1966
DOI: 10.1109/tit.1966.1053923
|View full text |Cite
|
Sign up to set email alerts
|

On receiver structures for channels having memory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
51
0

Year Published

1994
1994
2011
2011

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 121 publications
(51 citation statements)
references
References 4 publications
0
51
0
Order By: Relevance
“…8 The definition is rigorously extended to cases with i = −∞ and/or j = ∞, by assuming P X 0 |z j i to be a regular version of the conditional distribution (cf., e.g., [17]) of X0 given Z Lemma 4 and Claim 2 parallel similar results in sequential decision theory [31] (e.g., in the data compression case, the limiting values of the block and conditional entropies coincide, defining the entropy rate). Their proofs are also standard, but are given in Appendix B for completeness.…”
Section: Universal Optimality: the Stochastic Settingmentioning
confidence: 99%
See 3 more Smart Citations
“…8 The definition is rigorously extended to cases with i = −∞ and/or j = ∞, by assuming P X 0 |z j i to be a regular version of the conditional distribution (cf., e.g., [17]) of X0 given Z Lemma 4 and Claim 2 parallel similar results in sequential decision theory [31] (e.g., in the data compression case, the limiting values of the block and conditional entropies coincide, defining the entropy rate). Their proofs are also standard, but are given in Appendix B for completeness.…”
Section: Universal Optimality: the Stochastic Settingmentioning
confidence: 99%
“…The number in square brackets is the value of k employed, which was obtained using the compressibility heuristic described in Section 6-B. For each combination we also show the residual error rate of the optimal Bayesian distribution-dependent scheme tailored for the specific corresponding value of the pair (p, δ), as implemented by the forward-backward recursions [8,1].…”
Section: -A Binary Symmetric Markov Source Corrupted By a Bscmentioning
confidence: 99%
See 2 more Smart Citations
“…The development of an efficient optimization technique [92] 1.0 estimate the model parameters so as 1.0 'match' the observed signal patterns has culminated in the theory of HMM-based signal representation. T!·3 success of this hidden Markov modeling technique has been proven by its application in ecology (e.g., [93]), text analysis (e.g., [94]), coding theory (e.g., [95]) and speech recognition (e.g., [96]). …”
Section: Characterization Of Hidden Markov Modelmentioning
confidence: 99%