Coding for Write{eecient Memory
نویسندگان
چکیده
We introduce write{eecient memories (WEM) as a new model for storing and updating information on a rewritable medium. There is a cost ' : X X ! R 1 assigned to changes of letters.
منابع مشابه
On Multi{user Write{eecient Memories
Continuing our earlier work on write{eecient memories (WEM) we introduce now models, where several persons use the same storage device. At any time instant exactly one of a prescribed set of users has access to the memory, but there is no protocol, which determines the moving order. Among the constraints we analyse the most interesting one is a complete privacy protection. While a user stores n...
متن کاملFast Locks in Distributed Shared Memory Systems
Synchronization and remote memory access delays cause staggering ineeciency in most shared memory programs if run on thousands of processors. This paper introduces eecient lock synchronization using the combination of group write consistency, which guarantees write ordering within groups of processors, and eagersharing distributed memory, which sends newly written data values over fast network ...
متن کاملMemory Eecient Scalable Line-based Image Coding
We study the problem of memory-eecient scalable image compression and investigate some tradeoos in the complexity vs. coding eeciency space. The focus is on a low-complexity algorithm centered around the use of sub-bit-planes, scan-causal modeling, and a simpliied arithmetic coder. This algorithm approaches the lowest possible memory usage for scalable wavelet-based image compression and demons...
متن کاملStorage Channels with Write Errors: Two-dimensional Magnetic Recording and Advanced Memory Systems
For emerging data storage systems, allowing errors during writing and correcting them by customized coding and signal processing during reading may provide higher customer densities than the conventional approach of trying to completely avoid write errors. Two high-density storage channels with write errors are investigated in this thesis; two-dimensional magnetic recording (TDMR) and advanced ...
متن کاملPrivate Information Storage
We consider the setting of hiding information through the use of multiple databases that do not interact with one another. In this setting, there are k 2 \databases" which can be accessed by some \users". Users do not keep any state information, but wish to access O(n) bits of \data". Previously, in this setting solutions for retrieval of data in the eecient manner were given, where a user achi...
متن کامل