{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T05:48:34Z","timestamp":1763790514731,"version":"3.45.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T00:00:00Z","timestamp":1759104000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T00:00:00Z","timestamp":1759104000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,29]]},"DOI":"10.1109\/itw62417.2025.11240525","type":"proceedings-article","created":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T18:39:40Z","timestamp":1763750380000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Optimal tables for asymmetric numeral systems"],"prefix":"10.1109","author":[{"given":"Raphael S.","family":"Steiner","sequence":"first","affiliation":[{"name":"Huawei Research Center Zurich,Computing Systems Lab,Z&#x00FC;rich,Switzerland,8050"}]},{"given":"Mirko","family":"De Vita","sequence":"additional","affiliation":[{"name":"Huawei Research Center Zurich,Computing Systems Lab,Z&#x00FC;rich,Switzerland,8050"}]},{"given":"Endri","family":"Bezati","sequence":"additional","affiliation":[{"name":"Huawei Research Center Zurich,Computing Systems Lab,Z&#x00FC;rich,Switzerland,8050"}]}],"member":"263","reference":[{"journal-title":"Asymmetric numeral systems","year":"2009","author":"Duda","key":"ref1"},{"journal-title":"Asymmetric numeral systems: entropy coding combining speed of Huffman coding with compression rate of arithmetic coding","year":"2013","author":"Duda","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/PCS.2015.7170048"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JRPROC.1952.273898"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1147\/rd.203.0198"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056559"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1147\/rd.282.0135"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/214762.214771"},{"journal-title":"Interleaved entropy coders","year":"2014","author":"Giesen","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.23919\/ISITA.2018.8664207"},{"journal-title":"Encoding of probability distributions for asymmetric numeral systems","year":"2021","author":"Duda","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.34768\/amcs-2023-0004"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/e25040672"},{"year":"2015","key":"ref14","article-title":"Zstandard - Fast real-time compression algorithm"},{"year":"2016","key":"ref15","article-title":"LZFSE compression library and command line tool"},{"year":"2017","key":"ref16","article-title":"PIK - A new lossy\/lossless image format for photos and the internet"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/e24030375"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3096026"},{"key":"ref19","article-title":"Digital immunity module: Preventing unwanted encryption using source coding","volume-title":"Authorea Preprints","author":"Mahboubi","year":"2022"},{"article-title":"Pseudorandom bit generation with asymmetric numeral systems","year":"2022","author":"Pieprzyk","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849430"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008030427220"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-015-9234-z"},{"article-title":"Control robotics: The procedural control of physical processes","volume-title":"Proceedings IF IP Congress, 1974","author":"Dertouzos","key":"ref25"},{"journal-title":"Optimal tables for asymmetric numeral systems","year":"2025","author":"Steiner","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.2019EAP1140"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1090\/clrm\/016"},{"year":"2024","key":"ref29","article-title":"These compression algorithms could halve our image file sizes (but we don\u2019t use them) #SoMEpi"}],"event":{"name":"2025 IEEE Information Theory Workshop (ITW)","start":{"date-parts":[[2025,9,29]]},"location":"Sydney, Australia","end":{"date-parts":[[2025,10,3]]}},"container-title":["2025 IEEE Information Theory Workshop (ITW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11240243\/11240249\/11240525.pdf?arnumber=11240525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T05:44:15Z","timestamp":1763790255000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11240525\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,29]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/itw62417.2025.11240525","relation":{},"subject":[],"published":{"date-parts":[[2025,9,29]]}}}