Skip to main content

Showing 1–12 of 12 results for author: Kubo, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.03963  [pdf, other

    cs.CL cs.AI

    LLM-jp: A Cross-organizational Project for the Research and Development of Fully Open Japanese LLMs

    Authors: LLM-jp, :, Akiko Aizawa, Eiji Aramaki, Bowen Chen, Fei Cheng, Hiroyuki Deguchi, Rintaro Enomoto, Kazuki Fujii, Kensuke Fukumoto, Takuya Fukushima, Namgi Han, Yuto Harada, Chikara Hashimoto, Tatsuya Hiraoka, Shohei Hisada, Sosuke Hosokawa, Lu Jie, Keisuke Kamata, Teruhito Kanazawa, Hiroki Kanezashi, Hiroshi Kataoka, Satoru Katsumata, Daisuke Kawahara, Seiya Kawano , et al. (57 additional authors not shown)

    Abstract: This paper introduces LLM-jp, a cross-organizational project for the research and development of Japanese large language models (LLMs). LLM-jp aims to develop open-source and strong Japanese LLMs, and as of this writing, more than 1,500 participants from academia and industry are working together for this purpose. This paper presents the background of the establishment of LLM-jp, summaries of its… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

  2. arXiv:2201.12178  [pdf, other

    cs.LG

    Compositionality-Aware Graph2Seq Learning

    Authors: Takeshi D. Itoh, Takatomi Kubo, Kazushi Ikeda

    Abstract: Graphs are a highly expressive data structure, but it is often difficult for humans to find patterns from a complex graph. Hence, generating human-interpretable sequences from graphs have gained interest, called graph2seq learning. It is expected that the compositionality in a graph can be associated to the compositionality in the output sequence in many graph2seq tasks. Therefore, applying compos… ▽ More

    Submitted 28 January, 2022; originally announced January 2022.

    Comments: 8 pages, 1 figure, 2 tables

  3. Mutualized oblivious DNS ($μ$ODNS): Hiding a tree in the wild forest

    Authors: Jun Kurihara, Takeshi Kubo

    Abstract: The traditional Domain Name System (DNS) lacks fundamental features of security and privacy in its design. As concerns of privacy increased on the Internet, security and privacy enhancements of DNS have been actively investigated and deployed. Specially for user's privacy in DNS queries, several relay-based anonymization schemes have been recently introduced, however, they are vulnerable to the co… ▽ More

    Submitted 7 June, 2021; v1 submitted 28 April, 2021; originally announced April 2021.

    Comments: article class, 17pages, 3 figures, 2 tables, the citation [16] is corrected in version 2

  4. Multi-Level Attention Pooling for Graph Neural Networks: Unifying Graph Representations with Multiple Localities

    Authors: Takeshi D. Itoh, Takatomi Kubo, Kazushi Ikeda

    Abstract: Graph neural networks (GNNs) have been widely used to learn vector representation of graph-structured data and achieved better task performance than conventional methods. The foundation of GNNs is the message passing procedure, which propagates the information in a node to its neighbors. Since this procedure proceeds one step per layer, the range of the information propagation among nodes is small… ▽ More

    Submitted 31 October, 2021; v1 submitted 2 March, 2021; originally announced March 2021.

    Comments: 17 pages + 5 appendix pages, 16 figures + 2 appendix figures, 2 tables + 5 appendix tables

    Journal ref: Neural Netw. 145 (2022) 356-373

  5. arXiv:2101.03980  [pdf, other

    cs.SI physics.soc-ph

    Evaluation of User Dynamics Created by Weak Ties among Divided Communities

    Authors: Takahiro Kubo, Chisa Takano, Masaki Aida

    Abstract: Flaming phenomena represent the divergence in the strength of user dynamics as created by user interactions in online social networks (OSNs). Although it has been known that flaming phenomena occur when the Laplacian matrix of the OSN has non-real eigenvalues, it was recently shown that flaming phenomena may occur even if all the eigenvalues are real numbers. This effect appears only in the situat… ▽ More

    Submitted 11 January, 2021; originally announced January 2021.

    Comments: 12 pages, 6 figures, to appear in NOLTA, vol. 12

  6. arXiv:1911.10806  [pdf, other

    cs.CY cs.LG

    Detecting Unknown Behaviors by Pre-defined Behaviours: An Bayesian Non-parametric Approach

    Authors: Jin Watanabe, Takatomi Kubo, Fan Yang, Kazushi Ikeda

    Abstract: An automatic mouse behavior recognition system can considerably reduce the workload of experimenters and facilitate the analysis process. Typically, supervised approaches, unsupervised approaches and semi-supervised approaches are applied for behavior recognition purpose under a setting which has all of predefined behaviors. In the real situation, however, as mouses can show various types of behav… ▽ More

    Submitted 11 December, 2019; v1 submitted 25 November, 2019; originally announced November 2019.

  7. arXiv:1911.10725  [pdf, other

    cs.CE q-bio.PE

    Analyzing Insect-Plant Predation Data By Bayesian Nonparametrics

    Authors: Fan Yang, Takatomi Kubo, Kazushi Ikeda

    Abstract: In the prospect of ecology and biology, studying insect-plant predation will considerably contribute to pest control, benefit agriculture and afforestation, and also help people to better understand insect-plant co-evolution. Therefore, we are motivated to do two work in this study. The first part is to cluster the insect-plant predation, in such manner, unobserved predation could be estimated. Th… ▽ More

    Submitted 11 December, 2019; v1 submitted 25 November, 2019; originally announced November 2019.

  8. arXiv:1910.13523  [pdf, other

    cs.CV cs.MM eess.SP

    A Hierarchical Mixture Density Network

    Authors: Fan Yang, Jaymar Soriano, Takatomi Kubo, Kazushi Ikeda

    Abstract: The relationship among three correlated variables could be very sophisticated, as a result, we may not be able to find their hidden causality and model their relationship explicitly. However, we still can make our best guess for possible mappings among these variables, based on the observed relationship. One of the complicated relationships among three correlated variables could be a two-layer hie… ▽ More

    Submitted 23 October, 2019; originally announced October 2019.

    Comments: 8 pages, 5 figures, conference

    Journal ref: The 24th International Conference on Neural Information Processing, 2017

  9. Towards Generation of Visual Attention Map for Source Code

    Authors: Takeshi D. Itoh, Takatomi Kubo, Kiyoka Ikeda, Yuki Maruno, Yoshiharu Ikutani, Hideaki Hata, Kenichi Matsumoto, Kazushi Ikeda

    Abstract: Program comprehension is a dominant process in software development and maintenance. Experts are considered to comprehend the source code efficiently by directing their gaze, or attention, to important components in it. However, reflecting the importance of components is still a remaining issue in gaze behavior analysis for source code comprehension. Here we show a conceptual framework to compare… ▽ More

    Submitted 13 August, 2019; v1 submitted 14 July, 2019; originally announced July 2019.

    Comments: 4 pages, 2 figures; APSIPA 2019 ACCEPTED

    Journal ref: APSIPA ASC (2019)

  10. arXiv:1903.06320  [pdf, other

    cs.SE cs.AI

    Toward Imitating Visual Attention of Experts in Software Development Tasks

    Authors: Yoshiharu Ikutani, Nishanth Koganti, Hideaki Hata, Takatomi Kubo, Kenichi Matsumoto

    Abstract: Expert programmers' eye-movements during source code reading are valuable sources that are considered to be associated with their domain expertise. We advocate a vision of new intelligent systems incorporating expertise of experts for software development tasks, such as issue localization, comment generation, and code generation. We present a conceptual framework of neural autonomous agents based… ▽ More

    Submitted 14 March, 2019; originally announced March 2019.

    Comments: 4 pages, EMIP 2019

  11. A Fundamental Inequality for Lower-bounding the Error Probability for Classical and Quantum Multiple Access Channels and Its Applications

    Authors: Takuya Kubo, Hiroshi Nagaoka

    Abstract: In the study of the capacity problem for multiple access channels (MACs), a lower bound on the error probability obtained by Han plays a crucial role in the converse parts of several kinds of channel coding theorems in the information-spectrum framework. Recently, Yagi and Oohama showed a tighter bound than the Han bound by means of Polyanskiy's converse. In this paper, we give a new bound which g… ▽ More

    Submitted 24 March, 2015; originally announced March 2015.

    Comments: under submission

  12. Motivating Smartphone Collaboration in Data Acquisition and Distributed Computing

    Authors: Lingjie Duan, Takeshi Kubo, Kohei Sugiyama, Jianwei Huang, Teruyuki Hasegawa, Jean Walrand

    Abstract: This paper analyzes and compares different incentive mechanisms for a master to motivate the collaboration of smartphone users on both data acquisition and distributed computing applications. To collect massive sensitive data from users, we propose a reward-based collaboration mechanism, where the master announces a total reward to be shared among collaborators, and the collaboration is successful… ▽ More

    Submitted 26 January, 2014; originally announced January 2014.

    Comments: This paper will appear at IEEE Transactions on Mobil Computing