Thu, Jul 23 AM Freshman Session 10:30 - 12:10 |
(1) |
10:30-10:55 |
Note on Formulation of QDFT Based on FTM Gate |
Hiroki Sato, Noboru Watanabe (TUS) |
(2) |
10:55-11:20 |
On Efficiency of Information Transmission for Quantum Controlled Communication Process including Optical Noisy Channel |
Kazuaki Yoneda, Noboru Watanabe (TUS) |
(3) |
11:20-11:45 |
Error correcting for 2 entangled qubit system |
Shigeaki Yoshizumi, Masanari Asano, Satoshi Iriyama, Masanori Ohya (Tokyo Univ. of Science) |
(4) |
11:45-12:10 |
Entanglement in Generalized 4-body Cluster State |
Shinya Akiyama, Yoshiharu Tanaka, Masanari Asano, Masanori Ohya (Tokyo Univ. of Science) |
|
12:10-13:30 |
Lunch Break ( 80 min. ) |
Thu, Jul 23 PM Freshman Session 13:30 - 15:35 |
(5) |
13:30-13:55 |
Efficiently Encodable Generalized LDPC Codes using a Structure of its Subcodes |
Kenichi Teramoto, Gou Hosoya, Masayuki Goto, Shigeichi Hirasawa (Waseda Univ.) |
(6) |
13:55-14:20 |
Effective Methods of Constructing Irregular LDPC Codes under Message-Passing Decoding and Updating Order for Sequential Decoding |
Yuki Taniguchi, Gou Hosoya, Masayuki Goto, Shigeichi Hirasawa (Waseda Univ.) |
(7) |
14:20-14:45 |
Hardware implementation of a soft decision iterative decoder with a concatenated code |
Ryohei Abe, Kazuhiko Yamaguchi (UEC), Katsuhiro Azu, Kiyoyuki Koike (Tokyo National Coll. of Tech.) |
(8) |
14:45-15:10 |
Robust Audio Data Hiding Based on Information Dispersal in Wavelet Domain |
Sandra Hernandez-Garay (National Polytechnic Inst.), Raul Martinez-Noriega (Univ. of Electro-Comm.), Ruben Vazquez-Medina (National Polytechnic Inst.), Kazuhiko Yamaguchi (Univ. of Electro-Comm.) |
(9) |
15:10-15:35 |
Performance Evaluation and Analysis on Digital Watermark for Still Images with JPEG Compression Attack |
Tetsushi Masuno, Takuya Kusaka (Okayama Univ.), Toru Fujiwara (Osaka Univ.) |
|
15:35-15:45 |
Break ( 10 min. ) |
Thu, Jul 23 PM General Session 15:45 - 16:35 |
(10) |
15:45-16:10 |
On Random Construction of Bipolar Sensing Matrix with Compact Representation |
Tadashi Wadayama (Nagoya Inst. of Tech.) |
(11) |
16:10-16:35 |
Joint Design of Network and Channel Coding for Multiple-Access Relay Channel |
Guanghui Song (Doshisha Univ.), Ying Li (Xidian Univ.), Jun Cheng, Yoichiro Watanabe (Doshisha Univ.) |
|
16:35-16:45 |
Break ( 10 min. ) |
Thu, Jul 23 PM Invited Talk 16:45 - 17:35 |
(12) |
16:45-17:35 |
[Invited Talk]
Golay Complementary Sets, Complete Complementary Codes, Reed-Muller Codes, and Applications |
Chi-chao Chao, Chao-Yu Chen (National Tsing Hua Univ.), Chung-Hsuan Wang (National Chiao Tung Univ.) |
Fri, Jul 24 AM Freshman Session 10:30 - 12:10 |
(13) |
10:30-10:55 |
On a Demodulation Procedure for CDMA Systems Based on Complete Complementary Codes |
Ryusuke Mayuzumi, Tetsuya Kojima (Tokyo Natl. Call. Tech.) |
(14) |
10:55-11:20 |
A Convex Optimization based Multiuser Detection Algorithm for Synchronous CDMA systems |
Shingo Ito, Tadashi Wadayama, Ichi Takumi (Nagoya Inst. of Tech.) |
(15) |
11:20-11:45 |
A New Data Compression Algorithm Based on a Dictionary Method Using Recursive Construction of T-codes |
Kenji Hamano, Hirosuke Yamamoto (Tokyo Univ.) |
(16) |
11:45-12:10 |
A Study on the Majority Decision of 2-dimensional Random Sensor Networks |
Kazutaka Nishino, Shinji Tani, Ikuo Oka, Shingo Ata (Osaka City Univ.) |
|
12:10-13:00 |
Lunch Break ( 50 min. ) |
Fri, Jul 24 PM General Session 13:00 - 17:30 |
(17) |
13:00-13:25 |
A Note on Constellation Shaping for the Additive White Gaussian Noise Channel |
Youhei Ogawa, Katsuaki Honma, Motohiko Isaka (Kwansei Gakuin University) |
(18) |
13:25-13:50 |
A Two Party Protocol Based on Additive Continuous Noisy Chanenls |
Kazuaki Hattori, Seiya Kawata, Motohiko Isaka (Kwansei Gakuin Univ.) |
(19) |
13:50-14:15 |
On Unconditional Security from the Gaussian Channel |
Seiya Kawata, Kazuaki Hattori, Motohiko Isaka (Kwansei Gakuin Univ.) |
(20) |
14:15-14:40 |
Exponential evaluations in universal random privacy amplification |
Masahito Hayashi (Tohoku Univ.) |
|
14:40-14:50 |
Break ( 10 min. ) |
(21) |
14:50-15:15 |
A Note on Correlation-based Watermarking Scheme Exploiting Real-valued STDM |
Shoma Fukuda, Hiromu Koda (UEC) |
(22) |
15:15-15:40 |
Strongly Secure Secret Sharing Scheme with Ramp Threshold based on Shamir's Polynomial Interpolation Scheme |
Mikihiko Nishiara (Shinshu Univ.), Katsunori Takizawa (Suzuki) |
(23) |
15:40-16:05 |
Quantum Distinguisher for Feistel Ciphers |
Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |
|
16:05-16:15 |
Break ( 10 min. ) |
(24) |
16:15-16:40 |
Multicast-error-correcting-codes and their construction for network coding |
Masazumi Kurihara (UEC Tokyo) |
(25) |
16:40-17:05 |
A Report of Analytical Technique of Weight Enumerating Function of Convolutional Codes |
Hideki Yoshikawa (Tohoku Gakuin Univ.) |
(26) |
17:05-17:30 |
Reliability Fanction, Asymptotic Distance Ratio, and Probability of Undetected Error for Concatenated Codes |
Toshihisa Nishijima (Hosei Univ.), Kin-ichiroh Tokiwa (Osaka Sangyo Univ.) |