


default search action
ISITA 2020: Kapolei, HI, USA
- International Symposium on Information Theory and Its Applications, ISITA 2020, Kapolei, HI, USA, October 24-27, 2020. IEEE 2020, ISBN 978-4-88552-330-4

- Olivier Rioul:

Rényi Entropy Power and Normal Transport. 1-5 - Xueyan Niu, Christopher J. Quinn:

Synergy and Redundancy Duality Between Gaussian Multiple Access and Broadcast Channels. 6-10 - V Arvind Rameshwar, Aryabhatt M. Reghu, Navin Kashyap:

On the Capacity of the Flash Memory Channel with Feedback. 11-15 - Shota Saito, Toshiyasu Matsushima:

On Two Information Quantities Relating Two Distortion Balls. 16-20 - Tetsunao Matsuta, Tomohiko Uyematsu:

An Equivalent Expression for the Wyner-Ziv Source Coding Problem. 21-25 - Shigeaki Kuzuoka:

A Study on the Overflow Probability of Variable-to-Fixed Length Codes. 26-30 - Michail Mylonakis, Photios A. Stavrou, Mikael Skoglund:

Remote Empirical Coordination. 31-35 - Yasutada Oohama:

Exponent Function for the Gel'fand-Pinsker Channel at Rates above the Capacity. 36-40 - Éric Jacopin:

Entropy to Control Planning in Video-Games. 41-45 - Lóránt Farkas:

Trellis Code Error Exponent From Results for Asynchronous Multiple Access Channels. 46-50 - Mohammadamin Baniasadi, Ertem Tuncel:

Minimum Energy Analysis for Robust Gaussian Joint Source-Channel Coding with a Square-Law Profile. 51-55 - Srinivas Avasarala, Sharang M. Sriram, Soumya Jana:

On Berger-Tung Inner Bound for Sum-Rate versus Sum-Distortion Problem. 56-60 - Hiroki Koga:

Coding Theorems on the Simple Capacity for Digital Fingerprinting Codes. 61-65 - Omri Lev, Anatoly Khina:

Gauss-Markov Source Tracking with Side Information: Lower Bounds. 66-70 - Sharu Theresa Jose, Osvaldo Simeone:

Address-Event Variable-Length Compression for Time-Encoded Data. 71-75 - Yuta Sakai, Vincent Y. F. Tan:

Third-Order Asymptotics of Variable-Length Compression Allowing Errors. 76-80 - Yuta Nakahara, Toshiyasu Matsushima:

Autoregressive Image Generative Models with Normal and t-distributed Noise and the Bayes Codes for Them. 81-85 - Ryota Yoshizawa, Kenichiro Furuta, Yuma Yoshinaga, Osamu Torii, Tomoya Kodama:

An Effective Learning Scheme for Weighted-BP with Parallel Permutation Decoding. 86-90 - Naoki Ide, Tetsuya Asayama, Hiroshi Ueno, Masayuki Ohzeki:

Maximum Likelihood Channel Decoding with Quantum Annealing Machine. 91-95 - Yunseo Nam, Song-Nam Hong, Namyoon Lee:

Orthogonal Sparse Superposition Codes. 96-100 - Ilya Dumer, Navid Gharavi:

Codes for high-noise memoryless channels. 101-105 - Tiancheng Wang, Tsuyoshi Sasaki Usuda:

Effect of Non-Gaussian Noise Due to Beam Wandering on Error Performance of Quantum Measurement. 106-110 - Yuto Takahashi, Tiancheng Wang, Shogo Usami, Tsuyoshi Sasaki Usuda:

Performance Evaluation of Ghost Imaging with Orthogonal/Non-orthogonal Quantum States in Terms of Image Quality. 111-115 - Jun Yamauchi, Yuto Takahashi, Tiancheng Wang, Tsuyoshi Sasaki Usuda:

Quantum Illumination using Quasi-Bell States. 116-120 - Ryusuke Miyazaki, Mana Yoshida, Tiancheng Wang, Tsuyoshi Sasaki Usuda:

