1.1 Coding Theory I — Iterative Algorithm — | |
Dec.12.Wed 9:00〜10:15 Silk Hall: Room 1 Chair: Kenta Kasai (Tokyo Institute of Technology) |
|
1.1.1 | Escape Method from Local Maximum Using the Estimated SNR for Multi-Bit GDBF Decoding without Any Threshold |
◎Ryoji Haga(Meijo University), Shogo Usami(Meijo University) |
|
1.1.2 | Performance Evaluation of Two-Bit Bit Flipping Decoding with Bias Terms |
◎Koh Matsushita(Gifu University), Hiroshi Kamabe(Gifu University) |
|
1.1.3 | A Study on Sum-Product Decoding Performance of Convolutional Codes |
○Toshiyuki Shohon(Kagawa National College of Technology) |
|
1.2 Shannon Theory I — Channel Coding I — | |
Dec.12.Wed 9:00〜10:15 Rose: Room 2 Chair: Yasutada Oohama (University of Electro-Communications) |
|
1.2.1 | Random-Coding Exponential Error Bounds for Channels with Action-Dependent States |
◎Tetsunao Matsuta(Tokyo Institute of Technology), Tomohiko Uyematsu(Tokyo Institute of Technology) |
|
1.2.2 | Error Probability in Information Transmission over Continuous-Time White Gaussian Channels with Feedback |
○Shunsuke Ihara(Nagoya University) |
|
1.2.3 | Error Probability in Information Transmission over Discrete-Time Stationary Gaussian Channels with Feedback |
○Shunsuke Ihara(Nagoya University) |
|
1.3 Coding for Magnetic Recording Devices I | |
Dec.12.Wed 9:00〜10:15 Cosmos: Room 3 Chair: Motohiko Isaka (Kwansei Gakuin University) |
|
1.3.1 | On the Irreducibility of Certain Shifts of Finite Type |
◎Tetsuya Kobayashi(The University of Electro-Communications), Akiko Manada(The University of Electro-Communications), Takahiro Ota(Nagano Prefectural Institute of Technology), Hiroyoshi Morita(The University of Electro-Communications) |
|
1.3.2 | Two-Dimensional Maximum Transition Run Codes for Digital Magnetic Recording Channels |
○Hidetoshi Saito(Kogakuin University), Masashi Kossuge(Kogakuin University), Daichi Shibamoto(Kogakuin University) |
|
1.3.3 | Redundant Adaptive Data Allocation for Energy Efficient Dependable Disk Arrays |
◎Viet Ta Hong(Tokyo Institute of Technology), Kousuke Oota(Tokyo Institute of Technology), Haruhiko Kaneko(Tokyo Institute of Technology) |
|
1.4 Cryptography I — Information Theoretic Cryptography — | |
Dec.12.Wed 9:00〜10:15 Cattleya: Room 4 Chair: Hiroki Koga (Tsukuba University) |
|
1.4.1 | Information Theoretic Security and Variational Distance -Renner's Reply and Reply to Renner- |
○Osamu Hirota(Tamagawa University) |
|
1.4.2 | Reconstruction of a Secret from Incomplete Shares on Shamir's Secret Sharing |
◎Takafumi Yamamoto(Tokyo Institute of Technology), Wakaha Ogata(Tokyo Institute of Technology) |
|
1.4.3 | A Consideration on Minimum Bandwidth Regenerating Codes for Functions |
○Takahiro Yoshida(Aoyama Gakuin University), Hajime Jinushi(Aoyama Gakuin University) |
|
1.5 Signal Processing I | |
Dec.12.Wed 9:00〜10:15 Toyonokuni: Room 5 Chair: Tetsuya Kojima (Tokyo National College of Technology) |
|
1.5.1 | Evaluations of a Flexible MIMO Radar System Using Signal Cross-Correlation |
◎Katsuhiro Minoru(Kyoto Institute of Technology), Daisuke Umehara(Kyoto Institute of Technology), Koichiro Wakasugi(Kyoto Institute of Technology) |
|
1.5.2 | Affine Projection Type Blind Multiuser Detection for MIMO-DS-CDMA Communications |
◎Shota Ohba(Tokyo University of Science), Takahiro Natori(Tokyo University of Science), Nari Tanabe(Tokyo University of Science, Suwa), Toshihiro Hurukawa(Tokyo University of Science) |
|
1.5.3 | Robust Channel Estimation Method for MIMO-OFDM System |
◎Takahiro Natori(Tokyo University of Science), Nari Tanabe(Tokyo University of Science, Suwa), Toshihiro Furukawa(Tokyo University of Science) |
|
2.1 Coding Theory II — Decoding of LDPC Codes — | |
Dec.12.Wed 10:40〜11:55 Silk Hall: Room 1 Chair: Masanori Hirotomo (Saga University) |
|
2.1.1 | Stability Condition for Non-Binary LDPC Codes over Galois Field |
○Takayuki Nozaki(Tokyo Institute of Technology), Kenta Kasai(Tokyo Institute of Technology), Kohichi Sakaniwa(Tokyo Institute of Technology) |
