Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
QIT (2nd) |
2013-05-27 11:40 |
Hokkaido |
Hokkaido Univ. |
Re-interpretations for an experiment on the back-action in a weak measurement Kouji Nakamura (NAOJ), Masataka Iinuma (Hiroshima Univ.) |
Interpretations of an experiment on the back-action in a weak measurement in [M. Iinuma et al., New J. Phys. {bf 13} (20... [more] |
|
QIT (2nd) |
2013-05-27 12:00 |
Hokkaido |
Hokkaido Univ. |
Rigorous Treatment of the Weak Measurement from the Perspective of Uncertainty and Amplification Jaeha Lee (Univ. of Tokyo), Izumi Tsutsui (KEK) |
The extended physical quantity in quantum mechanics called Weak Value (WV) has gained a renewed interest in recent years... [more] |
|
QIT (2nd) |
2013-05-27 - 2013-05-28 |
Hokkaido |
Hokkaido Univ. |
[Poster Presentation]
Complex Probability and Weak Value From the Viewpoint of Operational Probabilistic Theory Kazuki Fukuda (SOKENDAI) |
Over the last decade, the notion of weak measurement and weak value proposed by Aharonov and his colleagues has attracte... [more] |
|
QIT (2nd) |
2012-05-22 14:50 |
Fukui |
Fukui Univ. |
Measurement uncertainties in the quantum formalism
-- quasi-realities of individual systems -- Holger F. Hofmann (Hiroshima Univ.) |
The evaluation of uncertainties in quantum measurements is problematic since the correct value of an observable between ... [more] |
|
QIT (2nd) |
2011-11-21 17:20 |
Osaka |
Osaka Univ. Engr. Sci. Sigma Hall (Toyonaka) |
On Amplification by Weak Measurement Tatsuhiko Koike, Saki Tanaka (Keio Univ) |
The amplification by a weak quantum measurement proposed by Aharonov, Albert, and Vaidman is
studied in the case o... [more] |
|
QIT (2nd) |
2011-11-21 14:40 |
Osaka |
Osaka Univ. Engr. Sci. Sigma Hall (Toyonaka) |
[Poster Presentation]
Optimal enhancement by weak mesurement Yuki Susa, Yutaka Shikano, Akio Hosoya (Tokyo Tech) |
The ``weak measurement" proposed by Aharonov and his colleagues extracts information of a physical quantity of the syste... [more] |
|
MI |
2010-11-15 15:55 |
Kyoto |
Shimadzu Corp. |
New Region Growing Segmentation Technique for MR Images with Weak Boundaries Ahmed Ayman (Kyoto Univ./Al-Azhar Univ.), Takuya Funatomi, Michihiko Minoh (Kyoto Univ.), Zanaty Elnomery (Sohag Univ.), Tomohisa Okada, Kaori Togashi, Tomoko Sakai, Shigehito Yamada (Kyoto Univ.) MI2010-79 |
In medical image processing, segmented images are used for studying anatomical structures, diagnosis and assisting in su... [more] |
MI2010-79 pp.71-76 |
NLP |
2010-10-29 10:55 |
Osaka |
Osaka University Machikaneyama Hall |
* Kuniyasu Shimizu (Chiba Inst. of Tech.), Munehisa Sekikawa (Aihara Innovative Mathematical Modeling Project), Naohiko Inaba, Tetsuro Endo (Meiji Univ.), Yuto Saito, Tomoyuki Yamamoto (Chiba Inst. of Tech.) NLP2010-95 |
In this study, a response to a weak perturbation of the Bonhoeffer-van der Pol (BVP) oscillator is investigated.
In t... [more] |
NLP2010-95 pp.81-84 |
IT, ISEC, WBS |
2010-03-05 15:20 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
On key recovery for Enocoro with weak key in related-key attack scenario Yasutaka Igarashi, Kazuto Okamoto, Toshinobu Kaneko (Tokyo Univ. of Science) IT2009-113 ISEC2009-121 WBS2009-92 |
Enocoro is a hardware-oriented pseudorandom number generator (PRNG), whose structure is similar to the PRNG named PANAMA... [more] |
IT2009-113 ISEC2009-121 WBS2009-92 pp.275-280 |
ICD |
2009-12-14 13:30 |
Shizuoka |
Shizuoka University (Hamamatsu) |
[Poster Presentation]
A nanowatt DA converter for subthreshold CMOS LSIs Kazuki Yamamoto, Ken Ueno, Tetsuya Asai, Yoshihito Amemiya (Hokkaido Univ.) ICD2009-88 |
An ultra-low power digital-to-analog (DA) converter based on the technique of pulse-width-modulated DA conversion was pr... [more] |
ICD2009-88 pp.59-64 |
RCS, AN, MoNA, SR (Joint) |
2009-03-05 13:20 |
Kanagawa |
YRP |
A Study on Duplicate Address Detection Using Divided Keys Kazuki Akima, Hiraku Okada, Kenichi Mase (Niigata Univ.) AN2008-73 |
IP address assignment and duplicate address detection are important issues for MANET. Two MANETs may merge to form a sin... [more] |
AN2008-73 pp.53-58 |