- Home
- Video search
We found 32 result.
2013 ISIT Plenary Lecture
Concentration Inequalities and The Entropy Method
Gábor Lugosi
Department of Economics, Pompeu Fabra University
ISIT Plenary Lecture
2013 ISIT Plenary Lecture
High Dimensional Classification with Invariant Deep Networks
Stéphane Mallat
École Normale Supérieure
ISIT Plenary Lecture
Information Theory Society presents a brief history of internet communication and packet switched networks leading to the idea of network coding.…
Network Coding
IEEE ITW 2021, Virtually from Kanazawa, Japan
Tutorial Lecture
Storage
2016 ISIT Plenary Talk
The SAT-UNSAT Transition for Random Satisfiability Problems in the Case of Continuous Variables
Giorgio Parisi
University of…
ISIT Plenary Lecture
2016 ISIT Plenary Talk
The Laplacian Matrices of Graphs
Daniel A. Spielman
Yale University
ISIT Plenary Lecture
2016 ISIT Plenary Talk
Codes, Metrics, and Applications
Alexander Barg
University of Maryland
IEEE ITW 2021, Virtually from Kanazawa, Japan
Plenary Lecture
Machine LearningSignal ProcessingDeep Learning
IEEE ITW 2021, Virtually from Kanazawa, Japan
Tutorial Lecture
CryptographyCoding Theory
2016 ISIT Plenary Talk
From 3T to 5G: Theory and Practice of Cooperation in Wireless Networks
Elza Erkip
New York University
ISIT Plenary Lecture
2016 ISIT Shannon Lecture
The Classical Capacity of a Quantum Channel
Alexander S. Holevo
Steklov Mathematical Institute
ISIT Plenary LectureShannon Lectures
What motivated the concept of Markov chains & Markov models? Featuring Plato's theory of forms, Jacob Bernoulli's weak law of large numbers and…
Information Theory Society presents how the Lempel-Ziv lossless compression algorithm works. It was published in 1978 and improved by Welch in 1984…
Source CodingCoding
IEEE ITW 2021, Virtually from Kanazawa, Japan
Plenary Lecture
Coding TheoryDistributed Systems
IEEE ITW 2021, Virtually from Kanazawa, Japan
Plenary Lecture
Low LatencyCoding Theory
IEEE ITW 2021, Virtually from Kanazawa, Japan
Tutorial Lecture
Private Information RetrievalSecrecyCoded Computing
IEEE ITW 2021, Virtually from Kanazawa, Japan
Tutorial Lecture
Polar CodesCoding Theory
Morse Code Simulator: https://www.khanacademy.org/math/appl...
How can we quantify/measure an information source? We introduce the ideas of Nyquist & Hartley using a simple game involving yes/no questions. It…
Claude Shannon demonstrated how to generate "english looking" text using Markov chains and how this gives a satisfactory representation of the…
Information Theory Society presents the key concepts needed to understand low-density parity-check codes (LDPC codes). It's a blend of repetition…
LDPC CodesCoding
The IEEE Information Theory Society presents an overview of Adi Shamir's 1979 paper on secret sharing. This is part of our series on the greatest…
Secrecy
The key insights behind content and collaborative filtering (Matrix Factorization). How Amazon, Netflix, Facebook and others predict what you will…
Recommender SystemsApplications