IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 114, Number 138

Information Theory

Workshop Date : 2014-07-17 - 2014-07-18 / Issue Date : 2014-07-10

[PREV] [NEXT]

[TOP] | [2011] | [2012] | [2013] | [2014] | [2015] | [2016] | [2017] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

IT2014-11
Construction of Almost Instantaneous FV codes based on Integer Programming
Masato Tsuchihasi, Hirosuke Yamamoto, Junya Honda (Univ. of Tokyo)
pp. 1 - 6

IT2014-12
Distance Metric Learning with Low Computational Complexity based on Ensemble of Low-dimensional Matrixes
Hiroshi Saito, Fumihiro Yamazaki, Kenta Mikawa, Masayuki Goto (Waseda Univ.)
pp. 7 - 12

IT2014-13
On state change of FTM gate by using the orthogonal states
Takaya Suzuki, Noboru Watanabe (TUS)
pp. 13 - 16

IT2014-14
Performance of bit/byte slice implementation of FEAL
Teppei Nakai, Toshinobu Kaneko (TUS)
pp. 17 - 19

IT2014-15
Secrecy Capacity of a Class of Wiretap Channels with Side Information at the Transmitter
Hachiro Fujita (Tokyo Metropolitan Univ.)
pp. 21 - 24

IT2014-16
$alpha$-divergence derived as the generalized rate function in Tsallis statistics
Hiroki Suyari (Chiba Univ.), Antonio Maria Scarfone (ISC-CNR)
pp. 25 - 30

IT2014-17
Coding Theoretic Construction of Quantum Ramp Secret Sharing
Ryutaroh Matsumoto (Tokyo Inst. of Tech.)
pp. 31 - 35

IT2014-18
Maximum Multicast Throughput by Network Coding on Undirected Hypernetworks
Hokuto Takahashi, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 37 - 42

IT2014-19
Extended LZW codes with Modified Reduplicative Parsing
Yuta Takabayashi, Hirosuke Yamamoto (Univ. of Tokyo)
pp. 43 - 48

IT2014-20
A study of a MDP-based recommender system when the class of user who is recommended items is unknown
Shusuke Iwai, Nozomi Miya (Waseda Univ.), Yasunari Maeda (Kitami Institute of Technology), Toshiyasu Matsushima (Waseda Univ.)
pp. 49 - 54

IT2014-21
A Note on Optimal Control System for Selective-Repeat Hybrid SR-ARQ with a Finite Length Buffer
Yuta Kageyama, Akira Kamatsuka (Waseda Univ.), Yasunari Maeda (Kitami Institute of Technology), Toshiyasu Matsushima (Waseda Univ.)
pp. 55 - 58

IT2014-22
A Flash Code Utilizing Dynamic Segment Allocation
Kazuki Kumagai, Yuichi Kaji (NAIST)
pp. 59 - 64

IT2014-23
Bounds on the Entropy of Multinomial Distribution
Yuichi Kaji (NAIST)
pp. 65 - 70

IT2014-24
Fixed-Length Lossy Source Coding Theorems with Small Excess Distortion Probability
Ryo Nomura (Senshu Univ.), Hideki Yagi (Univ. of Electro-Comm.)
pp. 71 - 76

IT2014-25
Coding with a Fidelity Criterion Allowing Some Overflow Probability
Hideki Yagi (Univ. of Electro-Comm.), Ryo Nomura (Senshu Univ.)
pp. 77 - 82

IT2014-26
[Invited Talk] How to Observe Probability Distribution of Self-Information -- as viewed under different resolutions of $n^{-1}$ and $n^{-1/2}$ --
Toshiyasu Matsushima (Waseda Univ.)
pp. 83 - 88

IT2014-27
Recognition Accuracy Improvement of QR Code by Using GMD Decoding
Keisuke Furumoto, Yoshihiro Kusanagi, Masakatu Morii (Kobe Univ)
pp. 89 - 94

IT2014-28
On Constructing Symbol-Pair Convolutional Codes and Computing the Free Pair Distance
Chikara Sasakura (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.)
pp. 95 - 100

IT2014-29
A Prediction Method based on Weighted Ensemble of Decision Tree on Alternating Decision Forests.
Shotaro Misawa, Naohiro Fujiwara, Kenta Mikawa, Masayuki Goto (Waseda Univ.)
pp. 101 - 106

IT2014-30
On construction of connected channel and its quantum capacity
Hiromi Ito, Noboru Watanabe (TUS)
pp. 107 - 110

IT2014-31
A broadcast retransmission scheme with index coding
Takahiro Oshima, Tadashi Wadayama (Nagoya Inst. of Tech.)
pp. 111 - 116

IT2014-32
Improving Performance of Spatially Coupled Code for Burst Erasure by Column Permutation of Parity Check Matrix
Hiroki Mori, Tadashi Wadayama (Nagoya Inst. of Tech.)
pp. 117 - 122

IT2014-33
Note on attack for a public key agreement based on non-commutative algebra
Takaaki Miyamoto, Satoshi Iriyama (TUS)
pp. 123 - 125

IT2014-34
On Quantization by Greedy Combining for Outputs of Discrete Memoryless Channels
Yuta Sakai, Ken-ichi Iwata (Univ. of Fukui)
pp. 127 - 132

IT2014-35
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes K(XVI)SE(1)PKC,K(XVII)SE(1)PKC and K(XVII)Ī£IIPKC
Masao Kasahara (Waseda Univ./Chuo Univ.)
pp. 133 - 138

IT2014-36
New Method for Factoring RSA Moduli with Implicit Hint
Ryuichi Sakai (OECU), Masao Kasahara (Chuo Univ.)
pp. 139 - 142

IT2014-37
A Method for Constructing High Rate Punctured Convolutional Codes by Using Dual Codes(II)
Kana Kikuchi, Sen Moriya, Hiroshi Sasano (Kinki Univ.)
pp. 143 - 148

IT2014-38
On Applications for Complex Modulation by Constant-Weight and Multi-Valued Codes
Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyusyhu Women's Univ.), Keiichi Takahashi (Kinki Univ.)
pp. 149 - 152

IT2014-39
Tail-Biting Code/Error-Trellis Construction for Linear Block Codes
Masato Tajima, Koji Okino, Tatsuto Murayama (Univ. of Toyama)
pp. 153 - 158

IT2014-40
Geometry of Markov Chains, Finite State Machines, and Tree Models
Jun'ichi Takeuchi (Kyushu Univ.)
pp. 159 - 164

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan