1.1 Coding Theory I — Iterative Algorithm —
Dec.12.Wed 9:00〜10:15 Silk Hall: Room 1
Chair: Kenta Kasai (Tokyo Institute of Technology)

1.1.1  Escape Method from Local Maximum Using the Estimated SNR for Multi-Bit GDBF Decoding without Any Threshold
 
◎Ryoji Haga(Meijo University), Shogo Usami(Meijo University)
1.1.2  Performance Evaluation of Two-Bit Bit Flipping Decoding with Bias Terms
 
◎Koh Matsushita(Gifu University), Hiroshi Kamabe(Gifu University)
1.1.3  A Study on Sum-Product Decoding Performance of Convolutional Codes
 
○Toshiyuki Shohon(Kagawa National College of Technology)
   
1.2 Shannon Theory I — Channel Coding I —
Dec.12.Wed 9:00〜10:15 Rose: Room 2
Chair: Yasutada Oohama (University of Electro-Communications)

1.2.1  Random-Coding Exponential Error Bounds for Channels with Action-Dependent States
 
◎Tetsunao Matsuta(Tokyo Institute of Technology), Tomohiko Uyematsu(Tokyo Institute of Technology)
1.2.2  Error Probability in Information Transmission over Continuous-Time White Gaussian Channels with Feedback
 
○Shunsuke Ihara(Nagoya University)
1.2.3  Error Probability in Information Transmission over Discrete-Time Stationary Gaussian Channels with Feedback
 
○Shunsuke Ihara(Nagoya University)
   
1.3 Coding for Magnetic Recording Devices I
Dec.12.Wed 9:00〜10:15 Cosmos: Room 3
Chair: Motohiko Isaka (Kwansei Gakuin University)

1.3.1  On the Irreducibility of Certain Shifts of Finite Type
 
◎Tetsuya Kobayashi(The University of Electro-Communications),
Akiko Manada(The University of Electro-Communications),
Takahiro Ota(Nagano Prefectural Institute of Technology),
Hiroyoshi Morita(The University of Electro-Communications)
1.3.2  Two-Dimensional Maximum Transition Run Codes for Digital Magnetic Recording Channels
 
○Hidetoshi Saito(Kogakuin University), Masashi Kossuge(Kogakuin University),
Daichi Shibamoto(Kogakuin University)
1.3.3  Redundant Adaptive Data Allocation for Energy Efficient Dependable Disk Arrays
 
◎Viet Ta Hong(Tokyo Institute of Technology), Kousuke Oota(Tokyo Institute of Technology),
Haruhiko Kaneko(Tokyo Institute of Technology)
   
1.4 Cryptography I — Information Theoretic Cryptography —
Dec.12.Wed 9:00〜10:15 Cattleya: Room 4
Chair: Hiroki Koga (Tsukuba University)

1.4.1  Information Theoretic Security and Variational Distance -Renner's Reply and Reply to Renner-
 
○Osamu Hirota(Tamagawa University)
1.4.2  Reconstruction of a Secret from Incomplete Shares on Shamir's Secret Sharing
 
◎Takafumi Yamamoto(Tokyo Institute of Technology), Wakaha Ogata(Tokyo Institute of Technology)
1.4.3  A Consideration on Minimum Bandwidth Regenerating Codes for Functions
 
○Takahiro Yoshida(Aoyama Gakuin University), Hajime Jinushi(Aoyama Gakuin University)
   
1.5 Signal Processing I
Dec.12.Wed 9:00〜10:15 Toyonokuni: Room 5
Chair: Tetsuya Kojima (Tokyo National College of Technology)

1.5.1  Evaluations of a Flexible MIMO Radar System Using Signal Cross-Correlation
 
◎Katsuhiro Minoru(Kyoto Institute of Technology), Daisuke Umehara(Kyoto Institute of Technology),
Koichiro Wakasugi(Kyoto Institute of Technology)
1.5.2  Affine Projection Type Blind Multiuser Detection for MIMO-DS-CDMA Communications
 
◎Shota Ohba(Tokyo University of Science), Takahiro Natori(Tokyo University of Science),
Nari Tanabe(Tokyo University of Science, Suwa), Toshihiro Hurukawa(Tokyo University of Science)
1.5.3  Robust Channel Estimation Method for MIMO-OFDM System
 
◎Takahiro Natori(Tokyo University of Science), Nari Tanabe(Tokyo University of Science, Suwa),
Toshihiro Furukawa(Tokyo University of Science)
   
2.1 Coding Theory II — Decoding of LDPC Codes —
Dec.12.Wed 10:40〜11:55 Silk Hall: Room 1
Chair: Masanori Hirotomo (Saga University)

