{"id":"https://openalex.org/W2886140273","doi":"https://doi.org/10.1109/isit.2018.8437902","title":"On the Tightness of a Cut-Set Bound on Network Function Computation","display_name":"On the Tightness of a Cut-Set Bound on Network Function Computation","publication_year":2018,"publication_date":"2018-06-01","ids":{"openalex":"https://openalex.org/W2886140273","doi":"https://doi.org/10.1109/isit.2018.8437902","mag":"2886140273"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2018.8437902","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2018.8437902","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100440022","display_name":"Jie Wang","orcid":"https://orcid.org/0000-0001-8623-4622"},"institutions":[{"id":"https://openalex.org/I4210116924","display_name":"Chinese University of Hong Kong, Shenzhen","ror":"https://ror.org/02d5ks197","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633","https://openalex.org/I180726961","https://openalex.org/I4210116924"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jie Wang","raw_affiliation_strings":["The Chinese University of Hong Kong Shenzhen, School of Science and Engineering, Shenzhen, China","School of Science and Engineering, The Chinese University of Hong Kong Shenzhen, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"The Chinese University of Hong Kong Shenzhen, School of Science and Engineering, Shenzhen, China","institution_ids":["https://openalex.org/I4210116924"]},{"raw_affiliation_string":"School of Science and Engineering, The Chinese University of Hong Kong Shenzhen, Shenzhen, China","institution_ids":["https://openalex.org/I4210116924"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054079306","display_name":"Shenghao Yang","orcid":"https://orcid.org/0000-0003-1987-5643"},"institutions":[{"id":"https://openalex.org/I4210116924","display_name":"Chinese University of Hong Kong, Shenzhen","ror":"https://ror.org/02d5ks197","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633","https://openalex.org/I180726961","https://openalex.org/I4210116924"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shenghao Yang","raw_affiliation_strings":["The Chinese University of Hong Kong, Shenzhen, Shenzhen Key Laboratory of IoT Intelligent Systems and Wireless Network Technology, Shenzhen, China","Shenzhen Key Laboratory of IoT Intelligent Systems and Wireless Network Technology, The Chinese University of Hong Kong, Shenzhen, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"The Chinese University of Hong Kong, Shenzhen, Shenzhen Key Laboratory of IoT Intelligent Systems and Wireless Network Technology, Shenzhen, China","institution_ids":["https://openalex.org/I4210116924"]},{"raw_affiliation_string":"Shenzhen Key Laboratory of IoT Intelligent Systems and Wireless Network Technology, The Chinese University of Hong Kong, Shenzhen, Shenzhen, China","institution_ids":["https://openalex.org/I4210116924"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049701424","display_name":"Congduan Li","orcid":"https://orcid.org/0000-0003-0495-332X"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Congduan Li","raw_affiliation_strings":["City University of Hong Kong, Department of Computer Science, Hong Kong","Department of Computer Science, City University of Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"City University of Hong Kong, Department of Computer Science, Hong Kong","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100440022"],"corresponding_institution_ids":["https://openalex.org/I4210116924"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.09942142,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1824","last_page":"1828"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9797000288963318,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9684000015258789,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.7317039966583252},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.7068749666213989},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6395815014839172},{"id":"https://openalex.org/keywords/linear-network-coding","display_name":"Linear network coding","score":0.603792667388916},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5547116994857788},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.5078077912330627},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.4271225035190582},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.40002381801605225},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.359294593334198},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2950412631034851},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.0899319052696228}],"concepts":[{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.7317039966583252},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.7068749666213989},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6395815014839172},{"id":"https://openalex.org/C138293262","wikidata":"https://www.wikidata.org/wiki/Q1089578","display_name":"Linear network coding","level":3,"score":0.603792667388916},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5547116994857788},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.5078077912330627},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.4271225035190582},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.40002381801605225},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.359294593334198},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2950412631034851},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0899319052696228},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2018.8437902","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2018.8437902","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1673335653","https://openalex.org/W2005007104","https://openalex.org/W2123976939","https://openalex.org/W2129119419","https://openalex.org/W2146247100","https://openalex.org/W2169369793","https://openalex.org/W2545365617","https://openalex.org/W2962789451","https://openalex.org/W2964259786","https://openalex.org/W6745198564"],"related_works":["https://openalex.org/W2212571888","https://openalex.org/W2139379087","https://openalex.org/W2411336269","https://openalex.org/W2079655802","https://openalex.org/W2020805386","https://openalex.org/W3014803371","https://openalex.org/W2124128583","https://openalex.org/W2489403550","https://openalex.org/W2046435967","https://openalex.org/W2073059552"],"abstract_inverted_index":{"The":[0,35,44,55],"following":[1],"model":[2],"of":[3,27,64,76,100,129,145,149],"network":[4,36,46,49,151],"function":[5,22,29,69,152],"computation":[6,53],"in":[7,107,121],"directed":[8],"acyclic":[9],"networks":[10],"is":[11,58,94,118],"considered:":[12],"A":[13],"sink":[14],"node":[15],"desires":[16],"to":[17,137],"compute":[18],"correctly":[19],"a":[20,85,146],"target":[21,68],"with":[23,103],"all":[24,97],"possible":[25],"inputs":[26],"the":[28,61,67,77,90,98,101,126,142,150],"generated":[30],"at":[31],"multiple":[32],"source":[33],"nodes.":[34],"links":[37],"have":[38],"limited":[39],"capacity":[40,92,106,128,144],"and":[41,81],"are":[42],"error-free.":[43],"intermediate":[45],"nodes":[47],"perform":[48],"coding":[50],"without":[51],"any":[52],"bound.":[54],"computing":[56,91,105,127,143,153],"rate":[57],"measured":[59],"by":[60,123],"average":[62],"number":[63],"times":[65],"that":[66,93,114],"can":[70,134],"be":[71,135],"computed":[72],"for":[73,96],"one":[74],"use":[75],"network.":[78],"Guang,":[79],"Yang":[80],"Li":[82],"recently":[83],"proposed":[84],"general":[86,122,147],"upper":[87,116,139],"bound":[88,117],"on":[89,141],"tight":[95,120],"instances":[99],"problem":[102],"known":[104],"literature.":[108],"In":[109],"this":[110],"paper,":[111],"we":[112],"show":[113],"their":[115],"not":[119],"explicitly":[124],"characterizing":[125],"an":[130],"example.":[131],"Our":[132],"technique":[133],"extended":[136],"characterize":[138],"bounds":[140],"instance":[148],"problem.":[154]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
