{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T20:02:41Z","timestamp":1694635361225},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T00:00:00Z","timestamp":1238544000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2009,4]]},"DOI":"10.1109\/tit.2009.2013018","type":"journal-article","created":{"date-parts":[[2009,3,19]],"date-time":"2009-03-19T19:18:03Z","timestamp":1237490283000},"page":"1487-1518","source":"Crossref","is-referenced-by-count":3,"title":["Error Exponents for Asymmetric Two-User Discrete Memoryless Source-Channel Coding Systems"],"prefix":"10.1109","volume":"55","author":[{"given":"Yangfan","family":"Zhong","sequence":"first","affiliation":[]},{"given":"Fady","family":"Alajaji","sequence":"additional","affiliation":[]},{"given":"L. Lorne","family":"Campbell","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.909092"},{"key":"ref10","author":"csiszr","year":"1981","journal-title":"Information Theory Coding Theorems for Discrete Memoryless Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.872971"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1668418"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1981.1056323"},{"key":"ref15","author":"gallager","year":"1968","journal-title":"Information Theory and Reliable Communication"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1979.1056029"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1987.1057353"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/18.623141"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e88-a.11.3196"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.909093"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1987.1057342"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/0471773735"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1973.1054980"},{"key":"ref6","author":"cover","year":"2006","journal-title":"Elements of Information Theory"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.871608"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.924671"},{"key":"ref8","first-page":"315","article-title":"joint source-channel error exponent","volume":"9","author":"csiszr","year":"1980","journal-title":"Probl Contr Inf Theory"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1980.1056273"},{"key":"ref2","first-page":"23","article-title":"lower bound for the error probability of multiple-access channels","volume":"11","author":"arutyunyan (haroutunian)","year":"1975","journal-title":"Probl Pered Inform"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/18.720546"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056669"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.262080"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1980.1056275"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1977.1055655"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/18.485710"},{"key":"ref23","first-page":"1","article-title":"cognitive interference channels with confidential messages","author":"liang","year":"2007","journal-title":"Proc Annual Allerton Conf on Communication Control and Computing"},{"key":"ref26","author":"mitola","year":"2000","journal-title":"Cognitive Radio An Integrated Agent Architecture for Software Defined Radio"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/35.393001"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/18\/4802290\/04802300.pdf?arnumber=4802300","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:44:06Z","timestamp":1633913046000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4802300\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4]]},"references-count":30,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tit.2009.2013018","relation":{},"ISSN":["0018-9448"],"issn-type":[{"value":"0018-9448","type":"print"}],"subject":[],"published":{"date-parts":[[2009,4]]}}}