{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:31:28Z","timestamp":1747809088624,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/isit.2010.5513253","type":"proceedings-article","created":{"date-parts":[[2010,8,19]],"date-time":"2010-08-19T15:57:25Z","timestamp":1282233445000},"page":"186-190","source":"Crossref","is-referenced-by-count":4,"title":["Universal Slepian-Wolf source codes using low-density parity-check matrices"],"prefix":"10.1109","author":[{"given":"Tetsunao","family":"Matsuta","sequence":"first","affiliation":[]},{"given":"Tomohiko","family":"Uyematsu","sequence":"additional","affiliation":[]},{"given":"Ryutaroh","family":"Matsumoto","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"576","article-title":"LDPC codes can approach the Slepian-Wolf bound for general binary sources","author":"schonberg","year":"2002","journal-title":"Proc 40th Annu Allerton Conf Communication Control and Computing"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.855604"},{"key":"ref12","article-title":"Problems in application of LDPC codes to information reconciliation in quantum key distribution protocols","author":"matsumoto","year":"2009","journal-title":"IEICE Tech Group Report IT 2009-41"},{"article-title":"Information Theory: Coding Theorems for Discrete Memoryless Systems","year":"1981","author":"csiszar","key":"ref13"},{"article-title":"Modern Shannon Theory","year":"1998","author":"uyematsu","key":"ref14"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-12066-8","article-title":"Information-Spectrum Methods in Information Theory","author":"han","year":"2003"},{"key":"ref3","first-page":"1063","article-title":"Coding theorems on correlated general sources","volume":"78","author":"miyake","year":"1995","journal-title":"IEICE Trans Fundamentals"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/18.748992"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4347.001.0001","article-title":"Low-Density Parity-Check Codes","author":"gallager","year":"1963"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1088\/0305-4470\/35\/8\/101"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.878215"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056524"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1973.1055037"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2002.804244"}],"event":{"name":"2010 IEEE International Symposium on Information Theory - ISIT","start":{"date-parts":[[2010,6,13]]},"location":"Austin, TX, USA","end":{"date-parts":[[2010,6,18]]}},"container-title":["2010 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5508195\/5513230\/05513253.pdf?arnumber=5513253","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T23:39:18Z","timestamp":1559432358000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5513253\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/isit.2010.5513253","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}