{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:59:47Z","timestamp":1774630787051,"version":"3.50.1"},"reference-count":163,"publisher":"Emerald","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,18]]},"abstract":"<jats:p>Over-complete systems of vectors, or in short, frames, play the role of analog codes in many areas of communication and signal processing. To name a few, spreading sequences for code-division multiple access (CDMA), over-complete representations for multiple-description (MD) source coding, space-time codes, sensing matrices for compressed sensing (CS), and more recently, codes for unreliable distributed computation. In this survey paper we observe an informationtheoretic random-like behavior of frame subsets. Such subframes arise in setups involving erasures (communication), random user activity (multiple access), or sparsity (signal processing), in addition to channel or quantization noise. The goodness of a frame as an analog code is a function of the eigenvalues of a sub-frame, averaged over all subframes (e.g., harmonic mean of the eigenvalues relates to least-square estimation error, while geometric mean to the Shannon transform, and condition number to the restricted isometry property).<\/jats:p>\n                  <jats:p>Within the highly symmetric class of Equiangular Tight Frames (ETF), as well as other \u201cnear ETF\u201d families, we show a universal behavior of the empirical eigenvalue distribution (ESD) of a randomly-selected sub-frame: (i) the ESD is asymptotically indistinguishable from Wachter\u2019s MANOVA distribution; and (ii) it exhibits a convergence rate to this limit that is indistinguishable from that of a matrix sequence drawn from MANOVA (Jacobi) ensembles of corresponding dimensions. Some of these results follow from careful statistical analysis of empirical evidence, and some are proved analytically using random matrix theory arguments of independent interest. The goodness measures of the MANOVA limit distribution are better, in a concrete formal sense, than those of the Marchenko\u2013Pastur distribution at the same aspect ratio, implying that deterministic analog codes are better than random (i.i.d.) analog codes. We further give evidence that the ETF (and near ETF) family is in fact superior to any other frame family in terms of its typical sub-frame goodness.<\/jats:p>","DOI":"10.1561\/0100000125","type":"journal-article","created":{"date-parts":[[2021,11,18]],"date-time":"2021-11-18T09:11:41Z","timestamp":1637226701000},"page":"526-645","source":"Crossref","is-referenced-by-count":1,"title":["Asymptotic Frame Theory for Analog Coding"],"prefix":"10.1561","volume":"18","author":[{"given":"Marina","family":"Haikin","sequence":"first","affiliation":[{"name":"Now at Amazon. Previously at Tel Aviv University where this work was performed ;"}]},{"given":"Matan","family":"Gavish","sequence":"additional","affiliation":[{"name":"The Hebrew University of Jerusalem ,","place":["Israel"]}]},{"given":"Dustin G.","family":"Mixon","sequence":"additional","affiliation":[{"name":"The Ohio State University , Colombus, OH,","place":["USA"]}]},{"given":"Ram","family":"Zamir","sequence":"additional","affiliation":[{"name":"Tel Aviv University ,","place":["Israel"]}]}],"member":"140","published-online":{"date-parts":[[2021,11,18]]},"reference":[{"key":"2026032712180527700_ref001","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511801334","volume-title":"An Introduction to Random Matrices","author":"Anderson","year":"2009"},{"key":"2026032712180527700_ref002","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1016\/j.aim.2013.12.026","article-title":"Asymptotically liberating sequences of random unitary matrices","volume":"255","author":"Anderson","year":"2014","journal-title":"Advances in Mathematics"},{"issue":"16","key":"2026032712180527700_ref003","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1088\/1751-8121\/aab4cd","article-title":"Constructing exact symmetric informationally complete measurements from numerical solutions","volume":"51","author":"Appleby","year":"2018","journal-title":"Journal of Physics A: Mathematical and Theoretical"},{"issue":"6","key":"2026032712180527700_ref004","doi-asserted-by":"crossref","first-page":"3955","DOI":"10.1109\/TIT.2011.2137330","article-title":"Spectral distribution of random matrices from binary linear block codes","volume":"57","author":"Babadi","year":"2011","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"2026032712180527700_ref005","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1093\/imrn\/rnv385","article-title":"A conditional construction of restricted isometries","volume":"2017","author":"Bandeira","year":"2017","journal-title":"International Mathematics Research Notices"},{"key":"2026032712180527700_ref006","article-title":"On the relationship between dropout and equiangular tight frames","volume-title":"arXiv preprint arXiv:1810.06049","author":"Bank","year":"2018"},{"key":"2026032712180527700_ref007","doi-asserted-by":"crossref","DOI":"10.5244\/C.34.11","article-title":"An ETF view of dropout regularization","volume-title":"British Machine Vision Virtual Conference, 2020","author":"Bank","year":"2020"},{"key":"2026032712180527700_ref008","doi-asserted-by":"crossref","first-page":"iii","DOI":"10.1109\/ICASSP.2004.1326700","article-title":"Sigma-delta quantization and finite frames","volume":"3","author":"Benedetto","year":"2004","journal-title":"2004 IEEE International Conference on Acoustics, Speech, and Signal Processing"},{"issue":"2","key":"2026032712180527700_ref009","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1023\/A:1021323312367","article-title":"Finite normalized tight frames","volume":"18","author":"Benedetto","year":"2003","journal-title":"Advances in Computational Mathematics"},{"key":"2026032712180527700_ref010","first-page":"1","article-title":"Geometric properties of Grassmannian frames for R2 and R3","volume-title":"EURASIP Journal on Advances in Signal Processing","author":"Benedetto","year":"2006"},{"key":"2026032712180527700_ref011","volume-title":"Rate distortion theory: A mathematical basis for data compression","author":"Berger","year":"1971"},{"key":"2026032712180527700_ref012","article-title":"Optimal measures for p-frame energies on spheres","volume-title":"arXiv preprint arXiv:1908.00885","author":"Bilyk","year":"2019"},{"issue":"5","key":"2026032712180527700_ref013","doi-asserted-by":"crossref","first-page":"874","DOI":"10.1109\/PROC.1985.13219","article-title":"Algebraic fields, signal processing, and error control","volume":"73","author":"Blahut","year":"1985","journal-title":"Proceedings of the IEEE"},{"key":"2026032712180527700_ref014","first-page":"457","volume-title":"Digital transmission of information","author":"Blahut","year":"1990"},{"key":"2026032712180527700_ref015","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.laa.2016.09.005","article-title":"Achieving the orthoplex bound and constructing weighted complex projective 2-designs with Singer sets","volume":"511","author":"Bodmann","year":"2016","journal-title":"Linear Algebra and its Applications"},{"issue":"12","key":"2026032712180527700_ref016","doi-asserted-by":"crossref","first-page":"3256","DOI":"10.1109\/78.735301","article-title":"Frame-theoretic analysis of oversampled filter banks","volume":"46","author":"Bolcskei","year":"1998","journal-title":"IEEE Transactions on signal processing"},{"issue":"3","key":"2026032712180527700_ref017","doi-asserted-by":"crossref","first-page":"1071","DOI":"10.1109\/TSP.2007.908963","article-title":"Causal compensation for erasures in frame representations","volume":"56","author":"Boufounos","year":"2008","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"1","key":"2026032712180527700_ref018","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1215\/00127094-1384809","article-title":"Explicit constructions of RIP matrices and related problems","volume":"159","author":"Bourgain","year":"2011","journal-title":"Duke Mathematical Journal"},{"key":"2026032712180527700_ref019","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1145\/1993636.1993721","article-title":"Breaking the k2 barrier for explicit RIP matrices","volume-title":"Proceedings of the forty-third annual ACM symposium on Theory of computing","author":"Bourgain","year":"2011"},{"key":"2026032712180527700_ref020","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1007\/s11856-020-2027-7","article-title":"Nearly orthogonal vectors and small antipodal spherical codes","volume":"238","author":"Bukh","year":"2020","journal-title":"Israel Journal of Mathematics"},{"issue":"1","key":"2026032712180527700_ref021","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.acha.2012.07.010","article-title":"Sharp RIP bound for sparse signal and low-rank matrix recovery","volume":"35","author":"Cai","year":"2013","journal-title":"Applied and Computational Harmonic Analysis"},{"issue":"2","key":"2026032712180527700_ref022","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1109\/JSTSP.2010.2043161","article-title":"Construction of a large class of deterministic sensing matrices that satisfy a statistical isometry property","volume":"4","author":"Calderbank","year":"2010","journal-title":"IEEE journal of selected topics in signal processing"},{"issue":"9-10","key":"2026032712180527700_ref023","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1016\/j.crma.2008.03.014","article-title":"The restricted isometry property and its implications for compressed sensing","volume":"346","author":"Candes","year":"2008","journal-title":"Comptes Rendus Mathematique"},{"issue":"12","key":"2026032712180527700_ref024","doi-asserted-by":"crossref","first-page":"5406","DOI":"10.1109\/TIT.2006.885507","article-title":"\u201cNear-optimal signal recovery from random projections: Universal encoding strategies?","volume":"52","author":"Candes","year":"2006","journal-title":"IEEE transactions on information theory"},{"key":"2026032712180527700_ref025","volume-title":"Oversampling delta-sigma data converters: theory, design, and simulation","author":"Candy","year":"1992"},{"key":"2026032712180527700_ref026","volume-title":"Finite frames: Theory and applications","author":"Casazza","year":"2012"},{"issue":"1","key":"2026032712180527700_ref027","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10444-020-09745-7","article-title":"Universal optimal configurations for the p-frame potentials","volume":"46","author":"Chen","year":"2020","journal-title":"Advances in Computational Mathematics"},{"key":"2026032712180527700_ref028","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/978-3-319-19749-4_4","article-title":"Noise-shaping quantization methods for frame-based and compressive sampling systems","volume-title":"Sampling theory, a renaissance","author":"Chou","year":"2015"},{"issue":"1","key":"2026032712180527700_ref029","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1090\/S0894-0347-06-00546-7","article-title":"Universally optimal distribution of points on spheres","volume":"20","author":"Cohn","year":"2007","journal-title":"Journal of the American Mathematical Society"},{"issue":"3","key":"2026032712180527700_ref030","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.2140\/gt.2016.20.1289","article-title":"Optimal simplices and codes in projective spaces","volume":"20","author":"Cohn","year":"2016","journal-title":"Geometry & Topology"},{"key":"2026032712180527700_ref031","doi-asserted-by":"crossref","DOI":"10.1201\/9781420010541","volume-title":"Handbook of combinatorial designs","author":"Colbourn","year":"2006"},{"issue":"2","key":"2026032712180527700_ref032","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1080\/10586458.1996.10504585","article-title":"Packing lines, planes, etc.: Packings in Grassmannian spaces","volume":"5","author":"Conway","year":"1996","journal-title":"Experimental mathematics"},{"issue":"6","key":"2026032712180527700_ref033","doi-asserted-by":"crossref","first-page":"1629","DOI":"10.1109\/TIT.2002.1003843","article-title":"Duality between channel capacity and rate distortion with two-sided state information","volume":"48","author":"Cover","year":"2002","journal-title":"IEEE Transactions on Information Theory"},{"key":"2026032712180527700_ref034","volume-title":"Elements of Information Theory","author":"Cover","year":"1991"},{"key":"2026032712180527700_ref035","volume-title":"The advantage of irregular pulse shape for NOMA","author":"Dadush","year":"2018"},{"key":"2026032712180527700_ref036","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1515\/9781400827268.372","volume-title":"Fundamental Papers in Wavelet Theory","author":"Daubechies","year":"2009"},{"issue":"6","key":"2026032712180527700_ref037","doi-asserted-by":"crossref","first-page":"1501","DOI":"10.1109\/18.104312","article-title":"Information theoretic inequalities","volume":"37","author":"Dembo","year":"1991","journal-title":"IEEE Transactions on Information Theory"},{"issue":"11","key":"2026032712180527700_ref038","doi-asserted-by":"crossref","first-page":"4245","DOI":"10.1109\/TIT.2007.907343","article-title":"A generic construction of complex codebooks meeting the Welch bound","volume":"53","author":"Ding","year":"2007","journal-title":"IEEE transactions on information theory"},{"issue":"1906","key":"2026032712180527700_ref039","doi-asserted-by":"crossref","first-page":"4273","DOI":"10.1098\/rsta.2009.0152","article-title":"Observed universality of phase transitions in high-dimensional geometry, with implications for modern data analysis and signal processing","volume":"367","author":"Donoho","year":"2009","journal-title":"Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences"},{"issue":"1","key":"2026032712180527700_ref040","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/TIT.2005.860430","article-title":"Stable recovery of sparse overcomplete representations in the presence of noise","volume":"52","author":"Donoho","year":"2006","journal-title":"IEEE Transactions on information theory"},{"key":"2026032712180527700_ref041","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1016\/j.laa.2014.11.006","article-title":"Infinite random matrix theory, tridiagonal bordered Toeplitz matrices, and the moment problem","volume":"467","author":"Dubbs","year":"2015","journal-title":"Linear Algebra and its Applications"},{"issue":"2","key":"2026032712180527700_ref042","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1090\/S0002-9947-1952-0047179-6","article-title":"A class of nonharmonic Fourier series","volume":"72","author":"Duffin","year":"1952","journal-title":"Transactions of the American Mathematical Society"},{"issue":"2","key":"2026032712180527700_ref043","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1007\/s10208-006-0215-9","article-title":"The beta-Jacobi matrix model, the CS decomposition, and generalized singular value problems","volume":"8","author":"Edelman","year":"2008","journal-title":"Foundations of Computational Mathematics"},{"key":"2026032712180527700_ref044","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-7011-4","volume-title":"Sparse and redundant representations: from theory to applications in signal and image processing","author":"Elad","year":"2010"},{"issue":"4","key":"2026032712180527700_ref045","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1109\/TIT.2003.809602","article-title":"Geometrically uniform frames","volume":"49","author":"Eldar","year":"2003","journal-title":"IEEE Transactions on Information Theory"},{"issue":"6","key":"2026032712180527700_ref046","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.1007\/s10955-013-0807-8","article-title":"Local eigenvalue density for general MANOVA matrices","volume":"152","author":"Erd","year":"2013","journal-title":"Journal of Statistical Physics"},{"key":"2026032712180527700_ref047","doi-asserted-by":"publisher","first-page":"3017","DOI":"10.1109\/ISIT.2019.8849468","article-title":"Numerically stable polynomially coded computing","volume-title":"2019 IEEE International Symposium on Information Theory (ISIT)","author":"Fahim","year":"2019"},{"issue":"4","key":"2026032712180527700_ref048","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1007\/s00041-010-9156-z","article-title":"Limiting empirical singular value distribution of restrictions of discrete Fourier transform matrices","volume":"17","author":"Farrell","year":"2011","journal-title":"Journal of Fourier Analysis and Applications"},{"key":"2026032712180527700_ref049","volume-title":"Methods of proof in random matrix theory","author":"Feier","year":"2012"},{"key":"2026032712180527700_ref050","first-page":"1688","article-title":"Spectrum-blind minimum-rate sampling and reconstruction of multiband signals","volume":"3","author":"Feng","year":"1996","journal-title":"1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings, IEEE"},{"issue":"3","key":"2026032712180527700_ref051","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1137\/17M1137528","article-title":"Packings in real projective spaces","volume":"2","author":"Fickus","year":"2018","journal-title":"SIAM Journal on Applied Algebra and Geometry"},{"key":"2026032712180527700_ref052","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.laa.2015.04.004","article-title":"Grouptheoretic constructions of erasure-robust frames","volume":"479","author":"Fickus","year":"2015","journal-title":"Linear Algebra and its Applications"},{"key":"2026032712180527700_ref053","article-title":"Tables of the existence of equiangular tight frames","volume-title":"arXiv preprint arXiv:1504.00253","author":"Fickus","year":"2015"},{"key":"2026032712180527700_ref054","article-title":"Constructing a large family of equiangular tight frames","volume-title":"Proc. Sampl. Theory Appl","author":"Fickus","year":"2011"},{"issue":"5","key":"2026032712180527700_ref055","doi-asserted-by":"crossref","first-page":"1014","DOI":"10.1016\/j.laa.2011.06.027","article-title":"Steiner equiangular tight frames","volume":"436","author":"Fickus","year":"2012","journal-title":"Linear algebra and its applications"},{"issue":"3","key":"2026032712180527700_ref056","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1016\/j.acha.2008.09.001","article-title":"Sparsest solutions of underdetermined linear systems via lq-minimization for 0&lt; q &lt;1","volume":"26","author":"Foucart","year":"2009","journal-title":"Applied and Computational Harmonic Analysis"},{"key":"2026032712180527700_ref057","doi-asserted-by":"crossref","volume-title":"A mathematical introduction to compressive sensing","author":"Foucart","DOI":"10.1007\/978-0-8176-4948-7"},{"issue":"3","key":"2026032712180527700_ref058","doi-asserted-by":"crossref","first-page":"21","DOI":"10.3390\/axioms6030021","article-title":"The SIC question: History and state of play","volume":"6","author":"Fuchs","year":"2017","journal-title":"Axioms"},{"issue":"6","key":"2026032712180527700_ref059","doi-asserted-by":"crossref","first-page":"851","DOI":"10.1109\/TIT.1982.1056588","article-title":"Achievable rates for multiple descriptions","volume":"28","author":"Gamal","year":"1982","journal-title":"IEEE Transactions on Information Theory"},{"key":"2026032712180527700_ref060","volume-title":"Vector quantization and signal compression","author":"Gersho","year":"2012"},{"key":"2026032712180527700_ref061","article-title":"Moments of isotropic measures and optimal projective codes","volume-title":"arXiv preprint arXiv:1904.11159","author":"Glazyrin","year":"2019"},{"issue":"4","key":"2026032712180527700_ref062","doi-asserted-by":"crossref","first-page":"2411","DOI":"10.1137\/19M1282702","article-title":"Repeated minimizers of p-frame energies","volume":"34","author":"Glazyrin","year":"2020","journal-title":"SIAM Journal on Discrete Mathematics"},{"key":"2026032712180527700_ref063","doi-asserted-by":"crossref","DOI":"10.1109\/TIP.2021.3087404","article-title":"Diversity image coding using irregular interpolation","volume-title":"IEEE Transactions on Image Processing","author":"Goren","year":"2021"},{"issue":"1","key":"2026032712180527700_ref064","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/18.650985","article-title":"Quantized overcomplete expansions in R N: Analysis, synthesis, and algorithms","volume":"44","author":"Goyal","year":"1998","journal-title":"IEEE Transactions on Information Theory"},{"issue":"5","key":"2026032712180527700_ref065","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/79.952806","article-title":"Multiple description coding: Compression meets the network","volume":"18","author":"Goyal","year":"2001","journal-title":"IEEE Signal processing magazine"},{"issue":"3","key":"2026032712180527700_ref066","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1006\/acha.2000.0340","article-title":"Quantized frame expansions with erasures","volume":"10","author":"Goyal","year":"21","journal-title":"Applied and Computational Harmonic Analysis"},{"key":"2026032712180527700_ref067","first-page":"408","article-title":"Multiple description transform coding: Robustness to erasures using tight frame expansions","volume-title":"Information Theory, 1998. Proceedings. 1998 IEEE International Symposium on, IEEE","author":"Goyal","year":"1998"},{"key":"2026032712180527700_ref068","article-title":"Low rank co-diagonal matrices and ramsey graphs","volume":"7","author":"Grolmusz","year":"2000","journal-title":"R15\u2013R15, the electronic journal of combinatorics"},{"key":"2026032712180527700_ref069","article-title":"The statistical restricted isometry property and the Wigner semicircle distribution of incoherent dictionaries","volume-title":"arXiv preprint arXiv:0812.2602","author":"Gurevich","year":"2008"},{"key":"2026032712180527700_ref070","first-page":"103940V","volume-title":"Wavelets and Sparsity XVII","author":"Haas","year":"2017"},{"key":"2026032712180527700_ref071","volume-title":"An analog coding frame-work","author":"Haikin","year":"2018"},{"key":"2026032712180527700_ref072","first-page":"2074","article-title":"Analog coding of a source with erasures","author":"Haikin","year":"2016","journal-title":"IEEE International Symposium on Information Theory (ISIT), IEEE"},{"key":"2026032712180527700_ref073","article-title":"Moments of subsets of general equiangular tight frames","volume-title":"arXiv preprint arXiv:2107.00888","author":"Haikin","year":"2021"},{"key":"2026032712180527700_ref074","doi-asserted-by":"crossref","first-page":"5024","DOI":"10.1073\/pnas.1700203114","article-title":"Random subsets of structured deterministic frames have MANOVA spectra","volume":"114","author":"Haikin","year":"2017","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"2026032712180527700_ref075","first-page":"2057","article-title":"Frame moments and Welch bound with erasures","volume-title":"2018 IEEE International Symposium on Information Theory (ISIT), IEEE","author":"Haikin","year":"2018"},{"key":"2026032712180527700_ref076","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/978-3-319-45282-1_11","article-title":"The restricted isometry property of subsampled Fourier matrices","volume-title":"Geometric aspects of functional analysis","author":"Haviv","year":"2017"},{"key":"2026032712180527700_ref077","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/j.laa.2003.07.012","article-title":"Optimal frames for erasures","volume":"377","author":"Holmes","year":"2004","journal-title":"Linear Algebra and its Applications"},{"key":"2026032712180527700_ref078","first-page":"111381","volume-title":"Wavelets and Sparsity XVIII","author":"Jasper"},{"key":"2026032712180527700_ref079","article-title":"Monotonicity of the traceinverse of covariance submatrices and two-sided prediction","volume-title":"IEEE Transactions on Information Theory, submitted