Skip to main content

Showing 1–35 of 35 results for author: Gong, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.14278  [pdf

    cs.CV

    RAMCT: Novel Region-adaptive Multi-channel Tracker with Iterative Tikhonov Regularization for Thermal Infrared Tracking

    Authors: Shang Zhang, Yuke Hou, Guoqiang Gong, Ruoyan Xiong, Yue Zhang

    Abstract: Correlation filter (CF)-based trackers have gained significant attention for their computational efficiency in thermal infrared (TIR) target tracking. However, ex-isting methods struggle with challenges such as low-resolution imagery, occlu-sion, background clutter, and target deformation, which severely impact tracking performance. To overcome these limitations, we propose RAMCT, a region-adaptiv… ▽ More

    Submitted 19 April, 2025; originally announced April 2025.

  2. arXiv:2503.24389  [pdf, other

    cs.CV cs.NE

    SU-YOLO: Spiking Neural Network for Efficient Underwater Object Detection

    Authors: Chenyang Li, Wenxuan Liu, Guoqiang Gong, Xiaobo Ding, Xian Zhong

    Abstract: Underwater object detection is critical for oceanic research and industrial safety inspections. However, the complex optical environment and the limited resources of underwater equipment pose significant challenges to achieving high accuracy and low power consumption. To address these issues, we propose Spiking Underwater YOLO (SU-YOLO), a Spiking Neural Network (SNN) model. Leveraging the lightwe… ▽ More

    Submitted 31 March, 2025; originally announced March 2025.

  3. arXiv:2503.11205  [pdf, other

    cs.CV

    LLaVA-MLB: Mitigating and Leveraging Attention Bias for Training-Free Video LLMs

    Authors: Leqi Shen, Tao He, Guoqiang Gong, Fan Yang, Yifeng Zhang, Pengzhang Liu, Sicheng Zhao, Guiguang Ding

    Abstract: Training-free video large language models (LLMs) leverage pretrained Image LLMs to process video content without the need for further training. A key challenge in such approaches is the difficulty of retaining essential visual and temporal information, constrained by the token limits in Image LLMs. To address this, we propose a two-stage method for selecting query-relevant tokens based on the LLM… ▽ More

    Submitted 14 March, 2025; originally announced March 2025.

  4. arXiv:2503.11187  [pdf, other

    cs.CV

    FastVID: Dynamic Density Pruning for Fast Video Large Language Models

    Authors: Leqi Shen, Guoqiang Gong, Tao He, Yifeng Zhang, Pengzhang Liu, Sicheng Zhao, Guiguang Ding

    Abstract: Video Large Language Models have shown impressive capabilities in video comprehension, yet their practical deployment is hindered by substantial inference costs caused by redundant video tokens. Existing pruning techniques fail to fully exploit the spatiotemporal redundancy inherent in video data. To bridge this gap, we perform a systematic analysis of video redundancy from two perspectives: tempo… ▽ More

    Submitted 14 March, 2025; originally announced March 2025.

  5. arXiv:2502.16498  [pdf, other

    cs.NI

    Combining Heuristic and Reinforcement Learning to Achieve the Low-latency and High-throughput Receiver-side Congestion Control

    Authors: Xianliang Jiang, Guanghui Gong, Guang Jin

    Abstract: Traditional congestion control algorithms struggle to maintain the consistent and satisfactory data transmission performance over time-varying networking condition. Simultaneously, as video traffic becomes dominant, the loose coupling between the DASH framework and TCP congestion control results in the un-matched bandwidth usage, thereby limiting video streaming performance. To address these issue… ▽ More

    Submitted 23 February, 2025; originally announced February 2025.

    Comments: 15 pages, 17 figures

  6. arXiv:2502.10192  [pdf, ps, other

    cs.IT

    A Note on "Constructing Bent Functions Outside the Maiorana-McFarland Class Using a General Form of Rothaus"

    Authors: Fei Guo, Zilong Wang, Guang Gong

    Abstract: In 2017, Zhang et al. proposed a question (not open problem) and two open problems in [IEEE TIT 63 (8): 5336--5349, 2017] about constructing bent functions by using Rothaus' construction. In this note, we prove that the sufficient conditions of Rothaus' construction are also necessary, which answers their question. Besides, we demonstrate that the second open problem, which considers the iterative… ▽ More

    Submitted 14 February, 2025; originally announced February 2025.

  7. arXiv:2405.00314  [pdf, other

    cs.LG cs.AI cs.AR cs.CV cs.PF

    Model Quantization and Hardware Acceleration for Vision Transformers: A Comprehensive Survey

    Authors: Dayou Du, Gu Gong, Xiaowen Chu

    Abstract: Vision Transformers (ViTs) have recently garnered considerable attention, emerging as a promising alternative to convolutional neural networks (CNNs) in several vision-related applications. However, their large model sizes and high computational and memory demands hinder deployment, especially on resource-constrained devices. This underscores the necessity of algorithm-hardware co-design specific… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

  8. arXiv:2404.05781  [pdf, other

    q-bio.NC cs.LG

    Group-specific discriminant analysis reveals statistically validated sex differences in lateralization of brain functional network

    Authors: Shuo Zhou, Junhao Luo, Yaya Jiang, Haolin Wang, Haiping Lu, Gaolang Gong

    Abstract: Lateralization is a fundamental feature of the human brain, where sex differences have been observed. Conventional studies in neuroscience on sex-specific lateralization are typically conducted on univariate statistical comparisons between male and female groups. However, these analyses often lack effective validation of group specificity. Here, we formulate modeling sex differences in lateralizat… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

  9. arXiv:2402.17862  [pdf, other

    cs.CV cs.AI

    REPrune: Channel Pruning via Kernel Representative Selection

    Authors: Mincheol Park, Dongjin Kim, Cheonjun Park, Yuna Park, Gyeong Eun Gong, Won Woo Ro, Suhyun Kim

    Abstract: Channel pruning is widely accepted to accelerate modern convolutional neural networks (CNNs). The resulting pruned model benefits from its immediate deployment on general-purpose software and hardware resources. However, its large pruning granularity, specifically at the unit of a convolution filter, often leads to undesirable accuracy drops due to the inflexibility of deciding how and where to in… ▽ More

    Submitted 8 March, 2024; v1 submitted 27 February, 2024; originally announced February 2024.

    Comments: Published at AAAI2024

  10. arXiv:2301.07266  [pdf

    cs.CV cs.AI

    ACQ: Improving Generative Data-free Quantization Via Attention Correction

    Authors: Jixing Li, Xiaozhou Guo, Benzhe Dai, Guoliang Gong, Min Jin, Gang Chen, Wenyu Mao, Huaxiang Lu

    Abstract: Data-free quantization aims to achieve model quantization without accessing any authentic sample. It is significant in an application-oriented context involving data privacy. Converting noise vectors into synthetic samples through a generator is a popular data-free quantization method, which is called generative data-free quantization. However, there is a difference in attention between synthetic… ▽ More

    Submitted 29 July, 2023; v1 submitted 17 January, 2023; originally announced January 2023.

  11. arXiv:2209.08712  [pdf, ps, other

    cs.IT

    Systematic Constructions of Bent-Negabent Functions, 2-Rotation Symmetric Bent-Negabent Functions and Their Duals

    Authors: Fei Guo, Zilong Wang, Guang Gong

    Abstract: Bent-negabent functions have many important properties for their application in cryptography since they have the flat absolute spectrum under the both Walsh-Hadamard transform and nega-Hadamard transform. In this paper, we present four new systematic constructions of bent-negabent functions on $4k, 8k, 4k+2$ and $8k+2$ variables, respectively, by modifying the truth tables of two classes of quadra… ▽ More

    Submitted 18 September, 2022; originally announced September 2022.

  12. arXiv:2208.12533  [pdf, ps, other

    cs.IT

    Non-standard Golay Complementary Sequence Pair over QAM

    Authors: Erzhong Xue, Zilong Wang, Guang Gong

    Abstract: We generalize the three-stage process for constructing and enumerating Golay array and sequence pairs given in 2008 by Frank Fiedler et al. [A multi-dimensional approach to the construction and enumeration of Golay complementary sequences, Journal of Combinatorial Theory, Series A 115 (2008) 753-776] to $4^{q}$-QAM constellation based on para-unitary matrix method, which partly solves their open q… ▽ More

    Submitted 26 August, 2022; originally announced August 2022.

  13. arXiv:2112.02373  [pdf, other

    cs.CV

    3rd Place: A Global and Local Dual Retrieval Solution to Facebook AI Image Similarity Challenge

    Authors: Xinlong Sun, Yangyang Qin, Xuyuan Xu, Guoping Gong, Yang Fang, Yexin Wang

    Abstract: As a basic task of computer vision, image similarity retrieval is facing the challenge of large-scale data and image copy attacks. This paper presents our 3rd place solution to the matching track of Image Similarity Challenge (ISC) 2021 organized by Facebook AI. We propose a multi-branch retrieval method of combining global descriptors and local descriptors to cover all attack cases. Specifically,… ▽ More

    Submitted 28 December, 2021; v1 submitted 4 December, 2021; originally announced December 2021.

    Comments: This is the 3rd place solution for Facebook Image Similarity Challenge and NIPS2021 Workshop. The current first draft version will be updated later

  14. arXiv:2012.05509  [pdf

    eess.IV cs.CV cs.LG

    COVID-MTL: Multitask Learning with Shift3D and Random-weighted Loss for Automated Diagnosis and Severity Assessment of COVID-19

    Authors: Guoqing Bao, Huai Chen, Tongliang Liu, Guanzhong Gong, Yong Yin, Lisheng Wang, Xiuying Wang

    Abstract: There is an urgent need for automated methods to assist accurate and effective assessment of COVID-19. Radiology and nucleic acid test (NAT) are complementary COVID-19 diagnosis methods. In this paper, we present an end-to-end multitask learning (MTL) framework (COVID-MTL) that is capable of automated and simultaneous detection (against both radiology and NAT) and severity assessment of COVID-19.… ▽ More

    Submitted 31 December, 2020; v1 submitted 10 December, 2020; originally announced December 2020.

    Comments: COVID-19 research; computer vision and pattern recognition; 13 pages, 10 figures and 5 tables

  15. arXiv:2005.05825  [pdf, ps, other

    cs.IT

    Constructions of complementary sequence sets and complete complementary codes by 2-level autocorrelation sequences and permutation polynomials

    Authors: Zilong Wang, Guang Gong

    Abstract: In this paper, a recent method to construct complementary sequence sets and complete complementary codes by Hadamard matrices is deeply studied. By taking the algebraic structure of Hadamard matrices into consideration, our main result determine the so-called $δ$-linear terms and $δ$-quadratic terms. As a first consequence, a powerful theory linking Golay complementary sets of $p$-ary ($p$ prime)… ▽ More

    Submitted 12 May, 2020; originally announced May 2020.

  16. PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks

    Authors: Kalikinkar Mandal, Guang Gong

    Abstract: Federated Learning (FL) enables a large number of users to jointly learn a shared machine learning (ML) model, coordinated by a centralized server, where the data is distributed across multiple devices. This approach enables the server or users to train and learn an ML model using gradient descent, while keeping all the training data on users' devices. We consider training an ML model over a mobil… ▽ More

    Submitted 5 April, 2020; originally announced April 2020.

    Comments: In Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop (CCSW'19)

  17. arXiv:2003.03459  [pdf, ps, other

    cs.IT

    New Constructions of Complementary Sequence Pairs over $4^q$-QAM

    Authors: Zilong Wang, Erzhong Xue, Guang Gong

    Abstract: The previous constructions of quadrature amplitude modulation (QAM) Golay complementary sequences (GCSs) were generalized as $4^q $-QAM GCSs of length $2^{m}$ by Li \textsl{et al.} (the generalized cases I-III for $q\ge 2$) in 2010 and Liu \textsl{et al.} (the generalized cases IV-V for $q\ge 3$) in 2013 respectively. Those sequences are presented as the combination of the quaternary standard GCSs… ▽ More

    Submitted 20 December, 2020; v1 submitted 6 March, 2020; originally announced March 2020.

  18. arXiv:2001.04898  [pdf, ps, other

    cs.IT

    New Construction of Complementary Sequence (or Array) Sets and Complete Complementary Codes

    Authors: Zilong Wang, Dongxu Ma, Guang Gong, Erzhong Xue

    Abstract: A new method to construct $q$-ary complementary sequence sets (CSSs) and complete complementary codes (CCCs) of size $N$ is proposed by using desired para-unitary (PU) matrices. The concept of seed PU matrices is introduced and a systematic approach on how to compute the explicit forms of the functions in constructed CSSs and CCCs from the seed PU matrices is given. A general form of these functio… ▽ More

    Submitted 12 January, 2020; originally announced January 2020.

    Comments: arXiv admin note: text overlap with arXiv:1910.10304, arXiv:1910.10310

  19. arXiv:1912.03849  [pdf, other

    cs.CV

    Shape-Aware Organ Segmentation by Predicting Signed Distance Maps

    Authors: Yuan Xue, Hui Tang, Zhi Qiao, Guanzhong Gong, Yong Yin, Zhen Qian, Chao Huang, Wei Fan, Xiaolei Huang

    Abstract: In this work, we propose to resolve the issue existing in current deep learning based organ segmentation systems that they often produce results that do not capture the overall shape of the target organ and often lack smoothness. Since there is a rigorous mapping between the Signed Distance Map (SDM) calculated from object boundary contours and the binary segmentation map, we exploit the feasibili… ▽ More

    Submitted 8 December, 2019; originally announced December 2019.

    Comments: AAAI 2020

  20. arXiv:1910.10310   

    cs.IT

    New Construction of Complementary Sequence (or Array) Sets and Complete Complementary Codes (II)

    Authors: Zilong Wang, Dongxu Ma, Erzhong Xue, Guang Gong, Srdjan Budisin

    Abstract: Previously, we have presented a framework to use the para-unitary (PU) matrix-based approach for constructing new complementary sequence set (CSS), complete complementary code (CCC), complementary sequence array (CSA), and complete complementary array (CCA). In this paper, we introduce a new class of delay matrices for the PU construction. In this way, generalized Boolean functions (GBF) derived f… ▽ More

    Submitted 12 May, 2020; v1 submitted 22 October, 2019; originally announced October 2019.

    Comments: This paper and another is merged together. And the merged paper is online

  21. arXiv:1910.10304   

    cs.IT

    New Construction of Complementary Sequence (or Array) Sets and Complete Complementary Codes (I)

    Authors: Zilong Wang, Dongxu Ma, Guang Gong

    Abstract: A new method to construct $q$-ary complementary sequence (or array) sets (CSSs) and complete complementary codes (CCCs) of size $N$ is introduced in this paper. An algorithm on how to compute the explicit form of the functions in constructed CSS and CCC is also given. A general form of these functions only depends on a basis of functions from $\Z_N$ to $\Z_q$ and representatives in the equivalent… ▽ More

    Submitted 12 May, 2020; v1 submitted 22 October, 2019; originally announced October 2019.

    Comments: This paper and another is merged together. And the merged paper is online

  22. arXiv:1909.11707  [pdf, other

    cs.CR eess.SP

    Implementation of three LWC Schemes in the WiFi 4-Way Handshake with Software Defined Radio

    Authors: Yunjie Yi, Guang Gong, Kalikinkar Mandal

    Abstract: With the rapid deployment of Internet of Things (IoT) devices in applications such as smarthomes, healthcare and industrial automation, security and privacy has become a major concern. Recently, National Institute of Standards and Technology (NIST) has initiated a lightweight cryptography (LWC) competition to standardize new cryptographic algorithm(s) for providing security in resource-constrained… ▽ More

    Submitted 30 September, 2021; v1 submitted 25 September, 2019; originally announced September 2019.

    Comments: NIST Lightweight Cryptography Workshop 2019

  23. arXiv:1908.00707  [pdf, other

    cs.CV

    Scale Matters: Temporal Scale Aggregation Network for Precise Action Localization in Untrimmed Videos

    Authors: Guoqiang Gong, Liangfeng Zheng, Kun Bai, Yadong Mu

    Abstract: Temporal action localization is a recently-emerging task, aiming to localize video segments from untrimmed videos that contain specific actions. Despite the remarkable recent progress, most two-stage action localization methods still suffer from imprecise temporal boundaries of action proposals. This work proposes a novel integrated temporal scale aggregation network (TSA-Net). Our main insight is… ▽ More

    Submitted 2 August, 2019; originally announced August 2019.

  24. arXiv:1903.05351  [pdf, ps, other

    cs.IT

    New Characterizations for the Multi-output Correlation-Immune Boolean Functions

    Authors: Jinjin Chai, Zilong Wang, Sihem Mesnager, Guang Gong

    Abstract: Correlation-immune (CI) multi-output Boolean functions have the property of keeping the same output distribution when some input variables are fixed. Recently, a new application of CI functions has appeared in the system of resisting side-channel attacks (SCA). In this paper, three new methods are proposed to characterize the $t$ th-order CI multi-output Boolean functions ($n$-input and $m$-output… ▽ More

    Submitted 24 August, 2019; v1 submitted 13 March, 2019; originally announced March 2019.

    MSC Class: 42A38; 94A60; 06E30

  25. arXiv:1903.05350  [pdf, ps, other

    cs.IT

    The Fourier Spectral Characterization for the Correlation-Immune Functions over Fp

    Authors: Zilong Wang, Jinjin Chai, Guang Gong

    Abstract: The correlation-immune functions serve as an important metric for measuring resistance of a cryptosystem against correlation attacks. Existing literature emphasize on matrices, orthogonal arrays and Walsh-Hadamard spectra to characterize the correlation-immune functions over $\mathbb{F}_p$ ($p \geq 2$ is a prime). %with prime $p$. Recently, Wang and Gong investigated the Fourier spectral character… ▽ More

    Submitted 13 March, 2019; originally announced March 2019.

  26. arXiv:1812.10033  [pdf, other

    cs.CV

    MMFNet: A Multi-modality MRI Fusion Network for Segmentation of Nasopharyngeal Carcinoma

    Authors: Huai Chen, Yuxiao Qi, Yong Yin, Tengxiang Li, Xiaoqing Liu, Xiuli Li, Guanzhong Gong, Lisheng Wang

    Abstract: Segmentation of nasopharyngeal carcinoma (NPC) from Magnetic Resonance Images (MRI) is a crucial prerequisite for NPC radiotherapy. However, manually segmenting of NPC is time-consuming and labor-intensive. Additionally, single-modality MRI generally cannot provide enough information for its accurate delineation. Therefore, a multi-modality MRI fusion network (MMFNet) based on three modalities of… ▽ More

    Submitted 22 October, 2019; v1 submitted 25 December, 2018; originally announced December 2018.

    Comments: 34 pages, 12 figures

  27. arXiv:1807.03662  [pdf

    cs.DC cs.CR

    TrialChain: A Blockchain-Based Platform to Validate Data Integrity in Large, Biomedical Research Studies

    Authors: Hao Dai, H Patrick Young, Thomas JS Durant, Guannan Gong, Mingming Kang, Harlan M Krumholz, Wade L Schulz, Lixin Jiang

    Abstract: The governance of data used for biomedical research and clinical trials is an important requirement for generating accurate results. To improve the visibility of data quality and analysis, we developed TrialChain, a blockchain-based platform that can be used to validate data integrity from large, biomedical research studies. We implemented a private blockchain using the MultiChain platform and int… ▽ More

    Submitted 10 July, 2018; originally announced July 2018.

  28. arXiv:1411.4340  [pdf, ps, other

    cs.IT cs.CR

    Some Notes on Constructions of Binary Sequences with Optimal Autocorrelation

    Authors: Tongjiang Yan, Guang Gong

    Abstract: Constructions of binary sequences with low autocorrelation are considered in the paper. Based on recent progresses about this topic, several more general constructions of binary sequences with optimal autocorrelations and other low autocorrelations are presented.

    Submitted 16 November, 2014; originally announced November 2014.

  29. arXiv:1410.2903  [pdf, ps, other

    cs.IT math.CO

    Quadratic Zero-Difference Balanced Functions, APN Functions and Strongly Regular Graphs

    Authors: Claude Carlet, Guang Gong, Yin Tan

    Abstract: Let $F$ be a function from $\mathbb{F}_{p^n}$ to itself and $δ$ a positive integer. $F$ is called zero-difference $δ$-balanced if the equation $F(x+a)-F(x)=0$ has exactly $δ$ solutions for all non-zero $a\in\mathbb{F}_{p^n}$. As a particular case, all known quadratic planar functions are zero-difference 1-balanced; and some quadratic APN functions over $\mathbb{F}_{2^n}$ are zero-difference 2-bala… ▽ More

    Submitted 31 October, 2014; v1 submitted 10 October, 2014; originally announced October 2014.

    MSC Class: 11T06; 11T71; 05E30

  30. arXiv:1309.7423  [pdf, ps, other

    cs.IT

    More Constructions of Differentially 4-uniform Permutations on $\gf_{2^{2k}}$

    Authors: Longjiang Qu, Yin Tan, Chao Li, Guang Gong

    Abstract: Differentially 4-uniform permutations on $\gf_{2^{2k}}$ with high nonlinearity are often chosen as Substitution boxes in both block and stream ciphers. Recently, Qu et al. introduced a class of functions, which are called preferred functions, to construct a lot of infinite families of such permutations \cite{QTTL}. In this paper, we propose a particular type of Boolean functions to characterize th… ▽ More

    Submitted 21 July, 2014; v1 submitted 28 September, 2013; originally announced September 2013.

  31. arXiv:1307.0885  [pdf, ps, other

    cs.IT

    The Proof of Lin's Conjecture via the Decimation-Hadamard Transform

    Authors: Honggang Hu, Shuai Shao, Guang Gong, Tor Helleseth

    Abstract: In 1998, Lin presented a conjecture on a class of ternary sequences with ideal 2-level autocorrelation in his Ph.D thesis. Those sequences have a very simple structure, i.e., their trace representation has two trace monomial terms. In this paper, we present a proof for the conjecture. The mathematical tools employed are the second-order multiplexing decimation-Hadamard transform, Stickelberger's t… ▽ More

    Submitted 2 July, 2013; originally announced July 2013.

  32. arXiv:1106.4728  [pdf, other

    cs.IT

    Large Zero Autocorrelation Zone of Golay Sequences and $4^q$-QAM Golay Complementary Sequences

    Authors: Guang Gong, Fei Huo, Yang Yang

    Abstract: Sequences with good correlation properties have been widely adopted in modern communications, radar and sonar applications. In this paper, we present our new findings on some constructions of single $H$-ary Golay sequence and $4^q$-QAM Golay complementary sequence with a large zero autocorrelation zone, where $H\ge 2$ is an arbitrary even integer and $q\ge 2$ is an arbitrary integer. Those new res… ▽ More

    Submitted 22 June, 2011; originally announced June 2011.

  33. arXiv:1010.2830  [pdf, ps, other

    cs.IT

    A Generalized Construction of OFDM M-QAM Sequences With Low Peak-to-Average Power Ratio

    Authors: Zilong Wang, Guang Gong, Rongquan Feng

    Abstract: A construction of $2^{2n}$-QAM sequences is given and an upper bound of the peak-to-mean envelope power ratio (PMEPR) is determined. Some former works can be viewed as special cases of this construction.

    Submitted 14 October, 2010; originally announced October 2010.

    Comments: published by Advances in Mathematics of Communications

  34. arXiv:0902.1267  [pdf, ps, other

    cs.IT cs.DM math.RT

    A Note on the Diagonalization of the Discrete Fourier Transform

    Authors: Zilong Wang, Guang Gong

    Abstract: Following the approach developed by S. Gurevich and R. Hadani, an analytical formula of the canonical basis of the DFT is given for the case $N=p$ where $p$ is a prime number and $p\equiv 1$ (mod 4).

    Submitted 5 June, 2009; v1 submitted 7 February, 2009; originally announced February 2009.

    Comments: 12 pages, accepted by Applied and Computational Harmonic Analysis

  35. arXiv:0812.4487  [pdf, ps, other

    cs.IT cs.DM math.RT

    New Sequences Design from Weil Representation with Low Two-Dimensional Correlation in Both Time and Phase Shifts

    Authors: Zilong Wang, Guang Gong

    Abstract: For a given prime $p$, a new construction of families of the complex valued sequences of period $p$ with efficient implementation is given by applying both multiplicative characters and additive characters of finite field $\mathbb{F}_p$. Such a signal set consists of $p^2(p-2)$ time-shift distinct sequences, the magnitude of the two-dimensional autocorrelation function (i.e., the ambiguity functio… ▽ More

    Submitted 13 May, 2011; v1 submitted 24 December, 2008; originally announced December 2008.

    Comments: 23 pages, accepted by IEEE Transactions on Information Theory