default search action
ISITA 2022: Tsukuba, Ibaraki, Japan
- International Symposium on Information Theory and Its Applications, ISITA 2022, Tsukuba, Ibaraki, Japan, October 17-19, 2022. IEEE 2022, ISBN 978-4-88552-341-0
- Juane Li, Yi Gong, Xin Xiao, Shu Lin, Khaled A. S. Abdel-Ghaffar:
A Class of Cyclic Partial Geometries and Their Associated Constant Weight and LDPC Codes. 1-5 - Chia-Hao Lin, Tzu-Hsuan Huang, Chung-Hsuan Wang, Yeong-Luh Ueng:
Bit-Level Informed Dynamic Scheduling for Decoding Non-binary LDPC Codes. 6-10 - Zhi Jing, Hyojeong Choi, Hong-Yeop Song:
Some Girth-8 Linear Code is a 3-SEQ LRC. 11-13 - Tadashi Wadayama, Ayano Nakai-Kasai:
Ordinary Differential Equation-based Sparse Signal Recovery. 14-18 - Naoki Ide, Masayuki Ohzeki:
Sparse Signal Reconstruction with QUBO Formulation in l0-regularized Linear Regression. 19-23 - Yuichi Kida, Takuro Kida:
Theory of the optimum interpolation reconstruction and an application for Parallel MRI. 24-28 - Hassan Tavakoli, Saeid Pakravan:
A Tighter Lower Bound on the Capacity of the Cascading Binary Deletion Channel and Binary Symmetric Channel. 29-33 - Masaki Hori, Mikihiko Nishiara:
Channel Capacity with Cost Constraint Allowing Some Cost Overrun. 34-38 - Jun Muramatsu:
On the Achievability of Interference Channel Coding. 39-43 - Akihito Nagaya, Hiroki Koga:
On the Optimum Achievable Rates of a Coded Caching Scheme with Small Cache Memory. 44-48 - Shinya Okumura, Shusaku Uemura, Momonari Kudo:
Revisiting Lattice-Based Attacks Using Trace Map for Ring-LWE. 49-53 - Minami Sato, Sosuke Minamoto, Ryuichi Sakai, Yasuyuki Murakami:
High-Density Knapsack Cryptosystem using Shifted-Odd and Super-Increasing Sequence. 54-58 - Bagus Santoso, Yasuhiko Ikematsu, Shuhei Nakamura, Takanori Yasuda:
Three-Pass Identification Scheme Based on MinRank Problem with Half Cheating Probability. 59-63 - Hikaru Tsuchida, Haruna Higo, Toshiyuki Isshiki, Kengo Mori:
Hash-Chain-Based Sanitizable Signatures for Deletion and Generalization Processes. 64-68 - Hiroshi Kamabe, Takumi Marumo, Shan Lu:
Balanced coding with Lehmer code. 69-73 - Hidetoshi Saito:
High Areal Density Heated Dot Magnetic Recording Systems with Double-layered Bit Patterned Media. 74-78 - Adir Kobovich, Orian Leitersdorf, Daniella Bar-Lev, Eitan Yaakobi:
Codes for Constrained Periodicity. 79-83 - Takuto Kakishima, Shun Watanabe:
A Numerical Study of Multi-Letter Ahlswede-Han Scheme for Modulo-Sum Problem. 84-88 - Akira Kamatsuka, Takahiro Yoshida, Koki Kazama, Toshiyasu Matsushima:
An Algorithm for Computing the Stratonovich's Value of Information. 89-93 - Genta Onishi, Kengo Hashimoto, Ken-ichi Iwata, Hirosuke Yamamoto:
Enumeration and Coding of Binary AIFV-m Code Trees. 94-98 - Duc Tu Dao, Han Mao Kiah, Tuan Thanh Nguyen:
Average Redundancy of Variable-Length Balancing Schemes à la Knuth. 99-103 - Yonatan Yehezkeally, Daniella Bar-Lev, Sagi Marcovich, Eitan Yaakobi:
Reconstruction from Substrings with Partial Overlap. 104-108 - Takahiro Ota, Akiko Manada:
A Necessary and Sufficient Condition for Reconstruction of Circular Binary String based on the Lengths of Substrings with Weights. 109-113 - Akiko Manada, Takahiro Ota, Hiroyoshi Morita:
The Maximum Run-Length Constrained Balanced Codes for Random-Access DNA Storage. 114-118 - Yohei Sakai, Masaya Kambara, Guanghui Song, Tomotaka Kimura, Jun Cheng:
Finite Blocklength Analysis of Cooperative Superposition Coded Relaying Systems over Nakagami-m Fading Channels. 119-123 - Asahi Mizukoshi, Ayano Nakai-Kasai, Tadashi Wadayama:
PSOR-Jacobi Algorithm for Accelerated MMSE MIMO Detection. 124-128 - Hsiao-feng Francis Lu:
Near-Optimal Designs of Hybrid Massive MIMO Systems from Lattice Decoding. 129-133 - Marcel Mross, Pin-Hsun Lin, Eduard A. Jorswieck:
