Hideki Imai

From MaRDI portal
(Redirected from Person:583231)


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Combinatorial and geometric approaches to counting problems on linear matroids, graphic arrangements, and partial orders
Lecture Notes in Computer Science
2024-01-29Paper
Computing the Tutte polynomial of a graph of moderate size
 
2023-03-21Paper
OBDDs of a monotone function and of its prime implicants
 
2023-01-25Paper
Probing a set of hyperplanes by lines and related problems
Lecture Notes in Computer Science
2023-01-18Paper
FPT algorithms to enumerate and count acyclic and totally cyclic orientations
 
2022-04-27Paper
Extended formulations of lower-truncated transversal polymatroids
Optimization Methods & Software
2021-07-06Paper
FPT algorithms exploiting carving decomposition for Eulerian orientations and ice-type models
 
2018-06-15Paper
Parametric multiroute flow and its application to multilink-attack network
Discrete Optimization
2018-05-24Paper
How to Strengthen the Security of RSA-OAEP
IEEE Transactions on Information Theory
2017-07-27Paper
Fixed Initialization Decoding of LDPC Codes Over a Binary Symmetric Channel
IEEE Transactions on Information Theory
2017-07-12Paper
Quantum Error Correction Beyond the Bounded Distance Decoding Limit
IEEE Transactions on Information Theory
2017-07-12Paper
How to construct efficient signcryption schemes on elliptic curves
Information Processing Letters
2016-06-09Paper
Parametric multiroute flow and its application to robust network with \(k\) edge failures
Lecture Notes in Computer Science
2015-10-16Paper
scientific article; zbMATH DE number 6487863 (Why is no real title available?)
 
2015-09-30Paper
BDD operations for quantum graph states
Reversible Computation
2014-09-02Paper
Reducing the spread of damage of key exposures in key-insulated encryption
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128
Periodica Mathematica Hungarica
2014-02-17Paper
Proximity and motion planning on \(\ell _{1}\)-rigid planar periodic graphs
Transactions on Computational Science XX
2013-12-17Paper
A construction method of matroidal networks
Science China Information Sciences
2013-08-20Paper
Ciphertext Policy Multi-dimensional Range Encryption
Lecture Notes in Computer Science
2013-06-04Paper
Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function
Information Processing Letters
2012-10-23Paper
Time-specific encryption from forward-secure encryption
Lecture Notes in Computer Science
2012-09-25Paper
Calculating average joint Hamming weight for minimal weight conversion of \(d\) integers
WALCOM: Algorithms and Computation
2012-06-08Paper
Revisiting hyperbolic Voronoi diagrams in two and higher dimensions from theoretical, applied and generalized viewpoints
Lecture Notes in Computer Science
2012-03-09Paper
Matroid enumeration for incidence geometry
Discrete & Computational Geometry
2012-03-02Paper
Distinguishability measures and entropies for general probabilistic theories
Reports on Mathematical Physics
2011-06-03Paper
Physical Equivalence of Pure States and Derivation of Qubit in General Probabilistic Theories
 
2010-12-24Paper
Constructing Better KEMs with Partial Message Recovery
Information Security and Cryptology
2010-11-23Paper
No-cloning theorem on quantum logics
Journal of Mathematical Physics
2010-08-17Paper
Unconditionally secure electronic voting
Towards Trustworthy Elections
2010-06-17Paper
Efficient hybrid encryption from ID-based encryption
Designs, Codes and Cryptography
2010-03-02Paper
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations
Lecture Notes in Computer Science
2010-02-09Paper
The role of arbiters in asymmetric authentication schemes
Lecture Notes in Computer Science
2010-02-09Paper
Very-efficient anonymous password-authenticated key exchange and its extensions
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
2010-01-14Paper
Efficient constructions of deterministic encryption from hybrid encryption and code-based PKE
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
2010-01-14Paper
Attribute-based encryption supporting direct/indirect revocation modes
Cryptography and Coding
2010-01-07Paper
Leakage-resilient authenticated key establishment protocols
Lecture Notes in Computer Science
2010-01-05Paper
Advances in Cryptology - ASIACRYPT 2003
Lecture Notes in Computer Science
2010-01-05Paper
Unconditionally secure chaffing-and-winnowing for multiple use
Lecture Notes in Computer Science
2009-12-03Paper
Efficient oblivious transfer protocols achieving a non-zero rate from any non-trivial noisy correlation
Lecture Notes in Computer Science
2009-12-03Paper
An improvement of discrete Tardos fingerprinting codes
Designs, Codes and Cryptography
2009-10-14Paper
Generic Construction of Stateful Identity Based Encryption
Lecture Notes in Computer Science
2009-09-29Paper
Conjunctive Broadcast and Attribute-Based Encryption
Pairing-Based Cryptography – Pairing 2009
2009-08-18Paper
An approach for stream ciphers design based on joint computing over random and secret data
Computing
2009-08-10Paper
Deciding non-realizability of oriented matroids by semidefinite programming
 
