{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T10:04:25Z","timestamp":1730196265886,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1109\/allerton.2010.5707065","type":"proceedings-article","created":{"date-parts":[[2011,2,3]],"date-time":"2011-02-03T16:50:52Z","timestamp":1296751852000},"page":"1311-1318","source":"Crossref","is-referenced-by-count":6,"title":["Capacity-distortion trade-off in channels with state"],"prefix":"10.1109","author":[{"given":"Chiranjib","family":"Choudhuri","sequence":"first","affiliation":[]},{"given":"Young-Han","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Urbashi","family":"Mitra","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/26.718565"},{"key":"ref11","article-title":"A constrained channel coding approach to joint communication and channel estimation","author":"zhang","year":"2008","journal-title":"Proc IEEE Int Symp Inform Theory"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2002.1023498"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.844108"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.920242"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"ref16","article-title":"Lecture Notes on Network Information Theory","author":"gamal","year":"0","journal-title":"arXiv 1001 3404"},{"key":"ref17","article-title":"Foundations and Trends in Communications and Information Theory","volume":"4","author":"kramer","year":"0"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1979.1056084"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055508"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056723"},{"key":"ref3","first-page":"19","article-title":"Coding for channel with random parameters","volume":"9","author":"gel'fand","year":"1980","journal-title":"Probl Contr Inform Theory"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/18.923725"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.808134"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.839380"},{"key":"ref7","article-title":"Information-theoretic measures for anomaly detection","author":"lee","year":"2001","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"ref2","first-page":"52","article-title":"Coding in a memory with defective cells","volume":"10","author":"kusnetsov","year":"1974","journal-title":"Prohl Peredach Inform"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.24.0289"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/48.486787"}],"event":{"name":"2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","start":{"date-parts":[[2010,9,29]]},"location":"Monticello, IL, USA","end":{"date-parts":[[2010,10,1]]}},"container-title":["2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5701578\/5706874\/05707065.pdf?arnumber=5707065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T00:12:04Z","timestamp":1490055124000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5707065\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/allerton.2010.5707065","relation":{},"subject":[],"published":{"date-parts":[[2010,9]]}}}