Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2010] | [2011] | [2012] | [2013] | [2014] | [2015] | [2016] | [Japanese] / [English]
WBS2013-43
Decoding error of Sudoku for erasure channel
Ryo Hidai, Mikihiko Nishiara (Shinshu Univ.)
pp. 1 - 6
WBS2013-44
Maximum Redundancy of Lossless Data Compression via Substring Enumeration with a Finite Alphabet
Ken-ichi Iwata (Univ. of Fukui), Mitsuharu Arimura (Shonan Inst. of Tech.)
pp. 7 - 12
WBS2013-45
Classification of Partitions of Permutations by Dominant Sets for Rank Modulation
Yusuke Takahashi, Hiroshi Kamabe (Gifu Univ.)
pp. 13 - 18
WBS2013-46
Single-Letter Characterization of Epsilon-Capacity for Mixed Memoryless Channels
Hideki Yagi (Univ. of Electro-Comm.), Ryo Nomura (Senshu Univ.)
pp. 19 - 26
WBS2013-47
An XML Based Document Management Framework to Prevent Data Leakage
Kamran Morovati (Univ. of pune), Sanjay Kadam (C-DAC)
pp. 27 - 34
WBS2013-48
A Study on Correlation ElectroMagnetic Analysis against KCipher-2 implemented on a Microcontroller for ZigBee Devices
Hajime Uno, Sho Endo, Naofumi Homma, Takafumi Aoki (Tohoku Univ.), Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake (KDDI Lab.)
pp. 35 - 40
WBS2013-49
On the Diffusion Property of Type 1 Generalized Feistel Cipher with Multi-input Multi-output Non-linear Functions
Keisuke Ito, Shingo Yanagihara, Tetsu Iwata (Nagoya Univ.)
pp. 41 - 48
WBS2013-50
Effect of IQ Imbalance on Channel Shortening in OFDM System
Xi Zhang, Teruyuki Miyajima (Ibaraki Univ)
pp. 49 - 54
WBS2013-51
Spectrum Sensing of OFDM Pilot Signal with Carrier-frequency-offset Correction and Symbol Synchronization by Maximal Ratio Combining
Toshihiro Yoshitake, Yohtaro Umeda, Yusuke Kozawa (Tokyo Univ. of Science)
pp. 55 - 60
WBS2013-52
Peak Power Reduction of OFDM Signals based on Trellis Shaping using Clipping and Filtering Combined with Selected Mapping
Masaki Matsuoka, Ryota Yoshizawa, Hideki Ochiai (Yokohama National Univ.)
pp. 61 - 66
WBS2013-53
An Optimization of Interleaver for Convolutionally coded BICM-OFDM over Frequency-Selective Block Fading Channels
Yuta Hori, Hideki Ochiai (Yokohama National Univ.)
pp. 67 - 72
WBS2013-54
Study on a High Precision Simultation Method for LDPC Codes
Akiyoshi Hashimoto, Atsushi Ishikawa (Hitachi)
pp. 73 - 76
WBS2013-55
A Max-Log-MAP Decoding Using a Recursive Vector Generator for Binary Linear Codes
Takuya Kusaka (Okayama Univ.)
pp. 77 - 80
WBS2013-56
Syndrome Decoding of Symbol-Pair Codes
Makoto Takita (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.)
pp. 81 - 86
WBS2013-57
A new class of system oriented PKC, K(I)SOPKC.
-- appending a general scheme, K(X)Scheme, for constructing system-oriented PKC'S --
Masao Kasahara (Waseda Univ./Chuo Univ.)
pp. 87 - 94
WBS2013-58
Computer Simulation of Leakage Resilient IBE and IPE
Kazuki Suzurimi (Ibaraki Univ.), Le Trieu Phong (NICT), Kaoru Kurosawa (Ibaraki Univ.)
pp. 95 - 100
WBS2013-59
Study on Visible Light CDMA Systems Using MUI Cancellers with Inverted MPSCs
Tomoko K. Matsushima, Shiho Sasaki, Masaki Kakuyama, Shoichiro Yamasaki (Polytechnic Univ.), Yuya Murata (Tokyo Inst. of Tech.), Yasuaki Teramachi (Brain Functions Lab.)
pp. 101 - 106
WBS2013-60
Complex Amplitude Estimation Accuracy Evaluation of APES Method Using Near-Field Source Localization with Emitted Signal of Authenticated Transceiver
Yoshiaki Kudo, Yohtaro Umeda, Yusuke Kozawa (Tokyo Univ. of Science)
pp. 107 - 112
WBS2013-61
Modeling and error rate performance evaluation of a virtual MIMO relay system with small UA and multiple ground stations
Kensuke Ikeda (Yokohama National Univ.), Fumie Ono (NICT), Hideki Ochiai (Yokohama National Univ.), Ryu Miura (NICT)
pp. 113 - 118
WBS2013-62
[Invited Talk]
Four Limits in Probability and Their Operational Meanings in Information Theory
Hiroki Koga (Univ. of Tsukuba)
pp. 119 - 126
WBS2013-63
[Invited Talk]
Information-Theoretic Cryptography
-- Survey and Challenge --
Junji Shikata (Yokohama National Univ.)
p. 127
WBS2013-64
[Invited Talk]
Approaches from Queueing Theory for Wireless Mesh Networks
Hiraku Okada (Nagoya Univ.)
pp. 129 - 134
WBS2013-65
Numerical analysis of optimal quantum cloning machines for trine states
Akira Koyama, Jun Suzuki (Univ. of Electro-Comm.)
pp. 135 - 140
WBS2013-66
Study of Data Communication using Spread Spectrum Modulation in Magnetic Field Resonance Wireless Power Transfer
Shouhei Ueno, Kazuki Sugeno, Motoki Iida, Yukitoshi Sanada (Keio Univ.)
pp. 141 - 146
WBS2013-67
Data Transmission using Transmitter Side Channel Estimation in Wireless Power Transfer System
Kazuki Sugeno, Yukitoshi Sanada (Keio Univ.), Mamiko Inamori (Tokai Univ.)
pp. 147 - 153
WBS2013-68
A Note on Indistinguishability of Fail-Stop Signature Schemes
Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.)
pp. 155 - 161
WBS2013-69
A Distribution Related to The Exponentiation Inversion Problem Reduced from Fixed Argument Pairing Inversion 2 Problem over Barreto-Naehrig Curve
Shoichi Akagi, Yasuyuki Nogami (Okayama Univ.)
pp. 163 - 168
WBS2013-70
On the Outage Energy Efficiency of Wireless Duocast Relay Multiple Access Channels in the Low Power Regime
Bai Ro, Tomohiko Uyematsu, Ryutaroh Matsumoto, Tetsunao Matsuta (Tokyo Inst. of Tech.)
pp. 169 - 174
WBS2013-71
Performance Analysis of Amplify-and-Forward Cooperative Diversity with RF Energy Harvesting
Hiroki Kawabata, Koji Ishibashi (The Univ. of Electro-Comm.)
pp. 175 - 180
WBS2013-72
On Dynamic Cooperative Diversity Based on Dual-Spinal Codes
Shun Ogata, Koji Ishibashi (The Univ. of Electro-Comm.)
pp. 181 - 186
WBS2013-73
A QAM Classification based on Two Amplitude Moments in the Presence of Symbol Timing Error
Yasuhiro Matsumura, Ikuo Oka, Shingo Ata (Osaka City Univ.)
pp. 187 - 192
WBS2013-74
A Construction of an Efficient Linear Ramp Threshold Secret Sharing Scheme Using an LT code
Mitsuteru Sakashita, Hiroki Koga, Shuntaro Honjo (Univ.of Tsukuba)
pp. 193 - 200
WBS2013-75
Construction of a Strongly Secure Ramp Secret Sharing Scheme Using the MRD Code and Analysis of its Security
Shuntaro Honjo, Hiroki Koga, Mitsuteru Sakashita (Univ. of Tsukuba)
pp. 201 - 207
WBS2013-76
Secret Sharing Schemes Secure against Rushing Adversaries
Satoshi Obana (Hosei Univ.)
pp. 209 - 214
WBS2013-77
On a secret sharing scheme with systematic Reed-Solomon codes and its applications
Shoichiro Yamasaki, Tomoko K. Matsushima, Shigeyoshi Ohno (Polytechnic Univ.)
pp. 215 - 220
WBS2013-78
A Note on the Complex Modulation with Zero Point from Constant-Weight and Multi-Valued Sequences
Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyuhsu Women's Univ.), Keiichi Takahashi (Kinki Univ.)
pp. 221 - 226
WBS2013-79
Performance Evaluation of Single Carrier Transmission Using Frequency Domain Equalization
Shinichiro Miyazaki, Shoichiro Yamasaki (Polytechnic Univ.), Ryuji Kohno (Yokohama National Univ.)
pp. 227 - 232
WBS2013-80
Constructions of Time-Space Constrained Codes by Flipping 1 Bit
Shohei Takeyama, Hiroshi Kamabe (Gifu Univ.)
pp. 233 - 240
WBS2013-81
Reduction of Error-Trellises for Tail-Biting Convolutional Codes Using Shifted Error-Subsequences
Masato Tajima, Koji Okino, Tatsuto Murayama (Univ. of Toyama)
pp. 241 - 248
WBS2013-82
Identification Capacity of a Biometrical Identification System Using List Decording
Marika Mori, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 249 - 254
WBS2013-83
On the Performance of Probabilistic Digital Fingerprinting Codes Generated from Nonstationary Distribution
Kouhei Kanai, Hiroki Koga (Univ. of Tsukuba)
pp. 255 - 260
WBS2013-84
Coding Theorems for Shannon's Cipher System under Two New Secrecy Criteria
Shun Kikuchi, Hiroki Koga (Univ. of Tsukuba)
pp. 261 - 268
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.