IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 23  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, IT 2023-05-12
13:25
Kyoto Rakuyu Kaikan (Kyoto Univ. Yoshida-South Campus)
(Primary: On-site, Secondary: Online)
Equivalences among Some Information Measures for Individual Sequences and Their Applications for Fixed-Length Coding Problems
Tomohiko Uyematsu (Tokyo Tech.), Tetsunao Matsuta (Saitama Univ.) IT2023-12 EMM2023-12
This paper proposes three new information measures for
individual sequences and clarifies their properties.
Our new ... [more]
IT2023-12 EMM2023-12
pp.61-66
RCC, ISEC, IT, WBS 2023-03-15
13:00
Yamaguchi
(Primary: On-site, Secondary: Online)
An Achievable Cost Region for Information Erasure Using a Common Random Number for Distributed Information
Tetsunao Matsuta (Saitama Univ.) IT2022-135 ISEC2022-114 WBS2022-132 RCC2022-132
Confidential information kept by companies and individuals is often stored in a storage device. Considering the migratio... [more] IT2022-135 ISEC2022-114 WBS2022-132 RCC2022-132
pp.427-432
WBS, IT, ISEC 2021-03-04
15:45
Online Online Upper and Lower Bounds on the Capacity of Private Information Retrieval Allowing Information Leakage from Queries with Different Limits for Each Database
Naoto Toyoda, Tetsunao Matsuta, Uyematsu Tomohiko (Tokyo Tech) IT2020-133 ISEC2020-63 WBS2020-52
In this paper, we consider the private information retrieval using multiple databases with multiple messages in the case... [more] IT2020-133 ISEC2020-63 WBS2020-52
pp.128-133
WBS, IT, ISEC 2018-03-08
10:50
Tokyo Katsusika Campas, Tokyo University of Science The Access Structure of a Secret Sharing Scheme Using Locally Repairable Codes
Masanobu Nakata, Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech) IT2017-107 ISEC2017-95 WBS2017-88
As a method to distribute and preserve secret information, a secret sharing scheme provides high confidentiality and red... [more] IT2017-107 ISEC2017-95 WBS2017-88
pp.25-30
WBS, IT, ISEC 2018-03-08
13:00
Tokyo Katsusika Campas, Tokyo University of Science Outage Capacity of a Two-User MIMO Interference Channel for Simultaneous Information and Energy Transfer
Kengo Ikebata, Tomohiko Uyematsu (Tokyo Tech), Ryutaroh Matsumoto (Nagoya Univ), Tetsunao Matsuta (Tokyo Tech) IT2017-110 ISEC2017-98 WBS2017-91
In a two-user interference channel for simultaneous information and energy transfer, there are an ID (Information Decodi... [more] IT2017-110 ISEC2017-98 WBS2017-91
pp.43-48
ISEC, WBS, IT 2017-03-09
16:50
Tokyo TOKAI University [Invited Talk] On the Wyner-Ziv Coding Problem with Delayed Side Information
Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) IT2016-117 ISEC2016-107 WBS2016-93
Wyner-Ziv coding is a basic and typical source coding for multiple information sources. In Wyner-Ziv coding, the encoder... [more] IT2016-117 ISEC2016-107 WBS2016-93
pp.115-120
ISEC, WBS, IT 2017-03-10
14:10
Tokyo TOKAI University Spectrum Sensing in Cooperative with Some Secondary Users
Yuki Muranaka, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) IT2016-131 ISEC2016-121 WBS2016-107
The cognitive radio has attracted attention as a measure to utilize the radio spectrum more efficiently in order to cope... [more] IT2016-131 ISEC2016-121 WBS2016-107
pp.209-214
IT, ISEC, WBS 2016-03-10
11:05
Tokyo The University of Electro-Communications Bayesian Estimation of the Virus Source of an Infection in a Network Using Any Prior Distribution
Ryousuke Kido, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Tech.) IT2015-104 ISEC2015-63 WBS2015-87
We model a phenomenon that a computer virus is spreading in a network as infection of the virus in a graph constructed o... [more] IT2015-104 ISEC2015-63 WBS2015-87
pp.19-24
IT, ISEC, WBS 2016-03-10
14:05
Tokyo The University of Electro-Communications The Minimum Codelength of Multiple-Uniprior Index Coding
Masaru Takahashi, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Tech) IT2015-110 ISEC2015-69 WBS2015-93
Index coding for sharing information via satellite communication is considered. Each receiver knows some of the messages... [more] IT2015-110 ISEC2015-69 WBS2015-93
pp.55-60
IT, ISEC, WBS 2016-03-10
14:30
Tokyo The University of Electro-Communications Intrinsic Randomness Problem for Correlated General Sources
Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech.) IT2015-111 ISEC2015-70 WBS2015-94
Muramatsu et~al. considered the problem of generating statistically independent random numbers from two correlated memor... [more] IT2015-111 ISEC2015-70 WBS2015-94
pp.61-66
IT, ISEC, WBS 2016-03-10
15:30
Tokyo The University of Electro-Communications Secrecy Rates for the Gaussian Wiretap Channel with an Energy Transfer Cooperative Jammer
Tomoya Komiyama, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) IT2015-122 ISEC2015-81 WBS2015-105
Wireless secure communications based on the information-theoretic security are attracting much attention.
In this pape... [more]
IT2015-122 ISEC2015-81 WBS2015-105
pp.131-136
ISEC, IT, WBS 2015-03-02
16:00
Fukuoka The University of Kitakyushu Outage Capacity of a Two-User Interference Channel for Simultaneous Information and Energy Transfer
Yutaka Osawa, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) IT2014-80 ISEC2014-93 WBS2014-72
Wireless energy transfer is attracting more attention. A two-user interference channel for simultaneous information and ... [more] IT2014-80 ISEC2014-93 WBS2014-72
pp.117-122
IT 2014-09-19
13:00
Chiba   Revisiting the Rate-Distortion Theory Using Smooth Max Renyi Divergence
Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Inst. of Tech.) IT2014-46
This paper clarifies the rate-distortion function for general sources
in terms of the smooth max Renyi divergence. To t... [more]
IT2014-46
pp.31-36
ISEC, IT, WBS 2014-03-11
13:20
Aichi Nagoya Univ., Higashiyama Campus On the Outage Energy Efficiency of Wireless Duocast Relay Multiple Access Channels in the Low Power Regime
Bai Ro, Tomohiko Uyematsu, Ryutaroh Matsumoto, Tetsunao Matsuta (Tokyo Inst. of Tech.) IT2013-81 ISEC2013-110 WBS2013-70
This paper deals with the energy effiency of energy-constrained terminals in the wireless duocast relay multiple access ... [more] IT2013-81 ISEC2013-110 WBS2013-70
pp.169-174
ISEC, IT, WBS 2014-03-11
15:15
Aichi Nagoya Univ., Higashiyama Campus Identification Capacity of a Biometrical Identification System Using List Decording
Marika Mori, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT2013-93 ISEC2013-122 WBS2013-82
The biometrical identification system using list decorder is a system which outputs candidates from the observed biometr... [more] IT2013-93 ISEC2013-122 WBS2013-82
pp.249-254
WBS, SAT
(Joint)
2013-05-16
16:00
Tochigi Utsunomiya Univ. [Encouragement Talk] An Information-Spectrum Approach for Open Problems in Information Theory
Tetsunao Matsuta (Tokyo Inst. of Tech.) WBS2013-5 SAT2013-4
In information theory, a coding problem is a computable characterization of the theoretical limit of coding rates for a ... [more] WBS2013-5 SAT2013-4
pp.25-30(WBS), pp.19-24(SAT)
IT, ISEC, WBS 2013-03-07
10:30
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Universal Coding for Asynchronous Slepian-Wolf Coding Systems
Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT2012-62 ISEC2012-80 WBS2012-48
Slepian-Wolf (SW) coding system is the most fundamental source coding system in multi-terminal information theory. In t... [more] IT2012-62 ISEC2012-80 WBS2012-48
pp.1-6
ISEC, IT, WBS 2011-03-04
09:25
Osaka Osaka University A Practical Algorithm of Universal Source Coding by the Most Frequent Substring
Tsuki Saito, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech) IT2010-105 ISEC2010-109 WBS2010-84
In the grammar based code proposed by Kieffer and Yang, a context-free grammar which only produces the input sequence is... [more] IT2010-105 ISEC2010-109 WBS2010-84
pp.243-248
IT 2011-01-18
14:00
Nara   A general formula for the capacity region of multiple-access channels with feedback
Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT2010-61
Recently, the multi-terminal information theory becomes more important, because multi-terminal communication systems hav... [more] IT2010-61
pp.43-48
IT, ISEC, WBS 2010-03-04
16:35
Nagano Nagano-Engineering Campus, Shinshu University Universal Slepian-Wolf Source Codes Using Low-Density Parity-Check Matrices
Tetsunao Matsuta, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Inst. of Tech.) IT2009-99 ISEC2009-107 WBS2009-78
Low-density parity-check (LDPC) codes become very popular in channel coding, since they can achieve the performance clos... [more] IT2009-99 ISEC2009-107 WBS2009-78
pp.181-186
 Results 1 - 20 of 23  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan