1: \begin{thebibliography}{10}
2: \providecommand{\url}[1]{#1}
3: \def\UrlFont{\rmfamily}
4: \providecommand{\newblock}{\relax}
5: \providecommand{\bibinfo}[2]{#2}
6: \providecommand\BIBentrySTDinterwordspacing{\spaceskip=0pt\relax}
7: \providecommand\BIBentryALTinterwordstretchfactor{4}
8: \providecommand\BIBentryALTinterwordspacing{\spaceskip=\fontdimen2\font plus
9: \BIBentryALTinterwordstretchfactor\fontdimen3\font minus
10: \fontdimen4\font\relax}
11: \providecommand\BIBforeignlanguage[2]{{%
12: \expandafter\ifx\csname l@#1\endcsname\relax
13: \typeout{** WARNING: IEEEtran.bst: No hyphenation pattern has been}%
14: \typeout{** loaded for the language `#1'. Using the pattern for}%
15: \typeout{** the default language instead.}%
16: \else
17: \language=\csname l@#1\endcsname
18: \fi
19: #2}}
20:
21: \bibitem{Boneh}
22: D.~Boneh and J.~Shaw, ``{Collusion-secure fingerprinting for digital data},''
23: \emph{{IEEE} Trans. Inform. Theory}, vol.~44, no.~5, pp. 1897--1905, Sep.
24: 1998.
25:
26: \bibitem{Liu}
27: W.~Trappe, M.~Wu, Z.~J. Wang, and K.~J.~R. Liu, ``{Anti-collusion
28: fingerprinting for multimedia},'' \emph{{IEEE} Trans. Signal. Proc.},
29: vol.~51, no.~4, pp. 1069--1087, Apr. 2003.
30:
31: \bibitem{Barg_code}
32: A.~Barg, G.~R. Blakley, and G.~Kabatiansky, ``{Digital fingerprinting codes:
33: Problem statements, constructions, identification of traitors},''
34: \emph{{IEEE} Trans. Inform. Theory}, vol.~49, no.~4, pp. 825--865, Apr. 2003.
35:
36: \bibitem{Spt}
37: A.~D. Friedman, R.~L. Graham, and J.~D. Ullman, ``{Universal single transition
38: time asynchronous state assignments},'' \emph{{IEEE} Trans. Comput.},
39: vol.~18, no.~6, pp. 541--547, Jun. 1969.
40:
41: \bibitem{Barg_cap}
42: \BIBentryALTinterwordspacing
43: N.~Anthapadmanabhan, A.~Barg, and I.~Dumer. (2007) {On the Fingerprinting
44: Capacity Under the Marking Assumption}. [Online]. Available:
45: \url{http://arxiv.org/pdf/cs.IT/0612073/}
46: \BIBentrySTDinterwordspacing
47:
48: \bibitem{richardson2001cld}
49: T.~J. Richardson and R.~L. Urbanke, ``The capacity of low-density parity-check
50: codes under message-passing decoding,'' \emph{{IEEE} Trans. Inform. Theory},
51: vol.~47, no.~2, pp. 599--618, 2001.
52:
53: \bibitem{pishronik2004dld}
54: H.~Pishro-Nik and F.~Fekri, ``On decoding of low-density parity-check codes
55: over the binary erasure channel,'' \emph{{IEEE} Trans. Inform. Theory},
56: vol.~50, no.~3, pp. 439--454, 2004.
57:
58: \bibitem{divsalar}
59: D.~Divsalar, S.~Dolinar, and C.~Jones, ``{Low-rate LDPC codes with simple
60: protograph structure},'' in \emph{Proceedings of International Symposium on
61: Information Theory, (ISIT)}, 2005, pp. 1622--1626.
62:
63: \bibitem{Book_Cover}
64: T.~Cover and J.~Thomas, \emph{Elements of Information Theory}.\hskip 1em plus
65: 0.5em minus 0.4em\relax New York: Wiley, 1991.
66:
67: \bibitem{di2002finite}
68: C.~Di, D.~Proietti, I.~Telatar, T.~J. Richardson, and R.~L. Urbanke,
69: ``Finite-length analysis of low-density parity-check codes on thebinary
70: erasure channel,'' \emph{{IEEE} Trans. Inform. Theory}, vol.~48, no.~6, pp.
71: 1570--1579, 2002.
72:
73: \bibitem{Gallager}
74: R.~G. Gallager, \emph{Information Theory and Reliable Communication}.\hskip 1em
75: plus 0.5em minus 0.4em\relax New York, NY, USA: John Wiley \& Sons, Inc.,
76: 1968.
77:
78: \bibitem{divsalar1998ctt}
79: D.~Divsalar, H.~Jin, and R.~McEliece, ``{Coding theorems for
80: ˇĄturbo-likeˇ¦codes},'' in \emph{Proc. 1998 Allerton Conf}, 1998, pp.
81: 201--210.
82:
83: \bibitem{pfister2005cae}
84: H.~D. Pfister, I.~Sason, and R.~Urbanke, ``Capacity-achieving ensembles for the
85: binary erasure channel with bounded complexity,'' \emph{{IEEE} Trans. Inform.
86: Theory}, vol.~51, no.~7, pp. 2352--2379, 2005.
87:
88: \bibitem{Pfister2007ARA}
89: H.~D. Pfister and I.~Sason, ``Accumulate-repeat-accumulate codes:
90: Capacity-achieving ensembles of systematic codes for the erasure channel with
91: bounded complexity,'' \emph{{IEEE} Trans. Inform. Theory}, vol.~53, no.~6,
92: pp. 2088--2115, 2007.
93:
94: \bibitem{luby2001eec}
95: M.~G. Luby, M.~Mitzenmacher, M.~A. Shokrollahi, and D.~A. Spielman, ``Efficient
96: erasure correcting codes,'' \emph{{IEEE} Trans. Inform. Theory}, vol.~47,
97: no.~2, pp. 569--584, 2001.
98:
99: \bibitem{Forney}
100: A.~Barg and G.~D. Forney, ``{Random codes: minimum distances and error
101: exponents},'' \emph{{IEEE} Trans. Inform. Theory}, vol.~48, no.~9, pp.
102: 2568--2573, Sep. 2003.
103:
104: \end{thebibliography}
105: