{"results":[{"id":"ss_0ec126f4319e2e18110e3ca8fbddca463a4efc96","title":"Integrated information theory: from consciousness to its physical substrate","authors":[{"name":"G. Tononi"},{"name":"M. Boly"},{"name":"M. Massimini"},{"name":"C. Koch"}],"abstract":"","source":"Semantic Scholar","year":2016,"language":"en","subjects":["Psychology","Medicine"],"doi":"10.1038/nrn.2016.44","url":"https://www.semanticscholar.org/paper/0ec126f4319e2e18110e3ca8fbddca463a4efc96","is_open_access":true,"citations":1364,"published_at":"","score":90},{"id":"ss_512dd3c7e1b55786e6f918bd0411ff744bb4cf62","title":"Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology","authors":[{"name":"V. Venkatesh"},{"name":"J. Thong"},{"name":"Xin Xu"}],"abstract":"","source":"Semantic Scholar","year":2012,"language":"en","subjects":["Psychology","Computer Science"],"doi":"10.2307/41410412","url":"https://www.semanticscholar.org/paper/512dd3c7e1b55786e6f918bd0411ff744bb4cf62","pdf_url":"http://hdl.handle.net/10397/12341","is_open_access":true,"citations":13818,"published_at":"","score":86},{"id":"ss_f88d8e39dfed5db2bf129467aafd1473f0a424b8","title":"Information Theory and Statistics","authors":[{"name":"E. Haroutunian"}],"abstract":"","source":"Semantic Scholar","year":2011,"language":"en","subjects":["Mathematics","Computer Science"],"doi":"10.1007/978-3-642-04898-2_643","url":"https://www.semanticscholar.org/paper/f88d8e39dfed5db2bf129467aafd1473f0a424b8","is_open_access":true,"citations":3528,"published_at":"","score":85},{"id":"ss_6de5e123b473790a3ecaf0b04b60737f95deac0a","title":"Network Information Theory","authors":[{"name":"Leeanne Sagona"}],"abstract":"Course Description: This course covers information theory as it relates to networked communication systems. The course will broadly be broken into three parts: (1) Study of single-hop networks, such as the multiple-access channel, broadcast channel, distributed source coding, (2) Study of multi-hop networks, including noiseless network coding, and the impact of eavesdropping and adversarial attacks, and (3) Research projects by students, who will choose their own topics to present to the rest of the class.","source":"Semantic Scholar","year":2021,"language":"en","subjects":null,"doi":"10.1002/047174882x.ch15","url":"https://www.semanticscholar.org/paper/6de5e123b473790a3ecaf0b04b60737f95deac0a","is_open_access":true,"citations":615,"published_at":"","score":83.45},{"id":"ss_7dbdb4209626fd92d2436a058663206216036e68","title":"Elements of Information Theory","authors":[{"name":"T. Cover"},{"name":"Joy A. Thomas"}],"abstract":"","source":"Semantic Scholar","year":2005,"language":"en","subjects":["Computer Science","Engineering"],"doi":"10.1002/047174882X","url":"https://www.semanticscholar.org/paper/7dbdb4209626fd92d2436a058663206216036e68","is_open_access":true,"citations":48054,"published_at":"","score":80},{"id":"ss_400b45a803d642b752a84147ef547af7811e8f3f","title":"Information Theory and an Extension of the Maximum Likelihood Principle","authors":[{"name":"H. Akaike"}],"abstract":"","source":"Semantic Scholar","year":1973,"language":"en","subjects":["Computer Science"],"doi":"10.1007/978-1-4612-0919-5_38","url":"https://www.semanticscholar.org/paper/400b45a803d642b752a84147ef547af7811e8f3f","is_open_access":true,"citations":23131,"published_at":"","score":80},{"id":"ss_f7f15848cd0fbb3d08f351595da833b1627de9c3","title":"Information Theory, Inference, and Learning Algorithms","authors":[{"name":"D. MacKay"}],"abstract":"","source":"Semantic Scholar","year":2004,"language":"en","subjects":["Computer Science"],"doi":"10.1109/tit.2004.834752","url":"https://www.semanticscholar.org/paper/f7f15848cd0fbb3d08f351595da833b1627de9c3","is_open_access":true,"citations":10884,"published_at":"","score":80},{"id":"ss_08b67692bc037eada8d3d7ce76cc70994e7c8116","title":"Information Theory and Statistical Mechanics","authors":[{"name":"E. Jaynes"}],"abstract":"","source":"Semantic Scholar","year":1957,"language":"en","subjects":["Mathematics"],"doi":"10.1103/PHYSREV.106.620","url":"https://www.semanticscholar.org/paper/08b67692bc037eada8d3d7ce76cc70994e7c8116","is_open_access":true,"citations":12650,"published_at":"","score":80},{"id":"ss_1bfcc0af57b449b99fd144f9663985e51f3d9c84","title":"Information Theory","authors":[{"name":"Rongmei Li"},{"name":"R. Kaptein"},{"name":"D. Hiemstra"},{"name":"Jaap Kamps"}],"abstract":"INFORMATION THEORY rests on the fundamental observation that information and uncertainty are related (Shannon and Weaver, 1949). Intuitively, a code can be used to send information from one agent (the transmitter) to another (the receiver) or a channel just in case the receiver cannot completely anticipate which message the transmitter will send. A “language” that consisted of only one sentence could not be a useful instrument of communication precisely because there could be neither a real choice (on the part of the transmitter) nor any real uncertainty (on the part of the receiver) about which message could be sent. Entropy is a measure of the uncertainty in a communication system. Given that uncertainty and information can be identified, we can say that a measure of the uncertainty in a system is also a measure of its information content. Suppose that a communication system provides n distinct symbols and that pi is the probability that the i th symbol occurs; then the entropy, H, is given by:","source":"Semantic Scholar","year":1987,"language":"en","subjects":["Computer Science","Mathematics"],"doi":"10.1007/978-0-387-35973-1_638","url":"https://www.semanticscholar.org/paper/1bfcc0af57b449b99fd144f9663985e51f3d9c84","pdf_url":"https://doi.org/10.1351/goldbook.i03032","is_open_access":true,"citations":3498,"published_at":"","score":80},{"id":"ss_5387c0769d3d18ace289c5cb3dcf90231d9d425f","title":"Elements of information theory (2. ed.)","authors":[{"name":"T. Cover"},{"name":"Joy A. Thomas"}],"abstract":"","source":"Semantic Scholar","year":2006,"language":"en","subjects":["Computer Science"],"url":"https://www.semanticscholar.org/paper/5387c0769d3d18ace289c5cb3dcf90231d9d425f","is_open_access":true,"citations":3434,"published_at":"","score":80},{"id":"ss_6e163fb03f549ab2bb1dbbf746005553ea15a575","title":"Information Theory and Reliable Communication","authors":[{"name":"D. A. Bell"}],"abstract":"","source":"Semantic Scholar","year":1969,"language":"en","subjects":["Computer Science"],"doi":"10.1049/EP.1969.0319","url":"https://www.semanticscholar.org/paper/6e163fb03f549ab2bb1dbbf746005553ea15a575","is_open_access":true,"citations":3798,"published_at":"","score":80},{"id":"ss_eff026fee8b554a445ac881e5ffa899688e799a6","title":"Information Theory and Reliable Communication","authors":[{"name":"R. Gallager"}],"abstract":"","source":"Semantic Scholar","year":1968,"language":"en","subjects":["Mathematics"],"doi":"10.2307/2344305","url":"https://www.semanticscholar.org/paper/eff026fee8b554a445ac881e5ffa899688e799a6","is_open_access":true,"citations":3507,"published_at":"","score":80},{"id":"ss_710c3abdc49f334c0d127f30b5f330ce75cb073b","title":"Network Information Theory","authors":[{"name":"T. Cover"},{"name":"Joy A. Thomas"}],"abstract":"","source":"Semantic Scholar","year":2001,"language":"en","subjects":["Computer Science"],"doi":"10.1002/0471200611.CH14","url":"https://www.semanticscholar.org/paper/710c3abdc49f334c0d127f30b5f330ce75cb073b","is_open_access":true,"citations":2291,"published_at":"","score":80},{"id":"ss_11fbf06e4c1c4eddc91a68e434433a4fc5f7cfc4","title":"Information Theory and Statistics","authors":[{"name":"C. Craig"},{"name":"S. Kullback"}],"abstract":"","source":"Semantic Scholar","year":1960,"language":"en","subjects":["Computer Science","Mathematics"],"doi":"10.2307/2003916","url":"https://www.semanticscholar.org/paper/11fbf06e4c1c4eddc91a68e434433a4fc5f7cfc4","is_open_access":true,"citations":3973,"published_at":"","score":80},{"id":"ss_277b6accc82872010ebebfc79214ca2913c483b7","title":"Information Theory, Inference, and Learning Algorithms","authors":[{"name":"Yuhong Yang"}],"abstract":"","source":"Semantic Scholar","year":2005,"language":"en","subjects":["Computer Science","Mathematics"],"doi":"10.1198/jasa.2005.s54","url":"https://www.semanticscholar.org/paper/277b6accc82872010ebebfc79214ca2913c483b7","is_open_access":true,"citations":2101,"published_at":"","score":80},{"id":"ss_61fa9a2cbf52888f26561348fd2e87dfaa68f30b","title":"Group testing: an information theory perspective","authors":[{"name":"Matthew Aldridge"},{"name":"O. Johnson"},{"name":"J. Scarlett"}],"abstract":"The group testing problem concerns discovering a small number of defective items within a large population by performing tests on pools of items. A test is positive if the pool contains at least one defective, and negative if it contains no defectives. This is a sparse inference problem with a combinatorial flavour, with applications in medical