default search action
Shun Watanabe
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c60]So Suda, Shun Watanabe, Haruya Yamaguchi:
An Improved Lower Bound on Oblivious Transfer Capacity via Interactive Erasure Emulation. ISIT 2024: 1872-1877 - [c59]Naoki Miura, Hiroaki Taguchi, Kazuyoshi Watanabe, Masaya Nohara, Tatsuyuki Makita, Masahiro Tanabe, Takahiro Wakimoto, Shohei Kumagai, Hideyuki Nosaka, Atsushi Aratake, Toshihiro Okamoto, Shun Watanabe, Jun Takeya, Takeshi Komatsu:
17.4 Environmentally-Friendly Disposable Circuit and Battery System for Reducing Impact of E-Wastes. ISSCC 2024: 320-322 - [i55]So Suda, Shun Watanabe, Haruya Yamaguchi:
An Improved Lower Bound on Oblivious Transfer Capacity via Interactive Erasure Emulation. CoRR abs/2401.14965 (2024) - 2023
- [c58]Shun Watanabe, Kenji Yasunaga:
Unified View for Notions of Bit Security. ASIACRYPT (6) 2023: 361-389 - [c57]Varun Narayanan, Vinod M. Prabhakaran, Neha Sangwan, Shun Watanabe:
Complete Characterization of Broadcast and Pseudo-signatures from Correlations. EUROCRYPT (2) 2023: 563-593 - [c56]Geoffrey Wolfer, Shun Watanabe:
Geometric Reduction for Identity Testing of Reversible Markov Chains. GSI (1) 2023: 328-337 - [c55]Michiru Mizoguchi, Shun Watanabe, Masaya Nakahara, Hiroshi Noborio:
Comparison of the Accuracy of Pouch Replacement Timing Decisions Using Image Generation Artificial Intelligence and Machine Learning. HCI (4) 2023: 107-120 - [c54]Daisuke Takeuchi, Shun Watanabe:
Tight Exponential Strong Converse for Source Coding Problem with Encoded Side Information. ISIT 2023: 1366-1371 - [i54]Geoffrey Wolfer, Shun Watanabe:
A Geometric Reduction Approach for Identity Testing of Reversible Markov Chains. CoRR abs/2302.08059 (2023) - [i53]Varun Narayanan, Vinod M. Prabhakaran, Neha Sangwan, Shun Watanabe:
Complete Characterization of Broadcast and Pseudo-Signatures from Correlations. IACR Cryptol. ePrint Arch. 2023: 233 (2023) - [i52]Shun Watanabe, Kenji Yasunaga:
Bit-Security Preserving Hardness Amplification. IACR Cryptol. ePrint Arch. 2023: 795 (2023) - 2022
- [j34]Shun Watanabe, Masakazu Mukai:
Optimal trajectory generation of a drone for wheelchair tracking using mixed-integer programming. Artif. Life Robotics 27(1): 159-164 (2022) - [j33]Shun Watanabe:
Minimax Converse for Identification via Channels. IEEE Trans. Inf. Theory 68(1): 25-34 (2022) - [c53]Shun Watanabe:
On Sub-optimality of Random Binning for Distributed Hypothesis Testing. ISIT 2022: 2708-2713 - [c52]Takuto Kakishima, Shun Watanabe:
A Numerical Study of Multi-Letter Ahlswede-Han Scheme for Modulo-Sum Problem. ISITA 2022: 84-88 - [i51]Shun Watanabe:
On Sub-optimality of Random Binning for Distributed Hypothesis Testing. CoRR abs/2201.13005 (2022) - [i50]Geoffrey Wolfer, Shun Watanabe:
Geometric Aspects of Data-Processing of Markov Chains. CoRR abs/2203.04575 (2022) - [i49]Daisuke Takeuchi, Shun Watanabe:
Tight Exponential Strong Converse for Source Coding Problem with Encoded Side Information. CoRR abs/2209.10275 (2022) - [i48]Shun Watanabe, Kenji Yasunaga:
Unified View for Notions of Bit Security. IACR Cryptol. ePrint Arch. 2022: 693 (2022) - 2021
- [c51]Shun Watanabe, Kenji Yasunaga:
Bit Security as Computational Cost for Winning Games with High Probability. ASIACRYPT (3) 2021: 161-188 - [c50]Daisuke Takeuchi, Shun Watanabe:
The Achievable Rate Region of Wyner-Ahlswede-Körner Coding Problem for Mixed Sources. ITW 2021: 1-6 - [i47]Geoffrey Wolfer, Shun Watanabe:
Information Geometry of Reversible Markov Chains. CoRR abs/2106.05669 (2021) - [i46]Shun Watanabe, Kenji Yasunaga:
Bit Security as Computational Cost for Winning Games with High Probability. IACR Cryptol. ePrint Arch. 2021: 1258 (2021) - 2020
- [j32]Masahito Hayashi, Shun Watanabe:
Finite-Length Analyses for Source and Channel Coding on Markov Chains. Entropy 22(4): 460 (2020) - [j31]Madhu Sudan, Himanshu Tyagi, Shun Watanabe:
Communication for Generating Correlation: A Unifying Survey. IEEE Trans. Inf. Theory 66(1): 5-37 (2020) - [j30]Himanshu Tyagi, Shun Watanabe:
Strong Converse Using Change of Measure Arguments. IEEE Trans. Inf. Theory 66(2): 689-703 (2020) - [j29]Shun Watanabe, Te Sun Han:
Interval Algorithm for Random Number Generation: Information Spectrum Approach. IEEE Trans. Inf. Theory 66(3): 1691-1701 (2020) - [j28]Shun Watanabe:
A Classification of Functions in Multiterminal Distributed Computing. IEEE Trans. Inf. Theory 66(10): 6169-6183 (2020) - [c49]Shun Watanabe, Toru Tsumugiwa, Ryuichi Yokogawa:
Gait Assessment on EMG and Trunk Acceleration with Impedance-Controlled Gait-Aid Walker-Type Robot. AIM 2020: 1125-1130 - [c48]Shun Watanabe, Te Sun Han:
Isomorphism Problem Revisited: Information Spectrum Approach. ISIT 2020: 2332-2336 - [c47]Shun Watanabe, Toru Tsumugiwa, Ryuichi Yokogawa:
Gait Analysis of Walking Locomotion Enhanced by an Impedance-Controlled Gait-Aid Walker-Type Robot. SII 2020: 1187-1192 - [i45]Shun Watanabe, Te Sun Han:
Isomorphism Problem Revisited: Information Spectrum Approach. CoRR abs/2001.04113 (2020) - [i44]Shun Watanabe:
Minimax Converse for Identification via Channels. CoRR abs/2011.14741 (2020)
2010 – 2019
- 2019
- [c46]Himanshu Tyagi, Shun Watanabe:
A New Proof of Nonsignalling Multiprover Parallel Repetition Theorem. ISIT 2019: 967-971 - [c45]Shun Watanabe, Te Sun Han:
Interval Algorithm for Random Number Generation: Information Spectrum Approach. ITW 2019: 1-5 - [i43]Himanshu Tyagi, Shun Watanabe:
A New Proof of Nonsignalling Multiprover Parallel Repetition Theorem. CoRR abs/1901.11105 (2019) - [i42]Himanshu Tyagi, Shun Watanabe:
Secret Key Capacity For Multipleaccess Channel With Public Feedback. CoRR abs/1902.08970 (2019) - [i41]Madhu Sudan, Himanshu Tyagi, Shun Watanabe:
Communication for Generating Correlation: A Survey. CoRR abs/1904.09563 (2019) - [i40]Shun Watanabe, Te Sun Han:
Interval Algorithm for Random Number Generation: Information Spectrum Approach. CoRR abs/1904.09782 (2019) - [i39]Himanshu Tyagi, Shun Watanabe:
A New Proof of Nonsignalling Multiprover Parallel Repetition Theorem. Electron. Colloquium Comput. Complex. TR19 (2019) - 2018
- [j27]Himanshu Tyagi, Pramod Viswanath, Shun Watanabe:
Interactive Communication for Data Exchange. IEEE Trans. Inf. Theory 64(1): 26-37 (2018) - [j26]Shun Watanabe:
Neyman-Pearson Test for Zero-Rate Multiterminal Hypothesis Testing. IEEE Trans. Inf. Theory 64(7): 4923-4939 (2018) - [c44]Shun Watanabe:
A Classification of Functions in Multiterminal Distributed Computing. ISIT 2018: 1814-1818 - [c43]Himanshu Tyagi, Shun Watanabe:
Strong Converse using Change of Measure Arguments. ISIT 2018: 1849-1853 - [c42]Shun Watanabe:
Second-Order Optimal Test in Composite Hypothesis Testing. ISITA 2018: 722-726 - [i38]Himanshu Tyagi, Shun Watanabe:
Strong Converse using Change of Measure Arguments. CoRR abs/1805.04625 (2018) - 2017
- [j25]Shun Watanabe:
Second-Order Region for Gray-Wyner Network. IEEE Trans. Inf. Theory 63(2): 1006-1018 (2017) - [j24]Himanshu Tyagi, Shun Watanabe:
Universal Multiparty Data Exchange and Secret Key Agreement. IEEE Trans. Inf. Theory 63(7): 4057-4074 (2017) - [j23]Himanshu Tyagi, Shaileshh Bojja Venkatakrishnan, Pramod Viswanath, Shun Watanabe:
Information Complexity Density and Simulation of Protocols. IEEE Trans. Inf. Theory 63(11): 6979-7002 (2017) - [j22]Shigeaki Kuzuoka, Shun Watanabe:
On Distributed Computing for Functions With Certain Structures. IEEE Trans. Inf. Theory 63(11): 7003-7017 (2017) - [c41]Shun Watanabe:
Neyman-Pearson test for zero-rate multiterminal hypothesis testing. ISIT 2017: 116-120 - [c40]Himanshu Tyagi, Shun Watanabe:
Optimality of the recursive data exchange protocol. ISIT 2017: 2855-2859 - [c39]Shun Watanabe:
A converse bound on Wyner-Ahlswede-Körner Network via Gray-Wyner network. ITW 2017: 81-85 - [i37]Shun Watanabe:
A Converse Bound on Wyner-Ahlswede-Körner Network via Gray-Wyner Network. CoRR abs/1704.02262 (2017) - [i36]Shun Watanabe:
A Classification of Functions in Multiterminal Distributed Computing. CoRR abs/1712.02985 (2017) - 2016
- [j21]Masahito Hayashi, Shun Watanabe:
Uniform Random Number Generation From Markov Chains: Non-Asymptotic and Asymptotic Analyses. IEEE Trans. Inf. Theory 62(4): 1795-1822 (2016) - [j20]Masahito Hayashi, Himanshu Tyagi, Shun Watanabe:
Secret Key Agreement: General Capacity and Second-Order Asymptotics. IEEE Trans. Inf. Theory 62(7): 3796-3810 (2016) - [j19]Min-Hsiu Hsieh, Shun Watanabe:
Channel Simulation and Coded Source Compression. IEEE Trans. Inf. Theory 62(11): 6609-6619 (2016) - [c38]Himanshu Tyagi, Shaileshh Bojja Venkatakrishnan, Pramod Viswanath, Shun Watanabe:
Information Complexity Density and Simulation of Protocols. ITCS 2016: 381-391 - [c37]Himanshu Tyagi, Shun Watanabe:
Universal multiparty data exchange. ISIT 2016: 2329-2333 - [c36]Shigeaki Kuzuoka, Shun Watanabe:
On distributed computing for functions with certain structures. ITW 2016: 6-10 - [i35]Himanshu Tyagi, Pramod Viswanath, Shun Watanabe:
Interactive Communication for Data Exchange. CoRR abs/1601.03617 (2016) - [i34]Shigeaki Kuzuoka, Shun Watanabe:
On Distributed Computing for Functions with Certain Structures. CoRR abs/1602.08204 (2016) - [i33]Himanshu Tyagi, Shun Watanabe:
Universal Multiparty Data Exchange and Secret Key Agreement. CoRR abs/1605.01033 (2016) - [i32]Shun Watanabe:
Neyman-Pearson Test for Zero-Rate Multiterminal Hypothesis Testing. CoRR abs/1611.08175 (2016) - 2015
- [j18]Shun Watanabe, Yasutada Oohama:
The Optimal Use of Rate-Limited Randomness in Broadcast Channels With Confidential Messages. IEEE Trans. Inf. Theory 61(2): 983-995 (2015) - [j17]Shun Watanabe, Shigeaki Kuzuoka, Vincent Yan Fu Tan:
Nonasymptotic and Second-Order Achievability Bounds for Coding With Side-Information. IEEE Trans. Inf. Theory 61(4): 1574-1605 (2015) - [j16]Shigeaki Kuzuoka, Shun Watanabe:
An Information-Spectrum Approach to Weak Variable-Length Source Coding With Side-Information. IEEE Trans. Inf. Theory 61(6): 3559-3573 (2015) - [j15]Himanshu Tyagi, Shun Watanabe:
Converses For Secret Key Agreement and Secure Computing. IEEE Trans. Inf. Theory 61(9): 4809-4827 (2015) - [j14]Shigeaki Kuzuoka, Shun Watanabe:
A Dichotomy of Functions in Distributed Coding: An Information Spectral Approach. IEEE Trans. Inf. Theory 61(9): 5028-5041 (2015) - [c35]Prakash Narayan, Himanshu Tyagi, Shun Watanabe:
Common randomness for secure computing. ISIT 2015: 949-953 - [c34]Shigeaki Kuzuoka, Shun Watanabe:
A dichotomy of functions in distributed coding: An information spectral approach. ISIT 2015: 1766-1770 - [c33]Himanshu Tyagi, Pramod Viswanath, Shun Watanabe:
Interactive communication for data exchange. ISIT 2015: 1806-1810 - [c32]Himanshu Tyagi, Shun Watanabe:
Impossibility bounds for secure computing. ISIT 2015: 2742-2746 - [c31]Min-Hsiu Hsieh, Shun Watanabe:
Source compression with a quantum helper. ISIT 2015: 2762-2766 - [c30]Min-Hsiu Hsieh, Shun Watanabe:
Fully quantum source compression with a quantum helper. ITW Fall 2015: 307-311 - [i31]Min-Hsiu Hsieh, Shun Watanabe:
Source Compression with a Quantum Helper. CoRR abs/1501.04366 (2015) - [i30]Masahito Hayashi, Shun Watanabe:
Uniform Random Number Generation from Markov Chains: Non-Asymptotic and Asymptotic Analyses. CoRR abs/1503.04371 (2015) - [i29]Min-Hsiu Hsieh, Shun Watanabe:
Fully Quantum Source Compression with a Quantum Helper. CoRR abs/1504.05227 (2015) - [i28]Himanshu Tyagi, Shaileshh Bojja Venkatakrishnan, Pramod Viswanath, Shun Watanabe:
Information Complexity Density and Simulation of Protocols. CoRR abs/1504.05666 (2015) - [i27]Shun Watanabe:
Second-Order Region for Gray-Wyner Network. CoRR abs/1508.04227 (2015) - [i26]Min-Hsiu Hsieh, Shun Watanabe:
Channel Simulation and Coded Source Compression. CoRR abs/1511.06071 (2015) - [i25]Himanshu Tyagi, Shaileshh Bojja Venkatakrishnan, Pramod Viswanath, Shun Watanabe:
Information Complexity Density and Simulation of Protocols. Electron. Colloquium Comput. Complex. TR15 (2015) - 2014
- [j13]Shun Watanabe, Takashi Kuremoto, Shingo Mabu, Masanao Obayashi, Kunikazu Kobayashi:
The Recollection Characteristics of Generalized MCNN Using Different Control Methods. J. Robotics Netw. Artif. Life 1(1): 73-79 (2014) - [j12]Shun Watanabe, Ryutaroh Matsumoto, Tomohiko Uyematsu:
Optimal axis compensation in quantum key distribution protocols over unital channels. Theor. Comput. Sci. 560: 91-106 (2014) - [j11]Shun Watanabe, Shigeaki Kuzuoka:
Universal Wyner-Ziv Coding for Distortion Constrained General Side Information. IEEE Trans. Inf. Theory 60(12): 7568-7583 (2014) - [j10]Shun Watanabe, Yasutada Oohama:
Cognitive Interference Channels With Confidential Messages Under Randomness Constraint. IEEE Trans. Inf. Theory 60(12): 7698-7707 (2014) - [c29]Himanshu Tyagi, Shun Watanabe:
Converse results for secrecy generation over channels. ACSSC 2014: 56-59 - [c28]Masahito Hayashi, Himanshu Tyagi, Shun Watanabe:
Strong converse for a degraded wiretap channel via active hypothesis testing. Allerton 2014: 148-151 - [c27]Himanshu Tyagi, Shun Watanabe:
A Bound for Multiparty Secret Key Agreement and Implications for a Problem of Secure Computing. EUROCRYPT 2014: 369-386 - [c26]Masahito Hayashi, Shun Watanabe:
Information geometry approach to parameter estimation in Markov chains. ISIT 2014: 1091-1095 - [c25]Masahito Hayashi, Himanshu Tyagi, Shun Watanabe:
Secret key agreement: General capacity and second-order asymptotics. ISIT 2014: 1136-1140 - [c24]Vincent Yan Fu Tan, Shun Watanabe, Masahito Hayashi:
Moderate deviations for joint source-channel coding of systems with Markovian memory. ISIT 2014: 1687-1691 - [c23]Shun Watanabe, Masahito Hayashi:
Strong converse and second-order asymptotics of channel resolvability. ISIT 2014: 1882-1886 - [c22]Shigeaki Kuzuoka, Shun Watanabe:
An information-spectrum approach to weak variable-length Slepian-Wolf coding. ISIT 2014: 2684-2688 - [c21]Shun Watanabe, Masahito Hayashi:
Finite-length analysis on tail probability and simple hypothesis testing for Markov chain. ISITA 2014: 196-200 - [c20]Masahito Hayashi, Shun Watanabe:
Non-asymptotic and asymptotic analyses on Markov chains in several problems. ITA 2014: 1-10 - [i24]Shun Watanabe, Masahito Hayashi:
Finite-length Analysis on Tail probability and Simple Hypothesis Testing for Markov Chain. CoRR abs/1401.3801 (2014) - [i23]Shigeaki Kuzuoka, Shun Watanabe:
An Information-Spectrum Approach to Weak Variable-Length Source Coding with Side-Information. CoRR abs/1401.3809 (2014) - [i22]Masahito Hayashi, Shun Watanabe:
Information Geometry Approach to Parameter Estimation in Markov Chains. CoRR abs/1401.3814 (2014) - [i21]Shun Watanabe, Masahito Hayashi:
Strong Converse and Second-Order Asymptotics of Channel Resolvability. CoRR abs/1404.5507 (2014) - [i20]Himanshu Tyagi, Shun Watanabe:
Converses for Secret Key Agreement and Secure Computing. CoRR abs/1404.5715 (2014) - [i19]Shigeaki Kuzuoka, Shun Watanabe:
A Dichotomy of Functions in Distributed Coding: An Information Spectral Approach. CoRR abs/1408.5971 (2014) - [i18]Masahito Hayashi, Himanshu Tyagi, Shun Watanabe:
Strong Converse for a Degraded Wiretap Channel via Active Hypothesis Testing. CoRR abs/1410.0443 (2014) - [i17]Masahito Hayashi, Himanshu Tyagi, Shun Watanabe:
Secret Key Agreement: General Capacity and Second-Order Asymptotics. CoRR abs/1411.0735 (2014) - [i16]Himanshu Tyagi, Shun Watanabe:
A Bound For Multiparty Secret Key Agreement And Implications For A Problem Of Secure Computing. IACR Cryptol. ePrint Arch. 2014: 88 (2014) - 2013
- [j9]Shun Watanabe, Takashi Kuremoto, Kunikazu Kobayashi, Masanao Obayashi:
A method for analyzing the spatiotemporal changes of chaotic neural networks. Artif. Life Robotics 18(3-4): 196-203 (2013) - [j8]Takashi Kuremoto, Yasuhiro Kinoshita, Liang-Bing Feng, Shun Watanabe, Kunikazu Kobayashi, Masanao Obayashi:
A gesture recognition system with retina-V1 model and one-pass dynamic programming. Neurocomputing 116: 291-300 (2013) - [j7]Shun Watanabe:
The Rate-Distortion Function for Product of Two Sources With Side-Information at Decoders. IEEE Trans. Inf. Theory 59(9): 5678-5691 (2013) - [c19]Himanshu Tyagi, Shun Watanabe:
Secret key capacity for multipleaccess channel with public feedback. Allerton 2013: 1-7 - [c18]Masahito Hayashi, Shun Watanabe:
Non-asymptotic bounds on fixed length source coding for Markov chains. Allerton 2013: 875-882 - [c17]Shun Watanabe, Shigeaki Kuzuoka:
Universal Wyner-Ziv coding for distortion constrained general side-information. ISIT 2013: 1357-1361 - [c16]Shun Watanabe, Masahito Hayashi:
Non-asymptotic analysis of privacy amplification via Rényi entropy and inf-spectral entropy. ISIT 2013: 2715-2719 - [c15]Shun Watanabe, Shigeaki Kuzuoka, Vincent Yan Fu Tan:
Non-asymptotic and second-order achievability bounds for source coding with side-information. ISIT 2013: 3055-3059 - [i15]Shun Watanabe, Shigeaki Kuzuoka, Vincent Yan Fu Tan:
Non-Asymptotic and Second-Order Achievability Bounds for Coding With Side-Information. CoRR abs/1301.6467 (2013) - [i14]Shun Watanabe, Shigeaki Kuzuoka:
Universal Wyner-Ziv Coding for Distortion Constrained General Side-Information. CoRR abs/1302.0050 (2013) - [i13]Masahito Hayashi, Shun Watanabe:
Non-Asymptotic and Asymptotic Analyses on Markov Chains in Several Problems. CoRR abs/1309.7528 (2013) - 2012
- [c14]Shun Watanabe, Yasutada Oohama:
Broadcast channels with confidential messages by randomness constrained stochastic encoder. ISIT 2012: 61-65 - [c13]Shun Watanabe, Yasutada Oohama:
Cognitive interference channels with confidential messages under randomness constraint. ISITA 2012: 697-701 - [c12]Shun Watanabe, Yasutada Oohama:
Privacy amplification theorem for bounded storage eavesdropper. ITW 2012: 177-181 - [c11]Shun Watanabe:
Expurgation exponent of leaked information in privacy amplification for binary sources. ITW 2012: 401-405 - [i12]Shun Watanabe, Yasutada Oohama:
Broadcast Channels with Confidential Messages by Randomness Constrained Stochastic Encoder. CoRR abs/1201.6468 (2012) - [i11]Shun Watanabe, Yasutada Oohama:
Cognitive Interference Channels with Confidential Messages under Randomness Constraint. CoRR abs/1204.5663 (2012) - [i10]Shun Watanabe:
Expurgation Exponent of Leaked Information in Privacy Amplification for Binary Sources. CoRR abs/1208.3017 (2012) - [i9]Shun Watanabe, Masahito Hayashi:
Non-Asymptotic Analysis of Privacy Amplification via Renyi Entropy and Inf-Spectral Entropy. CoRR abs/1211.5252 (2012) - 2011
- [j6]Shun Watanabe, Yasutada Oohama:
Secret Key Agreement From Vector Gaussian Sources by Rate Limited Public Communication. IEEE Trans. Inf. Forensics Secur. 6(3-1): 541-550 (2011) - [c10]Takashi Kuremoto, Yasuhiro Kinoshita, Liang-Bing Feng, Shun Watanabe, Kunikazu Kobayashi, Masanao Obayashi:
A Gesture Recognition System Using One-Pass DP Method. ICIC (2) 2011: 581-587 - [c9]Shun Watanabe:
The rate-distortion function for product of two sources with side-information at decoders. ISIT 2011: 2761-2765 - [i8]Shun Watanabe:
The Rate-Distortion Function for Product of Two Sources with Side-Information at Decoders. CoRR abs/1105.2864 (2011) - [i7]Shun Watanabe:
Remarks on Private and Quantum Capacities of More Capable and Less Noisy Quantum Channels. CoRR abs/1110.5746 (2011) - 2010
- [j5]Shun Watanabe, Ryutaroh Matsumoto, Tomohiko Uyematsu:
Strongly Secure Privacy Amplification Cannot Be Obtained by Encoder of Slepian-Wolf Code. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(9): 1650-1659 (2010) - [j4]Shun Watanabe, Yasutada Oohama:
Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(11): 1976-1983 (2010) - [c8]Shun Watanabe, Yasutada Oohama:
Secret key agreement from vector Gaussian sources by rate limited public communication. ISIT 2010: 2597-2601 - [i6]Shun Watanabe, Yasutada Oohama:
Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication. CoRR abs/1001.3705 (2010) - [i5]Shun Watanabe, Yasutada Oohama:
Secret Key Agreement from Vector Gaussian Sources by Rate Limited Public Communication. CoRR abs/1009.5760 (2010) - [i4]Yasutada Oohama, Shun Watanabe:
Capacity Results for Relay Channels with Confidential Messages. CoRR abs/1009.5829 (2010)
2000 – 2009
- 2009
- [j3]Masashi Naito, Shun Watanabe, Ryutaroh Matsumoto, Tomohiko Uyematsu:
Secret Key Agreement by Soft-Decision of Signals in Gaussian Maurer's Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(2): 525-534 (2009) - [j2]Akisato Kimura, Tomohiko Uyematsu, Shigeaki Kuzuoka, Shun Watanabe:
Universal Source Coding OverGeneralized Complementary Delivery Networks. IEEE Trans. Inf. Theory 55(3): 1360-1373 (2009) - [c7]Michael J. Moore, Akihiro Enomoto, Shun Watanabe, Kazuhiro Oiwa, Tatsuya Suda:
Simulating molecular motor uni-cast information rate for molecular communication. CISS 2009: 859-864 - [c6]Shun Watanabe, Tsuki Saitou, Ryutaroh Matsumoto, Tomohiko Uyematsu:
Strongly secure privacy amplification cannot be obtained by encoder of Slepian-Wolf code. ISIT 2009: 1298-1302 - [c5]Tomohiko Uyematsu, Shun Watanabe, Ryutaroh Matsumoto:
Optimal axis compensation in quantum key distribution protocols over unital channels. ISIT 2009: 1884-1888 - [i3]Shun Watanabe, Ryutaroh Matsumoto, Tomohiko Uyematsu:
Strongly Secure Privacy Amplification Cannot Be Obtained by Encoder of Slepian-Wolf Code. CoRR abs/0906.2582 (2009) - 2008
- [j1]Ryutaroh Matsumoto, Shun Watanabe:
Key Rate Available from Mismatched Measurements in the BB84 Protocol and the Uncertainty Principle. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(10): 2870-2873 (2008) - [c4]Tomoki Yoshihisa, Tadashi Nakano, Shun Watanabe, Tatsuya Suda:
Bee-inspired data collection methods for P2P streaming systems. BIONETICS 2008: 11 - [c3]Masashi Naito, Shun Watanabe, Ryutaroh Matsumoto, Tomohiko Uyematsu:
Secret key agreement by reliability information of signals in Gaussian Maurer's Model. ISIT 2008: 727-731 - [i2]Masashi Naito, Shun Watanabe, Ryutaroh Matsumoto, Tomohiko Uyematsu:
Secret Key Agreement by Soft-decision of Signals in Gaussian Maurer's Model. CoRR abs/0804.2940 (2008) - 2007
- [c2]Shun Watanabe, Ryutaroh Matsumoto, Tomohiko Uyematsu, Yasuhito Kawano:
Key rate of quantum key distribution with hashed two-way classical communication. ISIT 2007: 2601-2605 - [i1]Akisato Kimura, Tomohiko Uyematsu, Shigeaki Kuzuoka, Shun Watanabe:
Universal source coding over generalized complementary delivery networks. CoRR abs/0710.4987 (2007) - 2005
- [c1]Shun Watanabe, Ryutaroh Matsumoto, Tomohiko Uyematsu:
Noise tolerance of the BB84 protocol with random privacy amplification. ISIT 2005: 1013-1017
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-17 20:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint