-
Policy Iteration for Pareto-Optimal Policies in Stochastic Stackelberg Games
Authors:
Mikoto Kudo,
Yohei Akimoto
Abstract:
In general-sum stochastic games, a stationary Stackelberg equilibrium (SSE) does not always exist, in which the leader maximizes leader's return for all the initial states when the follower takes the best response against the leader's policy. Existing methods of determining the SSEs require strong assumptions to guarantee the convergence and the coincidence of the limit with the SSE. Moreover, our…
▽ More
In general-sum stochastic games, a stationary Stackelberg equilibrium (SSE) does not always exist, in which the leader maximizes leader's return for all the initial states when the follower takes the best response against the leader's policy. Existing methods of determining the SSEs require strong assumptions to guarantee the convergence and the coincidence of the limit with the SSE. Moreover, our analysis suggests that the performance at the fixed points of these methods is not reasonable when they are not SSEs. Herein, we introduced the concept of Pareto-optimality as a reasonable alternative to SSEs. We derive the policy improvement theorem for stochastic games with the best-response follower and propose an iterative algorithm to determine the Pareto-optimal policies based on it. Monotone improvement and convergence of the proposed approach are proved, and its convergence to SSEs is proved in a special case.
△ Less
Submitted 7 May, 2024;
originally announced May 2024.
-
The solving degrees for computing Gröbner bases of affine semi-regular polynomial sequences
Authors:
Momonari Kudo,
Kazuhiro Yokoyama
Abstract:
Determining the complexity of computing Gröbner bases is an important problem both in theory and in practice, and for that the solving degree plays a key role. In this paper, we study the solving degrees of affine semi-regular sequences and their homogenized sequences. Some of our results are considered to give mathematically rigorous proofs of the correctness of methods for computing Gröbner base…
▽ More
Determining the complexity of computing Gröbner bases is an important problem both in theory and in practice, and for that the solving degree plays a key role. In this paper, we study the solving degrees of affine semi-regular sequences and their homogenized sequences. Some of our results are considered to give mathematically rigorous proofs of the correctness of methods for computing Gröbner bases of the ideal generated by an affine semi-regular sequence. This paper is a sequel of the authors' previous work and gives additional results on the solving degrees and important behaviors of Gröbner basis computation.
△ Less
Submitted 4 April, 2024;
originally announced April 2024.
-
On Hilbert-Poincaré series of affine semi-regular polynomial sequences and related Gröbner bases
Authors:
Momonari Kudo,
Kazuhiro Yokoyama
Abstract:
Gröbner bases are nowadays central tools for solving various problems in commutative algebra and algebraic geometry. A typical use of Gröbner bases is the multivariate polynomial system solving, which enables us to construct algebraic attacks against post-quantum cryptographic protocols. Therefore, the determination of the complexity of computing Gröbner bases is very important both in theory and…
▽ More
Gröbner bases are nowadays central tools for solving various problems in commutative algebra and algebraic geometry. A typical use of Gröbner bases is the multivariate polynomial system solving, which enables us to construct algebraic attacks against post-quantum cryptographic protocols. Therefore, the determination of the complexity of computing Gröbner bases is very important both in theory and in practice: One of the most important cases is the case where input polynomials compose an (overdetermined) affine semi-regular sequence. The first part of this paper aims to present a survey on Gröbner basis computation and its complexity. In the second part, we shall give an explicit formula on the (truncated) Hilbert-Poincaré series associated to the homogenization of an affine semi-regular sequence. Based on the formula, we also study (reduced) Gröbner bases of the ideals generated by an affine semi-regular sequence and its homogenization. Some of our results are considered to give mathematically rigorous proofs of the correctness of methods for computing Gröbner bases of the ideal generated by an affine semi-regular sequence.
△ Less
Submitted 3 March, 2024; v1 submitted 15 January, 2024;
originally announced January 2024.
-
Computing superspecial hyperelliptic curves of genus 4 with automorphism group properly containing the Klein 4-group
Authors:
Ryo Ohashi,
Momonari Kudo
Abstract:
In algebraic geometry, enumerating or finding superspecial curves in positive characteristic $p$ is important both in theory and in computation. In this paper, we propose feasible algorithms to enumerate or find superspecial hyperelliptic curves of genus $4$ with automorphism group properly containing the Klein $4$-group. Executing the algorithms on Magma, we succeeded in enumerating such superspe…
▽ More
In algebraic geometry, enumerating or finding superspecial curves in positive characteristic $p$ is important both in theory and in computation. In this paper, we propose feasible algorithms to enumerate or find superspecial hyperelliptic curves of genus $4$ with automorphism group properly containing the Klein $4$-group. Executing the algorithms on Magma, we succeeded in enumerating such superspecial curves for every $p$ with $19 \leq p < 500$, and in finding a single one for every $p$ with $19 \leq p < 7000$.
△ Less
Submitted 28 December, 2023;
originally announced December 2023.
-
Sensor Data Simulation for Anomaly Detection of the Elderly Living Alone
Authors:
Kai Tanaka,
Mineichi Kudo,
Keigo Kimura
Abstract:
With the increase of the number of elderly people living alone around the world, there is a growing demand for sensor-based detection of anomalous behaviors. Although smart homes with ambient sensors could be useful for detecting such anomalies, there is a problem of lack of sufficient real data for develo** detection algorithms. For co** with this problem, several sensor data simulators have…
▽ More
With the increase of the number of elderly people living alone around the world, there is a growing demand for sensor-based detection of anomalous behaviors. Although smart homes with ambient sensors could be useful for detecting such anomalies, there is a problem of lack of sufficient real data for develo** detection algorithms. For co** with this problem, several sensor data simulators have been proposed, but they have not been able to model appropriately the long-term transitions and correlations between anomalies that exist in reality. In this paper, therefore, we propose a novel sensor data simulator that can model these factors in generation of sensor data. Anomalies considered in this study were classified into three types of \textit{state anomalies}, \textit{activity anomalies}, and \textit{moving anomalies}. The simulator produces 10 years data in 100 min. including six anomalies, two for each type. Numerical evaluations show that this simulator is superior to the past simulators in the sense that it simulates well day-to-day variations of real data.
△ Less
Submitted 28 December, 2023;
originally announced December 2023.
-
Some explicit arithmetics on curves of genus three and their applications
Authors:
Tomoki Moriya,
Momonari Kudo
Abstract:
A Richelot isogeny between Jacobian varieties is an isogeny whose kernel is included in the $2$-torsion subgroup of the domain. In particular, a Richelot isogeny whose codomain is the product of two or more principally porlalized abelian varieties is called a decomposed Richelot isogeny. In this paper, we develop some explicit arithmetics on curves of genus $3$, including algorithms to compute the…
▽ More
A Richelot isogeny between Jacobian varieties is an isogeny whose kernel is included in the $2$-torsion subgroup of the domain. In particular, a Richelot isogeny whose codomain is the product of two or more principally porlalized abelian varieties is called a decomposed Richelot isogeny. In this paper, we develop some explicit arithmetics on curves of genus $3$, including algorithms to compute the codomain of a decomposed Richelot isogeny. As solutions to compute the domain of a decomposed Richelot isogeny, explicit formulae of defining equations for Howe curves of genus $3$ are also given. Using the formulae, we shall construct an algorithm with complexity $\tilde{O}(p^3)$ (resp.\ $\tilde{O}(p^4)$) to enumerate all hyperelliptic (resp.\ non-hyperelliptic) superspecial Howe curves of genus $3$.
△ Less
Submitted 1 March, 2023; v1 submitted 7 September, 2022;
originally announced September 2022.
