default search action
ISITA 2020: Kapolei, HI, USA
- International Symposium on Information Theory and Its Applications, ISITA 2020, Kapolei, HI, USA, October 24-27, 2020. IEEE 2020, ISBN 978-4-88552-330-4
- Olivier Rioul:
Rényi Entropy Power and Normal Transport. 1-5 - Xueyan Niu, Christopher J. Quinn:
Synergy and Redundancy Duality Between Gaussian Multiple Access and Broadcast Channels. 6-10 - V Arvind Rameshwar, Aryabhatt M. Reghu, Navin Kashyap:
On the Capacity of the Flash Memory Channel with Feedback. 11-15 - Shota Saito, Toshiyasu Matsushima:
On Two Information Quantities Relating Two Distortion Balls. 16-20 - Tetsunao Matsuta, Tomohiko Uyematsu:
An Equivalent Expression for the Wyner-Ziv Source Coding Problem. 21-25 - Shigeaki Kuzuoka:
A Study on the Overflow Probability of Variable-to-Fixed Length Codes. 26-30 - Michail Mylonakis, Photios A. Stavrou, Mikael Skoglund:
Remote Empirical Coordination. 31-35 - Yasutada Oohama:
Exponent Function for the Gel'fand-Pinsker Channel at Rates above the Capacity. 36-40 - Éric Jacopin:
Entropy to Control Planning in Video-Games. 41-45 - Lóránt Farkas:
Trellis Code Error Exponent From Results for Asynchronous Multiple Access Channels. 46-50 - Mohammadamin Baniasadi, Ertem Tuncel:
Minimum Energy Analysis for Robust Gaussian Joint Source-Channel Coding with a Square-Law Profile. 51-55 - Srinivas Avasarala, Sharang M. Sriram, Soumya Jana:
On Berger-Tung Inner Bound for Sum-Rate versus Sum-Distortion Problem. 56-60 - Hiroki Koga:
Coding Theorems on the Simple Capacity for Digital Fingerprinting Codes. 61-65 - Omri Lev, Anatoly Khina:
Gauss-Markov Source Tracking with Side Information: Lower Bounds. 66-70 - Sharu Theresa Jose, Osvaldo Simeone:
Address-Event Variable-Length Compression for Time-Encoded Data. 71-75 - Yuta Sakai, Vincent Y. F. Tan:
Third-Order Asymptotics of Variable-Length Compression Allowing Errors. 76-80 - Yuta Nakahara, Toshiyasu Matsushima:
Autoregressive Image Generative Models with Normal and t-distributed Noise and the Bayes Codes for Them. 81-85 - Ryota Yoshizawa, Kenichiro Furuta, Yuma Yoshinaga, Osamu Torii, Tomoya Kodama:
An Effective Learning Scheme for Weighted-BP with Parallel Permutation Decoding. 86-90 - Naoki Ide, Tetsuya Asayama, Hiroshi Ueno, Masayuki Ohzeki:
Maximum Likelihood Channel Decoding with Quantum Annealing Machine. 91-95 - Yunseo Nam, Song-Nam Hong, Namyoon Lee:
Orthogonal Sparse Superposition Codes. 96-100 - Ilya Dumer, Navid Gharavi:
Codes for high-noise memoryless channels. 101-105 - Tiancheng Wang, Tsuyoshi Sasaki Usuda:
Effect of Non-Gaussian Noise Due to Beam Wandering on Error Performance of Quantum Measurement. 106-110 - Yuto Takahashi, Tiancheng Wang, Shogo Usami, Tsuyoshi Sasaki Usuda:
Performance Evaluation of Ghost Imaging with Orthogonal/Non-orthogonal Quantum States in Terms of Image Quality. 111-115 - Jun Yamauchi, Yuto Takahashi, Tiancheng Wang, Tsuyoshi Sasaki Usuda:
Quantum Illumination using Quasi-Bell States. 116-120 - Ryusuke Miyazaki, Mana Yoshida, Tiancheng Wang, Tsuyoshi Sasaki Usuda:
Simplification of the Calculation of the Channel Matrix for AMPM Coherent-state Signals. 121-125 - Yuya Naruse, Shan Lu, Hiroshi Kamabe:
Design of ZDF code using uniform shift enumerator. 126-130 - Kento Nakada:
A family of perfectness of the Levenshtein codes La(n;2n). 131-135 - Anastasiia Smeshko, Fedor I. Ivanov, Victor V. Zyablov:
Theoretical Estimates of Burst Error Probability for Convolutional Codes. 136-140 - Chien-Sheng Yang, Amir Salman Avestimehr:
Coded Computing for Boolean Functions. 141-145 - Yanyan Dong, Shenghao Yang:
On Optimal Finite-length Binary Codes of Four Codewords for Binary Symmetric Channels. 146-150 - Toshihiro Niinomi, Hideki Yagi, Shigeichi Hirasawa:
Upper Bounds on the Error Probability for the Ensemble of Linear Block Codes with Mismatched Decoding. 151-155 - Sangook Lee, Kazunori Iwata, Kazushi Mimura:
Property of Quantum Decoding for Sourlas Codes of Which Tuples Are Randomly Decimated. 156-159 - Anastasiia Smeshko, Fedor I. Ivanov, Victor V. Zyablov:
Upper and Lower Estimates of Frame Error Rate for Convolutional Codes. 160-164 - Ramy F. Taki ElDin, Hajime Matsui:
Generator Polynomial Matrices of Reversed and Reversible Quasi-Cyclic Codes. 165-169 - Takuya Ohara, Makoto Takita, Masakatu Morii:
A Construction of Binary Punctured Linear Codes and A Supporting Method for Best Code Search. 170-174 - Min Zhu, David G. M. Mitchell, Michael Lentmaier, Daniel J. Costello Jr.:
Decoder Error Propagation Mitigation for Spatially Coupled LDPC Codes. 175-179 - Masaki Kawaguchi, Hajime Matsui:
Finding Self-Dual Quasi-Cyclic Codes with Large Minimum Weight via Polynomial Matrices. 180-184 - Yunqi Wan, Li Chen, Fangguo Zhang:
Algebraic List Decoding of Elliptic Codes Through Module Basis Reduction. 185-189 - Yong-Ting Ni, Cheng-Yu Pai, Chao-Yu Chen:
An Iterative Bit-Flipping Decoding Algorithm For Binary Reed-Muller Codes *. 190-194 - Kirill Ivanov, Rüdiger L. Urbanke:
On the dependency between the code symmetries and the decoding efficiency. 195-199 - Mohammad Rowshan, Andreas Burg, Emanuele Viterbo:
Complexity-efficient Fano Decoding of Polarization-adjusted Convolutional (PAC) Codes. 200-204 - Rejoy Roy Mathews, Chris Winstead:
Decoding LDPC Codes with Probabilistic Local Maximum Likelihood Bit Flipping. 205-209 - Yung-Tsao Hsu, Mao-Chao Lin:
A Design of Differentially Encoded LDPC Coding Based on Multi-Edge Framework. 210-214 - Masoome Otarinia, Thomas E. Fuja:
The 5G New Radio Code: Elementary Absorbing Sets and Error Floor Performance. 215-219 - Gou Hosoya, Toshihiro Niinomi:
Performance of Non-Binary LDPC Codes on Two-Dimensional Array Erasure Models. 220-224 - Yuta Iketo, Takayuki Nozaki:
Encoding Algorithm of Binary and Non-binary Irregular LDPC Codes via Block Triangular Matrices with Low Weight Diagonal Submatrices. 225-229 - Yi-Hsuan Chen, Yu-Ting Liu, Chung-Hsuan Wang, Chi-Chao Chao:
Analysis of UEP QC-LDPC Codes Using Density Evolution. 230-234 - Gada Rezgui, Asma Maaloui, Iryna Andriyanova, Charly Poulliat, Cyril Méasson:
NB-LDPC Codes with High Rates Achieving Low BER over the AWGN Channel with QAM Signaling. 235-239 - Akiko Manada, Takahiro Ota, Hiroyoshi Morita:
Bonds of Constrained Systems and Their Characteristics. 240-244 - Anders Høst-Madsen, Heecheol Yang, Minchul Kim, Jungwoo Lee:
Repair of Multiple Descriptions on Distributed Storage. 245-249 - Zhi Jing, Hong-Yeop Song:
