default search action
ISITA 2014: Melbourne, Australia
- International Symposium on Information Theory and its Applications, ISITA 2014, Melbourne, Australia, October 26-29, 2014. IEEE 2014
- Giuliano Garrammone, Enrico Paolini, Marco Chiani:
Spectral shape of non-binary LDPC code ensembles with separated variable nodes. 1-5 - Kasra Vakilinia, Dariush Divsalar, Richard D. Wesel:
Optimized degree distributions for binary and non-binary LDPC codes in Flash memory. 6-10 - Masanori Hirotomo, Jun'ichi Tsurumi, Masakatu Morii:
On computing the weight distribution of non-binary ldpc codes using the probabilistic algorithm. 11-15 - Jossy Sayir:
Non-binary LDPC decoding using truncated messages in the Walsh-Hadamard domain. 16-20 - Masahito Hayashi:
Universal channel coding with continuous output system. 21-25 - Tsutomu Kawabata, Yoshiaki Kitayama:
A computation algorithm of the capacity of discrete memoryless channel with the input size larger than the output size. 26-29 - Sima Naseri, Somaie Yazdani, Behrooz Razeghi, Ghosheh Abed Hodtani:
A generalized write channel model for bit-patterned media recording. 30-34 - Hideki Yagi, Ryo Nomura:
Channel dispersion for well-ordered mixed channels decomposed into memoryless channels. 35-39 - Sathiamoorthy Manoharan, Aquib Master, Ulrich Speidel:
Complexity-based steganalysis. 40-44 - Tetsuya Kojima, Toru Tachikawa, Akihiro Oizumi, Yoshimasa Yamaguchi, Udaya Parampalli:
A disaster prevention broadcasting based on data hiding scheme using complete complementary codes. 45-49 - Minoru Kuribayashi:
Countermeasure to non-linear collusion attacks on spread spectrum fingerprinting. 50-54 - Sachiko Kanamori, Kanako Kawaguchi, Hidema Tanaka:
Study on a scheme for the right to be forgotten. 55-59 - Junhan Park, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa:
Analysis of Slow Read DoS attack. 60-64 - Kento Horikoshi, Hiroshi Hanaizumi, Shin Ishimaru:
An automated recognition technique for aorta aneurysm using thoracic multi-slice CT images. 65-69 - Ling-Hua Chang, Jwo-Yuh Wu:
An improved RIP-based performance guarantee for sparse signal reconstruction with noise via orthogonal matching pursuit. 70-74 - Thanh T. Nguyen, John C. Devlin, Darrell M. Elton, Guang Deng, Eddie Custovic, B. Bienvenue:
A comparison of FFT-based techniques for Doppler velocity estimation in SuperDARN radars. 75-79 - Takashi Ozaki, Yusuke Kozawa, Yohtaro Umeda:
Variable multi-pulse PPM using new dimming control method for visible light communications. 80-84 - Seyed Ali Saberali, Norman C. Beaulieu:
Matched-filter detection of the presence of MPSK signals. 85-89 - Tien-Hui Chen, Kuan-Chen Chen, Mao-Chao Lin:
A construction of LDPC convolutional codes with close distance bounds. 90-94 - Daiki Hato, Yu Morishima, Ikuo Oka, Shingo Ata:
Error probability analyses of maximum a posteriori probability decoding by moment techniques. 95-99 - Kana Kikuchi, Sen Moriya, Hiroshi Sasano:
Construction of high-rate punctured convolutional codes through dual codes. 100-104 - Emtithal Ahmed Talha, Ryuji Kohno:
Dependable medical network based on 4G cellular mobile standard with external channel code in concatenated code structure. 105-109 - Jagadeesh Harshan, Emanuele Viterbo:
Constellation constrained capacity of additive Gaussian mixture noise channels. 110-114 - Jun Muramatsu:
Formulas for limit superior/inferior in probability. 115-119 - Yuta Sakai, Ken-ichi Iwata:
Suboptimal quantizer design for outputs of discrete memoryless channels with a finite-input alphabet. 120-124 - Young-Sik Kim:
Estimation of Rényi entropy of order α based on the nearest neighbor distance. 125-129 - Hiroki Suyari, Antonio Maria Scarfone:
α-divergence derived as the generalized rate function in a power-law system. 130-134 - Ryuichi Sakai, Masao Kasahara:
New method for factoring two RSA moduli with implicit hint. 135-137 - Vorapong Suppakitpaisarn, Hiroshi Imai:
Worst case computation time for minimal joint Hamming weight numeral system. 138-142 - Shingo Hasegawa, Shuji Isobe:
Lossy identification schemes from decisional RSA. 143-147 - Hiroki Hayashi, Satoshi Obana:
Protocols for evaluating conditional sum on encrypted data. 148-152 - Kenichi Yamaya, Toshinobu Kaneko:
Differential probability for a component in non-linear function of K2 v2.0. 153-157 - Mihoko Wada, Keisuke Kodaira, Tomoharu Shibuya:
Entanglement-assisted quantum error-correcting codes based on the circulant permutation matrix. 158-162 - Kenjiro Yanagi:
Non-hermitian extensions of Schrödinger type uncertainty relations. 163-166 - Keisuke Kodaira, Tomoharu Shibuya:
On the condition on classical codes to construct quantum error correcting codes for amplitude damping channel. 167-171 - Antonín Hoskovec, Holger Frydrych, Igor Jex, Gernot Alber:
Decoupling bent quantum networks. 172-175 - Sachin Rai, Hiromasa Habuchi:
Enhancement of punctured turbo code with UTPA in optical wireless channel. 181-185 - Gou Hosoya, Hiroyuki Yashima:
An improvement of approximate BP decoding. 186-190 - Tatsumi Konishi:
A coded modulation scheme for 64-QAM with a matched mapping. 191-195 - Shun Watanabe, Masahito Hayashi:
Finite-length analysis on tail probability and simple hypothesis testing for Markov chain. 196-200 - Ryosuke Obi, Manabu Hagiwara, Reynald Affeldt:
Formalization of the variable-length source coding theorem: Direct part. 201-205 - Branko Ristic, Alex Skvortsov:
Bayesian estimation of the rates in a stochastic biochemical reaction network. 206-210 - Shota Saito, Nozomi Miya, Toshiyasu Matsushima:
Evaluation of the minimum overflow threshold of bayes codes for a Markov source. 211-215 - Pierre-Olivier Amblard, Olivier J. J. Michel:
Granger causality for functional valued random processes. 216-220 - Hidenori Kuwakado, Masazumi Kurihara:
Secure regenerating codes using linear MBR/MSR codes and the all-or-nothing transform. 221-225 - Hikaru Kishimoto, Shingo Okamura:
Secure consolidation of charging information over Smart Grid using ID federation. 226-230 - Shingo Hasegawa, Shuji Isobe:
On the security notions of signcryption. 231-235 - Naoto Yanai, Masahiro Mambo, Eiji Okamoto:
A CDH-based ordered multisignature scheme in the standard model with better efficiency. 236-240 - Tomoaki Tsuchikawa, Bhed Bahadur Bista, Toyoo Takata:
A proposal of distributed management scheme of content key information for pure P2P networks. 241-245 - Kazuki Sato, Kenji Nakahira, Shogo Usami, Tsuyoshi Sasaki Usuda:
Error performance for non-destructive quantum receiver of M-ary coherent-state signals. 246-249 - Naoki Iwata, Tsuyoshi Sasaki Usuda:
Quantum gain of coding by polar codes with finite codeword length. 250-253 - Shungo Asano, Tsuyoshi Sasaki Usuda:
A simple approximation of minimum error probability using trace distance. 254-258 - Shinji Koyama, Tsuyoshi Sasaki Usuda:
Error performance of optimum quantum detection for BPSK signals in the presence of phase noise and its robustness. 259-263 - Ricardo Antonio Parrao Hernandez, Brian M. Kurkoski:
Low complexity construction of low density lattice codes based on array codes. 264-268 - Keshava M. Elliadka, Robert Morelos-Zaragoza:
Precoding by Priority: A UEP scheme for RaptorQ codes. 269-273 - Takayuki Nozaki:
Fountain codes based on zigzag decodable coding. 274-278 - Li-Jen Chang, Chung-Hsuan Wang, John K. Zao:
An error-floor reduction technique for short-length LT codes. 279-283 - Mitsuharu Arimura:
On the coding rate of a multishot Tunstall code for stationary memoryless sources. 284-288 - Takahiro Ota, Hiroyoshi Morita:
