Tokyo Gas

Displaying 1-8 of 8 results

  • White Papers // Sep 2013

    Dynamic Extraction of Key Paper From the Cluster Using Variance Values of Cited Literature

    When looking into recent research trends in the field of academic landscape, citation network analysis is common and automated clustering of many academic papers has been achieved by making good use of various techniques. However, specifying the features of each area identified by automated clustering or dynamically extracted key papers...

    Provided By Tokyo Gas

  • White Papers // Sep 2012

    New Parameters of Linear Codes Expressing Security Performance of Universal Secure Network Coding

    The universal secure network coding presented by Silva et al. realizes secure and reliable transmission of a secret message over any underlying network code, by using maximum rank distance codes. Inspired by their result, this paper considers the secure network coding based on arbitrary linear codes, and investigates its security...

    Provided By Tokyo Gas

  • White Papers // Jul 2012

    The Effects of Business Process Orientation on Innovation

    With the evolution of customer's needs, innovation becomes a core competency of organizations to success in the intense global competition nowadays. Business Process Orientation (BPO), as \"A state of mind\" of the organization, emphasizes to employ a customer-and-process-oriented way to rethink and reengineer business. It is interesting and important to...

    Provided By Tokyo Gas

  • White Papers // May 2011

    Strong Security and Separated Code Constructions for the Broadcast Channels With Confidential Messages

    The authors show that the capacity region of the broadcast channel with confidential messages does not change when the strong security criterion is adopted instead of the weak security criterion traditionally used. They also show a construction method of coding for the broadcast channel with confidential messages by using an...

    Provided By Tokyo Gas

  • White Papers // Mar 2010

    CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model

    Proxy Re-Encryption (PRE) is a cryptographic application proposed by the researchers. It is an encryption system with a special property in which the semi-honest third party, the proxy, can re-encrypt ciphertexts for Alice into other ciphertexts for Bob without using Alice's secret key. The authors can classify PRE into bidirectional...

    Provided By Tokyo Gas

  • White Papers // Oct 2009

    Low-Complexity Algorithm for Log Likelihood Ratios in Coded MIMO-OFDM Communications

    In this paper, the authors propose a low-complexity algorithm to calculate Log Likelihood Ratios (LLRs) of coded bits, which is necessary for channel decoding in coded MIMO-OFDM mobile communications. An approximate LLR needs to find a pair of transmitted signal candidates that can maximize the log likelihood function under a...

    Provided By Tokyo Gas

  • White Papers // Feb 2009

    Business Process-Based View of Inter-Firm Relationships

    A business process based view of inter-firm relationship is proposed and discussed in this paper. The authors define inter-firm relationships as a broad range of relationships including strategic alliances, joint ventures, and Mergers and Acquisitions (M&A) or other equity-based relationships in this paper. Inter-firm relationships are some of the most...

    Provided By Tokyo Gas

  • White Papers // Sep 2008

    Using Common Criteria as Reusable Knowledge in Security Requirements Elicitation

    The elicitation of Security Requirements (SRs) is a crucial issue to develop secure information systems of high quality. Although, the authors have several methods mainly for functional requirements such as goal-oriented methods and use case modeling, most of them do not provide sufficient supports to identify threats, security objectives and...

    Provided By Tokyo Gas

  • White Papers // Oct 2009

    Low-Complexity Algorithm for Log Likelihood Ratios in Coded MIMO-OFDM Communications

    In this paper, the authors propose a low-complexity algorithm to calculate Log Likelihood Ratios (LLRs) of coded bits, which is necessary for channel decoding in coded MIMO-OFDM mobile communications. An approximate LLR needs to find a pair of transmitted signal candidates that can maximize the log likelihood function under a...

    Provided By Tokyo Gas

  • White Papers // Sep 2012

    New Parameters of Linear Codes Expressing Security Performance of Universal Secure Network Coding

    The universal secure network coding presented by Silva et al. realizes secure and reliable transmission of a secret message over any underlying network code, by using maximum rank distance codes. Inspired by their result, this paper considers the secure network coding based on arbitrary linear codes, and investigates its security...

    Provided By Tokyo Gas

  • White Papers // May 2011

    Strong Security and Separated Code Constructions for the Broadcast Channels With Confidential Messages

    The authors show that the capacity region of the broadcast channel with confidential messages does not change when the strong security criterion is adopted instead of the weak security criterion traditionally used. They also show a construction method of coding for the broadcast channel with confidential messages by using an...

    Provided By Tokyo Gas

  • White Papers // Mar 2010

    CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model

    Proxy Re-Encryption (PRE) is a cryptographic application proposed by the researchers. It is an encryption system with a special property in which the semi-honest third party, the proxy, can re-encrypt ciphertexts for Alice into other ciphertexts for Bob without using Alice's secret key. The authors can classify PRE into bidirectional...

    Provided By Tokyo Gas

  • White Papers // Sep 2008

    Using Common Criteria as Reusable Knowledge in Security Requirements Elicitation

    The elicitation of Security Requirements (SRs) is a crucial issue to develop secure information systems of high quality. Although, the authors have several methods mainly for functional requirements such as goal-oriented methods and use case modeling, most of them do not provide sufficient supports to identify threats, security objectives and...

    Provided By Tokyo Gas

  • White Papers // Sep 2013

    Dynamic Extraction of Key Paper From the Cluster Using Variance Values of Cited Literature

    When looking into recent research trends in the field of academic landscape, citation network analysis is common and automated clustering of many academic papers has been achieved by making good use of various techniques. However, specifying the features of each area identified by automated clustering or dynamically extracted key papers...

    Provided By Tokyo Gas

  • White Papers // Feb 2009

    Business Process-Based View of Inter-Firm Relationships

    A business process based view of inter-firm relationship is proposed and discussed in this paper. The authors define inter-firm relationships as a broad range of relationships including strategic alliances, joint ventures, and Mergers and Acquisitions (M&A) or other equity-based relationships in this paper. Inter-firm relationships are some of the most...

    Provided By Tokyo Gas

  • White Papers // Jul 2012

    The Effects of Business Process Orientation on Innovation

    With the evolution of customer's needs, innovation becomes a core competency of organizations to success in the intense global competition nowadays. Business Process Orientation (BPO), as \"A state of mind\" of the organization, emphasizes to employ a customer-and-process-oriented way to rethink and reengineer business. It is interesting and important to...

    Provided By Tokyo Gas