Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, RCS, SIP |
2023-01-24 11:30 |
Gunma |
Maebashi Terrsa (Primary: On-site, Secondary: Online) |
Classical Code Construction for Quantum Deletion Error-Correcting Codes Manabu Hagiwara (Chiba Univ.) IT2022-38 SIP2022-89 RCS2022-217 |
As a recent contribution, the author provided conditions that a classical deletion error-correcting code is converted to... [more] |
IT2022-38 SIP2022-89 RCS2022-217 pp.51-53 |
QIT (2nd) |
2022-05-30 16:20 |
Online |
Online |
Quantum Deletion Error and Instances of Single Quantum Deletion Error-Correcting Codes Manabu Hagiwara (Chiba Univ.) |
First, the fundamentals concerning quantum deletion errors will be introduced. In particular, this manuscript introduces... [more] |
|
IT, ISEC, RCC, WBS |
2022-03-11 11:10 |
Online |
Online |
Corruption-Correctable Message Authentication Code Isamu Furuya, Akiko Inoue, Kazuhiko Minematsu (NEC) IT2021-114 ISEC2021-79 WBS2021-82 RCC2021-89 |
We propose correction correctable MAC, which enables to verify data integrity and to correct corruptions of the data.
A... [more] |
IT2021-114 ISEC2021-79 WBS2021-82 RCC2021-89 pp.180-187 |
ICM, LOIS |
2021-01-21 18:10 |
Online |
Online |
Two-Layered QR Codes and Their Principles
-- Development of Hologram QR Codes -- Hiroya Kawahara, Kohei Yamasaki (Kobe Univ.), Makoto Takita (University of Hyogo), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICM2020-48 LOIS2020-36 |
The Quick Response (QR) code is used for various purposes, such as accessing web pages, payment, etc. The QR codes which... [more] |
ICM2020-48 LOIS2020-36 pp.81-86 |
IT |
2020-12-03 16:40 |
Online |
Online |
Implementation and security evaluation of wiretap channel coding in noisy channels Koutaro Takasaki, Tomohiro Ogawa (UEC) IT2020-62 |
In wiretap channel coding by Wyner,one can transmit messages to a legitimate receiver reliably without giving any inform... [more] |
IT2020-62 pp.206-211 |
VLD, DC, CPSY, RECONF, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC (Joint) [detail] |
2019-11-14 14:15 |
Ehime |
Ehime Prefecture Gender Equality Center |
Neural Network-based Lifetime Prediction and Reliability Enhancement Techniques for 3D NAND Flash Memory Masaki Abe, Ken Takeuchi (Chuo Univ.) ICD2019-30 IE2019-36 |
NAND flash memories have lifetime such as data-retention time and read cycles. This paper proposes neural network techni... [more] |
ICD2019-30 IE2019-36 pp.7-12 |
ICD, CPSY |
2016-12-15 15:30 |
Tokyo |
Tokyo Institute of Technology |
[Poster Presentation]
Performance Evaluation of Storage Class Memory based SSD in Consideration of Reliability Yutaka Adachi, Hirofumi Takishita, Ken Takeuchi (Chuo Univ.) ICD2016-68 CPSY2016-74 |
The future Storage Class Memory (SCM) is equivalent to NAND Flash in terms of cost. SCM is high performance compared wit... [more] |
ICD2016-68 CPSY2016-74 p.55 |
QIT (2nd) |
2015-11-24 13:40 |
Kanagawa |
NTT Atsugi R&D center |
[Poster Presentation]
Solution to the Mean King's Problem in Qubit-Systems Using Higher-Dimensional Quantum Error-Correcting Codes Toru Kuriyama, Masakazu Yoshida, Jun Cheng (Doshisha Univ.) |
Mean King's problem is a king of quantum estimation problems. In qubit-systems, we construct a higher-dimensional quantu... [more] |
|
WBS, MICT |
2015-07-22 10:50 |
Nara |
Nara Institute of Science and Technology |
Concatenated codes for error-control considering different types of errors in WBAN Takahiro Goto, Kento Takabayashi, Ryuji Kohno (Yokohama National Univ.) WBS2015-24 MICT2015-28 |
Recently, a wireless medical and healthcare system has been paid attention as technology combining and utilizing both me... [more] |
WBS2015-24 MICT2015-28 pp.61-64 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2014-11-28 09:15 |
Oita |
B-ConPlaza |
Energy evaluation of bit-write reduction method based on state encoding limiting maximum and minimum Hamming distances for non-volatile memories Tatsuro Kojo, Masashi Tawada, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2014-105 DC2014-59 |
Data stored in non-volatile memories may be destructed due to crosstalk and radiation but we can restore their data by u... [more] |
VLD2014-105 DC2014-59 pp.221-226 |
IT |
2014-05-16 13:25 |
Oita |
Beppu International Convention Center |
A method of parallel processing of syndromes to decode primitive BCH codes Ken-ichi Iwata, Reiya Ooshima (Univ. of Fukui) IT2014-5 |
We consider numbers of addition and multiplication operations to calculate an error syndrome for q-ary primitive BCH cod... [more] |
IT2014-5 pp.23-26 |
IT |
2014-01-27 13:05 |
Osaka |
Osaka City University |
A construction of adaptive quantum noise control [(pq)^2, (2+p(q-1))(pq-1)] codes Tomoji Maruishi, Toru Fujiwara (Osaka Univ.) IT2013-47 |
Typically, in physical devices, phase errors occur far more than bit errors. Recently, adaptively quantum noise control ... [more] |
IT2013-47 pp.11-16 |
ISEC |
2012-09-21 15:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
New Classes of Public Key Cryptosystems with Concealed Equations of Very High Degree Constructed Based on Cyclic Codes, K(X)SE(1)PKC, K(XVI)SE(2)PKC, Realizing Coding Rate of Exactly 1.0, along with K(III)ΣΠPKC Masao Kasahara (21st ICRC) ISEC2012-53 |
In this paper, we first present a new class of public-key cryptosystems, K(X)BASESE(1)PKC based on cyclic codes. Althoug... [more] |
ISEC2012-53 pp.43-50 |
QIT (2nd) |
2012-05-22 15:50 |
Fukui |
Fukui Univ. |
A Solution to the Mean King's Problem using Quantum Error-Correcting Codes Masakazu Yoshida (Chuo Univ.), Takayuki Miyadera (Kyoto Univ.), Gen Kimura (Shibaura Inst. of Tech.), Hideki Imai (Chuo Univ.) |
Mean King's problem is formulated as a quantum retrodiction problem for noncommutative observables. In this paper, we in... [more] |
|
IT, ISEC, WBS |
2012-03-01 16:10 |
Kanagawa |
|
Construction of multiple error correcting WOM-Code Hidetoshi Utsunomiya, Hiroshi Kamabe (Gifu Univ.) IT2011-61 ISEC2011-88 WBS2011-62 |
Memory devices on which data can be written only once are called write
once memories (WOM). A WOM code is a code which... [more] |
IT2011-61 ISEC2011-88 WBS2011-62 pp.95-100 |
PRMU, FM |
2011-12-16 15:15 |
Shizuoka |
Hamamatsu Campus, Shizuoka Univ. |
Robust Image Matching by Multiple LS-SVMs Toshitaka Shimizu, Hajimu Kawakami (Ryukoku Univ) PRMU2011-143 |
This paper describes a method of designing robust classifiers of multi-class image data with multiple LS-SVMs.We first i... [more] |
PRMU2011-143 pp.107-112 |
ISEC |
2011-09-09 15:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Public Key Cryptosystems Constructed Based on Reed-Solomon Codes and Pseudo Cyclic Codes, K(IX)SE(1)PKC and K(X)SE(1)PKC, Realizing Coding Rate of Exactly 1.0 Masao Kasahara (Osaka Gakuin Univ.) ISEC2011-31 |
In this paper, we present a new class of public-key cryptosystems, K(IX)SE(1)PKC and K(X)SE(1)PKC realizing the coding r... [more] |
ISEC2011-31 pp.29-35 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-13 14:30 |
Shizuoka |
Shizuoka University |
Public Key Cryptosystems Constructed Based on Cyclic Codes, Realizing Coding Rate of Exactly 1.0, K(XI)SE(g)PKC and K(XII)SE(g)PKC Masao Kasahara (Osaka Gakuin Univ.) ISEC2011-23 SITE2011-20 ICSS2011-28 EMM2011-22 |
In this paper, we first present a new class of public-key cryptosystems, K(\ix)SE(1)PKC based on error-correcting codes ... [more] |
ISEC2011-23 SITE2011-20 ICSS2011-28 EMM2011-22 pp.131-136 |
ISEC, IT, WBS |
2011-03-04 13:50 |
Osaka |
Osaka University |
Public Key Cryptosystems Constructed Based on Pseudo Cyclic Codes, K(VIII)SE(1)PKC and K(XI)SE(2)PKC
-- Modification of K(VII)SE(1)PKC -- Masao Kasahara (Osaka Gakuin Univ.) IT2010-125 ISEC2010-129 WBS2010-104 |
In this paper, we present a new class of public-key cryptosystems, K(VIII)SE(1)PKC and K(XI)SE(2)PKC based on error-corr... [more] |
IT2010-125 ISEC2010-129 WBS2010-104 pp.377-382 |
IT |
2010-09-22 09:30 |
Miyagi |
Tohoku Gakuin University |
[Invited Talk]
On polar codes Ryuhei Mori (Kyoto Univ.) IT2010-41 |
Polar codes are channel codes which achieve symmetric capacity with low encoding and decoding complexity. In this note, ... [more] |
IT2010-41 pp.43-49 |