{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T14:49:43Z","timestamp":1772808583225,"version":"3.50.1"},"reference-count":31,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2016]]},"DOI":"10.3934\/amc.2016009","type":"journal-article","created":{"date-parts":[[2016,5,2]],"date-time":"2016-05-02T17:06:13Z","timestamp":1462208773000},"page":"333-354","source":"Crossref","is-referenced-by-count":4,"title":["Arbitrarily varying multiple access channels with conferencing encoders: List decoding and finite coordination resources"],"prefix":"10.3934","volume":"10","author":[{"given":"Holger","family":"Boche","sequence":"first","affiliation":[]},{"given":"Rafael F.","family":"Schaefer","sequence":"additional","affiliation":[]}],"member":"2321","reference":[{"key":"key-10.3934\/amc.2016009-1","doi-asserted-by":"crossref","unstructured":"R. Ahlswede, Elimination of correlation in random codes for arbitrarily carying channels, <em>Z. Wahrscheinlichkeitstheorie verw. Gebiete<\/em>, <strong>44<\/strong> (1978), 159-175.","DOI":"10.1007\/BF00533053"},{"key":"key-10.3934\/amc.2016009-2","unstructured":"R. Ahlswede, Coloring hypergraphs: A new approach to multi-user source coding-II, <em>J. Comb. Inform. Syst. Sci.<\/em>, <strong>5<\/strong> (1980), 220-268."},{"key":"key-10.3934\/amc.2016009-3","doi-asserted-by":"publisher","unstructured":"R. Ahlswede, Arbitrarily varying channels with states sequence known to the sender, <em>IEEE Trans. Inf. Theory<\/em>, <strong>32<\/strong> (1986), 621-629.","DOI":"10.1109\/TIT.1986.1057222"},{"key":"key-10.3934\/amc.2016009-4","doi-asserted-by":"publisher","unstructured":"R. Ahlswede and N. Cai, Two proofs of Pinsker's conjecture concerning arbitrarily varying channels, <em>IEEE Trans. Inf. Theory<\/em>, <strong>37<\/strong> (1991), 1647-1649.","DOI":"10.1109\/18.104326"},{"key":"key-10.3934\/amc.2016009-5","doi-asserted-by":"publisher","unstructured":"R. Ahlswede and N. Cai, Arbitrarily varying multiple-access channels I - Ericson's symmetrizability is adequate, Gubner's conjecture is true, <em>IEEE Trans. Inf. Theory<\/em>, <strong>45<\/strong> (1999), 742-749.","DOI":"10.1109\/18.749024"},{"key":"key-10.3934\/amc.2016009-6","doi-asserted-by":"publisher","unstructured":"P. Beelen and K. Brander, Efficient list decoding of a class of algebraic-geometry codes, <em>Adv. Math. Commun.<\/em>, <strong>4<\/strong> (2010), 485-518.","DOI":"10.3934\/amc.2010.4.485"},{"key":"key-10.3934\/amc.2016009-7","doi-asserted-by":"publisher","unstructured":"I. Bjelakovi\u0107, H. Boche and J. Sommerfeld, Capacity results for arbitrarily varying wiretap channels, in <em>Information Theory, Combinatorics, and Search Theory<\/em>, Springer, 2013, 123-144.","DOI":"10.1007\/978-3-642-36899-8_5"},{"key":"key-10.3934\/amc.2016009-8","doi-asserted-by":"publisher","unstructured":"D. Blackwell, L. Breiman and A. J. Thomasian, The capacity of a class of channels, <em>Ann. Math. Stat.<\/em>, <strong>30<\/strong> (1959), 1229-1241.","DOI":"10.1214\/aoms\/1177706106"},{"key":"key-10.3934\/amc.2016009-9","doi-asserted-by":"publisher","unstructured":"D. Blackwell, L. Breiman and A. J. Thomasian, The capacities of certain channel classes under random coding, <em>Ann. Math. Stat.<\/em>, <strong>31<\/strong> (1960), 558-567.","DOI":"10.1214\/aoms\/1177705783"},{"key":"key-10.3934\/amc.2016009-10","unstructured":"V. Blinovsky, P. Narayan and M. Pinsker, Capacity of the arbitrarily varying channel under list decoding, <em>Probl. Pered. Inform.<\/em>, <strong>31<\/strong> (1995), 99-113."},{"key":"key-10.3934\/amc.2016009-11","doi-asserted-by":"publisher","unstructured":"H. Boche and J. N\u00f6tzel, The classical-quantum multiple access channel with conferencing encoders and with common messages, <em>Quantum Inf. Proc.<\/em>, <strong>13<\/strong> (2014), 2595-2617.","DOI":"10.1007\/s11128-014-0814-y"},{"key":"key-10.3934\/amc.2016009-12","doi-asserted-by":"publisher","unstructured":"H. Boche and R. F. Schaefer, Capacity results and super-activation for wiretap channels with active wiretappers, <em>IEEE Trans. Inf. Forensics Sec.<\/em>, <strong>8<\/strong> (2013), 1482-1496.","DOI":"10.1109\/TIFS.2013.2276049"},{"key":"key-10.3934\/amc.2016009-13","doi-asserted-by":"publisher","unstructured":"H. Boche and R. F. Schaefer, List decoding for arbitrarily varying multiple access channels with conferencing encoders, in <em>Proc. IEEE Int. Conf. Commun.<\/em>, Sydney, 2014, 1934-1940.","DOI":"10.1109\/ICC.2014.6883606"},{"key":"key-10.3934\/amc.2016009-14","doi-asserted-by":"publisher","unstructured":"H. Boche, R. F. Schaefer and H. V. Poor, On the continuity of the secrecy capacity of wiretap channels under channel uncertainty, in <em>Proc. IEEE Int. Conf. Commun.<\/em>, London, 2015, 5779-5784.","DOI":"10.1109\/ICC.2015.7248976"},{"key":"key-10.3934\/amc.2016009-15","doi-asserted-by":"publisher","unstructured":"I. Csisz\u00e1r and P. Narayan, The capacity of the arbitrarily varying channel revisited: positivity, constraints, <em>IEEE Trans. Inf. Theory<\/em>, <strong>34<\/strong> (1988), 181-193.","DOI":"10.1109\/18.2627"},{"key":"key-10.3934\/amc.2016009-16","doi-asserted-by":"publisher","unstructured":"J. A. Gubner, On the deterministic-code capacity of the multiple-access arbitrarily varying channel, <em>IEEE Trans. Inf. Theory<\/em>, <strong>36<\/strong> (1990), 262-275.","DOI":"10.1109\/18.52472"},{"key":"key-10.3934\/amc.2016009-17","unstructured":"V. Guruswami, Bridging Shannon and Hamming: List error-correction with optimal rate, in <em>Proc. ICM<\/em>, Hyderabad, 2010."},{"key":"key-10.3934\/amc.2016009-18","doi-asserted-by":"publisher","unstructured":"F. Hernando, T. H\u00f8holdt and D. Ruano, List decoding of matrix-product codes from nested codes: an application to quasi-cyclic codes, <em>Adv. Math. Commun.<\/em>, <strong>6<\/strong> (2012), 259-272.","DOI":"10.3934\/amc.2012.6.259"},{"key":"key-10.3934\/amc.2016009-19","doi-asserted-by":"publisher","unstructured":"B. L. Hughes, The sSmalles list for the arbitrarily varying channel, <em>IEEE Trans. Inf. Theory<\/em>, <strong>43<\/strong> (1997), 803-815.","DOI":"10.1109\/18.568692"},{"key":"key-10.3934\/amc.2016009-20","doi-asserted-by":"publisher","unstructured":"J.-H. Jahn, Coding of arbitrarily varying multiuser channels, <em>IEEE Trans. Inf. Theory<\/em>, <strong>27<\/strong> (1981), 212-226.","DOI":"10.1109\/TIT.1981.1056320"},{"key":"key-10.3934\/amc.2016009-21","doi-asserted-by":"publisher","unstructured":"E. MolavianJazi, M. Bloch and J. N. Laneman, Arbitrary jamming can preclude secure communication, in <em>Proc. 47th Ann. Allerton Conf. Commun. Control Comp.<\/em>, Urbana-Champaign, 2009, 1069-1075.","DOI":"10.1109\/ALLERTON.2009.5394876"},{"key":"key-10.3934\/amc.2016009-22","doi-asserted-by":"publisher","unstructured":"S. Nitinawarat, On the deterministic code capacity region of an arbitrarily varying multiple-access channel under list decoding, <em>IEEE Trans. Inf. Theory<\/em>, <strong>59<\/strong> (2013), 2683-2693.","DOI":"10.1109\/TIT.2013.2242514"},{"key":"key-10.3934\/amc.2016009-23","doi-asserted-by":"publisher","unstructured":"J. N\u00f6tzel, M. Wiese and H. Boche, The arbitrarily varying wiretap channel - secret randomness, stability and super-activation, in <em>Proc. IEEE Int. Symp. Inf. Theory<\/em>, Hong Kong, 2015, 2151-2155.","DOI":"10.1109\/ISIT.2015.7282836"},{"key":"key-10.3934\/amc.2016009-24","doi-asserted-by":"publisher","unstructured":"A. D. Sarwate and M. Gastpar, List-decoding for the arbitrarily varying channel under state constraints, <em>IEEE Trans. Inf. Theory<\/em>, <strong>58<\/strong> (2012), 1372-1384.","DOI":"10.1109\/TIT.2011.2178153"},{"key":"key-10.3934\/amc.2016009-25","doi-asserted-by":"publisher","unstructured":"R. F. Schaefer and H. Boche, List decoding for arbitrarily varying broadcast channels with receiver side information, <em>IEEE Trans. Inf. Theory<\/em>, <strong>60<\/strong> (2014), 4472-4487.","DOI":"10.1109\/TIT.2014.2326412"},{"key":"key-10.3934\/amc.2016009-26","doi-asserted-by":"publisher","unstructured":"M. Wiese and H. Boche, The arbitrarily varying multiple-access channel with conferencing encoders, <em>IEEE Trans. Inf. Theory<\/em>, <strong>59<\/strong> (2013), 1405-1416.","DOI":"10.1109\/TIT.2012.2229779"},{"key":"key-10.3934\/amc.2016009-27","doi-asserted-by":"publisher","unstructured":"M. Wiese and H. Boche, On the weakest resource for coordination in arbitrarily varying multiple access channels with conferencing encoders, <em>Probl. Inf. Transm.<\/em>, <strong>50<\/strong> (2014), 15-26.","DOI":"10.1134\/S0032946014010025"},{"key":"key-10.3934\/amc.2016009-28","doi-asserted-by":"publisher","unstructured":"M. Wiese, H. Boche, I. Bjelakovi\u0107 and V. Jungnickel, The compound multiple access channel with partially cooperating encoders, <em>IEEE Trans. Inf. Theory<\/em>, <strong>57<\/strong> (2011), 3045-3066.","DOI":"10.1109\/TIT.2011.2119830"},{"key":"key-10.3934\/amc.2016009-29","doi-asserted-by":"publisher","unstructured":"M. Wiese, J. N\u00f6tzel and H. Boche, The arbitrarily varying wiretap channel - communication under uncoordinated attacks, in <em>Proc. IEEE Int. Symp. Inf. Theory<\/em>, Hong Kong, 2015, 2146-2150.","DOI":"10.1109\/ISIT.2015.7282835"},{"key":"key-10.3934\/amc.2016009-30","doi-asserted-by":"publisher","unstructured":"F. M. J. Willems, The discrete memoryless multiple access channel with partially cooperating encoders, <em>IEEE Trans. Inf. Theory<\/em>, <strong>29<\/strong> (1983), 441-445.","DOI":"10.1109\/TIT.1983.1056660"},{"key":"key-10.3934\/amc.2016009-31","doi-asserted-by":"crossref","unstructured":"J. Wolfowitz, Simultaneous channels, <em>Arch. Rat. Mech. Anal.<\/em>, <strong>4<\/strong> (1960), 371-386.","DOI":"10.1007\/BF00281397"}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"link":[{"URL":"http:\/\/www.aimsciences.org\/journals\/displayArticlesnew.jsp?paperID=12523","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T10:05:53Z","timestamp":1772791553000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.aimsciences.org\/\/article\/doi\/10.3934\/amc.2016009"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016]]}},"URL":"https:\/\/doi.org\/10.3934\/amc.2016009","relation":{},"ISSN":["1930-5346","1930-5338"],"issn-type":[{"value":"1930-5346","type":"print"},{"value":"1930-5338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}