Hirosuke Yamamoto
Orcid: 0000-0001-6297-8838
According to our database1,
Hirosuke Yamamoto
authored at least 110 papers
between 1979 and 2024.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2011, "For contributions to source coding and information-theoretic secure coding".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Encoding and Decoding Algorithms of ANS Variants and Evaluation of Their Average Code Lengths.
CoRR, 2024
Proceedings of the IEEE International Symposium on Information Theory, 2024
Proceedings of the IEEE International Symposium on Information Theory, 2024
2022
Proceedings of the International Symposium on Information Theory and Its Applications, 2022
Proceedings of the IEEE International Symposium on Information Theory, 2022
2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
2020
IEEE Trans. Inf. Theory, 2020
An Algorithm for Constructing the Optimal Code Trees for Binary Alphabetic AIFV-m Codes.
Proceedings of the IEEE Information Theory Workshop, 2020
Proceedings of the IEEE International Symposium on Information Theory, 2020
Proceedings of the IEEE International Symposium on Information Theory, 2020
2019
CoRR, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
An Iterative Algorithm to Optimize the Average Performance of Markov Chains with Finite States.
Proceedings of the IEEE International Symposium on Information Theory, 2019
2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
2017
IEEE Trans. Inf. Theory, 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
CoRR, 2017
CoRR, 2017
Proceedings of the 2017 IEEE Information Theory Workshop, 2017
Application of Yamamoto-Itoh coding scheme to discrete memoryless broadcast channels.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
CoRR, 2016
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
Proceedings of the IEEE International Symposium on Information Theory, 2016
Proceedings of the IEEE International Symposium on Information Theory, 2016
Proceedings of the IEEE International Symposium on Information Theory, 2016
2015
Proceedings of the 2015 IEEE Information Theory Workshop, 2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
2013
IEEE Trans. Inf. Theory, 2013
IEEE Trans. Inf. Theory, 2013
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
2012
Coding Theorems for a (2, 2)-Threshold Scheme With Detectability of Impersonation Attacks.
IEEE Trans. Inf. Theory, 2012
Probl. Inf. Transm., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
On Reliability Function of Gaussian Channel with Noisy Feedback: Zero Transmission Rate
CoRR, 2012
Proceedings of the International Symposium on Information Theory and its Applications, 2012
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
On decoding error exponent of Gaussian channel with noisy feedback: Nonexponential number of messages.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
2011
Proceedings of the Information Security Applications - 12th International Workshop, 2011
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
CoRR, 2010
Error exponents of discrete memoryless channels and AWGN channels with noisy feedback.
Proceedings of the International Symposium on Information Theory and its Applications, 2010
Proceedings of the IEEE International Symposium on Information Theory, 2010
Representative sequence selection in unsupervised anomaly detection using spectrum kernel with theoretical parameter setting.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010
Data Compression Based on a Dictionary Method Using Recursive Construction of T-Codes.
Proceedings of the 2010 Data Compression Conference (DCC 2010), 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Proceedings of the IEEE International Symposium on Information Theory, 2009
A coding theorem for cheating-detectable (2, 2)-threshold blockwise secret sharing schemes.
Proceedings of the IEEE International Symposium on Information Theory, 2009
Separate network coding for private and common messages from one source to two sinks.
Proceedings of the IEEE International Symposium on Information Theory, 2009
A differential equation method to derive the formulas of the T-complexity and the LZ-complexity.
Proceedings of the IEEE International Symposium on Information Theory, 2009
Anomaly Detection Using Time Index Differences of Identical Symbols with and without Training Data.
Proceedings of the Advanced Data Mining and Applications, 5th International Conference, 2009
2008
Coding Theorems for the Shannon Cipher System With a Guessing Wiretapper and Correlated Source Outputs.
IEEE Trans. Inf. Theory, 2008
Probl. Inf. Transm., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
2007
Optimal Multiple Assignments Based on Integer Programming in Secret Sharing Schemes with General Access Structures.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Proceedings of the IEEE International Symposium on Information Theory, 2007
2006
Inf. Process. Lett., 2006
2005
IEEE Trans. Inf. Theory, 2005
IEEE Trans. Inf. Theory, 2005
CoRR, 2005
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005
2004
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
2003
IEEE Trans. Inf. Theory, 2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
2002
The Optimal <i>n</i>-out-of-<i>n</i> Visual Secret Sharing Scheme for Gray-Scale Images.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
2001
Average-sense optimality and competitive optimality for almost instantaneous VF codes.
IEEE Trans. Inf. Theory, 2001
2000
IEEE Trans. Inf. Theory, 2000
1997
1996
IEEE Trans. Inf. Theory, 1996
1995
1994
Coding theorems for Shannon's cipher system with correlated source outputs, and common information.
IEEE Trans. Inf. Theory, 1994
1991
IEEE Trans. Inf. Theory, 1991
A coding theorem for secret sharing communication systems with two Gaussian wiretap channels.
IEEE Trans. Inf. Theory, 1991
IEEE Trans. Inf. Theory, 1991
1989
IEEE Trans. Inf. Theory, 1989
Syst. Comput. Jpn., 1989
1988
A rate-distortion problem for a communication system with a secondary decoder to be hindered.
IEEE Trans. Inf. Theory, 1988
1986
IEEE Trans. Inf. Theory, 1986
1983
A source coding problem for sources with additional outputs to keep secret from the receiver or wiretappers.
IEEE Trans. Inf. Theory, 1983
Correction to 'Wyner-Ziv theory for a general function of the correlated sources' (Sep 82 803-807).
IEEE Trans. Inf. Theory, 1983
1982
IEEE Trans. Inf. Theory, 1982
1981
IEEE Trans. Inf. Theory, 1981
1980
IEEE Trans. Inf. Theory, 1980
Correction to 'Asymptotic Performance of a Modified Schalkwijk-Barron Scheme for Channels with Noiseless Feedback'.
IEEE Trans. Inf. Theory, 1980
1979
Asymptotic performance of a modified Schalkwijk-Barron scheme for channels with noiseless feedback (Corresp.).
IEEE Trans. Inf. Theory, 1979