{"id":"https://openalex.org/W2061302090","doi":"https://doi.org/10.1109/isit.2005.1523592","title":"Lossy source encoding via message-passing and decimation over generalized codewords of LDGM codes","display_name":"Lossy source encoding via message-passing and decimation over generalized codewords of LDGM codes","publication_year":2005,"publication_date":"2005-01-01","ids":{"openalex":"https://openalex.org/W2061302090","doi":"https://doi.org/10.1109/isit.2005.1523592","mag":"2061302090"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2005.1523592","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2005.1523592","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038379562","display_name":"Martin J. Wainwright","orcid":"https://orcid.org/0000-0002-8760-2236"},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"M.J. Wainwright","raw_affiliation_strings":["Departments of EECS and Statistics, University of California Berkeley, Berkeley, CA, USA","Dept. of EECS & Stat., UC Berkeley, CA"],"affiliations":[{"raw_affiliation_string":"Departments of EECS and Statistics, University of California Berkeley, Berkeley, CA, USA","institution_ids":["https://openalex.org/I95457486"]},{"raw_affiliation_string":"Dept. of EECS & Stat., UC Berkeley, CA","institution_ids":["https://openalex.org/I95457486"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078805815","display_name":"Elitza Maneva","orcid":"https://orcid.org/0000-0002-8638-1013"},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"E. Maneva","raw_affiliation_strings":["Computer Science Division, University of California Berkeley, Berkeley, CA, USA","University of California, Berkeley"],"affiliations":[{"raw_affiliation_string":"Computer Science Division, University of California Berkeley, Berkeley, CA, USA","institution_ids":["https://openalex.org/I95457486"]},{"raw_affiliation_string":"University of California, Berkeley","institution_ids":["https://openalex.org/I95457486"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5038379562"],"corresponding_institution_ids":["https://openalex.org/I95457486"],"apc_list":null,"apc_paid":null,"fwci":10.6695,"has_fulltext":false,"cited_by_count":99,"citation_normalized_percentile":{"value":0.98336167,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1493","last_page":"1497"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/decimation","display_name":"Decimation","score":0.7517259120941162},{"id":"https://openalex.org/keywords/belief-propagation","display_name":"Belief propagation","score":0.7170283198356628},{"id":"https://openalex.org/keywords/lossy-compression","display_name":"Lossy compression","score":0.6612159013748169},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.5872257351875305},{"id":"https://openalex.org/keywords/satisfiability","display_name":"Satisfiability","score":0.549299955368042},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5272342562675476},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5236870050430298},{"id":"https://openalex.org/keywords/message-passing","display_name":"Message passing","score":0.47691628336906433},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.46017682552337646},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3669505715370178},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.2705758512020111},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09155765175819397},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.07394349575042725},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07390251755714417}],"concepts":[{"id":"https://openalex.org/C173642442","wikidata":"https://www.wikidata.org/wiki/Q1253346","display_name":"Decimation","level":3,"score":0.7517259120941162},{"id":"https://openalex.org/C152948882","wikidata":"https://www.wikidata.org/wiki/Q4060686","display_name":"Belief propagation","level":3,"score":0.7170283198356628},{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.6612159013748169},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.5872257351875305},{"id":"https://openalex.org/C168773769","wikidata":"https://www.wikidata.org/wiki/Q1350299","display_name":"Satisfiability","level":2,"score":0.549299955368042},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5272342562675476},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5236870050430298},{"id":"https://openalex.org/C854659","wikidata":"https://www.wikidata.org/wiki/Q1859284","display_name":"Message passing","level":2,"score":0.47691628336906433},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.46017682552337646},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3669505715370178},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.2705758512020111},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09155765175819397},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.07394349575042725},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07390251755714417},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/isit.2005.1523592","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2005.1523592","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.119.7383","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.119.7383","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.eecs.berkeley.edu/~wainwrig/Papers/WaiMan05_arxiv.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320307102","display_name":"Intel Corporation","ror":"https://ror.org/01ek73717"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1518885151","https://openalex.org/W1544902333","https://openalex.org/W2011442073","https://openalex.org/W2012642696","https://openalex.org/W2081642252","https://openalex.org/W2127490352","https://openalex.org/W2130973998","https://openalex.org/W2949727674","https://openalex.org/W6632595725","https://openalex.org/W6670787703","https://openalex.org/W6763404930"],"related_works":["https://openalex.org/W2050010277","https://openalex.org/W3125437229","https://openalex.org/W2896991873","https://openalex.org/W2163364417","https://openalex.org/W2963109230","https://openalex.org/W4301665663","https://openalex.org/W2918957485","https://openalex.org/W2122977448","https://openalex.org/W4286892381","https://openalex.org/W2508916882"],"abstract_inverted_index":{"We":[0],"describe":[1],"message-passing":[2,122],"and":[3,150],"decimation":[4],"approaches":[5],"for":[6,28,71,93],"lossy":[7],"source":[8,133],"coding":[9],"using":[10],"low-density":[11],"generator":[12],"matrix":[13],"(LDGM)":[14],"codes.":[15],"In":[16,100],"particular,":[17],"this":[18,103],"paper":[19],"addresses":[20],"the":[21,45,59,128,152],"problem":[22],"of":[23,52,97,112,143],"encoding":[24,134],"a":[25,50,110,141],"Bernoulli(1/2)":[26],"source:":[27],"randomly":[29],"generated":[30],"LDGM":[31],"codes":[32],"with":[33],"suitably":[34],"irregular":[35],"degree":[36],"distributions,":[37],"our":[38,105],"methods":[39],"yield":[40],"performance":[41],"very":[42],"close":[43],"to":[44,102,108,145],"rate":[46],"distortion":[47],"limit":[48],"over":[49,116],"range":[51],"rates.":[53],"Our":[54],"approach":[55,106],"is":[56,107,136],"inspired":[57],"by":[58,66,78],"survey":[60],"propagation":[61,91],"(SP)":[62],"algorithm,":[63],"originally":[64],"developed":[65],"Mezard":[67],"et":[68,80],"al.":[69,81],"(2002)":[70],"solving":[72],"random":[73,114],"satisfiability":[74,98],"problems.":[75,99],"Previous":[76],"work":[77],"Maneva":[79],"(2005)":[82],"shows":[83],"how":[84],"SP":[85],"can":[86,124],"be":[87,125],"understood":[88],"as":[89],"belief":[90],"(BP)":[92],"an":[94],"alternative":[95],"representation":[96],"analogy":[101],"connection,":[104],"define":[109],"family":[111],"Markov":[113],"fields":[115],"generalized":[117],"codewords,":[118],"from":[119],"which":[120],"local":[121],"rules":[123],"derived":[126],"in":[127],"standard":[129],"way.":[130],"The":[131],"overall":[132],"method":[135],"based":[137],"on":[138],"message-passing,":[139],"setting":[140],"subset":[142],"bits":[144],"their":[146],"preferred":[147],"values":[148],"(decimation),":[149],"reducing":[151],"code":[153]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":4},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":4}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
