Search Results - "Sian-Jheng Lin"
-
1
An Encoding Algorithm of Triply Extended Reed-Solomon Codes With Asymptotically Optimal Complexities
Published in IEEE transactions on communications (01-08-2018)“…In this paper, we devise a fast encoding algorithm for triply extended Reed-Solomon codes. The proposed approach requires approximately two XORs per bit, which…”
Get full text
Journal Article -
2
FFT Algorithm for Binary Extension Finite Fields and Its Application to Reed-Solomon Codes
Published in IEEE transactions on information theory (01-10-2016)“…Recently, a new polynomial basis over binary extension fields was proposed, such that the fast Fourier transform (FFT) over such fields can be computed in the…”
Get full text
Journal Article -
3
Novel Polynomial Basis With Fast Fourier Transform and Its Application to Reed-Solomon Erasure Codes
Published in IEEE transactions on information theory (01-11-2016)“…In this paper, we present a fast Fourier transform algorithm over extension binary fields, where the polynomial is represented in a non-standard basis. The…”
Get full text
Journal Article -
4
A simplified variant of tabled asymmetric numeral systems with a smaller look-up table
Published in Distributed and parallel databases : an international journal (01-09-2021)“…Data storage is an indispensable part of data management system. Asymmetric numeral systems (ANS) is a widely used compression algorithm. A number of…”
Get full text
Journal Article -
5
A Rolling Hash Algorithm and the Implementation to LZ4 Data Compression
Published in IEEE access (2020)“…LZ77 is a dictionary compression algorithm by replacing the repeating sequence with the addresses of the previous referenced data in the stream. To find out…”
Get full text
Journal Article -
6
Novel Repair-by-Transfer Codes and Systematic Exact-MBR Codes with Lower Complexities and Smaller Field Sizes
Published in IEEE transactions on parallel and distributed systems (01-12-2014)“…The (n, k, d) regenerating code is a class of (n, k) erasure codes with the capability to recover a lost code fragment from other d existing code fragments. In…”
Get full text
Journal Article -
7
Symbol and Bit Mapping Optimization for Physical-Layer Network Coding with Pulse Amplitude Modulation
Published in IEEE transactions on wireless communications (01-08-2013)“…In this paper, we consider a two-way relay network in which two users exchange messages through a single relay using a physical-layer network coding (PNC)…”
Get full text
Journal Article -
8
Reducing the Bandwidth of Block Propagation in Bitcoin Network With Erasure Coding
Published in IEEE access (2019)“…With the popularity of Bitcoin, there is a greater demand for the scalability of the Bitcoin blockchain, which is susceptible to the efficiency of block…”
Get full text
Journal Article -
9
Mining Strategies for Completing the Longest Blockchain
Published in IEEE access (2019)“…Bitcoin is an innovative decentralized cryptocurrency that records transactions in a public log, termed the blockchain. Due to delays in the Bitcoin network,…”
Get full text
Journal Article -
10
A Unified Form of Exact-MSR Codes via Product-Matrix Frameworks
Published in IEEE transactions on information theory (01-02-2015)“…Regenerating codes represent a class of block codes applicable for distributed storage systems. The [n, k, d] regenerating code has data recovery capability…”
Get full text
Journal Article -
11
The Scalar Scheme for Reversible Information-Embedding in Gray-Scale Signals: Capacity Evaluation and Code Constructions
Published in IEEE transactions on information forensics and security (01-08-2012)“…Reversible information-embedding (RIE) is a technique transforming host signals and the message into the stego-signals, and the stego-signals can be losslessly…”
Get full text
Journal Article -
12
Energy Efficient Transmission over Space Shift Keying Modulated MIMO Channels
Published in IEEE transactions on communications (01-10-2012)“…Energy-efficient communication using a class of spatial modulation (SM) that encodes the source information entirely in the antenna indices is considered in…”
Get full text
Journal Article -
13
A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group
Published in IEEE transactions on information forensics and security (01-02-2012)“…The (t, n) visual cryptography (VC) is a secret sharing scheme where a secret image is encoded into n transparencies, and the stacking of any t out of n…”
Get full text
Journal Article -
14
A Class of In-Place Linear Transformations Possessing the Cache-Oblivious Property
Published in IEEE access (2019)“…In-place linear transformations allow input to be overwritten with the output of the transformation. This paper presents a family of in-place linear…”
Get full text
Journal Article -
15
New Space Shift Keying Modulation with Hamming Code-Aided Constellation Design
Published in IEEE wireless communications letters (01-02-2012)“…A modulation scheme that maps the information onto the antenna indices, such as space shift keying (SSK) and its generalized form (namely, generalized SSK or…”
Get full text
Journal Article -
16
An Efficient (n, k) Information Dispersal Algorithm for High Code Rate System over Fermat Fields
Published in IEEE communications letters (01-12-2012)“…The (n, k) information dispersal algorithm (IDA) is the art of converting a file into n pieces of shadows, and any k out of the n shadows suffice for…”
Get full text
Journal Article -
17
An Efficient (n,k) Information Dispersal Algorithm Based on Fermat Number Transforms
Published in IEEE transactions on information forensics and security (01-08-2013)“…The (n,k) information dispersal algorithm (IDA) is a coding technique converting a digital source file into n small digital files (shadows), and the receipt of…”
Get full text
Journal Article -
18
On the Minimum of the Expansion Factor for Universal Coding of Integers
Published in IEEE transactions on communications (01-11-2021)“…Universal coding of integers (UCI) is a prefix coding suitable for probability distributions without prior knowledge. UCI has the property that the expected…”
Get full text
Journal Article -
19
A Class of Rateless Reed-Solomon Codes With Near-Linear Computational Complexities
Published in IEEE transactions on communications (01-11-2024)“…This paper proposes a class of rateless Reed-Solomon (RLRS) codes with near-linear encoding/decoding complexities. Like fountain codes, the RLRS codes can…”
Get full text
Journal Article -
20
Reversible Data Hiding in Color Image With Grayscale Invariance
Published in IEEE transactions on circuits and systems for video technology (01-02-2019)“…Different from all the previous reversible data hiding schemes, a completely novel one for the color image is proposed, which reversibly embeds messages into…”
Get full text
Journal Article