Tomohiko Uyematsu

Orcid: 0000-0002-9876-6789

According to our database1, Tomohiko Uyematsu authored at least 88 papers between 1986 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Equivalences among Some Information Measures for Individual Sequences and Their Applications for Fixed-Length Coding Problems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

2022
An Equivalent Expression for the Wyner-Ziv Source Coding Problem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

2020
Coding Theorems for Asynchronous Slepian-Wolf Coding Systems.
IEEE Trans. Inf. Theory, 2020

2019
Achievable Rate Regions for Source Coding with Delayed Partial Side Information.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

On the Distance Between the Rumor Source and Its Optimal Estimate in a Regular Tree.
Proceedings of the IEEE International Symposium on Information Theory, 2019

2018
Joint Channel Coding and Intrinsic Randomness.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Non-Asymptotic Bounds and a General Formula for the Rate-Distortion Region of the Successive Refinement Problem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

An Information-Theoretical Analysis of the Minimum Cost to Erase Information.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Error Exponents of Joint Channel Coding and Intrinsic Randomness for Memoryless Channels.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

2017
Second-Order Intrinsic Randomness for Correlated Non-Mixed and Mixed Sources.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Achievable Rate Regions of Cache-Aided Broadcast Networks for Delivering Content with a Multilayer Structure.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

On the minimum worst-case cost and the minimum average cost to erase information.
Proceedings of the 2017 IEEE Information Theory Workshop, 2017

2016
New Non-Asymptotic Bounds on Numbers of Codewords for the Fixed-Length Lossy Compression.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Caching-aided multicast for partial information.
Proceedings of the IEEE International Symposium on Information Theory, 2016

2015
Relative Generalized Rank Weight of Linear Codes and Its Applications to Network Coding.
IEEE Trans. Inf. Theory, 2015

Achievable rate regions for asynchronous Slepian-Wolf coding systems.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

Source coding with side information at the decoder revisited.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Key rate of the B92 quantum key distribution protocol with finite qubits.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Non-asymptotic bounds for fixed-length lossy compression.
Proceedings of the IEEE International Symposium on Information Theory, 2015

2014
Optimal axis compensation in quantum key distribution protocols over unital channels.
Theor. Comput. Sci., 2014

On the Wyner-Ziv Source Coding Problem with Unknown Delay.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Revisiting the rate-distortion theory using smooth max Rényi divergence.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

Maximum multicast throughput by network coding on undirected hypernetworks.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

Revisiting the Slepian-Wolf coding problem for general sources: A direct approach.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Rate-distortion functions for source coding when side information with unknown delay may be present.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

2013
Random-Coding Exponential Error Bounds for Channels with Action-Dependent States.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

A new unified method for intrinsic randomness problems of general sources.
Proceedings of the 2013 IEEE Information Theory Workshop, 2013

A general formula for capacity of channels with action-dependent states.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

2012
Parametric Forms of the Achievable Rate Region for Source Coding with a Helper.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Secret Sharing Schemes Based on Linear Codes Can Be Precisely Characterized by the Relative Generalized Hamming Weight.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

A general formula of rate-distortion functions for source coding with side information at many decoders.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Explicit construction of universal strongly secure network coding via MRD codes.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

New parameters of linear codes expressing security performance of universal secure network coding.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
A Universal Affine Code for Symmetric Channels.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

A General Formula of the Capacity Region for Multiple-Access Channels with Deterministic Feedback.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

A Novel Realization of Threshold Schemes over Binary Field Extensions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Strongly-secure secret sharing based on linear codes can be characterized by generalized hamming weight.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

2010
Strongly Secure Privacy Amplification Cannot Be Obtained by Encoder of Slepian-Wolf Code.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

A New Unified Method for Fixed-Length Source Coding Problems of General Sources.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Vulnerability of MRD-Code-based Universal Secure Network Coding against Stronger Eavesdroppers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Universal Slepian-Wolf Source Codes Using Low-Density Parity-Check Matrices.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Lower Bounds on the Maximum Energy Benefit of Network Coding for Wireless Multiple Unicast.
EURASIP J. Wirel. Commun. Netw., 2010

Universal Coding of Ergodic Sources for Multiple Decoders with Side Information
CoRR, 2010

Relating source coding and resolvability: A direct approach.
Proceedings of the IEEE International Symposium on Information Theory, 2010

Secure key rate of the BB84 protocol using finite sample bits.
Proceedings of the IEEE International Symposium on Information Theory, 2010

Universal source coding for multiple decoders with side information.
Proceedings of the IEEE International Symposium on Information Theory, 2010

2009
Universal Source Coding OverGeneralized Complementary Delivery Networks.
IEEE Trans. Inf. Theory, 2009

Foreword.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Decodability of Network Coding with Time-Varying Delay and No Buffering.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Secret Key Agreement by Soft-Decision of Signals in Gaussian Maurer's Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Strongly secure privacy amplification cannot be obtained by encoder of Slepian-Wolf code.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Closed forms of the achievable rate region for Wyner's source coding systems.
Proceedings of the IEEE International Symposium on Information Theory, 2009

On the energy benefit of network coding for wireless multiple unicast.
Proceedings of the IEEE International Symposium on Information Theory, 2009

2008
Universal Multiterminal Source Coding Algorithms With Asymptotically Zero Feedback: Fixed Database Case.
IEEE Trans. Inf. Theory, 2008

Fixed-Slope Universal Lossy Coding for Individual Sequences and Nonstationary Sources.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Multiterminal source coding with complementary delivery
CoRR, 2008

Universal Coding for Lossless and Lossy Complementary Delivery Problems
CoRR, 2008

Universal coding theorem for relay channels.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Near ML detection using Dijkstra's algorithm with bounded list size over MIMO channels.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Secret key agreement by reliability information of signals in Gaussian Maurer's Model.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Universal coding for lossy complementary delivery problem.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

2007
Universal Lossy Coding for Individual Sequences Based on Complexity Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Universal Coding for Correlated Sources with Complementary Delivery.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Universal source coding over generalized complementary delivery networks
CoRR, 2007

Key rate of quantum key distribution with hashed two-way classical communication.
Proceedings of the IEEE International Symposium on Information Theory, 2007

2006
Primal-Dual Distance Bounds of Linear Codes With Application to Cryptography.
IEEE Trans. Inf. Theory, 2006

Asymptotical Optimality of Two Variations of Lempel-Ziv Codes for Sources with Countably Infinite Alphabet.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Relationship among Complexities of Individual Sequences over Countable Alphabet.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

2005
Low-density parity-check matrices for coding of correlated sources.
IEEE Trans. Inf. Theory, 2005

Network Design and Cost Optimization for Label Switched Multilayer Photonic IP Networks.
IEEE J. Sel. Areas Commun., 2005

Efficient Secret Sharing Schemes Based on Authorized Subsets.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

String matching-based universal source codes for source networks with asymptotically zero feedback.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

Noise tolerance of the BB84 protocol with random privacy amplification.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

2004
Weak variable-length Slepian-Wolf coding with linked encoders for mixed sources.
IEEE Trans. Inf. Theory, 2004

Maximum Mutual Information of Space-Time Block Codes with Symbolwise Decodability
CoRR, 2004

Two Methods for Decreasing the Computational Complexity of the MIMO ML Decoder
CoRR, 2004

Applicability of the sample path method of ergodic processes to individual sequences.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

2003
Two Algorithms for Random Number Generation Implemented by Using Arithmetic of Limited Precision.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Conditional Lempel-Ziv Complexity and Its Application to Source Coding Theorem with Side Information.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Foreword.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Low density parity check matrices for coding of multiple access networks.
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003

2001
An algebraic construction of codes for Slepian-Wolf source networks.
IEEE Trans. Inf. Theory, 2001

1999
Channel simulation by interval algorithm: A performance analysis of interval algorithm.
IEEE Trans. Inf. Theory, 1999

1997
A construction of codes with exponential error bounds on arbitrary discrete memoryless channels.
IEEE Trans. Inf. Theory, 1997

1995
Quantum communication with three coherent states.
IEEE Trans. Commun., 1995

Permutation Cipher Scheme Using Polynomials over a Field.
IEICE Trans. Inf. Syst., 1995

1994
Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext.
Proceedings of the Advances in Cryptology, 1994

1986
A hierarchical classification of signals and corresponding approximation method based on minimum norm criterion.
Proceedings of the IEEE International Conference on Acoustics, 1986


  Loading...