{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:03:28Z","timestamp":1725807808484},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/mlsp.2016.7738870","type":"proceedings-article","created":{"date-parts":[[2016,11,10]],"date-time":"2016-11-10T21:40:41Z","timestamp":1478814041000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Binary independent component analysis: Theory, bounds and algorithms"],"prefix":"10.1109","author":[{"given":"Amichai","family":"Painsky","sequence":"first","affiliation":[]},{"given":"Saharon","family":"Rosset","sequence":"additional","affiliation":[]},{"given":"Meir","family":"Feder","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2510657"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2145090"},{"key":"ref12","first-page":"618","article-title":"An immune-inspired information-theoretic approach to the problem of ICA over a Galois field","author":"romis","year":"2011","journal-title":"Information Theory Workshop"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CIMSIVP.2014.7013284"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1992.4.6.863"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/0165-1684(94)90029-9"},{"journal-title":"Communication over an Unknown Channel via Common Broadcasting","year":"2003","author":"shulman","key":"ref16"},{"key":"ref17","article-title":"A simple and efficient approach for adaptive entropy coding over large alphabets","author":"painsky","year":"2016","journal-title":"Data Compression Conference (DCC)"},{"journal-title":"An Information-Theoretic Approach to Neural Computing","year":"1996","author":"obradovic","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/BF00126625"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2002.804287"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45482-9_5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22887-2_25"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2006.02.025"},{"key":"ref2","first-page":"29","article-title":"Improving the convergence of back-propagation learning with second order methods","author":"becker","year":"1988","journal-title":"Proceedings of the 1988 Connectionist Models Summer School"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.3.412"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"}],"event":{"name":"2016 IEEE 26th International Workshop on Machine Learning for Signal Processing (MLSP)","start":{"date-parts":[[2016,9,13]]},"location":"Vietri sul Mare, Salerno, Italy","end":{"date-parts":[[2016,9,16]]}},"container-title":["2016 IEEE 26th International Workshop on Machine Learning for Signal Processing (MLSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7605057\/7738802\/07738870.pdf?arnumber=7738870","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,11,30]],"date-time":"2016-11-30T12:03:16Z","timestamp":1480507396000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7738870\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/mlsp.2016.7738870","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}