{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:00:32Z","timestamp":1772283632136,"version":"3.50.1"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2015,4,1]],"date-time":"2015-04-01T00:00:00Z","timestamp":1427846400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"ETH, Zurich, Switzerland","award":["ETH-15 12-2"],"award-info":[{"award-number":["ETH-15 12-2"]}]},{"name":"HYCON2 Network of Excellence"},{"name":"Swiss National Science Foundation through the National Centre of Competence in Research within the Project entitled Quantum Science and Technology","award":["200020-135048"],"award-info":[{"award-number":["200020-135048"]}]},{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["258932"],"award-info":[{"award-number":["258932"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/tit.2015.2401002","type":"journal-article","created":{"date-parts":[[2015,2,6]],"date-time":"2015-02-06T15:14:38Z","timestamp":1423235678000},"page":"1649-1666","source":"Crossref","is-referenced-by-count":20,"title":["Efficient Approximation of Channel Capacities"],"prefix":"10.1109","volume":"61","author":[{"given":"Tobias","family":"Sutter","sequence":"first","affiliation":[]},{"given":"David","family":"Sutter","sequence":"additional","affiliation":[]},{"given":"Peyman Mohajerin","family":"Esfahani","sequence":"additional","affiliation":[]},{"given":"John","family":"Lygeros","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1515\/9783110273403"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1080\/10556788.2013.835812"},{"key":"ref33","first-page":"691","article-title":"The asymptotic capacity of the direct detection photon channel with a bandwidth constraint","author":"brady","year":"1990","journal-title":"Proc 28th Annu Allerton Conf Commun Control Comput"},{"key":"ref32","article-title":"Efficient approximation of quantum channel capacities","author":"sutter","year":"2014"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-013-0677-5"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84800-155-8_12"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2262919"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2009.12.080559"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2134430"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1364\/JOSAB.24.000739"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.5.000329"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1109\/TCOMM.2013.112513.130142","article-title":"Capacity-achieving distributions for the discrete-time Poisson channel&#x2014;Part I: General properties and numerical techniques","volume":"62","author":"cao","year":"2014","journal-title":"IEEE Trans Commun"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1109\/TCOMM.2013.112513.130143","article-title":"Capacity-achieving distributions for the discrete-time Poisson channel&#x2014;Part II: Binary inputs","volume":"62","author":"cao","year":"2014","journal-title":"IEEE Trans Commun"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.822581"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.850108"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-004-0552-5"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.2008121"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/BF01448363"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/0100000005","article-title":"Geometric programming for communication systems","volume":"2","author":"mung","year":"2005","journal-title":"Found Trends Commun Inf Theory"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-8853-9","author":"nesterov","year":"2004","journal-title":"Introductory Lectures on Convex Optimization A Basic Course (Applied Optimization)"},{"key":"ref28","volume":"2","author":"fremlin","year":"2010","journal-title":"Measure Theory Broad Foundations"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1972.1054753"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1049\/ip-i-2.1990.0056"},{"key":"ref3","author":"gallager","year":"1968","journal-title":"Information Theory and Reliable Communication"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2000.866533"},{"key":"ref29","author":"anderson","year":"1987","journal-title":"Linear Programming in Infinite-Dimensional Spaces Theory and Applications (Discrete Mathematics and Optimization)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/18.923716"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2048452"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2004.1405276"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1972.1054855"},{"key":"ref9","first-page":"221","article-title":"Numerical computation of the capacity of continuous memoryless channels","author":"dauwels","year":"2005","journal-title":"Proc 26th Symp Information Theory in the Benelux"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref20","author":"bertsekas","year":"2009","journal-title":"Convex Optimization Theory"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1137\/0329017"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1980.1056173"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2174959"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s00220-009-0833-1"},{"key":"ref41","author":"folland","year":"1999","journal-title":"Real Analysis Modern Techniques and Their Applications (Pure and Applied Mathematics)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1142\/p665"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1137\/110826102"},{"key":"ref26","article-title":"Duality-based bounds on channel capacity","author":"moser","year":"2005"},{"key":"ref43","author":"billingsley","year":"1968","journal-title":"Convergence of Probability Measures (Probability and Mathematical Statistics Tracts on Probability and Statistics)"},{"key":"ref25","author":"thomas","year":"2006","journal-title":"Elements of Information Theory"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/7060773\/07035101.pdf?arnumber=7035101","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:47:52Z","timestamp":1641988072000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7035101\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":44,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tit.2015.2401002","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4]]}}}