{"id":"https://openalex.org/W4386075237","doi":"https://doi.org/10.1109/isit54713.2023.10206559","title":"Learning-augmented streaming codes for variable-size messages under partial burst losses","display_name":"Learning-augmented streaming codes for variable-size messages under partial burst losses","publication_year":2023,"publication_date":"2023-06-25","ids":{"openalex":"https://openalex.org/W4386075237","doi":"https://doi.org/10.1109/isit54713.2023.10206559"},"language":"en","primary_location":{"id":"doi:10.1109/isit54713.2023.10206559","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/isit54713.2023.10206559","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058836143","display_name":"Michael Rudow","orcid":"https://orcid.org/0000-0002-6253-1689"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Michael Rudow","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5109919225","display_name":"K. V. Rashmi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"K. V. Rashmi","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5058836143"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.6085,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.68865785,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1101","last_page":"1106"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11409","display_name":"Advanced Wireless Network Optimization","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.771725058555603},{"id":"https://openalex.org/keywords/streaming-algorithm","display_name":"Streaming algorithm","score":0.679205060005188},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6088991165161133},{"id":"https://openalex.org/keywords/variable-bitrate","display_name":"Variable bitrate","score":0.5769826769828796},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5191144943237305},{"id":"https://openalex.org/keywords/block-size","display_name":"Block size","score":0.5060686469078064},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4883284270763397},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.441049188375473},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4304344356060028},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.1969844102859497},{"id":"https://openalex.org/keywords/bit-rate","display_name":"Bit rate","score":0.16911974549293518},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10073164105415344},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09740698337554932}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.771725058555603},{"id":"https://openalex.org/C187166803","wikidata":"https://www.wikidata.org/wiki/Q2835831","display_name":"Streaming algorithm","level":3,"score":0.679205060005188},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6088991165161133},{"id":"https://openalex.org/C57667952","wikidata":"https://www.wikidata.org/wiki/Q1154443","display_name":"Variable bitrate","level":3,"score":0.5769826769828796},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5191144943237305},{"id":"https://openalex.org/C41431624","wikidata":"https://www.wikidata.org/wiki/Q1053357","display_name":"Block size","level":3,"score":0.5060686469078064},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4883284270763397},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.441049188375473},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4304344356060028},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.1969844102859497},{"id":"https://openalex.org/C2987812609","wikidata":"https://www.wikidata.org/wiki/Q194158","display_name":"Bit rate","level":2,"score":0.16911974549293518},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10073164105415344},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09740698337554932},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit54713.2023.10206559","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/isit54713.2023.10206559","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W2031335939","https://openalex.org/W2041945405","https://openalex.org/W2049418428","https://openalex.org/W2066422082","https://openalex.org/W2113967464","https://openalex.org/W2125921054","https://openalex.org/W2143241245","https://openalex.org/W2171283709","https://openalex.org/W2540504585","https://openalex.org/W2586580216","https://openalex.org/W2761089354","https://openalex.org/W2913533115","https://openalex.org/W2963225233","https://openalex.org/W2976706786","https://openalex.org/W3013193461","https://openalex.org/W3081071837","https://openalex.org/W3100552666","https://openalex.org/W3146013305","https://openalex.org/W3206731135","https://openalex.org/W3214381038","https://openalex.org/W3215828111","https://openalex.org/W4280651027","https://openalex.org/W4284709636","https://openalex.org/W4285107210","https://openalex.org/W4289812968","https://openalex.org/W4321021169","https://openalex.org/W4386075237","https://openalex.org/W6661023124"],"related_works":["https://openalex.org/W2077189200","https://openalex.org/W2393136772","https://openalex.org/W768788828","https://openalex.org/W4386229429","https://openalex.org/W3016449295","https://openalex.org/W53339341","https://openalex.org/W2484416673","https://openalex.org/W2123931954","https://openalex.org/W4362564423","https://openalex.org/W2551596405"],"abstract_inverted_index":{"Recovering":[0],"bursts":[1,56],"of":[2,22,109,132,152,170,188,205],"lost":[3,74],"packets":[4,72],"in":[5,50,66,78,124,163],"real-time":[6,34],"is":[7],"crucial":[8],"to":[9,55,91,101,113,148,184],"multimedia":[10],"live-streaming":[11],"applications\u2019":[12],"quality-of-experience":[13],"(QoE).":[14],"Streaming":[15],"codes":[16,49],"optimally":[17],"handle":[18],"the":[19,130,140,150,171,176,186,203],"unique":[20],"aspects":[21],"loss":[23],"recovery":[24],"for":[25,47,62,75,115],"live":[26],"streaming,":[27],"including":[28],"(a)":[29,139,175],"variable-size":[30],"messages,":[31],"(b)":[32,144,180],"a":[33,82,87,98,103,121,145,160,181,199],"playback":[35],"deadline,":[36],"and":[37],"(c)":[38],"burst":[39],"losses":[40],"across":[41],"multiple":[42],"frames.":[43],"However,":[44],"existing":[45],"models":[46],"streaming":[48,89,104,122,161],"this":[51],"setting":[52,127,166],"only":[53,70],"apply":[54],"that":[57],"drop":[58],"all":[59],"data":[60],"sent":[61],"each":[63,76,116],"message.":[64,117,156,192],"Yet":[65],"many":[67],"real-world":[68],"applications":[69],"some":[71],"are":[73,135,195],"message":[77],"what":[79],"we":[80,119],"call":[81],"\"partial":[83],"burst.\"":[84],"We":[85,95,157],"introduce":[86],"new":[88],"model":[90],"accommodate":[92],"partial":[93],"bursts.":[94],"then":[96,158],"design":[97,159],"building":[99,141,177],"block":[100,142,178],"construct":[102],"code":[105,123,162],"given":[106],"any":[107],"choice":[108],"how":[110],"much":[111],"parity":[112,153,189],"allocate":[114],"Next,":[118],"present":[120],"an":[125,164],"offline":[126],"(i.e.,":[128,167],"where":[129],"sizes":[131],"future":[133],"messages":[134],"known)":[136],"by":[137,173],"combining":[138,174],"with":[143,179],"linear":[146],"program":[147],"set":[149,185],"number":[151,187],"symbols":[154,190],"per":[155,191],"online":[165],"without":[168],"knowledge":[169],"future)":[172],"learning-augmented":[182],"algorithm":[183],"The":[193],"constructions":[194],"approximately":[196],"rate-optimal":[197],"under":[198],"natural":[200],"condition":[201],"on":[202],"nature":[204],"feedback.":[206]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-14T06:41:57.775601","created_date":"2025-10-10T00:00:00"}
