2017
DOI: 10.1007/978-3-319-67428-5_4
|View full text |Cite
|
Sign up to set email alerts
|

LZ78 Compression in Low Main Memory Space

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…They also proposed an efficient hash-based trie representation in a similar way to m-Bonsai, which is referred to as FK-hash. 3 Although FK-hash uses O(t log σ + t log t) bits of space, its update algorithm is simple and practically fast. However, we are not aware of any space-efficient approach using them as keyword dictionaries.…”
Section: Theoretical Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…They also proposed an efficient hash-based trie representation in a similar way to m-Bonsai, which is referred to as FK-hash. 3 Although FK-hash uses O(t log σ + t log t) bits of space, its update algorithm is simple and practically fast. However, we are not aware of any space-efficient approach using them as keyword dictionaries.…”
Section: Theoretical Discussionmentioning
confidence: 99%
“…In both variants, we maintain a hash table H of size m with the load factor α = n/m ≤ 1 to store n nodes. In Section 4.3, we propose a linear-time growing algorithm based on Arroyuelo's approach [3]. Finally, in Section 4.4, we propose NLM data structures designed for PBT and CBT.…”
Section: Representation Based On M-bonsaimentioning
confidence: 99%
See 1 more Smart Citation
“…We wrote our code in C++17 and compiled it with gcc version 9.2.1 via the compile flags -O3 -march=native -DNDEBUG. We measured the number of allocated bytes with tudostats, 6 which overrides the standard memory allocation (new and malloc) to additionally monitor the maximum allocated memory during execution.…”
Section: Methodsmentioning
confidence: 99%
“…The pressure efficiency of these methods is limited up to their information entropy. Typical lossless data compression and reconstruction methods include Huffman coding [17], run-length coding [18], arithmetic coding [19], dictionary coding [20,21], and so on. The principles of them are referred to relevant references [17][18][19][20][21], which are not discussed here.…”
Section: Lossless Data Compression and Reconstruction Algorithmsmentioning
confidence: 99%