We consider source requantization in two forms -- successive degradation (i.e., source fidelity reduction) and bit stealing (i.e., information embedding) -when no forward planning...
Aaron S. Cohen, Stark C. Draper, Emin Martinian, G...
With the emergence of software delivery platforms such as Microsoft's .NET, code compression has become one of the core enabling technologies strongly affecting system perfor...
A video transmission system is presented based on the 3-D SPIHT algorithm for video compression and turbo codes for channel error protection. The channel considered is a binary sy...
Brian A. Banister, Benjamin Belzer, Thomas R. Fisc...
Recently, Coppersmith and Shparlinski proved several results on the interpolation of the discrete logarithm in the finite prime field Fp by polynomials modulo p and modulo p -1, re...
This contribution is concerned with a generalization of Itoh and Tsujii's algorithm for inversion in extension fields GF(qm ). Unlike the original algorithm, the method introd...
We point out an interplay between Fq-Frobenius non-classical plane curves and complete (k, d)-arcs in P2 (Fq). A typical example that shows how this works is the one concerning an ...
Massimo Giulietti, Fernanda Pambianco, Fernando To...
We use methods of Mortimer [19] to examine the subcodes spanned by minimumweight vectors of the projective generalized Reed-Muller codes and their duals. These methods provide a p...