IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 60 of 214 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IT, ISEC, WBS 2019-03-07
10:55
Tokyo University of Electro-Communications A Two-Step LZY Code by Excluding the Nodes Which Will Not be Used from the Candidate Set
Mitsuharu Arimnura (Shonan Inst. Tech.) IT2018-92 ISEC2018-98 WBS2018-93
When blocks are parsed and encoded incrementally in the LZY code, which is a variation of the LZ78 code, the newly parse... [more] IT2018-92 ISEC2018-98 WBS2018-93
pp.103-108
RCS, SIP, IT 2019-02-01
15:10
Osaka Osaka University [Encouragement Talk] A study on polar code concatenation to chaos MIMO transmission scheme
Keita Ito, Okamoto Eiji, Masuda Yoshihiro (NITech), Yamamoto Tetsuya (panasonic) IT2018-68 SIP2018-98 RCS2018-275
For secure and high-quality wireless transmission, we have proposed a chaos-multiple-input multiple-output (C-MIMO) tran... [more] IT2018-68 SIP2018-98 RCS2018-275
pp.191-196
ICSS 2018-11-22
10:50
Kagoshima   Identification Scheme Based on the Binary Syndrome Decoding Problem Using High Density Parity Check Codes
Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2018-62
Most of the currently used identification schemes can not be safely used if factoring factorization and discrete logarit... [more] ICSS2018-62
pp.49-54
ISEC 2018-09-07
11:30
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC (from CRYPTO 2018)
Kan Yasuda (NTT) ISEC2018-55
In this talk we explain the content of “Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC... [more] ISEC2018-55
p.27
IT 2018-09-05
09:45
Iwate Seionsou An Upper Bound on the Generalized Cayley Distance
Akira Yamawaki, Hiroshi Kamabe, Shan Lu (Gifu Univ.) IT2018-28
Generalized Cayley distance is one of distances which are considered in permutation codes. The generalized Cayley distan... [more] IT2018-28
pp.7-12
KBSE, SS, IPSJ-SE [detail] 2018-07-18
09:40
Hokkaido   Proposal of a usage investigation tool of similar coding pattern
Koki Ogasawara, Tetsuya Kanda, Katsuro Inoue (Osaka Univ) SS2018-1 KBSE2018-11
Coding pattern is a code snippet that appears repeatedly in source code. Reusing coding pattern helps software developer... [more] SS2018-1 KBSE2018-11
pp.1-6
CQ 2018-06-01
10:30
Chiba Chiba Univ. Nishi-Chiba Campus, academic link center A Study on the Packet Loss Characteristics for High Quality Video Transmission over Wireless LAN
Noriko Hiranuma, Yuki Asada, Tetsuro Fujii (Tokyo City Univ.) CQ2018-23
All digital media is now transmitted over IP based network and the demand for wireless is rapidly increasing. The new co... [more] CQ2018-23
pp.31-36
IT, EMM 2018-05-17
14:25
Tokyo Ookayama Campus, Tokyo Institute of Technology A Two-Step Source Code Using the Parsing Count of LZ78 Code as the First Step
Mitsuharu Arimura (Shonan Inst. Tech.), Hiroshi Nagaoka (Univ. of Electro-Communications) IT2018-2 EMM2018-2
The redundancy of a two-step source code has been analyzed using the shape of the parsing tree of the Lempel-Ziv-Yokoo c... [more] IT2018-2 EMM2018-2
pp.7-12
CS, CAS 2018-03-13
15:30
Fukuoka Nishijin Plaza, Kyushu University On Reduction of Calculation Complexity of Polar Codes over Fading Channels
Masaaki Ito, Fumio Takahata (Waseda Univ.) CAS2017-158 CS2017-112
Algorithms for improving performances of polar codes over fading channels have been proposed, but it seems to be a probl... [more] CAS2017-158 CS2017-112
pp.139-144
WBS, IT, ISEC 2018-03-09
09:50
Tokyo Katsusika Campas, Tokyo University of Science Bayes Optimal AMP Decoder for Sparse Superposition Codes
Yuwa Hatae (Kyushu Univ.), Kazushi Mimura (Hiroshima City Univ.), Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ.) IT2017-127 ISEC2017-115 WBS2017-108
Sparse superposition codes (SS codes), proposed by Barron and Joseph
in 2010, are
a class of error-correcting codes f... [more]
IT2017-127 ISEC2017-115 WBS2017-108
pp.143-148
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] 2018-03-08
13:55
Shimane Okinoshima Bunka-Kaikan Bldg. CPSY2017-146 DC2017-102 Resistive RAM (ReRAM) is one of the most promising memory technologies due to its property such as high density, low-pow... [more] CPSY2017-146 DC2017-102
pp.257-262
SS 2018-03-07
12:00
Okinawa   A Determination Method of Locality Sensitive Hashing Parameters for Code Clone Detection
Shogo Tokui (Osaka Univ.), Norihiro Yoshida (Nagoya Univ.), Eunjong Choi (NAIST), Katsuro Inoue (Osaka Univ.) SS2017-74
LSH (Locality-Sensitive Hashing) is a near neighbor search algorithm that performs probabilistic hashing of high-dimensi... [more] SS2017-74
pp.57-62
SAT, SANE
(Joint)
2018-02-22
12:30
Yamaguchi The Yamaguchi Chamber of Commerce and Industry A Simplified Initial Acquisition Scheme for WHCDM Based on Distribution Asymmetry of Demultiplexed Signal Energy
Yuki Nagashima, Toshiharu Kojima (UEC) SAT2017-59
In helicopter satellite communications, the periodic channel blockage due to rotor blades is the most important problem ... [more] SAT2017-59
pp.19-24
RCS, NS
(Joint)
2017-12-14
10:50
Hiroshima Aster Plaza Consideration on Frozen Bits of Polar Codes under Rayleigh Fading Environments
Taku Sugimoto (Kagawa Univ.), Satoshi Suyama, Satoshi Nagata (NTT DOCOMO), Nobuhiko Miki (Kagawa Univ.) RCS2017-250
This paper evaluates the influence of the design signal-to-noise power ratio (SNR) on the block error rate (BLER) perfor... [more] RCS2017-250
pp.1-6
MI 2017-09-25
16:30
Chiba Chiba Univ. MI2017-46 (To be available after the conference date) [more] MI2017-46
pp.25-26
IT 2017-09-08
10:15
Yamaguchi Centcore Yamaguchi Hotel Demonstration example of 1 block error correction similar to Reed-Solomon code for students of elementary school 4th or higher grades -- At The Annual Science Festival at Miyakonojo Kosen --
Hirofumi Nakamura (NIT, Miyakonojo College) IT2017-41
This report is not a report on new technical knowledge, but is a report on an example of an initiative designed to help ... [more] IT2017-41
pp.15-20
WBS, MICT 2017-07-13
13:45
Shizuoka ACT CITY [Poster Presentation] Effect of Framed-DOOK using Block Error Correcting Code in Optical Wireless Channel
Ran Sun, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.) WBS2017-14 MICT2017-16
For reducing the influence of background noise and inhibiting synchronization slip in optical wireless communication, fr... [more] WBS2017-14 MICT2017-16
pp.35-38
RCS 2017-06-22
10:10
Okinawa Ishigaki Shoukou Kaikan A Study on Short-Length Block Codes Suitable for Real-Time Communication Applications
Ryuichi Abe, Hideki Ochiai (YNU) RCS2017-64
Reed-Muller codes are known as one of the block codes that can be described by relatively simple trellis structure and t... [more] RCS2017-64
pp.85-90
RCS 2017-04-24
11:45
Kagawa Kotohira Onsen Kotosankaku Performance Evaluation of Polar Codes Using Puncturing/Shortening
Taku Sugimoto (Kagawa Univ.), Satoshi Suyama, Satoshi Nagata (NTT DOCOMO), Nobuhiko Miki (Kagawa Univ.) RCS2017-6
This paper evaluates the performance employing puncturing and shortening scheme used to overcome the problem in polar co... [more] RCS2017-6
pp.29-34
ISEC, WBS, IT 2017-03-09
14:25
Tokyo TOKAI University Trellis Reduction for Tail-Biting Convolutional Codes Using Characteristic Matrices and Cyclically Shifted Code-Subsequences
Masato Tajima IT2016-108 ISEC2016-98 WBS2016-84
Trellis reduction for tail-biting convolutional codes is investigated. A given tail-biting (TB) convolutional code is re... [more] IT2016-108 ISEC2016-98 WBS2016-84
pp.61-66
 Results 41 - 60 of 214 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan