{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T01:16:03Z","timestamp":1725671763077},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/isit.2010.5513256","type":"proceedings-article","created":{"date-parts":[[2010,8,19]],"date-time":"2010-08-19T15:57:25Z","timestamp":1282233445000},"page":"171-175","source":"Crossref","is-referenced-by-count":4,"title":["Hamming coding for Multiple Sources"],"prefix":"10.1109","author":[{"given":"Rick","family":"Ma","sequence":"first","affiliation":[]},{"given":"Samuel","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.2003.1193994"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.2003.1193992"},{"key":"ref12","article-title":"Network source coding using entropy constrained dithered quantization","author":"feng","year":"2003","journal-title":"Proc DCC'03"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2002.1023363"},{"key":"ref14","article-title":"Design of trellis codes for source coding with side information at the decoder","author":"wang","year":"2001","journal-title":"Proc DCC'01"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.2000.838191"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.2004.1281474"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.1997.613189"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2005.844959"},{"key":"ref19","article-title":"On the reliability function of variable-rate Slepian-Wolf coding","author":"chen","year":"0","journal-title":"45th Annual Allerton Conference"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.871046"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.1999.755665"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056454"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.855584"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2003.1292028"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/26.46532"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1974.1055171"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2003.1247033"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1973.1055037"},{"key":"ref20","article-title":"Slepian-Wolf coding of three binary sources using LDPC codes","author":"liveris","year":"2003","journal-title":"Proc Intl Symp Turbo Codes and Related Topics"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.2010.85"}],"event":{"name":"2010 IEEE International Symposium on Information Theory - ISIT","start":{"date-parts":[[2010,6,13]]},"location":"Austin, TX, USA","end":{"date-parts":[[2010,6,18]]}},"container-title":["2010 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5508195\/5513230\/05513256.pdf?arnumber=5513256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T16:17:51Z","timestamp":1489853871000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5513256\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/isit.2010.5513256","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}