- Home
- Video search
We found 48 result.
2013 ISIT Plenary Lecture
Concentration Inequalities and The Entropy Method
Gábor Lugosi
Department of Economics, Pompeu Fabra University
ISIT Plenary Lecture
2014 Shannon Lecture: On The Mathematics of Distinguishable Difference.
By János Körner, "Sapienza" University of Rome
Shannon Lectures
2013 ISIT Plenary Lecture
High Dimensional Classification with Invariant Deep Networks
Stéphane Mallat
École Normale Supérieure
ISIT Plenary Lecture
Information Theory Society presents a brief history of internet communication and packet switched networks leading to the idea of network coding.…
Network Coding
2011 Shannon Lecture
From Constrained Signaling to Network Interference Alignment via an Information-Estimation Perspective
Shlomo Shamai (Shitz)…
Shannon Lectures
IEEE ITW 2020, Riva del Garda, Italy
Plenary Lecture
ITW Plenary LecturePlenary Lecture
What motivated the concept of Markov chains & Markov models? Featuring Plato's theory of forms, Jacob Bernoulli's weak law of large numbers and…
Information Theory Society presents how the Lempel-Ziv lossless compression algorithm works. It was published in 1978 and improved by Welch in 1984…
Source CodingCoding
IEEE ITW 2020, Riva del Garda, Italy
Plenary Lecture
ITW Plenary LecturePlenary Lecture
2014 ISIT Plenary Lecture
Codes for Distributed Storage -- Asking More of an Old Friend
P. Vijay Kumar
Indian Institute of Science
2014 ISIT Plenary Lecture
Signal Analysis Helping Art Historians and Conservators
Ingrid Daubechies
Duke University
IEEE ITW 2020, Riva del Garda, Italy
Tutorial
Deep LearningDistributed LearningTutorial
IEEE ITW 2020, Riva del Garda, Italy
Plenary Lecture
ITW Plenary LecturePlenary Lecture
2014 ISIT Plenary Lecture
DNA Sequencing in the 21st Century: Algorithms and Estimation
Michael S. Waterman
University of Southern California
ISIT Plenary Lecture
2014 ISIT Plenary Lecture
To Infinity and Beyond: New Frontiers in Wireless Information Theory
Andrea Goldsmith
Stanford University
Morse Code Simulator: https://www.khanacademy.org/math/appl...
How can we quantify/measure an information source? We introduce the ideas of Nyquist & Hartley using a simple game involving yes/no questions. It…
Claude Shannon demonstrated how to generate "english looking" text using Markov chains and how this gives a satisfactory representation of the…
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
Information theoryCoding TheoryFinite blocklength
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
Information theoryCoding TheoryFinite blocklength
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
EstimationHypothesis TestingDistributed SystemsSecrecy
Information Theory Society presents the key concepts needed to understand low-density parity-check codes (LDPC codes). It's a blend of repetition…
LDPC CodesCoding
The IEEE Information Theory Society presents an overview of Adi Shamir's 1979 paper on secret sharing. This is part of our series on the greatest…
Secrecy
The key insights behind content and collaborative filtering (Matrix Factorization). How Amazon, Netflix, Facebook and others predict what you will…
Recommender SystemsApplications
IEEE ITW 2020, Riva del Garda, Italy
Plenary Lecture
ITW Plenary LecturePlenary Lecture
IEEE ITW 2020, Riva del Garda, Italy
Plenary Lecture
ITW Plenary LecturePlenary Lecture
IEEE ITW 2020, Riva del Garda, Italy
Plenary Lecture
ITW Plenary LecturePlenary Lecture
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
Machine LearningInformation theoryFairness
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
Machine LearningInformation theoryFairness
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
Machine LearningInformation theoryFairness
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
EstimationHypothesis TestingDistributed SystemsSecrecy
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
Coding TheoryLocally-testable codesLocally-decodable codes
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
Data sharingPrivacy
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
Information theoryCoding TheoryFinite blocklength
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
Random WalkHigh dimensional expander Hypergraphs
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
Coding TheoryLocally-testable codesLocally-decodable codes
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
Data sharingPrivacy
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
EstimationHypothesis TestingDistributed SystemsSecrecy
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
Mutual information Machines learning Estimation
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
Coding TheoryLocally-testable codesLocally-decodable codes
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
Data sharingPrivacy
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
Mutual information Machines learning Estimation
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
Mutual information Machines learning Estimation
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
Random WalkHigh dimensional expander Hypergraphs
2021 Croucher Summer Course in Information Theory, The Chinese University of Hong Kong
Lecture
Random WalkHigh dimensional expander Hypergraphs