Keyword : information-spectrum methods


Redundancy-Optimal FF Codes for a General Source and Its Relationships to the Rate-Optimal FF Codes
Mitsuharu ARIMURA Hiroki KOGA Ken-ichi IWATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/12/01
Vol. E96-A  No. 12 ; pp. 2332-2342
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Source Coding
Keyword: 
fixed-to-fixed length source codinginformation-spectrum methodsgeneral sourcescoding rateredundancy
 Summary | Full Text:PDF

On the Achievable Rate Region in the Optimistic Sense for Separate Coding of Two Correlated General Sources
Hiroki KOGA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/12/01
Vol. E95-A  No. 12 ; pp. 2100-2106
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Source Coding
Keyword: 
correlated sourcesgeneral sourceoptimistic codingachievable rate regioninformation-spectrum methods
 Summary | Full Text:PDF

Four Limits in Probability and Their Roles in Source Coding
Hiroki KOGA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/11/01
Vol. E94-A  No. 11 ; pp. 2073-2082
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Source Coding
Keyword: 
coding theoreminformation-spectrum methodsoptimistic codingstrong converse propertysmooth Renyi entropy
 Summary | Full Text:PDF

A Generalization of the Simmons' Bounds on Secret-Key Authentication Systems
Hiroki KOGA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/10/25
Vol. E83-A  No. 10 ; pp. 1983-1986
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
authenticationimpersonation attacksubstitution attackinformation-theoretic boundsinformation-spectrum methods
 Summary | Full Text:PDF