#### Filter Results:

- Full text PDF available (102)

#### Publication Year

1962

2017

- This year (2)
- Last 5 years (24)
- Last 10 years (70)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- David S. Slepian, Jack K. Wolf
- IEEE Trans. Information Theory
- 1973

A new class of lower bounds to rate-distortion functions of<lb>stationary processes with memory and single-letter vector-valued distor-<lb>tion measures is derived. This class is shown to include or imply all other<lb>well-known lower bounds to rates of such sources and distortion measures.<lb>The derivation is based on the definition and properties of the… (More)

- Laura M. Grupp, Adrian M. Caulfield, +4 authors Jack K. Wolf
- MICRO
- 2009

Despite flash memory's promise, it suffers from many idiosyncrasies such as limited durability, data integrity problems, and asymmetry in operation granularity. As architects, we aim to find ways to overcome these idiosyncrasies while exploiting flash memory's useful characteristics. To be successful, we must understand the trade-offs between the… (More)

- Jack K. Wolf, Jacob Ziv
- IEEE Trans. Information Theory
- 1970

- Brian H. Marcus, Ron M. Roth, Paul H. Siegel, Silke Pless, W C Huuman, Jack K. Wolf
- 2000

13 encoded codewords. (C2) The codewords at addresses a and a + 2 8 should have diierent parities (of number of 1's). We use the following heuristic procedure to reorder the table so that these two conditions are satissed. Denote by x; y) a contiguous table portion that starts at address x and ends at address y?1 (inclusive). Starting with s = 000, we look… (More)

- Jack K. Wolf
- IEEE Trans. Information Theory
- 1978

It is shown that soft decision maximum likelihood decoding of any (n,k) linear block code over GF(q) can be accomplished using the Viterbi algorithm applied to a trellis with no more than q (n-k) states. For cyclic codes, the trellis is periodic. When this technique is applied to the decoding of product codes, the number of states in the trellis can be much… (More)

- Burt Masnick, Jack K. Wolf
- IEEE Trans. Information Theory
- 1967

It is possible for a linear block code to provide more protection against errors for selected mess~ge positions than is guaranteed by the minimum distance of the code. Codes having this property are called Linear Unequal Error Protection (LUEP) codes. In this report the optimal encoding of LUEP codes is discussed and bounds on the length of a code that… (More)

- Kees A. Schouhamer Immink, Paul H. Siegel, Jack K. Wolf
- IEEE Trans. Information Theory
- 1998

Constrained codes are a key component in the digital recording devices that have become ubiquitous in computer data storage and electronic entertainment applications. This paper surveys the theory and practice of constrained coding, tracing the evolution of the subject from its origins in Shannon’s classic 1948 paper to present-day applications in… (More)

- Toby Berger, Frederick Jelinek, Jack K. Wolf
- IEEE Trans. Information Theory
- 1972

- N. Thomas Gaarder, Jack K. Wolf
- IEEE Trans. Information Theory
- 1975

- Jack K. Wolf
- Cryptologia
- 1981