{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T14:53:25Z","timestamp":1729608805941,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/isit.2010.5513231","type":"proceedings-article","created":{"date-parts":[[2010,8,19]],"date-time":"2010-08-19T19:57:25Z","timestamp":1282247845000},"page":"1213-1217","source":"Crossref","is-referenced-by-count":3,"title":["Generalized belief propagation algorithm for the capacity of multi-dimensional run-length limited constraints"],"prefix":"10.1109","author":[{"given":"Giovanni","family":"Sabato","sequence":"first","affiliation":[]},{"given":"Mehdi","family":"Molkaraie","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.917638"},{"key":"ref12","volume":"6282","author":"siegel","year":"2006","journal-title":"SPIE Proc Optical Data Storage Con"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2008.4595230"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5206053"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/18.669282"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.850085"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.37236\/1465","article-title":"Zero capacity region of multidimensional run length constraints","volume":"6","author":"ito","year":"1999","journal-title":"The Electronic Journal of Combinatorics"},{"journal-title":"Codes for Mass Data Storage Systems","year":"2004","author":"schouhamer immink","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/18.910572"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/18.771152"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/18.841179"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2009.5351455"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.892781"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1137\/S089548019528993X"},{"journal-title":"Simulation-based techniques to study two-dimensional ISI channels and constrained systems","year":"2009","author":"sabato","key":"ref9"}],"event":{"name":"2010 IEEE International Symposium on Information Theory - ISIT","start":{"date-parts":[[2010,6,13]]},"location":"Austin, TX, USA","end":{"date-parts":[[2010,6,18]]}},"container-title":["2010 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5508195\/5513230\/05513231.pdf?arnumber=5513231","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,10]],"date-time":"2020-06-10T18:31:55Z","timestamp":1591813915000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5513231\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/isit.2010.5513231","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}