{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:50:21Z","timestamp":1761663021228},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T00:00:00Z","timestamp":1330560000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/tit.2011.2172391","type":"journal-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T19:24:47Z","timestamp":1318965887000},"page":"1441-1469","source":"Crossref","is-referenced-by-count":19,"title":["Design of Signature Sequences for Overloaded CDMA and Bounds on the Sum Capacity With Arbitrary Symbol Alphabets"],"prefix":"10.1109","volume":"58","author":[{"given":"K.","family":"Alishahi","sequence":"first","affiliation":[]},{"given":"S.","family":"Dashmiz","sequence":"additional","affiliation":[]},{"given":"P.","family":"Pad","sequence":"additional","affiliation":[]},{"given":"F.","family":"Marvasti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/18.32152"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2010.5513400"},{"key":"ref33","year":"2008","journal-title":"Iterative synchronous and asynchronous multi-user detection with optimum soft limiter"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2112231"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/26.818883"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502260"},{"key":"ref37","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-1229-5","author":"marvasti","year":"2001","journal-title":"Nonuniform Sampling Theory and Practice"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/78.552210"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/WOCN.2005.1436070"},{"key":"ref34","article-title":"New bounds for binary and ternary overloaded CDMA","author":"dashmiz","year":"2009"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.804053"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.851749"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2006.1633802"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.847700"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557188"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2070131"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2006.1576553"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1088\/1751-8113\/40\/20\/002"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2018181"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2023756"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1109\/JSAC.2008.080402","article-title":"Multiuser detection of sparsely spread CDMA","volume":"26","author":"guo","year":"2008","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.4153\/CMB-1971-092-9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1364\/JON.6.001138"},{"key":"ref27","first-page":"334","article-title":"Construction of signature codes and the coin weighing problem","volume":"25","author":"martirossian","year":"1989","journal-title":"Probl Inf Trans"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2006.877941"},{"key":"ref6","author":"viterbi","year":"1995","journal-title":"CDMA Principles of Spread Spectrum Communication"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/18.705572"},{"key":"ref5","author":"verdu","year":"1998","journal-title":"Multiuser Detection"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/18.335940"},{"key":"ref7","author":"massey","year":"1993","journal-title":"Sequences II Methods in Communication Security and Computer Sciences"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/18.30982"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1974.1055219"},{"key":"ref1","author":"ojanpera","year":"1998","journal-title":"Wideband CDMA for Third Generation Mobile Communications Universal Personal Communications"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/18.930936"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/TIT.2008.2008139","article-title":"Recursive constructions of detecting matrices for multiuser coding: A unifying approach","volume":"55","author":"mow","year":"2009","journal-title":"IEEE Trans Inf Theory"},{"key":"ref45","author":"shepp","year":"1978","journal-title":"Entropy of the sum of independent Bernoulli random variables and of the multinominal distribution"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.2307\/2312835"},{"key":"ref47","author":"dembo","year":"2009","journal-title":"Large Deviations Techniques and Application"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199003"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1979.1056109"},{"key":"ref24","first-page":"195","article-title":"On a combinatory detection problem","volume":"9","author":"lindstrm","year":"1964","journal-title":"Publ Hung Acad Sci"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.826694"},{"key":"ref23","first-page":"229","article-title":"On two problems of information theory","volume":"8a","author":"erds","year":"1963","journal-title":"Magyar Tud Akad Mat Kutato Int Ko zl"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056549"},{"key":"ref26","author":"lindstrm","year":"1975","journal-title":"A Survey of Statistical Design and Linear Models"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1984.1056862"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.4153\/CJM-1966-007-2"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/18\/6157047\/06051491.pdf?arnumber=6051491","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:52:11Z","timestamp":1633909931000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6051491\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":47,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tit.2011.2172391","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,3]]}}}