The automated analysis of model specifications is an area that historically receives little attention in the simulation research community but which can offer significant bene...
Kara A. Olson, C. Michael Overstreet, E. Joseph De...
Abstract. This paper estimates the minimal length of a binary probabilistic traitor tracing code. We consider the code construction proposed by G. Tardos in 2003, with the symmetri...
Thispaper presents an information-theoreticstudy ofvideo codecs that are based on the principle of source coding with side information at the decoder In contrast to the classical ...
Prakash Ishwar, Vinod M. Prabhakaran, Kannan Ramch...
Practical applications that employ entropy coding for large alphabets often partition the alphabet set into two or more layers and encode each symbol by using some suitable prefix...
Dan Chen, Yi-Jen Chiang, Nasir D. Memon, Xiaolin W...
Mobility is a fundamental functionality of the next generation internet computing. How to support mobility for legacy codes, however, is still an issue of research. The key to sol...