{"id":"https://openalex.org/W2071101972","doi":"https://doi.org/10.1109/tit.1969.1054363","title":"The computation and bounding of rate-distortion functions","display_name":"The computation and bounding of rate-distortion functions","publication_year":1969,"publication_date":"1969-09-01","ids":{"openalex":"https://openalex.org/W2071101972","doi":"https://doi.org/10.1109/tit.1969.1054363","mag":"2071101972"},"language":"en","primary_location":{"id":"doi:10.1109/tit.1969.1054363","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.1969.1054363","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067480002","display_name":"B. Haskell","orcid":"https://orcid.org/0009-0002-6620-2070"},"institutions":[{"id":"https://openalex.org/I72090969","display_name":"Nokia (United States)","ror":"https://ror.org/038km2573","country_code":"US","type":"company","lineage":["https://openalex.org/I2738502077","https://openalex.org/I72090969"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"B. Haskell","raw_affiliation_strings":["Bell Telephone Laboratories, Inc., Holmdel, NJ, USA","Bell Telephone Labs., Inc., Holmdel, NJ (USA)"],"affiliations":[{"raw_affiliation_string":"Bell Telephone Laboratories, Inc., Holmdel, NJ, USA","institution_ids":[]},{"raw_affiliation_string":"Bell Telephone Labs., Inc., Holmdel, NJ (USA)","institution_ids":["https://openalex.org/I72090969"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5067480002"],"corresponding_institution_ids":["https://openalex.org/I72090969"],"apc_list":null,"apc_paid":null,"fwci":2.7952,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.89653737,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"15","issue":"5","first_page":"525","last_page":"531"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10500","display_name":"Sparse and Compressive Sensing Techniques","score":0.9760000109672546,"subfield":{"id":"https://openalex.org/subfields/2206","display_name":"Computational Mechanics"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.9660000205039978,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4524083435535431},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4514738917350769},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.4342181086540222},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4229898750782013},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.412240594625473},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.3336486518383026},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.33163660764694214},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.3296780586242676},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2761095464229584},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.12888136506080627}],"concepts":[{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4524083435535431},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4514738917350769},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.4342181086540222},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4229898750782013},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.412240594625473},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.3336486518383026},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33163660764694214},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.3296780586242676},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2761095464229584},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.12888136506080627},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tit.1969.1054363","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.1969.1054363","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320310145","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W1989008275","https://openalex.org/W2142901448","https://openalex.org/W2222445509","https://openalex.org/W2797937785"],"related_works":["https://openalex.org/W2046435967","https://openalex.org/W4231775656","https://openalex.org/W2980963558","https://openalex.org/W2383646825","https://openalex.org/W2371018915","https://openalex.org/W1882246857","https://openalex.org/W3103304230","https://openalex.org/W2185360082","https://openalex.org/W1992365905","https://openalex.org/W4287664878"],"abstract_inverted_index":{"Methods":[0],"are":[1,45,66,88,127,158],"given":[2],"for":[3,14,53,113],"the":[4,28,39,64,67,109,114,162],"numerical":[5],"computation":[6,48],"of":[7,30,41,49,104,116,147],"Shannon's":[8],"rate-distortion":[9],"function":[10],"<tex":[11,24,35,50,72,76,85,92,96,118,122,148,152],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[12,25,36,51,73,77,86,93,97,119,123,149,153],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">R(D)</tex>":[13,52,87],"certain":[15],"memoryless":[16],"message":[17],"sources.":[18],"It":[19],"is":[20,56],"first":[21],"assumed":[22],"that":[23],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">U</tex>":[26,74,94,120,150],",":[27,38,79],"set":[29,40],"possible":[31,42],"message-source":[32],"outputs,":[33],"and":[34,75,81,95,107,121,151],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">V</tex>":[37,78,98,124,154],"destination":[43],"symbols,":[44],"countable.":[46],"The":[47],"this":[54],"case":[55,115],"reduced":[57],"to":[58,139,160],"a":[59,101],"minimization":[60],"problem":[61],"in":[62,164],"which":[63,131],"variables":[65],"destination-symbol":[68],"probabilities.":[69],"For":[70],"arbitrary":[71],"upper":[80],"lower":[82],"bounds":[83,133],"on":[84],"derived":[89,111],"by":[90,142],"partitioning":[91],"each":[99,140],"into":[100],"countable":[102,117],"collection":[103],"disjoint":[105],"subsets":[106],"employing":[108],"results":[110,163],"previously":[112],".":[125,155],"Conditions":[126],"then":[128],"discussed":[129],"under":[130],"these":[132],"can":[134],"be":[135],"made":[136],"arbitrarily":[137],"close":[138],"other":[141],"choosing":[143],"sufficiently":[144],"fine":[145],"partitions":[146],"Two":[156],"examples":[157],"included":[159],"illustrate":[161],"detail.":[165]},"counts_by_year":[{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
