Information flow (information theory)
About: Information flow (information theory) is a research topic. Over the lifetime, 4788 publications have been published within this topic receiving 83074 citations.
Papers published on a yearly basis
TL;DR: In this paper, the authors used data from a voluntary association to construct a new formal model for a traditional anthropological problem, fission in small groups, where the process leading to fission is viewed as an unequal flow of sentiments and information across the ties in a social network.
Abstract: Data from a voluntary association are used to construct a new formal model for a traditional anthropological problem, fission in small groups. The process leading to fission is viewed as an unequal flow of sentiments and information across the ties in a social network. This flow is unequal because it is uniquely constrained by the contextual range and sensitivity of each relationship in the network. The subsequent differential sharing of sentiments leads to the formation of subgroups with more internal stability than the group as a whole, and results in fission. The Ford-Fulkerson labeling algorithm allows an accurate prediction of membership in the subgroups and of the locus of the fission to be made from measurements of the potential for information flow across each edge in the network. Methods for measurement of potential information flow are discussed, and it is shown that all appropriate techniques will generate the same predictions.
TL;DR: A model of trust and its interaction with information flow, influence, and control is presented and an experiment based on the model indicates that shared trust or lack of trust apparently are a significant determinant of managerial problem-solving efectiveness.
Abstract: This paper presents a model of trust and its interaction with information flow, influence, and control, and reports on an experiment based on the model to test several hypotheses about problem-solving effectiveness. The subjects were managers and the independent variable was the individual manager's initial level of trust. Groups of business executives were given identical factual information about a difficult manufacturing-marketing policy problem; half the groups were briefed to expect trusting behavior, the other half to expect untrusting behavior. There were highly significant differences in effectiveness between the high-trust groups and the low-trust groups in the clarification of goals, the reality of information exchanged, the scope of search for solutions, and the commitment of managers to implement solutions. The findings indicate that shared trust or lack of trust apparently are a significant determinant of managerial problem-solving efectiveness.1
TL;DR: The model provides a unifying view of all systems that restrict information flow, enables a classification of them according to security objectives, and suggests some new approaches to formulating the requirements of secure information flow among security classes.
Abstract: This paper investigates mechanisms that guarantee secure information flow in a computer system. These mechanisms are examined within a mathematical framework suitable for formulating the requirements of secure information flow among security classes. The central component of the model is a lattice structure derived from the security classes and justified by the semantics of information flow. The lattice properties permit concise formulations of the security requirements of different existing systems and facilitate the construction of mechanisms that enforce security. The model provides a unifying view of all systems that restrict information flow, enables a classification of them according to security objectives, and suggests some new approaches. It also leads to the construction of automatic program certification mechanisms for verifying the secure flow of information through a program.
TL;DR: Techniques are shown which acknowledge circuits in the design of systems, showing where estimates are to be used, how design iterations and reviews are handled, and how information flows during the design work, to develop an effective engineering plan.
Abstract: Systems design involves the determination of interdependent variables. Thus the precedence ordering for the tasks of determining these variables involves circuits. Circuits require planning decisions about how to iterate and where to use estimates. Conventional planning techniques, such as critical path, do not deal with these problems. Techniques are shown which acknowledge these circuits in the design of systems. These techniques can be used to develop an effective engineering plan, showing where estimates are to be used, how design iterations and reviews are handled, and how information flows during the design work. This information flow can be used to determine the consequences of a change in any variable on the rest of the variables in the system, and thus which engineers must be informed and which documents must be changed. From this, a critical path schedule can be developed for implementing the change. This method is ideally suited to an automated design office where data, computer input and output, and communications are all handled through the use of computer terminals and data bases. However, these same techniques can also be effectively used in classical engineering environments.
TL;DR: It is demonstrated how exchange of minimal amounts of information between vehicles can be designed to realize a dynamical system which supplies each vehicle with a shared reference trajectory.
Trending Questions (10)