{"id":"https://openalex.org/W2276215754","doi":"https://doi.org/10.1109/isit.2016.7541466","title":"Distributed information-theoretic biclustering","display_name":"Distributed information-theoretic biclustering","publication_year":2016,"publication_date":"2016-07-01","ids":{"openalex":"https://openalex.org/W2276215754","doi":"https://doi.org/10.1109/isit.2016.7541466","mag":"2276215754"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2016.7541466","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2016.7541466","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Georg Pichler","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Georg Pichler","raw_affiliation_strings":["Institute of Telecommunications, Vienna University of Technology, Austria"],"affiliations":[{"raw_affiliation_string":"Institute of Telecommunications, Vienna University of Technology, Austria","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Pablo Piantanida","orcid":null},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I4210097418","display_name":"Laboratoire des signaux et syst\u00e8mes","ror":"https://ror.org/00skw9v43","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I277688954","https://openalex.org/I277688954","https://openalex.org/I4210097418","https://openalex.org/I4210107720"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Pablo Piantanida","raw_affiliation_strings":["Laboratoire des Signaux et Syst&#x00E8;mes (L2S), CentraleSup&#x00E9;lec-CNRS-Universit&#x00E9; Paris-Sud, Gif-sur-Yvette, France"],"affiliations":[{"raw_affiliation_string":"Laboratoire des Signaux et Syst&#x00E8;mes (L2S), CentraleSup&#x00E9;lec-CNRS-Universit&#x00E9; Paris-Sud, Gif-sur-Yvette, France","institution_ids":["https://openalex.org/I4210097418","https://openalex.org/I1294671590"]}]},{"author_position":"last","author":{"id":null,"display_name":"Gerald Matz","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gerald Matz","raw_affiliation_strings":["Institute of Telecommunications, Vienna University of Technology, Austria"],"affiliations":[{"raw_affiliation_string":"Institute of Telecommunications, Vienna University of Technology, Austria","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.5593,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.69659857,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1083","last_page":"1087"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.8956000208854675,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.8956000208854675,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12879","display_name":"Distributed Sensor Networks and Detection Algorithms","score":0.031599998474121094,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11447","display_name":"Blind Source Separation Techniques","score":0.005400000140070915,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.6082000136375427},{"id":"https://openalex.org/keywords/biclustering","display_name":"Biclustering","score":0.5874000191688538},{"id":"https://openalex.org/keywords/logarithm","display_name":"Logarithm","score":0.5083000063896179},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.42910000681877136},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.4138999879360199},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.38960000872612}],"concepts":[{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.6082000136375427},{"id":"https://openalex.org/C144817290","wikidata":"https://www.wikidata.org/wiki/Q2976575","display_name":"Biclustering","level":5,"score":0.5874000191688538},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5648000240325928},{"id":"https://openalex.org/C39927690","wikidata":"https://www.wikidata.org/wiki/Q11197","display_name":"Logarithm","level":2,"score":0.5083000063896179},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.42910000681877136},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.42890000343322754},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.4138999879360199},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4043000042438507},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.38960000872612},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.37529999017715454},{"id":"https://openalex.org/C130120984","wikidata":"https://www.wikidata.org/wiki/Q2835898","display_name":"Distributed algorithm","level":2,"score":0.33219999074935913},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2939000129699707},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.2858000099658966},{"id":"https://openalex.org/C52622258","wikidata":"https://www.wikidata.org/wiki/Q131222","display_name":"Information theory","level":2,"score":0.2632000148296356},{"id":"https://openalex.org/C152139883","wikidata":"https://www.wikidata.org/wiki/Q252973","display_name":"Mutual information","level":2,"score":0.2572999894618988}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/isit.2016.7541466","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2016.7541466","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:hal-01436833v1","is_oa":false,"landing_page_url":"https://hal.science/hal-01436833","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"2016 IEEE International Symposium on Information Theory (ISIT), Jul 2016, Barcelona, Spain. &#x27E8;10.1109/ISIT.2016.7541466&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1994846830","https://openalex.org/W2019307453","https://openalex.org/W2037478555","https://openalex.org/W2068143054","https://openalex.org/W2071177730","https://openalex.org/W2112905930","https://openalex.org/W2150926065","https://openalex.org/W2161281052","https://openalex.org/W2173267959","https://openalex.org/W2553439846","https://openalex.org/W4302366875"],"related_works":[],"abstract_inverted_index":{"This":[0,64],"paper":[1],"investigates":[2],"the":[3,17,33,46,93,104],"problem":[4,98,106],"of":[5,8,28,41,53,56],"distributed":[6,29,71,118],"biclustering":[7,113],"memoryless":[9,31],"sources":[10,43],"and":[11,89,99],"extends":[12],"previous":[13],"work":[14],"[1]":[15],"to":[16,37,92,103,117,128,130],"general":[18],"case":[19],"with":[20],"more":[21],"than":[22],"two":[23,50],"sources.":[24],"Given":[25],"a":[26],"set":[27],"stationary":[30],"sources,":[32],"encoders'":[34],"goal":[35],"is":[36,62,66,114],"find":[38],"rate-limited":[39],"representations":[40],"these":[42],"such":[44],"that":[45,131],"mutual":[47],"information":[48],"between":[49],"selected":[51],"subsets":[52],"descriptions":[54,79],"(each":[55],"them":[57,102],"generated":[58],"by":[59],"distinct":[60],"encoders)":[61],"maximized.":[63],"formulation":[65],"fundamentally":[67],"different":[68],"from":[69],"conventional":[70],"source":[72],"coding":[73],"problems":[74],"since":[75],"here":[76],"redundancy":[77],"among":[78],"should":[80],"actually":[81],"be":[82],"maximally":[83],"preserved.":[84],"We":[85],"derive":[86],"non-trivial":[87],"outer":[88],"inner":[90],"bounds":[91],"achievable":[94],"region":[95],"for":[96],"this":[97],"further":[100],"connect":[101],"CEO":[105],"under":[107],"logarithmic":[108],"loss":[109],"distortion.":[110],"Since":[111],"information-theoretic":[112],"closely":[115],"related":[116],"hypothesis":[119],"testing":[120],"against":[121],"independence,":[122],"our":[123],"results":[124],"are":[125],"also":[126],"expected":[127],"apply":[129],"problem.":[132]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2016-06-24T00:00:00"}
