Paper Abstract and Keywords |
Presentation |
2005-05-27 09:30
Encoding Algorithms for 2 Dimensional Weak Run-Length-Limited Constraints Hiroshi Kamabe (Gifu Univ.) |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
Weakly constrained codes were introduced for constructing efficient encoding
algorithms with low complexities.
We introduce 2-dimensional(2-D) weak input constraints for 2-D
storage media.
We describe coding rules for 2 dimensional weak run-length-limited
constraints.
These rules can employ a technique from bit-stuffing algorithms. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Bit-stuffing / RLL constraint / 2 dimensional constraint / Weak constraint / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 105, no. 85, IT2005-22, pp. 1-6, May 2005. |
Paper # |
IT2005-22 |
Date of Issue |
2005-05-20 (IT) |
ISSN |
Print edition: ISSN 0913-5685 |
Download PDF |
|
Conference Information |
Committee |
IT |
Conference Date |
2005-05-25 - 2005-05-27 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Univ. of Hawaii |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
general |
Paper Information |
Registration To |
IT |
Conference Code |
2005-05-IT |
Language |
English |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
Encoding Algorithms for 2 Dimensional Weak Run-Length-Limited Constraints |
Sub Title (in English) |
|
Keyword(1) |
Bit-stuffing |
Keyword(2) |
RLL constraint |
Keyword(3) |
2 dimensional constraint |
Keyword(4) |
Weak constraint |
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Hiroshi Kamabe |
1st Author's Affiliation |
Gifu University (Gifu Univ.) |
2nd Author's Name |
|
2nd Author's Affiliation |
() |
3rd Author's Name |
|
3rd Author's Affiliation |
() |
4th Author's Name |
|
4th Author's Affiliation |
() |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2005-05-27 09:30:00 |
Presentation Time |
20 minutes |
Registration for |
IT |
Paper # |
IT2005-22 |
Volume (vol) |
vol.105 |
Number (no) |
no.85 |
Page |
pp.1-6 |
#Pages |
6 |
Date of Issue |
2005-05-20 (IT) |