{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T09:54:25Z","timestamp":1740131665927,"version":"3.37.3"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T00:00:00Z","timestamp":1496275200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100003977","name":"Israel Science Foundation","doi-asserted-by":"publisher","award":["396\/11"],"award-info":[{"award-number":["396\/11"]}],"id":[{"id":"10.13039\/501100003977","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/tit.2017.2668388","type":"journal-article","created":{"date-parts":[[2017,2,13]],"date-time":"2017-02-13T19:22:38Z","timestamp":1487013758000},"page":"3894-3922","source":"Crossref","is-referenced-by-count":5,"title":["On Cooperation and Interference in the Weak Interference Regime"],"prefix":"10.1109","volume":"63","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5687-2295","authenticated-orcid":false,"given":"Daniel","family":"Zahavi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8486-1243","authenticated-orcid":false,"given":"Ron","family":"Dabora","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2001","author":"meyer","journal-title":"Matrix Analysis and Applied Linear Algebra","key":"ref33"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1017\/CBO9780511817106"},{"year":"2006","author":"cover","journal-title":"Elements of Information Theory","key":"ref31"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1017\/CBO9780511981234"},{"year":"0","author":"zahavi","journal-title":"On cooperation and interference in the weak interference regime (full version with detailed proofs)","key":"ref34"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/GLOCOM.2007.313"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TIT.1981.1056307"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ITA.2009.5044928"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TIT.2012.2191710"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TIT.2012.2201371"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TIT.2011.2119790"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TIT.2011.2169110"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TIT.2009.2016061"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/TIT.2012.2191712"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/TIT.2016.2617311"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1016\/0024-3795(81)90232-9"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TIT.2008.2006447"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1515\/9781400833344"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TIT.1981.1056416"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TIT.2009.2021380"},{"year":"2014","author":"pozrikidis","journal-title":"An Introduction to Grids Graphs and Networks","key":"ref29"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TIT.2008.2009793"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TIT.2012.2196677"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TIT.2008.2009807"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TIT.1975.1055432"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TIT.2014.2381664"},{"key":"ref1","first-page":"611","article-title":"Two-way communication channels","volume":"1","author":"shannon","year":"1961","journal-title":"Proc 4th Berkeley Symp Math Statist Probab"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/TIT.2012.2236381"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/TIT.2005.853304"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/TIT.2004.828151"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/TIT.2007.894680"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/TIT.2004.834745"},{"year":"2009","author":"boyd","journal-title":"Convex optimization","key":"ref26"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/18.243446"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/7931776\/07852450.pdf?arnumber=7852450","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:15:18Z","timestamp":1642004118000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7852450\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":34,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tit.2017.2668388","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"type":"print","value":"0018-9448"},{"type":"electronic","value":"1557-9654"}],"subject":[],"published":{"date-parts":[[2017,6]]}}}