-
Incomplete Multi-View Weak-Label Learning with Noisy Features and Imbalanced Labels
Authors:
Zhiwei Li,
Zijian Yang,
Lu Sun,
Mineichi Kudo,
Kego Kimura
Abstract:
A variety of modern applications exhibit multi-view multi-label learning, where each sample has multi-view features, and multiple labels are correlated via common views. Current methods usually fail to directly deal with the setting where only a subset of features and labels are observed for each sample, and ignore the presence of noisy views and imbalanced labels in real-world problems. In this p…
▽ More
A variety of modern applications exhibit multi-view multi-label learning, where each sample has multi-view features, and multiple labels are correlated via common views. Current methods usually fail to directly deal with the setting where only a subset of features and labels are observed for each sample, and ignore the presence of noisy views and imbalanced labels in real-world problems. In this paper, we propose a novel method to overcome the limitations. It jointly embeds incomplete views and weak labels into a low-dimensional subspace with adaptive weights, and facilitates the difference between embedding weight matrices via auto-weighted Hilbert-Schmidt Independence Criterion (HSIC) to reduce the redundancy. Moreover, it adaptively learns view-wise importance for embedding to detect noisy views, and mitigates the label imbalance problem by focal loss. Experimental results on four real-world multi-view multi-label datasets demonstrate the effectiveness of the proposed method.
△ Less
Submitted 29 August, 2023; v1 submitted 4 January, 2022;
originally announced January 2022.
-
Construction of Differentially Private Summaries over Fully Homomorphic Encryption
Authors:
S. Ushiyama,
T. Takahashi,
M. Kudo,
H. Yamana
Abstract:
Cloud computing has garnered attention as a platform of query processing systems. However, data privacy leakage is a critical problem. Chowdhury et al. proposed Crypt(epsilon), which executes differential privacy (DP) over encrypted data on two non-colluding semi-honest servers. Further, the DP index proposed by these authors summarizes a dataset to prevent information leakage while improving the…
▽ More
Cloud computing has garnered attention as a platform of query processing systems. However, data privacy leakage is a critical problem. Chowdhury et al. proposed Crypt(epsilon), which executes differential privacy (DP) over encrypted data on two non-colluding semi-honest servers. Further, the DP index proposed by these authors summarizes a dataset to prevent information leakage while improving the performance. However, two problems persist: 1) the original data are decrypted to apply sorting via a garbled circuit, and 2) the added noise becomes large because the sorted data are partitioned with equal width, regardless of the data distribution. To solve these problems, we propose a new method called DP-summary that summarizes a dataset into differentially private data over a homomorphic encryption without decryption, thereby enhancing data security. Furthermore, our scheme adopts Li et al.'s data-aware and workload-aware (DAWA) algorithm for the encrypted data, thereby minimizing the noise caused by DP and reducing the errors of query responses. An experimental evaluation using torus fully homomorphic encryption (TFHE), a bit-wise fully homomorphic encryption library, confirms the applicability of the proposed method, which summarized eight 16-bit data in 12.5 h. We also confirmed that there was no accuracy degradation even after adopting TFHE along with the DAWA algorithm.
△ Less
Submitted 16 December, 2021;
originally announced December 2021.
-
Polynomial XL: A Variant of the XL Algorithm Using Macaulay Matrices over Polynomial Rings
Authors:
Hiroki Furue,
Momonari Kudo
Abstract:
Solving a system of $m$ multivariate quadratic equations in $n$ variables over finite fields (the MQ problem) is one of the important problems in the theory of computer science. The XL algorithm (XL for short) is a major approach for solving the MQ problem with linearization over a coefficient field. Furthermore, the hybrid approach with XL (h-XL) is a variant of XL guessing some variables beforeh…
▽ More
Solving a system of $m$ multivariate quadratic equations in $n$ variables over finite fields (the MQ problem) is one of the important problems in the theory of computer science. The XL algorithm (XL for short) is a major approach for solving the MQ problem with linearization over a coefficient field. Furthermore, the hybrid approach with XL (h-XL) is a variant of XL guessing some variables beforehand. In this paper, we present a variant of h-XL, which we call the \textit{polynomial XL (PXL)}. In PXL, the whole $n$ variables are divided into $k$ variables to be fixed and the remaining $n-k$ variables as ``main variables'', and we generate a Macaulay matrix with respect to the $n-k$ main variables over a polynomial ring of the $k$ (sub-)variables. By eliminating some columns of the Macaulay matrix over the polynomial ring before guessing $k$ variables, the amount of operations required for each guessed value can be reduced compared with h-XL. Our complexity analysis of PXL (under some practical assumptions and heuristics) gives a new theoretical bound, and it indicates that PXL could be more efficient than other algorithms in theory on the random system with $n=m$, which is the case of general multivariate signatures. For example, on systems over the finite field with ${2^8}$ elements with $n=m=80$, the numbers of operations deduced from the theoretical bounds of the hybrid approaches with XL and Wiedemann XL, Crossbred, and PXL with optimal $k$ are estimated as $2^{252}$, $2^{234}$, $2^{237}$, and $2^{220}$, respectively.
△ Less
Submitted 7 May, 2024; v1 submitted 9 December, 2021;
originally announced December 2021.
-
Algorithm to enumerate superspecial Howe curves of genus $4$
Authors:
Momonari Kudo,
Shushi Harashita
Abstract:
A Howe curve is a curve of genus $4$ obtained as the fiber product over $\mathbf{P}^1$ of two elliptic curves. Any Howe curve is canonical. This paper provides an efficient algorithm to find superspecial Howe curves and that to enumerate their isomorphism classes. We discuss not only an algorithm to test the superspeciality but also an algorithm to test isomorphisms for Howe curves. Our algorithms…
▽ More
A Howe curve is a curve of genus $4$ obtained as the fiber product over $\mathbf{P}^1$ of two elliptic curves. Any Howe curve is canonical. This paper provides an efficient algorithm to find superspecial Howe curves and that to enumerate their isomorphism classes. We discuss not only an algorithm to test the superspeciality but also an algorithm to test isomorphisms for Howe curves. Our algorithms are much more efficient than conventional ones proposed by the authors so far for general canonical curves. We show the existence of a superspecial Howe curve in characteristic $7<p\le 331$ and enumerate the isomorphism classes of superspecial Howe curves in characteristic $p\le 53$, by executing our algorithms over the computer algebra system Magma.
△ Less
Submitted 9 March, 2020;
originally announced March 2020.
-
Time-Discounting Convolution for Event Sequences with Ambiguous Timestamps
Authors:
Takayuki Katsuki,
Takayuki Osogami,
Akira Koseki,
Masaki Ono,
Michiharu Kudo,
Masaki Makino,
Atsushi Suzuki
Abstract:
This paper proposes a method for modeling event sequences with ambiguous timestamps, a time-discounting convolution. Unlike in ordinary time series, time intervals are not constant, small time-shifts have no significant effect, and inputting timestamps or time durations into a model is not effective. The criteria that we require for the modeling are providing robustness against time-shifts or time…
▽ More
This paper proposes a method for modeling event sequences with ambiguous timestamps, a time-discounting convolution. Unlike in ordinary time series, time intervals are not constant, small time-shifts have no significant effect, and inputting timestamps or time durations into a model is not effective. The criteria that we require for the modeling are providing robustness against time-shifts or timestamps uncertainty as well as maintaining the essential capabilities of time-series models, i.e., forgetting meaningless past information and handling infinite sequences. The proposed method handles them with a convolutional mechanism across time with specific parameterizations, which efficiently represents the event dependencies in a time-shift invariant manner while discounting the effect of past events, and a dynamic pooling mechanism, which provides robustness against the uncertainty in timestamps and enhances the time-discounting capability by dynamically changing the pooling window size. In our learning algorithm, the decaying and dynamic pooling mechanisms play critical roles in handling infinite and variable length sequences. Numerical experiments on real-world event sequences with ambiguous timestamps and ordinary time series demonstrated the advantages of our method.
△ Less
Submitted 6 December, 2018;
originally announced December 2018.
-
Computing representation matrices for the action of Frobenius to cohomology groups
Authors:
Momonari Kudo
Abstract:
This paper is concerned with the computation of representation matrices for the action of Frobenius to the cohomology groups of algebraic varieties. Specifically we shall give an algorithm to compute the matrices for arbitrary algebraic varieties with defining equations over perfect fields of positive characteristic, and estimate its complexity. Moreover, we propose a specific efficient method, wh…
▽ More
This paper is concerned with the computation of representation matrices for the action of Frobenius to the cohomology groups of algebraic varieties. Specifically we shall give an algorithm to compute the matrices for arbitrary algebraic varieties with defining equations over perfect fields of positive characteristic, and estimate its complexity. Moreover, we propose a specific efficient method, which works for complete intersections.
△ Less
Submitted 26 April, 2017;
originally announced April 2017.
-
MLC Toolbox: A MATLAB/OCTAVE Library for Multi-Label Classification
Authors:
Keigo Kimura,
Lu Sun,
Mineichi Kudo
Abstract:
Multi-Label Classification toolbox is a MATLAB/OCTAVE library for Multi-Label Classification (MLC). There exists a few Java libraries for MLC, but no MATLAB/OCTAVE library that covers various methods. This toolbox offers an environment for evaluation, comparison and visualization of the MLC results. One attraction of this toolbox is that it enables us to try many combinations of feature space dime…
▽ More
Multi-Label Classification toolbox is a MATLAB/OCTAVE library for Multi-Label Classification (MLC). There exists a few Java libraries for MLC, but no MATLAB/OCTAVE library that covers various methods. This toolbox offers an environment for evaluation, comparison and visualization of the MLC results. One attraction of this toolbox is that it enables us to try many combinations of feature space dimension reduction, sample clustering, label space dimension reduction and ensemble, etc.
△ Less
Submitted 9 April, 2017;
originally announced April 2017.
-
On Practical Accuracy of Edit Distance Approximation Algorithms
Authors:
Hiroyuki Hanada,
Mineichi Kudo,
Atsuyoshi Nakamura
Abstract:
The edit distance is a basic string similarity measure used in many applications such as text mining, signal processing, bioinformatics, and so on. However, the computational cost can be a problem when we repeat many distance calculations as seen in real-life searching situations. A promising solution to cope with the problem is to approximate the edit distance by another distance with a lower com…
▽ More
The edit distance is a basic string similarity measure used in many applications such as text mining, signal processing, bioinformatics, and so on. However, the computational cost can be a problem when we repeat many distance calculations as seen in real-life searching situations. A promising solution to cope with the problem is to approximate the edit distance by another distance with a lower computational cost. There are, indeed, many distances have been proposed for approximating the edit distance. However, their approximation accuracies are evaluated only theoretically: many of them are evaluated only with big-oh (asymptotic) notations, and without experimental analysis. Therefore, it is beneficial to know their actual performance in real applications. In this study we compared existing six approximation distances in two approaches: (i) we refined their theoretical approximation accuracy by calculating up to the constant coefficients, and (ii) we conducted some experiments, in one artificial and two real-life data sets, to reveal under which situations they perform best. As a result we obtained the following results: [Batu 2006] is the best theoretically and [Andoni 2010] experimentally. Theoretical considerations show that [Batu 2006] is the best if the string length n is large enough (n >= 300). [Andoni 2010] is experimentally the best for most data sets and theoretically the second best. [Bar-Yossef 2004], [Charikar 2006] and [Sokolov 2007], despite their middle-level theoretical performance, are experimentally as good as [Andoni 2010] for pairs of strings with large alphabet size.
△ Less
Submitted 22 January, 2017;
originally announced January 2017.
-
Checking Security Policy Compliance
Authors:
Vaibhav Gowadia,
Csilla Farkas,
Michiharu Kudo
Abstract:
Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. O…
▽ More
Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.
△ Less
Submitted 30 September, 2008;
originally announced September 2008.