Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-13 11:35 |
Osaka |
Osaka Univ. (Suita Campus) |
Proxy Re-Authentication Capable of Key and Data Compression Yoshiro Matsuoka, Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65 |
In this paper, we propose a new cryptographic protocol called proxy re-authentication capable of key and data compressio... [more] |
IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65 pp.52-59 |
ITS, IE, ITE-MMS, ITE-ME, ITE-AIT [detail] |
2024-02-20 14:30 |
Hokkaido |
Hokkaido Univ. |
Optimizing Division Schemes with Mixture of Experts for Medical Data Compression Jiancheng Zhao, Takefumi Ogawa (Utokyo) ITS2023-73 IE2023-62 |
Implicit Neural Representation (INR) is an emerging technique for data compression that utilizes the parameters of a Dee... [more] |
ITS2023-73 IE2023-62 pp.145-150 |
RECONF, VLD |
2024-01-29 15:30 |
Kanagawa |
AIRBIC Meeting Room 1-4 (Primary: On-site, Secondary: Online) |
An FPGA-based data compressor for state vector quantum simulators Kaijie Wei, Hideharu Amano (Keio Univ.), Ryohei Niwase (Tsukuba Univ.), Takefumi Miyoshi (WasaLabo), Yoshiki Yamaguchi (Tsukuba Univ.) VLD2023-87 RECONF2023-90 |
A quantum computer simulator is a tool to emulate the operation of a quantum computer on a classical computer. It is a c... [more] |
VLD2023-87 RECONF2023-90 pp.41-46 |
EMM |
2024-01-17 09:30 |
Miyagi |
Tohoku Univ. (Primary: On-site, Secondary: Online) |
A Reversible Data Hiding Method in Compressible Encrypted Domain for OpenEXR Images Noa Kikuchi, Shoko Imaizumi (Chiba Univ.) EMM2023-84 |
In this paper, we propose a method to achieve high-capacity reversible data hiding (RDH) for OpenEXR images with compres... [more] |
EMM2023-84 pp.20-25 |
RISING (3rd) |
2023-10-31 14:00 |
Hokkaido |
Kaderu 2・7 (Sapporo) |
[Poster Presentation]
Optimal Compression Rate for Multiple Data Compression Techniques in Data Parallel Distributed Deep Learning Ryudai Fukuda, Takuji Tachibana (Univ. Fukui) |
In distributed deep learning, where multiple processors are used, the learning time can be significantly reduced by exec... [more] |
|
NS |
2023-10-05 10:10 |
Hokkaido |
Hokkaidou University + Online (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
Communication Scheduling Based on Heuristic Algorithm in Distributed Deep Learning Ryudai Fukuda, Takuji Tachibana (Univ. Fukui) NS2023-86 |
In distributed deep learning, where multiple processors are used, the learning time can be significantly reduced by exec... [more] |
NS2023-86 pp.83-88 |
IT |
2023-08-03 14:30 |
Kanagawa |
Shonan Institute of Technology (Primary: On-site, Secondary: Online) |
An Asymmetric Encoding-Decoding Scheme for Lossless Data Compression Hirosuke Yamamoto (Univ. of Tokyo), Ken-ichi Iwata (Univ. of Fukui) IT2023-17 |
ANS (Asymmetric Numeral Systems) are new lossless data-compression-coding systems that can achieve almost the same compr... [more] |
IT2023-17 pp.17-22 |
RCC, ISEC, IT, WBS |
2023-03-14 13:50 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
A Construction Method of Alphabetic Codes Allowing N-bit Decoding Delays Daichi Ueda, Ken-ichi Iwata (Univ. of Fukui), Hirosuke Yamamoto (The Univ. of Tokyo) IT2022-102 ISEC2022-81 WBS2022-99 RCC2022-99 |
As an extension of the AIFV and AIFV-m codes that allow decoding delay, Sugiura, Kamamoto, and Moriya proposed the N-bit... [more] |
IT2022-102 ISEC2022-81 WBS2022-99 RCC2022-99 pp.218-223 |
EMM |
2023-03-02 13:00 |
Nagasaki |
Fukue culture hall (Primary: On-site, Secondary: Online) |
[Poster Presentation]
An extension of reversible data hiding in encrypted images with high compression performance and flexible processing order Eichi Arai, Shoko Imaizumi (Chiba Univ.) EMM2022-67 |
In this paper, we propose a reversible data hiding in encrypted images (RDH-EI) method that achieves both a high compres... [more] |
EMM2022-67 pp.1-6 |
EMM |
2023-03-02 13:00 |
Nagasaki |
Fukue culture hall (Primary: On-site, Secondary: Online) |
[Poster Presentation]
A Video Data Hiding Scheme Using Dynamic Programming on Feature Sequences Tamaki Yonemaru, Tetsuya Kojima, Raito Matsuzaki, Akira Tanaka (NIT, Tokyo College) EMM2022-73 |
A video data hiding scheme based on the differences between two successive frames has been proposed. In this scheme, a w... [more] |
EMM2022-73 pp.34-37 |
EMM |
2023-01-26 09:30 |
Miyagi |
Tohoku Univ. (Primary: On-site, Secondary: Online) |
Influence of Data Hiding in EtC-Image Classification with Vision Transformer Kosuke Abe, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) EMM2022-61 |
A privacy-preserving image classification method with the vision transformer (ViT) was proposed in which the accuracy of... [more] |
EMM2022-61 pp.1-6 |
IT, RCS, SIP |
2023-01-24 10:25 |
Gunma |
Maebashi Terrsa (Primary: On-site, Secondary: Online) |
An improved context tree switching method by dynamic expansion and pruning of context tree Masaya Ootsu, Hideki Yagi (UEC) IT2022-36 SIP2022-87 RCS2022-215 |
The Context Tree Weighting (CTW) method is a sequential lossless universal coding algorithm for tree sources with good p... [more] |
IT2022-36 SIP2022-87 RCS2022-215 pp.42-47 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 13:00 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Optimal Data Communication Scheduling Considering Multiple Data Compression Techniques in Distributed Deep Learning Fukuda Ryudai, Takuji Tachibana (Univ. Fukui) NS2022-105 |
In distributed deep learning, which uses multiple processors, the training time can be greatly reduced by executing the ... [more] |
NS2022-105 pp.29-34 |
RISING (3rd) |
2022-10-31 10:30 |
Kyoto |
Kyoto Terrsa (Day 1), and Online (Day 2, 3) |
[Poster Presentation]
Study of Data Collection System for Anomaly Detection by Ultrasonic Components of Mechanical Equipment Operating Sounds Rio Shigyo, Daiki Nobayashi, Kazuya Tsukamoto, Mitsunori Mizumachi, Takeshi Ikenaga (KIT) |
Status checks of mechanical equipment are typically being conducted by workers (manpower) at the actual place. However, ... [more] |
|
IA, CQ, MIKA (Joint) |
2022-09-16 15:45 |
Hokkaido |
Hokkaido Citizens Actives Center (Primary: On-site, Secondary: Online) |
Study of Data Collection System for Ultrasonic Waves Based Anomaly Detection of Mechanical Equipment Rio Shigyo, Daiki Nobayashi, Kazuya Tsukamoto, Mitsunori Mizumachi, Takeshi Ikenaga (KIT) IA2022-32 |
Status checks of mechanical equipment are typically being conducted by workers (manpower). However, since the check timi... [more] |
IA2022-32 pp.97-102 |
IT |
2022-07-21 14:55 |
Okayama |
Okayama University of Science (Primary: On-site, Secondary: Online) |
A Data Compression Method Where The Codeword Is a Computer Program Generating The Data Mitsuharu Arimura (Shonan Inst. Tech.) IT2022-19 |
The Kolmogorov complexity of a string is defined as the shortest length of the program on a Turing machine used to repre... [more] |
IT2022-19 pp.18-23 |
AI |
2022-07-04 11:50 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
Efficient Query Solution and Highly Compressed Indexing for Large RDF Graphs Koji Fujiwara, Ken Kaneiwa (UEC) AI2022-6 |
The number and size of RDF graphs on the Web grow continuously and demand efficient solutions with compressed data stora... [more] |
AI2022-6 pp.31-36 |
IT, ISEC, RCC, WBS |
2022-03-10 16:50 |
Online |
Online |
[Special Invited Talk]
A spread of Information Theory Researches Hirosuke Yamamoto (U.Tokyo) IT2021-103 ISEC2021-68 WBS2021-71 RCC2021-78 |
We look back on the research themes dealt with in our researches of information theory for 47 years, and think about the... [more] |
IT2021-103 ISEC2021-68 WBS2021-71 RCC2021-78 pp.117-121 |
EMM |
2022-03-08 10:25 |
Online |
(Primary: Online, Secondary: On-site) (Primary: Online, Secondary: On-site) |
[Poster Presentation]
Influence of Data Hiding in Etc-Image Classification with SVM Kosuke Abe, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) EMM2021-112 |
Classification accuracy for Encryption-then-Comperssion (EtC) images by support vector machine(SVM) is comparable to tha... [more] |
EMM2021-112 pp.107-111 |
COMP |
2021-10-23 13:15 |
Online |
Online |
[Invited Talk]
Optimal-Time Queries on BWT-runs Compressed Indexes Takaaki Nishimoto, Yasuo Tabei (RIKEN) COMP2021-16 |
Indexing highly repetitive strings (i.e., strings with many repetitions) for fast queries has become a central research ... [more] |
COMP2021-16 p.19 |