Results 21 to 30 of about 483,886 (315)
Channel Coding and Source Coding With Increased Partial Side Information
Let ( S 1 , i , S 2 , i ) ∼ i . i . d p ( s 1 , s 2 ) , i = 1 , 2 , ⋯ be a memoryless, correlated partial side information sequence. In this work, we study channel coding and source coding problems where the partial side
Avihay Sadeh-Shirazi+2 more
doaj +1 more source
Entropy-Constrained Scalar Quantization with a Lossy-Compressed Bit
We consider the compression of a continuous real-valued source X using scalar quantizers and average squared error distortion D. Using lossless compression of the quantizer’s output, Gish and Pierce showed that uniform quantizing yields the smallest ...
Melanie F. Pradier+2 more
doaj +1 more source
Design and Implementation of a Fully Flexible Cognitive Radio Modem
Software-defined radio (SDR)-based cognitive communication radio systems are very popular at present, and there have been many investigations on this topic.
Greta A. Vardanyan+2 more
doaj +1 more source
An End-to-End Scheme for Learning Over Compressed Data Transmitted Through a Noisy Channel
Within the emerging area of goal-oriented communications, this paper introduces a novel end-to-end transmission scheme dedicated to learning over a noisy channel, under the constraint that no prior training dataset is available.
Alireza Tasdighi, Elsa Dupraz
doaj +1 more source
Secure source coding with a helper [PDF]
We consider a secure source coding problem with a rate-limited helper. In particular, Alice observes an independent and identically distributed (i.i.d.) source X and wishes to transmit this source losslessly to Bob over a rate-limited link. A helper (Helen), observes an i.i.d. correlated source Y and can transmit information to Bob over a separate rate-
Kannan Ramchandran+2 more
openaire +4 more sources
Normalization of Java Source Codes [PDF]
Security issues can be leveraged when input parameters are not checked. These missing checks can lead an application to an unexpected state where an attacker can get access to assets. The tool Chucky-ng aims at detecting such missing checks in source code. Such source codes are the only input required for Chuck-yJava.
Ouairy, Léopold+2 more
openaire +3 more sources
On locally decodable source coding [PDF]
Locally decodable channel codes form a special class of error-correcting codes with the property that the decoder is able to reconstruct any bit of the input message from querying only a few bits of a noisy codeword. It is well known that such codes require significantly more redundancy (in particular have vanishing rate) compared to their non-local ...
Makhdoumi, Ali+3 more
openaire +4 more sources
On the Asymptotic Optimality of a Low-Complexity Coding Strategy for WSS, MA, and AR Vector Sources
In this paper, we study the asymptotic optimality of a low-complexity coding strategy for Gaussian vector sources. Specifically, we study the convergence speed of the rate of such a coding strategy when it is used to encode the most relevant vector ...
Jesús Gutiérrez-Gutiérrez+2 more
doaj +1 more source
Joint Source-Channel Coding (JSCC) is a powerful technique that allows for the efficient transmission of information by simultaneously considering the characteristics of both the source and the channel.
Alexander Hamilton+2 more
doaj +1 more source