Information and Systems-Software Science(Date:2002/03/12)

Presentation
表紙

,  

[Date]2002/3/12
[Paper #]
目次

,  

[Date]2002/3/12
[Paper #]
A Note on q-ary Prefix-Synchronized Codes Capable of Correcting Single Insertion/Deletion Errors

Takayuki KATO,  Hajime JINUSHI,  

[Date]2002/3/12
[Paper #]SST2001-190
Top-down Recursive Maximum Liklihood Decoding Using Ordered Statistic Information

Takuya KOUMOTO,  Tadao KASAMI,  

[Date]2002/3/12
[Paper #]SST2001-191
Selection Method of Search Centers in Iterative Soft-decision Decoding Algorithms for Non Binary Codes

Hitoshi Tokushige,  Ippei Hisadomi,  Tadao Kasami,  

[Date]2002/3/12
[Paper #]SST2001-192
A Soft-Decision Iterative Decoding Algorithm Using a Top-Down and Recursive Minimum Distance Search

Jun Asatani,  Kenichi Tomita,  Takuya Koumoto,  Toyoo Takata,  Tadao Kasami,  

[Date]2002/3/12
[Paper #]SST2001-193
Performance Analysis of a Two-step Decoding Method based on Majority Logic Decoding and Ordered Statistic Decoding

Dungiade SHIOWATTANA,  Toru FUJIWARA,  

[Date]2002/3/12
[Paper #]SST2001-194
Theoretical Analysis of Bit Error Probability for Maximum a posteriori Probability Decoding

Hideki YOSHIKAWA,  

[Date]2002/3/12
[Paper #]SST2001-195
Positioning by Wireless System for Physically Handicapped Person in Railway Station

Kyong SEO,  Masaomi IKESHOJI,  Takao ENKAWA,  Masao NAKAGAWA,  

[Date]2002/3/12
[Paper #]SST2001-196
A Study of Decoding Algorithm of Low Density Parity Check Code

Naoto KOBAYASHI,  Ryo NOMURA,  Toshiyasu MATSUSHIMA,  

[Date]2002/3/12
[Paper #]SST2001-197
A Study on Strength of CIPHERUNICORN-A against Truncated Differential Attack

Hiroki SEKINE,  Toshinobu KANEKO,  

[Date]2002/3/12
[Paper #]SST2001-198
The Security Condition of Visual Secret Sharing Schemes for Plural Images

Mitsugu IWAMOTO,  Hirosuke YAMAMOTO,  

[Date]2002/3/12
[Paper #]SST2001-199
Secret Function Sharing Systems for Multi-Groups and their Application to Oblivious Transfers

Yohei KAWAMOTO,  Hirosuke YAMAMOTO,  

[Date]2002/3/12
[Paper #]SST2001-200
A proposal of the method to revoke multiple certificates and to reduce RL size

Fumihiko KANEOKA,  Takeshi NAGAYOSHI,  Hiroshi MASAMOTO,  

[Date]2002/3/12
[Paper #]SST2001-201
Efficient Exponentiation on Elliptic Curve Cryptosystem

Hideyuki MIYAKE,  Atsuko MIYAJI,  

[Date]2002/3/12
[Paper #]SST2001-202
An Extension of Collusion Problem and its Application to Protocol Analysis

Atsushi WASEDA,  Masakazu SOSHI,  Atsuko MIYAJI,  

[Date]2002/3/12
[Paper #]SST2001-203
Measurement System of the BER Performance for the High-Frequency Band Power-Line Communication and its Evaluation

Hideyuki NISHIO,  Shinji TSUZUKI,  Takashi IMAJYO,  Yoshio YAMADA,  

[Date]2002/3/12
[Paper #]SST2001-204
A Consideration on Modulation Schemes for Indoor Visible Light Communication System utilizing White LED Lights

Yuichi TANAKA,  Toshihiko KOMINE,  Shinichiro HARUYAMA,  Masao NAKAGAWA,  

[Date]2002/3/12
[Paper #]SST2001-205
The Effect of Reflection on Indoor Visible-Light Communication System using LED

Kanei FAN,  Toshihiko KOMINE,  Yuichi TANAKA,  Masao NAKAGAWA,  

[Date]2002/3/12
[Paper #]SST2001-206
Integrated System of White LED Visible-Light Communication and Electrical Power-Line Communication

Toshihiko KOMINE,  Yuichi TANAKA,  Masao NAKAGAWA,  

[Date]2002/3/12
[Paper #]SST2001-207
12>> 1-20hit(31hit)