Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
WBS, IT, ISEC |
2018-03-08 09:00 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Evaluation of Bayes Predictive Distributions under Unknown Parametric Models on Misspecified Models Hirokazu Kono, Shota Saito, Toshiyasu Matsushima (Waseda Univ.) IT2017-103 ISEC2017-91 WBS2017-84 |
In this paper, we discuss a problem to estimate the conditional distribution of $Y_{N+1}$ given $x_{N+1}$ and ${(x_t,y_t... [more] |
IT2017-103 ISEC2017-91 WBS2017-84 pp.1-6 |
WBS, IT, ISEC |
2018-03-08 09:25 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Information Geometrical Study of Cluster-Model Approximation for Boltzmann Machines Kenta Toyoda, Tomohiro Ogawa (Univ. of Electro- Commu.) IT2017-104 ISEC2017-92 WBS2017-85 |
In learning algorithms for Boltzmann machines, it is necessary but very hard to calculate the expectation of units with ... [more] |
IT2017-104 ISEC2017-92 WBS2017-85 pp.7-12 |
WBS, IT, ISEC |
2018-03-08 09:50 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Redundancy Analysis of Univarsal Lossless Source Coding via Estimation of Prior
-- Relaxing an Ergodicity Condition -- Ryosuke Ikarashi, Tsutomu Kawabata (UEC) IT2017-105 ISEC2017-93 WBS2017-86 |
Bayesian mixture with non-discrete prior has an asymptotic redundancy proportional to the half of log data length, with ... [more] |
IT2017-105 ISEC2017-93 WBS2017-86 pp.13-18 |
WBS, IT, ISEC |
2018-03-08 10:15 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Evaluation of the Worst-Case Redundancy of Strongly Universal FV Source Codes Using the Source Approximation and the Asymptotically Sufficient Statistic Mitsuharu Arimura (Shonan Inst. Tech.), Hiroshi Nagaoka (Univ. of Electro-Comm.) IT2017-106 ISEC2017-94 WBS2017-87 |
The universality of some variations of two-step lossless source codes using asymptotically sufficient statistics were pr... [more] |
IT2017-106 ISEC2017-94 WBS2017-87 pp.19-24 |
WBS, IT, ISEC |
2018-03-08 10:50 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
The Access Structure of a Secret Sharing Scheme Using Locally Repairable Codes Masanobu Nakata, Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech) IT2017-107 ISEC2017-95 WBS2017-88 |
As a method to distribute and preserve secret information, a secret sharing scheme provides high confidentiality and red... [more] |
IT2017-107 ISEC2017-95 WBS2017-88 pp.25-30 |
WBS, IT, ISEC |
2018-03-08 11:15 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Construction of Secret Sharing Schemes with Small Thresholds for Countably Infinite Participants Takashi Hisatome, Hiroki Koga (Univ. Tsukuba) IT2017-108 ISEC2017-96 WBS2017-89 |
In Shamir's (k, n)-threshold scheme, given a secret S
a dealer generates n shares by using a random polynomial
of de... [more] |
IT2017-108 ISEC2017-96 WBS2017-89 pp.31-36 |
WBS, IT, ISEC |
2018-03-08 11:40 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Constructions of the (3,n) and (4,n) Threshold Visual Cryptography Using Combinatorial Designs and Their Performance Evaluation Kotaro Okada, Hiroki Koga (Univ. of Tsukuba) IT2017-109 ISEC2017-97 WBS2017-90 |
A $(t,n)$-threshold visual cryptography scheme ($(t,n)$-VCS) is a kind of secret sharing schemes for digital images.
In... [more] |
IT2017-109 ISEC2017-97 WBS2017-90 pp.37-42 |
WBS, IT, ISEC |
2018-03-08 13:00 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Outage Capacity of a Two-User MIMO Interference Channel for Simultaneous Information and Energy Transfer Kengo Ikebata, Tomohiko Uyematsu (Tokyo Tech), Ryutaroh Matsumoto (Nagoya Univ), Tetsunao Matsuta (Tokyo Tech) IT2017-110 ISEC2017-98 WBS2017-91 |
In a two-user interference channel for simultaneous information and energy transfer, there are an ID (Information Decodi... [more] |
IT2017-110 ISEC2017-98 WBS2017-91 pp.43-48 |
WBS, IT, ISEC |
2018-03-08 13:25 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Optimality for the Iterative Construction Scheme of AIFV-$m$ codes Ryusei Fujita, Ken-ichi Iwata (Univ. of Fukui), Hirosuke Yamamoto (The Univ. of Tokyo) IT2017-111 ISEC2017-99 WBS2017-92 |
Yamamoto, Tsuchihashi, and Honda proposed binary AIFV (almost instantaneous fixed-to-variable length) codes, which allow... [more] |
IT2017-111 ISEC2017-99 WBS2017-92 pp.49-54 |
WBS, IT, ISEC |
2018-03-08 13:50 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Optimal Coded Caching using Linear Programming Shota Kamiya, Hiroki Koga (Univ. Tsukuba) IT2017-112 ISEC2017-100 WBS2017-93 |
Caching is a method of reducing the network traffic by prefetching some part of contents into memories of users. In this... [more] |
IT2017-112 ISEC2017-100 WBS2017-93 pp.55-60 |
WBS, IT, ISEC |
2018-03-08 14:15 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Shifted Coded Slotted ALOHA Tomokazu Emoto, Takayuki Nozaki (Yamaguchi Univ.) IT2017-113 ISEC2017-101 WBS2017-94 |
In the random access scheme, each user randomly transmits packets in accordance with a predetermined rule.
In this sche... [more] |
IT2017-113 ISEC2017-101 WBS2017-94 pp.61-66 |
WBS, IT, ISEC |
2018-03-08 15:00 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
[Invited Talk]
On Traitor Tracings and Related Topics Shota Yamada (AIST) IT2017-114 ISEC2017-102 WBS2017-95 |
[more] |
IT2017-114 ISEC2017-102 WBS2017-95 p.67 |
WBS, IT, ISEC |
2018-03-08 16:00 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
[Invited Talk]
Research and Development of Transmission Technologies for the Next Generation Terrestrial Broadcasting Tomoaki Takeuchi (NHK) IT2017-115 ISEC2017-103 WBS2017-96 |
[more] |
IT2017-115 ISEC2017-103 WBS2017-96 p.69 |
WBS, IT, ISEC |
2018-03-08 17:00 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
[Invited Talk]
On fast multiplications of multiple-valued logic polynomials by discrete Fourier transforms Hajime Matsui (Toyota Technological Institute) IT2017-116 ISEC2017-104 WBS2017-97 |
[more] |
IT2017-116 ISEC2017-104 WBS2017-97 p.71 |
WBS, IT, ISEC |
2018-03-08 09:00 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Effect on randomizing components to the security of Minalpher Yuki Kishi, Keita Osafune, Yuta Kuwano, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ) IT2017-117 ISEC2017-105 WBS2017-98 |
This paper examines randomizing components in Minalpher, where the randomizing components are Shift Rows (SR) and Mix C... [more] |
IT2017-117 ISEC2017-105 WBS2017-98 pp.73-79 |
WBS, IT, ISEC |
2018-03-08 09:25 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
A study on hierarchical secret sharing schemes applicable to any level based on XOR operations Koji Shima, Hiroshi Doi (IISEC) IT2017-118 ISEC2017-106 WBS2017-99 |
Hierarchical secret sharing schemes are known for how they share a secret among a group of participants partitioned into... [more] |
IT2017-118 ISEC2017-106 WBS2017-99 pp.81-88 |
WBS, IT, ISEC |
2018-03-08 09:50 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Succinct Oblivious RAM Taku Onodera, Tetsuo Shibuya (IMSUT) IT2017-119 ISEC2017-107 WBS2017-100 |
As online storage services become increasingly common, it is important that users’ private information is protected from... [more] |
IT2017-119 ISEC2017-107 WBS2017-100 pp.89-96 |
WBS, IT, ISEC |
2018-03-08 10:15 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
High Efficient Scalar Multiplication in Elliptic Curve Cryptography Noboru Takeuchi, Toshiyuki Kinoshita (TUT) IT2017-120 ISEC2017-108 WBS2017-101 |
(To be available after the conference date) [more] |
IT2017-120 ISEC2017-108 WBS2017-101 pp.97-101 |
WBS, IT, ISEC |
2018-03-08 10:50 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Digital watermark using deep-learning classification Mashu Sakai, Taiki Shigeta, Hikaru Morita (Kanagawa Univ.) IT2017-121 ISEC2017-109 WBS2017-102 |
Digital watermarking is a technique of embedding information in an original image without being noticed or disclosed to ... [more] |
IT2017-121 ISEC2017-109 WBS2017-102 pp.103-106 |
WBS, IT, ISEC |
2018-03-08 11:15 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Evaluation of deep learning method for detection of intrusion packets Tomoki Ueno, Mitiko Harayama (GIFU Univ) IT2017-122 ISEC2017-110 WBS2017-103 |
[more] |
IT2017-122 ISEC2017-110 WBS2017-103 pp.107-113 |