Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2014] | [2015] | [2016] | [2017] | [2018] | [2019] | [2020] | [Japanese] / [English]
WBS2017-84
Evaluation of Bayes Predictive Distributions under Unknown Parametric Models on Misspecified Models
Hirokazu Kono, Shota Saito, Toshiyasu Matsushima (Waseda Univ.)
pp. 1 - 6
WBS2017-85
Information Geometrical Study of Cluster-Model Approximation for Boltzmann Machines
Kenta Toyoda, Tomohiro Ogawa (Univ. of Electro- Commu.)
pp. 7 - 12
WBS2017-86
Redundancy Analysis of Univarsal Lossless Source Coding via Estimation of Prior
-- Relaxing an Ergodicity Condition --
Ryosuke Ikarashi, Tsutomu Kawabata (UEC)
pp. 13 - 18
WBS2017-87
Evaluation of the Worst-Case Redundancy of Strongly Universal FV Source Codes Using the Source Approximation and the Asymptotically Sufficient Statistic
Mitsuharu Arimura (Shonan Inst. Tech.), Hiroshi Nagaoka (Univ. of Electro-Comm.)
pp. 19 - 24
WBS2017-88
The Access Structure of a Secret Sharing Scheme Using Locally Repairable Codes
Masanobu Nakata, Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech)
pp. 25 - 30
WBS2017-89
Construction of Secret Sharing Schemes with Small Thresholds for Countably Infinite Participants
Takashi Hisatome, Hiroki Koga (Univ. Tsukuba)
pp. 31 - 36
WBS2017-90
Constructions of the (3,n) and (4,n) Threshold Visual Cryptography Using Combinatorial Designs and Their Performance Evaluation
Kotaro Okada, Hiroki Koga (Univ. of Tsukuba)
pp. 37 - 42
WBS2017-91
Outage Capacity of a Two-User MIMO Interference Channel for Simultaneous Information and Energy Transfer
Kengo Ikebata, Tomohiko Uyematsu (Tokyo Tech), Ryutaroh Matsumoto (Nagoya Univ), Tetsunao Matsuta (Tokyo Tech)
pp. 43 - 48
WBS2017-92
Optimality for the Iterative Construction Scheme of AIFV-$m$ codes
Ryusei Fujita, Ken-ichi Iwata (Univ. of Fukui), Hirosuke Yamamoto (The Univ. of Tokyo)
pp. 49 - 54
WBS2017-93
Optimal Coded Caching using Linear Programming
Shota Kamiya, Hiroki Koga (Univ. Tsukuba)
pp. 55 - 60
WBS2017-94
Shifted Coded Slotted ALOHA
Tomokazu Emoto, Takayuki Nozaki (Yamaguchi Univ.)
pp. 61 - 66
WBS2017-95
[Invited Talk]
On Traitor Tracings and Related Topics
Shota Yamada (AIST)
p. 67
WBS2017-96
[Invited Talk]
Research and Development of Transmission Technologies for the Next Generation Terrestrial Broadcasting
Tomoaki Takeuchi (NHK)
p. 69
WBS2017-97
[Invited Talk]
On fast multiplications of multiple-valued logic polynomials by discrete Fourier transforms
Hajime Matsui (Toyota Technological Institute)
p. 71
WBS2017-98
Effect on randomizing components to the security of Minalpher
Yuki Kishi, Keita Osafune, Yuta Kuwano, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ)
pp. 73 - 79
WBS2017-99
A study on hierarchical secret sharing schemes applicable to any level based on XOR operations
Koji Shima, Hiroshi Doi (IISEC)
pp. 81 - 88
WBS2017-100
Succinct Oblivious RAM
Taku Onodera, Tetsuo Shibuya (IMSUT)
pp. 89 - 96
WBS2017-101
High Efficient Scalar Multiplication in Elliptic Curve Cryptography
Noboru Takeuchi, Toshiyuki Kinoshita (TUT)
pp. 97 - 101
WBS2017-102
Digital watermark using deep-learning classification
Mashu Sakai, Taiki Shigeta, Hikaru Morita (Kanagawa Univ.)
pp. 103 - 106
WBS2017-103
Evaluation of deep learning method for detection of intrusion packets
Tomoki Ueno, Mitiko Harayama (GIFU Univ)
pp. 107 - 113
WBS2017-104
Reply analysis between Twitter users using machine learning
-- Distinguish real-life/online friends --
Takakuwa Ranka, Sasaki Taroh, Fujioka Atsushi (KU)
pp. 115 - 119
WBS2017-105
On the Number of Rounds by Card-based Cryptographic Protocols Using Private Operations
Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.)
pp. 121 - 128
WBS2017-106
Card-Based Cryptographic Protocols with Private Operations which can Prevent Malicious Behaviors
Youhei Shimizu, Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ)
pp. 129 - 135
WBS2017-107
A study on segmented deletion error correction using polar code
Hikari Koremura, Haruhiko Kaneko (Tokyo Tech)
pp. 137 - 141
WBS2017-108
Bayes Optimal AMP Decoder for Sparse Superposition Codes
Yuwa Hatae (Kyushu Univ.), Kazushi Mimura (Hiroshima City Univ.), Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ.)
pp. 143 - 148
WBS2017-109
Ordered Shuffle-BP Decoding Based on the Loops of LDPC Code
Ryoma Sakai, Kazuhiko Yamaguchi (UEC)
pp. 149 - 154
WBS2017-110
Efficient Scheduling of Serial Iterative Decoding for Zigzag Decodable Fountain Codes
Yoshihiro Murayama, Takayuki Nozaki (Yamaguchi Univ.)
pp. 155 - 160
WBS2017-111
Non-binary codes correcting a burst of deletions or insertions
Toyohiko Saeki, Takayuki Nozaki (Yamaguchi Univ.)
pp. 161 - 166
WBS2017-112
Asymptotic Analysis of LDPC Codes for Two-Way Relay Channels
Yuta Ishimatsu, Satoshi Takabe, Tadashi Wadayama (NITech), Masahito Hayashi (Nagoya Univ.)
pp. 167 - 172
WBS2017-113
Consideration of error correction code suitable for WBAN
Akihiro Yamada, Hiroyoshi Morita, Akiko Manada (The Univ. of Electro-Communications)
pp. 173 - 177
WBS2017-114
On the Generalization of Fano's Inequality for Countably Infinite Alphabets, List-Decoding, and General Conditional Information Measures
Yuta Sakai (Univ. Fukui)
pp. 179 - 184
WBS2017-115
Parameter orthogonalization method in quantum parameter estimation problem
Jun Suzuki (UEC)
pp. 185 - 190
WBS2017-116
Improved Lossless Compression by Substring Enumeration Using Sorting
Takahiro Ota (NPIT), Akiko Manada (UEC)
pp. 191 - 196
WBS2017-117
The Error Performance Analysis of the K-best Viterbi Decoding Algorithm
Hideki Yoshikawa (Tohoku Gakuin Univ.)
pp. 197 - 200
WBS2017-118
Quantum &Classical Radar Camera for Automotive and Effect of Fog-2
-- Sparse Modeling --
Osamu Hirota (Tamagawa Univ.)
pp. 201 - 206
WBS2017-119
Attacks on several Multivariate PKCs
-- Attack on K(AVII)MVPKC --
Ryuichi Sakai (Osaka Electro-Communication Univ.), Masao Kasahara (Waseda Univ.)
pp. 207 - 212
WBS2017-120
A Note on Security Notions of Anonymity in Identity-Based Encryption
-- Case of ID-CCA2 Security --
Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.)
pp. 213 - 218
WBS2017-121
On Confirming Ciphertext Update in Key-Updatable Public-key Encryption with Keyword Search
Yuka Sakoda, Honomu Ohtomo, Naoki Matsunaga, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.)
pp. 219 - 223
WBS2017-122
On (Un)Deniability of Plausible Deniability
Atsushi Waseda, Ryo Nojima (NICT)
pp. 225 - 230
WBS2017-123
Information-Theoretically Secure Authentication Codes with Arbitration using Non-Uniformly Random Keys
Miho Ishikawa, Junji Shikata (Yokohama National Univ.)
pp. 231 - 236
WBS2017-124
On Security Evaluation for Coset Coding in Wiretap Channel Coding
Yuki Mori, Tomohiro Ogawa (UEC)
pp. 237 - 243
WBS2017-125
Secure Communications over the Two-Way Wiretap Channel II with Noisy Main Channel Using Cooperative Jamming
Hiroki Iizuka, Ryota Tanaka, Junji Shikata (Yokohama National Univ.)
pp. 245 - 251
WBS2017-126
Time-Space Jointly Path-Matched MC-CDM Wide Band Radio Modulation with TX and RX Array Antennas
-- for High Performance Error-Control Coding --
Kohji Itoh, Akira Nakamura, Makoto Itami (TUS)
pp. 253 - 258
WBS2017-127
Influence of Channel Estimation Error on Noise Enhancement Suppression by Using Novel Multilevel Spreading Codes
Tatsuya Motoki, Takehiko Kobayashi (Tokyo Denki Univ.)
pp. 259 - 264
WBS2017-128
Performance Comparison of User Position Detection Method using Multiple Unmanned Aerial Vehicles based Positioning Accuracy Index
Hiroyasu Ishikawa, Hiroki Onuki (Nihon Univ.)
pp. 265 - 270
WBS2017-129
Study on Aerial Cooperative Relaying for Coverage Extension of High-Altitude Unmanned Aircraft Systems
Fumie Ono (NICT), Hideki Ochiai (Yokohama National Univ.), Ryu Miura, Fumihide Kojima (NICT)
pp. 271 - 273
WBS2017-130
On Adaptive Self-Interference Suppression for Full Duplex Filter-and-Forward Relaying
Hayato Teshiromori, Teruyuki Miyajima, Yoshiki Sugitani (Ibaraki Univ.)
pp. 275 - 280
WBS2017-131
Evaluation of synchronization jitter caused by the distance from base-station on optical wireless RVC system using CSK-MPPM
Masayuki Ishikawa, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)
pp. 281 - 286
WBS2017-132
A study of Bit Error Rate Taking into Account Synchronization Performance on Optical Wireless Framed-DOOK System
Yuta Asano, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)
pp. 287 - 292
WBS2017-133
BER Performance Evaluation of ROD-WSN using Modified Pseudo Orthogonal M-sequences under Fading Channel
Tomohiro Okawa, Hiromasa Habuchi (Ibaraki Univ.), Koichiro Hashiura (Akita Prefectural Univ.)
pp. 293 - 297
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.