1991
DOI: 10.1109/18.79932
|View full text |Cite
|
Sign up to set email alerts
|

Runlength codes from source codes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2000
2000
2016
2016

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Let the minimal set contain K words. One complete extension of this minimal set is comprised of the K 2 codewords formed by concatenating all words in the minimal set with each of the K words in the minimal set [6]; the next complete extension involves extending all K 2 words in a similar manner. In contrast, a partial extension of a minimal set is formed by selecting any one of the words and appending to it all K words from the minimal set [3].…”
Section: Minimal Sets and Their Extensionmentioning
confidence: 99%
“…Let the minimal set contain K words. One complete extension of this minimal set is comprised of the K 2 codewords formed by concatenating all words in the minimal set with each of the K words in the minimal set [6]; the next complete extension involves extending all K 2 words in a similar manner. In contrast, a partial extension of a minimal set is formed by selecting any one of the words and appending to it all K words from the minimal set [3].…”
Section: Minimal Sets and Their Extensionmentioning
confidence: 99%
“…Dyadic PMFs resulting from source codes are in general not optimal. For the (d, k) constrained noiseless channel, it was claimed in [3] that a source code asymptotically achieves capacity. To the best of our knowledge, for DMCs, there exist no results in the literature on optimality and asymptotic behavior of dyadic PMFs.…”
Section: Introductionmentioning
confidence: 99%
“…The idea of constructing (d, k)-codes from source codes is not new. For example, by reversing a source encoder-decoder pair, the decoder of a suitable source code can be used to encode unconstrained Bernoulli(1/2)-distributed bitstreams into (d, k)-sequences in a recoverable manner [3], [4]. In such designs, the choice of source code is guided by special properties of (d, k)sequences with maximum-entropy (maxentropic) distribution.…”
Section: Introductionmentioning
confidence: 99%
“…Intuitively speaking, it better conforms the data to the characteristics of maxentropic sequences. It is also worth noting that the binary DT is a special case of general DT's, such as the ones introduced in [3], [4]. In fact, some of these source coding techniques can be readily applied to the binary case, where a Bernoulli(p) distribution replaces Λ d,k .…”
Section: Introductionmentioning
confidence: 99%