Thu, Jul 17 AM 09:45 - 11:25 |
(1) |
09:45-10:10 |
Construction of Almost Instantaneous FV codes based on Integer Programming |
Masato Tsuchihasi, Hirosuke Yamamoto, Junya Honda (Univ. of Tokyo) |
(2) |
10:10-10:35 |
Distance Metric Learning with Low Computational Complexity based on Ensemble of Low-dimensional Matrixes |
Hiroshi Saito, Fumihiro Yamazaki, Kenta Mikawa, Masayuki Goto (Waseda Univ.) |
(3) |
10:35-11:00 |
On state change of FTM gate by using the orthogonal states |
Takaya Suzuki, Noboru Watanabe (TUS) |
(4) |
11:00-11:25 |
Performance of bit/byte slice implementation of FEAL |
Teppei Nakai, Toshinobu Kaneko (TUS) |
|
11:25-12:35 |
Break ( 70 min. ) |
Thu, Jul 17 PM 12:35 - 13:50 |
(5) |
12:35-13:00 |
Secrecy Capacity of a Class of Wiretap Channels with Side Information at the Transmitter |
Hachiro Fujita (Tokyo Metropolitan Univ.) |
(6) |
13:00-13:25 |
$alpha$-divergence derived as the generalized rate function in Tsallis statistics |
Hiroki Suyari (Chiba Univ.), Antonio Maria Scarfone (ISC-CNR) |
(7) |
13:25-13:50 |
Coding Theoretic Construction of Quantum Ramp Secret Sharing |
Ryutaroh Matsumoto (Tokyo Inst. of Tech.) |
|
13:50-14:00 |
Break ( 10 min. ) |
Thu, Jul 17 PM 14:00 - 15:40 |
(8) |
14:00-14:25 |
Maximum Multicast Throughput by Network Coding on Undirected Hypernetworks |
Hokuto Takahashi, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) |
(9) |
14:25-14:50 |
Extended LZW codes with Modified Reduplicative Parsing |
Yuta Takabayashi, Hirosuke Yamamoto (Univ. of Tokyo) |
(10) |
14:50-15:15 |
A study of a MDP-based recommender system when the class of user who is recommended items is unknown |
Shusuke Iwai, Nozomi Miya (Waseda Univ.), Yasunari Maeda (Kitami Institute of Technology), Toshiyasu Matsushima (Waseda Univ.) |
(11) |
15:15-15:40 |
A Note on Optimal Control System for Selective-Repeat Hybrid SR-ARQ with a Finite Length Buffer |
Yuta Kageyama, Akira Kamatsuka (Waseda Univ.), Yasunari Maeda (Kitami Institute of Technology), Toshiyasu Matsushima (Waseda Univ.) |
|
15:40-15:50 |
Break ( 10 min. ) |
Thu, Jul 17 PM 15:50 - 17:30 |
(12) |
15:50-16:15 |
A Flash Code Utilizing Dynamic Segment Allocation |
Kazuki Kumagai, Yuichi Kaji (NAIST) |
(13) |
16:15-16:40 |
Bounds on the Entropy of Multinomial Distribution |
Yuichi Kaji (NAIST) |
(14) |
16:40-17:05 |
Fixed-Length Lossy Source Coding Theorems with Small Excess Distortion Probability |
Ryo Nomura (Senshu Univ.), Hideki Yagi (Univ. of Electro-Comm.) |
(15) |
17:05-17:30 |
Coding with a Fidelity Criterion Allowing Some Overflow Probability |
Hideki Yagi (Univ. of Electro-Comm.), Ryo Nomura (Senshu Univ.) |
|
17:30-17:40 |
Break ( 10 min. ) |
Thu, Jul 17 PM 17:40 - 18:30 |
(16) |
17:40-18:30 |
[Invited Talk]
How to Observe Probability Distribution of Self-Information
-- as viewed under different resolutions of $n^{-1}$ and $n^{-1/2}$ -- |
Toshiyasu Matsushima (Waseda Univ.) |
Fri, Jul 18 AM 09:30 - 11:10 |
(17) |
09:30-09:55 |
Recognition Accuracy Improvement of QR Code by Using GMD Decoding |
Keisuke Furumoto, Yoshihiro Kusanagi, Masakatu Morii (Kobe Univ) |
(18) |
09:55-10:20 |
On Constructing Symbol-Pair Convolutional Codes and Computing the Free Pair Distance |
Chikara Sasakura (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) |
(19) |
10:20-10:45 |
A Prediction Method based on Weighted Ensemble of Decision Tree on Alternating Decision Forests. |
Shotaro Misawa, Naohiro Fujiwara, Kenta Mikawa, Masayuki Goto (Waseda Univ.) |
(20) |
10:45-11:10 |
On construction of connected channel and its quantum capacity |
Hiromi Ito, Noboru Watanabe (TUS) |
|
11:10-13:10 |
Break ( 120 min. ) |
Fri, Jul 18 PM 13:10 - 14:50 |
(21) |
13:10-13:35 |
A broadcast retransmission scheme with index coding |
Takahiro Oshima, Tadashi Wadayama (Nagoya Inst. of Tech.) |
(22) |
13:35-14:00 |
Improving Performance of Spatially Coupled Code for Burst Erasure by Column Permutation of Parity Check Matrix |
Hiroki Mori, Tadashi Wadayama (Nagoya Inst. of Tech.) |
(23) |
14:00-14:25 |
Note on attack for a public key agreement based on non-commutative algebra |
Takaaki Miyamoto, Satoshi Iriyama (TUS) |
(24) |
14:25-14:50 |
On Quantization by Greedy Combining for Outputs of Discrete Memoryless Channels |
Yuta Sakai, Ken-ichi Iwata (Univ. of Fukui) |
|
14:50-15:00 |
Break ( 10 min. ) |
Fri, Jul 18 PM 15:00 - 16:40 |
(25) |
15:00-15:25 |
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes K(XVI)SE(1)PKC,K(XVII)SE(1)PKC and K(XVII)ΣIIPKC |
Masao Kasahara (Waseda Univ./Chuo Univ.) |
(26) |
15:25-15:50 |
New Method for Factoring RSA Moduli with Implicit Hint |
Ryuichi Sakai (OECU), Masao Kasahara (Chuo Univ.) |
(27) |
15:50-16:15 |
A Method for Constructing High Rate Punctured Convolutional Codes by Using Dual Codes(II) |
Kana Kikuchi, Sen Moriya, Hiroshi Sasano (Kinki Univ.) |
(28) |
16:15-16:40 |
On Applications for Complex Modulation by Constant-Weight and Multi-Valued Codes |
Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyusyhu Women's Univ.), Keiichi Takahashi (Kinki Univ.) |
|
16:40-16:50 |
Break ( 10 min. ) |
Fri, Jul 18 PM 16:50 - 17:40 |
(29) |
16:50-17:15 |
Tail-Biting Code/Error-Trellis Construction for Linear Block Codes |
Masato Tajima, Koji Okino, Tatsuto Murayama (Univ. of Toyama) |
(30) |
17:15-17:40 |
Geometry of Markov Chains, Finite State Machines, and Tree Models |
Jun'ichi Takeuchi (Kyushu Univ.) |