Coreference Resolution via a Multi-loss Neural Network without Using Argument Information.","venue":"CoRR","volume":"abs/2009.10290","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2009-10290","ee":"https://arxiv.org/abs/2009.10290","url":"https://dblp.org/rec/journals/corr/abs-2009-10290"}, "url":"URL#1912690" }, { "@score":"2", "@id":"1919551", "info":{"authors":{"author":[{"@pid":"167/6308","text":"Fredrik Hellström"},{"@pid":"12/3405","text":"Giuseppe Durisi"}]},"title":"Nonvacuous Loss Bounds with Fast Rates for Neural Networks via Conditional Information Measures.","venue":"CoRR","volume":"abs/2010.11552","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2010-11552","ee":"https://arxiv.org/abs/2010.11552","url":"https://dblp.org/rec/journals/corr/abs-2010-11552"}, "url":"URL#1919551" }, { "@score":"2", "@id":"1929672", "info":{"authors":{"author":[{"@pid":"158/2705","text":"Chung-Wei Weng"},{"@pid":"155/0034","text":"Yauhen Yakimenka"},{"@pid":"134/9785","text":"Hsuan-Yin Lin"},{"@pid":"96/6263","text":"Eirik Rosnes"},{"@pid":"39/4721","text":"Jörg Kliewer"}]},"title":"Generative Adversarial User Privacy in Lossy Single-Server Information Retrieval.","venue":"CoRR","volume":"abs/2012.03902","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2012-03902","ee":"https://arxiv.org/abs/2012.03902","url":"https://dblp.org/rec/journals/corr/abs-2012-03902"}, "url":"URL#1929672" }, { "@score":"2", "@id":"1934259", "info":{"authors":{"author":[{"@pid":"178/5284","text":"Marshall Ball"},{"@pid":"12/9528","text":"Elette Boyle"},{"@pid":"139/0602","text":"Akshay Degwekar"},{"@pid":"178/5250","text":"Apoorvaa Deshpande"},{"@pid":"r/AlonRosen","text":"Alon Rosen"},{"@pid":"v/VinodVaikuntanathan","text":"Vinod Vaikuntanathan"},{"@pid":"161/6306","text":"Prashant Nalini Vasudevan"}]},"title":"Cryptography from Information Loss.","venue":"Electron. Colloquium Comput. Complex.","volume":"TR20","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/eccc/BallBDDRVV20","ee":"https://eccc.weizmann.ac.il/report/2020/044","url":"https://dblp.org/rec/journals/eccc/BallBDDRVV20"}, "url":"URL#1934259" }, { "@score":"2", "@id":"1934775", "info":{"authors":{"author":[{"@pid":"178/5284","text":"Marshall Ball"},{"@pid":"12/9528","text":"Elette Boyle"},{"@pid":"139/0602","text":"Akshay Degwekar"},{"@pid":"178/5250","text":"Apoorvaa Deshpande"},{"@pid":"r/AlonRosen","text":"Alon Rosen"},{"@pid":"v/VinodVaikuntanathan","text":"Vinod Vaikuntanathan"},{"@pid":"161/6306","text":"Prashant Nalini Vasudevan"}]},"title":"Cryptography from Information Loss.","venue":"IACR Cryptol. ePrint Arch.","volume":"2020","pages":"395","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/iacr/BallBDDRVV20","ee":"https://eprint.iacr.org/2020/395","url":"https://dblp.org/rec/journals/iacr/BallBDDRVV20"}, "url":"URL#1934775" }, { "@score":"3", "@id":"1942082", "info":{"authors":{"author":{"@pid":"158/1686","text":"Yigit Ugur"}},"title":"An Information-Theoretic Approach to Distributed Learning. Distributed Source Coding Under Logarithmic Loss. (Approche théorie de l'information à l'apprentissage statistique. Codage distribué de sources sous mesure de fidélité logarithmique).","year":"2019","type":"Books and Theses","access":"open","key":"phd/hal/Ugur19","ee":"https://tel.archives-ouvertes.fr/tel-02489734","url":"https://dblp.org/rec/phd/hal/Ugur19"}, "url":"URL#1942082" }, { "@score":"2", "@id":"1948410", "info":{"authors":{"author":[{"@pid":"77/7757","text":"Nantian Huang"},{"@pid":"244/0716","text":"Yinyin Wu"},{"@pid":"35/8083","text":"Guowei Cai"},{"@pid":"195/5414","text":"Heyan Zhu"},{"@pid":"94/6965","text":"Changyong Yu"},{"@pid":"45/4954","text":"Li Jiang"},{"@pid":"147/0497","text":"Ye Zhang"},{"@pid":"244/1108","text":"Jiansen Zhang"},{"@pid":"244/0979","text":"Enkai Xing"}]},"title":"Short-Term Wind Speed Forecast With Low Loss of Information Based on Feature Generation of OSVD.","venue":"IEEE Access","volume":"7","pages":"81027-81046","year":"2019","type":"Journal Articles","access":"open","key":"journals/access/HuangWCZYJZZX19","doi":"10.1109/ACCESS.2019.2922662","ee":"https://doi.org/10.1109/ACCESS.2019.2922662","url":"https://dblp.org/rec/journals/access/HuangWCZYJZZX19"}, "url":"URL#1948410" }, { "@score":"2", "@id":"1976358", "info":{"authors":{"author":[{"@pid":"252/3294","text":"Xinyu Zuo"},{"@pid":"90/7879","text":"Yubo Chen 0001"},{"@pid":"42/4903","text":"Kang Liu 0001"},{"@pid":"47/2026-1","text":"Jun Zhao 0001"}]},"title":"Event co-reference resolution via a multi-loss neural network without using argument information.","venue":"Sci. China Inf. Sci.","volume":"62","number":"11","pages":"212101:1-212101:9","year":"2019","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZuoCLZ19","doi":"10.1007/S11432-018-9833-1","ee":"https://doi.org/10.1007/s11432-018-9833-1","url":"https://dblp.org/rec/journals/chinaf/ZuoCLZ19"}, "url":"URL#1976358" }, { "@score":"2", "@id":"1992402", "info":{"authors":{"author":[{"@pid":"58/9837","text":"Stefano Liberati"},{"@pid":"253/6812","text":"Giovanni Tricella"},{"@pid":"239/3205","text":"Andrea Trombettoni"}]},"title":"The Information Loss Problem: An Analogue Gravity Perspective.","venue":"Entropy","volume":"21","number":"10","pages":"940","year":"2019","type":"Journal Articles","access":"open","key":"journals/entropy/LiberatiTT19","doi":"10.3390/E21100940","ee":"https://doi.org/10.3390/e21100940","url":"https://dblp.org/rec/journals/entropy/LiberatiTT19"}, "url":"URL#1992402" }, { "@score":"2", "@id":"1992485", "info":{"authors":{"author":[{"@pid":"235/9460","text":"C. T. Martínez-Martínez"},{"@pid":"96/6171","text":"J. A. Méndez-Bermúdez"}]},"title":"Information Entropy of Tight-Binding Random Networks with Losses and Gain: Scaling and Universality.","venue":"Entropy","volume":"21","number":"1","pages":"86","year":"2019","type":"Journal Articles","access":"open","key":"journals/entropy/Martinez-Martinez19","doi":"10.3390/E21010086","ee":"https://doi.org/10.3390/e21010086","url":"https://dblp.org/rec/journals/entropy/Martinez-Martinez19"}, "url":"URL#1992485" }, { "@score":"2", "@id":"1992786", "info":{"authors":{"author":[{"@pid":"234/4890","text":"Dariusz Swietlik"},{"@pid":"03/4059","text":"Jacek Bialowas"},{"@pid":"242/5266","text":"Janusz Morys"},{"@pid":"242/5839","text":"Aida Kusiak"}]},"title":"Computer Model of Synapse Loss During an Alzheimer's Disease-Like Pathology in Hippocampal Subregions DG, CA3 and CA1 - The Way to Chaos and Information Transfer.","venue":"Entropy","volume":"21","number":"4","pages":"408","year":"2019","type":"Journal Articles","access":"open","key":"journals/entropy/SwietlikBMK19","doi":"10.3390/E21040408","ee":"https://doi.org/10.3390/e21040408","url":"https://dblp.org/rec/journals/entropy/SwietlikBMK19"}, "url":"URL#1992786" }, { "@score":"2", "@id":"1992790", "info":{"authors":{"author":[{"@pid":"82/5652","text":"Ioan Tabus"},{"@pid":"202/7143","text":"Emre Can Kaya"}]},"title":"Information Theoretic Modeling of High Precision Disparity Data for Lossy Compression and Object Segmentation.","venue":"Entropy","volume":"21","number":"11","pages":"1113","year":"2019","type":"Journal Articles","access":"open","key":"journals/entropy/TabusandK19","doi":"10.3390/E21111113","ee":"https://doi.org/10.3390/e21111113","url":"https://dblp.org/rec/journals/entropy/TabusandK19"}, "url":"URL#1992790" }, { "@score":"2", "@id":"1993874", "info":{"authors":{"author":[{"@pid":"195/8933","text":"Zhi Song"},{"@pid":"98/1512-2","text":"Amitava Mukherjee 0002"},{"@pid":"50/7845","text":"Yanchun Liu"},{"@pid":"51/7817","text":"Jiujun Zhang"}]},"title":"Optimizing joint location-scale monitoring - An adaptive distribution-free approach with minimal loss of information.","venue":"Eur. J. Oper. Res.","volume":"274","number":"3","pages":"1019-1036","year":"2019","type":"Journal Articles","access":"closed","key":"journals/eor/SongMLZ19","doi":"10.1016/J.EJOR.2018.11.060","ee":"https://doi.org/10.1016/j.ejor.2018.11.060","url":"https://dblp.org/rec/journals/eor/SongMLZ19"}, "url":"URL#1993874" }, { "@score":"2", "@id":"2021428", "info":{"authors":{"author":[{"@pid":"85/3128","text":"Xiujuan Lei"},{"@pid":"09/5661-3","text":"Yuchen Zhang 0003"}]},"title":"Predicting disease-genes based on network information loss and protein complexes in heterogeneous network.","venue":"Inf. Sci.","volume":"479","pages":"386-400","year":"2019","type":"Journal Articles","access":"closed","key":"journals/isci/LeiZ19","doi":"10.1016/J.INS.2018.12.008","ee":"https://doi.org/10.1016/j.ins.2018.12.008","url":"https://dblp.org/rec/journals/isci/LeiZ19"}, "url":"URL#2021428" }, { "@score":"2", "@id":"2022507", "info":{"authors":{"author":[{"@pid":"55/6445","text":"Wen Zeng"},{"@pid":"k/MaciejKoutny","text":"Maciej Koutny"}]},"title":"Modelling and analysis of corporate efficiency and productivity loss associated with enterprise information security technologies.","venue":"J. Inf. Secur. Appl.","volume":"49","year":"2019","type":"Journal Articles","access":"closed","key":"journals/istr/ZengK19","doi":"10.1016/J.JISA.2019.102385","ee":"https://doi.org/10.1016/j.jisa.2019.102385","url":"https://dblp.org/rec/journals/istr/ZengK19"}, "url":"URL#2022507" }, { "@score":"2", "@id":"2022827", "info":{"authors":{"author":[{"@pid":"57/2703","text":"Longzhe Han"},{"@pid":"147/0983","text":"Taras Maksymyuk"},{"@pid":"51/7802","text":"Xuecai Bao"},{"@pid":"34/3125-1","text":"Jia Zhao 0001"},{"@pid":"150/4295","text":"Yan Liu"}]},"title":"Deep Learning based Loss Recovery Mechanism for Video Streaming over Mobile Information-Centric Network.","venue":"KSII Trans. Internet Inf. Syst.","volume":"13","number":"9","pages":"4572-4586","year":"2019","type":"Journal Articles","access":"open","key":"journals/itiis/HanMBZL19","doi":"10.3837/TIIS.2019.09.014","ee":"https://doi.org/10.3837/tiis.2019.09.014","url":"https://dblp.org/rec/journals/itiis/HanMBZL19"}, "url":"URL#2022827" }, { "@score":"2", "@id":"2027756", "info":{"authors":{"author":[{"@pid":"281/8726","text":"Zixuan Victoria Zhao"},{"@pid":"282/0289","text":"Christian E. López"},{"@pid":"136/7916","text":"Conrad S. Tucker"}]},"title":"Evaluating the Impact of Idea Dissemination Methods on Information Loss.","venue":"J. Comput. Inf. Sci. Eng.","volume":"19","number":"3","year":"2019","type":"Journal Articles","access":"closed","key":"journals/jcise/ZhaoLT19","doi":"10.1115/1.4042553","ee":"https://doi.org/10.1115/1.4042553","url":"https://dblp.org/rec/journals/jcise/ZhaoLT19"}, "url":"URL#2027756" }, { "@score":"2", "@id":"2032566", "info":{"authors":{"author":[{"@pid":"244/9698","text":"R. Mahesh 0003"},{"@pid":"25/8575","text":"T. Meyyappan"}]},"title":"Fuzzy based cell generalization to improve the data utility with minimal loss of information.","venue":"J. Intell. Fuzzy Syst.","volume":"37","number":"1","pages":"217-225","year":"2019","type":"Journal Articles","access":"closed","key":"journals/jifs/MaheshM19","doi":"10.3233/JIFS-179079","ee":"https://doi.org/10.3233/JIFS-179079","url":"https://dblp.org/rec/journals/jifs/MaheshM19"}, "url":"URL#2032566" }, { "@score":"2", "@id":"2045736", "info":{"authors":{"author":[{"@pid":"32/4553","text":"Simon Graham"},{"@pid":"86/475-11","text":"Hao Chen 0011"},{"@pid":"226/3979","text":"Jevgenij Gamper"},{"@pid":"165/7846","text":"Qi Dou 0001"},{"@pid":"52/2889","text":"Pheng-Ann Heng"},{"@pid":"165/8109","text":"David R. J. Snead"},{"@pid":"174/3244","text":"Yee-Wah Tsang"},{"@pid":"r/NasirRajpoot","text":"Nasir M. Rajpoot"}]},"title":"MILD-Net: Minimal information loss dilated network for gland instance segmentation in colon histology images.","venue":"Medical Image Anal.","volume":"52","pages":"199-211","year":"2019","type":"Journal Articles","access":"closed","key":"journals/mia/GrahamCGDHSTR19","doi":"10.1016/J.MEDIA.2018.12.001","ee":"https://doi.org/10.1016/j.media.2018.12.001","url":"https://dblp.org/rec/journals/mia/GrahamCGDHSTR19"}, "url":"URL#2045736" }, { "@score":"2", "@id":"2047268", "info":{"authors":{"author":[{"@pid":"119/5967","text":"Qing Rao"},{"@pid":"c/SamarjitChakraborty","text":"Samarjit Chakraborty"}]},"title":"Efficient lossless compression for depth information in traffic scenarios.","venue":"Multim. Syst.","volume":"25","number":"4","pages":"293-306","year":"2019","type":"Journal Articles","access":"closed","key":"journals/mms/RaoC19","doi":"10.1007/S00530-019-00605-Z","ee":"https://doi.org/10.1007/s00530-019-00605-z","url":"https://dblp.org/rec/journals/mms/RaoC19"}, "url":"URL#2047268" }, { "@score":"2", "@id":"2074972", "info":{"authors":{"author":[{"@pid":"143/1777","text":"Pushpendu Kar"},{"@pid":"36/1023","text":"Sudip Misra"},{"@pid":"91/2882","text":"Mohammad S. Obaidat"}]},"title":"RILoD: Reduction of Information Loss in a WSN System in the Presence of Dumb Nodes.","venue":"IEEE Syst. J.","volume":"13","number":"1","pages":"336-344","year":"2019","type":"Journal Articles","access":"closed","key":"journals/sj/KarMO19","doi":"10.1109/JSYST.2017.2780264","ee":"https://doi.org/10.1109/JSYST.2017.2780264","url":"https://dblp.org/rec/journals/sj/KarMO19"}, "url":"URL#2074972" }, { "@score":"2", "@id":"2082079", "info":{"authors":{"author":[{"@pid":"198/9661","text":"Mohsen Zareian Jahromi"},{"@pid":"117/5754","text":"Adel Zahedi"},{"@pid":"94/356","text":"Jesper Jensen 0001"},{"@pid":"48/2543","text":"Jan Østergaard"}]},"title":"Information Loss in the Human Auditory System.","venue":"IEEE ACM Trans. Audio Speech Lang. Process.","volume":"27","number":"3","pages":"472-481","year":"2019","type":"Journal Articles","access":"closed","key":"journals/taslp/JahromiZJO19","doi":"10.1109/TASLP.2018.2882913","ee":"https://doi.org/10.1109/TASLP.2018.2882913","url":"https://dblp.org/rec/journals/taslp/JahromiZJO19"}, "url":"URL#2082079" }, { "@score":"2", "@id":"2109355", "info":{"authors":{"author":[{"@pid":"167/3784","text":"Étienne Simon"},{"@pid":"61/1640","text":"Vincent Guigue"},{"@pid":"15/2146","text":"Benjamin Piwowarski"}]},"title":"Unsupervised Information Extraction: Regularizing Discriminative Approaches with Relation Distribution Losses.","venue":"ACL","pages":"1378-1387","year":"2019","type":"Conference and Workshop Papers","access":"open","key":"conf/acl/SimonGP19","doi":"10.18653/V1/P19-1133","ee":"https://doi.org/10.18653/v1/p19-1133","url":"https://dblp.org/rec/conf/acl/SimonGP19"}, "url":"URL#2109355" }, { "@score":"2", "@id":"2118497", "info":{"authors":{"author":[{"@pid":"232/9096","text":"Chuyan Wang"},{"@pid":"98/1345","text":"Liang Qian"},{"@pid":"260/6244","text":"Yichong Wei"},{"@pid":"09/3366","text":"Lingzhi Liu"}]},"title":"Lossy Information Transmission Method based on Semantic Computing Architecture.","venue":"APCC","pages":"78-82","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/apcc/WangQWL19","doi":"10.1109/APCC47188.2019.9026544","ee":"https://doi.org/10.1109/APCC47188.2019.9026544","url":"https://dblp.org/rec/conf/apcc/WangQWL19"}, "url":"URL#2118497" }, { "@score":"2", "@id":"2128261", "info":{"authors":{"author":[{"@pid":"169/7204","text":"Meriem Romaissa Boubakeur"},{"@pid":"05/3838-1","text":"Guoyin Wang 0001"},{"@pid":"32/2948-8","text":"Ke Liu 0008"},{"@pid":"64/997","text":"Karima Benatchba"}]},"title":"Evaluation of Identity Information Loss in EEG-Based Biometric Systems.","venue":"BI","pages":"201-211","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/brain/BoubakeurWLB19","doi":"10.1007/978-3-030-37078-7_20","ee":"https://doi.org/10.1007/978-3-030-37078-7_20","url":"https://dblp.org/rec/conf/brain/BoubakeurWLB19"}, "url":"URL#2128261" }, { "@score":"2", "@id":"2134313", "info":{"authors":{"author":[{"@pid":"239/7619","text":"Dimitrios Dimitrios"},{"@pid":"239/7581","text":"Athanasios Mpouras"}]},"title":"Anonymizing Clinical and Genetic Data of Patients with Minimum Information Loss.","venue":"CERC","pages":"223-230","year":"2019","type":"Conference and Workshop Papers","access":"open","key":"conf/cerc/DimitriosM19","ee":"https://ceur-ws.org/Vol-2348/short05.pdf","url":"https://dblp.org/rec/conf/cerc/DimitriosM19"}, "url":"URL#2134313" }, { "@score":"2", "@id":"2142865", "info":{"authors":{"author":[{"@pid":"249/2743","text":"Noémien Kocher"},{"@pid":"257/1684","text":"Christian Scuito"},{"@pid":"249/2584","text":"Lorenzo Tarantino"},{"@pid":"13/4501","text":"Alexandros Lazaridis"},{"@pid":"160/9830","text":"Andreas Fischer 0002"},{"@pid":"205/9188","text":"Claudiu Musat"}]},"title":"Alleviating Sequence Information Loss with Data Overlapping and Prime Batch Sizes.","venue":"CoNLL","pages":"890-899","year":"2019","type":"Conference and Workshop Papers","access":"open","key":"conf/conll/KocherSTLFM19","doi":"10.18653/V1/K19-1083","ee":"https://doi.org/10.18653/v1/K19-1083","url":"https://dblp.org/rec/conf/conll/KocherSTLFM19"}, "url":"URL#2142865" }, { "@score":"2", "@id":"2153961", "info":{"authors":{"author":[{"@pid":"160/2989","text":"Anna Maria Oberländer"},{"@pid":"242/2598","text":"Benedict Lösser"},{"@pid":"188/7779","text":"Daniel Rau"}]},"title":"Taxonomy Research in Information Systems: a Systematic Assessment.","venue":"ECIS","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecis/OberlanderLR19","ee":"https://aisel.aisnet.org/ecis2019_rp/144","url":"https://dblp.org/rec/conf/ecis/OberlanderLR19"}, "url":"URL#2153961" }, { "@score":"2", "@id":"2163175", "info":{"authors":{"author":[{"@pid":"168/9992","text":"Kyohei Unno"},{"@pid":"85/3233","text":"Yusuke Kameda"},{"@pid":"36/618","text":"Ichiro Matsuda"},{"@pid":"52/545","text":"Susumu Itoh"},{"@pid":"12/993","text":"Sei Naito"}]},"title":"Lossless Image Coding Exploiting Local and Non-local Information via Probability Model Optimization.","venue":"EUSIPCO","pages":"1-5","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/eusipco/UnnoKMIN19","doi":"10.23919/EUSIPCO.2019.8903128","ee":"https://doi.org/10.23919/EUSIPCO.2019.8903128","url":"https://dblp.org/rec/conf/eusipco/UnnoKMIN19"}, "url":"URL#2163175" }, { "@score":"2", "@id":"2177979", "info":{"authors":{"author":[{"@pid":"g/JamesGeller","text":"James Geller"},{"@pid":"k/ShmuelTomiKlein","text":"Shmuel T. Klein"},{"@pid":"234/3249","text":"Vipina Kuttichi Keloth"}]},"title":"Measuring and Avoiding Information Loss During Concept Import from a Source to a Target Ontology.","venue":"KEOD","pages":"442-449","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic3k/GellerKK19","doi":"10.5220/0008354904420449","ee":"https://doi.org/10.5220/0008354904420449","url":"https://dblp.org/rec/conf/ic3k/GellerKK19"}, "url":"URL#2177979" }, { "@score":"2", "@id":"2180641", "info":{"authors":{"author":[{"@pid":"211/3604","text":"Ferran De Cabrera"},{"@pid":"05/8860","text":"Jaume Riba"}]},"title":"Squared-Loss Mutual Information via High-Dimension Coherence Matrix Estimation.","venue":"ICASSP","pages":"5142-5146","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/icassp/CabreraR19","doi":"10.1109/ICASSP.2019.8682642","ee":"https://doi.org/10.1109/ICASSP.2019.8682642","url":"https://dblp.org/rec/conf/icassp/CabreraR19"}, "url":"URL#2180641" }, { "@score":"2", "@id":"2196352", "info":{"authors":{"author":[{"@pid":"90/2018-2","text":"Xin Wei 0002"},{"@pid":"39/721-1","text":"Hui Wang 0001"},{"@pid":"42/250","text":"Bryan W. Scotney"},{"@pid":"153/6666","text":"Huan Wan"}]},"title":"Gicoface: Global Information-Based Cosine Optimal Loss for Deep Face Recognition.","venue":"ICIP","pages":"3457-3461","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/icip/00020SW19","doi":"10.1109/ICIP.2019.8803410","ee":"https://doi.org/10.1109/ICIP.2019.8803410","url":"https://dblp.org/rec/conf/icip/00020SW19"}, "url":"URL#2196352" }, { "@score":"2", "@id":"2220927", "info":{"authors":{"author":[{"@pid":"247/2067","text":"Takemi Nakamura"},{"@pid":"93/6689","text":"Masahiro Shibata"},{"@pid":"18/5957","text":"Masato Tsuru"}]},"title":"On Retrieval Order of Statistics Information from OpenFlow Switches to Locate Lossy Links by Network Tomographic Refinement.","venue":"INCoS","pages":"342-351","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/incos/NakamuraST19","doi":"10.1007/978-3-030-29035-1_33","ee":"https://doi.org/10.1007/978-3-030-29035-1_33","url":"https://dblp.org/rec/conf/incos/NakamuraST19"}, "url":"URL#2220927" }, { "@score":"2", "@id":"2231027", "info":{"authors":{"author":[{"@pid":"03/131","text":"Sung Hoon Lim"},{"@pid":"01/161-1","text":"Chen Feng 0001"},{"@pid":"46/10646","text":"Adriano Pastore"},{"@pid":"70/6148","text":"Bobak Nazer"},{"@pid":"40/709","text":"Michael Gastpar"}]},"title":"Towards an Algebraic Network Information Theory: Distributed Lossy Computation of Linear Functions.","venue":"ISIT","pages":"1827-1831","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/Lim0PNG19","doi":"10.1109/ISIT.2019.8849363","ee":"https://doi.org/10.1109/ISIT.2019.8849363","url":"https://dblp.org/rec/conf/isit/Lim0PNG19"}, "url":"URL#2231027" }, { "@score":"2", "@id":"2240706", "info":{"authors":{"author":[{"@pid":"44/6047-1","text":"Binh Nguyen 0001"},{"@pid":"16/1709","text":"Wanli Ma"},{"@pid":"21/6348","text":"Dat Tran 0001"}]},"title":"Investigating the effects of lossy compression on age, gender and alcoholic information in EEG signals.","venue":"KES","pages":"231-240","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/kes/NguyenMT19","doi":"10.1016/J.PROCS.2019.09.178","ee":"https://doi.org/10.1016/j.procs.2019.09.178","url":"https://dblp.org/rec/conf/kes/NguyenMT19"}, "url":"URL#2240706" }, { "@score":"2", "@id":"2243878", "info":{"authors":{"author":[{"@pid":"272/7280","text":"Tatyana Vityazeva"},{"@pid":"272/7292","text":"Anatoly Mikheev"}]},"title":"Information Loss in Measurement Signal Filtering Systems.","venue":"MECO","pages":"1-4","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/meco/VityazevaM19","doi":"10.1109/MECO.2019.8759995","ee":"https://doi.org/10.1109/MECO.2019.8759995","url":"https://dblp.org/rec/conf/meco/VityazevaM19"}, "url":"URL#2243878" }, { "@score":"2", "@id":"2247563", "info":{"authors":{"author":[{"@pid":"14/5109","text":"Jerry D. Gibson"},{"@pid":"236/4069","text":"Hoontaek Oh"}]},"title":"Characterizing Mutual Information Loss in Pyramidal Image Processing Structures.","venue":"MIPR","pages":"157-162","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/mipr/GibsonO19","doi":"10.1109/MIPR.2019.00035","ee":"https://doi.org/10.1109/MIPR.2019.00035","url":"https://dblp.org/rec/conf/mipr/GibsonO19"}, "url":"URL#2247563" }, { "@score":"2", "@id":"2254095", "info":{"authors":{"author":[{"@pid":"13/3479","text":"Lin Chen"},{"@pid":"146/7746","text":"Hossein Esfandiari"},{"@pid":"42/5813","text":"Gang Fu"},{"@pid":"m/VahabSMirrokni","text":"Vahab S. Mirrokni"}]},"title":"Locality-Sensitive Hashing for f-Divergences: Mutual Information Loss and Beyond.","venue":"NeurIPS","pages":"10044-10054","year":"2019","type":"Conference and Workshop Papers","access":"open","key":"conf/nips/ChenEFM19","ee":"https://proceedings.neurips.cc/paper/2019/hash/21b29648a47a45ad16bb0da0c004dfba-Abstract.html","url":"https://dblp.org/rec/conf/nips/ChenEFM19"}, "url":"URL#2254095" }, { "@score":"2", "@id":"2255179", "info":{"authors":{"author":[{"@pid":"241/9585","text":"Yilun Xu"},{"@pid":"06/5143-4","text":"Peng Cao 0004"},{"@pid":"177/9339","text":"Yuqing Kong"},{"@pid":"71/3387-1","text":"Yizhou Wang 0001"}]},"title":"L_DMI: A Novel Information-theoretic Loss Function for Training Deep Nets Robust to Label Noise.","venue":"NeurIPS","pages":"6222-6233","year":"2019","type":"Conference and Workshop Papers","access":"open","key":"conf/nips/XuCKW19","ee":"https://proceedings.neurips.cc/paper/2019/hash/8a1ee9f2b7abe6e88d1a479ab6a42c5e-Abstract.html","url":"https://dblp.org/rec/conf/nips/XuCKW19"}, "url":"URL#2255179" }, { "@score":"2", "@id":"2255301", "info":{"authors":{"author":[{"@pid":"116/8682-6","text":"Shuai Zhao 0006"},{"@pid":"w/YangWang30","text":"Yang Wang 0030"},{"@pid":"59/5806","text":"Zheng Yang"},{"@pid":"c/DCai","text":"Deng Cai 0001"}]},"title":"Region Mutual Information Loss for Semantic Segmentation.","venue":"NeurIPS","pages":"11115-11125","year":"2019","type":"Conference and Workshop Papers","access":"open","key":"conf/nips/Zhao0YC19","ee":"https://proceedings.neurips.cc/paper/2019/hash/a67c8c9a961b4182688768dd9ba015fe-Abstract.html","url":"https://dblp.org/rec/conf/nips/Zhao0YC19"}, "url":"URL#2255301" }, { "@score":"4", "@id":"2297104", "info":{"authors":{"author":[{"@pid":"81/11205","text":"Juan Antonio Lossio-Ventura"},{"@pid":"118/8594","text":"Denisse Muñante"},{"@pid":"61/11335","text":"Hugo Alatrista-Salas"}]},"title":"Information Management and Big Data, 5th International Conference, SIMBig 2018, Lima, Peru, September 3-5, 2018, Proceedings.","venue":["SIMBig","Communications in Computer and Information Science"],"volume":"898","publisher":"Springer","year":"2019","type":"Editorship","key":"conf/simbig/2018","doi":"10.1007/978-3-030-11680-4","ee":"https://doi.org/10.1007/978-3-030-11680-4","url":"https://dblp.org/rec/conf/simbig/2018"}, "url":"URL#2297104" }, { "@score":"2", "@id":"2298846", "info":{"authors":{"author":[{"@pid":"223/9595","text":"Jiarong Dong"},{"@pid":"81/2423","text":"Ke Gao"},{"@pid":"89/8489","text":"Xiaokai Chen"},{"@pid":"33/4618","text":"Junbo Guo"},{"@pid":"75/2820","text":"Juan Cao"},{"@pid":"z/YongdongZhang","text":"Yongdong Zhang 0001"}]},"title":"Not All Words are Equal: Video-specific Information Loss for Video Captioning.","venue":"CoRR","volume":"abs/1901.00097","year":"2019","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1901-00097","ee":"http://arxiv.org/abs/1901.00097","url":"https://dblp.org/rec/journals/corr/abs-1901-00097"}, "url":"URL#2298846" }, { "@score":"2", "@id":"2303554", "info":{"authors":{"author":[{"@pid":"236/4857","text":"Sanghyeon Na"},{"@pid":"218/5252","text":"Seungjoo Yoo"},{"@pid":"07/2074","text":"Jaegul Choo"}]},"title":"MISO: Mutual Information Loss with Stochastic Style Representations for Multimodal Image-to-Image Translation.","venue":"CoRR","volume":"abs/1902.03938","year":"2019","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1902-03938","ee":"http://arxiv.org/abs/1902.03938","url":"https://dblp.org/rec/journals/corr/abs-1902-03938"}, "url":"URL#2303554" }, { "@score":"2", "@id":"2303752", "info":{"authors":{"author":{"@pid":"05/6579","text":"Eric Clarkson"}},"title":"Quantifying the Loss of Information from Binning List-Mode Data.","venue":"CoRR","volume":"abs/1902.04606","year":"2019","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1902-04606","ee":"http://arxiv.org/abs/1902.04606","url":"https://dblp.org/rec/journals/corr/abs-1902-04606"}, "url":"URL#2303752" }, { "@score":"2", "@id":"2304150", "info":{"authors":{"author":[{"@pid":"194/5523","text":"Brandon Foggo"},{"@pid":"156/4072","text":"Nanpeng Yu"},{"@pid":"38/5467-2","text":"Jie Shi 0002"},{"@pid":"208/9418","text":"Yuanqi Gao"}]},"title":"Asymptotic Finite Sample Information Losses in Neural Classifiers.","venue":"CoRR","volume":"abs/1902.05991","year":"2019","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1902-05991","ee":"http://arxiv.org/abs/1902.05991","url":"https://dblp.org/rec/journals/corr/abs-1902-05991"}, "url":"URL#2304150" }, { "@score":"2", "@id":"2305270", "info":{"authors":{"author":[{"@pid":"194/5523","text":"Brandon Foggo"},{"@pid":"156/4072","text":"Nanpeng Yu"}]},"title":"Interpreting Active Learning Methods Through Information Losses.","venue":"CoRR","volume":"abs/1902.09602","year":"2019","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1902-09602","ee":"http://arxiv.org/abs/1902.09602","url":"https://dblp.org/rec/journals/corr/abs-1902-09602"}, "url":"URL#2305270" }, { "@score":"2", "@id":"2307186", "info":{"authors":{"author":[{"@pid":"92/2834-3","text":"Lin Gao 0003"},{"@pid":"89/1512","text":"Giorgio Battistelli"},{"@pid":"68/5289","text":"Luigi Chisci"}]},"title":"Multiobject fusion with minimum information loss.","venue":"CoRR","volume":"abs/1903.04239","year":"2019","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1903-04239","ee":"http://arxiv.org/abs/1903.04239","url":"https://dblp.org/rec/journals/corr/abs-1903-04239"}, "url":"URL#2307186" }, { "@score":"2", "@id":"2324356", "info":{"authors":{"author":[{"@pid":"207/5395","text":"Tianwen Jiang"},{"@pid":"94/6503-3","text":"Tong Zhao 0003"},{"@pid":"86/5934","text":"Bing Qin 0001"},{"@pid":"52/5150-1","text":"Ting Liu 0001"},{"@pid":"c/NiteshVChawla","text":"Nitesh V. Chawla"},{"@pid":"69/339-1","text":"Meng Jiang 0001"}]},"title":"Constructing Information-Lossless Biological Knowledge Graphs from Conditional Statements.","venue":"CoRR","volume":"abs/1907.00720","year":"2019","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1907-00720","ee":"http://arxiv.org/abs/1907.00720","url":"https://dblp.org/rec/journals/corr/abs-1907-00720"}, "url":"URL#2324356" }, { "@score":"2", "@id":"2333925", "info":{"authors":{"author":[{"@pid":"44/1448","text":"Yanbin Liu"},{"@pid":"56/4937","text":"Makoto Yamada"},{"@pid":"154/3702","text":"Yao-Hung Hubert Tsai"},{"@pid":"137/4218","text":"Tam Le"},{"@pid":"62/5884","text":"Ruslan Salakhutdinov"},{"@pid":"33/4854-1","text":"Yi Yang 0001"}]},"title":"LSMI-Sinkhorn: Semi-supervised Squared-Loss Mutual Information Estimation with Optimal Transport.","venue":"CoRR","volume":"abs/1909.02373","year":"2019","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1909-02373","ee":"http://arxiv.org/abs/1909.02373","url":"https://dblp.org/rec/journals/corr/abs-1909-02373"}, "url":"URL#2333925" }, { "@score":"2", "@id":"2334301", "info":{"authors":{"author":[{"@pid":"241/9585","text":"Yilun Xu"},{"@pid":"06/5143-4","text":"Peng Cao 0004"},{"@pid":"177/9339","text":"Yuqing Kong"},{"@pid":"71/3387-1","text":"Yizhou Wang 0001"}]},"title":"L_DMI: An Information-theoretic Noise-robust Loss Function.","venue":"CoRR","volume":"abs/1909.03388","year":"2019","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1909-03388","ee":"http://arxiv.org/abs/1909.03388","url":"https://dblp.org/rec/journals/corr/abs-1909-03388"}, "url":"URL#2334301" }, { "@score":"2", "@id":"2336283", "info":{"authors":{"author":[{"@pid":"249/2743","text":"Noémien Kocher"},{"@pid":"257/1684","text":"Christian Scuito"},{"@pid":"249/2584","text":"Lorenzo Tarantino"},{"@pid":"13/4501","text":"Alexandros Lazaridis"},{"@pid":"160/9830","text":"Andreas Fischer 0002"},{"@pid":"205/9188","text":"Claudiu Musat"}]},"title":"Alleviating Sequence Information Loss with Data Overlapping and Prime Batch Sizes.","venue":"CoRR","volume":"abs/1909.08700","year":"2019","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1909-08700","ee":"http://arxiv.org/abs/1909.08700","url":"https://dblp.org/rec/journals/corr/abs-1909-08700"}, "url":"URL#2336283" }, { "@score":"2", "@id":"2342670", "info":{"authors":{"author":[{"@pid":"116/8682-6","text":"Shuai Zhao 0006"},{"@pid":"w/YangWang30","text":"Yang Wang 0030"},{"@pid":"59/5806","text":"Zheng Yang"},{"@pid":"c/DCai","text":"Deng Cai 0001"}]},"title":"Region Mutual Information Loss for Semantic Segmentation.","venue":"CoRR","volume":"abs/1910.12037","year":"2019","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1910-12037","ee":"http://arxiv.org/abs/1910.12037","url":"https://dblp.org/rec/journals/corr/abs-1910-12037"}, "url":"URL#2342670" }, { "@score":"2", "@id":"2342835", "info":{"authors":{"author":[{"@pid":"13/3479","text":"Lin Chen"},{"@pid":"146/7746","text":"Hossein Esfandiari"},{"@pid":"239/8404","text":"Thomas Fu"},{"@pid":"m/VahabSMirrokni","text":"Vahab S. Mirrokni"}]},"title":"Locality-Sensitive Hashing for f-Divergences: Mutual Information Loss and Beyond.","venue":"CoRR","volume":"abs/1910.12414","year":"2019","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1910-12414","ee":"http://arxiv.org/abs/1910.12414","url":"https://dblp.org/rec/journals/corr/abs-1910-12414"}, "url":"URL#2342835" }, { "@score":"2", "@id":"2344035", "info":{"authors":{"author":[{"@pid":"92/2834-3","text":"Lin Gao 0003"},{"@pid":"89/1512","text":"Giorgio Battistelli"},{"@pid":"68/5289","text":"Luigi Chisci"}]},"title":"Fusion of labeled RFS densities with minimum information loss.","venue":"CoRR","volume":"abs/1911.01083","year":"2019","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1911-01083","ee":"http://arxiv.org/abs/1911.01083","url":"https://dblp.org/rec/journals/corr/abs-1911-01083"}, "url":"URL#2344035" }, { "@score":"2", "@id":"2344182", "info":{"authors":{"author":[{"@pid":"194/5523","text":"Brandon Foggo"},{"@pid":"156/4072","text":"Nanpeng Yu"}]},"title":"Improving Supervised Phase Identification Through the Theory of Information Losses.","venue":"CoRR","volume":"abs/1911.01484","year":"2019","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1911-01484","ee":"http://arxiv.org/abs/1911.01484","url":"https://dblp.org/rec/journals/corr/abs-1911-01484"}, "url":"URL#2344182" }, { "@score":"2", "@id":"2350672", "info":{"authors":{"author":[{"@pid":"255/4776","text":"Lampros Gavalakis"},{"@pid":"74/5935","text":"Ioannis Kontoyiannis"}]},"title":"Fundamental Limits of Lossless Data Compression with Side Information.","venue":"CoRR","volume":"abs/1912.05734","year":"2019","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1912-05734","ee":"http://arxiv.org/abs/1912.05734","url":"https://dblp.org/rec/journals/corr/abs-1912-05734"}, "url":"URL#2350672" }, { "@score":"2", "@id":"2358454", "info":{"authors":{"author":{"@pid":"160/4509","text":"Arash Kermani Kolankeh"}},"title":"Inhibition and loss of information in unsupervised feature extraction.","year":"2018","type":"Books and Theses","access":"closed","key":"phd/dnb/Kolankeh18","ee":"https://nbn-resolving.org/urn:nbn:de:bsz:ch1-qucosa2-209294","url":"https://dblp.org/rec/phd/dnb/Kolankeh18"}, "url":"URL#2358454" }, { "@score":"2", "@id":"2390769", "info":{"authors":{"author":[{"@pid":"198/5058","text":"Simon Stolarczyk"},{"@pid":"172/3722","text":"Manisha Bhardwaj"},{"@pid":"37/6135","text":"Kevin E. Bassler"},{"@pid":"39/311","text":"Wei Ji Ma"},{"@pid":"37/4056","text":"Kresimir Josic"}]},"title":"Loss of information in feedforward social networks.","venue":"J. Complex Networks","volume":"6","number":"3","pages":"448-469","year":"2018","type":"Journal Articles","access":"closed","key":"journals/compnet/StolarczykBBMJ18","doi":"10.1093/COMNET/CNX032","ee":"https://doi.org/10.1093/comnet/cnx032","url":"https://dblp.org/rec/journals/compnet/StolarczykBBMJ18"}, "url":"URL#2390769" }, { "@score":"2", "@id":"2402531", "info":{"authors":{"author":[{"@pid":"10/2850","text":"Ansel Y. Rodríguez González"},{"@pid":"15/9527","text":"Fernando Lezama"},{"@pid":"213/2268","text":"Carlos A. Iglesias-Alvarez"},{"@pid":"94/4588","text":"José Fco. Martínez-Trinidad"},{"@pid":"88/6286","text":"Jesús Ariel Carrasco-Ochoa"},{"@pid":"09/5915","text":"Enrique Munoz de Cote"}]},"title":"Closed frequent similar pattern mining: Reducing the number of frequent similar patterns without information loss.","venue":"Expert Syst. Appl.","volume":"96","pages":"271-283","year":"2018","type":"Journal Articles","access":"closed","key":"journals/eswa/GonzalezLIMCC18","doi":"10.1016/J.ESWA.2017.12.018","ee":"https://doi.org/10.1016/j.eswa.2017.12.018","url":"https://dblp.org/rec/journals/eswa/GonzalezLIMCC18"}, "url":"URL#2402531" }, { "@score":"2", "@id":"2418696", "info":{"authors":{"author":[{"@pid":"85/6499","text":"Keisuke Murakami"},{"@pid":"72/3856","text":"Takeaki Uno"}]},"title":"Optimization algorithm for k-anonymization of datasets with low information loss.","venue":"Int. J. Inf. Sec.","volume":"17","number":"6","pages":"631-644","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijisec/MurakamiU18","doi":"10.1007/S10207-017-0392-Y","ee":"https://doi.org/10.1007/s10207-017-0392-y","url":"https://dblp.org/rec/journals/ijisec/MurakamiU18"}, "url":"URL#2418696" }, { "@score":"2", "@id":"2428279", "info":{"authors":{"author":{"@pid":"96/577","text":"Nicolás Ruiz"}},"title":"On some consequences of the permutation paradigm for data anonymization: Centrality of permutation matrices, universal measures of disclosure risk and information loss, evaluation by dominance.","venue":"Inf. Sci.","volume":"430","pages":"620-633","year":"2018","type":"Journal Articles","access":"closed","key":"journals/isci/Ruiz18","doi":"10.1016/J.INS.2017.10.048","ee":"https://doi.org/10.1016/j.ins.2017.10.048","url":"https://dblp.org/rec/journals/isci/Ruiz18"}, "url":"URL#2428279" }, { "@score":"2", "@id":"2438986", "info":{"authors":{"author":[{"@pid":"26/2033","text":"Kazumi Saito"},{"@pid":"43/4213","text":"Kouzou Ohara"},{"@pid":"28/3674","text":"Masahiro Kimura"},{"@pid":"08/6525","text":"Hiroshi Motoda"}]},"title":"Accurate and efficient detection of critical links in network to minimize information loss.","venue":"J. Intell. Inf. Syst.","volume":"51","number":"2","pages":"235-255","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jiis/SaitoOKM18","doi":"10.1007/S10844-018-0523-6","ee":"https://doi.org/10.1007/s10844-018-0523-6","url":"https://dblp.org/rec/journals/jiis/SaitoOKM18"}, "url":"URL#2438986" }, { "@score":"2", "@id":"2480637", "info":{"authors":{"author":[{"@pid":"142/1128","text":"Ying-Che Hung"},{"@pid":"33/3675","text":"Ping Chen"},{"@pid":"230/0292","text":"Liang-Yü Chen"}]},"title":"Advanced Classification of Coffee Beans with Fatty Acids Profiling to Block Information Loss.","venue":"Symmetry","volume":"10","number":"10","pages":"529","year":"2018","type":"Journal Articles","access":"open","key":"journals/symmetry/HungCC18","doi":"10.3390/SYM10100529","ee":"https://doi.org/10.3390/sym10100529","url":"https://dblp.org/rec/journals/symmetry/HungCC18"}, "url":"URL#2480637" }, { "@score":"2", "@id":"2481056", "info":{"authors":{"author":[{"@pid":"171/6632","text":"Qingyou Yan"},{"@pid":"79/2888-6","text":"Le Yang 0006"},{"@pid":"03/11108","text":"Tomas Balezentis"},{"@pid":"226/5603","text":"Dalia Streimikiene"},{"@pid":"66/3363","text":"Chao Qin"}]},"title":"Optimal Dividend and Capital Injection Problem with Transaction Cost and Salvage Value: The Case of Excess-of-Loss Reinsurance Based on the Symmetry of Risk Information.","venue":"Symmetry","volume":"10","number":"7","pages":"276","year":"2018","type":"Journal Articles","access":"open","key":"journals/symmetry/YanYBSQ18","doi":"10.3390/SYM10070276","ee":"https://doi.org/10.3390/sym10070276","url":"https://dblp.org/rec/journals/symmetry/YanYBSQ18"}, "url":"URL#2481056" }, { "@score":"2", "@id":"2492992", "info":{"authors":{"author":[{"@pid":"188/3989","text":"Fode Zhang"},{"@pid":"57/3424","text":"Yimin Shi"},{"@pid":"01/190","text":"Hon Keung Tony Ng"},{"@pid":"93/9597","text":"Ruibing Wang"}]},"title":"Information Geometry of Generalized Bayesian Prediction Using α-Divergences as Loss Functions.","venue":"IEEE Trans. Inf. Theory","volume":"64","number":"3","pages":"1812-1824","year":"2018","type":"Journal Articles","access":"closed","key":"journals/tit/ZhangSNW18","doi":"10.1109/TIT.2017.2774820","ee":"https://doi.org/10.1109/TIT.2017.2774820","url":"https://dblp.org/rec/journals/tit/ZhangSNW18"}, "url":"URL#2492992" }, { "@score":"2", "@id":"2513510", "info":{"authors":{"author":[{"@pid":"29/9220","text":"Yanina Shkel"},{"@pid":"91/6905","text":"Maxim Raginsky"},{"@pid":"v/SVerdu","text":"Sergio Verdú"}]},"title":"Sequential prediction with coded side information under logarithmic loss.","venue":"ALT","pages":"753-769","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/alt/ShkelRV18","ee":"http://proceedings.mlr.press/v83/shkel18a.html","url":"https://dblp.org/rec/conf/alt/ShkelRV18"}, "url":"URL#2513510" }, { "@score":"2", "@id":"2525436", "info":{"authors":{"author":[{"@pid":"223/9595","text":"Jiarong Dong"},{"@pid":"81/2423","text":"Ke Gao"},{"@pid":"89/8489","text":"Xiaokai Chen"},{"@pid":"33/4618","text":"Junbo Guo"},{"@pid":"75/2820","text":"Juan Cao"},{"@pid":"z/YongdongZhang","text":"Yongdong Zhang 0001"}]},"title":"Not All Words Are Equal: Video-specific Information Loss for Video Captioning.","venue":"BMVC","pages":"58","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/bmvc/DongGCGCZ18","ee":"http://bmvc2018.org/contents/papers/0143.pdf","url":"https://dblp.org/rec/conf/bmvc/DongGCGCZ18"}, "url":"URL#2525436" }, { "@score":"2", "@id":"2537558", "info":{"authors":{"author":[{"@pid":"150/7250","text":"Thodoris Lykouris"},{"@pid":"s/KarthikSridharan","text":"Karthik Sridharan"},{"@pid":"t/EvaTardos","text":"Éva Tardos"}]},"title":"Small-loss bounds for online learning with partial information.","venue":"COLT","pages":"979-986","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/colt/LykourisST18","ee":"http://proceedings.mlr.press/v75/lykouris18a.html","url":"https://dblp.org/rec/conf/colt/LykourisST18"}, "url":"URL#2537558" }, { "@score":"2", "@id":"2541760", "info":{"authors":{"author":[{"@pid":"220/3064","text":"Yijie Bei"},{"@pid":"173/8168","text":"Alexandru Damian"},{"@pid":"220/3361","text":"Shijia Hu"},{"@pid":"220/3331","text":"Sachit Menon"},{"@pid":"125/5702","text":"Nikhil Ravi"},{"@pid":"62/6936","text":"Cynthia Rudin"}]},"title":"New Techniques for Preserving Global Structure and Denoising With Low Information Loss in Single-Image Super-Resolution.","venue":"CVPR Workshops","pages":"874-881","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/cvpr/BeiDHMRR18","doi":"10.1109/CVPRW.2018.00132","ee":"http://openaccess.thecvf.com/content_cvpr_2018_workshops/w13/html/Bei_New_Techniques_for_CVPR_2018_paper.html","url":"https://dblp.org/rec/conf/cvpr/BeiDHMRR18"}, "url":"URL#2541760" }, { "@score":"2", "@id":"2545236", "info":{"authors":{"author":[{"@pid":"204/6414","text":"Nikolai J. Podlesny"},{"@pid":"48/6963","text":"Anne V. D. M. Kayem"},{"@pid":"52/4931-1","text":"Stephan von Schorlemer"},{"@pid":"83/6118","text":"Matthias Uflacker"}]},"title":"Minimising Information Loss on Anonymised High Dimensional Data with Greedy In-Memory Processing.","venue":"DEXA","pages":"85-100","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dexa/PodlesnyKSU18","doi":"10.1007/978-3-319-98809-2_6","ee":"https://doi.org/10.1007/978-3-319-98809-2_6","url":"https://dblp.org/rec/conf/dexa/PodlesnyKSU18"}, "url":"URL#2545236" }, { "@score":"2", "@id":"2549880", "info":{"authors":{"author":[{"@pid":"67/1810","text":"Alex Alvarado"},{"@pid":"42/4111","text":"Yi Lei"},{"@pid":"210/5401","text":"David S. Millar"}]},"title":"Achievable Information Rate Losses for High Order Modulation and Hard-Decision Forward Error Correction.","venue":"ECOC","pages":"1-3","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecoc/AlvaradoLM18","doi":"10.1109/ECOC.2018.8535531","ee":"https://doi.org/10.1109/ECOC.2018.8535531","url":"https://dblp.org/rec/conf/ecoc/AlvaradoLM18"}, "url":"URL#2549880" }, { "@score":"2", "@id":"2549958", "info":{"authors":{"author":[{"@pid":"281/0933","text":"Ahmed I. Abd El-Rahman"},{"@pid":"98/2803","text":"John C. Cartledge"},{"@pid":"39/2092","text":"L. Li"}]},"title":"Bit-Wise Achievable Information Rates for Probabilistically Shaped 64-QAM in the Presence of Polarization Dependent Loss.","venue":"ECOC","pages":"1-3","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecoc/El-RahmanCL18","doi":"10.1109/ECOC.2018.8535372","ee":"https://doi.org/10.1109/ECOC.2018.8535372","url":"https://dblp.org/rec/conf/ecoc/El-RahmanCL18"}, "url":"URL#2549958" }, { "@score":"2", "@id":"2561988", "info":{"authors":{"author":[{"@pid":"61/3234-7","text":"Qiang Liu 0007"},{"@pid":"13/3004","text":"Nageswara S. V. Rao"}]},"title":"On Effect of Information Loss on Fuser Quality and Utility.","venue":"FUSION","pages":"245-252","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/fusion/0007R18","doi":"10.23919/ICIF.2018.8455336","ee":"https://doi.org/10.23919/ICIF.2018.8455336","url":"https://dblp.org/rec/conf/fusion/0007R18"}, "url":"URL#2561988" }, { "@score":"2", "@id":"2574240", "info":{"authors":{"author":[{"@pid":"19/8605","text":"Jinhyung Oh"},{"@pid":"169/9141","text":"Jong Ho Kim"},{"@pid":"56/8846","text":"Young-Jun Chong"}]},"title":"Analysis of path loss about radio duct phenomenon with atmospheric refractive index information.","venue":"ICACT","pages":"527-530","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/icact/OhKC18a","doi":"10.23919/ICACT.2018.8323818","ee":"https://doi.org/10.23919/ICACT.2018.8323818","url":"https://dblp.org/rec/conf/icact/OhKC18a"}, "url":"URL#2574240" }, { "@score":"2", "@id":"2575445", "info":{"authors":{"author":[{"@pid":"233/4681","text":"Guang-Xun Du"},{"@pid":"18/5837-4","text":"Liang Sun 0004"}]},"title":"Loss of Effectiveness Information Observability Analysis for Multicopters.","venue":"ICARM","pages":"572-576","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/icarm/DuS18","doi":"10.1109/ICARM.2018.8610857","ee":"https://doi.org/10.1109/ICARM.2018.8610857","url":"https://dblp.org/rec/conf/icarm/DuS18"}, "url":"URL#2575445" }, { "@score":"2", "@id":"2607438", "info":{"authors":{"author":[{"@pid":"12/9627","text":"William C. Wright"},{"@pid":"196/6795","text":"Benjamin Wilkinson"},{"@pid":"08/10726","text":"Wendell P. Cropper Jr."},{"@pid":"119/1415","text":"Christopher E. Oxendine"}]},"title":"Classifying Terrestrial Based Forest Photography with Geographic Information Systems to Model Signal Loss.","venue":"IGARSS","pages":"6420-6423","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/igarss/WrightWCO18","doi":"10.1109/IGARSS.2018.8519244","ee":"https://doi.org/10.1109/IGARSS.2018.8519244","url":"https://dblp.org/rec/conf/igarss/WrightWCO18"}, "url":"URL#2607438" }, { "@score":"2", "@id":"2622019", "info":{"authors":{"author":[{"@pid":"168/9260","text":"Geun-Jun Kim"},{"@pid":"96/5805","text":"Bongsoon Kang"}]},"title":"A Method of Prevent Loss of Information in Ill-Posed Problem Based Application using Atmospheric Scattering Model.","venue":"ISOCC","pages":"214-215","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/isocc/KimK18","doi":"10.1109/ISOCC.2018.8649899","ee":"https://doi.org/10.1109/ISOCC.2018.8649899","url":"https://dblp.org/rec/conf/isocc/KimK18"}, "url":"URL#2622019" }, { "@score":"2", "@id":"2640823", "info":{"authors":{"author":[{"@pid":"184/3904","text":"Zahmeeth Sakkaff"},{"@pid":"211/4192","text":"Aditya Immaneni"},{"@pid":"41/7268","text":"Massimiliano Pierobon"}]},"title":"Applying molecular communication theory to estimate information loss in cell signal transduction: an approach based on cancer transcriptomics.","venue":"NANOCOM","pages":"16:1-16:7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/nanocom/SakkaffIP18","doi":"10.1145/3233188.3233202","ee":"https://doi.org/10.1145/3233188.3233202","url":"https://dblp.org/rec/conf/nanocom/SakkaffIP18"}, "url":"URL#2640823" }, { "@score":"2", "@id":"2666012", "info":{"authors":{"author":[{"@pid":"217/2159","text":"Xueni Zhang"},{"@pid":"72/5749-8","text":"Lei Zhou 0008"},{"@pid":"99/4833-1","text":"Xiao Bai 0001"},{"@pid":"h/EdwinRHancock","text":"Edwin R. Hancock"}]},"title":"Deep Supervised Hashing with Information Loss.","venue":"S+SSPR","pages":"395-405","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/sspr/ZhangZ0H18","doi":"10.1007/978-3-319-97785-0_38","ee":"https://doi.org/10.1007/978-3-319-97785-0_38","url":"https://dblp.org/rec/conf/sspr/ZhangZ0H18"}, "url":"URL#2666012" }, { "@score":"2", "@id":"2673680", "info":{"authors":{"author":[{"@pid":"175/2705","text":"Amina Hentati"},{"@pid":"80/1206","text":"Jean-François Frigon"},{"@pid":"56/4552","text":"Wessam Ajib"}]},"title":"Information Age and Packet Loss Performance Analysis of Energy Harvesting WSNs.","venue":"VTC Fall","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/vtc/HentatiFA18","doi":"10.1109/VTCFALL.2018.8690610","ee":"https://doi.org/10.1109/VTCFall.2018.8690610","url":"https://dblp.org/rec/conf/vtc/HentatiFA18"}, "url":"URL#2673680" }, { "@score":"4", "@id":"2684581", "info":{"authors":{"author":[{"@pid":"81/11205","text":"Juan Antonio Lossio-Ventura"},{"@pid":"61/11335","text":"Hugo Alatrista-Salas"}]},"title":"Information Management and Big Data - 4th Annual International Symposium, SIMBig 2017, Lima, Peru, September 4-6, 2017, Revised Selected Papers","venue":["SIMBig","Communications in Computer and Information Science"],"volume":"795","publisher":"Springer","year":"2018","type":"Editorship","key":"conf/simbig/2017s","doi":"10.1007/978-3-319-90596-9","ee":"https://doi.org/10.1007/978-3-319-90596-9","url":"https://dblp.org/rec/conf/simbig/2017s"}, "url":"URL#2684581" }, { "@score":"2", "@id":"2685334", "info":{"authors":{"author":{"@pid":"d/JDomingoFerrer","text":"Josep Domingo-Ferrer"}},"title":"Information Loss Measures.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Domingo-Ferrer18c","doi":"10.1007/978-1-4614-8265-9_1505","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1505","url":"https://dblp.org/rec/reference/db/Domingo-Ferrer18c"}, "url":"URL#2685334" }, { "@score":"2", "@id":"2692193", "info":{"authors":{"author":[{"@pid":"177/1788","text":"Lovedeep Gondara"},{"@pid":"w/KeWang","text":"Ke Wang 0001"}]},"title":"Recovering Loss to Followup Information Using Denoising Autoencoders.","venue":"CoRR","volume":"abs/1802.04664","year":"2018","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1802-04664","ee":"http://arxiv.org/abs/1802.04664","url":"https://dblp.org/rec/journals/corr/abs-1802-04664"}, "url":"URL#2692193" }, { "@score":"2", "@id":"2692535", "info":{"authors":{"author":[{"@pid":"z/HectorZenilChavez","text":"Hector Zenil"},{"@pid":"116/4558","text":"Narsis Aftab Kiani"},{"@pid":"24/4407","text":"Jesper Tegnér"}]},"title":"Parameter-free Network Sparsification and Data Reduction by Minimal Algorithmic Information Loss.","venue":"CoRR","volume":"abs/1802.05843","year":"2018","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1802-05843","ee":"http://arxiv.org/abs/1802.05843","url":"https://dblp.org/rec/journals/corr/abs-1802-05843"}, "url":"URL#2692535" }, { "@score":"2", "@id":"2692818", "info":{"authors":{"author":[{"@pid":"192/2170","text":"Huangjie Zheng"},{"@pid":"166/5900","text":"Jiangchao Yao"},{"@pid":"85/3714-2","text":"Ya Zhang 0002"},{"@pid":"35/5873","text":"Ivor W. Tsang"}]},"title":"Degeneration in VAE: in the Light of Fisher Information Loss.","venue":"CoRR","volume":"abs/1802.06677","year":"2018","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1802-06677","ee":"http://arxiv.org/abs/1802.06677","url":"https://dblp.org/rec/journals/corr/abs-1802-06677"}, "url":"URL#2692818" }, { "@score":"2", "@id":"2700679", "info":{"authors":{"author":[{"@pid":"217/2911","text":"Juan Arévalo"},{"@pid":"220/2518","text":"Juan Ramón Duque"},{"@pid":"137/4095","text":"Marco Creatura"}]},"title":"A Missing Information Loss function for implicit feedback datasets.","venue":"CoRR","volume":"abs/1805.00121","year":"2018","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1805-00121","ee":"http://arxiv.org/abs/1805.00121","url":"https://dblp.org/rec/journals/corr/abs-1805-00121"}, "url":"URL#2700679" }, { "@score":"2", "@id":"2700853", "info":{"authors":{"author":[{"@pid":"198/9661","text":"Mohsen Zareian Jahromi"},{"@pid":"117/5754","text":"Adel Zahedi"},{"@pid":"94/356","text":"Jesper Jensen 0001"},{"@pid":"48/2543","text":"Jan Østergaard"}]},"title":"Information Loss in the Human Auditory System.","venue":"CoRR","volume":"abs/1805.00698","year":"2018","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1805-00698","ee":"http://arxiv.org/abs/1805.00698","url":"https://dblp.org/rec/journals/corr/abs-1805-00698"}, "url":"URL#2700853" }, { "@score":"2", "@id":"2701633", "info":{"authors":{"author":[{"@pid":"220/3064","text":"Yijie Bei"},{"@pid":"173/8168","text":"Alexandru Damian"},{"@pid":"220/3361","text":"Shijia Hu"},{"@pid":"220/3331","text":"Sachit Menon"},{"@pid":"125/5702","text":"Nikhil Ravi"},{"@pid":"62/6936","text":"Cynthia Rudin"}]},"title":"New Techniques for Preserving Global Structure and Denoising with Low Information Loss in Single-Image Super-Resolution.","venue":"CoRR","volume":"abs/1805.03383","year":"2018","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1805-03383","ee":"http://arxiv.org/abs/1805.03383","url":"https://dblp.org/rec/journals/corr/abs-1805-03383"}, "url":"URL#2701633" }, { "@score":"2", "@id":"2701782", "info":{"authors":{"author":[{"@pid":"99/10141","text":"Alberto Barchielli"},{"@pid":"173/2175","text":"Matteo Gregoratti"}]},"title":"Uncertainty relations and information loss for spin-1/2 measurements.","venue":"CoRR","volume":"abs/1805.03919","year":"2018","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1805-03919","ee":"http://arxiv.org/abs/1805.03919","url":"https://dblp.org/rec/journals/corr/abs-1805-03919"}, "url":"URL#2701782" }, { "@score":"2", "@id":"2705125", "info":{"authors":{"author":[{"@pid":"32/4553","text":"Simon Graham"},{"@pid":"86/475-11","text":"Hao Chen 0011"},{"@pid":"165/7846","text":"Qi Dou 0001"},{"@pid":"52/2889","text":"Pheng-Ann Heng"},{"@pid":"r/NasirRajpoot","text":"Nasir M. Rajpoot"}]},"title":"MILD-Net: Minimal Information Loss Dilated Network for Gland Instance Segmentation in Colon Histology Images.","venue":"CoRR","volume":"abs/1806.01963","year":"2018","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1806-01963","ee":"http://arxiv.org/abs/1806.01963","url":"https://dblp.org/rec/journals/corr/abs-1806-01963"}, "url":"URL#2705125" }, { "@score":"2", "@id":"2707995", "info":{"authors":{"author":[{"@pid":"218/6430","text":"Manuel Mager"},{"@pid":"223/4363","text":"Elisabeth Mager"},{"@pid":"38/5201","text":"Alfonso Medina Urrea"},{"@pid":"40/7871","text":"Iván Meza"},{"@pid":"182/1923","text":"Katharina Kann"}]},"title":"Lost in Translation: Analysis of Information Loss During Machine Translation Between Polysynthetic and Fusional Languages.","venue":"CoRR","volume":"abs/1807.00286","year":"2018","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1807-00286","ee":"http://arxiv.org/abs/1807.00286","url":"https://dblp.org/rec/journals/corr/abs-1807-00286"}, "url":"URL#2707995" }, { "@score":"2", "@id":"2709963", "info":{"authors":{"author":{"@pid":"66/10823","text":"Robin Lamarche-Perrin"}},"title":"An Information-theoretic Framework for the Lossy Compression of Link Streams.","venue":"CoRR","volume":"abs/1807.06874","year":"2018","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1807-06874","ee":"http://arxiv.org/abs/1807.06874","url":"https://dblp.org/rec/journals/corr/abs-1807-06874"}, "url":"URL#2709963" }, { "@score":"2", "@id":"2723985", "info":{"authors":{"author":[{"@pid":"190/6982","text":"Amina Asif"},{"@pid":"08/10535","text":"Muhammad Dawood"},{"@pid":"45/10683","text":"Fayyaz ul Amir Afsar Minhas"}]},"title":"A generalized meta-loss function for distillation and learning using privileged information for classification and regression.","venue":"CoRR","volume":"abs/1811.06885","year":"2018","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1811-06885","ee":"http://arxiv.org/abs/1811.06885","url":"https://dblp.org/rec/journals/corr/abs-1811-06885"}, "url":"URL#2723985" }, { "@score":"2", "@id":"2767607", "info":{"authors":{"author":[{"@pid":"58/4382","text":"Erich Schmidt"},{"@pid":"124/5770","text":"Manfred Kaltenbacher"},{"@pid":"153/3087","text":"Anton Wolfschluckner"}]},"title":"Eddy current losses in permanent magnets of surface mounted permanent magnet synchronous machines - Analytical calculation and high order finite element analyses.","venue":"Elektrotech. Informationstechnik","volume":"134","number":"2","pages":"148-155","year":"2017","type":"Journal Articles","access":"open","key":"journals/ei/SchmidtKW17","doi":"10.1007/S00502-017-0498-Y","ee":"https://doi.org/10.1007/s00502-017-0498-y","url":"https://dblp.org/rec/journals/ei/SchmidtKW17"}, "url":"URL#2767607" }, { "@score":"3", "@id":"2769597", "info":{"authors":{"author":[{"@pid":"119/4993","text":"Daniel Chicharro"},{"@pid":"18/2874","text":"Stefano Panzeri"}]},"title":"Synergy and Redundancy in Dual Decompositions of Mutual Information Gain and Information Loss.","venue":"Entropy","volume":"19","number":"2","pages":"71","year":"2017","type":"Journal Articles","access":"open","key":"journals/entropy/ChicharroP17","doi":"10.3390/E19020071","ee":"https://doi.org/10.3390/e19020071","url":"https://dblp.org/rec/journals/entropy/ChicharroP17"}, "url":"URL#2769597" }, { "@score":"2", "@id":"2769735", "info":{"authors":{"author":[{"@pid":"45/11374","text":"Susan E. Hodge"},{"@pid":"58/5389","text":"Veronica J. Vieland"}]},"title":"Information Loss in Binomial Data Due to Data Compression.","venue":"Entropy","volume":"19","number":"2","pages":"75","year":"2017","type":"Journal Articles","access":"open","key":"journals/entropy/HodgeV17","doi":"10.3390/E19020075","ee":"https://doi.org/10.3390/e19020075","url":"https://dblp.org/rec/journals/entropy/HodgeV17"}, "url":"URL#2769735" }, { "@score":"2", "@id":"2770009", "info":{"authors":{"author":[{"@pid":"04/9062","text":"Yao Rong"},{"@pid":"184/0663","text":"Mengjiao Tang"},{"@pid":"00/5012-2","text":"Jie Zhou 0002"}]},"title":"Intrinsic Losses Based on Information Geometry and Their Applications.","venue":"Entropy","volume":"19","number":"8","pages":"405","year":"2017","type":"Journal Articles","access":"open","key":"journals/entropy/RongTZ17","doi":"10.3390/E19080405","ee":"https://doi.org/10.3390/e19080405","url":"https://dblp.org/rec/journals/entropy/RongTZ17"}, "url":"URL#2770009" }, { "@score":"2", "@id":"2788517", "info":{"authors":{"author":[{"@pid":"154/4219","text":"Salaheddine Kabou"},{"@pid":"99/6782","text":"Sidi Mohamed Benslimane"}]},"title":"A New Distributed Anonymization Protocol with Minimal Loss of Information.","venue":"Int. J. Organ. Collect. Intell.","volume":"7","number":"1","pages":"1-19","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijoci/KabouB17","doi":"10.4018/IJOCI.2017010101","ee":"https://doi.org/10.4018/IJOCI.2017010101","url":"https://dblp.org/rec/journals/ijoci/KabouB17"}, "url":"URL#2788517" }, { "@score":"2", "@id":"2796587", "info":{"authors":{"author":[{"@pid":"65/4610","text":"Yonghao Gu"},{"@pid":"135/7627","text":"Yongfei Wang"},{"@pid":"70/2539","text":"Zhen Yang"},{"@pid":"216/3920","text":"Yimu Gao"}]},"title":"A Distributed Privacy-Utility Tradeoff Method Using Distributed Lossy Source Coding with Side Information.","venue":"KSII Trans. Internet Inf. Syst.","volume":"11","number":"5","pages":"2778-2791","year":"2017","type":"Journal Articles","access":"open","key":"journals/itiis/GuWYG17","doi":"10.3837/TIIS.2017.05.026","ee":"https://doi.org/10.3837/tiis.2017.05.026","url":"https://dblp.org/rec/journals/itiis/GuWYG17"}, "url":"URL#2796587" }, { "@score":"2", "@id":"2796594", "info":{"authors":{"author":[{"@pid":"57/2703","text":"Longzhe Han"},{"@pid":"51/7802","text":"Xuecai Bao"},{"@pid":"50/2749","text":"Wenfeng Wang"},{"@pid":"207/8990","text":"Xiangsheng Feng"},{"@pid":"46/6521","text":"Zuhan Liu"},{"@pid":"191/8501","text":"Wenqun Tan"}]},"title":"A Receiver-Driven Loss Recovery Mechanism for Video Dissemination over Information-Centric VANET.","venue":"KSII Trans. Internet Inf. Syst.","volume":"11","number":"7","pages":"3465-3479","year":"2017","type":"Journal Articles","access":"open","key":"journals/itiis/HanBWFLT17","doi":"10.3837/TIIS.2017.07.009","ee":"https://doi.org/10.3837/tiis.2017.07.009","url":"https://dblp.org/rec/journals/itiis/HanBWFLT17"}, "url":"URL#2796594" }, { "@score":"2", "@id":"2801717", "info":{"authors":{"author":[{"@pid":"180/5394","text":"Konstantinos Gourgoulias"},{"@pid":"81/5454","text":"Markos A. Katsoulakis"},{"@pid":"75/4765","text":"Luc Rey-Bellet"}]},"title":"Information criteria for quantifying loss of reversibility in parallelized KMC.","venue":"J. Comput. Phys.","volume":"328","pages":"438-454","year":"2017","type":"Journal Articles","access":"closed","key":"journals/jcphy/GourgouliasKR17","doi":"10.1016/J.JCP.2016.10.031","ee":"https://doi.org/10.1016/j.jcp.2016.10.031","url":"https://dblp.org/rec/journals/jcphy/GourgouliasKR17"}, "url":"URL#2801717" }, { "@score":"2", "@id":"2807687", "info":{"authors":{"author":[{"@pid":"123/6759","text":"Herke van Hoof"},{"@pid":"60/4878","text":"Gerhard Neumann"},{"@pid":"p/JanPeters1","text":"Jan Peters 0001"}]},"title":"Non-parametric Policy Search with Limited Information Loss.","venue":"J. Mach. Learn. Res.","volume":"18","pages":"73:1-73:46","year":"2017","type":"Journal Articles","access":"open","key":"journals/jmlr/HoofNP17","ee":"http://jmlr.org/papers/v18/16-142.html","url":"https://dblp.org/rec/journals/jmlr/HoofNP17"}, "url":"URL#2807687" }, { "@score":"2", "@id":"2820914", "info":{"authors":{"author":[{"@pid":"54/4931","text":"Mingwen Wang"},{"@pid":"130/5413","text":"Dongming Tang"}]},"title":"Region of interest extraction for finger vein images with less information losses.","venue":"Multim. Tools Appl.","volume":"76","number":"13","pages":"14937-14949","year":"2017","type":"Journal Articles","access":"closed","key":"journals/mta/WangT17","doi":"10.1007/S11042-016-4285-2","ee":"https://doi.org/10.1007/s11042-016-4285-2","url":"https://dblp.org/rec/journals/mta/WangT17"}, "url":"URL#2820914" }, { "@score":"2", "@id":"2827761", "info":{"authors":{"author":[{"@pid":"63/6200","text":"Shifei Ding"},{"@pid":"177/5983","text":"Xiekai Zhang"},{"@pid":"192/5235","text":"Yuexuan An"},{"@pid":"05/6904-4","text":"Yu Xue 0004"}]},"title":"Weighted linear loss multiple birth support vector machine based on information granulation for multi-class classification.","venue":"Pattern Recognit.","volume":"67","pages":"32-46","year":"2017","type":"Journal Articles","access":"closed","key":"journals/pr/DingZAX17","doi":"10.1016/J.PATCOG.2017.02.011","ee":"https://doi.org/10.1016/j.patcog.2017.02.011","url":"https://dblp.org/rec/journals/pr/DingZAX17"}, "url":"URL#2827761" }, { "@score":"2", "@id":"2845107", "info":{"authors":{"author":[{"@pid":"46/1308","text":"Afsaneh Asaei"},{"@pid":"60/2378","text":"Milos Cernak"},{"@pid":"12/6705","text":"Hervé Bourlard"}]},"title":"Perceptual Information Loss due to Impaired Speech Production.","venue":"IEEE ACM Trans. Audio Speech Lang. Process.","volume":"25","number":"12","pages":"2433-2443","year":"2017","type":"Journal Articles","access":"closed","key":"journals/taslp/AsaeiCB17","doi":"10.1109/TASLP.2017.2738445","ee":"https://doi.org/10.1109/TASLP.2017.2738445","url":"https://dblp.org/rec/journals/taslp/AsaeiCB17"}, "url":"URL#2845107" }, { "@score":"2", "@id":"2865864", "info":{"authors":{"author":[{"@pid":"74/5221","text":"Avinash Srinivasan"},{"@pid":"204/4031","text":"Hunter Dong"},{"@pid":"14/5349","text":"Angelos Stavrou"}]},"title":"FROST: Anti-Forensics Digital-Dead-DROp Information Hiding RobuST to Detection & Data Loss with Fault tolerance.","venue":"ARES","pages":"82:1-82:8","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/IEEEares/SrinivasanDS17","doi":"10.1145/3098954.3106069","ee":"https://doi.org/10.1145/3098954.3106069","url":"https://dblp.org/rec/conf/IEEEares/SrinivasanDS17"}, "url":"URL#2865864" }, { "@score":"2", "@id":"2874621", "info":{"authors":{"author":[{"@pid":"97/6811","text":"Takashi Tanaka"},{"@pid":"15/4074","text":"Mikael Skoglund"},{"@pid":"50/2611","text":"Henrik Sandberg"},{"@pid":"81/3323","text":"Karl Henrik Johansson"}]},"title":"Directed information and privacy loss in cloud-based control.","venue":"ACC","pages":"1666-1672","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/amcc/TanakaSSJ17","doi":"10.23919/ACC.2017.7963192","ee":"https://doi.org/10.23919/ACC.2017.7963192","url":"https://dblp.org/rec/conf/amcc/TanakaSSJ17"}, "url":"URL#2874621" }, { "@score":"2", "@id":"2880535", "info":{"authors":{"author":[{"@pid":"173/6399","text":"Danny Websdale"},{"@pid":"57/9277","text":"Ben Milner"}]},"title":"Using visual speech information and perceptually motivated loss functions for binary mask estimation.","venue":"AVSP","pages":"41-46","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/avsp/WebsdaleM17","doi":"10.21437/AVSP.2017-9","ee":"https://doi.org/10.21437/AVSP.2017-9","url":"https://dblp.org/rec/conf/avsp/WebsdaleM17"}, "url":"URL#2880535" }, { "@score":"2", "@id":"2882448", "info":{"authors":{"author":[{"@pid":"b/PBaumann","text":"Peter Baumann 0001"},{"@pid":"183/1624","text":"Eric Hirschorn"},{"@pid":"35/9913","text":"Joan Masó"},{"@pid":"132/4908","text":"Vlad Merticariu"},{"@pid":"77/11245","text":"Dimitar Misev"}]},"title":"All in One: Encoding spatio-temporal big data in XML, JSON, and RDF without information loss.","venue":"IEEE BigData","pages":"3406-3415","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/bigdataconf/0001HMMM17","doi":"10.1109/BIGDATA.2017.8258326","ee":"https://doi.org/10.1109/BigData.2017.8258326","url":"https://dblp.org/rec/conf/bigdataconf/0001HMMM17"}, "url":"URL#2882448" }, { "@score":"2", "@id":"2882645", "info":{"authors":{"author":[{"@pid":"177/1788","text":"Lovedeep Gondara"},{"@pid":"w/KeWang","text":"Ke Wang 0001"}]},"title":"Recovering loss to followup information using denoising autoencoders.","venue":"IEEE BigData","pages":"1936-1945","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/bigdataconf/GondaraW17","doi":"10.1109/BIGDATA.2017.8258139","ee":"https://doi.org/10.1109/BigData.2017.8258139","url":"https://dblp.org/rec/conf/bigdataconf/GondaraW17"}, "url":"URL#2882645" }, { "@score":"2", "@id":"2896210", "info":{"authors":{"author":{"@pid":"03/6424","text":"Ahmed Khoumsi"}},"title":"Decentralized supervisory control of discrete event systems without loss of information.","venue":"CoDIT","pages":"510-515","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/codit/Khoumsi17","doi":"10.1109/CODIT.2017.8102644","ee":"https://doi.org/10.1109/CoDIT.2017.8102644","url":"https://dblp.org/rec/conf/codit/Khoumsi17"}, "url":"URL#2896210" }, { "@score":"2", "@id":"2925555", "info":{"authors":{"author":{"@pid":"05/8762","text":"Sung Soo Hwang"}},"title":"Automatic Information Loss Detection and Color Compensation for the Color Blind.","venue":"HCI","pages":"248-257","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/hci/Hwang17","doi":"10.1007/978-3-319-58634-2_19","ee":"https://doi.org/10.1007/978-3-319-58634-2_19","url":"https://dblp.org/rec/conf/hci/Hwang17"}, "url":"URL#2925555" }, { "@score":"2", "@id":"2938524", "info":{"authors":{"author":{"@pid":"48/5476","text":"Toshihiro Osaragi"}},"title":"Classification Method by Information Loss Minimization for Visualizing Spatial Data.","venue":"ICCSA","pages":"623-634","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iccsa/Osaragi17","doi":"10.1007/978-3-319-62407-5_45","ee":"https://doi.org/10.1007/978-3-319-62407-5_45","url":"https://dblp.org/rec/conf/iccsa/Osaragi17"}, "url":"URL#2938524" }, { "@score":"2", "@id":"2965179", "info":{"authors":{"author":[{"@pid":"204/2958","text":"Gangming Zhao"},{"@pid":"49/3441","text":"Jingdong Wang 0001"},{"@pid":"55/2285-1","text":"Zhaoxiang Zhang 0001"}]},"title":"Random Shifting for CNN: a Solution to Reduce Information Loss in Down-Sampling Layers.","venue":"IJCAI","pages":"3476-3482","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/ijcai/ZhaoWZ17","doi":"10.24963/IJCAI.2017/486","ee":"https://doi.org/10.24963/ijcai.2017/486","url":"https://dblp.org/rec/conf/ijcai/ZhaoWZ17"}, "url":"URL#2965179" }, { "@score":"2", "@id":"2975959", "info":{"authors":{"author":{"@pid":"07/3113","text":"Abdellatif Zaidi"}},"title":"Two-encoder multiterminal source coding with side information under logarithmic loss.","venue":"ISIT","pages":"724-728","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/Zaidi17","doi":"10.1109/ISIT.2017.8006623","ee":"https://doi.org/10.1109/ISIT.2017.8006623","url":"https://dblp.org/rec/conf/isit/Zaidi17"}, "url":"URL#2975959" }, { "@score":"2", "@id":"2985635", "info":{"authors":{"author":[{"@pid":"209/2355","text":"Hagen Sparka"},{"@pid":"150/0791","text":"Roman Naumann"},{"@pid":"26/8089","text":"Stefan Dietzel"},{"@pid":"15/503-1","text":"Björn Scheuermann 0001"}]},"title":"Effective Lossless Compression of Sensor Information in Manufacturing Industry.","venue":"LCN","pages":"480-488","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/lcn/SparkaNDS17","doi":"10.1109/LCN.2017.89","ee":"https://doi.org/10.1109/LCN.2017.89","url":"https://dblp.org/rec/conf/lcn/SparkaNDS17"}, "url":"URL#2985635" }, { "@score":"4", "@id":"3036369", "info":{"authors":{"author":[{"@pid":"81/11205","text":"Juan Antonio Lossio-Ventura"},{"@pid":"61/11335","text":"Hugo Alatrista-Salas"}]},"title":"Information Management and Big Data - Second Annual International Symposium, SIMBig 2015, Cusco, Peru, September 2-4, 2015, and Third Annual International Symposium, SIMBig 2016, Cusco, Peru, September 1-3, 2016, Revised Selected Papers","venue":["SIMBig","Communications in Computer and Information Science"],"volume":"656","publisher":"Springer","year":"2017","type":"Editorship","key":"conf/simbig/2016s","doi":"10.1007/978-3-319-55209-5","ee":"https://doi.org/10.1007/978-3-319-55209-5","url":"https://dblp.org/rec/conf/simbig/2016s"}, "url":"URL#3036369" }, { "@score":"3", "@id":"3036370", "info":{"authors":{"author":[{"@pid":"81/11205","text":"Juan Antonio Lossio-Ventura"},{"@pid":"61/11335","text":"Hugo Alatrista-Salas"}]},"title":"Proceedings of the 4th Annual International Symposium on Information Management and Big Data, SIMBig 2017, Lima, Peru, September 4-6, 2017.","venue":["SIMBig","CEUR Workshop Proceedings"],"volume":"2029","publisher":"CEUR-WS.org","year":"2017","type":"Editorship","access":"open","key":"conf/simbig/2017","ee":"https://ceur-ws.org/Vol-2029","url":"https://dblp.org/rec/conf/simbig/2017"}, "url":"URL#3036370" }, { "@score":"2", "@id":"3046691", "info":{"authors":{"author":[{"@pid":"167/7819","text":"Yeohee Im"},{"@pid":"v/SVerdu","text":"Sergio Verdú"}]},"title":"Optimal Universal Lossless Compression with Side Information.","venue":"CoRR","volume":"abs/1707.05421","year":"2017","type":"Informal and Other Publications","access":"open","key":"journals/corr/ImV17","ee":"http://arxiv.org/abs/1707.05421","url":"https://dblp.org/rec/journals/corr/ImV17"}, "url":"URL#3046691" }, { "@score":"2", "@id":"3052396", "info":{"authors":{"author":{"@pid":"96/577","text":"Nicolás Ruiz"}},"title":"On some consequences of the permutation paradigm for data anonymization: centrality of permutation matrices, universal measures of disclosure risk and information loss, evaluation by dominance.","venue":"CoRR","volume":"abs/1701.08419","year":"2017","type":"Informal and Other Publications","access":"open","key":"journals/corr/Ruiz17","ee":"http://arxiv.org/abs/1701.08419","url":"https://dblp.org/rec/journals/corr/Ruiz17"}, "url":"URL#3052396" }, { "@score":"2", "@id":"3056968", "info":{"authors":{"author":[{"@pid":"30/6937","text":"Shohei Hidaka"},{"@pid":"04/3708","text":"Masafumi Oizumi"}]},"title":"Fast and exact search for the partition with minimal information loss.","venue":"CoRR","volume":"abs/1708.01444","year":"2017","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1708-01444","ee":"http://arxiv.org/abs/1708.01444","url":"https://dblp.org/rec/journals/corr/abs-1708-01444"}, "url":"URL#3056968" }, { "@score":"2", "@id":"3062960", "info":{"authors":{"author":[{"@pid":"75/4734-1","text":"Tomoya Sakai 0001"},{"@pid":"26/3367-1","text":"Gang Niu 0001"},{"@pid":"35/1228","text":"Masashi Sugiyama"}]},"title":"Estimation of Squared-Loss Mutual Information from Positive and Unlabeled Data.","venue":"CoRR","volume":"abs/1710.05359","year":"2017","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1710-05359","ee":"http://arxiv.org/abs/1710.05359","url":"https://dblp.org/rec/journals/corr/abs-1710-05359"}, "url":"URL#3062960" }, { "@score":"2", "@id":"3065319", "info":{"authors":{"author":[{"@pid":"150/7250","text":"Thodoris Lykouris"},{"@pid":"s/KarthikSridharan","text":"Karthik Sridharan"},{"@pid":"t/EvaTardos","text":"Éva Tardos"}]},"title":"Small-loss bounds for online learning with partial information.","venue":"CoRR","volume":"abs/1711.03639","year":"2017","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1711-03639","ee":"http://arxiv.org/abs/1711.03639","url":"https://dblp.org/rec/journals/corr/abs-1711-03639"}, "url":"URL#3065319" }, { "@score":"2", "@id":"3092660", "info":{"authors":{"author":[{"@pid":"133/0986","text":"Shreelekha Pandey"},{"@pid":"75/3036","text":"Pritee Khanna"}]},"title":"Content-based image retrieval embedded with agglomerative clustering built on information loss.","venue":"Comput. Electr. Eng.","volume":"54","pages":"506-521","year":"2016","type":"Journal Articles","access":"closed","key":"journals/cee/PandeyK16","doi":"10.1016/J.COMPELECENG.2016.04.003","ee":"https://doi.org/10.1016/j.compeleceng.2016.04.003","url":"https://dblp.org/rec/journals/cee/PandeyK16"}, "url":"URL#3092660" }, { "@score":"2", "@id":"3098606", "info":{"authors":{"author":[{"@pid":"z/HectorZenilChavez","text":"Hector Zenil"},{"@pid":"116/4558","text":"Narsis Aftab Kiani"},{"@pid":"24/4407","text":"Jesper Tegnér"}]},"title":"Quantifying loss of information in network-based dimensionality reduction techniques.","venue":"J. Complex Networks","volume":"4","number":"3","pages":"342-362","year":"2016","type":"Journal Articles","access":"closed","key":"journals/compnet/ZenilKT16","doi":"10.1093/COMNET/CNV025","ee":"https://doi.org/10.1093/comnet/cnv025","url":"https://dblp.org/rec/journals/compnet/ZenilKT16"}, "url":"URL#3098606" }, { "@score":"2", "@id":"3143208", "info":{"authors":{"author":[{"@pid":"48/2168","text":"Yuan Zhang"},{"@pid":"144/6046","text":"Navid Rahbari Asr"},{"@pid":"94/2277","text":"Mo-Yuen Chow"}]},"title":"A robust distributed system incremental cost estimation algorithm for smart grid economic dispatch with communications information losses.","venue":"J. Netw. Comput. Appl.","volume":"59","pages":"315-324","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jnca/ZhangAC16","doi":"10.1016/J.JNCA.2015.05.014","ee":"https://doi.org/10.1016/j.jnca.2015.05.014","url":"https://dblp.org/rec/journals/jnca/ZhangAC16"}, "url":"URL#3143208" }, { "@score":"2", "@id":"3184163", "info":{"authors":{"author":[{"@pid":"169/5585","text":"Chongyi Li"},{"@pid":"08/10219","text":"Jichang Guo"},{"@pid":"180/7852","text":"Runmin Cong"},{"@pid":"35/5889","text":"Yanwei Pang"},{"@pid":"72/6811-11","text":"Bo Wang 0011"}]},"title":"Underwater Image Enhancement by Dehazing With Minimum Information Loss and Histogram Distribution Prior.","venue":"IEEE Trans. Image Process.","volume":"25","number":"12","pages":"5664-5677","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tip/LiGCPW16","doi":"10.1109/TIP.2016.2612882","ee":"https://doi.org/10.1109/TIP.2016.2612882","url":"https://dblp.org/rec/journals/tip/LiGCPW16"}, "url":"URL#3184163" }, { "@score":"2", "@id":"3184742", "info":{"authors":{"author":[{"@pid":"61/857","text":"Mikhail Ivanov"},{"@pid":"119/4848","text":"Christian Häger"},{"@pid":"56/5920","text":"Fredrik Brannstrom"},{"@pid":"95/3707","text":"Alexandre Graell i Amat"},{"@pid":"67/1810","text":"Alex Alvarado"},{"@pid":"92/6506","text":"Erik Agrell"}]},"title":"On the Information Loss of the Max-Log Approximation in BICM Systems.","venue":"IEEE Trans. Inf. Theory","volume":"62","number":"6","pages":"3011-3025","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tit/IvanovHBAAA16","doi":"10.1109/TIT.2016.2543740","ee":"https://doi.org/10.1109/TIT.2016.2543740","url":"https://dblp.org/rec/journals/tit/IvanovHBAAA16"}, "url":"URL#3184742" }, { "@score":"2", "@id":"3184980", "info":{"authors":{"author":[{"@pid":"06/8656","text":"Ge Xu"},{"@pid":"49/3283-17","text":"Wei Liu 0017"},{"@pid":"98/449","text":"Biao Chen"}]},"title":"A Lossy Source Coding Interpretation of Wyner's Common Information.","venue":"IEEE Trans. Inf. Theory","volume":"62","number":"2","pages":"754-768","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tit/XuLC16","doi":"10.1109/TIT.2015.2506560","ee":"https://doi.org/10.1109/TIT.2015.2506560","url":"https://dblp.org/rec/journals/tit/XuLC16"}, "url":"URL#3184980" }, { "@score":"2", "@id":"3232070", "info":{"authors":{"author":[{"@pid":"152/6263","text":"Andrei Sechelea"},{"@pid":"87/4387","text":"Adrian Munteanu 0001"},{"@pid":"00/340","text":"Samuel Cheng 0001"},{"@pid":"90/5258","text":"Nikos Deligiannis"}]},"title":"The Rate Loss in Binary Source Coding with Decoder Side Information.","venue":"DCC","pages":"633","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/dcc/SecheleaMCD16","doi":"10.1109/DCC.2016.62","ee":"https://doi.org/10.1109/DCC.2016.62","url":"https://dblp.org/rec/conf/dcc/SecheleaMCD16"}, "url":"URL#3232070" }, { "@score":"2", "@id":"3240781", "info":{"authors":{"author":[{"@pid":"06/2610","text":"Thomas Buchmann"},{"@pid":"136/2069","text":"Felix Schwägerl"}]},"title":"Breaking the Boundaries of Meta Models and Preventing Information Loss in Model-Driven Software Product Lines.","venue":"ENASE","pages":"73-83","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/enase/BuchmannS16","doi":"10.5220/0005789100730083","ee":"https://doi.org/10.5220/0005789100730083","url":"https://dblp.org/rec/conf/enase/BuchmannS16"}, "url":"URL#3240781" }, { "@score":"2", "@id":"3241482", "info":{"authors":{"author":{"@pid":"88/4106","text":"Gaëlle Loosli"}},"title":"Study on the loss of information caused by the "positivation" of graph kernels for 3D shapes.","venue":"ESANN","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/esann/Loosli16","ee":"https://www.esann.org/sites/default/files/proceedings/legacy/es2016-14.pdf","url":"https://dblp.org/rec/conf/esann/Loosli16"}, "url":"URL#3241482" }, { "@score":"2", "@id":"3244725", "info":{"authors":{"author":[{"@pid":"182/0724","text":"Sergey V. Makov"},{"@pid":"193/1932","text":"Anton Nikitin"},{"@pid":"193/1985","text":"Alexandr Minaev"},{"@pid":"169/7606","text":"Viacheslav V. Voronin"},{"@pid":"193/2044","text":"Ilya Svirin"}]},"title":"Method of additional information encapsulation into digital audio channel with minimal loss of original signal quality.","venue":"EWDTS","pages":"1-4","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/ewdts/MakovNMVS16","doi":"10.1109/EWDTS.2016.7807755","ee":"https://doi.org/10.1109/EWDTS.2016.7807755","url":"https://dblp.org/rec/conf/ewdts/MakovNMVS16"}, "url":"URL#3244725" }, { "@score":"2", "@id":"3247764", "info":{"authors":{"author":{"@pid":"144/3263","text":"Daniel Clarke"}},"title":"Minimum information loss fusion in distributed sensor networks.","venue":"FUSION","pages":"1057-1062","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/fusion/Clarke16","ee":"https://ieeexplore.ieee.org/document/7528002/","url":"https://dblp.org/rec/conf/fusion/Clarke16"}, "url":"URL#3247764" }, { "@score":"2", "@id":"3252997", "info":{"authors":{"author":{"@pid":"05/8762","text":"Sung Soo Hwang"}},"title":"Robust Design: An Image Analysis Tool for Analyzing Information Loss Caused by Viewers and Environments.","venue":"HCI","pages":"159-166","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hci/Hwang16","doi":"10.1007/978-3-319-40406-6_15","ee":"https://doi.org/10.1007/978-3-319-40406-6_15","url":"https://dblp.org/rec/conf/hci/Hwang16"}, "url":"URL#3252997" }, { "@score":"2", "@id":"3270705", "info":{"authors":{"author":[{"@pid":"169/5585","text":"Chongyi Li"},{"@pid":"08/10219","text":"Jichang Guo"},{"@pid":"180/2669","text":"Shanji Chen"},{"@pid":"133/4164","text":"Yibin Tang"},{"@pid":"35/5889","text":"Yanwei Pang"},{"@pid":"39/449-87","text":"Jian Wang 0087"}]},"title":"Underwater image restoration based on minimum information loss principle and optical properties of underwater imaging.","venue":"ICIP","pages":"1993-1997","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icip/LiGCTPW16","doi":"10.1109/ICIP.2016.7532707","ee":"https://doi.org/10.1109/ICIP.2016.7532707","url":"https://dblp.org/rec/conf/icip/LiGCTPW16"}, "url":"URL#3270705" }, { "@score":"2", "@id":"3304468", "info":{"authors":{"author":[{"@pid":"96/7431","text":"Dalibor Stys"},{"@pid":"26/11031","text":"Tomás Náhlík"},{"@pid":"144/4626","text":"Petr Machácek"},{"@pid":"160/3749","text":"Renata Rychtáriková"},{"@pid":"144/7923","text":"Mohammadmehdi Saberioon"}]},"title":"Least Information Loss (LIL) Conversion of Digital Images and Lessons Learned for Scientific Image Inspection.","venue":"IWBBIO","pages":"527-536","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwbbio/StysNMRS16","doi":"10.1007/978-3-319-31744-1_47","ee":"https://doi.org/10.1007/978-3-319-31744-1_47","url":"https://dblp.org/rec/conf/iwbbio/StysNMRS16"}, "url":"URL#3304468" }, { "@score":"2", "@id":"3323074", "info":{"authors":{"author":[{"@pid":"23/1092-3","text":"Song Wu 0003"},{"@pid":"31/992","text":"Michael S. Lew"}]},"title":"Comparison of Information Loss Architectures in CNNs.","venue":"PCM","pages":"346-354","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/pcm/WuL16","doi":"10.1007/978-3-319-48896-7_34","ee":"https://doi.org/10.1007/978-3-319-48896-7_34","url":"https://dblp.org/rec/conf/pcm/WuL16"}, "url":"URL#3323074" }, { "@score":"2", "@id":"3333898", "info":{"authors":{"author":{"@pid":"163/4684","text":"Kayla M. Booth"}},"title":"From "Weight Loss Tips" to "Fastest Exercise to Get Abs": How Teens Search for Fitness Information Across Social Media Platforms.","venue":"CPR","pages":"23-24","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcpr/Booth16a","doi":"10.1145/2890602.2906196","ee":"https://doi.org/10.1145/2890602.2906196","url":"https://dblp.org/rec/conf/sigcpr/Booth16a"}, "url":"URL#3333898" }, { "@score":"2", "@id":"3351660", "info":{"authors":{"author":[{"@pid":"225/6330","text":"Jian Lu"},{"@pid":"132/8049","text":"Yinfei Xu"},{"@pid":"13/4682","text":"Ping Zhang"},{"@pid":"03/8281","text":"Man Feng"},{"@pid":"25/1593","text":"Qiao Wang"}]},"title":"Binary lossy coding problem with encoder side information and common reconstruction constraint.","venue":"WCSP","pages":"1-5","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/wcsp/LuXZFW16","doi":"10.1109/WCSP.2016.7752468","ee":"https://doi.org/10.1109/WCSP.2016.7752468","url":"https://dblp.org/rec/conf/wcsp/LuXZFW16"}, "url":"URL#3351660" }, { "@score":"3", "@id":"3360808", "info":{"authors":{"author":[{"@pid":"81/11205","text":"Juan Antonio Lossio-Ventura"},{"@pid":"61/11335","text":"Hugo Alatrista-Salas"}]},"title":"Proceedings of the 3rd Annual International Symposium on Information Management and Big Data - SIMBig 2016, Cusco, Peru, September 1-3, 2016.","venue":["SIMBig","CEUR Workshop Proceedings"],"volume":"1743","publisher":"CEUR-WS.org","year":"2016","type":"Editorship","access":"open","key":"conf/simbig/2016","ee":"https://ceur-ws.org/Vol-1743","url":"https://dblp.org/rec/conf/simbig/2016"}, "url":"URL#3360808" }, { "@score":"3", "@id":"3365908", "info":{"authors":{"author":[{"@pid":"25/6012","text":"Charalambos D. Charalambous"},{"@pid":"03/8134","text":"Christos K. Kourtellaris"},{"@pid":"90/427","text":"Sergey Loyka"}]},"title":"Capacity Achieving Distributions & Information Lossless Randomized Strategies for Feedback Channels with Memory: The LQG Theory of Directed Information-Part II.","venue":"CoRR","volume":"abs/1604.01056","year":"2016","type":"Informal and Other Publications","access":"open","key":"journals/corr/CharalambousKL16","ee":"http://arxiv.org/abs/1604.01056","url":"https://dblp.org/rec/journals/corr/CharalambousKL16"}, "url":"URL#3365908" }, { "@score":"2", "@id":"3367933", "info":{"authors":{"author":[{"@pid":"41/439","text":"John C. Duchi"},{"@pid":"140/4732","text":"Khashayar Khosravi"},{"@pid":"61/7353","text":"Feng Ruan"}]},"title":"Information Measures, Experiments, Multi-category Hypothesis Tests, and Surrogate Losses.","venue":"CoRR","volume":"abs/1603.00126","year":"2016","type":"Informal and Other Publications","access":"open","key":"journals/corr/DuchiKR16","ee":"http://arxiv.org/abs/1603.00126","url":"https://dblp.org/rec/journals/corr/DuchiKR16"}, "url":"URL#3367933" }, { "@score":"2", "@id":"3369991", "info":{"authors":{"author":[{"@pid":"180/5394","text":"Konstantinos Gourgoulias"},{"@pid":"81/5454","text":"Markos A. Katsoulakis"},{"@pid":"75/4765","text":"Luc Rey-Bellet"}]},"title":"Information Criteria for quantifying loss of reversibility in parallelized KMC.","venue":"CoRR","volume":"abs/1605.02375","year":"2016","type":"Informal and Other Publications","access":"open","key":"journals/corr/GourgouliasKR16","ee":"http://arxiv.org/abs/1605.02375","url":"https://dblp.org/rec/journals/corr/GourgouliasKR16"}, "url":"URL#3369991" }, { "@score":"2", "@id":"3381140", "info":{"authors":{"author":[{"@pid":"198/5058","text":"Simon Stolarczyk"},{"@pid":"172/3722","text":"Manisha Bhardwaj"},{"@pid":"37/6135","text":"Kevin E. Bassler"},{"@pid":"39/311","text":"Wei Ji Ma"},{"@pid":"37/4056","text":"Kresimir Josic"}]},"title":"Loss of information in feedforward social networks.","venue":"CoRR","volume":"abs/1609.09529","year":"2016","type":"Informal and Other Publications","access":"open","key":"journals/corr/StolarczykBBMJ16","ee":"http://arxiv.org/abs/1609.09529","url":"https://dblp.org/rec/journals/corr/StolarczykBBMJ16"}, "url":"URL#3381140" }, { "@score":"2", "@id":"3381375", "info":{"authors":{"author":[{"@pid":"97/2264","text":"Hengky Susanto"},{"@pid":"34/1537","text":"Byung-Guk Kim"}]},"title":"Practical Recovery Solution for Information Loss in Real-Time Network Environment.","venue":"CoRR","volume":"abs/1604.02526","year":"2016","type":"Informal and Other Publications","access":"open","key":"journals/corr/SusantoK16","ee":"http://arxiv.org/abs/1604.02526","url":"https://dblp.org/rec/journals/corr/SusantoK16"}, "url":"URL#3381375" }, { "@score":"2", "@id":"3383890", "info":{"authors":{"author":[{"@pid":"04/4176","text":"Yaoqing Yang"},{"@pid":"54/5626","text":"Pulkit Grover"},{"@pid":"31/2011","text":"Soummya Kar"}]},"title":"Rate Distortion for Lossy In-network Function Computation: Information Dissipation and Sequential Reverse Water-Filling.","venue":"CoRR","volume":"abs/1601.06224","year":"2016","type":"Informal and Other Publications","access":"open","key":"journals/corr/YangGK16","ee":"http://arxiv.org/abs/1601.06224","url":"https://dblp.org/rec/journals/corr/YangGK16"}, "url":"URL#3383890" }, { "@score":"2", "@id":"3419940", "info":{"authors":{"author":[{"@pid":"06/8177","text":"Bernhard Weiss"},{"@pid":"161/4123","text":"Harald Polt"},{"@pid":"161/4018","text":"Christoph Geschrey"},{"@pid":"16/3756","text":"Manfred Schrödl"}]},"title":"Investigation of inverter-based losses and magnet-temperatures of a 1 MVA permanent magnet synchronous generator via a 25 kVA physical model.","venue":"Elektrotech. Informationstechnik","volume":"132","number":"1","pages":"3-10","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ei/WeissPGS15","doi":"10.1007/S00502-014-0274-1","ee":"https://doi.org/10.1007/s00502-014-0274-1","url":"https://dblp.org/rec/journals/ei/WeissPGS15"}, "url":"URL#3419940" }, { "@score":"2", "@id":"3419941", "info":{"authors":{"author":[{"@pid":"06/8177","text":"Bernhard Weiss"},{"@pid":"161/4123","text":"Harald Polt"},{"@pid":"161/4018","text":"Christoph Geschrey"},{"@pid":"16/3756","text":"Manfred Schrödl"}]},"title":"Erratum to: Investigation of inverter-based losses and magnet-temperatures of a 1 MVA permanent magnet synchronous generator via a 25 kVA physical model.","venue":"Elektrotech. Informationstechnik","volume":"132","number":"1","pages":"95","year":"2015","type":"Journal Articles","access":"open","key":"journals/ei/WeissPGS15a","doi":"10.1007/S00502-015-0285-6","ee":"https://doi.org/10.1007/s00502-015-0285-6","url":"https://dblp.org/rec/journals/ei/WeissPGS15a"}, "url":"URL#3419941" }, { "@score":"2", "@id":"3424684", "info":{"authors":{"author":[{"@pid":"160/4509","text":"Arash Kermani Kolankeh"},{"@pid":"82/11354","text":"Michael Teichmann"},{"@pid":"69/1370","text":"Fred H. Hamker"}]},"title":"Competition improves robustness against loss of information.","venue":"Frontiers Comput. Neurosci.","volume":"9","pages":"35","year":"2015","type":"Journal Articles","access":"open","key":"journals/ficn/KolankehTH15","doi":"10.3389/FNCOM.2015.00035","ee":"https://doi.org/10.3389/fncom.2015.00035","url":"https://dblp.org/rec/journals/ficn/KolankehTH15"}, "url":"URL#3424684" }, { "@score":"2", "@id":"3427186", "info":{"authors":{"author":[{"@pid":"31/11057","text":"Zhiling Tu"},{"@pid":"06/6156","text":"Ofir Turel"},{"@pid":"46/6764","text":"Yufei Yuan"},{"@pid":"69/1007","text":"Norman P. Archer"}]},"title":"Learning to cope with information security risks regarding mobile device loss or theft: An empirical examination.","venue":"Inf. Manag.","volume":"52","number":"4","pages":"506-517","year":"2015","type":"Journal Articles","access":"closed","key":"journals/iam/TuTYA15","doi":"10.1016/J.IM.2015.03.002","ee":"https://doi.org/10.1016/j.im.2015.03.002","url":"https://dblp.org/rec/journals/iam/TuTYA15"}, "url":"URL#3427186" }, { "@score":"2", "@id":"3431172", "info":{"authors":{"author":[{"@pid":"43/4547","text":"Unil Yun"},{"@pid":"48/10171","text":"Gwangbum Pyun"},{"@pid":"24/6820","text":"Eunchul Yoon"}]},"title":"Efficient Mining of Robust Closed Weighted Sequential Patterns Without Information Loss.","venue":"Int. J. Artif. Intell. Tools","volume":"24","number":"1","pages":"1550007:1-1550007:28","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijait/YunPY15","doi":"10.1142/S0218213015500074","ee":"https://doi.org/10.1142/S0218213015500074","url":"https://dblp.org/rec/journals/ijait/YunPY15"}, "url":"URL#3431172" }, { "@score":"2", "@id":"3435620", "info":{"authors":{"author":[{"@pid":"163/2934","text":"Ourania Kounadi"},{"@pid":"40/2581","text":"Michael Leitner"}]},"title":"Defining a Threshold Value for Maximum Spatial Information Loss of Masked Geo-Data.","venue":"ISPRS Int. J. Geo Inf.","volume":"4","number":"2","pages":"572-590","year":"2015","type":"Journal Articles","access":"open","key":"journals/ijgi/KounadiL15","doi":"10.3390/IJGI4020572","ee":"https://doi.org/10.3390/ijgi4020572","url":"https://dblp.org/rec/journals/ijgi/KounadiL15"}, "url":"URL#3435620" }, { "@score":"2", "@id":"3447377", "info":{"authors":{"author":[{"@pid":"93/1625","text":"Florian Kohlmayer"},{"@pid":"94/7923","text":"Fabian Prasser"},{"@pid":"61/6295","text":"Klaus A. Kuhn"}]},"title":"The cost of quality: Implementing generalization and suppression for anonymizing biomedical data with minimal information loss.","venue":"J. Biomed. Informatics","volume":"58","pages":"37-48","year":"2015","type":"Journal Articles","access":"open","key":"journals/jbi/KohlmayerPK15","doi":"10.1016/J.JBI.2015.09.007","ee":"https://doi.org/10.1016/j.jbi.2015.09.007","url":"https://dblp.org/rec/journals/jbi/KohlmayerPK15"}, "url":"URL#3447377" }, { "@score":"2", "@id":"3454626", "info":{"authors":{"author":[{"@pid":"171/6921","text":"Tomio Miwa"},{"@pid":"171/6931","text":"Yosuke Ishiguro"},{"@pid":"19/1207","text":"Toshiyuki Yamamoto"},{"@pid":"125/0003","text":"Takayuki Morikawa"}]},"title":"Allocation Planning for Probe Taxi Devices Aimed at Minimizing Losses to Travel Time Information Users.","venue":"J. Intell. Transp. Syst.","volume":"19","number":"4","pages":"399-410","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jits/MiwaIYM15","doi":"10.1080/15472450.2014.995760","ee":"https://doi.org/10.1080/15472450.2014.995760","url":"https://dblp.org/rec/journals/jits/MiwaIYM15"}, "url":"URL#3454626" }, { "@score":"2", "@id":"3469001", "info":{"authors":{"author":[{"@pid":"158/9980","text":"Santiago Moral"},{"@pid":"158/9948","text":"Victor Chapela"},{"@pid":"29/5053","text":"Regino Criado"},{"@pid":"85/2562","text":"Miguel Romance"}]},"title":"Efficient algorithms for estimating loss of information in a complex network: Applications to intentional risk analysis.","venue":"Networks Heterog. Media","volume":"10","number":"1","pages":"195-208","year":"2015","type":"Journal Articles","access":"closed","key":"journals/nhm/MoralCCR15","doi":"10.3934/NHM.2015.10.195","ee":"https://doi.org/10.3934/nhm.2015.10.195","url":"https://dblp.org/rec/journals/nhm/MoralCCR15"}, "url":"URL#3469001" }, { "@score":"2", "@id":"3470716", "info":{"authors":{"author":[{"@pid":"56/4937","text":"Makoto Yamada"},{"@pid":"09/4991","text":"Leonid Sigal"},{"@pid":"75/8610","text":"Michalis Raptis"},{"@pid":"39/446","text":"Machiko Toyoda"},{"@pid":"02/5438","text":"Yi Chang 0001"},{"@pid":"35/1228","text":"Masashi Sugiyama"}]},"title":"Cross-Domain Matching with Squared-Loss Mutual Information.","venue":"IEEE Trans. Pattern Anal. Mach. Intell.","volume":"37","number":"9","pages":"1764-1776","year":"2015","type":"Journal Articles","access":"closed","key":"journals/pami/YamadaSRTCS15","doi":"10.1109/TPAMI.2014.2388235","ee":"https://doi.org/10.1109/TPAMI.2014.2388235","url":"https://dblp.org/rec/journals/pami/YamadaSRTCS15"}, "url":"URL#3470716" }, { "@score":"2", "@id":"3472081", "info":{"authors":{"author":{"@pid":"07/700","text":"Glen E. Holt"}},"title":"Additional Information on Drugs and Hearing Loss.","venue":"Public Libr. Q.","volume":"34","number":"1","pages":"97-98","year":"2015","type":"Journal Articles","access":"closed","key":"journals/plq/Holt15","doi":"10.1080/01616846.2015.1000788","ee":"https://doi.org/10.1080/01616846.2015.1000788","url":"https://dblp.org/rec/journals/plq/Holt15"}, "url":"URL#3472081" }, { "@score":"2", "@id":"3481235", "info":{"authors":{"author":{"@pid":"176/2575","text":"Jasmin Hammon"}},"title":"Alterity and freedom of information on the internet: the loss of net neutrality in contemporary literature.","venue":"SIGCAS Comput. Soc.","volume":"45","number":"3","pages":"91-99","year":"2015","type":"Journal Articles","access":"closed","key":"journals/sigcas/Hammon15","doi":"10.1145/2874239.2874253","ee":"https://doi.org/10.1145/2874239.2874253","url":"https://dblp.org/rec/journals/sigcas/Hammon15"}, "url":"URL#3481235" }, { "@score":"2", "@id":"3494309", "info":{"authors":{"author":[{"@pid":"08/7480","text":"Yeow-Khiang Chia"},{"@pid":"76/11150","text":"Hon Fah Chong"}]},"title":"On Lossy Source Coding With Side Information Under the Erasure Distortion Measure.","venue":"IEEE Trans. Inf. Theory","volume":"61","number":"12","pages":"6475-6484","year":"2015","type":"Journal Articles","access":"closed","key":"journals/tit/ChiaC15","doi":"10.1109/TIT.2015.2484352","ee":"https://doi.org/10.1109/TIT.2015.2484352","url":"https://dblp.org/rec/journals/tit/ChiaC15"}, "url":"URL#3494309" }, { "@score":"2", "@id":"3494418", "info":{"authors":{"author":[{"@pid":"43/8919","text":"Jiantao Jiao"},{"@pid":"23/7883","text":"Thomas A. Courtade"},{"@pid":"14/10360","text":"Kartik Venkat"},{"@pid":"34/2720","text":"Tsachy Weissman"}]},"title":"Justification of Logarithmic Loss via the Benefit of Side Information.","venue":"IEEE Trans. Inf. Theory","volume":"61","number":"10","pages":"5357-5365","year":"2015","type":"Journal Articles","access":"closed","key":"journals/tit/JiaoCVW15","doi":"10.1109/TIT.2015.2462848","ee":"https://doi.org/10.1109/TIT.2015.2462848","url":"https://dblp.org/rec/journals/tit/JiaoCVW15"}, "url":"URL#3494418" }, { "@score":"2", "@id":"3503007", "info":{"authors":{"author":[{"@pid":"36/1499","text":"Hojin Ha"},{"@pid":"89/189","text":"Changhoon Yim"}]},"title":"Scalable Video Transmission Over Wireless Networks Based on Loss Distribution and Layer Information.","venue":"Wirel. Pers. Commun.","volume":"83","number":"3","pages":"2013-2028","year":"2015","type":"Journal Articles","access":"closed","key":"journals/wpc/HaY15","doi":"10.1007/S11277-015-2500-5","ee":"https://doi.org/10.1007/s11277-015-2500-5","url":"https://dblp.org/rec/journals/wpc/HaY15"}, "url":"URL#3503007" }, { "@score":"2", "@id":"3509301", "info":{"authors":{"author":[{"@pid":"92/9827","text":"Pooria Pakrooh"},{"@pid":"75/5222","text":"Ali Pezeshki"},{"@pid":"39/2447","text":"Louis L. Scharf"},{"@pid":"75/4742","text":"Douglas Cochran"},{"@pid":"27/5242","text":"Stephen D. Howard"}]},"title":"Distribution of the Fisher information loss due to random compressed sensing.","venue":"ACSSC","pages":"1487-1489","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/acssc/PakroohPSCH15","doi":"10.1109/ACSSC.2015.7421392","ee":"https://doi.org/10.1109/ACSSC.2015.7421392","url":"https://dblp.org/rec/conf/acssc/PakroohPSCH15"}, "url":"URL#3509301" }, { "@score":"2", "@id":"3512028", "info":{"authors":{"author":[{"@pid":"04/4176","text":"Yaoqing Yang"},{"@pid":"54/5626","text":"Pulkit Grover"},{"@pid":"31/2011","text":"Soummya Kar"}]},"title":"Information dissipation in noiseless lossy in-network function computation.","venue":"Allerton","pages":"445-452","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/allerton/YangGK15","doi":"10.1109/ALLERTON.2015.7447038","ee":"https://doi.org/10.1109/ALLERTON.2015.7447038","url":"https://dblp.org/rec/conf/allerton/YangGK15"}, "url":"URL#3512028" }, { "@score":"2", "@id":"3516494", "info":{"authors":{"author":[{"@pid":"65/10838","text":"He-Ming Ruan"},{"@pid":"165/7654","text":"Ming-Hwa Tsai"},{"@pid":"84/3147","text":"Yennun Huang"},{"@pid":"36/2081","text":"Yen-Hua Liao"},{"@pid":"31/3229","text":"Chin-Laung Lei"}]},"title":"Discovery of De-identification Policies Considering Re-identification Risks and Information Loss.","venue":"AsiaJCIS","pages":"69-76","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asiajcis/RuanTHLL15","doi":"10.1109/ASIAJCIS.2015.23","ee":"https://doi.org/10.1109/AsiaJCIS.2015.23","url":"https://dblp.org/rec/conf/asiajcis/RuanTHLL15"}, "url":"URL#3516494" }, { "@score":"2", "@id":"3536135", "info":{"authors":{"author":[{"@pid":"236/9356","text":"Jang Ho Yun"},{"@pid":"166/0889","text":"In-Hyun Cho"},{"@pid":"43/730","text":"Kyung Ho Lee"}]},"title":"FAIR-Based Loss Measurement Model for Enterprise Personal Information Breach.","venue":"CSA/CUTE","pages":"825-833","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/YunCL15","doi":"10.1007/978-981-10-0281-6_116","ee":"https://doi.org/10.1007/978-981-10-0281-6_116","url":"https://dblp.org/rec/conf/csa2/YunCL15"}, "url":"URL#3536135" }, { "@score":"2", "@id":"3543098", "info":{"authors":{"author":[{"@pid":"145/9872","text":"Mariam Ibrahim"},{"@pid":"85/5901-2","text":"Jun Chen 0002"},{"@pid":"12/2833-1","text":"Ratnesh Kumar 0001"}]},"title":"An information theoretic measure for secrecy loss in stochastic discrete event systems.","venue":"ECAI","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecai2/Ibrahim0015","doi":"10.1109/ECAI.2015.7301204","ee":"https://doi.org/10.1109/ECAI.2015.7301204","url":"https://dblp.org/rec/conf/ecai2/Ibrahim0015"}, "url":"URL#3543098" }, { "@score":"2", "@id":"3544241", "info":{"authors":{"author":[{"@pid":"252/7191","text":"Luis Romero Cortés"},{"@pid":"252/9585","text":"Reza Maram"},{"@pid":"23/2115","text":"José Azaña"}]},"title":"Spectral compression of complex-modulated signals without loss of information by joint temporal-spectral self-imaging.","venue":"ECOC","pages":"1-3","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecoc/CortesMA15","doi":"10.1109/ECOC.2015.7341742","ee":"https://doi.org/10.1109/ECOC.2015.7341742","url":"https://dblp.org/rec/conf/ecoc/CortesMA15"}, "url":"URL#3544241" }, { "@score":"2", "@id":"3583906", "info":{"authors":{"author":[{"@pid":"162/1118","text":"Aderonke Busayo Sakpere"},{"@pid":"48/6963","text":"Anne V. D. M. Kayem"}]},"title":"Adaptive Buffer Resizing for Efficient Anonymization of Streaming Data with Minimal Information Loss.","venue":"ICISSP","pages":"191-201","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icissp/SakpereK15","doi":"10.5220/0005288901910201","ee":"https://doi.org/10.5220/0005288901910201","url":"https://dblp.org/rec/conf/icissp/SakpereK15"}, "url":"URL#3583906" }, { "@score":"2", "@id":"3609570", "info":{"authors":{"author":[{"@pid":"83/4575","text":"Ryo Nomura"},{"@pid":"97/4261","text":"Hideki Yagi"}]},"title":"Information spectrum approach to fixed-length lossy source coding problem with some excess distortion probability.","venue":"ISIT","pages":"306-310","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/NomuraY15","doi":"10.1109/ISIT.2015.7282466","ee":"https://doi.org/10.1109/ISIT.2015.7282466","url":"https://dblp.org/rec/conf/isit/NomuraY15"}, "url":"URL#3609570" }, { "@score":"2", "@id":"3609619", "info":{"authors":{"author":[{"@pid":"18/6668","text":"Erwin Riegler"},{"@pid":"85/316","text":"Georg Tauböck"}]},"title":"Almost lossless analog compression without phase information.","venue":"ISIT","pages":"999-1003","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/RieglerT15","doi":"10.1109/ISIT.2015.7282605","ee":"https://doi.org/10.1109/ISIT.2015.7282605","url":"https://dblp.org/rec/conf/isit/RieglerT15"}, "url":"URL#3609619" }, { "@score":"2", "@id":"3613508", "info":{"authors":{"author":[{"@pid":"53/7480","text":"Askar Boranbayev"},{"@pid":"309/3578","text":"Mikhail Mazhitov"},{"@pid":"309/3813","text":"Zhanat Kakhanov"}]},"title":"Implementation of Security Systems for Prevention of Loss of Information at Organizations of Higher Education.","venue":"ITNG","pages":"802-804","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/itng/BoranbayevMK15","doi":"10.1109/ITNG.2015.147","ee":"https://doi.org/10.1109/ITNG.2015.147","url":"https://dblp.org/rec/conf/itng/BoranbayevMK15"}, "url":"URL#3613508" }, { "@score":"2", "@id":"3614446", "info":{"authors":{"author":[{"@pid":"85/316","text":"Georg Tauböck"},{"@pid":"18/6668","text":"Erwin Riegler"}]},"title":"Almost lossless analog compression without phase information - complex case.","venue":"ITW Fall","pages":"362-366","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/itw/TaubockR15","doi":"10.1109/ITWF.2015.7360796","ee":"https://doi.org/10.1109/ITWF.2015.7360796","url":"https://dblp.org/rec/conf/itw/TaubockR15"}, "url":"URL#3614446" }, { "@score":"2", "@id":"3620352", "info":{"authors":{"author":[{"@pid":"272/8457","text":"Maxim V. Akinin"},{"@pid":"272/8438","text":"Natalya V. Akinina"},{"@pid":"272/8408","text":"Alexandr I. Taganov"},{"@pid":"272/7781","text":"Michael B. Nikiforov"}]},"title":"Autoencoder: Approach to the reduction of the dimension of the vector space with controlled loss of information.","venue":"MECO","pages":"171-173","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/meco/AkininATN15","doi":"10.1109/MECO.2015.7181894","ee":"https://doi.org/10.1109/MECO.2015.7181894","url":"https://dblp.org/rec/conf/meco/AkininATN15"}, "url":"URL#3620352" }, { "@score":"2", "@id":"3640434", "info":{"authors":{"author":[{"@pid":"178/1407","text":"Huma Zia"},{"@pid":"21/3700","text":"Nick R. Harris"},{"@pid":"79/2874","text":"Geoff V. Merrett"},{"@pid":"86/5558","text":"Mark Rivers"}]},"title":"Data-driven low-complexity nitrate loss model utilizing sensor information - Towards collaborative farm management with wireless sensor networks.","venue":"SAS","pages":"1-6","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/sas2/ZiaHMR15","doi":"10.1109/SAS.2015.7133592","ee":"https://doi.org/10.1109/SAS.2015.7133592","url":"https://dblp.org/rec/conf/sas2/ZiaHMR15"}, "url":"URL#3640434" }, { "@score":"3", "@id":"3646048", "info":{"authors":{"author":[{"@pid":"81/11205","text":"Juan Antonio Lossio-Ventura"},{"@pid":"61/11335","text":"Hugo Alatrista-Salas"}]},"title":"Overview of SIMBig 2015: 2nd Annual International Symposium on Information Management and Big Data.","venue":"SIMBig","pages":"10-12","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/simbig/VenturaA15","ee":"https://ceur-ws.org/Vol-1478/o1.pdf","url":"https://dblp.org/rec/conf/simbig/VenturaA15"}, "url":"URL#3646048" }, { "@score":"2", "@id":"3656054", "info":{"authors":{"author":[{"@pid":"84/1142","text":"Richard Brath"},{"@pid":"92/6979","text":"Ebad Banissi"}]},"title":"Evaluating lossiness and fidelity in information visualization.","venue":"Visualization and Data Analysis","pages":"93970H","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/vda/BrathB15","doi":"10.1117/12.2083444","ee":"https://doi.org/10.1117/12.2083444","url":"https://dblp.org/rec/conf/vda/BrathB15"}, "url":"URL#3656054" }, { "@score":"2", "@id":"3656277", "info":{"authors":{"author":[{"@pid":"58/3196-1","text":"Xun Cai 0001"},{"@pid":"66/698","text":"Jae S. Lim"}]},"title":"Adaptive residual DPCM for lossless intra coding.","venue":"Visual Information Processing and Communication","pages":"94100A","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/vipc/CaiL15","doi":"10.1117/12.2074833","ee":"https://doi.org/10.1117/12.2074833","url":"https://dblp.org/rec/conf/vipc/CaiL15"}, "url":"URL#3656277" }, { "@score":"2", "@id":"3656298", "info":{"authors":{"author":[{"@pid":"150/8552","text":"Yatong Xia"},{"@pid":"168/2865","text":"Zimeng Li"},{"@pid":"07/954","text":"Zhenzhong Chen"},{"@pid":"86/1403","text":"Daiqin Yang"}]},"title":"Quantitative analysis on lossy compression in remote sensing image classification.","venue":"Visual Information Processing and Communication","pages":"94100K","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/vipc/XiaLCY15","doi":"10.1117/12.2083205","ee":"https://doi.org/10.1117/12.2083205","url":"https://dblp.org/rec/conf/vipc/XiaLCY15"}, "url":"URL#3656298" }, { "@score":"3", "@id":"3669196", "info":{"authors":{"author":[{"@pid":"81/11205","text":"Juan Antonio Lossio-Ventura"},{"@pid":"61/11335","text":"Hugo Alatrista-Salas"}]},"title":"Proceedings of the 2nd Annual International Symposium on Information Management and Big Data - SIMBig 2015, Cusco, Peru, September 2-4, 2015.","venue":["SIMBig","CEUR Workshop Proceedings"],"volume":"1478","publisher":"CEUR-WS.org","year":"2015","type":"Editorship","access":"open","key":"conf/simbig/2015","ee":"https://ceur-ws.org/Vol-1478","url":"https://dblp.org/rec/conf/simbig/2015"}, "url":"URL#3669196" }, { "@score":"2", "@id":"3675687", "info":{"authors":{"author":[{"@pid":"60/11141","text":"Farhad Farokhi"},{"@pid":"05/7026","text":"Girish N. Nair"}]},"title":"Mutual Information as Privacy-Loss Measure in Strategic Communication.","venue":"CoRR","volume":"abs/1509.05502","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FarokhiN15","ee":"http://arxiv.org/abs/1509.05502","url":"https://dblp.org/rec/journals/corr/FarokhiN15"}, "url":"URL#3675687" }, { "@score":"2", "@id":"3684038", "info":{"authors":{"author":[{"@pid":"18/6668","text":"Erwin Riegler"},{"@pid":"85/316","text":"Georg Tauböck"}]},"title":"Almost Lossless Analog Compression without Phase Information.","venue":"CoRR","volume":"abs/1504.03024","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/RieglerT15","ee":"http://arxiv.org/abs/1504.03024","url":"https://dblp.org/rec/journals/corr/RieglerT15"}, "url":"URL#3684038" }, { "@score":"2", "@id":"3688106", "info":{"authors":{"author":[{"@pid":"z/HectorZenilChavez","text":"Hector Zenil"},{"@pid":"116/4558","text":"Narsis Aftab Kiani"},{"@pid":"24/4407","text":"Jesper Tegnér"}]},"title":"Quantifying Loss of Information in Network-based Dimensionality Reduction Techniques.","venue":"CoRR","volume":"abs/1504.06249","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ZenilKT15a","ee":"http://arxiv.org/abs/1504.06249","url":"https://dblp.org/rec/journals/corr/ZenilKT15a"}, "url":"URL#3688106" }, { "@score":"2", "@id":"3713546", "info":{"authors":{"author":[{"@pid":"53/4424","text":"Salvatore Cavalieri"},{"@pid":"68/8343","text":"Ferdinando Chiacchio"}]},"title":"Limiting the loss of information in KNXnet/IP on congestion conditions.","venue":"Comput. Networks","volume":"73","pages":"154-172","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cn/CavalieriC14","doi":"10.1016/J.COMNET.2014.08.012","ee":"https://doi.org/10.1016/j.comnet.2014.08.012","url":"https://dblp.org/rec/journals/cn/CavalieriC14"}, "url":"URL#3713546" }, { "@score":"2", "@id":"3731101", "info":{"authors":{"author":[{"@pid":"75/4734-1","text":"Tomoya Sakai 0001"},{"@pid":"35/1228","text":"Masashi Sugiyama"}]},"title":"Computationally Efficient Estimation of Squared-Loss Mutual Information with Multiplicative Kernel Models.","venue":"IEICE Trans. Inf. Syst.","volume":"97-D","number":"4","pages":"968-971","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ieicet/SakaiS14","doi":"10.1587/TRANSINF.E97.D.968","ee":"https://doi.org/10.1587/transinf.E97.D.968","url":"https://dblp.org/rec/journals/ieicet/SakaiS14"}, "url":"URL#3731101" }, { "@score":"2", "@id":"3736961", "info":{"authors":{"author":[{"@pid":"z/LixiaZhang4","text":"Lixia Zhang 0004"},{"@pid":"72/4134-3","text":"Weiping Wang 0003"},{"@pid":"91/296","text":"Jianliang Gao"},{"@pid":"75/2669-1","text":"Jianxin Wang 0001"}]},"title":"Lossy links diagnosis for wireless sensor networks by utilising the existing traffic information.","venue":"Int. J. Embed. Syst.","volume":"6","number":"2/3","pages":"140-147","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijes/Zhang0GW14","doi":"10.1504/IJES.2014.063811","ee":"https://doi.org/10.1504/IJES.2014.063811","url":"https://dblp.org/rec/journals/ijes/Zhang0GW14"}, "url":"URL#3736961" }, { "@score":"2", "@id":"3738041", "info":{"authors":{"author":[{"@pid":"131/2547","text":"Pushkar Dixit"},{"@pid":"35/10907","text":"Nishant Singh"},{"@pid":"131/2514","text":"Jay Prakash Gupta"}]},"title":"Robust Lossless Semi Fragile Information Protection in Images.","venue":"Int. J. Interact. Multim. Artif. Intell.","volume":"2","number":"6","pages":"75-88","year":"2014","type":"Journal Articles","access":"open","key":"journals/ijimai/DixitSG14","doi":"10.9781/IJIMAI.2014.269","ee":"https://doi.org/10.9781/ijimai.2014.269","url":"https://dblp.org/rec/journals/ijimai/DixitSG14"}, "url":"URL#3738041" }, { "@score":"2", "@id":"3745580", "info":{"authors":{"author":{"@pid":"72/3481","text":"Kjell Hausken"}},"title":"Returns to information security investment: Endogenizing the expected loss.","venue":"Inf. Syst. Frontiers","volume":"16","number":"2","pages":"329-336","year":"2014","type":"Journal Articles","access":"closed","key":"journals/isf/Hausken14","doi":"10.1007/S10796-012-9390-9","ee":"https://doi.org/10.1007/s10796-012-9390-9","url":"https://dblp.org/rec/journals/isf/Hausken14"}, "url":"URL#3745580" }, { "@score":"2", "@id":"3754560", "info":{"authors":{"author":[{"@pid":"30/6165","text":"Ismo Hänninen"},{"@pid":"53/2662","text":"Craig S. Lent"},{"@pid":"01/6870","text":"Gregory L. Snider"}]},"title":"Quantifying Irreversible Information Loss in Digital Circuits.","venue":"ACM J. Emerg. Technol. Comput. Syst.","volume":"11","number":"2","pages":"10:1-10:17","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jetc/HanninenLS14","doi":"10.1145/2629523","ee":"https://doi.org/10.1145/2629523","url":"https://dblp.org/rec/journals/jetc/HanninenLS14"}, "url":"URL#3754560" }, { "@score":"2", "@id":"3761943", "info":{"authors":{"author":[{"@pid":"35/547","text":"Chih-Chung Hsu"},{"@pid":"l/ChiaWenLin","text":"Chia-Wen Lin"},{"@pid":"31/9004","text":"Yuming Fang"},{"@pid":"14/3737","text":"Weisi Lin"}]},"title":"Objective Quality Assessment for Image Retargeting Based on Perceptual Geometric Distortion and Information Loss.","venue":"IEEE J. Sel. Top. Signal Process.","volume":"8","number":"3","pages":"377-389","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jstsp/HsuLFL14","doi":"10.1109/JSTSP.2014.2311884","ee":"https://doi.org/10.1109/JSTSP.2014.2311884","url":"https://dblp.org/rec/journals/jstsp/HsuLFL14"}, "url":"URL#3761943" }, { "@score":"3", "@id":"3769579", "info":{"authors":{"author":[{"@pid":"35/1228","text":"Masashi Sugiyama"},{"@pid":"26/3367-1","text":"Gang Niu 0001"},{"@pid":"56/4937","text":"Makoto Yamada"},{"@pid":"66/2623","text":"Manabu Kimura"},{"@pid":"75/2801","text":"Hirotaka Hachiya"}]},"title":"Information-Maximization Clustering Based on Squared-Loss Mutual Information.","venue":"Neural Comput.","volume":"26","number":"1","pages":"84-131","year":"2014","type":"Journal Articles","access":"closed","key":"journals/neco/SugiyamaNYKH14","doi":"10.1162/NECO_A_00534","ee":"https://doi.org/10.1162/NECO_a_00534","url":"https://dblp.org/rec/journals/neco/SugiyamaNYKH14"}, "url":"URL#3769579" }, { "@score":"2", "@id":"3794340", "info":{"authors":{"author":[{"@pid":"74/7118","text":"Yonatan Kaspi"},{"@pid":"92/1103","text":"Neri Merhav"}]},"title":"Zero-Delay and Causal Single-User and Multi-User Lossy Source Coding with Decoder Side Information.","venue":"IEEE Trans. Inf. Theory","volume":"60","number":"11","pages":"6931-6942","year":"2014","type":"Journal Articles","access":"closed","key":"journals/tit/KaspiM14","doi":"10.1109/TIT.2014.2358238","ee":"https://doi.org/10.1109/TIT.2014.2358238","url":"https://dblp.org/rec/journals/tit/KaspiM14"}, "url":"URL#3794340" }, { "@score":"2", "@id":"3794532", "info":{"authors":{"author":[{"@pid":"13/8759","text":"Kumar Viswanatha"},{"@pid":"62/3836","text":"Emrah Akyol"},{"@pid":"85/5752","text":"Kenneth Rose"}]},"title":"The Lossy Common Information of Correlated Sources.","venue":"IEEE Trans. Inf. Theory","volume":"60","number":"6","pages":"3238-3253","year":"2014","type":"Journal Articles","access":"closed","key":"journals/tit/ViswanathaAR14","doi":"10.1109/TIT.2014.2315805","ee":"https://doi.org/10.1109/TIT.2014.2315805","url":"https://dblp.org/rec/journals/tit/ViswanathaAR14"}, "url":"URL#3794532" }, { "@score":"3", "@id":"3802547", "info":{"authors":{"author":[{"@pid":"18/11202","text":"Berkan Dulek"},{"@pid":"57/5692","text":"Sinan Gezici"},{"@pid":"12/3281","text":"Ryo Sawai"},{"@pid":"54/5342","text":"Ryota Kimura"}]},"title":"Power Adaptation for Cognitive Radio Systems Under an Average SINR Loss Constraint in the Absence of Path Loss Information.","venue":"Wirel. Pers. Commun.","volume":"77","number":"1","pages":"151-172","year":"2014","type":"Journal Articles","access":"closed","key":"journals/wpc/DulekGSK14","doi":"10.1007/S11277-013-1499-8","ee":"https://doi.org/10.1007/s11277-013-1499-8","url":"https://dblp.org/rec/journals/wpc/DulekGSK14"}, "url":"URL#3802547" }, { "@score":"2", "@id":"3803226", "info":{"authors":{"author":[{"@pid":"346/2524","text":"Sigrun Eckelmann"},{"@pid":"41/78","text":"Norbert Lossau"},{"@pid":"346/2458","text":"Hans-Georg Nolte-Fischer"}]},"title":"Auf dem Weg zur Neuausrichtung der überregionalen Informationsservice.","venue":"ZfBB","volume":"61","number":"1","pages":"5-10","year":"2014","type":"Journal Articles","access":"closed","key":"journals/zfbb/EckelmannLN14","doi":"10.3196/186429501461132","ee":"https://doi.org/10.3196/186429501461132","url":"https://dblp.org/rec/journals/zfbb/EckelmannLN14"}, "url":"URL#3803226" }, { "@score":"3", "@id":"3810440", "info":{"authors":{"author":[{"@pid":"86/10890-1","text":"Eric Graves 0001"},{"@pid":"72/1500","text":"Tan F. Wong"}]},"title":"Information integrity in lossy source coding with side information.","venue":"Allerton","pages":"1267-1271","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/allerton/GravesW14","doi":"10.1109/ALLERTON.2014.7028601","ee":"https://doi.org/10.1109/ALLERTON.2014.7028601","url":"https://dblp.org/rec/conf/allerton/GravesW14"}, "url":"URL#3810440" }, { "@score":"2", "@id":"3816451", "info":{"authors":{"author":[{"@pid":"68/10039","text":"Khaled Mahbub Morshed"},{"@pid":"26/1130","text":"Ingmar Land"},{"@pid":"18/2407","text":"Gottfried Lechner"}]},"title":"Lossless compression of uniform binary sources with coded side-information.","venue":"AusCTW","pages":"102-107","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/ausctw/MorshedLL14","doi":"10.1109/AUSCTW.2014.6766436","ee":"https://doi.org/10.1109/AusCTW.2014.6766436","url":"https://dblp.org/rec/conf/ausctw/MorshedLL14"}, "url":"URL#3816451" }, { "@score":"2", "@id":"3855555", "info":{"authors":{"author":[{"@pid":"63/204","text":"Kuo-Hui Yeh"},{"@pid":"76/1704","text":"Nai-Wei Lo"},{"@pid":"140/3341","text":"Chuan-Yen Fan"}]},"title":"An analysis framework for information loss and privacy leakage on Android applications.","venue":"GCCE","pages":"216-218","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcce/YehLF14","doi":"10.1109/GCCE.2014.7031192","ee":"https://doi.org/10.1109/GCCE.2014.7031192","url":"https://dblp.org/rec/conf/gcce/YehLF14"}, "url":"URL#3855555" }, { "@score":"2", "@id":"3875227", "info":{"authors":{"author":[{"@pid":"127/9497","text":"Jim Jing-Yan Wang"},{"@pid":"56/2203-1","text":"Xin Gao 0001"}]},"title":"Minimum Information Loss Based Multi-kernel Learning for Flagellar Protein Recognition in Trypanosoma Brucei.","venue":"ICDM Workshops","pages":"133-141","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/WangG14","doi":"10.1109/ICDMW.2014.142","ee":"https://doi.org/10.1109/ICDMW.2014.142","url":"https://dblp.org/rec/conf/icdm/WangG14"}, "url":"URL#3875227" }, { "@score":"3", "@id":"3889742", "info":{"authors":{"author":[{"@pid":"81/11205","text":"Juan Antonio Lossio-Ventura"},{"@pid":"95/4374","text":"Clément Jonquet"},{"@pid":"r/MathieuRoche","text":"Mathieu Roche"},{"@pid":"t/MTeisseire","text":"Maguelonne Teisseire"}]},"title":"Integration of linguistic and web information to improve biomedical terminology extraction.","venue":"IDEAS","pages":"265-269","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/ideas/VenturaJRT14","doi":"10.1145/2628194.2628208","ee":"https://doi.org/10.1145/2628194.2628208","url":"https://dblp.org/rec/conf/ideas/VenturaJRT14"}, "url":"URL#3889742" }, { "@score":"2", "@id":"3904289", "info":{"authors":{"author":[{"@pid":"08/7480","text":"Yeow-Khiang Chia"},{"@pid":"76/11150","text":"Hon Fah Chong"}]},"title":"On lossy source coding with side information under the erasure distortion measure.","venue":"ISIT","pages":"3047-3051","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/ChiaC14","doi":"10.1109/ISIT.2014.6875394","ee":"https://doi.org/10.1109/ISIT.2014.6875394","url":"https://dblp.org/rec/conf/isit/ChiaC14"}, "url":"URL#3904289" }, { "@score":"2", "@id":"3904436", "info":{"authors":{"author":[{"@pid":"43/8919","text":"Jiantao Jiao"},{"@pid":"23/7883","text":"Thomas A. Courtade"},{"@pid":"14/10360","text":"Kartik Venkat"},{"@pid":"34/2720","text":"Tsachy Weissman"}]},"title":"Justification of logarithmic loss via the benefit of side information.","venue":"ISIT","pages":"946-950","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/JiaoCVW14","doi":"10.1109/ISIT.2014.6874972","ee":"https://doi.org/10.1109/ISIT.2014.6874972","url":"https://dblp.org/rec/conf/isit/JiaoCVW14"}, "url":"URL#3904436" }, { "@score":"2", "@id":"3914884", "info":{"authors":{"author":[{"@pid":"160/5082","text":"Omer Sagy"},{"@pid":"13/10835","text":"Peleg Yiftachel"},{"@pid":"160/5141","text":"Udi Shemer"},{"@pid":"28/6373","text":"Adir Even"}]},"title":"Value Attribution in Complex Information-System Settings toward Minimizing the damage of Data Loss.","venue":"MCIS","pages":"42","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/mcis/SagyYSE14","ee":"http://aisel.aisnet.org/mcis2014/42","url":"https://dblp.org/rec/conf/mcis/SagyYSE14"}, "url":"URL#3914884" }, { "@score":"2", "@id":"3919908", "info":{"authors":{"author":[{"@pid":"119/5967","text":"Qing Rao"},{"@pid":"139/4800","text":"Christian Grünler"},{"@pid":"14/708","text":"Markus Hammori"},{"@pid":"c/SamarjitChakraborty","text":"Samarjit Chakraborty"}]},"title":"Stixel on the Bus: An Efficient Lossless Compression Scheme for Depth Information in Traffic Scenarios.","venue":"MMM","pages":"568-579","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/mmm/RaoGHC14","doi":"10.1007/978-3-319-04114-8_48","ee":"https://doi.org/10.1007/978-3-319-04114-8_48","url":"https://dblp.org/rec/conf/mmm/RaoGHC14"}, "url":"URL#3919908" }, { "@score":"2", "@id":"3920474", "info":{"authors":{"author":[{"@pid":"56/11343","text":"Qiuyuan Huang"},{"@pid":"85/10699","text":"Kairan Sun"},{"@pid":"09/1365","text":"Xin Li"},{"@pid":"88/1600","text":"Dapeng Oliver Wu"}]},"title":"Just FUN: a joint fountain coding and network coding approach to loss-tolerant information spreading.","venue":"MobiHoc","pages":"83-92","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobihoc/HuangSLW14","doi":"10.1145/2632951.2632965","ee":"https://doi.org/10.1145/2632951.2632965","url":"https://dblp.org/rec/conf/mobihoc/HuangSLW14"}, "url":"URL#3920474" }, { "@score":"2", "@id":"3923571", "info":{"authors":{"author":[{"@pid":"61/3234-1","text":"Qiang Liu 0001"},{"@pid":"39/1313","text":"Alexander Ihler"}]},"title":"Distributed Estimation, Information Loss and Exponential Families.","venue":"NIPS","pages":"1098-1106","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/nips/LiuI14","ee":"https://proceedings.neurips.cc/paper/2014/hash/303ed4c69846ab36c2904d3ba8573050-Abstract.html","url":"https://dblp.org/rec/conf/nips/LiuI14"}, "url":"URL#3923571" }, { "@score":"2", "@id":"3930182", "info":{"authors":{"author":[{"@pid":"84/882","text":"Jordi Castro 0001"},{"@pid":"07/5302-2","text":"José A. González 0002"}]},"title":"Assessing the Information Loss of Controlled Adjustment Methods in Two-Way Tables.","venue":"Privacy in Statistical Databases","pages":"11-23","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/psd/CastroG14","doi":"10.1007/978-3-319-11257-2_2","ee":"https://doi.org/10.1007/978-3-319-11257-2_2","url":"https://dblp.org/rec/conf/psd/CastroG14"}, "url":"URL#3930182" }, { "@score":"2", "@id":"3934937", "info":{"authors":{"author":[{"@pid":"146/2190","text":"Andita Suci Pratiwi"},{"@pid":"04/1604","text":"Syarulnaziah Anawar"}]},"title":"Resolving Uncertainty Information Using Case-Based Reasoning Approach in Weight-Loss Participatory Sensing Campaign.","venue":"SCDM","pages":"551-560","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/scdm/PratiwiA14","doi":"10.1007/978-3-319-07692-8_52","ee":"https://doi.org/10.1007/978-3-319-07692-8_52","url":"https://dblp.org/rec/conf/scdm/PratiwiA14"}, "url":"URL#3934937" }, { "@score":"2", "@id":"3935979", "info":{"authors":{"author":[{"@pid":"68/6125","text":"Abdun Naser Mahmood"},{"@pid":"66/6642","text":"Md. Enamul Kabir"},{"@pid":"87/8333","text":"Abdul K. Mustafa"}]},"title":"Novel Iterative Min-Max Clustering to Minimize Information Loss in Statistical Disclosure Control.","venue":"SecureComm","pages":"157-172","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/securecomm/MahmoodKM14","doi":"10.1007/978-3-319-23802-9_14","ee":"https://doi.org/10.1007/978-3-319-23802-9_14","url":"https://dblp.org/rec/conf/securecomm/MahmoodKM14"}, "url":"URL#3935979" }, { "@score":"4", "@id":"3946426", "info":{"authors":{"author":[{"@pid":"81/11205","text":"Juan Antonio Lossio-Ventura"},{"@pid":"95/4374","text":"Clément Jonquet"},{"@pid":"r/MathieuRoche","text":"Mathieu Roche"},{"@pid":"t/MTeisseire","text":"Maguelonne Teisseire"}]},"title":"Automatic Term Extraction Combining Different Information (Extraction automatique de termes combinant différentes informations) [in French].","venue":"TALN","pages":"407-412","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/taln/VenturaJRT14","ee":"https://aclanthology.org/F14-2004/","url":"https://dblp.org/rec/conf/taln/VenturaJRT14"}, "url":"URL#3946426" }, { "@score":"3", "@id":"3963431", "info":{"authors":{"author":[{"@pid":"81/11205","text":"Juan Antonio Lossio-Ventura"},{"@pid":"61/11335","text":"Hugo Alatrista Salas"}]},"title":"Proceedings of the 1st Symposium on Information Management and Big Data - SIMBig 2014, Cusco, Peru, October 8-10, 2014.","venue":["SIMBig","CEUR Workshop Proceedings"],"volume":"1318","publisher":"CEUR-WS.org","year":"2014","type":"Editorship","access":"open","key":"conf/simbig/2014","ee":"https://ceur-ws.org/Vol-1318","url":"https://dblp.org/rec/conf/simbig/2014"}, "url":"URL#3963431" }, { "@score":"2", "@id":"3972951", "info":{"authors":{"author":[{"@pid":"91/7220","text":"Hossein Hosseini"},{"@pid":"04/10820","text":"Ali Goli"},{"@pid":"51/8775","text":"Neda Barzegar Marvasti"},{"@pid":"140/7647","text":"Masoume Azghani"},{"@pid":"06/1232","text":"Farokh Marvasti"}]},"title":"On Image Block Loss Restoration Using the Sparsity Pattern as Side Information.","venue":"CoRR","volume":"abs/1401.5966","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/HosseiniGMAM14","ee":"http://arxiv.org/abs/1401.5966","url":"https://dblp.org/rec/journals/corr/HosseiniGMAM14"}, "url":"URL#3972951" }, { "@score":"2", "@id":"3973253", "info":{"authors":{"author":[{"@pid":"61/857","text":"Mikhail Ivanov"},{"@pid":"119/4848","text":"Christian Häger"},{"@pid":"56/5920","text":"Fredrik Brännström"},{"@pid":"95/3707","text":"Alexandre Graell i Amat"},{"@pid":"67/1810","text":"Alex Alvarado"},{"@pid":"92/6506","text":"Erik Agrell"}]},"title":"On the Information Loss of the Max-Log Approximation in BICM Systems.","venue":"CoRR","volume":"abs/1408.2214","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/IvanovHBAAA14","ee":"http://arxiv.org/abs/1408.2214","url":"https://dblp.org/rec/journals/corr/IvanovHBAAA14"}, "url":"URL#3973253" }, { "@score":"2", "@id":"3973511", "info":{"authors":{"author":[{"@pid":"43/8919","text":"Jiantao Jiao"},{"@pid":"23/7883","text":"Thomas A. Courtade"},{"@pid":"14/10360","text":"Kartik Venkat"},{"@pid":"34/2720","text":"Tsachy Weissman"}]},"title":"Justification of Logarithmic Loss via the Benefit of Side Information.","venue":"CoRR","volume":"abs/1403.4679","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/JiaoCVW14","ee":"http://arxiv.org/abs/1403.4679","url":"https://dblp.org/rec/journals/corr/JiaoCVW14"}, "url":"URL#3973511" }, { "@score":"2", "@id":"3976929", "info":{"authors":{"author":[{"@pid":"21/708","text":"David F. Nettleton"},{"@pid":"t/VicencTorra","text":"Vicenç Torra"},{"@pid":"07/7048","text":"Anton Dries"}]},"title":"The effect of constraints on information loss and risk for clustering and modification based graph anonymization methods.","venue":"CoRR","volume":"abs/1401.0458","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/NettletonTD14","ee":"http://arxiv.org/abs/1401.0458","url":"https://dblp.org/rec/journals/corr/NettletonTD14"}, "url":"URL#3976929" }, { "@score":"2", "@id":"3980562", "info":{"authors":{"author":[{"@pid":"13/8759","text":"Kumar Viswanatha"},{"@pid":"62/3836","text":"Emrah Akyol"},{"@pid":"85/5752","text":"Kenneth Rose"}]},"title":"The Lossy Common Information of Correlated Sources.","venue":"CoRR","volume":"abs/1403.8093","year":"2014","type":"Informal and Other Publications","access":"open","key":"journals/corr/ViswanathaAR14","ee":"http://arxiv.org/abs/1403.8093","url":"https://dblp.org/rec/journals/corr/ViswanathaAR14"}, "url":"URL#3980562" }, { "@score":"2", "@id":"3983869", "info":{"title":"Robust Lossless Semi Fragile Information Protection in Images.","venue":"CoRR","volume":"abs/1407.4865","year":"2014","type":"Withdrawn Items","access":"withdrawn","key":"journals/corr/DixitSG14","ee":"http://arxiv.org/abs/1407.4865","url":"https://dblp.org/rec/journals/corr/DixitSG14"}, "url":"URL#3983869" }, { "@score":"3", "@id":"3988218", "info":{"authors":{"author":{"@pid":"145/2473","text":"Jeremy Jover"}},"title":"Contribution à la réduction des pertes d'informations dans l'industrie du bois. (Contribution to the information loss reduction in the wood industry).","year":"2013","type":"Books and Theses","access":"open","key":"phd/hal/Jover13","ee":"https://tel.archives-ouvertes.fr/tel-00921941","url":"https://dblp.org/rec/phd/hal/Jover13"}, "url":"URL#3988218" }, { "@score":"2", "@id":"4004691", "info":{"authors":{"author":[{"@pid":"36/8618","text":"Sudeb Das"},{"@pid":"k/MalayKKundu","text":"Malay Kumar Kundu"}]},"title":"Effective management of medical information through ROI-lossless fragile image watermarking technique.","venue":"Comput. Methods Programs Biomed.","volume":"111","number":"3","pages":"662-675","year":"2013","type":"Journal Articles","access":"closed","key":"journals/cmpb/DasK13","doi":"10.1016/J.CMPB.2013.05.027","ee":"https://doi.org/10.1016/j.cmpb.2013.05.027","url":"https://dblp.org/rec/journals/cmpb/DasK13"}, "url":"URL#4004691" }, { "@score":"2", "@id":"4008488", "info":{"authors":{"author":[{"@pid":"130/6879","text":"John C. Lind"},{"@pid":"14/1162","text":"Douglas P. Wiens"},{"@pid":"27/6372","text":"Victor J. Yohai"}]},"title":"Robust minimum information loss estimation.","venue":"Comput. Stat. Data Anal.","volume":"65","pages":"98-112","year":"2013","type":"Journal Articles","access":"closed","key":"journals/csda/LindWY13","doi":"10.1016/J.CSDA.2012.06.011","ee":"https://doi.org/10.1016/j.csda.2012.06.011","url":"https://dblp.org/rec/journals/csda/LindWY13"}, "url":"URL#4008488" }, { "@score":"2", "@id":"4009734", "info":{"authors":{"author":[{"@pid":"76/3645","text":"Sushil Bikhchandani"},{"@pid":"70/1525","text":"John W. Mamer"}]},"title":"Decreasing Marginal Value of Information Under Symmetric Loss.","venue":"Decis. Anal.","volume":"10","number":"3","pages":"245-256","year":"2013","type":"Journal Articles","access":"closed","key":"journals/da/BikhchandaniM13","doi":"10.1287/DECA.2013.0274","ee":"https://doi.org/10.1287/deca.2013.0274","url":"https://dblp.org/rec/journals/da/BikhchandaniM13"}, "url":"URL#4009734" }, { "@score":"2", "@id":"4014629", "info":{"authors":{"author":{"@pid":"35/1228","text":"Masashi Sugiyama"}},"title":"Machine Learning with Squared-Loss Mutual Information.","venue":"Entropy","volume":"15","number":"1","pages":"80-112","year":"2013","type":"Journal Articles","access":"open","key":"journals/entropy/Sugiyama13","doi":"10.3390/E15010080","ee":"https://doi.org/10.3390/e15010080","url":"https://dblp.org/rec/journals/entropy/Sugiyama13"}, "url":"URL#4014629" }, { "@score":"2", "@id":"4020155", "info":{"authors":{"author":{"@pid":"64/5483","text":"Cagatay Candan"}},"title":"An Upper Bound on the Capacity Loss Due to Imprecise Channel State Information for General Memoryless Fading Channels.","venue":"IEEE Commun. Lett.","volume":"17","number":"7","pages":"1348-1351","year":"2013","type":"Journal Articles","access":"closed","key":"journals/icl/Candan13a","doi":"10.1109/LCOMM.2013.060513.122930","ee":"https://doi.org/10.1109/LCOMM.2013.060513.122930","url":"https://dblp.org/rec/journals/icl/Candan13a"}, "url":"URL#4020155" }, { "@score":"2", "@id":"4021610", "info":{"authors":{"author":[{"@pid":"95/3398","text":"Wittawat Jitkrittum"},{"@pid":"75/2801","text":"Hirotaka Hachiya"},{"@pid":"35/1228","text":"Masashi Sugiyama"}]},"title":"Feature Selection via l1-Penalized Squared-Loss Mutual Information.","venue":"IEICE Trans. Inf. Syst.","volume":"96-D","number":"7","pages":"1513-1524","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ieicet/JitkrittumHS13","doi":"10.1587/TRANSINF.E96.D.1513","ee":"https://doi.org/10.1587/transinf.E96.D.1513","url":"https://dblp.org/rec/journals/ieicet/JitkrittumHS13"}, "url":"URL#4021610" }, { "@score":"2", "@id":"4046507", "info":{"authors":{"author":[{"@pid":"25/6767","text":"Ravi Narayanaswamy"},{"@pid":"99/4880","text":"Varun Grover"},{"@pid":"23/1075","text":"Raymond M. Henry"}]},"title":"The Impact of Influence Tactics in Information System Development Projects: A Control-Loss Perspective.","venue":"J. Manag. Inf. Syst.","volume":"30","number":"1","pages":"191-226","year":"2013","type":"Journal Articles","access":"closed","key":"journals/jmis/NarayanaswamyGH13","doi":"10.2753/MIS0742-1222300106","ee":"https://doi.org/10.2753/mis0742-1222300106","url":"https://dblp.org/rec/journals/jmis/NarayanaswamyGH13"}, "url":"URL#4046507" }, { "@score":"2", "@id":"4049238", "info":{"authors":{"author":[{"@pid":"65/7748","text":"Akihiro Kawamura"},{"@pid":"40/2421","text":"Kenji Tahara"},{"@pid":"78/5486","text":"Ryo Kurazume"},{"@pid":"74/991","text":"Tsutomu Hasegawa"}]},"title":"Robust Visual Servoing for Object Manipulation Against Temporary Loss of Sensory Information Using a Multi-Fingered Hand-Arm.","venue":"J. Robotics Mechatronics","volume":"25","number":"1","pages":"125-135","year":"2013","type":"Journal Articles","access":"closed","key":"journals/jrm/KawamuraTKH13","doi":"10.20965/JRM.2013.P0125","ee":"https://doi.org/10.20965/jrm.2013.p0125","url":"https://dblp.org/rec/journals/jrm/KawamuraTKH13"}, "url":"URL#4049238" }, { "@score":"2", "@id":"4050923", "info":{"authors":{"author":[{"@pid":"c/ChinChenChang","text":"Chin-Chen Chang 0001"},{"@pid":"49/2705","text":"Kuo-Nan Chen"},{"@pid":"65/2749-1","text":"Zhi-Hui Wang 0001"},{"@pid":"83/3175","text":"Mingchu Li"}]},"title":"Lossless Information Hiding in the VQ Index Table.","venue":"J. Softw.","volume":"8","number":"3","pages":"547-553","year":"2013","type":"Journal Articles","access":"closed","key":"journals/jsw/ChangCWL13","doi":"10.4304/JSW.8.3.547-553","ee":"https://doi.org/10.4304/jsw.8.3.547-553","url":"https://dblp.org/rec/journals/jsw/ChangCWL13"}, "url":"URL#4050923" }, { "@score":"2", "@id":"4058437", "info":{"authors":{"author":[{"@pid":"08/312","text":"Taiji Suzuki"},{"@pid":"35/1228","text":"Masashi Sugiyama"}]},"title":"Sufficient Dimension Reduction via Squared-Loss Mutual Information Estimation.","venue":"Neural Comput.","volume":"25","number":"3","pages":"725-758","year":"2013","type":"Journal Articles","access":"closed","key":"journals/neco/SuzukiS13","doi":"10.1162/NECO_A_00407","ee":"https://doi.org/10.1162/NECO_a_00407","url":"https://dblp.org/rec/journals/neco/SuzukiS13"}, "url":"URL#4058437" }, { "@score":"2", "@id":"4062451", "info":{"authors":{"author":[{"@pid":"37/11398","text":"Martin M. Monti"},{"@pid":"155/2925","text":"Evan S. Lutkenhoff"},{"@pid":"94/10998","text":"Mikail Rubinov"},{"@pid":"12/11374","text":"Pierre Boveroux"},{"@pid":"65/7418","text":"Audrey Vanhaudenhuyse"},{"@pid":"122/9454","text":"Olivia Gosseries"},{"@pid":"02/11375","text":"Marie-Aurélie Bruno"},{"@pid":"88/9042","text":"Quentin Noirhomme"},{"@pid":"40/8531","text":"Mélanie Boly"},{"@pid":"22/9043","text":"Steven Laureys"}]},"title":"Dynamic Change of Global and Local Information Processing in Propofol-Induced Loss and Recovery of Consciousness.","venue":"PLoS Comput. Biol.","volume":"9","number":"10","year":"2013","type":"Journal Articles","access":"open","key":"journals/ploscb/MontiLRBVGBNBL13","doi":"10.1371/JOURNAL.PCBI.1003271","ee":"https://doi.org/10.1371/journal.pcbi.1003271","url":"https://dblp.org/rec/journals/ploscb/MontiLRBVGBNBL13"}, "url":"URL#4062451" }, { "@score":"2", "@id":"4081516", "info":{"authors":{"author":[{"@pid":"04/9668","text":"Behzad Ahmadi"},{"@pid":"12/3337","text":"Osvaldo Simeone"}]},"title":"Distributed and Cascade Lossy Source Coding With a Side Information "Vending Machine".","venue":"IEEE Trans. Inf. Theory","volume":"59","number":"10","pages":"6807-6819","year":"2013","type":"Journal Articles","access":"closed","key":"journals/tit/AhmadiS13","doi":"10.1109/TIT.2013.2269134","ee":"https://doi.org/10.1109/TIT.2013.2269134","url":"https://dblp.org/rec/journals/tit/AhmadiS13"}, "url":"URL#4081516" }, { "@score":"2", "@id":"4081908", "info":{"authors":{"author":[{"@pid":"46/7254","text":"Avraham Reani"},{"@pid":"92/1103","text":"Neri Merhav"}]},"title":"Data-Processing Bounds for Scalar Lossy Source Codes With Side Information at the Decoder.","venue":"IEEE Trans. Inf. Theory","volume":"59","number":"7","pages":"4057-4070","year":"2013","type":"Journal Articles","access":"closed","key":"journals/tit/ReaniM13","doi":"10.1109/TIT.2013.2249654","ee":"https://doi.org/10.1109/TIT.2013.2249654","url":"https://dblp.org/rec/journals/tit/ReaniM13"}, "url":"URL#4081908" }, { "@score":"2", "@id":"4081971", "info":{"authors":{"author":[{"@pid":"19/543","text":"Ravi Tandon"},{"@pid":"82/5303","text":"Lalitha Sankar"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"}]},"title":"Discriminatory Lossy Source Coding: Side Information Privacy.","venue":"IEEE Trans. Inf. Theory","volume":"59","number":"9","pages":"5665-5677","year":"2013","type":"Journal Articles","access":"closed","key":"journals/tit/TandonSP13","doi":"10.1109/TIT.2013.2259613","ee":"https://doi.org/10.1109/TIT.2013.2259613","url":"https://dblp.org/rec/journals/tit/TandonSP13"}, "url":"URL#4081971" }, { "@score":"2", "@id":"4081979", "info":{"authors":{"author":[{"@pid":"49/6393","text":"Roy Timo"},{"@pid":"g/AlexJGrant","text":"Alex J. Grant"},{"@pid":"04/1411","text":"Gerhard Kramer"}]},"title":"Lossy Broadcasting With Complementary Side Information.","venue":"IEEE Trans. Inf. Theory","volume":"59","number":"1","pages":"104-131","year":"2013","type":"Journal Articles","access":"closed","key":"journals/tit/TimoGK13","doi":"10.1109/TIT.2012.2216855","ee":"https://doi.org/10.1109/TIT.2012.2216855","url":"https://dblp.org/rec/journals/tit/TimoGK13"}, "url":"URL#4081979" }, { "@score":"2", "@id":"4082106", "info":{"authors":{"author":[{"@pid":"07/10941","text":"Garry Higgins"},{"@pid":"09/402","text":"Brian McGinley"},{"@pid":"49/3643","text":"Stephen Faul"},{"@pid":"35/6585","text":"Robert P. McEvoy"},{"@pid":"16/5775","text":"Martin Glavin"},{"@pid":"m/WPLiamMarname","text":"William P. Marnane"},{"@pid":"45/1650","text":"Edward Jones"}]},"title":"The Effects of Lossy Compression on Diagnostically Relevant Seizure Information in EEG Signals.","venue":"IEEE J. Biomed. Health Informatics","volume":"17","number":"1","pages":"121-127","year":"2013","type":"Journal Articles","access":"closed","key":"journals/titb/HigginsMFMGMJ13","doi":"10.1109/TITB.2012.2222426","ee":"https://doi.org/10.1109/TITB.2012.2222426","url":"https://dblp.org/rec/journals/titb/HigginsMFMGMJ13"}, "url":"URL#4082106" }, { "@score":"2", "@id":"4101390", "info":{"authors":{"author":{"@pid":"44/4601","text":"Masaaki Fujiyoshi"}},"title":"A blind lossless information embedding scheme based on generalized histogram shifting.","venue":"APSIPA","pages":"1-4","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/apsipa/Fujiyoshi13","doi":"10.1109/APSIPA.2013.6694331","ee":"https://doi.org/10.1109/APSIPA.2013.6694331","url":"https://dblp.org/rec/conf/apsipa/Fujiyoshi13"}, "url":"URL#4101390" }, { "@score":"2", "@id":"4106339", "info":{"authors":{"author":[{"@pid":"224/3449","text":"Shoko Nakatsuka"},{"@pid":"235/3528","text":"Takashi Hamabe"},{"@pid":"23/124","text":"Yoshinori Takeuchi"},{"@pid":"55/3142","text":"Masaharu Imai"}]},"title":"An efficient lossless data compression method based on exponential-Golomb coding for biomedical information and its implementation using ASIP technology.","venue":"BioCAS","pages":"382-385","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/biocas/NakatsukaHTI13","doi":"10.1109/BIOCAS.2013.6679719","ee":"https://doi.org/10.1109/BioCAS.2013.6679719","url":"https://dblp.org/rec/conf/biocas/NakatsukaHTI13"}, "url":"URL#4106339" }, { "@score":"2", "@id":"4135274", "info":{"authors":{"author":[{"@pid":"32/1761","text":"Arndt Lüder"},{"@pid":"24/11335","text":"Nicole Schmidt"},{"@pid":"142/4339","text":"Sebastian Helgermann"}]},"title":"Lossless exchange of graph based structure information of production systems by AutomationML.","venue":"ETFA","pages":"1-4","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/etfa/LuderSH13","doi":"10.1109/ETFA.2013.6648097","ee":"https://doi.org/10.1109/ETFA.2013.6648097","url":"https://dblp.org/rec/conf/etfa/LuderSH13"}, "url":"URL#4135274" }, { "@score":"3", "@id":"4168670", "info":{"authors":{"author":[{"@pid":"26/3367-1","text":"Gang Niu 0001"},{"@pid":"95/3398","text":"Wittawat Jitkrittum"},{"@pid":"64/2903-1","text":"Bo Dai 0001"},{"@pid":"75/2801","text":"Hirotaka Hachiya"},{"@pid":"35/1228","text":"Masashi Sugiyama"}]},"title":"Squared-loss Mutual Information Regularization: A Novel Information-theoretic Approach to Semi-supervised Learning.","venue":"ICML","pages":"10-18","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icml/NiuJDHS13","ee":"http://proceedings.mlr.press/v28/niu13.html","url":"https://dblp.org/rec/conf/icml/NiuJDHS13"}, "url":"URL#4168670" }, { "@score":"2", "@id":"4173043", "info":{"authors":{"author":[{"@pid":"218/8958","text":"Guilherme Marcio Soares"},{"@pid":"285/7621","text":"Alcindo G. B. Almeida"},{"@pid":"285/8102","text":"Raphael M. Mendes"},{"@pid":"285/8337","text":"Estêvão Coelho Teixeira"},{"@pid":"156/8853","text":"Henrique A. C. Braga"},{"@pid":"285/8011","text":"Missael N. Machado"},{"@pid":"159/8055","text":"Raphael Santos Broetto"},{"@pid":"277/2795","text":"Murillo V. H. B. Castro"},{"@pid":"285/8156","text":"Helder O. Gomes Filho"},{"@pid":"29/887","text":"Flávio Miguel Varejão"},{"@pid":"39/1708","text":"José Gonçalves Pereira Filho"},{"@pid":"159/8128","text":"André Bernadi Candeia"},{"@pid":"285/7565","text":"Rafael A. A. Sousa"}]},"title":"Detection of street lighting bulbs information to minimize commercial losses.","venue":"ICST","pages":"895-900","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icsenst/SoaresAMTBMBCFV13","doi":"10.1109/ICSENST.2013.6727779","ee":"https://doi.org/10.1109/ICSensT.2013.6727779","url":"https://dblp.org/rec/conf/icsenst/SoaresAMTBMBCFV13"}, "url":"URL#4173043" }, { "@score":"2", "@id":"4178619", "info":{"authors":{"author":[{"@pid":"120/6329","text":"Kalpana Singh"},{"@pid":"79/3442","text":"Lynn Margaret Batten"}]},"title":"An Attack-Resistant Hybrid Data-Privatization Method with Low Information Loss.","venue":"IFIPTM","pages":"263-271","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/ifiptm/SinghB13","doi":"10.1007/978-3-642-38323-6_21","ee":"https://doi.org/10.1007/978-3-642-38323-6_21","url":"https://dblp.org/rec/conf/ifiptm/SinghB13"}, "url":"URL#4178619" }, { "@score":"2", "@id":"4190640", "info":{"authors":{"author":[{"@pid":"135/4999","text":"Thomas Laich"},{"@pid":"78/1851","text":"Michèle A. Wigger"}]},"title":"Utility of encoder side information for the lossless Kaspi/Heegard-B erger problem.","venue":"ISIT","pages":"3065-3069","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/LaichW13","doi":"10.1109/ISIT.2013.6620789","ee":"https://doi.org/10.1109/ISIT.2013.6620789","url":"https://dblp.org/rec/conf/isit/LaichW13"}, "url":"URL#4190640" }, { "@score":"2", "@id":"4190854", "info":{"authors":{"author":[{"@pid":"44/5120","text":"Ramanan Subramanian"},{"@pid":"45/6426","text":"Badri N. Vellambi"},{"@pid":"26/1130","text":"Ingmar Land"}]},"title":"An improved bound on information loss due to finite block length in a Gaussian line network.","venue":"ISIT","pages":"1864-1868","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/SubramanianVL13","doi":"10.1109/ISIT.2013.6620549","ee":"https://doi.org/10.1109/ISIT.2013.6620549","url":"https://dblp.org/rec/conf/isit/SubramanianVL13"}, "url":"URL#4190854" }, { "@score":"2", "@id":"4231968", "info":{"authors":{"author":[{"@pid":"w/EricWMWong","text":"Eric W. M. Wong"},{"@pid":"73/273-1","text":"Jun Guo 0001"},{"@pid":"73/1162-1","text":"William Moran 0001"},{"@pid":"01/4750","text":"Moshe Zukerman"}]},"title":"Information exchange surrogates for approximation of blocking probabilities in overflow loss systems.","venue":"ITC","pages":"1-9","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/teletraffic/WongGMZ13","doi":"10.1109/ITC.2013.6662932","ee":"https://doi.org/10.1109/ITC.2013.6662932","url":"https://dblp.org/rec/conf/teletraffic/WongGMZ13"}, "url":"URL#4231968" }, { "@score":"2", "@id":"4234240", "info":{"authors":{"author":[{"@pid":"35/547","text":"Chih-Chung Hsu"},{"@pid":"l/ChiaWenLin","text":"Chia-Wen Lin"},{"@pid":"31/9004","text":"Yuming Fang"},{"@pid":"14/3737","text":"Weisi Lin"}]},"title":"Objective quality assessment for image retargeting based on perceptual distortion and information loss.","venue":"VCIP","pages":"1-6","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vcip/HsuLFL13","doi":"10.1109/VCIP.2013.6706443","ee":"https://doi.org/10.1109/VCIP.2013.6706443","url":"https://dblp.org/rec/conf/vcip/HsuLFL13"}, "url":"URL#4234240" }, { "@score":"2", "@id":"4234468", "info":{"authors":{"author":[{"@pid":"g/WenGao","text":"Wen Gao 0001"},{"@pid":"78/6619","text":"Minqiang Jiang"},{"@pid":"72/4474","text":"Haoping Yu"}]},"title":"On lossless coding for HEVC.","venue":"Visual Information Processing and Communication","pages":"866609","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/vipc/0001JY13","doi":"10.1117/12.2010198","ee":"https://doi.org/10.1117/12.2010198","url":"https://dblp.org/rec/conf/vipc/0001JY13"}, "url":"URL#4234468" }, { "@score":"2", "@id":"4242888", "info":{"authors":{"author":[{"@pid":"69/2960","text":"Rayna Dimitrova"},{"@pid":"73/4443","text":"Bernd Finkbeiner"}]},"title":"Lossy Channel Games under Incomplete Information","venue":"SR","pages":"43-51","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"journals/corr/abs-1303-0790","doi":"10.4204/EPTCS.112.9","ee":"https://doi.org/10.4204/EPTCS.112.9","url":"https://dblp.org/rec/journals/corr/abs-1303-0790"}, "url":"URL#4242888" }, { "@score":"2", "@id":"4244893", "info":{"authors":{"author":[{"@pid":"77/6612","text":"Chin-Feng Lee"},{"@pid":"86/6921","text":"Hsing-Ling Chen"}]},"title":"Lossless Text Steganography in Compression Coding.","venue":"Recent Advances in Information Hiding and Applications","pages":"155-179","year":"2013","type":"Parts in Books or Collections","access":"closed","key":"series/isrl/LeeC13","doi":"10.1007/978-3-642-28580-6_8","ee":"https://doi.org/10.1007/978-3-642-28580-6_8","url":"https://dblp.org/rec/series/isrl/LeeC13"}, "url":"URL#4244893" }, { "@score":"2", "@id":"4251981", "info":{"authors":{"author":[{"@pid":"05/9225","text":"Bernhard C. Geiger"},{"@pid":"81/3989","text":"Gernot Kubin"}]},"title":"Information Loss and Anti-Aliasing Filters in Multirate Systems.","venue":"CoRR","volume":"abs/1310.8487","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GeigerK13","ee":"http://arxiv.org/abs/1310.8487","url":"https://dblp.org/rec/journals/corr/GeigerK13"}, "url":"URL#4251981" }, { "@score":"2", "@id":"4257158", "info":{"authors":{"author":[{"@pid":"74/7118","text":"Yonatan Kaspi"},{"@pid":"92/1103","text":"Neri Merhav"}]},"title":"Zero-Delay and Causal Single-User and Multi-User Lossy Source Coding with Decoder Side Information","venue":"CoRR","volume":"abs/1301.0079","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1301-0079","ee":"http://arxiv.org/abs/1301.0079","url":"https://dblp.org/rec/journals/corr/abs-1301-0079"}, "url":"URL#4257158" }, { "@score":"3", "@id":"4257464", "info":{"authors":{"author":[{"@pid":"68/6788","text":"Eugene Perevalov"},{"@pid":"59/4748","text":"David Grace"}]},"title":"Towards the full information chain theory: expected loss and information relevance","venue":"CoRR","volume":"abs/1301.2020","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1301-2020","ee":"http://arxiv.org/abs/1301.2020","url":"https://dblp.org/rec/journals/corr/abs-1301-2020"}, "url":"URL#4257464" }, { "@score":"2", "@id":"4257494", "info":{"authors":{"author":[{"@pid":"06/8656","text":"Ge Xu"},{"@pid":"49/3283-17","text":"Wei Liu 0017"},{"@pid":"98/449","text":"Biao Chen"}]},"title":"Wyner's Common Information: Generalizations and A New Lossy Source Coding Interpretation","venue":"CoRR","volume":"abs/1301.2237","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1301-2237","ee":"http://arxiv.org/abs/1301.2237","url":"https://dblp.org/rec/journals/corr/abs-1301-2237"}, "url":"URL#4257494" }, { "@score":"2", "@id":"4258129", "info":{"authors":{"author":[{"@pid":"44/5120","text":"Ramanan Subramanian"},{"@pid":"45/6426","text":"Badri N. Vellambi"},{"@pid":"26/1130","text":"Ingmar Land"}]},"title":"Information Loss due to Finite Block Length in a Gaussian Line Network: An Improved Bound","venue":"CoRR","volume":"abs/1301.6255","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1301-6255","ee":"http://arxiv.org/abs/1301.6255","url":"https://dblp.org/rec/journals/corr/abs-1301-6255"}, "url":"URL#4258129" }, { "@score":"2", "@id":"4261970", "info":{"authors":{"author":[{"@pid":"05/9225","text":"Bernhard C. Geiger"},{"@pid":"81/3989","text":"Gernot Kubin"}]},"title":"On the Rate of Information Loss in Memoryless Systems","venue":"CoRR","volume":"abs/1304.5075","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1304-5075","ee":"http://arxiv.org/abs/1304.5075","url":"https://dblp.org/rec/journals/corr/abs-1304-5075"}, "url":"URL#4261970" }, { "@score":"2", "@id":"4295725", "info":{"authors":{"author":[{"@pid":"96/4724","text":"Grigorios Loukides"},{"@pid":"64/4944","text":"Aris Gkoulalas-Divanis"}]},"title":"Utility-preserving transaction data anonymization with low information loss.","venue":"Expert Syst. Appl.","volume":"39","number":"10","pages":"9764-9777","year":"2012","type":"Journal Articles","access":"closed","key":"journals/eswa/LoukidesG12","doi":"10.1016/J.ESWA.2012.02.179","ee":"https://doi.org/10.1016/j.eswa.2012.02.179","url":"https://dblp.org/rec/journals/eswa/LoukidesG12"}, "url":"URL#4295725" }, { "@score":"2", "@id":"4303222", "info":{"authors":{"author":{"@pid":"52/295","text":"Yifan Chen"}},"title":"Chernoff information path loss in wireless relay sensor networks.","venue":"IET Wirel. Sens. Syst.","volume":"2","number":"3","pages":"201-213","year":"2012","type":"Journal Articles","access":"closed","key":"journals/iet-wss/Chen12","doi":"10.1049/IET-WSS.2012.0008","ee":"https://doi.org/10.1049/iet-wss.2012.0008","url":"https://dblp.org/rec/journals/iet-wss/Chen12"}, "url":"URL#4303222" }, { "@score":"2", "@id":"4326942", "info":{"authors":{"author":[{"@pid":"28/3159","text":"Maryam Nazari"},{"@pid":"81/5726","text":"Sheila Webber"}]},"title":"Loss of faith in the origins of information literacy in e-environments: Proposal of a holistic approach.","venue":"J. Libr. Inf. Sci.","volume":"44","number":"2","pages":"97-107","year":"2012","type":"Journal Articles","access":"closed","key":"journals/jolis/NazariW12","doi":"10.1177/0961000611436095","ee":"https://doi.org/10.1177/0961000611436095","url":"https://dblp.org/rec/journals/jolis/NazariW12"}, "url":"URL#4326942" }, { "@score":"3", "@id":"4337056", "info":{"authors":{"author":[{"@pid":"77/9339","text":"Amy Kuceyeski"},{"@pid":"50/671","text":"Yu Zhang"},{"@pid":"63/2698","text":"Ashish Raj"}]},"title":"Linking white matter integrity loss to associated cortical regions using structural connectivity information in Alzheimer's disease and fronto-temporal dementia: The Loss in Connectivity (LoCo) score.","venue":"NeuroImage","volume":"61","number":"4","pages":"1311-1323","year":"2012","type":"Journal Articles","access":"closed","key":"journals/neuroimage/KuceyeskiZR12","doi":"10.1016/J.NEUROIMAGE.2012.03.039","ee":"https://doi.org/10.1016/j.neuroimage.2012.03.039","url":"https://dblp.org/rec/journals/neuroimage/KuceyeskiZR12"}, "url":"URL#4337056" }, { "@score":"2", "@id":"4338182", "info":{"authors":{"author":[{"@pid":"23/5508","text":"Masayuki Karasuyama"},{"@pid":"35/1228","text":"Masashi Sugiyama"}]},"title":"Canonical dependency analysis based on squared-loss mutual information.","venue":"Neural Networks","volume":"34","pages":"46-55","year":"2012","type":"Journal Articles","access":"closed","key":"journals/nn/KarasuyamaS12","doi":"10.1016/J.NEUNET.2012.06.009","ee":"https://doi.org/10.1016/j.neunet.2012.06.009","url":"https://dblp.org/rec/journals/nn/KarasuyamaS12"}, "url":"URL#4338182" }, { "@score":"3", "@id":"4348135", "info":{"authors":{"author":[{"@pid":"54/515","text":"Agnieszka C. Miguel"},{"@pid":"61/6980","text":"Eve A. Riskin"},{"@pid":"l/RELadner","text":"Richard E. Ladner"},{"@pid":"89/5786","text":"Dane Barney"}]},"title":"Near-lossless and lossy compression of imaging spectrometer data: comparison of information extraction performance.","venue":"Signal Image Video Process.","volume":"6","number":"4","pages":"597-611","year":"2012","type":"Journal Articles","access":"closed","key":"journals/sivp/MiguelRLB12","doi":"10.1007/S11760-010-0191-7","ee":"https://doi.org/10.1007/s11760-010-0191-7","url":"https://dblp.org/rec/journals/sivp/MiguelRLB12"}, "url":"URL#4348135" }, { "@score":"2", "@id":"4348632", "info":{"authors":{"author":[{"@pid":"19/1224","text":"Costas Voglis"},{"@pid":"49/3802","text":"Konstantinos E. Parsopoulos"},{"@pid":"13/991","text":"Isaac E. Lagaris"}]},"title":"Particle swarm optimization with deliberate loss of information.","venue":"Soft Comput.","volume":"16","number":"8","pages":"1373-1392","year":"2012","type":"Journal Articles","access":"closed","key":"journals/soco/VoglisPL12","doi":"10.1007/S00500-012-0841-5","ee":"https://doi.org/10.1007/s00500-012-0841-5","url":"https://dblp.org/rec/journals/soco/VoglisPL12"}, "url":"URL#4348632" }, { "@score":"2", "@id":"4348999", "info":{"authors":{"author":[{"@pid":"14/928","text":"Qing Chen"},{"@pid":"25/4390","text":"Henri Maître"},{"@pid":"97/10795","text":"Qiu-ping Deng"}]},"title":"Reliable information embedding for image/video in the presence of lossy compression.","venue":"Signal Process. Image Commun.","volume":"27","number":"1","pages":"66-74","year":"2012","type":"Journal Articles","access":"closed","key":"journals/spic/ChenMD12","doi":"10.1016/J.IMAGE.2010.12.005","ee":"https://doi.org/10.1016/j.image.2010.12.005","url":"https://dblp.org/rec/journals/spic/ChenMD12"}, "url":"URL#4348999" }, { "@score":"2", "@id":"4355006", "info":{"authors":{"author":[{"@pid":"44/2296","text":"Guorui Feng"},{"@pid":"43/8279","text":"Zhenxing Qian"},{"@pid":"01/3442-1","text":"Xinpeng Zhang 0001"}]},"title":"Spectrum-estimation based lossless information recovery for sparse array patterns.","venue":"Telecommun. Syst.","volume":"49","number":"2","pages":"163-169","year":"2012","type":"Journal Articles","access":"closed","key":"journals/telsys/FengQZ12","doi":"10.1007/S11235-010-9365-4","ee":"https://doi.org/10.1007/s11235-010-9365-4","url":"https://dblp.org/rec/journals/telsys/FengQZ12"}, "url":"URL#4355006" }, { "@score":"2", "@id":"4366749", "info":{"authors":{"author":[{"@pid":"18/8364","text":"Yifei Jiang"},{"@pid":"123/7074","text":"Yifu Li"},{"@pid":"62/7556","text":"Dongsong Ban"},{"@pid":"78/10373-3","text":"Yuanchao Xu 0003"}]},"title":"Frame Buffer Compression without Color Information Loss.","venue":"CIT","pages":"12-17","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/IEEEcit/JiangLBX12","doi":"10.1109/CIT.2012.29","ee":"https://doi.org/10.1109/CIT.2012.29","url":"https://dblp.org/rec/conf/IEEEcit/JiangLBX12"}, "url":"URL#4366749" }, { "@score":"2", "@id":"4382207", "info":{"authors":{"author":[{"@pid":"95/7429","text":"Yanjun Qian"},{"@pid":"35/8109-1","text":"Yue Deng 0001"},{"@pid":"39/4543","text":"Qionghai Dai"},{"@pid":"92/2256","text":"Yipeng Li"},{"@pid":"92/4809","text":"Guihua Er"}]},"title":"Visual words assignment on a graph via minimal mutual information loss.","venue":"BMVC","pages":"1-10","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/bmvc/QianDDLE12","doi":"10.5244/C.26.91","ee":"https://doi.org/10.5244/C.26.91","url":"https://dblp.org/rec/conf/bmvc/QianDDLE12"}, "url":"URL#4382207" }, { "@score":"2", "@id":"4392394", "info":{"authors":{"author":[{"@pid":"176/4642","text":"Ciro Civile"},{"@pid":"176/4719","text":"Heike Elchlepp"},{"@pid":"176/3004","text":"Rossy McLaren"},{"@pid":"05/7227","text":"Aureliu Lavric"},{"@pid":"166/4132","text":"Ian P. L. McLaren"}]},"title":"The face inversion effect and evoked brain potentials: Complete loss of configural information affects the N170.","venue":"CogSci","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/cogsci/CivileEMLM12","ee":"https://mindmodeling.org/cogsci2012/papers/0252/index.html","url":"https://dblp.org/rec/conf/cogsci/CivileEMLM12"}, "url":"URL#4392394" }, { "@score":"2", "@id":"4403292", "info":{"authors":{"author":{"@pid":"70/4225","text":"Olga Levina"}},"title":"Assessing Information Loss in EPC to BPMN Business Process Model Transformation.","venue":"EDOC Workshops","pages":"51-55","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/edoc/Levina12","doi":"10.1109/EDOCW.2012.38","ee":"https://doi.org/10.1109/EDOCW.2012.38","url":"https://dblp.org/rec/conf/edoc/Levina12"}, "url":"URL#4403292" }, { "@score":"2", "@id":"4413282", "info":{"authors":{"author":{"@pid":"21/708","text":"David F. Nettleton"}},"title":"Information loss evaluation based on fuzzy and crisp clustering of graph statistics.","venue":"FUZZ-IEEE","pages":"1-8","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/fuzzIEEE/Nettleton12","doi":"10.1109/FUZZ-IEEE.2012.6250774","ee":"https://doi.org/10.1109/FUZZ-IEEE.2012.6250774","url":"https://dblp.org/rec/conf/fuzzIEEE/Nettleton12"}, "url":"URL#4413282" }, { "@score":"2", "@id":"4425968", "info":{"authors":{"author":{"@pid":"52/295","text":"Yifan Chen"}},"title":"Modeling Chernoff information loss in cooperative sensor networks.","venue":"ICCC","pages":"763-768","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/iccchina/Chen12a","doi":"10.1109/ICCCHINA.2012.6356986","ee":"https://doi.org/10.1109/ICCChina.2012.6356986","url":"https://dblp.org/rec/conf/iccchina/Chen12a"}, "url":"URL#4425968" }, { "@score":"2", "@id":"4434834", "info":{"authors":{"author":{"@pid":"65/3964","text":"Junyong You"}},"title":"Video Gaze Prediction: Minimizing Perceptual Information Loss.","venue":"ICME","pages":"438-443","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/icmcs/You12","doi":"10.1109/ICME.2012.191","ee":"https://doi.org/10.1109/ICME.2012.191","url":"https://dblp.org/rec/conf/icmcs/You12"}, "url":"URL#4434834" }, { "@score":"2", "@id":"4458014", "info":{"authors":{"author":[{"@pid":"04/9668","text":"Behzad Ahmadi"},{"@pid":"12/3337","text":"Osvaldo Simeone"}]},"title":"Distributed and cascade lossy source coding with a side information "vending machine".","venue":"ISIT","pages":"184-188","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/AhmadiS12","doi":"10.1109/ISIT.2012.6283600","ee":"https://doi.org/10.1109/ISIT.2012.6283600","url":"https://dblp.org/rec/conf/isit/AhmadiS12"}, "url":"URL#4458014" }, { "@score":"2", "@id":"4458452", "info":{"authors":{"author":[{"@pid":"46/7254","text":"Avraham Reani"},{"@pid":"92/1103","text":"Neri Merhav"}]},"title":"Data processing lower bounds for scalar lossy source codes with side information at the decoder.","venue":"ISIT","pages":"1-5","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/ReaniM12","doi":"10.1109/ISIT.2012.6283651","ee":"https://doi.org/10.1109/ISIT.2012.6283651","url":"https://dblp.org/rec/conf/isit/ReaniM12"}, "url":"URL#4458452" }, { "@score":"2", "@id":"4458552", "info":{"authors":{"author":[{"@pid":"13/8759","text":"Kumar Viswanatha"},{"@pid":"62/3836","text":"Emrah Akyol"},{"@pid":"85/5752","text":"Kenneth Rose"}]},"title":"Lossy common information of two dependent random variables.","venue":"ISIT","pages":"528-532","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/ViswanathaAR12","doi":"10.1109/ISIT.2012.6284246","ee":"https://doi.org/10.1109/ISIT.2012.6284246","url":"https://dblp.org/rec/conf/isit/ViswanathaAR12"}, "url":"URL#4458552" }, { "@score":"2", "@id":"4463675", "info":{"authors":{"author":[{"@pid":"05/9225","text":"Bernhard C. Geiger"},{"@pid":"81/3989","text":"Gernot Kubin"}]},"title":"Relative information loss in the PCA.","venue":"ITW","pages":"562-566","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/itw/GeigerK12","doi":"10.1109/ITW.2012.6404738","ee":"https://doi.org/10.1109/ITW.2012.6404738","url":"https://dblp.org/rec/conf/itw/GeigerK12"}, "url":"URL#4463675" }, { "@score":"2", "@id":"4469684", "info":{"authors":{"author":[{"@pid":"55/5491","text":"Juan-Carlos Gomez 0001"},{"@pid":"m/MarieFrancineMoens","text":"Marie-Francine Moens"}]},"title":"Document Categorization Based on Minimum Loss of Reconstruction Information.","venue":"MICAI","pages":"91-103","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/micai/GomezM12","doi":"10.1007/978-3-642-37798-3_9","ee":"https://doi.org/10.1007/978-3-642-37798-3_9","url":"https://dblp.org/rec/conf/micai/GomezM12"}, "url":"URL#4469684" }, { "@score":"2", "@id":"4481936", "info":{"authors":{"author":[{"@pid":"21/708","text":"David F. Nettleton"},{"@pid":"77/8725","text":"Daniel Abril"}]},"title":"Document Sanitization: Measuring Search Engine Information Loss and Risk of Disclosure for the Wikileaks cables.","venue":"Privacy in Statistical Databases","pages":"308-321","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/psd/NettletonA12","doi":"10.1007/978-3-642-33627-0_24","ee":"https://doi.org/10.1007/978-3-642-33627-0_24","url":"https://dblp.org/rec/conf/psd/NettletonA12"}, "url":"URL#4481936" }, { "@score":"2", "@id":"4484404", "info":{"authors":{"author":[{"@pid":"124/0604","text":"Guilhem Puyou"},{"@pid":"155/5789","text":"Pierre Ezerzere"}]},"title":"Tolerance of Aircraft Longitudinal Control to the Loss of Scheduling Information : Toward a Performance Oriented Approach.","venue":"ROCOND","pages":"393-399","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/rocond/PuyouE12","doi":"10.3182/20120620-3-DK-2025.00150","ee":"https://doi.org/10.3182/20120620-3-DK-2025.00150","url":"https://dblp.org/rec/conf/rocond/PuyouE12"}, "url":"URL#4484404" }, { "@score":"3", "@id":"4496064", "info":{"authors":{"author":[{"@pid":"77/7082","text":"Kunihiko Harada"},{"@pid":"66/390","text":"Yoshinori Sato"},{"@pid":"85/201","text":"Yumiko Togashi"}]},"title":"Reducing Amount of Information Loss in k-Anonymization for Secondary Use of Collected Personal Information.","venue":"SRII Global Conference","pages":"61-69","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/srii/HaradaST12","doi":"10.1109/SRII.2012.18","ee":"https://doi.org/10.1109/SRII.2012.18","url":"https://dblp.org/rec/conf/srii/HaradaST12"}, "url":"URL#4496064" }, { "@score":"2", "@id":"4496191", "info":{"authors":{"author":[{"@pid":"85/11535","text":"Alexandra Pilalidou"},{"@pid":"13/1242","text":"Panos Vassiliadis"}]},"title":"Trading Privacy for Information Loss in the Blink of an Eye.","venue":"SSDBM","pages":"572-580","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ssdbm/PilalidouV12","doi":"10.1007/978-3-642-31235-9_38","ee":"https://doi.org/10.1007/978-3-642-31235-9_38","url":"https://dblp.org/rec/conf/ssdbm/PilalidouV12"}, "url":"URL#4496191" }, { "@score":"2", "@id":"4501235", "info":{"authors":{"author":[{"@pid":"56/1094","text":"Brendan Babb"},{"@pid":"62/5867","text":"Frank W. Moore"},{"@pid":"92/8284","text":"Shawn Aldridge"},{"@pid":"92/3475","text":"Michael R. Peterson"}]},"title":"State-of-the-art lossy compression of Martian images via the CMA-ES evolution strategy.","venue":"Visual Information Processing and Communication","pages":"83050U","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/vipc/BabbMAP12","doi":"10.1117/12.912162","ee":"https://doi.org/10.1117/12.912162","url":"https://dblp.org/rec/conf/vipc/BabbMAP12"}, "url":"URL#4501235" }, { "@score":"2", "@id":"4501237", "info":{"authors":{"author":[{"@pid":"39/8614","text":"Neslihan Bayramoglu"},{"@pid":"08/4639","text":"A. Aydin Alatan"}]},"title":"Lossless description of 3D range models.","venue":"Visual Information Processing and Communication","pages":"83050B","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/vipc/BayramogluA12","doi":"10.1117/12.910481","ee":"https://doi.org/10.1117/12.910481","url":"https://dblp.org/rec/conf/vipc/BayramogluA12"}, "url":"URL#4501237" }, { "@score":"2", "@id":"4501252", "info":{"authors":{"author":[{"@pid":"55/2932","text":"Bruno Macchiavello"},{"@pid":"29/6012","text":"Camilo C. Dorea"},{"@pid":"86/6364","text":"Edson M. Hung"},{"@pid":"17/6315","text":"Gene Cheung"},{"@pid":"76/1151","text":"Wai-Tian Tan"}]},"title":"Reference frame selection for loss-resilient depth map coding in multiview video conferencing.","venue":"Visual Information Processing and Communication","pages":"83050C","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/vipc/MacchiavelloDHC12","doi":"10.1117/12.909462","ee":"https://doi.org/10.1117/12.909462","url":"https://dblp.org/rec/conf/vipc/MacchiavelloDHC12"}, "url":"URL#4501252" }, { "@score":"2", "@id":"4501257", "info":{"authors":{"author":[{"@pid":"57/5713","text":"Sung-Bum Park"},{"@pid":"16/6803","text":"Jae-Hyun Kim"},{"@pid":"22/5147","text":"Yongje Kim"}]},"title":"Lossless halftone image compression using adaptive context template update.","venue":"Visual Information Processing and Communication","pages":"83050P","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/vipc/ParkKK12","doi":"10.1117/12.908478","ee":"https://doi.org/10.1117/12.908478","url":"https://dblp.org/rec/conf/vipc/ParkKK12"}, "url":"URL#4501257" }, { "@score":"2", "@id":"4501260", "info":{"authors":{"author":[{"@pid":"06/8108","text":"Michael Schöberl"},{"@pid":"65/3419","text":"Joachim Keinert"},{"@pid":"45/46","text":"Jürgen Seiler"},{"@pid":"97/8106","text":"Siegfried Foessel"},{"@pid":"00/6329","text":"André Kaup"}]},"title":"Defect pixel interpolation for lossy compression of camera raw data.","venue":"Visual Information Processing and Communication","pages":"83050N","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/vipc/SchoberlKSFK12","doi":"10.1117/12.907910","ee":"https://doi.org/10.1117/12.907910","url":"https://dblp.org/rec/conf/vipc/SchoberlKSFK12"}, "url":"URL#4501260" }, { "@score":"2", "@id":"4518602", "info":{"authors":{"author":[{"@pid":"05/9225","text":"Bernhard C. Geiger"},{"@pid":"81/3989","text":"Gernot Kubin"}]},"title":"Relative Information Loss - An Introduction","venue":"CoRR","volume":"abs/1203.6791","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1203-6791","ee":"http://arxiv.org/abs/1203.6791","url":"https://dblp.org/rec/journals/corr/abs-1203-6791"}, "url":"URL#4518602" }, { "@score":"2", "@id":"4518697", "info":{"authors":{"author":[{"@pid":"05/9225","text":"Bernhard C. Geiger"},{"@pid":"81/3989","text":"Gernot Kubin"}]},"title":"Relative Information Loss in the PCA","venue":"CoRR","volume":"abs/1204.0429","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1204-0429","ee":"http://arxiv.org/abs/1204.0429","url":"https://dblp.org/rec/journals/corr/abs-1204-0429"}, "url":"URL#4518697" }, { "@score":"2", "@id":"4520513", "info":{"authors":{"author":[{"@pid":"05/9225","text":"Bernhard C. Geiger"},{"@pid":"81/3989","text":"Gernot Kubin"}]},"title":"Signal Enhancement as Minimization of Relevant Information Loss","venue":"CoRR","volume":"abs/1205.6935","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1205-6935","ee":"http://arxiv.org/abs/1205.6935","url":"https://dblp.org/rec/journals/corr/abs-1205-6935"}, "url":"URL#4520513" }, { "@score":"2", "@id":"4521107", "info":{"authors":{"author":[{"@pid":"56/4937","text":"Makoto Yamada"},{"@pid":"09/4991","text":"Leonid Sigal"},{"@pid":"75/8610","text":"Michalis Raptis"},{"@pid":"35/1228","text":"Masashi Sugiyama"}]},"title":"Dependence Maximizing Temporal Alignment via Squared-Loss Mutual Information","venue":"CoRR","volume":"abs/1206.4116","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1206-4116","ee":"http://arxiv.org/abs/1206.4116","url":"https://dblp.org/rec/journals/corr/abs-1206-4116"}, "url":"URL#4521107" }, { "@score":"2", "@id":"4523809", "info":{"authors":{"author":[{"@pid":"46/7254","text":"Avraham Reani"},{"@pid":"92/1103","text":"Neri Merhav"}]},"title":"Data Processing Bounds for Scalar Lossy Source Codes with Side Information at the Decoder","venue":"CoRR","volume":"abs/1209.2066","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1209-2066","ee":"http://arxiv.org/abs/1209.2066","url":"https://dblp.org/rec/journals/corr/abs-1209-2066"}, "url":"URL#4523809" }, { "@score":"2", "@id":"4524664", "info":{"authors":{"author":[{"@pid":"95/3398","text":"Wittawat Jitkrittum"},{"@pid":"75/2801","text":"Hirotaka Hachiya"},{"@pid":"35/1228","text":"Masashi Sugiyama"}]},"title":"Feature Selection via L1-Penalized Squared-Loss Mutual Information","venue":"CoRR","volume":"abs/1210.1960","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1210-1960","ee":"http://arxiv.org/abs/1210.1960","url":"https://dblp.org/rec/journals/corr/abs-1210-1960"}, "url":"URL#4524664" }, { "@score":"2", "@id":"4528542", "info":{"authors":{"author":[{"@pid":"00/1901","text":"Jonathan W. Hui"},{"@pid":"27/6742","text":"Jean-Philippe Vasseur"}]},"title":"The Routing Protocol for Low-Power and Lossy Networks (RPL) Option for Carrying RPL Information in Data-Plane Datagrams.","venue":"RFC","volume":"6553","pages":"1-9","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc6553","doi":"10.17487/RFC6553","ee":"https://doi.org/10.17487/RFC6553","url":"https://dblp.org/rec/journals/rfc/rfc6553"}, "url":"URL#4528542" }, { "@score":"2", "@id":"4556509", "info":{"authors":{"author":[{"@pid":"b/JohnCBaez","text":"John C. Baez"},{"@pid":"65/9828","text":"Tobias Fritz"},{"@pid":"29/2805","text":"Tom Leinster"}]},"title":"A Characterization of Entropy in Terms of Information Loss.","venue":"Entropy","volume":"13","number":"11","pages":"1945-1957","year":"2011","type":"Journal Articles","access":"open","key":"journals/entropy/BaezFL11","doi":"10.3390/E13111945","ee":"https://doi.org/10.3390/e13111945","url":"https://dblp.org/rec/journals/entropy/BaezFL11"}, "url":"URL#4556509" }, { "@score":"2", "@id":"4559797", "info":{"authors":{"author":[{"@pid":"04/3708","text":"Masafumi Oizumi"},{"@pid":"18/6488","text":"Masato Okada"},{"@pid":"11/3260","text":"Shun-ichi Amari"}]},"title":"Information Loss Associated with Imperfect Observation and Mismatched Decoding.","venue":"Frontiers Comput. Neurosci.","volume":"5","pages":"9","year":"2011","type":"Journal Articles","access":"open","key":"journals/ficn/OizumiOA11","doi":"10.3389/FNCOM.2011.00009","ee":"https://doi.org/10.3389/fncom.2011.00009","url":"https://dblp.org/rec/journals/ficn/OizumiOA11"}, "url":"URL#4559797" }, { "@score":"2", "@id":"4560077", "info":{"authors":{"author":[{"@pid":"75/2455","text":"Sarra Ayouni"},{"@pid":"20/6407","text":"Sadok Ben Yahia"},{"@pid":"l/AnneLaurent","text":"Anne Laurent"}]},"title":"Extracting compact and information lossless sets of fuzzy association rules.","venue":"Fuzzy Sets Syst.","volume":"183","number":"1","pages":"1-25","year":"2011","type":"Journal Articles","access":"closed","key":"journals/fss/AyouniYL11","doi":"10.1016/J.FSS.2011.06.019","ee":"https://doi.org/10.1016/j.fss.2011.06.019","url":"https://dblp.org/rec/journals/fss/AyouniYL11"}, "url":"URL#4560077" }, { "@score":"2", "@id":"4568737", "info":{"authors":{"author":[{"@pid":"01/485","text":"Geoffrey Brown"},{"@pid":"59/9790","text":"Kam Woods"}]},"title":"Born Broken: Fonts and Information Loss in Legacy Digital Documents.","venue":"Int. J. Digit. Curation","volume":"6","number":"1","pages":"5-19","year":"2011","type":"Journal Articles","access":"open","key":"journals/ijdc/BrownW11","doi":"10.2218/IJDC.V6I1.168","ee":"https://doi.org/10.2218/ijdc.v6i1.168","url":"https://dblp.org/rec/journals/ijdc/BrownW11"}, "url":"URL#4568737" }, { "@score":"2", "@id":"4580115", "info":{"authors":{"author":[{"@pid":"84/9499","text":"Dieter Ghillemijn"},{"@pid":"37/4582","text":"Patrick Bultinck"},{"@pid":"57/7925","text":"Dimitri Van Neck"},{"@pid":"32/3048","text":"Paul W. Ayers"}]},"title":"A self-consistent Hirshfeld method for the atom in the molecule based on minimization of information loss.","venue":"J. Comput. Chem.","volume":"32","number":"8","pages":"1561-1567","year":"2011","type":"Journal Articles","access":"closed","key":"journals/jcc/GhillemijnBNA11","doi":"10.1002/JCC.21734","ee":"https://doi.org/10.1002/jcc.21734","url":"https://dblp.org/rec/journals/jcc/GhillemijnBNA11"}, "url":"URL#4580115" }, { "@score":"2", "@id":"4585842", "info":{"authors":{"author":[{"@pid":"50/5768","text":"Zhengmao Ye"},{"@pid":"04/4010","text":"Habib Mohamadian"},{"@pid":"42/4729","text":"Yongmao Ye"}]},"title":"Information Loss Determination on Digital Image Compression and Reconstruction Using Qualitative and Quantitative Analysis.","venue":"J. Multim.","volume":"6","number":"6","pages":"486-493","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jmm2/YeMY11","doi":"10.4304/JMM.6.6.486-493","ee":"https://doi.org/10.4304/jmm.6.6.486-493","url":"https://dblp.org/rec/journals/jmm2/YeMY11"}, "url":"URL#4585842" }, { "@score":"2", "@id":"4586482", "info":{"authors":{"author":[{"@pid":"65/2749-1","text":"Zhi-Hui Wang 0001"},{"@pid":"c/ChinChenChang","text":"Chin-Chen Chang 0001"},{"@pid":"83/3175","text":"Mingchu Li"},{"@pid":"59/4298","text":"Tzu-Chuen Lu"}]},"title":"A Simple Image Encoding Method with Data Lossless Information Hiding.","venue":"J. Networks","volume":"6","number":"3","pages":"400-407","year":"2011","type":"Journal Articles","access":"unavailable","key":"journals/jnw/WangCLL11","doi":"10.4304/JNW.6.3.400-407","ee":"https://doi.org/10.4304/jnw.6.3.400-407","url":"https://dblp.org/rec/journals/jnw/WangCLL11"}, "url":"URL#4586482" }, { "@score":"2", "@id":"4615864", "info":{"authors":{"author":[{"@pid":"33/6937-1","text":"Jin Meng 0001"},{"@pid":"y/EnHuiYang","text":"En-Hui Yang"},{"@pid":"46/5466","text":"Dake He"}]},"title":"Linear Interactive Encoding and Decoding for Lossless Source Coding With Decoder Only Side Information.","venue":"IEEE Trans. Inf. Theory","volume":"57","number":"8","pages":"5281-5297","year":"2011","type":"Journal Articles","access":"closed","key":"journals/tit/MengYH11","doi":"10.1109/TIT.2011.2158899","ee":"https://doi.org/10.1109/TIT.2011.2158899","url":"https://dblp.org/rec/journals/tit/MengYH11"}, "url":"URL#4615864" }, { "@score":"2", "@id":"4616524", "info":{"authors":{"author":[{"@pid":"80/2612","text":"Ana Granados"},{"@pid":"c/ManuelCebrian","text":"Manuel Cebrián"},{"@pid":"64/1881","text":"David Camacho"},{"@pid":"59/5271","text":"Francisco de Borja Rodríguez"}]},"title":"Reducing the Loss of Information through Annealing Text Distortion.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"23","number":"7","pages":"1090-1102","year":"2011","type":"Journal Articles","access":"closed","key":"journals/tkde/GranadosCCR11","doi":"10.1109/TKDE.2010.173","ee":"https://doi.org/10.1109/TKDE.2010.173","url":"https://dblp.org/rec/journals/tkde/GranadosCCR11"}, "url":"URL#4616524" }, { "@score":"2", "@id":"4630052", "info":{"authors":{"author":[{"@pid":"70/5178","text":"Ersen Ekrem"},{"@pid":"u/SennurUlukus","text":"Sennur Ulukus"}]},"title":"Secure lossy source coding with side information.","venue":"Allerton","pages":"1098-1105","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/allerton/EkremU11","doi":"10.1109/ALLERTON.2011.6120290","ee":"https://doi.org/10.1109/Allerton.2011.6120290","url":"https://dblp.org/rec/conf/allerton/EkremU11"}, "url":"URL#4630052" }, { "@score":"2", "@id":"4646322", "info":{"authors":{"author":[{"@pid":"06/8656","text":"Ge Xu"},{"@pid":"49/3283-17","text":"Wei Liu 0017"},{"@pid":"98/449","text":"Biao Chen"}]},"title":"Wyners common information for continuous random variables - A lossy source coding interpretation.","venue":"CISS","pages":"1-6","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ciss/XuLC11","doi":"10.1109/CISS.2011.5766249","ee":"https://doi.org/10.1109/CISS.2011.5766249","url":"https://dblp.org/rec/conf/ciss/XuLC11"}, "url":"URL#4646322" }, { "@score":"2", "@id":"4657606", "info":{"authors":{"author":[{"@pid":"46/1332","text":"Joel Greenyer"},{"@pid":"48/9729","text":"Sebastian Pook"},{"@pid":"36/9729","text":"Jan Rieke"}]},"title":"Preventing Information Loss in Incremental Model Synchronization by Reusing Elements.","venue":"ECMFA","pages":"144-159","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecmdafa/GreenyerPR11","doi":"10.1007/978-3-642-21470-7_11","ee":"https://doi.org/10.1007/978-3-642-21470-7_11","url":"https://dblp.org/rec/conf/ecmdafa/GreenyerPR11"}, "url":"URL#4657606" }, { "@score":"2", "@id":"4658006", "info":{"authors":{"author":[{"@pid":"85/4920","text":"John Grant"},{"@pid":"23/4530","text":"Anthony Hunter"}]},"title":"Measuring Consistency Gain and Information Loss in Stepwise Inconsistency Resolution.","venue":"ECSQARU","pages":"362-373","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecsqaru/GrantH11","doi":"10.1007/978-3-642-22152-1_31","ee":"https://doi.org/10.1007/978-3-642-22152-1_31","url":"https://dblp.org/rec/conf/ecsqaru/GrantH11"}, "url":"URL#4658006" }, { "@score":"2", "@id":"4673653", "info":{"authors":{"author":[{"@pid":"19/543","text":"Ravi Tandon"},{"@pid":"82/5303","text":"Lalitha Sankar"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"}]},"title":"Discriminatory Lossy Source Coding: Side Information Privacy.","venue":"GLOBECOM","pages":"1-5","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/TandonSP11","doi":"10.1109/GLOCOM.2011.6134031","ee":"https://doi.org/10.1109/GLOCOM.2011.6134031","url":"https://dblp.org/rec/conf/globecom/TandonSP11"}, "url":"URL#4673653" }, { "@score":"2", "@id":"4673698", "info":{"authors":{"author":[{"@pid":"19/11052","text":"Idalides J. Vergara-Laurens"},{"@pid":"66/1936","text":"Miguel A. Labrador"}]},"title":"Preserving privacy while reducing power consumption and information loss in LBS and participatory sensing applications.","venue":"GLOBECOM Workshops","pages":"1247-1252","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/Vergara-LaurensL11","doi":"10.1109/GLOCOMW.2011.6162381","ee":"https://doi.org/10.1109/GLOCOMW.2011.6162381","url":"https://dblp.org/rec/conf/globecom/Vergara-LaurensL11"}, "url":"URL#4673698" }, { "@score":"2", "@id":"4682417", "info":{"authors":{"author":[{"@pid":"00/8860","text":"Sivagnanasundaram Ramanan"},{"@pid":"11/7822","text":"John MacLaren Walsh"}]},"title":"Practical codes for lossy compression when side information may be absent.","venue":"ICASSP","pages":"3048-3051","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/icassp/RamananW11","doi":"10.1109/ICASSP.2011.5946301","ee":"https://doi.org/10.1109/ICASSP.2011.5946301","url":"https://dblp.org/rec/conf/icassp/RamananW11"}, "url":"URL#4682417" }, { "@score":"2", "@id":"4688231", "info":{"authors":{"author":[{"@pid":"68/1285","text":"Niya Li"},{"@pid":"07/314","text":"Jian Zhang"},{"@pid":"83/7134","text":"Wei Lv"},{"@pid":"35/10445","text":"Chengye Jin"}]},"title":"A Loss Assessment Design Method Based on SOA for Insurance Informationization.","venue":"ICDMA","pages":"38-41","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdma/LiZLJ11","doi":"10.1109/ICDMA.2011.18","ee":"https://doi.org/10.1109/ICDMA.2011.18","url":"https://dblp.org/rec/conf/icdma/LiZLJ11"}, "url":"URL#4688231" }, { "@score":"2", "@id":"4689219", "info":{"authors":{"author":[{"@pid":"71/10159","text":"Ricky Christanto"},{"@pid":"65/4541","text":"Shaou-Gang Miaou"},{"@pid":"07/3345","text":"Ting-Lan Lin"}]},"title":"Reducing perceptual discontinuity in peer-to-peer live video streaming based on frame loss visibility information.","venue":"ICEEI","pages":"1-6","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/iceei/ChristantoML11","doi":"10.1109/ICEEI.2011.6021614","ee":"https://doi.org/10.1109/ICEEI.2011.6021614","url":"https://dblp.org/rec/conf/iceei/ChristantoML11"}, "url":"URL#4689219" }, { "@score":"2", "@id":"4713886", "info":{"authors":{"author":[{"@pid":"118/3543","text":"Liping Shao"},{"@pid":"29/7035","text":"Xuanping Zhang"},{"@pid":"89/7839","text":"Yuemei Ren"}]},"title":"A DCT Multi-channel Image Information Sharing Scheme in Resisting JPEG Lossy Compression Attack.","venue":"IScIDE","pages":"761-768","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscide/ShaoZR11","doi":"10.1007/978-3-642-31919-8_97","ee":"https://doi.org/10.1007/978-3-642-31919-8_97","url":"https://dblp.org/rec/conf/iscide/ShaoZR11"}, "url":"URL#4713886" }, { "@score":"2", "@id":"4715532", "info":{"authors":{"author":[{"@pid":"67/7998","text":"Joffrey Villard"},{"@pid":"44/1416","text":"Pablo Piantanida"},{"@pid":"s/ShlomoShamai","text":"Shlomo Shamai"}]},"title":"Secure lossy source-channel wiretapping with side information at the receiving terminals.","venue":"ISIT","pages":"1141-1145","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/VillardPS11","doi":"10.1109/ISIT.2011.6033710","ee":"https://doi.org/10.1109/ISIT.2011.6033710","url":"https://dblp.org/rec/conf/isit/VillardPS11"}, "url":"URL#4715532" }, { "@score":"2", "@id":"4718271", "info":{"authors":{"author":[{"@pid":"05/9225","text":"Bernhard C. Geiger"},{"@pid":"55/7411","text":"Christian Feldbauer"},{"@pid":"81/3989","text":"Gernot Kubin"}]},"title":"Information loss in static nonlinearities.","venue":"ISWCS","pages":"799-803","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/iswcs/GeigerFK11","doi":"10.1109/ISWCS.2011.6125272","ee":"https://doi.org/10.1109/ISWCS.2011.6125272","url":"https://dblp.org/rec/conf/iswcs/GeigerFK11"}, "url":"URL#4718271" }, { "@score":"2", "@id":"4718272", "info":{"authors":{"author":[{"@pid":"05/9225","text":"Bernhard C. Geiger"},{"@pid":"81/3989","text":"Gernot Kubin"}]},"title":"Some results on the information loss in dynamical systems.","venue":"ISWCS","pages":"794-798","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/iswcs/GeigerK11","doi":"10.1109/ISWCS.2011.6125271","ee":"https://doi.org/10.1109/ISWCS.2011.6125271","url":"https://dblp.org/rec/conf/iswcs/GeigerK11"}, "url":"URL#4718272" }, { "@score":"2", "@id":"4720627", "info":{"authors":{"author":[{"@pid":"52/9768","text":"Kwashie Amartei Anang"},{"@pid":"18/2571","text":"Predrag B. Rapajic"},{"@pid":"39/9769","text":"Titus I. Eneh"},{"@pid":"76/9769","text":"Lawal Bello"}]},"title":"Sensitivity of information capacity of land mobile cellular system to propagation loss parameters at higher microwave frequencies.","venue":"IWCMC","pages":"630-635","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwcmc/AnangREB11","doi":"10.1109/IWCMC.2011.5982619","ee":"https://doi.org/10.1109/IWCMC.2011.5982619","url":"https://dblp.org/rec/conf/iwcmc/AnangREB11"}, "url":"URL#4720627" }, { "@score":"2", "@id":"4723648", "info":{"authors":{"author":[{"@pid":"h/ShiMinHu","text":"Shimin Hu 0001"},{"@pid":"88/10295","text":"Dingli Zhang"}]},"title":"The Information Construction Management about Initial Support of High-speed Railway Tunnel in Loess Region.","venue":"LISS","pages":"155-158","year":"2011","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/liss/HuZ11","url":"https://dblp.org/rec/conf/liss/HuZ11"}, "url":"URL#4723648" }, { "@score":"2", "@id":"4740140", "info":{"authors":{"author":[{"@pid":"124/0647","text":"Octavian Stefan"},{"@pid":"32/7853","text":"Alexandru Codrean"},{"@pid":"68/752","text":"Toma-Leonida Dragomir"},{"@pid":"51/8168","text":"Ioan Silea"}]},"title":"Time delay and information loss compensation in a network control system for a DC motor.","venue":"SACI","pages":"131-135","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/saci/StefanCDS11","doi":"10.1109/SACI.2011.5872986","ee":"https://doi.org/10.1109/SACI.2011.5872986","url":"https://dblp.org/rec/conf/saci/StefanCDS11"}, "url":"URL#4740140" }, { "@score":"2", "@id":"4752524", "info":{"authors":{"author":[{"@pid":"67/7998","text":"Joffrey Villard"},{"@pid":"44/1416","text":"Pablo Piantanida"}]},"title":"Secure distributed lossless compression with side information at the eavesdropper.","venue":"VALUETOOLS","pages":"665-672","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/valuetools/VillardP11","doi":"10.4108/ICST.VALUETOOLS.2011.245777","ee":"https://doi.org/10.4108/icst.valuetools.2011.245777","url":"https://dblp.org/rec/conf/valuetools/VillardP11"}, "url":"URL#4752524" }, { "@score":"2", "@id":"4752834", "info":{"authors":{"author":[{"@pid":"14/4834-23","text":"Jing Huang 0023"},{"@pid":"32/6590","text":"Dan Schonfeld"}]},"title":"Particle filtering with missing frames and its application to video tracking over lossy networks.","venue":"Visual Information Processing and Communication","pages":"78820F","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/vipc/HuangS11","doi":"10.1117/12.872268","ee":"https://doi.org/10.1117/12.872268","url":"https://dblp.org/rec/conf/vipc/HuangS11"}, "url":"URL#4752834" }, { "@score":"2", "@id":"4752839", "info":{"authors":{"author":[{"@pid":"15/10327","text":"K. C. Amit Kumar"},{"@pid":"22/8054","text":"Rony Darazi"},{"@pid":"m/BenoitMMacq","text":"Benoît Macq"}]},"title":"Optimal optical flow based disparity map estimation for lossless stereo image coding.","venue":"Visual Information Processing and Communication","pages":"78820H","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/vipc/KumarDM11","doi":"10.1117/12.872589","ee":"https://doi.org/10.1117/12.872589","url":"https://dblp.org/rec/conf/vipc/KumarDM11"}, "url":"URL#4752839" }, { "@score":"4", "@id":"4752843", "info":{"authors":{"author":{"@pid":"54/515","text":"Agnieszka C. Miguel"}},"title":"Impact of near-lossless and lossy coding on information extraction from hyperspectral data.","venue":"Visual Information Processing and Communication","pages":"788209","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/vipc/Miguel11","doi":"10.1117/12.876506","ee":"https://doi.org/10.1117/12.876506","url":"https://dblp.org/rec/conf/vipc/Miguel11"}, "url":"URL#4752843" }, { "@score":"2", "@id":"4752848", "info":{"authors":{"author":[{"@pid":"124/7257","text":"Adarsh K. Ramasubramonian"},{"@pid":"15/4178","text":"John W. Woods"}]},"title":"MD/PNC with feedback for heterogeneous video multicast in lossy networks.","venue":"Visual Information Processing and Communication","pages":"78820M","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/vipc/Ramasubramonian11","doi":"10.1117/12.872897","ee":"https://doi.org/10.1117/12.872897","url":"https://dblp.org/rec/conf/vipc/Ramasubramonian11"}, "url":"URL#4752848" }, { "@score":"2", "@id":"4762220", "info":{"authors":{"author":[{"@pid":"265/0441","text":"Laura Goebes"},{"@pid":"00/11275","text":"Karl-Martin Ehrhart"},{"@pid":"24/2155","text":"Christof Weinhardt"}]},"title":"Anticipated Emotions in the Reference-Dependent Valuation of Gains and Losses.","venue":"Information Management and Market Engineering Vol. II","pages":"159-178","year":"2011","type":"Parts in Books or Collections","access":"unavailable","key":"books/others/11/GoebesEW11","url":"https://dblp.org/rec/books/others/11/GoebesEW11"}, "url":"URL#4762220" }, { "@score":"2", "@id":"4771278", "info":{"authors":{"author":[{"@pid":"05/9225","text":"Bernhard C. Geiger"},{"@pid":"55/7411","text":"Christian Feldbauer"},{"@pid":"81/3989","text":"Gernot Kubin"}]},"title":"Information Loss in Static Nonlinearities","venue":"CoRR","volume":"abs/1102.4794","year":"2011","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1102-4794","ee":"http://arxiv.org/abs/1102.4794","url":"https://dblp.org/rec/journals/corr/abs-1102-4794"}, "url":"URL#4771278" }, { "@score":"2", "@id":"4773281", "info":{"authors":{"author":[{"@pid":"67/7998","text":"Joffrey Villard"},{"@pid":"44/1416","text":"Pablo Piantanida"},{"@pid":"s/ShlomoShamai","text":"Shlomo Shamai"}]},"title":"Secure Lossy Source-Channel Wiretapping with Side Information at the Receiving Terminals","venue":"CoRR","volume":"abs/1105.4555","year":"2011","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1105-4555","ee":"http://arxiv.org/abs/1105.4555","url":"https://dblp.org/rec/journals/corr/abs-1105-4555"}, "url":"URL#4773281" }, { "@score":"2", "@id":"4773721", "info":{"authors":{"author":[{"@pid":"b/JohnCBaez","text":"John C. Baez"},{"@pid":"65/9828","text":"Tobias Fritz"},{"@pid":"29/2805","text":"Tom Leinster"}]},"title":"A Characterization of Entropy in Terms of Information Loss","venue":"CoRR","volume":"abs/1106.1791","year":"2011","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1106-1791","ee":"http://arxiv.org/abs/1106.1791","url":"https://dblp.org/rec/journals/corr/abs-1106-1791"}, "url":"URL#4773721" }, { "@score":"2", "@id":"4773770", "info":{"authors":{"author":[{"@pid":"19/543","text":"Ravi Tandon"},{"@pid":"82/5303","text":"Lalitha Sankar"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"}]},"title":"Discriminatory Lossy Source Coding: Side Information Privacy","venue":"CoRR","volume":"abs/1106.2057","year":"2011","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1106-2057","ee":"http://arxiv.org/abs/1106.2057","url":"https://dblp.org/rec/journals/corr/abs-1106-2057"}, "url":"URL#4773770" }, { "@score":"2", "@id":"4773809", "info":{"authors":{"author":[{"@pid":"05/9225","text":"Bernhard C. Geiger"},{"@pid":"81/3989","text":"Gernot Kubin"}]},"title":"Some Results on the Information Loss in Dynamical Systems","venue":"CoRR","volume":"abs/1106.2404","year":"2011","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1106-2404","ee":"http://arxiv.org/abs/1106.2404","url":"https://dblp.org/rec/journals/corr/abs-1106-2404"}, "url":"URL#4773809" }, { "@score":"2", "@id":"4776212", "info":{"authors":{"author":[{"@pid":"05/9225","text":"Bernhard C. Geiger"},{"@pid":"81/3989","text":"Gernot Kubin"}]},"title":"On the Information Loss in Memoryless Systems: The Multivariate Case","venue":"CoRR","volume":"abs/1109.4856","year":"2011","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1109-4856","ee":"http://arxiv.org/abs/1109.4856","url":"https://dblp.org/rec/journals/corr/abs-1109-4856"}, "url":"URL#4776212" }, { "@score":"2", "@id":"4776425", "info":{"authors":{"author":[{"@pid":"04/9668","text":"Behzad Ahmadi"},{"@pid":"12/3337","text":"Osvaldo Simeone"}]},"title":"Distributed and Cascade Lossy Source Coding with a Side Information "Vending Machine"","venue":"CoRR","volume":"abs/1109.6665","year":"2011","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1109-6665","ee":"http://arxiv.org/abs/1109.6665","url":"https://dblp.org/rec/journals/corr/abs-1109-6665"}, "url":"URL#4776425" }, { "@score":"2", "@id":"4786550", "info":{"authors":{"author":[{"@pid":"71/214","text":"Peter Schachte"},{"@pid":"s/HaraldSondergaard","text":"Harald Søndergaard"},{"@pid":"41/1027","text":"Leigh Whiting"},{"@pid":"47/6964","text":"Kevin Henshall"}]},"title":"Information loss in knowledge compilation: A comparison of Boolean envelopes.","venue":"Artif. Intell.","volume":"174","number":"9-10","pages":"585-596","year":"2010","type":"Journal Articles","access":"closed","key":"journals/ai/SchachteSWH10","doi":"10.1016/J.ARTINT.2010.03.003","ee":"https://doi.org/10.1016/j.artint.2010.03.003","url":"https://dblp.org/rec/journals/ai/SchachteSWH10"}, "url":"URL#4786550" }, { "@score":"2", "@id":"4806160", "info":{"authors":{"author":[{"@pid":"51/6917","text":"Gert Van Dijck"},{"@pid":"64/5377","text":"Marc M. Van Hulle"}]},"title":"Increasing and Decreasing Returns and Losses in Mutual Information Feature Subset Selection.","venue":"Entropy","volume":"12","number":"10","pages":"2144-2170","year":"2010","type":"Journal Articles","access":"open","key":"journals/entropy/DijckH10","doi":"10.3390/E12102144","ee":"https://doi.org/10.3390/e12102144","url":"https://dblp.org/rec/journals/entropy/DijckH10"}, "url":"URL#4806160" }, { "@score":"2", "@id":"4808343", "info":{"authors":{"author":[{"@pid":"23/5823","text":"Peng Zhou"},{"@pid":"07/5647","text":"Liwei Fan"},{"@pid":"63/7428","text":"De-Qun Zhou"}]},"title":"Data aggregation in constructing composite indicators: A perspective of information loss.","venue":"Expert Syst. Appl.","volume":"37","number":"1","pages":"360-365","year":"2010","type":"Journal Articles","access":"closed","key":"journals/eswa/ZhouFZ10","doi":"10.1016/J.ESWA.2009.05.039","ee":"https://doi.org/10.1016/j.eswa.2009.05.039","url":"https://dblp.org/rec/journals/eswa/ZhouFZ10"}, "url":"URL#4808343" }, { "@score":"2", "@id":"4822456", "info":{"authors":{"author":[{"@pid":"04/3672","text":"Susana Ladra"},{"@pid":"t/VicencTorra","text":"Vicenç Torra"}]},"title":"Information Loss for Synthetic Data through Fuzzy Clustering.","venue":"Int. J. Uncertain. Fuzziness Knowl. Based Syst.","volume":"18","number":"1","pages":"25-37","year":"2010","type":"Journal Articles","access":"closed","key":"journals/ijufks/LadraT10","doi":"10.1142/S0218488510006362","ee":"https://doi.org/10.1142/S0218488510006362","url":"https://dblp.org/rec/journals/ijufks/LadraT10"}, "url":"URL#4822456" }, { "@score":"2", "@id":"4836873", "info":{"authors":{"author":[{"@pid":"65/2749-1","text":"Zhi-Hui Wang 0001"},{"@pid":"c/ChinChenChang","text":"Chin-Chen Chang 0001"},{"@pid":"49/2705","text":"Kuo-Nan Chen"},{"@pid":"83/3175","text":"Mingchu Li"}]},"title":"An encoding method for both image compression and data lossless information hiding.","venue":"J. Syst. Softw.","volume":"83","number":"11","pages":"2073-2082","year":"2010","type":"Journal Articles","access":"closed","key":"journals/jss/WangCCL10","doi":"10.1016/J.JSS.2010.06.007","ee":"https://doi.org/10.1016/j.jss.2010.06.007","url":"https://dblp.org/rec/journals/jss/WangCCL10"}, "url":"URL#4836873" }, { "@score":"2", "@id":"4841304", "info":{"authors":{"author":[{"@pid":"30/2935","text":"Jörn Sass"},{"@pid":"76/2361","text":"Ralf Wunderlich"}]},"title":"Optimal portfolio policies under bounded expected loss and partial information.","venue":"Math. Methods Oper. Res.","volume":"72","number":"1","pages":"25-61","year":"2010","type":"Journal Articles","access":"closed","key":"journals/mmor/SassW10","doi":"10.1007/S00186-010-0300-Y","ee":"https://doi.org/10.1007/s00186-010-0300-y","url":"https://dblp.org/rec/journals/mmor/SassW10"}, "url":"URL#4841304" }, { "@score":"2", "@id":"4844187", "info":{"authors":{"author":[{"@pid":"116/3948","text":"Gary Price"},{"@pid":"38/10740","text":"Mara Cercignani"},{"@pid":"116/3881","text":"Elvina M. Chu"},{"@pid":"116/4191","text":"Thomas R. E. Barnes"},{"@pid":"46/2264","text":"Gareth J. Barker"},{"@pid":"116/2389","text":"Eileen M. Joyce"},{"@pid":"116/3910","text":"Maria A. Ron"}]},"title":"Brain pathology in first-episode psychosis: Magnetization transfer imaging provides additional information to MRI measurements of volume loss.","venue":"NeuroImage","volume":"49","number":"1","pages":"185-192","year":"2010","type":"Journal Articles","access":"closed","key":"journals/neuroimage/PriceCCBBJR10","doi":"10.1016/J.NEUROIMAGE.2009.07.037","ee":"https://doi.org/10.1016/j.neuroimage.2009.07.037","url":"https://dblp.org/rec/journals/neuroimage/PriceCCBBJR10"}, "url":"URL#4844187" }, { "@score":"2", "@id":"4862028", "info":{"authors":{"author":[{"@pid":"24/2219-1","text":"Yihong Wu 0001"},{"@pid":"v/SVerdu","text":"Sergio Verdú"}]},"title":"Rényi information dimension: fundamental limits of almost lossless analog compression.","venue":"IEEE Trans. Inf. Theory","volume":"56","number":"8","pages":"3721-3748","year":"2010","type":"Journal Articles","access":"closed","key":"journals/tit/WuV10","doi":"10.1109/TIT.2010.2050803","ee":"https://doi.org/10.1109/TIT.2010.2050803","url":"https://dblp.org/rec/journals/tit/WuV10"}, "url":"URL#4862028" }, { "@score":"2", "@id":"4862032", "info":{"authors":{"author":[{"@pid":"y/EnHuiYang","text":"En-Hui Yang"},{"@pid":"46/5466","text":"Da-ke He"}]},"title":"Interactive encoding and decoding for one way learning: near lossless recovery with side information at the decoder.","venue":"IEEE Trans. Inf. Theory","volume":"56","number":"4","pages":"1808-1824","year":"2010","type":"Journal Articles","access":"closed","key":"journals/tit/YangH10","doi":"10.1109/TIT.2010.2040867","ee":"https://doi.org/10.1109/TIT.2010.2040867","url":"https://dblp.org/rec/journals/tit/YangH10"}, "url":"URL#4862032" }, { "@score":"2", "@id":"4866717", "info":{"authors":{"author":[{"@pid":"84/1733-1","text":"Jinsong Wu 0001"},{"@pid":"55/2073","text":"Steven D. Blostein"}]},"title":"Rectangular information lossless linear dispersion codes.","venue":"IEEE Trans. Wirel. Commun.","volume":"9","number":"2","pages":"517-522","year":"2010","type":"Journal Articles","access":"closed","key":"journals/twc/WuB10","doi":"10.1109/TWC.2010.02.090065","ee":"https://doi.org/10.1109/TWC.2010.02.090065","url":"https://dblp.org/rec/journals/twc/WuB10"}, "url":"URL#4866717" }, { "@score":"2", "@id":"4871171", "info":{"authors":{"author":[{"@pid":"51/6191","text":"Nathan Gnanasambandam"},{"@pid":"37/4879","text":"Jessica Staddon"}]},"title":"Personalized Privacy Policies: Challenges for Data Loss Prevention.","venue":"AAAI Spring Symposium - Intelligent Information Privacy Management","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/aaaiss/GnanasambandamS10","ee":"http://www.aaai.org/ocs/index.php/SSS/SSS10/paper/view/1045","url":"https://dblp.org/rec/conf/aaaiss/GnanasambandamS10"}, "url":"URL#4871171" }, { "@score":"2", "@id":"4874821", "info":{"authors":{"author":[{"@pid":"67/7998","text":"Joffrey Villard"},{"@pid":"44/1416","text":"Pablo Piantanida"}]},"title":"Secure lossy source coding with side information at the decoders.","venue":"Allerton","pages":"733-739","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/allerton/VillardP10","doi":"10.1109/ALLERTON.2010.5706980","ee":"https://doi.org/10.1109/ALLERTON.2010.5706980","url":"https://dblp.org/rec/conf/allerton/VillardP10"}, "url":"URL#4874821" }, { "@score":"2", "@id":"4890233", "info":{"title":"Information Loss through Data Aggregation.","venue":"Int. CMG Conference","year":"2010","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/cmg/X10e","ee":"http://www.cmg.org/?s2member_file_download=/proceedings/2010/5115.pdf","url":"https://dblp.org/rec/conf/cmg/X10e"}, "url":"URL#4890233" }, { "@score":"2", "@id":"4895564", "info":{"authors":{"author":[{"@pid":"97/2274","text":"Yu Liu"},{"@pid":"12/2633","text":"Ting Wang"},{"@pid":"43/6576","text":"Jianhua Feng"}]},"title":"A Semantic Information Loss Metric for Privacy Preserving Publication.","venue":"DASFAA","pages":"138-152","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasfaa/LiuWF10","doi":"10.1007/978-3-642-12098-5_11","ee":"https://doi.org/10.1007/978-3-642-12098-5_11","url":"https://dblp.org/rec/conf/dasfaa/LiuWF10"}, "url":"URL#4895564" }, { "@score":"2", "@id":"4896543", "info":{"authors":{"author":{"@pid":"41/5022","text":"Mina Sartipi"}},"title":"LDPC Codes for Information Embedding and Lossy Distributed Source Coding.","venue":"DCC","pages":"551","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/dcc/Sartipi10","doi":"10.1109/DCC.2010.87","ee":"https://doi.org/10.1109/DCC.2010.87","url":"https://dblp.org/rec/conf/dcc/Sartipi10"}, "url":"URL#4896543" }, { "@score":"2", "@id":"4905359", "info":{"authors":{"author":[{"@pid":"36/1923","text":"Won-Hee Kim"},{"@pid":"24/4563","text":"Jong-Nam Kim"}]},"title":"Cloud Image Resolution Enhancement Method Using Loss Information Estimation.","venue":"FGIT-SIP/MulGraB","pages":"115-120","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/fgit/KimK10b","doi":"10.1007/978-3-642-17641-8_15","ee":"https://doi.org/10.1007/978-3-642-17641-8_15","url":"https://dblp.org/rec/conf/fgit/KimK10b"}, "url":"URL#4905359" }, { "@score":"2", "@id":"4907621", "info":{"authors":{"author":[{"@pid":"52/7793","text":"Isaac Cano"},{"@pid":"04/3672","text":"Susana Ladra"},{"@pid":"t/VicencTorra","text":"Vicenç Torra"}]},"title":"Evaluation of information loss for privacy preserving data mining through comparison of fuzzy partitions.","venue":"FUZZ-IEEE","pages":"1-8","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/fuzzIEEE/CanoLT10","doi":"10.1109/FUZZY.2010.5584186","ee":"https://doi.org/10.1109/FUZZY.2010.5584186","url":"https://dblp.org/rec/conf/fuzzIEEE/CanoLT10"}, "url":"URL#4907621" }, { "@score":"2", "@id":"4918388", "info":{"authors":{"author":{"@pid":"50/2164","text":"Barry G. Quinn"}},"title":"Phase-only information loss.","venue":"ICASSP","pages":"3982-3985","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icassp/Quinn10","doi":"10.1109/ICASSP.2010.5495779","ee":"https://doi.org/10.1109/ICASSP.2010.5495779","url":"https://dblp.org/rec/conf/icassp/Quinn10"}, "url":"URL#4918388" }, { "@score":"2", "@id":"4918747", "info":{"authors":{"author":[{"@pid":"35/8760","text":"Jiaxi Xiao"},{"@pid":"58/568","text":"Xiaoli Ma"},{"@pid":"45/6772","text":"Steven W. McLaughlin"}]},"title":"Quantifying information rate losses with zero-forcing and maximum-likelihood detectors.","venue":"ICASSP","pages":"3342-3345","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icassp/XiaoMM10","doi":"10.1109/ICASSP.2010.5496010","ee":"https://doi.org/10.1109/ICASSP.2010.5496010","url":"https://dblp.org/rec/conf/icassp/XiaoMM10"}, "url":"URL#4918747" }, { "@score":"2", "@id":"4923287", "info":{"authors":{"author":[{"@pid":"07/8585","text":"Liu Heng"},{"@pid":"40/8592","text":"Pan Jing-ming"},{"@pid":"74/8588","text":"Tang Xiao-wo"}]},"title":"Research on Markdown Money Contract with a Loss-Averse Supplier under the Asymmetric Information.","venue":"ICEE","pages":"3255-3259","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icee/HengJX10","doi":"10.1109/ICEE.2010.819","ee":"https://doi.org/10.1109/ICEE.2010.819","url":"https://dblp.org/rec/conf/icee/HengJX10"}, "url":"URL#4923287" }, { "@score":"2", "@id":"4927695", "info":{"authors":{"author":{"@pid":"23/10656","text":"Astrid Fontaine"}},"title":"Assessing the Risk of Acquired Information Technology Knowledge Loss.","venue":"ICIS","pages":"167","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icis/Fontaine10","ee":"http://aisel.aisnet.org/icis2010_submissions/167","url":"https://dblp.org/rec/conf/icis/Fontaine10"}, "url":"URL#4927695" }, { "@score":"2", "@id":"4935578", "info":{"authors":{"author":[{"@pid":"65/2749-1","text":"Zhi-Hui Wang 0001"},{"@pid":"c/ChinChenChang","text":"Chin-Chen Chang 0001"},{"@pid":"83/3175","text":"Mingchu Li"},{"@pid":"59/4298","text":"Tzu-Chuen Lu"}]},"title":"A simple image encoding method with data lossless information hiding.","venue":"ICUIMC","pages":"44","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icuimc/WangCLL10","doi":"10.1145/2108616.2108670","ee":"https://doi.org/10.1145/2108616.2108670","url":"https://dblp.org/rec/conf/icuimc/WangCLL10"}, "url":"URL#4935578" }, { "@score":"2", "@id":"4937506", "info":{"authors":{"author":[{"@pid":"06/7894","text":"Fabio Bisogni"},{"@pid":"12/7894","text":"Simona Cavallini"}]},"title":"Assessing the Economic Loss and Social Impact of Information System Breakdowns.","venue":"Critical Infrastructure Protection","pages":"185-198","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/ifip11-10/BisogniC10","doi":"10.1007/978-3-642-16806-2_13","ee":"https://doi.org/10.1007/978-3-642-16806-2_13","url":"https://dblp.org/rec/conf/ifip11-10/BisogniC10"}, "url":"URL#4937506" }, { "@score":"2", "@id":"4938763", "info":{"authors":{"author":[{"@pid":"22/4411","text":"Francesca Bovolo"},{"@pid":"68/4982","text":"Silvia Marchesi"},{"@pid":"50/1319","text":"Lorenzo Bruzzone"}]},"title":"A nearly lossless 2d representation and characterization of change information in multispectral images.","venue":"IGARSS","pages":"3074-3077","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/igarss/BovoloMB10","doi":"10.1109/IGARSS.2010.5652646","ee":"https://doi.org/10.1109/IGARSS.2010.5652646","url":"https://dblp.org/rec/conf/igarss/BovoloMB10"}, "url":"URL#4938763" }, { "@score":"2", "@id":"4941344", "info":{"authors":{"author":[{"@pid":"22/128","text":"Antonio Miguel Mora"},{"@pid":"32/839","text":"Luis Javier Herrera"},{"@pid":"48/7656","text":"José Miguel Urquiza Ortiz"},{"@pid":"r/IgnacioRojasRuiz","text":"Ignacio Rojas"},{"@pid":"m/JJMereloGuervos","text":"Juan Julián Merelo Guervós"}]},"title":"Applying support vector machines and mutual information to book losses prediction.","venue":"IJCNN","pages":"1-7","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/ijcnn/MoraHORG10","doi":"10.1109/IJCNN.2010.5596710","ee":"https://doi.org/10.1109/IJCNN.2010.5596710","url":"https://dblp.org/rec/conf/ijcnn/MoraHORG10"}, "url":"URL#4941344" }, { "@score":"2", "@id":"4949894", "info":{"authors":{"author":[{"@pid":"74/7118","text":"Yonatan Kaspi"},{"@pid":"92/1103","text":"Neri Merhav"}]},"title":"Structure theorem for real-time variable-rate lossy source encoders and memory-limited decoders with side information.","venue":"ISIT","pages":"86-90","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/KaspiM10","doi":"10.1109/ISIT.2010.5513283","ee":"https://doi.org/10.1109/ISIT.2010.5513283","url":"https://dblp.org/rec/conf/isit/KaspiM10"}, "url":"URL#4949894" }, { "@score":"2", "@id":"4950019", "info":{"authors":{"author":[{"@pid":"83/4575","text":"Ryo Nomura"},{"@pid":"00/3771","text":"Toshiyasu Matsushima"}]},"title":"On the overflow probability of lossless codes with side information.","venue":"ISIT","pages":"131-135","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/NomuraM10","doi":"10.1109/ISIT.2010.5513268","ee":"https://doi.org/10.1109/ISIT.2010.5513268","url":"https://dblp.org/rec/conf/isit/NomuraM10"}, "url":"URL#4950019" }, { "@score":"2", "@id":"4952763", "info":{"authors":{"author":{"@pid":"177/8753","text":"Daniel Oost"}},"title":"A potential loss of trust as a result of the conflicting messages within information security research.","venue":"ISTAS","pages":"213-219","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/istas/Oost10","doi":"10.1109/ISTAS.2010.5514635","ee":"https://doi.org/10.1109/ISTAS.2010.5514635","url":"https://dblp.org/rec/conf/istas/Oost10"}, "url":"URL#4952763" }, { "@score":"2", "@id":"4975823", "info":{"authors":{"author":[{"@pid":"32/8429","text":"Phuong Huynh Van Quoc"},{"@pid":"d/TranKhanhDang","text":"Tran Khanh Dang"}]},"title":"eM2: An Efficient Member Migration Algorithm for Ensuring k-Anonymity and Mitigating Information Loss.","venue":"Secure Data Management","pages":"26-40","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/sdmw/QuocD10","doi":"10.1007/978-3-642-15546-8_3","ee":"https://doi.org/10.1007/978-3-642-15546-8_3","url":"https://dblp.org/rec/conf/sdmw/QuocD10"}, "url":"URL#4975823" }, { "@score":"2", "@id":"4994029", "info":{"authors":{"author":[{"@pid":"08/312","text":"Taiji Suzuki"},{"@pid":"35/1228","text":"Masashi Sugiyama"}]},"title":"Sufficient Dimension Reduction via Squared-loss Mutual Information Estimation.","venue":"AISTATS","pages":"804-811","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"journals/jmlr/SuzukiS10","ee":"http://proceedings.mlr.press/v9/suzuki10a.html","url":"https://dblp.org/rec/journals/jmlr/SuzukiS10"}, "url":"URL#4994029" }, { "@score":"2", "@id":"5006207", "info":{"authors":{"author":[{"@pid":"67/7998","text":"Joffrey Villard"},{"@pid":"44/1416","text":"Pablo Piantanida"}]},"title":"Secure Lossy Source Coding with Side Information at the Decoders","venue":"CoRR","volume":"abs/1009.3891","year":"2010","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1009-3891","ee":"http://arxiv.org/abs/1009.3891","url":"https://dblp.org/rec/journals/corr/abs-1009-3891"}, "url":"URL#5006207" }, { "@score":"2", "@id":"5032447", "info":{"authors":{"author":[{"@pid":"10/7008","text":"Wen-Jan Chen"},{"@pid":"94/8632","text":"Wen-Tsung Huang"}]},"title":"VQ indexes compression and information hiding using hybrid lossless index coding.","venue":"Digit. Signal Process.","volume":"19","number":"3","pages":"433-443","year":"2009","type":"Journal Articles","access":"closed","key":"journals/dsp/ChenH09","doi":"10.1016/J.DSP.2008.11.003","ee":"https://doi.org/10.1016/j.dsp.2008.11.003","url":"https://dblp.org/rec/journals/dsp/ChenH09"}, "url":"URL#5032447" }, { "@score":"3", "@id":"5051277", "info":{"authors":{"author":[{"@pid":"74/3424","text":"Wilfried Gericke"},{"@pid":"21/6333","text":"Dirk Thorleuchter"},{"@pid":"57/799","text":"Gerhard Weck"},{"@pid":"44/7014","text":"Frank Reiländer"},{"@pid":"41/1408","text":"Dirk Loß"}]},"title":"Vertrauliche Verarbeitung staatlich eingestufter Information - die Informationstechnologie im Geheimschutz.","venue":"Inform. Spektrum","volume":"32","number":"2","pages":"102-109","year":"2009","type":"Journal Articles","access":"closed","key":"journals/insk/GerickeTWRL09","doi":"10.1007/S00287-008-0299-0","ee":"https://doi.org/10.1007/s00287-008-0299-0","url":"https://dblp.org/rec/journals/insk/GerickeTWRL09"}, "url":"URL#5051277" }, { "@score":"2", "@id":"5053955", "info":{"authors":{"author":{"@pid":"15/6841","text":"Ryotaro Kamimura"}},"title":"Relative Relaxation and Weighted Information Loss to Simplify and Stabilize Feature Detection.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"4","pages":"489-498","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/Kamimura09","doi":"10.20965/JACIII.2009.P0489","ee":"https://doi.org/10.20965/jaciii.2009.p0489","url":"https://dblp.org/rec/journals/jaciii/Kamimura09"}, "url":"URL#5053955" }, { "@score":"2", "@id":"5056880", "info":{"authors":{"author":{"@pid":"15/6841","text":"Ryotaro Kamimura"}},"title":"Feature Discovery by Information Loss.","venue":"J. Comput.","volume":"4","number":"10","pages":"943-953","year":"2009","type":"Journal Articles","access":"open","key":"journals/jcp/Kamimura09","doi":"10.4304/JCP.4.10.943-953","ee":"http://www.jcomputers.us/index.php?m=content&c=index&a=show&catid=99&id=1517","url":"https://dblp.org/rec/journals/jcp/Kamimura09"}, "url":"URL#5056880" }, { "@score":"2", "@id":"5064394", "info":{"authors":{"author":[{"@pid":"t/VicencTorra","text":"Vicenç Torra"},{"@pid":"51/4628","text":"Yasunori Endo"},{"@pid":"72/418","text":"Sadaaki Miyamoto"}]},"title":"On the Comparison of Some Fuzzy Clustering Methods for Privacy Preserving Data Mining: Towards the Development of Specific Information Loss Measures.","venue":"Kybernetika","volume":"45","number":"3","pages":"548-560","year":"2009","type":"Journal Articles","access":"open","key":"journals/kybernetika/TorraEM09","ee":"http://www.kybernetika.cz/content/2009/3/548","url":"https://dblp.org/rec/journals/kybernetika/TorraEM09"}, "url":"URL#5064394" }, { "@score":"2", "@id":"5071197", "info":{"authors":{"author":[{"@pid":"55/5180","text":"Svetlana Lazebnik"},{"@pid":"91/6905","text":"Maxim Raginsky"}]},"title":"Supervised Learning of Quantizer Codebooks by Information Loss Minimization.","venue":"IEEE Trans. Pattern Anal. Mach. Intell.","volume":"31","number":"7","pages":"1294-1309","year":"2009","type":"Journal Articles","access":"closed","key":"journals/pami/LazebnikR09","doi":"10.1109/TPAMI.2008.138","ee":"https://doi.org/10.1109/TPAMI.2008.138","url":"https://dblp.org/rec/journals/pami/LazebnikR09"}, "url":"URL#5071197" }, { "@score":"2", "@id":"5071262", "info":{"authors":{"author":[{"@pid":"69/650","text":"Dimitrios Ververidis"},{"@pid":"k/CKotropoulos","text":"Constantine Kotropoulos"}]},"title":"Information Loss of the Mahalanobis Distance in High Dimensions: Application to Feature Selection.","venue":"IEEE Trans. Pattern Anal. Mach. Intell.","volume":"31","number":"12","pages":"2275-2281","year":"2009","type":"Journal Articles","access":"closed","key":"journals/pami/VerveridisK09","doi":"10.1109/TPAMI.2009.84","ee":"https://doi.org/10.1109/TPAMI.2009.84","url":"https://dblp.org/rec/journals/pami/VerveridisK09"}, "url":"URL#5071262" }, { "@score":"2", "@id":"5083003", "info":{"authors":{"author":[{"@pid":"55/7411","text":"Christian Feldbauer"},{"@pid":"30/797","text":"W. Bastiaan Kleijn"}]},"title":"Scalable coding with side information for packet loss recovery.","venue":"IEEE Trans. Commun.","volume":"57","number":"8","pages":"2309-2319","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tcom/FeldbauerK09","doi":"10.1109/TCOMM.2009.08.070351","ee":"https://doi.org/10.1109/TCOMM.2009.08.070351","url":"https://dblp.org/rec/journals/tcom/FeldbauerK09"}, "url":"URL#5083003" }, { "@score":"2", "@id":"5086950", "info":{"authors":{"author":[{"@pid":"35/288","text":"Daniel Marco"},{"@pid":"83/4741","text":"Michelle Effros"}]},"title":"On lossless coding with coded side information.","venue":"IEEE Trans. Inf. Theory","volume":"55","number":"7","pages":"3284-3296","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tit/MarcoE09","doi":"10.1109/TIT.2009.2021309","ee":"https://doi.org/10.1109/TIT.2009.2021309","url":"https://dblp.org/rec/journals/tit/MarcoE09"}, "url":"URL#5086950" }, { "@score":"2", "@id":"5087089", "info":{"authors":{"author":[{"@pid":"122/8306","text":"Vummintala Shashidhar"},{"@pid":"r/BSundarRajan","text":"B. Sundar Rajan"},{"@pid":"75/818","text":"P. Vijay Kumar"}]},"title":"Asymptotic-Information-Lossless Designs and the Diversity-Multiplexing Tradeoff.","venue":"IEEE Trans. Inf. Theory","volume":"55","number":"1","pages":"255-268","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tit/VummintalaRK09","doi":"10.1109/TIT.2008.2008132","ee":"https://doi.org/10.1109/TIT.2008.2008132","url":"https://dblp.org/rec/journals/tit/VummintalaRK09"}, "url":"URL#5087089" }, { "@score":"2", "@id":"5087446", "info":{"authors":{"author":[{"@pid":"g/AristidesGionis","text":"Aristides Gionis"},{"@pid":"04/2852","text":"Tamir Tassa"}]},"title":"k-Anonymization with Minimal Loss of Information.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"21","number":"2","pages":"206-219","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tkde/GionisT09","doi":"10.1109/TKDE.2008.129","ee":"https://doi.org/10.1109/TKDE.2008.129","url":"https://dblp.org/rec/journals/tkde/GionisT09"}, "url":"URL#5087446" }, { "@score":"2", "@id":"5087466", "info":{"authors":{"author":[{"@pid":"90/5488","text":"Michael J. Laszlo"},{"@pid":"66/331","text":"Sumitra Mukherjee"}]},"title":"Approximation Bounds for Minimum Information Loss Microaggregation.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"21","number":"11","pages":"1643-1647","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tkde/LaszloM09","doi":"10.1109/TKDE.2009.78","ee":"https://doi.org/10.1109/TKDE.2009.78","url":"https://dblp.org/rec/journals/tkde/LaszloM09"}, "url":"URL#5087466" }, { "@score":"2", "@id":"5106404", "info":{"authors":{"author":[{"@pid":"344/5274","text":"Dominic Samoita"},{"@pid":"83/4705","text":"Yskandar Hamam"}]},"title":"Mobile Localisation System Based On Information Rich radio Wave Path loss Model.","venue":"BroadBandCom","pages":"159-164","year":"2009","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/broadcom/SamoitaH09","url":"https://dblp.org/rec/conf/broadcom/SamoitaH09"}, "url":"URL#5106404" }, { "@score":"2", "@id":"5126937", "info":{"authors":{"author":[{"@pid":"32/1004","text":"Paolo Bucciol"},{"@pid":"80/264","text":"José-Luis Zechinelli-Martini"},{"@pid":"v/GVargas-Solar","text":"Genoveva Vargas-Solar"}]},"title":"Optimized Transmission of Loss Tolerant Information Streams for Real-Time Vehicle-to-Vehicle Communications.","venue":"ENC","pages":"142-145","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/enc/BucciolZV09","doi":"10.1109/ENC.2009.26","ee":"https://doi.org/10.1109/ENC.2009.26","url":"https://dblp.org/rec/conf/enc/BucciolZV09"}, "url":"URL#5126937" }, { "@score":"2", "@id":"5127410", "info":{"authors":{"author":[{"@pid":"42/2942","text":"YoungJoo Park"},{"@pid":"f/RichardFuruta","text":"Richard Furuta"}]},"title":"Workspace Narrative Exploration: Overcoming Interruption-Caused Context Loss in Information Seeking Tasks.","venue":"ECDL","pages":"433-436","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/ercimdl/ParkF09","doi":"10.1007/978-3-642-04346-8_52","ee":"https://doi.org/10.1007/978-3-642-04346-8_52","url":"https://dblp.org/rec/conf/ercimdl/ParkF09"}, "url":"URL#5127410" }, { "@score":"2", "@id":"5129737", "info":{"authors":{"author":[{"@pid":"83/7856","text":"Paolo Varutti"},{"@pid":"39/7855","text":"Rolf Findeisen"}]},"title":"Compensating network delays and information loss by predictive control methods.","venue":"ECC","pages":"1722-1727","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/eucc/VaruttiF09","doi":"10.23919/ECC.2009.7074651","ee":"https://doi.org/10.23919/ECC.2009.7074651","url":"https://dblp.org/rec/conf/eucc/VaruttiF09"}, "url":"URL#5129737" }, { "@score":"2", "@id":"5154522", "info":{"authors":{"author":[{"@pid":"55/5533","text":"Joseph G. Davis"},{"@pid":"80/10656","text":"Shayan Ganeshan"}]},"title":"Aversion to Loss and Information Overload: An Experimental Investigation.","venue":"ICIS","pages":"11","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icis/DavisG09","ee":"http://aisel.aisnet.org/icis2009/11","url":"https://dblp.org/rec/conf/icis/DavisG09"}, "url":"URL#5154522" }, { "@score":"2", "@id":"5154821", "info":{"authors":{"author":[{"@pid":"43/2393","text":"Ankit Anand"},{"@pid":"68/1206","text":"Xiao-Hong Peng"},{"@pid":"78/7883","text":"Richard Haywood"}]},"title":"Efficient information retrieval via proxy caching mechanisms within a lossy environment.","venue":"ICITST","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icitst/AnandPH09","doi":"10.1109/ICITST.2009.5402566","ee":"https://doi.org/10.1109/ICITST.2009.5402566","url":"https://dblp.org/rec/conf/icitst/AnandPH09"}, "url":"URL#5154821" }, { "@score":"2", "@id":"5154900", "info":{"authors":{"author":{"@pid":"53/7767","text":"Hoda W. Maalouf"}},"title":"Managing trade-offs between information loss and latency in real-time distributed systems.","venue":"ICITST","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icitst/Maalouf09","doi":"10.1109/ICITST.2009.5402614","ee":"https://doi.org/10.1109/ICITST.2009.5402614","url":"https://dblp.org/rec/conf/icitst/Maalouf09"}, "url":"URL#5154900" }, { "@score":"2", "@id":"5160345", "info":{"authors":{"author":[{"@pid":"59/4298","text":"Tzu-Chuen Lu"},{"@pid":"43/1961","text":"Ying-Hsuan Huang"}]},"title":"An efficient block-based lossless information hiding technique.","venue":"ICUIMC","pages":"342-347","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icuimc/LuH09","doi":"10.1145/1516241.1516300","ee":"https://doi.org/10.1145/1516241.1516300","url":"https://dblp.org/rec/conf/icuimc/LuH09"}, "url":"URL#5160345" }, { "@score":"2", "@id":"5161354", "info":{"authors":{"author":[{"@pid":"08/312","text":"Taiji Suzuki"},{"@pid":"35/1228","text":"Masashi Sugiyama"}]},"title":"Estimating Squared-Loss Mutual Information for Independent Component Analysis.","venue":"ICA","pages":"130-137","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/ida/SuzukiS09","doi":"10.1007/978-3-642-00599-2_17","ee":"https://doi.org/10.1007/978-3-642-00599-2_17","url":"https://dblp.org/rec/conf/ida/SuzukiS09"}, "url":"URL#5161354" }, { "@score":"2", "@id":"5164126", "info":{"authors":{"author":[{"@pid":"64/3009","text":"Te Li"},{"@pid":"98/3034","text":"Susanto Rahardja"},{"@pid":"60/2566","text":"Haiyan Shu"},{"@pid":"82/1981","text":"Haibin Huang"}]},"title":"Information Embedding in MPEG-4 Scalable Lossless Audio.","venue":"IIH-MSP","pages":"21-24","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iih-msp/LiRSH09","doi":"10.1109/IIH-MSP.2009.84","ee":"https://doi.org/10.1109/IIH-MSP.2009.84","url":"https://dblp.org/rec/conf/iih-msp/LiRSH09"}, "url":"URL#5164126" }, { "@score":"2", "@id":"5164155", "info":{"authors":{"author":[{"@pid":"59/4298","text":"Tzu-Chuen Lu"},{"@pid":"87/10137","text":"Cheng-Chun Huang"},{"@pid":"78/10135","text":"Siang-Ru Liao"}]},"title":"Lossless Information Hiding Scheme Based on Predictive Coding.","venue":"IIH-MSP","pages":"374-377","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iih-msp/LuHL09","doi":"10.1109/IIH-MSP.2009.25","ee":"https://doi.org/10.1109/IIH-MSP.2009.25","url":"https://dblp.org/rec/conf/iih-msp/LuHL09"}, "url":"URL#5164155" }, { "@score":"2", "@id":"5169467", "info":{"authors":{"author":[{"@pid":"01/485","text":"Geoffrey Brown"},{"@pid":"59/9790","text":"Kam Woods"}]},"title":"Born Broken: Fonts and Information Loss in Legacy Digital Documents.","venue":"iPRES","year":"2009","type":"Conference and Workshop Papers","access":"open","key":"conf/ipres/BrownW09","ee":"https://hdl.handle.net/11353/10.294029","url":"https://dblp.org/rec/conf/ipres/BrownW09"}, "url":"URL#5169467" }, { "@score":"2", "@id":"5173302", "info":{"authors":{"author":[{"@pid":"d/SNDiggavi","text":"Suhas N. Diggavi"},{"@pid":"14/7883","text":"Etienne Perron"},{"@pid":"27/2176","text":"Emre Telatar"}]},"title":"Lossy source coding with Gaussian or erased side-information.","venue":"ISIT","pages":"1035-1039","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/DiggaviPT09","doi":"10.1109/ISIT.2009.5206065","ee":"https://doi.org/10.1109/ISIT.2009.5206065","url":"https://dblp.org/rec/conf/isit/DiggaviPT09"}, "url":"URL#5173302" }, { "@score":"2", "@id":"5173515", "info":{"authors":{"author":{"@pid":"82/4494","text":"Alfonso Martinez"}},"title":"Information Rate loss from radiation decoherence.","venue":"ISIT","pages":"1874-1878","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/Martinez09","doi":"10.1109/ISIT.2009.5205474","ee":"https://doi.org/10.1109/ISIT.2009.5205474","url":"https://dblp.org/rec/conf/isit/Martinez09"}, "url":"URL#5173515" }, { "@score":"2", "@id":"5173688", "info":{"authors":{"author":[{"@pid":"49/6393","text":"Roy Timo"},{"@pid":"45/6426","text":"Badri N. Vellambi"}]},"title":"Two lossy source coding problems with causal side-information.","venue":"ISIT","pages":"1040-1044","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/TimoV09","doi":"10.1109/ISIT.2009.5206061","ee":"https://doi.org/10.1109/ISIT.2009.5206061","url":"https://dblp.org/rec/conf/isit/TimoV09"}, "url":"URL#5173688" }, { "@score":"2", "@id":"5197179", "info":{"authors":{"author":[{"@pid":"98/1125","text":"José R. Correa"},{"@pid":"70/7444","text":"Nicolás Figueroa"}]},"title":"On the Planner's Loss Due to Lack of Information in Bayesian Mechanism Design.","venue":"SAGT","pages":"72-84","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/sagt/CorreaF09","doi":"10.1007/978-3-642-04645-2_8","ee":"https://doi.org/10.1007/978-3-642-04645-2_8","url":"https://dblp.org/rec/conf/sagt/CorreaF09"}, "url":"URL#5197179" }, { "@score":"2", "@id":"5214245", "info":{"authors":{"author":[{"@pid":"30/7814","text":"Theofilos Chrysikos"},{"@pid":"09/733","text":"Stavros Kotsopoulos"}]},"title":"Impact of channel-dependent variation of path loss exponent on Wireless Information-Theoretic Security.","venue":"WTS","pages":"1-7","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/wts/ChrysikosK09","doi":"10.1109/WTS.2009.5068993","ee":"https://doi.org/10.1109/WTS.2009.5068993","url":"https://dblp.org/rec/conf/wts/ChrysikosK09"}, "url":"URL#5214245" }, { "@score":"2", "@id":"5223295", "info":{"authors":{"author":{"@pid":"d/JDomingoFerrer","text":"Josep Domingo-Ferrer"}},"title":"Information Loss Measures.","venue":"Encyclopedia of Database Systems","pages":"1499-1501","year":"2009","type":"Reference Works","access":"closed","key":"reference/db/Domingo-Ferrer09c","doi":"10.1007/978-0-387-39940-9_1505","ee":"https://doi.org/10.1007/978-0-387-39940-9_1505","url":"https://dblp.org/rec/reference/db/Domingo-Ferrer09c"}, "url":"URL#5223295" }, { "@score":"2", "@id":"5257485", "info":{"authors":{"author":[{"@pid":"54/1944","text":"Michi Nishihara"},{"@pid":"68/3859","text":"Masao Fukushima"}]},"title":"Evaluation of firm's loss due to incomplete information in real investment decision.","venue":"Eur. J. Oper. Res.","volume":"188","number":"2","pages":"569-585","year":"2008","type":"Journal Articles","access":"closed","key":"journals/eor/NishiharaF08","doi":"10.1016/J.EJOR.2007.03.046","ee":"https://doi.org/10.1016/j.ejor.2007.03.046","url":"https://dblp.org/rec/journals/eor/NishiharaF08"}, "url":"URL#5257485" }, { "@score":"2", "@id":"5260924", "info":{"authors":{"author":[{"@pid":"08/1352","text":"Chadi Abou-Rjeily"},{"@pid":"98/6382","text":"Wissam Fawaz"}]},"title":"Distributed information-lossless space-time codes for amplify-and-forward TH-UWB systems.","venue":"IEEE Commun. Lett.","volume":"12","number":"4","pages":"298-300","year":"2008","type":"Journal Articles","access":"closed","key":"journals/icl/Abou-RjeilyF08","doi":"10.1109/LCOMM.2008.071945","ee":"https://doi.org/10.1109/LCOMM.2008.071945","url":"https://dblp.org/rec/journals/icl/Abou-RjeilyF08"}, "url":"URL#5260924" }, { "@score":"2", "@id":"5269844", "info":{"authors":{"author":[{"@pid":"04/3672","text":"Susana Ladra"},{"@pid":"t/VicencTorra","text":"Vicenç Torra"}]},"title":"On the Comparison of Generic Information Loss Measures and Cluster-Specific Ones.","venue":"Int. J. Uncertain. Fuzziness Knowl. Based Syst.","volume":"16","number":"Supplement-1","pages":"107-120","year":"2008","type":"Journal Articles","access":"closed","key":"journals/ijufks/LadraT08","doi":"10.1142/S0218488508005273","ee":"https://doi.org/10.1142/S0218488508005273","url":"https://dblp.org/rec/journals/ijufks/LadraT08"}, "url":"URL#5269844" }, { "@score":"2", "@id":"5271554", "info":{"authors":{"author":[{"@pid":"14/6841-1","text":"Tao Qin 0001"},{"@pid":"58/6205-1","text":"Xu-Dong Zhang 0001"},{"@pid":"16/3313","text":"Ming-Feng Tsai"},{"@pid":"37/6216","text":"De-Sheng Wang"},{"@pid":"l/TieYanLiu","text":"Tie-Yan Liu"},{"@pid":"83/5560-1","text":"Hang Li 0001"}]},"title":"Query-level loss functions for information retrieval.","venue":"Inf. Process. Manag.","volume":"44","number":"2","pages":"838-855","year":"2008","type":"Journal Articles","access":"closed","key":"journals/ipm/QinZTWLL08","doi":"10.1016/J.IPM.2007.07.016","ee":"https://doi.org/10.1016/j.ipm.2007.07.016","url":"https://dblp.org/rec/journals/ipm/QinZTWLL08"}, "url":"URL#5271554" }, { "@score":"2", "@id":"5276794", "info":{"authors":{"author":[{"@pid":"27/2892","text":"Jeffery H. K. Wu"},{"@pid":"34/6628","text":"Ruey-Feng Chang"},{"@pid":"62/202","text":"Chii-Jen Chen"},{"@pid":"03/5777","text":"Ching-Lin Wang"},{"@pid":"07/476","text":"Ta-Hsun Kuo"},{"@pid":"89/2420","text":"Woo Kyung Moon"},{"@pid":"72/1484","text":"Dar-Ren Chen"}]},"title":"Tamper Detection and Recovery for Medical Images Using Near-lossless Information Hiding Technique.","venue":"J. Digit. Imaging","volume":"21","number":"1","pages":"59-76","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jdi/WuCCWKMC08","doi":"10.1007/S10278-007-9011-1","ee":"https://doi.org/10.1007/s10278-007-9011-1","url":"https://dblp.org/rec/journals/jdi/WuCCWKMC08"}, "url":"URL#5276794" }, { "@score":"2", "@id":"5276853", "info":{"authors":{"author":[{"@pid":"66/3013","text":"Katsunari Yoshioka"},{"@pid":"29/3461","text":"Kotaro Sonoda"},{"@pid":"50/6620","text":"Osamu Takizawa"},{"@pid":"58/4020","text":"Tsutomu Matsumoto"}]},"title":"Information Hiding on Lossless Data Compression.","venue":"J. Digit. Inf. Manag.","volume":"6","number":"2","pages":"151-160","year":"2008","type":"Journal Articles","access":"unavailable","key":"journals/jdim/YoshiokaSTM08","url":"https://dblp.org/rec/journals/jdim/YoshiokaSTM08"}, "url":"URL#5276853" }, { "@score":"2", "@id":"5278474", "info":{"authors":{"author":{"@pid":"63/2288","text":"Hannu Salmela"}},"title":"Analysing business losses caused by information systems risk: a business process analysis approach.","venue":"J. Inf. Technol.","volume":"23","number":"3","pages":"185-202","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jitech/Salmela08","doi":"10.1057/PALGRAVE.JIT.2000122","ee":"https://doi.org/10.1057/palgrave.jit.2000122","url":"https://dblp.org/rec/journals/jitech/Salmela08"}, "url":"URL#5278474" }, { "@score":"2", "@id":"5309513", "info":{"authors":{"author":[{"@pid":"67/4024","text":"Duc A. Tran"},{"@pid":"05/4987","text":"Khanh Vu"}]},"title":"Dimensionality Reduction in Hyperbolic Data Spaces: Bounding Reconstructed-Information Loss.","venue":"ACIS-ICIS","pages":"133-139","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACISicis/TranV08","doi":"10.1109/ICIS.2008.82","ee":"https://doi.org/10.1109/ICIS.2008.82","url":"https://dblp.org/rec/conf/ACISicis/TranV08"}, "url":"URL#5309513" }, { "@score":"2", "@id":"5310023", "info":{"authors":{"author":[{"@pid":"t/VicencTorra","text":"Vicenç Torra"},{"@pid":"04/3672","text":"Susana Ladra"}]},"title":"Cluster-Specific Information Loss Measures in Data Privacy: A Review.","venue":"ARES","pages":"994-999","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/IEEEares/TorraL08","doi":"10.1109/ARES.2008.87","ee":"https://doi.org/10.1109/ARES.2008.87","url":"https://dblp.org/rec/conf/IEEEares/TorraL08"}, "url":"URL#5310023" }, { "@score":"2", "@id":"5315068", "info":{"authors":{"author":[{"@pid":"33/6937-1","text":"Jin Meng 0001"},{"@pid":"y/EnHuiYang","text":"En-Hui Yang"},{"@pid":"46/5466","text":"Da-ke He"}]},"title":"Low-density linear IED schemes for lossless source coding with decoder only side information.","venue":"Allerton","pages":"661-668","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/allerton/MengYH08","doi":"10.1109/ALLERTON.2008.4797621","ee":"https://doi.org/10.1109/ALLERTON.2008.4797621","url":"https://dblp.org/rec/conf/allerton/MengYH08"}, "url":"URL#5315068" }, { "@score":"2", "@id":"5331093", "info":{"authors":{"author":{"@pid":"52/4725","text":"Wendy Hui Wang"}},"title":"Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss.","venue":"COMAD","pages":"150-161","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/comad/Wang08","ee":"http://www.cse.iitb.ac.in/~comad/2008/PDFs/10-hidingpresence.pdf","url":"https://dblp.org/rec/conf/comad/Wang08"}, "url":"URL#5331093" }, { "@score":"2", "@id":"5357706", "info":{"authors":{"author":[{"@pid":"92/2073","text":"Young Gil Kim"},{"@pid":"62/6601","text":"Norman C. Beaulieu"}]},"title":"Lossless Selection Combining without Channel State Information.","venue":"ICC","pages":"1328-1332","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KimB08","doi":"10.1109/ICC.2008.258","ee":"https://doi.org/10.1109/ICC.2008.258","url":"https://dblp.org/rec/conf/icc/KimB08"}, "url":"URL#5357706" }, { "@score":"2", "@id":"5371673", "info":{"authors":{"author":[{"@pid":"04/10760","text":"Ehsan Nekouei"},{"@pid":"158/8885","text":"Hossein Momenaee Kermani"},{"@pid":"52/2625","text":"Siamak Talebi"}]},"title":"An information lossless, full diversity, full rate, linear dispersion STBC.","venue":"ICT","pages":"1-4","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/ict/NekoueiKT08","doi":"10.1109/ICTEL.2008.4652659","ee":"https://doi.org/10.1109/ICTEL.2008.4652659","url":"https://dblp.org/rec/conf/ict/NekoueiKT08"}, "url":"URL#5371673" }, { "@score":"2", "@id":"5376159", "info":{"authors":{"author":[{"@pid":"46/2287","text":"Akinori Ito"},{"@pid":"64/10135","text":"Kiyoshi Konno"},{"@pid":"34/5203","text":"Shozo Makino"},{"@pid":"79/4954","text":"Motoyuki Suzuki"}]},"title":"Packet Loss Concealment for MDCT-Based Audio Codec Using Correlation-Based Side Information.","venue":"IIH-MSP","pages":"612-615","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/iih-msp/ItoKMS08","doi":"10.1109/IIH-MSP.2008.103","ee":"https://doi.org/10.1109/IIH-MSP.2008.103","url":"https://dblp.org/rec/conf/iih-msp/ItoKMS08"}, "url":"URL#5376159" }, { "@score":"3", "@id":"5377045", "info":{"authors":{"author":{"@pid":"15/6841","text":"Ryotaro Kamimura"}},"title":"Conditional information and information loss for flexible feature extraction.","venue":"IJCNN","pages":"2074-2083","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/ijcnn/Kamimura08","doi":"10.1109/IJCNN.2008.4634083","ee":"https://doi.org/10.1109/IJCNN.2008.4634083","url":"https://dblp.org/rec/conf/ijcnn/Kamimura08"}, "url":"URL#5377045" }, { "@score":"2", "@id":"5378795", "info":{"authors":{"author":{"@pid":"08/2015","text":"Philippe Gournay"}},"title":"Improved frame loss recovery using closed-loop estimation of very low bit rate side information.","venue":"INTERSPEECH","pages":"666-669","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/interspeech/Gournay08","doi":"10.21437/INTERSPEECH.2008-213","ee":"https://doi.org/10.21437/Interspeech.2008-213","url":"https://dblp.org/rec/conf/interspeech/Gournay08"}, "url":"URL#5378795" }, { "@score":"2", "@id":"5384807", "info":{"authors":{"author":[{"@pid":"27/1454","text":"Wei-Hsin Gu"},{"@pid":"75/6714","text":"Soumya Jana"},{"@pid":"83/4741","text":"Michelle Effros"}]},"title":"On approximating the rate regions for lossy source coding with coded and uncoded side information.","venue":"ISIT","pages":"2162-2166","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/GutJE08","doi":"10.1109/ISIT.2008.4595373","ee":"https://doi.org/10.1109/ISIT.2008.4595373","url":"https://dblp.org/rec/conf/isit/GutJE08"}, "url":"URL#5384807" }, { "@score":"2", "@id":"5385170", "info":{"authors":{"author":[{"@pid":"y/EnHuiYang","text":"En-Hui Yang"},{"@pid":"46/5466","text":"Da-ke He"}]},"title":"On interactive encoding and decoding for lossless source coding with decoder only side information.","venue":"ISIT","pages":"419-423","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/YangH08","doi":"10.1109/ISIT.2008.4595020","ee":"https://doi.org/10.1109/ISIT.2008.4595020","url":"https://dblp.org/rec/conf/isit/YangH08"}, "url":"URL#5385170" }, { "@score":"2", "@id":"5389334", "info":{"authors":{"author":[{"@pid":"05/6552","text":"Deniz Gündüz"},{"@pid":"15/5237","text":"Elza Erkip"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"}]},"title":"Secure lossless compression with side information.","venue":"ITW","pages":"169-173","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/itw/GunduzEP08","doi":"10.1109/ITW.2008.4578644","ee":"https://doi.org/10.1109/ITW.2008.4578644","url":"https://dblp.org/rec/conf/itw/GunduzEP08"}, "url":"URL#5389334" }, { "@score":"3", "@id":"5395357", "info":{"authors":{"author":[{"@pid":"87/2948-17","text":"Yuan Liu 0017"},{"@pid":"12/5444-1","text":"Tao Mei 0001"},{"@pid":"40/1913","text":"Xiuqing Wu"},{"@pid":"56/5807-1","text":"Xian-Sheng Hua 0001"}]},"title":"Optimizing video search reranking via minimum incremental information loss.","venue":"Multimedia Information Retrieval","pages":"253-259","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mir/LiuMWH08","doi":"10.1145/1460096.1460139","ee":"https://doi.org/10.1145/1460096.1460139","url":"https://dblp.org/rec/conf/mir/LiuMWH08"}, "url":"URL#5395357" }, { "@score":"2", "@id":"5425633", "info":{"authors":{"author":{"@pid":"27/3135","text":"Robert Burduk"}},"title":"Possibility of Use a Fuzzy Loss Function in Medical Diagnostics.","venue":"Information Technologies in Biomedicine","pages":"476-481","year":"2008","type":"Parts in Books or Collections","access":"closed","key":"series/asc/Burduk08a","doi":"10.1007/978-3-540-68168-7_53","ee":"https://doi.org/10.1007/978-3-540-68168-7_53","url":"https://dblp.org/rec/series/asc/Burduk08a"}, "url":"URL#5425633" }, { "@score":"2", "@id":"5425921", "info":{"authors":{"author":[{"@pid":"61/3320","text":"Artur Janicki"},{"@pid":"64/5342","text":"Bartlomiej Ksiezak"}]},"title":"Packet Loss Concealment Algorithm for VoIP Transmission in Unreliable Networks.","venue":"New Trends in Multimedia and Network Information Systems","pages":"23-33","year":"2008","type":"Parts in Books or Collections","access":"closed","key":"series/faia/JanickiK08","doi":"10.3233/978-1-58603-904-2-23","ee":"https://doi.org/10.3233/978-1-58603-904-2-23","url":"https://dblp.org/rec/series/faia/JanickiK08"}, "url":"URL#5425921" }, { "@score":"2", "@id":"5433549", "info":{"authors":{"author":[{"@pid":"05/6552","text":"Deniz Gündüz"},{"@pid":"15/5237","text":"Elza Erkip"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"}]},"title":"Secure Lossless Compression with Side Information","venue":"CoRR","volume":"abs/0803.1195","year":"2008","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-0803-1195","ee":"http://arxiv.org/abs/0803.1195","url":"https://dblp.org/rec/journals/corr/abs-0803-1195"}, "url":"URL#5433549" }, { "@score":"2", "@id":"5438875", "info":{"authors":{"author":{"@pid":"37/11166","text":"Kim Boström"}},"title":"Lossless quantum data compression and secure direct communication: new concepts and methods for quantum information theory.","pages":"1-135","publisher":"VDM Verlag Dr. Müller, Saarbrücken, Germany","year":"2007","type":"Books and Theses","access":"unavailable","key":"phd/de/Bostrom2007","ee":"https://d-nb.info/986312657","url":"https://dblp.org/rec/phd/de/Bostrom2007"}, "url":"URL#5438875" }, { "@score":"2", "@id":"5474756", "info":{"authors":{"author":[{"@pid":"48/120","text":"Andrew Gilpin"},{"@pid":"s/TuomasSandholm","text":"Tuomas Sandholm"}]},"title":"Lossless abstraction of imperfect information games.","venue":"J. ACM","volume":"54","number":"5","pages":"25","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jacm/GilpinS07","doi":"10.1145/1284320.1284324","ee":"https://doi.org/10.1145/1284320.1284324","url":"https://dblp.org/rec/journals/jacm/GilpinS07"}, "url":"URL#5474756" }, { "@score":"2", "@id":"5475672", "info":{"authors":{"author":[{"@pid":"64/3844","text":"Douglas R. Mitchell"},{"@pid":"29/371","text":"Joyce A. Mitchell"}]},"title":"Status of clinical gene sequencing data reporting and associated risks for information loss.","venue":"J. Biomed. Informatics","volume":"40","number":"1","pages":"47-54","year":"2007","type":"Journal Articles","access":"open","key":"journals/jbi/MitchellM07","doi":"10.1016/J.JBI.2006.02.012","ee":"https://doi.org/10.1016/j.jbi.2006.02.012","url":"https://dblp.org/rec/journals/jbi/MitchellM07"}, "url":"URL#5475672" }, { "@score":"2", "@id":"5478512", "info":{"authors":{"author":[{"@pid":"98/2604-19","text":"Ming Yang 0019"},{"@pid":"b/NikolaosGBourbakis","text":"Nikolaos G. Bourbakis"}]},"title":"High-bitrate multimedia information hiding for digital image/video under lossy compression.","venue":"J. Electronic Imaging","volume":"16","number":"1","pages":"013008","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jei/YangB07","doi":"10.1117/1.2437725","ee":"https://doi.org/10.1117/1.2437725","url":"https://dblp.org/rec/journals/jei/YangB07"}, "url":"URL#5478512" }, { "@score":"2", "@id":"5480434", "info":{"authors":{"author":[{"@pid":"87/2205","text":"Niranjan Shetty"},{"@pid":"14/5109","text":"Jerry D. Gibson"}]},"title":"Packet Loss Concealment for G.722 using Side Information with Application to Voice over Wireless LANs.","venue":"J. Multim.","volume":"2","number":"3","pages":"66-76","year":"2007","type":"Journal Articles","access":"unavailable","key":"journals/jmm2/ShettyG07","doi":"10.4304/JMM.2.3.66-76","ee":"https://doi.org/10.4304/jmm.2.3.66-76","url":"https://dblp.org/rec/journals/jmm2/ShettyG07"}, "url":"URL#5480434" }, { "@score":"2", "@id":"5484637", "info":{"authors":{"author":[{"@pid":"34/517","text":"Syam Menon"},{"@pid":"90/3807","text":"Sumit Sarkar"}]},"title":"Minimizing Information Loss and Preserving Privacy.","venue":"Manag. Sci.","volume":"53","number":"1","pages":"101-116","year":"2007","type":"Journal Articles","access":"closed","key":"journals/mansci/MenonS07","doi":"10.1287/MNSC.1060.0603","ee":"https://doi.org/10.1287/mnsc.1060.0603","url":"https://dblp.org/rec/journals/mansci/MenonS07"}, "url":"URL#5484637" }, { "@score":"4", "@id":"5513902", "info":{"authors":{"author":{"@pid":"15/6841","text":"Ryotaro Kamimura"}},"title":"Forced information and information loss in information-theoretic competitive learning.","venue":"Artificial Intelligence and Applications","pages":"78-84","year":"2007","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/aia/Kamimura07","url":"https://dblp.org/rec/conf/aia/Kamimura07"}, "url":"URL#5513902" }, { "@score":"2", "@id":"5515770", "info":{"authors":{"author":{"@pid":"95/10690","text":"Ravi Narayanaswami"}},"title":"Examining the Dynamics of Managing Information Systems Development Projects: A Control Loss Perspective.","venue":"AMCIS","pages":"407","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/amcis/Narayanaswami07","ee":"http://aisel.aisnet.org/amcis2007/407","url":"https://dblp.org/rec/conf/amcis/Narayanaswami07"}, "url":"URL#5515770" }, { "@score":"2", "@id":"5530462", "info":{"authors":{"author":[{"@pid":"d/YvoDesmedt","text":"Yvo Desmedt"},{"@pid":"27/5566","text":"Goce Jakimoski"}]},"title":"Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels.","venue":"CT-RSA","pages":"324-338","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/ctrsa/DesmedtJ07","doi":"10.1007/11967668_21","ee":"https://doi.org/10.1007/11967668_21","url":"https://dblp.org/rec/conf/ctrsa/DesmedtJ07"}, "url":"URL#5530462" }, { "@score":"2", "@id":"5532120", "info":{"authors":{"author":[{"@pid":"05/6552","text":"Deniz Gündüz"},{"@pid":"15/5237","text":"Elza Erkip"}]},"title":"Lossless Transmission of Correlated Sources over a Multiple Access Channel with Side Information.","venue":"DCC","pages":"83-92","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/dcc/GunduzE07","doi":"10.1109/DCC.2007.53","ee":"https://doi.org/10.1109/DCC.2007.53","url":"https://dblp.org/rec/conf/dcc/GunduzE07"}, "url":"URL#5532120" }, { "@score":"2", "@id":"5537123", "info":{"authors":{"author":[{"@pid":"g/AristidesGionis","text":"Aristides Gionis"},{"@pid":"04/2852","text":"Tamir Tassa"}]},"title":"k -Anonymization with Minimal Loss of Information.","venue":"ESA","pages":"439-450","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/esa/GionisT07","doi":"10.1007/978-3-540-75520-3_40","ee":"https://doi.org/10.1007/978-3-540-75520-3_40","url":"https://dblp.org/rec/conf/esa/GionisT07"}, "url":"URL#5537123" }, { "@score":"2", "@id":"5539079", "info":{"authors":{"author":[{"@pid":"75/2337-1","text":"Antonio Fasano 0001"},{"@pid":"66/426","text":"Sergio Barbarossa"}]},"title":"Information lossless space-time coding for Rayleigh faded multiple access systems.","venue":"EUSIPCO","pages":"1308-1312","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/eusipco/FasanoB07","ee":"https://ieeexplore.ieee.org/document/7099017/","url":"https://dblp.org/rec/conf/eusipco/FasanoB07"}, "url":"URL#5539079" }, { "@score":"3", "@id":"5540939", "info":{"authors":{"author":{"@pid":"15/6841","text":"Ryotaro Kamimura"}},"title":"Forced Information and Information Loss for a Student Survey Analysis.","venue":"FOCI","pages":"630-636","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/foci/Kamimura07a","doi":"10.1109/FOCI.2007.371538","ee":"https://doi.org/10.1109/FOCI.2007.371538","url":"https://dblp.org/rec/conf/foci/Kamimura07a"}, "url":"URL#5540939" }, { "@score":"2", "@id":"5542554", "info":{"authors":{"author":[{"@pid":"75/2455","text":"Sarra Ayouni"},{"@pid":"20/6407","text":"Sadok Ben Yahia"}]},"title":"Extracting Compact and Information Lossless Set of Fuzzy Association Rules.","venue":"FUZZ-IEEE","pages":"1-6","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/fuzzIEEE/AyouniY07","doi":"10.1109/FUZZY.2007.4295579","ee":"https://doi.org/10.1109/FUZZY.2007.4295579","url":"https://dblp.org/rec/conf/fuzzIEEE/AyouniY07"}, "url":"URL#5542554" }, { "@score":"2", "@id":"5548125", "info":{"authors":{"author":[{"@pid":"19/3325","text":"Florian Johannsen"},{"@pid":"78/742","text":"Susanne Leist"},{"@pid":"09/5958","text":"Gregor Zellner"}]},"title":"Information losses within the collaborative integration of different process models - BPML as an XML-based interchange format for BPMN business process models.","venue":"HICSS","pages":"9","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/FlorianLZ07","doi":"10.1109/HICSS.2007.270","ee":"https://doi.org/10.1109/HICSS.2007.270","url":"https://dblp.org/rec/conf/hicss/FlorianLZ07"}, "url":"URL#5548125" }, { "@score":"2", "@id":"5552071", "info":{"authors":{"author":[{"@pid":"75/2337-1","text":"Antonio Fasano 0001"},{"@pid":"66/426","text":"Sergio Barbarossa"}]},"title":"Information Lossless Space-Time Coding for Multiple Access Systems.","venue":"ICASSP","pages":"45-48","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/icassp/FasanoB07","doi":"10.1109/ICASSP.2007.366468","ee":"https://doi.org/10.1109/ICASSP.2007.366468","url":"https://dblp.org/rec/conf/icassp/FasanoB07"}, "url":"URL#5552071" }, { "@score":"2", "@id":"5555453", "info":{"authors":{"author":[{"@pid":"12/1353","text":"Yoshitaka Takahashi"},{"@pid":"57/208","text":"Yoshiaki Shikata"},{"@pid":"83/4587","text":"Kazunori Okada"},{"@pid":"66/697","text":"Naohisa Komatsu"}]},"title":"Multi-Server Loss System with T-Limited Service for Traffic Control in Information Networks.","venue":"ICCCN","pages":"491-496","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/icccn/TakahashiSOK07","doi":"10.1109/ICCCN.2007.4317867","ee":"https://doi.org/10.1109/ICCCN.2007.4317867","url":"https://dblp.org/rec/conf/icccn/TakahashiSOK07"}, "url":"URL#5555453" }, { "@score":"2", "@id":"5560938", "info":{"authors":{"author":[{"@pid":"67/5166","text":"Sang-Kwang Lee"},{"@pid":"06/1032","text":"Seong-Jae Lim"},{"@pid":"93/707","text":"Young-Ho Suh"},{"@pid":"83/2498","text":"Yo-Sung Ho"}]},"title":"Lossless Data Hiding for Medical Images with Patient Information.","venue":"ICIP","pages":"253-256","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/icip/LeeLSH07","doi":"10.1109/ICIP.2007.4379294","ee":"https://doi.org/10.1109/ICIP.2007.4379294","url":"https://dblp.org/rec/conf/icip/LeeLSH07"}, "url":"URL#5560938" }, { "@score":"2", "@id":"5579773", "info":{"authors":{"author":[{"@pid":"y/EnHuiYang","text":"En-Hui Yang"},{"@pid":"46/5466","text":"Da-ke He"}]},"title":"Universal Data Compression with Side Information at the Decoder by Using Traditional Universal Lossless Compression Algorithms.","venue":"ISIT","pages":"431-435","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/YangH07","doi":"10.1109/ISIT.2007.4557263","ee":"https://doi.org/10.1109/ISIT.2007.4557263","url":"https://dblp.org/rec/conf/isit/YangH07"}, "url":"URL#5579773" }, { "@score":"2", "@id":"5589636", "info":{"authors":{"author":[{"@pid":"97/1797","text":"Jirí Grim"},{"@pid":"66/5758","text":"Jan Hora"}]},"title":"Minimum Information Loss Cluster Analysis for Categorical Data.","venue":"MLDM","pages":"233-247","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/mldm/GrimH07","doi":"10.1007/978-3-540-73499-4_18","ee":"https://doi.org/10.1007/978-3-540-73499-4_18","url":"https://dblp.org/rec/conf/mldm/GrimH07"}, "url":"URL#5589636" }, { "@score":"2", "@id":"5606299", "info":{"authors":{"author":[{"@pid":"59/4298","text":"Tzu-Chuen Lu"},{"@pid":"87/10137","text":"Cheng-Chun Huang"}]},"title":"Lossless Information Hiding Scheme Based on Pixels Complexity Analysis.","venue":"SITIS","pages":"934-941","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sitis/LuH07","doi":"10.1109/SITIS.2007.60","ee":"https://doi.org/10.1109/SITIS.2007.60","url":"https://dblp.org/rec/conf/sitis/LuH07"}, "url":"URL#5606299" }, { "@score":"2", "@id":"5606943", "info":{"authors":{"author":{"@pid":"15/6841","text":"Ryotaro Kamimura"}},"title":"Information loss to extract distinctive features in competitive learning.","venue":"SMC","pages":"1217-1222","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/smc/Kamimura07","doi":"10.1109/ICSMC.2007.4413651","ee":"https://doi.org/10.1109/ICSMC.2007.4413651","url":"https://dblp.org/rec/conf/smc/Kamimura07"}, "url":"URL#5606943" }, { "@score":"2", "@id":"5612171", "info":{"authors":{"author":[{"@pid":"80/6521","text":"Gabriel Ghinita"},{"@pid":"08/5342","text":"Panagiotis Karras"},{"@pid":"97/3036","text":"Panos Kalnis"},{"@pid":"34/6253","text":"Nikos Mamoulis"}]},"title":"Fast Data Anonymization with Low Information Loss.","venue":"VLDB","pages":"758-769","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/vldb/GhinitaKKM07","ee":"http://www.vldb.org/conf/2007/papers/research/p758-ghinita.pdf","url":"https://dblp.org/rec/conf/vldb/GhinitaKKM07"}, "url":"URL#5612171" }, { "@score":"2", "@id":"5613537", "info":{"authors":{"author":[{"@pid":"81/2752","text":"Payam Rabiei"},{"@pid":"a/NaofalAlDhahir","text":"Naofal Al-Dhahir"}]},"title":"A New Information Lossless STBC for 2 Transmit Antennas with Reduced-Complexity ML Decoding.","venue":"VTC Fall","pages":"773-777","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/vtc/RabieiA07","doi":"10.1109/VETECF.2007.171","ee":"https://doi.org/10.1109/VETECF.2007.171","url":"https://dblp.org/rec/conf/vtc/RabieiA07"}, "url":"URL#5613537" }, { "@score":"2", "@id":"5618826", "info":{"authors":{"author":[{"@pid":"55/5180","text":"Svetlana Lazebnik"},{"@pid":"91/6905","text":"Maxim Raginsky"}]},"title":"Learning Nearest-Neighbor Quantizers from Labeled Data by Information Loss Minimization.","venue":"AISTATS","pages":"251-258","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"journals/jmlr/LazebnikR07","ee":"http://proceedings.mlr.press/v2/lazebnik07a.html","url":"https://dblp.org/rec/journals/jmlr/LazebnikR07"}, "url":"URL#5618826" }, { "@score":"2", "@id":"5625406", "info":{"authors":{"author":[{"@pid":"41/4917","text":"Cheng Chang"},{"@pid":"50/2194","text":"Anant Sahai"}]},"title":"The price of ignorance: The impact of side-information on delay for lossless source-coding","venue":"CoRR","volume":"abs/0712.0873","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-0712-0873","ee":"http://arxiv.org/abs/0712.0873","url":"https://dblp.org/rec/journals/corr/abs-0712-0873"}, "url":"URL#5625406" }, { "@score":"2", "@id":"5626105", "info":{"authors":{"author":[{"@pid":"84/1667","text":"Hari Palaiyanur"},{"@pid":"50/2194","text":"Anant Sahai"}]},"title":"Sequential decoding for lossless streaming source coding with side information","venue":"CoRR","volume":"abs/cs/0703120","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0703120","ee":"http://arxiv.org/abs/cs/0703120","url":"https://dblp.org/rec/journals/corr/abs-cs-0703120"}, "url":"URL#5626105" }, { "@score":"2", "@id":"5665182", "info":{"authors":{"author":[{"@pid":"97/6934","text":"Guang Yu"},{"@pid":"52/6049","text":"Yijun Li"}]},"title":"A scientometric assessment of the information loss caused by the delays in publication of Chinese science journals.","venue":"J. Inf. Sci.","volume":"32","number":"1","pages":"78-87","year":"2006","type":"Journal Articles","access":"closed","key":"journals/jis/YuL06","doi":"10.1177/0165551506059228","ee":"https://doi.org/10.1177/0165551506059228","url":"https://dblp.org/rec/journals/jis/YuL06"}, "url":"URL#5665182" }, { "@score":"3", "@id":"5677356", "info":{"authors":{"author":{"@pid":"h/SvenOveHansson","text":"Sven Ove Hansson"}},"title":"Mild Contraction. Evaluating Loss of Information Due to Loss of Belief.","venue":"Stud Logica","volume":"82","number":"2","pages":"293-295","year":"2006","type":"Journal Articles","access":"closed","key":"journals/sLogica/Hansson06","doi":"10.1007/S11225-006-7204-0","ee":"https://doi.org/10.1007/s11225-006-7204-0","url":"https://dblp.org/rec/journals/sLogica/Hansson06"}, "url":"URL#5677356" }, { "@score":"2", "@id":"5679427", "info":{"authors":{"author":[{"@pid":"73/1149-15","text":"Jian Xu 0015"},{"@pid":"w/WeiWang9","text":"Wei Wang 0009"},{"@pid":"p/JianPei","text":"Jian Pei"},{"@pid":"55/6951","text":"Xiaoyuan Wang"},{"@pid":"s/BaileShi","text":"Baile Shi"},{"@pid":"f/AdaWaiCheeFu","text":"Ada Wai-Chee Fu"}]},"title":"Utility-based anonymization for privacy preservation with less information loss.","venue":"SIGKDD Explor.","volume":"8","number":"2","pages":"21-30","year":"2006","type":"Journal Articles","access":"closed","key":"journals/sigkdd/XuWPWSF06","doi":"10.1145/1233321.1233324","ee":"https://doi.org/10.1145/1233321.1233324","url":"https://dblp.org/rec/journals/sigkdd/XuWPWSF06"}, "url":"URL#5679427" }, { "@score":"2", "@id":"5687111", "info":{"authors":{"author":[{"@pid":"96/718","text":"Haixiao Cai"},{"@pid":"52/6276","text":"Sanjeev R. Kulkarni"},{"@pid":"v/SVerdu","text":"Sergio Verdú"}]},"title":"An Algorithm for Universal Lossless Compression With Side Information.","venue":"IEEE Trans. Inf. Theory","volume":"52","number":"9","pages":"4008-4016","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tit/CaiKV06a","doi":"10.1109/TIT.2006.880020","ee":"https://doi.org/10.1109/TIT.2006.880020","url":"https://dblp.org/rec/journals/tit/CaiKV06a"}, "url":"URL#5687111" }, { "@score":"3", "@id":"5687288", "info":{"authors":{"author":[{"@pid":"72/5311","text":"Tony T. Lee"},{"@pid":"328/1300","text":"Terry Y. Lo"},{"@pid":"17/5983","text":"Jianfang Wang"}]},"title":"An information-lossless decomposition theory of relational information systems.","venue":"IEEE Trans. Inf. Theory","volume":"52","number":"5","pages":"1890-1903","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tit/LeeLW06","doi":"10.1109/TIT.2006.872860","ee":"https://doi.org/10.1109/TIT.2006.872860","url":"https://dblp.org/rec/journals/tit/LeeLW06"}, "url":"URL#5687288" }, { "@score":"2", "@id":"5687437", "info":{"authors":{"author":[{"@pid":"122/8306","text":"Vummintala Shashidhar"},{"@pid":"r/BSundarRajan","text":"B. Sundar Rajan"},{"@pid":"72/4129","text":"B. A. Sethuraman"}]},"title":"Information-Lossless Space-Time Block Codes From Crossed-Product Algebras.","venue":"IEEE Trans. Inf. Theory","volume":"52","number":"9","pages":"3913-3935","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tit/ShashidharRS06","doi":"10.1109/TIT.2006.880049","ee":"https://doi.org/10.1109/TIT.2006.880049","url":"https://dblp.org/rec/journals/tit/ShashidharRS06"}, "url":"URL#5687437" }, { "@score":"2", "@id":"5690141", "info":{"authors":{"author":[{"@pid":"31/4005","text":"Leon H. Sibul"},{"@pid":"06/4599","text":"Michael J. Roan"},{"@pid":"36/1175","text":"Stuart C. Schwartz"},{"@pid":"94/1501","text":"Christian M. Coviello"}]},"title":"Lossless Information Fusion for Active Ranging and Detection Systems.","venue":"IEEE Trans. Signal Process.","volume":"54","number":"10","pages":"3980-3990","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tsp/SibulRSC06","doi":"10.1109/TSP.2006.880197","ee":"https://doi.org/10.1109/TSP.2006.880197","url":"https://dblp.org/rec/journals/tsp/SibulRSC06"}, "url":"URL#5690141" }, { "@score":"2", "@id":"5735025", "info":{"authors":{"author":[{"@pid":"22/5506","text":"Wei-Jung Chien"},{"@pid":"k/LJKaram","text":"Lina J. Karam"},{"@pid":"25/7011","text":"Glen P. Abousleman"}]},"title":"Distributed Video Coding With Lossy Side Information.","venue":"ICASSP","pages":"69-72","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/icassp/ChienKA06","doi":"10.1109/ICASSP.2006.1660281","ee":"https://doi.org/10.1109/ICASSP.2006.1660281","url":"https://dblp.org/rec/conf/icassp/ChienKA06"}, "url":"URL#5735025" }, { "@score":"2", "@id":"5752762", "info":{"authors":{"author":[{"@pid":"66/3013","text":"Katsunari Yoshioka"},{"@pid":"29/3461","text":"Kotaro Sonoda"},{"@pid":"50/6620","text":"Osamu Takizawa"},{"@pid":"58/4020","text":"Tsutomu Matsumoto"}]},"title":"Information Hiding on Lossless Data Compression.","venue":"IIH-MSP","pages":"15-18","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/iih-msp/YoshiokaSTM06","doi":"10.1109/IIH-MSP.2006.265109","ee":"https://doi.org/10.1109/IIH-MSP.2006.265109","url":"https://dblp.org/rec/conf/iih-msp/YoshiokaSTM06"}, "url":"URL#5752762" }, { "@score":"2", "@id":"5761211", "info":{"authors":{"author":[{"@pid":"41/4917","text":"Cheng Chang"},{"@pid":"50/2194","text":"Anant Sahai"}]},"title":"Upper Bound on Error Exponents with Delay for Lossless Source Coding with Side-Information.","venue":"ISIT","pages":"326-330","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/ChangS06","doi":"10.1109/ISIT.2006.261607","ee":"https://doi.org/10.1109/ISIT.2006.261607","url":"https://dblp.org/rec/conf/isit/ChangS06"}, "url":"URL#5761211" }, { "@score":"2", "@id":"5765793", "info":{"authors":{"author":[{"@pid":"35/288","text":"Daniel Marco"},{"@pid":"83/4741","text":"Michelle Effros"}]},"title":"A Partial Solution for Lossless Source Coding with Coded Side Information.","venue":"ITW","pages":"247-251","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/itw/MarcoE06","doi":"10.1109/ITW.2006.1633821","ee":"https://doi.org/10.1109/ITW.2006.1633821","url":"https://dblp.org/rec/conf/itw/MarcoE06"}, "url":"URL#5765793" }, { "@score":"2", "@id":"5765794", "info":{"authors":{"author":[{"@pid":"21/6031","text":"Emin Martinian"},{"@pid":"48/6396","text":"Martin J. Wainwright"}]},"title":"Low-density constructions for lossy compression, binning, and coding with side information.","venue":"ITW","pages":"263-264","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/itw/MartinianW06","doi":"10.1109/ITW.2006.1633825","ee":"https://doi.org/10.1109/ITW.2006.1633825","url":"https://dblp.org/rec/conf/itw/MartinianW06"}, "url":"URL#5765794" }, { "@score":"2", "@id":"5777651", "info":{"authors":{"author":[{"@pid":"74/84","text":"Jordi Pérez-Romero"},{"@pid":"65/314","text":"Oriol Sallent"},{"@pid":"95/6471","text":"Ramón Agustí"}]},"title":"Enhanced Radio Access Technology Selection Exploiting Path Loss Information.","venue":"PIMRC","pages":"1-5","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/pimrc/Perez-RomeroSA06","doi":"10.1109/PIMRC.2006.254198","ee":"https://doi.org/10.1109/PIMRC.2006.254198","url":"https://dblp.org/rec/conf/pimrc/Perez-RomeroSA06"}, "url":"URL#5777651" }, { "@score":"2", "@id":"5786814", "info":{"authors":{"author":[{"@pid":"37/8972","text":"Francesco Alonge"},{"@pid":"127/0538","text":"Tommaso Cangemi"},{"@pid":"127/0521","text":"Filippo D'Ippolito"}]},"title":"Tracking control of network distributed systems in presence of variable time delay and loss of information.","venue":"SMC","pages":"3671-3678","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/smc/AlongeCD06","doi":"10.1109/ICSMC.2006.384700","ee":"https://doi.org/10.1109/ICSMC.2006.384700","url":"https://dblp.org/rec/conf/smc/AlongeCD06"}, "url":"URL#5786814" }, { "@score":"3", "@id":"5798544", "info":{"authors":{"author":[{"@pid":"d/JDomingoFerrer","text":"Josep Domingo-Ferrer"},{"@pid":"64/6629","text":"Josep Maria Mateo-Sanz"},{"@pid":"33/3284","text":"Francesc Sebé"}]},"title":"Information Loss in Continuous Hybrid Microdata: Subdomain-Level Probabilistic Measures.","venue":"Soft Computing in Web Information Retrieva","pages":"287-298","year":"2006","type":"Parts in Books or Collections","access":"closed","key":"series/sfsc/Domingo-FerrerMS06","doi":"10.1007/3-540-31590-X_14","ee":"https://doi.org/10.1007/3-540-31590-X_14","url":"https://dblp.org/rec/series/sfsc/Domingo-FerrerMS06"}, "url":"URL#5798544" }, { "@score":"2", "@id":"5801145", "info":{"authors":{"author":[{"@pid":"21/5407","text":"Majid Fozunbal"},{"@pid":"39/2685","text":"Ton Kalker"}]},"title":"Decision Making with Side Information and Unbounded Loss Functions","venue":"CoRR","volume":"abs/cs/0601115","year":"2006","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0601115","ee":"http://arxiv.org/abs/cs/0601115","url":"https://dblp.org/rec/journals/corr/abs-cs-0601115"}, "url":"URL#5801145" }, { "@score":"2", "@id":"5818261", "info":{"authors":{"author":[{"@pid":"64/6629","text":"Josep Maria Mateo-Sanz"},{"@pid":"d/JDomingoFerrer","text":"Josep Domingo-Ferrer"},{"@pid":"33/3284","text":"Francesc Sebé"}]},"title":"Probabilistic Information Loss Measures in Confidentiality Protection of Continuous Microdata.","venue":"Data Min. Knowl. Discov.","volume":"11","number":"2","pages":"181-193","year":"2005","type":"Journal Articles","access":"closed","key":"journals/datamine/Mateo-SanzDS05","doi":"10.1007/S10618-005-0011-9","ee":"https://doi.org/10.1007/s10618-005-0011-9","url":"https://dblp.org/rec/journals/datamine/Mateo-SanzDS05"}, "url":"URL#5818261" }, { "@score":"2", "@id":"5821292", "info":{"authors":{"author":{"@pid":"26/6958","text":"Paul Goodwin"}},"title":"Providing support for decisions based on time series information under conditions of asymmetric loss.","venue":"Eur. J. Oper. Res.","volume":"163","number":"2","pages":"388-402","year":"2005","type":"Journal Articles","access":"closed","key":"journals/eor/Goodwin05","doi":"10.1016/J.EJOR.2003.10.039","ee":"https://doi.org/10.1016/j.ejor.2003.10.039","url":"https://dblp.org/rec/journals/eor/Goodwin05"}, "url":"URL#5821292" }, { "@score":"2", "@id":"5857177", "info":{"authors":{"author":[{"@pid":"89/5925","text":"Alina Maor"},{"@pid":"92/1103","text":"Neri Merhav"}]},"title":"On joint information embedding and lossy compression.","venue":"IEEE Trans. Inf. Theory","volume":"51","number":"8","pages":"2998-3008","year":"2005","type":"Journal Articles","access":"closed","key":"journals/tit/MaorM05","doi":"10.1109/TIT.2005.851767","ee":"https://doi.org/10.1109/TIT.2005.851767","url":"https://dblp.org/rec/journals/tit/MaorM05"}, "url":"URL#5857177" }, { "@score":"2", "@id":"5857178", "info":{"authors":{"author":[{"@pid":"89/5925","text":"Alina Maor"},{"@pid":"92/1103","text":"Neri Merhav"}]},"title":"On Joint Information Embedding and Lossy Compression in the Presence of a Stationary Memoryless Attack Channel.","venue":"IEEE Trans. Inf. Theory","volume":"51","number":"9","pages":"3166-3175","year":"2005","type":"Journal Articles","access":"closed","key":"journals/tit/MaorM05a","doi":"10.1109/TIT.2005.853315","ee":"https://doi.org/10.1109/TIT.2005.853315","url":"https://dblp.org/rec/journals/tit/MaorM05a"}, "url":"URL#5857178" }, { "@score":"2", "@id":"5875111", "info":{"authors":{"author":[{"@pid":"97/6316","text":"Ling Shi"},{"@pid":"89/5700","text":"Michael Epstein"},{"@pid":"91/1861-4","text":"Abhishek Tiwari 0004"},{"@pid":"m/RichardMMurray","text":"Richard M. Murray"}]},"title":"Estimation with Information Loss: Asymptotic Analysis and Error Bounds.","venue":"CDC/ECC","pages":"1215-1221","year":"2005","type":"Conference and Workshop Papers","access":"closed","key":"conf/cdc/ShiETM05","doi":"10.1109/CDC.2005.1582324","ee":"https://doi.org/10.1109/CDC.2005.1582324","url":"https://dblp.org/rec/conf/cdc/ShiETM05"}, "url":"URL#5875111" }, { "@score":"2", "@id":"5907830", "info":{"authors":{"author":[{"@pid":"83/4314","text":"Irwan Prasetya Gunawan"},{"@pid":"g/MohammedGhanbari","text":"Mohammed Ghanbari 0001"}]},"title":"Image quality assessment based on harmonics gain/loss information.","venue":"ICIP","pages":"429-432","year":"2005","type":"Conference and Workshop Papers","access":"closed","key":"conf/icip/GunawanG05","doi":"10.1109/ICIP.2005.1529779","ee":"https://doi.org/10.1109/ICIP.2005.1529779","url":"https://dblp.org/rec/conf/icip/GunawanG05"}, "url":"URL#5907830" }, { "@score":"2", "@id":"5922743", "info":{"authors":{"author":[{"@pid":"96/718","text":"Haixiao Cai"},{"@pid":"52/6276","text":"Sanjeev R. Kulkarni"},{"@pid":"v/SVerdu","text":"Sergio Verdú"}]},"title":"A universal lossless compressor with side information based on context tree weighting.","venue":"ISIT","pages":"2340-2344","year":"2005","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/CaiKV05","doi":"10.1109/ISIT.2005.1523766","ee":"https://doi.org/10.1109/ISIT.2005.1523766","url":"https://dblp.org/rec/conf/isit/CaiKV05"}, "url":"URL#5922743" }, { "@score":"2", "@id":"5923129", "info":{"authors":{"author":{"@pid":"63/2713","text":"Ertem Tuncel"}},"title":"Lossless joint source-channel coding across broadcast channels with decoder side information.","venue":"ISIT","pages":"641-645","year":"2005","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/Tuncel05","doi":"10.1109/ISIT.2005.1523414","ee":"https://doi.org/10.1109/ISIT.2005.1523414","url":"https://dblp.org/rec/conf/isit/Tuncel05"}, "url":"URL#5923129" }, { "@score":"2", "@id":"5944488", "info":{"authors":{"author":[{"@pid":"v/ArjenPdeVries","text":"Arjen P. de Vries"},{"@pid":"r/TRolleke","text":"Thomas Rölleke"}]},"title":"Relevance information: a loss of entropy but a gain for IDF?","venue":"SIGIR","pages":"282-289","year":"2005","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigir/VriesR05","doi":"10.1145/1076034.1076084","ee":"https://doi.org/10.1145/1076034.1076084","url":"https://dblp.org/rec/conf/sigir/VriesR05"}, "url":"URL#5944488" }, { "@score":"2", "@id":"5999323", "info":{"authors":{"author":[{"@pid":"55/5599","text":"S. S. Maniccam"},{"@pid":"b/NikolaosGBourbakis","text":"Nikolaos G. Bourbakis"}]},"title":"Lossless compression and information hiding in images.","venue":"Pattern Recognit.","volume":"37","number":"3","pages":"475-486","year":"2004","type":"Journal Articles","access":"closed","key":"journals/pr/ManiccamB04","doi":"10.1016/J.PATCOG.2003.08.010","ee":"https://doi.org/10.1016/j.patcog.2003.08.010","url":"https://dblp.org/rec/journals/pr/ManiccamB04"}, "url":"URL#5999323" }, { "@score":"2", "@id":"6015587", "info":{"authors":{"author":[{"@pid":"51/1426","text":"Chamy Allenberg-Neeman"},{"@pid":"76/375","text":"Benny Neeman"}]},"title":"Full Information Game with Gains and Losses.","venue":"ALT","pages":"264-278","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/alt/Allenberg-NeemanN04","doi":"10.1007/978-3-540-30215-5_21","ee":"https://doi.org/10.1007/978-3-540-30215-5_21","url":"https://dblp.org/rec/conf/alt/Allenberg-NeemanN04"}, "url":"URL#6015587" }, { "@score":"2", "@id":"6017914", "info":{"authors":{"author":[{"@pid":"11/1893","text":"Chaoyuan Cui"},{"@pid":"32/6638","text":"Hanxiong Chen"},{"@pid":"88/3255","text":"Kazutaka Furuse"},{"@pid":"79/1829","text":"Nobuo Ohbo"}]},"title":"Web Query Refinement without Information Loss.","venue":"APWeb","pages":"363-372","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/apweb/CuiCFO04","doi":"10.1007/978-3-540-24655-8_39","ee":"https://doi.org/10.1007/978-3-540-24655-8_39","url":"https://dblp.org/rec/conf/apweb/CuiCFO04"}, "url":"URL#6017914" }, { "@score":"2", "@id":"6038626", "info":{"authors":{"author":[{"@pid":"74/49","text":"T. Kiran"},{"@pid":"r/BSundarRajan","text":"B. Sundar Rajan"}]},"title":"High-rate information-lossless linear dispersion STBCs from group algebra.","venue":"GLOBECOM","pages":"381-385","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KiranR04","doi":"10.1109/GLOCOM.2004.1377974","ee":"https://doi.org/10.1109/GLOCOM.2004.1377974","url":"https://dblp.org/rec/conf/globecom/KiranR04"}, "url":"URL#6038626" }, { "@score":"2", "@id":"6038949", "info":{"authors":{"author":[{"@pid":"122/8306","text":"Vummintala Shashidhar"},{"@pid":"r/BSundarRajan","text":"B. Sundar Rajan"},{"@pid":"75/818","text":"P. Vijay Kumar"}]},"title":"Asymptotic-information-lossless designs and diversity-multiplexing tradeoff.","venue":"GLOBECOM","pages":"366-370","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/VummintalaRK04","doi":"10.1109/GLOCOM.2004.1377971","ee":"https://doi.org/10.1109/GLOCOM.2004.1377971","url":"https://dblp.org/rec/conf/globecom/VummintalaRK04"}, "url":"URL#6038949" }, { "@score":"2", "@id":"6044789", "info":{"authors":{"author":[{"@pid":"94/1861-2","text":"Jian-Kang Zhang 0002"},{"@pid":"95/3659","text":"Kon Max Wong"},{"@pid":"43/368","text":"Timothy N. Davidson"}]},"title":"Information lossless full rate full diversity cyclotomic linear dispersion codes.","venue":"ICASSP","pages":"465-468","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/icassp/ZhangWD04","doi":"10.1109/ICASSP.2004.1326864","ee":"https://doi.org/10.1109/ICASSP.2004.1326864","url":"https://dblp.org/rec/conf/icassp/ZhangWD04"}, "url":"URL#6044789" }, { "@score":"2", "@id":"6065121", "info":{"authors":{"author":[{"@pid":"89/5925","text":"Alina Maor"},{"@pid":"92/1103","text":"Neri Merhav"}]},"title":"On joint information embedding and lossy compression.","venue":"ISIT","pages":"194","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/MaorM04","doi":"10.1109/ISIT.2004.1365232","ee":"https://doi.org/10.1109/ISIT.2004.1365232","url":"https://dblp.org/rec/conf/isit/MaorM04"}, "url":"URL#6065121" }, { "@score":"2", "@id":"6065159", "info":{"authors":{"author":[{"@pid":"97/2573","text":"Jayanth Nayak"},{"@pid":"63/2713","text":"Ertem Tuncel"},{"@pid":"85/5752","text":"Kenneth Rose"}]},"title":"Lossy source coding under a maximum distortion constraint with decoder side-information.","venue":"ISIT","pages":"331","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/NayakTR04","doi":"10.1109/ISIT.2004.1365370","ee":"https://doi.org/10.1109/ISIT.2004.1365370","url":"https://dblp.org/rec/conf/isit/NayakTR04"}, "url":"URL#6065159" }, { "@score":"2", "@id":"6065247", "info":{"authors":{"author":[{"@pid":"122/8306","text":"Vummintala Shashidhar"},{"@pid":"r/BSundarRajan","text":"B. Sundar Rajan"},{"@pid":"72/4129","text":"B. A. Sethuraman"}]},"title":"Information-lossless STBCs from crossed-product algebras.","venue":"ISIT","pages":"126","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/isit/ShashidharRS04","doi":"10.1109/ISIT.2004.1365163","ee":"https://doi.org/10.1109/ISIT.2004.1365163","url":"https://dblp.org/rec/conf/isit/ShashidharRS04"}, "url":"URL#6065247" }, { "@score":"2", "@id":"6080022", "info":{"authors":{"author":{"@pid":"80/3798","text":"Ramesh A. Dandekar"}},"title":"Maximum Utility-Minimum Information Loss Table Server Design for Statistical Disclosure Control of Tabular Data.","venue":"Privacy in Statistical Databases","pages":"121-135","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/psd/Dandekar04","doi":"10.1007/978-3-540-25955-8_10","ee":"https://doi.org/10.1007/978-3-540-25955-8_10","url":"https://dblp.org/rec/conf/psd/Dandekar04"}, "url":"URL#6080022" }, { "@score":"2", "@id":"6080038", "info":{"authors":{"author":[{"@pid":"92/3872","text":"Josep A. Sànchez"},{"@pid":"36/1927","text":"Julià Urrutia"},{"@pid":"86/5551","text":"Enric Ripoll"}]},"title":"Trade-Off between Disclosure Risk and Information Loss Using Multivariate Microaggregation: A Case Study on Business Data.","venue":"Privacy in Statistical Databases","pages":"307-322","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/psd/SanchezUR04","doi":"10.1007/978-3-540-25955-8_25","ee":"https://doi.org/10.1007/978-3-540-25955-8_25","url":"https://dblp.org/rec/conf/psd/SanchezUR04"}, "url":"URL#6080038" }, { "@score":"2", "@id":"6087418", "info":{"authors":{"author":[{"@pid":"51/4138","text":"Yi Zhao"},{"@pid":"67/5566","text":"Honglin Li"},{"@pid":"23/4609","text":"Stanley C. Ahalt"}]},"title":"Optimized packet interleaving for streaming applications on burst-lossy channels.","venue":"Visual Information Processing","pages":"241-251","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/spieVIP/ZhaoLA04","doi":"10.1117/12.542948","ee":"https://doi.org/10.1117/12.542948","url":"https://dblp.org/rec/conf/spieVIP/ZhaoLA04"}, "url":"URL#6087418" }, { "@score":"2", "@id":"6094689", "info":{"authors":{"author":[{"@pid":"49/3744","text":"Alessandro Acquisti"},{"@pid":"28/3855","text":"Jens Grossklags"}]},"title":"Privacy Attitudes and Privacy Behavior - Losses, Gains, and Hyperbolic Discounting.","venue":"Economics of Information Security","pages":"165-178","year":"2004","type":"Parts in Books or Collections","access":"closed","key":"series/ais/AcquistiG04","doi":"10.1007/1-4020-8090-5_13","ee":"https://doi.org/10.1007/1-4020-8090-5_13","url":"https://dblp.org/rec/series/ais/AcquistiG04"}, "url":"URL#6094689" }, { "@score":"2", "@id":"6131259", "info":{"authors":{"author":[{"@pid":"52/2854","text":"Esteve Pallarès-Segarra"},{"@pid":"19/1519","text":"Joan García-Haro"}]},"title":"Fluid-flow approach to evaluate the information loss probability in a finite buffering switching node under heterogeneous ON/OFF input traffic sources.","venue":"Perform. Evaluation","volume":"51","number":"2/4","pages":"153-169","year":"2003","type":"Journal Articles","access":"closed","key":"journals/pe/Pallares-SegarraG03","doi":"10.1016/S0166-5316(02)00094-9","ee":"https://doi.org/10.1016/S0166-5316(02)00094-9","url":"https://dblp.org/rec/journals/pe/Pallares-SegarraG03"}, "url":"URL#6131259" }, { "@score":"2", "@id":"6135324", "info":{"authors":{"author":[{"@pid":"41/4910","text":"Rebecka Jörnsten"},{"@pid":"35/7092-39","text":"Wei Wang 0039"},{"@pid":"27/116-1","text":"Bin Yu 0001"},{"@pid":"53/5765","text":"Kannan Ramchandran"}]},"title":"Microarray image compression: SLOCO and the effect of information loss.","venue":"Signal Process.","volume":"83","number":"4","pages":"859-869","year":"2003","type":"Journal Articles","access":"closed","key":"journals/sigpro/JornstenWYR03","doi":"10.1016/S0165-1684(02)00478-4","ee":"https://doi.org/10.1016/S0165-1684(02)00478-4","url":"https://dblp.org/rec/journals/sigpro/JornstenWYR03"}, "url":"URL#6135324" }, { "@score":"2", "@id":"6140444", "info":{"authors":{"author":[{"@pid":"23/5592","text":"Dania Brunello"},{"@pid":"11/1879","text":"Giancarlo Calvagno"},{"@pid":"96/1030","text":"Gian Antonio Mian"},{"@pid":"73/5872","text":"Roberto Rinaldo"}]},"title":"Lossless compression of video using temporal information.","venue":"IEEE Trans. Image Process.","volume":"12","number":"2","pages":"132-139","year":"2003","type":"Journal Articles","access":"closed","key":"journals/tip/BrunelloCMR03","doi":"10.1109/TIP.2002.807354","ee":"https://doi.org/10.1109/TIP.2002.807354","url":"https://dblp.org/rec/journals/tip/BrunelloCMR03"}, "url":"URL#6140444" }, { "@score":"2", "@id":"6141420", "info":{"authors":{"author":[{"@pid":"00/3716","text":"Tamer Shanableh"},{"@pid":"g/MohammedGhanbari","text":"Mohammed Ghanbari 0001"}]},"title":"Loss concealment using B-pictures motion information.","venue":"IEEE Trans. Multim.","volume":"5","number":"2","pages":"257-266","year":"2003","type":"Journal Articles","access":"closed","key":"journals/tmm/ShanablehG03","doi":"10.1109/TMM.2003.811624","ee":"https://doi.org/10.1109/TMM.2003.811624","url":"https://dblp.org/rec/journals/tmm/ShanablehG03"}, "url":"URL#6141420" }, { "@score":"3", "@id":"6158694", "info":{"authors":{"author":[{"@pid":"82/4299","text":"Qian Zhao"},{"@pid":"83/4741","text":"Michelle Effros"}]},"title":"Low Complexity Code Design for Lossless and Near-Lossless Side Information Source Codes.","venue":"DCC","pages":"3-12","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/dcc/ZhaoE03","doi":"10.1109/DCC.2003.1193991","ee":"https://doi.org/10.1109/DCC.2003.1193991","url":"https://dblp.org/rec/conf/dcc/ZhaoE03"}, "url":"URL#6158694" }, { "@score":"2", "@id":"6159579", "info":{"authors":{"author":[{"@pid":"19/2492","text":"Giuseppe Caire"},{"@pid":"s/ShlomoShamai","text":"Shlomo Shamai"},{"@pid":"05/2386","text":"Amin Shokrollahi"},{"@pid":"v/SVerdu","text":"Sergio Verdú"}]},"title":"Fountain codes for lossless data compression.","venue":"Algebraic Coding Theory and Information Theory","pages":"1-20","year":"2003","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/dimacs/CaireSSV03","url":"https://dblp.org/rec/conf/dimacs/CaireSSV03"}, "url":"URL#6159579" }, { "@score":"2", "@id":"6159585", "info":{"authors":{"author":[{"@pid":"92/1483","text":"Aaron S. Cohen"},{"@pid":"11/1342","text":"Ram Zamir"}]},"title":"Unbounded Loss in Writing on Dirty Paper is Possible.","venue":"Advances in Network Information Theory","pages":"79-86","year":"2003","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/dimacs/CohenZ03","doi":"10.1090/DIMACS/066/05","ee":"https://doi.org/10.1090/dimacs/066/05","url":"https://dblp.org/rec/conf/dimacs/CohenZ03"}, "url":"URL#6159585" }, { "@score":"2", "@id":"6159624", "info":{"authors":{"author":{"@pid":"177/8124","text":"Gil L. Shamir"}},"title":"Applications of coding theory to universal loss less source coding performance bounds.","venue":"Algebraic Coding Theory and Information Theory","pages":"21-56","year":"2003","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/dimacs/Shamir03","url":"https://dblp.org/rec/conf/dimacs/Shamir03"}, "url":"URL#6159624" }, { "@score":"2", "@id":"6167337", "info":{"authors":{"author":[{"@pid":"00/6071","text":"Keisuke Ishibashi"},{"@pid":"67/15","text":"Masaki Aida"},{"@pid":"54/6071","text":"Shin-ichi Kuribayashi"}]},"title":"Estimating packet loss-rate by using delay information and combined with change-of-measure framework.","venue":"GLOBECOM","pages":"3878-3882","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/IshibashiAK03","doi":"10.1109/GLOCOM.2003.1258957","ee":"https://doi.org/10.1109/GLOCOM.2003.1258957","url":"https://dblp.org/rec/conf/globecom/IshibashiAK03"}, "url":"URL#6167337" }, { "@score":"2", "@id":"6176877", "info":{"authors":{"author":[{"@pid":"86/1111","text":"Madoka Hasegawa"},{"@pid":"77/892","text":"Nobutaka Suzuki"},{"@pid":"64/5179","text":"Takuya Takahashi"},{"@pid":"09/6571","text":"Shigeo Kato"}]},"title":"A lossless coding method using shape information and rotation compensation for digital museum images.","venue":"ICIP","pages":"193-196","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/icip/HasegawaSTK03","doi":"10.1109/ICIP.2003.1246649","ee":"https://doi.org/10.1109/ICIP.2003.1246649","url":"https://dblp.org/rec/conf/icip/HasegawaSTK03"}, "url":"URL#6176877" }, { "@score":"2", "@id":"6197522", "info":{"authors":{"author":[{"@pid":"63/2228","text":"Yuko Itokawa"},{"@pid":"87/2446","text":"Tomoyuki Uchida"},{"@pid":"93/1755","text":"Takayoshi Shoudai"},{"@pid":"71/3097","text":"Tetsuhiro Miyahara"},{"@pid":"99/5389","text":"Yasuaki Nakamura"}]},"title":"Finding Frequent Subgraphs from Graph Structured Data with Geometric Information and Its Application to Lossless Compression.","venue":"PAKDD","pages":"582-594","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/pakdd/ItokawaUSMN03","doi":"10.1007/3-540-36175-8_58","ee":"https://doi.org/10.1007/3-540-36175-8_58","url":"https://dblp.org/rec/conf/pakdd/ItokawaUSMN03"}, "url":"URL#6197522" }, { "@score":"2", "@id":"6208808", "info":{"authors":{"author":[{"@pid":"74/2272-2","text":"Bing Zhang 0002"},{"@pid":"68/6843","text":"Mehdad N. Shirazi"}]},"title":"Implementation of explicit wireless loss notification using MAC-layer information.","venue":"WCNC","pages":"1339-1343","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/wcnc/ZhangS03","doi":"10.1109/WCNC.2003.1200568","ee":"https://doi.org/10.1109/WCNC.2003.1200568","url":"https://dblp.org/rec/conf/wcnc/ZhangS03"}, "url":"URL#6208808" }, { "@score":"2", "@id":"6208816", "info":{"authors":{"author":[{"@pid":"52/1486","text":"Periklis Andritsos"},{"@pid":"71/353","text":"Vassilios Tzerpos"}]},"title":"Software Clustering based on Information Loss Minimization.","venue":"WCRE","pages":"334-344","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/wcre/AndritsosT03","doi":"10.1109/WCRE.2003.1287264","ee":"https://doi.org/10.1109/WCRE.2003.1287264","url":"https://dblp.org/rec/conf/wcre/AndritsosT03"}, "url":"URL#6208816" }, { "@score":"2", "@id":"6210019", "info":{"authors":{"author":[{"@pid":"26/3228","text":"Traian Marius Truta"},{"@pid":"f/FarshadFotouhi","text":"Farshad Fotouhi"},{"@pid":"25/214","text":"Daniel C. Barth-Jones"}]},"title":"Privacy and confidentiality management for the microaggregation disclosure control method: disclosure risk and information loss measures.","venue":"WPES","pages":"21-30","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/wpes/TrutaFC03","doi":"10.1145/1005140.1005144","ee":"https://doi.org/10.1145/1005140.1005144","url":"https://dblp.org/rec/conf/wpes/TrutaFC03"}, "url":"URL#6210019" }, { "@score":"2", "@id":"6223434", "info":{"authors":{"author":{"@pid":"57/5755","text":"Dudley Stark"}},"title":"Information Loss In Top To Random Shuffling.","venue":"Comb. Probab. Comput.","volume":"11","number":"6","pages":"607-627","year":"2002","type":"Journal Articles","access":"closed","key":"journals/cpc/Stark02","doi":"10.1017/S0963548302005382","ee":"https://doi.org/10.1017/S0963548302005382","url":"https://dblp.org/rec/journals/cpc/Stark02"}, "url":"URL#6223434" }, { "@score":"2", "@id":"6223435", "info":{"authors":{"author":[{"@pid":"57/5755","text":"Dudley Stark"},{"@pid":"64/858","text":"A. Ganesh"},{"@pid":"56/6263","text":"Neil O'Connell"}]},"title":"Information Loss In Riffle Shuffling.","venue":"Comb. Probab. Comput.","volume":"11","number":"1","pages":"79-95","year":"2002","type":"Journal Articles","access":"closed","key":"journals/cpc/StarkGO02","doi":"10.1017/S0963548301004990","ee":"https://doi.org/10.1017/S0963548301004990","url":"https://dblp.org/rec/journals/cpc/StarkGO02"}, "url":"URL#6223435" }, { "@score":"2", "@id":"6241466", "info":{"authors":{"author":{"@pid":"72/1519","text":"Inés Samengo"}},"title":"Information Loss in an Optimal Maximum Likelihood Decoding.","venue":"Neural Comput.","volume":"14","number":"4","pages":"771-779","year":"2002","type":"Journal Articles","access":"closed","key":"journals/neco/Samengo02","doi":"10.1162/089976602317318947","ee":"https://doi.org/10.1162/089976602317318947","url":"https://dblp.org/rec/journals/neco/Samengo02"}, "url":"URL#6241466" }, { "@score":"2", "@id":"6262480", "info":{"authors":{"author":[{"@pid":"16/5949-1","text":"Javier Romero 0001"},{"@pid":"124/2274","text":"Juan Luis Nieves"},{"@pid":"146/3699","text":"Eva M. Valero"},{"@pid":"10/7860","text":"Javier Hernández-Andrés"},{"@pid":"94/1425","text":"José A. García"}]},"title":"Loss of Spectral Information in the Colour Signals Filtered by the Human Visual System.","venue":"CGIV","pages":"109-111","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/cgiv/RomeroNVHG02","ee":"http://www.ingentaconnect.com/content/ist/cgiv/2002/00002002/00000001/art00025","url":"https://dblp.org/rec/conf/cgiv/RomeroNVHG02"}, "url":"URL#6262480" }, { "@score":"2", "@id":"6284355", "info":{"authors":{"author":[{"@pid":"33/3284","text":"Francesc Sebé"},{"@pid":"d/JDomingoFerrer","text":"Josep Domingo-Ferrer"},{"@pid":"64/6629","text":"Josep Maria Mateo-Sanz"},{"@pid":"t/VicencTorra","text":"Vicenç Torra"}]},"title":"Post-Masking Optimization of the Tradeoff between Information Loss and Disclosure Risk in Masked Microdata Sets.","venue":"Inference Control in Statistical Databases","pages":"163-171","year":"2002","type":"Conference and Workshop Papers","access":"closed","key":"conf/icsd/SebeDMT02","doi":"10.1007/3-540-47804-3_13","ee":"https://doi.org/10.1007/3-540-47804-3_13","url":"https://dblp.org/rec/conf/icsd/SebeDMT02"}, "url":"URL#6284355" }, { "@score":"2", "@id":"6287333", "info":{"authors":{"author":[{"@pid":"s/RobinSommer","text":"Robin Sommer"},{"@pid":"f/AnjaFeldmann","text":"Anja Feldmann"}]},"title":"NetFlow: information loss or win?","venue":"Internet Measurement Workshop","pages":"173-174","year":"2002","type":"Conference and Workshop Papers","access":"closed","key":"conf/imc/SommerF02","doi":"10.1145/637201.637226","ee":"https://doi.org/10.1145/637201.637226","url":"https://dblp.org/rec/conf/imc/SommerF02"}, "url":"URL#6287333" }, { "@score":"2", "@id":"6304844", "info":{"authors":{"author":[{"@pid":"09/6571","text":"Shigeo Kato"},{"@pid":"86/1111","text":"Madoka Hasegawa"}]},"title":"Data hiding method in adaptive lossless coding scheme.","venue":"Visual Information Processing","pages":"176-183","year":"2002","type":"Conference and Workshop Papers","access":"closed","key":"conf/spieVIP/KatoH02","doi":"10.1117/12.477578","ee":"https://doi.org/10.1117/12.477578","url":"https://dblp.org/rec/conf/spieVIP/KatoH02"}, "url":"URL#6304844" }, { "@score":"2", "@id":"6346917", "info":{"authors":{"author":[{"@pid":"y/EnHuiYang","text":"En-Hui Yang"},{"@pid":"92/3950","text":"Alexei Kaltchenko"},{"@pid":"k/JohnCKieffer","text":"John C. Kieffer"}]},"title":"Universal lossless data compression with side information by using a conditional MPM grammar transform.","venue":"IEEE Trans. Inf. Theory","volume":"47","number":"6","pages":"2130-2150","year":"2001","type":"Journal Articles","access":"closed","key":"journals/tit/YangKK01","doi":"10.1109/18.945239","ee":"https://doi.org/10.1109/18.945239","url":"https://dblp.org/rec/journals/tit/YangKK01"}, "url":"URL#6346917" }, { "@score":"2", "@id":"6393466", "info":{"authors":{"author":[{"@pid":"87/796","text":"P. Sojan Lal"},{"@pid":"78/5261","text":"A. Unnikrishnan"},{"@pid":"83/1707","text":"K. Poulose Jacob"}]},"title":"Generation of Octrees from Raster Scan with Reduced Information Loss.","venue":"VIIP","pages":"366-370","year":"2001","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/viip/LalUJ01","url":"https://dblp.org/rec/conf/viip/LalUJ01"}, "url":"URL#6393466" }, { "@score":"2", "@id":"6412834", "info":{"authors":{"author":[{"@pid":"m/EduardoMena","text":"Eduardo Mena"},{"@pid":"12/2871","text":"Vipul Kashyap"},{"@pid":"98/2200","text":"Arantza Illarramendi"},{"@pid":"s/AmitPSheth","text":"Amit P. Sheth"}]},"title":"Imprecise Answers in Distributed Environments: Estimation of Information Loss for Multi-Ontology Based Query Processing.","venue":"Int. J. Cooperative Inf. Syst.","volume":"9","number":"4","pages":"403-425","year":"2000","type":"Journal Articles","access":"closed","key":"journals/ijcis/MenaKIS00","doi":"10.1142/S0218843000000193","ee":"https://doi.org/10.1142/S0218843000000193","url":"https://dblp.org/rec/journals/ijcis/MenaKIS00"}, "url":"URL#6412834" }, { "@score":"2", "@id":"6425923", "info":{"authors":{"author":[{"@pid":"v/MillistWVincent","text":"Millist W. Vincent"},{"@pid":"l/MarkLevene","text":"Mark Levene"}]},"title":"Restructuring Partitioned Normal Form Relations without Information Loss.","venue":"SIAM J. Comput.","volume":"29","number":"5","pages":"1550-1567","year":"2000","type":"Journal Articles","access":"closed","key":"journals/siamcomp/VincentL00","doi":"10.1137/S0097539797326319","ee":"https://doi.org/10.1137/S0097539797326319","url":"https://dblp.org/rec/journals/siamcomp/VincentL00"}, "url":"URL#6425923" }, { "@score":"2", "@id":"6437343", "info":{"authors":{"author":[{"@pid":"34/3188","text":"Lucy Y. Pao"},{"@pid":"263/1247","text":"Weerawat Khawsuk"}]},"title":"Determining track loss without truth information for distributed target tracking applications.","venue":"ACC","pages":"4363-4367","year":"2000","type":"Conference and Workshop Papers","access":"closed","key":"conf/amcc/PaoK00","doi":"10.1109/ACC.2000.877046","ee":"https://doi.org/10.1109/ACC.2000.877046","url":"https://dblp.org/rec/conf/amcc/PaoK00"}, "url":"URL#6437343" }, { "@score":"2", "@id":"6497700", "info":{"authors":{"author":[{"@pid":"b/OtmanABasir","text":"Otman A. Basir"},{"@pid":"07/2356","text":"Helen C. Shen"}]},"title":"Interdependence and information loss in multi-sensor systems.","venue":"J. Field Robotics","volume":"16","number":"11","pages":"597-612","year":"1999","type":"Journal Articles","access":"closed","key":"journals/jfr/BasirS99","doi":"10.1002/(SICI)1097-4563(199911)16:11<597::AID-ROB1>3.0.CO;2-D","ee":"https://doi.org/10.1002/(SICI)1097-4563(199911)16:11<597::AID-ROB1>3.0.CO;2-D","url":"https://dblp.org/rec/journals/jfr/BasirS99"}, "url":"URL#6497700" }, { "@score":"2", "@id":"6536711", "info":{"authors":{"author":[{"@pid":"05/3599","text":"Panagiotis Kanellis"},{"@pid":"62/1001","text":"Mark Lycett"},{"@pid":"p/RayJPaul","text":"Ray J. Paul"}]},"title":"Failure, Identity Loss and Living Information Systems.","venue":"ISCO","pages":"189-212","year":"1999","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/isco/KanellisLP99","url":"https://dblp.org/rec/conf/isco/KanellisLP99"}, "url":"URL#6536711" }, { "@score":"2", "@id":"6536716", "info":{"authors":{"author":{"@pid":"l/KLyytinen","text":"Kalle Lyytinen"}},"title":"Comments on "Failure, Identity Loss and Living Information Systems" by Panagiotis Kanellis, Mark Lycett and Ray J. Paul.","venue":"ISCO","pages":"213-216","year":"1999","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/isco/Lyytinen99a","url":"https://dblp.org/rec/conf/isco/Lyytinen99a"}, "url":"URL#6536716" }, { "@score":"2", "@id":"6578214", "info":{"authors":{"author":[{"@pid":"28/2295-1","text":"Zhou Wang 0001"},{"@pid":"00/3113","text":"Yinglin Yu"},{"@pid":"z/DavidZhang","text":"David Zhang 0001"}]},"title":"Best neighborhood matching: an information loss restoration technique for block-based image coding systems.","venue":"IEEE Trans. Image Process.","volume":"7","number":"7","pages":"1056-1061","year":"1998","type":"Journal Articles","access":"closed","key":"journals/tip/WangYZ98","doi":"10.1109/83.701166","ee":"https://doi.org/10.1109/83.701166","url":"https://dblp.org/rec/journals/tip/WangYZ98"}, "url":"URL#6578214" }, { "@score":"2", "@id":"6584613", "info":{"authors":{"author":[{"@pid":"21/4185","text":"László Neumann"},{"@pid":"53/46","text":"Kresimir Matkovic"},{"@pid":"86/3719","text":"Werner Purgathofer"}]},"title":"Automatic Exposure in Computer Graphics Based on the Minimum Information Loss Principle.","venue":"Computer Graphics International","pages":"666-","year":"1998","type":"Conference and Workshop Papers","access":"closed","key":"conf/cgi/NeumannMP98","doi":"10.1109/CGI.1998.694325","ee":"https://doi.org/10.1109/CGI.1998.694325","url":"https://dblp.org/rec/conf/cgi/NeumannMP98"}, "url":"URL#6584613" }, { "@score":"2", "@id":"6641110", "info":{"authors":{"author":[{"@pid":"92/1103","text":"Neri Merhav"},{"@pid":"16/3406","text":"Jacob Ziv"}]},"title":"On the amount of statistical side information required for lossy data compression.","venue":"IEEE Trans. Inf. Theory","volume":"43","number":"4","pages":"1112-1121","year":"1997","type":"Journal Articles","access":"closed","key":"journals/tit/MerhavZ97","doi":"10.1109/18.605571","ee":"https://doi.org/10.1109/18.605571","url":"https://dblp.org/rec/journals/tit/MerhavZ97"}, "url":"URL#6641110" }, { "@score":"2", "@id":"6653612", "info":{"authors":{"author":{"@pid":"183/2550","text":"Christophe Dussert"}},"title":"What is the visual information loss in a spatial-point-pattern statistical characterization?","venue":"Human Vision and Electronic Imaging","pages":"430-440","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/hvei/Dussert97","doi":"10.1117/12.274540","ee":"https://doi.org/10.1117/12.274540","url":"https://dblp.org/rec/conf/hvei/Dussert97"}, "url":"URL#6653612" }, { "@score":"3", "@id":"6717920", "info":{"authors":{"author":[{"@pid":"m/EduardoMena","text":"Eduardo Mena"},{"@pid":"12/2871","text":"Vipul Kashyap"},{"@pid":"98/2200","text":"Arantza Illarramendi"},{"@pid":"s/AmitPSheth","text":"Amit P. Sheth"}]},"title":"Managing Multiple Information Sources through Ontologies: Relationship between Vocabulary Heterogeneity and Loss of Information.","venue":"KRDB","year":"1996","type":"Conference and Workshop Papers","access":"open","key":"conf/krdb/MenaKIS96","ee":"https://ceur-ws.org/Vol-4/mena.ps","url":"https://dblp.org/rec/conf/krdb/MenaKIS96"}, "url":"URL#6717920" }, { "@score":"2", "@id":"6722723", "info":{"authors":{"author":[{"@pid":"90/3909","text":"Edward R. Dougherty"},{"@pid":"96/271","text":"Junior Barrera"}]},"title":"Morphological paradigm for loss-function-based design of digital filters.","venue":"Visual Information Processing","pages":"90-97","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/spieVIP/DoughertyB96","doi":"10.1117/12.243577","ee":"https://doi.org/10.1117/12.243577","url":"https://dblp.org/rec/conf/spieVIP/DoughertyB96"}, "url":"URL#6722723" }, { "@score":"2", "@id":"6747218", "info":{"authors":{"author":[{"@pid":"04/5473","text":"Xiaobing Lee"},{"@pid":"09/2187","text":"Ya-Qin Zhang"},{"@pid":"58/4358","text":"Alberto Leon-Garcia"}]},"title":"Information loss recovery for block-based image coding techniques-a fuzzy logic approach.","venue":"IEEE Trans. Image Process.","volume":"4","number":"3","pages":"259-273","year":"1995","type":"Journal Articles","access":"closed","key":"journals/tip/LeeZL95","doi":"10.1109/83.366475","ee":"https://doi.org/10.1109/83.366475","url":"https://dblp.org/rec/journals/tip/LeeZL95"}, "url":"URL#6747218" }, { "@score":"2", "@id":"6747285", "info":{"authors":{"author":[{"@pid":"u/MichaelUnser","text":"Michael Unser"},{"@pid":"17/988","text":"Akram Aldroubi"},{"@pid":"98/380","text":"Murray Eden"}]},"title":"Enlargement or reduction of digital images with minimum loss of information.","venue":"IEEE Trans. Image Process.","volume":"4","number":"3","pages":"247-258","year":"1995","type":"Journal Articles","access":"closed","key":"journals/tip/UnserAE95","doi":"10.1109/83.366474","ee":"https://doi.org/10.1109/83.366474","url":"https://dblp.org/rec/journals/tip/UnserAE95"}, "url":"URL#6747285" }, { "@score":"2", "@id":"6749762", "info":{"authors":{"author":{"@pid":"29/1765","text":"Thorsten Brants"}},"title":"Tagset Reduction without Information Loss.","venue":"ACL","pages":"287-289","year":"1995","type":"Conference and Workshop Papers","access":"open","key":"conf/acl/Brants95","doi":"10.3115/981658.981698","ee":"https://aclanthology.org/P95-1039/","url":"https://dblp.org/rec/conf/acl/Brants95"}, "url":"URL#6749762" }, { "@score":"2", "@id":"6770818", "info":{"authors":{"author":[{"@pid":"183/6009","text":"Jenny S. Ho"},{"@pid":"28/5026","text":"David Loshin"},{"@pid":"183/3977","text":"R. Shane Barton"},{"@pid":"183/3195","text":"Richard D. Juday"}]},"title":"Testing of remapping for reading enhancement for patients with central visual field losses.","venue":"Visual Information Processing","pages":"417-424","year":"1995","type":"Conference and Workshop Papers","access":"closed","key":"conf/spieVIP/HoLBJ95","doi":"10.1117/12.211991","ee":"https://doi.org/10.1117/12.211991","url":"https://dblp.org/rec/conf/spieVIP/HoLBJ95"}, "url":"URL#6770818" }, { "@score":"2", "@id":"6773833", "info":{"authors":{"author":{"@pid":"29/1765","text":"Thorsten Brants"}},"title":"Tagset Reduction Without Information Loss","venue":"CoRR","volume":"cmp-lg/9505010","year":"1995","type":"Informal and Other Publications","access":"open","key":"journals/corr/cmp-lg-9505010","ee":"http://arxiv.org/abs/cmp-lg/9505010","url":"https://dblp.org/rec/journals/corr/cmp-lg-9505010"}, "url":"URL#6773833" }, { "@score":"2", "@id":"6783262", "info":{"authors":{"author":{"@pid":"80/4293","text":"Donn B. Parker"}},"title":"Demonstrating the Elements of Information Security with Loss Scenarios.","venue":"Inf. Secur. J. A Glob. Perspect.","volume":"3","number":"1","pages":"17-22","year":"1994","type":"Journal Articles","access":"closed","key":"journals/isjgp/Parker94a","doi":"10.1080/10658989409342440","ee":"https://doi.org/10.1080/10658989409342440","url":"https://dblp.org/rec/journals/isjgp/Parker94a"}, "url":"URL#6783262" }, { "@score":"2", "@id":"6800214", "info":{"authors":{"author":[{"@pid":"78/6967","text":"Xavier Ginesta"},{"@pid":"59/6380","text":"Seung P. Kim"}]},"title":"Vector Quantization of Contextual Information for Lossless Image Compression.","venue":"Data Compression Conference","pages":"474-484","year":"1994","type":"Conference and Workshop Papers","access":"closed","key":"conf/dcc/GinestaK94","doi":"10.1109/DCC.1994.305947","ee":"https://doi.org/10.1109/DCC.1994.305947","url":"https://dblp.org/rec/conf/dcc/GinestaK94"}, "url":"URL#6800214" }, { "@score":"2", "@id":"6813000", "info":{"authors":{"author":[{"@pid":"35/4888","text":"Gustavo Deco"},{"@pid":"b/WBrauer","text":"Wilfried Brauer"}]},"title":"Higher Order Statistical Decorrelation without Information Loss.","venue":"NIPS","pages":"247-254","year":"1994","type":"Conference and Workshop Papers","access":"open","key":"conf/nips/DecoB94","ee":"http://papers.nips.cc/paper/901-higher-order-statistical-decorrelation-without-information-loss","url":"https://dblp.org/rec/conf/nips/DecoB94"}, "url":"URL#6813000" }, { "@score":"2", "@id":"6823435", "info":{"authors":{"author":{"@pid":"k/BrianKnight","text":"Brian Knight"}},"title":"Information Loss in Temporal Knowledge Representations.","venue":"Comput. J.","volume":"36","number":"2","pages":"128-136","year":"1993","type":"Journal Articles","access":"closed","key":"journals/cj/Knight93","doi":"10.1093/COMJNL/36.2.127","ee":"https://doi.org/10.1093/comjnl/36.2.127","url":"https://dblp.org/rec/journals/cj/Knight93"}, "url":"URL#6823435" }, { "@score":"2", "@id":"6827294", "info":{"authors":{"author":{"@pid":"15/5017","text":"Tom Newman"}},"title":"Information Loss Rarely Recovered.","venue":"Inf. Manag. Comput. Secur.","volume":"1","number":"4","year":"1993","type":"Journal Articles","access":"closed","key":"journals/imcs/Newman93","doi":"10.1108/09685229310045330","ee":"https://doi.org/10.1108/09685229310045330","url":"https://dblp.org/rec/journals/imcs/Newman93"}, "url":"URL#6827294" }, { "@score":"2", "@id":"6828019", "info":{"authors":{"author":[{"@pid":"o/GultekinOzsoyoglu","text":"Gultekin Özsoyoglu"},{"@pid":"14/4337","text":"JiYoung Chung"},{"@pid":"63/565","text":"Tzong-An Su"}]},"title":"Information loss in three cell-level control techniques for summary tables.","venue":"Inf. Sci.","volume":"70","number":"3","pages":"179-212","year":"1993","type":"Journal Articles","access":"closed","key":"journals/isci/OzsoyogluCS93","doi":"10.1016/0020-0255(93)90077-Y","ee":"https://doi.org/10.1016/0020-0255(93)90077-Y","url":"https://dblp.org/rec/journals/isci/OzsoyogluCS93"}, "url":"URL#6828019" }, { "@score":"2", "@id":"6837215", "info":{"authors":{"author":[{"@pid":"85/2528","text":"Gautam Bhargava"},{"@pid":"g/ShashiKGadia","text":"Shashi K. Gadia"}]},"title":"Relational Database Systems with Zero Information Loss.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"5","number":"1","pages":"76-87","year":"1993","type":"Journal Articles","access":"closed","key":"journals/tkde/BhargavaG93","doi":"10.1109/69.204093","ee":"https://doi.org/10.1109/69.204093","url":"https://dblp.org/rec/journals/tkde/BhargavaG93"}, "url":"URL#6837215" }, { "@score":"2", "@id":"6856862", "info":{"authors":{"author":{"@pid":"91/4845","text":"Jun Ma"}},"title":"Lossless gray-scale image compression by predictive GDF.","venue":"Visual Information Processing","pages":"113-122","year":"1993","type":"Conference and Workshop Papers","access":"closed","key":"conf/spieVIP/Ma93","doi":"10.1117/12.150942","ee":"https://doi.org/10.1117/12.150942","url":"https://dblp.org/rec/conf/spieVIP/Ma93"}, "url":"URL#6856862" }, { "@score":"2", "@id":"6857950", "info":{"authors":{"author":[{"@pid":"04/5473","text":"Xiaobing Lee"},{"@pid":"09/2187","text":"Ya-Qin Zhang"},{"@pid":"58/4358","text":"Alberto Leon-Garcia"}]},"title":"Information loss recovery for block-based image coding techniques: a fuzzy logic approach.","venue":"VCIP","year":"1993","type":"Conference and Workshop Papers","access":"closed","key":"conf/vcip/LeeZL93","doi":"10.1117/12.157972","ee":"https://doi.org/10.1117/12.157972","url":"https://dblp.org/rec/conf/vcip/LeeZL93"}, "url":"URL#6857950" }, { "@score":"2", "@id":"6927261", "info":{"authors":{"author":{"@pid":"196/7751","text":"Ulrich Losse"}},"title":"Die schutzfähige Erfindung und die stimulierungswürdige erfinderische Leistung unter Bedingungen des Einsatzes von Informationsverarbeitungssystemen in Schöpfungsprozessen: erfinder- und patentrechtliche Konsequenzen.","year":"1990","type":"Books and Theses","access":"unavailable","key":"phd/dnb/Losse90","ee":"https://d-nb.info/911491619","url":"https://dblp.org/rec/phd/dnb/Losse90"}, "url":"URL#6927261" }, { "@score":"2", "@id":"6928890", "info":{"authors":{"author":[{"@pid":"j/SushilJajodia","text":"Sushil Jajodia"},{"@pid":"57/778","text":"Frederick N. Springsteel"}]},"title":"Lossless Outer Joins with Incomplete Information.","venue":"BIT","volume":"30","number":"1","pages":"34-41","year":"1990","type":"Journal Articles","access":"closed","key":"journals/bit/JajodiaS90","doi":"10.1007/BF01932129","ee":"https://doi.org/10.1007/BF01932129","url":"https://dblp.org/rec/journals/bit/JajodiaS90"}, "url":"URL#6928890" }, { "@score":"2", "@id":"6948036", "info":{"authors":{"author":{"@pid":"h/MartinCHenson","text":"Martin C. Henson"}},"title":"Information Loss in the Programming Logic TK.","venue":"Programming Concepts and Methods","pages":"523-560","year":"1990","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/ifip2/Henson90","url":"https://dblp.org/rec/conf/ifip2/Henson90"}, "url":"URL#6948036" }, { "@score":"2", "@id":"6949329", "info":{"authors":{"author":[{"@pid":"47/4879","text":"Bruno Forte"},{"@pid":"29/5362","text":"Vladimir Kolbas"}]},"title":"Minimum Loss of Information and Image Segmentation.","venue":"IPMU","pages":"349-357","year":"1990","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipmu/ForteK90","doi":"10.1007/BFB0028121","ee":"https://doi.org/10.1007/BFb0028121","url":"https://dblp.org/rec/conf/ipmu/ForteK90"}, "url":"URL#6949329" }, { "@score":"2", "@id":"6965865", "info":{"authors":{"author":{"@pid":"73/1061","text":"San-Qi Li"}},"title":"Study of information loss in packet voice systems.","venue":"IEEE Trans. Commun.","volume":"37","number":"11","pages":"1192-1202","year":"1989","type":"Journal Articles","access":"closed","key":"journals/tcom/Li89","doi":"10.1109/26.46513","ee":"https://doi.org/10.1109/26.46513","url":"https://dblp.org/rec/journals/tcom/Li89"}, "url":"URL#6965865" }, { "@score":"2", "@id":"6978021", "info":{"authors":{"author":[{"@pid":"85/2528","text":"Gautam Bhargava"},{"@pid":"g/ShashiKGadia","text":"Shashi K. Gadia"}]},"title":"Achieving Zero Information-Loss in a Classical Database Environment.","venue":"VLDB","pages":"217-224","year":"1989","type":"Conference and Workshop Papers","access":"closed","key":"conf/vldb/BhargavaG89","ee":"http://www.vldb.org/conf/1989/P217.PDF","url":"https://dblp.org/rec/conf/vldb/BhargavaG89"}, "url":"URL#6978021" }, { "@score":"2", "@id":"6979484", "info":{"authors":{"author":{"@pid":"196/7735","text":"Monika Lösse"}},"title":"Grundlagen und Ansätze zur Projektierung von Arbeitsaufgaben unter Beachtung des informationellen Aspektes bei verstärktem Einsatz automatisierter technischer Mittel in der Produktion, dargestellt an Beispielen aus dem Maschinen- und Anlagenbau.","year":"1988","type":"Books and Theses","access":"unavailable","key":"phd/dnb/Losse88","ee":"https://d-nb.info/900438258","url":"https://dblp.org/rec/phd/dnb/Losse88"}, "url":"URL#6979484" }, { "@score":"2", "@id":"7009699", "info":{"authors":{"author":[{"@pid":"f/CFaloutsos","text":"Christos Faloutsos"},{"@pid":"66/2056","text":"Stavros Christodoulakis"}]},"title":"Optimal Signature Extraction and Information Loss.","venue":"ACM Trans. Database Syst.","volume":"12","number":"3","pages":"395-428","year":"1987","type":"Journal Articles","access":"closed","key":"journals/tods/FaloutsosC87","doi":"10.1145/27629.214285","ee":"https://doi.org/10.1145/27629.214285","url":"https://dblp.org/rec/journals/tods/FaloutsosC87"}, "url":"URL#7009699" }, { "@score":"2", "@id":"7031223", "info":{"authors":{"author":[{"@pid":"o/GultekinOzsoyoglu","text":"Gultekin Özsoyoglu"},{"@pid":"14/4337","text":"JiYoung Chung"}]},"title":"Information Loss in the Lattice Model of Summary Tables due to Cell Suppression.","venue":"ICDE","pages":"75-83","year":"1986","type":"Conference and Workshop Papers","access":"closed","key":"conf/icde/OzsoyogluC86","doi":"10.1109/ICDE.1986.7266208","ee":"https://doi.org/10.1109/ICDE.1986.7266208","url":"https://dblp.org/rec/conf/icde/OzsoyogluC86"}, "url":"URL#7031223" }, { "@score":"2", "@id":"7037797", "info":{"authors":{"author":[{"@pid":"69/2407","text":"John R. Anderson"},{"@pid":"38/5312","text":"Robin Jeffries"}]},"title":"Novice LISP Errors: Undetected Losses of Information from Working Memory.","venue":"Hum. Comput. Interact.","volume":"1","number":"2","pages":"107-131","year":"1985","type":"Journal Articles","access":"closed","key":"journals/hhci/AndersonJ85","doi":"10.1207/S15327051HCI0102_2","ee":"https://doi.org/10.1207/s15327051hci0102_2","url":"https://dblp.org/rec/journals/hhci/AndersonJ85"}, "url":"URL#7037797" }, { "@score":"3", "@id":"7052427", "info":{"authors":{"author":{"@pid":"129/3752","text":"Emmanuel P. Papadakis"}},"title":"Information retrieval and the loss of information.","venue":"J. Am. Soc. Inf. Sci.","volume":"35","number":"1","pages":"56","year":"1984","type":"Journal Articles","access":"closed","key":"journals/jasis/Papadakis84","doi":"10.1002/ASI.4630350109","ee":"https://doi.org/10.1002/asi.4630350109","url":"https://dblp.org/rec/journals/jasis/Papadakis84"}, "url":"URL#7052427" }, { "@score":"2", "@id":"7062468", "info":{"authors":{"author":{"@pid":"35/3191","text":"Jan Schlörer"}},"title":"Information Loss in Partitioned Statistical Databases.","venue":"Comput. J.","volume":"26","number":"3","pages":"218-223","year":"1983","type":"Journal Articles","access":"closed","key":"journals/cj/Schlorer83","doi":"10.1093/COMJNL/26.3.218","ee":"https://doi.org/10.1093/comjnl/26.3.218","url":"https://dblp.org/rec/journals/cj/Schlorer83"}, "url":"URL#7062468" }, { "@score":"2", "@id":"7113462", "info":{"authors":{"author":{"@pid":"76/741","text":"James L. Dolby"}},"title":"On the notions of ambiguity and information loss.","venue":"Inf. Process. Manag.","volume":"13","number":"1","pages":"69-77","year":"1977","type":"Journal Articles","access":"closed","key":"journals/ipm/Dolby77","doi":"10.1016/0306-4573(77)90032-2","ee":"https://doi.org/10.1016/0306-4573(77)90032-2","url":"https://dblp.org/rec/journals/ipm/Dolby77"}, "url":"URL#7113462" }, { "@score":"2", "@id":"7146393", "info":{"authors":{"author":{"@pid":"19/2501","text":"Keith L. Doty"}},"title":"On Information-Lossless Discrete-Time Systems.","venue":"IEEE Trans. Computers","volume":"19","number":"6","pages":"548-551","year":"1970","type":"Journal Articles","access":"closed","key":"journals/tc/Doty70","doi":"10.1109/T-C.1970.222974","ee":"https://doi.org/10.1109/T-C.1970.222974","url":"https://dblp.org/rec/journals/tc/Doty70"}, "url":"URL#7146393" }, { "@score":"2", "@id":"7152062", "info":{"authors":{"author":{"@pid":"86/2878","text":"I. J. Good 0001"}},"title":"The Loss of Information due to Clipping a Waveform","venue":"Inf. Control.","volume":"10","number":"2","pages":"220-222","year":"1967","type":"Journal Articles","access":"open","key":"journals/iandc/Good67","doi":"10.1016/S0019-9958(67)80010-X","ee":"https://doi.org/10.1016/S0019-9958(67)80010-X","url":"https://dblp.org/rec/journals/iandc/Good67"}, "url":"URL#7152062" }, { "@score":"2", "@id":"7152857", "info":{"authors":{"author":{"@pid":"134/3799","text":"J. A. Zoellner"}},"title":"Information loss of a peak-riding detector in the presence of pulse interference (Corresp.).","venue":"IEEE Trans. Inf. Theory","volume":"13","number":"2","pages":"316-318","year":"1967","type":"Journal Articles","access":"closed","key":"journals/tit/Zoellner67","doi":"10.1109/TIT.1967.1054000","ee":"https://doi.org/10.1109/TIT.1967.1054000","url":"https://dblp.org/rec/journals/tit/Zoellner67"}, "url":"URL#7152857" }, { "@score":"2", "@id":"7155610", "info":{"authors":{"author":{"@pid":"e/ShimonEven","text":"Shimon Even"}},"title":"On Information Lossless Automata of Finite Order.","venue":"IEEE Trans. Electron. Comput.","volume":"14","number":"4","pages":"561-569","year":"1965","type":"Journal Articles","access":"closed","key":"journals/tc/Even65","doi":"10.1109/PGEC.1965.263996","ee":"https://doi.org/10.1109/PGEC.1965.263996","url":"https://dblp.org/rec/journals/tc/Even65"}, "url":"URL#7155610" }, { "@score":"2", "@id":"7156978", "info":{"authors":{"author":{"@pid":"n/PeterGNeumann","text":"Peter G. Neumann"}},"title":"Error-limiting coding using information-lossless sequential machines.","venue":"IEEE Trans. Inf. Theory","volume":"10","number":"2","pages":"108-115","year":"1964","type":"Journal Articles","access":"closed","key":"journals/tit/Neumann64a","doi":"10.1109/TIT.1964.1053660","ee":"https://doi.org/10.1109/TIT.1964.1053660","url":"https://dblp.org/rec/journals/tit/Neumann64a"}, "url":"URL#7156978" }, { "@score":"2", "@id":"7157692", "info":{"authors":{"author":{"@pid":"62/2123","text":"Frederick Jelinek"}},"title":"Loss in Information Transmission through Two-Way Channels","venue":"Inf. Control.","volume":"6","number":"4","pages":"337-371","year":"1963","type":"Journal Articles","access":"open","key":"journals/iandc/Jelinek63","doi":"10.1016/S0019-9958(63)80012-1","ee":"https://doi.org/10.1016/S0019-9958(63)80012-1","url":"https://dblp.org/rec/journals/iandc/Jelinek63"}, "url":"URL#7157692" }, { "@score":"2", "@id":"7159302", "info":{"authors":{"author":{"@pid":"e/ShimonEven","text":"Shimon Even"}},"title":"Generalized automata and their information losslessness","venue":"SWCT","pages":"143-147","year":"1962","type":"Conference and Workshop Papers","access":"closed","key":"conf/focs/Even62","doi":"10.1109/FOCS.1962.6","ee":"https://doi.org/10.1109/FOCS.1962.6","url":"https://dblp.org/rec/conf/focs/Even62"}, "url":"URL#7159302" }, { "@score":"2", "@id":"7160597", "info":{"authors":{"author":[{"@pid":"67/6602","text":"Satosi Watanabe"},{"@pid":"11/6816","text":"Chacko T. Abraham"}]},"title":"Loss and Recovery of Information by Coarse Observation of Stochastic Chain","venue":"Inf. Control.","volume":"3","number":"3","pages":"248-278","year":"1960","type":"Journal Articles","access":"open","key":"journals/iandc/WatanabeA60","doi":"10.1016/S0019-9958(60)90863-9","ee":"https://doi.org/10.1016/S0019-9958(60)90863-9","url":"https://dblp.org/rec/journals/iandc/WatanabeA60"}, "url":"URL#7160597" }, { "@score":"2", "@id":"7161397", "info":{"authors":{"author":{"@pid":"75/5677","text":"David A. Huffman"}},"title":"Canonical forms for information-lossless finite-state logical machines.","venue":"IRE Trans. Inf. Theory","volume":"5","number":"5","pages":"41-59","year":"1959","type":"Journal Articles","access":"closed","key":"journals/tit/Huffman59","doi":"10.1109/TIT.1959.1057537","ee":"https://doi.org/10.1109/TIT.1959.1057537","url":"https://dblp.org/rec/journals/tit/Huffman59"}, "url":"URL#7161397" } ] } } } )