Skip to main content

Showing 1–41 of 41 results for author: Itoh, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.02447  [pdf, ps, other

    cs.HC

    Visualization for interactively adjusting the de-bias effect of word embedding

    Authors: Arisa Sugino, Takayuki Itoh

    Abstract: Word embedding, which converts words into numerical values, is an important natural language processing technique and widely used. One of the serious problems of word embedding is that the bias will be learned and affect the model if the dataset used for pre-training contains bias. On the other hand, indiscriminate removal of bias from word embeddings may result in the loss of information, even if… ▽ More

    Submitted 3 June, 2025; originally announced June 2025.

  2. arXiv:2506.00028  [pdf, ps, other

    cs.HC

    Visualization and Comparison of AOI Transitions with Force-Directed Graph Layout

    Authors: Yuri Miyagi, Nils Rodrigues, Daniel Weiskopf, Takayuki Itoh

    Abstract: By analyzing the gaze trajectories of people viewing screens and advertisements, we can determine what people are interested in. This knowledge can be effective when recommending commercial products and services, and also, when improving advertisement design. Therefore, analysis and visualization of eye gaze have been an active research topic. This paper proposes a new method for visualizing patte… ▽ More

    Submitted 24 May, 2025; originally announced June 2025.

  3. arXiv:2408.06601  [pdf, other

    cs.HC cs.GR

    HiRegEx: Interactive Visual Query and Exploration of Multivariate Hierarchical Data

    Authors: Guozheng Li, Haotian Mi, Chi Harold Liu, Takayuki Itoh, Guoren Wang

    Abstract: When using exploratory visual analysis to examine multivariate hierarchical data, users often need to query data to narrow down the scope of analysis. However, formulating effective query expressions remains a challenge for multivariate hierarchical data, particularly when datasets become very large. To address this issue, we develop a declarative grammar, HiRegEx (Hierarchical data Regular Expres… ▽ More

    Submitted 12 August, 2024; originally announced August 2024.

    Comments: 11 pages, 8 figures, accepted at IEEE VIS 2024

    MSC Class: 65D18 ACM Class: I.3.6

  4. arXiv:2406.03778  [pdf, other

    cs.DS cs.DM

    A Nearly Optimal Deterministic Algorithm for Online Transportation Problem

    Authors: Tsubasa Harada, Toshiya Itoh

    Abstract: For the online transportation problem with $m$ server sites, it has long been known that the competitive ratio of any deterministic algorithm is at least $2m-1$. Kalyanasundaram and Pruhs conjectured in 1998 that a deterministic $(2m-1)$-competitive algorithm exists for this problem, a conjecture that has remained open for over two decades. In this paper, we propose a new deterministic algorithm… ▽ More

    Submitted 23 April, 2025; v1 submitted 6 June, 2024; originally announced June 2024.

    Comments: 34 pages

  5. arXiv:2311.10585  [pdf, ps, other

    cs.CC

    Popularity on the 3D-Euclidean Stable Roommates

    Authors: Steven Ge, Toshiya Itoh

    Abstract: We study the 3D-Euclidean Multidimensional Stable Roommates problem, which asks whether a given set $V$ of $s\cdot n$ agents with a location in 3-dimensional Euclidean space can be partitioned into $n$ disjoint subsets $π= \{R_1 ,\dots , R_n\}$ with $|R_i| = s$ for each $R_i \in π$ such that $π$ is (strictly) popular, where $s$ is the room size. A partitioning is popular if there does not exist an… ▽ More

    Submitted 17 November, 2023; originally announced November 2023.

    Comments: 27 pages, 23 figures

    MSC Class: 91A68; 91A10; 68Q25; 68Q17 ACM Class: F.2.2; G.2.1

  6. arXiv:2308.05933  [pdf, ps, other

    cs.DS cs.DM

    Competitive Analysis of Online Facility Assignment for General Layout of Servers on a Line

    Authors: Tsubasa Harada, Toshiya Itoh

    Abstract: In the online facility assignment on a line ${\rm OFAL}(S,c)$ with a set $S$ of $k$ servers and a capacity $c:S\to\mathbb{N}$, each server $s\in S$ with a capacity $c(s)$ is placed on a line, and a request arrives on a line one-by-one. The task of an online algorithm is to irrevocably match a current request with one of the servers with vacancies before the next request arrives. An algorithm can m… ▽ More

    Submitted 11 August, 2023; originally announced August 2023.

    Comments: 21 pages

  7. arXiv:2303.11825  [pdf, other

    cs.HC

    The MERCADO Workshop at IEEE VIS 2023: Multimodal Experiences for Remote Communication Around Data Online

    Authors: Matthew Brehmer, Maxime Cordeil, Christophe Hurter, Takayuki Itoh

    Abstract: We propose a half-day workshop at IEEE VIS 2023 on the topic of communication and collaboration around data. Specifically, we aim to gather researchers interested on multimodal, synchronous, and remote or hybrid forms of communication and collaboration within organizational and educational settings. This topic lies at the intersection of data visualization, human-computer interaction, and computer… ▽ More

    Submitted 12 April, 2023; v1 submitted 21 March, 2023; originally announced March 2023.

    Comments: Workshop accepted for IEEE VIS 2023 (https://ieeevis.org/year/2023/info/workshops): October 22 - 27 in Melbourne, Australia. Website: https://sites.google.com/view/mercadoworkshop

  8. Health Guardian Platform: A technology stack to accelerate discovery in Digital Health research

    Authors: Bo Wen, Vince S. Siu, Italo Buleje, Kuan Yu Hsieh, Takashi Itoh, Lukas Zimmerli, Nigel Hinds, Elif Eyigoz, Bing Dang, Stefan von Cavallar, Jeffrey L. Rogers

    Abstract: This paper highlights the design philosophy and architecture of the Health Guardian, a platform developed by the IBM Digital Health team to accelerate discoveries of new digital biomarkers and development of digital health technologies. The Health Guardian allows for rapid translation of artificial intelligence (AI) research into cloud-based microservices that can be tested with data from clinical… ▽ More

    Submitted 10 November, 2022; originally announced November 2022.

    Comments: 6 pages, 3 figures, https://ieeexplore.ieee.org/document/9861047

    Journal ref: IEEE International Conference on Digital Health (ICDH), 2022, pp. 40-46

  9. arXiv:2210.07911  [pdf, other

    cs.GT cs.CC cs.DS

    Popularity on the Roommate Diversity Problem

    Authors: Steven Ge, Toshiya Itoh

    Abstract: A recently introduced restricted variant of the multidimensional stable roommate problem is the roommate diversity problem: each agent belongs to one of two types (e.g., red and blue), and the agents' preferences over the coalitions solely depend on the fraction of agents of their own type among their roommates. There are various notions of stability that defines an optimal partitioning of agent… ▽ More

    Submitted 5 January, 2023; v1 submitted 14 October, 2022; originally announced October 2022.

    Comments: 33 pages

    MSC Class: 68W05; 68Q25; 68Q17 ACM Class: F.2.2; F.1.3; G.2.1

  10. arXiv:2207.05308  [pdf, ps, other

    cs.DS cs.DM

    Capacity-Insensitive Algorithms for Online Facility Assignment Problems on a Line

    Authors: Tsubasa Harada, Toshiya Itoh, Shuichi Miyazaki

    Abstract: In the online facility assignment problem OFA(k,\ell), there exist k servers with a capacity \ell \geq 1 on a metric space and a request arrives one-by-one. The task of an online algorithm is to irrevocably match a current request with one of the servers with vacancies before the next request arrives. As special cases for OFA(k,\ell), we consider OFA(k,\ell) on a line, which is denoted by OFAL(k,\… ▽ More

    Submitted 9 August, 2022; v1 submitted 12 July, 2022; originally announced July 2022.

  11. How to Physically Verify a Rectangle in a Grid: A Physical ZKP for Shikaku

    Authors: Suthee Ruangwises, Toshiya Itoh

    Abstract: Shikaku is a pencil puzzle consisting of a rectangular grid, with some cells containing a number. The player has to partition the grid into rectangles such that each rectangle contains exactly one number equal to the area of that rectangle. In this paper, we propose two physical zero-knowledge proof protocols for Shikaku using a deck of playing cards, which allow a prover to physically show that h… ▽ More

    Submitted 25 October, 2022; v1 submitted 20 February, 2022; originally announced February 2022.

    Comments: This paper has appeared at FUN 2022

  12. arXiv:2201.12178  [pdf, other

    cs.LG

    Compositionality-Aware Graph2Seq Learning

    Authors: Takeshi D. Itoh, Takatomi Kubo, Kazushi Ikeda

    Abstract: Graphs are a highly expressive data structure, but it is often difficult for humans to find patterns from a complex graph. Hence, generating human-interpretable sequences from graphs have gained interest, called graph2seq learning. It is expected that the compositionality in a graph can be associated to the compositionality in the output sequence in many graph2seq tasks. Therefore, applying compos… ▽ More

    Submitted 28 January, 2022; originally announced January 2022.

    Comments: 8 pages, 1 figure, 2 tables

  13. Physical ZKP for Makaro Using a Standard Deck of Cards

    Authors: Suthee Ruangwises, Toshiya Itoh

    Abstract: Makaro is a logic puzzle with an objective to fill numbers into a rectangular grid to satisfy certain conditions. In 2018, Bultel et al. developed a physical zero-knowledge proof (ZKP) protocol for Makaro using a deck of cards, which allows a prover to physically convince a verifier that he/she knows a solution of the puzzle without revealing it. However, their protocol requires several identical… ▽ More

    Submitted 25 October, 2022; v1 submitted 22 December, 2021; originally announced December 2021.

    Comments: This paper has appeared at TAMC 2022

  14. arXiv:2112.10012  [pdf

    cs.HC

    An Exploration Tool for Retrieval of Travel Information with Personal Photos

    Authors: Risa Kitamura, Takayuki Itoh

    Abstract: Photos can be treated as life logs of photo owners. Photos can be reliable information to estimate patterns of actions and movements of the owners. Based on this discussion, we are developing an interactive technique to explore the recommended tourist spots based on their past personal travel photos. The technique extracts a set of keywords from the photo set applying a generic object recognition… ▽ More

    Submitted 18 December, 2021; originally announced December 2021.

  15. arXiv:2111.00154  [pdf, ps, other

    cs.DM

    Characterization of the Imbalance Problem on Complete Bipartite Graphs

    Authors: Steven Ge, Toshiya Itoh

    Abstract: We study the imbalance problem on complete bipartite graphs. The imbalance problem is a graph layout problem and is known to be NP-complete. Graph layout problems find their applications in the optimization of networks for parallel computer architectures, VLSI circuit design, information retrieval, numerical analysis, computational biology, graph theory, scheduling and archaeology. In this paper,… ▽ More

    Submitted 20 November, 2021; v1 submitted 29 October, 2021; originally announced November 2021.

    Comments: 22 pages (of which 9 pages appendix), 17 figures

  16. Event Classification with Multi-step Machine Learning

    Authors: Masahiko Saito, Tomoe Kishimoto, Yuya Kaneta, Taichi Itoh, Yoshiaki Umeda, Junichi Tanaka, Yutaro Iiyama, Ryu Sawada, Koji Terashi

    Abstract: The usefulness and value of Multi-step Machine Learning (ML), where a task is organized into connected sub-tasks with known intermediate inference goals, as opposed to a single large model learned end-to-end without intermediate sub-tasks, is presented. Pre-optimized ML models are connected and better performance is obtained by re-optimizing the connected one. The selection of an ML model from sev… ▽ More

    Submitted 4 June, 2021; originally announced June 2021.

    Journal ref: EPJ Web of Conferences 251, 03036 (2021)

  17. Multi-Level Attention Pooling for Graph Neural Networks: Unifying Graph Representations with Multiple Localities

    Authors: Takeshi D. Itoh, Takatomi Kubo, Kazushi Ikeda

    Abstract: Graph neural networks (GNNs) have been widely used to learn vector representation of graph-structured data and achieved better task performance than conventional methods. The foundation of GNNs is the message passing procedure, which propagates the information in a node to its neighbors. Since this procedure proceeds one step per layer, the range of the information propagation among nodes is small… ▽ More

    Submitted 31 October, 2021; v1 submitted 2 March, 2021; originally announced March 2021.

    Comments: 17 pages + 5 appendix pages, 16 figures + 2 appendix figures, 2 tables + 5 appendix tables

    Journal ref: Neural Netw. 145 (2022) 356-373

  18. Physical ZKP for Connected Spanning Subgraph: Applications to Bridges Puzzle and Other Problems

    Authors: Suthee Ruangwises, Toshiya Itoh

    Abstract: An undirected graph $G$ is known to both the prover $P$ and the verifier $V$, but only $P$ knows a subgraph $H$ of $G$. Without revealing any information about $H$, $P$ wants to convince $V$ that $H$ is a connected spanning subgraph of $G$, i.e. $H$ is connected and contains all vertices of $G$. In this paper, we propose an unconventional zero-knowledge proof protocol using a physical deck of card… ▽ More

    Submitted 8 August, 2021; v1 submitted 3 November, 2020; originally announced November 2020.

    Comments: This paper has appeared at UCNC 2021

  19. Physical Zero-Knowledge Proof for Ripple Effect

    Authors: Suthee Ruangwises, Toshiya Itoh

    Abstract: Ripple Effect is a logic puzzle where the player has to fill numbers into empty cells in a rectangular grid. The grid is divided into rooms, and each room must contain consecutive integers starting from 1 to its size. Also, if two cells in the same row or column contain the same number $x$, there must be a space of at least $x$ cells separating the two cells. In this paper, we develop a physical z… ▽ More

    Submitted 27 September, 2021; v1 submitted 21 September, 2020; originally announced September 2020.

    Comments: A preliminary version of this paper has appeared at WALCOM 2021

    Journal ref: Theoretical Computer Science, 895: 115-123 (2021)

  20. arXiv:2009.07342  [pdf

    cs.HC

    Scatterplot Selection Applying a Graph Coloring Problem

    Authors: Takayuki Itoh, Asuka Nakabayashi, Mariko Hagita

    Abstract: Scatterplot selection is an effective approach to represent essential portions of multidimensional data in a limited display space. Various metrics for evaluation of scatterplots such as scagnostics have been presented and applied to scatterplot selection. This paper presents a new scatterplot selection technique that applies multiple metrics. The technique firstly calculates scores of scatterplot… ▽ More

    Submitted 15 September, 2020; originally announced September 2020.

  21. arXiv:2008.09830  [pdf

    cs.HC

    Brushing Feature Values in Immersive Graph Visualization Environment

    Authors: Hinako Sassa, Maxime Cordeil, Mitsuo Yoshida, Takayuki Itoh

    Abstract: There are a variety of graphs where multidimensional feature values are assigned to the nodes. Visualization of such datasets is not an easy task since they are complex and often huge. Immersive Analytics is a powerful approach to support the interactive exploration of such large and complex data. Many recent studies on graph visualization have applied immersive analytics frameworks. However, ther… ▽ More

    Submitted 22 August, 2020; originally announced August 2020.

    Comments: 5 pages, 7 figures

  22. arXiv:2008.08415  [pdf, ps, other

    cs.DS

    Competitive Analysis for Two Variants of Online Metric Matching Problem

    Authors: Toshiya Itoh, Shuichi Miyazaki, Makoto Satake

    Abstract: In this paper, we study two variants of the online metric matching problem. The first problem is the online metric matching problem where all the servers are placed at one of two positions in the metric space. We show that a simple greedy algorithm achieves the competitive ratio of 3 and give a matching lower bound. The second problem is the online facility assignment problem on a line, where serv… ▽ More

    Submitted 30 September, 2020; v1 submitted 19 August, 2020; originally announced August 2020.

    Comments: 12 pages. Update from the 1st version: The first author was added and Theorems 3, 4 and 5 were improved

    MSC Class: 68W27

  23. arXiv:2007.05380  [pdf

    physics.optics cs.ET

    Analog Computing with Metatronic Circuits

    Authors: Mario Miscuglio, Yaliang Gui, Xiaoxuan Ma, Shuai Sun, Tarek El-Ghazawi, Tatsuo Itoh, Andrea Alù, Volker J. Sorger

    Abstract: Analog photonic solutions offer unique opportunities to address complex computational tasks with unprecedented performance in terms of energy dissipation and speeds, overcoming current limitations of modern computing architectures based on electron flows and digital approaches. The lack of modularization and lumped element reconfigurability in photonics has prevented the transition to an all-optic… ▽ More

    Submitted 10 July, 2020; originally announced July 2020.

  24. Physical Zero-Knowledge Proof for Numberlink Puzzle and $k$ Vertex-Disjoint Paths Problem

    Authors: Suthee Ruangwises, Toshiya Itoh

    Abstract: Numberlink is a logic puzzle with an objective to connect all pairs of cells with the same number by non-crossing paths in a rectangular grid. In this paper, we propose a physical protocol of zero-knowledge proof for Numberlink using a deck of cards, which allows a prover to convince a verifier that he/she knows a solution without revealing it. In particular, the protocol shows how to physically c… ▽ More

    Submitted 3 November, 2020; v1 submitted 4 February, 2020; originally announced February 2020.

    Comments: A preliminary version of this paper has appeared in the proceedings of FUN 2021

    Journal ref: New Generation Computing, 39(1): 3-17 (2021)

  25. Securely Computing the $n$-Variable Equality Function with $2n$ Cards

    Authors: Suthee Ruangwises, Toshiya Itoh

    Abstract: Research in the area of secure multi-party computation using a deck of playing cards, often called card-based cryptography, started from the introduction of the five-card trick protocol to compute the logical AND function by den Boer in 1989. Since then, many card-based protocols to compute various functions have been developed. In this paper, we propose two new protocols that securely compute the… ▽ More

    Submitted 27 September, 2021; v1 submitted 14 November, 2019; originally announced November 2019.

    Comments: A preliminary version of this paper has appeared at TAMC 2020

    Journal ref: Theoretical Computer Science, 887: 99-110 (2021)

  26. Towards Generation of Visual Attention Map for Source Code

    Authors: Takeshi D. Itoh, Takatomi Kubo, Kiyoka Ikeda, Yuki Maruno, Yoshiharu Ikutani, Hideaki Hata, Kenichi Matsumoto, Kazushi Ikeda

    Abstract: Program comprehension is a dominant process in software development and maintenance. Experts are considered to comprehend the source code efficiently by directing their gaze, or attention, to important components in it. However, reflecting the importance of components is still a remaining issue in gaze behavior analysis for source code comprehension. Here we show a conceptual framework to compare… ▽ More

    Submitted 13 August, 2019; v1 submitted 14 July, 2019; originally announced July 2019.

    Comments: 4 pages, 2 figures; APSIPA 2019 ACCEPTED

    Journal ref: APSIPA ASC (2019)

  27. Stable Noncrossing Matchings

    Authors: Suthee Ruangwises, Toshiya Itoh

    Abstract: Given a set of $n$ men represented by $n$ points lying on a line, and $n$ women represented by $n$ points lying on another parallel line, with each person having a list that ranks some people of opposite gender as his/her acceptable partners in strict order of preference. In this problem, we want to match people of opposite genders to satisfy people's preferences as well as making the edges not cr… ▽ More

    Submitted 25 October, 2019; v1 submitted 6 March, 2019; originally announced March 2019.

    Comments: This paper has appeared at IWOCA 2019

  28. AND Protocols Using Only Uniform Shuffles

    Authors: Suthee Ruangwises, Toshiya Itoh

    Abstract: Secure multi-party computation using a deck of playing cards has been a subject of research since the "five-card trick" introduced by den Boer in 1989. One of the main problems in card-based cryptography is to design committed-format protocols to compute a Boolean AND operation subject to different runtime and shuffle restrictions by using as few cards as possible. In this paper, we introduce two… ▽ More

    Submitted 30 July, 2019; v1 submitted 1 October, 2018; originally announced October 2018.

    Comments: This paper has appeared at CSR 2019

  29. Unpopularity Factor in the Marriage and Roommates Problems

    Authors: Suthee Ruangwises, Toshiya Itoh

    Abstract: Given a set $A$ of $n$ people, with each person having a preference list that ranks a subset of $A$ as his/her acceptable partners in order of preference, we consider the Roommates Problem (RP) and the Marriage Problem (MP) of matching people with their partners. In RP there is no further restriction, while in MP only people of opposite genders can be acceptable partners. For a pair of matchings… ▽ More

    Submitted 3 November, 2020; v1 submitted 26 March, 2018; originally announced March 2018.

    Comments: A preliminary version of this paper has appeared at CSR 2019

    Journal ref: Theory of Computing Systems, 65(3): 579-592 (2021)

  30. arXiv:1712.00214  [pdf, other

    cs.DS

    On the Hardness of Deriving the Arithmetic Mean Component Competitive Ratio

    Authors: Toshiya Itoh, Yoshinori Takei

    Abstract: For the multi-objective time series search problem, Hasegawa and Itoh [Theoretical Computer Science, Vo.718, pp.58-66, 2018] presented the best possible online algorithm balanced price policy (BPP for short) for any monotone function $f: R^k \to R$. Specifically, the competitive ratio with respect to the monotone function $f(c_{1},\ldots,c_{k})=(c_{1}+\cdots+c_{k})/k$ is referred to as the arithme… ▽ More

    Submitted 10 April, 2018; v1 submitted 1 December, 2017; originally announced December 2017.

    Comments: 18 pages

  31. arXiv:1707.04805  [pdf, ps, other

    cs.GR

    A Streamline Selection Technique Overlaying with Isosurfaces

    Authors: Shiho Furuya, Takayuki Itoh

    Abstract: Integration of scalar and vector visualization has been an interesting topic. This paper presents a technique to appropriately select and display multiple streamlines while overlaying with isosurfaces, aiming an integrated scalar and vector field visualization. The technique visualizes a scalar field by multiple semitransparent isosurfaces, and a vector field by multiple streamlines, while the tec… ▽ More

    Submitted 15 July, 2017; originally announced July 2017.

    Comments: TopoInVis2017

  32. Random Popular Matchings with Incomplete Preference Lists

    Authors: Suthee Ruangwises, Toshiya Itoh

    Abstract: Given a set $A$ of $n$ people and a set $B$ of $m \geq n$ items, with each person having a list that ranks his/her preferred items in order of preference, we want to match every person with a unique item. A matching $M$ is called popular if for any other matching $M'$, the number of people who prefer $M$ to $M'$ is not less than the number of those who prefer $M'$ to $M$. For given $n$ and $m$, co… ▽ More

    Submitted 26 October, 2019; v1 submitted 23 September, 2016; originally announced September 2016.

    Comments: A shortened version of this paper has appeared at WALCOM 2018

    Journal ref: Journal of Graph Algorithms and Applications, 23(5): 815-835 (2019)

  33. arXiv:1609.05268  [pdf, ps, other

    cs.HC cs.GR

    High-Dimensional Data Visualization by Interactive Construction of Low-Dimensional Parallel Coordinate Plots

    Authors: Takayuki Itoh, Ashnil Kumar, Karsten Klein, Jinman Kim

    Abstract: Parallel coordinate plots (PCPs) are among the most useful techniques for the visualization and exploration of high-dimensional data spaces. They are especially useful for the representation of correlations among the dimensions, which identify relationships and interdependencies between variables. However, within these high-dimensional spaces, PCPs face difficulties in displaying the correlation b… ▽ More

    Submitted 16 September, 2016; originally announced September 2016.

  34. arXiv:1506.04474  [pdf, ps, other

    cs.DS

    Optimal Online Algorithms for the Multi-Objective Time Series Search Problem

    Authors: Shun Hasegawa, Toshiya Itoh

    Abstract: Tiedemann, et al. [Proc. of WALCOM, LNCS 8973, 2015, pp.210-221] defined multi-objective online problems (as an online version of multi-objective optimization problems) and the competitive analysis for multi-objective online problems and showed that (1) with respect to the worst component competitive analysis, the online algorithm RPP-HIGH is best possible for the multi-objective time series searc… ▽ More

    Submitted 29 April, 2016; v1 submitted 15 June, 2015; originally announced June 2015.

    Comments: 15 pages

    ACM Class: F.1.2

  35. Buffer Management of Multi-Queue QoS Switches with Class Segregation

    Authors: Toshiya Itoh, Seiji Yoshimoto

    Abstract: In this paper, we focus on buffer management of multi-queue QoS switches in which packets of different values are segregated in different queues. Our model consists of $m$ queues and $m$ packet values $0 < v_{1} < v_{2} < ... < v_{m}$. Recently, Al-Bawani and Souza [IPL 113(4), pp.145-150, 2013] presented an online algorithm GREEDY for buffer management of multi-queue QoS switches with class segre… ▽ More

    Submitted 2 May, 2013; v1 submitted 10 April, 2013; originally announced April 2013.

    Comments: 12 pages, 2 tables, 2 figures. arXiv admin note: substantial text overlap with arXiv:1109.6060

  36. arXiv:1109.6060  [pdf, ps, other

    cs.DM

    Greedy Algorithms for Multi-Queue Buffer Management with Class Segregation

    Authors: Toshiya Itoh, Seiji Yoshimoto

    Abstract: In this paper, we focus on a multi-queue buffer management in which packets of different values are segregated in different queues. Our model consists of m packets values and m queues. Recently, Al-Bawani and Souza (arXiv:1103.6049v2 [cs.DS] 30 Mar 2011) presented an online multi-queue buffer management algorithm Greedy and showed that it is 2-competitive for the general m-valued case, i.e., m pac… ▽ More

    Submitted 26 December, 2011; v1 submitted 27 September, 2011; originally announced September 2011.

    Comments: 19 pages

  37. New Constructions for Query-Efficient Locally Decodable Codes of Subexponential Length

    Authors: Toshiya Itoh, Yasuhiro Suzuki

    Abstract: A $(k,δ,ε)$-locally decodable code $C: F_{q}^{n} \to F_{q}^{N}$ is an error-correcting code that encodes each message $\vec{x}=(x_{1},x_{2},...,x_{n}) \in F_{q}^{n}$ to $C(\vec{x}) \in F_{q}^{N}$ and has the following property: For any $\vec{y} \in {\bf F}_{q}^{N}$ such that $d(\vec{y},C(\vec{x})) \leq δN$ and each $1 \leq i \leq n$, the symbol $x_{i}$ of $\vec{x}$ can be recovered with probabil… ▽ More

    Submitted 29 October, 2008; v1 submitted 25 October, 2008; originally announced October 2008.

    Comments: 13 pages, 1 figure, 2 tables

    ACM Class: F.1.2; F.2.2; G.2.1

    Journal ref: IEICE Trans. on Inf. and Syst. E93-D(2), pp.263-270, 2010

  38. arXiv:0805.0933  [pdf

    cs.OH

    High Quality Factor Silicon Cantilever Driven by PZT Actuator for Resonant Based Mass Detection

    Authors: Jian Lu, T. Ikehara, Yi Zhang, Takashi Mihara, Toshihiro Itoh, Ryutaro Maeda

    Abstract: A high quality factor (Q-factor) piezoelectric lead zirconat titanate (PZT) actuated single crystal silicon cantilever was proposed in this paper for resonant based ultra-sensitive mass detection. Energy dissipation from intrinsic mechanical loss of the PZT film was successfully compressed by separating the PZT actuator from resonant structure. Excellent Q-factor, which is several times larger t… ▽ More

    Submitted 7 May, 2008; originally announced May 2008.

    Comments: Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/handle/2042/16838)

    Journal ref: Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2008, Nice : France (2008)

  39. Approximation Algorithms for the Highway Problem under the Coupon Model

    Authors: Ryoso Hamane, Toshiya Itoh, Kouhei Tomita

    Abstract: When a store sells items to customers, the store wishes to determine the prices of the items to maximize its profit. Intuitively, if the store sells the items with low (resp. high) prices, the customers buy more (resp. less) items, which provides less profit to the store. So it would be hard for the store to decide the prices of items. Assume that the store has a set V of n items and there is a… ▽ More

    Submitted 4 January, 2008; v1 submitted 16 December, 2007; originally announced December 2007.

    Comments: 13 pages, 5 figures

    ACM Class: F.2.2; G.1.2; G.2.1

    Journal ref: IEICE Trans. on Fundamentals, E92-A(8), pp.1779-1786, 2009

  40. arXiv:0710.5338  [pdf, ps, other

    cs.DM cs.CC

    Weighted Random Popular Matchings

    Authors: Toshiya Itoh, Osamu Watanabe

    Abstract: For a set A of n applicants and a set I of m items, we consider a problem of computing a matching of applicants to items, i.e., a function M mapping A to I; here we assume that each applicant $x \in A$ provides a preference list on items in I. We say that an applicant $x \in A$ prefers an item p than an item q if p is located at a higher position than q in its preference list, and we say that x… ▽ More

    Submitted 29 October, 2007; originally announced October 2007.

    Comments: 13 pages, 2 figures

    ACM Class: F.1.2; G.2.3

    Journal ref: Random Structures and Algorithms, 37(4), pp.477-494, 2010

  41. Primal-dual distance bounds of linear codes with application to cryptography

    Authors: Ryutaroh Matsumoto, Kaoru Kurosawa, Toshiya Itoh, Toshimitsu Konno, Tomohiko Uyematsu

    Abstract: Let $N(d,d^\perp)$ denote the minimum length $n$ of a linear code $C$ with $d$ and $d^{\bot}$, where $d$ is the minimum Hamming distance of $C$ and $d^{\bot}$ is the minimum Hamming distance of $C^{\bot}$. In this paper, we show a lower bound and an upper bound on $N(d,d^\perp)$. Further, for small values of $d$ and $d^\perp$, we determine $N(d,d^\perp)$ and give a generator matrix of the optimu… ▽ More

    Submitted 12 June, 2006; v1 submitted 24 June, 2005; originally announced June 2005.

    Comments: 6 pages, using IEEEtran.cls. To appear in IEEE Trans. Inform. Theory, Sept. 2006. Two authors were added in the revised version

    Journal ref: IEEE Trans. Inform. Theory, vol. 52, no. 9, pp. 4251-4256, Sept. 2006