{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:59:24Z","timestamp":1773377964495,"version":"3.50.1"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:00:00Z","timestamp":1656201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:00:00Z","timestamp":1656201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,26]]},"DOI":"10.1109\/isit50566.2022.9834539","type":"proceedings-article","created":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T15:34:22Z","timestamp":1659540862000},"page":"474-479","source":"Crossref","is-referenced-by-count":12,"title":["Learning-Augmented Streaming Codes are Approximately Optimal for Variable-Size Messages"],"prefix":"10.1109","author":[{"given":"Michael","family":"Rudow","sequence":"first","affiliation":[]},{"given":"K.V.","family":"Rashmi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"7368","article-title":"Ko codes: inventing nonlinear encoding and decoding for reliable wireless communication via deep-learning","author":"makkuva","year":"2021","journal-title":"International Conference on Machine Learning"},{"key":"ref38","first-page":"2329","article-title":"Hyper-graph-network decoders for block codes","volume":"32","author":"nachmani","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006751"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2788405"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2017.7926071"},{"key":"ref30","first-page":"303","article-title":"Customizing ml predictions for online algorithms","author":"anand","year":"2020","journal-title":"International Conference on Machine Learning"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2019.8815400"},{"key":"ref36","first-page":"2758","article-title":"Turbo autoencoder: Deep learning based channel codes for point-to-point communication channels","volume":"32","author":"jiang","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254811"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2784180"},{"key":"ref28","article-title":"Learning-based frequency estimation algorithms","author":"hsu","year":"2019","journal-title":"International Conference on Learning Representations"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1017\/9781108637435.037"},{"key":"ref29","article-title":"Learning-augmented data stream algorithms","author":"jiang","year":"2019","journal-title":"International Conference on Learning Representations"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.2639062"},{"key":"ref1","article-title":"Learning-based streaming codes are approximately optimal for variable-size messages","author":"rudow","year":"2022"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174458"},{"key":"ref22","first-page":"345","article-title":"Online metric algorithms with untrusted predictions","author":"antoniadis","year":"2020","journal-title":"International Conference on Machine Learning"},{"key":"ref21","first-page":"3296","article-title":"Competitive caching with machine learned advice","author":"lykouris","year":"2018","journal-title":"International Conference on Machine Learning"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196909"},{"key":"ref23","article-title":"A model for learned bloom filters and optimizing by sandwiching","volume":"31","author":"mitzenmacher","year":"2018","journal-title":"Advances in neural information processing systems"},{"key":"ref26","first-page":"20083","article-title":"The primal-dual method for learning augmented algorithms","volume":"33","author":"bamas","year":"2020","journal-title":"Advances in neural information processing systems"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975994.114"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-0865-5_26"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110514"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2663110"},{"key":"ref40","article-title":"Deepcode: Feedback codes via deep learning","volume":"31","author":"kim","year":"2018","journal-title":"Advances in neural information processing systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2012.6284055"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620379"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2940833"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057027"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2011.6189949"},{"key":"ref17","first-page":"327","article-title":"On prioritized coding for real-time streaming under packet erasures","author":"wei","year":"2013","journal-title":"Allerton"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT45174.2021.9518162"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2022.3170895"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557355"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.834844"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2894124"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2618924"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2020.2983152"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2016.7886039"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437570"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2021.3121101"},{"key":"ref46","article-title":"Detection algorithms for communication systems using deep learning","author":"farsad","year":"2017"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2019.2899805"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2017.2758370"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2848294"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2020.2983165"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2020.2987203"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997434"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS47774.2020.00024"}],"event":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","location":"Espoo, Finland","start":{"date-parts":[[2022,6,26]]},"end":{"date-parts":[[2022,7,1]]}},"container-title":["2022 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9834325\/9834269\/09834539.pdf?arnumber=9834539","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:35:42Z","timestamp":1773347742000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9834539\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,26]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/isit50566.2022.9834539","relation":{},"subject":[],"published":{"date-parts":[[2022,6,26]]}}}