{"id":"https://openalex.org/W2976325565","doi":"https://doi.org/10.1109/isit.2019.8849452","title":"Improved Upper Bounds on the Hermite and KZ Constants","display_name":"Improved Upper Bounds on the Hermite and KZ Constants","publication_year":2019,"publication_date":"2019-07-01","ids":{"openalex":"https://openalex.org/W2976325565","doi":"https://doi.org/10.1109/isit.2019.8849452","mag":"2976325565"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2019.8849452","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2019.8849452","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080664346","display_name":"Jinming Wen","orcid":"https://orcid.org/0000-0002-8181-0958"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jinming Wen","raw_affiliation_strings":["College of Information Science and Technology and the College of Cyber Security, Jinan University, Guangzhou, 510632, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology and the College of Cyber Security, Jinan University, Guangzhou, 510632, China","institution_ids":["https://openalex.org/I159948400"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062087251","display_name":"Xiao-Wen Chang","orcid":"https://orcid.org/0000-0001-9251-2959"},"institutions":[{"id":"https://openalex.org/I5023651","display_name":"McGill University","ror":"https://ror.org/01pxwe438","country_code":"CA","type":"education","lineage":["https://openalex.org/I5023651"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Xiao-Wen Chang","raw_affiliation_strings":["School of Computer Science, McGill University, Montreal, H3A 0E9, Canada","School of Computer Science, McGill University, Montreal, Canada"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, McGill University, Montreal, H3A 0E9, Canada","institution_ids":["https://openalex.org/I5023651"]},{"raw_affiliation_string":"School of Computer Science, McGill University, Montreal, Canada","institution_ids":["https://openalex.org/I5023651"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082041657","display_name":"Jian Weng","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Weng","raw_affiliation_strings":["College of Information Science and Technology and the College of Cyber Security, Jinan University, Guangzhou, 510632, China","College of Information Science and Technology and the College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology and the College of Cyber Security, Jinan University, Guangzhou, 510632, China","institution_ids":["https://openalex.org/I159948400"]},{"raw_affiliation_string":"College of Information Science and Technology and the College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5080664346"],"corresponding_institution_ids":["https://openalex.org/I159948400","https://openalex.org/I19820366","https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":0.1205,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.47282099,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1742","last_page":"1746"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10125","display_name":"Advanced Wireless Communication Techniques","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.7990661859512329},{"id":"https://openalex.org/keywords/constant","display_name":"Constant (computer programming)","score":0.7222764492034912},{"id":"https://openalex.org/keywords/bounding-overwatch","display_name":"Bounding overwatch","score":0.6890396475791931},{"id":"https://openalex.org/keywords/hermite-polynomials","display_name":"Hermite polynomials","score":0.6452484726905823},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.5179520845413208},{"id":"https://openalex.org/keywords/orthogonality","display_name":"Orthogonality","score":0.46629446744918823},{"id":"https://openalex.org/keywords/lattice","display_name":"Lattice (music)","score":0.4615488350391388},{"id":"https://openalex.org/keywords/lattice-reduction","display_name":"Lattice reduction","score":0.44471949338912964},{"id":"https://openalex.org/keywords/lattice-constant","display_name":"Lattice constant","score":0.4179415702819824},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.2888419032096863},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.2276049554347992},{"id":"https://openalex.org/keywords/mathematical-analysis","display_name":"Mathematical analysis","score":0.21879732608795166},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.16603699326515198},{"id":"https://openalex.org/keywords/geometry","display_name":"Geometry","score":0.09365281462669373},{"id":"https://openalex.org/keywords/mimo","display_name":"MIMO","score":0.09221115708351135},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.09070926904678345},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.04916808009147644}],"concepts":[{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.7990661859512329},{"id":"https://openalex.org/C2777027219","wikidata":"https://www.wikidata.org/wiki/Q1284190","display_name":"Constant (computer programming)","level":2,"score":0.7222764492034912},{"id":"https://openalex.org/C63584917","wikidata":"https://www.wikidata.org/wiki/Q333286","display_name":"Bounding overwatch","level":2,"score":0.6890396475791931},{"id":"https://openalex.org/C201362023","wikidata":"https://www.wikidata.org/wiki/Q658574","display_name":"Hermite polynomials","level":2,"score":0.6452484726905823},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.5179520845413208},{"id":"https://openalex.org/C17137986","wikidata":"https://www.wikidata.org/wiki/Q215067","display_name":"Orthogonality","level":2,"score":0.46629446744918823},{"id":"https://openalex.org/C2781204021","wikidata":"https://www.wikidata.org/wiki/Q6497091","display_name":"Lattice (music)","level":2,"score":0.4615488350391388},{"id":"https://openalex.org/C44274781","wikidata":"https://www.wikidata.org/wiki/Q6497132","display_name":"Lattice reduction","level":4,"score":0.44471949338912964},{"id":"https://openalex.org/C132612359","wikidata":"https://www.wikidata.org/wiki/Q625641","display_name":"Lattice constant","level":3,"score":0.4179415702819824},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.2888419032096863},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.2276049554347992},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.21879732608795166},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.16603699326515198},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.09365281462669373},{"id":"https://openalex.org/C207987634","wikidata":"https://www.wikidata.org/wiki/Q176862","display_name":"MIMO","level":3,"score":0.09221115708351135},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.09070926904678345},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.04916808009147644},{"id":"https://openalex.org/C54197355","wikidata":"https://www.wikidata.org/wiki/Q5782992","display_name":"Beamforming","level":2,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C207114421","wikidata":"https://www.wikidata.org/wiki/Q133900","display_name":"Diffraction","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2019.8849452","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2019.8849452","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W149470655","https://openalex.org/W610273277","https://openalex.org/W1527013905","https://openalex.org/W1598269861","https://openalex.org/W1952809395","https://openalex.org/W1973270757","https://openalex.org/W1981287047","https://openalex.org/W1989510734","https://openalex.org/W1999877277","https://openalex.org/W2005762169","https://openalex.org/W2035266863","https://openalex.org/W2100213926","https://openalex.org/W2109671164","https://openalex.org/W2122401230","https://openalex.org/W2140940105","https://openalex.org/W2171061231","https://openalex.org/W2296657975","https://openalex.org/W2605352268","https://openalex.org/W2889019540","https://openalex.org/W3099979855","https://openalex.org/W4206558398","https://openalex.org/W6605963903","https://openalex.org/W6675090356"],"related_works":["https://openalex.org/W2042331445","https://openalex.org/W2059318893","https://openalex.org/W2095582735","https://openalex.org/W2134230263","https://openalex.org/W2129251126","https://openalex.org/W1965698851","https://openalex.org/W834942123","https://openalex.org/W2950467063","https://openalex.org/W2114377583","https://openalex.org/W2024473989"],"abstract_inverted_index":{"The":[0,15,44],"Korkine-Zolotareff":[1],"(KZ)":[2],"reduction":[3,9],"is":[4,19],"a":[5,20,65],"widely":[6],"used":[7,49],"lattice":[8,37],"strategy":[10],"in":[11,50],"communications":[12],"and":[13,39,73],"cryptography.":[14],"Hermite":[16,71],"constant,":[17],"which":[18],"vital":[21],"constant":[22,46,72],"of":[23,33,42,55,106],"lattice,":[24],"has":[25],"many":[26],"applications,":[27],"such":[28],"as":[29],"bounding":[30],"the":[31,34,70,76,84,97,104,107],"length":[32],"shortest":[35],"nonzero":[36],"vector":[38],"orthogonality":[40],"defect":[41],"lattices.":[43],"KZ":[45,56,85],"can":[47],"be":[48],"quantifying":[51],"some":[52],"useful":[53],"properties":[54],"reduced":[57],"matrices.":[58],"In":[59],"this":[60],"paper,":[61],"we":[62],"first":[63,98],"develop":[64,79],"linear":[66],"upper":[67,81,88,109],"bound":[68,77,82],"on":[69,83,103],"then":[74],"use":[75],"to":[78],"an":[80],"constant.":[86],"These":[87],"bounds":[89,110],"are":[90,111],"sharper":[91],"than":[92],"those":[93],"obtained":[94],"recently":[95],"by":[96],"two":[99],"authors.":[100],"Some":[101],"examples":[102],"applications":[105],"improved":[108],"also":[112],"presented.":[113]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-14T06:41:57.775601","created_date":"2025-10-10T00:00:00"}
