-
Visualization for interactively adjusting the de-bias effect of word embedding
Authors:
Arisa Sugino,
Takayuki Itoh
Abstract:
Word embedding, which converts words into numerical values, is an important natural language processing technique and widely used. One of the serious problems of word embedding is that the bias will be learned and affect the model if the dataset used for pre-training contains bias. On the other hand, indiscriminate removal of bias from word embeddings may result in the loss of information, even if…
▽ More
Word embedding, which converts words into numerical values, is an important natural language processing technique and widely used. One of the serious problems of word embedding is that the bias will be learned and affect the model if the dataset used for pre-training contains bias. On the other hand, indiscriminate removal of bias from word embeddings may result in the loss of information, even if the bias is undesirable to us. As a result, a risk of model performance degradation due to bias removal will be another problem. As a solution to this problem, we focus on gender bias in Japanese and propose an interactive visualization method to adjust the degree of debias for each word category. Specifically, we visualize the accuracy in a category classification task after debiasing, and allow the user to adjust the parameters based on the visualization results, so that the debiasing can be adjusted according to the user's objectives. In addition, considering a trade-off between debiasing and preventing degradation of model performance, and that different people perceive gender bias differently, we developed a mechanism to present multiple choices of debiasing configurations applying an optimization scheme. This paper presents the results of an experiment in which we removed the gender bias for word embeddings learned from the Japanese version of Wikipedia. We classified words into five categories based on a news corpus, and observed that the degree of influence of debiasing differed greatly among the categories. We then adjusted the degree of debiasing for each category based on the visualization results.
△ Less
Submitted 3 June, 2025;
originally announced June 2025.
-
Visualization and Comparison of AOI Transitions with Force-Directed Graph Layout
Authors:
Yuri Miyagi,
Nils Rodrigues,
Daniel Weiskopf,
Takayuki Itoh
Abstract:
By analyzing the gaze trajectories of people viewing screens and advertisements, we can determine what people are interested in. This knowledge can be effective when recommending commercial products and services, and also, when improving advertisement design. Therefore, analysis and visualization of eye gaze have been an active research topic. This paper proposes a new method for visualizing patte…
▽ More
By analyzing the gaze trajectories of people viewing screens and advertisements, we can determine what people are interested in. This knowledge can be effective when recommending commercial products and services, and also, when improving advertisement design. Therefore, analysis and visualization of eye gaze have been an active research topic. This paper proposes a new method for visualizing patterns of the gaze trajectories of multiple people by (1) visualizing patterns that move through multiple areas of interest (AOI) and (2) visualizing differences among multiple gaze trajectories. The method first constructs a hierarchical AOI structure to a Web page or an image, and uses this structure to convert the trajectory into a sequence of symbols. We apply N-grams to the generated symbol sequences to extract transition patterns between AOIs. Finally, the method visualizes a list of the pattern extraction results and the shapes of the characteristic elements. We present the visualization of gaze trajectories for three examples of stimuli, and argue that analysts can efficiently discover trends in gaze transitions between text and figures, as well as differences between participants of the eye-tracking experiments.
△ Less
Submitted 24 May, 2025;
originally announced June 2025.
-
HiRegEx: Interactive Visual Query and Exploration of Multivariate Hierarchical Data
Authors:
Guozheng Li,
Haotian Mi,
Chi Harold Liu,
Takayuki Itoh,
Guoren Wang
Abstract:
When using exploratory visual analysis to examine multivariate hierarchical data, users often need to query data to narrow down the scope of analysis. However, formulating effective query expressions remains a challenge for multivariate hierarchical data, particularly when datasets become very large. To address this issue, we develop a declarative grammar, HiRegEx (Hierarchical data Regular Expres…
▽ More
When using exploratory visual analysis to examine multivariate hierarchical data, users often need to query data to narrow down the scope of analysis. However, formulating effective query expressions remains a challenge for multivariate hierarchical data, particularly when datasets become very large. To address this issue, we develop a declarative grammar, HiRegEx (Hierarchical data Regular Expression), for querying and exploring multivariate hierarchical data. Rooted in the extended multi-level task topology framework for tree visualizations (e-MLTT), HiRegEx delineates three query targets (node, path, and subtree) and two aspects for querying these targets (features and positions), and uses operators developed based on classical regular expressions for query construction. Based on the HiRegEx grammar, we develop an exploratory framework for querying and exploring multivariate hierarchical data and integrate it into the TreeQueryER prototype system. The exploratory framework includes three major components: top-down pattern specification, bottom-up data-driven inquiry, and context-creation data overview. We validate the expressiveness of HiRegEx with the tasks from the e-MLTT framework and showcase the utility and effectiveness of TreeQueryER system through a case study involving expert users in the analysis of a citation tree dataset.
△ Less
Submitted 12 August, 2024;
originally announced August 2024.
-
A Nearly Optimal Deterministic Algorithm for Online Transportation Problem
Authors:
Tsubasa Harada,
Toshiya Itoh
Abstract:
For the online transportation problem with $m$ server sites, it has long been known that the competitive ratio of any deterministic algorithm is at least $2m-1$. Kalyanasundaram and Pruhs conjectured in 1998 that a deterministic $(2m-1)$-competitive algorithm exists for this problem, a conjecture that has remained open for over two decades.
In this paper, we propose a new deterministic algorithm…
▽ More
For the online transportation problem with $m$ server sites, it has long been known that the competitive ratio of any deterministic algorithm is at least $2m-1$. Kalyanasundaram and Pruhs conjectured in 1998 that a deterministic $(2m-1)$-competitive algorithm exists for this problem, a conjecture that has remained open for over two decades.
In this paper, we propose a new deterministic algorithm named Subtree-Decomposition for the online transportation problem and show that it achieves a competitive ratio of at most $8m-5$. This is the first $O(m)$-competitive deterministic algorithm, coming close to the lower bound of $2m-1$ within a constant factor.
△ Less
Submitted 23 April, 2025; v1 submitted 6 June, 2024;
originally announced June 2024.
-
Popularity on the 3D-Euclidean Stable Roommates
Authors:
Steven Ge,
Toshiya Itoh
Abstract:
We study the 3D-Euclidean Multidimensional Stable Roommates problem, which asks whether a given set $V$ of $s\cdot n$ agents with a location in 3-dimensional Euclidean space can be partitioned into $n$ disjoint subsets $π= \{R_1 ,\dots , R_n\}$ with $|R_i| = s$ for each $R_i \in π$ such that $π$ is (strictly) popular, where $s$ is the room size. A partitioning is popular if there does not exist an…
▽ More
We study the 3D-Euclidean Multidimensional Stable Roommates problem, which asks whether a given set $V$ of $s\cdot n$ agents with a location in 3-dimensional Euclidean space can be partitioned into $n$ disjoint subsets $π= \{R_1 ,\dots , R_n\}$ with $|R_i| = s$ for each $R_i \in π$ such that $π$ is (strictly) popular, where $s$ is the room size. A partitioning is popular if there does not exist another partitioning in which more agents are better off than worse off. Computing a popular partition in a stable roommates game is NP-hard, even if the preferences are strict. The preference of an agent solely depends on the distance to its roommates. An agent prefers to be in a room where the sum of the distances to its roommates is small. We show that determining the existence of a strictly popular outcome in a 3D-Euclidean Multidimensional Stable Roommates game with room size $3$ is co-NP-hard.
△ Less
Submitted 17 November, 2023;
originally announced November 2023.
-
Competitive Analysis of Online Facility Assignment for General Layout of Servers on a Line
Authors:
Tsubasa Harada,
Toshiya Itoh
Abstract:
In the online facility assignment on a line ${\rm OFAL}(S,c)$ with a set $S$ of $k$ servers and a capacity $c:S\to\mathbb{N}$, each server $s\in S$ with a capacity $c(s)$ is placed on a line, and a request arrives on a line one-by-one. The task of an online algorithm is to irrevocably match a current request with one of the servers with vacancies before the next request arrives. An algorithm can m…
▽ More
In the online facility assignment on a line ${\rm OFAL}(S,c)$ with a set $S$ of $k$ servers and a capacity $c:S\to\mathbb{N}$, each server $s\in S$ with a capacity $c(s)$ is placed on a line, and a request arrives on a line one-by-one. The task of an online algorithm is to irrevocably match a current request with one of the servers with vacancies before the next request arrives. An algorithm can match up to $c(s)$ requests to a server $s\in S$.
