2 research outputs found

    Benford's law from 1881 to 2006

    Full text link
    On the occasion of the 125-th anniversary of Newcomb's paper, a bibliography of academic work related to Benford's law from its year of origin 1881 to 2006 has been compiled.Comment: 15 page

    Prefix Coding under Siege

    No full text
    A novel lossless source coding paradigm applies to problems of unreliable lossless channels with low bitrate, in which a vital message needs to be transmitted prior to termination of communications. This paradigm can be applied to Alfréd Rényi’s secondhand account of an ancient siege in which a spy was sent to scout the enemy but was captured. After escaping, the spy returned to his base in no condition to speak and unable to write. His commander asked him questions that he could answer by nodding or shaking his head, and the fortress was defended with this information. Rényi told this story with reference to traditional lossless prefix coding, in which the objective is minimization of expected codeword length. The goal of maximizing probability of survival in the siege scenario, however, is distinct from yet related to this traditional objective. Rather ∑ than finding a code minimizing expected codeword length n i=1 p(i)l(i), this variant involves maximizing ∑n i=1 p(i)θl(i) for a known θ ∈ (0,1). When there are no restrictions on codewords, this problem can be solved using a known generalization of Huffman coding. The optimal solution has coding bounds which are functions of Rényi entropy; in addition to known bounds, new bounds are derived here. The alphabetically constrained version of this problem has applications in search trees and diagnostic testing. A novel dynamic programming algorithm — based upon the oldest known algorithm for the traditional alphabetic problem — optimizes this problem in O(n 3) time and O(n 2) space, whereas two novel approximation algorithms can find a suboptimal solution faster: one in linear time, the other in O(n log n) time. Coding bounds for the alphabetic version of this problem are also presented
    corecore