{"id":"https://openalex.org/W1991684514","doi":"https://doi.org/10.1109/itw.2013.6691229","title":"Source broadcasting over erasure channels: Distortion bounds and code design","display_name":"Source broadcasting over erasure channels: Distortion bounds and code design","publication_year":2013,"publication_date":"2013-09-01","ids":{"openalex":"https://openalex.org/W1991684514","doi":"https://doi.org/10.1109/itw.2013.6691229","mag":"1991684514"},"language":"en","primary_location":{"id":"doi:10.1109/itw.2013.6691229","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw.2013.6691229","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE Information Theory Workshop (ITW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111968720","display_name":"Louis Tan","orcid":null},"institutions":[{"id":"https://openalex.org/I185261750","display_name":"University of Toronto","ror":"https://ror.org/03dbr7087","country_code":"CA","type":"education","lineage":["https://openalex.org/I185261750"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Louis Tan","raw_affiliation_strings":["Dept. of Electrical & Computer Engineering, University of Toronto, Toronto, ON, Canada","[Department of Electrical and Computer Engineering, University of Toronto, Toronto, ON M5S 3G4, Canada]"],"affiliations":[{"raw_affiliation_string":"Dept. of Electrical & Computer Engineering, University of Toronto, Toronto, ON, Canada","institution_ids":["https://openalex.org/I185261750"]},{"raw_affiliation_string":"[Department of Electrical and Computer Engineering, University of Toronto, Toronto, ON M5S 3G4, Canada]","institution_ids":["https://openalex.org/I185261750"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100411235","display_name":"Yao Li","orcid":"https://orcid.org/0000-0002-4129-8902"},"institutions":[{"id":"https://openalex.org/I161318765","display_name":"University of California, Los Angeles","ror":"https://ror.org/046rm7j60","country_code":"US","type":"education","lineage":["https://openalex.org/I161318765"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yao Li","raw_affiliation_strings":["Dept. of Electrical Engineering, UCLA, Los Angeles, CA, USA","Dept. of Electrical Engineering, UCLA, Los Angeles, CA USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Electrical Engineering, UCLA, Los Angeles, CA, USA","institution_ids":["https://openalex.org/I161318765"]},{"raw_affiliation_string":"Dept. of Electrical Engineering, UCLA, Los Angeles, CA USA","institution_ids":["https://openalex.org/I161318765"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046253142","display_name":"Ashish Khisti","orcid":"https://orcid.org/0000-0002-2331-8965"},"institutions":[{"id":"https://openalex.org/I185261750","display_name":"University of Toronto","ror":"https://ror.org/03dbr7087","country_code":"CA","type":"education","lineage":["https://openalex.org/I185261750"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ashish Khisti","raw_affiliation_strings":["Dept. of Electrical & Computer Engineering, University of Toronto, Toronto, ON, Canada","[Department of Electrical and Computer Engineering, University of Toronto, Toronto, ON M5S 3G4, Canada]"],"affiliations":[{"raw_affiliation_string":"Dept. of Electrical & Computer Engineering, University of Toronto, Toronto, ON, Canada","institution_ids":["https://openalex.org/I185261750"]},{"raw_affiliation_string":"[Department of Electrical and Computer Engineering, University of Toronto, Toronto, ON M5S 3G4, Canada]","institution_ids":["https://openalex.org/I185261750"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034577486","display_name":"Emina Soljanin","orcid":"https://orcid.org/0000-0002-7464-4242"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Emina Soljanin","raw_affiliation_strings":["Alcatel-Lucent, Bell Labs, Murray Hill, NJ, USA","Bell Labs, Alcatel-Lucent, Murray Hill, NJ 07974 USA"],"affiliations":[{"raw_affiliation_string":"Alcatel-Lucent, Bell Labs, Murray Hill, NJ, USA","institution_ids":[]},{"raw_affiliation_string":"Bell Labs, Alcatel-Lucent, Murray Hill, NJ 07974 USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5111968720"],"corresponding_institution_ids":["https://openalex.org/I185261750"],"apc_list":null,"apc_paid":null,"fwci":1.0874,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.79244268,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8227365612983704},{"id":"https://openalex.org/keywords/binary-erasure-channel","display_name":"Binary erasure channel","score":0.7649416923522949},{"id":"https://openalex.org/keywords/erasure-code","display_name":"Erasure code","score":0.7277874946594238},{"id":"https://openalex.org/keywords/erasure","display_name":"Erasure","score":0.686163067817688},{"id":"https://openalex.org/keywords/broadcasting","display_name":"Broadcasting (networking)","score":0.6078256964683533},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5814045071601868},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.5808053612709045},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.5743893980979919},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.4986531734466553},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.47513678669929504},{"id":"https://openalex.org/keywords/fountain-code","display_name":"Fountain code","score":0.45852676033973694},{"id":"https://openalex.org/keywords/linear-network-coding","display_name":"Linear network coding","score":0.4490639567375183},{"id":"https://openalex.org/keywords/lossy-compression","display_name":"Lossy compression","score":0.4361400306224823},{"id":"https://openalex.org/keywords/channel-code","display_name":"Channel code","score":0.43229180574417114},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.4229898750782013},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36565065383911133},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.32933634519577026},{"id":"https://openalex.org/keywords/channel-capacity","display_name":"Channel