Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Tradeoff relations between entropic quantities and their application in quantum information theory Michele Dall'Arno (Toyohashi U. of Technology) IT2023-133 ISEC2023-132 WBS2023-121 RCC2023-115 |
In this presentation we introduce tradeoff relations between entropic quantities such as Renyi entropies, the subentropy... [more] |
IT2023-133 ISEC2023-132 WBS2023-121 RCC2023-115 pp.366-367 |
RCC, ISEC, IT, WBS |
2023-03-15 13:25 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Generalized Unicity Distance and its Application to Y-00 Quantum Stream Cipher Masaki Sohma (Tamagawa Univ.), Osamu Hirota (Chuo Univ.) IT2022-128 ISEC2022-107 WBS2022-125 RCC2022-125 |
Shannon proposed a theory to evaluate cryptographic functions based on the entropy theory he had developed in order to a... [more] |
IT2022-128 ISEC2022-107 WBS2022-125 RCC2022-125 pp.378-385 |
IT, ISEC, RCC, WBS |
2022-03-10 16:50 |
Online |
Online |
[Special Invited Talk]
A spread of Information Theory Researches Hirosuke Yamamoto (U.Tokyo) IT2021-103 ISEC2021-68 WBS2021-71 RCC2021-78 |
We look back on the research themes dealt with in our researches of information theory for 47 years, and think about the... [more] |
IT2021-103 ISEC2021-68 WBS2021-71 RCC2021-78 pp.117-121 |
IT |
2017-07-14 10:00 |
Chiba |
Chiba University |
Asymptotic Tightness of The Shannon Lower Bound for R(D)
-- Another Proof for Self-Similar Memoryless Source -- Shingo Taguchi, Tsutomu Kawabata (UEC) IT2017-27 |
Although the asymptotic properties of the Shannon lower bound for the rate-distortion function are well known for contin... [more] |
IT2017-27 pp.61-65 |
IT, EMM |
2016-05-20 10:15 |
Hokkaido |
Otaru Economic Center |
A Sharp Bound Between Two Arimoto's Conditional Renyi Entropies with Distinct Positive Orders Yuta Sakai, Ken-ichi Iwata (Univ. of Fukui) IT2016-11 EMM2016-11 |
In information theory, information measures for random variables, such as the Shannon entropy and the Rényi entropy, are... [more] |
IT2016-11 EMM2016-11 pp.63-68 |
IT |
2011-09-30 14:30 |
Tokyo |
Tokyo Institute of Technology |
Several Questions on The Shannon's Information Theory
-- From the Experience to use Information Theories as Interdisciplinary Analysis Tools -- Kimiaki Tokumaru (System Engineer) IT2011-34 |
Claude Shannon (1916-2001) proposed his unique definitions for Entropy, Redundancy, Stochastic, Quantization, and influe... [more] |
IT2011-34 pp.61-66 |
PRMU |
2011-03-10 09:30 |
Ibaraki |
|
Written languages are analogously processed, while spoken languages are digitally processed.
-- An Error Correction Request for Shannon's Information Theory and Pavlov's 'Conditional Reflexes' -- Kimiaki Tokumaru (System Engineer) PRMU2010-241 |
The author came to a hypothesis that the unique and fundamental difference between humans and non-human animals (NHA) is... [more] |
PRMU2010-241 pp.25-30 |
ISEC |
2010-05-21 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Comparing with feature of quantum stream cipher Y-00 and CPPM
-- Cipher with randomization of chiphertext -- Masaki Sohma, Osamu Hirota (Tamagawa Univ.) ISEC2010-4 |
The basis of the information theoretic security of the symmetric ky cipher is based on the Shannon theory published in 1... [more] |
ISEC2010-4 pp.17-24 |
ISEC |
2009-09-25 11:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Spy satellite system with quasi perfect secrecy by quantum stream cipher Y-00
-- Beyond the Shannon limit -- Osamu Hirota (Tamagawa Univ.) ISEC2009-42 |
It is well known that there is the Shannon limit for information theoretic security of the conventional symmetric key ci... [more] |
ISEC2009-42 pp.15-22 |
NS, RCS (Joint) |
2009-07-16 11:00 |
Hokkaido |
Hokkaido University (Hokkaido) |
Cooperative Diversity Can Mitigate Keyhole Effects in Wireless MIMO Systems Oussama Souihli, Tomoaki Ohtsuki (Keio Univ.) RCS2009-53 |
A MIMO keyhole is a propagation environment such that the channel gain matrix has unit rank (single degree of freedom), ... [more] |
RCS2009-53 pp.1-6 |
IT |
2008-10-07 14:40 |
Tochigi |
Asaya Hotel(Kinugawa Onsen) |
[Invited Talk]
Theory of Complex Systems starting from the Axiomatic Formulation of an Entropy Hiroki Suyari (Chiba Univ.) IT2008-40 |
Shannon entropy is well known to be characterized by the so-called
Shannon-Khinchin axioms. We briefly review the mathe... [more] |
IT2008-40 pp.7-12 |
WBS, IT, ISEC |
2006-03-16 15:35 |
Aichi |
Nagoya Univ. |
[Invited Talk]
TBA Hirosuke Yamamoto (Univ. of Tokyo) |
The rate-distortion theory shows that the minimum coding rate $R$ to achieve a given distortion $D$ in lossy data comp... [more] |
IT2005-74 ISEC2005-131 WBS2005-88 pp.57-62 |