Zum Hauptinhalt springen

Showing 1–34 of 34 results for author: Teixeira, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.03225  [pdf, other

    cs.CV

    Interactive Image Selection and Training for Brain Tumor Segmentation Network

    Authors: Matheus A. Cerqueira, Flávia Sprenger, Bernardo C. A. Teixeira, Alexandre X. Falcão

    Abstract: Medical image segmentation is a relevant problem, with deep learning being an exponent. However, the necessity of a high volume of fully annotated images for training massive models can be a problem, especially for applications whose images present a great diversity, such as brain tumors, which can occur in different sizes and shapes. In contrast, a recent methodology, Feature Learning from Image… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

    Comments: 5 pages, 4 figures, and 3 tables

    MSC Class: 68T07; 68T45

  2. Building Brain Tumor Segmentation Networks with User-Assisted Filter Estimation and Selection

    Authors: Matheus A. Cerqueira, Flávia Sprenger, Bernardo C. A. Teixeira, Alexandre X. Falcão

    Abstract: Brain tumor image segmentation is a challenging research topic in which deep-learning models have presented the best results. However, the traditional way of training those models from many pre-annotated images leaves several unanswered questions. Hence methodologies, such as Feature Learning from Image Markers (FLIM), have involved an expert in the learning loop to reduce human effort in data ann… ▽ More

    Submitted 19 March, 2024; originally announced March 2024.

    Comments: 10 pages, 5 figures, 2 tables, 24 references, manuscript of conference paper

    MSC Class: 68T07; 68T45

  3. arXiv:2401.12633  [pdf, other

    cs.SI cs.CR

    Heterogeneity- and homophily-induced vulnerability of a P2P network formation model: the IOTA auto-peering protocol

    Authors: Yu Gao, Carlo Campajola, Nicolo Vallarano, Andreia Sofia Teixeira, Claudio J. Tessone

    Abstract: IOTA is a distributed ledger technology that relies on a peer-to-peer (P2P) network for communications. Recently an auto-peering algorithm was proposed to build connections among IOTA peers according to their "Mana" endowment, which is an IOTA internal reputation system. This paper's goal is to detect potential vulnerabilities and evaluate the resilience of the P2P network generated using IOTA aut… ▽ More

    Submitted 23 January, 2024; originally announced January 2024.

  4. arXiv:2303.16774  [pdf, other

    physics.soc-ph cs.SI

    Polarization and multiscale structural balance in signed networks

    Authors: Szymon Talaga, Massimo Stella, Trevor James Swanson, Andreia Sofia Teixeira

    Abstract: Polarization, understood as a division into mutually hostile groups, is a common feature of social systems. It is studied in Structural Balance Theory (SBT) in terms of semicycles in signed networks. However, enumerating semicycles is computationally expensive, so approximations are often needed. Here we introduce Multiscale Semiwalk Balance (MSB) approach for measuring degree of balance (DoB) in… ▽ More

    Submitted 24 October, 2023; v1 submitted 29 March, 2023; originally announced March 2023.

    Comments: 35 pages; 10 figures

    Journal ref: Commun Phys 6, 349 (2023)

  5. arXiv:2212.12439  [pdf, ps, other

    cs.CR cs.DC

    Permissionless Refereed Tournaments

    Authors: Diego Nehab, Augusto Teixeira

    Abstract: Scalability problems in programmable blockchains have created a strong demand for secure methods that move the bulk of computation outside the blockchain. One of the preferred solutions to this problem involves off-chain computers that compete interactively to prove to the limited blockchain that theirs is the correct result of a given intensive computation. Each off-chain computer spends effort l… ▽ More

    Submitted 23 December, 2022; originally announced December 2022.

  6. arXiv:2208.01087  [pdf, other

    physics.soc-ph cs.SI

    Embedding-aided network dismantling

    Authors: Saeed Osat, Fragkiskos Papadopoulos, Andreia Sofia Teixeira, Filippo Radicchi

    Abstract: Optimal percolation concerns the identification of the minimum-cost strategy for the destruction of any extensive connected components in a network. Solutions of such a dismantling problem are important for the design of optimal strategies of disease containment based either on immunization or social distancing. Depending on the specific variant of the problem considered, network dismantling is pe… ▽ More

    Submitted 1 August, 2022; originally announced August 2022.

    Comments: 13 pages, 5 figures, 1 table + SM available at https://cgi.luddy.indiana.edu/~filiradi/Mypapers/SM_geo_percolation.pdf

  7. Federated Learning Enables Big Data for Rare Cancer Boundary Detection

    Authors: Sarthak Pati, Ujjwal Baid, Brandon Edwards, Micah Sheller, Shih-Han Wang, G Anthony Reina, Patrick Foley, Alexey Gruzdev, Deepthi Karkada, Christos Davatzikos, Chiharu Sako, Satyam Ghodasara, Michel Bilello, Suyash Mohan, Philipp Vollmuth, Gianluca Brugnara, Chandrakanth J Preetha, Felix Sahm, Klaus Maier-Hein, Maximilian Zenk, Martin Bendszus, Wolfgang Wick, Evan Calabrese, Jeffrey Rudie, Javier Villanueva-Meyer , et al. (254 additional authors not shown)

    Abstract: Although machine learning (ML) has shown promise in numerous domains, there are concerns about generalizability to out-of-sample data. This is currently addressed by centrally sharing ample, and importantly diverse, data from multiple sites. However, such centralization is challenging to scale (or even not feasible) due to various limitations. Federated ML (FL) provides an alternative to train acc… ▽ More

    Submitted 25 April, 2022; v1 submitted 22 April, 2022; originally announced April 2022.

    Comments: federated learning, deep learning, convolutional neural network, segmentation, brain tumor, glioma, glioblastoma, FeTS, BraTS

  8. Design of multiplicative watermarking against covert attacks

    Authors: Alexander J. Gallo, Sribalaji C. Anand, André M. H. Teixeira, Riccardo M. G. Ferrari

    Abstract: This paper addresses the design of an active cyberattack detection architecture based on multiplicative watermarking, allowing for detection of covert attacks. We propose an optimal design problem, relying on the so-called output-to-output l2-gain, which characterizes the maximum gain between the residual output of a detection scheme and some performance output. Although optimal, this control prob… ▽ More

    Submitted 1 October, 2021; originally announced October 2021.

    Comments: 6 page conference paper accepted to the 60th IEEE Conference on Decision and Control

    Journal ref: 2021 60th IEEE Conference on Decision and Control (CDC), profs. of

  9. arXiv:2106.09329  [pdf, other

    cs.SE cs.SI

    Network Science, Homophily and Who Reviews Who in the Linux Kernel?

    Authors: José Apolinário Teixeira, Ville Leppänen, Sami Hyrynsalmi

    Abstract: In this research, we investigate peer review in the development of Linux by drawing on network theory and network analysis. We frame an analytical model which integrates the sociological principle of homophily (i.e., the relational tendency of individuals to establish relationships with similar others) with prior research on peer-review in general and open-source software in particular. We found a… ▽ More

    Submitted 17 June, 2021; originally announced June 2021.

    Comments: As presented at 2020 European Conference on Information Systems (ECIS 2020)

    ACM Class: D.2.0

  10. arXiv:2102.13597  [pdf, other

    physics.soc-ph cs.GT

    Evolution of collective fairness in complex networks through degree-based role assignment

    Authors: Andreia Sofia Teixeira, Francisco C. Santos, Alexandre P. Francisco, Fernando P. Santos

    Abstract: From social contracts to climate agreements, individuals engage in groups that must collectively reach decisions with varying levels of equality and fairness. These dilemmas also pervade Distributed Artificial Intelligence, in domains such as automated negotiation, conflict resolution or resource allocation. As evidenced by the well-known Ultimatum Game -- where a Proposer has to divide a resource… ▽ More

    Submitted 26 February, 2021; originally announced February 2021.

  11. arXiv:2102.06943  [pdf, other

    cs.AI

    Goods Transportation Problem Solving via Routing Algorithm

    Authors: Mikhail Shchukin, Aymen Ben Said, Andre Lobo Teixeira

    Abstract: This paper outlines the ideas behind developing a graph-based heuristic-driven routing algorithm designed for a particular instance of a goods transportation problem with a single good type. The proposed algorithm solves the optimization problem of satisfying the demand of goods on a given undirected transportation graph with minimizing the estimated cost for each traversed segment of the delivery… ▽ More

    Submitted 13 February, 2021; originally announced February 2021.

  12. arXiv:2007.12053  [pdf, other

    cs.SI cs.CL

    Revealing semantic and emotional structure of suicide notes with cognitive network science

    Authors: Andreia Sofia Teixeira, Szymon Talaga, Trevor James Swanson, Massimo Stella

    Abstract: Understanding the cognitive and emotional perceptions of people who commit suicide is one of the most sensitive scientific challenges. There are circumstances where people feel the need to leave something written, an artifact where they express themselves, registering their last words and feelings. These suicide notes are of utmost importance for better understanding the psychology of suicidal ide… ▽ More

    Submitted 13 May, 2021; v1 submitted 23 July, 2020; originally announced July 2020.

    Comments: Significantly revised version (in particular balance analysis); 22 pages (with SI); 5 figures; 2 tables

  13. arXiv:1912.03213  [pdf

    cs.NI cs.PF eess.SY

    Analysis of AeroMACS Data Link for Unmanned Aircraft Vehicles

    Authors: Maede Zolanvari, Marcio A. Teixeira, Raj Jain

    Abstract: Aeronautical Mobile Airport Communications System (AeroMACS) is based on the IEEE 802.16e mobile wireless standard commonly known as WiMAX. It is expected to be the main part of the next-generation aviation communication system to support fixed and mobile services for manned and unmanned applications. AeroMACS will be an essential technology helping pave the way toward full integration of Unmanned… ▽ More

    Submitted 6 December, 2019; originally announced December 2019.

  14. arXiv:1912.02651  [pdf

    cs.CR cs.DB cs.LG eess.SY

    Effect of Imbalanced Datasets on Security of Industrial IoT Using Machine Learning

    Authors: Maede Zolanvari, Marcio A. Teixeira, Raj Jain

    Abstract: Machine learning algorithms have been shown to be suitable for securing platforms for IT systems. However, due to the fundamental differences between the industrial internet of things (IIoT) and regular IT networks, a special performance review needs to be considered. The vulnerabilities and security requirements of IIoT systems demand different considerations. In this paper, we study the reasons… ▽ More

    Submitted 2 December, 2019; originally announced December 2019.

    Comments: arXiv admin note: substantial text overlap with arXiv:1911.05771

  15. arXiv:1911.05771  [pdf

    cs.CR cs.LG cs.NI

    Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things

    Authors: Maede Zolanvari, Marcio A. Teixeira, Lav Gupta, Khaled M. Khan, Raj Jain

    Abstract: It is critical to secure the Industrial Internet of Things (IIoT) devices because of potentially devastating consequences in case of an attack. Machine learning and big data analytics are the two powerful leverages for analyzing and securing the Internet of Things (IoT) technology. By extension, these techniques can help improve the security of the IIoT systems as well. In this paper, we first pre… ▽ More

    Submitted 13 November, 2019; originally announced November 2019.

    Journal ref: in IEEE Internet of Things Journal, vol. 6, no. 4, pp. 6822-6834, Aug. 2019

  16. arXiv:1907.05527  [pdf, other

    cs.CR

    A Federated Lightweight Authentication Protocol for the Internet of Things

    Authors: Maria L. B. A. Santos, Jessica C. Carneiro, Antonio M. R. Franco, Fernando A. Teixeira, Marco A. Henriques, Leonardo B. Oliveira

    Abstract: Considering the world's IoT development and market, it is necessary to guarantee the security of the developed IoT applications as well as the privacy of their end users. In this sense, Federated Identity Management (FIdM) systems can be of great help as they improve user authentication and privacy. In this paper, we claim that traditional FIdM are mostly cumbersome and then ill-suited for IoT. As… ▽ More

    Submitted 11 July, 2019; originally announced July 2019.

  17. SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach

    Authors: Marcio Andrey Teixeira, Tara Salman, Maede Zolanvari, Raj Jain, Nader Meskin, Mohammed Samaka

    Abstract: This paper presents the development of a Supervisory Control and Data Acquisition (SCADA) system testbed used for cybersecurity research. The testbed consists of a water storage tank's control system, which is a stage in the process of water treatment and distribution. Sophisticated cyber-attacks were conducted against the testbed. During the attacks, the network traffic was captured, and features… ▽ More

    Submitted 10 February, 2019; originally announced April 2019.

    Comments: E-Preprint

    Journal ref: Future Internet 2018, 10(8), 76

  18. Um Sistema de Aquisição e Análise de Dados para Extração de Conhecimento da Plataforma Ebit

    Authors: Marcelo Augusto Muniz Teixeira, Fábio Manoel França Lobato, Beatriz Nery Rodrigues Chagas, Antonio Fernando Lavareda Jacob Junior

    Abstract: The internet development and the consequent change in communication forms have strengthened as online social networks, increasing the involvement of people with this media and making consumers of products and services, which are more informed and demanding for companies. This context has given rise to Social CRM, which can be put into practice by means of electronic word of mouth platforms, enable… ▽ More

    Submitted 27 November, 2018; originally announced November 2018.

    Comments: in Portuguese, Paper presented at the 15th International Conference On Information Systems & Technology Management

  19. arXiv:1808.06663  [pdf, other

    cs.SE

    How do Software Ecosystems Co-Evolve? A view from OpenStack and beyond

    Authors: José Apolinário Teixeira, Sami Hyrynsalmi

    Abstract: Much research that analyzes the evolution of a software ecosystem is confined to its own boundaries. Evidence shows, however, that software ecosystems co-evolve independently with other software ecosystems. In other words, understanding the evolution of a software ecosystem requires an especially astute awareness of its competitive landscape and much consideration for other software ecosystems in… ▽ More

    Submitted 20 August, 2018; originally announced August 2018.

    Comments: As presented at the 8th International Conference on Software Business (ICSOB 2017), held in Essen, Germany, June, 12-13, 2017. (Best conference paper award) The official conference proceedings are available at www.springerlink.com

  20. arXiv:1803.09060  [pdf, ps, other

    cs.NI

    Terahertz Technologies to Deliver Optical Network Quality of Experience in Wireless Systems Beyond 5G

    Authors: Alexandros-Apostolos A. Boulogeorgos, Angeliki Alexiou, Thomas Merkle, Colja Schubert, Robert Elschner, Alexandros Katsiotis, Panagiotis Stavrianos, Dimitrios Kritharidis, Panteleimon-Konstantinos Chartsias, Joonas Kokkoniemi, Markku Juntti, Janne Lehtomaki, Antonio Teixeira, Francisco Rodrigues

    Abstract: This article discusses the basic system architecture for terahertz (THz) wireless links with bandwidths of more than 50 GHz into optical networks. New design principles and breakthrough technologies are required in order to demonstrate Tbps data-rates at near zero-latency using the proposed system concept. Specifically, we present the concept of designing the baseband signal processing for both th… ▽ More

    Submitted 24 March, 2018; originally announced March 2018.

    Comments: 24 pages, 6 figures, To appear in IEEE Communications Magazine

  21. Linking and Cutting Spanning Trees

    Authors: Luís M. S. Russo, Andreia Sofia Teixeira, Alexandre P Francisco

    Abstract: We consider the problem of uniformly generating a spanning tree, of a connected undirected graph. This process is useful to compute statistics, namely for phylogenetic trees. We describe a Markov chain for producing these trees. For cycle graphs we prove that this approach significantly outperforms existing algorithms. For general graphs we obtain no analytical bounds, but experimental results sho… ▽ More

    Submitted 7 July, 2020; v1 submitted 21 January, 2018; originally announced January 2018.

    Comments: This research has received funding from the European Union's Horizon 2020 research and innovation programme under the Marie Sklodowska-Curie Actions H2020-MSCA-RISE-2015 BIRDS GA No. 690941. Prototype implementation at https://github.com/LuisRusso-INESC-ID/LinkCutSpanningTrees

    Journal ref: Algorithms 2018, 11(4), 53

  22. arXiv:1708.08355  [pdf, other

    cs.CR

    Data Attacks on Power System State Estimation: Limited Adversarial Knowledge vs. Limited Attack Resources

    Authors: Kaikai Pan, André Teixeira, Milos Cvetkovic, Peter Palensky

    Abstract: A class of data integrity attack, known as false data injection (FDI) attack, has been studied with a considerable amount of work. It has shown that with perfect knowledge of the system model and the capability to manipulate a certain number of measurements, the FDI attacks can coordinate measurements corruption to keep stealth against the bad data detection. However, a more realistic attack is es… ▽ More

    Submitted 28 August, 2017; originally announced August 2017.

    Comments: Accepted in the 43rd Annual Conference of the IEEE Industrial Electronics Society (IECON 2017)

  23. arXiv:1708.08349  [pdf, other

    cs.CR

    Cyber Risk Analysis of Combined Data Attacks Against Power System State Estimation

    Authors: Kaikai Pan, André Teixeira, Milos Cvetkovic, Peter Palensky

    Abstract: Understanding smart grid cyber attacks is key for developing appropriate protection and recovery measures. Advanced attacks pursue maximized impact at minimized costs and detectability. This paper conducts risk analysis of combined data integrity and availability attacks against the power system state estimation. We compare the combined attacks with pure integrity attacks - false data injection (F… ▽ More

    Submitted 28 August, 2017; originally announced August 2017.

    Comments: Submitted to IEEE Transactions on Smart Grid on August 14th, 2017

  24. arXiv:1708.08322  [pdf, other

    cs.CR

    Co-simulation for Cyber Security Analysis: Data Attacks against Energy Management System

    Authors: Kaikai Pan, André Teixeira, Claudio López, Peter Palensky

    Abstract: It is challenging to assess the vulnerability of a cyber-physical power system to data attacks from an integral perspective. In order to support vulnerability assessment except analytic analysis, suitable platform for security tests needs to be developed. In this paper we analyze the cyber security of energy management system (EMS) against data attacks. First we extend our analytic framework that… ▽ More

    Submitted 28 August, 2017; originally announced August 2017.

    Comments: Accepted in 8th IEEE International Conference on Smart Grid Communications (SmartGridComm 2017)

  25. arXiv:1707.02140  [pdf, ps, other

    cs.CR

    Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications

    Authors: Sabarathinam Chockalingam, Dina Hadziosmanovic, Wolter Pieters, Andre Teixeira, Pieter van Gelder

    Abstract: Over the last years, we have seen several security incidents that compromised system safety, of which some caused physical harm to people. Meanwhile, various risk assessment methods have been developed that integrate safety and security, and these could help to address the corresponding threats by implementing suitable risk treatment plans. However, an overarching overview of these methods, system… ▽ More

    Submitted 7 July, 2017; originally announced July 2017.

  26. arXiv:1706.02780  [pdf, other

    cs.AI cs.LG

    Setting Players' Behaviors in World of Warcraft through Semi-Supervised Learning

    Authors: Marcelo Souza Nery, Roque Anderson Teixeira, Victor do Nascimento Silva, Adriano Alonso Veloso

    Abstract: Digital games are one of the major and most important fields on the entertainment domain, which also involves cinema and music. Numerous attempts have been done to improve the quality of the games including more realistic artistic production and computer science. Assessing the player's behavior, a task known as player modeling, is currently the need of the hour which leads to possible improvements… ▽ More

    Submitted 8 June, 2017; originally announced June 2017.

  27. arXiv:1402.4031  [pdf, other

    cs.GT eess.SY math.OC

    Estimation with Strategic Sensors

    Authors: Farhad Farokhi, Andre M. H. Teixeira, Cedric Langbort

    Abstract: We introduce a model of estimation in the presence of strategic, self-interested sensors. We employ a game-theoretic setup to model the interaction between the sensors and the receiver. The cost function of the receiver is equal to the estimation error variance while the cost function of the sensor contains an extra term which is determined by its private information. We start by the single sensor… ▽ More

    Submitted 24 June, 2015; v1 submitted 17 February, 2014; originally announced February 2014.

    Comments: Results are generalized, illustrative examples are added, and the literature review is improved

  28. arXiv:1304.8046  [pdf, ps, other

    cs.IT cs.CC

    Sophistication vs Logical Depth

    Authors: Luís Antunes, Bruno Bauwens, Andre Souto, Andreia Teixeira

    Abstract: Sophistication and logical depth are two measures that express how complicated the structure in a string is. Sophistication is defined as the minimal complexity of a computable function that defines a two-part description for the string that is shortest within some precision; the second can be defined as the minimal computation time of a program that is shortest within some precision. We show that… ▽ More

    Submitted 27 January, 2017; v1 submitted 30 April, 2013; originally announced April 2013.

    Comments: 9 pages

    MSC Class: 94A17 ACM Class: H.1.1

  29. arXiv:1303.1724  [pdf

    cs.CE physics.chem-ph q-bio.BM

    Automated Identification and Classification of Stereochemistry: Chirality and Double Bond Stereoisomerism

    Authors: Ana L. Teixeira, João P. Leal, Andre O Falcao

    Abstract: Stereoisomers have the same molecular formula and the same atom connectivity and their existence can be related to the presence of different three-dimensional arrangements. Stereoisomerism is of great importance in many different fields since the molecular properties and biological effects of the stereoisomers are often significantly different. Most drugs for example, are often composed of a singl… ▽ More

    Submitted 7 March, 2013; originally announced March 2013.

  30. arXiv:1302.0710  [pdf

    cs.CE

    ThermInfo: Collecting, Retrieving, and Estimating Reliable Thermochemical Data

    Authors: Ana L. Teixeira, Rui C. Santos, Joao P. Leal, Jose A. Martinho Simoes, Andre O. Falcao

    Abstract: Standard enthalpies of formation are used for assessing the efficiency and safety of chemical processes in the chemical industry. However, the number of compounds for which the enthalpies of formation are available is many orders of magnitude smaller than the number of known compounds. Thermochemical data prediction methods are therefore clearly needed. Several commercial and free chemical databas… ▽ More

    Submitted 4 February, 2013; originally announced February 2013.

  31. arXiv:1301.4451  [pdf, ps, other

    cs.CC

    On the logical depth function

    Authors: L. Antunes, A. Souto, A. Teixeira, P. M. B. Vitanyi

    Abstract: For a finite binary string $x$ its logical depth $d$ for significance $b$ is the shortest running time of a program for $x$ of length $K(x)+b$. There is another definition of logical depth. We give a new proof that the two versions are close. There is an infinite sequence of strings of consecutive lengths such that for every string there is a $b$ such that incrementing $b$ by 1 makes the associate… ▽ More

    Submitted 5 July, 2013; v1 submitted 18 January, 2013; originally announced January 2013.

    Comments: 11 pages LaTeX; previous version was incorrect, this is a new version with almost the same results

  32. arXiv:1011.1828  [pdf, other

    math.OC cs.NI physics.soc-ph

    A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator

    Authors: André Teixeira, György Dán, Henrik Sandberg, Karl H. Johansson

    Abstract: The electrical power network is a critical infrastructure in today's society, so its safe and reliable operation is of major concern. State estimators are commonly used in power networks, for example, to detect faulty equipment and to optimally route power flows. The estimators are often located in control centers, to which large numbers of measurements are sent over unencrypted communication chan… ▽ More

    Submitted 8 November, 2010; originally announced November 2010.

    Comments: Modified version submitted to the 18th IFAC World Congress, 2011. The paper has 11 pages and 4 figures

  33. arXiv:0901.2906  [pdf, ps, other

    cs.CC

    Measuring communication complexity using instance complexity with oracles

    Authors: Armando Matos, Andreia Teixeira, Andre Souto

    Abstract: We establish a connection between non-deterministic communication complexity and instance complexity, a measure of information based on algorithmic entropy. Let $\overline{x}$, $\overline{y}$ and $Y_1(\overline{x})$ be respectively the input known by Alice, the input known by Bob, and the set of all values of $y$ such that $f(\overline{x},y)=1$; a string is a witness of the non-deterministic com… ▽ More

    Submitted 19 January, 2009; originally announced January 2009.

  34. arXiv:0901.2903  [pdf, ps, other

    cs.IT cs.CC

    Entropy Measures vs. Algorithmic Information

    Authors: Andreia Teixeira, Andre Souto, Armando Matos, Luis Antunes

    Abstract: Algorithmic entropy and Shannon entropy are two conceptually different information measures, as the former is based on size of programs and the later in probability distributions. However, it is known that, for any recursive probability distribution, the expected value of algorithmic entropy equals its Shannon entropy, up to a constant that depends only on the distribution. We study if a similar r… ▽ More

    Submitted 2 June, 2010; v1 submitted 19 January, 2009; originally announced January 2009.