2025-10-07 09:35:42
Bridging integrated information theory and the free-energy principle in living neuronal networks
Teruki Mayama, Sota Shimizu, Yuki Takano, Dai Akita, Hirokazu Takahashi
https://arxiv.org/abs/2510.04084
Bridging integrated information theory and the free-energy principle in living neuronal networks
Teruki Mayama, Sota Shimizu, Yuki Takano, Dai Akita, Hirokazu Takahashi
https://arxiv.org/abs/2510.04084
Quantum Reverse Shannon Theorem Simplified
Gilad Gour
https://arxiv.org/abs/2510.04552 https://arxiv.org/pdf/2510.04552
Modeling information acquisition via f-divergence and duality
Alex Bloedel, Tommaso Denti, Luciano Pomatto
https://arxiv.org/abs/2510.03482 https://arxiv.o…
But the debt industry itself hasn't gotten any more efficient: "the cost of moving a dollar from a saver to a borrower was about two cents in 1910; a hundred years later, it was the same." ... "This puzzle resolves itself once we recognize that the vast majority of financial innovation is geared towards figuring out how to siphon off resources through fees, insider information and lobbying."
[2025-10-07 Tue (UTC), 10 new articles found for cs.IT Information Theory]
toXiv_bot_toot
Replaced article(s) found for cond-mat.stat-mech. https://arxiv.org/list/cond-mat.stat-mech/new
[1/1]:
- Entropy augmentation through subadditive excess: information theory in irreversible processes
J\"urgen T. Stockburger
Intrinsic cause-effect power: the tradeoff between differentiation and specification
William G. P. Mayner, William Marshall, Giulio Tononi
https://arxiv.org/abs/2510.03881 https…
Real conspiracies tend to come out, but some of them take a while. Information on the Iran/Contra scandal broke out about 5 years after the conspiracy started. That would have taken several hundred people to carry out, so it was somewhat hard to hide. Even so, they largely got away with it.
The moon landing conspiracy theory would have taken thousands of people, so it would have come out more quickly. Since we have an example of a real secret program of a similar scale as what would be required to fake a moon landing (that is, the Manhattan project), we know that the fake moon landing conspiracy theory is not true. (There's also the literally tons of evidence in the form of rocks and other samples, and all kinds of other ways to debunk the claim.)
Could Kash Patel's FBI have been trying really hard to entrap people into carrying out terrorist attacks in order to justify #Trump's occupation of DC? Could they have helped a guy plan an attack then just failed to arrest him? There are reasonable scenarios that fall in between malice and incompetence while still indicating some level of false flag.
Could someone have just snapped and ambushed some guardsmen without any involvement from the FBI? Yeah, totally. The US is a country full of guns with a completely non-functional mental health system. Someone coming from a country that the US destroyed, twice, could have a lot of untreated trauma. Might they see the national guard as a threat (even if that wasn't totally true)? Yeah, they were deployed to threaten people (even when they were just picking up trash). The point was to incite this kind of response. It's completely reasonable to believe that the FBI would not need to be involved at all, that this would just be the stochastic response they were looking for.
So the point here is that everything is on the table, nothing is really known, nothing should be surprising, and no matter what it's Trump's fault. This is exactly the escalation he was looking for. If he didn't get it naturally, he would also have had ways of making it happen.
He will use this in exactly the same way as the Reichstag fire, to drive a wedge between liberals and radicals. Don't fall for it.
Edit:
There are plausible reasons to not believe the official narrative at all right now, or maybe ever. The official narrative is also plausible, but there are plausible reasons to disagree with the response even if the official story is true. It is unnecessary to resort to conspiracy thinking in order to account for what happened and to disagree with the response. But it is also understandable why someone might jump immediately to a conspiracy given the circumstances.
istg people who have opinions on AGI should be required by law to at least grasp the basics of information theory
Series D, Episode 09 - Sand
SOOLIN: All right Avon, you've told us your theory. It wasn't a plague on Virn; it was the sand feeding off human energy. Does that mean we reckon Tarrant is dead?
AVON: Not necessarily. According to Orac's earlier information there's probably a woman down there. It's just possible that Tarrant was stronger and fitter than the three men in the Federation patrol, in which case he may have been kept alive, as Keller was kept alive, a…
An Algorithmic Information-Theoretic Perspective on the Symbol Grounding Problem
Zhangchi Liu
https://arxiv.org/abs/2510.05153 https://arxiv.org/pdf/2510.0…
RE: https://fediscience.org/@suomenantropologi/115614886106180185
Vale Keith Hart. That keynote from 2010 (link below) was (and still is) a compelling argument for reconnecting value theory to practical political economy by weaving together Marx's commodity fetishism, the concept of plural economy inspired by Mauss, and the digital revolution's radical cheapening of information.
