{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:10:58Z","timestamp":1729653058854,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/isit.2012.6284217","type":"proceedings-article","created":{"date-parts":[[2012,8,30]],"date-time":"2012-08-30T20:57:57Z","timestamp":1346360277000},"page":"398-402","source":"Crossref","is-referenced-by-count":4,"title":["Is non-unique decoding necessary?"],"prefix":"10.1109","author":[{"given":"Shirin Saeedi","family":"Bidokhti","sequence":"first","affiliation":[]},{"given":"Vinod M.","family":"Prabhakaran","sequence":"additional","affiliation":[]},{"given":"Suhas. N.","family":"Diggavi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394810"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2011.6089495"},{"journal-title":"Is Nonunique Decoding Necessary?","year":"2012","author":"saeedi","key":"11"},{"key":"12","article-title":"Combinatorial algorithms for wireless information flow","author":"ebrahimi","year":"2009","journal-title":"ACM Transactions on Algorithms"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1981.1056307"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1979.1056046"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139030687"},{"journal-title":"An Achievability Scheme for the Compound Channel with State Noncausally Available at the Encoder","year":"2010","author":"nair","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2119930"},{"key":"6","doi-asserted-by":"crossref","first-page":"1872","DOI":"10.1109\/TIT.2011.2110110","article-title":"Wireless network information flow: A deterministic approach","volume":"57","author":"avestimehr","year":"2011","journal-title":"IEEE Transactions on Information Theory"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.924720"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2027512"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2119890"},{"journal-title":"3-Receiver Broadcast Channels with Common and Confidential Messages","year":"2011","author":"chia","key":"8"}],"event":{"name":"2012 IEEE International Symposium on Information Theory - ISIT","start":{"date-parts":[[2012,7,1]]},"location":"Cambridge, MA, USA","end":{"date-parts":[[2012,7,6]]}},"container-title":["2012 IEEE International Symposium on Information Theory Proceedings"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6268627\/6281806\/06284217.pdf?arnumber=6284217","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T23:28:31Z","timestamp":1498001311000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6284217\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/isit.2012.6284217","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}