{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:44:25Z","timestamp":1775054665338,"version":"3.50.1"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:00:00Z","timestamp":1656201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:00:00Z","timestamp":1656201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,26]]},"DOI":"10.1109\/isit50566.2022.9834680","type":"proceedings-article","created":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T15:34:22Z","timestamp":1659540862000},"page":"784-789","source":"Crossref","is-referenced-by-count":1,"title":["Weak Superimposed Codes of Improved Asymptotic Rate and Their Randomized Construction"],"prefix":"10.1109","author":[{"given":"Yu","family":"Tsunoda","sequence":"first","affiliation":[{"name":"University of Tsukuba,Faculty of Engineering, Information and Systems,Tsukuba,Japan,305-8573"}]},{"given":"Yuichiro","family":"Fujiwara","sequence":"additional","affiliation":[{"name":"Chiba University,Division of Mathematics and Informatics,Chiba,Japan,263-8522"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2019.08.020"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1017\/S0963548300004521"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1134\/S003294602102006X"},{"key":"ref30","first-page":"237","article-title":"Superimposed distance codes","volume":"18","author":"d\u2019yachkov","year":"1989","journal-title":"Problems Control Inf Theory"},{"key":"ref35","author":"mitzenmacher","year":"2017","journal-title":"Probability and Computing Randomization and Probabilistic"},{"key":"ref34","author":"alon","year":"2016","journal-title":"The Probabilistic Method"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2766659"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/BF02772959"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/0097-3165(82)90004-8"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0012-365X(03)00287-5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0012-365X(01)00452-6"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/0097-3165(94)90067-1"},{"key":"ref16","article-title":"Pooling Designs and Non-Adaptive Group Testing: Important Tools for DNA Sequencing","author":"du","year":"2006","journal-title":"World Sci"},{"key":"ref17","author":"du","year":"2000","journal-title":"Combinatorial Group Testing and its Applications"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/0378-3758(84)90058-2"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2021.3104670"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437884"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1984.1096146"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849238"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057026"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.809570"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8007113"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1134\/S0032946020040080"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2020.3033445"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/18.705568"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(03)00281-0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2019.10.032"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1964.1053689"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1023\/B:DESI.0000029217.97956.26"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2871477"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1667053.1667060"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2004.823341"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2048468"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2021.3054612"},{"key":"ref25","article-title":"X-codes: Theory and applications of unknowable inputs","author":"lumetta","year":"2003","journal-title":"UIUC Center for Reliable and High-Performance Computing Tech Rep CRHC-03-08 (also UILU-ENG-03-2217)"}],"event":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","location":"Espoo, Finland","start":{"date-parts":[[2022,6,26]]},"end":{"date-parts":[[2022,7,1]]}},"container-title":["2022 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9834325\/9834269\/09834680.pdf?arnumber=9834680","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:36:09Z","timestamp":1773347769000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9834680\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,26]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/isit50566.2022.9834680","relation":{},"subject":[],"published":{"date-parts":[[2022,6,26]]}}}