default search action
ISITA 2010: Taichung, Taiwan
- Proceedings of the International Symposium on Information Theory and its Applications, ISITA 2010, 17-20 October 2010, Taichung, Taiwan. IEEE 2010, ISBN 978-1-4244-6017-5
LDPC Codes I
- Rich Echard, Shih-Chun Chang:
Good high-rate pi-rotation LDPC codes based on novel puncturing techniques. 1-6 - Chung-Li Wang, Shu Lin:
Low-density parity-check accumulate codes. 7-12 - Cha-Hao Chung, Yeong-Luh Ueng, Ming-Che Lu, Mao-Chao Lin:
Adaptive quantization for low-density-parity-check decoders. 13-18 - Masato Tajima, Koji Okino, Takashi Miyagoshi:
Error-trellis state complexity of LDPC convolutional codes based on circulant matrices. 19-24
MIMO I
- Hsiao-feng Lu:
Approximately universal MIMO diversity embedded codes. 25-30 - Kenji Nakayama, Yasunori Iwanami, Eiji Okamoto:
MIMO MFSK receivers using FDE and MLD on quasi-static frequency selective fading channels. 31-36 - Vesna Gardasevic, Ralf R. Müller, Daniel J. Ryan, Lars Lundheim, Geir E. Øien:
Lattice-reduction aided HNN for vector precoding. 37-41 - Roope Vehkalahti, Camilla Hollanti, Jyrki T. Lahtonen:
A family of cyclic division algebra based fast-decodable 4×2 space-time block codes. 42-47
Cryptography I
- Vladimir B. Balakirsky, A. J. Han Vinck:
Direct biometric verification schemes with Gaussian data. 48-53 - Tanya Ignatenko, Frans M. J. Willems:
Fundamental limits for biometric identification with a database containing protected templates. 54-59 - Sami Zhioua:
A geometric view of mutual information: Application to anonymity protocols. 60-65 - Chigusa Kawashima, I Gusti Bagus Baskara Nugraha, Hiroyoshi Morita, Todorka Alexandrova:
Realizing and evaluating mutual anonymity in P2P networks. 66-71
Source Coding I
- Takahiro Ota, Hiroyoshi Morita:
On the adaptive antidictionary code using minimal forbidden words with constant lengths. 72-77 - Mikihiko Nishiara:
On coding for source with infinitesimal time slots. 78-81 - Danny Dubé:
Using synchronization bits to boost compression by substring enumeration. 82-87 - Shohei Iwata, Toshihiro Hattori, Motohiko Isaka:
On coding for nonbinary sources with side information at the decoder. 88-93
Stochastic Processes/Pattern Recognition
- Juan Miguel Medina, Bruno Cernuschi-Frías:
Stationary sequences and stable sampling. 94-99 - Christopher J. Quinn, Todd P. Coleman, Negar Kiyavash:
Approximating discrete probability distributions with causal dependence trees. 100-105 - Makoto Suzuki, Naohide Yamagishi, Yi-Ching Tsai, Takashi Ishida, Masayuki Goto:
English and Taiwanese text categorization using N-gram based on Vector Space Model. 106-111 - Masanori Kawakita, Yoko Oie, Jun'ichi Takeuchi:
A note on model selection for small sample regression. 112-117
Error-Control Coding I
- Torleiv Kløve, Somaye Yari:
Proper self-complementary codes. 118-122 - Joan-Josep Climent, Francisco J. García, Verónica Requena:
Computing the degree of a Boolean function from its support. 123-128 - Chien-Yi Wang, I-Wei Lai, Tzi-Dar Chiueh, Gerd Ascheid, Heinrich Meyr:
BER analysis for MIMO BICM-ID assuming finite precision of extrinsic LLR. 129-134 - Toshihisa Nishijima, Kin-ichiroh Tokiwa:
Upper bounds on the average probability of undetected error for the ensembles of both product and concatenated codes. 135-138 - Takashi Hayashi, Koji Ishii, Shigeaki Ogose:
Practical design and its evaluations for nested transmit diversity. 139-144
Cooperative Communications I
- Ernest Kurniawan, Sumei Sun, Kai Yen, Kai Fong Ernest Chong:
Improving error performance of Joint Channel and Network Coding in Multiple Access Relay Channel. 145-150 - Valentin Savin:
Split-extended LDPC codes for coded cooperation. 151-156 - Wei Yang, Lihua Li, Gang Wu, Haifeng Wang:
