| Publication | Date of Publication | Type |
|---|
Rate Distortion Optimization: A Joint Framework and Algorithms for Random Access Hierarchical Video Coding IEEE Transactions on Image Processing | 2022-09-16 | Paper |
scientific article; zbMATH DE number 7478104 (Why is no real title available?) | 2022-02-22 | Paper |
scientific article; zbMATH DE number 7477989 (Why is no real title available?) | 2022-02-22 | Paper |
scientific article; zbMATH DE number 7478016 (Why is no real title available?) | 2022-02-22 | Paper |
On the Duality Between Slepian–Wolf Coding and Channel Coding Under Mismatched Decoding IEEE Transactions on Information Theory | 2017-08-08 | Paper |
On the Linear Codebook-Level Duality Between Slepian–Wolf Coding and Channel Coding IEEE Transactions on Information Theory | 2017-08-08 | Paper |
On the Redundancy of Slepian–Wolf Coding IEEE Transactions on Information Theory | 2017-08-08 | Paper |
Interactive Encoding and Decoding for One Way Learning: Near Lossless Recovery With Side Information at the Decoder IEEE Transactions on Information Theory | 2017-07-27 | Paper |
Linear Interactive Encoding and Decoding for Lossless Source Coding With Decoder Only Side Information IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Rate Distortion Theory for Causal Video Coding: Characterization, Computation Algorithm, and Comparison IEEE Transactions on Information Theory | 2017-07-12 | Paper |
On the Information Theoretic Performance Comparison of Causal Video Coding and Predictive Video Coding IEEE Transactions on Information Theory | 2017-05-16 | Paper |
scientific article; zbMATH DE number 6499855 (Why is no real title available?) | 2015-10-28 | Paper |
Acquisition of part-whole relations based on unsupervised learning | 2015-02-11 | Paper |
One-way Hash function construction based on chaotic message expansion | 2012-01-27 | Paper |
Improved efficiency of Kiltz07-KEM Information Processing Letters | 2010-08-20 | Paper |
Fast reduction for large-scale training data set | 2009-03-06 | Paper |
Authenticated group key agreement protocol with resistance to leakage of ephemeral secret DH exponents | 2009-03-06 | Paper |
An E-cash system for multiple banks based on restrictive proxy blind signatures | 2009-03-06 | Paper |
Efficient universal lossless data compression algorithms based on a greedy sequential grammar transform-part two: with context models IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Performance Analysis of Grammar-Based Codes Revisited IEEE Transactions on Information Theory | 2008-12-21 | Paper |
The Universality of Grammar-Based Codes for Sources With Countably Infinite Alphabets IEEE Transactions on Information Theory | 2008-12-21 | Paper |
scientific article; zbMATH DE number 5116586 (Why is no real title available?) | 2007-01-19 | Paper |
scientific article; zbMATH DE number 5081614 (Why is no real title available?) | 2007-01-04 | Paper |
scientific article; zbMATH DE number 5079720 (Why is no real title available?) | 2006-12-11 | Paper |
Offline e-cash system with finite circulation period based on an elliptic curve | 2006-11-27 | Paper |
scientific article; zbMATH DE number 5059264 (Why is no real title available?) | 2006-10-04 | Paper |
Fuzzy model for trust evaluation | 2006-05-26 | Paper |
The new design of the threaded binary trees International Journal of Computer Mathematics | 1994-07-03 | Paper |