Skip to main content

Showing 1–15 of 15 results for author: Kudo, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.06689  [pdf, ps, other

    cs.GT cs.LG cs.MA math.OC

    Policy Iteration for Pareto-Optimal Policies in Stochastic Stackelberg Games

    Authors: Mikoto Kudo, Yohei Akimoto

    Abstract: In general-sum stochastic games, a stationary Stackelberg equilibrium (SSE) does not always exist, in which the leader maximizes leader's return for all the initial states when the follower takes the best response against the leader's policy. Existing methods of determining the SSEs require strong assumptions to guarantee the convergence and the coincidence of the limit with the SSE. Moreover, our… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: 21 pages

  2. arXiv:2404.03530  [pdf, ps, other

    math.AC cs.CR cs.SC math.AG

    The solving degrees for computing Gröbner bases of affine semi-regular polynomial sequences

    Authors: Momonari Kudo, Kazuhiro Yokoyama

    Abstract: Determining the complexity of computing Gröbner bases is an important problem both in theory and in practice, and for that the solving degree plays a key role. In this paper, we study the solving degrees of affine semi-regular sequences and their homogenized sequences. Some of our results are considered to give mathematically rigorous proofs of the correctness of methods for computing Gröbner base… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

    Comments: arXiv admin note: text overlap with arXiv:2401.07768

  3. arXiv:2401.07768  [pdf, ps, other

    cs.SC math.AC math.AG

    On Hilbert-Poincaré series of affine semi-regular polynomial sequences and related Gröbner bases

    Authors: Momonari Kudo, Kazuhiro Yokoyama

    Abstract: Gröbner bases are nowadays central tools for solving various problems in commutative algebra and algebraic geometry. A typical use of Gröbner bases is the multivariate polynomial system solving, which enables us to construct algebraic attacks against post-quantum cryptographic protocols. Therefore, the determination of the complexity of computing Gröbner bases is very important both in theory and… ▽ More

    Submitted 3 March, 2024; v1 submitted 15 January, 2024; originally announced January 2024.

    Comments: 25 pages, Comments are welcome!

    Journal ref: Mathematical Foundations for Post-Quantum Cryptography (T. Takagi et al. eds), Mathematics for Industry, Springer, 2024

  4. arXiv:2312.16858  [pdf, ps, other

    math.AG cs.SC math.NT

    Computing superspecial hyperelliptic curves of genus 4 with automorphism group properly containing the Klein 4-group

    Authors: Ryo Ohashi, Momonari Kudo

    Abstract: In algebraic geometry, enumerating or finding superspecial curves in positive characteristic $p$ is important both in theory and in computation. In this paper, we propose feasible algorithms to enumerate or find superspecial hyperelliptic curves of genus $4$ with automorphism group properly containing the Klein $4$-group. Executing the algorithms on Magma, we succeeded in enumerating such superspe… ▽ More

    Submitted 28 December, 2023; originally announced December 2023.

    Comments: 26 pages, and comments are welcome!

  5. arXiv:2312.16852  [pdf, other

    cs.LG cs.HC eess.SP

    Sensor Data Simulation for Anomaly Detection of the Elderly Living Alone

    Authors: Kai Tanaka, Mineichi Kudo, Keigo Kimura

    Abstract: With the increase of the number of elderly people living alone around the world, there is a growing demand for sensor-based detection of anomalous behaviors. Although smart homes with ambient sensors could be useful for detecting such anomalies, there is a problem of lack of sufficient real data for develo** detection algorithms. For co** with this problem, several sensor data simulators have… ▽ More

    Submitted 28 December, 2023; originally announced December 2023.

    Comments: 26 pages, 10 figures

  6. arXiv:2209.02926  [pdf, ps, other

    math.AG cs.SC math.NT

    Some explicit arithmetics on curves of genus three and their applications

    Authors: Tomoki Moriya, Momonari Kudo

    Abstract: A Richelot isogeny between Jacobian varieties is an isogeny whose kernel is included in the $2$-torsion subgroup of the domain. In particular, a Richelot isogeny whose codomain is the product of two or more principally porlalized abelian varieties is called a decomposed Richelot isogeny. In this paper, we develop some explicit arithmetics on curves of genus $3$, including algorithms to compute the… ▽ More

    Submitted 1 March, 2023; v1 submitted 7 September, 2022; originally announced September 2022.

    Comments: Comments are welcome!

  7. arXiv:2201.01079  [pdf, other

    cs.LG

    Incomplete Multi-View Weak-Label Learning with Noisy Features and Imbalanced Labels

    Authors: Zhiwei Li, Zijian Yang, Lu Sun, Mineichi Kudo, Kego Kimura

    Abstract: A variety of modern applications exhibit multi-view multi-label learning, where each sample has multi-view features, and multiple labels are correlated via common views. Current methods usually fail to directly deal with the setting where only a subset of features and labels are observed for each sample, and ignore the presence of noisy views and imbalanced labels in real-world problems. In this p… ▽ More

    Submitted 29 August, 2023; v1 submitted 4 January, 2022; originally announced January 2022.

    Comments: 6 pages, 2 figures, conference

  8. arXiv:2112.08662  [pdf

    cs.CR cs.DB

    Construction of Differentially Private Summaries over Fully Homomorphic Encryption

    Authors: S. Ushiyama, T. Takahashi, M. Kudo, H. Yamana

    Abstract: Cloud computing has garnered attention as a platform of query processing systems. However, data privacy leakage is a critical problem. Chowdhury et al. proposed Crypt(epsilon), which executes differential privacy (DP) over encrypted data on two non-colluding semi-honest servers. Further, the DP index proposed by these authors summarizes a dataset to prevent information leakage while improving the… ▽ More

    Submitted 16 December, 2021; originally announced December 2021.

    Comments: Accepted at the 32nd international Conference on Database and Expert Systems Applications (DEXA2021)

  9. arXiv:2112.05023  [pdf, other

    cs.SC cs.CR math.AC

    Polynomial XL: A Variant of the XL Algorithm Using Macaulay Matrices over Polynomial Rings

    Authors: Hiroki Furue, Momonari Kudo

    Abstract: Solving a system of $m$ multivariate quadratic equations in $n$ variables over finite fields (the MQ problem) is one of the important problems in the theory of computer science. The XL algorithm (XL for short) is a major approach for solving the MQ problem with linearization over a coefficient field. Furthermore, the hybrid approach with XL (h-XL) is a variant of XL guessing some variables beforeh… ▽ More

    Submitted 7 May, 2024; v1 submitted 9 December, 2021; originally announced December 2021.

    Comments: 35 pages, 1 figure

    Journal ref: Proceedings of PQCrypto 2024

  10. arXiv:2003.04153  [pdf, ps, other

    math.NT cs.SC math.AG

    Algorithm to enumerate superspecial Howe curves of genus $4$

    Authors: Momonari Kudo, Shushi Harashita

    Abstract: A Howe curve is a curve of genus $4$ obtained as the fiber product over $\mathbf{P}^1$ of two elliptic curves. Any Howe curve is canonical. This paper provides an efficient algorithm to find superspecial Howe curves and that to enumerate their isomorphism classes. We discuss not only an algorithm to test the superspeciality but also an algorithm to test isomorphisms for Howe curves. Our algorithms… ▽ More

    Submitted 9 March, 2020; originally announced March 2020.

    Comments: 18 pages. Magma codes used to obtain the main results will be appear at the website of the first author

    Journal ref: Proceedings of the Fourteenth Algorithmic Number Theory Symposium (ANTS-XIV), edited by Steven Galbraith, Open Book Series 4, Mathematical Sciences Publishers, Berkeley, 2020

  11. Time-Discounting Convolution for Event Sequences with Ambiguous Timestamps

    Authors: Takayuki Katsuki, Takayuki Osogami, Akira Koseki, Masaki Ono, Michiharu Kudo, Masaki Makino, Atsushi Suzuki

    Abstract: This paper proposes a method for modeling event sequences with ambiguous timestamps, a time-discounting convolution. Unlike in ordinary time series, time intervals are not constant, small time-shifts have no significant effect, and inputting timestamps or time durations into a model is not effective. The criteria that we require for the modeling are providing robustness against time-shifts or time… ▽ More

    Submitted 6 December, 2018; originally announced December 2018.

    Comments: 18th IEEE International Conference on Data Mining (ICDM 2018)

  12. Computing representation matrices for the action of Frobenius to cohomology groups

    Authors: Momonari Kudo

    Abstract: This paper is concerned with the computation of representation matrices for the action of Frobenius to the cohomology groups of algebraic varieties. Specifically we shall give an algorithm to compute the matrices for arbitrary algebraic varieties with defining equations over perfect fields of positive characteristic, and estimate its complexity. Moreover, we propose a specific efficient method, wh… ▽ More

    Submitted 26 April, 2017; originally announced April 2017.

    Journal ref: Journal of Symbolic Computation, Vol. 109, 441-464, 2022

  13. arXiv:1704.02592  [pdf, ps, other

    cs.LG

    MLC Toolbox: A MATLAB/OCTAVE Library for Multi-Label Classification

    Authors: Keigo Kimura, Lu Sun, Mineichi Kudo

    Abstract: Multi-Label Classification toolbox is a MATLAB/OCTAVE library for Multi-Label Classification (MLC). There exists a few Java libraries for MLC, but no MATLAB/OCTAVE library that covers various methods. This toolbox offers an environment for evaluation, comparison and visualization of the MLC results. One attraction of this toolbox is that it enables us to try many combinations of feature space dime… ▽ More

    Submitted 9 April, 2017; originally announced April 2017.

    Comments: Instruction pages are now under construction

  14. arXiv:1701.06134  [pdf, ps, other

    cs.DS

    On Practical Accuracy of Edit Distance Approximation Algorithms

    Authors: Hiroyuki Hanada, Mineichi Kudo, Atsuyoshi Nakamura

    Abstract: The edit distance is a basic string similarity measure used in many applications such as text mining, signal processing, bioinformatics, and so on. However, the computational cost can be a problem when we repeat many distance calculations as seen in real-life searching situations. A promising solution to cope with the problem is to approximate the edit distance by another distance with a lower com… ▽ More

    Submitted 22 January, 2017; originally announced January 2017.

  15. arXiv:0809.5266  [pdf, ps, other

    cs.CR

    Checking Security Policy Compliance

    Authors: Vaibhav Gowadia, Csilla Farkas, Michiharu Kudo

    Abstract: Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. O… ▽ More

    Submitted 30 September, 2008; originally announced September 2008.

    Comments: 23 pages; submitted to TKDE; original submission 15 mar 2007; revised 20 jan 2008

    ACM Class: H.1.1; H.2.0.a; I.2.2.e; I.2.4