Abstract is missing.
- Spectral shape of non-binary LDPC code ensembles with separated variable nodesGiuliano Garrammone, Enrico Paolini, Marco Chiani. 1-5 [doi]
- Optimized degree distributions for binary and non-binary LDPC codes in Flash memoryKasra Vakilinia, Dariush Divsalar, Richard D. Wesel. 6-10 [doi]
- On computing the weight distribution of non-binary ldpc codes using the probabilistic algorithmMasanori Hirotomo, Jun'ichi Tsurumi, Masakatu Morii. 11-15 [doi]
- Non-binary LDPC decoding using truncated messages in the Walsh-Hadamard domainJossy Sayir. 16-20 [doi]
- Universal channel coding with continuous output systemMasahito Hayashi. 21-25 [doi]
- A computation algorithm of the capacity of discrete memoryless channel with the input size larger than the output sizeTsutomu Kawabata, Yoshiaki Kitayama. 26-29 [doi]
- A generalized write channel model for bit-patterned media recordingSima Naseri, Somaie Yazdani, Behrooz Razeghi, Ghosheh Abed Hodtani. 30-34 [doi]
- Channel dispersion for well-ordered mixed channels decomposed into memoryless channelsHideki Yagi, Ryo Nomura. 35-39 [doi]
- Complexity-based steganalysisSathiamoorthy Manoharan, Aquib Master, Ulrich Speidel. 40-44 [doi]
- A disaster prevention broadcasting based on data hiding scheme using complete complementary codesTetsuya Kojima, Toru Tachikawa, Akihiro Oizumi, Yoshimasa Yamaguchi, Udaya Parampalli. 45-49 [doi]
- Countermeasure to non-linear collusion attacks on spread spectrum fingerprintingMinoru Kuribayashi. 50-54 [doi]
- Study on a scheme for the right to be forgottenSachiko Kanamori, Kanako Kawaguchi, Hidema Tanaka. 55-59 [doi]
- Analysis of Slow Read DoS attackJunhan Park, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa. 60-64 [doi]
- An automated recognition technique for aorta aneurysm using thoracic multi-slice CT imagesKento Horikoshi, Hiroshi Hanaizumi, Shin Ishimaru. 65-69 [doi]
- An improved RIP-based performance guarantee for sparse signal reconstruction with noise via orthogonal matching pursuitLing-Hua Chang, Jwo-Yuh Wu. 70-74 [doi]
- A comparison of FFT-based techniques for Doppler velocity estimation in SuperDARN radarsThanh T. Nguyen, John C. Devlin, Darrell M. Elton, Guang Deng, Eddie Custovic, B. Bienvenue. 75-79 [doi]
- Variable multi-pulse PPM using new dimming control method for visible light communicationsTakashi Ozaki, Yusuke Kozawa, Yohtaro Umeda. 80-84 [doi]
- Matched-filter detection of the presence of MPSK signalsSeyed Ali Saberali, Norman C. Beaulieu. 85-89 [doi]
- A construction of LDPC convolutional codes with close distance boundsTien-Hui Chen, Kuan-Chen Chen, Mao Chao Lin. 90-94 [doi]
- Error probability analyses of maximum a posteriori probability decoding by moment techniquesDaiki Hato, Yu Morishima, Ikuo Oka, Shingo Ata. 95-99 [doi]
- Construction of high-rate punctured convolutional codes through dual codesKana Kikuchi, Sen Moriya, Hiroshi Sasano. 100-104 [doi]
- Dependable medical network based on 4G cellular mobile standard with external channel code in concatenated code structureEmtithal Ahmed Talha, Ryuji Kohno. 105-109 [doi]
- Constellation constrained capacity of additive Gaussian mixture noise channelsJ. Harshan, Emanuele Viterbo. 110-114 [doi]
- Formulas for limit superior/inferior in probabilityJun Muramatsu. 115-119 [doi]
- Suboptimal quantizer design for outputs of discrete memoryless channels with a finite-input alphabetYuta Sakai, Ken-ichi Iwata. 120-124 [doi]
- Estimation of Rényi entropy of order α based on the nearest neighbor distanceYoung-Sik Kim. 125-129 [doi]
- α-divergence derived as the generalized rate function in a power-law systemHiroki Suyari, Antonio Maria Scarfone. 130-134 [doi]
- New method for factoring two RSA moduli with implicit hintRyuichi Sakai, Masao Kasahara. 135-137 [doi]
- Worst case computation time for minimal joint Hamming weight numeral systemVorapong Suppakitpaisarn, Hiroshi Imai. 138-142 [doi]
- Lossy identification schemes from decisional RSAShingo Hasegawa, Shuji Isobe. 143-147 [doi]
- Protocols for evaluating conditional sum on encrypted dataHiroki Hayashi, Satoshi Obana. 148-152 [doi]
- Differential probability for a component in non-linear function of K2 v2.0Kenichi Yamaya, Toshinobu Kaneko. 153-157 [doi]
- Entanglement-assisted quantum error-correcting codes based on the circulant permutation matrixMihoko Wada, Keisuke Kodaira, Tomoharu Shibuya. 158-162 [doi]
- Non-hermitian extensions of Schrödinger type uncertainty relationsKenjiro Yanagi. 163-166 [doi]
- On the condition on classical codes to construct quantum error correcting codes for amplitude damping channelKeisuke Kodaira, Tomoharu Shibuya. 167-171 [doi]
- Decoupling bent quantum networksAntonín Hoskovec, Holger Frydrych, Igor Jex, Gernot Alber. 172-175 [doi]
- A simple scheme for correcting blocks of multiple adjacent bit errorsJosep Cotrina Navau, Marcel Fernandez. 176-180 [doi]
- Enhancement of punctured turbo code with UTPA in optical wireless channelSachin Rai, Hiromasa Habuchi. 181-185 [doi]
- An improvement of approximate BP decodingGou Hosoya, Hiroyuki Yashima. 186-190 [doi]
- A coded modulation scheme for 64-QAM with a matched mappingTatsumi Konishi. 191-195 [doi]
- Finite-length analysis on tail probability and simple hypothesis testing for Markov chainShun Watanabe, Masahito Hayashi. 196-200 [doi]
- Formalization of the variable-length source coding theorem: Direct partRyosuke Obi, Manabu Hagiwara, Reynald Affeldt. 201-205 [doi]
- Bayesian estimation of the rates in a stochastic biochemical reaction networkBranko Ristic, Alex Skvortsov. 206-210 [doi]
- Evaluation of the minimum overflow threshold of bayes codes for a Markov sourceShota Saito, Nozomi Miya, Toshiyasu Matsushima. 211-215 [doi]
- Granger causality for functional valued random processesPierre-Olivier Amblard, Olivier J. J. Michel. 216-220 [doi]
- Secure regenerating codes using linear MBR/MSR codes and the all-or-nothing transformHidenori Kuwakado, Masazumi Kurihara. 221-225 [doi]
- Secure consolidation of charging information over Smart Grid using ID federationHikaru Kishimoto, Shingo Okamura. 226-230 [doi]
- On the security notions of signcryptionShingo Hasegawa, Shuji Isobe. 231-235 [doi]
- A CDH-based ordered multisignature scheme in the standard model with better efficiencyNaoto Yanai, Masahiro Mambo, Eiji Okamoto. 236-240 [doi]
- A proposal of distributed management scheme of content key information for pure P2P networksTomoaki Tsuchikawa, Bhed Bahadur Bista, Toyoo Takata. 241-245 [doi]
- Error performance for non-destructive quantum receiver of M-ary coherent-state signalsKazuki Sato, Kenji Nakahira, Shogo Usami, Tsuyoshi Sasaki Usuda. 246-249 [doi]
- Quantum gain of coding by polar codes with finite codeword lengthNaoki Iwata, Tsuyoshi Sasaki Usuda. 250-253 [doi]
- A simple approximation of minimum error probability using trace distanceShungo Asano, Tsuyoshi Sasaki Usuda. 254-258 [doi]
- Error performance of optimum quantum detection for BPSK signals in the presence of phase noise and its robustnessShinji Koyama, Tsuyoshi Sasaki Usuda. 259-263 [doi]
- Low complexity construction of low density lattice codes based on array codesRicardo Antonio Parrao Hernandez, Brian M. Kurkoski. 264-268 [doi]
- Precoding by Priority: A UEP scheme for RaptorQ codesKeshava M. Elliadka, Robert Morelos-Zaragoza. 269-273 [doi]
- Fountain codes based on zigzag decodable codingTakayuki Nozaki. 274-278 [doi]
- An error-floor reduction technique for short-length LT codesLi-Jen Chang, Chung-Hsuan Wang, John K. Zao. 279-283 [doi]
- On the coding rate of a multishot Tunstall code for stationary memoryless sourcesMitsuharu Arimura. 284-288 [doi]
- On a two-dimensional antidictionary codingTakahiro Ota, Hiroyoshi Morita. 289-293 [doi]
- On a universal antidictionary coding for stationary ergodic sources with finite alphabetTakahiro Ota, Hiroyoshi Morita. 294-298 [doi]
- On redundancy of memoryless sources over countable alphabetsMaryam Hosseini, Narayana Santhanam. 299-303 [doi]
- An extended similarity distance for use with computable information estimatorsUlrich Speidel. 304-308 [doi]
- A solution for privacy-preserving, remote access to sensitive dataKalpana Singh, Jian Zhong, Lynn Margaret Batten, Peter Bertók. 309-313 [doi]
- Android applications: Data leaks via advertising librariesVeelasha Moonsamy, Lynn Batten. 314-317 [doi]
- Pairing-based cryptography for homomorphic cryptographyYasuyuki Nogami, Shunsuke Miyoshi. 318-321 [doi]
- Finite-length analysis for secret random number generation and coding theoremsMasahito Hayashi. 322-326 [doi]
- Basics and applications of measurement-based quantum computingTomoyuki Morimae. 327-330 [doi]
- Quantum network coding and the current status of its studiesHarumichi Nishimura. 331-334 [doi]
- Coding theoretic study of secure network coding and quantum secret sharingRyutaroh Matsumoto. 335-337 [doi]
- A new construction for constant weight codesTuvi Etzion, Alexander Vardy. 338-342 [doi]
- List-decoding Gabidulin codes via interpolation and the euclidean algorithmMargreta Kuijper, Anna-Lena Trautmann. 343-347 [doi]
- On the primitive polynomial as the characteristic polynomial of a symmetric companion matrixManabu Hagiwara, Takaaki Sasaki. 348-352 [doi]
- On generator polynomial matrices of generalized pseudo-cyclic codesHajime Matsui. 353-357 [doi]
- A decoding algorithm for projective Reed-Muller codes of 2-dimensional projective space with DFTNorihiro Nakashima, Hajime Matsui. 358-362 [doi]
- Maximum multicast throughput by network coding on undirected hypernetworksHokuto Takahashi, Ryutaroh Matsumoto, Tomohiko Uyematsu. 363-367 [doi]
- Distributed storage over unidirectional ring networksJiyong Lu, Xuan Guang, Fang-Wei Fu. 368-372 [doi]
- On some properties of distributed line graphsAkiko Manada, Hiroyoshi Morita. 373-377 [doi]
- Two storage code constructions allowing partially collaborative repairsShiqiu Liu, Frédérique E. Oggier. 378-382 [doi]
- Node repair for distributed storage systems over fading channelsDavid A. Karpuk, Camilla Hollanti, Amaro Barreal. 383-387 [doi]
- Cooperative jamming for MIMO wiretap channelsShuiyin Liu, Yi Hong, Emanuele Viterbo. 388-392 [doi]
- Achievable rate-equivocation regions for relay broadcast channels with confidential messagesBin Dai, Zheng Ma. 393-397 [doi]
- On the ergodic secrecy capacity of MIMO wiretap channels with statistical CSIMaksym A. Girnyk, Mikko Vehkaperä, Jinhong Yuan, Lars K. Rasmussen. 398-402 [doi]
- Binary transmissions over Gaussian wiretap channel under soft/hard decision decodingChao Qi, Yanling Chen, A. J. Han Vinck, Xiaohu Tang. 403-407 [doi]
- RA-inspired codes for efficient information theoretic multi-path network securityTao Ye, Darryl Veitch, Sarah Johnson. 408-412 [doi]
- A single carrier block transmission scheme with scattered pilots for high-order modulation in fast fading channelYasunori Nouda, Shinji Masuda, Ryosuke Nakamura, Hiroyasu Sano. 413-417 [doi]
- A study on block equalization for OFDM systems with short Cyclic PrefixMasahiro Fujii, Yuta Kasajima, Hiroyuki Hatano, Atsushi Ito, Yu Watanabe. 418-422 [doi]
- Reducing the effect of delayed path beyond guard interval by compressed sensing in OFDM systemsMasato Saito. 423-427 [doi]
- Performance analysis of chaos based WSNs under jamming attackArash Tayebi, Stevan M. Berber, Akshya K. Swain. 428-432 [doi]
- Non-binary polar codes with channel symbol permutationsMao-Ching Chiu. 433-437 [doi]
- Permuted successive cancellation decoder for polar codesHarish Vangala, Emanuele Viterbo, Yi Hong. 438-442 [doi]
- Twisted polar codesPeter Trifonov, Vera Miloslavskaya. 443-447 [doi]
- Faulty successive cancellation decoding of polar codes for the binary erasure channelAlexios Balatsoukas-Stimming, Andreas Burg. 448-452 [doi]
- Sequential decoding of Reed-Solomon codesVera Miloslavskaya, Peter Trifonov. 453-457 [doi]
- User-relay duality in cyclic interference alignment for cascaded two-way relay networksHenning Maier, Rudolf Mathar. 458-462 [doi]
- Dirty interference cancelation for multiple access channelsRuchen Duan, Yingbin Liang, Ashish Khisti, Shlomo Shamai. 463-467 [doi]
- State-dependent Gaussian Z-interference channel: New resultsShahab Ghasemi-Goojani, Hamid Behroozi. 468-472 [doi]
- Capacity study of distributed beamforming in relation to constrained backbone communicationPeng Zhang, Frans M. J. Willems, Li Huang. 473-477 [doi]
- A new higher order differential of CamelliaNobuyuki Sugio, Hiroshi Aono, Kimihiko Sekino, Toshinobu Kaneko. 478-482 [doi]
- In search of secure domain parameters under strong diffie-hellman and related assumptionsSeongHan Shin, Kazukuni Kobara, Hideki Imai. 483-487 [doi]
- A new higher order differential of LBlockNaoki Shibayama, Toshinobu Kaneko. 488-492 [doi]
- Secret key reconstruction method using round addition DFA on lightweight block cipher LBlockHideki Yoshikawa, Masahiro Kaminaga, Arimitsu Shikoda, Toshinori Suzuki. 493-496 [doi]
- A knapsack public-key cryptosystem using two random sequencesYasuyuki Murakami, Shinsuke Hamasho, Masao Kasahara. 497-501 [doi]
- Joint turbo equalization and BICM-ID-based IDMA over frequency selective fading channelsKun Wu, Khoirul Anwar, Tad Matsumoto. 502-506 [doi]
- Performance analysis of MC-CDMA channel estimation method using Kalman filterTakemi Suzuki, Takahiro Natori, Nari Tanabe, Toshihiro Furukawa. 507-510 [doi]
- Asymptotic reduced-rank MMSE in asynchronous MC-DS-CDMA systemsFeng-Tsun Chien, Ronald Y. Chang. 511-515 [doi]
- On BER performance of block coding MC-ZCZ-CDMAAiniwan Abudoukeremu, Jincheng Huang, Yuta Ida, Takahiro Matsumoto, Shinya Matsufuji. 516-520 [doi]
- Introduction of a recursive method for specific weight binary vector generation in decreasing order of its reliability measureTakuya Kusaka. 521-525 [doi]
- Cross-Error Correcting Integer Codes over ℤ2mAnna-Lena Trautmann, Emanuele Viterbo. 526-530 [doi]
- Symbol-level synchronization using probability lookup-table for IDS error correctionHaruhiko Kaneko. 531-535 [doi]
- Coding scheme for T-user noisy multiple-access adder channelShan Lu, Wei Hou, Jun Cheng. 536-540 [doi]
- Cut-set bound for generalized networks with deterministic channelsSilas L. Fong. 541-545 [doi]
- The error exponent of zero-rate multiterminal hypothesis testing for sources with common informationMakoto Ueda, Shigeaki Kuzuoka. 546-550 [doi]
- Rate distortion for source coding with Markov side information at the decoderYasutada Oohama. 551-555 [doi]
- Encoding of markov sources with partial memoryless side information at the decoderYasutada Oohama. 556-560 [doi]
- Information theoretical evaluation of the bucketing technique to mitigate timing attacksYasuyuki Kobayashi, Yuichi Kaji, Hiroyuki Seki. 561-565 [doi]
- Password-protected secret-sharing schemes without random oraclesShingo Hasegawa, Shuji Isobe, Jun-ya Iwazaki, Eisuke Koizumi, Hiroki Shizuya. 566-570 [doi]
- Gaussian fuzzy commitmentA. J. Han Vinck, Aram Jivanyan, Jonas Winzen. 571-574 [doi]
- Cheating on a visual secret sharing scheme under a realistic scenarioPichanee Lumyong, Mitsugu Iwamoto, Kazuo Ohta. 575-579 [doi]
- Design factors for dual-hop AF systems with partial relay selectionSamy S. Soliman, Norman C. Beaulieu. 580-584 [doi]
- New relay-based transmission protocols for wireless distributed storage systemsCamilla Hollanti, Hsiao-feng Lu, David A. Karpuk, Amaro Barreal. 585-589 [doi]
- Channel capacity and achievable rates of peak power limited AWGNC, and their applications to adaptive modulation and codingShiro Ikeda, Kazunori Hayashi, Toshiyuki Tanaka. 590-594 [doi]
- Study on BER performance of SS system using a Huffman sequence against CW jamming over AWGN channelsTakahiro Matsumoto, Hideyuki Torii, Yuta Ida, Shinya Matsufuji. 595-599 [doi]
- Position modulation code for non-binary Write-Once MemoriesTetsuya Kobayashi, Hiroyoshi Morita, Akiko Manada. 600-604 [doi]
- A flash code utilizing dynamic segment allocationKazuki Kumagai, Yuichi Kaji. 605-609 [doi]
- Write-Once Memory codes for low-complexity decoding of Asymmetric Multiple Access ChannelRyota Sekiya, Erick Christian Garcia Alvarez, Brian M. Kurkoski, Hideki Yagi. 610-614 [doi]
- An improvement of performance to layered index-less indexed flash codesJun Asatani, Mitsuaki Honji. 615-619 [doi]
- Code rate of constrained code for phase change memoriesShohei Takeyama, Hiroshi Kamabe. 620-624 [doi]
- Degrees of Freedom of the MIMO 3 -way channelHenning Maier, Anas Chaaban, Rudolf Mathar. 625-629 [doi]
- Channel estimation for frequency-selective two-way MIMO relay systemsChoo W. R. Chiong, Yue Rong, Yong Xiang. 630-634 [doi]
- Transceiver optimization for MIMO multi-relay systems using projected gradient approachApriana Toding, Muhammad R. A. Khandaker, Yue Rong. 635-639 [doi]
- Joint source and relay matrices optimization for interference MIMO relay systemsKhoa Xuan Nguyen, Yue Rong. 640-644 [doi]
- Improved rates and coding for the MIMO two-way relay channelAnatoly Khina, Yuval Kochman, Uri Erez. 645-649 [doi]
- A novel class of binary zero-correlation zone sequence sets by using a cyclic difference setTakafumi Hayashi, Yodai Watanabe, Takao Maeda. 650-654 [doi]
- A novel zero-correlation zone sequence set having a low-peak factor and a flat power spectrumTakafumi Hayashi, Yodai Watanabe, Shinya Matsufuji, Takao Maeda. 655-659 [doi]
- Relations between evaluations of NIST tests and Lyapunov exponents of sequences generated by the logistic map over integersChikara Miyazaki, Takeru Miyazaki, Satoshi Uehara, Shunsuke Araki. 660-664 [doi]
- Some properties of the maximum period on the logistic map over Z2nKyohei Yoshida, Takeru Miyazaki, Satoshi Uehara, Shunsuke Araki. 665-668 [doi]
- Parameterization of high-dimensional perfect sequences over a composition algebra over ℝTakao Maeda, Takafumi Hayashi. 669-673 [doi]
- Estimation of areal density gains of TDMR system with 2D detectorRathnakumar Radhakrishnan, Nedeljko Varnica, Mats Öberg. 674-678 [doi]
- Two-dimensional noise-predictive maximum likelihood method for magnetic recording channelsChaitanya Kumar Matcha, Shayan Garani Srinivasa, Seyed Mehrdad Khatami, Bane V. Vasic. 679-683 [doi]
- A review study on the benefits of multi-reader heads in SMR and TDMR systemsKheong Sann Chan. 684-688 [doi]
- On throughput-delay tradeoff of network coding for wireless communicationsParastoo Sadeghi, Mingchao Yu, Neda Aboutorab. 689-693 [doi]
- Information inequalities and finite groups: an overviewNadya Markin, Frédérique E. Oggier. 694-698 [doi]
- Combination network coding: Alphabet size and zigzag decodingChi Wan Sung, Xueqing Gong. 699-703 [doi]
- Graph-based code construction for data storageMostafa Shabani, Terence H. Chan. 704-708 [doi]
- Initial values entering into an element zero with period one for logistic maps over integersShunsuke Araki, Ken'ichi Kakizaki, Takeru Miyazaki, Satoshi Uehara. 709-713 [doi]
- A study of an automorphism on the logistic maps over prime fieldsTakeru Miyazaki, Shunsuke Araki, Satoshi Uehara, Yasuyuki Nogami. 714-718 [doi]
- An efficient generation of geometric sequences defined with trace and legendre symbolYasuyuki Nogami, Kazuki Tada, Satoshi Uehara. 719-721 [doi]
- On generalized constant-weight codes over GF(q) from a cyclic difference set and their propertiesTakayasu Kaida, Junru Zheng, Keiichi Takahashi. 722-726 [doi]