Zum Hauptinhalt springen

Showing 1–34 of 34 results for author: Watanabe, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.06164  [pdf, other

    cs.CV eess.IV

    Implicit Neural Representation for Videos Based on Residual Connection

    Authors: Taiga Hayami, Hiroshi Watanabe

    Abstract: Video compression technology is essential for transmitting and storing videos. Many video compression methods reduce information in videos by removing high-frequency components and utilizing similarities between frames. Alternatively, the implicit neural representations (INRs) for videos, which use networks to represent and compress videos through model compression. A conventional method improves… ▽ More

    Submitted 15 June, 2024; originally announced July 2024.

  2. arXiv:2405.11894  [pdf, other

    cs.CV eess.IV

    Refining Coded Image in Human Vision Layer Using CNN-Based Post-Processing

    Authors: Takahiro Shindo, Yui Tatsumi, Taiju Watanabe, Hiroshi Watanabe

    Abstract: Scalable image coding for both humans and machines is a technique that has gained a lot of attention recently. This technology enables the hierarchical decoding of images for human vision and image recognition models. It is a highly effective method when images need to serve both purposes. However, no research has yet incorporated the post-processing commonly used in popular image compression sche… ▽ More

    Submitted 16 June, 2024; v1 submitted 20 May, 2024; originally announced May 2024.

  3. arXiv:2405.09152  [pdf, other

    cs.CV cs.MM

    Scalable Image Coding for Humans and Machines Using Feature Fusion Network

    Authors: Takahiro Shindo, Taiju Watanabe, Yui Tatsumi, Hiroshi Watanabe

    Abstract: As image recognition models become more prevalent, scalable coding methods for machines and humans gain more importance. Applications of image recognition models include traffic monitoring and farm management. In these use cases, the scalable coding method proves effective because the tasks require occasional image checking by humans. Existing image compression methods for humans and machines meet… ▽ More

    Submitted 16 June, 2024; v1 submitted 15 May, 2024; originally announced May 2024.

  4. arXiv:2404.03874  [pdf, other

    cs.CR cs.DC

    VELLET: Verifiable Embedded Wallet for Securing Authenticity and Integrity

    Authors: Hiroki Watanabe, Kohei Ichihara, Takumi Aita

    Abstract: The blockchain ecosystem, particularly with the rise of Web3 and Non-Fungible Tokens (NFTs), has experienced a significant increase in users and applications. However, this expansion is challenged by the need to connect early adopters with a wider user base. A notable difficulty in this process is the complex interfaces of blockchain wallets, which can be daunting for those familiar with tradition… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

    Comments: A shortened version is to be published at the IEEE International Conference on Blockchain and Cryptocurrency (ICBC) 2024

  5. arXiv:2403.04173  [pdf, other

    cs.CV

    Image Coding for Machines with Edge Information Learning Using Segment Anything

    Authors: Takahiro Shindo, Kein Yamada, Taiju Watanabe, Hiroshi Watanabe

    Abstract: Image Coding for Machines (ICM) is an image compression technique for image recognition. This technique is essential due to the growing demand for image recognition AI. In this paper, we propose a method for ICM that focuses on encoding and decoding only the edge information of object parts in an image, which we call SA-ICM. This is an Learned Image Compression (LIC) model trained using edge… ▽ More

    Submitted 7 June, 2024; v1 submitted 6 March, 2024; originally announced March 2024.

    Comments: 2024 IEEE International Conference on Image Processing (ICIP 2024)

  6. arXiv:2402.08267   

    cs.CV cs.AI

    Improving Image Coding for Machines through Optimizing Encoder via Auxiliary Loss

    Authors: Kei Iino, Shunsuke Akamatsu, Hiroshi Watanabe, Shohei Enomoto, Akira Sakamoto, Takeharu Eda

    Abstract: Image coding for machines (ICM) aims to compress images for machine analysis using recognition models rather than human vision. Hence, in ICM, it is important for the encoder to recognize and compress the information necessary for the machine recognition task. There are two main approaches in learned ICM; optimization of the compression model based on task loss, and Region of Interest (ROI) based… ▽ More

    Submitted 13 February, 2024; originally announced February 2024.

    Comments: This version has been removed by arXiv administrators as the submitter did not have the right to agree to the license at the time of submission

  7. arXiv:2310.07376  [pdf, other

    cs.CV cs.AI cs.MM

    Point Cloud Denoising and Outlier Detection with Local Geometric Structure by Dynamic Graph CNN

    Authors: Kosuke Nakayama, Hiroto Fukuta, Hiroshi Watanabe

    Abstract: The digitalization of society is rapidly developing toward the realization of the digital twin and metaverse. In particular, point clouds are attracting attention as a media format for 3D space. Point cloud data is contaminated with noise and outliers due to measurement errors. Therefore, denoising and outlier detection are necessary for point cloud processing. Among them, PointCleanNet is an effe… ▽ More

    Submitted 21 October, 2023; v1 submitted 11 October, 2023; originally announced October 2023.

    Comments: 2023 IEEE 12th Global Conference on Consumer Electronics (GCCE 2023)

  8. arXiv:2308.13984  [pdf, other

    cs.CV

    Image Coding for Machines with Object Region Learning

    Authors: Takahiro Shindo, Taiju Watanabe, Kein Yamada, Hiroshi Watanabe

    Abstract: Compression technology is essential for efficient image transmission and storage. With the rapid advances in deep learning, images are beginning to be used for image recognition as well as for human vision. For this reason, research has been conducted on image coding for image recognition, and this field is called Image Coding for Machines (ICM). There are two main approaches in ICM: the ROI-based… ▽ More

    Submitted 26 August, 2023; originally announced August 2023.

  9. arXiv:2308.06483  [pdf, other

    cs.SD eess.AS

    BigWavGAN: A Wave-To-Wave Generative Adversarial Network for Music Super-Resolution

    Authors: Yenan Zhang, Hiroshi Watanabe

    Abstract: Generally, Deep Neural Networks (DNNs) are expected to have high performance when their model size is large. However, large models failed to produce high-quality results commensurate with their scale in music Super-Resolution (SR). We attribute this to that DNNs cannot learn information commensurate with their size from standard mean square error losses. To unleash the potential of large DNN model… ▽ More

    Submitted 29 October, 2023; v1 submitted 12 August, 2023; originally announced August 2023.

    Comments: Accepted by IEEE GCCE 2023

  10. arXiv:2306.11282  [pdf, other

    cs.SD eess.AS

    Phase Repair for Time-Domain Convolutional Neural Networks in Music Super-Resolution

    Authors: Yenan Zhang, Guilly Kolkman, Hiroshi Watanabe

    Abstract: Audio Super-Resolution (SR) is an important topic as low-resolution recordings are ubiquitous in daily life. In this paper, we focus on the music SR task, which is challenging due to the wide frequency response and dynamic range of music. Many models are designed in time domain to jointly process magnitude and phase of audio signals. However, prior works show that approaches using Time-Domain Conv… ▽ More

    Submitted 18 February, 2024; v1 submitted 20 June, 2023; originally announced June 2023.

    Comments: Under review

  11. arXiv:2305.18782  [pdf, other

    cs.CV

    VVC Extension Scheme for Object Detection Using Contrast Reduction

    Authors: Takahiro Shindo, Taiju Watanabe, Kein Yamada, Hiroshi Watanabe

    Abstract: In recent years, video analysis using Artificial Intelligence (AI) has been widely used, due to the remarkable development of image recognition technology using deep learning. In 2019, the Moving Picture Experts Group (MPEG) has started standardization of Video Coding for Machines (VCM) as a video coding technology for image recognition. In the framework of VCM, both higher image recognition accur… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

  12. arXiv:2304.00689  [pdf, other

    cs.CV cs.MM eess.IV

    Accuracy Improvement of Object Detection in VVC Coded Video Using YOLO-v7 Features

    Authors: Takahiro Shindo, Taiju Watanabe, Kein Yamada, Hiroshi Watanabe

    Abstract: With advances in image recognition technology based on deep learning, automatic video analysis by Artificial Intelligence is becoming more widespread. As the amount of video used for image recognition increases, efficient compression methods for such video data are necessary. In general, when the image quality deteriorates due to image encoding, the image recognition accuracy also falls. Therefore… ▽ More

    Submitted 2 April, 2023; originally announced April 2023.

  13. arXiv:2303.03633  [pdf, other

    cs.CV

    Sketch-based Medical Image Retrieval

    Authors: Kazuma Kobayashi, Lin Gu, Ryuichiro Hataya, Takaaki Mizuno, Mototaka Miyake, Hirokazu Watanabe, Masamichi Takahashi, Yasuyuki Takamizawa, Yukihiro Yoshida, Satoshi Nakamura, Nobuji Kouno, Amina Bolatkan, Yusuke Kurose, Tatsuya Harada, Ryuji Hamamoto

    Abstract: The amount of medical images stored in hospitals is increasing faster than ever; however, utilizing the accumulated medical images has been limited. This is because existing content-based medical image retrieval (CBMIR) systems usually require example images to construct query vectors; nevertheless, example images cannot always be prepared. Besides, there can be images with rare characteristics th… ▽ More

    Submitted 6 March, 2023; originally announced March 2023.

  14. arXiv:2301.01249  [pdf

    cs.DC cs.CR cs.NI

    On coexistence of decentralized system (blockchain) and central management in Internet-of-Things

    Authors: Hiroshi Watanabe

    Abstract: Networks are composed of logical nodes and edges for communications. The atomistic component of things connected to the network is a memory chip. Accordingly, the unique linkage of a memory chip and a logical node can be promising to resolve the root-of-trust problem on the Internet-of-Things. For this aim, we propose a protocol of challenge-response using a memory chip. For the central management… ▽ More

    Submitted 10 December, 2022; originally announced January 2023.

    Comments: 6 pages, 10 figures, accepted and presented in the 2022 IEEE 1st Global Emerging Technology Blockchain Forum, 7-11 November 2022 | Virtual Event (Whova); https://getblockchain.events.whova.com/Agenda/2759385

    Report number: #1570825370

  15. arXiv:2211.16733  [pdf, ps, other

    physics.soc-ph cs.CL stat.AP

    A minor extension of the logistic equation for growth of word counts on online media: Parametric description of diversity of growth phenomena in society

    Authors: Hayafumi Watanabe

    Abstract: To understand the growing phenomena of new vocabulary on nationwide online social media, we analyzed monthly word count time series extracted from approximately 1 billion Japanese blog articles from 2007 to 2019. In particular, we first introduced the extended logistic equation by adding one parameter to the original equation and showed that the model can consistently reproduce various patterns of… ▽ More

    Submitted 13 May, 2023; v1 submitted 29 November, 2022; originally announced November 2022.

    Journal ref: 2023 J. Phys. Complex. 4 025018

  16. Information Compression and Performance Evaluation of Tic-Tac-Toe's Evaluation Function Using Singular Value Decomposition

    Authors: Naoya Fujita, Hiroshi Watanabe

    Abstract: We approximated the evaluation function for the game Tic-Tac-Toe by singular value decomposition (SVD) and investigated the effect of approximation accuracy on winning rate. We first prepared the perfect evaluation function of Tic-Tac-Toe and performed low-rank approximation by considering the evaluation function as a ninth-order tensor. We found that we can reduce the amount of information of the… ▽ More

    Submitted 2 December, 2022; v1 submitted 6 July, 2022; originally announced July 2022.

    Comments: 15 pages, 5 figures, Updated contents

  17. A Low-Cost Neural ODE with Depthwise Separable Convolution for Edge Domain Adaptation on FPGAs

    Authors: Hiroki Kawakami, Hirohisa Watanabe, Keisuke Sugiura, Hiroki Matsutani

    Abstract: High-performance deep neural network (DNN)-based systems are in high demand in edge environments. Due to its high computational complexity, it is challenging to deploy DNNs on edge devices with strict limitations on computational resources. In this paper, we derive a compact while highly-accurate DNN model, termed dsODENet, by combining recently-proposed parameter reduction techniques: Neural ODE… ▽ More

    Submitted 17 March, 2023; v1 submitted 27 July, 2021; originally announced July 2021.

    Journal ref: IEICE Trans on Information and Systems (2023)

  18. arXiv:2012.15465  [pdf, ps, other

    cs.LG cs.AI

    Accelerating ODE-Based Neural Networks on Low-Cost FPGAs

    Authors: Hirohisa Watanabe, Hiroki Matsutani

    Abstract: ODENet is a deep neural network architecture in which a stacking structure of ResNet is implemented with an ordinary differential equation (ODE) solver. It can reduce the number of parameters and strike a balance between accuracy and performance by selecting a proper solver. It is also possible to improve the accuracy while keeping the same number of parameters on resource-limited edge devices. In… ▽ More

    Submitted 10 March, 2023; v1 submitted 31 December, 2020; originally announced December 2020.

