


default search action
ISITA 2010: Taichung, Taiwan
- Proceedings of the International Symposium on Information Theory and its Applications, ISITA 2010, 17-20 October 2010, Taichung, Taiwan. IEEE 2010, ISBN 978-1-4244-6017-5

LDPC Codes I
- Rich Echard, Shih-Chun Chang:

Good high-rate pi-rotation LDPC codes based on novel puncturing techniques. 1-6 - Chung-Li Wang, Shu Lin:

Low-density parity-check accumulate codes. 7-12 - Cha-Hao Chung, Yeong-Luh Ueng

, Ming-Che Lu, Mao-Chao Lin:
Adaptive quantization for low-density-parity-check decoders. 13-18 - Masato Tajima, Koji Okino, Takashi Miyagoshi:

Error-trellis state complexity of LDPC convolutional codes based on circulant matrices. 19-24
MIMO I
- Hsiao-feng Lu:

Approximately universal MIMO diversity embedded codes. 25-30 - Kenji Nakayama, Yasunori Iwanami, Eiji Okamoto:

MIMO MFSK receivers using FDE and MLD on quasi-static frequency selective fading channels. 31-36 - Vesna Gardasevic, Ralf R. Müller, Daniel J. Ryan, Lars Lundheim, Geir E. Øien:

Lattice-reduction aided HNN for vector precoding. 37-41 - Roope Vehkalahti

, Camilla Hollanti
, Jyrki T. Lahtonen:
A family of cyclic division algebra based fast-decodable 4×2 space-time block codes. 42-47
Cryptography I
- Vladimir B. Balakirsky, A. J. Han Vinck:

Direct biometric verification schemes with Gaussian data. 48-53 - Tanya Ignatenko, Frans M. J. Willems:

Fundamental limits for biometric identification with a database containing protected templates. 54-59 - Sami Zhioua

:
A geometric view of mutual information: Application to anonymity protocols. 60-65 - Chigusa Kawashima, I Gusti Bagus Baskara Nugraha

, Hiroyoshi Morita, Todorka Alexandrova
:
Realizing and evaluating mutual anonymity in P2P networks. 66-71
Source Coding I
- Takahiro Ota, Hiroyoshi Morita:

On the adaptive antidictionary code using minimal forbidden words with constant lengths. 72-77 - Mikihiko Nishiara:

On coding for source with infinitesimal time slots. 78-81 - Danny Dubé:

Using synchronization bits to boost compression by substring enumeration. 82-87 - Shohei Iwata, Toshihiro Hattori, Motohiko Isaka:

On coding for nonbinary sources with side information at the decoder. 88-93
Stochastic Processes/Pattern Recognition
- Juan Miguel Medina, Bruno Cernuschi-Frías

:
Stationary sequences and stable sampling. 94-99 - Christopher J. Quinn, Todd P. Coleman, Negar Kiyavash:

Approximating discrete probability distributions with causal dependence trees. 100-105 - Makoto Suzuki, Naohide Yamagishi, Yi-Ching Tsai, Takashi Ishida, Masayuki Goto

:
English and Taiwanese text categorization using N-gram based on Vector Space Model. 106-111 - Masanori Kawakita, Yoko Oie, Jun'ichi Takeuchi:

A note on model selection for small sample regression. 112-117
Error-Control Coding I
- Torleiv Kløve, Somaye Yari:

Proper self-complementary codes. 118-122 - Joan-Josep Climent

, Francisco J. García, Verónica Requena
:
Computing the degree of a Boolean function from its support. 123-128 - Chien-Yi Wang, I-Wei Lai, Tzi-Dar Chiueh, Gerd Ascheid, Heinrich Meyr:

BER analysis for MIMO BICM-ID assuming finite precision of extrinsic LLR. 129-134 - Toshihisa Nishijima, Kin-ichiroh Tokiwa:

Upper bounds on the average probability of undetected error for the ensembles of both product and concatenated codes. 135-138 - Takashi Hayashi, Koji Ishii, Shigeaki Ogose:

Practical design and its evaluations for nested transmit diversity. 139-144
Cooperative Communications I
- Ernest Kurniawan, Sumei Sun, Kai Yen, Kai Fong Ernest Chong

:
Improving error performance of Joint Channel and Network Coding in Multiple Access Relay Channel. 145-150 - Valentin Savin

:
Split-extended LDPC codes for coded cooperation. 151-156 - Wei Yang, Lihua Li, Gang Wu, Haifeng Wang:

Joint relay selection and link adaptation for distributed beamforming in regenerative cooperative networks. 157-162 - Jaeyoung Lee, Sung-Il Kim, Jun Heo:

Performance analysis and optimal power allocation for hybrid incremental relaying. 163-168 - Shi-Yong Lee, Chia-Chun Chang, Min-Kuan Chang

:
Modeling of DF behavior and SNR evaluation for multinode cooperation system with adaptive modulation under different diversity combining strategies. 169-173
Cryptography II
- Jean-Claude Belfiore, Frédérique E. Oggier:

Secrecy gain: A wiretap lattice code design. 174-178 - David Elkouss

, Jesús Martínez-Mateo
, Vicente Martín:
Secure rate-adaptive reconciliation. 179-184 - Hadi Ahmadi, Reihaneh Safavi-Naini:

Secret key establishment over a pair of independent broadcast channels. 185-190 - Hadi Ahmadi, Reihaneh Safavi-Naini:

New results on Secret Key Establishment over a pair of broadcast channels. 191-196 - Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Reza Aref:

Secret key rate region of multiple access channel model. 197-202
Signal Processing for Communications
- Toshiyuki Kikkawa, Yukitoshi Sanada:

Wireless relay networks using multiple frequency bands. 203-208 - Aya Inami, Chika Sugimoto, Ryuji Kohno:

Performance analysis of equalization and interference cancellation by adaptive digital filter for UWB-IR system inside a vehicle. 209-214 - Hiroshi Takayama, Chika Sugimoto, Ryuji Kohno:

A study on estimating implanted devices using image information and ranging system using UWB radio. 215-219 - Yuuki Matsuura, Koji Ishii, Shigeaki Ogose:

A novel positioning estimation method with the correlation between sensors' data. 220-224 - Koji Enda, Ryuji Kohno:

Iterative algorithm using particle filter for positioning in NLOS environment. 225-230
Video/Image Coding
- Haruhiko Kaneko

:
Probabilistic search of nonbinary LDPC codes for distributed video coding. 231-236 - Chih-Chung Tsui, Yu-Ming Lee, Yinyi Lin:

Selective multiple reference frames motion estimation for H.264/AVC video coding. 237-242 - Malavika Bhaskaranand, Jerry D. Gibson:

Spectral entropy-based bit allocation. 243-248 - Tsung-Han Tsai, Chang-Ming Lee, Wen-Nung Lie:

Practical estimation of adaptive correlation noise model for Distributed Video Coding. 249-254 - Hsin M. Shieh, Jin-Gui Li, Yu-Ching Hsu, Meng-Chi Ye, Dong G. Lee:

Iterative prior-knowledge-based image reconstruction algorithms. 255-260
Error-Control Coding II
- John B. Anderson, Adnan Prlja:

Turbo equalization and an M-BCJR algorithm for strongly narrowband intersymbol interference. 261-266 - Christian Senger, Vladimir Sidorenko

, Steffen Schober, Martin Bossert, Victor V. Zyablov
:
Adaptive single-trial error/erasure decoding of binary codes. 267-272 - Chong-Dao Lee, Yaotsu Chang, Trieu-Kien Truong, Yan-Haw Chen:

More on general error locator polynomials for a class of binary cyclic codes. 273-277 - Jen-Chun Chang, I-te Tsai, Hsin-Lung Wu:

Efficient decoding algorithm for constant composition codes. 278-281
OFDM I
- Xiaoying Shao, Cornelis H. Slump:

A robust cross coding scheme for OFDM systems. 282-287 - Daisuke Shimbo, Ikuo Oka:

A modulation classification using amplitude moments in OFDM systems. 288-293 - Yutaro Nakagawa, Yukitoshi Sanada:

Time domain feedback equalizer for fast fading channel in OFDM with scattered pilot. 294-297 - Shi-Yong Lee, Chia-Chun Chang, Min-Kuan Chang

:
Novel lifetime-aware bit and power allocation in OFDM systems. 298-302
Digital Watermarking
- Harumi Murata, Akio Ogihara, Motoi Iwata, Akira Shiozaki:

An audio watermarking method by using automatic music transcription information. 303-308 - Motoi Iwata, Tomoki Hori, Akira Shiozaki, Akio Ogihara:

Digital watermarking method for tamper detection and recovery of JPEG images. 309-314 - Shouta Sakaino, Hiromu Koda:

A scheme of digital watermarking for 3-D models using correlation method in polar coordinate system. 315-319 - Tadakazu Sakakura, Akira Hayashi:

A simple detection scheme of LSB steganography based on statistics of image difference signal. 320-325 - Tetsushi Masuno, Toru Fujiwara, Takuya Kusaka:

A New method to reduce the probability of detection errors for a digital watermark using complementary decoding algorithms and minimum weight codewords of linear code. 326-331
Data Networks
- Jan-Ray Liao, Pin-Hsuan Wu:

Longest queue first in round-robin matching for input-queued switches. 332-336 - Shin-Guang Chen:

Optimal network planning in robust two site's communication. 337-342 - Siva K. Gorantla, Sachin Kadloor, Todd P. Coleman, Negar Kiyavash, Ira S. Moskowitz, Myong H. Kang:

Directed information and the NRL Network Pump. 343-348 - Pedro C. Pinto, Moe Z. Win

:
Continuum percolation in the intrinsically secure communications graph. 349-354
Cooperative MIMO
- Mingjun Dai, Ping Hu, Chi Wan Sung

:
Diamond relay network under Rayleigh fading: On-off power control and outage-capacity bound. 355-360 - Kyoung-Young Song, Jaehong Kim, Jong-Seon No, Habong Chung:

Diversity analysis of the best relay selection for soft-decision-and-forward cooperative network. 361-364 - Pham Thanh Hiep

, Ryuji Kohno:
Analysis performance of decode-and-forward scheme in distributed MIMO repeater system. 365-370 - Youssef Nasser

, Jean-François Hélard:
Efficient space-time block codes for cooperative MIMO communications. 371-376 - Zoran Utkovski

, Yao Cheng
, Jürgen Lindner:
A non-coherent AF scheme for two-way wireless relay networks based on packings in Grassmann manifolds. 377-382
LDPC Codes II
- Qin Huang, Qiuju Diao, Shu Lin:

Circulant decomposition: Cyclic, quasi-cyclic and LDPC codes. 383-388 - Takakazu Sakai, Koji Shibata:

Importance sampling for LDPC codes based on optimal simulation probability density function. 389-393 - Gou Hosoya, Hideki Yagi, Manabu Kobayashi:

An iterative decoding algorithm for rate-compatible punctured low-density parity-check codes of high coding rates. 394-399 - Matteo Gorgoglione, Valentin Savin

, David Declercq:
Optimized puncturing distributions for irregular non-binary LDPC codes. 400-405
Multiuser Information Theory I
- Richard E. Blahut, Soumya Jana:

Körner-Marton theorem for binary modulo-two sum problem from canonical equations. 406-409 - Rafael F. Wyrembelski, Igor Bjelakovic, Holger Boche:

On arbitrarily varying bidirectional broadcast channels with constraints on input and states. 410-415 - Moritz Wiese, Holger Boche, Igor Bjelakovic:

The compound MAC with common message and partial channel state information. 416-421 - Chao Wang, Ming Xiao, Mikael Skoglund:

Diversity-multiplexing tradeoff analysis of multi-source multi-relay coded networks. 422-427
Cryptography III
- Kunikatsu Kobayashi, Kohtaro Tadaki, Masao Kasahara, Shigeo Tsujii:

A knapsack cryptosystem based on multiple knapsacks. 428-432 - Yasuyuki Murakami:

A new construction method of knapsack PKC using linear transformation and Chinese remainder theorem. 433-436 - Akira Hayashi:

On the critical density associated with the matrix type knapsack cryptosystem. 437-440 - Masahito Gotaishi:

Improvement of the Low Rank Attack. 441-445
Shannon Theory I
- Ambedkar Dukkipati:

On Kolmogorov-Nagumo averages and nonextensive entropy. 446-451 - Akari Sato, Hirosuke Yamamoto

:
Error exponents of discrete memoryless channels and AWGN channels with noisy feedback. 452-457 - Behrooz Makki, Thomas Eriksson

:
Data transmission in the presence of noisy channel state feedback and outage probability constraint. 458-463 - Sadaf Salehkalaibar, Mohammad Reza Aref:

On the capacity region of a class of Z Channels with cooperation. 464-468
Constrained Coding
- Kees A. Schouhamer Immink:

High-rate maximum runlength constrained coding schemes using base conversion. 469-472 - Ken-ichi Iwata

, Takuya Koyama:
A prefix-free coding for finite-state noiseless channels with small coding delay. 473-477 - Jan Geldmacher, Jürgen Götze:

Syndrome former trellis construction for punctured convolutional codes. 478-483 - Shih-Kai Lee, Hsin-Yi Chen, Mao-Chao Lin, Tien-Hui Chen:

On soft iterative decoding for ternary recording systems with RLL constraints. 484-489
LDPC Codes III
- Raúl Martínez-Noriega, Brian M. Kurkoski, Kazuhiko Yamaguchi, Kingo Kobayashi:

Recovering synchronization with iterative decoders: LDPC codes. 490-495 - Tsung-Che Wu, Yao-Wen Hu, Chang-Ming Lee:

Optimization of memory utilization for partially parallel QC-LDPC decoder. 496-500 - Chao-Yu Chen

, Qin Huang, Chi-Chao Chao, Shu Lin:
A message-passing decoding algorithm for q-ary LDPC codes with low-complexity. 501-506 - Chi-Jen Wu, Chung-Hsuan Wang, Chi-Chao Chao:

A new construction of irregular LDPC convolutional codes with cycle removal. 507-512 - Masanori Hirotomo, Masakatu Morii:

Detailed evaluation of error floors of LDPC codes using the probabilistic algorithm. 513-518
MIMO II
- Keigo Takeuchi, Ralf R. Müller, Mikko Vehkaperä

, Toshiyuki Tanaka:
An achievable rate of large block-fading MIMO systems with no CSI via successive decoding. 519-524 - A. Taufiq Asyhari

, Albert Guillen i Fabregas
:
MIMO block-fading channels with mismatched CSIR. 525-530 - Shuo Shen, Matthew R. McKay

, Ross D. Murch
:
MIMO systems with mutual coupling: How many antennas to pack into fixed-length arrays? 531-536 - Roope Vehkalahti

, Camilla Hollanti
, Jyrki T. Lahtonen, Hsiao-feng Lu:
Some simple observations on MISO codes. 537-541 - Paul de Kerret, Michael Joham, Wolfgang Utschick

, Rudolf Mathar:
MIMO broadcast channel rate region with linear precoding at high SNR without full multiplexing. 542-547
Cryptography IV
- Jeich Mar, Yow-Cheng Yeh, I-Fan Hsiao:

An ANFIS-IDS against deauthentication DOS attacks for a WLAN. 548-553 - Hirotaka Tazawa, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:

A user authenticaion scheme using multiple passphrases and its arrangement. 554-559 - Kai Zhao, Yuichi Kaji:

Anti-phishing mutual authentication using the visual secret sharing scheme. 560-565 - Nai-Wei Lo, Kuo-Hui Yeh:

De-synchronization attack on RFID authentication protocols. 566-570 - Yasunori Onda, SeongHan Shin, Kazukuni Kobara, Hideki Imai:

How to distinguish on-line dictionary attacks and password mis-typing in two-factor authentication. 571-576
Source Coding II
- Shigeaki Kuzuoka:

Relations between universal FV and FF source codes. 577-582 - Hiroshi Fujisaki:

On embeddings of shifts of finite type into the golden-mean-Dyck shift. 583-588 - Grégory Demay, Vishwambhar Rathi, Lars K. Rasmussen:

Optimality of LDGM-LDPC compound codes for lossy compression of binary erasure source. 589-594 - Mitsuharu Arimura, Ken-ichi Iwata

:
The minimum achievable redundancy rate of fixed-to-fixed length source codes for general sources. 595-600 - Jyun-Jie Wang, Houshou Chen

, Zhin-Han Dai, Hsinying Liang
:
Joint JPEG-block coding with expurgating trellis for wireless robust image transmission. 601-605
Signal Processing
- Krzysztof Wawryn, Robert T. Wirski

, Bogdan Strzeszewski
:
Implementation of finite impulse response systems using rotation structures. 606-610 - Nanako Ubayama, Toma Miyata, Naoyuki Aikawa:

A design method for IIR digital filters with variable stopband using semidefinite programming. 611-615 - Robert T. Wirski

:
Synthesis of orthogonal Roesser model for two-dimensional FIR filters. 616-620 - Yuichi Kida, Takuro Kida:

The optimum approximate reconstruction of a signal from the discrete sample values of the prescribed multiple waves. 621-626 - Yuichi Kida, Takuro Kida:

Development of a new numerical solution of inhomogeneous linear partial differential equations with many independent variables. 627-632
Coding Performance
- Matthias Rüngeler

, Birgit Schotsch, Peter Vary:
Improved decoding of Shannon-Kotel'nikov mappings. 633-638 - Yu Morishima, Ikuo Oka, Shingo Ata:

Pulse interference mitigation techniques for QPSK and QAM using Viterbi decoding. 639-643 - Shinsuke Nagata, Kaiji Mukumoto, Tadahiro Wada, Koji Ishibashi:

Performance evaluation of Go-Back-i-symbol ARQ scheme applicable to meteor burst communications. 644-649 - Xiao-Hong Peng:

Bounds on end-to-end performance of networks employing erasure control coding. 650-655
OFDM II
- Kenta Eguchi, Haruki Higuchi, Yukitoshi Sanada:

User/sampling point selection algorithm in multiuser MIMO-OFDM with fractional sampling. 656-661 - Eisuke Sakai, Haruki Nishimura, Mamiko Inamori

, Yukitoshi Sanada, Mohammad Ghavami
:
Low-complexity sampling point selection in OFDM receiver with fractional sampling. 662-667 - Chia-Yao Chen, Wen-Kang Jia, Yaw-Chung Chen:

A novel CRC based error correction scheme in OFDM/OFDMA wireless networks. 668-672 - Rih-Lung Chung, Chin-Wen Chang, Jeng-Kuang Hwang

:
Bidirectional decision feedback equalization for mobile MIMO-OFDM systems. 673-677
Cryptography V
- Hiroki Koga:

Two generalizations of a coding theorem for a (2, 2)-threshold scheme with a cheater. 678-683 - Ulrich Speidel, T. Aaron Gulliver

:
A secure authentication system based on variable-length codes. 684-689 - Miodrag J. Mihaljevic, Hajime Watanabe, Hideki Imai:

A low complexity authentication protocol based on pseudorandomness, randomness and homophonic coding. 690-695 - Josep Rifà

, Lorena Ronquillo:
Product perfect Z2 Z4-linear codes in steganography. 696-701
Multiuser Information Theory II
- Simon Görtzen, Anke Schmeink:

A theoretical framework for capacity-achieving multi-user waterfilling in OFDMA. 702-707 - Moritz Wiese, Frederic Knabe, Johannes Georg Klotz, Aydin Sezgin

:
The performance of QPSK in low-SNR interference channels. 708-713 - Yasutada Oohama:

On the rate distortion region of Gaussian multiterminal source coding. 714-719 - S. M. Hossein Tabatabaei Yazdi, Mohammad Reza Aref:

The capacity of a class of linear deterministic relay networks. 720-725 - Yifan Chen, Chau Yuen, Yong Huat Chew:

Double-directional information azimuth spectrum and relay network tomography for a decentralized wireless relay network. 726-731
Performance Evaluation
- Shin'ichi Koike, Seiichi Noda:

O&7PSK modulation and its bit error rate performance. 732-737 - Yusuke Kozawa, Hiromasa Habuchi:

Theoretical analysis of M-CSK/CDMA system in optical wireless channel. 738-742 - Bayarpurev Mongol, Takaya Yamazato

, Masaaki Katayama:
Inband and outband spectrum analysis of the BFDM and BFDM/OQAM signals with truncated Gaussian pulses. 743-746 - Yuuki Nishino, Makoto Tanahashi, Hideki Ochiai

:
A new bit-labeling for trellis-shaped PSK with improved PAPR reduction capability. 747-751 - Jo Lynn Tan, Ahmad Zuri bin Sha'ameri, Yen Mei Chee:

Signal analysis and classification of digital communication signal using higher order time-frequency analysis techniques. 752-756
Decoding
- Chen-Yi Wang, Shin-Lin Shieh, Po-Ning Chen, Yunghsiang S. Han:

Path deletions for finite stack-size sequential-type decoding algorithms. 757-761 - Hideki Yoshikawa, Yoshitake Kawadai:

Theoretical analysis of bit error probability for 4-state recursive systematic convolutional code with Max-Log MAP decoding. 762-766 - Hideki Yoshikawa:

Theoretical analysis of bit error probability for Log-MAP decoding. 767-771 - Ryuhei Yokoyama, Toru Fujiwara, Takuya Kusaka:

Adaptive recursive MLD using ordered statistics for low rate codes. 772-777
Cryptography VI
- Dai Watanabe, Toru Owada, Kazuto Okamoto, Yasutaka Igarashi, Toshinobu Kaneko:

Update on Enocoro stream cipher. 778-783 - Yasutaka Igarashi, Toshinobu Kaneko:

On the truncated path search for the maximum differential characteristic probability on a generalized Feistel-type block cipher. 784-788 - Miodrag J. Mihaljevic, Hideki Imai:

A Security evaluation of certain stream ciphers which involve randomness and coding. 789-794 - Naoto Yanai

, Eikoh Chida, Masahiro Mambo:
A structured aggregate signature scheme. 795-800
Shannon Theory II
- Tsutomu Kawabata:

A revisit to the Muroga method of computing channel capacity. 801-806 - Sergio Lembo, Chia-Hao Yu, Olav Tirkkonen

:
Block fading channels with limited channel state information. 807-811 - Meik Dorpinghaus, Heinrich Meyr, Gerd Ascheid:

The achievable rate of stationary rayleigh flat-fading channels with IID input symbols. 812-817 - Reza Khosravi-Farsani, Bahareh Akhbari, Mohammad Reza Aref:

The capacity region of a class of Relay-Broadcast Channels and relay channels with three parallel unmatched subchannels. 818-823
Sequences
- Shunsuke Araki, Ken'ichi Kakizaki, Takeru Miyazaki, Satoshi Uehara:

Suitable representation of values on the logistic map with finite precision. 824-829 - Takeru Miyazaki, Shunsuke Araki, Satoshi Uehara:

A study on differences in properties of the logistic maps over integers affected by rounding. 830-835 - Ying Li, Yi-Chan Kao, Mei-Wen Chang:

Autocorrelation functions and double difference sequences. 836-841 - Takayasu Kaida, Junru Zheng:

Hamming distance correlation for q-ary constant weight codes. 842-845
Error-Control Coding III
- Junru Zheng, Takayasu Kaida:

An algorithm for new lower bound of minimum distance by DFT for cyclic codes. 846-849 - Hidetoshi Saito, Ryuji Kohno:

Maximum a posteriori estimation using ARCH models and burst error correcting array codes for burst-erasure recording channels. 850-855 - Julie Neckebroek, Marc Moeneclaey, Enrico Magli:

Comparison of Reed-Solomon and Raptor codes for the protection of video on-demand on the erasure channel. 856-860 - Mathieu Cunche, Valentin Savin

, Vincent Roca:
Analysis of Quasi-Cyclic LDPC codes under ML decoding over the erasure channel. 861-866 - Hiroshi Kamabe:

Floating codes with good average performance. 867-872
MIMO III
- Dan Zhang, I-Wei Lai, Konstantinos Nikitopoulos, Gerd Ascheid:

Informed message update for iterative MIMO demapping and turbo decoding. 873-878 - Redha M. Radaydeh, Mohamed-Slim Alouini

:
Imperfect generalized transmit beamforming with co-channel interference cancelation. 879-884 - Ronghong Mo, Yong Huat Chew, Tony Q. S. Quek

, Chengzhi Chen:
Distributed precoding design for MIMO interference channels. 885-889 - Dong-Min Shin, Kyeongcheol Yang:

Analysis of diversity-multiplexing tradeoff bounds of ZF-SIC systems with error propagation. 890-894 - Yabo Li:

Digital-controlled analog beamforming for indoor MIMO multipath channels. 895-899
Cryptography VII
- Kohtaro Tadaki, Shigeo Tsujii:

Two-sided multiplications are reduced to one-sided multiplication in linear piece in hand matrix methods. 900-904 - Kohtaro Tadaki, Shigeo Tsujii:

Clarifying the specification of linear Piece In Hand matrix method. 905-910 - Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:

A generic weakness of the k-normal Boolean functions exposed to dedicated algebraic attack. 911-916 - Masakazu Yoshida, Takayuki Miyadera, Hideki Imai:

On the security of the quantum key distribution using the Mean King Problem. 917-912 - Kenta Kasai, Ryutaroh Matsumoto

, Kohichi Sakaniwa:
Information reconciliation for QKD with rate-compatible non-binary LDPC codes. 922-927
Cognitive and Software Radio
- Mohamed Saber

, Yutaka Jitsumatsu, Muhammad Tahir Abbas Khan:
Design and implementation of low power digital phase-locked loop. 928-933 - Youngmin Jeong, Tony Q. S. Quek, Hyundong Shin:

Downlink beamforming optimization for cognitive underlay networks. 934-939 - Kevin Chang, Yu-Chieh Huang, Bouchra Senadji

:
Analysis of primary user duty cycle impact on spectrum sensing performance. 940-945 - Meng-Lin Ku, Li-Chun Wang

, Yu Ted Su:
Optimal multiuser beamforming and power allocation for hierarchical cognitive radio systems. 946-951 - Hamid G. Bafghi, Somayeh Salimi, Babak Seyfe, Mohammad Reza Aref:

Cognitive interference channel with two confidential messages. 952-956
Cooperative Communications II
- Lu Lu, Fan Sun, Ming Xiao, Lars K. Rasmussen:

Relay-aided multi-cell broadcasting with random network coding. 957-962 - Kuang-Yu Sung, Yao-Win Peter Hong

, Chi-Chao Chao:
Subcarrier allocation and partner selection algorithms for cooperative multicarrier systems. 963-968 - Li-Chun Wang

, Wei-Chi Li:
Outage performance analysis for fractional frequency reused TDD-OFDMA systems with asymmetric traffics. 969-974 - Jooha Bek, Jaeyoung Lee, Jun Heo:

Outage analysis and optimal power allocation for network-coding-based hybrid AF and DF. 975-980 - Rih-Lung Chung, Shu-Hao Chang:

Cooperative MMSE OFDM receiver for half-duplex and multiple-relays system. 981-985
RS/AG Codes
- Alexander Zeh, Wenhui Li:

Decoding Reed-Solomon codes up to the Sudan radius with the Euclidean algorithm. 986-990 - Chung-Chin Lu, Chih-Yen Yang, Ti-Chung Lee:

Syndrome calculation for the decoding of algebraic-geometry codes on plane Garcia-Stichtenoth curves. 991-994 - Jian-Jia Weng, Yu-Min Hsieh, Hsin-Chuan Kuo, Chung-Hsuan Wang, Tsung-Cheng Wu, Yi-Sheng Su:

A New reliability updating scheme for iterative decoding of Reed-Solomon codes with refined initialization. 995-1000 - Hajime Matsui:

Unified system of encoding and decoding erasures and errors for algebraic geometry codes. 1001-1006
Multiuser Information Theory III
- Tobias Renk, Holger Jäkel, Friedrich K. Jondral, Deniz Gündüz

, Andrea J. Goldsmith:
Outage capacity of bursty amplify-and-forward with incremental relaying. 1007-1011 - Zoran Utkovski

, Aydin Sezgin
, Jürgen Lindner:
Non-coherent two-way relaying: Rate bounds for the high SNR regime. 1012-1017 - Bahareh Akhbari, Mahtab Mirmohseni, Mohammad Reza Aref:

Achievable rate regions for interference channel with two relays. 1018-1023 - Amir Sonee

, Somayeh Salimi, Mahmoud Salmasizadeh:
Generalized multiple-access relay channel with confidential messages. 1024-1029
Quantum Information
- Kenjiro Yanagi:

Generalized Wigner-Yanase-Dyson skew information and uncertainty relation. 1030-1034 - Masaki Ota, Hideyuki Kumazawa, Keisuke Shiromoto, Tsuyoshi Sasaki Usuda:

Formula of channel matrix for coded quantum signals by classical linear codes over Zm. 1035-1040 - Kao-Yueh Kuo

, Chung-Chin Lu:
A further study on the encoding complexity of quantum stabilizer codes. 1041-1044 - Yoshio Takamura, Shogo Usami, Tsuyoshi Sasaki Usuda:

On attainment of the capacity of broadband quantum channel by wavelength division multiplexing. 1045-1049
OFDM PAPR
- Hsinying Liang

, Zhe Lin, Houshou Chen
, Cheng-Ying Yang:
A modified genetic algorithm PTS technique with error correction for PAPR reduction in OFDM systems. 1050-1053 - Kee-Hoon Kim, Hyun-Bae Jeon, Jong-Seon No, Dong-Joon Shin:

A new selected mapping scheme for PAPR reduction in OFDM systems. 1054-1057 - Holger Boche, Brendan Farrell:

PAPR for OFDM and the proportion of information bearing signals for tone reservation. 1058-1063

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