2.1.1  Stability Condition for Non-Binary LDPC Codes over Galois Field
 
○Takayuki Nozaki(Tokyo Institute of Technology), Kenta Kasai(Tokyo Institute of Technology),
Kohichi Sakaniwa(Tokyo Institute of Technology)
2.1.2  Log-Likelihood Ratio Calculation for Iterative Decoding on Rayleigh Fading Channels Using Padé Approximation
 
◎Gou Hosoya(Tokyo University of Science), Hiroyuki Yashima(Tokyo University of Science)
2.1.3  Unequal Rate Repeat Accumulate Codes for Two-User Gaussian Multiple Access Channel
 
◎Meilin He(Doshisha University), Guanghui Song(Doshisha University), Jun Cheng(Doshisha University), Yoichiro Watanabe(Doshisha University)
   
2.2 Shannon Theory II — Entropy and Information —
Dec.12.Wed 10:40〜11:30 Rose: Room 2
Chair: Shiro Ikeda (Institute of Statistical Mathematics)

2.2.1  Some Remarks on the Generalized Poor-Verdú Error Bound
 
◎Takuya Kubo(The University of Electro-Communications),
Hiroshi Nagaoka(The University of Electro-Communications)
2.2.2  Exponential Families, Mixture Families, and the Relative Entropy: An Information-Geometrical Study
 
○Hiroshi Nagaoka(The University of Electro-Communications)
   
2.3 Coding for Magnetic Recording Devices II
Dec.12.Wed 10:40〜11:55 Cosmos: Room 3
Chair: Akiko Manada (University of Electro-Communications)

2.3.1  Selecting Method of Marker Code for Insertion/Deletion/Substitution Error Correction
 
◎Masato Inoue(Tokyo Institute of Technology), Haruhiko Kaneko(Tokyo Institute of Technology)
2.3.2  Index-Less Indexed Flash Codes Using Inversion Bit
 
○Masashi Ohkawa(Gifu University), Hiroshi Kamabe(Gifu University)
2.3.3  Applying Resizable-Cluster Method in Binary-Indexed Flash Code
 
◎Michael Joseph Tan(Nara Institute of Science and Technology),
Yuichi Kaji(Nara Institute of Science and Technology)
   
2.4 Quantum Information Theory I — Fundamentals and Quantum Communications —
Dec.12.Wed 10:40〜11:55 Cattleya: Room 4
Chair: Tomohiro Ogawa (University of Electro-Communications)

2.4.1  Uncertainty Relations of Monotone Pair Skew Informations
 
○Kenjiro Yanagi(Yamaguchi University)
2.4.2  Toward Generalization of Formula of Channel Matrix for Classical-Quantum Channel
 
◎Yoshihiro Ishikawa(Aichi Prefectural University), Keisuke Shiromoto(Kumamoto University),
Tsuyoshi Sasaki Usuda(Aichi Prefectural University)
2.4.3  Optimization of Feedback in Quasi-Optimum Quantum Receiver for M-Ary Signals
 
◎Takashi Kondo(Aichi Prefectural University), Hiro Yamashita(Aichi Prefectural University),
Shogo Usami(Meijo University), Tsuyoshi Sasaki Usuda(Aichi Prefectural University)
   
2.5 Signal Processing II
Dec.12.Wed 10:40〜11:55 Toyonokuni: Room 5
Chair: Tetsuo Tsujioka (Osaka City University)

2.5.1  DLS Type Zero-Forcing Equalizer for Multipath Fading Environment
 
◎Ryo Horiuchi(Tokyo University of Science,Suwa), Toshihiro Yagi(Tokyo University of Science),
Takahiro Natori(Tokyo University of Science), Nari Tanabe(Tokyo University of Science,Suwa),
Toshihiro Furukawa(Tokyo University of Science)
2.5.2  A Study on Packet Design to Realize Position Estimation as Well as Information-Communication for Mobile Robot Using Image Information
 
◎Ryo Iwakura(Yokohama National University), Chika Sugimoto(Yokohama National University),
Ryuji Kohno(Yokohama National University)
2.5.3  A Study on Interference Cancellation Technique to Improve Detection Accuracy for UWB Ground Penetrating Radar
 
◎Yuya Kazumoto(Yokohama National University), Chika Sugimoto(Yokohama National University),
Ryuji Kohno(Yokohama National University)
   
3.1 Coding Theory III — Weight Distribution of LDPC Codes —
Dec.12.Wed 14:00〜15:15 Silk Hall: Room 1
Chair: Yuichi Kaji (Nara Institute of Science and Technology)

3.1.1  Weight Distributions for Non-Binary Cluster LDPC Codes
 
◎Masaki Maehara(Tokyo Institute of Technology), Takayuki Nozaki(Tokyo Institute of Technology),
Kenta Kasai(Tokyo Institute of Technology), Kohichi Sakaniwa(Tokyo Institute of Technology)
3.1.2  A Probabilistic Method for Computing the Weight Distribution of Non-Binary LDPC Codes
 
◎Jun'ichi Tsurumi(Kobe University), Masanori Hirotomo(Saga University), Masakatu Morii(Kobe University)
3.1.3  A Method for Computing the Weight Spectrum of LDPC Convolutional Codes Constructed from Quasi-Cyclic Codes
 
○Masanori Hirotomo(Saga University), Masakatu Morii(Kobe University)
   
3.2 Shannon Theory III — Channel Coding II —
Dec.12.Wed 14:00〜15:15 Rose: Room 2
Chair: Ken-ichi Iwata (University of Fukui)

3.2.1  Central Limit Theorem and Sparse Superposition Codes
 
◎Yoshinari Takeishi(Kyushu University, ISIT), Masanori Kawakita(Kyushu University, ISIT),
Jun'ichi Takeuchi(Kyushu University, ISIT)
3.2.2  Constructions of Code for General Channel and Lossy Code for General Source.
 
○Jun Muramastu(NTT Corporation)
3.2.3  Alternative General Formuras for Channel Capacity and Rate-Distortion Region
 
○Jun Muramastu(NTT Corporation)
   
3.3 Communication Systems I
Dec.12.Wed 14:00〜15:15 Cosmos: Room 3
Chair: Keigo Takeuchi (University of Electro-Communications)

3.3.1  A Consideration on Average Power Reduction Capability of Coded Trellis Shaping
 
◎Ryota Yoshizawa(Yokohama National University), Hideki Ochiai(Yokohama National University)
3.3.2  Linear Time ADMM Decoding for LDPC Codes over MIMO Channels
 
○Manabu Kobayashi(Shonan Institute of Technology), Shunsuke Horii(Waseda University),
Toshiyasu Matsushima(Waseda University), Shigeichi Hirasawa(Waseda University)
3.3.3  A Method of Selecting Proper Cooperative Nodes for Collaborative Sensing in Cognitive Radio System
 
◎Yusuke Sugimoto(Yokohama National University), Chika Sugimoto(Yokohama National University),
Ryuji Kohno(Yokohama National University)
   
3.4 Cryptography II — Signature Scheme, ID base cryptography —
Dec.12.Wed 14:00〜15:15 Cattleya: Room 4
Chair: Wakaha Ogata (Tokyo Institute of Technology)

3.4.1  A Secure Instantiation of the Random Oracle by a Computable Function
 
○Kohtaro Tadaki(Chuo University), Norihisa Doi(Chuo University)
3.4.2  Notes on Key Generation for Identity Based Key Sharing Scheme with Composite Modulus
 
○Ryuichi Sakai(Osaka Electro-Communication University),
Yasuyuki Murakami(Osaka Electro-Communication University), Masao Kasahara(Osaka Gakuin University)
3.4.3  Implementation of Xate Pairing over Barreto-Naehrig Curve with OEF
 
◎Shoichi Akagi(Okayama University), Yuki Mori(Okayama University), Kenta Nekado(Okayama University), Yasuyuki Nogami(Okayama University)
   
3.5 Compressed Sensing I
Dec.12.Wed 14:00〜15:15 Toyonokuni: Room 5
Chair: Koujin Takeda (Tokyo Institute of Technology)

3.5.1  Sample Complexity in Dictionary Learning: Approach from Statistical Mechanics
 
◎Ayaka Sakata(Tokyo Institute of Technology), Yoshiyuki Kabashima(Tokyo Institute of Technology)
3.5.2  Tradeoff between Compression Rate and Signal-to-Noise Ratio in Compressed Sensing
 
◎Kei Sano(Kyoto University), Ryosuke Matsushita(Kyoto University), Toshiyuki Tanaka(Kyoto University)
3.5.3  Two-Dimensional Approximate Message Passing for Compressed Sensing
 
○Kazushi Mimura(Hiroshima City University), Jumpei Sugimoto(Yamaguchi University),
Akira Hirabayashi(Yamaguchi University)
   
4.1 Coding Theory IV — Convolutional Codes —
Dec.12.Wed 15:40〜16:55 Silk Hall: Room 1
Chair: Toshihiro Niinomi (Tokyo City University)

4.1.1  A Study on Constructing High Rate Punctured Convolutional Codes by Using Dual Codes
 
◎Kana Kikuchi(Kinki University), Sen Moriya(Kinki University), Hiroshi Sasano(Kinki University)
4.1.2  Starting (Ending) State Estimation in Error-Trellises for Tailbiting Convolutional Codes
 
○Masato Tajima(University of Toyama), Koji Okino(University of Toyama)
4.1.3  Novel Interleaver Design and Its Application in Coded OFDM
 
○Chenggao Han(University of Electro-Communications),
Takeshi Hashimoto(University of Electro-Communications)
   
4.2 Pattern Recognition and Machine Learning I
Dec.12.Wed 15:40〜16:30 Rose: Room 2
Chair: Hiroshi Nagaoka (University of Electro-Communications)

4.2.1  A Study of Bayes Risk with Bregman Divergence Loss Function
 
○Shiro Ikeda(The Institute of Statistical Mathematics), Jun'ichi Takeuchi(Kyushu University)
4.2.2  Affine Invariant Divergences for Robust Statistical Inference
 
○Takafumi Kanamori(Nagoya University), Hironori Fujisawa(The Institute of Statistical Mathematics)
   
4.3 Communication Systems II
Dec.12.Wed 15:40〜16:55 Cosmos: Room 3
Chair: Shingo Ata (Osaka City University)

4.3.1  The Error Control Scheme Considering the QoS for WBANs
 
○Kento Takabayashi(Yokohama National University),
Hirokazu Tanaka(University of Oulu Research Institute Japan),
Chika Sugimoto(Yokohama National University), Ryuji Kohno(Yokohama National University)
4.3.2  A Study on Adaptive MAC Protocol for Controlling Communication
 
◎Ryosuke Takahashi(Yokohama National University), Chika Sugimoto(Yokohama National University),
Ryuji Kohno(Yokohama National University)
4.3.3  A Study on Error-Controlling Scheme in Multi-Hop Network
 
◎Eriko Saeki(Yokohama National University), Chika Sugimoto(Yokohama National University),
Ryuji Kohno(Yokohama National University)
   
4.4 Cryptography III — Public Key Cryptography —
Dec.12.Wed 15:40〜16:55 Cattleya: Room 4
Chair: Kohtaro Tadaki (Chuo University)

4.4.1  A Public Key Reduction Method on Construction of Knapsack PKC Using a Random Sequence
 
○Hiroto Hayashi(Osaka Electric Communication University),
Yasuyuki Murakami(Osaka Electric Communication University)
4.4.2  A Public Key Distribution Scheme by Applying MHK Knapsack Public-Key Cryptosytem
 
○Yasuyuki Murakami(Osaka Electro-Communication University),
Shinsuke Hamasho(Osaka Electro-Communication University), Masao Kasahara(Osaka Gakuin University)
4.4.3  New Classes of Public Key Cryptosystems Constructed Based on Cyclic Codes, K(X)SE(1)PKC- Along with the Presentation of KM(IV)SE(1)PKC, Revised Version of K(IV)SE(1)PKC -
 
○Masao Kasahara(21st. Century Information Culture Research Center)
   
4.5 Compressed Sensing II
Dec.12.Wed 15:40〜16:55 Toyonokuni: Room 5
Chair: Ayaka Sakata (Tokyo Institute of Technology)

4.5.1  Revocery Algorithm in Compressed Sensing Based on Maximim a Posteriori Estimation
 
○Koujin Takeda(Tokyo Institute of Technology), Yoshiyuki Kabashima(Tokyo Institute of Technology)
4.5.2  Approximate Message Passing Algorithm for Low-Rank Matrix Reconstruction
 
○Ryosuke Matsushita(Kyoto University), Toshiyuki Tanaka(Kyoto University)
4.5.3  A Note on Tree Model-Based Compressed Sensing Based on Augmented Lagrangian Method
 
◎Shunsuke Horii(Waseda University), Tota Suko(Waseda University),
Toshiyasu Matsushima(Waseda University)
   
5.1 Coding Theory V — Graph Theory —
Dec.13.Thu 9:00〜10:15 Silk Hall: Room 1
Chair: Hiroshi Kamabe (Gifu University)

5.1.1  Probabilistic Analysis on Minimum S-T Cut Weight of Irregular Random Graphs
 
◎Yuki Fujii(Nagoya Institute of Technology), Tadashi Wadayama(Nagoya Institute of Technology)
5.1.2  Probabilistic Analysis on the Network Failure Probability over Irregular Graph Ensembles
 
◎Akiyuki Yano(Nagoya Institute of Technology), Tadashi Wadayama(Nagoya Institute of Technology)
5.1.3  New Generalizations of the Bethe Approximation via Asymptotic Expansion
 
○Ryuhei Mori(Kyoto University), Toshiyuki Tanaka(Kyoto University)
   
5.2 Shannon Theory IV — Multi-terminal Information Theory —
Dec.13.Thu 9:00〜10:15 Rose: Room 2
Chair: Shigeaki Kuzuoka (Wakayama University)

5.2.1  On the Strong Converse Theorem for Discrete Memoryless Multiple Access Channels
 
○Yasutada Oohama(University of Electro-Communications)
5.2.2  Finite Blocklength Analysis for Multiple Access Channels and Composite Hypothesis Testing
 
○Hideki Yagi(University of Electro-Communications),
Yasutada Oohama(University of Electro-Communications)
5.2.3  Second-Order Slepian-Wolf Source Coding Theorems
 
○Ryo Nomura(Senshu University), Te Sun Han(NICT)
   
5.3 Spread Spectrum Communications
Dec.13.Thu 9:00〜10:15 Cosmos: Room 3
Chair: Chenggao Han (University of Electro-Communications)

5.3.1  A Study on Visible Light CDMA Systems Using Inverted MPSC Sequences
 
○Tomoko K. Matsushima(Polytechnic University), Yuya Murata(Tokyo Institute of Technology),
Yasuaki Teramachi(Polytechnic University)
5.3.2  Consideration on Binary CSK Method Using Generalized MPSC and Polar Correlation Sequences for Optical CDMA
 
◎Satoru Aoyama(Meijo University), Shogo Usami(Meijo University)
5.3.3  Coded OFDM System with Spreading Operation
 
◎Minoru Kuribayashi(Kobe University), Masakatu Morii(Kobe University)
   
5.4 Quantum Information Theory II — Quantum Cryptography and Asymptotic Theory —
Dec.13.Thu 9:00〜10:15 Cattleya: Room 4
Chair: Tsuyoshi Sasaki Usuda (Aichi Prefectural University)

5.4.1  Fast Exact Computation of the Tail Probability of a Hypergeometric Distribution and Its Application to Quantum Cryptography
 
Kenta Sakakibara(Tokyo Institute of Technology), ○Ryutaroh Matsumoto(Tokyo Institute of Technology), Tomohiko Uyematsu(Tokyo Institute of Technology)
5.4.2  Universal Resolvability and Wiretap Channel Coding for Classical-Quantum Channels
 
○Tomohiro Ogawa(University of Electro-Communications)
5.4.3  Second Order Asymptotic Theory of Entanglement Concentration and Dilution
 
◎Wataru Kumagai(Tohoku University, Nagoya University),
Masahito Hayashi(Nagoya University, National University of Singapore)
   
5.5 Image Processing
Dec.13.Thu 9:00〜10:15 Toyonokuni: Room 5
Chair: Kazushi Mimura (Hiroshima City University)

5.5.1  On Limit of Single-Frame Super-Resolution
 
◎Kotaro Yamaguchi(Kyushu University, ISIT), Masaori Kawakita(Kyushu University, ISIT),
Norikazu Takahashi(Kyushu University, ISIT), Jun'ichi Takeuchi(Kyushu University, ISIT)
5.5.2  Evaluation of Muti-Directional Switching Median Filter by Deviding Images into Equal-Sized Blocks
 
○Yasuki Yokoyama(Nagano National College of Technology),
Takashi Miyazaki(Nagano National College of Technology), Mitsuo Sone(Tokai University),
Hiroaki Yamamoto(Shinshu University)
5.5.3  2-D Block Kalman Filter with Colored Driving Source for Image Restoration Method Using Adaptive Image Modeling
 
◎Ryu Nagayasu(Tokyo University of Science), Naoto Hosoda(Tokyo University of Science, Suwa),
Nari Tanabe(Tokyo University of Science, Suwa), Toshihiro Furukawa(Tokyo University of Science)
   
6.1 Coding Theory VI — Cyclic Codes —
Dec.13.Thu 10:40〜11:55 Silk Hall: Room 1
Chair: Masaya Fujisawa (Tokyo University of Science)

6.1.1  On Properties of Proposed Algorithm for Cyclic Codes
 
○Junru Zheng(Kyushu Women's University), Takayasu Kaida(Kinki University)
6.1.2  A Note on the Proposed Lower Bound and the Hartmann-Tzeng Bound of the Minimum Distance for Cyclic Codes
 
○Takayasu Kaida(Kinki University), Junru Zheng(Kyushu Women's University)
6.1.3  Prime Factorization Method for Enumerating Generalized Quasi-Cyclic Codes
 
◎Shota Tanzan(Toyota Technological Institute), Hajime Matsui(Toyota Technological Institute),
Wang Chih-Wei(Toyota Technological Institute)
   
6.2 Shannon Theory V — Source Coding —
Dec.13.Thu 10:40〜11:55 Rose: Room 2
Chair: Mitsuharu Arimura (Shonan Institute of Technology)

6.2.1  Rate-Distortion Function for Gamma Sources under Absolute-Log Distortion
 
◎Kazuho Watanabe(Nara Institute of Science and Technology),
Shiro Ikeda(The Institute of Statistical Mathematics)
6.2.2  Universal Wyner-Ziv Coding for Distortion Constrained General Side-Information
 
○Shun Watanabe(University of Tokushima), Shigeaki Kuzuoka(Wakayama University)
6.2.3  Number Theoretic Analysis of the Induced Transformations Associated with the Interval Algorithm
 
○Hiroshi Fujisaki(Kanazawa University)
   
6.3 Iterative Signal Processing and Multi-user — Communications —
Dec.13.Thu 10:40〜11:55 Cosmos: Room 3
Chair: Hideki Yagi (University of Electro-Communications)

6.3.1  Iterative Channel Estimation Based on Biased Convolutional Codes
 
○Keigo Takeuchi(University of Electro-Communications)
6.3.2  Large-System Analysis of Data-Dependent User Selection with General Modulation for MIMO Broadcast Channels
 
○Keigo Takeuchi(University of Electro-Communications),
Ralf R. Mueller(Norwegian University of Science and Technology),
Tsutomu Kawabata(University of Electro-Communications)
6.3.3  K-User Parallel Concatenated Code for Synchronous Gaussian Multiple-Access Channel
 
◎Guanghui Song(Doshisha University), Keiko Sanpei(Doshisha University), Jun Cheng(Doshisha University), Yoichiro Watanabe(Doshisha University)
   
6.4 Quantum Information Theory III — Entanglement Purification —
Dec.13.Thu 10:40〜11:55 Cattleya: Room 4
Chair: Ryutaroh Matsumoto (Tokyo Institute of Technology)

6.4.1  Expectation of the Number of Distilled Pairs in Entanglement Purification Protocols
 
◎Takahiro Segawa(Meijo University), Yoshiaki Yazaki(Meijo University), Shogo Usami(Meijo University), Tsuyoshi Sasaki Usuda(Aichi Prefectural University)
6.4.2  Effectiveness of 2-EPPs on Quantum Errors of One Kind
 
◎Yoshiaki Yazaki(Meijo University), Shogo Usami(Meijo University),
Tsuyoshi Sasaki Usuda(Aichi Prefectural University)
6.4.3  Property of EPPs for Phase Damped Entangled States
 
◎Daichi Sasaki(Aichi Prefectural University), Yoshiaki Yazaki(Meijo University),
Shigeyori Nagahashi(Nagoya Institute of Technology), Tsuyoshi Sasaki Usuda(Aichi Prefectural University)
   
6.5 Audio Signal Processing
Dec.13.Thu 10:40〜11:55 Toyonokuni: Room 5
Chair: Yoshinao Shiraki(Toho University)

6.5.1  Fourier-Mukai Transform and Categorical-Signal Processing
 
○Yoshinao Shiraki(Toho University)
6.5.2  Noise Suppression Method for Single Microphone in Real Environment
 
◎Hiromasa Terashima(Tokyo University of Science, Suwa),
Takahiro Natori(Tokyo University of Science), Masahide Wakamiko(Micron Seiko),
Satoru Yokokawa(Chino Giken), Nari Tanabe(Tokyo University of Science, Suwa),
Toshihiro Furukawa(Tokyo University of Science)
6.5.3  Vocal Suppression Method with Realistic Background Music
 
◎Hidesumi Moriya(Tokyo University of Science Suwa),
Hiromasa Terashima(Tokyo University of Science Suwa), Takahiro Natori(Tokyo University of Science),
Nari Tanabe(Tokyo University of Science Suwa), Toshihiro Furukawa(Tokyo University of Science)
   
7.1 Coding Theory VII — Algebraic Codes —
Dec.13.Thu 13:20〜14:35 Silk Hall: Room 1
Chair: Toshiyuki Kohnosu (Osaka Electro-Communication University)

7.1.1  Mutually Disjoint Combinatorial Designs from Quaternary Codes
 
◎Yuya Anai(Kumamoto University), Misato Oka(Kumamoto University),
Keisuke Shiromoto(Kumamoto University)
7.1.2  Decoding of Reed-Solomon Codes over 2-Adic Number Field with Discrete Fourier Transforms
 
○Hajime Matsui(Toyota Technological Institute),
Kazuyoshi Suzuki(Nagoya Industrial Science Research Institute)
7.1.3  On Improved Codes of Multipoint Codes from Cab Curves
 
○Masaya Fujisawa(Tokyo University of Science), Shojiro Sakata(The University of Electro-Communications)
   
7.2 Data Compression
Dec.13.Thu 13:20〜14:35 Rose: Room 2
Chair: Mikihiko Nishiara (Shinshu University)

7.2.1  On Antidictionary Coding by Means of Lossless Data Compression via Substring Enumeration
 
○Takahiro Ota(Nagano Prefectural Institute of Technology),
Hiroyoshi Morita(University of Electro-Communications)
7.2.2  Differential Base Pattern Coding for Cache Line Data Compression
 
◎Kousuke Ota(Tokyo Institute of Technology), Satoshi Fujii(Tokyo Institute of Technology),
Hiroaki Sasaki(Tokyo Institute of Technology), Haruhiko Kaneko(Tokyo Institute of Technology)
7.2.3  A Study on Entropy Coding Scheme for HEVC Video Coding
 
○Kazuo Sugimoto(Mitsubishi Electric), Ryoji Hattori(Mitsubishi Electric),
Shun-ichi Sekiguchi(Mitsubishi Electric), Tokumichi Murakami(Mitsubishi Electric)
   
7.3 Coded Modulation
Dec.13.Thu 13:20〜14:35 Cosmos: Room 3
Chair: Hideki Yoshikawa (Tohoku Gakuin University)

7.3.1  Isometiric Labeling for Signal Constellations
 
○Tatsumi Konishi(Aichi Institute of Technology), Masaru Ito(Aichi Institute of Technology),
Masayuki Kagiya(Aichi Institute of Technology), Masakazu Mori(Aichi Institute of Technology)
7.3.2  Design of APSK Bit Labeling for Multilevel Coded Modulation
 
◎Daiki Yoda(Yokohama National University), Hideki Ochiai(Yokohama National University)
7.3.3  An Extension of Multistage Threshold Decoding with Difference Register for 8PSK
 
○Kazuyuki Kaneda(Sasebo National Collage of Technology),
Haruo Ogiwara(Nagaoka University of Technology (Former))
   
7.4 Quantum Information Theory IV — Applications of Entanglement —
Dec.13.Thu 13:20〜14:35 Cattleya: Room 4
Chair: Shun Watanabe (University of Tokushima)

7.4.1  On Construction of Quantum Teleportation by Kossakowski-Ohya Scheme Based on Non-Maximum Entangled States Generated by Squeezed States
 
◎Daiki Nakajima(Tokyo University of Science), Noboru Watanabe(Tokyo University of Science)
7.4.2  The Characteristic of the Estimated Limit with Entangled Coherent State
 
◎Dan Murakami(Tamagawa University)
7.4.3  Optimization of Encodings of Entanglement-Assisted Classical Communication Using an Attenuated Quasi-Bell State
 
◎Shota Yamaguchi(Aichi Prefectural University), Hiroki Takeuchi(Aichi Prefectural University),
Tsuyoshi Sasaki Usuda(Aichi Prefectural University)
   
7.5 Network Security — Fundamentals and Applications —
Dec.13.Thu 13:20〜14:35 Toyonokuni: Room 5
Chair: Ryo Nomura (Senshu University)

7.5.1  Model Selection of Non-Negative Matrix Factorization by MDL Criterion and Its Application to Botnet Detection
 
◎Sayaka Yamauchi(ISIT, Kyushu University), Masanori Kawakita(ISIT, Kyushu University),
Jun'ichi Takeuchi(ISIT, Kyushu University)
7.5.2  An Extended Privacy Preserving Regression Analysis
 
◎Tota Suko(Waseda University), Shunsuke Horii(Waseda University),
Manabu Kobayashi(Shonan Institute of Technology), Toshiyasu Matsushima(Waseda University),
Shigeichi Hirasawa(Waseda University)
7.5.3  A Note on Virtual Money Concerning Seigniorage
 
○Toru Inoue(Hiroshima Shudo University)
   
8.1 Coding Theory VIII — Coding and Devices —
Dec.14.Fri 9:00〜10:15 Silk Hall: Room 1
Chair: Shogo Usami (Meijo University)

8.1.1  On Exclusive-OR Operations in Parallel Bit Decoding for Extended Hamming Codes
 
○Ken-ichi Iwata(University of Fukui), Reiya Ooshima(University of Fukui)
8.1.2  A Floating Code Construction Using Coset Coding with Hamming Code
 
◎Naoyoshi Okamae(Osaka University), Toru Fujiwara(Osaka University),
Yuichi Kaji(Nara Institute of Science and Technology)
8.1.3  Construction and Code Rate of Multiple Error Correcting WOM-Codes
 
◎Hidetoshi Utsunomiya(Gifu University), Hiroshi Kamabe(Gifu University)
   
8.2 Information Network
Dec.14.Fri 9:00〜10:15 Rose: Room 2
Chair: Takahiro Ota (Nagano Prefectural Institute of Technology)

8.2.1  On Pessimistic Coding for Queueing Timing Channel
 
○Mikihiko Nishiara(Shinshu University), Naoki Fujiyama(SCSK)
8.2.2  Subgraph Extraction from Large-Scale Networks Based on Eigenmode Analysis
 
◎Takahiro Anzai(Kyoto Institute of Technology), Daisuke Umehara(Kyoto Institute of Technology),
Koichiro Wakasugi(Kyoto Institute of Technology)
8.2.3  IS Simulation Using NS-2 for MMPP Packet Drop Probability
 
◎Yuki Ishizuka(Nagaoka University of Technology), Kenji Nakagawa(Nagaoka University of Technology)
   
8.3 Estimation for Communication Systems
Dec.14.Fri 9:00〜10:15 Cosmos: Room 3
Chair: Hideki Ochiai (Yokohama National University)

8.3.1  Signal Detection Using a Goodness of Fit Test Based on Probability Density Function
 
◎Chiaki Honda(Osaka City University), Ikuo Oka(Osaka City University), Shingo Ata(Osaka City University)
8.3.2  Timing and Frequency Offsets Estimation by Amplitude Moments
 
◎Yasuhiro Matsumura(Osaka City University), Ikuo Oka(Osaka City University),
Shingo Ata(Osaka City University)
8.3.3  On Comparative Evaluation of Auto Regressive Estimation Methods
 
◎Hiroki Nakayama(Osaka City University), Shingo Ata(Osaka City University),
Ikuo Oka(Osaka City University)
   
8.4 Cryptography IV — Attacks on Public Key Cryptography —
Dec.14.Fri 9:00〜10:15 Cattleya: Room 4
Chair: Ryuichi Sakai (Osaka Electro-Communication University)

8.4.1  Attack Against Public-Key Cryptosystem Provably as Secure as Subset Sum Problem
 
○Shinsuke Hamasho(Osaka Electro-Communication University),
Yasuyuki Murakami(Osaka Electro-Communication University)
8.4.2  Representative Decision Efficient for Pollard's Rho Method Attacking on G2 over Barreto-Naehrig Curve
 
◎Yuki Kono(Okayama University), Tomonori Arii(Okayama University), Kenta Nekado(Okayama University), Yasuyuki Nogami(Okayama University)
8.4.3  Lazy Random Walk Efficient for Pollard's Rho Method Attacking on G3 over Barreto-Naehrig Curve
 
◎Kenta Nekado(Okayama University), Yusuke Takai(Okayama University), Yuki Mori(Okayama University), Yasuyuki Nogami(Okayama University)
   
9.1 Coding Theory IX — Computability —
Dec.14.Fri 10:40〜11:55 Silk Hall: Room 1
Chair: Manabu Kobayashi (Shonan Institute of Technology)

9.1.1  A New Method for Constructing Good Linear Codes; Update on the Minimum Distance of Some Linear Codes
 
◎Motoyuki Watanabe(Kobe University), Masakatu Morii(Kobe University)
9.1.2  Analysis of Iterative Algorithm for MAX-XORSAT
 
○Kazushi Mimura(Hiroshima City University), A.C.C. Coolen(King's College London)
9.1.3  Correctability of Efficiently Computable Additive Errors
 
○Kenji Yasunaga(ISIT)
   
9.2 Pattern Recognition and Machine Learning II
Dec.14.Fri 10:40〜11:55 Rose: Room 2
Chair: Tota Suko (Waseda University)

9.2.1  A Study of Recommender System to Improve Aggregate Diversity Based on Latent Probabilistic Model
 
◎Takeshi Suzuki(Waseda University), Kenta Mikawa(Waseda University), Masayuki Goto(Waseda University)
9.2.2  A Study on Evaluation of Model-Based Collaborative Filtering Using Agent-Based Simulation
 
◎Yusuke Izawa(Waseda University), Kenta Mikawa(Waseda University), Masayuki Goto(Waseda University)
9.2.3  A Note on Japanese Text Categorization Using Word and Character N-Grams
 
○Makoto Suzuki(Shonan Institute of Technology), Naohide Yamagishi(Shonan Institute of Technology)
   
9.3 Sequences
Dec.14.Fri 10:40〜11:30 Cosmos: Room 3
Chair: Hajime Matsui (Toyota Technological Institute)

9.3.1  Binary Sequences Generated by a Certain Primitive Polynomial of Odd Characteristic
 
◎Kazuki Tada(Okayama University), Yusuke Takai(Okayama University),
Yasuyuki Nogami(Okayama University), Satoshi Uehara(The University of Kitakyushu)
9.3.2  Huffman Sequence Derived from Quadratic Residues
 
○Yoshihiro Tanada(Daiichi Institute of Technology), Kiminori Sato(Kagoshima University)
   
9.4 Cryptography V — Systems and Evaluations —
Dec.14.Fri 10:40〜11:55 Cattleya: Room 4
Chair: Mitsugu Iwamoto (University of Electro-Communications)

9.4.1  Analysis on the Fingerprinting Capacity for the Memoryless and Fair Collusion Attacks
 
◎Tomoya Narita(University of Electro-Communications), Hideki Yagi(University of Electro-Communications), Tsutomu Kawabata(University of Electro-Communications)
9.4.2  Spread Spectrum Watermarking Combined with Constant Weight Code
 
◎Masaki Hakka(Kobe University), Minoru Kuribayashi(Kobe University), Masakatu Morii(Kobe University)
9.4.3  Security Evaluation of Piccolo Against Saturation Cryptanalysis
 
◎Naoto Kobayashi(Tokyo University of Science), Toshinobu Kaneko(Tokyo University of Science)


◎:The presentation for SITA encouragement award, ○:A regular presentation