Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, ISEC, WBS |
2016-03-10 09:50 |
Tokyo |
The University of Electro-Communications |
Studies on Sudoku Puzzle Based on Coding Theory Nobumasa Nanami, Shinsuke Hirano, Kazuhiko Yamaguchi (UEC) IT2015-101 ISEC2015-60 WBS2015-84 |
Sudoku puzzle is popular in worldwide, and it has been discussed by wide variety of researchers. In the sense of coding ... [more] |
IT2015-101 ISEC2015-60 WBS2015-84 pp.1-6 |
IT, ISEC, WBS |
2016-03-10 10:15 |
Tokyo |
The University of Electro-Communications |
Acceleration of the Arimoto algorithm for computation of random coding exponent function Hiroki Watanabe, Hiroshi Nagaoka (UEC) IT2015-102 ISEC2015-61 WBS2015-85 |
The Arimoto algorithm(AA) for computation of random coding exponent function is an alternating maximixation algorithm si... [more] |
IT2015-102 ISEC2015-61 WBS2015-85 pp.7-12 |
IT, ISEC, WBS |
2016-03-10 10:40 |
Tokyo |
The University of Electro-Communications |
Redundancy of Bayesian Code with Markov Fractal Prior Distributions Naoya Matsukami, Tsutomu Kawabata (UEC) IT2015-103 ISEC2015-62 WBS2015-86 |
Bayesian code method is used as a standard in realizing a universal noiseless source code. For a memoryless source, a mi... [more] |
IT2015-103 ISEC2015-62 WBS2015-86 pp.13-17 |
IT, ISEC, WBS |
2016-03-10 11:05 |
Tokyo |
The University of Electro-Communications |
Bayesian Estimation of the Virus Source of an Infection in a Network Using Any Prior Distribution Ryousuke Kido, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Tech.) IT2015-104 ISEC2015-63 WBS2015-87 |
We model a phenomenon that a computer virus is spreading in a network as infection of the virus in a graph constructed o... [more] |
IT2015-104 ISEC2015-63 WBS2015-87 pp.19-24 |
IT, ISEC, WBS |
2016-03-10 10:40 |
Tokyo |
The University of Electro-Communications |
Performance Evaluation on Service Area Constitution for Position Detection Method using Two Unmanned Aerial Vehicle Hiroyasu Ishikawa, Shin Herai, Shunsuke Sato (Nihon Univ.) IT2015-105 ISEC2015-64 WBS2015-88 |
The Unmanned aircraft system (UAS) has been researched and developed as a temporal communication system for the emergenc... [more] |
IT2015-105 ISEC2015-64 WBS2015-88 pp.25-30 |
IT, ISEC, WBS |
2016-03-10 11:05 |
Tokyo |
The University of Electro-Communications |
A Study on PAPR Reduction based on Iterative PTS without Side Information in OFDM Systems Moeko Yoshida, Teruyuki Miyajima (Ibaraki Univ.) IT2015-106 ISEC2015-65 WBS2015-89 |
This paper proposes both a new PAPR reduction scheme for OFDM and demodulation method without side information. PAPR is ... [more] |
IT2015-106 ISEC2015-65 WBS2015-89 pp.31-36 |
IT, ISEC, WBS |
2016-03-10 12:50 |
Tokyo |
The University of Electro-Communications |
Application of MUI cancellers using bipolar MPSC in CDMA radio communication systems Hiroki Sato, Shinichiro Miyazaki, Tomoko K. Matsushima, Kotoku Omura, Shoichiro Yamasaki (Polytechnic Univ.) IT2015-107 ISEC2015-66 WBS2015-90 |
Modified prime sequence codes (MPSCs) are often used as unipolar codes in synchronous optical code division multiple acc... [more] |
IT2015-107 ISEC2015-66 WBS2015-90 pp.37-42 |
IT, ISEC, WBS |
2016-03-10 13:15 |
Tokyo |
The University of Electro-Communications |
A Synchronization Method using Fixed-Symbol for Insertion/Deletion/Substitution Channels Ryo Shibata, Gou Hosoya, Hiroyuki Yashima (TUS) IT2015-108 ISEC2015-67 WBS2015-91 |
We investigate a synchronization method over channels impaired by insertion, deletion, and substitution error (IDS chann... [more] |
IT2015-108 ISEC2015-67 WBS2015-91 pp.43-48 |
IT, ISEC, WBS |
2016-03-10 13:40 |
Tokyo |
The University of Electro-Communications |
Relations Between Conditional Shannon Entropy and Expectation of Norm and Their Applications Yuta Sakai, Ken-ichi Iwata (Univ. of Fukui) IT2015-109 ISEC2015-68 WBS2015-92 |
The paper investigates the extremal relations between the Shannon entropy and the $ell_{alpha}$-norm. More precisely, th... [more] |
IT2015-109 ISEC2015-68 WBS2015-92 pp.49-54 |
IT, ISEC, WBS |
2016-03-10 14:05 |
Tokyo |
The University of Electro-Communications |
The Minimum Codelength of Multiple-Uniprior Index Coding Masaru Takahashi, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Tech) IT2015-110 ISEC2015-69 WBS2015-93 |
Index coding for sharing information via satellite communication is considered. Each receiver knows some of the messages... [more] |
IT2015-110 ISEC2015-69 WBS2015-93 pp.55-60 |
IT, ISEC, WBS |
2016-03-10 14:30 |
Tokyo |
The University of Electro-Communications |
Intrinsic Randomness Problem for Correlated General Sources Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech.) IT2015-111 ISEC2015-70 WBS2015-94 |
Muramatsu et~al. considered the problem of generating statistically independent random numbers from two correlated memor... [more] |
IT2015-111 ISEC2015-70 WBS2015-94 pp.61-66 |
IT, ISEC, WBS |
2016-03-10 12:50 |
Tokyo |
The University of Electro-Communications |
Revisiting Isomorphism of Polynomials with Two Secrets Bagus Santoso (UEC) IT2015-112 ISEC2015-71 WBS2015-95 |
The isomorphism of polynomials with two secret (IP2S) problem is one candidate of computational assumptions for post-qua... [more] |
IT2015-112 ISEC2015-71 WBS2015-95 pp.67-74 |
IT, ISEC, WBS |
2016-03-10 13:15 |
Tokyo |
The University of Electro-Communications |
Improvement in detection performance of Tardos's fingerprinting code using detailed score distribution Ryo Inoue, Kazuhiko Yamaguchi (UEC) IT2015-113 ISEC2015-72 WBS2015-96 |
Tardos proposed c-secure code based on randomness with certain distribution (Tardos’s code). The code is shorter than Bo... [more] |
IT2015-113 ISEC2015-72 WBS2015-96 pp.75-80 |
IT, ISEC, WBS |
2016-03-10 13:40 |
Tokyo |
The University of Electro-Communications |
Collision-Free Rainbow Table Structure Yuki Tabata, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) IT2015-114 ISEC2015-73 WBS2015-97 |
Rainbow table is a method to crack the password in high speed from hash values. Collision of password candidates occurs,... [more] |
IT2015-114 ISEC2015-73 WBS2015-97 pp.81-88 |
IT, ISEC, WBS |
2016-03-10 14:05 |
Tokyo |
The University of Electro-Communications |
Message Preprocessing for MD Hash Functions Hidenori Kuwakado (Kansai Univ.), Shoichi Hirose (Univ. of Fukui) IT2015-115 ISEC2015-74 WBS2015-98 |
[more] |
IT2015-115 ISEC2015-74 WBS2015-98 pp.89-93 |
IT, ISEC, WBS |
2016-03-10 14:30 |
Tokyo |
The University of Electro-Communications |
A Multiplier Architecture for Finite Field of 254bit-Prime Square Order Based on Pipelined 32bit Montgomery Multipliers Yusuke Nagahama, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) IT2015-116 ISEC2015-75 WBS2015-99 |
Bilinear Pairing is a major tool to realize advanced cryptographic functionality such as searchable encryption, aggregat... [more] |
IT2015-116 ISEC2015-75 WBS2015-99 pp.95-100 |
IT, ISEC, WBS |
2016-03-10 15:05 |
Tokyo |
The University of Electro-Communications |
Distance and Correlation Properties for Constant-Weight Codes from an (11,5,2)-Cyclic Difference Set Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyuhsu Women's Univ.) IT2015-117 ISEC2015-76 WBS2015-100 |
In 2008 the authors proposed an extended method for constructing constant-weight code over $GF(q)$, which is generalized... [more] |
IT2015-117 ISEC2015-76 WBS2015-100 pp.101-106 |
IT, ISEC, WBS |
2016-03-10 15:30 |
Tokyo |
The University of Electro-Communications |
The Effective Method of Improving Berlekamp-Preparata Convolutional Codes Decoding by Tail-Biting Technology Tianyi Zhang, Masato Kitakami (Chiba Univ.) IT2015-118 ISEC2015-77 WBS2015-101 |
An application of convolutional codes is the burst error correcting. The terminated Berlekamp-Preparata convolutional co... [more] |
IT2015-118 ISEC2015-77 WBS2015-101 pp.107-112 |
IT, ISEC, WBS |
2016-03-10 15:55 |
Tokyo |
The University of Electro-Communications |
On the bit error probability for constant log-MAP decoding of convolutional codes Hideki Yoshikawa (Tohoku Gakuin Univ.) IT2015-119 ISEC2015-78 WBS2015-102 |
[more] |
IT2015-119 ISEC2015-78 WBS2015-102 pp.113-117 |
IT, ISEC, WBS |
2016-03-10 16:20 |
Tokyo |
The University of Electro-Communications |
Algebraic Construction of KV Trellises for Linear Block Codes Masato Tajima IT2015-120 ISEC2015-79 WBS2015-103 |
In this paper, we present an algebraic construction of Koetter-Vardy (KV) trellises. The proposed method is based on the... [more] |
IT2015-120 ISEC2015-79 WBS2015-103 pp.119-124 |