In this chapter we study the problem of dependent bit allocation. addressed in the literature so far has been conæned to coding environments where

Size: px
Start display at page:

Download "In this chapter we study the problem of dependent bit allocation. addressed in the literature so far has been conæned to coding environments where"

Transcription

1 105 Chapter 4 Optimal Bit Allocation for Dependent Quantization 1 Contents 4.1 Introduction : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Dependent coding problem formulation : : : : : : : : : : : : : : : : : Temporal dependency: the MPEG case : : : : : : : : : : : : : : : : : Buæer constrained allocation for dependent coders : : : : : : : : : : : Appendix: Proof of Theorem 1 : : : : : : : : : : : : : : : : : : : : : Introduction In this chapter we study the problem of dependent bit allocation. All the work addressed in the literature so far has been conæned to coding environments where the input signal units èe.g. image blocks or subbandsè have been coded independently. However, many popular schemes èe.g. DPCMè involve dependent coding frameworks, i.e. where the set of available RíD operating points for some coding units èfig. 1 Part of this work has been done jointly with Kannan Ramchandran. For related publications see ë85, 72,84,86ë

2 èbèè depends on the particular choice of RíD point for other coding units èfig. 4-1èaèè. Other dependent coding examples include multiresolution èmrè coders like the Laplacian spatial pyramid ë11ë and the closedíloop spatio-temporal pyramid video coder ë108ë, as well as the MPEG ë58ë coder. Refer to Fig. 4-2 for an overview of where dependent coding schemes æt into typical source coding environments. In this chapter ë85, 84, 86ë, we generalize the bit allocation problem to include temporally dependent coding blocks èsee ë85, 86ë for the case when dependent allocation in multiresolution scheme is consideredè. As in ë101ë, we make no assumptions about the input or quantizer characteristics, and deal with arbitrary input signals and arbitrary discrete admissible quantizer sets. An alternative, model-based, solution of the dependent bit allocation problem has been proposed in ë107ë. As seen from Fig. 4-1 for the twoíframe case, the number of possible operating points for each frame grows exponentially in the dependency tree depth, making the problem very diæcult in the general case èe.g. DPCMè. However, when the dependency tree is structured, as in MPEG, with several ëleaves" or ëterminal nodes" èe.g. B-frames of MPEG, as will be seen in Section 4.3è, then it is possible to solve the diæcult dependent problem elegantly, by describing how to formulate intelligent pruning rules to eliminate suboptimal operating points. Moreover, a number of important applications èlike CD-ROM storageè can aæord considerable oæ-line complexity,thus making our proposed approach relevant. This chapter is organized as follows: in Section 4.2, we provide a Lagrangianí based solution for an arbitrary set of quantizers for each coding block. We point out the complexity of this approach, and introduce a certain monotonicity property of the operational RíD curves of the signal blocks to help reduce the complexity of the search for the optimal solution. We address the temporally dependent coding scheme in detail in Section 4.3 using MPEG as an example, and show how the monotonicity

3 107 property introduced earlier can be used to formulate fast heuristic solutions. In Section 4.4, we brieæy outline how these techniques could be extended to include buæer constraints as well. 4.2 Dependent coding problem formulation In this section, we deæne a general dependent allocation problem, show how this general formulation is applicable to MPEG and multiresolution coders, and give a solution based on Lagrange multipliers. Before we introduce the dependent coding problem, let us review the optimal independent allocation case which has been studied in the literature ë50, 101, 113ë and which was used in Chapter 2. The formulation is reviewed here for convenience and also to introduce a notation that is more adequate for the speciæc problems discussed in this chapter Optimal independent allocation í the constant slope condition The classical rateídistortion optimal bit allocation problem consists of minimizing the average distortion D of a collection of signal elements or blocks subject to a total bit rate constraint R budget for all blocks. For the two-block case, where fq1;r1èq1è;d1èq1èg and fq2;r2èq2è;d2èq2èg refer to the quantizer, distortion and bit rate of each block respectively, the independent allocation problem is: min ëd1èq1è+d2èq2èë Q 1 ;Q 2 è4.1è such that R1èQ1è+R2èQ2èçR budget : è4.2è The ëhard" constrained optimization problem of è4.1è,è4.2è can be solved by being converted to an ëeasy" equivalent unconstrained problem. This is done by ëmerging"

4 108 rate and distortion through the Lagrange multiplier ç ç 0 ë101ë, and ænding the minimum Lagrangian cost J i èçè = min Qi ëd i èq i è+çr i èq i èë for i =1;2. The search for the optimal RíD operating points for each signal block can be done independently, for the æxed quality ëslope" ç èwhich trades oæ distortion for rateè because at RíD optimality, all blocks must operate at a constant slope point ç on their RíD curves ë101, 87ë. The desired optimal constant slope value ç æ is not known a priori and depends on the particular target budget or quality constraint, but can be obtained via a fast convex search ë87ë. See Section for more details General formulation In the more general case, signal units may not be independently coded. Without loss of generality,we ærst consider a 2-level dependency as in Fig Shown are the RíD characteristics for a given discrete set of quantization choices for the ærst independent frame èr1èq1è;d1èq1èè and the second dependent frame èr2èq1;q2è;d2èq1;q2èè. Our constrained optimization problem is: what quantization choice do we use for each frame such that the total èor averageè distortion is minimized subject to a maximum total bit budget constraint? We model the total distortion as a weighted average of the individual distortions D1 and D2 in our general formulation. We will show how diæerent choices of the weights lead to diæerent problems of interest. Our problem can be formulated as: min ëw1d1èq1è+w2d2èq1;q2èë è4.3è Q 1 ;Q 2 such that R1èQ1è+R2èQ1;Q2èç R budget : è4.4è Note that although Q1 and Q2 here represent frameílevel quantization choices, it does not imply that all blocks within the frame have the same quantization scale.

5 109 Thus Q1 could consist of a vector choice of diæerent quantization scales for each block of frame 1. Also note that for arbitrary choices of w1 and w2, wehaveaweighted mean-squared-error èmseè criterion, which reduces to the conventional èunweightedè MSE measure when w1 = w2 =1. D 1 3 D 2 Slope =λ J 2 (3,2) J 2 (2,2) Slope =λ J 1 (2) 2 J 2 (1,2) 1 R 1 R 2 (a) (b) Figure 4-1: Operational R-D characteristics of 2 frames in a dependent coding framework, where frame 2 depends on frame 1. èaè Independent frame's R-D curve. èbè Dependent frame's R-D curves. Note how each quantizer choice for frame 1 leads to a diæerent R2, D2 curve. The Lagrangian costs shown are J = D + çr for each frame Examples We now provide examples of problems of interest which follow as special cases of è4.3è,è4.4è. See Fig. 4-2.

6 Figure 4-2: Overview of typical source coding environments. Example 1. Independent coding: The independent case seen in Section is a special case of è4.3è,è4.4è, where frame 2 does not depend on frame 1, i.e. R2èQ1;Q2è = R2èQ2è and D2èQ1;Q2è = D2èQ2è. The independent coding case arises for intraframe coding as well as pyramidal coding without quantization feedback ë11, 85, 86ë. This was also the situation considered throughout Chapter 2. Example 2. Spatially dependent pyramid coding with quantization feedback: When w1 = 0;w2 = 1,wehave the case of a two-layer closed loop èquantization feedbackè pyramid, where the bottom layer èlayer 2è depends on the quantization choice of the top layer èlayer 1è ë85, 86ë. Note that è4.4è refers to a total bit rate constraint, and we solve the fullíresolution quality optimization problem only. In

7 111 addition, for a multiresolution coding environment, it may be necessary to throw in additional constraints on the top layer bit rate ë11, 85, 86ë: R1èQ1è ç R 0 1 ; è4.5è or quality D1èQ1è ç D 0 1 : è4.6è Example 3. Temporally dependent coding: This is the most general case where è4.3è,è4.4è apply without any restrictions. DPCM and MPEG come under this class Solution based on Lagrange multipliers The problem of è4.3è,è4.4è can be solved by introducing the Lagrangian cost J corresponding to the Lagrange multiplier ç ç 0 as in ë101ë as follows: J1èQ1è = w1d1èq1è+çr1èq1è; è4.7è J2èQ1;Q2è = w2d2èq1;q2è+çr2èq1;q2è; è4.8è and considering the following unconstrained minimization problem: min Q 1 ;Q 2 ëj1èq1è+j2èq1;q2èë: è4.9è Then, by a direct extension of Theorem 1 of Shoham and Gersho in ë101ë, the following result follows: Theorem 4.1 If èq æ 1 ;Qæ 2è solves the unconstrained problem of Eq. è4.9è, then it also solves the constrained problem of Eqs. è4.3è, è4.4è for the particular case of R budget = ër1èq æ 1è+R2èQ æ 1 ;Qæ 2èë.

8 112 Proof: See Appendix 4.5. The above result implies that if we solve the unconstrained problem of è4.9è for a æxed value of ç, and if the total bit rate happens to be R budget, then we have also optimally solved the constrained optimization problem of è4.3è, è4.4è. Further, as ç is swept from 0 to 1, one traces out the convex hull of the composite RíD curve of the dependent allocation problem. The monotonic relationship between ç and the expended bit rate ë101ë makes it easy to search for the ëcorrect" value of ç, sayç æ, for a desired R budget. Note how for the independent case èj2èq1;q2è=j2èq2èè, where there is a single R2, D2 curve in Fig. 4-1, è4.9è becomes the familiar result of ë101ë èsee also Chapter 2è. Here, each frame is minimized independently, aswas shown in Section For the general dependent case, the 2-frame problem becomes the search for Q æ 1 ;Qæ 2 that solve: J1èQ æ 1è+J2èQ æ 1 ;Qæ 2è = min Q 1 ;Q 2 ëj1èq1è+j2èq1;q2èë è4.10è = min Q 1 ëj1èq1è+j2èq1;q æ 2èQ1èèë; è4.11è where J2èQ1;Q æ 2èQ1èè = min Q2 ëw2d2èq1;q2è+çr2èq1;q2èë is the minimum Lagrangian cost èfor quality condition çè associated with the dependent frame when the independent frame is quantized with Q1. See Fig Thus, for the desired operating quality ç, we ænd the optimal solution by ænding, for all choices of Q1 for the independent layer, the optimal èq æ 2èQ1èè which ëlives" at absolute slope ç on the èdependentè R2íD2 curve associated with Q1. The important point to note is that here we cannot treat each of the blocks separately as in Section and thus minimizing è4.9è actually requires, if no further assumptions are made, an exhaustive search for the minimal lagrangian for

9 113 all possible combinations of Q1;Q2. Fig. 4-3 shows an example where a greedy choice of quantizer for the ærst frame, i.e. choosing the quantizer that minimizes J1èQ1è would have resulted in overall suboptimality. In general we will have that: min ëj1èq1è+j2èq1;q2èë 6= minëj1èq1èë + minëj2èq æ Q 1 ;Q 2 1 ;Q 2èë Q 1 Q 2 where Q æ 1 = arg min Q1 ëj1èq1èë. D 1 D 2 J 1 (1) Slope =λ Slope =λ 3 J 2 (2,2) J 1 (2) 2 1 J 2 (1,2) R 1 R 2 J 1 (2) < J 1 (1) BUT J 1 (1) + J 2 (1,2) < J 1 (2) + J 2 (2,2) Figure 4-3: Example of search for the minimal ç. Choosing quantizer 2 would be optimal if only the ærst frame were considered. However choosing quantizer 1 for frame 1 is better overall because the gain for frame 2 compensates the suboptimality for frame 1. By a simple extension of Theorem 4.1, it follows that the optimal solution to our general Níframe dependency problem consists in introducing J i èq1;q2;:::;q i è= w i D i èq1;q2;:::;q i è+çr i èq1;q2;:::;q i è for i =1;2;:::;N and solving the fol-

10 114 lowing unconstrained problem for the ëcorrect" value of ç which meets the given R budget : min Q 1 ;Q 2 ;:::;Q N ëj1èq1è+j2èq1;q2è+:::j N èq1;q2;:::;q N èë: è4.12è Complexity The optimal solution, as shown by è4.12è is obviously exponentially complex in the dependency-tree depth N. Moreover, it has to be pointed out that the computational complexity is dominated by the data generation phase, i.e. ænding all the èr i èq1;q2;:::;q i è;d i èq1;q2;:::;q i èè points for the problem is much more complex than ænding the optimal solution, given all the possible RíD operating points. The complexity comes from the fact that, contrary to the situation in the independent case, the RíD characteristic for a given block is a function of choices of quantizers for previous blocks and thus an exponentially growing èin the depth of the dependencyè number of possible solutions has to be considered. In order to ease this computational burden, we are therefore interested in methods which will avoid the need to grow all the RíD data, while retaining optimality. We now examine an important property which enables us to do this, and which will be used in Section 4.3 to formulate pruning conditions to eliminate suboptimal choices in the MPEG allocation problem. Note that while our methods rely on generating ëreal" RíD data, a model-based approach may be used within our framework to reduce the complexity. For instance, one could measure some of the R-D points and the extrapolate the R-D values for the others.

11 Monotonicity The key to obtaining a fast solution to the complex dependent allocation problem of è4.3è,è4.4è is the monotonicity property of the RíD curves of the dependent components èframesè. Consider the example of 2 frames, with the operational RíD curve of the second frame depending on that of the ærst, as in Fig Assume that the quantizer grades are ordered as monotonically increasing from ænest to coarsest. Let us use i and j to denote the quantization choices for the independent and dependent frames, respectively. Thus, using our convention, iéi 0 denotes that quantizer i is æner than quantizer i 0. Deænition 4.1 A dependent coding system has the monotonicity property if, for any ç ç 0: J2èi; jè ç J2èi 0 ;jè; for i ç i 0 : è4.13è For example, for ç = 0, this means that D2èi; jè ç D2èi 0 ;jè; for i ç i 0 : è4.14è Stated in words, the monotonicity condition simply implies that a ëbetter" èi.e. æner quantizedè predictor will lead to more eæcient coding, in the rate-distortion sense, of the residue èwhose energy decreases as the predictor quality gets betterè. That is, the dependent frame's family of R-D curves will be monotonic in the æneness of the quantizer choice associated with the parent frame from which they are derived. As can be seen, the æner the quantization for frame 1 èfig. 4-1èaèè, the closer to the origin of the R2, D2 graph will be the corresponding curve for the dependent frame 2 èfig. 4-1èbèè. Experimental results involving MPEG verify this monotonicity property for all the cases that we studied. Thus, monotonicity appears to be a realistic

12 116 property, which has favorable theoretical implications as well, and it can be used to formulate fast pruning conditions for the MPEG allocation problem in Section Temporal dependency: the MPEG case We now address the general temporal dependency quantization problem of which MPEG ë58ë is an example. The MPEG coding format, a CCITT video compression standard, shown in Fig. 4-4, segments the video sequence into groups-of-pictures ègop'sè. Each GOP consists of three types of frames using the intraframe èiè, prediction èp è and bidirectionallyíinterpolated èbè modes of operation. The I frames are coded independently, the P frames are predicted from the previous I or P, and the B frames are interpolated from the previous and next I andèor P frames. For the 2-frame dependency illustrated in Fig. 4-1, the problem we are trying to solve èfor an MSE criterionè is the problem of è4.3è,è4.4è with w1 = w2 =1: min Q 1 ;Q 2 ëd1èq1è+d2èq1;q2èë s:t: R1èQ1è+R2èQ1;Q2èçR budget : The solution to this problem was shown in Section as being exponentially complex in the dependency tree depth. Here, we will show how to reduce this complexity for the MPEG coding case èsee Fig. 4-4è. Before we tackle the general MPEG problem èwith I,P and B framesè, we begin with a simpler special case of MPEG that is easier to analyze and which provides the intuition for the more complex general problem A particular case of MPEG: I-B-I We consider a special case of MPEG having only I and B frames èsee Fig. 4-5è, i.e. the predicted P frames of the more general MPEG format are omitted. The

13 Figure 4-4: Typical MPEG coding framework. èaè The MPEG frames: the I frames are independently coded, the P frames are predicted from previous I or P frames, and the B frames are interpolated from adjacent I andèor P frame pairs. èbè Temporal dependency in the MPEG framework. Note that the B frames are leaves in the dependency tree, since no prediction is generated using them. dependency tree is shown in the more compact form of a trellis. The ëstates" of the trellis represent the quantization choices for the independently coded I frames èordered from top to bottom in the direction of ænest to coarsestè, while the ëbranches" denote the quantizer choices associated with the two B frames. The trellis is populated with Lagrangian costs èfor a æxed çè associated with the quantizers for each frame. Let us focus on the I1, B1, B2, I2 stage of the trellis. The state nodes are populated with the costs of the respective I frame quantizers J èqè = èdèqè + çrèqèè. Each èi; jè branch connecting quantizer state i of I1 to quantizer state j of I2 is populated with the sum of the minimum Lagrangian costs

14 Figure 4-5: The I-B-I special case of MPEG. Finding an R-D convex hull point corresponding to a ç is equivalent to ænding the smallest cost path through the trellis. Each trellis node corresponds to a quantizer choice for the I frames, monotonically ordered from ænest to coarsest, and is populated with the associated Lagrangian cost èj èiè = Dèqè + çrèqèè. The branches correspond to the B frame pairs, and are populated with their minimum Lagrangian costs èj èbè = minëdèqè+çrèqèëè for the particular I frame quantizer choices given by each branch's end nodes. For quality slope ç, the optimal total cost path is obtained with the Viterbi algorithm. The ëdark line" path joins the smallest cost I frame nodes. Monotonicity implies that all dashed line paths can be pruned out. of the B1 and B2 frames, i.e. with JèB1è+JèB2è, where: JèB l è = min Q Bl ëdèq Bl è+çrèq Bl èë for l =1;2 è4.15è where the R-D curves for B1; B2, are generated from the i; j quantizer choices for I1;I2 respectively. From è4.12è, it is clear that the optimal path is that which has the minimum total cost across all trellis paths. Since the independent I frames ëdecouple" the B frame pairs from one another, it is obvious that the popular Viterbi

15 119 algorithm èvaè ë34ë will provide the minimum cost path through the trellis, i.e. we need to keep a single path èthe minimum cost oneè arriving at each node. More formally,wehave the following algorithm for the I1, B1, B2, I2 stage of the trellis: Algorithm 4.1 Step 1 : Generate J èi1è and J èi2è for I-frames I1 and I2 for all quantizers in Q I1 ;Q I2 respectively, i.e. populate all the nodes of the trellis with the Lagrangian costs. Step 2 :For every pair of nodes èi; jè, where i and j are the quantizer choices for I1 and I2 respectively, assign branch cost JèB1è+JèB2è where JèB l è for l =1;2 are obtained from è4.15è, i.e. populate all the branches of the trellis with the minimum Lagrangian costs. Step 3 èva pruning ruleè: At every node of I2, keep only that branch which minimizes J èi1è+j èb1è+j èb2è. As noted in Section 4.2.5, the computational complexity is dominated by the data generation phase, i.e. in the trellis population phase Pruning conditions implied by monotonicity The monotonicity condition stated earlier in Section will now be used to formulate pruning conditions to eliminate suboptimal operating points in the temporal dependency coding problem. The ærst lemma is associated with Fig. 4-6èaè. As a reminder, the quantizer states are ranked in a monotonically increasing order from ænest to coarsest. Lemma 4.1 If J1èiè+J2èi; jè éj1èi 0 è+j2èi 0 ;jè for any iéi 0 ; è4.16è

16 Figure 4-6: Pruning conditions obtained from monotonicity. èaè J1èi2è + J2èi2;jè is the minimum Lagrangian cost of all branches terminating in node j. Therefore èsee Lemma 1è, the èi3;jè branch can be pruned. èbè J2èi; j1èè is the minimum Lagrangian cost of all branches originating from node i. Therefore èsee Lemma 2è, the èi; j2è and the èi; j3è branches can be pruned. ècè Diagram used for the proof of Lemma 1.

17 121 then the èi 0 ;jè branch cannot be part of the optimal path and can be pruned out. Proof: We prove the lemma by contradiction. Assume that èi 0 ;jè for any iéi 0 is part of the optimal path èsee Fig. 4-6ècèè and let the optimal quantizer sequence path be èi 0 ;j;k;:::;lè. But, by monotonicity, wehave: J3èi; j; kè ç J3èi 0 ;j;kè è4.17è æææ J L èi;j;k;:::;lè ç J L èi 0 ;j;k;:::;lè è4.18è Summing up Eqs. è4.16è, è4.17è, :::, è4.18è, we get the contradiction that the total Lagrangian cost of the path èi;j;k;:::;lè is smaller than that of the optimal path èi 0 ;j;k;:::;lè. 2 The above lemma is associated with pruning branches that merge into a common destination state. A dual result holds for the pruning of branches that originate from a common source state èsee Fig. 4-6èbèè leading to the following companion Lemma 2, whose proof is omitted as it is similar to that of Lemma 1: Lemma 4.2 If J2èi; jè éj2èi; j 0 è for any j é j 0 ;then the èi; j 0 è branch cannot be part of the optimal path and can be pruned out. Note that a consequence of the above lemma is that if J1èiè éj1èi 0 è for iéi 0, then the state node i 0 èand all branches from itè can be pruned out. The two pruning conditions of Lemmas 1 and 2 can be used to lower the complexity of the VA-based search. In the special case of MPEG of Section èrefer to Fig. 4-5è, Lemmas 1 and 2 eliminate the need to consider the full trellis on which to run the VA, making

18 Figure 4-7: General MPEG ëtrellis" diagram extension of Fig. 3. Here, the inclusion of the P frames prevents the decoupling of the B frame pairs, and the entire tree has to be grown. Note that each stage of the trellis is represented by ëvector" branches whose dimension grows exponentially with the dependency tree depth General MPEG bit allocation Having established the intuition behind dependent allocation and the power of monotonicity,wenowevolve to the more complex ègeneralè MPEG format of Fig The presence of the P frames extends the dependency tree depth, and the decoupling between successive stages of the trellis is lost. We can thus no longer resort to the

19 123 Viterbi algorithm, but must instead retain the entire tree, which grows exponentially with the number of dependent levels èalthough only until a new I frame is transmitted, so that the complexity may still be manageable.è The good news, however, is that the monotonicity conditions still apply, and the pruning conditions of Lemmas 1 and 2 can aid in reducing complexity dramatically. As an example, see Fig. 4-8 where we consider an I-B-P -B-P sequence of MPEG frames ènote that for simplicity, we use only one B-frame between I-P pairsè and a choice of 3 quantizer grades for each frame. More formally, the algorithm used is the following èrefer to Figs. 4-7 and 4-8è: Algorithm 4.2 Step 1 : Generate JèIè for all quantizers q 2 Q I.See Fig. 4-8èaè. Step 2 : èmonotonicityè Prune out all I-nodes lying below minimum cost node q æ 2 Q I in Step 1. Step 3 : Grow JèI;P1è for all combinations of q 2 Q P1 and all remaining q 2 Q I after Step 2. See Fig. 4-8èbè. Step 4 : èmonotonicityè Use pruning conditions of Lemmas 1 and 2 to eliminate suboptimal I, P1 combinations. See Fig. 4-8èbè. Step 5 : For every surviving I, P1 combination, ænd the B1;B2 quantizer pair that minimizes J èb1è +J èb2è, i.e. populate the branch costs of the trellis of Fig See Fig. 4-8ècè. Step 6 : èmonotonicityè Use pruning conditions of Lemmas 1 and 2 to eliminate suboptimal I, B1, B2, P1 combinations. See Fig. 4-8ècè. Step 7 : For all remaining paths, repeat Steps 3 to 6 for the èp1, B3, B4, P2è and the èp2, B5, B6, Iè sets.

20 124 The smallest cost path after running Algorithm 4.2 is the optimal solution corresponding to the chosen ç for the group-of-pictures considered. While the exhaustive search would have us grow as many as 363 Lagrangian costs, in our example, only 36 costs need to be grown, an order of magnitude reduction in complexity with no loss of optimality if the monotonicity conditions apply èin our example, application of Algorithm 4.2 for ç = 10 provides an optimal RíD operating point í db at 1bppíaswas veriæed through exhaustive searchè. The complexity reduction due to monotonicity is dependent on the desired quality slope ç, with higher quality targets achieving better reduction. In the limit, as ç goes to 0, the minimum cost path is always the one corresponding to the ænest quantizers and thus only a single ëhighest quality" path has to be grown. Conversely, ifçgoes to 1 the monotonicity property provides no gain. Thus one should not resort to the convex search techniques described in Section and would have to use instead search strategies which start with smaller values for ç and increase it until a solution is reached Suboptimal heuristics As pointed out, the amount to which the monotonicity property can be exploited is ç-dependent, and may not suæce for some applications. To this end, it is advisable to come up with fast heuristics, which, used in combination with monotonicity, can approach the optimal performance at a fraction of the complexity. In trying to formulate a fast MPEG heuristic, it is necessary to consider some important points: èiè the ëanchor" I-frame is the most important of the group of pictures and must not be compromised, èiiè most signal sequences enjoy a ænite memory property, where the inæuence of a parent frame diminishes with the level of its dependency. Thus, it may paytochoose èonlyè the lowest cost nodes for all frames except the I-frame, for which we retain all nodes remaining after applying monotonicity-based

21 125 pruning. Thus, a single path is grown from each of these admissible I-frame nodes, whereas in the general case, a whole tree evolves from each such node. Based on this, we propose the following heuristic: èiè retain all paths that originate from each of the I-frame quantization states remaining after the monotonicity-based pruning, i.e. it is not prudent to be greedy for the I-frame, as a greedy error aæects all dependent frames derived from it; èiiè use a ëgreedy" pruning condition èin combination with the monotonicity propertyè to keep only the lowest cost branch thus far at all other stages in the trellis. That is, we follow Algorithm 4.2, except that we add an extra pruning condition in Steps 4 and 6, where we retain only a single èminimum costè path corresponding to every surviving I-frame node. This heuristic, as shown in Fig. 4-9, leads to near optimal performance at a fraction of the computational cost. For the example of Figs. 4-8 and 4-9, the optimal solution for a particular ç gives db at 1 bpp, while the heuristic achieves db at 0.97 bpp, certainly very close to optimality. Unlike Algorithm 4.2, which relies on monotonicity pruning conditions only and which works best when ç is low èhigh qualityè, the fast heuristic retains low complexityeven at high values of ç. Note how choosing the greedy solution for the I-frame èbottom-most nodeè would have given a much worse performance Discussion We have shown a method to ænd the optimal bit allocation strategy for an MPEG coding framework, assuming arbitrary quantizer sets for each MPEG frame. Although our scheme can be computationally complex, it can serve as an optimal benchmark to evaluate more practical allocation strategies. Also, model-based approaches èe.g. measuring one RíD point and using a model-based extrapolation to ænd other pointsè can be combined with our techniques to ease the computational burden. Note that since MPEG coders are typically buæered with a buæer size of the order of a group-

22 Figure 4-8: Tree pruning using the monotonicity property èlemmas 1,2è. The numbers are the cumulative Lagrangian costs for a typical example for ç = 10. Branches pruned at each stage are shown with dashed lines. In this example, the number of RíD points generated is cut down from 363 èexhaustiveè to only 36 with no loss of optimality. 4.4 Buæer constrained allocation for dependent coders In Chapter 2 we dealt with the problem of allocating bits among diæerent signal blocks when the sequence of blocks had to be transmitted with ænite end-to-end delay, i.e. we had an allocation problem with the constraint that the encoder buæer did not overæow. In Chapter 2, however, we had assumed that the blocks to be quantized were coded independently èin an MPEG environment this would mean

23 Figure 4-9: Tree pruning using monotonicity as well as a ëgreedy" heuristic for the same conditions as those of Fig. 6. The number of R-D points generated is now 24, at a slight loss of optimality ètotal Lagrangian cost is versus optimal cost of 77.24è. only I frames are usedè so that our solution there would not be applicable to the dependent environments discussed in this chapter. Here we outline how the solution of Section can be modiæed to account for the buæer constraint. Given the rate and distortion èr and D, resp.è for each frame and calling Bèiè the buæer occupancy after coding frame i, our buæer control problem is that of ænding the quantizer choice èq1;:::;q N è to: NX NX minè D i èq1;:::;q i èè s:t: èiè R i èq1;:::;q i èçn ær = R budget è4.19è i=1 i=1 èiiè Bèiè ç B max ; 8i: è4.20è Obviously, without the buæer constraint of èiiè, our problem reduces to the dependent bit allocation studied in Section There, the minimization of the corresponding Lagrangian cost P J i èq1;:::;q i è for each block was formulated as the

24 128 search for the minimum Lagrangian cost path in a trellis, where the states represent the possible quantizers for each frame èsee Fig. 4-7è. The search can be sped up by resorting to heuristics based on the monotonicity property to prune out suboptimal branches. When constraint èiiè is considered, not all solutions obtained using the algorithms of Section will be feasible due to overæow. However, if we add to the trellis pruning rules a new rule which eliminates paths that overæow, the resulting algorithm will provide the optimal solution to è4.19è and è4.20è, within a convex hull approximation. More formally, we grow all the solutions as in Section where each branch, associated with P a given quantizer selection, èq1;:::;q i è, will have associated a Lagrangian cost J i èq1;:::;q i è and a buæer state, Bèiè =maxèbèi, 1è + R i èq1;:::;q i è,r;0è: Thus, on top of the pruning rules described in Section 4.3.2, we will prune out any branch such that Bèiè é èb max, rè. The one parameter that remains to be set is the initial buæer state. Typically, since regardless of the coding environment the ærst frame in the sequence will be coded in Intra mode èand thus will very likely require a number of bits above the channel rateè, we can assume that Bè0è = 0 so that the buæer is initially empty. If we focus speciæcally in an MPEG environment, we can consider a group of pictures ègopè and compute the allocation so that the initial and ænal buæer states are both zero. In this manner we can decouple the buæer constrained allocation for consecutive GOPs. The P above described method requires, in order to solve the problem, that a ç such that R i èq æ 1 ;Qæ 2 iè=nærbe found. The pruning rules based on monotonicity ;:::;Qæ are more eæcient for small values of ç èi.e. high bit rateè and, similarly, smaller ç's will result in more overæowing paths. Thus it is reasonable to initialize ç to a ësmall"

25 129 value and then, to ænd the optimal solution, increase ç until the target rate is met. Solutions that were discarded because of overæow for a given ç do not have tobe reconsidered for a diæerent ç. This algorithm leaves also room for fast approximations based on heuristics. For example, assume that Q1 = q is æxed and consider the resulting R-D characteristic, i.e. the set of all points è P R i ; P D i è for which Q1 = q. Then, if the point corresponding to èq; Q2;:::;Q N è lies on the convex hull of the the R-D characteristic generated with Q1 = q we have found that typically èq 0 ;Q2;:::;Q N è will also lie on the convex hull of the R-D characteristic obtained when setting Q1 = q 0.Thus after studying the R-D characteristic for a particular value Q1 = q one can extrapolate which combinations for èq2;:::;q N è are likely to be suboptimal for any Q1 and therefore reduce the search to those that are likely to be ëgood". To summarize, in this section we have described some initial results for a deterministic rate control for MPEG encoders. The optimal solution can be found with slight modiæcations of the algorithm that solves the unconstrained problem. Further work should focus on exploring more ways of reducing the complexity of the search by exploiting the structure of the R-D data through the use of heuristics. 4.5 Appendix: Proof of Theorem 1 Note that in the proof, in the interest of notation brevity, we omit the explicit dependence of D1;R1;J1 and D2;R2;J2 on Q1 and Q2; i.e. we use J1 = J1èQ1è;D1 = D1èQ1è;R1 = R1èQ1è and J2 = J2èQ1;Q2è;D2 = D2èQ1;Q2è;R2 = R2èQ1;Q2è, and similarly for the optimal quantizers Q æ 1 and Q æ 2. Then, for all Q1;Q2,wehave from the unconstrained minimization: J æ 1 + J æ 2 ç J 1 + J2: è4.21è

26 130 i.e., D æ 1 + çræ 1 + Dæ 2 + çræ 2 ç D 1 + çr1 + D2 + çr2: è4.22è or, ëd æ 1 + D æ 2ë, ëd1 + D2ë ç çèër1 + R2ë, ër æ 1 + R2æëè: è4.23è Since è4.23è holds for all admissible fq1;q2g, it certainly holds for the subset of fq1;q2g for which ër1+r2ëçr budget, where R budget =ër æ 1+R æ 2ë. Therefore, from è4.23è, since ç ç 0, we have that: ëd1èq æ 1è+D2èQ æ 1 ;Qæ 2èë, ëd1èq1è+d2èq1;q2èë ç 0; è4.24è i.e. over all fq1;q2g which meet the rate budget, èq æ 1 ;Qæ 2è gives the minimum distortion. 2

Proposed Running Head: Lexicographic Bit Allocation for MPEG Video Corresponding Author: Dzung T. Hoang Sony Semiconductor of America 3300 Zanker Road

Proposed Running Head: Lexicographic Bit Allocation for MPEG Video Corresponding Author: Dzung T. Hoang Sony Semiconductor of America 3300 Zanker Road Lexicographic Bit Allocation for MPEG Video Dzung T. Hoang Sony Semiconductor of America 3300 Zanker Road, MS SJ3C3 San Jose, CA 95134 dth@ricochet.net Elliot L. Linzer C-Cube Microsystems One Water Street,

More information

Optimal Blockwise Dependent Quantization. Integrated Media Systems Center. Corresponding Author: Antonio Ortega.

Optimal Blockwise Dependent Quantization. Integrated Media Systems Center. Corresponding Author: Antonio Ortega. 1 Optimal Blockwise Dependent Quantization for Stereo Image Coding Woontack Woo and Antonio Ortega Integrated Media Systems Center Department of Electrical Engineering-Systems University of Southern California,

More information

Boundary layer quadrilateral. Boundary layer

Boundary layer quadrilateral. Boundary layer CHAPTER 5 BOUNDARY LAYER MESHING - GROWTH CURVES 5.1 Boundary Layer Meshing Notations Cj i p i j;k Mi;j;k 0 fp i jg c i j;k Mi;j;k 1 fc i jg j th growth curve originating from Mi 0 k th node of the j th

More information

Liang-Jin Lin. A Dissertation Presented to the FACULTY OF THE GRADUATE SCHOOL UNIVERSITY OF SOUTHERN CALIFORNIA. In Partial Fulællment of the

Liang-Jin Lin. A Dissertation Presented to the FACULTY OF THE GRADUATE SCHOOL UNIVERSITY OF SOUTHERN CALIFORNIA. In Partial Fulællment of the Video Bit-Rate Control with Spline Approximated Rate-Distortion Characteristics by Liang-Jin Lin A Dissertation Presented to the FACULTY OF THE GRADUATE SCHOOL UNIVERSITY OF SOUTHERN CALIFORNIA In Partial

More information

Rate Distortion Optimization in Video Compression

Rate Distortion Optimization in Video Compression Rate Distortion Optimization in Video Compression Xue Tu Dept. of Electrical and Computer Engineering State University of New York at Stony Brook 1. Introduction From Shannon s classic rate distortion

More information

IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 6, NO. 11, NOVEMBER

IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 6, NO. 11, NOVEMBER IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 6, NO. 11, NOVEMBER 1997 1487 A Video Compression Scheme with Optimal Bit Allocation Among Segmentation, Motion, and Residual Error Guido M. Schuster, Member,

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

19.2 View Serializability. Recall our discussion in Section?? of how our true goal in the design of a

19.2 View Serializability. Recall our discussion in Section?? of how our true goal in the design of a 1 19.2 View Serializability Recall our discussion in Section?? of how our true goal in the design of a scheduler is to allow only schedules that are serializable. We also saw how differences in what operations

More information

Bit Allocation for Spatial Scalability in H.264/SVC

Bit Allocation for Spatial Scalability in H.264/SVC Bit Allocation for Spatial Scalability in H.264/SVC Jiaying Liu 1, Yongjin Cho 2, Zongming Guo 3, C.-C. Jay Kuo 4 Institute of Computer Science and Technology, Peking University, Beijing, P.R. China 100871

More information

53 M 0 j èm 2 i è ;1 M 0 j èm 2 i è ;1 èm 2 i è ;0 èm 2 i è ;0 (a) (b) M 0 i M 0 i (c) (d) Figure 6.1: Invalid boundary layer elements due to invisibi

53 M 0 j èm 2 i è ;1 M 0 j èm 2 i è ;1 èm 2 i è ;0 èm 2 i è ;0 (a) (b) M 0 i M 0 i (c) (d) Figure 6.1: Invalid boundary layer elements due to invisibi CHAPTER 6 BOUNDARY LAYER MESHING - ENSURING ELEMENT VALIDITY Growth curves are created with maximum consideration for topological validity and topological compatibility with the model. However, only preliminary

More information

Inænitely Long Walks on 2-colored Graphs Which Don't Cover the. Graph. Pete Gemmell æ. December 14, Abstract

Inænitely Long Walks on 2-colored Graphs Which Don't Cover the. Graph. Pete Gemmell æ. December 14, Abstract Inænitely Long Walks on 2-colored Graphs Which Don't Cover the Graph Pete Gemmell æ December 14, 1992 Abstract Suppose we have a undirected graph G =èv; Eè where V is the set of vertices and E is the set

More information

Rate-Distortion Optimized Tree Structured Compression Algorithms for Piecewise Polynomial Images

Rate-Distortion Optimized Tree Structured Compression Algorithms for Piecewise Polynomial Images 1 Rate-Distortion Optimized Tree Structured Compression Algorithms for Piecewise Polynomial Images Rahul Shukla, Pier Luigi Dragotti 1, Minh N. Do and Martin Vetterli Audio-Visual Communications Laboratory,

More information

Bit Allocation and Encoded View Selection for Optimal Multiview Image Representation

Bit Allocation and Encoded View Selection for Optimal Multiview Image Representation Bit Allocation and Encoded View Selection for Optimal Multiview Image Representation Gene Cheung #, Vladan Velisavljević o # National Institute of Informatics 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo, Japan

More information

Face whose neighbors are to be found. Neighbor face Bounding box of boundary layer elements. Enlarged bounding box

Face whose neighbors are to be found. Neighbor face Bounding box of boundary layer elements. Enlarged bounding box CHAPTER 8 BOUNDARY LAYER MESHING - FIXING BOUNDARY LAYER INTERSECTIONS When boundary layer elements are generated on model faces that are too close to each other the layers may run into each other. When

More information

REDUCTION CUT INVERTED SUM

REDUCTION CUT INVERTED SUM Irreducible Plane Curves Jason E. Durham æ Oregon State University Corvallis, Oregon durhamj@ucs.orst.edu August 4, 1999 Abstract Progress in the classiæcation of plane curves in the last æve years has

More information

Lecture 2 September 3

Lecture 2 September 3 EE 381V: Large Scale Optimization Fall 2012 Lecture 2 September 3 Lecturer: Caramanis & Sanghavi Scribe: Hongbo Si, Qiaoyang Ye 2.1 Overview of the last Lecture The focus of the last lecture was to give

More information

IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. 3, MARCH

IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. 3, MARCH IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. 3, MARCH 2005 343 Rate-Distortion Optimized Tree-Structured Compression Algorithms for Piecewise Polynomial Images Rahul Shukla, Member, IEEE, Pier Luigi

More information

CMPT 365 Multimedia Systems. Media Compression - Video

CMPT 365 Multimedia Systems. Media Compression - Video CMPT 365 Multimedia Systems Media Compression - Video Spring 2017 Edited from slides by Dr. Jiangchuan Liu CMPT365 Multimedia Systems 1 Introduction What s video? a time-ordered sequence of frames, i.e.,

More information

Quality versus Intelligibility: Evaluating the Coding Trade-offs for American Sign Language Video

Quality versus Intelligibility: Evaluating the Coding Trade-offs for American Sign Language Video Quality versus Intelligibility: Evaluating the Coding Trade-offs for American Sign Language Video Frank Ciaramello, Jung Ko, Sheila Hemami School of Electrical and Computer Engineering Cornell University,

More information

Overview: motion-compensated coding

Overview: motion-compensated coding Overview: motion-compensated coding Motion-compensated prediction Motion-compensated hybrid coding Motion estimation by block-matching Motion estimation with sub-pixel accuracy Power spectral density of

More information

Delay-minimal Transmission for Energy Constrained Wireless Communications

Delay-minimal Transmission for Energy Constrained Wireless Communications Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu

More information

Journal of Universal Computer Science, vol. 3, no. 10 (1997), submitted: 11/3/97, accepted: 2/7/97, appeared: 28/10/97 Springer Pub. Co.