testing, biology, telecommunications, information technology, data science, and more. In this monograph, we survey recent developments in the group testing problem from an information-theoretic perspective. We cover several related developments: efficient algorithms with practical storage and computation requirements, achievability bounds for optimal decoding methods, and algorithm-independent converse bounds. We assess the theoretical guarantees not only in terms of scaling laws, but also in terms of the constant factors, leading to the notion of the {\\em rate} of group testing, indicating the amount of information learned per test. Considering both noiseless and noisy settings, we identify several regimes where existing algorithms are provably optimal or near-optimal, as well as regimes where there remains greater potential for improvement. In addition, we survey results concerning a number of variations on the standard group testing problem, including partial recovery criteria, adaptive algorithms with a limited number of stages, constrained test designs, and sublinear-time algorithms.","source":"Semantic Scholar","year":2019,"language":"en","subjects":["Computer Science","Mathematics","Psychology"],"doi":"10.1561/0100000099","url":"https://www.semanticscholar.org/paper/61fa9a2cbf52888f26561348fd2e87dfaa68f30b","pdf_url":"http://eprints.whiterose.ac.uk/151615/1/Group_Testing__An_Information_Theory_Perspective__2_%20%281%29.pdf","is_open_access":true,"citations":307,"published_at":"","score":72.21000000000001},{"id":"ss_52eab7a42c5b20865f435c940a7738c4743fc036","title":"The Information Theory of Aging","authors":[{"name":"Yuancheng Ryan Lu"},{"name":"Xiao Tian"},{"name":"David A. Sinclair"}],"abstract":"","source":"Semantic Scholar","year":2023,"language":"en","subjects":["Medicine"],"doi":"10.1038/s43587-023-00527-6","url":"https://www.semanticscholar.org/paper/52eab7a42c5b20865f435c940a7738c4743fc036","is_open_access":true,"citations":72,"published_at":"","score":69.16},{"id":"ss_9b127cf8c7a58a8290fb08f1c1098df1972e0dab","title":"Quantum Differential Privacy: An Information Theory Perspective","authors":[{"name":"Christoph Hirche"},{"name":"C. Rouzé"},{"name":"Daniel Stilck França"}],"abstract":"Differential privacy has been an exceptionally successful concept when it comes to providing provable security guarantees for classical computations. More recently, the concept was generalized to quantum computations. While classical computations are essentially noiseless and differential privacy is often achieved by artificially adding noise, near-term quantum computers are inherently noisy and it was observed that this leads to natural differential privacy as a feature. In this work we discuss quantum differential privacy in an information theoretic framework by casting it as a quantum divergence. A main advantage of this approach is that differential privacy becomes a property solely based on the output states of the computation, without the need to check it for every measurement. This leads to simpler proofs and generalized statements of its properties as well as several new bounds for both, general and specific, noise models. In particular, these include common representations of quantum circuits and quantum machine learning concepts. Here, we focus on the difference in the amount of noise required to achieve certain levels of differential privacy versus the amount that would make any computation useless. Finally, we also generalize the classical concepts of local differential privacy, Rényi differential privacy and the hypothesis testing interpretation to the quantum setting, providing several new properties and insights.","source":"Semantic Scholar","year":2022,"language":"en","subjects":["Computer Science","Physics","Mathematics"],"doi":"10.1109/TIT.2023.3272904","url":"https://www.semanticscholar.org/paper/9b127cf8c7a58a8290fb08f1c1098df1972e0dab","pdf_url":"https://arxiv.org/pdf/2202.10717","is_open_access":true,"citations":104,"published_at":"","score":69.12},{"id":"doaj_10.1016/j.actpsy.2025.105751","title":"Control-value appraisals, achievement emotions and English performance in Chinese middle school students","authors":[{"name":"Meihua Liu"},{"name":"Ning Du"},{"name":"Xinmiao Li"},{"name":"Yihan Wang"}],"abstract":"Guided by the control-value theory of achievement emotions, this study examined the relations between control-value appraisals, achievement emotions and English