Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, IT |
2023-05-12 13:25 |
Kyoto |
Rakuyu Kaikan (Kyoto Univ. Yoshida-South Campus) (Primary: On-site, Secondary: Online) |
Equivalences among Some Information Measures for Individual Sequences and Their Applications for Fixed-Length Coding Problems Tomohiko Uyematsu (Tokyo Tech.), Tetsunao Matsuta (Saitama Univ.) IT2023-12 EMM2023-12 |
This paper proposes three new information measures for
individual sequences and clarifies their properties.
Our new ... [more] |
IT2023-12 EMM2023-12 pp.61-66 |
RCC, ISEC, IT, WBS |
2023-03-15 13:00 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
An Achievable Cost Region for Information Erasure Using a Common Random Number for Distributed Information Tetsunao Matsuta (Saitama Univ.) IT2022-135 ISEC2022-114 WBS2022-132 RCC2022-132 |
Confidential information kept by companies and individuals is often stored in a storage device. Considering the migratio... [more] |
IT2022-135 ISEC2022-114 WBS2022-132 RCC2022-132 pp.427-432 |
WBS, IT, ISEC |
2021-03-04 15:45 |
Online |
Online |
Upper and Lower Bounds on the Capacity of Private Information Retrieval Allowing Information Leakage from Queries with Different Limits for Each Database Naoto Toyoda, Tetsunao Matsuta, Uyematsu Tomohiko (Tokyo Tech) IT2020-133 ISEC2020-63 WBS2020-52 |
In this paper, we consider the private information retrieval using multiple databases with multiple messages in the case... [more] |
IT2020-133 ISEC2020-63 WBS2020-52 pp.128-133 |
WBS, IT, ISEC |
2018-03-08 10:50 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
The Access Structure of a Secret Sharing Scheme Using Locally Repairable Codes Masanobu Nakata, Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech) IT2017-107 ISEC2017-95 WBS2017-88 |
As a method to distribute and preserve secret information, a secret sharing scheme provides high confidentiality and red... [more] |
IT2017-107 ISEC2017-95 WBS2017-88 pp.25-30 |
WBS, IT, ISEC |
2018-03-08 13:00 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Outage Capacity of a Two-User MIMO Interference Channel for Simultaneous Information and Energy Transfer Kengo Ikebata, Tomohiko Uyematsu (Tokyo Tech), Ryutaroh Matsumoto (Nagoya Univ), Tetsunao Matsuta (Tokyo Tech) IT2017-110 ISEC2017-98 WBS2017-91 |
In a two-user interference channel for simultaneous information and energy transfer, there are an ID (Information Decodi... [more] |
IT2017-110 ISEC2017-98 WBS2017-91 pp.43-48 |
ISEC, WBS, IT |
2017-03-09 16:50 |
Tokyo |
TOKAI University |
[Invited Talk]
On the Wyner-Ziv Coding Problem with Delayed Side Information Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) IT2016-117 ISEC2016-107 WBS2016-93 |
Wyner-Ziv coding is a basic and typical source coding for multiple information sources. In Wyner-Ziv coding, the encoder... [more] |
IT2016-117 ISEC2016-107 WBS2016-93 pp.115-120 |
ISEC, WBS, IT |
2017-03-10 14:10 |
Tokyo |
TOKAI University |
Spectrum Sensing in Cooperative with Some Secondary Users Yuki Muranaka, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) IT2016-131 ISEC2016-121 WBS2016-107 |
The cognitive radio has attracted attention as a measure to utilize the radio spectrum more efficiently in order to cope... [more] |
IT2016-131 ISEC2016-121 WBS2016-107 pp.209-214 |
IT, ISEC, WBS |
2016-03-10 11:05 |
Tokyo |
The University of Electro-Communications |
Bayesian Estimation of the Virus Source of an Infection in a Network Using Any Prior Distribution Ryousuke Kido, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Tech.) IT2015-104 ISEC2015-63 WBS2015-87 |
We model a phenomenon that a computer virus is spreading in a network as infection of the virus in a graph constructed o... [more] |
IT2015-104 ISEC2015-63 WBS2015-87 pp.19-24 |
IT, ISEC, WBS |
2016-03-10 14:05 |
Tokyo |
The University of Electro-Communications |
The Minimum Codelength of Multiple-Uniprior Index Coding Masaru Takahashi, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Tech) IT2015-110 ISEC2015-69 WBS2015-93 |
Index coding for sharing information via satellite communication is considered. Each receiver knows some of the messages... [more] |
IT2015-110 ISEC2015-69 WBS2015-93 pp.55-60 |
IT, ISEC, WBS |
2016-03-10 14:30 |
Tokyo |
The University of Electro-Communications |
Intrinsic Randomness Problem for Correlated General Sources Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech.) IT2015-111 ISEC2015-70 WBS2015-94 |
Muramatsu et~al. considered the problem of generating statistically independent random numbers from two correlated memor... [more] |
IT2015-111 ISEC2015-70 WBS2015-94 pp.61-66 |
IT, ISEC, WBS |
2016-03-10 15:30 |
Tokyo |
The University of Electro-Communications |
Secrecy Rates for the Gaussian Wiretap Channel with an Energy Transfer Cooperative Jammer Tomoya Komiyama, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) IT2015-122 ISEC2015-81 WBS2015-105 |
Wireless secure communications based on the information-theoretic security are attracting much attention.
In this pape... [more] |
IT2015-122 ISEC2015-81 WBS2015-105 pp.131-136 |
ISEC, IT, WBS |
2015-03-02 16:00 |
Fukuoka |
The University of Kitakyushu |
Outage Capacity of a Two-User Interference Channel for Simultaneous Information and Energy Transfer Yutaka Osawa, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) IT2014-80 ISEC2014-93 WBS2014-72 |
Wireless energy transfer is attracting more attention. A two-user interference channel for simultaneous information and ... [more] |
IT2014-80 ISEC2014-93 WBS2014-72 pp.117-122 |
IT |
2014-09-19 13:00 |
Chiba |
|
Revisiting the Rate-Distortion Theory Using Smooth Max Renyi Divergence Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Inst. of Tech.) IT2014-46 |
This paper clarifies the rate-distortion function for general sources
in terms of the smooth max Renyi divergence. To t... [more] |
IT2014-46 pp.31-36 |
ISEC, IT, WBS |
2014-03-11 13:20 |
Aichi |
Nagoya Univ., Higashiyama Campus |
On the Outage Energy Efficiency of Wireless Duocast Relay Multiple Access Channels in the Low Power Regime Bai Ro, Tomohiko Uyematsu, Ryutaroh Matsumoto, Tetsunao Matsuta (Tokyo Inst. of Tech.) IT2013-81 ISEC2013-110 WBS2013-70 |
This paper deals with the energy effiency of energy-constrained terminals in the wireless duocast relay multiple access ... [more] |
IT2013-81 ISEC2013-110 WBS2013-70 pp.169-174 |
ISEC, IT, WBS |
2014-03-11 15:15 |
Aichi |
Nagoya Univ., Higashiyama Campus |
Identification Capacity of a Biometrical Identification System Using List Decording Marika Mori, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT2013-93 ISEC2013-122 WBS2013-82 |
The biometrical identification system using list decorder is a system which outputs candidates from the observed biometr... [more] |
IT2013-93 ISEC2013-122 WBS2013-82 pp.249-254 |
WBS, SAT (Joint) |
2013-05-16 16:00 |
Tochigi |
Utsunomiya Univ. |
[Encouragement Talk]
An Information-Spectrum Approach for Open Problems in Information Theory Tetsunao Matsuta (Tokyo Inst. of Tech.) WBS2013-5 SAT2013-4 |
In information theory, a coding problem is a computable characterization of the theoretical limit of coding rates for a ... [more] |
WBS2013-5 SAT2013-4 pp.25-30(WBS), pp.19-24(SAT) |
IT, ISEC, WBS |
2013-03-07 10:30 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Universal Coding for Asynchronous Slepian-Wolf Coding Systems Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT2012-62 ISEC2012-80 WBS2012-48 |
Slepian-Wolf (SW) coding system is the most fundamental source coding system in multi-terminal information theory. In t... [more] |
IT2012-62 ISEC2012-80 WBS2012-48 pp.1-6 |
ISEC, IT, WBS |
2011-03-04 09:25 |
Osaka |
Osaka University |
A Practical Algorithm of Universal Source Coding by the Most Frequent Substring Tsuki Saito, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech) IT2010-105 ISEC2010-109 WBS2010-84 |
In the grammar based code proposed by Kieffer and Yang, a context-free grammar which only produces the input sequence is... [more] |
IT2010-105 ISEC2010-109 WBS2010-84 pp.243-248 |
IT |
2011-01-18 14:00 |
Nara |
|
A general formula for the capacity region of multiple-access channels with feedback Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT2010-61 |
Recently, the multi-terminal information theory becomes more important, because multi-terminal communication systems hav... [more] |
IT2010-61 pp.43-48 |
IT, ISEC, WBS |
2010-03-04 16:35 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
Universal Slepian-Wolf Source Codes Using Low-Density Parity-Check Matrices Tetsunao Matsuta, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Inst. of Tech.) IT2009-99 ISEC2009-107 WBS2009-78 |
Low-density parity-check (LDPC) codes become very popular in channel coding, since they can achieve the performance clos... [more] |
IT2009-99 ISEC2009-107 WBS2009-78 pp.181-186 |