{"id":"https://openalex.org/W2156567124","doi":"https://doi.org/10.1109/tit.2011.2143990","title":"Slepian\u2013Wolf Coding Over Cooperative Relay Networks","display_name":"Slepian\u2013Wolf Coding Over Cooperative Relay Networks","publication_year":2011,"publication_date":"2011-05-25","ids":{"openalex":"https://openalex.org/W2156567124","doi":"https://doi.org/10.1109/tit.2011.2143990","mag":"2156567124"},"language":"en","primary_location":{"id":"doi:10.1109/tit.2011.2143990","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2011.2143990","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/0910.3509","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Mohammad Hossein Yassaee","orcid":null},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Mohammad Hossein Yassaee","raw_affiliation_strings":["Information Systems and Security Laboratory (ISSL), Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Information Systems and Security Laboratory (ISSL), Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]}]},{"author_position":"last","author":{"id":null,"display_name":"Mohammad Reza Aref","orcid":null},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mohammad Reza Aref","raw_affiliation_strings":["Information Systems and Security Laboratory (ISSL), Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Information Systems and Security Laboratory (ISSL), Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I133529467"],"apc_list":null,"apc_paid":null,"fwci":3.5092,"has_fulltext":false,"cited_by_count":42,"citation_normalized_percentile":{"value":0.93230048,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"57","issue":"6","first_page":"3462","last_page":"3482"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.5169000029563904,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.5169000029563904,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.44519999623298645,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12879","display_name":"Distributed Sensor Networks and Detection Algorithms","score":0.014000000432133675,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.7692000269889832},{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.7511000037193298},{"id":"https://openalex.org/keywords/linear-network-coding","display_name":"Linear network coding","score":0.6243000030517578},{"id":"https://openalex.org/keywords/relay-channel","display_name":"Relay channel","score":0.5619999766349792},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.550599992275238},{"id":"https://openalex.org/keywords/submodular-set-function","display_name":"Submodular set function","score":0.5388000011444092},{"id":"https://openalex.org/keywords/gaussian","display_name":"Gaussian","score":0.5051000118255615},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.4819999933242798},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.478300005197525},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.4140999913215637}],"concepts":[{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.7692000269889832},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.7511000037193298},{"id":"https://openalex.org/C138293262","wikidata":"https://www.wikidata.org/wiki/Q1089578","display_name":"Linear network coding","level":3,"score":0.6243000030517578},{"id":"https://openalex.org/C46257984","wikidata":"https://www.wikidata.org/wiki/Q7310895","display_name":"Relay channel","level":4,"score":0.5619999766349792},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.550599992275238},{"id":"https://openalex.org/C178621042","wikidata":"https://www.wikidata.org/wiki/Q7631710","display_name":"Submodular set function","level":2,"score":0.5388000011444092},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.5138999819755554},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.5051000118255615},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.4819999933242798},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.478300005197525},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4399000108242035},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.4140999913215637},{"id":"https://openalex.org/C44415725","wikidata":"https://www.wikidata.org/wiki/Q4913893","display_name":"Binary entropy function","level":3,"score":0.4043000042438507},{"id":"https://openalex.org/C166366890","wikidata":"https://www.wikidata.org/wiki/Q602136","display_name":"Channel code","level":3,"score":0.38530001044273376},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.37599998712539673},{"id":"https://openalex.org/C122123141","wikidata":"https://www.wikidata.org/wiki/Q176623","display_name":"Random variable","level":2,"score":0.36899998784065247},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.3625999987125397},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.35659998655319214},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3294999897480011},{"id":"https://openalex.org/C97744766","wikidata":"https://www.wikidata.org/wiki/Q870845","display_name":"Channel capacity","level":3,"score":0.3249000012874603},{"id":"https://openalex.org/C204397858","wikidata":"https://www.wikidata.org/wiki/Q4437907","display_name":"List decoding","level":5,"score":0.314300000667572},{"id":"https://openalex.org/C52622258","wikidata":"https://www.wikidata.org/wiki/Q131222","display_name":"Information