On a two-dimensional antidictionary coding. 289-293 - Takahiro Ota, Hiroyoshi Morita:
On a universal antidictionary coding for stationary ergodic sources with finite alphabet. 294-298 - Maryam Hosseini, Narayana Santhanam:
On redundancy of memoryless sources over countable alphabets. 299-303 - Ulrich Speidel:
An extended similarity distance for use with computable information estimators. 304-308 - Kalpana Singh, Jian Zhong, Lynn Margaret Batten, Peter Bertók:
A solution for privacy-preserving, remote access to sensitive data. 309-313 - Veelasha Moonsamy, Lynn Batten:
Android applications: Data leaks via advertising libraries. 314-317 - Yasuyuki Nogami, Shunsuke Miyoshi:
Pairing-based cryptography for homomorphic cryptography. 318-321 - Masahito Hayashi:
Finite-length analysis for secret random number generation and coding theorems. 322-326 - Tomoyuki Morimae:
Basics and applications of measurement-based quantum computing. 327-330 - Harumichi Nishimura:
Quantum network coding and the current status of its studies. 331-334 - Ryutaroh Matsumoto:
Coding theoretic study of secure network coding and quantum secret sharing. 335-337 - Tuvi Etzion, Alexander Vardy:
A new construction for constant weight codes. 338-342 - Margreta Kuijper, Anna-Lena Trautmann:
List-decoding Gabidulin codes via interpolation and the euclidean algorithm. 343-347 - Manabu Hagiwara, Takaaki Sasaki:
On the primitive polynomial as the characteristic polynomial of a symmetric companion matrix. 348-352 - Hajime Matsui:
On generator polynomial matrices of generalized pseudo-cyclic codes. 353-357 - Norihiro Nakashima, Hajime Matsui:
A decoding algorithm for projective Reed-Muller codes of 2-dimensional projective space with DFT. 358-362 - Hokuto Takahashi, Ryutaroh Matsumoto, Tomohiko Uyematsu:
Maximum multicast throughput by network coding on undirected hypernetworks. 363-367 - Jiyong Lu, Xuan Guang, Fang-Wei Fu:
Distributed storage over unidirectional ring networks. 368-372 - Akiko Manada, Hiroyoshi Morita:
On some properties of distributed line graphs. 373-377 - Shiqiu Liu, Frédérique E. Oggier:
Two storage code constructions allowing partially collaborative repairs. 378-382 - David A. Karpuk, Camilla Hollanti, Amaro Barreal:
Node repair for distributed storage systems over fading channels. 383-387 - Shuiyin Liu, Yi Hong, Emanuele Viterbo:
Cooperative jamming for MIMO wiretap channels. 388-392 - Bin Dai, Zheng Ma:
Achievable rate-equivocation regions for relay broadcast channels with confidential messages. 393-397 - Maksym A. Girnyk, Mikko Vehkaperä, Jinhong Yuan, Lars K. Rasmussen:
On the ergodic secrecy capacity of MIMO wiretap channels with statistical CSI. 398-402 - Chao Qi, Yanling Chen, A. J. Han Vinck, Xiaohu Tang:
Binary transmissions over Gaussian wiretap channel under soft/hard decision decoding. 403-407 - Tao Ye, Darryl Veitch, Sarah Johnson:
RA-inspired codes for efficient information theoretic multi-path network security. 408-412 - Yasunori Nouda, Shinji Masuda, Ryosuke Nakamura, Hiroyasu Sano:
A single carrier block transmission scheme with scattered pilots for high-order modulation in fast fading channel. 413-417 - Masahiro Fujii, Yuta Kasajima, Hiroyuki Hatano, Atsushi Ito, Yu Watanabe:
A study on block equalization for OFDM systems with short Cyclic Prefix. 418-422 - Masato Saito:
Reducing the effect of delayed path beyond guard interval by compressed sensing in OFDM systems. 423-427 - Arash Tayebi, Stevan M. Berber, Akshya K. Swain:
Performance analysis of chaos based WSNs under jamming attack. 428-432 - Mao-Ching Chiu:
Non-binary polar codes with channel symbol permutations. 433-437 - Harish Vangala, Emanuele Viterbo, Yi Hong:
Permuted successive cancellation decoder for polar codes. 438-442 - Peter Trifonov, Vera Miloslavskaya:
Twisted polar codes. 443-447 - Alexios Balatsoukas-Stimming, Andreas Burg:
Faulty successive cancellation decoding of polar codes for the binary erasure channel. 448-452 - Vera Miloslavskaya, Peter Trifonov:
Sequential decoding of Reed-Solomon codes. 453-457 - Henning Maier, Rudolf Mathar:
User-relay duality in cyclic interference alignment for cascaded two-way relay networks. 458-462 - Ruchen Duan, Yingbin Liang, Ashish Khisti, Shlomo Shamai:
Dirty interference cancelation for multiple access channels. 463-467 - Shahab Ghasemi-Goojani, Hamid Behroozi:
State-dependent Gaussian Z-interference channel: New results. 468-472 - Peng Zhang, Frans M. J. Willems, Li Huang:
Capacity study of distributed beamforming in relation to constrained backbone communication. 473-477 - Nobuyuki Sugio, Hiroshi Aono, Kimihiko Sekino, Toshinobu Kaneko:
A new higher order differential of Camellia. 478-482 - SeongHan Shin, Kazukuni Kobara, Hideki Imai:
In search of secure domain parameters under strong diffie-hellman and related assumptions. 483-487 - Naoki Shibayama, Toshinobu Kaneko:
A new higher order differential of LBlock. 488-492 - Hideki Yoshikawa, Masahiro Kaminaga, Arimitsu Shikoda, Toshinori Suzuki:
Secret key reconstruction method using round addition DFA on lightweight block cipher LBlock. 493-496 - Yasuyuki Murakami, Shinsuke Hamasho, Masao Kasahara:
A knapsack public-key cryptosystem using two random sequences. 497-501 - Kun Wu, Khoirul Anwar, Tad Matsumoto:
Joint turbo equalization and BICM-ID-based IDMA over frequency selective fading channels. 502-506 - Takemi Suzuki, Takahiro Natori, Nari Tanabe, Toshihiro Furukawa:
Performance analysis of MC-CDMA channel estimation method using Kalman filter. 507-510 - Feng-Tsun Chien, Ronald Y. Chang:
Asymptotic reduced-rank MMSE in asynchronous MC-DS-CDMA systems. 511-515 - Ainiwan Abudoukeremu, Jincheng Huang, Yuta Ida, Takahiro Matsumoto, Shinya Matsufuji:
On BER performance of block coding MC-ZCZ-CDMA. 516-520 - Takuya Kusaka:
Introduction of a recursive method for specific weight binary vector generation in decreasing order of its reliability measure. 521-525 - Anna-Lena Trautmann, Emanuele Viterbo:
Cross-Error Correcting Integer Codes over ℤ2m. 526-530 - Haruhiko Kaneko:
Symbol-level synchronization using probability lookup-table for IDS error correction. 531-535 - Shan Lu, Wei Hou, Jun Cheng:
Coding scheme for T-user noisy multiple-access adder channel. 536-540 - Silas L. Fong:
Cut-set bound for generalized networks with deterministic channels. 541-545 - Makoto Ueda, Shigeaki Kuzuoka:
The error exponent of zero-rate multiterminal hypothesis testing for sources with common information. 546-550 - Yasutada Oohama:
Rate distortion for source coding with Markov side information at the decoder. 551-555 - Yasutada Oohama:
Encoding of markov sources with partial memoryless side information at the decoder. 556-560 - Yasuyuki Kobayashi, Yuichi Kaji, Hiroyuki Seki:
Information theoretical evaluation of the bucketing technique to mitigate timing attacks. 561-565 - Shingo Hasegawa, Shuji Isobe, Jun-ya Iwazaki, Eisuke Koizumi, Hiroki Shizuya:
Password-protected secret-sharing schemes without random oracles. 566-570 - A. J. Han Vinck, Aram Jivanyan, Jonas Winzen:
Gaussian fuzzy commitment. 571-574 - Pichanee Lumyong, Mitsugu Iwamoto, Kazuo Ohta:
Cheating on a visual secret sharing scheme under a realistic scenario. 575-579 - Samy S. Soliman, Norman C. Beaulieu:
Design factors for dual-hop AF systems with partial relay selection. 580-584 - Camilla Hollanti, Hsiao-feng Lu, David A. Karpuk, Amaro Barreal:
New relay-based transmission protocols for wireless distributed storage systems. 585-589 - Shiro Ikeda, Kazunori Hayashi, Toshiyuki Tanaka:
Channel capacity and achievable rates of peak power limited AWGNC, and their applications to adaptive modulation and coding. 590-594 - Takahiro Matsumoto, Hideyuki Torii, Yuta Ida, Shinya Matsufuji:
Study on BER performance of SS system using a Huffman sequence against CW jamming over AWGN channels. 595-599 - Tetsuya Kobayashi, Hiroyoshi Morita, Akiko Manada:
Position modulation code for non-binary Write-Once Memories. 600-604 - Kazuki Kumagai, Yuichi Kaji:
A flash code utilizing dynamic segment allocation. 605-609 - Ryota Sekiya, Erick Christian Garcia Alvarez, Brian M. Kurkoski, Hideki Yagi:
Write-Once Memory codes for low-complexity decoding of Asymmetric Multiple Access Channel. 610-614 - Jun Asatani, Mitsuaki Honji:
An improvement of performance to layered index-less indexed flash codes. 615-619 - Shohei Takeyama, Hiroshi Kamabe:
Code rate of constrained code for phase change memories. 620-624 - Henning Maier, Anas Chaaban, Rudolf Mathar:
Degrees of Freedom of the MIMO 3 -way channel. 625-629 - Choo W. R. Chiong, Yue Rong, Yong Xiang:
Channel estimation for frequency-selective two-way MIMO relay systems. 630-634 - Apriana Toding, Muhammad R. A. Khandaker, Yue Rong:
Transceiver optimization for MIMO multi-relay systems using projected gradient approach. 635-639 - Khoa Xuan Nguyen, Yue Rong:
Joint source and relay matrices optimization for interference MIMO relay systems. 640-644 - Anatoly Khina, Yuval Kochman, Uri Erez:
Improved rates and coding for the MIMO two-way relay channel. 645-649 - Takafumi Hayashi, Yodai Watanabe, Takao Maeda:
A novel class of binary zero-correlation zone sequence sets by using a cyclic difference set. 650-654 - Takafumi Hayashi, Yodai Watanabe, Shinya Matsufuji, Takao Maeda:
A novel zero-correlation zone sequence set having a low-peak factor and a flat power spectrum. 655-659 - Chikara Miyazaki, Takeru Miyazaki, Satoshi Uehara, Shunsuke Araki:
Relations between evaluations of NIST tests and Lyapunov exponents of sequences generated by the logistic map over integers. 660-664 - Kyohei Yoshida, Takeru Miyazaki, Satoshi Uehara, Shunsuke Araki:
Some properties of the maximum period on the logistic map over Z2n. 665-668 - Takao Maeda, Takafumi Hayashi:
Parameterization of high-dimensional perfect sequences over a composition algebra over ℝ. 669-673 - Rathnakumar Radhakrishnan, Nedeljko Varnica, Mats Öberg:
Estimation of areal density gains of TDMR system with 2D detector. 674-678 - Chaitanya Kumar Matcha, Shayan Garani Srinivasa, Seyed Mehrdad Khatami, Bane Vasic:
Two-dimensional noise-predictive maximum likelihood method for magnetic recording channels. 679-683 - Kheong Sann Chan:
A review study on the benefits of multi-reader heads in SMR and TDMR systems. 684-688 - Parastoo Sadeghi, Mingchao Yu, Neda Aboutorab:
On throughput-delay tradeoff of network coding for wireless communications. 689-693 - Nadya Markin, Frédérique E. Oggier:
Information inequalities and finite groups: an overview. 694-698 - Chi Wan Sung, Xueqing Gong:
Combination network coding: Alphabet size and zigzag decoding. 699-703 - Mostafa Shabani, Terence H. Chan:
Graph-based code construction for data storage. 704-708 - Shunsuke Araki, Ken'ichi Kakizaki, Takeru Miyazaki, Satoshi Uehara:
Initial values entering into an element zero with period one for logistic maps over integers. 709-713 - Takeru Miyazaki, Shunsuke Araki, Satoshi Uehara, Yasuyuki Nogami:
A study of an automorphism on the logistic maps over prime fields. 714-718 - Yasuyuki Nogami, Kazuki Tada, Satoshi Uehara:
An efficient generation of geometric sequences defined with trace and legendre symbol. 719-721 - Takayasu Kaida, Junru Zheng, Keiichi Takahashi:
On generalized constant-weight codes over GF(q) from a cyclic difference set and their properties. 722-726
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.