{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T14:23:45Z","timestamp":1775139825015,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2009,12,1]],"date-time":"2009-12-01T00:00:00Z","timestamp":1259625600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1109\/tit.2009.2032819","type":"journal-article","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T18:41:38Z","timestamp":1259088098000},"page":"5511-5539","source":"Crossref","is-referenced-by-count":74,"title":["Unequal Error Protection: An Information-Theoretic Perspective"],"prefix":"10.1109","volume":"55","author":[{"given":"Shashi","family":"Borade","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Baris","family":"Nakiboglu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lizhong","family":"Zheng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2003.1228282"},{"key":"ref38","article-title":"unequal error protection codes: theory and practice","author":"trott","year":"1996","journal-title":"Proc IEEE Information Theory Workshop"},{"key":"ref33","volume":"arxiv cs 610146v2 [cs it]","author":"sahai","year":"0","journal-title":"The Necessity and Sufficiency of Anytime Capacity for Control Over a Noisy Communication Link Part II Vector Systems"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2007.892436"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2004.1365489"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1155\/2007\/92659"},{"key":"ref37","author":"albert","year":"1996","journal-title":"Probability"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(67)90052-6"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref34","volume":"arxiv cs 610143v2 [cs it]","author":"sahai","year":"0","journal-title":"Source Coding and Channel Requirements for Unstable Processes"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/18.243441"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1979.1056119"},{"key":"ref11","author":"thomas","year":"1991","journal-title":"Elements of Information Theory"},{"key":"ref12","first-page":"315","article-title":"joint source-channel error exponent","volume":"9","author":"csiszr","year":"1980","journal-title":"Probl Contr Inf Theory"},{"key":"ref13","author":"imre","year":"1982","journal-title":"Information Theory Coding Theorems for Discrete Memoryless Systems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2008.4595216"},{"key":"ref15","first-page":"1641","article-title":"on successive refinement of diversity","author":"diggavi","year":"2004","journal-title":"Proc 42nd Annu Allerton Conf Communications Control and Computing"},{"key":"ref16","first-page":"24","article-title":"cyclic codes with unequal protection of symbols","volume":"12","author":"dynkin","year":"1976","journal-title":"Probl Perd Inform"},{"key":"ref17","author":"forney","year":"0","journal-title":"On exponential error bounds for random codes on the BSC"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1968.1054129"},{"key":"ref19","author":"gallager","year":"0","journal-title":"Fixed Composition Arguments and Lower Bounds to Error Probability"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.850230"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2021322"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"1523","DOI":"10.1109\/TIT.2003.811925","article-title":"constructing linear unequal error protection codes from algebraic curves","volume":"49","author":"zbudak","year":"2003","journal-title":"IEEE Trans Inf Theory"},{"key":"ref3","first-page":"44","article-title":"bounds for codes with unequal protection of two sets of messages","volume":"15","author":"bassalygo","year":"1979","journal-title":"Probl Perd Inform"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IZS.2008.4497265"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2004.1365488"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5205858"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.876353"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1981.1056327"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/18.556670"},{"key":"ref9","first-page":"10","article-title":"data transmission over a discrete channel with feedback, random transmission time","volume":"12","author":"burnashev","year":"1976","journal-title":"Probl Perd Inform"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/18.42172"},{"key":"ref20","author":"robert","year":"1968","journal-title":"Information Theory and Reliable Communication"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1972.1054869"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056753"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1054054"},{"key":"ref23","first-page":"3","article-title":"on message transmission over a discrete channel with noiseless feedback","volume":"15","author":"kudryashov","year":"1973","journal-title":"Probl Perd Inform"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/18.272481"},{"key":"ref25","author":"montanari","year":"0","journal-title":"On Exponential Error Bounds for Random Codes on the DMC"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/18\/5319729\/05319734.pdf?arnumber=5319734","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:52:37Z","timestamp":1633909957000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5319734\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12]]},"references-count":40,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tit.2009.2032819","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,12]]}}}