Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, SIP, RCS |
2020-01-23 15:20 |
Hiroshima |
Hiroshima City Youth Center |
[Invited Talk]
Performance limitation analysis of control systems based on an information theoretic approach Hideaki Ishii (Tokyo Tech) IT2019-57 SIP2019-70 RCS2019-287 |
The study of networked control systems lies at the intersection of control theory and information theory. In this talk, ... [more] |
IT2019-57 SIP2019-70 RCS2019-287 p.129 |
IT |
2019-11-26 15:10 |
Kagoshima |
Kirishima Kokusai Hotel |
[Invited Talk]
Succinct Data Structures and Information Theory Kunihiko Sadakane (UTokyo) IT2019-33 |
Succinct data structures can compress data into their entropy and support efficient queries. In this paper, we explain ... [more] |
IT2019-33 pp.7-14 |
RCC, ITS, WBS |
2019-11-06 14:55 |
Nara |
Nara Institute of Science and Technology |
[Invited Talk]
Efficiency of information processing in the brain: Information theoretic approach Ryota Kobayashi (NII) WBS2019-35 ITS2019-26 RCC2019-66 |
Animals can survive because their brain processes information about the environment and transfer it to the nerve cells (... [more] |
WBS2019-35 ITS2019-26 RCC2019-66 p.63 |
ISEC, SITE, LOIS |
2019-11-02 10:00 |
Osaka |
Osaka Univ. |
Evolving Secret Sharing: Hierarchical Access Structure with Polynomial Share Size Sabyasachi Dutta (Univ. of Calgary), Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.) ISEC2019-76 SITE2019-70 LOIS2019-35 |
Secret sharing allows storing secret information in a distributed manner among several participants.
The original setti... [more] |
ISEC2019-76 SITE2019-70 LOIS2019-35 pp.93-98 |
IT, ISEC, WBS |
2019-03-08 10:50 |
Tokyo |
University of Electro-Communications |
The distribution of the conditional information leakage in binary symmetric erasure wiretap channels Ukyo Michiwaki, Yutaka Jitsumatsu (Kyushu Univ.), Yasutada Oohama (UEC) IT2018-118 ISEC2018-124 WBS2018-119 |
In Wyner's wiretap channel, information leakage is defined as mutual information between transmitter's messages and eave... [more] |
IT2018-118 ISEC2018-124 WBS2018-119 pp.263-268 |
WBS, IT, ISEC |
2018-03-08 10:50 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
The Access Structure of a Secret Sharing Scheme Using Locally Repairable Codes Masanobu Nakata, Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech) IT2017-107 ISEC2017-95 WBS2017-88 |
As a method to distribute and preserve secret information, a secret sharing scheme provides high confidentiality and red... [more] |
IT2017-107 ISEC2017-95 WBS2017-88 pp.25-30 |
WBS, IT, ISEC |
2018-03-09 10:15 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Information-Theoretically Secure Authentication Codes with Arbitration using Non-Uniformly Random Keys Miho Ishikawa, Junji Shikata (Yokohama National Univ.) IT2017-142 ISEC2017-130 WBS2017-123 |
The authentication code (A-code) is an information-theoretically secure authentication system which detects messages for... [more] |
IT2017-142 ISEC2017-130 WBS2017-123 pp.231-236 |
WBS, IT, ISEC |
2018-03-09 10:50 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
On Security Evaluation for Coset Coding in Wiretap Channel Coding Yuki Mori, Tomohiro Ogawa (UEC) IT2017-143 ISEC2017-131 WBS2017-124 |
According to wiretap channel coding by Wyner, it is possible to encode messages (or secret keys) so that the legitimate ... [more] |
IT2017-143 ISEC2017-131 WBS2017-124 pp.237-243 |
IT |
2017-09-08 13:00 |
Yamaguchi |
Centcore Yamaguchi Hotel |
[Invited Talk]
Broadcast Encryption with Information Theoretic Security
-- Classical Results and Recent Progress -- Yohei Watanabe (UEC) IT2017-44 |
Information-theoretically secure cryptographic protocols have become increasingly important due to progress of quantum c... [more] |
IT2017-44 pp.31-36 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 15:45 |
Tokyo |
|
Proposal of the concept of connecting HIMOJI-ontologies by mutual information of texts, and its case study
-- In the case to see latent texts as random variables -- Xianbo Song, Tetsuya Morizumi, Hirotsugu Kinoshita (Kanagawa Univ.) ISEC2017-26 SITE2017-18 ICSS2017-25 EMM2017-29 |
This paper is linked to the theme of database creation of "HIMOJI data" which has been studied at Kanagawa University. H... [more] |
ISEC2017-26 SITE2017-18 ICSS2017-25 EMM2017-29 pp.135-140 |
PRMU, SP |
2017-06-22 17:00 |
Miyagi |
|
Investigation of solution diversity about probabilistic latent semantic analysis using normalized mutual information Toshio Uchiyama (Hokkaido Info. Univ.) PRMU2017-31 SP2017-7 |
Probabilistic Latent Semantic Analysis (PLSA) and Latent Dirichlet
analysis are known as topic models to analyze text ... [more] |
PRMU2017-31 SP2017-7 pp.33-38 |
ISEC, WBS, IT |
2017-03-10 13:45 |
Tokyo |
TOKAI University |
Index Coding with Information-Theoretic Secrecy for Unintended Message Mami Takei, Hiroki Koga (Univ. Tsukuba) IT2016-130 ISEC2016-120 WBS2016-106 |
In this paper we consider the index coding problem, where multiple receivers decode respective intended messages from th... [more] |
IT2016-130 ISEC2016-120 WBS2016-106 pp.203-208 |
PRMU, SP, WIT, ASJ-H |
2016-06-13 15:00 |
Tokyo |
|
Improvement of probabilistic latent semantic analysis using weighted information theoretic clustering Toshio Uchiyama (Hokkaido Info. Univ.) PRMU2016-43 SP2016-9 WIT2016-9 |
Probabilistic Latent Semantic Analysis and Latent Dirichlet analysis are
models to analyze images and documents. This ... [more] |
PRMU2016-43 SP2016-9 WIT2016-9 pp.47-52 |
SITE, IPSJ-EIP |
2016-06-02 14:50 |
Kanagawa |
Institute of Information Security |
Secrecy Laws in Japan and communication technologies Makoto Koike (MK Microwave Research) SITE2016-4 |
Conventionally, the National Government Official Act, the Local Government Official Act, and the Self Defense Forces Act... [more] |
SITE2016-4 pp.37-41 |
IT, ISEC, WBS |
2016-03-10 15:30 |
Tokyo |
The University of Electro-Communications |
Secrecy Rates for the Gaussian Wiretap Channel with an Energy Transfer Cooperative Jammer Tomoya Komiyama, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) IT2015-122 ISEC2015-81 WBS2015-105 |
Wireless secure communications based on the information-theoretic security are attracting much attention.
In this pape... [more] |
IT2015-122 ISEC2015-81 WBS2015-105 pp.131-136 |
IT, ISEC, WBS |
2016-03-10 15:55 |
Tokyo |
The University of Electro-Communications |
Fundamental Properties on a Secret-key Cryptosystem with Guessing Secrecy for Plaintexts and Keys Shota Kamiya, Hiroki Koga (Tsukuba Unv.) IT2015-123 ISEC2015-82 WBS2015-106 |
In this paper we consider a secret-key cryptosystem with a wiretapper who tries to guess the plaintext corresponding to ... [more] |
IT2015-123 ISEC2015-82 WBS2015-106 pp.137-142 |
NC, IPSJ-BIO, IBISML, IPSJ-MPS (Joint) [detail] |
2015-06-25 11:10 |
Okinawa |
Okinawa Institute of Science and Technology |
Statistical and information-theoretical analysis of the sumo wrestling tournament Shoukei Gushiken, Ryota Miyata (Univ Ryukyus) IBISML2015-25 |
Duggan and Levitt (2002) proposed a statistical analysis method for the sumo wrestling tournament.
However, they focuse... [more] |
IBISML2015-25 pp.201-205 |
ISEC |
2015-05-15 15:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Cheating detectable multi-use password protected secret sharing secure against active adversary Atsunori Ichikawa, Wakaha Ogata (TIT) ISEC2015-4 |
(To be available after the conference date) [more] |
ISEC2015-4 pp.23-30 |
NLC, IPSJ-NL, SP, IPSJ-SLP, JSAI-SLUD (Joint) [detail] |
2014-12-16 16:40 |
Kanagawa |
Tokyo Institute of Technology (Suzukakedai Campus) |
Words have no meanings. (Digital Linguistics)
-- The Meaning Mechanism of Complex Concept 'Self-Reproducing Automata' -- Kimiaki Tokumaru (Natural Philosopher) NLC2014-35 |
In animals’ sign reflexes, signs are just triggers which activate reactive actions. Therefore, meanings reside not in si... [more] |
NLC2014-35 pp.23-28 |
PRMU, IBISML, IPSJ-CVIM [detail] |
2014-09-02 16:15 |
Ibaraki |
|
Rates of convergence of the universal Bayesian measure for continuous data Takanori Ayano, Joe Suzuki (Osaka Univ.) PRMU2014-53 IBISML2014-34 |
It is very important to estimate the probability of the data series accurately for applying MDL information criterion.
... [more] |
PRMU2014-53 IBISML2014-34 pp.143-146 |