0710.2705/FPs.bbl
1: \begin{thebibliography}{10}
2: \providecommand{\url}[1]{#1}
3: \def\UrlFont{\rmfamily}
4: \providecommand{\newblock}{\relax}
5: \providecommand{\bibinfo}[2]{#2}
6: \providecommand\BIBentrySTDinterwordspacing{\spaceskip=0pt\relax}
7: \providecommand\BIBentryALTinterwordstretchfactor{4}
8: \providecommand\BIBentryALTinterwordspacing{\spaceskip=\fontdimen2\font plus
9: \BIBentryALTinterwordstretchfactor\fontdimen3\font minus
10:   \fontdimen4\font\relax}
11: \providecommand\BIBforeignlanguage[2]{{%
12: \expandafter\ifx\csname l@#1\endcsname\relax
13: \typeout{** WARNING: IEEEtran.bst: No hyphenation pattern has been}%
14: \typeout{** loaded for the language `#1'. Using the pattern for}%
15: \typeout{** the default language instead.}%
16: \else
17: \language=\csname l@#1\endcsname
18: \fi
19: #2}}
20: 
21: \bibitem{Boneh}
22: D.~Boneh and J.~Shaw, ``{Collusion-secure fingerprinting for digital data},''
23:   \emph{{IEEE} Trans. Inform. Theory}, vol.~44, no.~5, pp. 1897--1905, Sep.
24:   1998.
25: 
26: \bibitem{Liu}
27: W.~Trappe, M.~Wu, Z.~J. Wang, and K.~J.~R. Liu, ``{Anti-collusion
28:   fingerprinting for multimedia},'' \emph{{IEEE} Trans. Signal. Proc.},
29:   vol.~51, no.~4, pp. 1069--1087, Apr. 2003.
30: 
31: \bibitem{Barg_code}
32: A.~Barg, G.~R. Blakley, and G.~Kabatiansky, ``{Digital fingerprinting codes:
33:   Problem statements, constructions, identification of traitors},''
34:   \emph{{IEEE} Trans. Inform. Theory}, vol.~49, no.~4, pp. 825--865, Apr. 2003.
35: 
36: \bibitem{Spt}
37: A.~D. Friedman, R.~L. Graham, and J.~D. Ullman, ``{Universal single transition
38:   time asynchronous state assignments},'' \emph{{IEEE} Trans. Comput.},
39:   vol.~18, no.~6, pp. 541--547, Jun. 1969.
40: 
41: \bibitem{Barg_cap}
42: \BIBentryALTinterwordspacing
43: N.~Anthapadmanabhan, A.~Barg, and I.~Dumer. (2007) {On the Fingerprinting
44:   Capacity Under the Marking Assumption}. [Online]. Available:
45:   \url{http://arxiv.org/pdf/cs.IT/0612073/}
46: \BIBentrySTDinterwordspacing
47: 
48: \bibitem{richardson2001cld}
49: T.~J. Richardson and R.~L. Urbanke, ``The capacity of low-density parity-check
50:   codes under message-passing decoding,'' \emph{{IEEE} Trans. Inform. Theory},
51:   vol.~47, no.~2, pp. 599--618, 2001.
52: 
53: \bibitem{pishronik2004dld}
54: H.~Pishro-Nik and F.~Fekri, ``On decoding of low-density parity-check codes
55:   over the binary erasure channel,'' \emph{{IEEE} Trans. Inform. Theory},
56:   vol.~50, no.~3, pp. 439--454, 2004.
57: 
58: \bibitem{divsalar}
59: D.~Divsalar, S.~Dolinar, and C.~Jones, ``{Low-rate LDPC codes with simple
60:   protograph structure},'' in \emph{Proceedings of International Symposium on
61:   Information Theory, (ISIT)}, 2005, pp. 1622--1626.
62: 
63: \bibitem{Book_Cover}
64: T.~Cover and J.~Thomas, \emph{Elements of Information Theory}.\hskip 1em plus
65:   0.5em minus 0.4em\relax New York: Wiley, 1991.
66: 
67: \bibitem{di2002finite}
68: C.~Di, D.~Proietti, I.~Telatar, T.~J. Richardson, and R.~L. Urbanke,
69:   ``Finite-length analysis of low-density parity-check codes on thebinary
70:   erasure channel,'' \emph{{IEEE} Trans. Inform. Theory}, vol.~48, no.~6, pp.
71:   1570--1579, 2002.
72: 
73: \bibitem{Gallager}
74: R.~G. Gallager, \emph{Information Theory and Reliable Communication}.\hskip 1em
75:   plus 0.5em minus 0.4em\relax New York, NY, USA: John Wiley \& Sons, Inc.,
76:   1968.
77: 
78: \bibitem{divsalar1998ctt}
79: D.~Divsalar, H.~Jin, and R.~McEliece, ``{Coding theorems for
80:   ˇĄturbo-likeˇ¦codes},'' in \emph{Proc. 1998 Allerton Conf}, 1998, pp.
81:   201--210.
82: 
83: \bibitem{pfister2005cae}
84: H.~D. Pfister, I.~Sason, and R.~Urbanke, ``Capacity-achieving ensembles for the
85:   binary erasure channel with bounded complexity,'' \emph{{IEEE} Trans. Inform.
86:   Theory}, vol.~51, no.~7, pp. 2352--2379, 2005.
87: 
88: \bibitem{Pfister2007ARA}
89: H.~D. Pfister and I.~Sason, ``Accumulate-repeat-accumulate codes:
90:   Capacity-achieving ensembles of systematic codes for the erasure channel with
91:   bounded complexity,'' \emph{{IEEE} Trans. Inform. Theory}, vol.~53, no.~6,
92:   pp. 2088--2115, 2007.
93: 
94: \bibitem{luby2001eec}
95: M.~G. Luby, M.~Mitzenmacher, M.~A. Shokrollahi, and D.~A. Spielman, ``Efficient
96:   erasure correcting codes,'' \emph{{IEEE} Trans. Inform. Theory}, vol.~47,
97:   no.~2, pp. 569--584, 2001.
98: 
99: \bibitem{Forney}
100: A.~Barg and G.~D. Forney, ``{Random codes: minimum distances and error
101:   exponents},'' \emph{{IEEE} Trans. Inform. Theory}, vol.~48, no.~9, pp.
102:   2568--2573, Sep. 2003.
103: 
104: \end{thebibliography}
105: