default search action
BibTeX records: Yuichi Kaji
@article{DBLP:journals/ieiceta/Kaji24, author = {Yuichi Kaji}, title = {Foreword}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {107}, number = {3}, pages = {359}, year = {2024}, url = {https://doi.org/10.1587/transfun.2023taf0001}, doi = {10.1587/TRANSFUN.2023TAF0001}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/Kaji24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/HirataK23, author = {Tomonori Hirata and Yuichi Kaji}, title = {Information Leakage Through Passive Timing Attacks on {RSA} Decryption System}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {106}, number = {3}, pages = {406--413}, year = {2023}, url = {https://doi.org/10.1587/transfun.2022tap0006}, doi = {10.1587/TRANSFUN.2022TAP0006}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieiceta/HirataK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HondaK23, author = {Motonari Honda and Yuichi Kaji}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Improvement of Winternitz {OTS} with a Novel Fingerprinting Function}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {303--311}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012049100003555}, doi = {10.5220/0012049100003555}, timestamp = {Mon, 31 Jul 2023 15:34:21 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HondaK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/HirataK20, author = {Tomonori Hirata and Yuichi Kaji}, title = {Information leakage through passive timing attacks on {RSA} decryption system}, booktitle = {International Symposium on Information Theory and Its Applications, {ISITA} 2020, Kapolei, HI, USA, October 24-27, 2020}, pages = {392--396}, publisher = {{IEEE}}, year = {2020}, url = {https://ieeexplore.ieee.org/document/9366110}, timestamp = {Mon, 22 Mar 2021 15:48:59 +0100}, biburl = {https://dblp.org/rec/conf/isita/HirataK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MomoseCK20, author = {Atsuki Momose and Jason Paul Cruz and Yuichi Kaji}, title = {Hybrid-BFT: Optimistically Responsive Synchronous Consensus with Optimal Latency or Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {406}, year = {2020}, url = {https://eprint.iacr.org/2020/406}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MomoseCK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/CruzKY18, author = {Jason Paul Cruz and Yuichi Kaji and Naoto Yanai}, title = {{RBAC-SC:} Role-Based Access Control Using Smart Contract}, journal = {{IEEE} Access}, volume = {6}, pages = {12240--12251}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2812844}, doi = {10.1109/ACCESS.2018.2812844}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/CruzKY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jssc/TakahashiKTFHYW18, author = {Tomohiro Takahashi and Yuichi Kaji and Yasunori Tsukuda and Shinichiro Futami and Katsuhiko Hanzawa and Takahito Yamauchi and Ping Wah Wong and Frederick T. Brady and Phil Holden and Thomas Ayers and Kyohei Mizuta and Susumu Ohki and Keiji Tatani and Hayato Wakabayashi and Yoshikazu Nitta}, title = {A Stacked {CMOS} Image Sensor With Array-Parallel {ADC} Architecture}, journal = {{IEEE} J. Solid State Circuits}, volume = {53}, number = {4}, pages = {1061--1070}, year = {2018}, url = {https://doi.org/10.1109/JSSC.2017.2784759}, doi = {10.1109/JSSC.2017.2784759}, timestamp = {Sun, 30 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jssc/TakahashiKTFHYW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/KajiCY18, author = {Yuichi Kaji and Jason Paul Cruz and Yoshio Yatani}, editor = {Pierangela Samarati and Mohammad S. Obaidat}, title = {Hash-Based Signature with Constant-Sum Fingerprinting and Partial Construction of Hash Chains}, booktitle = {Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal, July 26-28, 2018}, pages = {463--470}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006828204630470}, doi = {10.5220/0006828204630470}, timestamp = {Wed, 29 Aug 2018 15:17:20 +0200}, biburl = {https://dblp.org/rec/conf/icete/KajiCY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/TakedaKI16, author = {Yuki Takeda and Yuichi Kaji and Minoru Ito}, title = {On the Computational Complexity of the Linear Solvability of Information Flow Problems with Hierarchy Constraint}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {99-A}, number = {12}, pages = {2211--2217}, year = {2016}, url = {https://doi.org/10.1587/transfun.E99.A.2211}, doi = {10.1587/TRANSFUN.E99.A.2211}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/TakedaKI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/Kaji16, author = {Yuichi Kaji}, title = {Converging bounds of the entropy of multinomial distributions}, booktitle = {2016 International Symposium on Information Theory and Its Applications, {ISITA} 2016, Monterey, CA, USA, October 30 - November 2, 2016}, pages = {433--437}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/document/7840461/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isita/Kaji16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/CruzYK16, author = {Jason Paul Cruz and Yoshio Yatani and Yuichi Kaji}, title = {Constant-sum fingerprinting for Winternitz one-time signature}, booktitle = {2016 International Symposium on Information Theory and Its Applications, {ISITA} 2016, Monterey, CA, USA, October 30 - November 2, 2016}, pages = {703--707}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/document/7840516/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isita/CruzYK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imt/Kaji15, author = {Yuichi Kaji}, title = {Performance Evaluation of Index-less Indexed Flash Codes for Non-uniform Write Operations}, journal = {Inf. Media Technol.}, volume = {10}, number = {2}, pages = {204--209}, year = {2015}, url = {https://doi.org/10.11185/imt.10.204}, doi = {10.11185/IMT.10.204}, timestamp = {Mon, 26 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imt/Kaji15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/allerton/TakedaKI15, author = {Yuki Takeda and Yuichi Kaji and Minoru Ito}, title = {On the computational complexity of the solvability of information flow problem with hierarchy constraint}, booktitle = {53rd Annual Allerton Conference on Communication, Control, and Computing, Allerton 2015, Allerton Park {\&} Retreat Center, Monticello, IL, USA, September 29 - October 2, 2015}, pages = {1205--1210}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ALLERTON.2015.7447145}, doi = {10.1109/ALLERTON.2015.7447145}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/allerton/TakedaKI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/Kaji15, author = {Yuichi Kaji}, title = {Bounds on the entropy of multinomial distribution}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2015, Hong Kong, China, June 14-19, 2015}, pages = {1362--1366}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIT.2015.7282678}, doi = {10.1109/ISIT.2015.7282678}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/Kaji15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/KobayashiKS14, author = {Yasuyuki Kobayashi and Yuichi Kaji and Hiroyuki Seki}, title = {Information theoretical evaluation of the bucketing technique to mitigate timing attacks}, booktitle = {International Symposium on Information Theory and its Applications, {ISITA} 2014, Melbourne, Australia, October 26-29, 2014}, pages = {561--565}, publisher = {{IEEE}}, year = {2014}, url = {https://ieeexplore.ieee.org/document/6979906/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isita/KobayashiKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/KumagaiK14, author = {Kazuki Kumagai and Yuichi Kaji}, title = {A flash code utilizing dynamic segment allocation}, booktitle = {International Symposium on Information Theory and its Applications, {ISITA} 2014, Melbourne, Australia, October 26-29, 2014}, pages = {605--609}, publisher = {{IEEE}}, year = {2014}, url = {https://ieeexplore.ieee.org/document/6979915/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isita/KumagaiK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/TanK13, author = {Michael Joseph Tan and Yuichi Kaji}, title = {Flash Code Utilizing Binary-Indexed Slice Encoding and Resizable-Clusters}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {12}, pages = {2360--2367}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.2360}, doi = {10.1587/TRANSFUN.E96.A.2360}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/TanK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eit/TanK13, author = {Michael Joseph Tan and Yuichi Kaji}, title = {Flash code utilizing resizable-clusters}, booktitle = {{IEEE} International Conference on Electro-Information Technology , {EIT} 2013, Rapid City, SD, USA, May 9-11, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EIT.2013.6632646}, doi = {10.1109/EIT.2013.6632646}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/eit/TanK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Kaji12, author = {Yuichi Kaji}, title = {The Expected Write Deficiency of Index-Less Indexed Flash Codes}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {12}, pages = {2130--2138}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.2130}, doi = {10.1587/TRANSFUN.E95.A.2130}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Kaji12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imt/MejiaKS12, author = {Ramon Francisco Pacquiao Mejia and Yuichi Kaji and Hiroyuki Seki}, title = {Error Control for High-density Monochrome Two-dimensional Barcodes}, journal = {Inf. Media Technol.}, volume = {7}, number = {3}, pages = {1136--1144}, year = {2012}, url = {https://doi.org/10.11185/imt.7.1136}, doi = {10.11185/IMT.7.1136}, timestamp = {Sat, 31 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imt/MejiaKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/NagaharaK12, author = {Hiroyuki Nagahara and Yuichi Kaji}, title = {Index-less flash codes with arbitrary small slices}, booktitle = {Proceedings of the International Symposium on Information Theory and its Applications, {ISITA} 2012, Honolulu, HI, USA, October 28-31, 2012}, pages = {106--110}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6400895/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isita/NagaharaK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MejiaKS11, author = {Ramon Francisco Pacquiao Mejia and Yuichi Kaji and Hiroyuki Seki}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Poster: trans-organizational role-based access control}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {817--820}, publisher = {{ACM}}, year = {2011}, url = {https://dl.acm.org/citation.cfm?id=2093501}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MejiaKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/Kaji11, author = {Yuichi Kaji}, title = {The expected write deficiency of index-less flash codes and their improvement}, booktitle = {2011 {IEEE} Information Theory Workshop, {ITW} 2011, Paraty, Brazil, October 16-20, 2011}, pages = {35--39}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ITW.2011.6089479}, doi = {10.1109/ITW.2011.6089479}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/itw/Kaji11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Kaji10, author = {Yuichi Kaji}, title = {Foreword}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {93-D}, number = {2}, pages = {207}, year = {2010}, url = {https://doi.org/10.1587/transinf.E93.D.207}, doi = {10.1587/TRANSINF.E93.D.207}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Kaji10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/ZhaoK10, author = {Kai Zhao and Yuichi Kaji}, title = {Anti-phishing mutual authentication using the visual secret sharing scheme}, booktitle = {Proceedings of the International Symposium on Information Theory and its Applications, {ISITA} 2010, 17-20 October 2010, Taichung, Taiwan}, pages = {560--565}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ISITA.2010.5649733}, doi = {10.1109/ISITA.2010.5649733}, timestamp = {Wed, 11 Aug 2021 11:51:25 +0200}, biburl = {https://dblp.org/rec/conf/isita/ZhaoK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lata/YoshinakaKS10, author = {Ryo Yoshinaka and Yuichi Kaji and Hiroyuki Seki}, editor = {Adrian{-}Horia Dediu and Henning Fernau and Carlos Mart{\'{\i}}n{-}Vide}, title = {Chomsky-Sch{\"{u}}tzenberger-Type Characterization of Multiple Context-Free Languages}, booktitle = {Language and Automata Theory and Applications, 4th International Conference, {LATA} 2010, Trier, Germany, May 24-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6031}, pages = {596--607}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13089-2\_50}, doi = {10.1007/978-3-642-13089-2\_50}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/lata/YoshinakaKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/Kaji09, author = {Yuichi Kaji}, title = {On the number of minimum weight codewords of {SFA-LDPC} codes}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2009, June 28 - July 3, 2009, Seoul, Korea, Proceedings}, pages = {70--74}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ISIT.2009.5205673}, doi = {10.1109/ISIT.2009.5205673}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/Kaji09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MohriMK08, author = {Hisashi Mohri and Ritsuko Matsumoto and Yuichi Kaji}, title = {Key Predistribution Schemes for Sensor Networks Using Finite Plane Geometry}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {91-D}, number = {5}, pages = {1416--1423}, year = {2008}, url = {https://doi.org/10.1093/ietisy/e91-d.5.1416}, doi = {10.1093/IETISY/E91-D.5.1416}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MohriMK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SugiyamaK08, author = {Kenji Sugiyama and Yuichi Kaji}, title = {On the Minimum Weight of Simple Full-Length Array {LDPC} Codes}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {6}, pages = {1502--1508}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.6.1502}, doi = {10.1093/IETFEC/E91-A.6.1502}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SugiyamaK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ArimaTKK07, author = {Satoshi Arima and Takuji Tachibana and Yuichi Kaji and Shoji Kasahara}, title = {FEC-Based Reliable Transmission for Multiple Bursts in {OBS} Networks}, journal = {{IEICE} Trans. Commun.}, volume = {90-B}, number = {12}, pages = {3541--3551}, year = {2007}, url = {https://doi.org/10.1093/ietcom/e90-b.12.3541}, doi = {10.1093/IETCOM/E90-B.12.3541}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ArimaTKK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/SugiyamaK07, author = {Kenji Sugiyama and Yuichi Kaji}, title = {On the minimum weight of simple full-length array {LDPC} codes}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2007, Nice, France, June 24-29, 2007}, pages = {746--750}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ISIT.2007.4557314}, doi = {10.1109/ISIT.2007.4557314}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/SugiyamaK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Kaji06, author = {Yuichi Kaji}, title = {Encoding {LDPC} Codes Using the Triangular Factorization}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {10}, pages = {2510--2518}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.10.2510}, doi = {10.1093/IETFEC/E89-A.10.2510}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Kaji06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NojimaK05, author = {Ryo Nojima and Yuichi Kaji}, title = {Secure, Efficient and Practical Key Management Scheme in the Complete-Subtree Method}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {88-A}, number = {1}, pages = {189--194}, year = {2005}, url = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_189\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NojimaK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NojimaK05a, author = {Ryo Nojima and Yuichi Kaji}, title = {Using Trapdoor Permutations in a Complete Subtree Method for Broadcast Encryption}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {88-A}, number = {2}, pages = {568--574}, year = {2005}, url = {http://search.ieice.org/bin/summary.php?id=e88-a\_2\_568\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NojimaK05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/IkegamiK03, author = {Daisuke Ikegami and Yuichi Kaji}, title = {Maximum Likelihood Decoding for Linear Block Codes Using Grobner Bases}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {86-A}, number = {3}, pages = {643--651}, year = {2003}, url = {http://search.ieice.org/bin/summary.php?id=e86-a\_3\_643}, timestamp = {Tue, 08 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/IkegamiK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/IshidaK03, author = {Toshiyuki Ishida and Yuichi Kaji}, title = {A Call-by-Need Recursive Algorithm for the LogMAP Decoding of a Binary Linear Block Code}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {86-A}, number = {12}, pages = {3306--3309}, year = {2003}, url = {http://search.ieice.org/bin/summary.php?id=e86-a\_12\_3306}, timestamp = {Tue, 08 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/IshidaK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rta/SekiTFK02, author = {Hiroyuki Seki and Toshinori Takai and Youhei Fujinaka and Yuichi Kaji}, editor = {Sophie Tison}, title = {Layered Transducing Term Rewriting System and Its Recognizability Preserving Property}, booktitle = {Rewriting Techniques and Applications, 13th International Conference, {RTA} 2002, Copenhagen, Denmark, July 22-24, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2378}, pages = {98--113}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45610-4\_8}, doi = {10.1007/3-540-45610-4\_8}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/rta/SekiTFK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaecc/KasamiTK01, author = {Tadao Kasami and Hitoshi Tokushige and Yuichi Kaji}, editor = {Serdar Boztas and Igor E. Shparlinski}, title = {Sufficient Conditions on Most Likely Local Sub-codewords in Recursive Maximum Likelihood Decoding Algorithms}, booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 14th International Symposium, AAECC-14, Melbourne, Australia November 26-30, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2227}, pages = {333--342}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45624-4\_35}, doi = {10.1007/3-540-45624-4\_35}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/aaecc/KasamiTK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rta/TakaiKS00, author = {Toshinori Takai and Yuichi Kaji and Hiroyuki Seki}, editor = {Leo Bachmair}, title = {Right-Linear Finite Path Overlapping Term Rewriting Systems Effectively Preserve Recognizability}, booktitle = {Rewriting Techniques and Applications, 11th International Conference, {RTA} 2000, Norwich, UK, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1833}, pages = {246--260}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10721975\_17}, doi = {10.1007/10721975\_17}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/rta/TakaiKS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/KajiFK97, author = {Yuichi Kaji and Toru Fujiwara and Tadao Kasami}, title = {Solving a Unification Problem under Constrained Substitutions Using Tree Automata}, journal = {J. Symb. Comput.}, volume = {23}, number = {1}, pages = {79--117}, year = {1997}, url = {https://doi.org/10.1006/jsco.1996.0077}, doi = {10.1006/JSCO.1996.0077}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/KajiFK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ci/KajiNSK94, author = {Yuichi Kaji and Ryuchi Nakanishi and Hiroyuki Seki and Tadao Kasami}, title = {The Computational Complexity of the Universal Recognition Problem for Parallel Multiple Context-Free Grammars}, journal = {Comput. Intell.}, volume = {10}, pages = {440--452}, year = {1994}, url = {https://doi.org/10.1111/j.1467-8640.1994.tb00008.x}, doi = {10.1111/J.1467-8640.1994.TB00008.X}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ci/KajiNSK94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/KajiFK94, author = {Yuichi Kaji and Toru Fujiwara and Tadao Kasami}, editor = {P. S. Thiagarajan}, title = {Solving a Unification Problem under Constrained Substitutions Using Tree Automata}, booktitle = {Foundations of Software Technology and Theoretical Computer Science, 14th Conference, Madras, India, December 15-17, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {880}, pages = {276--287}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58715-2\_131}, doi = {10.1007/3-540-58715-2\_131}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/KajiFK94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acl/SekiNKAK93, author = {Hiroyuki Seki and Ryuichi Nakanishi and Yuichi Kaji and Sachiko Ando and Tadao Kasami}, editor = {Lenhart K. Schubert}, title = {Parallel Multiple Context-Free Grammars, Finite-State Translation Systems, and Polynomial-Time Recognizable Subclasses of Lexical-Functional Grammars}, booktitle = {31st Annual Meeting of the Association for Computational Linguistics, 22-26 June 1993, Ohio State University, Columbus, Ohio, USA, Proceedings}, pages = {130--139}, publisher = {{ACL}}, year = {1993}, url = {https://aclanthology.org/P93-1018/}, doi = {10.3115/981574.981592}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acl/SekiNKAK93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.