{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:55:13Z","timestamp":1730274913389,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/isit.2015.7282534","type":"proceedings-article","created":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T22:09:52Z","timestamp":1443737392000},"page":"646-650","source":"Crossref","is-referenced-by-count":6,"title":["Rewriting flash memories by message passing"],"prefix":"10.1109","author":[{"given":"Eyal","family":"En Gad","sequence":"first","affiliation":[]},{"given":"Wentao","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jehoshua","family":"Bruck","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620390"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2251755"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2014.6875201"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/18.748992"},{"key":"ref14","article-title":"Iterative quantization using codes on graphs","author":"martinian","year":"2003","journal-title":"Proc Allerton"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2014.6874844"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.805067"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(82)90344-8"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.2008.0439"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2200291"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7282534"},{"key":"ref3","first-page":"1638","article-title":"Polar coding for noisy write-once memories","author":"en gad","year":"2014","journal-title":"Proc ISIT"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557323"},{"key":"ref5","first-page":"19","article-title":"Coding for channel with random parameters","volume":"9","author":"gel'fand","year":"1980","journal-title":"Problems of Control Theory"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1056994"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ITW2.2006.323776"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261737"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2255732"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.75.032345"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2176465"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/18.79943"},{"key":"ref21","article-title":"Write once, get 50% free: Saving SSD erase costs using WOM codes","author":"yadgar","year":"2015","journal-title":"USENIX FAST"}],"event":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","start":{"date-parts":[[2015,6,14]]},"location":"Hong Kong, Hong Kong","end":{"date-parts":[[2015,6,19]]}},"container-title":["2015 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7270906\/7282397\/07282534.pdf?arnumber=7282534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T20:55:08Z","timestamp":1490388908000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7282534\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/isit.2015.7282534","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}