Zum Hauptinhalt springen

Showing 1–15 of 15 results for author: Iwasaki, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.09068  [pdf, other

    cs.LG cs.AI stat.ML

    Learning Fair Division from Bandit Feedback

    Authors: Hakuei Yamada, Junpei Komiyama, Kenshi Abe, Atsushi Iwasaki

    Abstract: This work addresses learning online fair division under uncertainty, where a central planner sequentially allocates items without precise knowledge of agents' values or utilities. Departing from conventional online algorithm, the planner here relies on noisy, estimated values obtained after allocating items. We introduce wrapper algorithms utilizing \textit{dual averaging}, enabling gradual learni… ▽ More

    Submitted 15 November, 2023; originally announced November 2023.

  2. arXiv:2305.16610  [pdf, other

    cs.GT cs.LG

    Adaptively Perturbed Mirror Descent for Learning in Games

    Authors: Kenshi Abe, Kaito Ariu, Mitsuki Sakamoto, Atsushi Iwasaki

    Abstract: This paper proposes a payoff perturbation technique for the Mirror Descent (MD) algorithm in games where the gradient of the payoff functions is monotone in the strategy profile space, potentially containing additive noise. The optimistic family of learning algorithms, exemplified by optimistic MD, successfully achieves {\it last-iterate} convergence in scenarios devoid of noise, leading the dynam… ▽ More

    Submitted 24 June, 2024; v1 submitted 26 May, 2023; originally announced May 2023.

    Comments: Accepted at ICML 2024

  3. arXiv:2208.09855  [pdf, other

    cs.GT cs.LG

    Last-Iterate Convergence with Full and Noisy Feedback in Two-Player Zero-Sum Games

    Authors: Kenshi Abe, Kaito Ariu, Mitsuki Sakamoto, Kentaro Toyoshima, Atsushi Iwasaki

    Abstract: This paper proposes Mutation-Driven Multiplicative Weights Update (M2WU) for learning an equilibrium in two-player zero-sum normal-form games and proves that it exhibits the last-iterate convergence property in both full and noisy feedback settings. In the former, players observe their exact gradient vectors of the utility functions. In the latter, they only observe the noisy gradient vectors. Eve… ▽ More

    Submitted 26 May, 2023; v1 submitted 21 August, 2022; originally announced August 2022.

    Comments: Accepted in AISTATS 2023

  4. arXiv:2206.09254  [pdf, other

    cs.GT cs.LG stat.ML

    Mutation-Driven Follow the Regularized Leader for Last-Iterate Convergence in Zero-Sum Games

    Authors: Kenshi Abe, Mitsuki Sakamoto, Atsushi Iwasaki

    Abstract: In this study, we consider a variant of the Follow the Regularized Leader (FTRL) dynamics in two-player zero-sum games. FTRL is guaranteed to converge to a Nash equilibrium when time-averaging the strategies, while a lot of variants suffer from the issue of limit cycling behavior, i.e., lack the last-iterate convergence guarantee. To this end, we propose mutant FTRL (M-FTRL), an algorithm that int… ▽ More

    Submitted 18 June, 2022; originally announced June 2022.

    Comments: Accepted in UAI 2022

  5. arXiv:2205.14387  [pdf, other

    cs.GT econ.GN

    Regulating Matching Markets with Constraints: Data-driven Taxation

    Authors: Akira Matsushita, Kei Ikegami, Kyohei Okumura, Yoji Tomita, Atsushi Iwasaki

    Abstract: This paper develops a framework to conduct a counterfactual analysis to regulate matching markets with regional constraints that impose lower and upper bounds on the number of matches in each region. Our work is motivated by the Japan Residency Matching Program, in which the policymaker wants to guarantee the least number of doctors working in rural regions to achieve the minimum standard of servi… ▽ More

    Submitted 5 March, 2023; v1 submitted 28 May, 2022; originally announced May 2022.

  6. arXiv:2202.06570  [pdf, other

    cs.GT cs.AI

    Anytime Capacity Expansion in Medical Residency Match by Monte Carlo Tree Search

    Authors: Kenshi Abe, Junpei Komiyama, Atsushi Iwasaki

    Abstract: This paper considers the capacity expansion problem in two-sided matchings, where the policymaker is allowed to allocate some extra seats as well as the standard seats. In medical residency match, each hospital accepts a limited number of doctors. Such capacity constraints are typically given in advance. However, such exogenous constraints can compromise the welfare of the doctors; some popular ho… ▽ More

    Submitted 22 May, 2022; v1 submitted 14 February, 2022; originally announced February 2022.

    Journal ref: IJCAI 2022

  7. arXiv:1907.05036  [pdf, ps, other

    eess.IV cs.CV q-bio.CB

    Extension of Sinkhorn Method: Optimal Movement Estimation of Agents Moving at Constant Velocity

    Authors: Daigo Okada, Naotoshi Nakamura, Takuya Wada, Ayako Iwasaki, Ryo Yamada

    Abstract: In the field of bioimaging, an important part of analyzing the motion of objects is tracking. We propose a method that applies the Sinkhorn distance for solving the optimal transport problem to track objects. The advantage of this method is that it can flexibly incorporate various assumptions in tracking as a cost matrix. First, we extend the Sinkhorn distance from two dimensions to three dimensio… ▽ More

    Submitted 11 July, 2019; originally announced July 2019.

    Comments: 12 pages, 7 figures, 2 tables

    MSC Class: 92C55

    Journal ref: Transactions of the Japanese Society for Artificial Intelligence 34.5 (2019) D-J13_1-7

  8. arXiv:1907.04163  [pdf, ps, other

    cs.GT

    Approximately Stable Matchings with General Constraints

    Authors: Yasushi Kawase, Atsushi Iwasaki

    Abstract: This paper focuses on two-sided matching where one side (a hospital or firm) is matched to the other side (a doctor or worker) so as to maximize a cardinal objective under general feasibility constraints. In a standard model, even though multiple doctors can be matched to a single hospital, a hospital has a responsive preference and a maximum quota. However, in practical applications, a hospital h… ▽ More

    Submitted 9 July, 2019; originally announced July 2019.

  9. arXiv:1711.07359  [pdf, ps, other

    cs.GT

    Approximately Stable Matchings with Budget Constraints

    Authors: Yasushi Kawase, Atsushi Iwasaki

    Abstract: This paper considers two-sided matching with budget constraints where one side (firm or hospital) can make monetary transfers (offer wages) to the other (worker or doctor). In a standard model, while multiple doctors can be matched to a single hospital, a hospital has a maximum quota: the number of doctors assigned to a hospital cannot exceed a certain limit. In our model, a hospital instead has a… ▽ More

    Submitted 21 November, 2017; v1 submitted 17 November, 2017; originally announced November 2017.

    Comments: Accepted for the 32nd AAAI Conference on Artificial Intelligence (AAAI2018). arXiv admin note: text overlap with arXiv:1705.07643

  10. Near-Feasible Stable Matchings with Budget Constraints

    Authors: Yasushi Kawase, Atsushi Iwasaki

    Abstract: We consider the matching with contracts framework of Hatfield and Milgrom when one side (a firm or hospital) can make monetary transfers (offer wages) to the other (a worker or doctor). In a standard model, monetary transfers are not restricted. However, we assume that each hospital has a fixed budget; that is, the total amount of wages allocated by each hospital to the doctors is constrained. Wit… ▽ More

    Submitted 16 October, 2019; v1 submitted 22 May, 2017; originally announced May 2017.

    Comments: Accepted for the 26th International Joint Conference on Artificial Intelligence (IJCAI2017)

  11. arXiv:1607.08311  [pdf, ps, other

    cs.IT nlin.CD

    Further improving security of Vector Stream Cipher

    Authors: Atsushi Iwasaki, Ken Umeno

    Abstract: Vector Stream Cipher (VSC) is a stream cipher which consists of permutation polynomial over a ring of modulo $2^w$. The algorithm for generating key stream is very simple and the encryption is very fast. Some theoretical attacks for VSC have been reported so far since the invention of VSC in 2004. Then, the authors proposed some improvements and developed "Vector Stream Cipher 2.0 (VSC 2.0)" to be… ▽ More

    Submitted 6 November, 2016; v1 submitted 28 July, 2016; originally announced July 2016.

  12. arXiv:1607.03583  [pdf, other

    cs.GT

    Repeated Multimarket Contact with Private Monitoring: A Belief-Free Approach

    Authors: Atsushi Iwasaki, Tadashi Sekiguchi, Shun Yamamoto, Makoto Yokoo

    Abstract: This paper studies repeated games where two players play multiple duopolistic games simultaneously (multimarket contact). A key assumption is that each player receives a noisy and private signal about the other's actions (private monitoring or observation errors). There has been no game-theoretic support that multimarket contact facilitates collusion or not, in the sense that more collusive equili… ▽ More

    Submitted 22 November, 2019; v1 submitted 12 July, 2016; originally announced July 2016.

    Comments: Accepted for the 9th Intl. Symp. on Algorithmic Game Theory; An extended version was accepted at the Thirty-Fourth AAAI Conference on Artificial Intelligence (AAAI-20)

  13. arXiv:1605.03449  [pdf, ps, other

    cs.IT

    One-stroke polynomials over a ring of modulo $2^w$

    Authors: Atsushi Iwasaki, Ken Umeno

    Abstract: Permutation polynomials over a ring of modulo $2^w$ are compatible with digital computers and digital signal processors, and so they are in particular expected to be useful for cryptography and pseudo random number generator. In general, the period of the polynomial should be long in such fields. In this paper, we derive the necessary and sufficient condition which specify one-stroke polynomials w… ▽ More

    Submitted 27 July, 2016; v1 submitted 11 May, 2016; originally announced May 2016.

  14. arXiv:1602.08238  [pdf, ps, other

    cs.IT

    Three Theorems on odd degree Chebyshev polynomials and more generalized permutation polynomials over a ring of module $2^w$

    Authors: Atsushi Iwasaki, Ken Umeno

    Abstract: Odd degree Chebyshev polynomials over a ring of modulo $2^w$ have two kinds of period. One is an "orbital period". Odd degree Chebyshev polynomials are bijection over the ring. Therefore, when an odd degree Chebyshev polynomial iterate affecting a factor of the ring, we can observe an orbit over the ring. The "orbital period" is a period of the orbit. The other is a "degree period". It is observed… ▽ More

    Submitted 29 March, 2016; v1 submitted 26 February, 2016; originally announced February 2016.

  15. arXiv:1106.2378  [pdf, ps, other

    cs.GT cs.CC

    False-name-proof Mechanisms for Hiring a Team

    Authors: Atsushi Iwasaki, David Kempe, Mahyar Salek, Makoto Yokoo

    Abstract: We study the problem of hiring a team of selfish agents to perform a task. Each agent is assumed to own one or more elements of a set system, and the auctioneer is trying to purchase a feasible solution by conducting an auction. Our goal is to design auctions that are truthful and false-name-proof, meaning that it is in the agents' best interest to reveal ownership of all elements (which may not b… ▽ More

    Submitted 12 June, 2011; originally announced June 2011.

    Comments: 23 pages, 3 figures, This paper is an extented version of "False-name-proof Mechanisms for Hiring a Team" in the Proceedings of the Workshop on Internet and Network Economics, 2007