Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT |
2006-07-27 10:25 |
Chiba |
Univ. of Tokyo |
A discussion of chaos degree for quantum dynamics in spin 1/2 system Michihiro Maeda, Masanori Ohya (Tokyo Science Univ.) |
[more] |
IT2006-25 pp.1-5 |
IT |
2006-07-27 10:50 |
Chiba |
Univ. of Tokyo |
On state reconstruction for quantum controlled communication processes by using connected channel Shinichi Saito, Noboru Watanabe (TUS) |
[more] |
IT2006-26 pp.7-11 |
IT |
2006-07-27 11:15 |
Chiba |
Univ. of Tokyo |
Include the connected channel with a coherent noise, and about efficiency of the transmission of information on the quantum communication control process that uses Schrodinger Cat States for the input state. Yusuke Takase, Noboru Watanabe (TUS) |
[more] |
IT2006-27 pp.13-17 |
IT |
2006-07-27 13:30 |
Chiba |
Univ. of Tokyo |
FV code trees with no synchronizing string Yusuke Tashiro, Hirosuke Yamamoto (Univ. of Tokyo) |
[more] |
IT2006-28 pp.19-24 |
IT |
2006-07-27 13:55 |
Chiba |
Univ. of Tokyo |
The study of Bayes coding for i.i.d. sources which makes considaration of generating patterns of symbols in the source alphabet Ryunosuke Nanmo, Daiki Koizumi, Toshiyasu Matsushima (Waseda Univ.) |
[more] |
IT2006-29 pp.25-30 |
IT |
2006-07-27 14:20 |
Chiba |
Univ. of Tokyo |
An Information-Spectrum Approach to Steganography Isao Nakano, Hiroki Koga (Univ. Tsukuba) |
A model of information-theoretic steganography is proposed by Cachin.
In Cachin's model, covertexts are assumed to be ... [more] |
IT2006-30 pp.31-36 |
IT |
2006-07-27 15:00 |
Chiba |
Univ. of Tokyo |
Data Compression Using Antidictionary for Finite-Alphabet Sources Takahiro Ota (Pit-Nagano), Hiroyoshi Morita (UEC) |
An antidictionary is a set of words of minimal length that never appear in this string. And it is known that the antid... [more] |
IT2006-31 pp.37-42 |
IT |
2006-07-27 15:25 |
Chiba |
Univ. of Tokyo |
Fixed-Slope Universal Lossy Coding for Individual Sequences Shigeaki Kuzuoka, Tomohiko Uyematsu (Tokyo Inst. of Tech.) |
In a theory of lossy coding of individual sequences, two kinds
of coding schemes, the fixed-rate coding and the fixed-d... [more] |
IT2006-32 pp.43-48 |
IT |
2006-07-27 15:50 |
Chiba |
Univ. of Tokyo |
Observations on Some Turbo-like and LDPC Codes Motohiko Isaka (Kwansei Gakuin Univ.) |
[more] |
IT2006-33 pp.49-54 |
IT |
2006-07-27 16:30 |
Chiba |
Univ. of Tokyo |
[Invited Talk]
Encoding and Modeling of Data Shuichi Itoh (UEC) |
[more] |
IT2006-34 pp.55-60 |
IT |
2006-07-28 10:50 |
Chiba |
Univ. of Tokyo |
Consideration of four input - four output gates that used for quantum orthogonal states Hideaki Kataoka, Noboru Watanabe (TUS) |
[more] |
IT2006-35 pp.1-6 |
IT |
2006-07-28 11:15 |
Chiba |
Univ. of Tokyo |
On even probability of two kinds of NAND circuits constructed by FTM gate and four beam splitter gate Ren Furokoshi, Noboru Watanabe (TUS) |
[more] |
IT2006-36 pp.7-12 |
IT |
2006-07-28 11:40 |
Chiba |
Univ. of Tokyo |
On degree of entanglement of states ganerated by squeezed state and beam splitter Yuhji Koshikawa, Noboru Watanabe (TUS) |
[more] |
IT2006-37 pp.13-17 |
IT |
2006-07-28 13:55 |
Chiba |
Univ. of Tokyo |
An Improvement to an Iterative Erasure and Error Decoding Algorithm for Non-binary Block Codes Toshiaki Abe, Hitoshi Tokushige (Univ. of Tokushima), Marc Fossorier (Univ. of Hawaii), Tadao Kasami (NAIST) |
This paper considers an iterative decoding algorithm for non-binary block codes in which erasure and error decoding is p... [more] |
IT2006-38 pp.19-23 |
IT |
2006-07-28 14:20 |
Chiba |
Univ. of Tokyo |
A Scheme of Digital Ghost-Watermarking Exploiting the Hard-Decision Cross Correlation Hiroki Iesaka, Hiromu Koda, Shojiro Sakata (UEC) |
This paper proposes a scheme of digital ghost-watermarking exploiting the HCC(hard-decision cross correlation).
In thi... [more] |
IT2006-39 pp.25-30 |
IT |
2006-07-28 14:45 |
Chiba |
Univ. of Tokyo |
Strong Ramp Secret Sharing Schemes for Linear Network Coding Kunihiko Harada, Hirosuke Yamamoto (Univ. of Tokyo) |
[more] |
IT2006-40 pp.31-36 |
IT |
2006-07-28 15:25 |
Chiba |
Univ. of Tokyo |
On robust/secure transformations for linear network coding Masazumi Kurihara (UEC) |
In this paper we consider the problem of constructing some robust and secure network coding for a multicast network. Sup... [more] |
IT2006-41 pp.37-42 |
IT |
2006-07-28 15:50 |
Chiba |
Univ. of Tokyo |
A twistor theoretical approach to space-time codes Tatsumi Konishi (Aichi Inst. of Tech.) |
We attempt to consider space-time codes in relation to complex space-time based on twister theory by Penrose. As a resul... [more] |
IT2006-42 pp.43-46 |
IT |
2006-07-28 16:15 |
Chiba |
Univ. of Tokyo |
A few study of Unequal-Error Protection codes using LDPC codes Kunikazu Satou, Kingo Kobayashi, Kazuhiko Yamaguchi, Brian Kurkoski (UEC) |
[more] |
IT2006-43 pp.47-52 |
IT |
2006-07-28 16:40 |
Chiba |
Univ. of Tokyo |
On the input-output weight distribution of recursive systematic convolutional codes Hideki Yoshikawa (Suzuka Nat. Col. Tech.) |
[more] |
IT2006-44 pp.53-56 |