Binary Combinatorial Coding
نویسندگان
چکیده
We present a novel binary entropy code called combinatorial coding (CC). The theoretical basis for CC has been described previously under the context of universal coding [1], enumerative coding [2], and minimum description length [3]. The code described in these references works as follows: assume the source data of length M is binary, memoryless, and generated with an unknown parameter θ, the probability that a “1” occurs. To code the data, count the number of “1”s k and encode this using log( 1) M + bits. Next, use a ranking algorithm [4] to compute the index of the data in a lexicographic listing of all binary sequences of length M with k “1”s. There are C( , ) M k such sequences so the index can be transmitted with logC( , ) M k bits. In general, ranking an M-bit block requires M-bit integer addition and storage. On today’s 32-bit computer architectures, 32 M = is a practical limitation on block size.
منابع مشابه
Applying, Improving and Analyzing Some Heuristics for Binary Codes in Combinatorial DNA Design
Combinatorial algorithms have long been used to design error correcting codes with various constraints such as Hamming distance or weight. Such algorithms have been used to design DNA codes, which parallel error correcting codes in many ways. We implemented two algorithms from coding theory and adapted them for DNA. We tried several improvements and combinations and we will discuss the empirica...
متن کاملConstruction Optimal Combination Test Suite Based on Ethnic Group Evolution Algorithm
The optimal test case suite constructing problem is defined thus: given a set of test requirements and a test suite that satisfies all test requirements, find a subset of the test suite containing a minimum number of test cases that still satisfies all test requirements. Existing methods for solving test case suite generation problem do not guarantee that obtained test suite is optimal. In this...
متن کاملRegister Allocation for Unary-Binary Trees
We study the number of registers required for evaluating arithmetic expressions formed with any set of unary and binary operators. Our approach consists in a singularity analysis of intervening generating functions combined with a use of (complex) Mellin inversion. We illustrate it first by rederiving the known results about binary trees and then extend it to the fully general case of unaj-bina...
متن کاملAdvanced low-complexity compression for maskless lithography data
A direct-write maskless lithography system using 25nm for 50nm feature sizes requires data rates of about 10 Tb/s to maintain a throughput of one wafer per minute per layer achieved by today’s optical lithography systems. In a previous paper, we presented an architecture that achieves this data rate contingent on 25 to 1 compression of lithography data, and on implementation of a real-time deco...
متن کاملOn the Combinatorial Version of the Slepian-Wolf Problem
We study the following combinatorial version of the Slepian–Wolf coding scheme. Two isolated Senders are given binary strings X and Y respectively; the length of each string is equal to n, and the Hamming distance between the strings is at most αn. The Senders compress their strings and communicate the results to the Receiver. Then the Receiver must reconstruct both strings X and Y . The aim is...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003