1999
DOI: 10.1109/30.793608
|View full text |Cite
|
Sign up to set email alerts
|

Wavelet image compression for mobile/portable applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
5
0

Year Published

2002
2002
2015
2015

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…A redesigning of the DWT algorithm, in order to change the operation scheduling, allows to reduce the temporary data lifetime and to optimize the overall system performance [1]- [3]. The SW-LbL approach [1], [2] allows to significantly reduce both external memory size and bandwidth at the price of a slightly more complex implementation and the need of a small on-chip memory. The main idea behind this approach is to exploit data dependencies between horizontal and vertical processing in order to try to use temporary samples as soon as they are available.…”
Section: B Sliding-windows Layer-by-layer Approachmentioning
confidence: 99%
See 4 more Smart Citations
“…A redesigning of the DWT algorithm, in order to change the operation scheduling, allows to reduce the temporary data lifetime and to optimize the overall system performance [1]- [3]. The SW-LbL approach [1], [2] allows to significantly reduce both external memory size and bandwidth at the price of a slightly more complex implementation and the need of a small on-chip memory. The main idea behind this approach is to exploit data dependencies between horizontal and vertical processing in order to try to use temporary samples as soon as they are available.…”
Section: B Sliding-windows Layer-by-layer Approachmentioning
confidence: 99%
“…Extended state of the art researches showed that DWT coding and decoding algorithms can be redesigned by changing the scheduling of operations, yielding more efficient implementations with reduced memory requirements [3], [4], [6]. Further work proposed a variety of strategies, dealing with the trade-off among implementation complexity, cache memory requirements and external memory requirements [1], [2]. Thus, efficient implementations must be investigated to fit different system scenarios.…”
mentioning
confidence: 99%
See 3 more Smart Citations