Cooperative Locality and Availability of the MacDonald Codes for Multiple Symbol Erasures. 250-253 - Ryan Gabrys, Paul H. Siegel, Eitan Yaakobi:
Segmented Reverse Concatenation: A New Approach to Constrained ECC. 254-258 - Koki Kazama, Akira Kamatsuka, Takahiro Yoshida, Toshiyasu Matsushima:
A Note on a Relationship between Smooth Locally Decodable Codes and Private Information Retrieval. 259-263 - Shreya Gupta, V. Lalitha:
Rack-Aware Cooperative Regenerating Codes. 264-268 - Andreas Lenz, Lorenz Welter, Sven Puchinger:
Achievable Rates of Concatenated Codes in DNA Storage under Substitution Errors. 269-273 - Manabu Hagiwara:
Conversion Method from Erasure Codes to Multi-Deletion Error-Correcting Codes for Information in Array Design. 274-278 - Johan Chrisnata, Han Mao Kiah, Eitan Yaakobi:
Optimal Reconstruction Codes for Deletion Channels. 279-283 - Hokuto Takahashi, Manabu Hagiwara:
Decoding Algorithms of Monotone Codes and Azinv Codes and Their Unified View. 284-288 - Leo Otani, Haruhiko Kaneko:
Polar Coding for Oversampling Drift Channel. 289-293 - Reona Takemoto, Takayuki Nozaki:
Encoding Algorithm for Run-Length Limited Single Insertion/Deletion Correcting Code. 294-298 - Kamilla Nazirkhanova, Luiza R. Medova, Stanislav Kruglik, Alexey A. Frolov:
Codes Correcting Bounded Length Tandem Duplication. 299-303 - Rawad Bitar, Ilia Smagloy, Lorenz Welter, Antonia Wachter-Zeh, Eitan Yaakobi:
Criss-Cross Deletion Correcting Codes. 304-308 - Luca D'Alessio, Litian Liu, Ken Duffy, Yonina C. Eldar, Muriel Médard, Mehrtash Babadi:
A Coding Theory Perspective on Multiplexed Molecular Profiling of Biological Tissues. 309-313 - Arman Sharififar, Neda Aboutorab, Yucheng Liu, Parastoo Sadeghi:
Independent User Partition Multicast Scheme for the Groupcast Index Coding Problem. 314-318 - Yucheng Liu, Parastoo Sadeghi, Neda Aboutorab, Arman Sharififar:
Secure Index Coding with Security Constraints on Receivers. 319-323 - Jian-Jia Weng, Fady Alajaji, Tamás Linder:
A Simple Capacity Outer Bound for Two-Way Channels and Capacity Approximation Results. 324-328 - Ayumu Nakayama, Manabu Hagiwara:
Single Quantum Deletion Error-Correcting Codes. 329-333 - Taro Shibayama:
New Instances of Quantum Error-Correcting Codes for Single Deletion Errors. 334-338 - Yuta Ishii, Mitsuru Tada:
Structurally aggregate message authentication codes. 339-343 - Boris Ryabko, Viacheslav Zhuravlev:
The time-adaptive statistical testing for random number generators. 344-347 - Junichi Ida, Junji Shikata, Yohei Watanabe:
On the Power of Interaction in Signcryption. 348-352 - Kodai Sato, Kenji Yasunaga, Toru Fujiwara:
A Construction of Robustly Reusable Fuzzy Extractors over Blockchains. 353-357 - Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi:
The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE. 358-362 - Naoya Shiratori, Mitsuru Tada:
Delegatable proof of knowledge systems. 363-367 - Akinori Kawachi:
Hamming Weight of Product of Random Sparse Polynomials. 368-371 - Atsushi Iwasaki:
The relation between Proportion test and Uniformity test in NIST SP800-22. 372-376 - Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta:
How to Detect Malicious Behaviors in a Card-Based Majority Voting Protocol with Three Inputs. 377-381 - Tomoki Uemura, Yohei Watanabe, Yang Li, Noriyuki Miura, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta:
A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule. 382-386 - Hikaru Tsuchida, Takashi Nishide:
Client-Aided Bit-Composition Protocol with Guaranteed Output Delivery. 387-391 - Tomonori Hirata, Yuichi Kaji:
Information leakage through passive timing attacks on RSA decryption system. 392-396 - Bin Dai, Chong Li, Yingbin Liang, Zheng Ma, Shlomo Shamai Shitz:
On the Capacity of Gaussian Multiple-Access Wiretap Channels with Feedback. 397-401 - Parisa Babaheidarian, Somayeh Salimi, Panos Papadimitratos:
Scalable Security in Interference Channels With Arbitrary Number of Users. 402-406 - Setareh Sharifian, Alireza Poostindouz, Reihaneh Safavi-Naini:
A Capacity-achieving One-way Key Agreement with Improved Finite Blocklength Analysis. 407-411 - Alireza Poostindouz, Reihaneh Safavi-Naini:
A Channel Model of Transceivers for Multiterminal Secret Key Agreement. 412-416 - Vamoua Yachongka, Hideki Yagi:
Biometric Identification Systems with Both Chosen and Generated Secrecy. 417-421 - Kyohei Sekine, Hiroki Koga:
Optimal Basis Matrices of a Visual Cryptography Scheme with Meaningful Shares and Analysis of Its Security. 422-426 - Reo Eriguchi, Noboru Kunihiro, Koji Nuida:
A Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures. 427-431 - Ryo Okamura, Hiroki Koga:
New Constructions of an Evolving 2-Threshold Scheme Based on Binary or D-ary Prefix Codes. 432-436 - Maki Yoshida, Satoshi Obana:
Compact Verifiably Multiplicative Secret Sharing. 437-441 - Takeshi Koshiba:
Fourier-based Verifiable Function Secret Sharing. 442-446 - Yuta Kodera, Tomoya Tatara, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara:
A Parallel Blum-Micali Generator Based on the Gauss Periods. 447-450 - Sota Eguchi, Takeru Miyazaki, Shunsuke Araki, Satoshi Uehara, Yasuyuki Nogami:
A Study on Randomness of Sequences Obtained from Piecewise Logistic Map over Integers. 451-455 - Gangsan Kim, Hong-Yeop Song:
Almost perfect sequence family with perfect crosscorrelation. 456-459 - Kasumi Nakano, Kako Takahashi, Satoshi Uehara, Takeru Miyazaki, Shunsuke Araki, Yasuyuki Nogami:
A Study on Binary Sequences Located in Hadamard Matrices of Order 2n. 460-464 - Keita Emura, Shiho Moriai, Takuma Nakajima, Masato Yoshimi:
Cache-22: A Highly Deployable Encrypted Cache System. 465-469 - Katsuya Matsuoka, Mhd Irvan, Ryosuke Kobayashi, Rie Shigetomi Yamaguchi:
Score Fusion Method by Neural Network Using GPS and Wi-Fi Log Data. 470-474 - Onur Günlü, Peter Trifonov, Muah Kim, Rafael F. Schaefer, Vladimir Sidorenko:
Randomized Nested Polar Subcode Constructions for Privacy, Secrecy, and Storage. 475-479 - Rawad Bitar, Marvin Xhemrishi, Antonia Wachter-Zeh:
Fountain Codes for Private Distributed Matrix-Matrix Multiplication. 480-484 - Kazuhiro Kono, Noboru Babaguchi:
Data Anonymization for Service Strategy Development and Information Recommendation to Users Based on TF-IDF Method. 485-489 - Hiroomi Isozaki:
Detection Bottleneck links without multiple nodes. 490-493 - Kazumasa Omote:
A Decentralized Secure Email System based on Conventional RSA Signature. 494-498 - Hayami Motohashi, Kazuki Yoneyama:
Memory Efficient and Provably Secure Virus Detection. 499-503 - Ryuto Omachi, Yasuyuki Murakami:
Packer Identification Method for Multi-layer Executables with k-Nearest Neighbor of Entropies. 504-508 - Takahiro Ota, Akiko Manada:
Addressing Information Using Data Hiding for DNA-based Storage Systems. 509-513 - Tetsuya Kojima, Kento Akimoto:
Visible Video Data Hiding Techniques Based on Visual Effects Utilizing Barcodes. 514-518 - Tetsuro Kubo, Hiroshi Kubo:
Multi-Carrier Differential Trellis-Coded Modulation/Demodulation Employing Multiple Differential Detection with Channel Prediction. 519-523 - Yuki Noda, Shunya Asano, Makoto Itami, Akira Nakamura:
Improvement of accuracy of UWB Positioning System within the intersection using a Long Short-Term Memory Network. 524-528 - Xiaojie Liu, Ulrich Speidel:
On an Alternative Approach to Congestion Detection in Ad Hoc Networks. 529-533 - Masaya Kambara, Guanghui Song, Tomotaka Kimura, Jun Cheng:
Optimal Power Allocation of Cooperative Superposition-Coded Relaying with Finite-Blocklength Transmission over Quasi-Static Rayleigh Channels. 534-538 - Anders Høst-Madsen, N. Whitcomb, J. Weldon, Zixiang Xiong:
Latency-Energy Tradeoff with Realistic Hardware Models. 539-543 - Masayoshi Ohashi:
Study on a delay and Doppler estimation performance of 2-dimensional BPSK signal using discrete gaussian wave. 544-548 - Michael Fernando Mendez Jimenez, Omar DeGuchy, Roummel F. Marcia:
Deep Convolutional Autoencoders for Deblurring and Denoising Low-Resolution Images. 549-553 - Haruka Toyota, Hiroshi Kubo:
Experimental Evaluation Results of Acoustic Spread Spectrum Communications Employing Orthogonal Gold Sequences. 554-558 - Yui Nakai, Yuka Tanaka, Hiroshi Kubo:
Differential OFDM Employing AFC for Fast Time-Varying Doppler Shifts in Underwater Acoustic Communications. 559-563 - Yuka Tanaka, Yui Nakai, Hiroshi Kubo:
Doubly Differential OFDM Employing an Intercarrier Interference Self-Canceller for Underwater Acoustic Communications. 564-568 - Kosei Ozeki, Naofumi Aoki, Saki Anazawa, Yoshinori Dobashi, Kenichi Ikeda, Hiroshi Yasuda:
Designing a Symbol Classifier for Inaudible Sound Communication Systems Using a Neural Network. 569-572 - Kouji Tahata, Tatsuya Ochiai, Ukyo Matsushima:
Asymmetry models and model selection in square contingency tables with ordinal categories. 573-577 - Boris Ryabko:
Statistical Testing of Randomness. 578-581 - Haiyun He, Qiaosheng Eric Zhang, Vincent Y. F. Tan:
Optimal Resolution of Change-Point Detection with Empirically Observed Statistics and Erasures. 582-586 - Kohei Miyamoto, Jun'ichi Takeuchi:
On MDL Estimation for Simple Contaminated Gaussian Location Families. 587-591 - Mojtaba Abolfazli, Anders Høst-Madsen, June Zhang:
Differential Description Length for Hyperparameter Selection in Supervised Learning. 592-596 - Yuki Kondo, Manabu Hagiwara, Midori Kudo:
Formalization of VT Codes and Their Single-Deletion Correcting Property in Lean. 597-601 - Takehiko Mieno, Togo Yoshimura, Hiroyuki Okazaki, Yuichi Futa, Kenichi Arai:
Formal Verification of Merkle-Damgård Construction in ProVerif. 602-606 - Takafumi Saikawa, Kazunari Tanaka, Kensaku Tanaka:
Formal Verification and Code-Generation of Mersenne-Twister Algorithm. 607-611
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.