Dynamic asymmetric communication
暂无分享,去创建一个
[1] Travis Gagie. Sorting a Low-Entropy Sequence , 2005, ArXiv.
[2] Donald E. Knuth,et al. Dynamic Huffman Coding , 1985, J. Algorithms.
[3] Peter Elias,et al. Universal codeword sets and representations of the integers , 1975, IEEE Trans. Inf. Theory.
[4] Travis Gagie,et al. Compressing probability distributions , 2005, Inf. Process. Lett..
[5] Robert E. Tarjan,et al. Self-adjusting binary search trees , 1985, JACM.
[6] Bruce M. Maggs,et al. Protocols for Asymmetric Communication Channels , 2001, J. Comput. Syst. Sci..
[7] C. E. SHANNON,et al. A mathematical theory of communication , 1948, MOCO.
[8] Eduardo Sany Laber,et al. Improved bounds for asymmetric communication protocols , 2002, Inf. Process. Lett..
[9] Ruy Luiz Milidiú,et al. Bounding the Compression Loss of the FGK Algorithm , 1999, J. Algorithms.
[10] Micah Adler. Collecting correlated information from a sensor network , 2005, SODA '05.
[11] Faith Ellen,et al. New Protocols for Asymmetric Communication Channels , 2001, SIROCCO.
[12] Jeffrey Scott Vitter,et al. Design and analysis of dynamic Huffman codes , 1987, JACM.
[13] Robert E. Tarjan,et al. A Locally Adaptive Data , 1986 .
[14] Kurt Mehlhorn,et al. A Best Possible Bound for the Weighted Path Length of Binary Search Trees , 1977, SIAM J. Comput..
[15] D. Huffman. A Method for the Construction of Minimum-Redundancy Codes , 1952 .
[16] Nick Feamster,et al. Thwarting Web Censorship with Untrusted Messenger Discovery , 2003, Privacy Enhancing Technologies.
[17] Travis Gagie,et al. Dynamic Shannon coding , 2004, Data Compression Conference, 2004. Proceedings. DCC 2004.
[18] Prosenjit Bose,et al. Asymmetric Communication Protocols via Hotlink Assignments , 2003, Theory of Computing Systems.
[19] Mohammad Ghodsi,et al. A New Protocol for Asymmetric Communication Channels: Reaching the Lower Bounds , 2001 .
[20] Winston Wang,et al. Implementation and Security Analysis of the Infranet Anti-Censorship System by Winston Wang , 2014 .
[21] Erik D. Demaine,et al. Lower bounds for asymmetric communication channels and distributed source coding , 2006, SODA '06.
[22] Nick Feamster,et al. Infranet: Circumventing Web Censorship and Surveillance , 2002, USENIX Security Symposium.
[23] E. F. Moore,et al. Variable-length binary encodings , 1959 .