The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Toru Fujiwara: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tadao Kasami, Tsukasa Sugita, Toru Fujiwara
    The Split Weight (wL, wR) Enumeration of Reed-Muller Codes for wL + wR < 2dmin. [Citation Graph (0, 0)][DBLP]
    AAECC, 1997, pp:197-211 [Conf]
  2. Yuansheng Tang, Tadao Kasami, Toru Fujiwara
    An Optimality Testing Algorithm for a Decoded Codeword of Binary Block Codes and Its Computational Complexity. [Citation Graph (0, 0)][DBLP]
    AAECC, 1999, pp:201-210 [Conf]
  3. Yuichi Kaji, Toru Fujiwara, Tadao Kasami
    Solving a Unification Problem under Constrained Substitutions Using Tree Automata. [Citation Graph (0, 0)][DBLP]
    FSTTCS, 1994, pp:276-287 [Conf]
  4. Kenji Hashimoto, Yasunori Ishihara, Toru Fujiwara
    Schema update operations preserving the expressive power in XML databases. [Citation Graph (0, 0)][DBLP]
    ICDE Workshops, 2005, pp:1229- [Conf]
  5. Yasunori Ishihara, Shuichiro Ako, Toru Fujiwara
    Security against Inference Attacks on Negative Information in Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:49-60 [Conf]
  6. Yasunori Ishihara, Yumi Shimakawa, Toru Fujiwara
    Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:145-157 [Conf]
  7. Maki Yoshida, Shigeo Mitsunari, Toru Fujiwara
    A Timed-Release Key Management Scheme for Backward Recovery. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:3-14 [Conf]
  8. Maki Yoshida, Toru Fujiwara
    Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:27-37 [Conf]
  9. Maki Yoshida, Takaaki Fujita, Toru Fujiwara
    A New Optimum Detection Scheme for Additive Watermarks Embedded in Spatial Domain. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:101-104 [Conf]
  10. Maki Yoshida, Toru Fujiwara
    On the Security of Tag-KEM for Signcryption. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:171, n:1, pp:83-91 [Journal]
  11. Shingo Okamura, Yoshiyuki Konishi, Maki Yoshida, Toru Fujiwara
    Unlinkable Delivery System for Interactive Dramas. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:262-269 [Journal]
  12. Yuichi Kaji, Toru Fujiwara, Tadao Kasami
    Solving a Unification Problem under Constrained Substitutions Using Tree Automata. [Citation Graph (0, 0)][DBLP]
    J. Symb. Comput., 1997, v:23, n:1, pp:79-117 [Journal]
  13. Shou-ping Feng, Toru Fujiwara, Tadao Kasami, Kazuhiko Iwasaki
    On the Maximum Value of Aliasing Probabilities for Single Input Signature Registers. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1995, v:44, n:11, pp:1265-1274 [Journal]
  14. Y. Desaki, Toru Fujiwara, Tadao Kasami
    The weight distributions of extended binary primitive BCH codes of length 128. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:4, pp:1364-1371 [Journal]
  15. Toru Fujiwara, Minoru Ito, Tadao Kasami, Mitsuteru Kataoka, Jun Okui
    Performance analysis of disk allocation method using error-correcting codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1991, v:37, n:2, pp:379-0 [Journal]
  16. Toru Fujiwara, Tadao Kasami, Shou-ping Feng
    On the monotonic property of the probability of undetected error for a shortened code. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1991, v:37, n:5, pp:1409-0 [Journal]
  17. Toru Fujiwara, Toyoo Takata, Tadao Kasami, Shu Lin
    An approximation to the weight distribution of binary primitive BCH codes with designed distances 9 and 11. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1986, v:32, n:5, pp:706-0 [Journal]
  18. Toru Fujiwara, Hiroshi Yamamoto, Tadao Kasami, Shu Lin
    A Trellis-Based Recursive Maximum-Likelihood Decoding Algorithm for Binary Linear Block Codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1998, v:44, n:2, pp:714-729 [Journal]
  19. Tadao Kasami, Toyoo Takata, Toru Fujiwara, Shu Lin
    On linear structure and phase rotation invariant properties of block M-PSK modulation codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1991, v:37, n:1, pp:164-0 [Journal]
  20. Tadao Kasami, Toyoo Takata, Toru Fujiwara, Shu Lin
    On multilevel block modulation codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1991, v:37, n:4, pp:965-975 [Journal]
  21. Tadao Kasami, Toyoo Takata, Toru Fujiwara, Shu Lin
    On the optimum bit orders with respect to the state complexity of trellis diagrams for binary linear codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1993, v:39, n:1, pp:242-0 [Journal]
  22. Tadao Kasami, Toyoo Takata, Toru Fujiwara, Shu Lin
    On complexity of trellis structure of linear block codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1993, v:39, n:3, pp:1057-0 [Journal]
  23. Tadao Kasami, Toru Fujiwara, Shu Lin
    An approximation to the weight distribution of binary linear codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1985, v:31, n:6, pp:769-780 [Journal]
  24. Tadao Kasami, Toru Fujiwara, Toyoo Takata, Shu Lin
    A cascaded coding scheme for error control and its performance analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1988, v:34, n:3, pp:448-462 [Journal]
  25. Robert Morelos-Zaragoza, Toru Fujiwara, Tadao Kasami, Shu Lin
    Constructions of Generalized Concatenated Codes and Their Trellis-Based Decoding Complexity. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:2, pp:725-731 [Journal]
  26. Tsukasa Sugita, Tadao Kasami, Toru Fujiwara
    The weight distribution of the third-order Reed-Muller code of length 512. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1996, v:42, n:5, pp:1622-1625 [Journal]
  27. Toyoo Takata, Y. Yamashita, Toru Fujiwara, Tadao Kasami, Shu Lin
    Suboptimum decoding of decomposable block codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:5, pp:1392-1405 [Journal]
  28. Yuansheng Tang, Toru Fujiwara, Tadao Kasami
    Asymptotic optimality of the GMD and chase decoding algorithms. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2002, v:48, n:8, pp:2401-2405 [Journal]

  29. Correctable Errors of Weight Half the Minimum Distance Plus One for the First-Order Reed-Muller Codes. [Citation Graph (, )][DBLP]


  30. Verification of the Security Against Inference Attacks on XML Databases. [Citation Graph (, )][DBLP]


  31. A Tractable Subclass of DTDs for XPath Satisfiability with Sibling Axes. [Citation Graph (, )][DBLP]


  32. Anonymous Fingerprinting for Predelivery of Contents. [Citation Graph (, )][DBLP]


  33. Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking. [Citation Graph (, )][DBLP]


  34. Extending the Tractability Results on XPath Satisfiability with Sibling Axes. [Citation Graph (, )][DBLP]


  35. Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors. [Citation Graph (, )][DBLP]


  36. Relations between the Local Weight Distributions of a Linear Block Code, Its Extended Code, and Its Even Weight Subcode [Citation Graph (, )][DBLP]


  37. Uncorrectable Errors of Weight Half the Minimum Distance for Binary Linear Codes [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.283secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002