default search action
Toby Berger
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [c33]Mustafa Sungkar, Toby Berger:
Discrete Reconstruction Alphabets in Discrete Memoryless Source Rate-Distortion Problems. ISIT 2018: 116-120 - 2017
- [c32]Mustafa Sungkar, Toby Berger, William B. Levy:
Capacity achieving input distribution to the generalized inverse Gaussian neuron model. Allerton 2017: 860-869 - 2016
- [j81]William B. Levy, Toby Berger, Mustafa Sungkar:
Neural Computation From First Principles: Using the Maximum Entropy Method to Obtain an Optimal Bits-Per-Joule Neuron. IEEE Trans. Mol. Biol. Multi Scale Commun. 2(2): 154-165 (2016) - [j80]Mustafa Sungkar, Toby Berger, William B. Levy:
Mutual Information and Parameter Estimation in the Generalized Inverse Gaussian Diffusion Model of Cortical Neurons. IEEE Trans. Mol. Biol. Multi Scale Commun. 2(2): 166-182 (2016) - [c31]Toby Berger, Mustafa Sungkar:
Barndorff-Nielsen diffusions model neurons in primary sensory cortex. ITA 2016: 1-4 - 2015
- [j79]Jie Xing, Toby Berger, Mustafa Sungkar, William B. Levy:
Energy Efficient Neurons With Generalized Inverse Gaussian Conditional and Marginal Hitting Times. IEEE Trans. Inf. Theory 61(8): 4390-4398 (2015) - [c30]Toby Berger, Mustafa Sungkar:
Design of efficient channels with given input statistics. ISIT 2015: 1961-1965 - 2013
- [j78]Douglas S. Chan, Toby Berger, Lang Tong:
Carrier Sense Multiple Access Communications on Multipacket Reception Channels: Theory and Applications to IEEE 802.11 Wireless Networks. IEEE Trans. Commun. 61(1): 266-278 (2013) - [c29]Jie Xing, Toby Berger:
Energy efficient neurons with generalized inverse Gaussian conditional and marginal hitting times. ISIT 2013: 1824-1828 - [i4]Max A. Alekseyev, Toby Berger:
Solving the Tower of Hanoi with Random Moves. CoRR abs/1304.3780 (2013) - 2012
- [c28]Douglas S. Chan, Toby Berger:
Upper bound for the capacity of multiple access protocols on multipacket reception channels. ISIT 2012: 1603-1607 - [c27]Jie Xing, Toby Berger, Terrence J. Sejnowski:
A Berger-Levy energy efficient neuron model with unequal synaptic weights. ISIT 2012: 2964-2968 - [c26]William B. Levy, Toby Berger:
Design principles and specifications for neural-like computation under constraints on information preservation and energy costs as analyzed with statistical theory. ISIT 2012: 2969-2972 - [c25]Chenguang Xu, John Peng, Stephen G. Wilson, Toby Berger:
Achievable information rates for nonlinear satellite channels in unidirectional and bidirectional relaying. LATINCOM 2012: 1-6 - 2011
- [c24]Toby Berger, William B. Levy, Jie Xing:
Energy efficient neurons with generalized inverse Gaussian interspike interval durations. Allerton 2011: 1737-1742 - 2010
- [j77]Prapun Suksompong, Toby Berger:
Capacity analysis for integrate-and-fire neurons with descending action potential thresholds. IEEE Trans. Inf. Theory 56(2): 838-851 (2010) - [j76]Toby Berger, William B. Levy:
A mathematical theory of energy efficient neural computation and communication. IEEE Trans. Inf. Theory 56(2): 852-874 (2010)
2000 – 2009
- 2009
- [j75]Jay Cheng, Toby Berger:
On minimal eigenvalues of a class of tridiagonal matrices. IEEE Trans. Inf. Theory 55(11): 5024-5031 (2009) - [c23]Toby Berger, William B. Levy:
Information transfer by energy-efficient neurons. ISIT 2009: 1584-1588 - 2008
- [j74]Jun Chen, Toby Berger:
Successive Wyner-Ziv Coding Scheme and Its Application to the Quadratic Gaussian CEO Problem. IEEE Trans. Inf. Theory 54(4): 1586-1603 (2008) - [j73]Jun Chen, Toby Berger:
Robust Distributed Source Coding. IEEE Trans. Inf. Theory 54(8): 3385-3398 (2008) - [j72]Xiaofei Wang, Toby Berger:
Spatial channel reuse in wireless sensor networks. Wirel. Networks 14(2): 133-146 (2008) - [c22]Toby Berger:
Multiterminal rate-distortion theory revisited. Allerton 2008: 1535-1537 - 2007
- [j71]Xin Zhang, Jun Chen, Stephen B. Wicker, Toby Berger:
Successive Coding in Multiuser Information Theory. IEEE Trans. Inf. Theory 53(6): 2246-2254 (2007) - 2006
- [j70]Ying-On Yan, Toby Berger:
Zero-error instantaneous coding of correlated sources with length constraints is NP-complete. IEEE Trans. Inf. Theory 52(4): 1705-1708 (2006) - [j69]Luis Alfonso Lastras-Montaño, Toby Berger:
On Successive Refinement of the Binary Symmetric Markov Source. IEEE Trans. Inf. Theory 52(9): 4190-4197 (2006) - [j68]Jun Chen, Chao Tian, Toby Berger, Sheila S. Hemami:
Multiple Description Quantization Via Gram-Schmidt Orthogonalization. IEEE Trans. Inf. Theory 52(12): 5197-5217 (2006) - [c21]Prapun Suksompong, Toby Berger:
Jitter Analysis of Timing Codes for Neurons with Descending Action Potential Thresholds. ISIT 2006: 650-654 - [c20]Kwang Taik Kim, Toby Berger:
The Degree of Suboptimality of Sending a Lossy Version of the Innovations Process in Gauss-Markov Rate-Distortion. ISIT 2006: 808-812 - [i3]Jun Chen, Toby Berger:
Successive Wyner-Ziv Coding Scheme and its Application to the Quadratic Gaussian CEO Problem. CoRR abs/cs/0604077 (2006) - [i2]Jun Chen, Toby Berger:
Robust Distributed Source Coding. CoRR abs/cs/0604091 (2006) - 2005
- [j67]Jun Chen, Toby Berger:
The capacity of finite-State Markov Channels With feedback. IEEE Trans. Inf. Theory 51(3): 780-798 (2005) - [c19]Yegnaswamy Sermadevi, Jun Chen, Sheila S. Hemami, Toby Berger:
When is Bit Allocation for Predictive Video Coding Easy? DCC 2005: 289-298 - [c18]Kwang Taik Kim, Toby Berger:
Sending a lossy version of the innovations process is suboptimal in QG rate-distortion. ISIT 2005: 209-213 - [c17]Jun Chen, Chao Tian, Toby Berger, Sheila S. Hemami:
A new class of universal multiple description lattice quantizers. ISIT 2005: 1803-1807 - [c16]Xiaofei Wang, Jing Deng, Toby Berger:
GB: distributed reachability-tunable broadcast algorithms for wireless sensor networks. MASS 2005: 10 - [c15]Douglas S. Chan, Toby Berger:
Collision detection for carrier sense multiple access in wireless networks. PIMRC 2005: 1495-1499 - [c14]Xiaofei Wang, Toby Berger:
Self-organizing redundancy-cellular architecture for wireless sensor networks. WCNC 2005: 1945-1951 - [i1]Jun Chen, Chao Tian, Toby Berger, Sheila S. Hemami:
Multiple Description Quantization via Gram-Schmidt Orthogonalization. CoRR abs/cs/0504003 (2005) - 2004
- [j66]Jun Chen, Xin Zhang, Toby Berger, Stephen B. Wicker:
An upper bound on the sum-rate distortion function and its corresponding rate allocation schemes for the CEO problem. IEEE J. Sel. Areas Commun. 22(6): 977-987 (2004) - [c13]Jun Chen, Toby Berger:
Robust coding schemes for distributed sensor networks with unreliable sensors. ISIT 2004: 116 - [c12]Xiaofei Wang, Toby Berger:
Topology Control, Resources Allocation and Routing in Wireless Sensor Networks. MASCOTS 2004: 391-399 - [c11]Douglas S. Chan, Toby Berger, Raj Bridgelall:
Energy efficiency of CSMA protocols for wireless packet switched networks. WCNC 2004: 447-452 - 2003
- [j65]Toby Berger, Vladimir I. Levenshtein:
Application of Cover-free Codes and Combinatorial Designs to Two-stage Testing. Discret. Appl. Math. 128(1): 11-26 (2003) - [j64]Bing Xiang, Toby Berger:
Efficient text-independent speaker verification with structural Gaussian mixture models and neural network. IEEE Trans. Speech Audio Process. 11(5): 447-456 (2003) - [c10]Jay Cheng, Toby Berger:
Capacity and performance analysis for hybrid selection/maximal-ratio combining in Nakagami fading with unequal fading parameters and branch powers. ICC 2003: 3031-3035 - [c9]Jay Cheng, Toby Berger:
Performance analysis for MRC and postdetection EGC over generalized gamma fading channels. WCNC 2003: 120-125 - 2002
- [j63]Igor Devetak, Toby Berger:
Quantum rate-distortion theory for memoryless sources. IEEE Trans. Inf. Theory 48(6): 1580-1589 (2002) - [j62]Toby Berger, Vladimir I. Levenshtein:
Asymptotic efficiency of two-stage disjunctive testing. IEEE Trans. Inf. Theory 48(7): 1741-1749 (2002) - [c8]Bing Xiang, Toby Berger:
Structural Gaussian mixture models for efficient text-independent speaker verification. INTERSPEECH 2002: 1317-1320 - 2001
- [j61]Toby Berger, Vladimir I. Levenshtein:
Application of cover-free codes and combinatorial designs to two-stage testing. Electron. Notes Discret. Math. 6: 518-527 (2001) - [j60]Luis A. Lastras, Toby Berger:
All sources are nearly successively refinable. IEEE Trans. Inf. Theory 47(3): 918-926 (2001) - [c7]Bing Xiang, Toby Berger:
Multiple mixture segmental HMM and its applications. ICASSP 2001: 509-512 - 2000
- [j59]Harish Viswanathan, Toby Berger:
Sequential coding of correlated sources. IEEE Trans. Inf. Theory 46(1): 236-246 (2000)
1990 – 1999
- 1999
- [j58]Yi-Jen Chiu, Toby Berger:
A software-only videocodec using pixelwise conditional differential replenishment and perceptual enhancements. IEEE Trans. Circuits Syst. Video Technol. 9(3): 438-450 (1999) - [j57]Ram Zamir, Toby Berger:
Multiterminal Source Coding with High Resolution. IEEE Trans. Inf. Theory 45(1): 106-117 (1999) - [j56]Toby Berger, Ram Zamir:
A semi-continuous version of the Berger-Yeung problem. IEEE Trans. Inf. Theory 45(5): 1520-1526 (1999) - 1998
- [j55]Zhongxing Ye, Toby Berger:
Critical Distortion of Potts Model. IEEE Trans. Inf. Theory 44(2): 896-899 (1998) - [j54]Toby Berger, Jerry D. Gibson:
Lossy Source Coding. IEEE Trans. Inf. Theory 44(6): 2693-2723 (1998) - [c6]Mikio Kawahara, Yi-Jen Chiu, Toby Berger:
High-Speed Software Implementation of Huffman Coding. Data Compression Conference 1998: 553 - 1997
- [j53]J. Chow, Toby Berger:
Failure of successive refinement for symmetric Gaussian mixtures. IEEE Trans. Inf. Theory 43(1): 350-351 (1997) - [j52]En-Hui Yang, Zhen Zhang, Toby Berger:
Fixed-slope universal lossy data compression. IEEE Trans. Inf. Theory 43(5): 1465-1476 (1997) - [j51]Harish Viswanathan, Toby Berger:
The quadratic Gaussian CEO problem. IEEE Trans. Inf. Theory 43(5): 1549-1559 (1997) - 1996
- [j50]Luan Ling Lee, Toby Berger, Erez Aviczer:
Reliable On-Line Human Signature Verification Systems. IEEE Trans. Pattern Anal. Mach. Intell. 18(6): 643-647 (1996) - [j49]Toby Berger, Zhen Zhang, Harish Viswanathan:
The CEO problem [multiterminal source coding]. IEEE Trans. Inf. Theory 42(3): 887-902 (1996) - [c5]Yi-Jen Chiu, Toby Berger:
Video Compression Using Fax Techniques. Data Compression Conference 1996: 429 - 1995
- [j48]Zhen Zhang, Toby Berger:
Multiple description source coding with no excess marginal rate. IEEE Trans. Inf. Theory 41(2): 349-357 (1995) - 1994
- [j47]Zheng Chen, Toby Berger:
Reliability and availability analysis of Manhattan street networks. IEEE Trans. Commun. 42(234): 511-522 (1994) - [c4]Luan L. Lee, Toby Berger:
Reliable on-line human signature verification system for point-of-sales applications. ICPR (2) 1994: 19-23 - 1993
- [j46]Toby Berger, A. Hekstra, Alon Orlitsky:
Asymptotic Component Densities in Programmable Gate Arrays Realizing All Circuits of a Given Size. Algorithmica 9(2): 101-127 (1993) - [c3]Zheng Chen, Toby Berger:
Reliability and Availability Analysis of Manhattan Street Network. MASCOTS 1993: 143-148 - 1992
- [j45]Zhongxing Ye, Toby Berger:
A new method to estimate the critical distortion of random fields. IEEE Trans. Inf. Theory 38(1): 152-157 (1992) - [j44]Toby Berger:
Review of 'Entropy and Information Theory' (Gray, R.M.; 1990). IEEE Trans. Inf. Theory 38(4): 1430- (1992) - 1990
- [j43]Toby Berger, Flavio Bonomi:
Capacity and zero-error capacity of Ising channels. IEEE Trans. Inf. Theory 36(1): 173-180 (1990) - [j42]Toby Berger, Zhongxing Ye:
epsilon-entropy and critical distortion of random fields. IEEE Trans. Inf. Theory 36(4): 717-725 (1990) - [j41]Toby Berger, Zhongxing Ye:
Entropic aspects of random fields on trees. IEEE Trans. Inf. Theory 36(5): 1006-1018 (1990) - [j40]Toby Berger, Raymond W. Yeung:
Optimum '1' ended binary prefix codes. IEEE Trans. Inf. Theory 36(6): 1435-1441 (1990)
1980 – 1989
- 1989
- [j39]Toby Berger, Raymond W. Yeung:
Multiterminal source encoding with one distortion criterion. IEEE Trans. Inf. Theory 35(2): 228-236 (1989) - [j38]Toby Berger, Raymond W. Yeung:
Multiterminal source encoding with encoder breakdown. IEEE Trans. Inf. Theory 35(2): 237-244 (1989) - 1988
- [j37]Toby Berger:
Andrei Nikolaevich Kolmogorov (April 25, 1903-October 20, 1987). IEEE Trans. Inf. Theory 34(2): 173 (1988) - [j36]Zhen Zhang, Toby Berger:
Estimation via compressed information. IEEE Trans. Inf. Theory 34(2): 198-211 (1988) - [j35]Toby Berger:
Preface to special issue on coding techniques and coding theory. IEEE Trans. Inf. Theory 34(5): 1121 (1988) - 1987
- [j34]Jian-Cheng Huang, Toby Berger:
Correction to "Delay Analysis of 0.487 Contention Resolution Algorithms". IEEE Trans. Commun. 35(5): 566 (1987) - [j33]Zhen Zhang, Toby Berger:
New results in binary multiple descriptions. IEEE Trans. Inf. Theory 33(4): 502-521 (1987) - [j32]Zhen Zhang, Toby Berger, James L. Massey:
Some families of zero- error block codes for the two-user binary adder channel with feedback. IEEE Trans. Inf. Theory 33(5): 613-619 (1987) - 1986
- [j31]Jian-Cheng Huang, Toby Berger:
Delay Analysis of 0.487 Contention Resolution Algorithms. IEEE Trans. Commun. 34(9): 916-926 (1986) - [j30]Zhen Zhang, Toby Berger, J. Pieter M. Schalkwijk:
New outer bounds to capacity regions of two-way channels. IEEE Trans. Inf. Theory 32(3): 383-386 (1986) - [c2]Toby Berger:
Information Theory in Random Fields. Coding Theory and Applications 1986: 1-18 - [c1]Toby Berger, Raymond W. Yeung:
Optimum '1'-Ended Binary Prefix Codes. Coding Theory and Applications 1986: 68-75 - 1985
- [j29]Jian-Cheng Huang, Toby Berger:
Delay analysis of interval-searching contention resolution algorithms. IEEE Trans. Inf. Theory 31(2): 264-273 (1985) - [j28]Florin Avram, Toby Berger:
On critical distortion for Markov sources. IEEE Trans. Inf. Theory 31(5): 688-690 (1985) - [j27]Chris Heegard, Toby Berger:
Rate distortion when side information may be absent. IEEE Trans. Inf. Theory 31(6): 727-734 (1985) - 1984
- [j26]Toby Berger, Nader Mehravari, Don Towsley, Jack Keil Wolf:
Random Multiple-Access Communication and Group Testing. IEEE Trans. Commun. 32(7): 769-779 (1984) - [j25]Toby Berger:
Review of Information Theory: Coding Theorems for Discrete Memoryless Systems (Csiszár, I., and Körner, J.; 1981). IEEE Trans. Inf. Theory 30(4): 693-694 (1984) - [j24]Nader Mehravari, Toby Berger:
Poisson multiple-access contention with binary feedback. IEEE Trans. Inf. Theory 30(5): 745-751 (1984) - 1983
- [j23]Toby Berger, Zhen Zhang:
Minimum breakdown degradation in binary source encoding. IEEE Trans. Inf. Theory 29(6): 807-813 (1983) - 1982
- [j22]Toby Berger:
Minimum entropy quantizers and permutation codes. IEEE Trans. Inf. Theory 28(2): 149-156 (1982) - [j21]Amiram H. Kaspi, Toby Berger:
Rate-distortion for correlated sources with partially separated encoders. IEEE Trans. Inf. Theory 28(6): 828-840 (1982)
1970 – 1979
- 1979
- [j20]Toby Berger, Kim B. Housewright, Jim K. Omura, Suiyin Yung, Jacob Wolfowitz:
An upper bound on the rate distortion function for source coding with partial side information at the decoder. IEEE Trans. Inf. Theory 25(6): 664-666 (1979) - 1977
- [j19]Toby Berger:
Explicit bounds to R(D) for a binary symmetric Markov source. IEEE Trans. Inf. Theory 23(1): 52-59 (1977) - [j18]Toby Berger, Joseph Ka-Yin Lau:
On binary sliding block codes. IEEE Trans. Inf. Theory 23(3): 343-353 (1977) - [j17]Ilan Ziskind, Toby Berger:
Coding for noisy channels with input-dependent insertions. IEEE Trans. Inf. Theory 23(5): 598-604 (1977) - 1976
- [j16]Jose Antonio van der Horst, Toby Berger:
Complete decoding of triple-error-correcting binary BCH codes. IEEE Trans. Inf. Theory 22(2): 138-147 (1976) - [j15]Robert J. Dick, Toby Berger:
Capacity and a lower bound to $R_{mbox{co\mp}}$ for a channel with symbol fission. IEEE Trans. Inf. Theory 22(4): 399-410 (1976) - 1975
- [j14]Toby Berger:
Information-singular random processes. IEEE Trans. Inf. Theory 21(5): 502-511 (1975) - 1974
- [j13]Steven I. Krich, Toby Berger:
Coding for a delay-dependent fidelity criterion. IEEE Trans. Inf. Theory 20(1): 77-85 (1974) - [j12]Robert J. Dick, Toby Berger, Frederick Jelinek:
Tree encoding of Gaussian sources. IEEE Trans. Inf. Theory 20(3): 332-336 (1974) - 1973
- [j11]W. E. Toms Jr., Toby Berger:
Capacity and error exponents of a channel modeled as a linear dynamic system (Corresp.). IEEE Trans. Inf. Theory 19(1): 124-126 (1973) - 1972
- [j10]Toby Berger, Frederick Jelinek, Jack K. Wolf:
Permutation codes for sources. IEEE Trans. Inf. Theory 18(1): 160-169 (1972) - [j9]Toby Berger, Weng Yu:
Rate-distortion theory for context-dependent fidelity criteria. IEEE Trans. Inf. Theory 18(3): 378-384 (1972) - [j8]Toby Berger:
Optimum quantizers and permutation codes. IEEE Trans. Inf. Theory 18(6): 759-765 (1972) - 1971
- [j7]Toby Berger:
The source coding game. IEEE Trans. Inf. Theory 17(1): 71-76 (1971) - [j6]W. E. Toms Jr., Toby Berger:
Information rates of stochastically driven dynamic systems (Corresp.). IEEE Trans. Inf. Theory 17(1): 113-114 (1971) - 1970
- [j5]Toby Berger:
Information rates of Wiener processes. IEEE Trans. Inf. Theory 16(2): 134-139 (1970)
1960 – 1969
- 1969
- [j4]Toby Berger:
The effect of channel errors on fidelity relative to a metric (Corresp.). IEEE Trans. Inf. Theory 15(2): 326-328 (1969) - 1968
- [j3]Toby Berger:
Rate Distortion Theory for Sources with Abstract Alphabets and Memory. Inf. Control. 13(3): 254-273 (1968) - 1967
- [j2]Toby Berger, Donald W. Tufts:
Optimum pulse amplitude modulation-I: Transmitter-receiver design and bounds from information theory. IEEE Trans. Inf. Theory 13(2): 196-208 (1967) - [j1]Donald W. Tufts, Toby Berger:
Optimum pulse amplitude modulation-II: Inclusion of timing jitter. IEEE Trans. Inf. Theory 13(2): 209-216 (1967)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-02 19:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint