Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2023-03-14 09:25 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Security Anslysis of binary elliptic curve GLS254 Yue Gao (Osaka Univ.), ShuFan Wu (Taiwan Univ.), Atsuko Miyaji (Osaka Univ.) IT2022-73 ISEC2022-52 WBS2022-70 RCC2022-70 |
In now days, light weight system like Iot(Internet of Things) and FPGA have attracted many researchers and have applied... [more] |
IT2022-73 ISEC2022-52 WBS2022-70 RCC2022-70 pp.33-40 |
RCS, SR, SRW (Joint) |
2022-03-04 16:25 |
Online |
Online |
Behavioral Modeling of RF Power Amplifiers using Binary Neural Network Taishi Watanabe, Takeo Ohseki, Kosuke Yamazaki (KDDI Research) RCS2021-293 |
With the increase in bandwidth in mobile communication systems, the effect of performance degradation due to nonlinear d... [more] |
RCS2021-293 pp.207-211 |
QIT (2nd) |
2020-12-10 17:10 |
Online |
Online |
Quantum Algorithm for Finding the Optimal Variable Ordering for Binary Decision Diagrams Seiichiro Tani (NTT) |
An ordered binary decision diagram (OBDD) is a directed acyclic graph that represents a Boolean function.
Since OBDDs h... [more] |
|
NS |
2019-10-10 16:10 |
Aichi |
Nagoya Institute of Technology |
[Invited Talk]
On recent developments in network reliability computation using binary decision diagrams Jun Kawahara (Kyoto Univ.) NS2019-113 |
Given a network with static link failure probabilities, the network reliability is to compute the probability that two s... [more] |
NS2019-113 pp.59-62 |
MSS, CAS, IPSJ-AL [detail] |
2018-11-12 17:15 |
Shizuoka |
|
[Invited Talk]
Robust Optimization and its Application to Supervised Learning Akiko Takeda (U.Tokyo) CAS2018-67 MSS2018-43 |
There are various uncertainties in real-world problems. When formulating them as mathematical optimization problems, we ... [more] |
CAS2018-67 MSS2018-43 p.55 |
ISEC |
2017-09-04 14:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
New Public Key Encryption Scheme based on Code and Multivariate Polynomials in Binary Field Tomoyuki Okubo, Bagus Santoso (UEC) ISEC2017-45 |
In this paper, we try to combine the code-based public key encryption scheme, McEliece public key encryption scheme, and... [more] |
ISEC2017-45 pp.29-33 |
EMM |
2017-03-06 14:30 |
Okinawa |
Miyakojima Marin Terminal Building (Okinawa) |
[Poster Presentation]
Digital watermarking method using non-binary LDPC codes and its evaluation for JPEG compression Toyohiko Saeki, Takayuki Nozaki, Masaki Kawamura (Yamaguchi Univ.) EMM2016-87 |
We propose digital watermarking methods using non-binary LDPC codes and evaluate their robustness against JPEG compressi... [more] |
EMM2016-87 pp.7-12 |
RCS, SAT (Joint) |
2015-08-17 10:45 |
Fukuoka |
Fukuoka Univ. |
Performance Comparison of Near Optimal Non-Binary LDPC Codes and Turbo Signal Codes Toshiki Matsumine, Hideki Ochiai (Yokohama National Univ.) RCS2015-135 |
Binary turbo codes and LDPC codes are known to approach Shannon limit as the codeword length increases.On the other hand... [more] |
RCS2015-135 pp.19-24 |
IT |
2015-01-30 14:55 |
Chiba |
|
Proof of Conjecture on Nonexistence of Circulant Hadamard Matrices for Order > 4 Yoshimasa Oh-hashi IT2014-58 |
There are various kinds of binary periodic sequences with the two-level autocorrelation function. However, in case of th... [more] |
IT2014-58 pp.23-28 |
IT |
2015-01-30 15:20 |
Chiba |
|
Additional Proof on Circulant Hadamard Matrices Yoshimasa Oh-hashi IT2014-59 |
There are various kinds of binary periodic sequences with the two-level autocorrelation function. However,
in case of t... [more] |
IT2014-59 pp.29-34 |
NS, IN (Joint) |
2014-03-06 10:10 |
Miyazaki |
Miyazaki Seagia |
Counting pedestrians on bi-directional walkway using binary sensor array Shuto Fujii, Yoshiaki Taniguchi, Go Hasegawa, Morito Matsuoka (Osaka Univ.) NS2013-188 |
In this report, we propose a method for estimating the number of pedestrians walking in opposite directions, as in cases... [more] |
NS2013-188 pp.67-72 |
COMP |
2012-06-21 09:55 |
Hokkaido |
Hokkaido University |
Rich Operations for Manipulating Sequence Binary Decision Diagrams Shuhei Denzumi, Hiroki Arimura, Shin-ichi Minato (Hokkaido Univ.) COMP2012-13 |
Manipulating large sequence data is important problem in string processing field. In this paper, we deal with sequence b... [more] |
COMP2012-13 pp.9-16 |
IBISML |
2010-11-04 15:00 |
Tokyo |
IIS, Univ. of Tokyo |
[Poster Presentation]
Quantum Error Correction with Non-Binary LDPC Codes Kenta Kasai (Tokyo Inst. of Tech.), Manabu Hagiwara (AIST), Hideki Imai (Chuo Univ.), Kohichi Sakaniwa (Tokyo Inst. of Tech.) IBISML2010-77 |
Quantum error correction is used in quantum computing and quantum communications to protect quantum information from qua... [more] |
IBISML2010-77 pp.135-145 |
ISEC |
2004-09-17 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A trial of GNFS implementation (Part VI)
-- lattice sieve -- Kazumaro Aoki, Hiroki Ueda (NTT), Yuji Kida (Rikkyo Univ.) |
The number field sieve is considered as the fastest algorithm for factoring an integer which does not include small fact... [more] |
ISEC2004-68 pp.9-14 |