{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:04:28Z","timestamp":1775837068587,"version":"3.50.1"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003977","name":"Israel Science Foundation","doi-asserted-by":"publisher","award":["137\/18"],"award-info":[{"award-number":["137\/18"]}],"id":[{"id":"10.13039\/501100003977","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1109\/tit.2022.3176371","type":"journal-article","created":{"date-parts":[[2022,5,18]],"date-time":"2022-05-18T19:36:34Z","timestamp":1652902594000},"page":"5657-5700","source":"Crossref","is-referenced-by-count":28,"title":["The DNA Storage Channel: Capacity and Error Probability Bounds"],"prefix":"10.1109","volume":"68","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6028-8892","authenticated-orcid":false,"given":"Nir","family":"Weinberger","sequence":"first","affiliation":[{"name":"Viterbi Faculty of Electrical and Computer Engineering, Technion&#x2014;Israel Institute of Technology, Haifa, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9547-3243","authenticated-orcid":false,"given":"Neri","family":"Merhav","sequence":"additional","affiliation":[{"name":"Viterbi Faculty of Electrical and Computer Engineering, Technion&#x2014;Israel Institute of Technology, Haifa, Israel"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-020-19148-3"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4684-9910-0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1088\/1751-8113\/40\/28\/s18"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2954679.2872397"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1126\/science.1226355"},{"key":"ref7","volume-title":"Convex Optimization","author":"Cover","year":"2006"},{"issue":"5","key":"ref8","first-page":"315","article-title":"Joint source-channel error exponent","volume":"9","author":"Csisz\u00e1r","year":"1980","journal-title":"Problems Control Inf. Theory"},{"issue":"6","key":"ref9","doi-asserted-by":"crossref","first-page":"2505","DOI":"10.1109\/18.720546","article-title":"The method of types","volume":"44","author":"Csisz\u00e1r","year":"1998","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511921889"},{"key":"ref11","article-title":"A new look at the error exponent of discrete memoryless channels","volume-title":"Proc. IEEE Int. Symp. Inf. Theory","author":"Csisz\u00e1r"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1017\/9781108591034"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaj2038"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2015.7133171"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-2945-6"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1038\/nature11875"},{"issue":"2","key":"ref17","first-page":"97","article-title":"Nonprobabilistic mutual information without memory","volume":"4","author":"Goppa","year":"1975","journal-title":"Problems Control Inf. Theory"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/anie.201411378"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-019-45832-6"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2555321"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2789292"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1561\/9781933019987"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.840883"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849523"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2961265"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ITW44776.2019.8989388"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053049"},{"key":"ref28","first-page":"269","article-title":"Achievable rates of concatenated codes in DNA storage under substitution errors","volume-title":"Proc. Int. Symp. Inf. Theory Appl.","author":"Lenz"},{"key":"ref29","volume":"143","author":"Marshall","year":"1979","journal-title":"Inequalities: Theory of Majorization and its Applications"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1986.1057176"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1214\/aop\/1039639365"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1561\/0100000052"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261874"},{"key":"ref34","volume-title":"Probability and Computing: Randomization and Probabilistic Techniques in Algorithms and Data Analysis","author":"Mitzenmacher","year":"2017"},{"issue":"1","key":"ref35","first-page":"3","article-title":"Some fundamental issues of microminiaturization","volume":"1","author":"Neiman","year":"1964","journal-title":"Radiotekhnika"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1038\/nbt.4079"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2562630"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1561\/0100000064"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2649493"},{"key":"ref40","article-title":"Codes for efficient data storage on DNA molecules","volume-title":"Proc. Talk Form., Inference, Energy Symp.","author":"Sayir"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2021.3058966"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2021.3063709"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2020.3002611"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.844077"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2021.3059095"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807213"},{"key":"ref47","article-title":"The DNA storage channel: Capacity and error probability","volume-title":"arXiv:2109.12549","author":"Weinberger","year":"2021"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1038\/srep14138"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.903122"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/9861208\/09777994.pdf?arnumber=9777994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T22:56:50Z","timestamp":1705964210000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9777994\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9]]},"references-count":49,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tit.2022.3176371","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9]]}}}