{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:23:42Z","timestamp":1740122622022,"version":"3.37.3"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,9,8]],"date-time":"2017-09-08T00:00:00Z","timestamp":1504828800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1007\/s11277-017-4945-1","type":"journal-article","created":{"date-parts":[[2017,9,11]],"date-time":"2017-09-11T11:33:17Z","timestamp":1505129597000},"page":"1785-1798","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Capacity and Channel Coding for Wireless Point-to-Point Z\n            2 Channel"],"prefix":"10.1007","volume":"98","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5995-4787","authenticated-orcid":false,"given":"Hassan","family":"Tavakoli","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,9,8]]},"reference":[{"key":"4945_CR1","doi-asserted-by":"crossref","DOI":"10.1002\/0471200611","volume-title":"Elements of information theory","author":"TM Cover","year":"1991","unstructured":"Cover, T. M., & Thomas, J. A. (1991). Elements of information theory. New York: Wiley."},{"issue":"1","key":"4945_CR2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/584091.584093","volume":"5","author":"CE Shannon","year":"2001","unstructured":"Shannon, C. E. (2001). A mathematical theory of communication. ACM SIGMOBILE Mobile Computing and Communications Review, 5(1), 3\u201355.","journal-title":"ACM SIGMOBILE Mobile Computing and Communications Review"},{"key":"4945_CR3","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511807213","volume-title":"Fundamentals of wireless communication","author":"D Tse","year":"2005","unstructured":"Tse, D., & Viswanath, P. (2005). Fundamentals of wireless communication. Cambridge: Cambridge University Press."},{"key":"4945_CR4","doi-asserted-by":"crossref","unstructured":"Hajizadeh S., & Hodtani G. A. (2012). Asymmetric broadcast channels. In Communication, control, and computing (Allerton), 2012 50th annual allerton conference on 2012 Oct 1 (pp. 1997\u20132002).","DOI":"10.1109\/Allerton.2012.6483467"},{"issue":"3","key":"4945_CR5","doi-asserted-by":"crossref","first-page":"1360","DOI":"10.1109\/TIT.2012.2237095","volume":"59","author":"B Xie","year":"2013","unstructured":"Xie, B., Courtade, T. A., & Wesel, R. D. (2013). Optimal encoding for discrete degraded broadcast channels. IEEE Transactions on Information Theory, 59(3), 1360\u20131378.","journal-title":"IEEE Transactions on Information Theory"},{"key":"4945_CR6","doi-asserted-by":"crossref","unstructured":"Mondelli M., Urbanke R., & Hassani S. H. (2014). How to achieve the capacity of asymmetric channels. In Communication, control, and computing (Allerton), 2014 52nd annual Allerton conference on 2014 Sep 30 (pp. 789\u2013796).","DOI":"10.1109\/ALLERTON.2014.7028535"},{"key":"4945_CR7","doi-asserted-by":"crossref","unstructured":"Tallini, L. G., Al-Bassam, S., & Bose, B. (2002). On the capacity and codes for the Z-channel. In Proceedings of IEEE International Symposium on Information Theory, 2002 (p. 422).","DOI":"10.1109\/ISIT.2002.1023694"},{"key":"4945_CR8","doi-asserted-by":"crossref","unstructured":"Zaidi, A., & Shamai, S. (2014). Asymmetric cooperative multiple access channels with delayed CSI. In 2014 IEEE international symposium on information theory (ISIT) (pp. 1186\u20131190).","DOI":"10.1109\/ISIT.2014.6875020"},{"key":"4945_CR9","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511791338","volume-title":"Modern coding theory","author":"T Richardson","year":"2008","unstructured":"Richardson, T., & Urbanke, R. (2008). Modern coding theory. Cambridge: Cambridge University Press."},{"key":"4945_CR10","first-page":"409","volume-title":"Some reflections on the interference channels","author":"E Meulen van der","year":"1994","unstructured":"van der Meulen, E. (1994). Some reflections on the interference channels (pp. 409\u2013421). Dordrecht: Kluwer Academic Publishers."},{"key":"4945_CR11","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/TIT.1978.1055812","volume":"24","author":"A Carleial","year":"1978","unstructured":"Carleial, A. (1978). Interference channels. IEEE Transactions on Information Theory, 24, 60\u201370.","journal-title":"IEEE Transactions on Information Theory"},{"key":"4945_CR12","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1109\/TIT.1985.1057085","volume":"31","author":"M Costa","year":"1985","unstructured":"Costa, M. (1985). On the Gaussian interference channel. IEEE Transactions on Information Theory, 31, 607\u2013615.","journal-title":"IEEE Transactions on Information Theory"},{"key":"4945_CR13","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1109\/TIT.2004.825249","volume":"50","author":"G Kramer","year":"2004","unstructured":"Kramer, G. (2004). Outer bounds on the capacity of Gaussian interference channels. IEEE Transactions on Information Theory, 50, 581\u2013586.","journal-title":"IEEE Transactions on Information Theory"},{"key":"4945_CR14","doi-asserted-by":"crossref","first-page":"1345","DOI":"10.1109\/TIT.2004.828151","volume":"50","author":"I Sason","year":"2004","unstructured":"Sason, I. (2004). On acheivable rate regions for the Gaussian interference channel. IEEE Transactions on Information Theory, 50, 1345\u20131356.","journal-title":"IEEE Transactions on Information Theory"},{"key":"4945_CR15","doi-asserted-by":"crossref","unstructured":"Vishwanath, S., Jindal N., & Goldsmith A. (2003) The \u201cZ\u201d channel. In Global telecommunications conference, 2003. GLOBECOM\u201903. IEEE, vol. 3, pp. 1726\u20131730. IEEE, 2003.","DOI":"10.1109\/GLOCOM.2003.1258532"},{"issue":"4","key":"4945_CR16","doi-asserted-by":"crossref","first-page":"1348","DOI":"10.1109\/TIT.2006.890779","volume":"53","author":"H-F Chong","year":"2007","unstructured":"Chong, H.-F., Motani, M., & Garg, H. K. (2007). Capacity theorems for the \u201cZ\u201d channel. IEEE Transactions on Information Theory, 53(4), 1348\u20131365.","journal-title":"IEEE Transactions on Information Theory"},{"key":"4945_CR17","doi-asserted-by":"crossref","unstructured":"Duan, R, Liang Y, Khisti A, & Shitz, S. S. (2013). State-dependent Gaussian Z-channel with mismatched side-information and interference. In Information theory workshop (ITW), 2013 IEEE, (pp. 1\u20135). IEEE, 2013.","DOI":"10.1109\/ITW.2013.6691306"},{"issue":"8","key":"4945_CR18","doi-asserted-by":"crossref","first-page":"4544","DOI":"10.1109\/TIT.2014.2327016","volume":"60","author":"BM Kurkoski","year":"2014","unstructured":"Kurkoski, B. M., & Yagi, H. (2014). Quantization of binary-input discrete memoryless channels. IEEE Transactions on Information Theory, 60(8), 4544\u20134552.","journal-title":"IEEE Transactions on Information Theory"},{"key":"4945_CR19","volume-title":"Linear programming 2: Theory and extensions","author":"GB Dantzig","year":"2006","unstructured":"Dantzig, G. B., & Thapa, M. N. (2006). Linear programming 2: Theory and extensions. Berlin: Springer."},{"issue":"4","key":"4945_CR20","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1287\/inte.20.4.105","volume":"20","author":"R Marsten","year":"1990","unstructured":"Marsten, R., Subramanian, R., Saltzman, M., Lustig, I., & Shanno, D. (1990). Interior point methods for linear programming: Just call Newton, Lagrange, and Fiacco and McCormick. Interfaces, 20(4), 105\u2013116.","journal-title":"Interfaces"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4945-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4945-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4945-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,12]],"date-time":"2018-01-12T06:26:28Z","timestamp":1515738388000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4945-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,8]]},"references-count":20,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["4945"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4945-1","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2017,9,8]]}}}