Engineering Sciences/NOLTA-Information Theory(Date:2002/03/12)

Presentation
表紙

,  

[Date]2002/3/12
[Paper #]
目次

,  

[Date]2002/3/12
[Paper #]
A Note on q-ary Prefix-Synchronized Codes Capable of Correcting Single Insertion/Deletion Errors

Takayuki KATO,  Hajime JINUSHI,  

[Date]2002/3/12
[Paper #]IT2001-74
Top-down Recursive Maximum Liklihood Decoding Using Ordered Statistic Information

Takuya KOUMOTO,  Tadao KASAMI,  

[Date]2002/3/12
[Paper #]IT2001-75
Selection Method of Search Centers in Iterative Soft-decision Decoding Algorithms for Non Binary Codes

Hitoshi Tokushige,  Ippei Hisadomi,  Tadao Kasami,  

[Date]2002/3/12
[Paper #]IT2001-76
A Soft-Decision Iterative Decoding Algorithm Using a Top-Down and Recursive Minimum Distance Search

Jun Asatani,  Kenichi Tomita,  Takuya Koumoto,  Toyoo Takata,  Tadao Kasami,  

[Date]2002/3/12
[Paper #]IT2001-77
Performance Analysis of a Two-step Decoding Method based on Majority Logic Decoding and Ordered Statistic Decoding

Dungjade SHIOWATTANA,  Toru FUJIWARA,  

[Date]2002/3/12
[Paper #]IT2001-78
Theoretical Analysis of Bit Error Probability for Maximum a posteriori Probability Decoding

Hideki YOSHIKAWA,  

[Date]2002/3/12
[Paper #]IT2001-79
Positioning by Wireless System for Physically Handicapped Person in Railway Station

Kyong SEO,  Masaomi IKESHOJI,  Takao ENKAWA,  Masao NAKAGAWA,  

[Date]2002/3/12
[Paper #]IT2001-80
A Study of Decoding Algorithm of Low Density Parity Check Code

Naoto KOBAYASHI,  Ryo NOMURA,  Toshiyasu MATSUSHIMA,  

[Date]2002/3/12
[Paper #]IT2001-81
A Study on Strength of CIPHERUNICORN-A against Truncated Differential Attack

Hiroki SEKINE,  Toshinobu KANEKO,  

[Date]2002/3/12
[Paper #]IT2001-82
The Security Condition of Visual Secret Sharing Schemes for Plural Images

Mitsugu IWAMOTO,  Hirosuke YAMAMOTO,  

[Date]2002/3/12
[Paper #]IT2001-83
Secret Function Sharing Systems for Multi-Groups and their Application to Oblivious Transfers

Yohei KAWAMOTO,  Hirosuke YAMAMOTO,  

[Date]2002/3/12
[Paper #]IT2001-84
A proposal of the method to revoke multiple certificates and to reduce RL size

Fumihiko KANEOKA,  Takeshi NAGAYOSHI,  Hiroshi MASAMOTO,  

[Date]2002/3/12
[Paper #]IT2001-85
Efficient Exponentiation on Elliptic Curve Cryptosystem

Hideyuki MIYAKE,  Atsuko MIYAJI,  

[Date]2002/3/12
[Paper #]IT2001-86
An Extension of Collusion Problem and its Application to Protocol Analysis

Atsushi WASEDA,  Masakazu SOSHI,  Atsuko MIYAJI,  

[Date]2002/3/12
[Paper #]IT2001-87
Measurement System of the BER Performance for the High-Frequency Band Power-Line Communication and its Evaluation

Hideyuki NISHIO,  Shinji TSUZUKI,  Takashi IMAJYO,  Yoshio YAMADA,  

[Date]2002/3/12
[Paper #]IT2001-88
A Consideration on Modulation Schemes for Indoor Visible Light Communication System utilizing White LED Lights

Yuichi TANAKA,  Toshihiko KOMINE,  Shinichiro HARUYAMA,  Masao NAKAGAWA,  

[Date]2002/3/12
[Paper #]IT2001-89
The Effect of Reflection on Indoor Visible-Light Communication System using LED

Kanei FAN,  Toshihiko KOMINE,  Yuichi TANAKA,  Masao NAKAGAWA,  

[Date]2002/3/12
[Paper #]IT2001-90
Integrated System of White LED Visible-Light Communication and Electrical Power-Line Communication

Toshihiko KOMINE,  Yuichi TANAKA,  Masao NAKAGAWA,  

[Date]2002/3/12
[Paper #]IT2001-91
12>> 1-20hit(31hit)