default search action
Glen G. Langdon Jr.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
1990 – 1999
- 1998
- [c5]Joceli Mayer, Glen G. Langdon Jr.:
Post-Processing Enhancement of Decompressed Images Using Variable Order Bezier Polynomials and Distance Transform. Data Compression Conference 1998: 561 - 1997
- [j33]Glen G. Langdon Jr.:
Comments on "Probability estimation in arithmetic and adaptive-Huffman entropy coders". IEEE Trans. Image Process. 6(8): 1202 (1997) - 1993
- [j32]Glen G. Langdon Jr.:
Book Reviews. SIGARCH Comput. Archit. News 21(4): 29 (1993) - [c4]A. Zandi, Balakrishna R. Iyer, Glen G. Langdon Jr.:
Sort Order Preserving Data Compression for Extended Alphabets. Data Compression Conference 1993: 330-339 - 1992
- [c3]Glen G. Langdon Jr., A. Gulati, E. Seiler:
On the JPEG Model for Lossless Image Compression. Data Compression Conference 1992: 172-180 - 1991
- [c2]Glen G. Langdon Jr.:
Adaptive binary arithmetic coding for multi-media applications. Compcon 1991: 354-357 - [c1]Glen G. Langdon Jr.:
Probabilistic and Q-Coder Algorithms for Binary Source Adaption. Data Compression Conference 1991: 13-22 - 1990
- [j31]Glen G. Langdon Jr.:
Book review: Highly Parallel Computing by George Almasi and Allan Gotlieb (Benjamin/Cummings, 1989). SIGARCH Comput. Archit. News 18(4): 90 (1990) - [j30]Glen G. Langdon Jr.:
Book review: Solving Problems on Concurrent Processors, Vol II: Software for Concurrent Processors by I. Angus, G. Fox, J. Kim, and D. Walker (Prentice-Hall, 1990). SIGARCH Comput. Archit. News 18(4): 90-91 (1990)
1980 – 1989
- 1988
- [j29]William B. Pennebaker, Joan L. Mitchell, Glen G. Langdon Jr., Ronald Arps:
An Overview of the Basic Principles of the Q-Coder Adaptive Binary Arithmetic Coder. IBM J. Res. Dev. 32(6): 717-726 (1988) - 1986
- [j28]Glen G. Langdon Jr.:
Self-Assessment Procedure XVI: A Self-Assessment Procedure Dealing with Computer Organization and Logic Design. Commun. ACM 29(11): 1051-1060 (1986) - [j27]Taylor L. Booth, Tom Brubaker, James T. Cain, Ronald L. Danielson, Ronald G. Hoelzeman, Glen G. Langdon Jr., David L. Soldan, Murali R. Varanasi:
Design Education in Computer Science and Engineering. Computer 19(6): 20-27 (1986) - [j26]Glen G. Langdon Jr.:
Comments on 'A universal data compression system' by J. Rissanen. IEEE Trans. Inf. Theory 32(6): 857- (1986) - 1985
- [j25]Stephen Todd, Glen G. Langdon Jr., Jorma Rissanen:
Parameter Reduction and Context Selection for Compression of Gray-Scale Images. IBM J. Res. Dev. 29(2): 188-193 (1985) - 1984
- [j24]James T. Cain, Glen G. Langdon Jr., Murali R. Varanasi:
The IEEE Computer Society Model Program in Computer Science and Engineering. Computer 17(4): 8-17 (1984) - [j23]Glen G. Langdon Jr.:
An Introduction to Arithmetic Coding. IBM J. Res. Dev. 28(2): 135-149 (1984) - 1983
- [j22]G. Nigel Martin, Glen G. Langdon Jr., Stephen Todd:
Arithmetic Codes for Constrained Channels. IBM J. Res. Dev. 27(2): 94-106 (1983) - [j21]Stephen Todd, Glen G. Langdon Jr., G. Nigel Martin:
A General Fixed Rate Arithmetic Coding Method for Constrained Channels. IBM J. Res. Dev. 27(2): 107-115 (1983) - [j20]Glen G. Langdon Jr., Jorma Rissanen:
A Double-Adaptive File Compression Algorithm. IEEE Trans. Commun. 31(11): 1253-1255 (1983) - [j19]Glen G. Langdon Jr.:
A note on the Ziv-Lempel model for compressing individual sequences. IEEE Trans. Inf. Theory 29(2): 284-287 (1983) - [j18]Glen G. Langdon Jr., Jorma Rissanen:
Correction to 'A simple general binary source code' (Sep 82 800-803). IEEE Trans. Inf. Theory 29(5): 778-779 (1983) - 1982
- [j17]Glen G. Langdon Jr., Jorma Rissanen:
A simple general binary source code. IEEE Trans. Inf. Theory 28(5): 800-803 (1982) - 1981
- [j16]Glen G. Langdon Jr.:
Putting Design into an Introductory Logic Design Course. IEEE Micro 1(1): 97-103 (1981) - [j15]Glen G. Langdon Jr., Jorma Rissanen:
Compression of Black-White Images with Arithmetic Coding. IEEE Trans. Commun. 29(6): 858-867 (1981) - [j14]Jorma Rissanen, Glen G. Langdon Jr.:
Universal modeling and coding. IEEE Trans. Inf. Theory 27(1): 12-22 (1981)
1970 – 1979
- 1979
- [j13]Jorma Rissanen, Glen G. Langdon Jr.:
Arithmetic Coding. IBM J. Res. Dev. 23(2): 149-162 (1979) - [j12]Glen G. Langdon Jr.:
Database Machines: An Introduction. IEEE Trans. Computers 28(6): 381-383 (1979) - 1978
- [j11]Glen G. Langdon Jr.:
A Decomposition Chart Technique to Aid in Realizations with Multiplexers. IEEE Trans. Computers 27(2): 157-159 (1978) - [j10]Glen G. Langdon Jr.:
A Note on Associative Processors for Data Management. ACM Trans. Database Syst. 3(2): 148-158 (1978) - 1977
- [j9]Glen G. Langdon Jr.:
Considerations on the "figure of merit" technique for storage hierarchy design. SIGARCH Comput. Archit. News 5(6): 25-28 (1977) - 1976
- [j8]Glen G. Langdon Jr.:
Workshop on microprocessors and education: 16-18 August, 1976, Colorado State University, Fort Collins, Colorado, USA, sponsored by DISE (digital systems and education) committee and the Electrical Engineering and Computer Science departments of Colorado State University. Microprocess. 1(2): 126-128 (1976) - [j7]Glen G. Langdon Jr.:
Review of Introduction to computer architecture by Harld S. Stone. SIGARCH Comput. Archit. News 5(2): 17-19 (1976)
1960 – 1969
- 1969
- [j6]Glen G. Langdon Jr.:
Subtraction by Minuend Complementation. IEEE Trans. Computers 18(1): 74-76 (1969) - [j5]Glen G. Langdon Jr.:
Delay-Free Asynchronous Circuits with Constrained Line Delays. IEEE Trans. Computers 18(2): 175-181 (1969) - 1968
- [j4]Glen G. Langdon Jr.:
Letters to the editor: Generating permutations by nested cycling. Commun. ACM 11(6): 392 (1968) - [j3]F. R. Moore, Glen G. Langdon Jr.:
A Generalized Firing Squad Problem. Inf. Control. 12(3): 212-220 (1968) - [j2]Glen G. Langdon Jr.:
Analysis of Asynchronous Circuits Under Different Delay Assumptions. IEEE Trans. Computers 17(12): 1131-1143 (1968) - 1967
- [j1]Glen G. Langdon Jr.:
An algorithm for generating permutations. Commun. ACM 10(5): 298-299 (1967)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint