The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

Precise Average Redundancy of an Idealized Arithmetic Coding

CERIAS TR 2002-13
Michael Drmota, Hsien-Kuei Hwang, Wojciech Szpankowski
Download: PDF

Redundancy is defined as the excess of the code length over the optimal (ideal) code length. We study the average redundancy of an idealized arithmetic coding (for memory less sources with unknown distributions) in which the Krichevsky and Trofimov estimator is followed by the Shannon-Fano code. We shall ignore here important practical implementation issues such as finite precisions and finite buffer sizes. In fact, our idealized arithmetic code can be viewed as an adaptive infinite precision implementation of arithmetic encoder that resembles Elias coding. However, we provide very precise results for the average redundancy that takes into account integer-length constraints. These findings are obtained by analytic methods of analysis of algorithms such as theory of distribution of sequences modulo 1 and Fourier series. These estimates can be used to study the average redundancy of codes for tree sources, and ultimately the context-tree weighting algorithms.

Added 2002-07-26

Improved Behaviour of Tries by the "Symmetrization" of the Source

CERIAS TR 2002-14
Yuriy A. Reznik and Wojciech Szpankowski
Download: PDF

In this paper, we propose and study a pre-processing technique for improving performance of digital tree (trie)-based search algorithms under asymmetric memory less sources. This technique (which we call a symmetrization of the source) bijectively maps the sequences of symbols from the original (asymmetric) source into symbols of an output alphabet resulting in a more uniform distribution. We introduce a criterion of efficiency for such a mapping, and demonstrate that a problem of finding an optimal for a given source (or universal) symmetrization transform is equivalent to a problem of constructing a minimum redundancy variable-length-to-block code for this source (or class of sources). Based on this result, we propose search algorithms that incorporate known (optimal for a given source and universal) variable-length-to-block codes and study their asymptotic behavior. We complement our analysis with a description of an efficient algorithm for universal symmetrization of binary memory less sources, and compare the performance of the resulting search structure with the standard tries.

Added 2002-07-26


Privacy Risks in Recommender Systems

Naren Ramakrishnan, Benjamin J. Keller, Batul J. Mirza, Anantha Y. Grama, George Karypis
Added 2002-07-26


Information Warfare

Peter Pace, Arthur K. Cebrowski

Information Warfare has emerged as a key joint warfighting mission area.  The explosive proliferation of of information-based technology significantly impacts warfighting across all phases, the range of military operations, and all levels of war.

Added 2002-07-26

Ensuring Successful Implementation of Commercial Items In Air Force Systems

SAB-TR-99-03
United States Scientific Advisory Board
Added 2002-07-26

A Platform Independent Computer Virus

Keith Allen McMillan

Some modern computer systems are subject to \“infection\” of their programs by reproducing computer viruses.  While it has been shown that detecting such a virus in general is an undecidable problem, there may be large classes of viruses against which effective defenses can be made.  Before an examination of the defenses is possible, a more complete catalog of the capabilities of viruses is necessary in order to determine if such classes exist.

Added 2002-07-26




Internet Security Handbook

S.W. Smith, G.G. Christoph
Added 2002-07-26