September","author":"Khina","year":"2020"},{"key":"2026032712180527700_ref080","article-title":"SIC-POVMs and the Stark conjectures","volume-title":"International Mathematics Research Notices","author":"Kopp","year":"2019"},{"key":"2026032712180527700_ref081","volume-title":"An introduction to frames","author":"Kovacevic","year":"2008"},{"issue":"11","key":"2026032712180527700_ref082","doi-asserted-by":"crossref","first-page":"1877","DOI":"10.1002\/cpa.21504","article-title":"Suprema of chaos processes and the restricted isometry property","volume":"67","author":"Krahmer","year":"2014","journal-title":"Communications on Pure and Applied Mathematics"},{"issue":"4","key":"2026032712180527700_ref083","doi-asserted-by":"crossref","first-page":"1701","DOI":"10.1109\/TAP.2014.2299819","article-title":"Multi-coset sparse imaging arrays","volume":"62","author":"Krieger","year":"2014","journal-title":"IEEE Transactions on Antennas and Propagation"},{"issue":"1","key":"2026032712180527700_ref084","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/18.567644","article-title":"On the role of mismatch in rate distortion theory","volume":"43","author":"Lapidoth","year":"1997","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"2026032712180527700_ref085","doi-asserted-by":"crossref","first-page":"1514","DOI":"10.1109\/TIT.2017.2736066","article-title":"Speeding up distributed machine learning using codes","volume":"64","author":"Lee","year":"2018","journal-title":"IEEE Transactions on Information Theory"},{"key":"2026032712180527700_ref086","first-page":"526","article-title":"Bounds on the maximal cardinality of a code with bounded modulus of the inner product","volume":"25","author":"Levenshtein","year":"1982","journal-title":"Soviet Math. Dokl"},{"issue":"1-2","key":"2026032712180527700_ref087","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BF00053379","article-title":"Designs as maximum codes in polynomial metric spaces","volume":"29","author":"Levenshtein","year":"1992","journal-title":"Acta Applicandae Mathematica"},{"key":"2026032712180527700_ref088","first-page":"449","article-title":"Universal bounds for codes and designs","volume":"1","author":"Levenshtein","year":"1998","journal-title":"Handbook of coding theory"},{"issue":"1","key":"2026032712180527700_ref089","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/0100000103","article-title":"Coded computing: Mitigating fundamental bottlenecks in large-scale distributed computing and machine learning","volume":"17","author":"Li","year":"2020","journal-title":"Foundations and Trends\u00ae in Communications and Information Theory"},{"issue":"10","key":"2026032712180527700_ref090","doi-asserted-by":"crossref","first-page":"2735","DOI":"10.1109\/TIT.2003.817466","article-title":"Grassmannian beamforming for multiple-input multiple-output wireless systems","volume":"49","author":"Love","year":"2003","journal-title":"IEEE transactions on information theory"},{"key":"2026032712180527700_ref091","first-page":"1","article-title":"A Delsarte-style proof of the Bukh\u2013Cox bound","volume-title":"2019 13th International conference on Sampling Theory and Applications (SampTA), IEEE","author":"Magsino","year":"2019"},{"key":"2026032712180527700_ref092","first-page":"1","article-title":"Kesten\u2013McKay law for random subensembles of Paley equiangular tight frames","volume-title":"Constructive Approximation","author":"Magsino","year":"2020"},{"issue":"4","key":"2026032712180527700_ref093","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1070\/SM1967v001n04ABEH001994","article-title":"Distribution of eigenvalues for some sets of random matrices","volume":"1","author":"Mar","year":"1967","journal-title":"Mathematics of the USSR-Sbornik"},{"issue":"2","key":"2026032712180527700_ref094","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/JSAC.1984.1146063","article-title":"Coding of real-number sequences for error correction: A digital signal processing problem","volume":"2","author":"Marshall","year":"1984","journal-title":"IEEE Journal on selected areas in communications"},{"issue":"10","key":"2026032712180527700_ref095","doi-asserted-by":"crossref","first-page":"4638","DOI":"10.1109\/TIT.2008.928983","article-title":"Source coding with distortion side information","volume":"54","author":"Martinian","year":"2008","journal-title":"IEEE Transactions on Information Theory"},{"key":"2026032712180527700_ref096","first-page":"1","article-title":"Sampling versus random binning for multiple descriptions of a bandlimited source","volume-title":"IEEE Information Theory Workshop (ITW), IEEE","author":"Mashiach","year":"2013"},{"key":"2026032712180527700_ref097","first-page":"000942","article-title":"Multiple description delta-sigma quantization with individual and central receivers","volume-title":"Electrical and Electronics Engineers in Israel (IEEEI), 2010 IEEE 26th Convention of, IEEE","author":"Mashiach","year":"2010"},{"key":"2026032712180527700_ref098","first-page":"1187","article-title":"Noise-shaped quantization for nonuniform sampling","volume-title":"Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on, IEEE","author":"Mashiach","year":"2013"},{"key":"2026032712180527700_ref099","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/978-1-4613-9323-8_7","article-title":"Welch\u2019s bound and sequence sets for code-division multiple-access systems","volume-title":"Sequences II","author":"Massey","year":"1993"},{"key":"2026032712180527700_ref100","article-title":"The expected eigenvalue distribution of a large regular graph","author":"McKay","journal-title":"Linear Algebra and its Applications"},{"key":"2026032712180527700_ref101","article-title":"Infinite families of optimal systems of biangu-lar lines related to representations of sl(2,fq)","author":"Mikhail","journal-title":"arXiv preprint arXiv:2012.02718"},{"key":"2026032712180527700_ref102","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/978-3-319-16042-9_13","article-title":"Explicit matrices with the restricted isometry property: Breaking the square-root bottleneck","volume-title":"Compressed sensing and its applications","author":"Mixon","year":"2015"},{"key":"2026032712180527700_ref103","first-page":"1","article-title":"The optimal packing of eight points in the real projective plane","volume-title":"Experimental Mathematics","author":"Mixon","year":"2019"},{"issue":"1","key":"2026032712180527700_ref104","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1137\/19M1307895","article-title":"Globally optimizing small codes in real projective spaces","volume":"35","author":"Mixon","year":"2021","journal-title":"SIAM Journal on Discrete Mathematics"},{"issue":"4","key":"2026032712180527700_ref105","doi-asserted-by":"crossref","first-page":"1181","DOI":"10.1073\/pnas.1219540110","article-title":"Deterministic matrices matching the compressed sensing phase transitions of gaussian random matrices","volume":"110","author":"Monajemi","year":"2013","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"2026032712180527700_ref106","volume-title":"Aspects of multivariate statistical theory","author":"Muirhead","year":"2009"},{"issue":"4","key":"2026032712180527700_ref107","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1080\/10586458.2015.1022842","article-title":"The Tammes problem for N = 14","volume":"24","author":"Musin","year":"2015","journal-title":"Experimental Mathematics"},{"key":"2026032712180527700_ref108","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511735127","volume-title":"Lectures on the combinatorics of free probability","author":"Nica","year":"2006"},{"issue":"2","key":"2026032712180527700_ref109","doi-asserted-by":"crossref","first-page":"1153","DOI":"10.1109\/TIT.2018.2881750","article-title":"Performance analysis and optimal filter design for sigma-delta modulation via duality with dpcm","volume":"65","author":"Ordentlich","year":"2019","journal-title":"IEEE Transactions on Information Theory"},{"issue":"10","key":"2026032712180527700_ref110","doi-asserted-by":"crossref","first-page":"4661","DOI":"10.1109\/TIT.2009.2027528","article-title":"Multiple-description coding by dithered Delta-Sigma quantization","volume":"55","author":"\u00d8stergaard","year":"2009","journal-title":"IEEE Transactions on Information Theory"},{"issue":"10","key":"2026032712180527700_ref111","doi-asserted-by":"crossref","first-page":"1909","DOI":"10.1002\/j.1538-7305.1980.tb03344.x","article-title":"On a source-coding problem with two channels and three receivers","volume":"59","author":"Ozarow","year":"1980","journal-title":"The Bell System Technical Journal"},{"issue":"1-4","key":"2026032712180527700_ref112","first-page":"311","article-title":"On orthogonal matrices","volume":"12","author":"Paley","year":"1933","journal-title":"Studies in Applied Mathematics"},{"key":"2026032712180527700_ref113","first-page":"000965","article-title":"Multiple description image\/video compression using oversampling and noise shaping in the dct-domain","volume-title":"Electrical and Electronics Engineers in Israel (IEEEI), 2010 IEEE 26th Convention of, IEEE","author":"Palgy","year":"2010"},{"key":"2026032712180527700_ref114","first-page":"2523","article-title":"A perspective on massive random-access","volume-title":"2017 IEEE International Symposium on Information Theory (ISIT), IEEE","author":"Polyanskiy","year":"2017"},{"issue":"1","key":"2026032712180527700_ref115","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/TIT.2003.821998","article-title":"N-channel symmetric multiple descriptions-part I: (n, k) source-channel erasure codes","volume":"50","author":"Pradhan","year":"2004","journal-title":"IEEE Transactions on Information Theory"},{"key":"2026032712180527700_ref116","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/SSP.2016.7551726","article-title":"On the eigenvalue distribution of column sub-sampled semi-unitary matrices","volume-title":"Statistical Signal Processing Workshop (SSP), 2016 IEEE, IEEE","author":"Raich","year":"2016"},{"key":"2026032712180527700_ref117","article-title":"Numerically stable coded matrix computations via circulant and rotation matrix embeddings","volume-title":"arXiv preprint arXiv:1910.06515","author":"Ramamoorthy","year":"2019"},{"issue":"2","key":"2026032712180527700_ref118","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1109\/TSP.2003.821106","article-title":"Frame-theoretic analysis of DFT codes with erasures","volume":"52","author":"Rath","year":"2004","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"12","key":"2026032712180527700_ref119","doi-asserted-by":"crossref","first-page":"7475","DOI":"10.1109\/TIT.2020.3029396","article-title":"Gradient coding from cyclic mds codes and expander graphs","volume":"66","author":"Raviv","year":"2020","journal-title":"IEEE Transactions on Information Theory"},{"issue":"4","key":"2026032712180527700_ref120","doi-asserted-by":"crossref","first-page":"1261","DOI":"10.1109\/18.335940","article-title":"Optimum sequence multisets for synchronous code-division multiple-access channels","volume":"40","author":"Rupf","year":"1994","journal-title":"IEEE Transactions on Information Theory"},{"key":"2026032712180527700_ref121","volume-title":"Geometry and combinatorics","author":"Seidel","year":"2014"},{"issue":"1","key":"2026032712180527700_ref122","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1109\/78.815502","article-title":"Noise amplification of periodic nonuniform sampling","volume":"48","author":"Seidner","year":"2000","journal-title":"IEEE Transactions on Signal Processing"},{"key":"2026032712180527700_ref123","article-title":"Frame based codes for partially active NOMA","volume-title":"arXiv preprint arXiv:2102.03604","author":"Slamovich","year":"2021"},{"issue":"4","key":"2026032712180527700_ref124","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1109\/TIT.1973.1055037","article-title":"Noiseless coding of correlated information sources","volume":"19","author":"Slepian","year":"1973","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"2026032712180527700_ref125","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/BF03025291","article-title":"Mathematical problems for the next century","volume":"20","author":"Smale","year":"1998","journal-title":"The mathematical intelligencer"},{"issue":"2","key":"2026032712180527700_ref126","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/BF03027290","article-title":"Chebotar\u0451v and his density theorem","volume":"18","author":"Stevenhagen","year":"1996","journal-title":"The Mathematical Intelligencer"},{"key":"2026032712180527700_ref127","doi-asserted-by":"crossref","first-page":"82080","DOI":"10.1109\/ACCESS.2019.2923646","article-title":"Massively concurrent non-orthogonal multiple access for 5G networks and beyond","volume":"7","author":"Stoica","year":"2019","journal-title":"IEEE Access"},{"issue":"3","key":"2026032712180527700_ref128","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/S1063-5203(03)00023-X","article-title":"Grassmannian frames with applications to coding and communication","volume":"14","author":"Strohmer","year":"2003","journal-title":"Applied and computational harmonic analysis"},{"issue":"1","key":"2026032712180527700_ref129","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1109\/TSP.2018.2878545","article-title":"High resolution compressed sensing radar using difference set codes","volume":"67","author":"Taghavi","year":"2018","journal-title":"IEEE Transactions on Signal Processing"},{"key":"2026032712180527700_ref130","doi-asserted-by":"crossref","DOI":"10.1090\/gsm\/132","volume-title":"Topics in random matrix theory","author":"Tao","year":"2012"},{"issue":"2","key":"2026032712180527700_ref131","doi-asserted-by":"crossref","first-page":"744","DOI":"10.1109\/18.661517","article-title":"Space-time codes for high data rate wireless communication: Performance criterion and code construction","volume":"44","author":"Tarokh","year":"1998","journal-title":"IEEE Transactions on Information Theory"},{"issue":"6","key":"2026032712180527700_ref132","doi-asserted-by":"crossref","first-page":"3386","DOI":"10.1109\/TIT.2017.2686420","article-title":"Low-coherence frames from group Fourier matrices","volume":"63","author":"Thill","year":"2017","journal-title":"IEEE Transactions on Information Theory"},{"key":"2026032712180527700_ref133","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1007\/978-3-319-51103-0_11","article-title":"Analogue BCH codes and direct reduced echelon parity check matrix construction","volume-title":"Error-Correction Coding and Decoding","author":"Tomlinson","year":"2017"},{"issue":"4","key":"2026032712180527700_ref134","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/BF02288916","article-title":"Multidimensional scaling: I. theory and method","volume":"17","author":"Torgerson","year":"1952","journal-title":"Psychometrika"},{"issue":"1","key":"2026032712180527700_ref135","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.acha.2007.09.001","article-title":"On the conditioning of random subdictionaries","volume":"25","author":"Tropp","year":"2008","journal-title":"Applied and Computational Harmonic Analysis"},{"key":"2026032712180527700_ref136","first-page":"475","article-title":"CDMA signature sequences with low peak-to-average-power ratio via alternating projection","volume":"1","author":"Tropp","year":"2003","journal-title":"The Thrity-Seventh Asilomar Conference on Signals, Systems & Computers, 23, IEEE"},{"key":"2026032712180527700_ref137","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511807213","volume-title":"Fundamentals of wireless communication","author":"Tse","year":"2005"},{"key":"2026032712180527700_ref138","first-page":"1721","article-title":"The Gaussian erasure channel","volume-title":"Information Theory, 2007. ISIT 2007. IEEE International Symposium on, IEEE","author":"Tulino","year":"2007"},{"issue":"3","key":"2026032712180527700_ref139","doi-asserted-by":"crossref","first-page":"1187","DOI":"10.1109\/TIT.2009.2039041","article-title":"Capacity of channels with frequency-selective and time-selective fading","volume":"56","author":"Tulino","year":"2010","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1","key":"2026032712180527700_ref140","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/0100000001","article-title":"Random matrix theory and wireless communications","volume":"1","author":"Tulino","year":"2004","journal-title":"Foundations and Trends\u00ae in Communications and Information Theory"},{"issue":"1","key":"2026032712180527700_ref141","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1109\/18.651040","article-title":"Lattice codes can achieve capacity on the AWGN channel","volume":"44","author":"Urbanke","year":"1998","journal-title":"IEEE transactions on Information Theory"},{"key":"2026032712180527700_ref142","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/978-3-642-17798-9_6","article-title":"Ger\u0161gorin-type theorems for partitioned matrices","volume-title":"Ger\u0161gorin and His Circles","author":"Varga","year":"2004"},{"key":"2026032712180527700_ref143","first-page":"739","article-title":"Estimate of the number of signals in error correcting codes","volume":"117","author":"Varshamov","year":"1957","journal-title":"Docklady Akad. Nauk, SSSR"},{"issue":"6","key":"2026032712180527700_ref144","doi-asserted-by":"crossref","first-page":"2173","DOI":"10.1109\/18.868487","article-title":"Perfect reconstruction formulas and bounds on aliasing error in sub-nyquist nonuniform sampling of multiband signals","volume":"46","author":"Venkataramani","year":"2000","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"2026032712180527700_ref145","doi-asserted-by":"crossref","first-page":"622","DOI":"10.1109\/18.749007","article-title":"Spectral efficiency of CDMA with random spreading","volume":"45","author":"Verdu","year":"1999","journal-title":"IEEE Transactions on Information Theory"},{"key":"2026032712180527700_ref146","first-page":"937","article-title":"The limiting empirical measure of multiple discriminant ratios","volume-title":"The Annals of Statistics","author":"Wachter","year":"1980"},{"issue":"11","key":"2026032712180527700_ref147","doi-asserted-by":"crossref","first-page":"2228","DOI":"10.1016\/j.laa.2009.07.016","article-title":"On the construction of equiangular frames from graphs","volume":"431","author":"Waldron","year":"2009","journal-title":"Linear Algebra and its applications"},{"key":"2026032712180527700_ref148","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-8176-4815-2","volume-title":"An introduction to finite tight frames","author":"Waldron","year":"2018"},{"issue":"3","key":"2026032712180527700_ref149","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1109\/TIT.1974.1055219","article-title":"Lower bounds on the maximum cross correlation of signals (corresp.)","volume":"20","author":"Welch","year":"1974","journal-title":"IEEE Transactions on Information theory"},{"key":"2026032712180527700_ref150","volume-title":"Mathematics and computation","author":"Wigderson","year":"2019"},{"issue":"3","key":"2026032712180527700_ref151","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1109\/TCOM.1983.1095820","article-title":"Redundancy, the discrete Fourier transform, and impulse noise cancellation","volume":"31","author":"Wolf","year":"1983","journal-title":"IEEE Transactions on Communications"},{"issue":"2","key":"2026032712180527700_ref152","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1016\/0003-4916(89)90322-9","article-title":"Optimal state-determination by mutually unbiased measurements","volume":"191","author":"Wootters","year":"1989","journal-title":"Annals of Physics"},{"issue":"5","key":"2026032712180527700_ref153","doi-asserted-by":"crossref","first-page":"1900","DOI":"10.1109\/TIT.2005.846411","article-title":"Achieving the Welch bound with difference sets","volume":"51","author":"Xia","year":"2005","journal-title":"IEEE Transactions on Information Theory"},{"key":"2026032712180527700_ref154","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1016\/j.acha.2020.04.003","article-title":"The minimizers of the p-frame potential","volume":"52","author":"Xu","year":"2021","journal-title":"Applied and Computational Harmonic Analysis"},{"issue":"7","key":"2026032712180527700_ref155","doi-asserted-by":"crossref","first-page":"079 701","DOI":"10.1117\/1.OE.54.7.079701","article-title":"Can compressed sensing beat the nyquist sampling rate?","volume":"54","author":"Yaroslavsky","year":"2015","journal-title":"Optical Engineering"},{"key":"2026032712180527700_ref156","doi-asserted-by":"crossref","DOI":"10.1109\/ISTC49272.2021.9594259","article-title":"Frame codes for distributed coded computation","volume-title":"The 11th International Symposium on Topics in Coding, Montreal, IEEE, to appear","author":"Yosibash","year":"2021"},{"issue":"8","key":"2026032712180527700_ref157","doi-asserted-by":"crossref","first-page":"1556","DOI":"10.1109\/49.942517","article-title":"Multicell uplink spectral efficiency of coded DS-CDMA with random signatures","volume":"19","author":"Zaidel","year":"2001","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"2026032712180527700_ref158","first-page":"1106","article-title":"Sparse NOMA: A closed-form characterization","volume-title":"2018 IEEE International Symposium on Information Theory (ISIT), IEEE","author":"Zaidel","year":"2018"},{"issue":"2","key":"2026032712180527700_ref159","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1109\/18.119699","article-title":"On universal quantization by randomized uniform\/lattice quantizers","volume":"38","author":"Zamir","year":"1992","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1","key":"2026032712180527700_ref160","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/18.370112","article-title":"Rate-distortion performance in coding bandlimited sources by sampling and dithered quantization","volume":"41","author":"Zamir","year":"1995","journal-title":"IEEE Transactions on Information Theory"},{"key":"2026032712180527700_ref161","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139045520","volume-title":"Lattice Coding for Signals and Networks: A Structured Coding Approach to Quantization, Modulation, and Multiuser Information Theory","author":"Zamir","year":"2014"},{"key":"2026032712180527700_ref162","doi-asserted-by":"crossref","DOI":"10.1109\/EEEI.2014.7005761","article-title":"Iterative decoding of robust analog product codes","volume-title":"2014 IEEE 28th Convention of Electrical & Electronics Engineers in Israel, IEEE","author":"Zanko","year":"2014"},{"issue":"01","key":"2026032712180527700_ref163","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1142\/S0219749911006776","article-title":"Quantum designs: Foundations of a noncommutative design theory","volume":"9","author":"Zauner","year":"2011","journal-title":"International Journal of Quantum Information"}],"container-title":["Foundations and Trends\u00ae in Communications and Information Theory"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/ftcit\/article-pdf\/18\/4\/526\/10977181\/0100000125en.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ftcit\/article-pdf\/18\/4\/526\/10977181\/0100000125en.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:19:01Z","timestamp":1774628341000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ftcit\/article\/18\/4\/526\/1324925\/Asymptotic-Frame-Theory-for-Analog-Coding"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,18]]},"references-count":163,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,11,18]]}},"URL":"https:\/\/doi.org\/10.1561\/0100000125","relation":{},"ISSN":["1567-2190","1567-2328"],"issn-type":[{"value":"1567-2190","type":"print"},{"value":"1567-2328","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,18]]}}}