    Comments: RAW'21

  19. arXiv:2011.05442  [pdf, ps, other

    cs.CR cs.CY

    Proof of Authenticity of Logistics Information with Passive RFID Tags and Blockchain

    Authors: Hiroshi Watanabe, Kenji Saito, Satoshi Miyazaki, Toshiharu Okada, Hiroyuki Fukuyama, Tsuneo Kato, Katsuo Taniguchi

    Abstract: In tracing the (robotically automated) logistics of large quantities of goods, inexpensive passive RFID tags are preferred for cost reasons. Accordingly, security between such tags and readers have primarily been studied among many issues of RFID. However, the authenticity of data cannot be guaranteed if logistics services can give false information. Although the use of blockchain is often discuss… ▽ More

    Submitted 10 November, 2020; originally announced November 2020.

    Comments: 30 pages, 11 figures

  20. arXiv:2005.12573  [pdf, other

    eess.IV cs.CV

    Learning Global and Local Features of Normal Brain Anatomy for Unsupervised Abnormality Detection

    Authors: Kazuma Kobayashi, Ryuichiro Hataya, Yusuke Kurose, Amina Bolatkan, Mototaka Miyake, Hirokazu Watanabe, Masamichi Takahashi, Jun Itami, Tatsuya Harada, Ryuji Hamamoto

    Abstract: In real-world clinical practice, overlooking unanticipated findings can result in serious consequences. However, supervised learning, which is the foundation for the current success of deep learning, only encourages models to identify abnormalities that are defined in datasets in advance. Therefore, abnormality detection must be implemented in medical images that are not limited to a specific dise… ▽ More

    Submitted 8 May, 2021; v1 submitted 26 May, 2020; originally announced May 2020.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  21. arXiv:2005.04646  [pdf, ps, other

    cs.LG stat.ML

    An FPGA-Based On-Device Reinforcement Learning Approach using Online Sequential Learning

    Authors: Hirohisa Watanabe, Mineto Tsukada, Hiroki Matsutani

    Abstract: DQN (Deep Q-Network) is a method to perform Q-learning for reinforcement learning using deep neural networks. DQNs require a large buffer and batch processing for an experience replay and rely on a backpropagation based iterative optimization, making them difficult to be implemented on resource-limited edge devices. In this paper, we propose a lightweight on-device reinforcement learning approach… ▽ More

    Submitted 12 March, 2023; v1 submitted 10 May, 2020; originally announced May 2020.

    Comments: RAW'21

  22. arXiv:2003.08047  [pdf

    cs.CV cs.LG eess.IV

    Capsule GAN Using Capsule Network for Generator Architecture

    Authors: Kanako Marusaki, Hiroshi Watanabe

    Abstract: This paper presents Capsule GAN, a Generative adversarial network using Capsule Network not only in the discriminator but also in the generator. Recently, Generative adversarial networks (GANs) has been intensively studied. However, generating images by GANs is difficult. Therefore, GANs sometimes generate poor quality images. These GANs use convolutional neural networks (CNNs). However, CNNs have… ▽ More

    Submitted 18 March, 2020; originally announced March 2020.

    Comments: 7 pages and 8 figures

    MSC Class: 68T05

  23. arXiv:1810.10194  [pdf, ps, other

    cs.DC

    Niji: Bitcoin Bridge Utilizing Payment Channels

    Authors: Hiroki Watanabe, Shigenori Ohashi, Shigeru Fujimura, Atsushi Nakadaira, Kota Hidaka, Jay Kishigami

    Abstract: Bitcoin's enormous success has inspired the development of alternative blockchains, such as consortium chains. Several cross-chain protocols have been proposed as ways of connecting these universes of individual blockchains in a distributed and secure manner. In this paper, we present Niji, a new cross-chain protocol that allows parties to perform virtual Bitcoin payment securely on a consortium c… ▽ More

    Submitted 24 October, 2018; originally announced October 2018.

    Comments: Presented at Scaling Bitcoin 2018

  24. arXiv:1807.06357  [pdf

    cs.CR cs.NI

    Can Blockchain Protect Internet-of-Things?

    Authors: Hiroshi Watanabe

    Abstract: In the Internet-of-Things, the number of connected devices is expected to be extremely huge, i.e., more than a couple of ten billion. It is however well-known that the security for the Internet-of-Things is still open problem. In particular, it is difficult to certify the identification of connected devices and to prevent the illegal spoofing. It is because the conventional security technologies h… ▽ More

    Submitted 22 July, 2018; v1 submitted 17 July, 2018; originally announced July 2018.

    Comments: Typo fixed, Future Technology Conference 2017, Vancouver, Canada, Nov. 29-30, 2017

    Report number: 978-1-5386-2823-2/17/$31.00 \copyright 2017 IEEE

    Journal ref: Future Technologies Conference (FTC) 2017 29-30 November 2017 | Vancouver, Canada

  25. SIMD Vectorization for the Lennard-Jones Potential with AVX2 and AVX-512 instructions

    Authors: Hiroshi Watanabe, Koh M. Nakagawa

    Abstract: This work describes the SIMD vectorization of the force calculation of the Lennard-Jones potential with Intel AVX2 and AVX-512 instruction sets. Since the force-calculation kernel of the molecular dynamics method involves indirect access to memory, the data layout is one of the most important factors in vectorization. We find that the Array of Structures (AoS) with padding exhibits better performa… ▽ More

    Submitted 22 October, 2018; v1 submitted 13 June, 2018; originally announced June 2018.

    Comments: 9 pages, 12 figures

  26. arXiv:1801.07948  [pdf, other

    physics.soc-ph cs.CL cs.CY

    Empirical observations of ultraslow diffusion driven by the fractional dynamics in languages: Dynamical statistical properties of word counts of already popular words

    Authors: Hayafumi Watanabe

    Abstract: Ultraslow diffusion (i.e. logarithmic diffusion) has been extensively studied theoretically, but has hardly been observed empirically. In this paper, firstly, we find the ultraslow-like diffusion of the time-series of word counts of already popular words by analysing three different nationwide language databases: (i) newspaper articles (Japanese), (ii) blog articles (Japanese), and (iii) page view… ▽ More

    Submitted 29 June, 2018; v1 submitted 24 January, 2018; originally announced January 2018.

    Journal ref: Phys. Rev. E 98, 012308 (2018)

  27. arXiv:1707.07066  [pdf, ps, other

    physics.soc-ph cs.CL cs.CY stat.AP

    Ultraslow diffusion in language: Dynamics of appearance of already popular adjectives on Japanese blogs

    Authors: Hayafumi Watanabe

    Abstract: What dynamics govern a time series representing the appearance of words in social media data? In this paper, we investigate an elementary dynamics, from which word-dependent special effects are segregated, such as breaking news, increasing (or decreasing) concerns, or seasonality. To elucidate this problem, we investigated approximately three billion Japanese blog articles over a period of six yea… ▽ More

    Submitted 28 July, 2017; v1 submitted 21 July, 2017; originally announced July 2017.

  28. arXiv:1611.05527  [pdf, ps, other

    cs.CL cs.LG stat.ML

    Automatic Node Selection for Deep Neural Networks using Group Lasso Regularization

    Authors: Tsubasa Ochiai, Shigeki Matsuda, Hideyuki Watanabe, Shigeru Katagiri

    Abstract: We examine the effect of the Group Lasso (gLasso) regularizer in selecting the salient nodes of Deep Neural Network (DNN) hidden layers by applying a DNN-HMM hybrid speech recognizer to TED Talks speech data. We test two types of gLasso regularization, one for outgoing weight vectors and another for incoming weight vectors, as well as two sizes of DNNs: 2048 hidden layer nodes and 4096 nodes. Furt… ▽ More

    Submitted 16 November, 2016; originally announced November 2016.

    Comments: Submitted to ICASSP 2017

  29. arXiv:1604.00762  [pdf, ps, other

    physics.soc-ph cs.SI physics.data-an

    Statistical properties of fluctuations of time series representing the appearance of words in nationwide blog data and their applications: An example of observations and the modelling of fluctuation scalings of nonstationary time series

    Authors: Hayafumi Watanabe, Yukie Sano, Hideki Takayasu, Misako Takayasu

    Abstract: To elucidate the non-trivial empirical statistical properties of fluctuations of a typical non-steady time series representing the appearance of words in blogs, we investigated approximately five billion Japanese blogs over a period of six years and analyse some corresponding mathematical models. First, we introduce a solvable non-steady extension of the random diffusion model, which can be deduce… ▽ More

    Submitted 7 November, 2016; v1 submitted 4 April, 2016; originally announced April 2016.

  30. arXiv:1304.3112  [pdf

    cs.AI

    A VLSI Design and Implementation for a Real-Time Approximate Reasoning

    Authors: Masaki Togai, Hiroyuki Watanabe

    Abstract: The role of inferencing with uncertainty is becoming more important in rule-based expert systems (ES), since knowledge given by a human expert is often uncertain or imprecise. We have succeeded in designing a VLSI chip which can perform an entire inference process based on fuzzy logic. The design of the VLSI fuzzy inference engine emphasizes simplicity, extensibility, and efficiency (operational s… ▽ More

    Submitted 27 March, 2013; originally announced April 2013.

    Comments: Appears in Proceedings of the Second Conference on Uncertainty in Artificial Intelligence (UAI1986)

    Report number: UAI-P-1986-PG-289-296

  31. arXiv:1111.4852  [pdf, ps, other

    q-fin.GN cs.SI physics.soc-ph

    Biased diffusion on Japanese inter-firm trading network: Estimation of sales from network structure

    Authors: Hayafumi Watanabe, Hideki Takayasu, Misako Takayasu

    Abstract: To investigate the actual phenomena of transport on a complex network, we analysed empirical data for an inter-firm trading network, which consists of about one million Japanese firms and the sales of these firms (a sale corresponds to the total in-flow into a node). First, we analysed the relationships between sales and sales of nearest neighbourhoods from which we obtain a simple linear relation… ▽ More

    Submitted 21 November, 2011; originally announced November 2011.

    Journal ref: New J. Phys. 14 (2012) 043034

  32. arXiv:1107.4730  [pdf, ps, other

    physics.soc-ph cs.SI physics.data-an

    Empirical analysis of collective human behavior for extraordinary events in blogosphere

    Authors: Yukie Sano, Kenta Yamada, Hayafumi Watanabe, Hideki Takayasu, Misako Takayasu

    Abstract: To uncover underlying mechanism of collective human dynamics, we survey more than 1.8 billion blog entries and observe the statistical properties of word appearances. We focus on words that show dynamic growth and decay with a tendency to diverge on a certain day. After careful pretreatment and fitting method, we found power laws generally approximate the functional forms of growth and decay with… ▽ More

    Submitted 25 December, 2012; v1 submitted 24 July, 2011; originally announced July 2011.

    Comments: 10 pages, 19 figures

  33. arXiv:0911.5230  [pdf, ps, other

    cs.CR cs.NI

    PAKE-based mutual HTTP authentication for preventing phishing attacks

    Authors: Yutaka Oiwa, Hajime Watanabe, Hiromitsu Takagi

    Abstract: This paper describes a new password-based mutual authentication protocol for Web systems which prevents various kinds of phishing attacks. This protocol provides a protection of user's passwords against any phishers even if dictionary attack is employed, and prevents phishers from imitating a false sense of successful authentication to users. The protocol is designed considering interoperability… ▽ More

    Submitted 27 November, 2009; originally announced November 2009.

    ACM Class: D.4.6

  34. arXiv:cs/0610036  [pdf, ps, other

    cs.CR math.NA

    Optimization of Memory Usage in Tardos's Fingerprinting Codes

    Authors: Koji Nuida, Manabu Hagiwara, Hajime Watanabe, Hideki Imai

    Abstract: It is known that Tardos's collusion-secure probabilistic fingerprinting code (Tardos code; STOC'03) has length of theoretically minimal order with respect to the number of colluding users. However, Tardos code uses certain continuous probability distribution in codeword generation, which creates some problems for practical use, in particular, it requires large extra memory. A solution proposed s… ▽ More

    Submitted 15 January, 2008; v1 submitted 6 October, 2006; originally announced October 2006.

    Comments: 12 pages, 1 figure; (v2) tables revised, typos corrected, comments on some recent works added; (v3) submitted version, title changed from "Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature"

    ACM Class: K.4.4; G.1.4