default search action
ISITA 2012: Honolulu, HI, USA
- Proceedings of the International Symposium on Information Theory and its Applications, ISITA 2012, Honolulu, HI, USA, October 28-31, 2012. IEEE 2012, ISBN 978-1-4673-2521-9
- Mustafa El-Halabi, Costas N. Georghiades:
On secure communication with known interference. 1-5 - Hiroshi Kamabe, Hiroshi Ono:
3-Bit decoding algorithm for AWGN channels. 1-5 - Ryoji Haga, Shogo Usami:
Multi-bit flip type gradient descent bit flipping decoding using no thresholds. 6-10 - Kuo-Kuang Yen, Chih-Lung Chen, Hsie-Chia Chang:
An improved LT encoding scheme with extended chain lengths. 11-15 - Kazuki Kobayashi, Tomoharu Shibuya:
Generalization of Lu's linear time encoding algorithm for LDPC codes. 16-20 - Keisuke Komatsubara, Kaiji Mukumoto, Tadahiro Wada:
Proposal of new decision feedback carrier synchronization method for meteor burst communications. 21-25 - Kohsuke Harada, Yasushi Tomizawa, Akihiko Takeo, Yuuichi Yamada, Kazuto Kashiwagi, Kenji Yoshida:
A study on read-back signal generation modeling for shingled-write magnetic recording from experimental results. 26-30 - Shinji Tsuzuki, Yukiaki Yoshizawa, Intan Sari Areni, Yoshio Yamada:
N-PE transmission system for Narrow-Band PLC. 31-35 - Robert Morelos-Zaragoza:
Unequal error protection with CRC-16 bits in EPC class-1 generation-2 UHF RFID systems. 36-40 - Benshuai Xu, Zarko B. Krusevac, Predrag B. Rapajic, Yifan Chen:
Maximum mutual information rate for the Uniformly Symmetric Variable Noise FSMC without channel state information. 41-45 - Yasutada Oohama:
On two strong converse theorems for discrete memoryless channels. 46-50 - Mohammad Naghshvar, Tara Javidi:
Optimal reliability over a DMC with feedback via deterministic sequential coding. 51-55 - Satoru Nakagawa, Motohiko Isaka:
Non-binary serially concatenated codes for distributed source coding. 56-60 - Xin He, Xiaobo Zhou, Khoirul Anwar, Tad Matsumoto:
Wireless mesh networks allowing intra-link errors: CEO problem viewpoint. 61-65 - Krishnamoorthy Iyer, Sibi Raj B. Pillai, Bikash Kumar Dey:
Power controlled adaptive sum-capacity in the presence of distributed CSI. 66-70 - Joe Suzuki:
Bayesian criteria based on universal measures. 71-75 - Rhonda D. Phillips:
The multiple sensor positive detection problem. 76-80 - John T. Flåm, Mikko Vehkaperä, Dave Zachariah, Efthymios Tsakonas:
Mean square error reduction by precoding of mixed Gaussian input. 81-85 - Nozomi Miya, Tota Suko, Goki Yasuda, Toshiyasu Matsushima:
Asymptotics of Bayesian estimation for nested models under misspecification. 86-90 - Justin Kong, Manabu Hagiwara:
Comparing Euclidean, Kendall tau metrics toward extending LP decoding. 91-95 - Myeongwoon Jeon, Jungwoo Lee:
On codes correcting bidirectional limited-magnitude errors for flash memories. 96-100 - Brian M. Kurkoski:
Lattice-based WOM codebooks that allow two writes. 101-105 - Hiroyuki Nagahara, Yuichi Kaji:
Index-less flash codes with arbitrary small slices. 106-110 - Takuya Kusaka, Ryuhei Yokoyama, Toru Fujiwara:
A soft-decision sphere decoding based on the recursive vector generator. 111-115 - Bowen Dai, Lei Wei:
Some results and challenges on codes and iterative decoding with non-equal symbol probabilities. 116-120 - Yasuaki Nakamura, Yoshihiro Okamoto, Hisashi Osawa, Hajime Aoi, Hiroaki Muraoka:
Write-margin evaluation of LDPC coding and iterative decoding system in BPM R/W channel with write-errors. 121-124 - Watid Phakphisut, Pornchai Supnithi:
Mixed-scheduling belief propagation for LDPC decoders in the magnetic recording systems. 125-129 - Tatsumi Konishi:
Novel 64QAM space-time codes using a large number of receive antennas. 130-134 - Ryo Araki, Naoki Kobayashi, Akira Nakamura, Kohei Ohno, Makoto Itami:
Cooperative reception scheme using multiple terminals for digital terrestrial television broadcasting One-Segment Service. 135-139 - Naoki Sunaga, Kohei Ohno, Makoto Itami:
A theoretical study on demodulation of pre-coded OFDM by pre-coded symbol replacement. 140-144 - Masaaki Moriyama, Yasunori Iwanami:
Complexity reduction using QRD-M or SD in MIMO Interleaved SC-FDMA receiver with iterative detection. 145-149 - Genji Hayashi, Tomoaki Ohtsuki:
Interference mitigation depending on the number of antennas and CSI available at femtocells. 150-154 - Shigeaki Kuzuoka:
On the redundancy of variable-rate Slepian-Wolf coding. 155-159 - Sheng Huang, Mikael Skoglund:
Computing polynomial functions of correlated sources: Inner bounds. 160-164 - Farshad Naghibi, Ragnar Thobaben, Somayeh Salimi, Mikael Skoglund:
Layered LDPC convolutional codes for compression of correlated sources under adversarial attacks. 165-169 - Elsa Dupraz, Aline Roumy, Michel Kieffer:
Source coding with side information at the decoder: Models with uncertainty, performance bounds, and practical coding schemes. 170-174 - Shahid Mahmood Satti, Nikos Deligiannis, Adrian Munteanu, Peter Schelkens, Jan Cornelis:
An optimization algorithm for scalable multiple description scalar quantizers. 175-179 - Chiaki Honda, Ikuo Oka, Shingo Ata:
Signal detection and modulation classification using a goodness of fit test. 180-183 - Ryo Ogawara, Masahiro Fujii, Yu Watanabe:
A study on location tracking system using Kalman filter based on sensor information. 184-188 - Nao Masuoka, Tetsuo Tsujioka, Shinsuke Hara:
Heart rate detection from waist ECG/PCG sensors for a vital signal acquisition system for athletes. 189-193 - Takahiro Ota, Hiroyoshi Morita:
On real-time arrhythmia detection in ECG monitors using antidictionary coding. 194-198 - Shigeyori Nagahashi, Tsuyoshi Sasaki Usuda, Ichi Takumi:
Improvement of 2-EPP using quantum error correcting codes and binary search. 199-202 - Yoshiaki Yazaki, Shogo Usami, Tsuyoshi Sasaki Usuda:
Superiority of 2-EPPs to 1-EPPs with finite entangled resources. 203-207 - Kao-Yueh Kuo, Chung-Chin Lu:
On the hardness of decoding quantum stabilizer codes under the depolarizing channel. 208-211 - Kazuha Ohashi, Tsuyoshi Sasaki Usuda:
Property of capacity by WDM for attenuated quantum channel. 212-215 - Tooru Shigehiro, Hirohisa Yabe, Keiichi Iwamura:
An improvement of insertion/deletion/substitution error correction capabilities of LDPC codes using slide decoding. 216-220 - Masato Inoue, Haruhiko Kaneko:
Insertion/deletion/substitution error correction using adaptive inversion of synchronization marker. 221-225 - Yuichiro Fujiwara, Vladimir D. Tonchev:
A direct product construction for high-rate self-synchronizing codes. 226-229 - Reolyn Heymann, Hendrik C. Ferreira, Theo G. Swart:
Combined permutation codes for synchronization. 230-234 - Lakshmi Prasad Natarajan, B. Sundar Rajan:
An Adaptive Conditional Zero-Forcing decoder with full-diversity, least complexity and essentially-ML performance for STBCs. 235-239 - Yichao Huang, Chee Wei Tan, Bhaskar D. Rao:
Large system analysis of power minimization in multiuser MISO downlink with transmit-side channel correlation. 240-244 - Keigo Takeuchi, Ralf R. Müller, Tsutomu Kawabata:
Large-system analysis of joint user selection and vector precoding with zero-forcing transmit beamforming for MIMO broadcast channels. 245-249 - Vijayvaradharaj T. Muralidharan, B. Sundar Rajan:
An alternate view of transmit diversity for the collocated MIMO system. 250-254 - Masazumi Kurihara, Hidenori Kuwakado:
Secret sharing schemes based on minimum bandwidth regenerating codes. 255-259 - Hiroki Koga, Kazuya Koyano:
On the role of mutual infomation between the shares in a robust (k, n)-threshold scheme. 260-264 - Atsushi Waseda, Masakazu Soshi:
Consideration for multi-threshold multi-secret sharing schemes. 265-269 - Todorka Alexandrova, Gergely Huzsak, Hiroyoshi Morita:
Churn resilience in network coding-based anonymous P2P system. 270-274 - Toma Miyata, Kosuke Teramoto, Naoyuki Aikawa:
A design method for FIR filters with complex coefficients by Successive Projection method. 275-278 - Ikuya Murakami, Yukio Mori, Naoyuki Aikawa:
An L1-method for designing FIR digital filters with complex coefficients. 279-283 - Nam Yul Yu:
On statistical restricted isometry property of a new class of deterministic partial Fourier compressed sensing matrices. 284-288 - Amirpasha Shirazinia, Saikat Chatterjee, Mikael Skoglund:
Performance bounds for vector quantized compressive sensing. 289-293 - Christian Rohlfing, Hauke Krüger, Peter Vary:
Logarithmic Cubic Vector Quantization: Concept and analysis. 294-298 - Takuya Kubo, Hiroshi Nagaoka:
Lower bounds on the error probability in classical and quantum state discrimination. 299-302 - Mark M. Wilde, Saikat Guha:
Explicit receivers for pure-interference bosonic multiple access channels. 303-307 - Hiro Yamashita, Tsuyoshi Sasaki Usuda, Shogo Usami:
Error performance of semi-classical quantum receivers for CPPM signals in KCQ key generation. 308-311 - Hidenori Kuwakado, Masakatu Morii:
Security on the quantum-type Even-Mansour cipher. 312-316 - Masakazu Yoshida, Takayuki Miyadera, Hideki Imai:
Quantum key distribution using Mean King problem with modified measurement schemes. 317-321 - Kazushi Mimura, Tadashi Wadayama, Yoshiyuki Kabashima:
Average growth rate of low-density generator-matrix codes ensembles. 322-326 - Akiyuki Yano, Tadashi Wadayama:
Probabilistic analysis of the network reliability problem on a random graph ensemble. 327-331 - Yuki Fujii, Tadashi Wadayama:
A coding theoretic approach for evaluating accumulate distribution on minimum cut capacity of weighted random graphs. 332-336 - David G. M. Mitchell, Kenta Kasai, Michael Lentmaier, Daniel J. Costello Jr.:
Asymptotic analysis of spatially coupled MacKay-Neal and Hsu-Anastasopoulos LDPC codes. 337-341 - Guanghui Song, Yuta Tsujii, Jun Cheng, Yoichiro Watanabe:
Extrinsic information transfer analysis of finite field spreading. 342-346 - Hayato Noguchi, Shin'ichi Tachikawa:
A novel spreading sequence and its performances for code-diversity in DS/CDMA communication systems. 347-351 - Masaya Yamagata, Hiromasa Habuchi:
A novel synchronization scheme for Bi-orthogonal modulation using modified pseudo-ternary M-sequence. 352-356 - Yusuke Kozawa, Hiromasa Habuchi:
Analysis of hierarchical multi-pulse PPM using modified pseudo orthogonal M-sequence set. 357-361 - Tomoyuki Mochizuki, Kouji Ohuchi:
Performance analysis of multi-pulse PPM/CSK on Ultra Wideband Impulse Radio. 362-366 - Sue-May Huang, Hsiao-feng Francis Lu, Stefan M. Moser:
Minimal-rate description for multiple-access channels. 367-371 - Nan Jiang, Yang Yang, Anders Høst-Madsen, Zixiang Xiong:
Sending two Gaussians over the Gaussian MAC with bandwidth expansion. 372-376 - Hideki Yagi:
Finite blocklength bounds for multiple access channels with correlated sources. 377-381 - Shan Lu, Jun Cheng, Yoichiro Watanabe:
Decoding for non-binary signature code. 382-386 - Xiaoli Xu, Satyajit Thakor, Yong Liang Guan:
Weighted sum-rate functional dependence bound for network coding capacity. 387-391 - Taisuke Yamamoto, Youji Fukuta, Masami Mohri, Masanori Hirotomo, Yoshiaki Shiraishi:
A distribution scheme of certificate revocation list by inter-vehicle communication using a random network coding. 392-395 - Easton Li Xu, Weiping Shang, Guangyue Han:
A graph theoretical approach to network encoding complexity. 396-400 - Prasad Krishnan, B. Sundar Rajan:
A construction of matroidal error correcting networks. 401-405 - Frédérique E. Oggier, Adnen Sboui:
On the existence of generalized rank weights. 406-410 - Chitchanok Chuengsatiansup:
Faster elliptic curve arithmetic for double-base chain by reordering sequences of field operations. 411-445 - Masayuki Yoshino, Noboru Kunihiro:
Improving GGH cryptosystem for large error vector. 416-420 - Takato Hirano, Mitsuhiro Hattori, Takashi Ito, Nori Matsuda, Takumi Mori:
Homomorphic encryption based cancelable biometrics secure against replay and its related attack. 421-425 - Ken Naganuma, Masayuki Yoshino, Hisayoshi Sato:
Upper bound of the shortest vector coefficients and its applications. 426-430 - Masaya Fujisawa, Shojiro Sakata:
Improved multipoint codes from Hermitian curves. 431-435 - Hajime Matsui:
Decoding a class of affine variety codes with fast DFT. 436-440 - Junru Zheng, Takayasu Kaida:
The designed minimum distance of medium lengths for binary cyclic codes. 441-445 - Takayasu Kaida, Junru Zheng:
On improved algorithms of the proposed lower bound including well-known bounds for cyclic codes. 446-449 - Giuliano Gadioli La Guardia:
On nonbinary quantum nonprimitive non-narrow-sense BCH codes. 450 - Donghoon Lee, Sung-Il Kim, Jaeyoung Lee, Jun Heo:
Performance of multihop decode-and-forward relaying assisted device-to-device communication underlaying cellular networks. 455-459 - Asma Bagheri, Ghosheh Abed Hodtani:
Carrier to interference ratio in shotgun cellular systems over composite fading channels. 460-464 - Fong-Ru Huang, Mao-Ching Chiu, Wern-Ho Sheen:
User pairing algorithms for multi-cell and multi-user communications. 465-469 - Koichiro Hashiura, Fumie Ono:
Performance evaluation of the modified binary countdown scheme considering the priority of packet. 470-474 - Yuta Ashida, Kuniyoshi Okuda, Wataru Uemura:
A VLC receiving devise using audio jacks with a folding noise. 475-479 - Shota Kanahara, Madoka Hasegawa, Shigeo Kato, Yuichi Tanaka:
A fast binary arithmetic coding using probability table of expanded symbols. 480-484 - Mitsuharu Arimura, Ken-ichi Iwata:
On variable-to-fixed length coding of a general source with infinite alphabet. 485-488 - Ken-ichi Iwata, Mitsuharu Arimura, Yuki Shima:
On the maximum redundancy of CSE for I.I.D. sources. 489-492 - Shigeki Miyake, Jun Muramatsu:
Universal codes on continuous alphabet using sparse matrices. 493-497 - T. Aaron Gulliver, Ulrich Speidel:
On the ratio between the maximal T-complexity and the T-complexity of random strings. 498-500 - Mohamed Kashef, Anthony Ephremides:
Optimal scheduling for two sources over time varying wireless channels. 501-505 - Qing He, Vangelis Angelakis, Anthony Ephremides, Di Yuan:
Revisiting minimum-length scheduling in wireless networks: An algorithmic framework. 506-510 - Yichao Huang, Bhaskar D. Rao:
On rate scaling laws with CDF-based distributed scheduling in multicell networks. 511-515 - Mohsen Sardari, Ahmad Beirami, Faramarz Fekri:
Memory placement in network compression: Line and grid topologies. 516-520 - Kazumaro Aoki:
A middletext distinguisher for full CLEFIA-128. 521-525 - Naoki Shibayama, Toshinobu Kaneko:
A peculiar higher order differential of CLEFIA. 526-530 - Yuji Iikubo, Shunsuke Horii, Toshiyasu Matsushima:
The optimal key estimation of stream ciphers and its approximation algorithm based on a probabilistic inference. 531-535 - Xuedi Song, Kazukuni Kobara, Kentaro Imafuku, Hideki Imai:
HB♭ protocol for lightweight authentication; Its information theoretic indistinguishability against MITM attack watching reader's response. 536-540 - Yuichi Komano, Hideo Shimizu, Chiho Mihara:
Another look on the relation between template attack and higher order DPA. 541-545 - Chi-Jen Wu, Chung-Hsuan Wang, Chi-Chao Chao:
Unequal error protection QC-LDPC codes via Masking. 546-550 - Masanori Hirotomo, Masakatu Morii:
An efficient method for computing the weight spectrum of LDPC convolutional codes constructed from quasi-cyclic codes. 551-555 - Manabu Hagiwara, James B. Nation:
Weight enumerator analysis for (2, P)- and (3, P)-SFA LDPC codes. 556-560 - Satoru Aoyama, Shogo Usami:
Consideration on modified gold sequences for optical CDM. 561-565 - Junya Amano, Tadahiro Wada, Kaiji Mukumoto:
An evaluation of a parallel transmission visible light communication system employing an LDPC code. 566-570 - Tetsuo Tsujioka:
A study on code construction of optical orthogonal codes with variable chip rates. 571-575 - Chiharu Mukai, Kouji Ohuchi:
BER performance of multiplexed CSK using linear/circular polarization in optical wireless communications. 576-580 - Shoichiro Matsumoto, Koji Kamakura:
Two-level signaling for IPACT in passive optical networks. 581-585 - Shounak Roychowdhury, Sarfraz Khurshid:
Localization of faults in software programs using Bernoulli divergences. 586-590 - Yuichi Futa, Daichi Mizushima, Hiroyuki Okazaki:
Formalization of Gaussian integers, Gaussian rational numbers, and their algebraic structures with Mizar. 591-595 - Nicholas Kolokotronis, Konstantinos Limniotis:
On the second-order nonlinearity of cubic Maiorana-McFarland Boolean functions. 596-600 - Nicholas Kolokotronis, Konstantinos Limniotis:
A greedy algorithm for checking normality of cryptographic boolean functions. 601-605 - Akiko Manada:
On a Shannon cover of certain reducible shift of finite type. 606-610 - Young-Sik Kim, Ji-Woong Jang, Sang-Hyo Kim, Jong-Seon No:
Linear complexity of quaternary sequences constructed from binary Legendre sequences. 611-614 - Young-Sik Kim, Ji-Woong Jang, Sang-Hyo Kim, Jong-Seon No:
On the linear complexity over Fp of quaternary sequences from binary Sidel'nikov sequences. 615-619 - Takeru Miyazaki, Shunsuke Araki, Satoshi Uehara:
Distribution of the loops on the logistic maps over integers for the control parameter. 620-624 - Takao Maeda, Takafumi Hayashi:
Fourier analysis of sequences over a composition algebra of the real number field. 625-628 - Motoi Iwata:
Digital watermarking method by selecting suitable pixel value from pixel value candidates near to original pixel value. 629-633 - Yamamoto Hiroshi, Fujioka Hayato:
An implementation of steganography using construction of Huffman tree. 634-637 - Ryusuke Mayuzumi, Tetsuya Kojima:
An improvement of steganography scheme based on complete complementary codes. 638-642 - Minoru Kuribayashi:
Analysis of binary fingerprinting codes under relaxed marking assumption. 643-647 - Masato Tajima, Koji Okino:
Error-trellises for tailbiting convolutional codes. 648-652 - Nicolas Sendrier, Marion Bellard:
Reconstruction of constellation labeling with convolutional coded data. 653-657 - Hideki Yoshikawa:
Theoretical analysis of bit error probability for punctured convolutional codes. 658-661 - Hiroshi Sasano, Sen Moriya:
A construction of high rate punctured convolutional codes. 662-666 - Naoki Kikuchi, Mamiko Inamori, Yukitoshi Sanada:
Coupling effects between transmit and receive antennas in frequency offset amplify-and-forward relay. 667-671 - Nico Aerts, Marc Moeneclaey:
SAGE-based estimation algorithms for time-varying channels in Amplify-and-forward cooperative networks. 672-676 - Pham Thanh Hiep, Ryuji Kohno:
Trade-off of multiplexing-diversity gain for high throughput multiple-hop MIMO relay system. 677-681 - Daniel Ciarlini Pinheiro, Yasunori Iwanami:
MIMO detect-and-forward relay scheme using symbol LLR threshold. 682-686 - Minqi Shen, Anders Høst-Madsen, Yabo Li:
Energy efficiency in large interference networks. 687-691 - Mustafa Ozmen, Mustafa Cenk Gursoy, Pramod K. Varshney:
Energy efficiency in fading interference channels under QoS constraints. 692-696 - Shun Watanabe, Yasutada Oohama:
Cognitive interference channels with confidential messages under randomness constraint. 697-701 - Keisuke Yamazaki:
Accuracy of latent variable estimation with the maximum likelihood estimator for partially observed hidden data. 707-711 - Shunsuke Horii, Manabu Kobayashi, Toshiyasu Matsushima, Shigeichi Hirasawa:
Fault diagnosis algorithm in multi-computer systems based on Lagrangian relaxation method. 712-716 - Manabu Kobayashi, Hiroshi Ninomiya, Toshiyasu Matsushima, Shigeichi Hirasawa:
An error probability estimation of the document classification using Markov model. 717-721 - Makoto Suzuki, Naohide Yamagishi, Yi-Ching Tsai:
Chinese text categorization using the character N-gram. 722-726 - Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita, Hiroshi Yamaguchi, Masahito Gotaishi, Yukiyasu Tsunoo, Takahiko Syouji, Norihisa Doi:
Scheme overcoming incompatibility of privacy and utilization of personal data. 727-730 - Ryuichi Sakai, Yasuyuki Murakami, Masao Kasahara:
Security analysis of shifted odd knapsack public key encryption scheme. 731-734 - Yasuyuki Murakami, Shinsuke Hamasho, Masao Kasahara:
A public-key cryptosystem based on decision version of subset sum problem. 735-739 - Shunsuke Araki, Takeru Miyazaki, Satoshi Uehara, Ken'ichi Kakizaki:
A study on precision of pseudorandom number generators using the logistic map. 740-744 - Mark M. Wilde, Joseph M. Renes:
Polar codes for private classical communication. 745-749 - Mine Alsan:
Performance of mismatched polar codes over BSCs. 750-755 - Junya Honda, Hirosuke Yamamoto:
Fast Linear-Programming decoding of LDPC codes over GF(2m). 754-758 - Yasuhiro Kitamura, Shinsuke Ibi, Seiichi Sampei:
A hybrid structured turbo code of CBRM in conjunction with XOR coded parity compression. 759-763 - Eriko Saeki, Ryuji Kohno:
Error-controlling scheme with encoding and spreading in multi-hop relay network. 764-768 - Chuan Huang, Shuguang Cui:
Capacity bounds for the alternative relaying diamond channel with conferencing links. 769-773 - Ping-Chung Wang, Hua-Lung Tsai, Mao-Chao Lin:
A design of code-aided channel estimation in two-way relay networks. 774-778 - Daniel J. Louw, Haruhiko Kaneko:
A system combining extrapolated and interpolated side information for single view multi-hypothesis distributed video coding. 779-783 - Sathiamoorthy Manoharan:
Steganalysis of synthetic low-colour images. 784-788 - Liang Chang, Jingde Xu, Kun Tang, Huijuan Cui:
A new robust pitch determination algorithm for telephone speech. 789-791 - Tadakazu Sakakura, Akira Hayashi:
Performance characteristics of LSB steganalysis based on statistics of image difference signal. 792-796 - Seigo Ikeda, Maki Yoshida, Toru Fujiwara:
New hybrid additive-multiplicative watermarking with better tradeoff between image quality and detection accuracy. 797-801 - Hiroki Nishikawa, Yoshio Kakizaki, Keiichi Iwamura:
Proposal of a watermarking scheme using winding number and unneeded synchronism. 802-805 - Tetsuya Kojima, Naoki Ohtani:
Private and blind digital fingerprinting schemes based upon complete complementary codes. 806-810
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.