IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 12 of 12  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Tradeoff relations between entropic quantities and their application in quantum information theory
Michele Dall'Arno (Toyohashi U. of Technology) IT2023-133 ISEC2023-132 WBS2023-121 RCC2023-115
In this presentation we introduce tradeoff relations between entropic quantities such as Renyi entropies, the subentropy... [more] IT2023-133 ISEC2023-132 WBS2023-121 RCC2023-115
pp.366-367
RCC, ISEC, IT, WBS 2023-03-15
13:25
Yamaguchi
(Primary: On-site, Secondary: Online)
Generalized Unicity Distance and its Application to Y-00 Quantum Stream Cipher
Masaki Sohma (Tamagawa Univ.), Osamu Hirota (Chuo Univ.) IT2022-128 ISEC2022-107 WBS2022-125 RCC2022-125
Shannon proposed a theory to evaluate cryptographic functions based on the entropy theory he had developed in order to a... [more] IT2022-128 ISEC2022-107 WBS2022-125 RCC2022-125
pp.378-385
IT, ISEC, RCC, WBS 2022-03-10
16:50
Online Online [Special Invited Talk] A spread of Information Theory Researches
Hirosuke Yamamoto (U.Tokyo) IT2021-103 ISEC2021-68 WBS2021-71 RCC2021-78
We look back on the research themes dealt with in our researches of information theory for 47 years, and think about the... [more] IT2021-103 ISEC2021-68 WBS2021-71 RCC2021-78
pp.117-121
IT 2017-07-14
10:00
Chiba Chiba University Asymptotic Tightness of The Shannon Lower Bound for R(D) -- Another Proof for Self-Similar Memoryless Source --
Shingo Taguchi, Tsutomu Kawabata (UEC) IT2017-27
Although the asymptotic properties of the Shannon lower bound for the rate-distortion function are well known for contin... [more] IT2017-27
pp.61-65
IT, EMM 2016-05-20
10:15
Hokkaido Otaru Economic Center A Sharp Bound Between Two Arimoto's Conditional Renyi Entropies with Distinct Positive Orders
Yuta Sakai, Ken-ichi Iwata (Univ. of Fukui) IT2016-11 EMM2016-11
In information theory, information measures for random variables, such as the Shannon entropy and the Rényi entropy, are... [more] IT2016-11 EMM2016-11
pp.63-68
IT 2011-09-30
14:30
Tokyo Tokyo Institute of Technology Several Questions on The Shannon's Information Theory -- From the Experience to use Information Theories as Interdisciplinary Analysis Tools --
Kimiaki Tokumaru (System Engineer) IT2011-34
Claude Shannon (1916-2001) proposed his unique definitions for Entropy, Redundancy, Stochastic, Quantization, and influe... [more] IT2011-34
pp.61-66
PRMU 2011-03-10
09:30
Ibaraki   Written languages are analogously processed, while spoken languages are digitally processed. -- An Error Correction Request for Shannon's Information Theory and Pavlov's 'Conditional Reflexes' --
Kimiaki Tokumaru (System Engineer) PRMU2010-241
The author came to a hypothesis that the unique and fundamental difference between humans and non-human animals (NHA) is... [more] PRMU2010-241
pp.25-30
ISEC 2010-05-21
14:15
Tokyo Kikai-Shinko-Kaikan Bldg. Comparing with feature of quantum stream cipher Y-00 and CPPM -- Cipher with randomization of chiphertext --
Masaki Sohma, Osamu Hirota (Tamagawa Univ.) ISEC2010-4
The basis of the information theoretic security of the symmetric ky cipher is based on the Shannon theory published in 1... [more] ISEC2010-4
pp.17-24
ISEC 2009-09-25
11:35
Tokyo Kikai-Shinko-Kaikan Bldg. Spy satellite system with quasi perfect secrecy by quantum stream cipher Y-00 -- Beyond the Shannon limit --
Osamu Hirota (Tamagawa Univ.) ISEC2009-42
It is well known that there is the Shannon limit for information theoretic security of the conventional symmetric key ci... [more] ISEC2009-42
pp.15-22
NS, RCS
(Joint)
2009-07-16
11:00
Hokkaido Hokkaido University (Hokkaido) Cooperative Diversity Can Mitigate Keyhole Effects in Wireless MIMO Systems
Oussama Souihli, Tomoaki Ohtsuki (Keio Univ.) RCS2009-53
A MIMO keyhole is a propagation environment such that the channel gain matrix has unit rank (single degree of freedom), ... [more] RCS2009-53
pp.1-6
IT 2008-10-07
14:40
Tochigi Asaya Hotel(Kinugawa Onsen) [Invited Talk] Theory of Complex Systems starting from the Axiomatic Formulation of an Entropy
Hiroki Suyari (Chiba Univ.) IT2008-40
Shannon entropy is well known to be characterized by the so-called
Shannon-Khinchin axioms. We briefly review the mathe... [more]
IT2008-40
pp.7-12
WBS, IT, ISEC 2006-03-16
15:35
Aichi Nagoya Univ. [Invited Talk] TBA
Hirosuke Yamamoto (Univ. of Tokyo)
The rate-distortion theory shows that the minimum coding rate $R$ to achieve a given distortion $D$ in lossy data comp... [more] IT2005-74 ISEC2005-131 WBS2005-88
pp.57-62
 Results 1 - 12 of 12  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan