Zum Hauptinhalt springen

Showing 1–21 of 21 results for author: Iwata, K

Searching in archive cs. Search in all archives.
.
  1. Encoding and Decoding Algorithms of ANS Variants and Evaluation of Their Average Code Lengths

    Authors: Hirosuke Yamamoto, Ken-ichi Iwata

    Abstract: Asymmetric Numeral Systems (ANS) proposed by Jarek Duda are high-performance distortionless data compression schemes that can achieve almost the same compression performance as arithmetic codes with less arithmetic operations than arithmetic coding. The ANS is widely used in various practical systems like Facebook, Apple, Google, Dropbox, Microsoft, and Pixar, due to their high performance, but ma… ▽ More

    Submitted 14 August, 2024; originally announced August 2024.

    Comments: This paper is an English translation version of an invited paper published in the IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (Japanese Edition)

    Journal ref: The IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (Japanese Edition), July, 2022

  2. arXiv:2308.04535  [pdf, other

    cs.CV

    Estimation of Human Condition at Disaster Site Using Aerial Drone Images

    Authors: Tomoki Arai, Kenji Iwata, Kensho Hara, Yutaka Satoh

    Abstract: Drones are being used to assess the situation in various disasters. In this study, we investigate a method to automatically estimate the damage status of people based on their actions in aerial drone images in order to understand disaster sites faster and save labor. We constructed a new dataset of aerial images of human actions in a hypothetical disaster that occurred in an urban area, and classi… ▽ More

    Submitted 8 August, 2023; originally announced August 2023.

    Comments: In submission to the ICCV 2023 Artificial Intelligence for Humanitarian Assistance and Disaster Response Workshop

  3. arXiv:2306.09671  [pdf, ps, other

    cs.IT

    The Optimality of AIFV Codes in the Class of $2$-bit Delay Decodable Codes

    Authors: Kengo Hashimoto, Ken-ichi Iwata

    Abstract: AIFV (almost instantaneous fixed-to-variable length) codes are noiseless source codes that can attain a shorter average codeword length than Huffman codes by allowing a time-variant encoder with two code tables and a decoding delay of at most 2 bits. First, we consider a general class of noiseless source codes, called k-bit delay decodable codes, in which one allows a finite number of code tables… ▽ More

    Submitted 16 June, 2023; originally announced June 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2306.07563

  4. arXiv:2306.07563  [pdf, ps, other

    cs.IT

    Properties of k-bit Delay Decodable Codes

    Authors: Kengo Hashimoto, Ken-ichi Iwata

    Abstract: The class of k-bit delay decodable codes, source codes allowing decoding delay of at most k bits for k >= 0, can attain a shorter average codeword length than Huffman codes. This paper discusses the general properties of the class of k-bit delay decodable codes with a finite number of code tables and proves two theorems which enable us to limit the scope of code-tuples to be considered when discus… ▽ More

    Submitted 13 June, 2023; originally announced June 2023.

  5. arXiv:2301.11591  [pdf, other

    cs.GR

    Information Entropy-based Camera Path Estimation for In-Situ Visualization

    Authors: Ken Iwata, Naohisa Sakamoto, Jorji Nonaka, Chongke Bi

    Abstract: In-situ processing has widely been recognized as an effective approach for the visualization and analysis of large-scale simulation outputs from modern HPC systems. One of the most common approaches for batch-based in-situ visualization is the image- or video-based approach. In this kind of approach, a large number of rendered images are generated from different viewpoints at each time step and ha… ▽ More

    Submitted 30 January, 2023; v1 submitted 27 January, 2023; originally announced January 2023.

  6. arXiv:2301.11588  [pdf, other

    stat.ML cs.LG

    Bounding Box-based Multi-objective Bayesian Optimization of Risk Measures under Input Uncertainty

    Authors: Yu Inatsu, Shion Takeno, Hiroyuki Hanada, Kazuki Iwata, Ichiro Takeuchi

    Abstract: In this study, we propose a novel multi-objective Bayesian optimization (MOBO) method to efficiently identify the Pareto front (PF) defined by risk measures for black-box functions under the presence of input uncertainty (IU). Existing BO methods for Pareto optimization in the presence of IU are risk-specific or without theoretical guarantees, whereas our proposed method addresses general risk mea… ▽ More

    Submitted 24 November, 2023; v1 submitted 27 January, 2023; originally announced January 2023.

    Comments: 39 pages, 5 figures

  7. arXiv:2209.08874  [pdf, other

    cs.IT

    Optimality of Huffman Code in the Class of 1-bit Delay Decodable Codes

    Authors: Kengo Hashimoto, Ken-ichi Iwata

    Abstract: For a given independent and identically distributed (i.i.d.) source, Huffman code achieves the optimal average codeword length in the class of instantaneous code with a single code table. However, it is known that there exist time-variant encoders, which achieve a shorter average codeword length than the Huffman code, using multiple code tables and allowing at most k-bit decoding delay for k = 2,… ▽ More

    Submitted 19 September, 2022; originally announced September 2022.

  8. arXiv:2103.14146  [pdf, other

    cs.CV

    Describing and Localizing Multiple Changes with Transformers

    Authors: Yue Qiu, Shintaro Yamamoto, Kodai Nakashima, Ryota Suzuki, Kenji Iwata, Hirokatsu Kataoka, Yutaka Satoh

    Abstract: Change captioning tasks aim to detect changes in image pairs observed before and after a scene change and generate a natural language description of the changes. Existing change captioning studies have mainly focused on a single change.However, detecting and describing multiple changed parts in image pairs is essential for enhancing adaptability to complex scenarios. We solve the above issues from… ▽ More

    Submitted 14 September, 2021; v1 submitted 25 March, 2021; originally announced March 2021.

    Comments: Accepted by ICCV2021. 18 pages, 15 figures, project page: https://cvpaperchallenge.github.io/Describing-and-Localizing-Multiple-Change-with-Transformers/

  9. arXiv:2103.13023  [pdf, other

    cs.CV

    Can Vision Transformers Learn without Natural Images?

    Authors: Kodai Nakashima, Hirokatsu Kataoka, Asato Matsumoto, Kenji Iwata, Nakamasa Inoue

    Abstract: Can we complete pre-training of Vision Transformers (ViT) without natural images and human-annotated labels? Although a pre-trained ViT seems to heavily rely on a large-scale dataset and human-annotated labels, recent large-scale datasets contain several problems in terms of privacy violations, inadequate fairness protection, and labor-intensive annotation. In the present paper, we pre-train ViT w… ▽ More

    Submitted 24 March, 2021; originally announced March 2021.

    Comments: Project page: https://hirokatsukataoka16.github.io/Vision-Transformers-without-Natural-Images/

  10. arXiv:2010.14002  [pdf, other

    eess.SP cs.LG

    Graph Blind Deconvolution with Sparseness Constraint

    Authors: Kazuma Iwata, Koki Yamada, Yuichi Tanaka

    Abstract: We propose a blind deconvolution method for signals on graphs, with the exact sparseness constraint for the original signal. Graph blind deconvolution is an algorithm for estimating the original signal on a graph from a set of blurred and noisy measurements. Imposing a constraint on the number of nonzero elements is desirable for many different applications. This paper deals with the problem with… ▽ More

    Submitted 26 October, 2020; originally announced October 2020.

  11. Countably Infinite Multilevel Source Polarization for Non-Stationary Erasure Distributions

    Authors: Yuta Sakai, Ken-ichi Iwata, Hiroshi Fujisaki

    Abstract: Polar transforms are central operations in the study of polar codes. This paper examines polar transforms for non-stationary memoryless sources on possibly infinite source alphabets. This is the first attempt of source polarization analysis over infinite alphabets. The source alphabet is defined to be a Polish group, and we handle the Arıkan-style two-by-two polar transform based on the group. Def… ▽ More

    Submitted 26 April, 2019; originally announced April 2019.

    Comments: 12 pages, 1 figure, a short version has been accepted by the 2019 IEEE International Symposium on Information Theory (ISIT2019)

  12. Modular Arithmetic Erasure Channels and Their Multilevel Channel Polarization

    Authors: Yuta Sakai, Ken-ichi Iwata, Hiroshi Fujisaki

    Abstract: This study proposes \emph{modular arithmetic erasure channels} (MAECs), a novel class of erasure-like channels with an input alphabet that need not be binary. This class contains the binary erasure channel (BEC) and some other known erasure-like channels as special cases. For MAECs, we provide recursive formulas of Arıkan-like polar transform to simulate channel polarization. In other words, we sh… ▽ More

    Submitted 4 May, 2020; v1 submitted 23 April, 2018; originally announced April 2018.

    Comments: 42 pages, 4 figures, 1 table, accepted by IEEE Transactions on Information Theory on April 2020

    Journal ref: IEEE Transactions on Information Theory, vol. 66, no. 7, pp. 3976--4006, July 2020

  13. Asymptotic Distribution of Multilevel Channel Polarization for a Certain Class of Erasure Channels

    Authors: Yuta Sakai, Ken-ichi Iwata, Hiroshi Fujisaki

    Abstract: This study examines multilevel channel polarization for a certain class of erasure channels that the input alphabet size is an arbitrary composite number. We derive limiting proportions of partially noiseless channels for such a class. The results of this study are proved by an argument of convergent sequences, inspired by Alsan and Telatar's simple proof of polarization, and without martingale co… ▽ More

    Submitted 13 January, 2018; originally announced January 2018.

    Comments: 31 pages; 1 figure; 1 table; a short version of this paper has been submitted to the 2018 IEEE International Symposium on Information Theory (ISIT2018)

  14. arXiv:1707.08567  [pdf

    cs.IT

    Proceedings of Workshop AEW10: Concepts in Information Theory and Communications

    Authors: Kees A. Schouhamer Immink, Stan Baggen, Ferdaous Chaabane, Yanling Chen, Peter H. N. de With, Hela Gassara, Hamed Gharbi, Adel Ghazel, Khaled Grati, Naira M. Grigoryan, Ashot Harutyunyan, Masayuki Imanishi, Mitsugu Iwamoto, Ken-ichi Iwata, Hiroshi Kamabe, Brian M. Kurkoski, Shigeaki Kuzuoka, Patrick Langenhuizen, Jan Lewandowsky, Akiko Manada, Shigeki Miyake, Hiroyoshi Morita, Jun Muramatsu, Safa Najjar, Arnak V. Poghosyan , et al. (9 additional authors not shown)

    Abstract: The 10th Asia-Europe workshop in "Concepts in Information Theory and Communications" AEW10 was held in Boppard, Germany on June 21-23, 2017. It is based on a longstanding cooperation between Asian and European scientists. The first workshop was held in Eindhoven, the Netherlands in 1989. The idea of the workshop is threefold: 1) to improve the communication between the scientist in the different p… ▽ More

    Submitted 27 July, 2017; originally announced July 2017.

    Comments: 44 pages, editors for the proceedings: Yanling Chen and A. J. Han Vinck

    MSC Class: 68P30; 94A05

  15. Sharp Bounds on Arimoto's Conditional Rényi Entropies Between Two Distinct Orders

    Authors: Yuta Sakai, Ken-ichi Iwata

    Abstract: This study examines sharp bounds on Arimoto's conditional Rényi entropy of order $β$ with a fixed another one of distinct order $α\neq β$. Arimoto inspired the relation between the Rényi entropy and the $\ell_{r}$-norm of probability distributions, and he introduced a conditional version of the Rényi entropy. From this perspective, we analyze the $\ell_{r}$-norms of particular distributions. As re… ▽ More

    Submitted 2 February, 2017; v1 submitted 31 January, 2017; originally announced February 2017.

    Comments: 61 pages, 6 figures; typos added, references added for Section V; A brief version of this paper was submitted to the 2017 IEEE International Symposium on Information Theory (ISIT2017)

  16. arXiv:1605.00324  [pdf, ps, other

    cs.CV

    Dominant Codewords Selection with Topic Model for Action Recognition

    Authors: Hirokatsu Kataoka, Masaki Hayashi, Kenji Iwata, Yutaka Satoh, Yoshimitsu Aoki, Slobodan Ilic

    Abstract: In this paper, we propose a framework for recognizing human activities that uses only in-topic dominant codewords and a mixture of intertopic vectors. Latent Dirichlet allocation (LDA) is used to develop approximations of human motion primitives; these are mid-level representations, and they adaptively integrate dominant vectors when classifying human activities. In LDA topic modeling, action vide… ▽ More

    Submitted 1 May, 2016; originally announced May 2016.

    Comments: in CVPRW16

  17. arXiv:1605.00019  [pdf, other

    cs.IT

    Sharp Bounds Between Two Rényi Entropies of Distinct Positive Orders

    Authors: Yuta Sakai, Ken-ichi Iwata

    Abstract: Many axiomatic definitions of entropy, such as the Rényi entropy, of a random variable are closely related to the $\ell_α$-norm of its probability distribution. This study considers probability distributions on finite sets, and examines the sharp bounds of the $\ell_β$-norm with a fixed $\ell_α$-norm, $α\neq β$, for $n$-dimensional probability vectors with an integer $n \ge 2$. From the results, w… ▽ More

    Submitted 5 May, 2016; v1 submitted 29 April, 2016; originally announced May 2016.

    Comments: A short version has been submitted to IEEE ITW2016. The short version is titled "Tight Bounds Between Two Rényi Entropies of Distinct Positive Orders."

  18. A Generalized Erasure Channel in the Sense of Polarization for Binary Erasure Channels

    Authors: Yuta Sakai, Ken-ichi Iwata

    Abstract: The polar transformation of a binary erasure channel (BEC) can be exactly approximated by other BECs. Arıkan proposed that polar codes for a BEC can be efficiently constructed by using its useful property. This study proposes a new class of arbitrary input generalized erasure channels, which can be exactly approximated the polar transformation by other same channel models, as with the BEC. One of… ▽ More

    Submitted 15 April, 2016; originally announced April 2016.

    Comments: A short version has been submitted to IEEE ITW2016

  19. Relations Between Conditional Shannon Entropy and Expectation of $\ell_α$-Norm

    Authors: Yuta Sakai, Ken-ichi Iwata

    Abstract: The paper examines relationships between the conditional Shannon entropy and the expectation of $\ell_α$-norm for joint probability distributions. More precisely, we investigate the tight bounds of the expectation of $\ell_α$-norm with a fixed conditional Shannon entropy, and vice versa. As applications of the results, we derive the tight bounds between the conditional Shannon entropy and several… ▽ More

    Submitted 15 February, 2016; originally announced February 2016.

    Comments: a short version was submitted to ISIT'2016

  20. arXiv:1601.07678  [pdf, other

    cs.IT

    Extremal Relations Between Shannon Entropy and $\ell_α$-Norm

    Authors: Yuta Sakai, Ken-ichi Iwata

    Abstract: The paper examines relationships between the Shannon entropy and the $\ell_α$-norm for $n$-ary probability vectors, $n \ge 2$. More precisely, we investigate the tight bounds of the $\ell_α$-norm with a fixed Shannon entropy, and vice versa. As applications of the results, we derive the tight bounds between the Shannon entropy and several information measures which are determined by the $\ell_α$-n… ▽ More

    Submitted 28 January, 2016; originally announced January 2016.

    Comments: a short version was submitted to ISIT'2016

  21. arXiv:1509.07627  [pdf, ps, other

    cs.CV cs.AI cs.MM

    Feature Evaluation of Deep Convolutional Neural Networks for Object Recognition and Detection

    Authors: Hirokatsu Kataoka, Kenji Iwata, Yutaka Satoh

    Abstract: In this paper, we evaluate convolutional neural network (CNN) features using the AlexNet architecture and very deep convolutional network (VGGNet) architecture. To date, most CNN researchers have employed the last layers before output, which were extracted from the fully connected feature layers. However, since it is unlikely that feature representation effectiveness is dependent on the problem, t… ▽ More

    Submitted 25 September, 2015; originally announced September 2015.

    Comments: 5 pages, 3 figures