Asymptotics of the Hankel determinant and orthogonal polynomials arising from the information theory of MIMO systems
Chao Min, Xiaoqing Wu
https://arxiv.org/abs/2510.06739 https…
Proceedings Twentieth International Workshop on Logical Frameworks and Meta-Languages: Theory and Practice
Kaustuv Chaudhuri (Inria, France), Daniele Nantes-Sobrinho (Imperial College, UK)
https://arxiv.org/abs/2510.11199
Preserving Core Structures of Social Networks via Information Guided Multi-Step Graph Pruning
Yutong Hu, Bingxin Zhou, Jing Wang, Weishu Zhao, Liang Hong
https://arxiv.org/abs/2510.10499
Stephen Miller has a theory about this political moment.
As President Trump expands his lawbreaking and dictatorial rule,
the powerful MAGA disinformation apparatus
—at Miller’s direction
—is supercharging public attention to the debate over Trump’s conduct in a way that’s designed to deeply polarize it.
That will force Americans to take a side in that standoff, Miller clearly believes,
driving them to embrace authoritarian rule,
though perhaps witho…
Exploring Complexity Measures for Analysis of Solar Wind Structures and Streams
Venla Koikkalainen, Emilia Kilpua, Simon Good, Adnane Osmane
https://arxiv.org/abs/2510.05873 htt…
Can You Hear Me Now? A Benchmark for Long-Range Graph Propagation
Luca Miglior, Matteo Tolloso, Alessio Gravina, Davide Bacciu
https://arxiv.org/abs/2512.17762 https://arxiv.org/pdf/2512.17762 https://arxiv.org/html/2512.17762
arXiv:2512.17762v1 Announce Type: new
Abstract: Effectively capturing long-range interactions remains a fundamental yet unresolved challenge in graph neural network (GNN) research, critical for applications across diverse fields of science. To systematically address this, we introduce ECHO (Evaluating Communication over long HOps), a novel benchmark specifically designed to rigorously assess the capabilities of GNNs in handling very long-range graph propagation. ECHO includes three synthetic graph tasks, namely single-source shortest paths, node eccentricity, and graph diameter, each constructed over diverse and structurally challenging topologies intentionally designed to introduce significant information bottlenecks. ECHO also includes two real-world datasets, ECHO-Charge and ECHO-Energy, which define chemically grounded benchmarks for predicting atomic partial charges and molecular total energies, respectively, with reference computations obtained at the density functional theory (DFT) level. Both tasks inherently depend on capturing complex long-range molecular interactions. Our extensive benchmarking of popular GNN architectures reveals clear performance gaps, emphasizing the difficulty of true long-range propagation and highlighting design choices capable of overcoming inherent limitations. ECHO thereby sets a new standard for evaluating long-range information propagation, also providing a compelling example for its need in AI for science.
toXiv_bot_toot
Computing moment polytopes - with a focus on tensors, entanglement and matrix multiplication
Maxim van den Berg, Matthias Christandl, Vladimir Lysikov, Harold Nieuwboer, Michael Walter, Jeroen Zuiddam
https://arxiv.org/abs/2510.08336
Credal Transformer: A Principled Approach for Quantifying and Mitigating Hallucinations in Large Language Models
Shihao Ji, Zihui Song, Jiajie Huang
https://arxiv.org/abs/2510.12137
Combining Blotto Networks and Voter Models to Simulate Voter Behavior in Response to Competitive Election Spending
Renee Jerome
https://arxiv.org/abs/2510.09697 https://
An information theorist's tour of differential privacy
Anand D. Sarwate, Flavio P. Calmon, Oliver Kosut, Lalitha Sankar
https://arxiv.org/abs/2510.10316 https://
The Mechanical Yes-Man: Emancipatory AI Pedagogy in Higher Education
Linda Rocco
https://arxiv.org/abs/2510.10176 https://arxiv.org/pdf/2510.10176
Mean dimension and rate-distortion function revisited
Rui Yang
https://arxiv.org/abs/2510.08051 https://arxiv.org/pdf/2510.08051
Symmetric Persistent Tensors and their Hessian
Masoud Gharahi, Giorgio Ottaviani
https://arxiv.org/abs/2510.07404 https://arxiv.org/pdf/2510.07404
Infinite-dimensional Lagrange-Dirac systems with boundary energy flow II: Field theories with bundle-valued forms
Fran\c{c}ois Gay-Balmaz, \'Alvaro Rodr\'iguez Abella, Hiroaki Yoshimura
https://arxiv.org/abs/2511.05687 https://arxiv.org/pdf/2511.05687 https://arxiv.org/html/2511.05687
arXiv:2511.05687v1 Announce Type: new
Abstract: Part I of this paper introduced the infinite dimensional Lagrange--Dirac theory for physical systems on the space of differential forms over a smooth manifold with boundary. This approach is particularly well-suited for systems involving energy exchange through the boundary, as it is built upon a restricted dual space -a vector subspace of the topological dual of the configuration space- that captures information about both the interior dynamics and boundary interactions. Consequently, the resulting dynamical equations naturally incorporate boundary energy flow. In this second part, the theory is extended to encompass vector-bundle-valued differential forms and non-Abelian gauge theories. To account for two commonly used forms of energy flux and boundary power densities, we introduce two distinct but equivalent formulations of the restricted dual. The results are derived from both geometric and variational viewpoints and are illustrated through applications to matter and gauge field theories. The interaction between gauge and matter fields is also addressed, along with the associated boundary conditions, applied to the case of the Yang-Mills-Higgs equations.
toXiv_bot_toot
Pooling Probabilistic Forecasts for Cooperative Wind Power Offering
Honglin Wen, Pierre Pinson
https://arxiv.org/abs/2510.12382 https://arxiv.org/pdf/2510.…
Crosslisted article(s) found for cs.GT. https://arxiv.org/list/cs.GT/new
[1/1]:
- Data as Commodity: a Game-Theoretic Principle for Information Pricing
Pasquale Casaburi, Giovanni Piccioli, Pierpaolo Vivo
Crosslisted article(s) found for math.ST. https://arxiv.org/list/math.ST/new
[1/1]:
- A Unified Information-Theoretic Framework for Meta-Learning Generalization
Wen Wen, Tieliang Gong, Yuxin Dong, Zeyu Gao, Yong-Jin Liu
Eternal inflation bubble collision signature on CMB remote dipole and quadrupole fields
Hongbo Cai, Pengjie Zhang, Yilun Guan
https://arxiv.org/abs/2510.12134 https://
Quantum-Theoretical Re-interpretation of Pricing Theory
Tian Xin
https://arxiv.org/abs/2510.06287 https://arxiv.org/pdf/2510.06287
The quantum communication power of indefinite causal order
Xuanqiang Zhao, Benchi Zhao, Giulio Chiribella
https://arxiv.org/abs/2510.08507 https://arxiv.or…
Application of deep neural networks for computing the renormalization group flow of the two-dimensional phi^4 field theory
Yueqi Zhao, Michael M. Fogler, Yi-Zhuang You
https://arxiv.org/abs/2510.06508 …
Data as Commodity: a Game-Theoretic Principle for Information Pricing
Pasquale Casaburi, Giovanni Piccioli, Pierpaolo Vivo
https://arxiv.org/abs/2510.07101 https://
A Note on Idempotent Matrices: The Poset Structure and The Construction
Sen-Peng Eu, Yong-Siang Lin, Wei-Liang Sun
https://arxiv.org/abs/2510.09501 https://
S-D-RSM: Stochastic Distributed Regularized Splitting Method for Large-Scale Convex Optimization Problems
Maoran Wang, Xingju Cai, Yongxin Chen
https://arxiv.org/abs/2511.10133 https://arxiv.org/pdf/2511.10133 https://arxiv.org/html/2511.10133
arXiv:2511.10133v1 Announce Type: new
Abstract: This paper investigates the problems large-scale distributed composite convex optimization, with motivations from a broad range of applications, including multi-agent systems, federated learning, smart grids, wireless sensor networks, compressed sensing, and so on. Stochastic gradient descent (SGD) and its variants are commonly employed to solve such problems. However, existing algorithms often rely on vanishing step sizes, strong convexity assumptions, or entail substantial computational overhead to ensure convergence or obtain favorable complexity. To bridge the gap between theory and practice, we integrate consensus optimization and operator splitting techniques (see Problem Reformulation) to develop a novel stochastic splitting algorithm, termed the \emph{stochastic distributed regularized splitting method} (S-D-RSM). In practice, S-D-RSM performs parallel updates of proximal mappings and gradient information for only a randomly selected subset of agents at each iteration. By introducing regularization terms, it effectively mitigates consensus discrepancies among distributed nodes. In contrast to conventional stochastic methods, our theoretical analysis establishes that S-D-RSM achieves global convergence without requiring diminishing step sizes or strong convexity assumptions. Furthermore, it achieves an iteration complexity of $\mathcal{O}(1/\epsilon)$ with respect to both the objective function value and the consensus error. Numerical experiments show that S-D-RSM achieves up to 2--3$\times$ speedup compared to state-of-the-art baselines, while maintaining comparable or better accuracy. These results not only validate the algorithm's theoretical guarantees but also demonstrate its effectiveness in practical tasks such as compressed sensing and empirical risk minimization.
