Vol. E89-A, No. 5 May 2006

Open Access Open Access  Restricted Access Subscription Access

Table of Contents

Foreword

FOREWORD PDF
Satoshi FUJITA 1159-1159

Letters

Sublogarithmic Space-Bounded Multi-Inkdot Alternating Turing Machines with Only Existential (Universal) States PDF
Tsunehiro YOSHINAGA, Jianliang XU, Katsushi INOUE 1417-1420
Maurer-Yacobi ID-Based Key Distribution Revisited PDF
Noboru KUNIHIRO, Wataru ABE, Kazuo OHTA 1421-1424
Inapproximability of the Edge-Contraction Problem PDF
Hideaki OTSUKI, Tomio HIRATA 1425-1427
Robust Blind Equalization Algorithms Based on the Constrained Maximization of a Fourth-Order Cumulant Function PDF
Kiyotaka KOHNO, Mitsuru KAWAMOTO, Asoke K. NANDI, Yujiro INOUYE 1495-1499
2-D Laplace-Z Transformation PDF
Yang XIAO, Moon Ho LEE 1500-1504
An Enhanced Time-Domain Circuit Simulation Technique Based on LIM PDF
Hidemasa KUBOTA, Yuichi TANJI, Takayuki WATANABE, Hideki ASAI 1505-1506
Solving the Graph Planarization Problem Using an Improved Genetic Algorithm PDF
Rong-Long WANG, Kozo OKAZAKI 1507-1512
The Characteristic Generators for a Group Code PDF
Haibin KAN, Xuefei LI, Hong SHEN 1513-1517
Evaluation of the T-DMB Standard and the Transmission System by Using Ensemble Remultiplexer PDF
Byungjun BAE, Joungil YUN, Chunghyun AHN, Soo-In LEE, Kyu-Ik SOHNG 1518-1521

Papers

A Steepest Descent Algorithm for M-Convex Functions on Jump Systems PDF
Kazuo MUROTA, Ken'ichiro TANAKA 1160-1165
Using Linear Hybrid Cellular Automata to Attack the Shrinking Generator PDF
Pino CABALLERO- GIL, Amparo FUSTER- SABATER 1166-1172
Balanced C4-Trefoil Decomposition of Complete Multi-Graphs PDF
Kazuhiko USHIO, Hideaki FUJIMOTO 1173-1180
Coding Floorplans with Fewer Bits PDF
Katsuhisa YAMANAKA, Shin-ichi NAKANO 1181-1185
Competitive Analysis of Multi-Queue Preemptive QoS Algorithms for General Priorities PDF
Toshiya ITOH, Noriyuki TAKAHASHI 1186-1197
Bounds on the Client-Server Incremental Computing PDF
Cho-chin LIN, Da-wei WANG, Tsan-sheng HSU 1198-1206
On Reconfiguring Radial Trees PDF
Yoshiyuki KUSAKARI 1207-1214
Dynamic Programming and Clique Based Approaches for Protein Threading with Profiles and Constraints PDF
Tatsuya AKUTSU, Morihiro HAYASHIDA, Dukka Bahadur K.C. (none), Etsuji TOMITA, Jun'ichi SUZUKI, Katsuhisa HORIMOTO 1215-1222
Topological Book Embedding of Bipartite Graphs PDF
Miki MIYAUCHI 1223-1226
The Symmetric Quadratic Semi-Assignment Polytope PDF
Hiroo SAITO 1227-1232
Taxonomical Security Consideration of OAEP Variants PDF
Yuichi KOMANO, Kazuo OHTA 1233-1245
A Weil Descent Attack against Elliptic Curve Cryptosystems over Quartic Extension Fields PDF
Seigo ARITA, Kazuto MATSUO, Koh-ichi NAGAO, Mahoro SHIMURA 1246-1254
Practical Application of Lattice Basis Reduction Algorithm to Side-Channel Analysis on (EC)DSA PDF
Katsuyuki TAKASHIMA 1255-1262
A Fast Edge-Splitting Algorithm in Edge-Weighted Graphs PDF
Hiroshi NAGAMOCHI 1263-1268
A Minimum Feedback Vertex Set in the Trivalent Cayley Graph PDF
Yuuki TANAKA, Yukio SHIBATA 1269-1274
Group Signature Schemes with Membership Revocation for Large Groups PDF
Toru NAKANISHI, Nobuo FUNABIKI 1275-1283
Construction of Classifiers by Iterative Compositions of Features with Partial Knowledge PDF
Kazuya HARAGUCHI, Toshihide IBARAKI 1284-1291
Efficient Methods for Determining DNA Probe Orders PDF
Hiro ITO, Kazuo IWAMA, Takeyuki TAMURA 1292-1298
Transformation of a Parity-Check Matrix for a Message-Passing Algorithm over the BEC PDF
Naoto KOBAYASHI, Toshiyasu MATSUSHIMA, Shigeichi HIRASAWA 1299-1306
A Note on Construction of Orthogonal Arrays with Unequal Strength from Error-Correcting Codes PDF
Tomohiko SAITO, Toshiyasu MATSUSHIMA, Shigeichi HIRASAWA 1307-1315
Enhanced Exhaustive Search Attack on Randomized BSD Type Countermeasure PDF
Dong-Guk HAN, Katsuyuki OKEYA, Tae Hyun KIM, Yoon Sung HWANG, Beomin KIM, Young-Ho PARK 1316-1327
An Efficient Group Signature Scheme from Bilinear Maps PDF
Jun FURUKAWA, Hideki IMAI 1328-1338
Signature Scheme in Multi-User Setting PDF
Chik-How TAN 1339-1345
An Energy Efficient Ranking Protocol for Radio Networks PDF
Koji NAKANO 1346-1354
An Energy Efficient Leader Election Protocol for Radio Network with a Single Transceiver PDF
Jacir Luiz BORDIM, Yasuaki ITO, Koji NAKANO 1355-1361
Defeating Simple Power Analysis on Koblitz Curves PDF
Camille VUILLAUME, Katsuyuki OKEYA, Tsuyoshi TAKAGI 1362-1369
Maximum-Cover Source-Location Problems PDF
Kenya SUGIHARA, Hiro ITO 1370-1377
A Quantum Protocol to Win the Graph Colouring Game on All Hadamard Graphs PDF
David AVIS, Jun HASEGAWA, Yosuke KIKUCHI, Yuuya SASAKI 1378-1381
Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares PDF
Mitsugu IWAMOTO, Lei WANG, Kazuki YONEYAMA, Noboru KUNIHIRO, Kazuo OHTA 1382-1395
A Provably Secure Refreshable Partially Anonymous Token and Its Applications PDF
Rie SHIGETOMI, Akira OTSUKA, Jun FURUKAWA, Keith MARTIN, Hideki IMAI 1396-1406
Dependent Randomized Rounding to the Home-Away Assignment Problem in Sports Scheduling PDF
Ayami SUZUKA, Ryuhei MIYASHIRO, Akiko YOSHISE, Tomomi MATSUI 1407-1416
MEG Analysis with Spatial Filtered Reconstruction PDF
Shinpei OKAWA, Satoshi HONDA 1428-1436
Perfect Tracking Control of Nonminimum Phase Systems in Magnetic Levitation System PDF
Feng LI, Jianming LU, Xueqin ZHAO, Takashi YAHAGI 1437-1445
Control Performance of Discrete-Time Fuzzy Systems Improved by Neural Networks PDF
Chien-Hsing SU, Cheng-Sea HUANG, Kuang-Yow LIAN 1446-1453
Performance Analysis of MIMO Systems in Spatially Correlated Fading Using Matrix-Monotone Functions PDF
Eduard A. JORSWIECK, Holger BOCHE 1454-1472
A Software Definable Architecture for Adaptive Space Diversity at Handsets in MC-CDMA Systems PDF
K. Robert LAI, Yuan-Lung CHANG 1473-1483
2-D Iteratively Reweighted Least Squares Lattice Algorithm and Its Application to Defect Detection in Textured Images PDF
Ru<img src="/img_font/mos00223.jpg" bord (none), Cenker ODEN, Ay<img src="/img_font/mos00223.jpg" bord (none), Aytul ER&Ccedil;<img src="/img_font/sg00 (none) 1484-1494