Simplification of the Calculation of the Channel Matrix for AMPM Coherent-state Signals. 121-125 - Yuya Naruse, Shan Lu, Hiroshi Kamabe:

Design of ZDF code using uniform shift enumerator. 126-130 - Kento Nakada:

A family of perfectness of the Levenshtein codes La(n;2n). 131-135 - Anastasiia Smeshko, Fedor I. Ivanov, Victor V. Zyablov:

Theoretical Estimates of Burst Error Probability for Convolutional Codes. 136-140 - Chien-Sheng Yang, Amir Salman Avestimehr:

Coded Computing for Boolean Functions. 141-145 - Yanyan Dong, Shenghao Yang:

On Optimal Finite-length Binary Codes of Four Codewords for Binary Symmetric Channels. 146-150 - Toshihiro Niinomi, Hideki Yagi, Shigeichi Hirasawa:

Upper Bounds on the Error Probability for the Ensemble of Linear Block Codes with Mismatched Decoding. 151-155 - Sangook Lee, Kazunori Iwata, Kazushi Mimura:

Property of Quantum Decoding for Sourlas Codes of Which Tuples Are Randomly Decimated. 156-159 - Anastasiia Smeshko, Fedor I. Ivanov, Victor V. Zyablov:

Upper and Lower Estimates of Frame Error Rate for Convolutional Codes. 160-164 - Ramy Farouk Taki Eldin, Hajime Matsui:

Generator Polynomial Matrices of Reversed and Reversible Quasi-Cyclic Codes. 165-169 - Takuya Ohara, Makoto Takita, Masakatu Morii:

A Construction of Binary Punctured Linear Codes and A Supporting Method for Best Code Search. 170-174 - Min Zhu, David G. M. Mitchell, Michael Lentmaier, Daniel J. Costello Jr.:

Decoder Error Propagation Mitigation for Spatially Coupled LDPC Codes. 175-179 - Masaki Kawaguchi, Hajime Matsui:

Finding Self-Dual Quasi-Cyclic Codes with Large Minimum Weight via Polynomial Matrices. 180-184 - Yunqi Wan, Li Chen, Fangguo Zhang:

Algebraic List Decoding of Elliptic Codes Through Module Basis Reduction. 185-189 - Yong-Ting Ni, Cheng-Yu Pai, Chao-Yu Chen:

An Iterative Bit-Flipping Decoding Algorithm For Binary Reed-Muller Codes *. 190-194 - Kirill Ivanov, Rüdiger L. Urbanke:

On the dependency between the code symmetries and the decoding efficiency. 195-199 - Mohammad Rowshan, Andreas Burg, Emanuele Viterbo:

Complexity-efficient Fano Decoding of Polarization-adjusted Convolutional (PAC) Codes. 200-204 - Rejoy Roy Mathews, Chris Winstead:

Decoding LDPC Codes with Probabilistic Local Maximum Likelihood Bit Flipping. 205-209 - Yung-Tsao Hsu, Mao-Chao Lin:

A Design of Differentially Encoded LDPC Coding Based on Multi-Edge Framework. 210-214 - Masoome Otarinia, Thomas E. Fuja:

The 5G New Radio Code: Elementary Absorbing Sets and Error Floor Performance. 215-219 - Gou Hosoya, Toshihiro Niinomi:

Performance of Non-Binary LDPC Codes on Two-Dimensional Array Erasure Models. 220-224 - Yuta Iketo, Takayuki Nozaki:

Encoding Algorithm of Binary and Non-binary Irregular LDPC Codes via Block Triangular Matrices with Low Weight Diagonal Submatrices. 225-229 - Yi-Hsuan Chen, Yu-Ting Liu, Chung-Hsuan Wang, Chi-Chao Chao:

Analysis of UEP QC-LDPC Codes Using Density Evolution. 230-234 - Gada Rezgui, Asma Maaloui, Iryna Andriyanova, Charly Poulliat, Cyril Méasson:

NB-LDPC Codes with High Rates Achieving Low BER over the AWGN Channel with QAM Signaling. 235-239 - Akiko Manada, Takahiro Ota, Hiroyoshi Morita:

Bonds of Constrained Systems and Their Characteristics. 240-244 - Anders Høst-Madsen, Heecheol Yang, Minchul Kim, Jungwoo Lee:

Repair of Multiple Descriptions on Distributed Storage. 245-249 - Zhi Jing, Hong-Yeop Song:

Cooperative Locality and Availability of the MacDonald Codes for Multiple Symbol Erasures. 250-253 - Ryan Gabrys, Paul H. Siegel, Eitan Yaakobi:

Segmented Reverse Concatenation: A New Approach to Constrained ECC. 254-258 - Koki Kazama, Akira Kamatsuka, Takahiro Yoshida, Toshiyasu Matsushima:

A Note on a Relationship between Smooth Locally Decodable Codes and Private Information Retrieval. 259-263 - Shreya Gupta, V. Lalitha:

Rack-Aware Cooperative Regenerating Codes. 264-268 - Andreas Lenz, Lorenz Welter, Sven Puchinger:

Achievable Rates of Concatenated Codes in DNA Storage under Substitution Errors. 269-273 - Manabu Hagiwara:

Conversion Method from Erasure Codes to Multi-Deletion Error-Correcting Codes for Information in Array Design. 274-278 - Johan Chrisnata, Han Mao Kiah, Eitan Yaakobi:

Optimal Reconstruction Codes for Deletion Channels. 279-283 - Hokuto Takahashi, Manabu Hagiwara:

Decoding Algorithms of Monotone Codes and Azinv Codes and Their Unified View. 284-288 - Leo Otani, Haruhiko Kaneko:

Polar Coding for Oversampling Drift Channel. 289-293 - Reona Takemoto, Takayuki Nozaki:

Encoding Algorithm for Run-Length Limited Single Insertion/Deletion Correcting Code. 294-298 - Kamilla Nazirkhanova, Luiza R. Medova, Stanislav Kruglik, Alexey A. Frolov:

Codes Correcting Bounded Length Tandem Duplication. 299-303 - Rawad Bitar, Ilia Smagloy, Lorenz Welter, Antonia Wachter-Zeh, Eitan Yaakobi:

Criss-Cross Deletion Correcting Codes. 304-308 - Luca D'Alessio, Litian Liu, Ken Duffy, Yonina C. Eldar, Muriel Médard, Mehrtash Babadi:

A Coding Theory Perspective on Multiplexed Molecular Profiling of Biological Tissues. 309-313 - Arman Sharififar, Neda Aboutorab, Yucheng Liu, Parastoo Sadeghi:

Independent User Partition Multicast Scheme for the Groupcast Index Coding Problem. 314-318 - Yucheng Liu, Parastoo Sadeghi, Neda Aboutorab, Arman Sharififar:

Secure Index Coding with Security Constraints on Receivers. 319-323 - Jian-Jia Weng, Fady Alajaji, Tamás Linder:

A Simple Capacity Outer Bound for Two-Way Channels and Capacity Approximation Results. 324-328 - Ayumu Nakayama, Manabu Hagiwara:

Single Quantum Deletion Error-Correcting Codes. 329-333 - Taro Shibayama:

New Instances of Quantum Error-Correcting Codes for Single Deletion Errors. 334-338 - Yuta Ishii, Mitsuru Tada:

Structurally aggregate message authentication codes. 339-343 - Boris Ryabko, Viacheslav Zhuravlev:

The time-adaptive statistical testing for random number generators. 344-347 - Junichi Ida, Junji Shikata, Yohei Watanabe:

On the Power of Interaction in Signcryption. 348-352 - Kodai Sato, Kenji Yasunaga, Toru Fujiwara:

A Construction of Robustly Reusable Fuzzy Extractors over Blockchains. 353-357 - Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi:

The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE. 358-362 - Naoya Shiratori, Mitsuru Tada:

Delegatable proof of knowledge systems. 363-367 - Akinori Kawachi:

Hamming Weight of Product of Random Sparse Polynomials. 368-371 - Atsushi Iwasaki:

The relation between Proportion test and Uniformity test in NIST SP800-22. 372-376 - Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta:

How to Detect Malicious Behaviors in a Card-Based Majority Voting Protocol with Three Inputs. 377-381 - Tomoki Uemura, Yohei Watanabe, Yang Li, Noriyuki Miura, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta:

A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule. 382-386 - Hikaru Tsuchida, Takashi Nishide:

Client-Aided Bit-Composition Protocol with Guaranteed Output Delivery. 387-391 - Tomonori Hirata, Yuichi Kaji:

Information leakage through passive timing attacks on RSA decryption system. 392-396 - Bin Dai, Chong Li, Yingbin Liang, Zheng Ma, Shlomo Shamai Shitz:

On the Capacity of Gaussian Multiple-Access Wiretap Channels with Feedback. 397-401 - Parisa Babaheidarian, Somayeh Salimi, Panos Papadimitratos:

Scalable Security in Interference Channels With Arbitrary Number of Users. 402-406 - Setareh Sharifian, Alireza Poostindouz, Reihaneh Safavi-Naini:

A Capacity-achieving One-way Key Agreement with Improved Finite Blocklength Analysis. 407-411 - Alireza Poostindouz, Reihaneh Safavi-Naini:

A Channel Model of Transceivers for Multiterminal Secret Key Agreement. 412-416 - Vamoua Yachongka, Hideki Yagi:

Biometric Identification Systems with Both Chosen and Generated Secrecy. 417-421 - Kyohei Sekine, Hiroki Koga:

Optimal Basis Matrices of a Visual Cryptography Scheme with Meaningful Shares and Analysis of Its Security. 422-426 - Reo Eriguchi, Noboru Kunihiro, Koji Nuida:

A Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures. 427-431 - Ryo Okamura, Hiroki Koga:

New Constructions of an Evolving 2-Threshold Scheme Based on Binary or D-ary Prefix Codes. 432-436 - Maki Yoshida, Satoshi Obana:

Compact Verifiably Multiplicative Secret Sharing. 437-441 - Takeshi Koshiba:

Fourier-based Verifiable Function Secret Sharing. 442-446 - Yuta Kodera, Tomoya Tatara, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara:

A Parallel Blum-Micali Generator Based on the Gauss Periods. 447-450 - Sota Eguchi, Takeru Miyazaki, Shunsuke Araki, Satoshi Uehara, Yasuyuki Nogami:

A Study on Randomness of Sequences Obtained from Piecewise Logistic Map over Integers. 451-455 - Gangsan Kim, Hong-Yeop Song:

Almost perfect sequence family with perfect crosscorrelation. 456-459 - Kasumi Nakano, Kako Takahashi, Satoshi Uehara, Takeru Miyazaki, Shunsuke Araki, Yasuyuki Nogami:

A Study on Binary Sequences Located in Hadamard Matrices of Order 2n. 460-464 - Keita Emura, Shiho Moriai, Takuma Nakajima, Masato Yoshimi:

Cache-22: A Highly Deployable Encrypted Cache System. 465-469 - Katsuya Matsuoka, Mhd Irvan, Ryosuke Kobayashi, Rie Shigetomi Yamaguchi:

Score Fusion Method by Neural Network Using GPS and Wi-Fi Log Data. 470-474 - Onur Günlü, Peter Trifonov, Muah Kim, Rafael F. Schaefer, Vladimir Sidorenko:

Randomized Nested Polar Subcode Constructions for Privacy, Secrecy, and Storage. 475-479 - Rawad Bitar, Marvin Xhemrishi, Antonia Wachter-Zeh:

Fountain Codes for Private Distributed Matrix-Matrix Multiplication. 480-484 - Kazuhiro Kono, Noboru Babaguchi:

Data Anonymization for Service Strategy Development and Information Recommendation to Users Based on TF-IDF Method. 485-489 - Hiroomi Isozaki:

Detection Bottleneck links without multiple nodes. 490-493 - Kazumasa Omote:

A Decentralized Secure Email System based on Conventional RSA Signature. 494-498 - Hayami Motohashi, Kazuki Yoneyama:

Memory Efficient and Provably Secure Virus Detection. 499-503 - Ryuto Omachi, Yasuyuki Murakami:

Packer Identification Method for Multi-layer Executables with k-Nearest Neighbor of Entropies. 504-508 - Takahiro Ota, Akiko Manada:

Addressing Information Using Data Hiding for DNA-based Storage Systems. 509-513 - Tetsuya Kojima, Kento Akimoto:

Visible Video Data Hiding Techniques Based on Visual Effects Utilizing Barcodes. 514-518 - Tetsuro Kubo, Hiroshi Kubo:

Multi-Carrier Differential Trellis-Coded Modulation/Demodulation Employing Multiple Differential Detection with Channel Prediction. 519-523 - Yuki Noda, Shunya Asano, Makoto Itami, Akira Nakamura:

Improvement of accuracy of UWB Positioning System within the intersection using a Long Short-Term Memory Network. 524-528 - Xiaojie Liu, Ulrich Speidel:

On an Alternative Approach to Congestion Detection in Ad Hoc Networks. 529-533 - Masaya Kambara, Guanghui Song, Tomotaka Kimura, Jun Cheng:

Optimal Power Allocation of Cooperative Superposition-Coded Relaying with Finite-Blocklength Transmission over Quasi-Static Rayleigh Channels. 534-538 - Anders Høst-Madsen, Nicholas Whitcomb, Jeffrey A. Weldon, Zixiang Xiong:

Latency-Energy Tradeoff with Realistic Hardware Models. 539-543 - Masayoshi Ohashi:

Study on a delay and Doppler estimation performance of 2-dimensional BPSK signal using discrete gaussian wave. 544-548 - Michael Fernando Mendez Jimenez, Omar DeGuchy, Roummel F. Marcia:

Deep Convolutional Autoencoders for Deblurring and Denoising Low-Resolution Images. 549-553 - Haruka Toyota, Hiroshi Kubo:

Experimental Evaluation Results of Acoustic Spread Spectrum Communications Employing Orthogonal Gold Sequences. 554-558 - Yui Nakai, Yuka Tanaka, Hiroshi Kubo:

Differential OFDM Employing AFC for Fast Time-Varying Doppler Shifts in Underwater Acoustic Communications. 559-563 - Yuka Tanaka, Yui Nakai, Hiroshi Kubo:

Doubly Differential OFDM Employing an Intercarrier Interference Self-Canceller for Underwater Acoustic Communications. 564-568 - Kosei Ozeki, Naofumi Aoki, Saki Anazawa, Yoshinori Dobashi, Kenichi Ikeda, Hiroshi Yasuda:

Designing a Symbol Classifier for Inaudible Sound Communication Systems Using a Neural Network. 569-572 - Kouji Tahata, Tatsuya Ochiai, Ukyo Matsushima:

Asymmetry models and model selection in square contingency tables with ordinal categories. 573-577 - Boris Ryabko:

Statistical Testing of Randomness. 578-581 - Haiyun He, Qiaosheng Eric Zhang, Vincent Y. F. Tan:

Optimal Resolution of Change-Point Detection with Empirically Observed Statistics and Erasures. 582-586 - Kohei Miyamoto, Jun'ichi Takeuchi:

On MDL Estimation for Simple Contaminated Gaussian Location Families. 587-591 - Mojtaba Abolfazli, Anders Høst-Madsen, June Zhang:

Differential Description Length for Hyperparameter Selection in Supervised Learning. 592-596 - Yuki Kondo, Manabu Hagiwara, Midori Kudo:

Formalization of VT Codes and Their Single-Deletion Correcting Property in Lean. 597-601 - Takehiko Mieno, Togo Yoshimura, Hiroyuki Okazaki, Yuichi Futa, Kenichi Arai:

Formal Verification of Merkle-Damgård Construction in ProVerif. 602-606 - Takafumi Saikawa, Kazunari Tanaka, Kensaku Tanaka:

Formal Verification and Code-Generation of Mersenne-Twister Algorithm. 607-611

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














