The MXOFF is basically an escape sequence that is used to escape the huffman
tables, basicallly it reads a single bit from the bitstream and jumps
through an array to a new address. The problem is that one of the tables
includes a jump >255 so they used the case of Jump > 250 (0xfa) as an escape
sequence to make this possible.

AFAIK this is only generated for one entry in the huffman table, so if you
identify it you can go in and manually change the addresses and remove this
little test for a not insignificant performance gain.

The only table that uses it is table 24, if you read the huffman decoder
algorithm and play around with the numbers in the table you can make a valid
table without too much tweaking.

Scott Manley
Hacker, DJ, Astronomer


----- Original Message -----
From: "tariqhusain shaikh" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Tuesday, September 03, 2002 11:11 PM
Subject: [MP3 ENCODER] MXOFF in dist10 lsf decoder


> hi everybody...
> This is a query related to dist10 code
> How is the MXOFF in dist10 lsf decoder decided for the
> huffman decoding
> Can anyone throw some light on it?
> Regards
> Tariq
>
> __________________________________________________
> Do You Yahoo!?
> Yahoo! Finance - Get real-time stock quotes
> http://finance.yahoo.com
> _______________________________________________
> mp3encoder mailing list
> [EMAIL PROTECTED]
> http://minnie.tuhs.org/mailman/listinfo/mp3encoder

_______________________________________________
mp3encoder mailing list
[EMAIL PROTECTED]
http://minnie.tuhs.org/mailman/listinfo/mp3encoder

Reply via email to