default search action
Akiko Manada
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Takahiro Ota, Akiko Manada:
A Reconstruction of Circular Binary String Using Substrings and Minimal Absent Words. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(3): 409-416 (2024) - [c25]Takeru Inada, Sho Tsugawa, Akiko Manada, Kohei Watabe:
Effect of Retraining Graph Generative Models with Generated Graphs. COMPSAC 2024: 1512-1513 - [c24]Thamila E. H. Abeywickrama, Sho Tsugawa, Akiko Manada, Kohei Watabe:
Evaluation of Transformer-Based Encoder on Conditional Graph Generation. COMPSAC 2024: 1526-1527 - 2022
- [c23]Takahiro Ota, Akiko Manada:
A Necessary and Sufficient Condition for Reconstruction of Circular Binary String based on the Lengths of Substrings with Weights. ISITA 2022: 109-113 - [c22]Akiko Manada, Takahiro Ota, Hiroyoshi Morita:
The Maximum Run-Length Constrained Balanced Codes for Random-Access DNA Storage. ISITA 2022: 114-118 - 2021
- [j9]Akiko Manada, Kyohei Yoshida, Hiroyoshi Morita, Ryuichi Tatsukawa:
Corrections to "A Grouping Based on Local Girths for the Group Shuffled Belief Propagation Decoding". IEEE Commun. Lett. 25(7): 2440 (2021) - 2020
- [j8]Takahiro Ota, Hiroyoshi Morita, Akiko Manada:
Compression by Substring Enumeration Using Sorted Contingency Tables. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(6): 829-835 (2020) - [c21]Akiko Manada, Takahiro Ota, Hiroyoshi Morita:
Bonds of Constrained Systems and Their Characteristics. ISITA 2020: 240-244 - [c20]Takahiro Ota, Akiko Manada:
Addressing Information Using Data Hiding for DNA-based Storage Systems. ISITA 2020: 509-513
2010 – 2019
- 2019
- [j7]Takahiro Ota, Hiroyoshi Morita, Akiko Manada:
A Universal Two-Dimensional Source Coding by Means of Subblock Enumeration. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(2): 440-449 (2019) - [j6]Akiko Manada, Hiroyoshi Morita:
Graph Theoretical Analysis on Distributed Line Graphs for Peer-to-Peer Networks. IEEE Trans. Netw. Sci. Eng. 6(3): 326-335 (2019) - [c19]Youki Shiraishi, Akiko Manada, Yuzo Taenaka, Youki Kadobayashi:
A Method for Designing Proximity-Aware Regular Graph-Based Structured Overlay Networks. ICCCS 2019: 430-435 - [c18]Takahiro Ota, Ryoji Nakamura, Akiko Manada:
A Fast Node Arrangement Algorithm of Wireless Sensor Networks for Two-dimensional Constraints. ISIT 2019: 1512-1516 - [i8]A. J. Han Vinck, Kees A. Schouhamer Immink, Tadashi Wadayama, Van Khu Vu, Akiko Manada, Kui Cai, Shunsuke Horii, Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta, Xingwei Zhong, Zhen Mei, Renfei Bu, Jos H. Weber, Vitaly Skachek, Hiroyoshi Morita, N. Hovhannisyan, Hiroshi Kamabe, Shan Lu, Hirosuke Yamamoto, Kengo Hashimoto, Øyvind Ytrehus, Shigeaki Kuzuoka, Mikihiko Nishiara, Han Mao Kiah, Jun Muramatsu, Shigeki Miyake:
Proceedings of the 11th Asia-Europe Workshop on Concepts in Information Theory. CoRR abs/1907.02944 (2019) - 2018
- [j5]Tetsuya Kobayashi, Hiroyoshi Morita, Akiko Manada:
On the Capacity of Write-Constrained Memories. IEEE Trans. Inf. Theory 64(7): 5101-5109 (2018) - [c17]Hirohisa Kitahara, Hiroyoshi Morita, Akiko Manada:
Analysis of Walking Body Using Kinect2 and Application of Integer Code to WBAN. BODYNETS 2018: 255-263 - [c16]Takahiro Ota, Hiroyoshi Morita, Akiko Manada:
Compression by Substring Enumeration with a Finite Alphabet Using Sorting. ISITA 2018: 555-559 - 2017
- [c15]Akiko Manada, Hiroyoshi Morita:
On the capacities of balanced codes with run-length constraints. ISIT 2017: 1391-1395 - [i7]Kees A. Schouhamer Immink, Stan Baggen, Ferdaous Chaabane, Yanling Chen, Peter H. N. de With, Héla Gassara, Hamed Gharbi, Adel Ghazel, Khaled Grati, Naira M. Grigoryan, Ashot N. Harutyunyan, Masayuki Imanishi, Mitsugu Iwamoto, Ken-ichi Iwata, Hiroshi Kamabe, Brian M. Kurkoski, Shigeaki Kuzuoka, Patrick Langenhuizen, Jan Lewandowsky, Akiko Manada, Shigeki Miyake, Hiroyoshi Morita, Jun Muramatsu, Safa Najjar, Arnak V. Poghosyan, Fatma Rouissi, Yuta Sakai, Ulrich Tamm, Joost van der Putten, Fons van der Sommen, A. J. Han Vinck, Tadashi Wadayama, Dirk Wübben, Hirosuke Yamamoto:
