Skip to main content

Showing 1–18 of 18 results for author: Imai, H

Searching in archive cs. Search in all archives.
.
  1. Spatio-temporal reconstruction of substance dynamics using compressed sensing in multi-spectral magnetic resonance spectroscopic imaging

    Authors: Utako Yamamoto, Hirohiko Imai, Kei Sano, Masayuki Ohzeki, Tetsuya Matsuda, Toshiyuki Tanaka

    Abstract: The objective of our study is to observe dynamics of multiple substances in vivo with high temporal resolution from multi-spectral magnetic resonance spectroscopic imaging (MRSI) data. The multi-spectral MRSI can effectively separate spectral peaks of multiple substances and is useful to measure spatial distributions of substances. However it is difficult to measure time-varying substance distribu… ▽ More

    Submitted 1 March, 2024; originally announced March 2024.

    Journal ref: Expert Systems with Applications, Vol. 232 (2023) p. 120744

  2. arXiv:2008.08272  [pdf, other

    cs.PL cs.LG

    Compiling ONNX Neural Network Models Using MLIR

    Authors: Tian **, Gheorghe-Teodor Bercea, Tung D. Le, Tong Chen, Gong Su, Haruki Imai, Yasushi Negishi, Anh Leu, Kevin O'Brien, Kiyokuni Kawachiya, Alexandre E. Eichenberger

    Abstract: Deep neural network models are becoming increasingly popular and have been used in various tasks such as computer vision, speech recognition, and natural language processing. Machine learning models are commonly trained in a resource-rich environment and then deployed in a distinct environment such as high availability machines or edge devices. To assist the portability of models, the open-source… ▽ More

    Submitted 30 September, 2020; v1 submitted 19 August, 2020; originally announced August 2020.

    Comments: 8 pages

  3. arXiv:1907.05013  [pdf, other

    cs.LG cs.DC cs.PF

    Profiling based Out-of-core Hybrid Method for Large Neural Networks

    Authors: Yuki Ito, Haruki Imai, Tung Le Duc, Yasushi Negishi, Kiyokuni Kawachiya, Ryo Matsumiya, Toshio Endo

    Abstract: GPUs are widely used to accelerate deep learning with NNs (NNs). On the other hand, since GPU memory capacity is limited, it is difficult to implement efficient programs that compute large NNs on GPU. To compute NNs exceeding GPU memory capacity, data-swap** method and recomputing method have been proposed in existing work. However, in these methods, performance overhead occurs due to data movem… ▽ More

    Submitted 11 July, 2019; originally announced July 2019.

    Comments: 15 pages

  4. arXiv:1812.07816  [pdf

    cs.LG cs.CV cs.PF stat.ML

    Fast and Accurate 3D Medical Image Segmentation with Data-swap** Method

    Authors: Haruki Imai, Samuel Matzek, Tung D. Le, Yasushi Negishi, Kiyokuni Kawachiya

    Abstract: Deep neural network models used for medical image segmentation are large because they are trained with high-resolution three-dimensional (3D) images. Graphics processing units (GPUs) are widely used to accelerate the trainings. However, the memory on a GPU is not large enough to train the models. A popular approach to tackling this problem is patch-based method, which divides a large image into sm… ▽ More

    Submitted 19 December, 2018; originally announced December 2018.

    Comments: 13 pages

    ACM Class: C.4; I.2.6; I.2.10; I.4.6; I.4.9; J.4

  5. arXiv:1807.02037  [pdf, other

    cs.LG cs.AI stat.ML

    TFLMS: Large Model Support in TensorFlow by Graph Rewriting

    Authors: Tung D. Le, Haruki Imai, Yasushi Negishi, Kiyokuni Kawachiya

    Abstract: While accelerators such as GPUs have limited memory, deep neural networks are becoming larger and will not fit with the memory limitation of accelerators for training. We propose an approach to tackle this problem by rewriting the computational graph of a neural network, in which swap-out and swap-in operations are inserted to temporarily store intermediate results on CPU memory. In particular, we… ▽ More

    Submitted 2 October, 2019; v1 submitted 5 July, 2018; originally announced July 2018.

    Comments: A new version of TFLMS was published at ISMM 2019 (https://dl.acm.org/citation.cfm?id=3329984)

  6. arXiv:1804.10001  [pdf, other

    cs.DC cs.AI cs.LG

    Profile-guided memory optimization for deep neural networks

    Authors: Taro Sekiyama, Takashi Imamichi, Haruki Imai, Rudy Raymond

    Abstract: Recent years have seen deep neural networks (DNNs) becoming wider and deeper to achieve better performance in many applications of AI. Such DNNs however require huge amounts of memory to store weights and intermediate results (e.g., activations, feature maps, etc.) in propagation. This requirement makes it difficult to run the DNNs on devices with limited, hard-to-extend memory, degrades the runni… ▽ More

    Submitted 26 April, 2018; originally announced April 2018.

    Comments: 7 pages, 9 figures

  7. arXiv:1102.3181  [pdf, ps, other

    cs.IT quant-ph

    Spatially Coupled Quasi-Cyclic Quantum LDPC Codes

    Authors: Manabu Hagiwara, Kenta Kasai, Hideki Imai, Kohichi Sakaniwa

    Abstract: We face the following dilemma for designing low-density parity-check codes (LDPC) for quantum error correction. 1) The row weights of parity-check should be large: The minimum distances are bounded above by the minimum row weights of parity-check matrices of constituent classical codes. Small minimum distance tends to result in poor decoding performance at the error-floor region. 2) The row weight… ▽ More

    Submitted 15 February, 2011; originally announced February 2011.

  8. arXiv:1012.5895  [pdf, ps, other

    cs.CR

    Homophonic Coding Design for Communication Systems Employing the Encoding-Encryption Paradigm

    Authors: Miodrag J. Mihaljevic, Frederique Oggier, Hideki Imai

    Abstract: This paper addresses the design of a dedicated homophonic coding for a class of communication systems which, in order to provide both reliability and security, first encode the data before encrypting it, which is referred to as the encoding-encryption paradigm. The considered systems employ error-correction coding for reliability, a stream cipher for encryption, and homophonic coding to enhance th… ▽ More

    Submitted 29 December, 2010; originally announced December 2010.

    Comments: 16 pages, 1 figure

  9. Quantum Error Correction beyond the Bounded Distance Decoding Limit

    Authors: Kenta Kasai, Manabu Hagiwara, Hideki Imai, Kohichi Sakaniwa

    Abstract: In this paper, we consider quantum error correction over depolarizing channels with non-binary low-density parity-check codes defined over Galois field of size $2^p$ . The proposed quantum error correcting codes are based on the binary quasi-cyclic CSS (Calderbank, Shor and Steane) codes. The resulting quantum codes outperform the best known quantum codes and surpass the performance limit of the b… ▽ More

    Submitted 13 July, 2011; v1 submitted 11 July, 2010; originally announced July 2010.

    Comments: To appear in IEEE Transactions on Information Theory

  10. arXiv:0904.1284  [pdf, ps, other

    cs.CR cs.DS

    Theoretical framework for constructing matching algorithms in biometric authentication systems

    Authors: Manabu Inuma, Akira Otsuka, Hideki Imai

    Abstract: In this paper, we propose a theoretical framework to construct matching algorithms for any biometric authentication systems. Conventional matching algorithms are not necessarily secure against strong intentional impersonation attacks such as wolf attacks. The wolf attack is an attempt to impersonate a genuine user by presenting a "wolf" to a biometric authentication system without the knowledge… ▽ More

    Submitted 8 April, 2009; originally announced April 2009.

  11. arXiv:quant-ph/0701020  [pdf, ps, other

    quant-ph cs.IT math-ph math.CO

    Quantum Quasi-Cyclic LDPC Codes

    Authors: Manabu Hagiwara, Hideki Imai

    Abstract: In this paper, a construction of a pair of "regular" quasi-cyclic LDPC codes as ingredient codes for a quantum error-correcting code is proposed. That is, we find quantum regular LDPC codes with various weight distributions. Furthermore our proposed codes have lots of variations for length, code rate. These codes are obtained by a descrete mathematical characterization for model matrices of quasi-… ▽ More

    Submitted 28 August, 2010; v1 submitted 5 January, 2007; originally announced January 2007.

    Comments: 18 pages, 1 figures, published in proc. of ISIT 2007, (2007 IEEE International Symposium on Information Theory)

  12. arXiv:cs/0610036  [pdf, ps, other

    cs.CR math.NA

    Optimization of Memory Usage in Tardos's Fingerprinting Codes

    Authors: Koji Nuida, Manabu Hagiwara, Hajime Watanabe, Hideki Imai

    Abstract: It is known that Tardos's collusion-secure probabilistic fingerprinting code (Tardos code; STOC'03) has length of theoretically minimal order with respect to the number of colluding users. However, Tardos code uses certain continuous probability distribution in codeword generation, which creates some problems for practical use, in particular, it requires large extra memory. A solution proposed s… ▽ More

    Submitted 15 January, 2008; v1 submitted 6 October, 2006; originally announced October 2006.

    Comments: 12 pages, 1 figure; (v2) tables revised, typos corrected, comments on some recent works added; (v3) submitted version, title changed from "Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature"

    ACM Class: K.4.4; G.1.4

  13. A Secure Traitor Tracing Scheme against Key Exposure

    Authors: Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai

    Abstract: Copyright protection is a major issue in distributing digital content. On the other hand, improvements to usability are sought by content users. In this paper, we propose a secure {\it traitor tracing scheme against key exposure (TTaKE)} which contains the properties of both a traitor tracing scheme and a forward secure public key cryptosystem. Its structure fits current digital broadcasting sys… ▽ More

    Submitted 2 August, 2005; originally announced August 2005.

    Comments: 5 pages, IEEE International Symposium on Information Theory 2005 (ISIT 2005)

  14. arXiv:cs/0304014  [pdf, ps, other

    cs.CR quant-ph

    Commitment Capacity of Discrete Memoryless Channels

    Authors: Andreas Winter, Anderson C. A. Nascimento, Hideki Imai

    Abstract: In extension of the bit commitment task and following work initiated by Crepeau and Kilian, we introduce and solve the problem of characterising the optimal rate at which a discrete memoryless channel can be used for bit commitment. It turns out that the answer is very intuitive: it is the maximum equivocation of the channel (after removing trivial redundancy), even when unlimited noiseless bidi… ▽ More

    Submitted 10 April, 2003; originally announced April 2003.

    Comments: 20 pages, LaTeX2e

    ACM Class: E.3; H.1

    Journal ref: Proc. 9th Cirencester Crypto and Coding Conf., LNCS 2989, pp 35-51, Springer, Berlin 2003.

  15. arXiv:cs/0110024  [pdf, ps, other

    cs.CR

    Pretty-Simple Password-Authenticated Key-Exchange Protocol

    Authors: Kazukuni Kobara, Hideki Imai

    Abstract: We propose pretty simple password-authenticated key-exchange protocol which is based on the difficulty of solving DDH problem. It has the following advantages: (1) Both $y_1$ and $y_2$ in our protocol are independent and thus they can be pre-computed and can be sent independently. This speeds up the protocol. (2) Clients and servers can use almost the same algorithm. This reduces the implementat… ▽ More

    Submitted 10 October, 2001; originally announced October 2001.

    ACM Class: K.6.5

  16. arXiv:cs/0110005  [pdf, ps, other

    cs.CC quant-ph

    Two-way Quantum One-counter Automata

    Authors: Tomohiro Yamasaki, Hirotada Kobayashi, Hiroshi Imai

    Abstract: After the first treatments of quantum finite state automata by Moore and Crutchfield and by Kondacs and Watrous, a number of papers study the power of quantum finite state automata and their variants. This paper introduces a model of two-way quantum one-counter automata (2Q1CAs), combining the model of two-way quantum finite state automata (2QFAs) by Kondacs and Watrous and the model of one-way… ▽ More

    Submitted 2 October, 2001; originally announced October 2001.

    Comments: LaTeX2e, 14 pages, 3 figures

    ACM Class: F.1.1

  17. arXiv:cs/0101020  [pdf, ps, other

    cs.CR

    More Robust Multiparty Protocols with Oblivious Transfer

    Authors: J. Mueller-Quade, H. Imai

    Abstract: With oblivious transfer multiparty protocols become possible even in the presence of a faulty majority. But all known protocols can be aborted by just one disruptor. This paper presents more robust solutions for multiparty protocols with oblivious transfer. This additional robustness against disruptors weakens the security of the protocol and the guarantee that the result is correct. We can ob… ▽ More

    Submitted 22 June, 2001; v1 submitted 22 January, 2001; originally announced January 2001.

    Comments: 13 pages, major revision

    ACM Class: D.4.6

  18. arXiv:cs/0011004  [pdf, ps, other

    cs.CR

    Anonymous Oblivious Transfer

    Authors: J. Mueller-Quade, H. Imai

    Abstract: In this short note we want to introduce {\em anonymous oblivious transfer} a new cryptographic primitive which can be proven to be strictly more powerful than oblivious transfer. We show that all functions can be robustly realized by multi party protocols with {\em anonymous oblivious transfer}. No assumption about possible collusions of cheaters or disruptors have to be made. Furthermore we sho… ▽ More

    Submitted 3 December, 2000; v1 submitted 4 November, 2000; originally announced November 2000.

    Comments: 6 pages, some things clearified, especially that a broadcast channel is not necessary

    ACM Class: C.2.0