{"id":"https://openalex.org/W2024742876","doi":"https://doi.org/10.1145/1980022.1980377","title":"Comparison between conventional intraframe codec and Wyner Ziv Codec","display_name":"Comparison between conventional intraframe codec and Wyner Ziv Codec","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W2024742876","doi":"https://doi.org/10.1145/1980022.1980377","mag":"2024742876"},"language":"en","primary_location":{"id":"doi:10.1145/1980022.1980377","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1980022.1980377","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference &amp; Workshop on Emerging Trends in Technology - ICWET '11","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018979163","display_name":"S. Rajesh Bansode","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"S. Rajesh Bansode","raw_affiliation_strings":[""],"affiliations":[{"raw_affiliation_string":"","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008305963","display_name":"Sumita Rathi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sumita Rathi","raw_affiliation_strings":[""],"affiliations":[{"raw_affiliation_string":"","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111880699","display_name":"Shruti Patil","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shruti Patil","raw_affiliation_strings":[""],"affiliations":[{"raw_affiliation_string":"","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5018979163"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12426177,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1370","last_page":"1370"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/codec","display_name":"Codec","score":0.8635345697402954},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7913065552711487},{"id":"https://openalex.org/keywords/distributed-source-coding","display_name":"Distributed source coding","score":0.6546688079833984},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.5840689539909363},{"id":"https://openalex.org/keywords/low-density-parity-check-code","display_name":"Low-density parity-check code","score":0.5601309537887573},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.5305018424987793},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.49416831135749817},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.45948824286460876},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.41247400641441345},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.33426275849342346},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3227638006210327},{"id":"https://openalex.org/keywords/variable-length-code","display_name":"Variable-length code","score":0.28174859285354614},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.21036556363105774},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10159081220626831}],"concepts":[{"id":"https://openalex.org/C161765866","wikidata":"https://www.wikidata.org/wiki/Q184748","display_name":"Codec","level":2,"score":0.8635345697402954},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7913065552711487},{"id":"https://openalex.org/C200801453","wikidata":"https://www.wikidata.org/wiki/Q5283181","display_name":"Distributed source coding","level":4,"score":0.6546688079833984},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.5840689539909363},{"id":"https://openalex.org/C67692717","wikidata":"https://www.wikidata.org/wiki/Q187444","display_name":"Low-density parity-check code","level":3,"score":0.5601309537887573},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.5305018424987793},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.49416831135749817},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.45948824286460876},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41247400641441345},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33426275849342346},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3227638006210327},{"id":"https://openalex.org/C60603091","wikidata":"https://www.wikidata.org/wiki/Q2981616","display_name":"Variable-length code","level":3,"score":0.28174859285354614},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.21036556363105774},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10159081220626831},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1980022.1980377","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1980022.1980377","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference &amp; Workshop on Emerging Trends in Technology - ICWET '11","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4226159237","https://openalex.org/W2898530548","https://openalex.org/W2108244046","https://openalex.org/W4289366682","https://openalex.org/W2138256990","https://openalex.org/W2398906346","https://openalex.org/W2181300307","https://openalex.org/W1980293270","https://openalex.org/W2887343277","https://openalex.org/W2078058633"],"abstract_inverted_index":{"In":[0,91],"a":[1,5,16,71],"communication":[2],"network":[3],"consider":[4],"collection":[6],"of":[7,28,44,62,105,117,146],"(correlated)":[8],"source":[9,23,50,65,84],"nodes":[10,51,85],"that":[11,35,48,73,78],"need":[12],"to":[13,15,55,69],"communicate":[14,56,87],"common":[17],"sink":[18],"node,":[19],"then":[20],"the":[21,38,45,49,63,75,83,103,118,128,138],"distributed":[22,64],"coding":[24,66,122],"problem":[25,67],"is":[26,47,68],"one":[27,58,89,116],"design":[29,46,70],"system":[30,72],"(of":[31],"encoders":[32],"and":[33,97,158],"decoder)":[34],"optimally":[36],"compresses":[37],"correlated":[39],"sources.":[40],"The":[41,60],"key":[42],"aspect":[43],"are":[52,100,111,115,150],"not":[53],"allowed":[54],"with":[57,88,153],"another.":[59,90],"goal":[61],"approaches":[74],"optimal":[76],"performance":[77],"can":[79],"be":[80],"obtained":[81],"if":[82],"could":[86],"this":[92],"paper":[93],"conventional":[94],"Intraframe":[95],"codec":[96,99],"Wyner":[98,106],"compared.":[101],"For":[102],"implementation":[104],"Ziv":[107],"Codec":[108],"LDPC":[109,113,148],"codes":[110,114,147,149],"used.":[112],"hottest":[119],"topics":[120],"in":[121,127,137],"theory":[123],"today.":[124],"Originally":[125],"invented":[126],"early":[129],"1960's,":[130],"they":[131],"have":[132],"experienced":[133],"an":[134],"amazing":[135],"comeback":[136],"last":[139],"few":[140],"years.":[141],"Unlike":[142],"many":[143],"other":[144],"classes":[145],"already":[151],"equipped":[152],"very":[154],"fast":[155],"(probabilistic)":[156],"encoding":[157],"decoding":[159],"algorithms.":[160]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