Proceedings of Workshop AEW10: Concepts in Information Theory and Communications. CoRR abs/1707.08567 (2017) - 2016
- [j4]Akiko Manada, Kyohei Yoshida, Hiroyoshi Morita, Ryuichi Tatasukawa:
A Grouping Based on Local Girths for the Group Shuffled Belief Propagation Decoding. IEEE Commun. Lett. 20(11): 2133-2136 (2016) - [c14]Takahiro Ota, Akiko Manada, Hiroyoshi Morita:
A finite graph representation for two-dimensional finite type constrained systems. ISITA 2016: 51-55 - [c13]Takahiro Ota, Akiko Manada, Hiroyoshi Morita:
A two-dimensional antidictionary automaton for a toric surface. ISITA 2016: 71-75 - [i6]Takahiro Ota, Akiko Manada, Hiroyoshi Morita:
A Graph Representation for Two-Dimensional Finite Type Constrained Systems. CoRR abs/1602.00446 (2016) - [i5]Eimear Byrne, Akiko Manada:
A Graph Theoretical Analysis of Low-Power Coding Schemes for One-Hop Networks. CoRR abs/1606.00974 (2016) - 2015
- [c12]Tetsuya Kobayashi, Hiroyoshi Morita, Akiko Manada:
On rate tradeoffs for erasable write-once memory codes. ISIT 2015: 1312-1316 - 2014
- [c11]Ryuichi Tatsukawa, Akiko Manada, Hiroyoshi Morita:
Irregular Repeat Accumulate Codes Based on Max-Flow Algorithm for Energy-Saving Networks. BODYNETS 2014 - [c10]Tetsuya Kobayashi, Hiroyoshi Morita, Akiko Manada:
On the capacity of Write-Constrained Memories. ISIT 2014: 2252-2256 - [c9]Akiko Manada, Hiroyoshi Morita:
On some properties of distributed line graphs. ISITA 2014: 373-377 - [c8]Tetsuya Kobayashi, Hiroyoshi Morita, Akiko Manada:
Position modulation code for non-binary Write-Once Memories. ISITA 2014: 600-604 - 2013
- [j3]Akiko Manada, Navin Kashyap:
On the Zeta Function of a Periodic-Finite-Type Shift. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(6): 1024-1031 (2013) - [j2]Tetsuya Kobayashi, Akiko Manada, Takahiro Ota, Hiroyoshi Morita:
On the Irreducibility of Certain Shifts of Finite Type. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(12): 2415-2421 (2013) - [c7]Keigo Yokota, Akiko Manada, Hiroyoshi Morita:
An XOR Encoding for Wireless Body Area Networks. BODYNETS 2013: 240-243 - 2012
- [c6]Eimear Byrne, Akiko Manada:
On coding schemes for wireless body area networks. ISCIT 2012: 149-154 - [c5]Akiko Manada:
On a Shannon cover of certain reducible shift of finite type. ISITA 2012: 606-610 - 2011
- [c4]Eimear Byrne, Akiko Manada, Stevan Jovica Marinkovic, Emanuel M. Popovici:
A graph theoretical approach for network coding in wireless body area networks. ISIT 2011: 405-409 - [i4]Eimear Byrne, Akiko Manada, Stevan Jovica Marinkovic, Emanuel M. Popovici:
A Graph Theoretical Approach for Network Coding in Wireless Body Area Networks. CoRR abs/1102.3603 (2011)
2000 – 2009
- 2009
- [j1]Akiko Manada, Navin Kashyap:
A Comparative Study of Periods in a Periodic-Finite-Type Shift. SIAM J. Discret. Math. 23(3): 1507-1524 (2009) - [c3]Navin Kashyap, Akiko Manada:
The zeta function of a periodic-finite-type shift. ISIT 2009: 1569-1573 - [i3]Akiko Manada, Navin Kashyap:
The Zeta Function of a Periodic-Finite-Type Shift. CoRR abs/0904.2375 (2009) - 2008
- [c2]Akiko Manada, Navin Kashyap:
On the period of a periodic-finite-type shift. ISIT 2008: 1453-1457 - [i2]Akiko Manada, Navin Kashyap:
On the Period of a Periodic-Finite-Type Shift. CoRR abs/0801.1060 (2008) - 2006
- [c1]Akiko Manada, Navin Kashyap:
On the Shannon Covers of Certain Irreducible Constrained Systems of Finite Type. ISIT 2006: 1477-1481 - [i1]Akiko Manada, Navin Kashyap:
On the Shannon Covers of Certain Irreducible Constrained Systems of Finite Type. CoRR abs/cs/0604104 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-17 21:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint