{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T08:03:15Z","timestamp":1761292995168},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/itw.2012.6404638","type":"proceedings-article","created":{"date-parts":[[2013,1,17]],"date-time":"2013-01-17T20:30:12Z","timestamp":1358454612000},"page":"114-118","source":"Crossref","is-referenced-by-count":25,"title":["Achieving the capacity of any DMC using only polar codes"],"prefix":"10.1109","author":[{"given":"David","family":"Sutter","sequence":"first","affiliation":[]},{"given":"Joseph M.","family":"Renes","sequence":"additional","affiliation":[]},{"given":"Frederic","family":"Dupuis","sequence":"additional","affiliation":[]},{"given":"Renato","family":"Renner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2010.5706965"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2012.6283739"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2011.6033892"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1977.1055718"},{"key":"14","article-title":"How to construct polar codes","author":"tal","year":"2011","journal-title":"Information Theory Workshop (ITW) 2010"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2011.5743556"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2012.6404638"},{"journal-title":"Information Theory and Reliable Communication","year":"1968","author":"gallager","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2009.5351487"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2021379"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2011.6033870"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177692552"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2010.5513555"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2010.5513567"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2162226"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2040961"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1142\/9789812562494_0013"}],"event":{"name":"2012 IEEE Information Theory Workshop (ITW 2012)","start":{"date-parts":[[2012,9,3]]},"location":"Lausanne, Switzerland","end":{"date-parts":[[2012,9,7]]}},"container-title":["2012 IEEE Information Theory Workshop"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6389798\/6404631\/06404638.pdf?arnumber=6404638","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T18:37:58Z","timestamp":1490207878000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6404638\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/itw.2012.6404638","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}