Journal of Universal Computer Science, vol. 3, no. 10 (1997), submitted: 11/3/97, accepted: 2/7/97, appeared: 28/10/97 Springer Pub. Co. Journal of Universal Computer Science, vol. 3, no. 10 (1997), 1100-1113 submitted: 11/3/97, accepted: 2/7/97, appeared: 28/10/97 Springer Pub. Co. Compression of Silhouette-like Images based on WFA æ Karel

More information

PAPER Optimal Quantization Parameter Set for MPEG-4 Bit-Rate Control

PAPER Optimal Quantization Parameter Set for MPEG-4 Bit-Rate Control 3338 PAPER Optimal Quantization Parameter Set for MPEG-4 Bit-Rate Control Dong-Wan SEO, Seong-Wook HAN, Yong-Goo KIM, and Yoonsik CHOE, Nonmembers SUMMARY In this paper, we propose an optimal bit rate

More information

SINGLE PASS DEPENDENT BIT ALLOCATION FOR SPATIAL SCALABILITY CODING OF H.264/SVC

SINGLE PASS DEPENDENT BIT ALLOCATION FOR SPATIAL SCALABILITY CODING OF H.264/SVC SINGLE PASS DEPENDENT BIT ALLOCATION FOR SPATIAL SCALABILITY CODING OF H.264/SVC Randa Atta, Rehab F. Abdel-Kader, and Amera Abd-AlRahem Electrical Engineering Department, Faculty of Engineering, Port

More information

Context based optimal shape coding

Context based optimal shape coding IEEE Signal Processing Society 1999 Workshop on Multimedia Signal Processing September 13-15, 1999, Copenhagen, Denmark Electronic Proceedings 1999 IEEE Context based optimal shape coding Gerry Melnikov,

More information

A General Greedy Approximation Algorithm with Applications

A General Greedy Approximation Algorithm with Applications A General Greedy Approximation Algorithm with Applications Tong Zhang IBM T.J. Watson Research Center Yorktown Heights, NY 10598 tzhang@watson.ibm.com Abstract Greedy approximation algorithms have been

More information

æ When a query is presented to the system, it is useful to ænd an eæcient method of ænding the answer,

æ When a query is presented to the system, it is useful to ænd an eæcient method of ænding the answer, CMPT-354-98.2 Lecture Notes July 26, 1998 Chapter 12 Query Processing 12.1 Query Interpretation 1. Why dowe need to optimize? æ A high-level relational query is generally non-procedural in nature. æ It

More information

*Faculty of Electrical Engineering, University of Belgrade, Serbia and Montenegro ** Technical University of Lodz, Institute of Electronics, Poland

*Faculty of Electrical Engineering, University of Belgrade, Serbia and Montenegro ** Technical University of Lodz, Institute of Electronics, Poland Terrain-adaptive infrared line-scan coding: A new image segmentation scheme by D. Milovanovic *, A. Marincic * and B. Wiecek ** *Faculty of Electrical Engineering, University of Belgrade, Serbia and Montenegro

More information

Frame Size f t. CPF(t) playback schedule. T f t. (a) (b)

Frame Size f t. CPF(t) playback schedule. T f t. (a) (b) Optimizations of Stored VBR Video Transmission on CBR Channel Ray-I Chang, Meng Chang Chen, Jan-Ming Ho and Ming-Tat Ko Institute of Information Science, Academia Sinica Nankang, Taipei 529, Taiwan ABSTRACT

More information

Comparative Study of Partial Closed-loop Versus Open-loop Motion Estimation for Coding of HDTV

Comparative Study of Partial Closed-loop Versus Open-loop Motion Estimation for Coding of HDTV Comparative Study of Partial Closed-loop Versus Open-loop Motion Estimation for Coding of HDTV Jeffrey S. McVeigh 1 and Siu-Wai Wu 2 1 Carnegie Mellon University Department of Electrical and Computer Engineering

More information

Applied Lagrange Duality for Constrained Optimization

Applied Lagrange Duality for Constrained Optimization Applied Lagrange Duality for Constrained Optimization Robert M. Freund February 10, 2004 c 2004 Massachusetts Institute of Technology. 1 1 Overview The Practical Importance of Duality Review of Convexity

More information

Approximating a Policy Can be Easier Than Approximating a Value Function

Approximating a Policy Can be Easier Than Approximating a Value Function Computer Science Technical Report Approximating a Policy Can be Easier Than Approximating a Value Function Charles W. Anderson www.cs.colo.edu/ anderson February, 2 Technical Report CS-- Computer Science

More information

IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 11, NOVEMBER

IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 11, NOVEMBER IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL 20, NO 11, NOVEMBER 2011 3179 On Dependent Bit Allocation for Multiview Image Coding With Depth-Image-Based Rendering Gene Cheung, Senior Member, IEEE, Vladan

More information

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of Minnesota

More information

Design æy. Ted J. Hubbard z. Erik K. Antonsson x. Engineering Design Research Laboratory. California Institute of Technology.

Design æy. Ted J. Hubbard z. Erik K. Antonsson x. Engineering Design Research Laboratory. California Institute of Technology. Cellular Automata Modeling in MEMS Design æy Ted J. Hubbard z Erik K. Antonsson x Engineering Design Research Laboratory Division of Engineering and Applied Science California Institute of Technology January

More information

9.4 SOME CHARACTERISTICS OF INTEGER PROGRAMS A SAMPLE PROBLEM

9.4 SOME CHARACTERISTICS OF INTEGER PROGRAMS A SAMPLE PROBLEM 9.4 SOME CHARACTERISTICS OF INTEGER PROGRAMS A SAMPLE PROBLEM Whereas the simplex method is effective for solving linear programs, there is no single technique for solving integer programs. Instead, a

More information

General properties of staircase and convex dual feasible functions

General properties of staircase and convex dual feasible functions General properties of staircase and convex dual feasible functions JÜRGEN RIETZ, CLÁUDIO ALVES, J. M. VALÉRIO de CARVALHO Centro de Investigação Algoritmi da Universidade do Minho, Escola de Engenharia

More information

Consistency and Set Intersection

Consistency and Set Intersection Consistency and Set Intersection Yuanlin Zhang and Roland H.C. Yap National University of Singapore 3 Science Drive 2, Singapore {zhangyl,ryap}@comp.nus.edu.sg Abstract We propose a new framework to study

More information

bè ëfind all countries C and the sum S of all of C's city populations, provided S is at least 10,000,000", SUMèPopulationè GROUP BY Co Name HAVING SUM

bè ëfind all countries C and the sum S of all of C's city populations, provided S is at least 10,000,000, SUMèPopulationè GROUP BY Co Name HAVING SUM MIDTERM CSE 232, February 2000 èopen bookè FIRSTNAME: LASTNAME: Problem 1 èsql, 20 è2,7,11èè Consider the following relations CountryèCo N ame; P opulationè and CityèCi Name; Co name; P opulationè For

More information

6. Lecture notes on matroid intersection

6. Lecture notes on matroid intersection Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans May 2, 2017 6. Lecture notes on matroid intersection One nice feature about matroids is that a simple greedy algorithm

More information

FUTURE communication networks are expected to support

FUTURE communication networks are expected to support 1146 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 13, NO 5, OCTOBER 2005 A Scalable Approach to the Partition of QoS Requirements in Unicast and Multicast Ariel Orda, Senior Member, IEEE, and Alexander Sprintson,

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

3. G. G. Lemieux and S. D. Brown, ëa detailed router for allocating wire segments

3. G. G. Lemieux and S. D. Brown, ëa detailed router for allocating wire segments . Xilinx, Inc., The Programmable Logic Data Book, 99.. G. G. Lemieux and S. D. Brown, ëa detailed router for allocating wire segments in æeld-programmable gate arrays," in Proceedings of the ACM Physical

More information

Monotone Paths in Geometric Triangulations

Monotone Paths in Geometric Triangulations Monotone Paths in Geometric Triangulations Adrian Dumitrescu Ritankar Mandal Csaba D. Tóth November 19, 2017 Abstract (I) We prove that the (maximum) number of monotone paths in a geometric triangulation

More information

Lec 11 Rate-Distortion Optimization (RDO) in Video Coding-I

Lec 11 Rate-Distortion Optimization (RDO) in Video Coding-I CS/EE 5590 / ENG 401 Special Topics (17804, 17815, 17803) Lec 11 Rate-Distortion Optimization (RDO) in Video Coding-I Zhu Li Course Web: http://l.web.umkc.edu/lizhu/teaching/2016sp.video-communication/main.html

More information

Exploiting a database to predict the in-flight stability of the F-16

Exploiting a database to predict the in-flight stability of the F-16 Exploiting a database to predict the in-flight stability of the F-16 David Amsallem and Julien Cortial December 12, 2008 1 Introduction Among the critical phenomena that have to be taken into account when

More information

Optimal Data Partitioning of MPEG-2 Coded Video

Optimal Data Partitioning of MPEG-2 Coded Video IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. XXXX, NO. XXXX, XXXX 03 1 Optimal Data Partitioning of MPEG-2 Coded Video Alexandros Eleftheriadis Senior Member, IEEE, and Pankaj Batra,

