2004
DOI: 10.1109/tit.2004.826633
|View full text |Cite
|
Sign up to set email alerts
|

Improved Bit-Stuffing Bounds on Two-Dimensional Constraints

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
1

Year Published

2006
2006
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 52 publications
(28 citation statements)
references
References 24 publications
0
27
1
Order By: Relevance
“…constraint. It is slightly higher than the lower bound of 0.9127 presented as a lower bound for bit-stufng in [7].…”
Section: ) Results Using Iterative Scalingcontrasting
confidence: 54%
See 1 more Smart Citation
“…constraint. It is slightly higher than the lower bound of 0.9127 presented as a lower bound for bit-stufng in [7].…”
Section: ) Results Using Iterative Scalingcontrasting
confidence: 54%
“…constraint is not known, but in [7] it was estimated to be 0.9238 and lower bounds on the entropy obtained by bit-stufng were given. For a rectangle to represent the forbidden words, the n.i.b.…”
Section: A Constrained Eldsmentioning
confidence: 99%
“…Using the same method in the 3-D case, it was shown in [18] that Several constructive methods were suggested which, by devising an appropriate encoder and analyzing its rate, yield lower bounds on the capacity of the constrained system. These works 0018-9448/$26.00 © 2011 IEEE include [22], [25], [26] as well as the bit-stuffing method described in [7], [27]. A few recursive constructions were also given by Etzion in [5].…”
Section: Introductionmentioning
confidence: 99%
“…There exists a configuration (u i,j ) (i,j)∈A over the vertex set V such that (a) for each (i, j) ∈ A we have w i,j = L(u i,j ); (b) each row in (u i,j ) is a path in G row ; (c) each column in (u i,j ) is a path in G col . Examples of 2-D constraints include the square constraint [2], 2-D runlength-limited (RLL) constraints [3], 2-D symmetric runlength-limited (SRLL) constraints [4], and the "no isolated bits" constraint [5].…”
Section: Introductionmentioning
confidence: 99%