Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, ISEC, WBS |
2019-03-07 10:55 |
Tokyo |
University of Electro-Communications |
A Two-Step LZY Code by Excluding the Nodes Which Will Not be Used from the Candidate Set Mitsuharu Arimnura (Shonan Inst. Tech.) IT2018-92 ISEC2018-98 WBS2018-93 |
When blocks are parsed and encoded incrementally in the LZY code, which is a variation of the LZ78 code, the newly parse... [more] |
IT2018-92 ISEC2018-98 WBS2018-93 pp.103-108 |
RCS, SIP, IT |
2019-02-01 15:10 |
Osaka |
Osaka University |
[Encouragement Talk]
A study on polar code concatenation to chaos MIMO transmission scheme Keita Ito, Okamoto Eiji, Masuda Yoshihiro (NITech), Yamamoto Tetsuya (panasonic) IT2018-68 SIP2018-98 RCS2018-275 |
For secure and high-quality wireless transmission, we have proposed a chaos-multiple-input multiple-output (C-MIMO) tran... [more] |
IT2018-68 SIP2018-98 RCS2018-275 pp.191-196 |
ICSS |
2018-11-22 10:50 |
Kagoshima |
|
Identification Scheme Based on the Binary Syndrome Decoding Problem Using High Density Parity Check Codes Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2018-62 |
Most of the currently used identification schemes can not be safely used if factoring factorization and discrete logarit... [more] |
ICSS2018-62 pp.49-54 |
ISEC |
2018-09-07 11:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC (from CRYPTO 2018) Kan Yasuda (NTT) ISEC2018-55 |
In this talk we explain the content of “Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC... [more] |
ISEC2018-55 p.27 |
IT |
2018-09-05 09:45 |
Iwate |
Seionsou |
An Upper Bound on the Generalized Cayley Distance Akira Yamawaki, Hiroshi Kamabe, Shan Lu (Gifu Univ.) IT2018-28 |
Generalized Cayley distance is one of distances which are considered in permutation codes. The generalized Cayley distan... [more] |
IT2018-28 pp.7-12 |
KBSE, SS, IPSJ-SE [detail] |
2018-07-18 09:40 |
Hokkaido |
|
Proposal of a usage investigation tool of similar coding pattern Koki Ogasawara, Tetsuya Kanda, Katsuro Inoue (Osaka Univ) SS2018-1 KBSE2018-11 |
Coding pattern is a code snippet that appears repeatedly in source code. Reusing coding pattern helps software developer... [more] |
SS2018-1 KBSE2018-11 pp.1-6 |
CQ |
2018-06-01 10:30 |
Chiba |
Chiba Univ. Nishi-Chiba Campus, academic link center |
A Study on the Packet Loss Characteristics for High Quality Video Transmission over Wireless LAN Noriko Hiranuma, Yuki Asada, Tetsuro Fujii (Tokyo City Univ.) CQ2018-23 |
All digital media is now transmitted over IP based network and the demand for wireless is rapidly increasing. The new co... [more] |
CQ2018-23 pp.31-36 |
IT, EMM |
2018-05-17 14:25 |
Tokyo |
Ookayama Campus, Tokyo Institute of Technology |
A Two-Step Source Code Using the Parsing Count of LZ78 Code as the First Step Mitsuharu Arimura (Shonan Inst. Tech.), Hiroshi Nagaoka (Univ. of Electro-Communications) IT2018-2 EMM2018-2 |
The redundancy of a two-step source code has been analyzed using the shape of the parsing tree of the Lempel-Ziv-Yokoo c... [more] |
IT2018-2 EMM2018-2 pp.7-12 |
CS, CAS |
2018-03-13 15:30 |
Fukuoka |
Nishijin Plaza, Kyushu University |
On Reduction of Calculation Complexity of Polar Codes over Fading Channels Masaaki Ito, Fumio Takahata (Waseda Univ.) CAS2017-158 CS2017-112 |
Algorithms for improving performances of polar codes over fading channels have been proposed, but it seems to be a probl... [more] |
CAS2017-158 CS2017-112 pp.139-144 |
WBS, IT, ISEC |
2018-03-09 09:50 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Bayes Optimal AMP Decoder for Sparse Superposition Codes Yuwa Hatae (Kyushu Univ.), Kazushi Mimura (Hiroshima City Univ.), Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ.) IT2017-127 ISEC2017-115 WBS2017-108 |
Sparse superposition codes (SS codes), proposed by Barron and Joseph
in 2010, are
a class of error-correcting codes f... [more] |
IT2017-127 ISEC2017-115 WBS2017-108 pp.143-148 |
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2018-03-08 13:55 |
Shimane |
Okinoshima Bunka-Kaikan Bldg. |
CPSY2017-146 DC2017-102 |
Resistive RAM (ReRAM) is one of the most promising memory technologies due to its property such as high density, low-pow... [more] |
CPSY2017-146 DC2017-102 pp.257-262 |
SS |
2018-03-07 12:00 |
Okinawa |
|
A Determination Method of Locality Sensitive Hashing Parameters for Code Clone Detection Shogo Tokui (Osaka Univ.), Norihiro Yoshida (Nagoya Univ.), Eunjong Choi (NAIST), Katsuro Inoue (Osaka Univ.) SS2017-74 |
LSH (Locality-Sensitive Hashing) is a near neighbor search algorithm that performs probabilistic hashing of high-dimensi... [more] |
SS2017-74 pp.57-62 |
SAT, SANE (Joint) |
2018-02-22 12:30 |
Yamaguchi |
The Yamaguchi Chamber of Commerce and Industry |
A Simplified Initial Acquisition Scheme for WHCDM Based on Distribution Asymmetry of Demultiplexed Signal Energy Yuki Nagashima, Toshiharu Kojima (UEC) SAT2017-59 |
In helicopter satellite communications, the periodic channel blockage due to rotor blades is the most important problem ... [more] |
SAT2017-59 pp.19-24 |
RCS, NS (Joint) |
2017-12-14 10:50 |
Hiroshima |
Aster Plaza |
Consideration on Frozen Bits of Polar Codes under Rayleigh Fading Environments Taku Sugimoto (Kagawa Univ.), Satoshi Suyama, Satoshi Nagata (NTT DOCOMO), Nobuhiko Miki (Kagawa Univ.) RCS2017-250 |
This paper evaluates the influence of the design signal-to-noise power ratio (SNR) on the block error rate (BLER) perfor... [more] |
RCS2017-250 pp.1-6 |
MI |
2017-09-25 16:30 |
Chiba |
Chiba Univ. |
MI2017-46 |
(To be available after the conference date) [more] |
MI2017-46 pp.25-26 |
IT |
2017-09-08 10:15 |
Yamaguchi |
Centcore Yamaguchi Hotel |
Demonstration example of 1 block error correction similar to Reed-Solomon code for students of elementary school 4th or higher grades
-- At The Annual Science Festival at Miyakonojo Kosen -- Hirofumi Nakamura (NIT, Miyakonojo College) IT2017-41 |
This report is not a report on new technical knowledge, but is a report on an example of an initiative designed to help ... [more] |
IT2017-41 pp.15-20 |
WBS, MICT |
2017-07-13 13:45 |
Shizuoka |
ACT CITY |
[Poster Presentation]
Effect of Framed-DOOK using Block Error Correcting Code in Optical Wireless Channel Ran Sun, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.) WBS2017-14 MICT2017-16 |
For reducing the influence of background noise and inhibiting synchronization slip in optical wireless communication, fr... [more] |
WBS2017-14 MICT2017-16 pp.35-38 |
RCS |
2017-06-22 10:10 |
Okinawa |
Ishigaki Shoukou Kaikan |
A Study on Short-Length Block Codes Suitable for Real-Time Communication Applications Ryuichi Abe, Hideki Ochiai (YNU) RCS2017-64 |
Reed-Muller codes are known as one of the block codes that can be described by relatively simple trellis structure and t... [more] |
RCS2017-64 pp.85-90 |
RCS |
2017-04-24 11:45 |
Kagawa |
Kotohira Onsen Kotosankaku |
Performance Evaluation of Polar Codes Using Puncturing/Shortening Taku Sugimoto (Kagawa Univ.), Satoshi Suyama, Satoshi Nagata (NTT DOCOMO), Nobuhiko Miki (Kagawa Univ.) RCS2017-6 |
This paper evaluates the performance employing puncturing and shortening scheme used to overcome the problem in polar co... [more] |
RCS2017-6 pp.29-34 |
ISEC, WBS, IT |
2017-03-09 14:25 |
Tokyo |
TOKAI University |
Trellis Reduction for Tail-Biting Convolutional Codes Using Characteristic Matrices and Cyclically Shifted Code-Subsequences Masato Tajima IT2016-108 ISEC2016-98 WBS2016-84 |
Trellis reduction for tail-biting convolutional codes is investigated. A given tail-biting (TB) convolutional code is re... [more] |
IT2016-108 ISEC2016-98 WBS2016-84 pp.61-66 |