Mon, Mar 10 AM IT 10:10 - 11:50 |
(1) |
10:10-10:35 |
Decoding error of Sudoku for erasure channel |
Ryo Hidai, Mikihiko Nishiara (Shinshu Univ.) |
(2) |
10:35-11:00 |
Maximum Redundancy of Lossless Data Compression via Substring Enumeration with a Finite Alphabet |
Ken-ichi Iwata (Univ. of Fukui), Mitsuharu Arimura (Shonan Inst. of Tech.) |
(3) |
11:00-11:25 |
Classification of Partitions of Permutations by Dominant Sets for Rank Modulation |
Yusuke Takahashi, Hiroshi Kamabe (Gifu Univ.) |
(4) |
11:25-11:50 |
Single-Letter Characterization of Epsilon-Capacity for Mixed Memoryless Channels |
Hideki Yagi (Univ. of Electro-Comm.), Ryo Nomura (Senshu Univ.) |
Mon, Mar 10 AM ISEC 10:35 - 11:50 |
(5) |
10:35-11:00 |
An XML Based Document Management Framework to Prevent Data Leakage |
Kamran Morovati (Univ. of pune), Sanjay Kadam (C-DAC) |
(6) |
11:00-11:25 |
A Study on Correlation ElectroMagnetic Analysis against KCipher-2 implemented on a Microcontroller for ZigBee Devices |
Hajime Uno, Sho Endo, Naofumi Homma, Takafumi Aoki (Tohoku Univ.), Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake (KDDI Lab.) |
(7) |
11:25-11:50 |
On the Diffusion Property of Type 1 Generalized Feistel Cipher with Multi-input Multi-output Non-linear Functions |
Keisuke Ito, Shingo Yanagihara, Tetsu Iwata (Nagoya Univ.) |
Mon, Mar 10 AM WBS/IT 10:10 - 11:50 |
(8) |
10:10-10:35 |
Effect of IQ Imbalance on Channel Shortening in OFDM System |
Xi Zhang, Teruyuki Miyajima (Ibaraki Univ) |
(9) |
10:35-11:00 |
Spectrum Sensing of OFDM Pilot Signal with Carrier-frequency-offset Correction and Symbol Synchronization by Maximal Ratio Combining |
Toshihiro Yoshitake, Yohtaro Umeda, Yusuke Kozawa (Tokyo Univ. of Science) |
(10) |
11:00-11:25 |
Peak Power Reduction of OFDM Signals based on Trellis Shaping using Clipping and Filtering Combined with Selected Mapping |
Masaki Matsuoka, Ryota Yoshizawa, Hideki Ochiai (Yokohama National Univ.) |
(11) |
11:25-11:50 |
An Optimization of Interleaver for Convolutionally coded BICM-OFDM over Frequency-Selective Block Fading Channels |
Yuta Hori, Hideki Ochiai (Yokohama National Univ.) |
|
11:50-13:20 |
Lunch ( 90 min. ) |
Mon, Mar 10 PM IT 13:20 - 14:35 |
(12) |
13:20-13:45 |
Study on a High Precision Simultation Method for LDPC Codes |
Akiyoshi Hashimoto, Atsushi Ishikawa (Hitachi) |
(13) |
13:45-14:10 |
A Max-Log-MAP Decoding Using a Recursive Vector Generator for Binary Linear Codes |
Takuya Kusaka (Okayama Univ.) |
(14) |
14:10-14:35 |
Syndrome Decoding of Symbol-Pair Codes |
Makoto Takita (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) |
Mon, Mar 10 PM ISEC 13:20 - 14:10 |
(15) |
13:20-13:45 |
A new class of system oriented PKC, K(I)SOPKC.
-- appending a general scheme, K(X)Scheme, for constructing system-oriented PKC'S -- |
Masao Kasahara (Waseda Univ./Chuo Univ.) |
(16) |
13:45-14:10 |
Computer Simulation of Leakage Resilient IBE and IPE |
Kazuki Suzurimi (Ibaraki Univ.), Le Trieu Phong (NICT), Kaoru Kurosawa (Ibaraki Univ.) |
Mon, Mar 10 PM WBS 13:20 - 14:35 |
(17) |
13:20-13:45 |
Study on Visible Light CDMA Systems Using MUI Cancellers with Inverted MPSCs |
Tomoko K. Matsushima, Shiho Sasaki, Masaki Kakuyama, Shoichiro Yamasaki (Polytechnic Univ.), Yuya Murata (Tokyo Inst. of Tech.), Yasuaki Teramachi (Brain Functions Lab.) |
(18) |
13:45-14:10 |
Complex Amplitude Estimation Accuracy Evaluation of APES Method Using Near-Field Source Localization with Emitted Signal of Authenticated Transceiver |
Yoshiaki Kudo, Yohtaro Umeda, Yusuke Kozawa (Tokyo Univ. of Science) |
(19) |
14:10-14:35 |
Modeling and error rate performance evaluation of a virtual MIMO relay system with small UA and multiple ground stations |
Kensuke Ikeda (Yokohama National Univ.), Fumie Ono (NICT), Hideki Ochiai (Yokohama National Univ.), Ryu Miura (NICT) |
|
14:35-14:50 |
Break ( 15 min. ) |
Mon, Mar 10 PM IT/ISEC/WBS Invited Talks 14:50 - 17:30 |
(20) |
14:50-15:40 |
[Invited Talk]
Four Limits in Probability and Their Operational Meanings in Information Theory |
Hiroki Koga (Univ. of Tsukuba) |
|
15:40-15:45 |
Break ( 5 min. ) |
(21) |
15:45-16:35 |
[Invited Talk]
Information-Theoretic Cryptography
-- Survey and Challenge -- |
Junji Shikata (Yokohama National Univ.) |
|
16:35-16:40 |
Break ( 5 min. ) |
(22) |
16:40-17:30 |
[Invited Talk]
Approaches from Queueing Theory for Wireless Mesh Networks |
Hiraku Okada (Nagoya Univ.) |
Tue, Mar 11 AM IT 10:35 - 11:50 |
(23) |
10:35-11:00 |
Numerical analysis of optimal quantum cloning machines for trine states |
Akira Koyama, Jun Suzuki (Univ. of Electro-Comm.) |
(24) |
11:00-11:25 |
Information Geometry for Markov Chains |
Masahito Hayashi (Nagoya Univ.), Shun Watanabe (Tokushima Univ.) |
(25) |
11:25-11:50 |
Conditional additive channel with Markovian memory |
Masahito Hayashi (Nagoya Univ.), Shun Watanabe (Tokushima Univ.) |
Tue, Mar 11 AM 09:55 - 10:45 |
(26) |
09:55-10:20 |
Study of Data Communication using Spread Spectrum Modulation in Magnetic Field Resonance Wireless Power Transfer |
Shouhei Ueno, Kazuki Sugeno, Motoki Iida, Yukitoshi Sanada (Keio Univ.) |
(27) |
10:20-10:45 |
Data Transmission using Transmitter Side Channel Estimation in Wireless Power Transfer System |
Kazuki Sugeno, Yukitoshi Sanada (Keio Univ.), Mamiko Inamori (Tokai Univ.) |
|
10:45-11:00 |
Break ( 15 min. ) |
Tue, Mar 11 AM ISEC 11:00 - 11:50 |
(28) |
11:00-11:25 |
A Note on Indistinguishability of Fail-Stop Signature Schemes |
Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) |
(29) |
11:25-11:50 |
A Distribution Related to The Exponentiation Inversion Problem Reduced from Fixed Argument Pairing Inversion 2 Problem over Barreto-Naehrig Curve |
Shoichi Akagi, Yasuyuki Nogami (Okayama Univ.) |
|
11:50-13:20 |
Lunch ( 90 min. ) |
Tue, Mar 11 PM IT 13:20 - 15:00 |
(30) |
13:20-13:45 |
On the Outage Energy Efficiency of Wireless Duocast Relay Multiple Access Channels in the Low Power Regime |
Bai Ro, Tomohiko Uyematsu, Ryutaroh Matsumoto, Tetsunao Matsuta (Tokyo Inst. of Tech.) |
(31) |
13:45-14:10 |
Performance Analysis of Amplify-and-Forward Cooperative Diversity with RF Energy Harvesting |
Hiroki Kawabata, Koji Ishibashi (The Univ. of Electro-Comm.) |
(32) |
14:10-14:35 |
On Dynamic Cooperative Diversity Based on Dual-Spinal Codes |
Shun Ogata, Koji Ishibashi (The Univ. of Electro-Comm.) |
(33) |
14:35-15:00 |
A QAM Classification based on Two Amplitude Moments in the Presence of Symbol Timing Error |
Yasuhiro Matsumura, Ikuo Oka, Shingo Ata (Osaka City Univ.) |
Tue, Mar 11 PM 13:20 - 15:00 |
(34) |
13:20-13:45 |
A Construction of an Efficient Linear Ramp Threshold Secret Sharing Scheme Using an LT code |
Mitsuteru Sakashita, Hiroki Koga, Shuntaro Honjo (Univ.of Tsukuba) |
(35) |
13:45-14:10 |
Construction of a Strongly Secure Ramp Secret Sharing Scheme Using the MRD Code and Analysis of its Security |
Shuntaro Honjo, Hiroki Koga, Mitsuteru Sakashita (Univ. of Tsukuba) |
(36) |
14:10-14:35 |
Secret Sharing Schemes Secure against Rushing Adversaries |
Satoshi Obana (Hosei Univ.) |
(37) |
14:35-15:00 |
On a secret sharing scheme with systematic Reed-Solomon codes and its applications |
Shoichiro Yamasaki, Tomoko K. Matsushima, Shigeyoshi Ohno (Polytechnic Univ.) |
|
15:00-15:15 |
Break ( 15 min. ) |
Tue, Mar 11 PM IT 15:15 - 16:55 |
(38) |
15:15-15:40 |
A Note on the Complex Modulation with Zero Point from Constant-Weight and Multi-Valued Sequences |
Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyuhsu Women's Univ.), Keiichi Takahashi (Kinki Univ.) |
(39) |
15:40-16:05 |
Performance Evaluation of Single Carrier Transmission Using Frequency Domain Equalization |
Shinichiro Miyazaki, Shoichiro Yamasaki (Polytechnic Univ.), Ryuji Kohno (Yokohama National Univ.) |
(40) |
16:05-16:30 |
Constructions of Time-Space Constrained Codes by Flipping 1 Bit |
Shohei Takeyama, Hiroshi Kamabe (Gifu Univ.) |
(41) |
16:30-16:55 |
Reduction of Error-Trellises for Tail-Biting Convolutional Codes Using Shifted Error-Subsequences |
Masato Tajima, Koji Okino, Tatsuto Murayama (Univ. of Toyama) |
Tue, Mar 11 PM IT 15:15 - 16:30 |
(42) |
15:15-15:40 |
Identification Capacity of a Biometrical Identification System Using List Decording |
Marika Mori, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) |
(43) |
15:40-16:05 |
On the Performance of Probabilistic Digital Fingerprinting Codes Generated from Nonstationary Distribution |
Kouhei Kanai, Hiroki Koga (Univ. of Tsukuba) |
(44) |
16:05-16:30 |
Coding Theorems for Shannon's Cipher System under Two New Secrecy Criteria |
Shun Kikuchi, Hiroki Koga (Univ. of Tsukuba) |