{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:25:51Z","timestamp":1725499551658},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1109\/isit.2005.1523573","type":"proceedings-article","created":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T15:51:59Z","timestamp":1160581919000},"page":"1401-1405","source":"Crossref","is-referenced-by-count":5,"title":["Density evolution for the simultaneous decoding of LDPC-based slepian-wolf source codes"],"prefix":"10.1109","author":[{"given":"A.W.","family":"Eckford","sequence":"first","affiliation":[]},{"family":"Wei Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","article-title":"Analysis of low-density parity-check codes for the Gilbert-Elliott channel","author":"eckford","year":"0","journal-title":"IEEE Trans Inform Theory"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/ITW.2004.1405287"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/DCC.2004.1281525"},{"key":"11","first-page":"63","article-title":"Slepian-Wolf coding of three binary sources using LDPC codes","author":"liveris","year":"2003","journal-title":"2nd Int Symp Turbo Codes"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/18.910572"},{"key":"3","article-title":"LDPC codes can approach the Slepian Wolf bound for general binary sources","author":"schonberg","year":"2002","journal-title":"Proc 40th Allerton Conf on Commun Control and Computing"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/TIT.2002.808103"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/TIT.1974.1055171"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/DCC.2004.1281473"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/ISIT.1997.613189"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/18.910577"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/ISIT.2003.1228186"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/LCOMM.2003.810001"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/DCC.2004.1281474"},{"key":"8","article-title":"Approaching the Slepian-Wolf boundary using practical channel codes","author":"cabarcas","year":"2004","journal-title":"Proc 2004 ISIT"}],"event":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","start":{"date-parts":[[2005,9,4]]},"location":"Adelaide, Australia","end":{"date-parts":[[2005,9,9]]}},"container-title":["Proceedings. International Symposium on Information Theory, 2005. ISIT 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10215\/32581\/01523573.pdf?arnumber=1523573","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T22:16:23Z","timestamp":1489616183000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1523573\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/isit.2005.1523573","relation":{},"subject":[],"published":{"date-parts":[[2005]]}}}