Jump to: Search | Browse | Email

Information Theory, Inference, and Learning Algorithms

Browse: most popular entries | oldest entries | most recent entries

- I’ve unsuccessfully tried to replicate the calculations used to produce figure 13.14 using the...
- Should the 1/2 on the RHS of eq (11.40) be replaced by 1/2 Log[2 Pi E]?
- I don't understand eq 1.38 and 1.39 on page 16 (ex 1.3 solution)
- Section 10.4 - part 2 of the channel capacity theorem is not clear. On page 168, the...
- How do you calculate the BER Shannon limit curve (as in "Gallager Codes - Recent Results" fig...
- I am trying to understand the solution to exercise 11.1 I am stuck at the point where "last term...
- I have read the book. I find the formula (11.33) is a little hard to understand. Why you said...
- On the page 214 (Concatenation of Hamming Codes) there is an equation of the probability of...
- What do I need to set up a Turbo coding lab?
- For solution of exercise 10.5, how to get the relation between Lagrange multiplier Lambda and...

Showing 1 to 10 of 14 entries (Next)

Copyright © 2003 David MacKay's Research group, Cavendish Laboratory