{"id":"https://openalex.org/W2027980676","doi":"https://doi.org/10.1109/isit.2009.5205621","title":"Distributed source coding without Slepian-Wolf compression","display_name":"Distributed source coding without Slepian-Wolf compression","publication_year":2009,"publication_date":"2009-06-01","ids":{"openalex":"https://openalex.org/W2027980676","doi":"https://doi.org/10.1109/isit.2009.5205621","mag":"2027980676"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2009.5205621","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2009.5205621","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100397622","display_name":"Yang Yang","orcid":"https://orcid.org/0000-0002-5241-5203"},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yang Yang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Texas A and M University, College Station, TX, USA","Department of Electrical & Computer Engineering, Texas A&M University, College Station, 77843, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Texas A and M University, College Station, TX, USA","institution_ids":["https://openalex.org/I91045830"]},{"raw_affiliation_string":"Department of Electrical & Computer Engineering, Texas A&M University, College Station, 77843, USA","institution_ids":["https://openalex.org/I91045830"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058154161","display_name":"Zixiang Xiong","orcid":"https://orcid.org/0000-0002-4714-3311"},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zixiang Xiong","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Texas A and M University, College Station, TX, USA","Department of Electrical & Computer Engineering, Texas A&M University, College Station, 77843, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Texas A and M University, College Station, TX, USA","institution_ids":["https://openalex.org/I91045830"]},{"raw_affiliation_string":"Department of Electrical & Computer Engineering, Texas A&M University, College Station, 77843, USA","institution_ids":["https://openalex.org/I91045830"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100397622"],"corresponding_institution_ids":["https://openalex.org/I91045830"],"apc_list":null,"apc_paid":null,"fwci":0.6096,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.70937048,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"884","last_page":"888"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13187","display_name":"Diffusion and Search Dynamics","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/tunstall-coding","display_name":"Tunstall coding","score":0.8154124021530151},{"id":"https://openalex.org/keywords/context-adaptive-binary-arithmetic-coding","display_name":"Context-adaptive binary arithmetic coding","score":0.7876918911933899},{"id":"https://openalex.org/keywords/distributed-source-coding","display_name":"Distributed source coding","score":0.7402499318122864},{"id":"https://openalex.org/keywords/entropy-encoding","display_name":"Entropy encoding","score":0.6674872636795044},{"id":"https://openalex.org/keywords/lossy-compression","display_name":"Lossy compression","score":0.6468966603279114},{"id":"https://openalex.org/keywords/shannon\u2013fano-coding","display_name":"Shannon\u2013Fano coding","score":0.6338231563568115},{"id":"https://openalex.org/keywords/variable-length-code","display_name":"Variable-length code","score":0.6299375891685486},{"id":"https://openalex.org/keywords/lossless-compression","display_name":"Lossless compression","score":0.6099557876586914},{"id":"https://openalex.org/keywords/context-adaptive-variable-length-coding","display_name":"Context-adaptive variable-length coding","score":0.6052814722061157},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5955279469490051},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5794896483421326},{"id":"https://openalex.org/keywords/coding-tree-unit","display_name":"Coding tree unit","score":0.526724100112915},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.4994542598724365},{"id":"https://openalex.org/keywords/arithmetic-coding","display_name":"Arithmetic coding","score":0.4844987094402313},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.4810243248939514},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.47128573060035706},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.43960684537887573},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36628952622413635},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14932993054389954}],"concepts":[{"id":"https://openalex.org/C73231260","wikidata":"https://www.wikidata.org/wiki/Q7853376","display_name":"Tunstall coding","level":4,"score":0.8154124021530151},{"id":"https://openalex.org/C175732694","wikidata":"https://www.wikidata.org/wiki/Q1128713","display_name":"Context-adaptive binary arithmetic coding","level":3,"score":0.7876918911933899},{"id":"https://openalex.org/C200801453","wikidata":"https://www.wikidata.org/wiki/Q5283181","display_name":"Distributed source coding","level":4,"score":0.7402499318122864},{"id":"https://openalex.org/C1769480","wikidata":"https://www.wikidata.org/wiki/Q1345239","display_name":"Entropy encoding","level":3,"score":0.6674872636795044},{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.6468966603279114},{"id":"https://openalex.org/C130811719","wikidata":"https://www.wikidata.org/wiki/Q2645","display_name":"Shannon\u2013Fano coding","level":4,"score":0.6338231563568115},{"id":"https://openalex.org/C60603091","wikidata":"https://www.wikidata.org/wiki/Q2981616","display_name":"Variable-length code","level":3,"score":0.6299375891685486},{"id":"https://openalex.org/C81081738","wikidata":"https://www.wikidata.org/wiki/Q55542","display_name":"Lossless compression","level":3,"score":0.6099557876586914},{"id":"https://openalex.org/C135534801","wikidata":"https://www.wikidata.org/wiki/Q1128721","display_name":"Context-adaptive variable-length coding","level":4,"score":0.6052814722061157},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5955279469490051},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5794896483421326},{"id":"https://openalex.org/C190750250","wikidata":"https://www.wikidata.org/wiki/Q13533439","display_name":"Coding tree unit","level":3,"score":0.526724100112915},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.4994542598724365},{"id":"https://openalex.org/C153338461","wikidata":"https://www.wikidata.org/wiki/Q2651","display_name":"Arithmetic coding","level":4,"score":0.4844987094402313},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.4810243248939514},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.47128573060035706},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.43960684537887573},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36628952622413635},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14932993054389954},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/isit.2009.5205621","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2009.5205621","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.384.1171","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.384.1171","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://ita.calit2.net/workshop/09/files/paper/paper_305.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1989131323","https://openalex.org/W2068143054","https://openalex.org/W2099111195","https://openalex.org/W2099213070","https://openalex.org/W2135828675","https://openalex.org/W2138256990","https://openalex.org/W2141356835","https://openalex.org/W2150412388","https://openalex.org/W2172236196","https://openalex.org/W3216977419"],"related_works":["https://openalex.org/W4312628177","https://openalex.org/W2148686647","https://openalex.org/W1579872668","https://openalex.org/W2123072960","https://openalex.org/W1587903609","https://openalex.org/W1994532706","https://openalex.org/W2213686625","https://openalex.org/W2668751350","https://openalex.org/W2045024766","https://openalex.org/W2375774096"],"abstract_inverted_index":{"Slepian-Wolf":[0],"(SW)":[1],"coding,":[2],"which":[3],"is":[4,52,64],"concerned":[5],"with":[6],"separate":[7],"near-lossless":[8],"compression":[9],"of":[10,19,117],"correlated":[11],"sources":[12,34],"(with":[13],"joint":[14,96],"decoding),":[15],"forms":[16],"the":[17,30,99,103,109,118,140],"basis":[18],"distributed":[20,76],"source":[21,47,77,104,133],"coding":[22,43,51,78,85,123,134],"(DSC)":[23],"and":[24,44,61,127,143],"can":[25],"be":[26],"used":[27],"to":[28,101],"exploit":[29,102],"correlation":[31],"among":[32],"quantized":[33],"in":[35,53],"lossy":[36],"DSC":[37],"problems":[38],"such":[39],"as":[40,67,70],"Wyner-Ziv":[41],"(WZ)":[42],"multiterminal":[45],"(MT)":[46],"coding.":[48,72,81],"However,":[49],"SW":[50,80,125,136],"general":[54],"lossy,":[55],"especially":[56],"at":[57,90,98],"short":[58],"block":[59],"length,":[60],"practical":[62],"implementation":[63],"not":[65],"nearly":[66],"well":[68],"understood":[69],"entropy":[71,84],"This":[73],"paper":[74],"studies":[75],"without":[79,124,135],"We":[82,106],"employ":[83],"(after":[86],"quantization":[87],"if":[88],"necessary)":[89],"each":[91],"encoder":[92],"while":[93],"relying":[94],"on":[95,139],"estimation":[97],"decoder":[100],"correlation.":[105],"start":[107],"from":[108],"simple":[110],"lossless":[111],"case":[112],"before":[113],"giving":[114],"single-letter":[115],"characterizations":[116],"rate-distortion":[119],"function":[120],"for":[121,131],"WZ":[122],"compression,":[126],"achievable":[128],"rate":[129],"region":[130],"MT":[132],"compression.":[137],"Examples":[138],"binary":[141],"symmetric":[142],"quadratic":[144],"Gaussian":[145],"cases":[146],"are":[147],"given.":[148]},"counts_by_year":[{"year":2016,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
