{"id":"https://openalex.org/W2963790453","doi":"https://doi.org/10.1109/isit.2016.7541432","title":"The capacity of online (causal) q-ary error-erasure channels","display_name":"The capacity of online (causal) q-ary error-erasure channels","publication_year":2016,"publication_date":"2016-07-01","ids":{"openalex":"https://openalex.org/W2963790453","doi":"https://doi.org/10.1109/isit.2016.7541432","mag":"2963790453"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2016.7541432","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2016.7541432","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://research-information.bris.ac.uk/en/publications/da460223-9704-49b9-b7ac-8bf2361f68b7","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083407050","display_name":"Zitan Chen","orcid":"https://orcid.org/0000-0003-0570-0770"},"institutions":[{"id":"https://openalex.org/I77566578","display_name":"United Microelectronics (United States)","ror":"https://ror.org/00vrhw316","country_code":"US","type":"company","lineage":["https://openalex.org/I4210161555","https://openalex.org/I77566578"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Zitan Chen","raw_affiliation_strings":["UMCP, United States","UMCP"],"affiliations":[{"raw_affiliation_string":"UMCP, United States","institution_ids":["https://openalex.org/I77566578"]},{"raw_affiliation_string":"UMCP","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108615688","display_name":"Sidharth Jaggi","orcid":null},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Sidharth Jaggi","raw_affiliation_strings":["CUHK, Hong Kong","CUHK"],"affiliations":[{"raw_affiliation_string":"CUHK, Hong Kong","institution_ids":["https://openalex.org/I889458895"]},{"raw_affiliation_string":"CUHK","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011741113","display_name":"Michael Langberg","orcid":"https://orcid.org/0000-0002-7470-0718"},"institutions":[{"id":"https://openalex.org/I63190737","display_name":"University at Buffalo, State University of New York","ror":"https://ror.org/01y64my43","country_code":"US","type":"education","lineage":["https://openalex.org/I63190737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael Langberg","raw_affiliation_strings":["SUNY at Buffalo, United States","SUNY at Buffalo"],"affiliations":[{"raw_affiliation_string":"SUNY at Buffalo, United States","institution_ids":["https://openalex.org/I63190737"]},{"raw_affiliation_string":"SUNY at Buffalo","institution_ids":["https://openalex.org/I63190737"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5083407050"],"corresponding_institution_ids":["https://openalex.org/I77566578"],"apc_list":null,"apc_paid":null,"fwci":1.305,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.8344078,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"915","last_page":"919"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/symbol","display_name":"Symbol (formal)","score":0.5839686393737793},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.547670304775238},{"id":"https://openalex.org/keywords/code-word","display_name":"Code word","score":0.546563982963562},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.546202540397644},{"id":"https://openalex.org/keywords/erasure","display_name":"Erasure","score":0.5061394572257996},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.4614033102989197},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.4543262720108032},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4127950370311737},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3770166039466858},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.36321866512298584},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.34399545192718506},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.3367908000946045},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.2871513366699219},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.24640706181526184},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.2110523283481598},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.13557493686676025},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.11089488863945007}],"concepts":[{"id":"https://openalex.org/C134400042","wikidata":"https://www.wikidata.org/wiki/Q2372244","display_name":"Symbol (formal)","level":2,"score":0.5839686393737793},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.547670304775238},{"id":"https://openalex.org/C153207627","wikidata":"https://www.wikidata.org/wiki/Q863873","display_name":"Code word","level":3,"score":0.546563982963562},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.546202540397644},{"id":"https://openalex.org/C2778790127","wikidata":"https://www.wikidata.org/wiki/Q484885","display_name":"Erasure","level":2,"score":0.5061394572257996},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.4614033102989197},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.4543262720108032},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4127950370311737},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3770166039466858},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.36321866512298584},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.34399545192718506},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.3367908000946045},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.2871513366699219},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.24640706181526184},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.2110523283481598},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.13557493686676025},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.11089488863945007}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/isit.2016.7541432","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2016.7541432","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire/da460223-9704-49b9-b7ac-8bf2361f68b7","is_oa":true,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/da460223-9704-49b9-b7ac-8bf2361f68b7","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Chen, Z, Jaggi, S & Langberg, M 2016, The capacity of online (causal) q-ary error-erasure channels. in Proceedings - ISIT 2016; 2016 IEEE International Symposium on Information Theory., 7541432, IEEE International Symposium on Information Theory - Proceedings, vol. 2016-August, Institute of Electrical and Electronics Engineers (IEEE), pp. 915-919. https://doi.org/10.1109/ISIT.2016.7541432","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:research-information.bris.ac.uk:publications/da460223-9704-49b9-b7ac-8bf2361f68b7","is_oa":true,"landing_page_url":"https://hdl.handle.net/1983/da460223-9704-49b9-b7ac-8bf2361f68b7","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Chen, Z, Jaggi, S & Langberg, M 2016, The capacity of online (causal) q-ary error-erasure channels. in Proceedings - ISIT 2016; 2016 IEEE International Symposium on Information Theory., 7541432, IEEE International Symposium on Information Theory - Proceedings, vol. 2016-August, Institute of Electrical and Electronics Engineers (IEEE), pp. 915-919. https://doi.org/10.1109/ISIT.2016.7541432","raw_type":"contributionToPeriodical"}],"best_oa_location":{"id":"pmh:oai:research-information.bris.ac.uk:openaire/da460223-9704-49b9-b7ac-8bf2361f68b7","is_oa":true,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/da460223-9704-49b9-b7ac-8bf2361f68b7","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Chen, Z, Jaggi, S & Langberg, M 2016, The capacity of online (causal) q-ary error-erasure channels. in Proceedings - ISIT 2016; 2016 IEEE International Symposium on Information Theory., 7541432, IEEE International Symposium on Information Theory - Proceedings, vol. 2016-August, Institute of Electrical and Electronics Engineers (IEEE), pp. 915-919. https://doi.org/10.1109/ISIT.2016.7541432","raw_type":"contributionToPeriodical"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.8500000238418579,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321019","display_name":"University Grants Committee","ror":"https://ror.org/00djwmt25"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1512395286","https://openalex.org/W1524159887","https://openalex.org/W1978948309","https://openalex.org/W1989102762","https://openalex.org/W1990514974","https://openalex.org/W2013841965","https://openalex.org/W2014944833","https://openalex.org/W2099111195","https://openalex.org/W2109084006","https://openalex.org/W2137267299","https://openalex.org/W2138129780","https://openalex.org/W2139194398","https://openalex.org/W2147549456","https://openalex.org/W2155979661","https://openalex.org/W2210387432","https://openalex.org/W2951262303","https://openalex.org/W2963294993","https://openalex.org/W2963628132","https://openalex.org/W2963629492","https://openalex.org/W3105388109"],"related_works":["https://openalex.org/W2072016134","https://openalex.org/W2351168932","https://openalex.org/W2465690287","https://openalex.org/W2108143034","https://openalex.org/W2376389741","https://openalex.org/W1997850251","https://openalex.org/W2084549431","https://openalex.org/W913430005","https://openalex.org/W1509695971","https://openalex.org/W1985021129"],"abstract_inverted_index":{"In":[0,137],"the":[1,73,77,82,88,99,119,125,133,142,149,177,219],"q-ary":[2,180],"online":[3,153,159,181,212],"(causal)":[4],"channel":[5,54,67,83,122],"coding":[6],"model,":[7],"a":[8,13,16,20,53,215],"sender":[9],"wishes":[10],"to":[11,15,56,86,118],"communicate":[12],"message":[14],"receiver":[17],"by":[18],"transmitting":[19],"codeword":[21,135],"x":[22,33,109],"=":[23,190],"(x":[24,101],"<sub":[25,34,102,110],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[26,35,49,103,111],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">1</sub>":[27],",":[28,32,44,108],".":[29,30,31,41,42,43,105,106,107],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">n</sub>":[36],")":[37],"\u2208":[38],"{0,":[39],"1,":[40],"q":[45,185,189],"-":[46],"1}":[47],"<sup":[48],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">n</sup>":[50],"symbol-by-symbol":[51],"via":[52],"limited":[55],"at":[57,76],"most":[58],"p*n":[59,64],"errors":[60],"(symbol":[61],"changes)":[62],"and":[63,156,239],"erasures.":[65],"The":[66,226],"is":[68,115,127],"\"online\"":[69],"(i.e.,":[70],"\"causal\")":[71],"in":[72,116,123,145,170,228],"sense":[74],"that":[75],"ith":[78,89],"step":[79],"of":[80,98,132,151,179,205,210,218,221],"communication":[81],"decides":[84],"whether":[85],"corrupt":[87],"symbol":[90],"or":[91],"not":[92],"only":[93],"based":[94],"on":[95,223],"its":[96],"view":[97],"symbols":[100],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">1,</sub>":[104],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">i</sub>":[112],").":[113],"This":[114],"contrast":[117],"classical":[120],"adversarial":[121],"which":[124,148],"corruption":[126,197],"chosen":[128],"with":[129],"full":[130],"knowledge":[131],"sent":[134],"x.":[136],"this":[138,206,229],"work":[139],"we":[140,175,193],"extend":[141,166],"results":[143,169],"obtained":[144],"[1]-[4]":[146],"(in":[147],"capacities":[150],"binary":[152,158],"bit-flip-only":[154],"channels,":[155],"separately":[157],"erasure-only":[160],"channels":[161,182,213],"were":[162],"characterized).":[163],"We":[164],"here":[165],"those":[167],"prior":[168],"two":[171],"important":[172],"ways.":[173],"First,":[174],"obtain":[176],"capacity":[178],"for":[183,234],"general":[184],"(rather":[186,199],"than":[187,200],"just":[188],"2).":[191],"Second,":[192],"analyze":[194],"combined":[195],"error-erasure":[196],"models":[198],"studying":[201],"them":[202],"separately).":[203],"Characterization":[204],"much":[207],"broader":[208],"class":[209],"symmetric":[211],"gives":[214],"fuller":[216],"understanding":[217],"effects":[220],"causality":[222],"jamming":[224],"adversaries.":[225],"extensions":[227],"paper":[230],"require":[231],"novel":[232],"approaches":[233],"both":[235],"optimal":[236],"code":[237],"designs,":[238],"matching":[240],"information-theoretic":[241],"converse":[242],"arguments.":[243]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
