Conference Date |
Fri, May 25, 2012 14:00 - 17:40 |
Topics |
|
Conference Place |
Center of Iiduka Research and Development |
Address |
680-41, Kawadu, Iiduka-shi, Fukuoka, 820-0067 Japan. |
Transportation Guide |
15minutes bus ride from JR Shin-Iiduka station. You may use the bus operated by Kyushu Institute of Technology from the station. (http://www.iizuka.kyutech.ac.jp/school_bus/, http://www.iizuka.kyutech.ac.jp/public/access) http://www.cird.or.jp/access.htm |
Contact Person |
Kinki University, Prof. Takayasu Kaida
+81-948-22-5655 |
Sponsors |
This conference is co-sponsored by IEEE IT Society Japan Chapter.
|
Announcement |
You are welcome to join the reception after the technical meeting. |
Fri, May 25 PM Source Coding Chair: Shigeki Miyake (NTT) 14:00 - 15:15 |
(1) |
14:00-14:25 |
A consideration on characteristics of Huffman codes for binary memoryless sources |
Takahiro Yoshida, Hajime Jinushi (Aoyama Gakuin Univ.) |
(2) |
14:25-14:50 |
On the relationship between the redundancy and the coding rate of FF codes |
Mitsuharu Arimura (Shonan Inst. Tech.), Hiroki Koga (Tsukuba Univ.), Ken-ichi Iwata (Fukui Univ.) |
(3) |
14:50-15:15 |
On the Heegard-Berger Coding Problem Under Logarithmic Distortion Measure |
Shigeaki Kuzuoka (Wakayama Univ.) |
Fri, May 25 PM Applications of Information Theory Chair: Kazushi Mimura (Hiroshima City Univ.) 15:25 - 16:15 |
(4) |
15:25-15:50 |
Biomedical Informatics R&D Center
-- Application of Informatics and Systems Engineering to Metabolic Systems -- |
Hiroyuki Kurata (Kyutech) |
(5) |
15:50-16:15 |
Analysis on Accumulate Distribution on Minimum Cut Weight of Weighted Random Graphs |
Yuki Fujii, Tadashi Wadayama (NIT) |
Fri, May 25 PM Information Theoretic Security Chair: Mitsugu Iwamoto (Univ. of Electro-Commununications) 16:25 - 17:40 |
(6) |
16:25-16:50 |
Broadcast Channels with Confidential Messages by Randomness Constrained Stochastic Encoder |
Shun Watanabe (Univ. of Tokushima), Yasutada Oohama (Univ. of Electro-Comm.) |
(7) |
16:50-17:15 |
A Secret Sharing Sche me Based on a Two-Dementional Code with Decodability by Mobile Phones |
Shuntaro Honjo, Hiroki Koga (Univ. Tsukuba) |
(8) |
17:15-17:40 |
Rational Secret Sharing for Non-Simultaneous Channels |
Akinori Kawachi (Tokyo Inst. of Tech.), Yoshio Okamoto (Univ. of Electro-Comm.), Keisuke Tanaka (Tokyo Inst. of Tech.), Kenji Yasunaga (ISIT) |