2009-06-11Paper
Computational Geometry Analysis of Quantum State Space and Its Applications
Generalized Voronoi Diagram: A Geometry-Based Approach to Computational Intelligence
2009-05-20Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
Topics in Cryptology – CT-RSA 2004
Lecture Notes in Computer Science
2009-05-07Paper
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
Strong Anonymous Signatures
Information Security and Cryptology
2009-04-29Paper
A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange
Public Key Infrastructure
2009-04-23Paper
Semantic security for the McEliece cryptosystem without random oracles
Designs, Codes and Cryptography
2009-03-31Paper
Introduction to the Special Issue on Information Theoretic Security
IEEE Transactions on Information Theory
2009-02-24Paper
The Commitment Capacity of the Gaussian Channel Is Infinite
IEEE Transactions on Information Theory
2009-02-24Paper
Orthogonality between Key Privacy and Data Privacy, Revisited
Information Security and Cryptology
2009-02-10Paper
A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services
Research in Cryptology
2009-01-22Paper
Efficient Identity-Based Encryption with Tight Security Reduction
Cryptology and Network Security
2009-01-09Paper
On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC
IEEE Transactions on Information Theory
2008-12-21Paper
Modeling Bit Flipping Decoding Based on Nonorthogonal Check Sums With Application to Iterative Decoding Attack of McEliece Cryptosystem
IEEE Transactions on Information Theory
2008-12-21Paper
Modeling Block Decoding Approaches for the Fast Correlation Attack
IEEE Transactions on Information Theory
2008-12-21Paper
A fibre bundle over manifolds of quantum channels and its application to quantum statistics
Journal of Physics A: Mathematical and Theoretical
2008-10-21Paper
Relations Among Notions of Security for Identity Based Encryption Schemes
LATIN 2006: Theoretical Informatics
2008-09-18Paper
Algebraic Cryptanalysis of 58-Round SHA-1
Fast Software Encryption
2008-09-16Paper
Qubit channels which require four inputs to achieve capacity: implications for additivity conjectures
 
2008-09-03Paper
An information theoretical model for quantum secret sharing schemes
 
2008-09-03Paper
Error-correcting codes and cryptography
Applicable Algebra in Engineering, Communication and Computing
2008-08-20Paper
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
Advances in Information and Computer Security
2008-07-25Paper
An Authentication and Key Exchange Protocol for Secure Credential Services
Lecture Notes in Computer Science
2008-06-17Paper
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function
Provable Security
2008-06-10Paper
Formal Security Treatments for Signatures from Identity-Based Encryption
Provable Security
2008-06-10Paper
Bounded CCA2-Secure Encryption
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
An Improvement of Tardos’s Collusion-Secure Fingerprinting Codes with Very Short Lengths
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
2008-04-17Paper
On the Key-Privacy Issue of McEliece Public-Key Encryption
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
2008-04-17Paper
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption
Cryptology and Network Security
2008-04-15Paper
Trade-Off Traitor Tracing
Lecture Notes in Computer Science
2008-04-11Paper
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
Lecture Notes in Computer Science
2008-03-18Paper
Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations
Lecture Notes in Computer Science
2008-03-18Paper
Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks
Progress in Cryptology - INDOCRYPT 2005
2008-03-17Paper
An Efficient Aggregate Shuffle Argument Scheme
Financial Cryptography and Data Security
2008-03-07Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2008-02-19Paper
Generating facets for the cut polytope of a graph by triangular elimination
Mathematical Programming. Series A. Series B
2008-01-07Paper
Cryptography and Coding
Lecture Notes in Computer Science
2007-11-28Paper
Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA
Applied Cryptography and Network Security
2007-09-24Paper
Short Signature and Universal Designated Verifier Signature Without Random Oracles
Applied Cryptography and Network Security
2007-09-24Paper
IDS False Alarm Reduction Using Continuous and Discontinuous Patterns
Applied Cryptography and Network Security
2007-09-24Paper
An Efficient Compiler from Σ-Protocol to 2-Move Deniable Zero-Knowledge
Automata, Languages and Programming
2007-09-11Paper
Tag-KEM from Set Partial Domain One-Way Permutations
Information Security and Privacy
2007-09-07Paper
Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service
Information Security and Privacy
2007-09-07Paper
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT
Information Security and Privacy
2007-09-07Paper
Geometry of optimal estimation scheme forSU(D) channels
Journal of Physics A: Mathematical and Theoretical
2007-05-07Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Lecture Notes in Computer Science
2007-02-12Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Lecture Notes in Computer Science
2007-02-12Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Lecture Notes in Computer Science
2007-02-12Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Lecture Notes in Computer Science
2007-02-12Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Lecture Notes in Computer Science
2007-02-12Paper
Information Security and Cryptology
Lecture Notes in Computer Science
2006-11-14Paper
Security in Communication Networks
Lecture Notes in Computer Science
2006-10-10Paper
Progress in Cryptology – Mycrypt 2005
Lecture Notes in Computer Science
2006-10-05Paper
On the relationship between convex bodies related to correlation experiments with dichotomic observables
Journal of Physics A: Mathematical and General
2006-09-28Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
NUMBERS OF PRIMAL AND DUAL BASES OF NETWORK FLOW AND UNIMODULAR INTEGER PROGRAMS
Journal of the Operations Research Society of Japan
2006-06-14Paper
Two-party Bell inequalities derived from combinatorics via triangular elimination
Journal of Physics A: Mathematical and General
2006-01-13Paper
Topics in Cryptology – CT-RSA 2005
Lecture Notes in Computer Science
2005-12-08Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
Comparison Between XL and Gröbner Basis Algorithms
 
2005-08-12Paper
A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates
 
2005-08-12Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
Quantum versus deterministic counter automata
Theoretical Computer Science
2005-06-01Paper
Standard pairs for lawrence-type matrices and their applications to several lawrence-type integer programs
Optimization Methods & Software
2005-04-05Paper
scientific article; zbMATH DE number 2143016 (Why is no real title available?)
 
2005-03-08Paper
ENUMERATING TRIANGULATIONS IN GENERAL DIMENSIONS
International Journal of Computational Geometry & Applications
2004-09-29Paper
scientific article; zbMATH DE number 2102678 (Why is no real title available?)
 
2004-09-24Paper
Fast Correlation Attack Algorithm with List Decoding and an Application
Fast Software Encryption
2004-08-12Paper
scientific article; zbMATH DE number 2090014 (Why is no real title available?)
 
2004-08-12Paper
scientific article; zbMATH DE number 2086723 (Why is no real title available?)
 
2004-08-11Paper
scientific article; zbMATH DE number 2086336 (Why is no real title available?)
 
2004-08-11Paper
scientific article; zbMATH DE number 2085422 (Why is no real title available?)
 
2004-08-09Paper
scientific article; zbMATH DE number 2085434 (Why is no real title available?)
 
2004-08-09Paper
scientific article; zbMATH DE number 2080181 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 2080236 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 2081066 (Why is no real title available?)
 
2004-08-04Paper
Quantify entanglement by concurrence hierarchy
Journal of Physics A: Mathematical and General
2004-06-10Paper
Quantum parameter estimation of a generalized Pauli channel
Journal of Physics A: Mathematical and General
2004-06-10Paper
Phase-covariant quantum cloning
Journal of Physics A: Mathematical and General
2004-06-09Paper
scientific article; zbMATH DE number 2043335 (Why is no real title available?)
 
2004-02-16Paper
scientific article; zbMATH DE number 2043308 (Why is no real title available?)
 
2004-02-16Paper
scientific article; zbMATH DE number 2013818 (Why is no real title available?)
 
2003-12-07Paper
scientific article; zbMATH DE number 2013812 (Why is no real title available?)
 
2003-12-07Paper
scientific article; zbMATH DE number 1982619 (Why is no real title available?)
 
2003-09-16Paper
scientific article; zbMATH DE number 1980951 (Why is no real title available?)
 
2003-09-15Paper
On the distribution of the peak-to-average power ratio in OFDM signals
IEEE Transactions on Communications
2003-08-19Paper
Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks
Public Key Cryptography — PKC 2003
2003-07-27Paper
scientific article; zbMATH DE number 1953229 (Why is no real title available?)
 
2003-07-25Paper
scientific article; zbMATH DE number 1951613 (Why is no real title available?)
 
2003-07-21Paper
Unconditionally Secure Anonymous Encryption and Group Authentication
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1941243 (Why is no real title available?)
 
2003-06-29Paper
scientific article; zbMATH DE number 1941244 (Why is no real title available?)
 
2003-06-29Paper
scientific article; zbMATH DE number 1930143 (Why is no real title available?)
 
2003-06-18Paper
scientific article; zbMATH DE number 1759325 (Why is no real title available?)
 
2003-02-14Paper
scientific article; zbMATH DE number 1860710 (Why is no real title available?)
 
2003-01-28Paper
One-way probabilistic reversible and quantum one-counter automata.
Theoretical Computer Science
2003-01-21Paper
scientific article; zbMATH DE number 1618052 (Why is no real title available?)
 
2002-11-04Paper
scientific article; zbMATH DE number 1617941 (Why is no real title available?)
 
2002-09-01Paper
A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks
The Computer Journal
2002-08-28Paper
scientific article; zbMATH DE number 1618037 (Why is no real title available?)
 
2002-07-22Paper
scientific article; zbMATH DE number 1696659 (Why is no real title available?)
 
2002-07-22Paper
scientific article; zbMATH DE number 1766719 (Why is no real title available?)
Journal of the Operations Research Society of Japan
2002-07-11Paper
scientific article; zbMATH DE number 1766771 (Why is no real title available?)
Journal of the Operations Research Society of Japan
2002-07-11Paper
scientific article; zbMATH DE number 1766758 (Why is no real title available?)
Journal of the Operations Research Society of Japan
2002-07-11Paper
scientific article; zbMATH DE number 1759271 (Why is no real title available?)
 
2002-06-25Paper
Dualistic computational algebraic analyses of primal and dual minimum cost flow problems on acyclic tournament graphs
 
2002-06-17Paper
scientific article; zbMATH DE number 1408378 (Why is no real title available?)
 
2002-05-14Paper
scientific article; zbMATH DE number 1738653 (Why is no real title available?)
 
2002-05-07Paper
scientific article; zbMATH DE number 1424191 (Why is no real title available?)
 
2002-04-08Paper
scientific article; zbMATH DE number 1424199 (Why is no real title available?)
 
2002-03-18Paper
scientific article; zbMATH DE number 1583775 (Why is no real title available?)
 
2002-03-06Paper
scientific article; zbMATH DE number 1504561 (Why is no real title available?)
 
2002-01-29Paper
scientific article; zbMATH DE number 1504542 (Why is no real title available?)
 
2002-01-27Paper
Quantum identification protocol with technologically bounded parties
 
2001-10-14Paper
One-way probabilistic reversible and quantum one-counter automata
RIMS Kokyuroku
2001-09-23Paper
Gröbner bases of acyclic tournament graphs and hypergeometric systems on the group of unipotent matrices
RIMS Kokyuroku
2001-09-23Paper
Complexity of Gröbner bases for toric ideals of acyclic tournament graphs
RIMS Kokyuroku
2001-09-17Paper
Binary multilevel convolutional codes with unequal error protection capabilities
IEEE Transactions on Communications
2001-08-14Paper
scientific article; zbMATH DE number 1583794 (Why is no real title available?)
 
2001-04-03Paper
scientific article; zbMATH DE number 1568060 (Why is no real title available?)
 
2001-02-21Paper
scientific article; zbMATH DE number 1555978 (Why is no real title available?)
 
2001-01-24Paper
scientific article; zbMATH DE number 1504673 (Why is no real title available?)
 
2001-01-14Paper
Algorithms for the longest common subsequence problem for multiple strings based on geometric maxima
Optimization Methods & Software
2000-11-08Paper
Dynamic weighted Voronoi diagrams and weighted minimax matching of two corresponding point sets
Optimization Methods & Software
2000-10-10Paper
scientific article; zbMATH DE number 1511712 (Why is no real title available?)
 
2000-09-27Paper
scientific article; zbMATH DE number 1420972 (Why is no real title available?)
 
2000-09-04Paper
scientific article; zbMATH DE number 1420969 (Why is no real title available?)
 
2000-08-24Paper
Restriction, terms and nonlinearity of Boolean functions
Theoretical Computer Science
2000-08-23Paper
scientific article; zbMATH DE number 744106 (Why is no real title available?)
 
2000-07-04Paper
Comparing the MOV and FR Reductions in Elliptic Curve Cryptography
Advances in Cryptology — EUROCRYPT ’99
2000-06-07Paper
Relating differential distribution tables to other properties of substitution boxes
Designs, Codes and Cryptography
2000-06-04Paper
scientific article; zbMATH DE number 1398063 (Why is no real title available?)
 
2000-02-03Paper
scientific article; zbMATH DE number 1398082 (Why is no real title available?)
 
2000-02-03Paper
scientific article; zbMATH DE number 1341883 (Why is no real title available?)
 
2000-02-01Paper
scientific article; zbMATH DE number 1395339 (Why is no real title available?)
 
2000-01-30Paper
scientific article; zbMATH DE number 1379132 (Why is no real title available?)
 
1999-12-15Paper
scientific article; zbMATH DE number 1379531 (Why is no real title available?)
 
1999-12-15Paper
scientific article; zbMATH DE number 1379519 (Why is no real title available?)
 
1999-12-15Paper
scientific article; zbMATH DE number 1372655 (Why is no real title available?)
 
1999-12-01Paper
Applications of error-control coding
IEEE Transactions on Information Theory
1999-11-21Paper
scientific article; zbMATH DE number 1322334 (Why is no real title available?)
 
1999-11-08Paper
scientific article; zbMATH DE number 1322335 (Why is no real title available?)
 
1999-11-08Paper
A New Approach to the Analysis of Free Rotations of Rigid Bodies
ZAMM - Journal of Applied Mathematics and Mechanics / Zeitschrift für Angewandte Mathematik und Mechanik
1999-11-08Paper
scientific article; zbMATH DE number 1351090 (Why is no real title available?)
 
1999-10-24Paper
scientific article; zbMATH DE number 1351105 (Why is no real title available?)
 
1999-10-20Paper
Enhanced \(A^{*}\) algorithms for multiple alignments: optimal alignments for several sequences and k-opt approximate alignments for large cases
Theoretical Computer Science
1999-01-12Paper
scientific article; zbMATH DE number 1189383 (Why is no real title available?)
 
1998-08-13Paper
scientific article; zbMATH DE number 1107700 (Why is no real title available?)
 
1998-06-14Paper
scientific article; zbMATH DE number 1107684 (Why is no real title available?)
 
1998-05-12Paper
scientific article; zbMATH DE number 1186881 (Why is no real title available?)
 
1998-01-01Paper
scientific article; zbMATH DE number 1024017 (Why is no real title available?)
 
1997-12-08Paper
scientific article; zbMATH DE number 1062099 (Why is no real title available?)
 
1997-09-17Paper
scientific article; zbMATH DE number 1024096 (Why is no real title available?)
 
1997-07-20Paper
scientific article; zbMATH DE number 1024024 (Why is no real title available?)
 
1997-06-18Paper
On classes of rate k/(k+1) convolutional codes and their decoding techniques
IEEE Transactions on Information Theory
1997-05-12Paper
\(\varepsilon\)-approximations of \(k\)-label spaces
Theoretical Computer Science
1997-02-28Paper
A new unifying heuristic algorithm for the undirected minimum cut problems using minimum range cut algorithms
Discrete Applied Mathematics
1996-07-07Paper
scientific article; zbMATH DE number 697829 (Why is no real title available?)
 
1995-01-08Paper
A design of Reed-Solomon decoder with systolic-array structure
IEEE Transactions on Computers
1995-01-01Paper
scientific article; zbMATH DE number 503257 (Why is no real title available?)
 
1994-09-20Paper
scientific article; zbMATH DE number 503275 (Why is no real title available?)
 
1994-03-07Paper
scientific article; zbMATH DE number 503363 (Why is no real title available?)
 
1994-02-22Paper
scientific article; zbMATH DE number 503341 (Why is no real title available?)
 
1994-02-22Paper
scientific article; zbMATH DE number 503204 (Why is no real title available?)
 
1994-02-17Paper
Generalized concatenated codes for channels where unidirectional byte errors are predominant
IEEE Transactions on Information Theory
1994-02-07Paper
Orthogonal weightet linear \(L_ 1\) and \(L_ \infty\) approximation and applications
Discrete Applied Mathematics
1993-08-10Paper
scientific article; zbMATH DE number 177893 (Why is no real title available?)
 
1993-05-18Paper
Human Identification Through Insecure Channel
Advances in Cryptology — EUROCRYPT ’91
1993-05-18Paper
scientific article; zbMATH DE number 140468 (Why is no real title available?)
 
1993-03-28Paper
Combination of decoding of error-correcting codes and equalization for channels with intersymbol interference
Discrete Applied Mathematics
1992-06-27Paper
Finding k points with minimum diameter and related problems
Journal of Algorithms
1991-01-01Paper
scientific article; zbMATH DE number 4208002 (Why is no real title available?)
 
1991-01-01Paper
scientific article; zbMATH DE number 4207997 (Why is no real title available?)
 
1991-01-01Paper
scientific article; zbMATH DE number 4207998 (Why is no real title available?)
 
1991-01-01Paper
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses
Advances in Cryptology — CRYPTO’ 89 Proceedings
1990-01-01Paper
Computing simple circuits from a set of line segments
Discrete & Computational Geometry
1990-01-01Paper
Locating a robot with angle measurements
Journal of Symbolic Computation
1990-01-01Paper
Some classes of burst asymmetric or unidirectional error correcting codes
Electronics Letters
1990-01-01Paper
Some new binary codes correcting asymmetric/unidirectional errors
IEEE Transactions on Information Theory
1990-01-01Paper
scientific article; zbMATH DE number 4213303 (Why is no real title available?)
 
1990-01-01Paper
scientific article; zbMATH DE number 4168547 (Why is no real title available?)
 
1989-01-01Paper
scientific article; zbMATH DE number 4168549 (Why is no real title available?)
 
1989-01-01Paper
A linear-time algorithm for linear \(L_ 1\) approximation of points
Algorithmica
1989-01-01Paper
Notes on oriented depth-first search and longest paths
Information Processing Letters
1989-01-01Paper
Geometric relations among Voronoi diagrams
Geometriae Dedicata
1988-01-01Paper
scientific article; zbMATH DE number 4070803 (Why is no real title available?)
 
1988-01-01Paper
scientific article; zbMATH DE number 4074316 (Why is no real title available?)
 
1988-01-01Paper
Computing the volume of the union of spheres
The Visual Computer
1988-01-01Paper
On the convexity of the multiplicative version of Karmarkar's potential function
Mathematical Programming. Series A. Series B
1988-01-01Paper
Shortest path between two simple polygons
Information Processing Letters
1987-01-01Paper
A Construction Method of High-Speed Decoders Using ROM's for Bose–Chaudhuri–Hocquenghem and Reed–Solomon Codes
IEEE Transactions on Computers
1987-01-01Paper
EXTENSIONS OF THE MULTIPLICATIVE PENALTY FUNCTION METHOD FOR LINEAR PROGRAMMING
Journal of the Operations Research Society of Japan
1987-01-01Paper
scientific article; zbMATH DE number 4059112 (Why is no real title available?)
 
1987-01-01Paper
Dynamic orthogonal segment intersection search
Journal of Algorithms
1987-01-01Paper
scientific article; zbMATH DE number 4044614 (Why is no real title available?)
 
1987-01-01Paper
WORST-CASE ANALYSIS FOR PLANAR MATCHING AND TOUR HEURISTICS WITH BUCKETING TECHNIQUES AND SPACEFILLING CURVES
Journal of the Operations Research Society of Japan
1986-01-01Paper
scientific article; zbMATH DE number 4026646 (Why is no real title available?)
 
1986-01-01Paper
Efficient Algorithms for Geometric Graph Search Problems
SIAM Journal on Computing
1986-01-01Paper
Visibility of disjoint polygons
Algorithmica
1986-01-01Paper
A multiplicative barrier function method for linear programming
Algorithmica
1986-01-01Paper
scientific article; zbMATH DE number 3965972 (Why is no real title available?)
 
1986-01-01Paper
scientific article; zbMATH DE number 3974880 (Why is no real title available?)
 
1985-01-01Paper
On combinatorial structures of line drawings of polyhedra
Discrete Applied Mathematics
1985-01-01Paper
Voronoi Diagram in the Laguerre Geometry and Its Applications
SIAM Journal on Computing
1985-01-01Paper
scientific article; zbMATH DE number 3945343 (Why is no real title available?)
 
1985-01-01Paper
PRACTICAL EFFICIENCIES OF EXISTING SHORTEST-PATH ALGORITHMS AND A NEW BUCKET ALGORITHM
Journal of the Operations Research Society of Japan
1984-01-01Paper
NETWORK-FLOW ALGORITHMS FOR LOWER-TRUNCATED TRANSVERSAL POLYMATROIDS
Journal of the Operations Research Society of Japan
1983-01-01Paper
Finding the connected components and a maximum clique of an intersection graph of rectangles in the plane
Journal of Algorithms
1983-01-01Paper
ON THE PRACTICAL EFFICIENCY OF VARIOUS MAXIMUM FLOW ALGORITHMS
Journal of the Operations Research Society of Japan
1983-01-01Paper
scientific article; zbMATH DE number 3898275 (Why is no real title available?)
 
1983-01-01Paper
Finding connected components of an intersection graph of squares in the Euclidean plane
Information Processing Letters
1982-01-01Paper
Generalized tensor product codes
IEEE Transactions on Information Theory
1981-01-01Paper
Correction to 'A New Multilevel Coding Method Using Error-Correcting Codes'
IEEE Transactions on Information Theory
1977-01-01Paper
A new multilevel coding method using error-correcting codes
IEEE Transactions on Information Theory
1977-01-01Paper
A theory of two-dimensional cyclic codes
Information and Control
1977-01-01Paper
A construction method for path-invariant comma-free codes (Corresp.)
IEEE Transactions on Information Theory
1974-01-01Paper
Two-dimensional Fire codes
IEEE Transactions on Information Theory
1973-01-01Paper
A theory of two-dimensional linear recurring arrays
IEEE Transactions on Information Theory
1972-01-01Paper
Lazy states: sufficient and necessary condition for zero quantum entropy rates under any coupling to the environment
 
N/APaper
Quantum Quasi-Cyclic LDPC Codes
 
N/APaper


Research outcomes over time


This page was built for person: Hideki Imai