|
2.1.2 | Log-Likelihood Ratio Calculation for Iterative Decoding on Rayleigh Fading Channels Using Padé Approximation |
◎Gou Hosoya(Tokyo University of Science), Hiroyuki Yashima(Tokyo University of Science) |
|
2.1.3 | Unequal Rate Repeat Accumulate Codes for Two-User Gaussian Multiple Access Channel |
◎Meilin He(Doshisha University), Guanghui Song(Doshisha University), Jun Cheng(Doshisha University), Yoichiro Watanabe(Doshisha University) |
|
2.2 Shannon Theory II — Entropy and Information — | |
Dec.12.Wed 10:40〜11:30 Rose: Room 2 Chair: Shiro Ikeda (Institute of Statistical Mathematics) |
|
2.2.1 | Some Remarks on the Generalized Poor-Verdú Error Bound |
◎Takuya Kubo(The University of Electro-Communications), Hiroshi Nagaoka(The University of Electro-Communications) |
|
2.2.2 | Exponential Families, Mixture Families, and the Relative Entropy: An Information-Geometrical Study |
○Hiroshi Nagaoka(The University of Electro-Communications) |
|
2.3 Coding for Magnetic Recording Devices II | |
Dec.12.Wed 10:40〜11:55 Cosmos: Room 3 Chair: Akiko Manada (University of Electro-Communications) |
|
2.3.1 | Selecting Method of Marker Code for Insertion/Deletion/Substitution Error Correction |
◎Masato Inoue(Tokyo Institute of Technology), Haruhiko Kaneko(Tokyo Institute of Technology) |
|
2.3.2 | Index-Less Indexed Flash Codes Using Inversion Bit |
○Masashi Ohkawa(Gifu University), Hiroshi Kamabe(Gifu University) |
|
2.3.3 | Applying Resizable-Cluster Method in Binary-Indexed Flash Code |
◎Michael Joseph Tan(Nara Institute of Science and Technology), Yuichi Kaji(Nara Institute of Science and Technology) |
|
2.4 Quantum Information Theory I — Fundamentals and Quantum Communications — | |
Dec.12.Wed 10:40〜11:55 Cattleya: Room 4 Chair: Tomohiro Ogawa (University of Electro-Communications) |
|
2.4.1 | Uncertainty Relations of Monotone Pair Skew Informations |
○Kenjiro Yanagi(Yamaguchi University) |
|
2.4.2 | Toward Generalization of Formula of Channel Matrix for Classical-Quantum Channel |
◎Yoshihiro Ishikawa(Aichi Prefectural University), Keisuke Shiromoto(Kumamoto University), Tsuyoshi Sasaki Usuda(Aichi Prefectural University) |
|
2.4.3 | Optimization of Feedback in Quasi-Optimum Quantum Receiver for M-Ary Signals |
◎Takashi Kondo(Aichi Prefectural University), Hiro Yamashita(Aichi Prefectural University), Shogo Usami(Meijo University), Tsuyoshi Sasaki Usuda(Aichi Prefectural University) |
|
2.5 Signal Processing II | |
Dec.12.Wed 10:40〜11:55 Toyonokuni: Room 5 Chair: Tetsuo Tsujioka (Osaka City University) |
|
2.5.1 | DLS Type Zero-Forcing Equalizer for Multipath Fading Environment |
◎Ryo Horiuchi(Tokyo University of Science,Suwa), Toshihiro Yagi(Tokyo University of Science), Takahiro Natori(Tokyo University of Science), Nari Tanabe(Tokyo University of Science,Suwa), Toshihiro Furukawa(Tokyo University of Science) |
|
2.5.2 | A Study on Packet Design to Realize Position Estimation as Well as Information-Communication for Mobile Robot Using Image Information |
◎Ryo Iwakura(Yokohama National University), Chika Sugimoto(Yokohama National University), Ryuji Kohno(Yokohama National University) |
|
2.5.3 | A Study on Interference Cancellation Technique to Improve Detection Accuracy for UWB Ground Penetrating Radar |
◎Yuya Kazumoto(Yokohama National University), Chika Sugimoto(Yokohama National University), Ryuji Kohno(Yokohama National University) |
|
3.1 Coding Theory III — Weight Distribution of LDPC Codes — | |
Dec.12.Wed 14:00〜15:15 Silk Hall: Room 1 Chair: Yuichi Kaji (Nara Institute of Science and Technology) |
|
3.1.1 | Weight Distributions for Non-Binary Cluster LDPC Codes |
◎Masaki Maehara(Tokyo Institute of Technology), Takayuki Nozaki(Tokyo Institute of Technology), Kenta Kasai(Tokyo Institute of Technology), Kohichi Sakaniwa(Tokyo Institute of Technology) |
|
3.1.2 | A Probabilistic Method for Computing the Weight Distribution of Non-Binary LDPC Codes |
◎Jun'ichi Tsurumi(Kobe University), Masanori Hirotomo(Saga University), Masakatu Morii(Kobe University) |
|
3.1.3 | A Method for Computing the Weight Spectrum of LDPC Convolutional Codes Constructed from Quasi-Cyclic Codes |
○Masanori Hirotomo(Saga University), Masakatu Morii(Kobe University) |
|
3.2 Shannon Theory III — Channel Coding II — | |
Dec.12.Wed 14:00〜15:15 Rose: Room 2 Chair: Ken-ichi Iwata (University of Fukui) |
|
3.2.1 | Central Limit Theorem and Sparse Superposition Codes |
◎Yoshinari Takeishi(Kyushu University, ISIT), Masanori Kawakita(Kyushu University, ISIT), Jun'ichi Takeuchi(Kyushu University, ISIT) |
|
3.2.2 | Constructions of Code for General Channel and Lossy Code for General Source. |
○Jun Muramastu(NTT Corporation) |
|
3.2.3 | Alternative General Formuras for Channel Capacity and Rate-Distortion Region |
○Jun Muramastu(NTT Corporation) |
|
3.3 Communication Systems I | |
Dec.12.Wed 14:00〜15:15 Cosmos: Room 3 Chair: Keigo Takeuchi (University of Electro-Communications) |
|
3.3.1 | A Consideration on Average Power Reduction Capability of Coded Trellis Shaping |
◎Ryota Yoshizawa(Yokohama National University), Hideki Ochiai(Yokohama National University) |
|
3.3.2 | Linear Time ADMM Decoding for LDPC Codes over MIMO Channels |
○Manabu Kobayashi(Shonan Institute of Technology), Shunsuke Horii(Waseda University), Toshiyasu Matsushima(Waseda University), Shigeichi Hirasawa(Waseda University) |
|
3.3.3 | A Method of Selecting Proper Cooperative Nodes for Collaborative Sensing in Cognitive Radio System |
◎Yusuke Sugimoto(Yokohama National University), Chika Sugimoto(Yokohama National University), Ryuji Kohno(Yokohama National University) |
|
3.4 Cryptography II — Signature Scheme, ID base cryptography — | |
Dec.12.Wed 14:00〜15:15 Cattleya: Room 4 Chair: Wakaha Ogata (Tokyo Institute of Technology) |
|
3.4.1 | A Secure Instantiation of the Random Oracle by a Computable Function |
○Kohtaro Tadaki(Chuo University), Norihisa Doi(Chuo University) |
|
3.4.2 | Notes on Key Generation for Identity Based Key Sharing Scheme with Composite Modulus |
○Ryuichi Sakai(Osaka Electro-Communication University), Yasuyuki Murakami(Osaka Electro-Communication University), Masao Kasahara(Osaka Gakuin University) |
|
3.4.3 | Implementation of Xate Pairing over Barreto-Naehrig Curve with OEF |
◎Shoichi Akagi(Okayama University), Yuki Mori(Okayama University), Kenta Nekado(Okayama University), Yasuyuki Nogami(Okayama University) |
|
3.5 Compressed Sensing I | |
Dec.12.Wed 14:00〜15:15 Toyonokuni: Room 5 Chair: Koujin Takeda (Tokyo Institute of Technology) |
|
3.5.1 | Sample Complexity in Dictionary Learning: Approach from Statistical Mechanics |
◎Ayaka Sakata(Tokyo Institute of Technology), Yoshiyuki Kabashima(Tokyo Institute of Technology) |
|
3.5.2 | Tradeoff between Compression Rate and Signal-to-Noise Ratio in Compressed Sensing |
◎Kei Sano(Kyoto University), Ryosuke Matsushita(Kyoto University), Toshiyuki Tanaka(Kyoto University) |
|
3.5.3 | Two-Dimensional Approximate Message Passing for Compressed Sensing |
○Kazushi Mimura(Hiroshima City University), Jumpei Sugimoto(Yamaguchi University), Akira Hirabayashi(Yamaguchi University) |
|
4.1 Coding Theory IV — Convolutional Codes — | |
Dec.12.Wed 15:40〜16:55 Silk Hall: Room 1 Chair: Toshihiro Niinomi (Tokyo City University) |
|
4.1.1 | A Study on Constructing High Rate Punctured Convolutional Codes by Using Dual Codes |
◎Kana Kikuchi(Kinki University), Sen Moriya(Kinki University), Hiroshi Sasano(Kinki University) |
|
4.1.2 | Starting (Ending) State Estimation in Error-Trellises for Tailbiting Convolutional Codes |
○Masato Tajima(University of Toyama), Koji Okino(University of Toyama) |
|
4.1.3 | Novel Interleaver Design and Its Application in Coded OFDM |
○Chenggao Han(University of Electro-Communications), Takeshi Hashimoto(University of Electro-Communications) |
|
4.2 Pattern Recognition and Machine Learning I | |