New Inner and Outer Bounds for Gaussian Broadcast Channels with Heterogeneous Blocklength Constraints. 134-138 - Cuong N. Nguyen, Lam Si Tung Ho, Vu C. Dinh, Tal Hassner, Cuong V. Nguyen:
Generalization Bounds for Deep Transfer Learning Using Majority Predictor Accuracy. 139-143 - Taisuke Ishiwatari, Shota Saito, Yuta Nakahara, Yuji Iikubo, Toshiyasu Matsushima:
Bayes Optimal Estimation and Its Approximation Algorithm for Difference with and without Treatment under URLC Model. 144-148 - Yuta Nakahara, Toshiyasu Matsushima:
Two-dimensional Autoregressive Model with Time-varying Parameters and the Bayes Codes. 149-153 - Koki Kazama, Toshiyasu Matsushima:
A Group-Type Distributed Secure Coded Computation Scheme Based on a Secret Sharing. 154-158 - Raiki Ioki, Hiroki Koga:
On the Optimal Construction of a Visual Cryptography Scheme for Multiple Secret Images. 159-163 - Shoichiro Yamasaki, Tomoko K. Matsushima, Hirokazu Tanaka:
A Security Enhanced Data Transmission Scheme Using Sequences Generated by Non-Systematic Reed-Solomon Coding. 164-168 - Shan Lu, Hiroshi Kamabe:
Improved Survival Probability for Coded Compressed Sensing in Unsourced Random Access. 169-173 - Koki Kazama, Toshiyasu Matsushima:
A Group-Type Distributed Coded Computation Scheme Based on a Gabidulin Code. 174-178 - Norifumi Ojiro, Hajime Matsui:
Construction of reversible integer codes with large moduli via Chinese remainder theorem. 179-183 - Naruki Shinohara, Hideki Yagi:
Unified Expression of Utility-Privacy Trade-off in Privacy-Constrained Source Coding. 184-188 - Yasutada Oohama, Bagus Santoso:
A Framework for Distributed Source Coding with Encryption: a New Strong Converse and More. 189-193 - Saeid Pakravan, Ghosheh Abed Hodtani:
Impact of Artificial Noise Assisted Transmission on the Physical Layer Security Performances in Wireless Wiretap Channel with Active Eavesdropper. 194-198 - Saeid Pakravan, Ghosheh Abed Hodtani:
The Relay Impact on the Physical Layer Security Performance of the Wireless Wiretap Channel. 199-203 - Yaping Yuan, Chung-Chin Lu:
A Modified MWPM Decoding Algorithm for Quantum Surface Codes Over Depolarizing Channels. 204-208 - Yuta Ochiai, Daisuke Ogawa, Yusuke Kozawa, Hiromasa Habuchi:
Influence of Reflected Light in Illumination-Light VN-CodeSK Based Positioning Systems. 209-213 - Lei Jiang, Amin Zribi, Tad Matsumoto, Jun-ichi Takada:
Iterative Model Identification and Tracking with Distributed Sensors. 214-218 - Suguru Sameshima, Tiancheng Wang, Shogo Usami, Tsuyoshi Sasaki Usuda:
PSK-type asymmetric quantum communication and its attenuation characteristics. 219-223 - Reiya Okawa, Ryosuke Kobayashi, Rie Shigetomi Yamaguchi:
Behavioral Authentication Method Focusing on the Tendency of the Days of the Week. 224-228 - Binh Le Thanh Thai, Hidema Tanaka:
An analysis of password security risk against dictionary attacks. 229-233 - Seiya Shimizu, Takeshi Nakai, Yohei Watanabe, Mitsugu Iwamoto:
An Improvement of Multi-Party Private Set Intersection Based on Oblivious Programmable PRFs. 234-238 - Anastasiia Doi, Tomoki Ono, Takeshi Nakai, Kazumasa Shinagawa, Yohei Watanabe, Koji Nuida, Mitsugu Iwamoto:
Card-based Cryptographic Protocols for Private Set Intersection. 239-243 - Mitsuharu Arimura:
A Class of Data Compression Where The Codeword Is a Computer Program Generating The Data. 244-248 - Kazuki Ogawa, Hiromu Takata, Motohiko Isaka:
Lossy Source Coding of Binary Memoryless Source by Trained LDGM Encoder. 249-253 - Vikrant Malik, R. K. Bansal:
Sequential Change Detection through Empirical Distribution and Universal Codes. 254-258
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.