performance in Chinese middle school students, with a focus on the predictive effects of control-value appraisals and achievement emotions and the mediating effects of achievement emotions. The participants were 347 8th graders from a middle school in north China, who took an English test and answered a battery of questionnaires on control and value appraisals, achievement emotions and background information. The major findings were: 1) perceived control significantly predicted positive emotions and negatively predicted negative emotions; perceived value significantly positively predicted positive emotions, anxiety and shame, yet inversely predicted anger and boredom; 2) neither perceived control nor value significantly predicted English performance; 3) hope and anger significantly positively while anxiety and hopelessness negatively predicted English performance; and 4) mediational modelling revealed no significant mediating effects of the achievement emotions on the relationships between perceived control and value and English performance. These findings highlight the importance of control, value and emotions in second/foreign learning as well as the complexity of the relationships between the variables. Based on these findings, suggestions for second/foreign learning and future research are discussed.","source":"DOAJ","year":2025,"language":"","subjects":["Psychology"],"doi":"10.1016/j.actpsy.2025.105751","url":"http://www.sciencedirect.com/science/article/pii/S0001691825010649","is_open_access":true,"published_at":"","score":69},{"id":"doaj_10.1002/lrh2.10458","title":"Moving from crisis response to a learning health system: Experiences from an Australian regional primary care network","authors":[{"name":"Bianca Forrester"},{"name":"Georgia Fisher"},{"name":"Louise A. Ellis"},{"name":"Andrew Giddy"},{"name":"Carolynn L. Smith"},{"name":"Yvonne Zurynski"},{"name":"Lena Sanci"},{"name":"Katherine Graham"},{"name":"Naomi White"},{"name":"Jeffrey Braithwaite"}],"abstract":"Abstract Introduction The COVID‐19 pandemic challenged primary care to rapidly innovate. In response, the Western Victorian Primary Health Network (WVPHN) developed a COVID‐19 online Community of Practice comprising general practitioners (GPs), practice nurses, pharmacists, aged care and disability workers, health administrators, public health experts, medical specialists, and consumers. This Experience Report describes our progress toward a durable organizational learning health system (LHS) model through the COVID‐19 pandemic crisis and beyond. Methods In March 2020, we commenced weekly Community of Practice sessions, adopting the Project ECHO (Extension of Community Health Outcomes) model for a virtual information‐sharing network that aims to bring clinicians together to develop collective knowledge. Our work was underpinned by the LHS framework proposed by Menear et al. and aligned with Kotter's eight‐step change model. Results There were four key phases in the development of our LHS: build a Community of Practice; facilitate iterative change; develop supportive organizational infrastructure; and establish a sustainable, ongoing LHS. In total, the Community of Practice supported 83 unique COVID‐19 ECHO sessions involving 3192 h of clinician participation and over 10 000 h of organizational commitment. Six larger sessions were run between March 2020 and September 2022 with 3192 attendances. New models of care and care pathways were codeveloped in sessions and network leaders contributed to the development of guidelines and policy advice. These innovations enabled WVPHN to lead the Australian state of Victoria on rates of COVID vaccine uptake and GP antiviral prescribing. Conclusion The COVID‐19 pandemic created a sense of urgency that helped stimulate a regional primary care‐based Community of Practice and LHS. A robust theoretical framework and established change management theory supported the purposeful implementation of our LHS. Reflection on challenges and successes may provide insights to support the implementation of LHS models in other primary care settings.","source":"DOAJ","year":2025,"language":"","subjects":["Medicine (General)","Public aspects of medicine"],"doi":"10.1002/lrh2.10458","url":"https://doi.org/10.1002/lrh2.10458","is_open_access":true,"published_at":"","score":69}],"total":21723319,"page":1,"page_size":20,"sources":["CrossRef","arXiv","DOAJ","Semantic Scholar"],"query":"Information theory"}