Compatibility among diversity Foundations, lessons, and directions of semantic communication
暂无分享,去创建一个
[1] N. Littlestone. Learning Quickly When Irrelevant Attributes Abound: A New Linear-Threshold Algorithm , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[2] Madhu Sudan,et al. Efficient Semantic Communication via Compatible Beliefs , 2011, ICS.
[3] Santosh S. Vempala,et al. Semantic Communication for Simple Goals Is Equivalent to On-line Learning , 2011, ALT.
[4] Julie A. McCann,et al. A survey of autonomic computing—degrees, models, and applications , 2008, CSUR.
[5] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[6] Stephen T. Kent,et al. Security Architecture for the Internet Protocol , 1998, RFC.
[7] Peter Auer,et al. The Nonstochastic Multiarmed Bandit Problem , 2002, SIAM J. Comput..
[8] Claude E. Shannon,et al. Recent Contributions to The Mathematical Theory of Communication , 2009 .
[9] Brendan Juba,et al. Learning implicitly in reasoning in PAC-Semantics , 2012, ArXiv.
[10] F. MacWilliams,et al. Codes which detect deception , 1974 .
[11] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[12] Brendan A. Juba,et al. Universal semantic communication I , 2008, Electron. Colloquium Comput. Complex..
[13] Leslie G. Valiant,et al. Robust logics , 1999, STOC '99.
[14] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[15] Oded Goldreich,et al. A theory of goal-oriented communication , 2012, JACM.