More information

CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 14: Combinatorial Problems as Linear Programs I. Instructor: Shaddin Dughmi

CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 14: Combinatorial Problems as Linear Programs I. Instructor: Shaddin Dughmi CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 14: Combinatorial Problems as Linear Programs I Instructor: Shaddin Dughmi Announcements Posted solutions to HW1 Today: Combinatorial problems

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms Prof. Tapio Elomaa tapio.elomaa@tut.fi Course Basics A 4 credit unit course Part of Theoretical Computer Science courses at the Laboratory of Mathematics There will be 4 hours

More information

insertion wcet insertion 99.9 insertion avgt heap wcet heap 99.9 heap avgt 200 execution time number of elements

insertion wcet insertion 99.9 insertion avgt heap wcet heap 99.9 heap avgt 200 execution time number of elements Time-Constrained Sorting A Comparison of Diæerent Algorithms P. Puschner Technische Universitíat Wien, Austria peter@vmars.tuwien.ac.at A. Burns University of York, UK burns@minster.york.ac.uk Abstract:

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Reduced Frame Quantization in Video Coding

Reduced Frame Quantization in Video Coding Reduced Frame Quantization in Video Coding Tuukka Toivonen and Janne Heikkilä Machine Vision Group Infotech Oulu and Department of Electrical and Information Engineering P. O. Box 500, FIN-900 University

More information

V. Vaerman, L. Piron, C. de Solça Fçabregas, S. Bhattacharjee, F. Bossen. and M. Kunt Lausanne. Switzerland. Abstract

V. Vaerman, L. Piron, C. de Solça Fçabregas, S. Bhattacharjee, F. Bossen. and M. Kunt Lausanne. Switzerland. Abstract Dynamic Approach to Visual Data Compression E. Reusens æ, T. Ebrahimi, C. Le Buhan, R. Castagno V. Vaerman, L. Piron, C. de Solça Fçabregas, S. Bhattacharjee, F. Bossen and M. Kunt Signal Processing Laboratory

More information

Module 1 Lecture Notes 2. Optimization Problem and Model Formulation

Module 1 Lecture Notes 2. Optimization Problem and Model Formulation Optimization Methods: Introduction and Basic concepts 1 Module 1 Lecture Notes 2 Optimization Problem and Model Formulation Introduction In the previous lecture we studied the evolution of optimization

More information

SIGNAL COMPRESSION. 9. Lossy image compression: SPIHT and S+P

SIGNAL COMPRESSION. 9. Lossy image compression: SPIHT and S+P SIGNAL COMPRESSION 9. Lossy image compression: SPIHT and S+P 9.1 SPIHT embedded coder 9.2 The reversible multiresolution transform S+P 9.3 Error resilience in embedded coding 178 9.1 Embedded Tree-Based

More information

rate name People Consult Topics name rate name People Consult Topics name

rate name People Consult Topics name rate name People Consult Topics name Midterm Examination æ Please read all instructions èincluding theseè carefully. æ There are 5 problems on the exam, with a varying number of points for each problem and subproblem for a total of 75 points.

More information

Lecture 2 - Introduction to Polytopes

Lecture 2 - Introduction to Polytopes Lecture 2 - Introduction to Polytopes Optimization and Approximation - ENS M1 Nicolas Bousquet 1 Reminder of Linear Algebra definitions Let x 1,..., x m be points in R n and λ 1,..., λ m be real numbers.

More information

Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks

Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks Sergey Gorinsky Harrick Vin Technical Report TR2000-32 Department of Computer Sciences, University of Texas at Austin Taylor Hall

More information

Today s s lecture. Lecture 3: Search - 2. Problem Solving by Search. Agent vs. Conventional AI View. Victor R. Lesser. CMPSCI 683 Fall 2004

Today s s lecture. Lecture 3: Search - 2. Problem Solving by Search. Agent vs. Conventional AI View. Victor R. Lesser. CMPSCI 683 Fall 2004 Today s s lecture Search and Agents Material at the end of last lecture Lecture 3: Search - 2 Victor R. Lesser CMPSCI 683 Fall 2004 Continuation of Simple Search The use of background knowledge to accelerate

More information

A Wavelet-Based Approach to Improve the. Kuwait University, Kuwait.

A Wavelet-Based Approach to Improve the. Kuwait University, Kuwait. A Wavelet-Based Approach to Improve the Eæciency of Multi-Level Surprise Mining? Cyrus Shahabi 1, Seokkyung Chung 1, and Maytham Safar 2 1 Department of Computer Science University of Southern California

More information

skim it quickly and read any sections that appear both relevant and accessible.

skim it quickly and read any sections that appear both relevant and accessible. Chapter 1 Bçezier curves and Splines This a very incomplete and rough draft, so please read it with caution. Many topics are just skipped, and there are no pictures at all. My suggestion is that you skim

More information

A Short SVM (Support Vector Machine) Tutorial

A Short SVM (Support Vector Machine) Tutorial A Short SVM (Support Vector Machine) Tutorial j.p.lewis CGIT Lab / IMSC U. Southern California version 0.zz dec 004 This tutorial assumes you are familiar with linear algebra and equality-constrained optimization/lagrange

More information

Integer Programming Theory

Integer Programming Theory Integer Programming Theory Laura Galli October 24, 2016 In the following we assume all functions are linear, hence we often drop the term linear. In discrete optimization, we seek to find a solution x

More information

AM 221: Advanced Optimization Spring 2016

AM 221: Advanced Optimization Spring 2016 AM 221: Advanced Optimization Spring 2016 Prof Yaron Singer Lecture 3 February 1st 1 Overview In our previous lecture we presented fundamental results from convex analysis and in particular the separating

More information

The ray tracing software package implements an object-oriented approach to

The ray tracing software package implements an object-oriented approach to Chapter 1 RayTracing 1.1 Using the ray tracer package The ray tracing software package implements an object-oriented approach to rendering and ray tracing. The object oriented design includes base classes

More information

Informed search. Soleymani. CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2016

Informed search. Soleymani. CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2016 Informed search CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2016 Soleymani Artificial Intelligence: A Modern Approach, Chapter 3 Outline Best-first search Greedy

More information

collinear and equally spaced. A sequence of points is "-regular if each of its points can be displaced by at most " along each axis to yield a regular

collinear and equally spaced. A sequence of points is -regular if each of its points can be displaced by at most  along each axis to yield a regular On Detecting Spatial Regularity in Noisy Images æ Gabriel Robins Brian L. Robinson Bhupinder S. Sethi Department of Computer Science, University of Virginia, Charlottesville, VA 22903 Abstract Detecting

More information

Lecture 5: Duality Theory

Lecture 5: Duality Theory Lecture 5: Duality Theory Rajat Mittal IIT Kanpur The objective of this lecture note will be to learn duality theory of linear programming. We are planning to answer following questions. What are hyperplane

More information

12.1 Formulation of General Perfect Matching

12.1 Formulation of General Perfect Matching CSC5160: Combinatorial Optimization and Approximation Algorithms Topic: Perfect Matching Polytope Date: 22/02/2008 Lecturer: Lap Chi Lau Scribe: Yuk Hei Chan, Ling Ding and Xiaobing Wu In this lecture,

More information

On Dependent Bit Allocation for Multiview Image Coding with Depth-Image-Based Rendering

On Dependent Bit Allocation for Multiview Image Coding with Depth-Image-Based Rendering On Dependent Bit Allocation for Multiview Image Coding with Depth-Image-Based Rendering Gene Cheung Senior Member, IEEE, Antonio Ortega Fellow, IEEE Vladan Velisavljević Member, IEEE, Gene Cheung Email

More information

Lower bounds and recursive methods for the problem of adjudicating conflicting claims

Lower bounds and recursive methods for the problem of adjudicating conflicting claims Lower bounds and recursive methods for the problem of adjudicating conflicting claims Diego Dominguez University of Rochester March 31, 006 Abstract For the problem of adjudicating conflicting claims,

More information

simply by implementing large parts of the system functionality in software running on application-speciæc instruction set processor èasipè cores. To s

simply by implementing large parts of the system functionality in software running on application-speciæc instruction set processor èasipè cores. To s SYSTEM MODELING AND IMPLEMENTATION OF A GENERIC VIDEO CODEC Jong-il Kim and Brian L. Evans æ Department of Electrical and Computer Engineering, The University of Texas at Austin Austin, TX 78712-1084 fjikim,bevansg@ece.utexas.edu

More information

BWM CRM, PRM CRM, WB, PRM BRM, WB CWM, CWH, PWM. Exclusive (read/write) CWM PWM

BWM CRM, PRM CRM, WB, PRM BRM, WB CWM, CWH, PWM. Exclusive (read/write) CWM PWM University of California, Berkeley College of Engineering Computer Science Division EECS Spring 1998 D.A. Patterson Quiz 2 April 22, 1998 CS252 Graduate Computer Architecture You are allowed to use a calculator

More information

George Mason University. Fairfax, VA æa paper submitted for possible presentation at the IEEE Computer Security Foundations

George Mason University. Fairfax, VA æa paper submitted for possible presentation at the IEEE Computer Security Foundations On the Expressive Power of the Unary Transformation Model æy Ravi S. Sandhu and Srinivas Ganta z Center for Secure Information Systems & Department of Information and Software Systems Engineering George

More information

One motivation for developing axiomatic systems is to determine precisely which properties

One motivation for developing axiomatic systems is to determine precisely which properties 1 Axiomatic Systems 1.1 Features of Axiomatic Systems One motivation for developing axiomatic systems is to determine precisely which properties of certain objects can be deduced from which other properties.

More information

IBM Research Report. Inter Mode Selection for H.264/AVC Using Time-Efficient Learning-Theoretic Algorithms

IBM Research Report. Inter Mode Selection for H.264/AVC Using Time-Efficient Learning-Theoretic Algorithms RC24748 (W0902-063) February 12, 2009 Electrical Engineering IBM Research Report Inter Mode Selection for H.264/AVC Using Time-Efficient Learning-Theoretic Algorithms Yuri Vatis Institut für Informationsverarbeitung

More information

Optimization I : Brute force and Greedy strategy

Optimization I : Brute force and Greedy strategy Chapter 3 Optimization I : Brute force and Greedy strategy A generic definition of an optimization problem involves a set of constraints that defines a subset in some underlying space (like the Euclidean

More information

MULTIVIEW video consists of sequences of spatially

MULTIVIEW video consists of sequences of spatially 744 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 3, MARCH 2011 Interactive Streaming of Stored Multiview Video Using Redundant Frame Structures Gene Cheung, Senior Member, IEEE, Antonio Ortega,

More information

Compression of Stereo Images using a Huffman-Zip Scheme

Compression of Stereo Images using a Huffman-Zip Scheme Compression of Stereo Images using a Huffman-Zip Scheme John Hamann, Vickey Yeh Department of Electrical Engineering, Stanford University Stanford, CA 94304 jhamann@stanford.edu, vickey@stanford.edu Abstract

More information

Express Letters. A Simple and Efficient Search Algorithm for Block-Matching Motion Estimation. Jianhua Lu and Ming L. Liou

Express Letters. A Simple and Efficient Search Algorithm for Block-Matching Motion Estimation. Jianhua Lu and Ming L. Liou IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 7, NO. 2, APRIL 1997 429 Express Letters A Simple and Efficient Search Algorithm for Block-Matching Motion Estimation Jianhua Lu and

More information

Networks. November 23, Abstract. In this paper we consider systems with redundant communication paths, and show how

Networks. November 23, Abstract. In this paper we consider systems with redundant communication paths, and show how Soft Real-Time Communication Over Dual Non-Real-Time Networks èextended Abstractè Ben Kao æ Hector Garcia-Molina y November 23, 1992 Abstract In this paper we consider systems with redundant communication

More information

Joint Entity Resolution

Joint Entity Resolution Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute

More information

January Carnegie Mellon University. Pittsburgh, PA 15213

January Carnegie Mellon University. Pittsburgh, PA 15213 Accelerating Exact k-means Algorithms with Geometric Reasoning Dan Pelleg January 2000 CMU-CS-00-105 Andrew Moore School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 An extract of

More information

7 according to the mesh size speciæcation. The simple Delaunay algorithm guarantees that all vertices of the boundary are present in the mesh. However

7 according to the mesh size speciæcation. The simple Delaunay algorithm guarantees that all vertices of the boundary are present in the mesh. However CHAPTER 2 SURVEY OF PREVIOUS EFFORTS ON ANISOTROPIC MESH GENERATION Anisotropic meshes for capturing boundary layers in viscous æows have been generated by three techniques: 1. Direct creation using anisotropic

More information

ARELAY network consists of a pair of source and destination

ARELAY network consists of a pair of source and destination 158 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 1, JANUARY 2009 Parity Forwarding for Multiple-Relay Networks Peyman Razaghi, Student Member, IEEE, Wei Yu, Senior Member, IEEE Abstract This paper

More information

Algorithms for Integer Programming

Algorithms for Integer Programming Algorithms for Integer Programming Laura Galli November 9, 2016 Unlike linear programming problems, integer programming problems are very difficult to solve. In fact, no efficient general algorithm is

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

und Formale Beschreibungsverfahren D Karlsruhe, Germany fbranke, July 1996 Abstract

und Formale Beschreibungsverfahren D Karlsruhe, Germany   fbranke, July 1996 Abstract Searching for Shortest Common Supersequences by Means of a Heuristic-Based Genetic Algorithm Jíurgen Branke, Martin Middendorf University of Karlsruhe Institut fíur Angewandte Informatik und Formale Beschreibungsverfahren

More information

VIDEO compression is generally processed in both. Joint Temporal Spatial Bit Allocation for Video Coding With Dependency

VIDEO compression is generally processed in both. Joint Temporal Spatial Bit Allocation for Video Coding With Dependency IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 15, NO. 1, JANUARY 2005 15 Joint Temporal Spatial Bit Allocation for Video Coding With Dependency Shan Liu and C.-C. Jay Kuo, Fellow,

More information

Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding.

Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding. Project Title: Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding. Midterm Report CS 584 Multimedia Communications Submitted by: Syed Jawwad Bukhari 2004-03-0028 About

More information

CODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM. Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala

CODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM. Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala CODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala Tampere University of Technology Korkeakoulunkatu 1, 720 Tampere, Finland ABSTRACT In

More information

Rate-distortion Optimized Streaming of Compressed Light Fields with Multiple Representations

Rate-distortion Optimized Streaming of Compressed Light Fields with Multiple Representations Rate-distortion Optimized Streaming of Compressed Light Fields with Multiple Representations Prashant Ramanathan and Bernd Girod Department of Electrical Engineering Stanford University Stanford CA 945

More information

Module 7. Independent sets, coverings. and matchings. Contents

Module 7. Independent sets, coverings. and matchings. Contents Module 7 Independent sets, coverings Contents and matchings 7.1 Introduction.......................... 152 7.2 Independent sets and coverings: basic equations..... 152 7.3 Matchings in bipartite graphs................

More information

10. Network dimensioning

10. Network dimensioning Partly based on slide material by Samuli Aalto and Jorma Virtamo ELEC-C7210 Modeling and analysis of communication networks 1 Contents Introduction Parameters: topology, routing and traffic Dimensioning

More information

NP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions.

NP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions. CS 787: Advanced Algorithms NP-Hardness Instructor: Dieter van Melkebeek We review the concept of polynomial-time reductions, define various classes of problems including NP-complete, and show that 3-SAT

More information

Informed Search A* Algorithm

Informed Search A* Algorithm Informed Search A* Algorithm CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2018 Soleymani Artificial Intelligence: A Modern Approach, Chapter 3 Most slides have

More information

DIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS

DIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS DIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS Television services in Europe currently broadcast video at a frame rate of 25 Hz. Each frame consists of two interlaced fields, giving a field rate of 50

More information

Digital Video Processing

Digital Video Processing Video signal is basically any sequence of time varying images. In a digital video, the picture information is digitized both spatially and temporally and the resultant pixel intensities are quantized.

More information

Lecture 7. s.t. e = (u,v) E x u + x v 1 (2) v V x v 0 (3)

Lecture 7. s.t. e = (u,v) E x u + x v 1 (2) v V x v 0 (3) COMPSCI 632: Approximation Algorithms September 18, 2017 Lecturer: Debmalya Panigrahi Lecture 7 Scribe: Xiang Wang 1 Overview In this lecture, we will use Primal-Dual method to design approximation algorithms

More information

Efficient Prefix Computation on Faulty Hypercubes

Efficient Prefix Computation on Faulty Hypercubes JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 17, 1-21 (21) Efficient Prefix Computation on Faulty Hypercubes YU-WEI CHEN AND KUO-LIANG CHUNG + Department of Computer and Information Science Aletheia

More information