{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:38:08Z","timestamp":1729629488189,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/isit.2014.6874875","type":"proceedings-article","created":{"date-parts":[[2014,8,19]],"date-time":"2014-08-19T21:50:30Z","timestamp":1408485030000},"page":"461-465","source":"Crossref","is-referenced-by-count":5,"title":["Second-order asymptotics for the gaussian MAC with degraded message sets"],"prefix":"10.1109","author":[{"given":"Jonathan","family":"Scarlett","sequence":"first","affiliation":[]},{"given":"Vincent Y. F.","family":"Tan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"1976","author":"rudin","journal-title":"Principles of Mathematical Analysis","key":"17"},{"year":"1971","author":"feller","journal-title":"An Introduction to Probability Theory and Its Applications","key":"15"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/TIT.2014.2310453"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/18.825846"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1214\/aop\/1176990448"},{"year":"2010","author":"polyanskiy","journal-title":"Channel Coding Non-Asymptotic Fundamental Limits","key":"11"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1017\/CBO9780511921889"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/TIT.2013.2291231"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/ISIT.2013.6620571"},{"year":"2012","author":"el-gamal","journal-title":"Network Information Theory","key":"1"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/ISIT.2014.6874875"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/EEEI.2012.6376904"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/Allerton.2013.6736578"},{"year":"2013","author":"molavianjazi","journal-title":"A Finite-Blocklength Perspective on Gaussian Multi-Access Channels","key":"5"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/ISIT.2012.6284677"},{"key":"9","doi-asserted-by":"crossref","first-page":"4947","DOI":"10.1109\/TIT.2009.2030478","article-title":"Information spectrum approach to second-order coding rate in channel coding","volume":"55","author":"hayashi","year":"2009","journal-title":"IEEE Trans on Inf Th"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/TIT.2010.2043769"}],"event":{"name":"2014 IEEE International Symposium on Information Theory (ISIT)","start":{"date-parts":[[2014,6,29]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2014,7,4]]}},"container-title":["2014 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6867217\/6874773\/06874875.pdf?arnumber=6874875","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:20:49Z","timestamp":1602688849000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6874875"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/isit.2014.6874875","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}