IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 78 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IT, SIP, RCS 2020-01-23
15:20
Hiroshima Hiroshima City Youth Center [Invited Talk] Performance limitation analysis of control systems based on an information theoretic approach
Hideaki Ishii (Tokyo Tech) IT2019-57 SIP2019-70 RCS2019-287
The study of networked control systems lies at the intersection of control theory and information theory. In this talk, ... [more] IT2019-57 SIP2019-70 RCS2019-287
p.129
IT 2019-11-26
15:10
Kagoshima Kirishima Kokusai Hotel [Invited Talk] Succinct Data Structures and Information Theory
Kunihiko Sadakane (UTokyo) IT2019-33
Succinct data structures can compress data into their entropy and support efficient queries. In this paper, we explain ... [more] IT2019-33
pp.7-14
RCC, ITS, WBS 2019-11-06
14:55
Nara Nara Institute of Science and Technology [Invited Talk] Efficiency of information processing in the brain: Information theoretic approach
Ryota Kobayashi (NII) WBS2019-35 ITS2019-26 RCC2019-66
Animals can survive because their brain processes information about the environment and transfer it to the nerve cells (... [more] WBS2019-35 ITS2019-26 RCC2019-66
p.63
ISEC, SITE, LOIS 2019-11-02
10:00
Osaka Osaka Univ. Evolving Secret Sharing: Hierarchical Access Structure with Polynomial Share Size
Sabyasachi Dutta (Univ. of Calgary), Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.) ISEC2019-76 SITE2019-70 LOIS2019-35
Secret sharing allows storing secret information in a distributed manner among several participants.
The original setti... [more]
ISEC2019-76 SITE2019-70 LOIS2019-35
pp.93-98
IT, ISEC, WBS 2019-03-08
10:50
Tokyo University of Electro-Communications The distribution of the conditional information leakage in binary symmetric erasure wiretap channels
Ukyo Michiwaki, Yutaka Jitsumatsu (Kyushu Univ.), Yasutada Oohama (UEC) IT2018-118 ISEC2018-124 WBS2018-119
In Wyner's wiretap channel, information leakage is defined as mutual information between transmitter's messages and eave... [more] IT2018-118 ISEC2018-124 WBS2018-119
pp.263-268
WBS, IT, ISEC 2018-03-08
10:50
Tokyo Katsusika Campas, Tokyo University of Science The Access Structure of a Secret Sharing Scheme Using Locally Repairable Codes
Masanobu Nakata, Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech) IT2017-107 ISEC2017-95 WBS2017-88
As a method to distribute and preserve secret information, a secret sharing scheme provides high confidentiality and red... [more] IT2017-107 ISEC2017-95 WBS2017-88
pp.25-30
WBS, IT, ISEC 2018-03-09
10:15
Tokyo Katsusika Campas, Tokyo University of Science Information-Theoretically Secure Authentication Codes with Arbitration using Non-Uniformly Random Keys
Miho Ishikawa, Junji Shikata (Yokohama National Univ.) IT2017-142 ISEC2017-130 WBS2017-123
The authentication code (A-code) is an information-theoretically secure authentication system which detects messages for... [more] IT2017-142 ISEC2017-130 WBS2017-123
pp.231-236
WBS, IT, ISEC 2018-03-09
10:50
Tokyo Katsusika Campas, Tokyo University of Science On Security Evaluation for Coset Coding in Wiretap Channel Coding
Yuki Mori, Tomohiro Ogawa (UEC) IT2017-143 ISEC2017-131 WBS2017-124
According to wiretap channel coding by Wyner, it is possible to encode messages (or secret keys) so that the legitimate ... [more] IT2017-143 ISEC2017-131 WBS2017-124
pp.237-243
IT 2017-09-08
13:00
Yamaguchi Centcore Yamaguchi Hotel [Invited Talk] Broadcast Encryption with Information Theoretic Security -- Classical Results and Recent Progress --
Yohei Watanabe (UEC) IT2017-44
Information-theoretically secure cryptographic protocols have become increasingly important due to progress of quantum c... [more] IT2017-44
pp.31-36
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
15:45
Tokyo   Proposal of the concept of connecting HIMOJI-ontologies by mutual information of texts, and its case study -- In the case to see latent texts as random variables --
Xianbo Song, Tetsuya Morizumi, Hirotsugu Kinoshita (Kanagawa Univ.) ISEC2017-26 SITE2017-18 ICSS2017-25 EMM2017-29