capacity","score":0.21848806738853455},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1989280879497528},{"id":"https://openalex.org/keywords/linear-code","display_name":"Linear code","score":0.13640907406806946},{"id":"https://openalex.org/keywords/block-code","display_name":"Block code","score":0.12721624970436096},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10266780853271484},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.08823943138122559}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8227365612983704},{"id":"https://openalex.org/C149862233","wikidata":"https://www.wikidata.org/wiki/Q864142","display_name":"Binary erasure channel","level":4,"score":0.7649416923522949},{"id":"https://openalex.org/C137529215","wikidata":"https://www.wikidata.org/wiki/Q5385031","display_name":"Erasure code","level":3,"score":0.7277874946594238},{"id":"https://openalex.org/C2778790127","wikidata":"https://www.wikidata.org/wiki/Q484885","display_name":"Erasure","level":2,"score":0.686163067817688},{"id":"https://openalex.org/C110157686","wikidata":"https://www.wikidata.org/wiki/Q922122","display_name":"Broadcasting (networking)","level":2,"score":0.6078256964683533},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5814045071601868},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.5808053612709045},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.5743893980979919},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.4986531734466553},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.47513678669929504},{"id":"https://openalex.org/C76132124","wikidata":"https://www.wikidata.org/wiki/Q5474786","display_name":"Fountain code","level":5,"score":0.45852676033973694},{"id":"https://openalex.org/C138293262","wikidata":"https://www.wikidata.org/wiki/Q1089578","display_name":"Linear network coding","level":3,"score":0.4490639567375183},{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.4361400306224823},{"id":"https://openalex.org/C166366890","wikidata":"https://www.wikidata.org/wiki/Q602136","display_name":"Channel code","level":3,"score":0.43229180574417114},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.4229898750782013},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36565065383911133},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.32933634519577026},{"id":"https://openalex.org/C97744766","wikidata":"https://www.wikidata.org/wiki/Q870845","display_name":"Channel capacity","level":3,"score":0.21848806738853455},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1989280879497528},{"id":"https://openalex.org/C2400350","wikidata":"https://www.wikidata.org/wiki/Q1752667","display_name":"Linear code","level":4,"score":0.13640907406806946},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.12721624970436096},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10266780853271484},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.08823943138122559},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itw.2013.6691229","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw.2013.6691229","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE Information Theory Workshop (ITW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1533214656","https://openalex.org/W1965291325","https://openalex.org/W2077862568","https://openalex.org/W2090811717","https://openalex.org/W2103921855","https://openalex.org/W2105323393","https://openalex.org/W2122096378","https://openalex.org/W2153036649","https://openalex.org/W2162921180","https://openalex.org/W2296125569","https://openalex.org/W2744777446","https://openalex.org/W2963565104","https://openalex.org/W6631948901"],"related_works":["https://openalex.org/W2372190485","https://openalex.org/W2139769859","https://openalex.org/W2583282232","https://openalex.org/W2962908977","https://openalex.org/W2140357074","https://openalex.org/W2137028263","https://openalex.org/W2810502498","https://openalex.org/W2744779861","https://openalex.org/W2162141500","https://openalex.org/W2951344115"],"abstract_inverted_index":{"We":[0,85,150],"study":[1],"a":[2,10,14,30,39,102,142],"lossy":[3],"source-broadcasting":[4],"problem":[5,27,100,137],"involving":[6],"the":[7,26,52,57,64,99,118,127,147],"transmission":[8],"of":[9,21,42,66,76],"binary":[11],"source":[12,46,70],"over":[13],"two-receiver":[15],"erasure":[16,123],"broadcast":[17,36],"channel.":[18],"The":[19,93],"motivation":[20],"our":[22],"work":[23],"stems":[24],"from":[25,101],"faced":[28,73],"by":[29,63],"server":[31,53],"that":[32,145],"wishes":[33,54],"to":[34,38,55,90,97,140],"singly":[35],"content":[37,82],"diverse":[40],"set":[41],"users":[43,75],"with":[44,74,154],"fractional":[45],"reconstruction":[47],"requirements.":[48],"In":[49],"this":[50,91,108],"problem,":[51],"minimize":[56],"overall":[58],"network":[59,119,148],"latency":[60,120],"incurred":[61],"(measured":[62],"number":[65],"channel":[67,78],"uses":[68],"per":[69],"symbol)":[71],"when":[72],"heterogeneous":[77],"qualities,":[79],"computing":[80],"capabilities,":[81],"demand":[83],"etc.":[84],"provide":[86,111],"two":[87],"complementary":[88],"approaches":[89,153],"problem.":[92],"first":[94],"approach":[95,129],"is":[96],"consider":[98],"joint":[103],"source-channel":[104],"coding":[105,132],"formulation.":[106],"Under":[107],"formulation,":[109],"we":[110],"both":[112,152],"inner":[113],"and":[114,133],"outer":[115],"bounds":[116],"for":[117],"under":[121],"an":[122,135],"distortion":[124],"criterion.":[125],"Alternatively,":[126],"second":[128],"employs":[130],"rateless":[131],"formulates":[134],"optimization":[136],"so":[138],"as":[139],"find":[141],"degree":[143],"distribution":[144],"minimizes":[146],"latency.":[149],"compare":[151],"numerical":[155],"simulations.":[156]},"counts_by_year":[{"year":2016,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