In this paper, we propose a new online algorithm PTCP (Policy Transition at Critical Point) for $\mathrm{OFAL}(S,c)$ and show that PTCP is $(2α(S)+1)$-competitive, where $α(S)$ is informally the ratio of the diameter of $S$ to the maximum distance between two adjacent servers in $S$. Depending on the layout of servers, $α(S)$ ranges from constant (independent of $k$) to $k-1$. Among all of known algorithms for $\mathrm{OFAL}(S,c)$, this upper bound on the competitive ratio is the best when $α(S)$ is small.
We also show that the competitive ratio of any MPFS (Most Preferred Free Servers) algorithm is at least $2α(S)+1$. For $\mathrm{OFAL}(S,c)$, recall that MPFS is a class of algorithms whose competitive ratio does not depend on a capacity $c$ and it includes the natural greedy algorithm and PTCP, etc. Thus, this implies that PTCP is the best for $\mathrm{OFAL}(S,c)$ in the class MPFS.
△ Less
Submitted 11 August, 2023;
originally announced August 2023.
-
The MERCADO Workshop at IEEE VIS 2023: Multimodal Experiences for Remote Communication Around Data Online
Authors:
Matthew Brehmer,
Maxime Cordeil,
Christophe Hurter,
Takayuki Itoh
Abstract:
We propose a half-day workshop at IEEE VIS 2023 on the topic of communication and collaboration around data. Specifically, we aim to gather researchers interested on multimodal, synchronous, and remote or hybrid forms of communication and collaboration within organizational and educational settings. This topic lies at the intersection of data visualization, human-computer interaction, and computer…
▽ More
We propose a half-day workshop at IEEE VIS 2023 on the topic of communication and collaboration around data. Specifically, we aim to gather researchers interested on multimodal, synchronous, and remote or hybrid forms of communication and collaboration within organizational and educational settings. This topic lies at the intersection of data visualization, human-computer interaction, and computer-supported collaborative work, and overlaps thematically with several prior seminars and workshops. Our intended outcomes for the workshop include assembling a corpus of inspiring examples and a design space, ideally consolidated into a survey paper, as well as the establishment of new collaborations and a shared research agenda. We anticipate a format comprised of short presentations and demos, an invited keynote or fireside chat, and a breakout group session organized around specific application domains. Website: https://sites.google.com/view/mercadoworkshop.
△ Less
Submitted 12 April, 2023; v1 submitted 21 March, 2023;
originally announced March 2023.
-
Health Guardian Platform: A technology stack to accelerate discovery in Digital Health research
Authors:
Bo Wen,
Vince S. Siu,
Italo Buleje,
Kuan Yu Hsieh,
Takashi Itoh,
Lukas Zimmerli,
Nigel Hinds,
Elif Eyigoz,
Bing Dang,
Stefan von Cavallar,
Jeffrey L. Rogers
Abstract:
This paper highlights the design philosophy and architecture of the Health Guardian, a platform developed by the IBM Digital Health team to accelerate discoveries of new digital biomarkers and development of digital health technologies. The Health Guardian allows for rapid translation of artificial intelligence (AI) research into cloud-based microservices that can be tested with data from clinical…
▽ More
This paper highlights the design philosophy and architecture of the Health Guardian, a platform developed by the IBM Digital Health team to accelerate discoveries of new digital biomarkers and development of digital health technologies. The Health Guardian allows for rapid translation of artificial intelligence (AI) research into cloud-based microservices that can be tested with data from clinical cohorts to understand disease and enable early prevention. The platform can be connected to mobile applications, wearables, or Internet of things (IoT) devices to collect health-related data into a secure database. When the analytics are created, the researchers can containerize and deploy their code on the cloud using pre-defined templates, and validate the models using the data collected from one or more sensing devices. The Health Guardian platform currently supports time-series, text, audio, and video inputs with 70+ analytic capabilities and is used for non-commercial scientific research. We provide an example of the Alzheimer's disease (AD) assessment microservice which uses AI methods to extract linguistic features from audio recordings to evaluate an individual's mini-mental state, the likelihood of having AD, and to predict the onset of AD before turning the age of 85. Today, IBM research teams across the globe use the Health Guardian internally as a test bed for early-stage research ideas, and externally with collaborators to support and enhance AI model development and clinical study efforts.
△ Less
Submitted 10 November, 2022;
originally announced November 2022.
-
Popularity on the Roommate Diversity Problem
Authors:
Steven Ge,
Toshiya Itoh
Abstract:
A recently introduced restricted variant of the multidimensional stable roommate problem is the roommate diversity problem: each agent belongs to one of two types (e.g., red and blue), and the agents' preferences over the coalitions solely depend on the fraction of agents of their own type among their roommates.
There are various notions of stability that defines an optimal partitioning of agent…
▽ More
A recently introduced restricted variant of the multidimensional stable roommate problem is the roommate diversity problem: each agent belongs to one of two types (e.g., red and blue), and the agents' preferences over the coalitions solely depend on the fraction of agents of their own type among their roommates.
There are various notions of stability that defines an optimal partitioning of agents. The notion of popularity has received a lot of attention recently. A partitioning of agents is popular if there does not exist another partitioning in which more agents are better off than worse off. Computing a popular partition in a stable roommate game can be done in polynomial time. When we allow ties the stable roommate problem becomes NP-complete. Determining the existence of a popular solution in the multidimensional stable roommate problem also NP-hard.
We show that in the roommate diversity problem with the room size fixed to two, the problem becomes tractable. Particularly, a popular partitioning of agents is guaranteed to exist and can be computed in polynomial time. Additionally a mixed popular partitioning of agents is always guaranteed to exist in any roommate diversity game. By contrast, when there are no restrictions on the coalition size of a roommate diversity game, a popular partitioning may fail to exist and the problem becomes intractable. Our results intractability results are summarized as follows:
* Determining the existence of a popular partitioning is co-NP-hard, even if the agents' preferences are trichotomous.
* Determining the existence of a strictly popular partitioning is co-NP-hard, even if the agents' preferences are dichotomous.
* Computing a mixed popular partitioning of agents in polynomial time is impossible unless P=NP, even if the agents' preferences are dichotomous.
△ Less
Submitted 5 January, 2023; v1 submitted 14 October, 2022;
originally announced October 2022.
-
Capacity-Insensitive Algorithms for Online Facility Assignment Problems on a Line
Authors:
Tsubasa Harada,
Toshiya Itoh,
Shuichi Miyazaki
Abstract:
In the online facility assignment problem OFA(k,\ell), there exist k servers with a capacity \ell \geq 1 on a metric space and a request arrives one-by-one. The task of an online algorithm is to irrevocably match a current request with one of the servers with vacancies before the next request arrives. As special cases for OFA(k,\ell), we consider OFA(k,\ell) on a line, which is denoted by OFAL(k,\…
▽ More
In the online facility assignment problem OFA(k,\ell), there exist k servers with a capacity \ell \geq 1 on a metric space and a request arrives one-by-one. The task of an online algorithm is to irrevocably match a current request with one of the servers with vacancies before the next request arrives. As special cases for OFA(k,\ell), we consider OFA(k,\ell) on a line, which is denoted by OFAL(k,\ell) and OFAL_{eq}(k,\ell), where the latter is the case of OFAL(k,\ell) with equidistant servers. In this paper, we deal with the competitive analysis for the above problems. As a natural generalization of the greedy algorithm GRDY, we introduce a class of algorithms called MPFS (most preferred free servers) and show that any MPFS algorithm has the capacity-insensitive property, i.e., for any \ell \geq 1, ALG is c-competitive for OFA(k,1) iff ALG is c-competitive for OFA(k,\ell). By applying the capacity-insensitive property of the greedy algorithm GRDY, we derive the matching upper and lower bounds 4k-5 on the competitive ratio of GRDY for OFAL_{eq}(k,\ell). To investigate the capability of MPFS algorithms, we show that the competitive ratio of any MPFS algorithm ALG for OFAL_{eq}(k,\ell) is at least $2k-1$. Then we propose a new MPFS algorithm IDAS (Interior Division for Adjacent Servers) for OFAL(k,\ell) and show that the competitive ratio of IDAS for OFAL}_{eq}(k,\ell) is at most 2k-1, i.e., IDAS for OFAL_{eq}(k,\ell) is best possible in all the MPFS algorithms.
△ Less
Submitted 9 August, 2022; v1 submitted 12 July, 2022;
originally announced July 2022.
-
How to Physically Verify a Rectangle in a Grid: A Physical ZKP for Shikaku
Authors:
Suthee Ruangwises,
Toshiya Itoh
Abstract:
Shikaku is a pencil puzzle consisting of a rectangular grid, with some cells containing a number. The player has to partition the grid into rectangles such that each rectangle contains exactly one number equal to the area of that rectangle. In this paper, we propose two physical zero-knowledge proof protocols for Shikaku using a deck of playing cards, which allow a prover to physically show that h…
▽ More
Shikaku is a pencil puzzle consisting of a rectangular grid, with some cells containing a number. The player has to partition the grid into rectangles such that each rectangle contains exactly one number equal to the area of that rectangle. In this paper, we propose two physical zero-knowledge proof protocols for Shikaku using a deck of playing cards, which allow a prover to physically show that he/she knows a solution of the puzzle without revealing it. Most importantly, in our second protocol we develop a general technique to physically verify a rectangle-shaped area with a certain size in a rectangular grid, which can be used to verify other problems with similar constraints.
△ Less
Submitted 25 October, 2022; v1 submitted 20 February, 2022;
originally announced February 2022.
-
Compositionality-Aware Graph2Seq Learning
Authors:
Takeshi D. Itoh,
Takatomi Kubo,
Kazushi Ikeda
Abstract:
Graphs are a highly expressive data structure, but it is often difficult for humans to find patterns from a complex graph. Hence, generating human-interpretable sequences from graphs have gained interest, called graph2seq learning. It is expected that the compositionality in a graph can be associated to the compositionality in the output sequence in many graph2seq tasks. Therefore, applying compos…
▽ More
Graphs are a highly expressive data structure, but it is often difficult for humans to find patterns from a complex graph. Hence, generating human-interpretable sequences from graphs have gained interest, called graph2seq learning. It is expected that the compositionality in a graph can be associated to the compositionality in the output sequence in many graph2seq tasks. Therefore, applying compositionality-aware GNN architecture would improve the model performance. In this study, we adopt the multi-level attention pooling (MLAP) architecture, that can aggregate graph representations from multiple levels of information localities. As a real-world example, we take up the extreme source code summarization task, where a model estimate the name of a program function from its source code. We demonstrate that the model having the MLAP architecture outperform the previous state-of-the-art model with more than seven times fewer parameters than it.
△ Less
Submitted 28 January, 2022;
originally announced January 2022.
-
Physical ZKP for Makaro Using a Standard Deck of Cards
Authors:
Suthee Ruangwises,
Toshiya Itoh
Abstract:
Makaro is a logic puzzle with an objective to fill numbers into a rectangular grid to satisfy certain conditions. In 2018, Bultel et al. developed a physical zero-knowledge proof (ZKP) protocol for Makaro using a deck of cards, which allows a prover to physically convince a verifier that he/she knows a solution of the puzzle without revealing it. However, their protocol requires several identical…
▽ More
Makaro is a logic puzzle with an objective to fill numbers into a rectangular grid to satisfy certain conditions. In 2018, Bultel et al. developed a physical zero-knowledge proof (ZKP) protocol for Makaro using a deck of cards, which allows a prover to physically convince a verifier that he/she knows a solution of the puzzle without revealing it. However, their protocol requires several identical copies of some cards, making it impractical as a deck of playing cards found in everyday life typically consists of all different cards. In this paper, we propose a new ZKP protocol for Makaro that can be implemented using a standard deck (a deck consisting of all different cards). Our protocol also uses asymptotically less cards than the protocol of Bultel et al. Most importantly, we develop a general method to encode a number with a sequence of all different cards. This allows us to securely compute several numerical functions using a standard deck, such as verifying that two given numbers are different and verifying that a number is the largest one among the given numbers.
△ Less
Submitted 25 October, 2022; v1 submitted 22 December, 2021;
originally announced December 2021.
-
An Exploration Tool for Retrieval of Travel Information with Personal Photos
Authors:
Risa Kitamura,
Takayuki Itoh
Abstract:
Photos can be treated as life logs of photo owners. Photos can be reliable information to estimate patterns of actions and movements of the owners. Based on this discussion, we are developing an interactive technique to explore the recommended tourist spots based on their past personal travel photos. The technique extracts a set of keywords from the photo set applying a generic object recognition…
▽ More
Photos can be treated as life logs of photo owners. Photos can be reliable information to estimate patterns of actions and movements of the owners. Based on this discussion, we are developing an interactive technique to explore the recommended tourist spots based on their past personal travel photos. The technique extracts a set of keywords from the photo set applying a generic object recognition and constructs a tree structure to support the exploration of the keywords. When a user selects a set of interesting keywords, the system provides travel information related to the selected keywords. Our previous paper already introduced the visualizations that demonstrate the appropriateness of the structure of the keywords. This paper focuses on the mechanism for interactive travel information retrieval of our system and user evaluations with this system.
△ Less
Submitted 18 December, 2021;
originally announced December 2021.
-
Characterization of the Imbalance Problem on Complete Bipartite Graphs
Authors:
Steven Ge,
Toshiya Itoh
Abstract:
We study the imbalance problem on complete bipartite graphs. The imbalance problem is a graph layout problem and is known to be NP-complete. Graph layout problems find their applications in the optimization of networks for parallel computer architectures, VLSI circuit design, information retrieval, numerical analysis, computational biology, graph theory, scheduling and archaeology. In this paper,…
▽ More
We study the imbalance problem on complete bipartite graphs. The imbalance problem is a graph layout problem and is known to be NP-complete. Graph layout problems find their applications in the optimization of networks for parallel computer architectures, VLSI circuit design, information retrieval, numerical analysis, computational biology, graph theory, scheduling and archaeology. In this paper, we give characterizations for the optimal solutions of the imbalance problem on complete bipartite graphs. Using the characterizations, we can solve the imbalance problem in $\mathcal{O}(\log(|V|) \cdot \log(\log(|V|)))$ time, when given the cardinalities of the parts of the graph, and verify whether a given solution is optimal in $O(|V|)$ time on complete bipartite graphs. We also introduce a restricted form of proper interval bipartite graphs on which the imbalance problem is solvable in $\mathcal{O}(c \cdot \log(|V|) \cdot \log(\log(|V|)))$ time, where $c = \mathcal{O}(|V|)$, by using the aforementioned characterizations.
△ Less
Submitted 20 November, 2021; v1 submitted 29 October, 2021;
originally announced November 2021.
-
Event Classification with Multi-step Machine Learning
Authors:
Masahiko Saito,
Tomoe Kishimoto,
Yuya Kaneta,
Taichi Itoh,
Yoshiaki Umeda,
Junichi Tanaka,
Yutaro Iiyama,
Ryu Sawada,
Koji Terashi
Abstract:
The usefulness and value of Multi-step Machine Learning (ML), where a task is organized into connected sub-tasks with known intermediate inference goals, as opposed to a single large model learned end-to-end without intermediate sub-tasks, is presented. Pre-optimized ML models are connected and better performance is obtained by re-optimizing the connected one. The selection of an ML model from sev…
▽ More
The usefulness and value of Multi-step Machine Learning (ML), where a task is organized into connected sub-tasks with known intermediate inference goals, as opposed to a single large model learned end-to-end without intermediate sub-tasks, is presented. Pre-optimized ML models are connected and better performance is obtained by re-optimizing the connected one. The selection of an ML model from several small ML model candidates for each sub-task has been performed by using the idea based on Neural Architecture Search (NAS). In this paper, Differentiable Architecture Search (DARTS) and Single Path One-Shot NAS (SPOS-NAS) are tested, where the construction of loss functions is improved to keep all ML models smoothly learning. Using DARTS and SPOS-NAS as an optimization and selection as well as the connections for multi-step machine learning systems, we find that (1) such a system can quickly and successfully select highly performant model combinations, and (2) the selected models are consistent with baseline algorithms, such as grid search, and their outputs are well controlled.
△ Less
Submitted 4 June, 2021;
originally announced June 2021.
-
Multi-Level Attention Pooling for Graph Neural Networks: Unifying Graph Representations with Multiple Localities
Authors:
Takeshi D. Itoh,
Takatomi Kubo,
Kazushi Ikeda
Abstract:
Graph neural networks (GNNs) have been widely used to learn vector representation of graph-structured data and achieved better task performance than conventional methods. The foundation of GNNs is the message passing procedure, which propagates the information in a node to its neighbors. Since this procedure proceeds one step per layer, the range of the information propagation among nodes is small…
▽ More
Graph neural networks (GNNs) have been widely used to learn vector representation of graph-structured data and achieved better task performance than conventional methods. The foundation of GNNs is the message passing procedure, which propagates the information in a node to its neighbors. Since this procedure proceeds one step per layer, the range of the information propagation among nodes is small in the lower layers, and it expands toward the higher layers. Therefore, a GNN model has to be deep enough to capture global structural information in a graph. On the other hand, it is known that deep GNN models suffer from performance degradation because they lose nodes' local information, which would be essential for good model performance, through many message passing steps. In this study, we propose multi-level attention pooling (MLAP) for graph-level classification tasks, which can adapt to both local and global structural information in a graph. It has an attention pooling layer for each message passing step and computes the final graph representation by unifying the layer-wise graph representations. The MLAP architecture allows models to utilize the structural information of graphs with multiple levels of localities because it preserves layer-wise information before losing them due to oversmoothing. Results of our experiments show that the MLAP architecture improves the graph classification performance compared to the baseline architectures. In addition, analyses on the layer-wise graph representations suggest that aggregating information from multiple levels of localities indeed has the potential to improve the discriminability of learned graph representations.
△ Less
Submitted 31 October, 2021; v1 submitted 2 March, 2021;
originally announced March 2021.
-
Physical ZKP for Connected Spanning Subgraph: Applications to Bridges Puzzle and Other Problems
Authors:
Suthee Ruangwises,
Toshiya Itoh
Abstract:
An undirected graph $G$ is known to both the prover $P$ and the verifier $V$, but only $P$ knows a subgraph $H$ of $G$. Without revealing any information about $H$, $P$ wants to convince $V$ that $H$ is a connected spanning subgraph of $G$, i.e. $H$ is connected and contains all vertices of $G$. In this paper, we propose an unconventional zero-knowledge proof protocol using a physical deck of card…
▽ More
An undirected graph $G$ is known to both the prover $P$ and the verifier $V$, but only $P$ knows a subgraph $H$ of $G$. Without revealing any information about $H$, $P$ wants to convince $V$ that $H$ is a connected spanning subgraph of $G$, i.e. $H$ is connected and contains all vertices of $G$. In this paper, we propose an unconventional zero-knowledge proof protocol using a physical deck of cards, which enables $P$ to physically show that $H$ satisfies the condition without revealing it. We also show applications of this protocol to verify solutions of three well-known NP-complete problems: the Hamiltonian cycle problem, the maximum leaf spanning tree problem, and a popular logic puzzle called Bridges.
△ Less
Submitted 8 August, 2021; v1 submitted 3 November, 2020;
originally announced November 2020.
-
Physical Zero-Knowledge Proof for Ripple Effect
Authors:
Suthee Ruangwises,
Toshiya Itoh
Abstract:
Ripple Effect is a logic puzzle where the player has to fill numbers into empty cells in a rectangular grid. The grid is divided into rooms, and each room must contain consecutive integers starting from 1 to its size. Also, if two cells in the same row or column contain the same number $x$, there must be a space of at least $x$ cells separating the two cells. In this paper, we develop a physical z…
▽ More
Ripple Effect is a logic puzzle where the player has to fill numbers into empty cells in a rectangular grid. The grid is divided into rooms, and each room must contain consecutive integers starting from 1 to its size. Also, if two cells in the same row or column contain the same number $x$, there must be a space of at least $x$ cells separating the two cells. In this paper, we develop a physical zero-knowledge proof for the Ripple Effect puzzle using a deck of cards, which allows a prover to convince a verifier that he/she knows a solution without revealing it. In particular, given a secret number $x$ and a list of numbers, our protocol can physically verify that $x$ does not appear among the first $x$ numbers in the list without revealing $x$ or any number in the list.
△ Less
Submitted 27 September, 2021; v1 submitted 21 September, 2020;
originally announced September 2020.
-
Scatterplot Selection Applying a Graph Coloring Problem
Authors:
Takayuki Itoh,
Asuka Nakabayashi,
Mariko Hagita
Abstract:
Scatterplot selection is an effective approach to represent essential portions of multidimensional data in a limited display space. Various metrics for evaluation of scatterplots such as scagnostics have been presented and applied to scatterplot selection. This paper presents a new scatterplot selection technique that applies multiple metrics. The technique firstly calculates scores of scatterplot…
▽ More
Scatterplot selection is an effective approach to represent essential portions of multidimensional data in a limited display space. Various metrics for evaluation of scatterplots such as scagnostics have been presented and applied to scatterplot selection. This paper presents a new scatterplot selection technique that applies multiple metrics. The technique firstly calculates scores of scatterplots with multiple metrics and then constructs a graph by connecting similar scatterplots. The technique applies a graph coloring problem so that different colors are assigned to similar scatterplots. We can extract a set of various scatterplots by selecting them that the specific same color is assigned. This paper introduces visualization examples with a retail dataset containing multidimensional climate and sales values.
△ Less
Submitted 15 September, 2020;
originally announced September 2020.
-
Brushing Feature Values in Immersive Graph Visualization Environment
Authors:
Hinako Sassa,
Maxime Cordeil,
Mitsuo Yoshida,
Takayuki Itoh
Abstract:
There are a variety of graphs where multidimensional feature values are assigned to the nodes. Visualization of such datasets is not an easy task since they are complex and often huge. Immersive Analytics is a powerful approach to support the interactive exploration of such large and complex data. Many recent studies on graph visualization have applied immersive analytics frameworks. However, ther…
▽ More
There are a variety of graphs where multidimensional feature values are assigned to the nodes. Visualization of such datasets is not an easy task since they are complex and often huge. Immersive Analytics is a powerful approach to support the interactive exploration of such large and complex data. Many recent studies on graph visualization have applied immersive analytics frameworks. However, there have been few studies on immersive analytics for visualization of multidimensional attributes associated with the input graphs. This paper presents a new immersive analytics system that supports the interactive exploration of multidimensional feature values assigned to the nodes of input graphs. The presented system displays label-axes corresponding to the dimensions of feature values, and label-edges that connect label-axes and corresponding to the nodes. The system supports brushing operations which controls the display of edges that connect a label-axis and nodes of the graph. This paper introduces visualization examples with a graph dataset of Twitter users and reviews by experts on graph data analysis.
△ Less
Submitted 22 August, 2020;
originally announced August 2020.
-
Competitive Analysis for Two Variants of Online Metric Matching Problem
Authors:
Toshiya Itoh,
Shuichi Miyazaki,
Makoto Satake
Abstract:
In this paper, we study two variants of the online metric matching problem. The first problem is the online metric matching problem where all the servers are placed at one of two positions in the metric space. We show that a simple greedy algorithm achieves the competitive ratio of 3 and give a matching lower bound. The second problem is the online facility assignment problem on a line, where serv…
▽ More
In this paper, we study two variants of the online metric matching problem. The first problem is the online metric matching problem where all the servers are placed at one of two positions in the metric space. We show that a simple greedy algorithm achieves the competitive ratio of 3 and give a matching lower bound. The second problem is the online facility assignment problem on a line, where servers have capacities, servers and requests are placed on 1-dimensional line, and the distances between any two consecutive servers are the same. We show lower bounds $1+ \sqrt{6}$ $(> 3.44948)$, $\frac{4+\sqrt{73}}{3}$ $(>4.18133)$ and $\frac{13}{3}$ $(>4.33333)$ on the competitive ratio when the numbers of servers are 3, 4 and 5, respectively.
△ Less
Submitted 30 September, 2020; v1 submitted 19 August, 2020;
originally announced August 2020.
-
Analog Computing with Metatronic Circuits
Authors:
Mario Miscuglio,
Yaliang Gui,
Xiaoxuan Ma,
Shuai Sun,
Tarek El-Ghazawi,
Tatsuo Itoh,
Andrea Alù,
Volker J. Sorger
Abstract:
Analog photonic solutions offer unique opportunities to address complex computational tasks with unprecedented performance in terms of energy dissipation and speeds, overcoming current limitations of modern computing architectures based on electron flows and digital approaches. The lack of modularization and lumped element reconfigurability in photonics has prevented the transition to an all-optic…
▽ More
Analog photonic solutions offer unique opportunities to address complex computational tasks with unprecedented performance in terms of energy dissipation and speeds, overcoming current limitations of modern computing architectures based on electron flows and digital approaches. The lack of modularization and lumped element reconfigurability in photonics has prevented the transition to an all-optical analog computing platform. Here, we explore a nanophotonic platform based on epsilon-near-zero materials capable of solving in the analog domain partial differential equations (PDE). Wavelength stretching in zero-index media enables highly nonlocal interactions within the board based on the conduction of electric displacement, which can be monitored to extract the solution of a broad class of PDE problems. By exploiting control of deposition technique through process parameters, we demonstrate the possibility of implementing the proposed nano-optic processor using CMOS-compatible indium-tin-oxide, whose optical properties can be tuned by carrier injection to obtain programmability at high speeds and low energy requirements. Our nano-optical analog processor can be integrated at chip-scale, processing arbitrary inputs at the speed of light.
△ Less
Submitted 10 July, 2020;
originally announced July 2020.
-
Physical Zero-Knowledge Proof for Numberlink Puzzle and $k$ Vertex-Disjoint Paths Problem
Authors:
Suthee Ruangwises,
Toshiya Itoh
Abstract:
Numberlink is a logic puzzle with an objective to connect all pairs of cells with the same number by non-crossing paths in a rectangular grid. In this paper, we propose a physical protocol of zero-knowledge proof for Numberlink using a deck of cards, which allows a prover to convince a verifier that he/she knows a solution without revealing it. In particular, the protocol shows how to physically c…
▽ More
Numberlink is a logic puzzle with an objective to connect all pairs of cells with the same number by non-crossing paths in a rectangular grid. In this paper, we propose a physical protocol of zero-knowledge proof for Numberlink using a deck of cards, which allows a prover to convince a verifier that he/she knows a solution without revealing it. In particular, the protocol shows how to physically count the number of elements in a list that are equal to a given secret value without revealing that value, the positions of elements in the list that are equal to it, or the value of any other element in the list. Finally, we show that our protocol can be modified to verify a solution of the well-known $k$ vertex-disjoint paths problem, both the undirected and directed settings.
△ Less
Submitted 3 November, 2020; v1 submitted 4 February, 2020;
originally announced February 2020.
-
Securely Computing the $n$-Variable Equality Function with $2n$ Cards
Authors:
Suthee Ruangwises,
Toshiya Itoh
Abstract:
Research in the area of secure multi-party computation using a deck of playing cards, often called card-based cryptography, started from the introduction of the five-card trick protocol to compute the logical AND function by den Boer in 1989. Since then, many card-based protocols to compute various functions have been developed. In this paper, we propose two new protocols that securely compute the…
▽ More
Research in the area of secure multi-party computation using a deck of playing cards, often called card-based cryptography, started from the introduction of the five-card trick protocol to compute the logical AND function by den Boer in 1989. Since then, many card-based protocols to compute various functions have been developed. In this paper, we propose two new protocols that securely compute the $n$-variable equality function (determining whether all inputs are equal) $E: \{0,1\}^n \rightarrow \{0,1\}$ using $2n$ cards. The first protocol can be generalized to compute any doubly symmetric function $f: \{0,1\}^n \rightarrow \mathbb{Z}$ using $2n$ cards, and any symmetric function $f: \{0,1\}^n \rightarrow \mathbb{Z}$ using $2n+2$ cards. The second protocol can be generalized to compute the $k$-candidate $n$-variable equality function $E: (\mathbb{Z}/k\mathbb{Z})^n \rightarrow \{0,1\}$ using $2 \lceil \lg k \rceil n$ cards.
△ Less
Submitted 27 September, 2021; v1 submitted 14 November, 2019;
originally announced November 2019.
-
Towards Generation of Visual Attention Map for Source Code
Authors:
Takeshi D. Itoh,
Takatomi Kubo,
Kiyoka Ikeda,
Yuki Maruno,
Yoshiharu Ikutani,
Hideaki Hata,
Kenichi Matsumoto,
Kazushi Ikeda
Abstract:
Program comprehension is a dominant process in software development and maintenance. Experts are considered to comprehend the source code efficiently by directing their gaze, or attention, to important components in it. However, reflecting the importance of components is still a remaining issue in gaze behavior analysis for source code comprehension. Here we show a conceptual framework to compare…
▽ More
Program comprehension is a dominant process in software development and maintenance. Experts are considered to comprehend the source code efficiently by directing their gaze, or attention, to important components in it. However, reflecting the importance of components is still a remaining issue in gaze behavior analysis for source code comprehension. Here we show a conceptual framework to compare the quantified importance of source code components with the gaze behavior of programmers. We use "attention" in attention models (e.g., code2vec) as the importance indices for source code components and evaluate programmers' gaze locations based on the quantified importance. In this report, we introduce the idea of our gaze behavior analysis using the attention map, and the results of a preliminary experiment.
△ Less
Submitted 13 August, 2019; v1 submitted 14 July, 2019;
originally announced July 2019.
-
Stable Noncrossing Matchings
Authors:
Suthee Ruangwises,
Toshiya Itoh
Abstract:
Given a set of $n$ men represented by $n$ points lying on a line, and $n$ women represented by $n$ points lying on another parallel line, with each person having a list that ranks some people of opposite gender as his/her acceptable partners in strict order of preference. In this problem, we want to match people of opposite genders to satisfy people's preferences as well as making the edges not cr…
▽ More
Given a set of $n$ men represented by $n$ points lying on a line, and $n$ women represented by $n$ points lying on another parallel line, with each person having a list that ranks some people of opposite gender as his/her acceptable partners in strict order of preference. In this problem, we want to match people of opposite genders to satisfy people's preferences as well as making the edges not crossing one another geometrically. A noncrossing blocking pair w.r.t. a matching $M$ is a pair $(m,w)$ of a man and a woman such that they are not matched with each other but prefer each other to their own partners in $M$, and the segment $(m,w)$ does not cross any edge in $M$. A weakly stable noncrossing matching (WSNM) is a noncrossing matching that does not admit any noncrossing blocking pair. In this paper, we prove the existence of a WSNM in any instance by developing an $O(n^2)$ algorithm to find one in a given instance.
△ Less
Submitted 25 October, 2019; v1 submitted 6 March, 2019;
originally announced March 2019.
-
AND Protocols Using Only Uniform Shuffles
Authors:
Suthee Ruangwises,
Toshiya Itoh
Abstract:
Secure multi-party computation using a deck of playing cards has been a subject of research since the "five-card trick" introduced by den Boer in 1989. One of the main problems in card-based cryptography is to design committed-format protocols to compute a Boolean AND operation subject to different runtime and shuffle restrictions by using as few cards as possible. In this paper, we introduce two…
▽ More
Secure multi-party computation using a deck of playing cards has been a subject of research since the "five-card trick" introduced by den Boer in 1989. One of the main problems in card-based cryptography is to design committed-format protocols to compute a Boolean AND operation subject to different runtime and shuffle restrictions by using as few cards as possible. In this paper, we introduce two AND protocols that use only uniform shuffles. The first one requires four cards and is a restart-free Las Vegas protocol with finite expected runtime. The second one requires five cards and always terminates in finite time.
△ Less
Submitted 30 July, 2019; v1 submitted 1 October, 2018;
originally announced October 2018.
-
Unpopularity Factor in the Marriage and Roommates Problems
Authors:
Suthee Ruangwises,
Toshiya Itoh
Abstract:
Given a set $A$ of $n$ people, with each person having a preference list that ranks a subset of $A$ as his/her acceptable partners in order of preference, we consider the Roommates Problem (RP) and the Marriage Problem (MP) of matching people with their partners. In RP there is no further restriction, while in MP only people of opposite genders can be acceptable partners. For a pair of matchings…
▽ More
Given a set $A$ of $n$ people, with each person having a preference list that ranks a subset of $A$ as his/her acceptable partners in order of preference, we consider the Roommates Problem (RP) and the Marriage Problem (MP) of matching people with their partners. In RP there is no further restriction, while in MP only people of opposite genders can be acceptable partners. For a pair of matchings $X$ and $Y$, let $φ(X,Y)$ denote the number of people who prefer a person they get matched by $X$ to a person they get matched by $Y$, and define an unpopularity factor $u(M)$ of a matching $M$ to be the maximum ratio $φ(M',M) / φ(M,M')$ among all other possible matchings $M'$. In this paper, we develop an algorithm to compute the unpopularity factor of a given matching in $O(m\sqrt{n}\log^2 n)$ time for RP and in $O(m\sqrt{n}\log n)$ time for MP, where $m$ is the total length of people's preference lists. We also generalize the notion of unpopularity factor to a weighted setting where people are given different voting weights and show that our algorithm can be slightly modified to support that setting with the same running time.
△ Less
Submitted 3 November, 2020; v1 submitted 26 March, 2018;
originally announced March 2018.
-
On the Hardness of Deriving the Arithmetic Mean Component Competitive Ratio
Authors:
Toshiya Itoh,
Yoshinori Takei
Abstract:
For the multi-objective time series search problem, Hasegawa and Itoh [Theoretical Computer Science, Vo.718, pp.58-66, 2018] presented the best possible online algorithm balanced price policy (BPP for short) for any monotone function $f: R^k \to R$. Specifically, the competitive ratio with respect to the monotone function $f(c_{1},\ldots,c_{k})=(c_{1}+\cdots+c_{k})/k$ is referred to as the arithme…
▽ More
For the multi-objective time series search problem, Hasegawa and Itoh [Theoretical Computer Science, Vo.718, pp.58-66, 2018] presented the best possible online algorithm balanced price policy (BPP for short) for any monotone function $f: R^k \to R$. Specifically, the competitive ratio with respect to the monotone function $f(c_{1},\ldots,c_{k})=(c_{1}+\cdots+c_{k})/k$ is referred to as the arithmetic mean component competitive ratio. Hasegawa and Itoh derived the closed formula of the arithmetic mean component competitive ratio for $k=2$, but it has not been known for any integer $k \geq 3$. In this paper, we show that it is NP-hard to derive closed formulas of the arithmetic mean component competitive ratio for general integer $k\geq 2$. On the the hand, we derive closed formulas of the arithmetic mean component competitive ratio for $k=3$ and $k=4$.
△ Less
Submitted 10 April, 2018; v1 submitted 1 December, 2017;
originally announced December 2017.
-
A Streamline Selection Technique Overlaying with Isosurfaces
Authors:
Shiho Furuya,
Takayuki Itoh
Abstract:
Integration of scalar and vector visualization has been an interesting topic. This paper presents a technique to appropriately select and display multiple streamlines while overlaying with isosurfaces, aiming an integrated scalar and vector field visualization. The technique visualizes a scalar field by multiple semitransparent isosurfaces, and a vector field by multiple streamlines, while the tec…
▽ More
Integration of scalar and vector visualization has been an interesting topic. This paper presents a technique to appropriately select and display multiple streamlines while overlaying with isosurfaces, aiming an integrated scalar and vector field visualization. The technique visualizes a scalar field by multiple semitransparent isosurfaces, and a vector field by multiple streamlines, while the technique adequately selects the streamlines considering reduction of cluttering among the isosurfaces and streamlines. The technique first selects and renders isosurfaces, and then generates large number of streamlines from randomly selected seed points. The technique evaluates each of the streamlines according to their shapes on a 2D display space, distances to critical points of the given vector fields, and occlusion by isosurfaces. It then selects the specified number of highly evaluated streamlines. As a result, we can visualize both scalar and vector fields as a set of view-independently selected isosurfaces and view-dependently selected streamlines.
△ Less
Submitted 15 July, 2017;
originally announced July 2017.
-
Random Popular Matchings with Incomplete Preference Lists
Authors:
Suthee Ruangwises,
Toshiya Itoh
Abstract:
Given a set $A$ of $n$ people and a set $B$ of $m \geq n$ items, with each person having a list that ranks his/her preferred items in order of preference, we want to match every person with a unique item. A matching $M$ is called popular if for any other matching $M'$, the number of people who prefer $M$ to $M'$ is not less than the number of those who prefer $M'$ to $M$. For given $n$ and $m$, co…
▽ More
Given a set $A$ of $n$ people and a set $B$ of $m \geq n$ items, with each person having a list that ranks his/her preferred items in order of preference, we want to match every person with a unique item. A matching $M$ is called popular if for any other matching $M'$, the number of people who prefer $M$ to $M'$ is not less than the number of those who prefer $M'$ to $M$. For given $n$ and $m$, consider the probability of existence of a popular matching when each person's preference list is independently and uniformly generated at random. Previously, Mahdian showed that when people's preference lists are strict (containing no ties) and complete (containing all items in $B$), if $α= m/n > α_*$, where $α_* \approx 1.42$ is the root of equation $x^2 = e^{1/x}$, then a popular matching exists with probability $1-o(1)$; and if $α< α_*$, then a popular matching exists with probability $o(1)$, i.e. a phase transition occurs at $α_*$. In this paper, we investigate phase transitions in the case that people's preference lists are strict but not complete. We show that in the case where every person has a preference list with length of a constant $k \geq 4$, a similar phase transition occurs at $α_k$, where $α_k \geq 1$ is the root of equation $x e^{-1/2x} = 1-(1-e^{-1/x})^{k-1}$.
△ Less
Submitted 26 October, 2019; v1 submitted 23 September, 2016;
originally announced September 2016.
-
High-Dimensional Data Visualization by Interactive Construction of Low-Dimensional Parallel Coordinate Plots
Authors:
Takayuki Itoh,
Ashnil Kumar,
Karsten Klein,
Jinman Kim
Abstract:
Parallel coordinate plots (PCPs) are among the most useful techniques for the visualization and exploration of high-dimensional data spaces. They are especially useful for the representation of correlations among the dimensions, which identify relationships and interdependencies between variables. However, within these high-dimensional spaces, PCPs face difficulties in displaying the correlation b…
▽ More
Parallel coordinate plots (PCPs) are among the most useful techniques for the visualization and exploration of high-dimensional data spaces. They are especially useful for the representation of correlations among the dimensions, which identify relationships and interdependencies between variables. However, within these high-dimensional spaces, PCPs face difficulties in displaying the correlation between combinations of dimensions and generally require additional display space as the number of dimensions increases. In this paper, we present a new technique for high-dimensional data visualization in which a set of low-dimensional PCPs are interactively constructed by sampling user-selected subsets of the high-dimensional data space. In our technique, we first construct a graph visualization of sets of well-correlated dimensions. Users observe this graph and are able to interactively select the dimensions by sampling from its cliques, thereby dynamically specifying the most relevant lower dimensional data to be used for the construction of focused PCPs. Our interactive sampling overcomes the shortcomings of the PCPs by enabling the visualization of the most meaningful dimensions (i.e., the most relevant information) from high-dimensional spaces. We demonstrate the effectiveness of our technique through two case studies, where we show that the proposed interactive low-dimensional space constructions were pivotal for visualizing the high-dimensional data and discovering new patterns.
△ Less
Submitted 16 September, 2016;
originally announced September 2016.
-
Optimal Online Algorithms for the Multi-Objective Time Series Search Problem
Authors:
Shun Hasegawa,
Toshiya Itoh
Abstract:
Tiedemann, et al. [Proc. of WALCOM, LNCS 8973, 2015, pp.210-221] defined multi-objective online problems (as an online version of multi-objective optimization problems) and the competitive analysis for multi-objective online problems and showed that (1) with respect to the worst component competitive analysis, the online algorithm RPP-HIGH is best possible for the multi-objective time series searc…
▽ More
Tiedemann, et al. [Proc. of WALCOM, LNCS 8973, 2015, pp.210-221] defined multi-objective online problems (as an online version of multi-objective optimization problems) and the competitive analysis for multi-objective online problems and showed that (1) with respect to the worst component competitive analysis, the online algorithm RPP-HIGH is best possible for the multi-objective time series search~problem; (2) with respect to the arithmetic mean component competitive analysis, the online algorithm RPP-MULT is best possible for the bi-objective time series search problem; (3) with respect to the geometric mean component competitive analysis, the online algorithm RPP-MULT is best possible for the bi-objective time series search problem. In this paper, we first point out that the definitions and frameworks of the competitive analysis due to Tiedemann, et al. do not necessarily capture the efficiency of online algorithms for multi-objective online problems and provide modified definitions of the competitive analysis for multi-objective online problems. Then under the modified framework, we present a simple online algorithm Balanced Price Policy BPP_{k} for the multi-objective (k-objective) time series search problem, and show that the algorithm BPP_{k} is best possible with respect to any measure of the competitive analysis (defined by a monotone continuous function f). Under the modified framework, we derive exact values of the competitive ratio for the multi-objective time series search problem with respect to the worst component competitive analysis, the arithmetic mean component competitive analysis, and the geometric mean component competitive analysis.
△ Less
Submitted 29 April, 2016; v1 submitted 15 June, 2015;
originally announced June 2015.
-
Buffer Management of Multi-Queue QoS Switches with Class Segregation
Authors:
Toshiya Itoh,
Seiji Yoshimoto
Abstract:
In this paper, we focus on buffer management of multi-queue QoS switches in which packets of different values are segregated in different queues. Our model consists of $m$ queues and $m$ packet values $0 < v_{1} < v_{2} < ... < v_{m}$. Recently, Al-Bawani and Souza [IPL 113(4), pp.145-150, 2013] presented an online algorithm GREEDY for buffer management of multi-queue QoS switches with class segre…
▽ More
In this paper, we focus on buffer management of multi-queue QoS switches in which packets of different values are segregated in different queues. Our model consists of $m$ queues and $m$ packet values $0 < v_{1} < v_{2} < ... < v_{m}$. Recently, Al-Bawani and Souza [IPL 113(4), pp.145-150, 2013] presented an online algorithm GREEDY for buffer management of multi-queue QoS switches with class segregation and showed thatif $m$ queues have the same size, then the competitive ratio of GREEDY is $1+r$, where $r=\max_{1 \leq i \leq m-1} v_{i}/v_{i+1}$. In this paper, we precisely analyze the behavior of GREEDY and show that it is $(1+r)$-competitive for the case that $m$ queues do not necessarily have the same size.
△ Less
Submitted 2 May, 2013; v1 submitted 10 April, 2013;
originally announced April 2013.
-
Greedy Algorithms for Multi-Queue Buffer Management with Class Segregation
Authors:
Toshiya Itoh,
Seiji Yoshimoto
Abstract:
In this paper, we focus on a multi-queue buffer management in which packets of different values are segregated in different queues. Our model consists of m packets values and m queues. Recently, Al-Bawani and Souza (arXiv:1103.6049v2 [cs.DS] 30 Mar 2011) presented an online multi-queue buffer management algorithm Greedy and showed that it is 2-competitive for the general m-valued case, i.e., m pac…
▽ More
In this paper, we focus on a multi-queue buffer management in which packets of different values are segregated in different queues. Our model consists of m packets values and m queues. Recently, Al-Bawani and Souza (arXiv:1103.6049v2 [cs.DS] 30 Mar 2011) presented an online multi-queue buffer management algorithm Greedy and showed that it is 2-competitive for the general m-valued case, i.e., m packet values are 0 < v_{1} < v_{2} < ... < v_{m}, and (1+v_{1}/v_{2})-competitive for the two-valued case, i.e., two packet values are 0 < v_{1} < v_{2}. For the general m-valued case, let c_i = (v_{i} + \sum_{j=1}^{i-1} 2^{j-1} v_{i-j})/(v_{i+1} + \sum_{j=1}^{i-1}2^{j-1}v_{i-j}) for 1 \leq i \leq m-1, and let c_{m}^{*} = \max_{i} c_{i}. In this paper, we precisely analyze the competitive ratio of Greedy for the general m-valued case, and show that the algorithm Greedy is (1+c_{m}^{*})-competitive.
△ Less
Submitted 26 December, 2011; v1 submitted 27 September, 2011;
originally announced September 2011.
-
New Constructions for Query-Efficient Locally Decodable Codes of Subexponential Length
Authors:
Toshiya Itoh,
Yasuhiro Suzuki
Abstract:
A $(k,δ,ε)$-locally decodable code $C: F_{q}^{n} \to F_{q}^{N}$ is an error-correcting code that encodes each message $\vec{x}=(x_{1},x_{2},...,x_{n}) \in F_{q}^{n}$ to $C(\vec{x}) \in F_{q}^{N}$ and has the following property: For any $\vec{y} \in {\bf F}_{q}^{N}$ such that $d(\vec{y},C(\vec{x})) \leq δN$ and each $1 \leq i \leq n$, the symbol $x_{i}$ of $\vec{x}$ can be recovered with probabil…
▽ More
A $(k,δ,ε)$-locally decodable code $C: F_{q}^{n} \to F_{q}^{N}$ is an error-correcting code that encodes each message $\vec{x}=(x_{1},x_{2},...,x_{n}) \in F_{q}^{n}$ to $C(\vec{x}) \in F_{q}^{N}$ and has the following property: For any $\vec{y} \in {\bf F}_{q}^{N}$ such that $d(\vec{y},C(\vec{x})) \leq δN$ and each $1 \leq i \leq n$, the symbol $x_{i}$ of $\vec{x}$ can be recovered with probability at least $1-ε$ by a randomized decoding algorithm looking only at $k$ coordinates of $\vec{y}$. The efficiency of a $(k,δ,ε)$-locally decodable code $C: F_{q}^{n} \to F_{q}^{N}$ is measured by the code length $N$ and the number $k$ of queries. For any $k$-query locally decodable code $C: F_{q}^{n} \to F_{q}^{N}$, the code length $N$ is conjectured to be exponential of $n$, however, this was disproved. Yekhanin [In Proc. of STOC, 2007] showed that there exists a 3-query locally decodable code $C: F_{2}^{n} \to F_{2}^{N}$ such that $N=\exp(n^{(1/\log \log n)})$ assuming that the number of Mersenne primes is infinite. For a 3-query locally decodable code $C: F_{q}^{n} \to F_{q}^{N}$, Efremenko [ECCC Report No.69, 2008] reduced the code length further to $N=\exp(n^{O((\log \log n/ \log n)^{1/2})})$, and also showed that for any integer $r>1$, there exists a $k$-query locally decodable code $C: F_{q}^{n} \to F_{q}^{N}$ such that $k \leq 2^{r}$ and $N=\exp(n^{O((\log \log n/ \log n)^{1-1/r})})$. In this paper, we present a query-efficient locally decodable code and show that for any integer $r>1$, there exists a $k$-query locally decodable code $C: F_{q}^{n} \to F_{q}^{N}$ such that $k \leq 3 \cdot 2^{r-2}$ and $N=\exp(n^{O((\log \log n/ \log n)^{1-1/r})})$.
△ Less
Submitted 29 October, 2008; v1 submitted 25 October, 2008;
originally announced October 2008.
-
High Quality Factor Silicon Cantilever Driven by PZT Actuator for Resonant Based Mass Detection
Authors:
Jian Lu,
T. Ikehara,
Yi Zhang,
Takashi Mihara,
Toshihiro Itoh,
Ryutaro Maeda
Abstract:
A high quality factor (Q-factor) piezoelectric lead zirconat titanate (PZT) actuated single crystal silicon cantilever was proposed in this paper for resonant based ultra-sensitive mass detection. Energy dissipation from intrinsic mechanical loss of the PZT film was successfully compressed by separating the PZT actuator from resonant structure. Excellent Q-factor, which is several times larger t…
▽ More
A high quality factor (Q-factor) piezoelectric lead zirconat titanate (PZT) actuated single crystal silicon cantilever was proposed in this paper for resonant based ultra-sensitive mass detection. Energy dissipation from intrinsic mechanical loss of the PZT film was successfully compressed by separating the PZT actuator from resonant structure. Excellent Q-factor, which is several times larger than conventional PZT cantilever, was achieved under both atmospheric pressure and reduced pressures. For a 30 micrometer-wide 100 micrometer-long cantilever, Q-factor was measured as high as 1113 and 7279 under the pressure of 101.2 KPa and 35 Pa, respectively. Moreover, it was found that high-mode vibration can be realized by the cantilever for the pursuit of great Q-factor, while support loss became significant because of the increased vibration amplitude at the actuation point. An optimized structure using node-point actuation was suggested then to suppress corresponding energy dissipation.
△ Less
Submitted 7 May, 2008;
originally announced May 2008.
-
Approximation Algorithms for the Highway Problem under the Coupon Model
Authors:
Ryoso Hamane,
Toshiya Itoh,
Kouhei Tomita
Abstract:
When a store sells items to customers, the store wishes to determine the prices of the items to maximize its profit. Intuitively, if the store sells the items with low (resp. high) prices, the customers buy more (resp. less) items, which provides less profit to the store. So it would be hard for the store to decide the prices of items. Assume that the store has a set V of n items and there is a…
▽ More
When a store sells items to customers, the store wishes to determine the prices of the items to maximize its profit. Intuitively, if the store sells the items with low (resp. high) prices, the customers buy more (resp. less) items, which provides less profit to the store. So it would be hard for the store to decide the prices of items. Assume that the store has a set V of n items and there is a set E of m customers who wish to buy those items, and also assume that each item i \in V has the production cost d_i and each customer e_j \in E has the valuation v_j on the bundle e_j \subseteq V of items. When the store sells an item i \in V at the price r_i, the profit for the item i is p_i=r_i-d_i. The goal of the store is to decide the price of each item to maximize its total profit. In most of the previous works, the item pricing problem was considered under the assumption that p_i \geq 0 for each i \in V, however, Balcan, et al. [In Proc. of WINE, LNCS 4858, 2007] introduced the notion of loss-leader, and showed that the seller can get more total profit in the case that p_i < 0 is allowed than in the case that p_i < 0 is not allowed. In this paper, we consider the line and the cycle highway problem, and show approximation algorithms for the line and/or cycle highway problem for which the smallest valuation is s and the largest valuation is \ell or all valuations are identical.
△ Less
Submitted 4 January, 2008; v1 submitted 16 December, 2007;
originally announced December 2007.
-
Weighted Random Popular Matchings
Authors:
Toshiya Itoh,
Osamu Watanabe
Abstract:
For a set A of n applicants and a set I of m items, we consider a problem of computing a matching of applicants to items, i.e., a function M mapping A to I; here we assume that each applicant $x \in A$ provides a preference list on items in I. We say that an applicant $x \in A$ prefers an item p than an item q if p is located at a higher position than q in its preference list, and we say that x…
▽ More
For a set A of n applicants and a set I of m items, we consider a problem of computing a matching of applicants to items, i.e., a function M mapping A to I; here we assume that each applicant $x \in A$ provides a preference list on items in I. We say that an applicant $x \in A$ prefers an item p than an item q if p is located at a higher position than q in its preference list, and we say that x prefers a matching M over a matching M' if x prefers M(x) over M'(x). For a given matching problem A, I, and preference lists, we say that M is more popular than M' if the number of applicants preferring M over M' is larger than that of applicants preferring M' over M, and M is called a popular matching if there is no other matching that is more popular than M. Here we consider the situation that A is partitioned into $A_{1},A_{2},...,A_{k}$, and that each $A_{i}$ is assigned a weight $w_{i}>0$ such that w_{1}>w_{2}>...>w_{k}>0$. For such a matching problem, we say that M is more popular than M' if the total weight of applicants preferring M over M' is larger than that of applicants preferring M' over M, and we call M an k-weighted popular matching if there is no other matching that is more popular than M. In this paper, we analyze the 2-weighted matching problem, and we show that (lower bound) if $m/n^{4/3}=o(1)$, then a random instance of the 2-weighted matching problem with $w_{1} \geq 2w_{2}$ has a 2-weighted popular matching with probability o(1); and (upper bound) if $n^{4/3}/m = o(1)$, then a random instance of the 2-weighted matching problem with $w_{1} \geq 2w_{2}$ has a 2-weighted popular matching with probability 1-o(1).
△ Less
Submitted 29 October, 2007;
originally announced October 2007.
-
Primal-dual distance bounds of linear codes with application to cryptography
Authors:
Ryutaroh Matsumoto,
Kaoru Kurosawa,
Toshiya Itoh,
Toshimitsu Konno,
Tomohiko Uyematsu
Abstract:
Let $N(d,d^\perp)$ denote the minimum length $n$ of a linear code $C$ with $d$ and $d^{\bot}$, where $d$ is the minimum Hamming distance of $C$ and $d^{\bot}$ is the minimum Hamming distance of $C^{\bot}$. In this paper, we show a lower bound and an upper bound on $N(d,d^\perp)$. Further, for small values of $d$ and $d^\perp$, we determine $N(d,d^\perp)$ and give a generator matrix of the optimu…
▽ More
Let $N(d,d^\perp)$ denote the minimum length $n$ of a linear code $C$ with $d$ and $d^{\bot}$, where $d$ is the minimum Hamming distance of $C$ and $d^{\bot}$ is the minimum Hamming distance of $C^{\bot}$. In this paper, we show a lower bound and an upper bound on $N(d,d^\perp)$. Further, for small values of $d$ and $d^\perp$, we determine $N(d,d^\perp)$ and give a generator matrix of the optimum linear code. This problem is directly related to the design method of cryptographic Boolean functions suggested by Kurosawa et al.
△ Less
Submitted 12 June, 2006; v1 submitted 24 June, 2005;
originally announced June 2005.