{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T16:08:24Z","timestamp":1772122104571,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1109\/itw44776.2019.8989388","type":"proceedings-article","created":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T22:18:26Z","timestamp":1581373106000},"page":"1-5","source":"Crossref","is-referenced-by-count":32,"title":["An Upper Bound on the Capacity of the DNA Storage Channel"],"prefix":"10.1109","author":[{"given":"Andreas","family":"Lenz","sequence":"first","affiliation":[{"name":"Technical University of Munich,Institute for Communications Engineering,Germany"}]},{"given":"Paul H.","family":"Siegel","sequence":"additional","affiliation":[{"name":"CMRR, University of California,Department of Electrical and Computer Engineering,San Diego,California"}]},{"given":"Antonia","family":"Wachter-Zeh","sequence":"additional","affiliation":[{"name":"Technical University of Munich,Institute for Communications Engineering,Germany"}]},{"given":"Eitan","family":"Yaakobi","sequence":"additional","affiliation":[{"name":"Technion &#x2013; Israel Institute of Technology,Computer Science Department,Haifa,Israel"}]}],"member":"263","reference":[{"key":"ref10","first-page":"5156","article-title":"Codes in the space of multisets-coding for permutation channels with impairments","volume":"64","author":"kova?evi?","year":"2016","journal-title":"IEEE Trans Inf Theory"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437544"},{"key":"ref12","author":"song","year":"2018","journal-title":"Sequence-subset distance and coding for error control in DNA-based data storage"},{"key":"ref13","article-title":"On coding over sliced information","author":"sima","year":"2018"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849523"},{"key":"ref15","first-page":"3360","article-title":"Clustering billions of reads for DNA data storage","author":"rashtchian","year":"2017","journal-title":"Conf Neural Information Processing Systems"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261874"},{"key":"ref17","author":"kolchin","year":"1978","journal-title":"Random Allocations"},{"key":"ref18","author":"ash","year":"1965","journal-title":"Information Theory"},{"key":"ref19","author":"cover","year":"2006","journal-title":"Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.05.398"},{"key":"ref3","article-title":"A rewritable, random-access DNA-based storage system","volume":"5","author":"yazdi","year":"2015","journal-title":"Scientific Reports"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/nbt.4079"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-017-05188-1","article-title":"Portable and errorfree DNA-based data storage","volume":"7","author":"yazdi","year":"2017","journal-title":"Scientific Reports"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849789"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8007106"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1126\/science.1226355"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2555321"}],"event":{"name":"2019 IEEE Information Theory Workshop (ITW)","location":"Visby, Sweden","start":{"date-parts":[[2019,8,25]]},"end":{"date-parts":[[2019,8,28]]}},"container-title":["2019 IEEE Information Theory Workshop (ITW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8968650\/8988913\/08989388.pdf?arnumber=8989388","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T19:41:55Z","timestamp":1753731715000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8989388\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/itw44776.2019.8989388","relation":{},"subject":[],"published":{"date-parts":[[2019,8]]}}}