Sciweavers

25 search results - page 1 / 5
» Authentication of LZ-77 Compressed Data
Sort
View
SAC
2003
ACM
14 years 4 months ago
Authentication of LZ-77 Compressed Data
Mikhail J. Atallah, Stefano Lonardi
DCC
2007
IEEE
14 years 10 months ago
Bit Recycling with Prefix Codes
Many data compression methods cannot remove all redundancy from a file that they compress because it can be encoded to many compressed files. In particular, we consider the redund...
Danny Dubé, Vincent Beaudoin
MM
2009
ACM
144views Multimedia» more  MM 2009»
14 years 5 months ago
Manipulating lossless video in the compressed domain
A compressed-domain transformation is one that operates directly on the compressed format, rather than requiring conversion to an uncompressed format prior to processing. Performi...
William Thies, Steven Hall, Saman P. Amarasinghe
SPE
2008
108views more  SPE 2008»
13 years 10 months ago
Effective asymmetric XML compression
The innate verbosity of the Extensible Markup Language remains one of its main weaknesses, especially when large XML documents are concerned. This problem can be solved with the a...
Przemyslaw Skibinski, Szymon Grabowski, Jakub Swac...
ISCAS
1994
IEEE
138views Hardware» more  ISCAS 1994»
14 years 3 months ago
High-Throughput Data Compressor Designs Using Content Addressable Memory
This paper presents a novel VLSI architecture for high-speed data compressor designs which implement the well-known LZ77 algorithm. The architecture mainly consists of three units...
Ren-Yang Yang, Chen-Yi Lee