Dec.12.Wed 15:40〜16:30 Rose: Room 2 Chair: Hiroshi Nagaoka (University of Electro-Communications) |
|
4.2.1 | A Study of Bayes Risk with Bregman Divergence Loss Function |
○Shiro Ikeda(The Institute of Statistical Mathematics), Jun'ichi Takeuchi(Kyushu University) |
|
4.2.2 | Affine Invariant Divergences for Robust Statistical Inference |
○Takafumi Kanamori(Nagoya University), Hironori Fujisawa(The Institute of Statistical Mathematics) |
|
4.3 Communication Systems II | |
Dec.12.Wed 15:40〜16:55 Cosmos: Room 3 Chair: Shingo Ata (Osaka City University) |
|
4.3.1 | The Error Control Scheme Considering the QoS for WBANs |
○Kento Takabayashi(Yokohama National University), Hirokazu Tanaka(University of Oulu Research Institute Japan), Chika Sugimoto(Yokohama National University), Ryuji Kohno(Yokohama National University) |
|
4.3.2 | A Study on Adaptive MAC Protocol for Controlling Communication |
◎Ryosuke Takahashi(Yokohama National University), Chika Sugimoto(Yokohama National University), Ryuji Kohno(Yokohama National University) |
|
4.3.3 | A Study on Error-Controlling Scheme in Multi-Hop Network |
◎Eriko Saeki(Yokohama National University), Chika Sugimoto(Yokohama National University), Ryuji Kohno(Yokohama National University) |
|
4.4 Cryptography III — Public Key Cryptography — | |
Dec.12.Wed 15:40〜16:55 Cattleya: Room 4 Chair: Kohtaro Tadaki (Chuo University) |
|
4.4.1 | A Public Key Reduction Method on Construction of Knapsack PKC Using a Random Sequence |
○Hiroto Hayashi(Osaka Electric Communication University), Yasuyuki Murakami(Osaka Electric Communication University) |
|
4.4.2 | A Public Key Distribution Scheme by Applying MHK Knapsack Public-Key Cryptosytem |
○Yasuyuki Murakami(Osaka Electro-Communication University), Shinsuke Hamasho(Osaka Electro-Communication University), Masao Kasahara(Osaka Gakuin University) |
|
4.4.3 | New Classes of Public Key Cryptosystems Constructed Based on Cyclic Codes, K(X)SE(1)PKC- Along with the Presentation of KM(IV)SE(1)PKC, Revised Version of K(IV)SE(1)PKC - |
○Masao Kasahara(21st. Century Information Culture Research Center) |
|
4.5 Compressed Sensing II | |
Dec.12.Wed 15:40〜16:55 Toyonokuni: Room 5 Chair: Ayaka Sakata (Tokyo Institute of Technology) |
|
4.5.1 | Revocery Algorithm in Compressed Sensing Based on Maximim a Posteriori Estimation |
○Koujin Takeda(Tokyo Institute of Technology), Yoshiyuki Kabashima(Tokyo Institute of Technology) |
|
4.5.2 | Approximate Message Passing Algorithm for Low-Rank Matrix Reconstruction |
○Ryosuke Matsushita(Kyoto University), Toshiyuki Tanaka(Kyoto University) |
|
4.5.3 | A Note on Tree Model-Based Compressed Sensing Based on Augmented Lagrangian Method |
◎Shunsuke Horii(Waseda University), Tota Suko(Waseda University), Toshiyasu Matsushima(Waseda University) |
|
5.1 Coding Theory V — Graph Theory — | |
Dec.13.Thu 9:00〜10:15 Silk Hall: Room 1 Chair: Hiroshi Kamabe (Gifu University) |
|
5.1.1 | Probabilistic Analysis on Minimum S-T Cut Weight of Irregular Random Graphs |
◎Yuki Fujii(Nagoya Institute of Technology), Tadashi Wadayama(Nagoya Institute of Technology) |
|
5.1.2 | Probabilistic Analysis on the Network Failure Probability over Irregular Graph Ensembles |
◎Akiyuki Yano(Nagoya Institute of Technology), Tadashi Wadayama(Nagoya Institute of Technology) |
|
5.1.3 | New Generalizations of the Bethe Approximation via Asymptotic Expansion |
○Ryuhei Mori(Kyoto University), Toshiyuki Tanaka(Kyoto University) |
|
5.2 Shannon Theory IV — Multi-terminal Information Theory — | |
Dec.13.Thu 9:00〜10:15 Rose: Room 2 Chair: Shigeaki Kuzuoka (Wakayama University) |
|
5.2.1 | On the Strong Converse Theorem for Discrete Memoryless Multiple Access Channels |
○Yasutada Oohama(University of Electro-Communications) |
|
5.2.2 | Finite Blocklength Analysis for Multiple Access Channels and Composite Hypothesis Testing |
○Hideki Yagi(University of Electro-Communications), Yasutada Oohama(University of Electro-Communications) |
|
5.2.3 | Second-Order Slepian-Wolf Source Coding Theorems |
○Ryo Nomura(Senshu University), Te Sun Han(NICT) |
|
5.3 Spread Spectrum Communications | |
Dec.13.Thu 9:00〜10:15 Cosmos: Room 3 Chair: Chenggao Han (University of Electro-Communications) |
|
5.3.1 | A Study on Visible Light CDMA Systems Using Inverted MPSC Sequences |
○Tomoko K. Matsushima(Polytechnic University), Yuya Murata(Tokyo Institute of Technology), Yasuaki Teramachi(Polytechnic University) |
|
5.3.2 | Consideration on Binary CSK Method Using Generalized MPSC and Polar Correlation Sequences for Optical CDMA |
◎Satoru Aoyama(Meijo University), Shogo Usami(Meijo University) |
|
5.3.3 | Coded OFDM System with Spreading Operation |
◎Minoru Kuribayashi(Kobe University), Masakatu Morii(Kobe University) |
|
5.4 Quantum Information Theory II — Quantum Cryptography and Asymptotic Theory — | |
Dec.13.Thu 9:00〜10:15 Cattleya: Room 4 Chair: Tsuyoshi Sasaki Usuda (Aichi Prefectural University) |
|
5.4.1 | Fast Exact Computation of the Tail Probability of a Hypergeometric Distribution and Its Application to Quantum Cryptography |
Kenta Sakakibara(Tokyo Institute of Technology), ○Ryutaroh Matsumoto(Tokyo Institute of Technology), Tomohiko Uyematsu(Tokyo Institute of Technology) |
|
5.4.2 | Universal Resolvability and Wiretap Channel Coding for Classical-Quantum Channels |
○Tomohiro Ogawa(University of Electro-Communications) |
|
5.4.3 | Second Order Asymptotic Theory of Entanglement Concentration and Dilution |
◎Wataru Kumagai(Tohoku University, Nagoya University), Masahito Hayashi(Nagoya University, National University of Singapore) |
|
5.5 Image Processing | |
Dec.13.Thu 9:00〜10:15 Toyonokuni: Room 5 Chair: Kazushi Mimura (Hiroshima City University) |
|
5.5.1 | On Limit of Single-Frame Super-Resolution |
◎Kotaro Yamaguchi(Kyushu University, ISIT), Masaori Kawakita(Kyushu University, ISIT), Norikazu Takahashi(Kyushu University, ISIT), Jun'ichi Takeuchi(Kyushu University, ISIT) |
|
5.5.2 | Evaluation of Muti-Directional Switching Median Filter by Deviding Images into Equal-Sized Blocks |
○Yasuki Yokoyama(Nagano National College of Technology), Takashi Miyazaki(Nagano National College of Technology), Mitsuo Sone(Tokai University), Hiroaki Yamamoto(Shinshu University) |
|
5.5.3 | 2-D Block Kalman Filter with Colored Driving Source for Image Restoration Method Using Adaptive Image Modeling |
◎Ryu Nagayasu(Tokyo University of Science), Naoto Hosoda(Tokyo University of Science, Suwa), Nari Tanabe(Tokyo University of Science, Suwa), Toshihiro Furukawa(Tokyo University of Science) |
|
6.1 Coding Theory VI — Cyclic Codes — | |
Dec.13.Thu 10:40〜11:55 Silk Hall: Room 1 Chair: Masaya Fujisawa (Tokyo University of Science) |
|
6.1.1 | On Properties of Proposed Algorithm for Cyclic Codes |
○Junru Zheng(Kyushu Women's University), Takayasu Kaida(Kinki University) |
|
6.1.2 | A Note on the Proposed Lower Bound and the Hartmann-Tzeng Bound of the Minimum Distance for Cyclic Codes |
○Takayasu Kaida(Kinki University), Junru Zheng(Kyushu Women's University) |
|
6.1.3 | Prime Factorization Method for Enumerating Generalized Quasi-Cyclic Codes |
◎Shota Tanzan(Toyota Technological Institute), Hajime Matsui(Toyota Technological Institute), Wang Chih-Wei(Toyota Technological Institute) |
|
6.2 Shannon Theory V — Source Coding — | |
Dec.13.Thu 10:40〜11:55 Rose: Room 2 Chair: Mitsuharu Arimura (Shonan Institute of Technology) |
|
6.2.1 | Rate-Distortion Function for Gamma Sources under Absolute-Log Distortion |
◎Kazuho Watanabe(Nara Institute of Science and Technology), Shiro Ikeda(The Institute of Statistical Mathematics) |
|
6.2.2 | Universal Wyner-Ziv Coding for Distortion Constrained General Side-Information |
○Shun Watanabe(University of Tokushima), Shigeaki Kuzuoka(Wakayama University) |
|
6.2.3 | Number Theoretic Analysis of the Induced Transformations Associated with the Interval Algorithm |
○Hiroshi Fujisaki(Kanazawa University) |
|
6.3 Iterative Signal Processing and Multi-user — Communications — | |
Dec.13.Thu 10:40〜11:55 Cosmos: Room 3 Chair: Hideki Yagi (University of Electro-Communications) |
|
6.3.1 | Iterative Channel Estimation Based on Biased Convolutional Codes |
○Keigo Takeuchi(University of Electro-Communications) |
|
6.3.2 | Large-System Analysis of Data-Dependent User Selection with General Modulation for MIMO Broadcast Channels |
○Keigo Takeuchi(University of Electro-Communications), Ralf R. Mueller(Norwegian University of Science and Technology), Tsutomu Kawabata(University of Electro-Communications) |
|
6.3.3 | K-User Parallel Concatenated Code for Synchronous Gaussian Multiple-Access Channel |
◎Guanghui Song(Doshisha University), Keiko Sanpei(Doshisha University), Jun Cheng(Doshisha University), Yoichiro Watanabe(Doshisha University) |
|
6.4 Quantum Information Theory III — Entanglement Purification — | |
Dec.13.Thu 10:40〜11:55 Cattleya: Room 4 Chair: Ryutaroh Matsumoto (Tokyo Institute of Technology) |
|
6.4.1 | Expectation of the Number of Distilled Pairs in Entanglement Purification Protocols |
◎Takahiro Segawa(Meijo University), Yoshiaki Yazaki(Meijo University), Shogo Usami(Meijo University), Tsuyoshi Sasaki Usuda(Aichi Prefectural University) |
|
6.4.2 | Effectiveness of 2-EPPs on Quantum Errors of One Kind |
◎Yoshiaki Yazaki(Meijo University), Shogo Usami(Meijo University), Tsuyoshi Sasaki Usuda(Aichi Prefectural University) |
|
6.4.3 | Property of EPPs for Phase Damped Entangled States |
◎Daichi Sasaki(Aichi Prefectural University), Yoshiaki Yazaki(Meijo University), Shigeyori Nagahashi(Nagoya Institute of Technology), Tsuyoshi Sasaki Usuda(Aichi Prefectural University) |
|
6.5 Audio Signal Processing | |
Dec.13.Thu 10:40〜11:55 Toyonokuni: Room 5 Chair: Yoshinao Shiraki(Toho University) |
|
6.5.1 | Fourier-Mukai Transform and Categorical-Signal Processing |
○Yoshinao Shiraki(Toho University) |
|
6.5.2 | Noise Suppression Method for Single Microphone in Real Environment |
◎Hiromasa Terashima(Tokyo University of Science, Suwa), Takahiro Natori(Tokyo University of Science), Masahide Wakamiko(Micron Seiko), Satoru Yokokawa(Chino Giken), Nari Tanabe(Tokyo University of Science, Suwa), Toshihiro Furukawa(Tokyo University of Science) |
|
6.5.3 | Vocal Suppression Method with Realistic Background Music |
◎Hidesumi Moriya(Tokyo University of Science Suwa), Hiromasa Terashima(Tokyo University of Science Suwa), Takahiro Natori(Tokyo University of Science), Nari Tanabe(Tokyo University of Science Suwa), Toshihiro Furukawa(Tokyo University of Science) |
|
7.1 Coding Theory VII — Algebraic Codes — | |
Dec.13.Thu 13:20〜14:35 Silk Hall: Room 1 Chair: Toshiyuki Kohnosu (Osaka Electro-Communication University) |
|
7.1.1 | Mutually Disjoint Combinatorial Designs from Quaternary Codes |
◎Yuya Anai(Kumamoto University), Misato Oka(Kumamoto University), Keisuke Shiromoto(Kumamoto University) |
|
7.1.2 | Decoding of Reed-Solomon Codes over 2-Adic Number Field with Discrete Fourier Transforms |
○Hajime Matsui(Toyota Technological Institute), Kazuyoshi Suzuki(Nagoya Industrial Science Research Institute) |
|
7.1.3 | On Improved Codes of Multipoint Codes from Cab Curves |
○Masaya Fujisawa(Tokyo University of Science), Shojiro Sakata(The University of Electro-Communications) |
|
7.2 Data Compression | |
Dec.13.Thu 13:20〜14:35 Rose: Room 2 Chair: Mikihiko Nishiara (Shinshu University) |
|
7.2.1 | On Antidictionary Coding by Means of Lossless Data Compression via Substring Enumeration |
○Takahiro Ota(Nagano Prefectural Institute of Technology), Hiroyoshi Morita(University of Electro-Communications) |
|
7.2.2 | Differential Base Pattern Coding for Cache Line Data Compression |
◎Kousuke Ota(Tokyo Institute of Technology), Satoshi Fujii(Tokyo Institute of Technology), Hiroaki Sasaki(Tokyo Institute of Technology), Haruhiko Kaneko(Tokyo Institute of Technology) |
|
7.2.3 | A Study on Entropy Coding Scheme for HEVC Video Coding |
