1995
DOI: 10.1117/12.205389
|View full text |Cite
|
Sign up to set email alerts
|

<title>Pyramidal Riesz products associated with subband coding and self-similarity</title>

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

1996
1996
2006
2006

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 0 publications
0
8
0
Order By: Relevance
“…In this paper we shall not investigate the properties of measures stemming from the full n flexibility of their pyramidal structure, but essentially only for a constant sequence 1 = 2 = · · ·. However, for an arbitrary sequence { n }, the authors in [2] proved that there exists a continuous measure µ α ∈ M(T) which is a weak- * limit point of the sequence {P N }, and that µ α is absolutely continuous if and only if |α n | 2 < ∞.…”
Section: Pyramidal Constructionsmentioning
confidence: 98%
See 3 more Smart Citations
“…In this paper we shall not investigate the properties of measures stemming from the full n flexibility of their pyramidal structure, but essentially only for a constant sequence 1 = 2 = · · ·. However, for an arbitrary sequence { n }, the authors in [2] proved that there exists a continuous measure µ α ∈ M(T) which is a weak- * limit point of the sequence {P N }, and that µ α is absolutely continuous if and only if |α n | 2 < ∞.…”
Section: Pyramidal Constructionsmentioning
confidence: 98%
“…Proof. To simplify notation, we shall let α (1) = α, α (2) = β, P (1) n = P n (H, R, α) and P (2) n = P n (H, R, β). We shall use the functions H (R n−1 t) as our sequence of random variables H n , and singularity will be proven if we show that…”
Section: Preliminariesmentioning
confidence: 99%
See 2 more Smart Citations
“…This section attempts to outline the contemporary works which apply wavelets with either goal. For a purely mathematical perspective the work by Benedetto [2] provides a theoretical foundation for secure communication.…”
Section: Spread Spectrum and Covert Communicationsmentioning
confidence: 99%