?
Solved

Compressing files

Posted on 2002-05-17
5
Medium Priority
?
247 Views
Last Modified: 2010-04-15
I'd like to know more about file compressing.
So, does anyone know where on the net I can find a good site for compressing teory(ZIP,ARJ ,...methods and algorithms)...
Thanks
0
Comment
Question by:darko_poljak
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 2

Accepted Solution

by:
jonnin earned 200 total points
ID: 7017321
0
 
LVL 1

Expert Comment

by:tapasmondal
ID: 7017883
U just write data compression in google search .Many sites there are.
tapas
0
 

Expert Comment

by:fundoosathish
ID: 7018015
hey, u can chk out on books like Data STructures Algorithms book by Trembley & Sorenson.
U  can use Huffman's encoding also which is very powerful & really works well for data compression..i've used for that my cryptography project...
All the sites you wont get all the neccesary details..it will be split over many sites.

hope the book will help...
0
 
LVL 2

Expert Comment

by:fremsley
ID: 7024524
0
 
LVL 45

Expert Comment

by:Kent Olsen
ID: 9480152
No comment has been added lately, so it's time to clean up this TA.

I will leave a recommendation in the Cleanup topic area that this question is:
Accept jonnin's comment as answer

Please leave any comments here within the next seven days.

PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!

Kent (Kdo)
EE Cleanup Volunteer
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Summary: This tutorial covers some basics of pointer, pointer arithmetic and function pointer. What is a pointer: A pointer is a variable which holds an address. This address might be address of another variable/address of devices/address of fu…
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Video by: Grant
The goal of this video is to provide viewers with basic examples to understand and use nested-loops in the C programming language.
The goal of this video is to provide viewers with basic examples to understand how to create, access, and change arrays in the C programming language.
Suggested Courses

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question