Technical Program
back to ISITA2014
Monday, October 27
10:20 - 12:00
M-1-C: LDPC Codes
Room: Clarendon Auditorium
Chair: Kenta Kasai
- Spectral Shape of Non-Binary LDPC Code Ensembles with Separated Variable Nodes
- Optimized Degree Distributions for Binary and Non-Binary LDPC Codes in Flash Memory
- On Computing the Weight Distribution of Non-Binary LDPC Codes Using the Probabilistic Algorithm
- Non-binary LDPC Decoding Using Truncated Messages in the Walsh-Hadamard Domain
M-1-D: Shannon Theory I
Room: D
Chair: Jun Muramatsu
- Universal Channel Coding with Continuous Output System
- A Computation Algorithm of the Capacity of Discrete Memoryless Channel with the Input Size Larger Than the Output Size
- A Generalized Write Channel Model for Bit-Patterned Media Recording
- Channel Dispersion for Well-Ordered Mixed Channels Decomposed Into Memoryless Channels
M-1-E: Data Hiding & Network Security
Room: E
Chair: Veelasha Moonsamy
- Complexity-based Steganalysis
- A Disaster Prevention Broadcasting Based on Data Hiding Scheme Using Complete Complementary Codes
- Countermeasure to Non-Linear Collusion Attacks on Spread Spectrum Fingerprinting
- Study on a Scheme for the Right to Be Forgotten
- Analysis of Slow Read DoS Attack
M-1-A: Image & Signal Processing
Room: A
Chair: Vaughan Clarkson
- An Automated Recognition Technique for Aorta Aneurysm Using Thoracic Multi-Slice CT Images
- An Improved RIP-Based Performance Guarantee for Sparse Signal Reconstruction with Noise Via Orthogonal Matching Pursuit
- A Comparison of FFT-based Techniques for Doppler Velocity Estimation in SuperDARN Radars
- Variable Multi-Pulse PPM Using New Dimming Control Method for Visible Light Communications
- Matched-Filter Detection of the Presence of MPSK Signals
14:00 - 15:40
M-2-C: Convolutional Codes
Room: Clarendon Auditorium
Chair: Takayuki Nozaki
- A Construction of LDPC Convolutional Codes with Close Distance Bounds
- Error Probability Analyses of Maximum a Posteriori Probability Decoding by Moment Techniques
- Construction of High-rate Punctured Convolutional Codes Through Dual Codes
- Dependable Medical Network Based on 4G Cellular Mobile Standard with External Channel Code in Concatenated Code Structure
M-2-D: Shannon Theory II
Room: D
Chair: Shigeaki Kuzuoka
- Constellation Constrained Capacity of Additive Gaussian Mixture Noise Channels
- Formulas for Limit Superior/Inferior in Probability
- Suboptimal Quantizer Design for Outputs of Discrete Memoryless Channels with a Finite-Input Alphabet
- Estimation of Renyi Entropy of Order $\alpha$ Based on the Nearest Neighbor Distance
- $\alpha$-Divergence Derived as the Generalized Rate Function in a Power-Law System
M-2-E: Computatinal Security
Room: E
Chair: Hidenori Kuwakado
- New Method for Factoring Two RSA Moduli with Implicit Hint
- Worst Case Computation Time for Minimal Joint Hamming Weight Numeral System
- Lossy Identification Schemes From Decisional RSA
- Protocols for Evaluating Conditional Sum on Encrypted Data
- Differential Probability for a Component in Non-Linear Function of K2 V2.0
M-2-A: Quantum Information over Quantum Channels
Room: A
Chair: Tomoyuki Morimae
- Entanglement-Assisted Quantum Error-Correcting Codes Based on the Circulant Permutation Matrix
- Non-Hermitian Extensions of Schrodinger Type Uncertainty Relations
- On the Condition on Classical Codes to Construct Quantum Error Correcting Codes for Amplitude Damping Channel
- Decoupling Bent Quantum Networks
16:00 - 17:40
M-3-C: Coding Theory & Practice I
Room: Clarendon Auditorium
Chair: Jun Cheng
- A Simple Scheme for Correcting Blocks of Multiple Adjacent Bit Errors
- Enhancement of Punctured Turbo Code with UTPA in Optical Wireless Channel
- An Improvement of Approximate BP Decoding
- A Coded Modulation Scheme for 64-QAM with a Matched Mapping
M-3-D: Stochastic Process & Source Coding
Room: D
Chair: Mitsuharu Arimura
- Finite-length Analysis on Tail Probability and Simple Hypothesis Testing for Markov Chain
- Formalization of the Variable-Length Source Coding Theorem: Direct Part
- Bayesian Estimation of the Rates in a Stochastic Biochemical Reaction Network
- Evaluation of the Minimum Overflow Threshold of Bayes Codes for a Markov Source
- Granger Causality for Functional Valued Random Processes
M-3-E: Data Security
Room: E
Chair: Hideki Yoshikawa
- Secure Regenerating Codes Using Linear MBR/MSR Codes and the All-or-Nothing Transform
- Secure Consolidation of Charging Information Over Smart Grid Using ID Federation
- On the Security Notions of Signcryption
- A CDH-based Ordered Multisignature Scheme in the Standard Model with Better Efficiency
- A Proposal of Distributed Management Scheme of Content Key Information for Pure P2P Networks
M-3-A: Classical Information over Quantum Channels
Room: A
Chair: Kenjiro Yanagi
- Error Performance for Non-Destructive Quantum Receiver of M-Ary Coherent-State Signals
- Quantum Gain of Coding by Polar Codes with Finite Codeword Length
- A Simple Approximation of Minimum Error Probability Using Trace Distance
- Error Performance of Optimum Quantum Detection for BPSK Signals in the Presence of Phase Noise and Its Robustness
Tuesday, October 28
10:20 - 12:00
T-1-C: Coding Theory & Practice II
Room: Clarendon Auditorium
Chair: Peter Trifonov
- Low Complexity Construction of Low Density Lattice Codes Based on Array Codes
- Precoding by Priority: A UEP Scheme for RaptorQ Codes
- Fountain Codes Based on Zigzag Decodable Coding
- An Error-Floor Reduction Technique for Short-Length LT Codes
T-1-D: Data Compression & Source Coding
Room: D
Chair: Ulrich Speidel
- On the Coding Rate of a Multishot Tunstall Code for Stationary Memoryless Sources
- On a Two-Dimensional Antidictionary Coding
- On a Universal Antidictionary Coding for Stationary Ergodic Sources with Finite Alphabet
- On Redundancy of Memoryless Sources Over Countable Alphabets
- An Extended Similarity Distance for Use with Computable Information Estimators
T-1-E: Approaches for Recent Innovative Cryptography
Organized Session
Room: EOrganizer & Chair: Yasuyuki Nogami
- A Solution For Privacy Preserving, Remote Access to Sensitive Data
- Recent Progress on Cryptographic Multilinear Maps and Applications
- Android Applications: Data Leaks via Advertising Libraries
- Pairing-based cryptography for homomorphic encryption
T-1-A: Classical and Quantum Secure Network
Organized Session
Room: AOrganizer & Chair: Masahito Hayashi
Chair: Ryutaroh Matsumoto
- Finite-length analysis for secret random number generation and coding theorems
- Basics and applications of measurement-based quantum computing
- Quantum network coding and the current status of its studies
- Coding Theoretic Study of Secure Network Coding and Quantum Secret Sharing
14:00 - 15:00
T-R: Recent Results Poster Session
Room: Auditorium Foyer
- [Type I Poster Session]
- On Modification of Rank Bound by Matrix Manipulation for Cyclic Codes
- A General Construction of Z-Concatenative Complete Complementary Codes
- SQL Injection Attack Detection with Contingency Table
- Steganalysis Based on Image Difference Signal Against Replacement of Two Least-Significant Bits
- A Two-stage Method for Automatically Detecting Craters in Lunar Images
- Asymptotics of MLE-based Prediction for Semi-supervised Learning
- Strong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach
- Support Vector Machines in Side Channel Analysis
- Advantage Creation Property of QAM-type KCQ Key Generation
- Parallel Concatenation of Polar Codes and Iterative Decoding
- Group Covariance and Formula of Channel Matrix of Coded 4PSK Signals by Linear Codes Over ${\mathbb F}_4$
- Chinese Word Acquisition Method Using State Transition Model
- Performance Evaluation of the Modified Binary Countdown Scheme for Wireless Multi-hop Network
- [Type II Poster Session]
- A Lunar Crater Detecting Method Using Morphological Features Derived from Digital Elevation Model
- A Relation between Mean King's Problem and Quantum Error-Correcting Codes
15:20 - 17:00
T-2-C: Algebraic Codes
Room: Clarendon Auditorium
Chair: Margreta Kuijper
- A New Construction for Constant Weight Codes
- List-Decoding Gabidulin Codes Via Interpolation and the Euclidean Algorithm
- On the Primitive Polynomial as the Characteristic Polynomial of a Symmetric Companion Matrix
- On Generator Polynomial Matrices of Generalized Pseudo-Cyclic Codes
- A Decoding Algorithm for Projective Reed-Muller Codes of 2-Dimensional Projective Space with DFT
T-2-D: Coding for Distributed Systems
Room: D
Chair: Jossy Sayir
- Maximum Multicast Throughput by Network Coding on Undirected Hypernetworks
- Distributed Storage Over Unidirectional Ring Networks
- On Some Properties of Distributed Line Graphs
- Two Storage Code Constructions Allowing Partially Collaborative Repairs
- Node Repair for Distributed Storage Systems Over Fading Channels
T-2-E: Information Theoretic Security I
Room: E
Chair: Yingbin Liang
- Cooperative Jamming for MIMO Wiretap Channels
- Achievable Rate-Equivocation Regions for Relay Broadcast Channels with Confidential Messages
- On the Ergodic Secrecy Capacity of MIMO Wiretap Channels with Statistical CSI
- Binary Transmissions Over Gaussian Wiretap Channel Under Soft/Hard Decision Decoding
- RA-Inspired Codes for Efficient Information Theoretic Multi-path Network Security
T-2-A: OFDM Systems
Room: A
Chair: Yue Rong
- A Single Carrier Block Transmission Scheme with Scattered Pilots for High-Order Modulation in Fast Fading Channel
- A Study on Block Equalization for OFDM Systems with Short Cyclic Prefix
- Reducing the Effect of Delayed Path Beyond Guard Interval by Compressed Sensing in OFDM Systems
- Performance Analysis of Chaos Based WSNs Under Jamming Attack
Wednesday, October 29
08:30 - 10:10
W-1-C: Coding Theory & Practice III
Room: Clarendon Auditorium
Chair: Chung-Hsuan Wang
- Non-binary Polar Codes with Channel Symbol Permutations
- Permuted Successive Cancellation Decoder for Polar Codes
- Twisted Polar Codes
- Faulty Successive Cancellation Decoding of Polar Codes for the Binary Erasure Channel
- Sequential Decoding of Reed-Solomon Codes
W-1-D: Multi-User Information Theory I
Room: D
Chair: Yasutada Oohama
- User-Relay Duality in Cyclic Interference Alignment for Cascaded Two-Way Relay Networks
- Dirty Interference Cancelation for Multiple Access Channels
- State-Dependent Gaussian Z-Interference Channel: New Results
- Capacity Study of Distributed Beamforming in Relation to Constrained Backbone Communication
W-1-E: Cryptology
Room: E
Chair: Ryuichi Sakai
- A New Higher Order Differential of Camellia
- In Search of Secure Domain Parameters Under Strong Diffie-Hellman and Related Assumptions
- A New Higher Order Differential of LBlock
- Secret Key Reconstruction Method Using Round Addition DFA on Lightweight Block Cipher LBlock
- A Knapsack Public-key Cryptosystem Using Two Random Sequences
W-1-A: Multiple Access Systems
Room: A
Chair: Jamie Evans
- Joint Turbo Equalization and BICM-ID-based IDMA Over Frequency Selective Fading Channels
- Performance Analysis of MC-CDMA Channel Estimation Method Using Kalman Filter
- Asymptotic Reduced-Rank MMSE in Asynchronous MC-DS-CDMA Systems
- On BER Performance of Block Coding MC-ZCZ-CDMA
10:30 - 11:50
W-2-C: Coding Theory & Practice IV
Room: Clarendon Auditorium
Chair: Mao-Ching Chiu
- Introduction of a Recursive Method for Specific Weight Binary Vector Generation in Decreasing Order of Its Reliability Measure
- Cross-Error Correcting Integer Codes Over $\mathbb{Z}_{2^m}$
- Symbol-Level Synchronization Using Probability Lookup-Table for IDS Error Correction
- Coding Scheme for T-User Noisy Multiple-Access Adder Channel
W-2-D: Multi-User Information Theory II
Room: D
Chair: Henning Maier
- Cut-Set Bound for Generalized Networks with Deterministic Channels
- The Error Exponent of Zero-Rate Multiterminal Hypothesis Testing for Sources with Common Information
- Rate Distortion for Source Coding with Markov Side Information At the Decoder
- Encoding of Markov Sources with Partial Memoryless Side Information At the Decoder
W-2-E: Information Theoretic Security II
Room: E
Chair: Mitsugu Iwamoto
- Information Theoretical Evaluation of the Bucketing Technique to Mitigate Timing Attacks
- Password-protected Secret-sharing Schemes Without Random Oracles
- Gaussian Fuzzy Commitment
- Cheating on a Visual Secret Sharing Scheme Under a Realistic Scenario
W-2-A: Communication Systems
Room: A
Chair: Branko Ristic
- Design Factors for Dual-Hop AF Systems with Partial Relay Selection
- New Relay-Based Transmission Protocols for Wireless Distributed Storage Systems
- Channel Capacity and Achievable Rates of Peak Power Limited AWGNC, and Their Applications to Adaptive Modulation and Coding
- Study on BER Performance of SS System Using a Huffman Sequence Against CW Jamming Over AWGN Channels
13:50 - 15:30
W-3-C: Constrained Codes & Flash Codes
Room: Clarendon Auditorium
Chair: Akiko Manada
- Position Modulation Code for Non-Binary Write-Once Memories
- A Flash Code Utilizing Dynamic Segment Allocation
- Write-Once Memory Codes for Low-Complexity Decoding of Asymmetric Multiple Access Channel
- An Improvement of Performance to Layered Index-less Indexed Flash Codes
- Code Rate of Constrained Code for Phase Change Memories
W-3-D: MIMO Relay Channel
Room: D
Chair: Jinhong Yuan
- Degrees of Freedom of the MIMO 3-Way Channel
- Channel Estimation for Frequency-Selective Two-Way MIMO Relay Systems
- Transceiver Optimization for MIMO Multi-Relay Systems Using Projected Gradient Approach
- Joint Source and Relay Matrices Optimization for Interference MIMO Relay Systems
- Improved Rates and Coding for the MIMO Two-Way Relay Channel
W-3-E: Sequences I
Room: E
Chair: Takayasu Kaida
- A Novel Class of Binary Zero-Correlation Zone Sequence Sets by Using a Cyclic Difference Set
- A Novel Zero-Correlation Zone Sequence Set Having a Low-Peak Factor and a Flat Power Spectrum
- Relations Between Evaluations of NIST Tests and Lyapunov Exponents of Sequences Generated by the Logistic Map Over Integers
- Some Properties of the Maximum Period on the Logistic Map Over $Z_{2^n}$
- Parameterization of High-Dimensional Perfect Sequences Over a Composition Algebra Over $\mathbb{R}$
15:50 - 17:10
W-4-C: Coding and Signal Processing for Two Dimensional Magnetic Recording
Organized Session
Room: Clarendon AuditoriumOrganizer: Bane Vasić
Chair: Shayan Garani
- Estimation of Areal Density Gains of TDMR System with 2D Detector
- Two-Dimensional Noise-Predictive Maximum Likelihood Method for Magnetic Recording Channels
- A review study on the benefits of multi-reader heads in SMR and TDMR systems
W-4-D: Fundamental Limits and Coding for Networks
Organized Session
Room: DOrganizer & Chair: Terence H. Chan
- On Throughput-delay Tradeoff of Network Coding for Wireless Communications
- Information inequalities and finite groups: an overview
- Combination Network Coding: Alphabet Size and Zigzag Decoding
- Graph-based Code Construction for Data Storage
W-4-E: Sequences II
Room: E
Chair: Shinya Matsufuji
- Initial Values Entering Into an Element Zero with Period One for Logistic Maps Over Integers
- A Study of an Automorphism on the Logistic Maps Over Prime Fields
- An Efficient Generation of Geometric Sequences Defined with Trace and Legendre Symbol
- On Generalized Constant-Weight Codes Over GF(q) From a Cyclic Difference Set and Their Properties
back to ISITA2014