toXiv_bot_toot
Replaced article(s) found for cs.AI. https://arxiv.org/list/cs.AI/new
[5/14]:
- QUITO-X: A New Perspective on Context Compression from the Information Bottleneck Theory
Wang, Huang, Tian, Su, Yu, Liao, Fan, Guo, Cheng
Crosslisted article(s) found for math.OA. https://arxiv.org/list/math.OA/new
[1/1]:
- Entanglement in von Neumann Algebraic Quantum Information Theory
Lauritz van Luijk
Switchable spin-photon coupling with hole spins in single-quantum dots
Carlos Sagaseta, Mar\'ia Jos\'e Calder\'on, Jos\'e Carlos Abadillo-Uriel
https://arxiv.org/abs/2510.05301
A general dark-state theory for arbitrary multilevel quantum systems
Xuan Zhao, Le-Man Kuang, Jie-Qiao Liao
https://arxiv.org/abs/2510.05561 https://arxiv.…
Crosslisted article(s) found for cs.IT. https://arxiv.org/list/cs.IT/new
[1/1]:
- Functional Connectivity Networks for Transportation Delay Analysis: from Theory to Software
Carlson Moses B\"uth, Massimiliano Zanin
Replaced article(s) found for math.ST. https://arxiv.org/list/math.ST/new
[1/1]:
- MLE convergence speed to information projection of exponential family: Criterion for model dimens...
Yo Sheena
The $\mathbb{A}^1$-Euler characteristic of symmetric powers
Louisa F. Br\"oring, Jesse Pajwani, Anna M. Viergever
https://arxiv.org/abs/2510.06922 https://
Replaced article(s) found for cs.IT. https://arxiv.org/list/cs.IT/new
[1/1]:
- Engineering Emergence
Abel Jansma, Erik Hoel
https://arxiv.or…
DISCO-DJ II: a differentiable particle-mesh code for cosmology
Florian List, Oliver Hahn, Thomas Fl\"oss, Lukas Winkler
https://arxiv.org/abs/2510.05206 https://
Replaced article(s) found for math.SG. https://arxiv.org/list/math.SG/new
[1/1]:
- Non-decomposable Lagrangian cobordisms between Legendrian knots
Roman Golovko, Daniel Kom\'arek
https://arxiv.org/abs/2511.08731 https://mastoxiv.page/@arXiv_mathSG_bot/115541377678336506
- Spaces of Legendrian cables and Seifert fibered links
Eduardo Fern\'andez, Hyunki Min
https://arxiv.org/abs/2310.12385 https://mastoxiv.page/@arXiv_mathGT_bot/111265563434686287
- Almost Hermitian structures on virtual moduli spaces of non-Abelian monopoles and applications to...
Paul M. N. Feehan, Thomas G. Leness
https://arxiv.org/abs/2410.13809 https://mastoxiv.page/@arXiv_mathDG_bot/113327305560976416
- Quantum cohomology, shift operators, and Coulomb branches
Ki Fung Chan, Kwokwai Chan, Chin Hang Eddie Lam
https://arxiv.org/abs/2505.23340 https://mastoxiv.page/@arXiv_mathAG_bot/114595582234065991
- One application of Duistermaat-Heckman measure in quantum information theory
Lin Zhang, Xiaohan Jiang, Bing Xie
https://arxiv.org/abs/2507.02369 https://mastoxiv.page/@arXiv_quantph_bot/114794376818737255
toXiv_bot_toot
Probabilistic Links Between Quantum Classification of Patterns of Boolean Functions and Hamming Distance
Theodore Andronikos, Constantinos Bitsakos, Konstantinos Nikas, Georgios I. Goumas, Nectarios Koziris
https://arxiv.org/abs/2510.12736
Crosslisted article(s) found for cs.IT. https://arxiv.org/list/cs.IT/new
[1/1]:
- Depth One Quantum Alternating Operator Ansatz as an Approximate Gibbs Distribution Sampler
Elijah Pelofske
Algorithmic Temperature Induced by Adopted Regular Universal Turing Machine
Kentaro Imafuku
https://arxiv.org/abs/2510.11737 https://arxiv.org/pdf/2510.117…
Replaced article(s) found for cs.IT. https://arxiv.org/list/cs.IT/new
[1/1]:
- Multiple-Rate Channel Codes in $\texttt{GF}(p^{n^{2}})$
R. S. Raja Durai, Ashwini Kumar
Nonlocal Games Through Communication Complexity and Quantum Cryptography
Pierre Botteron
https://arxiv.org/abs/2510.09457 https://arxiv.org/pdf/2510.09457
Crosslisted article(s) found for cs.IT. https://arxiv.org/list/cs.IT/new
[1/1]:
- Functional Donoho-Elad-Gribonval-Nielsen-Fuchs Sparsity Theorem
K. Mahesh Krishna
Beyond the Carnot limit: work extraction via an entropy battery
Liam Judd McClelland
https://arxiv.org/abs/2510.08989 https://arxiv.org/pdf/2510.08989
Replaced article(s) found for cs.IT. https://arxiv.org/list/cs.IT/new
[1/1]:
- On the Capacity of Vector Linear Computation over a Noiseless Quantum Multiple Access Channel wit...
Yuhang Yao, Syed A. Jafar
Thermodynamics of quantum processes: An operational framework for free energy and reversible athermality
Himanshu Badhani, Dhanuja G S, Siddhartha Das
https://arxiv.org/abs/2510.12790
Crosslisted article(s) found for cs.IT. https://arxiv.org/list/cs.IT/new
[1/1]:
- Soft Graph Transformer for MIMO Detection
Jiadong Hong, Lei Liu, Xinyu Bian, Wenjie Wang, Zhaoyang Zhang
Shedding light on classical shadows: learning photonic quantum states
Hugo Thomas, Ulysse Chabaud, Pierre-Emmanuel Emeriau
https://arxiv.org/abs/2510.07240 https://
Replaced article(s) found for cs.IT. https://arxiv.org/list/cs.IT/new
[1/1]:
- Moment Constraints and Phase Recovery for Multireference Alignment
Vahid Shahverdi, Emanuel Str\"om, Joakim and\'en
Crosslisted article(s) found for cs.IT. https://arxiv.org/list/cs.IT/new
[1/1]:
- Simulation of Quantum Repeater Networks under Decoherence and Purification Constraints
Wenhan Li, Shiyu Zhang
List Recoverable Codes: The Good, the Bad, and the Unknown (hopefully not Ugly)
Nicolas Resch, S. Venkitesh
https://arxiv.org/abs/2510.07597 https://arxiv.…
Recovery of the second law in fully quantum thermodynamics
Naoto Shiraishi, Ryuji Takagi
https://arxiv.org/abs/2510.05642 https://arxiv.org/pdf/2510.05642
Replaced article(s) found for cs.IT. https://arxiv.org/list/cs.IT/new
[1/1]:
- Physics-Aware Sparse Signal Recovery Through PDE-Governed Measurement Systems
Tadashi Wadayama, Koji Igarashi, Takumi Takahashi
Crosslisted article(s) found for cs.IT. https://arxiv.org/list/cs.IT/new
[1/1]:
- Toward Uncertainty-Aware and Generalizable Neural Decoding for Quantum LDPC Codes
Xiangjun Mi, Frank Mueller
Replaced article(s) found for cs.IT. https://arxiv.org/list/cs.IT/new
[1/1]:
- Causal Coordination for Distributed Decision-Making
Mengyuan Zhao, Tobias J. Oechtering, Ma\"el Le Treust
[2025-10-15 Wed (UTC), 5 new articles found for cs.IT Information Theory]
toXiv_bot_toot
[2025-10-14 Tue (UTC), 10 new articles found for cs.IT Information Theory]
toXiv_bot_toot
[2025-10-13 Mon (UTC), 9 new articles found for cs.IT Information Theory]
toXiv_bot_toot
List Decoding Reed--Solomon Codes in the Lee, Euclidean, and Other Metrics
Chris Peikert, Alexandra Veliche Hostetler
https://arxiv.org/abs/2510.11453 https://
[2025-10-10 Fri (UTC), 6 new articles found for cs.IT Information Theory]
toXiv_bot_toot
[2025-10-09 Thu (UTC), 9 new articles found for cs.IT Information Theory]
toXiv_bot_toot
A doubly composite Chernoff-Stein lemma and its applications
Ludovico Lami
https://arxiv.org/abs/2510.06342 https://arxiv.org/pdf/2510.06342
A Theoretically-Grounded Codebook for Digital Semantic Communications
Lingyi Wang, Rashed Shelim, Walid Saad, Naren Ramakrishnan
https://arxiv.org/abs/2510.07108 https://…