{"id":"https://openalex.org/W2407568342","doi":"https://doi.org/10.1109/isit.2016.7541842","title":"Soft covering with high probability","display_name":"Soft covering with high probability","publication_year":2016,"publication_date":"2016-07-01","ids":{"openalex":"https://openalex.org/W2407568342","doi":"https://doi.org/10.1109/isit.2016.7541842","mag":"2407568342"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2016.7541842","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2016.7541842","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1605.06396","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026048440","display_name":"Paul Cuff","orcid":"https://orcid.org/0000-0003-2936-9939"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Paul Cuff","raw_affiliation_strings":["Princeton University, United States","Princeton University (United States)"],"affiliations":[{"raw_affiliation_string":"Princeton University, United States","institution_ids":["https://openalex.org/I20089843"]},{"raw_affiliation_string":"Princeton University (United States)","institution_ids":["https://openalex.org/I20089843"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5026048440"],"corresponding_institution_ids":["https://openalex.org/I20089843"],"apc_list":null,"apc_paid":null,"fwci":0.3718,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.6498821,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"2963","last_page":"2967"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10500","display_name":"Sparse and Compressive Sensing Techniques","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/2206","display_name":"Computational Mechanics"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/codebook","display_name":"Codebook","score":0.8538132905960083},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.7310107946395874},{"id":"https://openalex.org/keywords/lossy-compression","display_name":"Lossy compression","score":0.6070486307144165},{"id":"https://openalex.org/keywords/lemma","display_name":"Lemma (botany)","score":0.5884977579116821},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.5146514177322388},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.4641505479812622},{"id":"https://openalex.org/keywords/random-variable","display_name":"Random variable","score":0.46355950832366943},{"id":"https://openalex.org/keywords/expected-value","display_name":"Expected value","score":0.4230978786945343},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.4182940125465393},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3809071481227875},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3523765206336975},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.16064542531967163},{"id":"https://openalex.org/keywords/geometry","display_name":"Geometry","score":0.09030905365943909}],"concepts":[{"id":"https://openalex.org/C127759330","wikidata":"https://www.wikidata.org/wiki/Q637416","display_name":"Codebook","level":2,"score":0.8538132905960083},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.7310107946395874},{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.6070486307144165},{"id":"https://openalex.org/C2777759810","wikidata":"https://www.wikidata.org/wiki/Q149316","display_name":"Lemma (botany)","level":3,"score":0.5884977579116821},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.5146514177322388},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.4641505479812622},{"id":"https://openalex.org/C122123141","wikidata":"https://www.wikidata.org/wiki/Q176623","display_name":"Random variable","level":2,"score":0.46355950832366943},{"id":"https://openalex.org/C141042865","wikidata":"https://www.wikidata.org/wiki/Q200125","display_name":"Expected value","level":2,"score":0.4230978786945343},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.4182940125465393},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3809071481227875},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3523765206336975},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.16064542531967163},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.09030905365943909},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C46757340","wikidata":"https://www.wikidata.org/wiki/Q43238","display_name":"Poaceae","level":2,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/isit.2016.7541842","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2016.7541842","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1605.06396","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1605.06396","pdf_url":"https://arxiv.org/pdf/1605.06396","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"mag:2407568342","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/1605.06396.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.1605.06396","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1605.06396","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1605.06396","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1605.06396","pdf_url":"https://arxiv.org/pdf/1605.06396","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.41999998688697815}],"awards":[{"id":"https://openalex.org/G4741230905","display_name":null,"funder_award_id":"CCF-1350595","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7955629248","display_name":"CAREER: Digital Encoding of Information Signals for Security with Limited Resources","funder_award_id":"1350595","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2407568342.pdf","grobid_xml":"https://content.openalex.org/works/W2407568342.grobid-xml"},"referenced_works_count":17,"referenced_works":["https://openalex.org/W245337057","https://openalex.org/W1409569118","https://openalex.org/W1963589622","https://openalex.org/W1998812578","https://openalex.org/W2031420654","https://openalex.org/W2043769961","https://openalex.org/W2068887604","https://openalex.org/W2103674915","https://openalex.org/W2134348739","https://openalex.org/W2141432745","https://openalex.org/W2162635854","https://openalex.org/W2186012205","https://openalex.org/W2233598973","https://openalex.org/W2914714618","https://openalex.org/W2963645489","https://openalex.org/W3103182327","https://openalex.org/W6689167136"],"related_works":["https://openalex.org/W2962685448","https://openalex.org/W1998812578","https://openalex.org/W2904979834","https://openalex.org/W2097338938","https://openalex.org/W2783683505","https://openalex.org/W2573319292","https://openalex.org/W2001921622","https://openalex.org/W2138605525","https://openalex.org/W1540156667","https://openalex.org/W2186990730","https://openalex.org/W1973818299","https://openalex.org/W2163714951","https://openalex.org/W2950874267","https://openalex.org/W3103381487","https://openalex.org/W2144476727","https://openalex.org/W1993176105","https://openalex.org/W1993316749","https://openalex.org/W2162635854","https://openalex.org/W2168734837","https://openalex.org/W1978639695"],"abstract_inverted_index":{"Wyner's":[0],"soft-covering":[1,38,56],"lemma":[2],"is":[3,51,65],"the":[4,35,55,69,75,84,92],"central":[5],"analysis":[6],"step":[7],"for":[8,24,82,96],"achievability":[9,26],"proofs":[10,27],"of":[11,37,63,88],"information":[12],"theoretic":[13],"security,":[14],"resolvability,":[15],"and":[16,91],"channel":[17],"synthesis.":[18],"It":[19],"can":[20],"also":[21],"be":[22],"used":[23],"simple":[25],"in":[28,68],"lossy":[29],"source":[30],"coding.":[31],"This":[32,78],"work":[33,79],"sharpens":[34],"claim":[36],"by":[39],"moving":[40],"away":[41],"from":[42],"an":[43],"expected":[44],"value":[45],"analysis.":[46],"Instead,":[47],"a":[48],"random":[49],"codebook":[50,94],"shown":[52],"to":[53],"achieve":[54],"phenomenon":[57],"with":[58],"high":[59],"probability.":[60],"The":[61],"probability":[62],"failure":[64],"super-exponentially":[66],"small":[67],"block-length,":[70],"enabling":[71],"many":[72],"applications":[73],"through":[74],"union":[76],"bound.":[77],"gives":[80],"bounds":[81],"both":[83],"exponential":[85],"decay":[86],"rate":[87,95],"total":[89],"variation":[90],"second-order":[93],"soft":[97],"covering.":[98]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
