{"id":"https://openalex.org/W1980293270","doi":"https://doi.org/10.1109/iwsda.2011.6159430","title":"Multiterminal source coding: Theory, code design and applications","display_name":"Multiterminal source coding: Theory, code design and applications","publication_year":2011,"publication_date":"2011-10-01","ids":{"openalex":"https://openalex.org/W1980293270","doi":"https://doi.org/10.1109/iwsda.2011.6159430","mag":"1980293270"},"language":"en","primary_location":{"id":"doi:10.1109/iwsda.2011.6159430","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwsda.2011.6159430","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fifth International Workshop on Signal Design and Its Applications in Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058154161","display_name":"Zixiang Xiong","orcid":"https://orcid.org/0000-0002-4714-3311"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Zixiang Xiong","raw_affiliation_strings":["Department of Electrical and Computer Engineering, College Station, TX, USA","Dept of Electrical and Computer Engineering, College Station, TX 77843, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, College Station, TX, USA","institution_ids":[]},{"raw_affiliation_string":"Dept of Electrical and Computer Engineering, College Station, TX 77843, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5058154161"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.05669245,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"3","last_page":"3"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9769999980926514,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9375,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.7727938294410706},{"id":"https://openalex.org/keywords/distributed-source-coding","display_name":"Distributed source coding","score":0.7700592279434204},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6692696213722229},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.6490635275840759},{"id":"https://openalex.org/keywords/variable-length-code","display_name":"Variable-length code","score":0.6447517275810242},{"id":"https://openalex.org/keywords/shannon\u2013fano-coding","display_name":"Shannon\u2013Fano coding","score":0.6208580136299133},{"id":"https://openalex.org/keywords/context-adaptive-binary-arithmetic-coding","display_name":"Context-adaptive binary arithmetic coding","score":0.5981141328811646},{"id":"https://openalex.org/keywords/tunstall-coding","display_name":"Tunstall coding","score":0.5797661542892456},{"id":"https://openalex.org/keywords/coding-tree-unit","display_name":"Coding tree unit","score":0.5574373602867126},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.5421974658966064},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5056498050689697},{"id":"https://openalex.org/keywords/gaussian","display_name":"Gaussian","score":0.503255307674408},{"id":"https://openalex.org/keywords/context-adaptive-variable-length-coding","display_name":"Context-adaptive variable-length coding","score":0.4653879702091217},{"id":"https://openalex.org/keywords/lossy-compression","display_name":"Lossy compression","score":0.4549448490142822},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.43072742223739624},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.43018031120300293},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.3273496627807617},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.255665123462677},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.21160462498664856},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.1068023145198822},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.07698211073875427}],"concepts":[{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.7727938294410706},{"id":"https://openalex.org/C200801453","wikidata":"https://www.wikidata.org/wiki/Q5283181","display_name":"Distributed source coding","level":4,"score":0.7700592279434204},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6692696213722229},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.6490635275840759},{"id":"https://openalex.org/C60603091","wikidata":"https://www.wikidata.org/wiki/Q2981616","display_name":"Variable-length code","level":3,"score":0.6447517275810242},{"id":"https://openalex.org/C130811719","wikidata":"https://www.wikidata.org/wiki/Q2645","display_name":"Shannon\u2013Fano coding","level":4,"score":0.6208580136299133},{"id":"https://openalex.org/C175732694","wikidata":"https://www.wikidata.org/wiki/Q1128713","display_name":"Context-adaptive binary arithmetic coding","level":3,"score":0.5981141328811646},{"id":"https://openalex.org/C73231260","wikidata":"https://www.wikidata.org/wiki/Q7853376","display_name":"Tunstall coding","level":4,"score":0.5797661542892456},{"id":"https://openalex.org/C190750250","wikidata":"https://www.wikidata.org/wiki/Q13533439","display_name":"Coding tree unit","level":3,"score":0.5574373602867126},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.5421974658966064},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5056498050689697},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.503255307674408},{"id":"https://openalex.org/C135534801","wikidata":"https://www.wikidata.org/wiki/Q1128721","display_name":"Context-adaptive variable-length coding","level":4,"score":0.4653879702091217},{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.4549448490142822},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.43072742223739624},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.43018031120300293},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.3273496627807617},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.255665123462677},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.21160462498664856},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.1068023145198822},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.07698211073875427},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwsda.2011.6159430","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwsda.2011.6159430","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fifth International Workshop on Signal Design and Its Applications in Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2148686647","https://openalex.org/W4312628177","https://openalex.org/W2123072960","https://openalex.org/W1579872668","https://openalex.org/W2213686625","https://openalex.org/W1587903609","https://openalex.org/W2668751350","https://openalex.org/W2045024766","https://openalex.org/W2140825120","https://openalex.org/W2168369297"],"abstract_inverted_index":{"Summary":[0],"form":[1],"only":[2],"given.":[3],"Distributed":[4],"source":[5,29,56,68,93,119],"coding":[6,30,57,69,78,94,127],"(DSC)":[7],"considers":[8],"the":[9,26,34,44,59,86,129],"problem":[10,31],"of":[11,17,36,62,66,89],"separate":[12],"compression":[13],"and":[14,22,32,75,124],"joint":[15],"decompression":[16],"multiple":[18],"correlated":[19],"sources.":[20],"Berger":[21],"Tung":[23],"first":[24],"introduced":[25],"multiterminal":[27],"(MT)":[28],"studied":[33],"region":[35],"all":[37],"possible":[38],"encoder":[39],"rate":[40],"tuples":[41],"such":[42],"that":[43],"sources":[45],"are":[46],"reconstructed":[47],"under":[48],"distortion":[49],"constraints.":[50],"One":[51],"can":[52],"loosely":[53],"view":[54],"MT":[55,67,92,118,125],"as":[58],"lossy":[60],"version":[61],"Slepian-Wolf":[63],"coding.":[64],"Applications":[65],"include":[70],"distributed":[71],"video":[72,77,126],"sensor":[73],"networks":[74],"MT/multiview":[76],"for":[79],"camera":[80,133],"arrays.":[81],"Despite":[82],"recent":[83,112],"progresses,":[84],"finding":[85],"sum-rate":[87],"bound":[88],"quadratic":[90,116],"Gaussian":[91,117],"with":[95,131],"more":[96],"than":[97],"two":[98],"terminals":[99],"is":[100],"still":[101],"an":[102],"open":[103],"problem.":[104],"In":[105],"this":[106],"talk,":[107],"I":[108],"will":[109],"present":[110],"our":[111],"theoretical":[113],"results":[114],"on":[115],"coding,":[120],"limit-approaching":[121],"code":[122],"designs,":[123],"(including":[128],"case":[130],"depth":[132],"assistance).":[134]},"counts_by_year":[{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
