{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:53:04Z","timestamp":1729677184034,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/allerton.2017.8262787","type":"proceedings-article","created":{"date-parts":[[2018,1,18]],"date-time":"2018-01-18T18:03:47Z","timestamp":1516298627000},"page":"565-571","source":"Crossref","is-referenced-by-count":2,"title":["Polar coding for multiple descriptions using monotone chain rules"],"prefix":"10.1109","author":[{"given":"Alankrita","family":"Bhatt","sequence":"first","affiliation":[]},{"given":"Nadim","family":"Ghaddar","sequence":"additional","affiliation":[]},{"given":"Lele","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"6583","DOI":"10.1109\/TIT.2013.2268946","article-title":"Polar codes for the two-user multiple-access channel","volume":"59","author":"?a?o?lu","year":"2013","journal-title":"IEEE Trans Inf Theory"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2201374"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620402"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2368555"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2014.6874845"},{"journal-title":"Channel Coding Techniques for Network Communication","year":"2015","author":"wang","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7282712"},{"key":"ref17","first-page":"59","article-title":"Polar codes for degraded relay channels","author":"karzand","year":"2012","journal-title":"Proc Int Zurich Seminar Commun"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.08.100875"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2162275"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2368561"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139030687"},{"key":"ref27","first-page":"566","article-title":"Polar coding for the slepian-wolf problem based on monotone chain rules","author":"ar?kan","year":"2012","journal-title":"Proc IEEE Internat Symp Inf Theory"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1981.tb00226.x"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.885498"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056588"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2021379"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056759"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1980.tb03372.x"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2104650"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1980.1056251"},{"key":"ref20","first-page":"1117","article-title":"A new polar coding scheme for strong security on wiretap channels","author":"?a?o?lu","year":"2013","journal-title":"Proc IEEE Internat Symp Inf Theory"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2015.7133098"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1109\/JSAC.2015.2504275","article-title":"Polar coding for the general wiretap channel with extensions to multiuser scenarios","volume":"34","author":"wei","year":"2016","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2014.6875073"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2539145"},{"key":"ref26","first-page":"899","article-title":"Source polarization","author":"ar?kan","year":"2010","journal-title":"Proc IEEE Internat Symp Inf Theory"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"2937","DOI":"10.1109\/TIT.2016.2549549","article-title":"Universal polarization","volume":"62","author":"?a?o?lu","year":"2016","journal-title":"IEEE Trans Inf Theory"}],"event":{"name":"2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","start":{"date-parts":[[2017,10,3]]},"location":"Monticello, IL, USA","end":{"date-parts":[[2017,10,6]]}},"container-title":["2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8253908\/8262705\/08262787.pdf?arnumber=8262787","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T10:43:13Z","timestamp":1570617793000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8262787\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/allerton.2017.8262787","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}