○Kazuo Sugimoto(Mitsubishi Electric), Ryoji Hattori(Mitsubishi Electric), Shun-ichi Sekiguchi(Mitsubishi Electric), Tokumichi Murakami(Mitsubishi Electric) |
|
7.3 Coded Modulation | |
Dec.13.Thu 13:20〜14:35 Cosmos: Room 3 Chair: Hideki Yoshikawa (Tohoku Gakuin University) |
|
7.3.1 | Isometiric Labeling for Signal Constellations |
○Tatsumi Konishi(Aichi Institute of Technology), Masaru Ito(Aichi Institute of Technology), Masayuki Kagiya(Aichi Institute of Technology), Masakazu Mori(Aichi Institute of Technology) |
|
7.3.2 | Design of APSK Bit Labeling for Multilevel Coded Modulation |
◎Daiki Yoda(Yokohama National University), Hideki Ochiai(Yokohama National University) |
|
7.3.3 | An Extension of Multistage Threshold Decoding with Difference Register for 8PSK |
○Kazuyuki Kaneda(Sasebo National Collage of Technology), Haruo Ogiwara(Nagaoka University of Technology (Former)) |
|
7.4 Quantum Information Theory IV — Applications of Entanglement — | |
Dec.13.Thu 13:20〜14:35 Cattleya: Room 4 Chair: Shun Watanabe (University of Tokushima) |
|
7.4.1 | On Construction of Quantum Teleportation by Kossakowski-Ohya Scheme Based on Non-Maximum Entangled States Generated by Squeezed States |
◎Daiki Nakajima(Tokyo University of Science), Noboru Watanabe(Tokyo University of Science) |
|
7.4.2 | The Characteristic of the Estimated Limit with Entangled Coherent State |
◎Dan Murakami(Tamagawa University) |
|
7.4.3 | Optimization of Encodings of Entanglement-Assisted Classical Communication Using an Attenuated Quasi-Bell State |
◎Shota Yamaguchi(Aichi Prefectural University), Hiroki Takeuchi(Aichi Prefectural University), Tsuyoshi Sasaki Usuda(Aichi Prefectural University) |
|
7.5 Network Security — Fundamentals and Applications — | |
Dec.13.Thu 13:20〜14:35 Toyonokuni: Room 5 Chair: Ryo Nomura (Senshu University) |
|
7.5.1 | Model Selection of Non-Negative Matrix Factorization by MDL Criterion and Its Application to Botnet Detection |
◎Sayaka Yamauchi(ISIT, Kyushu University), Masanori Kawakita(ISIT, Kyushu University), Jun'ichi Takeuchi(ISIT, Kyushu University) |
|
7.5.2 | An Extended Privacy Preserving Regression Analysis |
◎Tota Suko(Waseda University), Shunsuke Horii(Waseda University), Manabu Kobayashi(Shonan Institute of Technology), Toshiyasu Matsushima(Waseda University), Shigeichi Hirasawa(Waseda University) |
|
7.5.3 | A Note on Virtual Money Concerning Seigniorage |
○Toru Inoue(Hiroshima Shudo University) |
|
8.1 Coding Theory VIII — Coding and Devices — | |
Dec.14.Fri 9:00〜10:15 Silk Hall: Room 1 Chair: Shogo Usami (Meijo University) |
|
8.1.1 | On Exclusive-OR Operations in Parallel Bit Decoding for Extended Hamming Codes |
○Ken-ichi Iwata(University of Fukui), Reiya Ooshima(University of Fukui) |
|
8.1.2 | A Floating Code Construction Using Coset Coding with Hamming Code |
◎Naoyoshi Okamae(Osaka University), Toru Fujiwara(Osaka University), Yuichi Kaji(Nara Institute of Science and Technology) |
|
8.1.3 | Construction and Code Rate of Multiple Error Correcting WOM-Codes |
◎Hidetoshi Utsunomiya(Gifu University), Hiroshi Kamabe(Gifu University) |
|
8.2 Information Network | |
Dec.14.Fri 9:00〜10:15 Rose: Room 2 Chair: Takahiro Ota (Nagano Prefectural Institute of Technology) |
|
8.2.1 | On Pessimistic Coding for Queueing Timing Channel |
○Mikihiko Nishiara(Shinshu University), Naoki Fujiyama(SCSK) |
|
8.2.2 | Subgraph Extraction from Large-Scale Networks Based on Eigenmode Analysis |
◎Takahiro Anzai(Kyoto Institute of Technology), Daisuke Umehara(Kyoto Institute of Technology), Koichiro Wakasugi(Kyoto Institute of Technology) |
|
8.2.3 | IS Simulation Using NS-2 for MMPP Packet Drop Probability |
◎Yuki Ishizuka(Nagaoka University of Technology), Kenji Nakagawa(Nagaoka University of Technology) |
|
8.3 Estimation for Communication Systems | |
Dec.14.Fri 9:00〜10:15 Cosmos: Room 3 Chair: Hideki Ochiai (Yokohama National University) |
|
8.3.1 | Signal Detection Using a Goodness of Fit Test Based on Probability Density Function |
◎Chiaki Honda(Osaka City University), Ikuo Oka(Osaka City University), Shingo Ata(Osaka City University) |
|
8.3.2 | Timing and Frequency Offsets Estimation by Amplitude Moments |
◎Yasuhiro Matsumura(Osaka City University), Ikuo Oka(Osaka City University), Shingo Ata(Osaka City University) |
|
8.3.3 | On Comparative Evaluation of Auto Regressive Estimation Methods |
◎Hiroki Nakayama(Osaka City University), Shingo Ata(Osaka City University), Ikuo Oka(Osaka City University) |
|
8.4 Cryptography IV — Attacks on Public Key Cryptography — | |
Dec.14.Fri 9:00〜10:15 Cattleya: Room 4 Chair: Ryuichi Sakai (Osaka Electro-Communication University) |
|
8.4.1 | Attack Against Public-Key Cryptosystem Provably as Secure as Subset Sum Problem |
○Shinsuke Hamasho(Osaka Electro-Communication University), Yasuyuki Murakami(Osaka Electro-Communication University) |
|
8.4.2 | Representative Decision Efficient for Pollard's Rho Method Attacking on G2 over Barreto-Naehrig Curve |
◎Yuki Kono(Okayama University), Tomonori Arii(Okayama University), Kenta Nekado(Okayama University), Yasuyuki Nogami(Okayama University) |
|
8.4.3 | Lazy Random Walk Efficient for Pollard's Rho Method Attacking on G3 over Barreto-Naehrig Curve |
◎Kenta Nekado(Okayama University), Yusuke Takai(Okayama University), Yuki Mori(Okayama University), Yasuyuki Nogami(Okayama University) |
|
9.1 Coding Theory IX — Computability — | |
Dec.14.Fri 10:40〜11:55 Silk Hall: Room 1 Chair: Manabu Kobayashi (Shonan Institute of Technology) |
|
9.1.1 | A New Method for Constructing Good Linear Codes; Update on the Minimum Distance of Some Linear Codes |
◎Motoyuki Watanabe(Kobe University), Masakatu Morii(Kobe University) |
|
9.1.2 | Analysis of Iterative Algorithm for MAX-XORSAT |
○Kazushi Mimura(Hiroshima City University), A.C.C. Coolen(King's College London) |
|
9.1.3 | Correctability of Efficiently Computable Additive Errors |
○Kenji Yasunaga(ISIT) |
|
9.2 Pattern Recognition and Machine Learning II | |
Dec.14.Fri 10:40〜11:55 Rose: Room 2 Chair: Tota Suko (Waseda University) |
|
9.2.1 | A Study of Recommender System to Improve Aggregate Diversity Based on Latent Probabilistic Model |
◎Takeshi Suzuki(Waseda University), Kenta Mikawa(Waseda University), Masayuki Goto(Waseda University) |
|
9.2.2 | A Study on Evaluation of Model-Based Collaborative Filtering Using Agent-Based Simulation |
◎Yusuke Izawa(Waseda University), Kenta Mikawa(Waseda University), Masayuki Goto(Waseda University) |
|
9.2.3 | A Note on Japanese Text Categorization Using Word and Character N-Grams |
○Makoto Suzuki(Shonan Institute of Technology), Naohide Yamagishi(Shonan Institute of Technology) |
|
9.3 Sequences | |
Dec.14.Fri 10:40〜11:30 Cosmos: Room 3 Chair: Hajime Matsui (Toyota Technological Institute) |
|
9.3.1 | Binary Sequences Generated by a Certain Primitive Polynomial of Odd Characteristic |
◎Kazuki Tada(Okayama University), Yusuke Takai(Okayama University), Yasuyuki Nogami(Okayama University), Satoshi Uehara(The University of Kitakyushu) |
|
9.3.2 | Huffman Sequence Derived from Quadratic Residues |
○Yoshihiro Tanada(Daiichi Institute of Technology), Kiminori Sato(Kagoshima University) |
|
9.4 Cryptography V — Systems and Evaluations — | |
Dec.14.Fri 10:40〜11:55 Cattleya: Room 4 Chair: Mitsugu Iwamoto (University of Electro-Communications) |
|
9.4.1 | Analysis on the Fingerprinting Capacity for the Memoryless and Fair Collusion Attacks |
◎Tomoya Narita(University of Electro-Communications), Hideki Yagi(University of Electro-Communications), Tsutomu Kawabata(University of Electro-Communications) |
|
9.4.2 | Spread Spectrum Watermarking Combined with Constant Weight Code |
◎Masaki Hakka(Kobe University), Minoru Kuribayashi(Kobe University), Masakatu Morii(Kobe University) |
|
9.4.3 | Security Evaluation of Piccolo Against Saturation Cryptanalysis |
◎Naoto Kobayashi(Tokyo University of Science), Toshinobu Kaneko(Tokyo University of Science) |
|
◎:The presentation for SITA encouragement award, ○:A regular presentation |