theory","level":2,"score":0.31119999289512634},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.30649998784065247},{"id":"https://openalex.org/C8272713","wikidata":"https://www.wikidata.org/wiki/Q176737","display_name":"Stochastic process","level":2,"score":0.27950000762939453},{"id":"https://openalex.org/C81081738","wikidata":"https://www.wikidata.org/wiki/Q55542","display_name":"Lossless compression","level":3,"score":0.2793999910354614},{"id":"https://openalex.org/C42812","wikidata":"https://www.wikidata.org/wiki/Q1082910","display_name":"Partition (number theory)","level":2,"score":0.27300000190734863},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.27300000190734863},{"id":"https://openalex.org/C177067428","wikidata":"https://www.wikidata.org/wiki/Q17013331","display_name":"Feasible region","level":2,"score":0.2685999870300293},{"id":"https://openalex.org/C11704745","wikidata":"https://www.wikidata.org/wiki/Q918337","display_name":"Unicast","level":3,"score":0.2678000032901764},{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.26669999957084656},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.26330000162124634},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.2581000030040741},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.25619998574256897},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.25609999895095825},{"id":"https://openalex.org/C173988684","wikidata":"https://www.wikidata.org/wiki/Q863510","display_name":"Binary symmetric channel","level":4,"score":0.25200000405311584},{"id":"https://openalex.org/C153658351","wikidata":"https://www.wikidata.org/wiki/Q746264","display_name":"Constant function","level":3,"score":0.25040000677108765}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tit.2011.2143990","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2011.2143990","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:0910.3509","is_oa":true,"landing_page_url":"http://arxiv.org/abs/0910.3509","pdf_url":"https://arxiv.org/pdf/0910.3509","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:0910.3509","is_oa":true,"landing_page_url":"http://arxiv.org/abs/0910.3509","pdf_url":"https://arxiv.org/pdf/0910.3509","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W2048235391","https://openalex.org/W2051291905","https://openalex.org/W2051479030","https://openalex.org/W2098567664","https://openalex.org/W2105528015","https://openalex.org/W2105862302","https://openalex.org/W2107325229","https://openalex.org/W2109962983","https://openalex.org/W2110266514","https://openalex.org/W2113222961","https://openalex.org/W2129504043","https://openalex.org/W2135920312","https://openalex.org/W2136975020","https://openalex.org/W2138348807","https://openalex.org/W2140508399","https://openalex.org/W2141404390","https://openalex.org/W2143100312","https://openalex.org/W2144940531","https://openalex.org/W2145576049","https://openalex.org/W2153829573","https://openalex.org/W2164626211","https://openalex.org/W2167447263","https://openalex.org/W2168270815","https://openalex.org/W2168614646","https://openalex.org/W2170056754","https://openalex.org/W4206570602","https://openalex.org/W6684158937"],"related_works":[],"abstract_inverted_index":{"This":[0],"paper":[1,165],"deals":[2],"with":[3,23,45],"the":[4,67,71,79,147,164],"problem":[5],"of":[6,10,51,60,70,81,140,155,163],"multicasting":[7],"a":[8,17,58,75,152],"set":[9,59],"discrete":[11],"memoryless":[12],"correlated":[13],"sources":[14],"(DMCS)":[15],"over":[16],"cooperative":[18,120,132,175],"relay":[19,176,180,184],"network.":[20,128],"Necessary":[21],"conditions":[22,91,112,116],"cut-set":[24,148],"interpretation":[25],"are":[26,85,113,166],"presented.":[27],"A":[28],"Joint":[29],"source-Wyner\u2013Ziv":[30],"encoding/sliding":[31],"window":[32],"decoding":[33,39],"scheme":[34,97],"is":[35,43,63,108,135,157],"proposed,":[36],"in":[37,117,130],"which":[38,87,178],"at":[40],"each":[41,55],"receiver":[42],"done":[44],"respect":[46],"to":[47,89,168],"an":[48,170],"ordered":[49,56,83],"partition":[50,57],"other":[52],"nodes.":[53],"For":[54],"feasibility":[61],"constraints":[62],"derived.":[64],"Then,":[65],"utilizing":[66],"submodular":[68],"property":[69],"entropy":[72],"function":[73],"and":[74,104,125,182],"novel":[76],"geometrical":[77],"approach,":[78],"results":[80,162],"different":[82],"partitions":[84],"consolidated,":[86],"lead":[88],"sufficient":[90,111],"for":[92,174],"our":[93],"problem.":[94],"The":[95],"proposed":[96],"achieves":[98],"operational":[99],"separation":[100],"between":[101],"source":[102],"coding":[103],"channel":[105],"coding.":[106],"It":[107],"shown":[109,136],"that":[110,137],"indeed":[114],"necessary":[115],"two":[118],"special":[119],"networks,":[121,133],"namely,":[122],"Aref":[123],"network":[124],"finite-field":[126],"deterministic":[127],"Also,":[129],"Gaussian":[131],"it":[134],"reliable":[138],"transmission":[139],"all":[141,161],"DMCS":[142],"whose":[143],"Slepian\u2013Wolf":[144],"region":[145,150,173],"intersects":[146],"bound":[149],"within":[151],"constant":[153],"number":[154],"bits,":[156],"feasible.":[158],"In":[159],"particular,":[160],"specialized":[167],"obtain":[169],"achievable":[171],"rate":[172],"networks":[177,181],"includes":[179],"two-way":[183],"networks.":[185]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":9},{"year":2015,"cited_by_count":10},{"year":2014,"cited_by_count":8},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2016-06-24T00:00:00"}
