Sciweavers

DCC
2002
IEEE
14 years 4 months ago
Source Requantization: Successive Degradation and Bit Stealing
We consider source requantization in two forms -- successive degradation (i.e., source fidelity reduction) and bit stealing (i.e., information embedding) -when no forward planning...
Aaron S. Cohen, Stark C. Draper, Emin Martinian, G...
DCC
2002
IEEE
14 years 4 months ago
PPMexe: PPM for Compressing Software
With the emergence of software delivery platforms such as Microsoft's .NET, code compression has become one of the core enabling technologies strongly affecting system perfor...
Milenko Drinic, Darko Kirovski
DCC
2002
IEEE
14 years 4 months ago
Searching BWT Compressed Text with the Boyer-Moore Algorithm and Binary Search
Tim Bell, Matt Powell, Amar Mukherjee, Donald A. A...
DCC
2002
IEEE
14 years 4 months ago
Robust Video Transmission over Binary Symmetric Channels with Packet Erasures
A video transmission system is presented based on the 3-D SPIHT algorithm for video compression and turbo codes for channel error protection. The channel considered is a binary sy...
Brian A. Banister, Benjamin Belzer, Thomas R. Fisc...
DCC
2002
IEEE
14 years 4 months ago
Polynomial Interpolation of the Discrete Logarithm
Recently, Coppersmith and Shparlinski proved several results on the interpolation of the discrete logarithm in the finite prime field Fp by polynomials modulo p and modulo p -1, re...
Arne Winterhof
DCC
2002
IEEE
14 years 4 months ago
Ranks of q-Ary 1-Perfect Codes
Kevin T. Phelps, Mercè Villanueva
DCC
2002
IEEE
14 years 4 months ago
Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes
This contribution is concerned with a generalization of Itoh and Tsujii's algorithm for inversion in extension fields GF(qm ). Unlike the original algorithm, the method introd...
Jorge Guajardo, Christof Paar
DCC
2002
IEEE
14 years 4 months ago
On Complete Arcs Arising from Plane Curves
We point out an interplay between Fq-Frobenius non-classical plane curves and complete (k, d)-arcs in P2 (Fq). A typical example that shows how this works is the one concerning an ...
Massimo Giulietti, Fernanda Pambianco, Fernando To...
DCC
2002
IEEE
14 years 4 months ago
On Large Sets of v-1 L-Intersecting Steiner Triple Systems of Order v
F. Franek, Mike J. Grannell, Terry S. Griggs, Alex...
DCC
2002
IEEE
14 years 4 months ago
Subcodes of the Projective Generalized Reed-Muller Codes Spanned by Minimum-Weight Vectors
We use methods of Mortimer [19] to examine the subcodes spanned by minimumweight vectors of the projective generalized Reed-Muller codes and their duals. These methods provide a p...
Peng Ding, Jennifer D. Key