Zum Hauptinhalt springen

Showing 1–16 of 16 results for author: Seki, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.11351  [pdf, ps, other

    cs.FL cs.LO

    A Subclass of Mu-Calculus with the Freeze Quantifier Equivalent to Buchi Register Automata

    Authors: Yoshiaki Takata, Akira Onishi, Ryoma Senda, Hiroyuki Seki

    Abstract: Register automaton (RA) is an extension of finite automaton for dealing with data values in an infinite domain. In the previous work, we proposed disjunctive mu$^\downarrow$-calculus, which is a subclass of modal mu-calculus with the freeze quantifier, and showed that it has the same expressive power as RA. However, disjunctive mu$^\downarrow$-calculus is defined as a logic on finite words, wherea… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

    Comments: 6 pages, 1 figure, this is a longer version of a short paper submitted to IEICE Transactions on Information and Systems

  2. Data Set Terminology of Deep Learning in Medicine: A Historical Review and Recommendation

    Authors: Shannon L. Walston, Hiroshi Seki, Hirotaka Takita, Yasuhito Mitsuyama, Shingo Sato, Akifumi Hagiwara, Rintaro Ito, Shouhei Hanaoka, Yukio Miki, Daiju Ueda

    Abstract: Medicine and deep learning-based artificial intelligence (AI) engineering represent two distinct fields each with decades of published history. With such history comes a set of terminology that has a specific way in which it is applied. However, when two distinct fields with overlapping terminology start to collaborate, miscommunication and misunderstandings can occur. This narrative review aims t… ▽ More

    Submitted 18 June, 2024; v1 submitted 30 April, 2024; originally announced April 2024.

    Comments: 20 pages, 3 figures, 3 tables

  3. arXiv:2403.05088  [pdf, other

    cs.FL

    Semidirect Product Decompositions for Periodic Regular Languages

    Authors: Yusuke Inoue, Kenji Hashimoto, Hiroyuki Seki

    Abstract: The definition of period in finite-state Markov chains can be extended to regular languages by considering the transitions of DFAs accepting them. For example, the language $(ΣΣ)^*$ has period two because the length of a recursion (cycle) in its DFA must be even. This paper shows that the period of a regular language appears as a cyclic group within its syntactic monoid. Specifically, we show that… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

    MSC Class: 68Q45; 68Q70

  4. Casting manipulation of unknown string by robot arm

    Authors: Kenta Tabata, Hiroaki Seki, Tokuo Tsuji, Tatsuhiro Hiramitsu

    Abstract: Casting manipulation has been studied to expand the robot's movable range. In this manipulation, the robot throws and reaches the end effector to a distant target. Usually, a special casting manipulator, which consists of rigid arm links and specific flexible linear objects, is constructed for an effective casting manipulation. However, the special manipulator cannot perform normal manipulations,… ▽ More

    Submitted 30 January, 2024; originally announced January 2024.

    Comments: Accepted to IROS 2021

    Journal ref: 2021 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)

  5. arXiv:2307.00334  [pdf, ps, other

    cs.GT

    A game-theoretic approach to indistinguishability of winning objectives as user privacy

    Authors: Rindo Nakanishi, Yoshiaki Takata, Hiroyuki Seki

    Abstract: Game theory on graphs is a basic tool in computer science. In this paper, we propose a new game-theoretic framework for studying the privacy protection of a user who interactively uses a software service. Our framework is based on the idea that an objective of a user using software services should not be known to an adversary because the objective is often closely related to personal information o… ▽ More

    Submitted 1 July, 2023; originally announced July 2023.

  6. arXiv:2208.08319  [pdf, ps, other

    cs.FL

    Active Learning for Deterministic Bottom-up Nominal Tree Automata

    Authors: R. Nakanishi, Y. Takata, H. Seki

    Abstract: Nominal set plays a central role in a group-theoretic extension of finite automata to those over an infinite set of data values. Moerman et al. proposed an active learning algorithm for nominal word automata with the equality symmetry. In this paper, we introduce deterministic bottom-up nominal tree automata (DBNTA), which operate on trees whose nodes are labelled with elements of an orbit finite… ▽ More

    Submitted 17 August, 2022; originally announced August 2022.

  7. Reduction of Register Pushdown Systems with Freshness Property to Pushdown Systems in LTL Model Checking

    Authors: Yoshiaki Takata, Ryoma Senda, Hiroyuki Seki

    Abstract: Pushdown systems (PDS) are known as an abstract model of recursive programs, and model checking methods for PDS have been studied. Register PDS (RPDS) are PDS augmented by registers to deal with data values from an infinite domain in a restricted way. A linear temporal logic (LTL) model checking method for RPDS with regular valuations has been proposed; however, the method requires the register au… ▽ More

    Submitted 22 March, 2022; originally announced March 2022.

    Comments: 9 pages, 2 figures, this is a longer version of a short paper submitted to IEICE Transactions on Information and Systems

  8. arXiv:2109.12063  [pdf, ps, other

    cs.LG

    Reduced-Lead ECG Classifier Model Trained with DivideMix and Model Ensemble

    Authors: Hiroshi Seki, Takashi Nakano, Koshiro Ikeda, Shinji Hirooka, Takaaki Kawasaki, Mitsutomo Yamada, Shumpei Saito, Toshitaka Yamakawa, Shimpei Ogawa

    Abstract: Automatic diagnosis of multiple cardiac abnormalities from reduced-lead electrocardiogram (ECG) data is challenging. One of the reasons for this is the difficulty of defining labels from standard 12-lead data. Reduced-lead ECG data usually do not have identical characteristics of cardiac abnormalities because of the noisy label problem. Thus, there is an inconsistency in the annotated labels betwe… ▽ More

    Submitted 24 September, 2021; originally announced September 2021.

    Comments: 4 pages, in Computing in Cardiology (CinC) 2021, PhysioNet/CinC Challenge 2021 submission

  9. arXiv:1910.10357  [pdf, other

    cs.FL cs.CC

    Complexity Results on Register Pushdown Automata

    Authors: Ryoma Senda, Yoshiaki Takata, Hiroyuki Seki

    Abstract: Register pushdown automata (RPDA) is an extension of classical pushdown automata to handle data values in a restricted way. RPDA attracts attention as a model of a query language for structured documents with data values. The membership and emptiness problems for RPDA are known to be EXPTIME-complete. This paper shows the membership problem becomes PSPACE-complete and NP-complete for nondecreasing… ▽ More

    Submitted 23 October, 2019; originally announced October 2019.

    Comments: Proceedings of the Third Workshop on Software Foundations for Data Interoperability (SFDI2019+), October 28, 2019, Fukuoka, Japan

  10. arXiv:1905.04409  [pdf, other

    cs.CR cs.IT

    On the Compositionality of Dynamic Leakage and Its Application to the Quantification Problem

    Authors: Bao Trung Chu, Kenji Hashimoto, Hiroyuki Seki

    Abstract: Quantitative information flow (QIF) is traditionally defined as the expected value of information leakage over all feasible program runs and it fails to identify vulnerable programs where only limited number of runs leak large amount of information. As discussed in Bielova (2016), a good notion for dynamic leakage and an efficient way of computing the leakage are needed. To address this problem, t… ▽ More

    Submitted 10 May, 2019; originally announced May 2019.

    Comments: preprint

  11. Quantifying Dynamic Leakage: Complexity Analysis and Model Counting-based Calculation

    Authors: Bao Trung Chu, Kenji Hashimoto, Hiroyuki Seki

    Abstract: A program is non-interferent if it leaks no secret information to an observable output. However, non-interference is too strict in many practical cases and quantitative information flow (QIF) has been proposed and studied in depth. Originally, QIF is defined as the average of leakage amount of secret information over all executions of a program. However, a vulnerable program that has executions le… ▽ More

    Submitted 9 March, 2019; originally announced March 2019.

    Comments: will be revised to submit to IEICE Transaction on Information and Systems in near future

  12. arXiv:1811.04568  [pdf, ps, other

    cs.SD cs.CL eess.AS stat.ML

    Vectorization of hypotheses and speech for faster beam search in encoder decoder-based speech recognition

    Authors: Hiroshi Seki, Takaaki Hori, Shinji Watanabe

    Abstract: Attention-based encoder decoder network uses a left-to-right beam search algorithm in the inference step. The current beam search expands hypotheses and traverses the expanded hypotheses at the next time step. This traversal is implemented using a for-loop program in general, and it leads to speed down of the recognition process. In this paper, we propose a parallelism technique for beam search, w… ▽ More

    Submitted 12 November, 2018; originally announced November 2018.

  13. arXiv:1805.05826  [pdf, other

    cs.SD cs.CL eess.AS stat.ML

    A Purely End-to-end System for Multi-speaker Speech Recognition

    Authors: Hiroshi Seki, Takaaki Hori, Shinji Watanabe, Jonathan Le Roux, John R. Hershey

    Abstract: Recently, there has been growing interest in multi-speaker speech recognition, where the utterances of multiple speakers are recognized from their mixture. Promising techniques have been proposed for this task, but earlier works have required additional training data such as isolated source signals or senone alignments for effective learning. In this paper, we propose a new sequence-to-sequence fr… ▽ More

    Submitted 15 May, 2018; originally announced May 2018.

    Comments: ACL 2018

  14. An Extension of Proof Graphs for Disjunctive Parameterised Boolean Equation Systems

    Authors: Yutaro Nagae, Masahiko Sakai, Hiroyuki Seki

    Abstract: A parameterised Boolean equation system (PBES) is a set of equations that defines sets as the least and/or greatest fixed-points that satisfy the equations. This system is regarded as a declarative program defining functions that take a datum and returns a Boolean value. The membership problem of PBESs is a problem to decide whether a given element is in the defined set or not, which correspond… ▽ More

    Submitted 3 January, 2017; originally announced January 2017.

    Comments: In Proceedings WPTE 2016, arXiv:1701.00233

    Journal ref: EPTCS 235, 2017, pp. 46-61

  15. Node Query Preservation for Deterministic Linear Top-Down Tree Transducers

    Authors: Kazuki Miyahara, Kenji Hashimoto, Hiroyuki Seki

    Abstract: This paper discusses the decidability of node query preservation problems for XML document transformations. We assume a transformation given by a deterministic linear top-down data tree transducer (abbreviated as DLT^V) and an n-ary query based on runs of a tree automaton. We say that a DLT^V Tr strongly preserves a query Q if there is a query Q' such that for every document t, the answer set of Q… ▽ More

    Submitted 21 November, 2013; originally announced November 2013.

    Comments: In Proceedings TTATT 2013, arXiv:1311.5058

    Journal ref: EPTCS 134, 2013, pp. 27-37

  16. arXiv:1306.3032  [pdf

    cs.CV

    A Face-like Structure Detection on Planet and Satellite Surfaces using Image Processing

    Authors: Kazutaka Kurihara, Masakazu Takasu, Kazuhiro Sasao, Hal Seki, Takayuki Narabu, Mitsuo Yamamoto, Satoshi Iida, Hiroyuki Yamamoto

    Abstract: This paper demonstrates that face-like structures are everywhere, and can be de-tected automatically even with computers. Huge amount of satellite images of the Earth, the Moon, the Mars are explored and many interesting face-like structure are detected. Throughout this fact, we believe that science and technologies can alert people not to easily become an occultist.

    Submitted 13 June, 2013; originally announced June 2013.

    Comments: 4 pages

    Journal ref: ACE 2013, LNCS 8253, Springer, pp. 564-567, 2013