Engineering Sciences/NOLTA-Information Security(Date:2015/02/23)

Presentation
Outage Capacity of a Two-User Interference Channel for Simultaneous Information and Energy Transfer

Yutaka OSAWA,  Ryutaroh MATSUMOTO,  Tetsunao MATSUTA,  Tomohiko UYEMATSU,  

[Date]2015/2/23
[Paper #]IT2014-80,ISEC2014-93,WBS2014-72
Empirical Study For High Precision Shape Estimation Using Phase Monopulse Method in UWB Radar

Masanobu INOUE,  Yohei OISHI,  Keiji JIMI,  Isamu MATSUNAMI,  

[Date]2015/2/23
[Paper #]IT2014-81,ISEC2014-94,WBS2014-73
Performance Evaluation of Positioning Accuracy for User Position Detection Method using Unmanned Aerial Vehicle

Hiroyasu ISHIKAWA,  Shouta KOGURE,  

[Date]2015/2/23
[Paper #]IT2014-82,ISEC2014-95,WBS2014-74
Towards Tokyo Olympics : 5G/P2P Hybrid Designs for Streaming to Massive Wireless Crowds

Marat ZHANIKEEV,  

[Date]2015/2/23
[Paper #]IT2014-83,ISEC2014-96,WBS2014-75
A rapid filtering rule management plane implementation using distributed in-memory caching system

Ruo ANDO,  

[Date]2015/2/23
[Paper #]IT2014-84,ISEC2014-97,WBS2014-76
Arithmetic in a Prime Field of SWIFFT/SWIFFTX

Hidenori KUWAKADO,  

[Date]2015/2/23
[Paper #]IT2014-85,ISEC2014-98,WBS2014-77
Algorithms to reduce the number of output symbols on condition that discrete memoryless channel satisfies admissible mutual information

Takumi NAGAHARA,  Yuta SAKAI,  Ken-ichi IWATA,  

[Date]2015/2/23
[Paper #]IT2014-86,ISEC2014-99,WBS2014-78
Another Representation on the Second-Order Achievable Rate Region of Slepian-Wolf Coding Problem for General Sources

Shota SAITO,  Nozomi MIYA,  Toshiyasu MATSUSHIMA,  

[Date]2015/2/23
[Paper #]IT2014-87,ISEC2014-100,WBS2014-79
Throughput Analysis Considering Route Shapes in Multi-hop Communication with Node Skipping

Kohei MIMURA,  Kouji OHUCHI,  

[Date]2015/2/23
[Paper #]IT2014-88,ISEC2014-101,WBS2014-80
On a Block Spreading ZCZ-CDMA for High-Speed Transmission

Sho KURODA,  Kazuhiro KOBAYASHI,  Yuta IDA,  Takahiro MATSUMOTO,  Shinya MATSUFUJI,  

[Date]2015/2/23
[Paper #]IT2014-89,ISEC2014-102,WBS2014-81
A Note on Secure Computations with Commercially Available Playing Cards

Takaaki MIZUKI,  

[Date]2015/2/23
[Paper #]IT2014-90,ISEC2014-103,WBS2014-82
Knapsack Cryptosystem Using Three Random Secret Sequences

Yasuyuki MURAKAMI,  Shinsuke HAMASHO,  Masao KASAHARA,  

[Date]2015/2/23
[Paper #]IT2014-91,ISEC2014-104,WBS2014-83
Bonnet Detection Using Anomaly Detection Based on Sparse Structure Learning

Shu MUKAI,  Yuki KAWAMURA,  Masanori KAWAKITA,  Jun'ichi TAKEUCHI,  

[Date]2015/2/23
[Paper #]IT2014-92,ISEC2014-105,WBS2014-84
On Upper Bounds on Estimation Error of Least Squares Regression with L1 Penalty

Yushin TOYOKIHARA,  Masanori KAWAKITA,  Jun'ichi TAKEUCHI,  

[Date]2015/2/23
[Paper #]IT2014-93,ISEC2014-106,WBS2014-85
On Linear Complexity of Constant-Weight Sequences over Extension Fields : With Correction for Numerical Examples Presented on SCIS2015

Takayasu KAIDA,  Junru ZHENG,  Keiichi TAKAHASHI,  

[Date]2015/2/23
[Paper #]IT2014-94,ISEC2014-107,WBS2014-86
Toward Implementation of Algebraic Coding for Wiretap Channels

Mitsuru HAMADA,  

[Date]2015/2/23
[Paper #]IT2014-95,ISEC2014-108,WBS2014-87
Empirical Study For Improved Rapid Detection and Discrimination of Multiple Moving Targets Using UWB Radar

Yohei OISHI,  Masanobu INOUE,  Keiji JIMI,  Isamu MATSUNAMI,  

[Date]2015/2/23
[Paper #]IT2014-96,ISEC2014-109,WBS2014-88
An Empirical Study on 2D-SLAM by UWB Radar

Keiji JIMI,  Masanobu INOUE,  Yohei OISHI,  Isamu MATSUNAMI,  

[Date]2015/2/23
[Paper #]IT2014-97,ISEC2014-110,WBS2014-89
The Interference Avoidance in Ultra-Wideband Radar Using Stepped-FM Scheme

Shoichi HATADA,  Masanobu INOUE,  Isamu MATSUNAMI,  

[Date]2015/2/23
[Paper #]IT2014-98,ISEC2014-111,WBS2014-90
Fast and Secure Implementation of Cryptography and its Practical Application

Shinichi KAWAMURA,  

[Date]2015/2/23
[Paper #]IT2014-99,ISEC2014-112,WBS2014-91
<<123>> 21-40hit(46hit)