Proceedings DCC'99 Data Compression Conference (Cat. No. PR00096) 1999
DOI: 10.1109/dcc.1999.755656
|View full text |Cite
|
Sign up to set email alerts
|

Multiple description decoding of overcomplete expansions using projections onto convex sets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0

Year Published

2000
2000
2014
2014

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 44 publications
(36 citation statements)
references
References 9 publications
0
36
0
Order By: Relevance
“…The second term describes the sum of pairwise squared distances (SPSD) between elements of the -tuples. In Section IV (Proposition 4.1), we show that, under a high-resolution assumption, the second term in (23) is dominant, from which we conclude that in order to minimize (21) we have to choose the -tuples with the lowest SPSD. These -tuples are then assigned to central lattice points in such a way, that the first term in (23) is minimized.…”
Section: Theorem 31: For We Havementioning
confidence: 99%
“…The second term describes the sum of pairwise squared distances (SPSD) between elements of the -tuples. In Section IV (Proposition 4.1), we show that, under a high-resolution assumption, the second term in (23) is dominant, from which we conclude that in order to minimize (21) we have to choose the -tuples with the lowest SPSD. These -tuples are then assigned to central lattice points in such a way, that the first term in (23) is minimized.…”
Section: Theorem 31: For We Havementioning
confidence: 99%
“…Reed-Solomon code is commonly used in practice for FEC packet-level recovery systems with delay constraints [29]- [31]. Fig.…”
Section: Fec For One Burst-loss Channelmentioning
confidence: 99%
“…The basic idea is to decorrelate the vector components and then to introduce again correlation between coefficients, but in a known and controlled manner, so that erased coefficients can be statistically estimated from those received. Techniques based on overcomplete frame expansions have been proposed in [6], [15], [21].…”
Section: Code Constructionsmentioning
confidence: 99%
“…That means that either the KLT or the filters in the filter bank have finite length . The FIR filters are designed using the numerical optimization presented in Section III-C. 6 The MDTC is the same shown previously except that the KLT operates on blocks of finite length . Bits are still allocated according to a single description allocation strategy and the MDSQs are designed such that the index assignment strategy is the same for each of the components.…”
Section: Low-rate Finite Delay/complexity Performancementioning
confidence: 99%