Engineering Sciences/NOLTA-Information Theory(Date:2011/05/13)

Presentation
表紙

,  

[Date]2011/5/13
[Paper #]
目次

,  

[Date]2011/5/13
[Paper #]
An Improvement of Lossless Data Compression via Substring Enumeration

Yuki SHIMA,  Ken-ichi IWATA,  Mitsuharu ARIMURA,  

[Date]2011/5/13
[Paper #]IT2011-1
A Generalized the Chow-Liu Algorithm based on the MDL Principle

Joe SUZUKI,  

[Date]2011/5/13
[Paper #]IT2011-2
Privacy Amplification Theorem for Bounded Storage Eavesdropper

Shun WATANABE,  Yasutada OOHAMA,  

[Date]2011/5/13
[Paper #]IT2011-3
Access Structure of Secret Sharing Scheme based on Second-Degree Bivariate Polynomial Interpolation Scheme

Hideaki KASHIWAGURA,  Mikihiko NISHIARA,  

[Date]2011/5/13
[Paper #]IT2011-4
Relations among Information Theoretically and Computationally Secure Symmetric Key Encryptions

Mitsugu IWAMOTO,  Kazuo OHTA,  

[Date]2011/5/13
[Paper #]IT2011-5
Performance of a Fragile Watermarking Scheme with Detectability of Tampered Locations in JPEG Images

Mitsuteru SAKASHITA,  Hiroki KOGA,  

[Date]2011/5/13
[Paper #]IT2011-6
A Note on the Partition by Defining Set and the Weight Distributions for Cyclic Codes (Part 2)

Takayasu KAIDA,  Junru ZHENG,  

[Date]2011/5/13
[Paper #]IT2011-7
Efficient Coding Scheme for Balacing 2nd Order RDS

Hiroshi KAMABE,  Yu FUJITA,  

[Date]2011/5/13
[Paper #]IT2011-8
Study on Vital Data Acquisition Schemes for Sports Players : Heart Rate Measurements by Electrocardiograph, Phonocardiograph and Blood Flow Variation

Nao MASUOKA,  Tetsuo TSUJIOKA,  

[Date]2011/5/13
[Paper #]IT2011-9
複写される方へ

,  

[Date]2011/5/13
[Paper #]
Notice for Photocopying

,  

[Date]2011/5/13
[Paper #]
奥付

,  

[Date]2011/5/13
[Paper #]
裏表紙

,  

[Date]2011/5/13
[Paper #]