{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T08:30:30Z","timestamp":1725784230454},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/isit.2014.6874993","type":"proceedings-article","created":{"date-parts":[[2014,8,19]],"date-time":"2014-08-19T21:50:30Z","timestamp":1408485030000},"page":"1051-1055","source":"Crossref","is-referenced-by-count":8,"title":["Channel-code detection by a third-party receiver via the likelihood ratio test"],"prefix":"10.1109","author":[{"given":"Arti D.","family":"Yardi","sequence":"first","affiliation":[]},{"given":"Animesh","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Saravanan","family":"Vijayakumaran","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-332-5.50050-X"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/18.508834"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1981.1056393"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053953"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055873"},{"journal-title":"An Information-Theoretic Perspective of the Poisson Approximation via the Chen-Stein Method","year":"0","author":"sason","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557147"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2341-0"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1002\/0471200611","author":"cover","year":"1991","journal-title":"Elements of Information Theory"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.872971"},{"journal-title":"Error Control Coding","year":"2004","author":"lin","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261971"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557548"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2011.6133507"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1974.1055186"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/18.825794"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-218X(00)00353-X"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6655352"}],"event":{"name":"2014 IEEE International Symposium on Information Theory (ISIT)","start":{"date-parts":[[2014,6,29]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2014,7,4]]}},"container-title":["2014 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6867217\/6874773\/06874993.pdf?arnumber=6874993","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:24:46Z","timestamp":1602689086000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6874993"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/isit.2014.6874993","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}