Joint relay selection and link adaptation for distributed beamforming in regenerative cooperative networks. 157-162 - Jaeyoung Lee, Sung-Il Kim, Jun Heo:
Performance analysis and optimal power allocation for hybrid incremental relaying. 163-168 - Shi-Yong Lee, Chia-Chun Chang, Min-Kuan Chang:
Modeling of DF behavior and SNR evaluation for multinode cooperation system with adaptive modulation under different diversity combining strategies. 169-173
Cryptography II
- Jean-Claude Belfiore, Frédérique E. Oggier:
Secrecy gain: A wiretap lattice code design. 174-178 - David Elkouss, Jesús Martínez-Mateo, Vicente Martín:
Secure rate-adaptive reconciliation. 179-184 - Hadi Ahmadi, Reihaneh Safavi-Naini:
Secret key establishment over a pair of independent broadcast channels. 185-190 - Hadi Ahmadi, Reihaneh Safavi-Naini:
New results on Secret Key Establishment over a pair of broadcast channels. 191-196 - Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Secret key rate region of multiple access channel model. 197-202
Signal Processing for Communications
- Toshiyuki Kikkawa, Yukitoshi Sanada:
Wireless relay networks using multiple frequency bands. 203-208 - Aya Inami, Chika Sugimoto, Ryuji Kohno:
Performance analysis of equalization and interference cancellation by adaptive digital filter for UWB-IR system inside a vehicle. 209-214 - Hiroshi Takayama, Chika Sugimoto, Ryuji Kohno:
A study on estimating implanted devices using image information and ranging system using UWB radio. 215-219 - Yuuki Matsuura, Koji Ishii, Shigeaki Ogose:
A novel positioning estimation method with the correlation between sensors' data. 220-224 - Koji Enda, Ryuji Kohno:
Iterative algorithm using particle filter for positioning in NLOS environment. 225-230
Video/Image Coding
- Haruhiko Kaneko:
Probabilistic search of nonbinary LDPC codes for distributed video coding. 231-236 - Chih-Chung Tsui, Yu-Ming Lee, Yinyi Lin:
Selective multiple reference frames motion estimation for H.264/AVC video coding. 237-242 - Malavika Bhaskaranand, Jerry D. Gibson:
Spectral entropy-based bit allocation. 243-248 - Tsung-Han Tsai, Chang-Ming Lee, Wen-Nung Lie:
Practical estimation of adaptive correlation noise model for Distributed Video Coding. 249-254 - Hsin M. Shieh, Jin-Gui Li, Yu-Ching Hsu, Meng-Chi Ye, Dong G. Lee:
Iterative prior-knowledge-based image reconstruction algorithms. 255-260
Error-Control Coding II
- John B. Anderson, Adnan Prlja:
Turbo equalization and an M-BCJR algorithm for strongly narrowband intersymbol interference. 261-266 - Christian Senger, Vladimir Sidorenko, Steffen Schober, Martin Bossert, Victor V. Zyablov:
Adaptive single-trial error/erasure decoding of binary codes. 267-272 - Chong-Dao Lee, Yaotsu Chang, Trieu-Kien Truong, Yan-Haw Chen:
More on general error locator polynomials for a class of binary cyclic codes. 273-277 - Jen-Chun Chang, I-te Tsai, Hsin-Lung Wu:
Efficient decoding algorithm for constant composition codes. 278-281
OFDM I
- Xiaoying Shao, Cornelis H. Slump:
A robust cross coding scheme for OFDM systems. 282-287 - Daisuke Shimbo, Ikuo Oka:
A modulation classification using amplitude moments in OFDM systems. 288-293 - Yutaro Nakagawa, Yukitoshi Sanada:
Time domain feedback equalizer for fast fading channel in OFDM with scattered pilot. 294-297 - Shi-Yong Lee, Chia-Chun Chang, Min-Kuan Chang:
Novel lifetime-aware bit and power allocation in OFDM systems. 298-302
Digital Watermarking
- Harumi Murata, Akio Ogihara, Motoi Iwata, Akira Shiozaki:
An audio watermarking method by using automatic music transcription information. 303-308 - Motoi Iwata, Tomoki Hori, Akira Shiozaki, Akio Ogihara:
Digital watermarking method for tamper detection and recovery of JPEG images. 309-314 - Shouta Sakaino, Hiromu Koda:
A scheme of digital watermarking for 3-D models using correlation method in polar coordinate system. 315-319 - Tadakazu Sakakura, Akira Hayashi:
A simple detection scheme of LSB steganography based on statistics of image difference signal. 320-325 - Tetsushi Masuno, Toru Fujiwara, Takuya Kusaka:
A New method to reduce the probability of detection errors for a digital watermark using complementary decoding algorithms and minimum weight codewords of linear code. 326-331
Data Networks
- Jan-Ray Liao, Pin-Hsuan Wu:
Longest queue first in round-robin matching for input-queued switches. 332-336 - Shin-Guang Chen:
Optimal network planning in robust two site's communication. 337-342 - Siva K. Gorantla, Sachin Kadloor, Todd P. Coleman, Negar Kiyavash, Ira S. Moskowitz, Myong H. Kang:
Directed information and the NRL Network Pump. 343-348 - Pedro C. Pinto, Moe Z. Win:
Continuum percolation in the intrinsically secure communications graph. 349-354
Cooperative MIMO
- Mingjun Dai, Ping Hu, Chi Wan Sung:
Diamond relay network under Rayleigh fading: On-off power control and outage-capacity bound. 355-360 - Kyoung-Young Song, Jaehong Kim, Jong-Seon No, Habong Chung:
Diversity analysis of the best relay selection for soft-decision-and-forward cooperative network. 361-364 - Pham Thanh Hiep, Ryuji Kohno:
Analysis performance of decode-and-forward scheme in distributed MIMO repeater system. 365-370 - Youssef Nasser, Jean-François Hélard:
Efficient space-time block codes for cooperative MIMO communications. 371-376 - Zoran Utkovski, Yao Cheng, Jürgen Lindner:
A non-coherent AF scheme for two-way wireless relay networks based on packings in Grassmann manifolds. 377-382
LDPC Codes II
- Qin Huang, Qiuju Diao, Shu Lin:
Circulant decomposition: Cyclic, quasi-cyclic and LDPC codes. 383-388 - Takakazu Sakai, Koji Shibata:
Importance sampling for LDPC codes based on optimal simulation probability density function. 389-393 - Gou Hosoya, Hideki Yagi, Manabu Kobayashi:
An iterative decoding algorithm for rate-compatible punctured low-density parity-check codes of high coding rates. 394-399 - Matteo Gorgoglione, Valentin Savin, David Declercq:
Optimized puncturing distributions for irregular non-binary LDPC codes. 400-405
Multiuser Information Theory I
- Richard E. Blahut, Soumya Jana:
Körner-Marton theorem for binary modulo-two sum problem from canonical equations. 406-409 - Rafael F. Wyrembelski, Igor Bjelakovic, Holger Boche:
On arbitrarily varying bidirectional broadcast channels with constraints on input and states. 410-415 - Moritz Wiese, Holger Boche, Igor Bjelakovic:
The compound MAC with common message and partial channel state information. 416-421 - Chao Wang, Ming Xiao, Mikael Skoglund:
Diversity-multiplexing tradeoff analysis of multi-source multi-relay coded networks. 422-427
Cryptography III
- Kunikatsu Kobayashi, Kohtaro Tadaki, Masao Kasahara, Shigeo Tsujii:
A knapsack cryptosystem based on multiple knapsacks. 428-432 - Yasuyuki Murakami:
A new construction method of knapsack PKC using linear transformation and Chinese remainder theorem. 433-436 - Akira Hayashi:
On the critical density associated with the matrix type knapsack cryptosystem. 437-440 - Masahito Gotaishi:
Improvement of the Low Rank Attack. 441-445
Shannon Theory I
- Ambedkar Dukkipati:
On Kolmogorov-Nagumo averages and nonextensive entropy. 446-451 - Akari Sato, Hirosuke Yamamoto:
Error exponents of discrete memoryless channels and AWGN channels with noisy feedback. 452-457 - Behrooz Makki, Thomas Eriksson:
Data transmission in the presence of noisy channel state feedback and outage probability constraint. 458-463 - Sadaf Salehkalaibar, Mohammad Reza Aref:
On the capacity region of a class of Z Channels with cooperation. 464-468
Constrained Coding
- Kees A. Schouhamer Immink:
High-rate maximum runlength constrained coding schemes using base conversion. 469-472 - Ken-ichi Iwata, Takuya Koyama:
A prefix-free coding for finite-state noiseless channels with small coding delay. 473-477 - Jan Geldmacher, Jürgen Götze:
Syndrome former trellis construction for punctured convolutional codes. 478-483 - Shih-Kai Lee, Hsin-Yi Chen, Mao-Chao Lin, Tien-Hui Chen:
On soft iterative decoding for ternary recording systems with RLL constraints. 484-489
LDPC Codes III
- Raúl Martínez-Noriega, Brian M. Kurkoski, Kazuhiko Yamaguchi, Kingo Kobayashi:
Recovering synchronization with iterative decoders: LDPC codes. 490-495 - Tsung-Che Wu, Yao-Wen Hu, Chang-Ming Lee:
Optimization of memory utilization for partially parallel QC-LDPC decoder. 496-500 - Chao-Yu Chen, Qin Huang, Chi-Chao Chao, Shu Lin:
A message-passing decoding algorithm for q-ary LDPC codes with low-complexity. 501-506 - Chi-Jen Wu, Chung-Hsuan Wang, Chi-Chao Chao:
A new construction of irregular LDPC convolutional codes with cycle removal. 507-512 - Masanori Hirotomo, Masakatu Morii:
Detailed evaluation of error floors of LDPC codes using the probabilistic algorithm. 513-518
MIMO II
- Keigo Takeuchi, Ralf R. Müller, Mikko Vehkaperä, Toshiyuki Tanaka:
An achievable rate of large block-fading MIMO systems with no CSI via successive decoding. 519-524 - A. Taufiq Asyhari, Albert Guillen i Fabregas:
MIMO block-fading channels with mismatched CSIR. 525-530 - Shuo Shen, Matthew R. McKay, Ross D. Murch:
MIMO systems with mutual coupling: How many antennas to pack into fixed-length arrays? 531-536 - Roope Vehkalahti, Camilla Hollanti, Jyrki T. Lahtonen, Hsiao-feng Lu:
Some simple observations on MISO codes. 537-541 - Paul de Kerret, Michael Joham, Wolfgang Utschick, Rudolf Mathar:
MIMO broadcast channel rate region with linear precoding at high SNR without full multiplexing. 542-547
Cryptography IV
- Jeich Mar, Yow-Cheng Yeh, I-Fan Hsiao:
An ANFIS-IDS against deauthentication DOS attacks for a WLAN. 548-553 - Hirotaka Tazawa, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
A user authenticaion scheme using multiple passphrases and its arrangement. 554-559 - Kai Zhao, Yuichi Kaji:
Anti-phishing mutual authentication using the visual secret sharing scheme. 560-565 - Nai-Wei Lo, Kuo-Hui Yeh:
De-synchronization attack on RFID authentication protocols. 566-570 - Yasunori Onda, SeongHan Shin, Kazukuni Kobara, Hideki Imai:
How to distinguish on-line dictionary attacks and password mis-typing in two-factor authentication. 571-576
Source Coding II
- Shigeaki Kuzuoka:
Relations between universal FV and FF source codes. 577-582 - Hiroshi Fujisaki:
On embeddings of shifts of finite type into the golden-mean-Dyck shift. 583-588 - Grégory Demay, Vishwambhar Rathi, Lars K. Rasmussen:
Optimality of LDGM-LDPC compound codes for lossy compression of binary erasure source. 589-594 - Mitsuharu Arimura, Ken-ichi Iwata:
The minimum achievable redundancy rate of fixed-to-fixed length source codes for general sources. 595-600 - Jyun-Jie Wang, Houshou Chen, Zhin-Han Dai, Hsinying Liang:
Joint JPEG-block coding with expurgating trellis for wireless robust image transmission. 601-605
Signal Processing
- Krzysztof Wawryn, Robert T. Wirski, Bogdan Strzeszewski:
Implementation of finite impulse response systems using rotation structures. 606-610 - Nanako Ubayama, Toma Miyata, Naoyuki Aikawa:
A design method for IIR digital filters with variable stopband using semidefinite programming. 611-615 - Robert T. Wirski:
Synthesis of orthogonal Roesser model for two-dimensional FIR filters. 616-620 - Yuichi Kida, Takuro Kida:
The optimum approximate reconstruction of a signal from the discrete sample values of the prescribed multiple waves. 621-626 - Yuichi Kida, Takuro Kida:
Development of a new numerical solution of inhomogeneous linear partial differential equations with many independent variables. 627-632
Coding Performance
- Matthias Rüngeler, Birgit Schotsch, Peter Vary:
Improved decoding of Shannon-Kotel'nikov mappings. 633-638 - Yu Morishima, Ikuo Oka, Shingo Ata:
Pulse interference mitigation techniques for QPSK and QAM using Viterbi decoding. 639-643 - Shinsuke Nagata, Kaiji Mukumoto, Tadahiro Wada, Koji Ishibashi:
Performance evaluation of Go-Back-i-symbol ARQ scheme applicable to meteor burst communications. 644-649 - Xiao-Hong Peng:
Bounds on end-to-end performance of networks employing erasure control coding. 650-655
OFDM II
- Kenta Eguchi, Haruki Higuchi, Yukitoshi Sanada:
User/sampling point selection algorithm in multiuser MIMO-OFDM with fractional sampling. 656-661 - Eisuke Sakai, Haruki Nishimura, Mamiko Inamori, Yukitoshi Sanada, Mohammad Ghavami:
Low-complexity sampling point selection in OFDM receiver with fractional sampling. 662-667 - Chia-Yao Chen, Wen-Kang Jia, Yaw-Chung Chen:
A novel CRC based error correction scheme in OFDM/OFDMA wireless networks. 668-672 - Rih-Lung Chung, Chin-Wen Chang, Jeng-Kuang Hwang:
Bidirectional decision feedback equalization for mobile MIMO-OFDM systems. 673-677
Cryptography V
- Hiroki Koga:
Two generalizations of a coding theorem for a (2, 2)-threshold scheme with a cheater. 678-683 - Ulrich Speidel, T. Aaron Gulliver:
A secure authentication system based on variable-length codes. 684-689 - Miodrag J. Mihaljevic, Hajime Watanabe, Hideki Imai:
A low complexity authentication protocol based on pseudorandomness, randomness and homophonic coding. 690-695 - Josep Rifà, Lorena Ronquillo:
Product perfect Z2 Z4-linear codes in steganography. 696-701
Multiuser Information Theory II
- Simon Görtzen, Anke Schmeink:
A theoretical framework for capacity-achieving multi-user waterfilling in OFDMA. 702-707 - Moritz Wiese, Frederic Knabe, Johannes Georg Klotz, Aydin Sezgin:
The performance of QPSK in low-SNR interference channels. 708-713 - Yasutada Oohama:
On the rate distortion region of Gaussian multiterminal source coding. 714-719 - S. M. Hossein Tabatabaei Yazdi, Mohammad Reza Aref:
The capacity of a class of linear deterministic relay networks. 720-725 - Yifan Chen, Chau Yuen, Yong Huat Chew:
Double-directional information azimuth spectrum and relay network tomography for a decentralized wireless relay network. 726-731
Performance Evaluation
- Shin'ichi Koike, Seiichi Noda:
O&7PSK modulation and its bit error rate performance. 732-737 - Yusuke Kozawa, Hiromasa Habuchi:
Theoretical analysis of M-CSK/CDMA system in optical wireless channel. 738-742 - Bayarpurev Mongol, Takaya Yamazato, Masaaki Katayama:
Inband and outband spectrum analysis of the BFDM and BFDM/OQAM signals with truncated Gaussian pulses. 743-746 - Yuuki Nishino, Makoto Tanahashi, Hideki Ochiai:
A new bit-labeling for trellis-shaped PSK with improved PAPR reduction capability. 747-751 - Jo Lynn Tan, Ahmad Zuri bin Sha'ameri, Yen Mei Chee:
Signal analysis and classification of digital communication signal using higher order time-frequency analysis techniques. 752-756
Decoding
- Chen-Yi Wang, Shin-Lin Shieh, Po-Ning Chen, Yunghsiang S. Han:
Path deletions for finite stack-size sequential-type decoding algorithms. 757-761 - Hideki Yoshikawa, Yoshitake Kawadai:
Theoretical analysis of bit error probability for 4-state recursive systematic convolutional code with Max-Log MAP decoding. 762-766 - Hideki Yoshikawa:
Theoretical analysis of bit error probability for Log-MAP decoding. 767-771 - Ryuhei Yokoyama, Toru Fujiwara, Takuya Kusaka:
Adaptive recursive MLD using ordered statistics for low rate codes. 772-777
Cryptography VI
- Dai Watanabe, Toru Owada, Kazuto Okamoto, Yasutaka Igarashi, Toshinobu Kaneko:
Update on Enocoro stream cipher. 778-783 - Yasutaka Igarashi, Toshinobu Kaneko:
On the truncated path search for the maximum differential characteristic probability on a generalized Feistel-type block cipher. 784-788 - Miodrag J. Mihaljevic, Hideki Imai:
A Security evaluation of certain stream ciphers which involve randomness and coding. 789-794 - Naoto Yanai, Eikoh Chida, Masahiro Mambo:
A structured aggregate signature scheme. 795-800
Shannon Theory II
- Tsutomu Kawabata:
A revisit to the Muroga method of computing channel capacity. 801-806 - Sergio Lembo, Chia-Hao Yu, Olav Tirkkonen:
Block fading channels with limited channel state information. 807-811 - Meik Dorpinghaus, Heinrich Meyr, Gerd Ascheid:
The achievable rate of stationary rayleigh flat-fading channels with IID input symbols. 812-817 - Reza Khosravi-Farsani, Bahareh Akhbari, Mohammad Reza Aref:
The capacity region of a class of Relay-Broadcast Channels and relay channels with three parallel unmatched subchannels. 818-823
Sequences
- Shunsuke Araki, Ken'ichi Kakizaki, Takeru Miyazaki, Satoshi Uehara:
Suitable representation of values on the logistic map with finite precision. 824-829 - Takeru Miyazaki, Shunsuke Araki, Satoshi Uehara:
A study on differences in properties of the logistic maps over integers affected by rounding. 830-835 - Ying Li, Yi-Chan Kao, Mei-Wen Chang:
Autocorrelation functions and double difference sequences. 836-841 - Takayasu Kaida, Junru Zheng:
Hamming distance correlation for q-ary constant weight codes. 842-845
Error-Control Coding III
- Junru Zheng, Takayasu Kaida:
An algorithm for new lower bound of minimum distance by DFT for cyclic codes. 846-849 - Hidetoshi Saito, Ryuji Kohno:
Maximum a posteriori estimation using ARCH models and burst error correcting array codes for burst-erasure recording channels. 850-855 - Julie Neckebroek, Marc Moeneclaey, Enrico Magli:
Comparison of Reed-Solomon and Raptor codes for the protection of video on-demand on the erasure channel. 856-860 - Mathieu Cunche, Valentin Savin, Vincent Roca:
Analysis of Quasi-Cyclic LDPC codes under ML decoding over the erasure channel. 861-866 - Hiroshi Kamabe:
Floating codes with good average performance. 867-872
MIMO III
- Dan Zhang, I-Wei Lai, Konstantinos Nikitopoulos, Gerd Ascheid:
Informed message update for iterative MIMO demapping and turbo decoding. 873-878 - Redha M. Radaydeh, Mohamed-Slim Alouini:
Imperfect generalized transmit beamforming with co-channel interference cancelation. 879-884 - Ronghong Mo, Yong Huat Chew, Tony Q. S. Quek, Chengzhi Chen:
Distributed precoding design for MIMO interference channels. 885-889 - Dong-Min Shin, Kyeongcheol Yang:
Analysis of diversity-multiplexing tradeoff bounds of ZF-SIC systems with error propagation. 890-894 - Yabo Li:
Digital-controlled analog beamforming for indoor MIMO multipath channels. 895-899
Cryptography VII
- Kohtaro Tadaki, Shigeo Tsujii:
Two-sided multiplications are reduced to one-sided multiplication in linear piece in hand matrix methods. 900-904 - Kohtaro Tadaki, Shigeo Tsujii:
Clarifying the specification of linear Piece In Hand matrix method. 905-910 - Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
A generic weakness of the k-normal Boolean functions exposed to dedicated algebraic attack. 911-916 - Masakazu Yoshida, Takayuki Miyadera, Hideki Imai:
On the security of the quantum key distribution using the Mean King Problem. 917-912 - Kenta Kasai, Ryutaroh Matsumoto, Kohichi Sakaniwa:
Information reconciliation for QKD with rate-compatible non-binary LDPC codes. 922-927
Cognitive and Software Radio
- Mohamed Saber, Yutaka Jitsumatsu, Muhammad Tahir Abbas Khan:
Design and implementation of low power digital phase-locked loop. 928-933 - Youngmin Jeong, Tony Q. S. Quek, Hyundong Shin:
Downlink beamforming optimization for cognitive underlay networks. 934-939 - Kevin Chang, Yu-Chieh Huang, Bouchra Senadji:
Analysis of primary user duty cycle impact on spectrum sensing performance. 940-945 - Meng-Lin Ku, Li-Chun Wang, Yu Ted Su:
Optimal multiuser beamforming and power allocation for hierarchical cognitive radio systems. 946-951 - Hamid G. Bafghi, Somayeh Salimi, Babak Seyfe, Mohammad Reza Aref:
Cognitive interference channel with two confidential messages. 952-956
Cooperative Communications II
- Lu Lu, Fan Sun, Ming Xiao, Lars K. Rasmussen:
Relay-aided multi-cell broadcasting with random network coding. 957-962 - Kuang-Yu Sung, Yao-Win Peter Hong, Chi-Chao Chao:
Subcarrier allocation and partner selection algorithms for cooperative multicarrier systems. 963-968 - Li-Chun Wang, Wei-Chi Li:
Outage performance analysis for fractional frequency reused TDD-OFDMA systems with asymmetric traffics. 969-974 - Jooha Bek, Jaeyoung Lee, Jun Heo:
Outage analysis and optimal power allocation for network-coding-based hybrid AF and DF. 975-980 - Rih-Lung Chung, Shu-Hao Chang:
Cooperative MMSE OFDM receiver for half-duplex and multiple-relays system. 981-985
RS/AG Codes
- Alexander Zeh, Wenhui Li:
Decoding Reed-Solomon codes up to the Sudan radius with the Euclidean algorithm. 986-990 - Chung-Chin Lu, Chih-Yen Yang, Ti-Chung Lee:
Syndrome calculation for the decoding of algebraic-geometry codes on plane Garcia-Stichtenoth curves. 991-994 - Jian-Jia Weng, Yu-Min Hsieh, Hsin-Chuan Kuo, Chung-Hsuan Wang, Tsung-Cheng Wu, Yi-Sheng Su:
A New reliability updating scheme for iterative decoding of Reed-Solomon codes with refined initialization. 995-1000 - Hajime Matsui:
Unified system of encoding and decoding erasures and errors for algebraic geometry codes. 1001-1006
Multiuser Information Theory III
- Tobias Renk, Holger Jäkel, Friedrich K. Jondral, Deniz Gündüz, Andrea J. Goldsmith:
Outage capacity of bursty amplify-and-forward with incremental relaying. 1007-1011 - Zoran Utkovski, Aydin Sezgin, Jürgen Lindner:
Non-coherent two-way relaying: Rate bounds for the high SNR regime. 1012-1017 - Bahareh Akhbari, Mahtab Mirmohseni, Mohammad Reza Aref:
Achievable rate regions for interference channel with two relays. 1018-1023 - Amir Sonee, Somayeh Salimi, Mahmoud Salmasizadeh:
Generalized multiple-access relay channel with confidential messages. 1024-1029
Quantum Information
- Kenjiro Yanagi:
Generalized Wigner-Yanase-Dyson skew information and uncertainty relation. 1030-1034 - Masaki Ota, Hideyuki Kumazawa, Keisuke Shiromoto, Tsuyoshi Sasaki Usuda:
Formula of channel matrix for coded quantum signals by classical linear codes over Zm. 1035-1040 - Kao-Yueh Kuo, Chung-Chin Lu:
A further study on the encoding complexity of quantum stabilizer codes. 1041-1044 - Yoshio Takamura, Shogo Usami, Tsuyoshi Sasaki Usuda:
On attainment of the capacity of broadband quantum channel by wavelength division multiplexing. 1045-1049
OFDM PAPR
- Hsinying Liang, Zhe Lin, Houshou Chen, Cheng-Ying Yang:
A modified genetic algorithm PTS technique with error correction for PAPR reduction in OFDM systems. 1050-1053 - Kee-Hoon Kim, Hyun-Bae Jeon, Jong-Seon No, Dong-Joon Shin:
A new selected mapping scheme for PAPR reduction in OFDM systems. 1054-1057 - Holger Boche, Brendan Farrell:
PAPR for OFDM and the proportion of information bearing signals for tone reservation. 1058-1063
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.