Some Source Coding Theorems and 1:1 Coding Based on Generalized Inaccuracy Measure of Order α and Typeβ
摘要
In this paper,we have established some noiseless coding theorems for a generalized parametric‘useful’inaccuracy measure of orderαand typeβand generalized mean codeword length.Further,lower bounds on exponentiated useful code length for the best 1:1 code have been obtained in terms of the useful inaccuracy of orderαand typeβand the generalized average useful codeword length.
参考文献2
-
1LUO MingXing1,2,3, YANG YiXian1,2,3, WANG LiCheng1,2,3 & NIU XinXin1,2,3 1Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China,2Key Laboratory of Network and Information Attack and Defence Technology of MOE, Beijing University of Posts and Telecommunications, Beijing 100876, China,3National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China.Secure network coding in the presence of eavesdroppers[J].Science China(Information Sciences),2010,53(3):648-658. 被引量:8
-
2WU WeiRen,TU Juan,TU GuoFang,GAO ShaoShuai,ZHANG Can.Joint source channel VL coding/decoding for deep space communication networks based on a space trellis[J].Science China(Information Sciences),2011,54(9):1883-1894. 被引量:2
二级参考文献31
-
1Liu Jianjun Tu Guofang Wu Weiren.NEW ITERATIVE SUPER-TRELLIS DECODING WITH SOURCE A PRIORI INFORMATION FOR VLCS WITH TURBO CODES[J].Journal of Electronics(China),2007,24(1):122-127. 被引量:3
-
2Ahlswede R, Cai N, Li S-Y R, et al. Network information flow. IEEE Trans Inf Theory, 2000, 46:1204-1216.
-
3Ho T, Medard M, Koetter R, et al. A random linear network coding approach to multicast. IEEE Trans Inf Theory, 2006, 52:4413-4430.
-
4Li S-Y R, Yeung R W, Cai N. Linear network coding. IEEE Trans Inf Theory, 2003, 49:371-381.
-
5Yeung R W. Information Theory and Network Coding. Hong Kong: Springer, 2008.
-
6Jaggi S, Sanders P, Chou P A, et al. Polynomial time algorithms for multicast network code construction. IEEE Trans Inf Theory, 2003, 51:1973-1982.
-
7Koetter R, Medard M. An algebraic approach to network coding. IEEE/ACM Trans Network, 2003, 11:782-795.
-
8Lima L, Medard M, Barros J. Random linear network coding: A free cypher? In: Proc of the IEEE Inter Sym on Infor Theory, Nice. 2007. 546-550.
-
9Cai N, Yeung R W. Secure network coding. In: ISIT, Switzerland, 2002. 323.
-
10Cai N, Yeung R W. A security condition for multi-source linear network coding. In: Proc of the IEEE Inter Sym on Infor Theory, Nice. 2007. 24-29.
共引文献8
-
1郭网媚,蔡宁.卷积网络编码[J].中国电子科学研究院学报,2012,7(1):10-16. 被引量:1
-
2NIAN YongJian,WAN JianWei,TANG Yi,CHEN Bo.Near lossless compression of hyperspectral images based on distributed source coding[J].Science China(Information Sciences),2012,55(11):2646-2655. 被引量:7
-
3DONG Wei,CHEN LiQian.Recent advances on trusted computing in China[J].Chinese Science Bulletin,2012,57(35):4529-4532. 被引量:4
-
4张小红,张媛.基于纹理特征的H.264/AVC帧内预测模式快速选择算法[J].计算机工程与科学,2013,35(4):81-86. 被引量:2
-
5于明,朱超.利用半监督近邻传播聚类算法实现P2P流量识别[J].哈尔滨工程大学学报,2013,34(5):653-657. 被引量:6
-
6许进,王娟,邱宏茂,王晓明,李健,商杰.基于PKI/CA的数据服务安全系统研究[J].计算机工程与设计,2013,34(8):2995-3000. 被引量:4
-
7吕国亮,余保民.在1/2Z^+中的(F-Z_1)-可流拟阵(M-Z_1)/Z_2[J].数学的实践与认识,2013,43(17):195-199.
-
8ZENG Jianqiu,YANG Mengke.Internet Plus and Networks Convergence[J].China Communications,2015,12(4):42-49. 被引量:6