{"id":"https://openalex.org/W2025977964","doi":"https://doi.org/10.1109/itw.2006.1633771","title":"Coding for Channels with Rate-Limited Side Information at the Decoder","display_name":"Coding for Channels with Rate-Limited Side Information at the Decoder","publication_year":2006,"publication_date":"2006-05-25","ids":{"openalex":"https://openalex.org/W2025977964","doi":"https://doi.org/10.1109/itw.2006.1633771","mag":"2025977964"},"language":"en","primary_location":{"id":"doi:10.1109/itw.2006.1633771","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw.2006.1633771","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2006 IEEE Information Theory Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050285406","display_name":"Yossef Steinberg","orcid":"https://orcid.org/0000-0002-1681-1065"},"institutions":[{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Y. Steinberg","raw_affiliation_strings":["Department of Electrical Engineering, Technion-Israel Institute of Technology, Haifa, Israel","Department of Electrical Engineering, Technion - Israel Institute of Technology, Haifa 32000, Israel. ysteinbe@ee.technion.ac.il"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Technion-Israel Institute of Technology, Haifa, Israel","institution_ids":["https://openalex.org/I174306211"]},{"raw_affiliation_string":"Department of Electrical Engineering, Technion - Israel Institute of Technology, Haifa 32000, Israel. ysteinbe@ee.technion.ac.il","institution_ids":["https://openalex.org/I174306211"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5050285406"],"corresponding_institution_ids":["https://openalex.org/I174306211"],"apc_list":null,"apc_paid":null,"fwci":0.3761,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.64061251,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"11","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.7857966423034668},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6855741739273071},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.6708900928497314},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.6645232439041138},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6016415357589722},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5813847780227661},{"id":"https://openalex.org/keywords/channel-capacity","display_name":"Channel capacity","score":0.5098540186882019},{"id":"https://openalex.org/keywords/soft-decision-decoder","display_name":"Soft-decision decoder","score":0.48304516077041626},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.42000406980514526},{"id":"https://openalex.org/keywords/distributed-source-coding","display_name":"Distributed source coding","score":0.41302600502967834},{"id":"https://openalex.org/keywords/variable-length-code","display_name":"Variable-length code","score":0.32694071531295776},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.23016846179962158},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.16406682133674622},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.09036052227020264}],"concepts":[{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.7857966423034668},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6855741739273071},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.6708900928497314},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.6645232439041138},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6016415357589722},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5813847780227661},{"id":"https://openalex.org/C97744766","wikidata":"https://www.wikidata.org/wiki/Q870845","display_name":"Channel capacity","level":3,"score":0.5098540186882019},{"id":"https://openalex.org/C185588885","wikidata":"https://www.wikidata.org/wiki/Q7553811","display_name":"Soft-decision decoder","level":3,"score":0.48304516077041626},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.42000406980514526},{"id":"https://openalex.org/C200801453","wikidata":"https://www.wikidata.org/wiki/Q5283181","display_name":"Distributed source coding","level":4,"score":0.41302600502967834},{"id":"https://openalex.org/C60603091","wikidata":"https://www.wikidata.org/wiki/Q2981616","display_name":"Variable-length code","level":3,"score":0.32694071531295776},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.23016846179962158},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.16406682133674622},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.09036052227020264},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itw.2006.1633771","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw.2006.1633771","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2006 IEEE Information Theory Workshop","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1986389751","https://openalex.org/W2100058341","https://openalex.org/W2150412388","https://openalex.org/W2167577564","https://openalex.org/W3169111758"],"related_works":["https://openalex.org/W2356119241","https://openalex.org/W2182248074","https://openalex.org/W2019141945","https://openalex.org/W2898530548","https://openalex.org/W3167298930","https://openalex.org/W2361385741","https://openalex.org/W2076509970","https://openalex.org/W2138256990","https://openalex.org/W2148567998","https://openalex.org/W4324266468"],"abstract_inverted_index":{"In":[0],"this":[1,109],"work":[2],"coding":[3,83],"for":[4,54,84],"channel":[5,28,56,65,87,110],"with":[6,26,41],"partial":[7,42],"state":[8,29,43],"information":[9,30,52,76],"at":[10],"the":[11,16,22,37,55,64,70,79,89,106,119],"decoder":[12,38,57],"is":[13,24,39,58,111],"studied.":[14],"Specifically,":[15],"model":[17],"under":[18],"consideration":[19],"assumes":[20],"that":[21,113],"encoder":[23],"provided":[25,40],"full":[27],"in":[31,77,118],"a":[32,47,59,86,93,97],"non":[33],"causal":[34],"manner,":[35],"and":[36,96,123],"knowledge,":[44],"quantified":[45],"by":[46],"rate-limit.":[48],"Coding":[49],"of":[50,92,105,108,121],"side":[51,75],"intended":[53],"Wyner-Ziv":[60,94,122],"like":[61],"problem,":[62],"since":[63],"output":[66],"depends":[67],"statistically":[68],"on":[69],"state,":[71],"thus":[72],"serving":[73],"as":[74],"retrieving":[78],"encoded":[80],"state.":[81],"Therefore,":[82],"such":[85],"involves":[88,114],"simultaneous":[90],"solution":[91],"problem":[95],"related":[98],"Gel'fand-Pinsker":[99,124],"problem.":[100],"A":[101],"single":[102],"letter":[103],"characterization":[104],"capacity":[107],"developed,":[112],"two":[115],"rate":[116],"constraints,":[117],"form":[120],"formulas.":[125],"Applications":[126],"to":[127],"watermarking":[128],"problems":[129],"are":[130],"suggested.":[131]},"counts_by_year":[],"updated_date":"2026-01-13T01:12:25.745995","created_date":"2025-10-10T00:00:00"}
