|
|
Technical Committee on Information Theory (IT) (Searched in: 2011)
|
|
Search Results: Keywords 'from:2011-05-20 to:2011-05-20'
|
[Go to Official IT Homepage (Japanese)] |
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Ascending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT |
2011-05-20 11:00 |
Osaka |
Osaka City University |
An Improvement of Lossless Data Compression via Substring Enumeration Yuki Shima, Ken-ichi Iwata (Univ. of Fukui), Mitsuharu Arimura (Shonan Inst. of Tech.) IT2011-1 |
(To be available after the conference date) [more] |
IT2011-1 pp.1-6 |
IT |
2011-05-20 11:25 |
Osaka |
Osaka City University |
A Generalized the Chow-Liu Algorithm based on the MDL Principle Joe Suzuki (Osaka Univ.) IT2011-2 |
We extend the Chow-Liu algorithm for general random variables while
the previous versions only considered finite source... [more] |
IT2011-2 pp.7-12 |
IT |
2011-05-20 13:30 |
Osaka |
Osaka City University |
Privacy Amplification Theorem for Bounded Storage Eavesdropper Shun Watanabe, Yasutada Oohama (Univ. of Tokushima) IT2011-3 |
[more] |
IT2011-3 pp.13-18 |
IT |
2011-05-20 13:55 |
Osaka |
Osaka City University |
Access Structure of Secret Sharing Scheme based on Second-Degree Bivariate Polynomial Interpolation Scheme Hideaki Kashiwagura, Mikihiko Nishiara (Shinshu Univ.) IT2011-4 |
Shamir's polynomial interpolation scheme is a secret sharing scheme
with univariate polynomial.
In this study, we inve... [more] |
IT2011-4 pp.19-24 |
IT |
2011-05-20 14:20 |
Osaka |
Osaka City University |
Relations among Information Theoretically and Computationally Secure Symmetric Key Encryptions Mitsugu Iwamoto, Kazuo Ohta (Univ. of Electro-Comm.) IT2011-5 |
[more] |
IT2011-5 pp.25-30 |
IT |
2011-05-20 14:45 |
Osaka |
Osaka City University |
Performance of a Fragile Watermarking Scheme with Detectability of Tampered Locations in JPEG Images Mitsuteru Sakashita, Hiroki Koga (Univ Tsukuba) IT2011-6 |
In this paper we propose a fragile watermaking scheme with detectability
of tampered locations in JPEG images. Given a ... [more] |
IT2011-6 pp.31-36 |
IT |
2011-05-20 15:25 |
Osaka |
Osaka City University |
A Note on the Partition by Defining Set and the Weight Distributions for Cyclic Codes (Part 2) Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyushu Women's Univ.) IT2011-7 |
The partition of cyclic codes defined by the defining sets and
concept of a sequence of the defining set are induced.
... [more] |
IT2011-7 pp.37-40 |
IT |
2011-05-20 15:50 |
Osaka |
Osaka City University |
Efficient Coding Scheme for Balacing 2nd Order RDS Hiroshi Kamabe, Yu Fujita (Gifu Univ.) IT2011-8 |
[more] |
IT2011-8 pp.41-45 |
IT |
2011-05-20 16:15 |
Osaka |
Osaka City University |
Study on Vital Data Acquisition Schemes for Sports Players
-- Heart Rate Measurements by Electrocardiograph, Phonocardiograph and Blood Flow Variation -- Nao Masuoka, Tetsuo Tsujioka (Osaka City Univ.) IT2011-9 |
Recently, in order to figure out sports player’s state, his/her supervisor/coach requests to measure sports player’s vit... [more] |
IT2011-9 pp.47-52 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|