{"id":"https://openalex.org/W2074493852","doi":"https://doi.org/10.1109/tit.1985.1057118","title":"Two-way source coding with a fidelity criterion","display_name":"Two-way source coding with a fidelity criterion","publication_year":1985,"publication_date":"1985-11-01","ids":{"openalex":"https://openalex.org/W2074493852","doi":"https://doi.org/10.1109/tit.1985.1057118","mag":"2074493852"},"language":"en","primary_location":{"id":"doi:10.1109/tit.1985.1057118","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.1985.1057118","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059523100","display_name":"A. Kaspi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210161417","display_name":"Ministry of Defense","ror":"https://ror.org/04wxm6g36","country_code":"IL","type":"government","lineage":["https://openalex.org/I4210161417"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"A. Kaspi","raw_affiliation_strings":["Israel Ministry of Defence, Haifa, Israel","Israel Ministry of Defense, Haifa, Israel"],"affiliations":[{"raw_affiliation_string":"Israel Ministry of Defence, Haifa, Israel","institution_ids":["https://openalex.org/I4210161417"]},{"raw_affiliation_string":"Israel Ministry of Defense, Haifa, Israel","institution_ids":["https://openalex.org/I4210161417"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5059523100"],"corresponding_institution_ids":["https://openalex.org/I4210161417"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":115,"citation_normalized_percentile":{"value":0.18882903,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"31","issue":"6","first_page":"735","last_page":"740"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4887411594390869},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.344698041677475},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3416481614112854},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.32026174664497375}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4887411594390869},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.344698041677475},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3416481614112854},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.32026174664497375}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tit.1985.1057118","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.1985.1057118","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W607870208","https://openalex.org/W1990992471","https://openalex.org/W2002925467","https://openalex.org/W2017662155","https://openalex.org/W2150412388"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W4391913857"],"abstract_inverted_index":{"Let":[0],"<tex":[1,26,39,45,56,61,74,113,159],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[2,27,40,46,57,62,75,114,160],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">(X_{i},":[3],"Y_{i}),":[4],"i=":[5],"1,2":[6],"\\cdots</tex>":[7],",":[8,42],"be":[9,70,89],"a":[10,52,110,151],"sequence":[11],"of":[12,30,65,85,109,119],"independent,":[13],"identically":[14],"distributed":[15],"bivariate":[16],"random":[17],"variables":[18],"and":[19,121,129,134,145],"consider":[20],"the":[21,31,44,66,83,92,97,131,137,146],"following":[22],"communication":[23],"situation.":[24],"The":[25,60],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">X</tex>":[28],"component":[29,48,64],"process":[32,67],"is":[33,49,79,123,143,148],"observed":[34,50],"at":[35,51,72],"some":[36,103],"location,":[37,54],"say":[38,55],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">A</tex>":[41],"while":[43],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Y</tex>":[47],"different":[53],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">B</tex>":[58],".":[59,77],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">X(Y)</tex>":[63],"has":[68],"to":[69,81],"reproduced":[71],"location":[73],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">B(A)</tex>":[76],"It":[78],"desired":[80],"find":[82],"amount":[84],"information":[86,147],"that":[87,96,154],"should":[88],"exchanged":[90],"between":[91],"two":[93],"locations,":[94],"so":[95],"distortions":[98,122,135],"incurred":[99],"will":[100],"not":[101],"exceed":[102],"predetermined":[104],"tolerance.":[105],"A":[106],"\"single-letter":[107],"characterization\"":[108],"certain":[111],"region":[112,126],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">{\\cal****}^{K}":[115],"\\subset":[116],"{\\cal":[117],"R}^{4}</tex>":[118],"rates":[120,133],"given.":[124],"This":[125],"contains":[127],"(all,":[128],"only)":[130],"achievable":[132],"for":[136],"special":[138],"case":[139],"where":[140],"block":[141],"coding":[142],"used":[144],"conveyed":[149],"through":[150],"one-way":[152],"link":[153],"can":[155],"switch":[156],"direction":[157],"only":[158],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">K</tex>":[161],"times":[162],"per":[163],"block.":[164]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":9},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":11},{"year":2015,"cited_by_count":10},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":10},{"year":2012,"cited_by_count":5}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
