2007 IEEE International Symposium on Information Theory 2007
DOI: 10.1109/isit.2007.4557338
|View full text |Cite
|
Sign up to set email alerts
|

D-ary Bounded-Length Huffman Coding

Abstract: Abstract-Efficient optimal prefix coding has long been accomplished via the Huffman algorithm. However, there is still room for improvement and exploration regarding variants of the Huffman problem. Length-limited Huffman coding, useful for many practical applications, is one such variant, in which codes are restricted to the set of codes in which none of the n codewords is longer than a given length, lmax. Binary lengthlimited coding can be done in O(nlmax) time and O(n) space via the widely used Package-Merg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2008
2008
2013
2013

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…The multiary case is far less understood than the binary case. Recently, an algorithm to find the optimal length-restricted t-ary code has been presented whose running time is linear once the lengths are sorted [Bae07]. To analyze the increase in redundancy, consider the sub-optimal method that simply takes any node v of depth more than ℓ = 4 lg nRuns/ lg t and balances its subtree (so that height 5 lg nRuns/ lg t is guaranteed).…”
Section: Boosting Time Performancementioning
confidence: 99%
“…The multiary case is far less understood than the binary case. Recently, an algorithm to find the optimal length-restricted t-ary code has been presented whose running time is linear once the lengths are sorted [Bae07]. To analyze the increase in redundancy, consider the sub-optimal method that simply takes any node v of depth more than ℓ = 4 lg nRuns/ lg t and balances its subtree (so that height 5 lg nRuns/ lg t is guaranteed).…”
Section: Boosting Time Performancementioning
confidence: 99%
“…for b = a − 31a 2 /60 > 0. By (4.2a) and (4.2b), we have 1 |z| [3] So we now assume that D(1/z) = 0 for some z with r 3 ≤ |z| < 1 + log 2/t. Repeating the above steps with 1/t 3 replaced by 0 gives the slightly better bound z = ρ 2 with ρ 2 as in (2.3).…”
Section: Asymptoticsmentioning
confidence: 99%
“…However, consider nonbinary output alphabets, that is, D > 2. As in Huffman coding for such alphabets, we must add "dummy" with proof of correctness, in [21].…”
Section: E Further Refinementsmentioning
confidence: 99%
“…Although we briefly sketch how to adapt this technique to general output alphabet coding at the end of Subsection IV-E, an approach fully explained in [21], until then we concentrate on the binary case (D = 2).…”
Section: A Nodeset Notationmentioning
confidence: 99%
See 1 more Smart Citation