This paper is linked to the theme of database creation of "HIMOJI data" which has been studied at Kanagawa University. H... [more] ISEC2017-26 SITE2017-18 ICSS2017-25 EMM2017-29
pp.135-140
PRMU, SP 2017-06-22
17:00
Miyagi   Investigation of solution diversity about probabilistic latent semantic analysis using normalized mutual information
Toshio Uchiyama (Hokkaido Info. Univ.) PRMU2017-31 SP2017-7
Probabilistic Latent Semantic Analysis (PLSA) and Latent Dirichlet
analysis are known as topic models to analyze text ... [more]
PRMU2017-31 SP2017-7
pp.33-38
ISEC, WBS, IT 2017-03-10
13:45
Tokyo TOKAI University Index Coding with Information-Theoretic Secrecy for Unintended Message
Mami Takei, Hiroki Koga (Univ. Tsukuba) IT2016-130 ISEC2016-120 WBS2016-106
In this paper we consider the index coding problem, where multiple receivers decode respective intended messages from th... [more] IT2016-130 ISEC2016-120 WBS2016-106
pp.203-208
PRMU, SP, WIT, ASJ-H 2016-06-13
15:00
Tokyo   Improvement of probabilistic latent semantic analysis using weighted information theoretic clustering
Toshio Uchiyama (Hokkaido Info. Univ.) PRMU2016-43 SP2016-9 WIT2016-9
Probabilistic Latent Semantic Analysis and Latent Dirichlet analysis are
models to analyze images and documents. This ... [more]
PRMU2016-43 SP2016-9 WIT2016-9
pp.47-52
SITE, IPSJ-EIP 2016-06-02
14:50
Kanagawa Institute of Information Security Secrecy Laws in Japan and communication technologies
Makoto Koike (MK Microwave Research) SITE2016-4
Conventionally, the National Government Official Act, the Local Government Official Act, and the Self Defense Forces Act... [more] SITE2016-4
pp.37-41
IT, ISEC, WBS 2016-03-10
15:30
Tokyo The University of Electro-Communications Secrecy Rates for the Gaussian Wiretap Channel with an Energy Transfer Cooperative Jammer
Tomoya Komiyama, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) IT2015-122 ISEC2015-81 WBS2015-105
Wireless secure communications based on the information-theoretic security are attracting much attention.
In this pape... [more]
IT2015-122 ISEC2015-81 WBS2015-105
pp.131-136
IT, ISEC, WBS 2016-03-10
15:55
Tokyo The University of Electro-Communications Fundamental Properties on a Secret-key Cryptosystem with Guessing Secrecy for Plaintexts and Keys
Shota Kamiya, Hiroki Koga (Tsukuba Unv.) IT2015-123 ISEC2015-82 WBS2015-106
In this paper we consider a secret-key cryptosystem with a wiretapper who tries to guess the plaintext corresponding to ... [more] IT2015-123 ISEC2015-82 WBS2015-106
pp.137-142
NC, IPSJ-BIO, IBISML, IPSJ-MPS
(Joint) [detail]
2015-06-25
11:10
Okinawa Okinawa Institute of Science and Technology Statistical and information-theoretical analysis of the sumo wrestling tournament
Shoukei Gushiken, Ryota Miyata (Univ Ryukyus) IBISML2015-25
Duggan and Levitt (2002) proposed a statistical analysis method for the sumo wrestling tournament.
However, they focuse... [more]
IBISML2015-25
pp.201-205
ISEC 2015-05-15
15:00
Tokyo Kikai-Shinko-Kaikan Bldg. Cheating detectable multi-use password protected secret sharing secure against active adversary
Atsunori Ichikawa, Wakaha Ogata (TIT) ISEC2015-4
(To be available after the conference date) [more] ISEC2015-4
pp.23-30
NLC, IPSJ-NL, SP, IPSJ-SLP, JSAI-SLUD
(Joint) [detail]
2014-12-16
16:40
Kanagawa Tokyo Institute of Technology (Suzukakedai Campus) Words have no meanings. (Digital Linguistics) -- The Meaning Mechanism of Complex Concept 'Self-Reproducing Automata' --
Kimiaki Tokumaru (Natural Philosopher) NLC2014-35
In animals’ sign reflexes, signs are just triggers which activate reactive actions. Therefore, meanings reside not in si... [more] NLC2014-35
pp.23-28
PRMU, IBISML, IPSJ-CVIM [detail] 2014-09-02
16:15
Ibaraki   Rates of convergence of the universal Bayesian measure for continuous data
Takanori Ayano, Joe Suzuki (Osaka Univ.) PRMU2014-53 IBISML2014-34
It is very important to estimate the probability of the data series accurately for applying MDL information criterion.
... [more]
PRMU2014-53 IBISML2014-34
pp.143-146
 Results 21 - 40 of 78 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan