|
Search the dblp DataBase
Toru Fujiwara:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Tadao Kasami, Tsukasa Sugita, Toru Fujiwara
The Split Weight (wL, wR) Enumeration of Reed-Muller Codes for wL + wR < 2dmin. [Citation Graph (0, 0)][DBLP] AAECC, 1997, pp:197-211 [Conf]
- Yuansheng Tang, Tadao Kasami, Toru Fujiwara
An Optimality Testing Algorithm for a Decoded Codeword of Binary Block Codes and Its Computational Complexity. [Citation Graph (0, 0)][DBLP] AAECC, 1999, pp:201-210 [Conf]
- Yuichi Kaji, Toru Fujiwara, Tadao Kasami
Solving a Unification Problem under Constrained Substitutions Using Tree Automata. [Citation Graph (0, 0)][DBLP] FSTTCS, 1994, pp:276-287 [Conf]
- Kenji Hashimoto, Yasunori Ishihara, Toru Fujiwara
Schema update operations preserving the expressive power in XML databases. [Citation Graph (0, 0)][DBLP] ICDE Workshops, 2005, pp:1229- [Conf]
- Yasunori Ishihara, Shuichiro Ako, Toru Fujiwara
Security against Inference Attacks on Negative Information in Object-Oriented Databases. [Citation Graph (0, 0)][DBLP] ICICS, 2002, pp:49-60 [Conf]
- Yasunori Ishihara, Yumi Shimakawa, Toru Fujiwara
Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:145-157 [Conf]
- Maki Yoshida, Shigeo Mitsunari, Toru Fujiwara
A Timed-Release Key Management Scheme for Backward Recovery. [Citation Graph (0, 0)][DBLP] ICISC, 2005, pp:3-14 [Conf]
- Maki Yoshida, Toru Fujiwara
Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem. [Citation Graph (0, 0)][DBLP] IMA Int. Conf., 2001, pp:27-37 [Conf]
- Maki Yoshida, Takaaki Fujita, Toru Fujiwara
A New Optimum Detection Scheme for Additive Watermarks Embedded in Spatial Domain. [Citation Graph (0, 0)][DBLP] IIH-MSP, 2006, pp:101-104 [Conf]
- Maki Yoshida, Toru Fujiwara
On the Security of Tag-KEM for Signcryption. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2007, v:171, n:1, pp:83-91 [Journal]
- Shingo Okamura, Yoshiyuki Konishi, Maki Yoshida, Toru Fujiwara
Unlinkable Delivery System for Interactive Dramas. [Citation Graph (0, 0)][DBLP] IEICE Transactions, 2005, v:88, n:1, pp:262-269 [Journal]
- Yuichi Kaji, Toru Fujiwara, Tadao Kasami
Solving a Unification Problem under Constrained Substitutions Using Tree Automata. [Citation Graph (0, 0)][DBLP] J. Symb. Comput., 1997, v:23, n:1, pp:79-117 [Journal]
- Shou-ping Feng, Toru Fujiwara, Tadao Kasami, Kazuhiko Iwasaki
On the Maximum Value of Aliasing Probabilities for Single Input Signature Registers. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 1995, v:44, n:11, pp:1265-1274 [Journal]
- Y. Desaki, Toru Fujiwara, Tadao Kasami
The weight distributions of extended binary primitive BCH codes of length 128. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1997, v:43, n:4, pp:1364-1371 [Journal]
- Toru Fujiwara, Minoru Ito, Tadao Kasami, Mitsuteru Kataoka, Jun Okui
Performance analysis of disk allocation method using error-correcting codes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1991, v:37, n:2, pp:379-0 [Journal]
- Toru Fujiwara, Tadao Kasami, Shou-ping Feng
On the monotonic property of the probability of undetected error for a shortened code. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1991, v:37, n:5, pp:1409-0 [Journal]
- Toru Fujiwara, Toyoo Takata, Tadao Kasami, Shu Lin
An approximation to the weight distribution of binary primitive BCH codes with designed distances 9 and 11. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1986, v:32, n:5, pp:706-0 [Journal]
- Toru Fujiwara, Hiroshi Yamamoto, Tadao Kasami, Shu Lin
A Trellis-Based Recursive Maximum-Likelihood Decoding Algorithm for Binary Linear Block Codes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1998, v:44, n:2, pp:714-729 [Journal]
- Tadao Kasami, Toyoo Takata, Toru Fujiwara, Shu Lin
On linear structure and phase rotation invariant properties of block M-PSK modulation codes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1991, v:37, n:1, pp:164-0 [Journal]
- Tadao Kasami, Toyoo Takata, Toru Fujiwara, Shu Lin
On multilevel block modulation codes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1991, v:37, n:4, pp:965-975 [Journal]
- Tadao Kasami, Toyoo Takata, Toru Fujiwara, Shu Lin
On the optimum bit orders with respect to the state complexity of trellis diagrams for binary linear codes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1993, v:39, n:1, pp:242-0 [Journal]
- Tadao Kasami, Toyoo Takata, Toru Fujiwara, Shu Lin
On complexity of trellis structure of linear block codes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1993, v:39, n:3, pp:1057-0 [Journal]
- Tadao Kasami, Toru Fujiwara, Shu Lin
An approximation to the weight distribution of binary linear codes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1985, v:31, n:6, pp:769-780 [Journal]
- Tadao Kasami, Toru Fujiwara, Toyoo Takata, Shu Lin
A cascaded coding scheme for error control and its performance analysis. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1988, v:34, n:3, pp:448-462 [Journal]
- Robert Morelos-Zaragoza, Toru Fujiwara, Tadao Kasami, Shu Lin
Constructions of Generalized Concatenated Codes and Their Trellis-Based Decoding Complexity. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1999, v:45, n:2, pp:725-731 [Journal]
- Tsukasa Sugita, Tadao Kasami, Toru Fujiwara
The weight distribution of the third-order Reed-Muller code of length 512. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1996, v:42, n:5, pp:1622-1625 [Journal]
- Toyoo Takata, Y. Yamashita, Toru Fujiwara, Tadao Kasami, Shu Lin
Suboptimum decoding of decomposable block codes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1994, v:40, n:5, pp:1392-1405 [Journal]
- Yuansheng Tang, Toru Fujiwara, Tadao Kasami
Asymptotic optimality of the GMD and chase decoding algorithms. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2002, v:48, n:8, pp:2401-2405 [Journal]
Correctable Errors of Weight Half the Minimum Distance Plus One for the First-Order Reed-Muller Codes. [Citation Graph (, )][DBLP]
Verification of the Security Against Inference Attacks on XML Databases. [Citation Graph (, )][DBLP]
A Tractable Subclass of DTDs for XPath Satisfiability with Sibling Axes. [Citation Graph (, )][DBLP]
Anonymous Fingerprinting for Predelivery of Contents. [Citation Graph (, )][DBLP]
Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking. [Citation Graph (, )][DBLP]
Extending the Tractability Results on XPath Satisfiability with Sibling Axes. [Citation Graph (, )][DBLP]
Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors. [Citation Graph (, )][DBLP]
Relations between the Local Weight Distributions of a Linear Block Code, Its Extended Code, and Its Even Weight Subcode [Citation Graph (, )][DBLP]
Uncorrectable Errors of Weight Half the Minimum Distance for Binary Linear Codes [Citation Graph (, )][DBLP]
Search in 0.006secs, Finished in 0.283secs
|