Skip to main content

Showing 1–44 of 44 results for author: Sasaki, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.09881  [pdf, other

    quant-ph cs.NI

    Scalable Timing Coordination of Bell State Analyzers in Quantum Networks

    Authors: Yoshihiro Mori, Toshihiko Sasaki, Rikizo Ikuta, Kentaro Teramoto, Hiroyuki Ohno, Michal Hajdušek, Rodney Van Meter, Shota Nagayama

    Abstract: The optical Bell State Analyzer (BSA) plays a key role in the optical generation of entanglement in quantum networks. The optical BSA is effective in controlling the timing of arriving photons to achieve interference. It is unclear whether timing synchronization is possible even in multi-hop and complex large-scale networks, and if so, how efficient it is. We investigate the scalability of BSA syn… ▽ More

    Submitted 16 May, 2024; originally announced May 2024.

    Comments: 7 pages, 9 figures. Submitted to the IEEE Quantum Week 2024

  2. arXiv:2403.17423  [pdf, other

    cs.CV stat.ML

    Test-time Adaptation Meets Image Enhancement: Improving Accuracy via Uncertainty-aware Logit Switching

    Authors: Shohei Enomoto, Naoya Hasegawa, Kazuki Adachi, Taku Sasaki, Shin'ya Yamaguchi, Satoshi Suzuki, Takeharu Eda

    Abstract: Deep neural networks have achieved remarkable success in a variety of computer vision applications. However, there is a problem of degrading accuracy when the data distribution shifts between training and testing. As a solution of this problem, Test-time Adaptation~(TTA) has been well studied because of its practicality. Although TTA methods increase accuracy under distribution shift by updating t… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

    Comments: Accepted to IJCNN2024

  3. arXiv:2403.14114  [pdf, other

    cs.CV

    Test-time Similarity Modification for Person Re-identification toward Temporal Distribution Shift

    Authors: Kazuki Adachi, Shohei Enomoto, Taku Sasaki, Shin'ya Yamaguchi

    Abstract: Person re-identification (re-id), which aims to retrieve images of the same person in a given image from a database, is one of the most practical image recognition applications. In the real world, however, the environments that the images are taken from change over time. This causes a distribution shift between training and testing and degrades the performance of re-id. To maintain re-id performan… ▽ More

    Submitted 20 March, 2024; originally announced March 2024.

    Comments: Accepted to IJCNN2024

  4. arXiv:2401.13237  [pdf, other

    quant-ph cond-mat.stat-mech cs.IT physics.comp-ph stat.ML

    Quantum natural gradient without monotonicity

    Authors: Toi Sasaki, Hideyuki Miyahara

    Abstract: Natural gradient (NG) is an information-geometric optimization method that plays a crucial role, especially in the estimation of parameters for machine learning models like neural networks. To apply NG to quantum systems, the quantum natural gradient (QNG) was introduced and utilized for noisy intermediate-scale devices. Additionally, a mathematically equivalent approach to QNG, known as the stoch… ▽ More

    Submitted 24 January, 2024; originally announced January 2024.

    Comments: 6 pages, 3 figures

  5. arXiv:2312.02771  [pdf, ps, other

    cs.ET physics.app-ph

    Scaling-up Memristor Monte Carlo with magnetic domain-wall physics

    Authors: Thomas Dalgaty, Shogo Yamada, Anca Molnos, Eiji Kawasaki, Thomas Mesquida, François Rummens, Tatsuo Shibata, Yukihiro Urakawa, Yukio Terasaki, Tomoyuki Sasaki, Marc Duranton

    Abstract: By exploiting the intrinsic random nature of nanoscale devices, Memristor Monte Carlo (MMC) is a promising enabler of edge learning systems. However, due to multiple algorithmic and device-level limitations, existing demonstrations have been restricted to very small neural network models and datasets. We discuss these limitations, and describe how they can be overcome, by map** the stochastic gr… ▽ More

    Submitted 5 December, 2023; originally announced December 2023.

    Comments: Presented at the 1st workshop on Machine Learning with New Compute Paradigms (MLNCP) at NeurIPS 2023 (New Orleans, USA)

  6. arXiv:2309.08798  [pdf, other

    cs.AI cs.CV

    D3: Data Diversity Design for Systematic Generalization in Visual Question Answering

    Authors: Amir Rahimi, Vanessa D'Amario, Moyuru Yamada, Kentaro Takemoto, Tomotake Sasaki, Xavier Boix

    Abstract: Systematic generalization is a crucial aspect of intelligence, which refers to the ability to generalize to novel tasks by combining known subtasks and concepts. One critical factor that has been shown to influence systematic generalization is the diversity of training data. However, diversity can be defined in various ways, as data have many factors of variation. A more granular understanding of… ▽ More

    Submitted 15 September, 2023; originally announced September 2023.

    Comments: Under review, 15 pages

  7. arXiv:2306.09005  [pdf, other

    cs.LG cs.AI cs.CV

    Modularity Trumps Invariance for Compositional Robustness

    Authors: Ian Mason, Anirban Sarkar, Tomotake Sasaki, Xavier Boix

    Abstract: By default neural networks are not robust to changes in data distribution. This has been demonstrated with simple image corruptions, such as blurring or adding noise, degrading image classification performance. Many methods have been proposed to mitigate these issues but for the most part models are evaluated on single corruptions. In reality, visual space is compositional in nature, that is, that… ▽ More

    Submitted 15 June, 2023; originally announced June 2023.

  8. arXiv:2305.14902  [pdf, other

    cs.CL

    M4: Multi-generator, Multi-domain, and Multi-lingual Black-Box Machine-Generated Text Detection

    Authors: Yuxia Wang, Jonibek Mansurov, Petar Ivanov, **yan Su, Artem Shelmanov, Akim Tsvigun, Chenxi Whitehouse, Osama Mohammed Afzal, Tarek Mahmoud, Toru Sasaki, Thomas Arnold, Alham Fikri Aji, Nizar Habash, Iryna Gurevych, Preslav Nakov

    Abstract: Large language models (LLMs) have demonstrated remarkable capability to generate fluent responses to a wide variety of user queries. However, this has also raised concerns about the potential misuse of such texts in journalism, education, and academia. In this study, we strive to create automated systems that can detect machine-generated texts and pinpoint potential misuse. We first introduce a la… ▽ More

    Submitted 9 March, 2024; v1 submitted 24 May, 2023; originally announced May 2023.

    Comments: 41 pages

  9. arXiv:2305.09948  [pdf, other

    cs.CV cs.AI

    HICO-DET-SG and V-COCO-SG: New Data Splits for Evaluating the Systematic Generalization Performance of Human-Object Interaction Detection Models

    Authors: Kentaro Takemoto, Moyuru Yamada, Tomotake Sasaki, Hisanao Akima

    Abstract: Human-Object Interaction (HOI) detection is a task to localize humans and objects in an image and predict the interactions in human-object pairs. In real-world scenarios, HOI detection models need systematic generalization, i.e., generalization to novel combinations of objects and interactions, because the train data are expected to cover a limited portion of all possible combinations. To evaluate… ▽ More

    Submitted 11 April, 2024; v1 submitted 17 May, 2023; originally announced May 2023.

    Comments: 19 pages, 3 figures, 4 tables

  10. arXiv:2304.00411  [pdf, other

    cs.HC

    SolefulTap: Augmenting Tap Dancing Experience using a Floor-Type Impact Display

    Authors: Tomoya Sasaki, Narin Okazaki, Takatoshi Yoshida, Alfonso Balandra, Zendai Kashino, Masahiko Inami

    Abstract: We propose SolefulTap for a novel tap dancing experience. It allows users to feel as if they are tap dancing or appreciate a tap dancing performance using the sensations of their own feet. SolefulTap uses a method called Step Augmentation that provides audio-haptic feedback to users, generating impacts in response to users' simple step motions. Our prototype uses a floor-type impact display consis… ▽ More

    Submitted 1 April, 2023; originally announced April 2023.

  11. arXiv:2303.11912  [pdf, other

    cs.LG cs.AI

    Deephys: Deep Electrophysiology, Debugging Neural Networks under Distribution Shifts

    Authors: Anirban Sarkar, Matthew Groth, Ian Mason, Tomotake Sasaki, Xavier Boix

    Abstract: Deep Neural Networks (DNNs) often fail in out-of-distribution scenarios. In this paper, we introduce a tool to visualize and understand such failures. We draw inspiration from concepts from neural electrophysiology, which are based on inspecting the internal functioning of a neural networks by analyzing the feature tuning and invariances of individual units. Deep Electrophysiology, in short Deephy… ▽ More

    Submitted 17 March, 2023; originally announced March 2023.

    Comments: 12 pages, 8 figures

  12. arXiv:2303.04467  [pdf

    q-bio.PE cs.CY nlin.AO physics.soc-ph

    The evolution of cooperation and diversity by integrated indirect reciprocity

    Authors: Tatsuya Sasaki, Satoshi Uchida, Isamu Okada, Hitoshi Yamamoto

    Abstract: Indirect reciprocity is one of the major mechanisms for the evolution of cooperation in human societies. There are two types of indirect reciprocity: upstream and downstream. Cooperation in downstream reciprocity follows the pattern, 'You helped someone, and I will help you'. The direction of cooperation is reversed in upstream reciprocity, which instead follows the pattern, 'You helped me, and I… ▽ More

    Submitted 8 March, 2023; originally announced March 2023.

    Comments: 14 pages, 4 figures, 2 tables

    Journal ref: Games 2024, 15(2),15

  13. arXiv:2209.15452  [pdf, other

    cs.LG cs.AI eess.SY stat.ML

    Safe Exploration Method for Reinforcement Learning under Existence of Disturbance

    Authors: Yoshihiro Okawa, Tomotake Sasaki, Hitoshi Yanami, Toru Namerikawa

    Abstract: Recent rapid developments in reinforcement learning algorithms have been giving us novel possibilities in many fields. However, due to their exploring property, we have to take the risk into consideration when we apply those algorithms to safety-critical problems especially in real environments. In this study, we deal with a safe exploration problem in reinforcement learning under the existence of… ▽ More

    Submitted 20 March, 2023; v1 submitted 30 September, 2022; originally announced September 2022.

    Comments: Accepted by the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD) 2022. The Version of Record is available at https://doi.org/10.1007/978-3-031-26412-2_9

  14. arXiv:2201.11316  [pdf, other

    cs.CV cs.LG

    Transformer Module Networks for Systematic Generalization in Visual Question Answering

    Authors: Moyuru Yamada, Vanessa D'Amario, Kentaro Takemoto, Xavier Boix, Tomotake Sasaki

    Abstract: Transformers achieve great performance on Visual Question Answering (VQA). However, their systematic generalization capabilities, i.e., handling novel combinations of known concepts, is unclear. We reveal that Neural Module Networks (NMNs), i.e., question-specific compositions of modules that tackle a sub-task, achieve better or similar systematic generalization performance than the conventional T… ▽ More

    Submitted 17 March, 2023; v1 submitted 26 January, 2022; originally announced January 2022.

    Report number: CBMM Memo No. 121, Center for Brains, Minds and Machines

  15. arXiv:2201.10664  [pdf, other

    cs.CV cs.LG q-bio.NC

    Do Neural Networks for Segmentation Understand Insideness?

    Authors: Kimberly Villalobos, Vilim Štih, Amineh Ahmadinejad, Shobhita Sundaram, Jamell Dozier, Andrew Francl, Frederico Azevedo, Tomotake Sasaki, Xavier Boix

    Abstract: The insideness problem is an aspect of image segmentation that consists of determining which pixels are inside and outside a region. Deep Neural Networks (DNNs) excel in segmentation benchmarks, but it is unclear if they have the ability to solve the insideness problem as it requires evaluating long-range spatial dependencies. In this paper, the insideness problem is analysed in isolation, without… ▽ More

    Submitted 25 January, 2022; originally announced January 2022.

    Journal ref: Neural Computation 33 (2021) 2511-2549

  16. arXiv:2112.04162  [pdf, other

    cs.CV cs.LG q-bio.NC

    Symmetry Perception by Deep Networks: Inadequacy of Feed-Forward Architectures and Improvements with Recurrent Connections

    Authors: Shobhita Sundaram, Darius Sinha, Matthew Groth, Tomotake Sasaki, Xavier Boix

    Abstract: Symmetry is omnipresent in nature and perceived by the visual system of many species, as it facilitates detecting ecologically important classes of objects in our environment. Symmetry perception requires abstraction of long-range spatial dependencies between image regions, and its underlying neural mechanisms remain elusive. In this paper, we evaluate Deep Neural Network (DNN) architectures on th… ▽ More

    Submitted 21 January, 2022; v1 submitted 8 December, 2021; originally announced December 2021.

  17. arXiv:2111.00131  [pdf, other

    cs.CV cs.AI cs.LG

    Three approaches to facilitate DNN generalization to objects in out-of-distribution orientations and illuminations

    Authors: Akira Sakai, Taro Sunagawa, Spandan Madan, Kanata Suzuki, Takashi Katoh, Hiromichi Kobashi, Hanspeter Pfister, Pawan Sinha, Xavier Boix, Tomotake Sasaki

    Abstract: The training data distribution is often biased towards objects in certain orientations and illumination conditions. While humans have a remarkable capability of recognizing objects in out-of-distribution (OoD) orientations and illuminations, Deep Neural Networks (DNNs) severely suffer in this case, even when large amounts of training examples are available. In this paper, we investigate three diff… ▽ More

    Submitted 25 January, 2022; v1 submitted 29 October, 2021; originally announced November 2021.

  18. Annotation Cost Reduction of Stream-based Active Learning by Automated Weak Labeling using a Robot Arm

    Authors: Kanata Suzuki, Taro Sunagawa, Tomotake Sasaki, Takashi Katoh

    Abstract: Stream-based active learning (AL) is an efficient training data collection method, and it is used to reduce human annotation cost required in machine learning. However, it is difficult to say that the human cost is low enough because most previous studies have assumed that an oracle is a human with domain knowledge. In this study, we propose a method to replace a part of the oracle's work in strea… ▽ More

    Submitted 3 October, 2021; originally announced October 2021.

    Comments: Accepted at IROS 2021

  19. arXiv:2109.13445  [pdf, other

    cs.CV cs.AI cs.LG q-bio.NC stat.ML

    Emergent Neural Network Mechanisms for Generalization to Objects in Novel Orientations

    Authors: Avi Cooper, Xavier Boix, Daniel Harari, Spandan Madan, Hanspeter Pfister, Tomotake Sasaki, Pawan Sinha

    Abstract: The capability of Deep Neural Networks (DNNs) to recognize objects in orientations outside the distribution of the training data is not well understood. We present evidence that DNNs are capable of generalizing to objects in novel orientations by disseminating orientation-invariance obtained from familiar objects seen from many viewpoints. This capability strengthens when training the DNN with an… ▽ More

    Submitted 13 July, 2023; v1 submitted 27 September, 2021; originally announced September 2021.

  20. arXiv:2107.06409  [pdf, other

    cs.LG cs.CV

    The Foes of Neural Network's Data Efficiency Among Unnecessary Input Dimensions

    Authors: Vanessa D'Amario, Sanjana Srivastava, Tomotake Sasaki, Xavier Boix

    Abstract: Datasets often contain input dimensions that are unnecessary to predict the output label, e.g. background in object recognition, which lead to more trainable parameters. Deep Neural Networks (DNNs) are robust to increasing the number of parameters in the hidden layers, but it is unclear whether this holds true for the input layer. In this letter, we investigate the impact of unnecessary input dime… ▽ More

    Submitted 13 July, 2021; originally announced July 2021.

  21. arXiv:2106.16198  [pdf, other

    cs.CV cs.LG

    Adversarial examples within the training distribution: A widespread challenge

    Authors: Spandan Madan, Tomotake Sasaki, Hanspeter Pfister, Tzu-Mao Li, Xavier Boix

    Abstract: Despite a plethora of proposed theories, understanding why deep neural networks are susceptible to adversarial attacks remains an open question. A promising recent strand of research investigates adversarial attacks within the training data distribution, providing a more stringent and worrisome definition for these attacks. These theories posit that the key issue is that in high dimensional datase… ▽ More

    Submitted 17 February, 2023; v1 submitted 30 June, 2021; originally announced June 2021.

  22. arXiv:2106.08170  [pdf, other

    cs.LG cs.CV

    How Modular Should Neural Module Networks Be for Systematic Generalization?

    Authors: Vanessa D'Amario, Tomotake Sasaki, Xavier Boix

    Abstract: Neural Module Networks (NMNs) aim at Visual Question Answering (VQA) via composition of modules that tackle a sub-task. NMNs are a promising strategy to achieve systematic generalization, i.e., overcoming biasing factors in the training distribution. However, the aspects of NMNs that facilitate systematic generalization are not fully understood. In this paper, we demonstrate that the degree of mod… ▽ More

    Submitted 15 January, 2022; v1 submitted 15 June, 2021; originally announced June 2021.

    Journal ref: 35th Conference on Neural Information Processing Systems (NeurIPS 2021), Sydney, Australia

  23. Two-step reinforcement learning for model-free redesign of nonlinear optimal regulator

    Authors: Mei Minami, Yuka Masumoto, Yoshihiro Okawa, Tomotake Sasaki, Yutaka Hori

    Abstract: In many practical control applications, the performance level of a closed-loop system degrades over time due to the change of plant characteristics. Thus, there is a strong need for redesigning a controller without going through the system modeling process, which is often difficult for closed-loop systems. Reinforcement learning (RL) is one of the promising approaches that enable model-free redesi… ▽ More

    Submitted 30 November, 2023; v1 submitted 5 March, 2021; originally announced March 2021.

    Journal ref: SICE Journal of Control, Measurement, and System Integration, vol. 16, no. 1, pp. 349--362, 2023

  24. arXiv:2103.03656  [pdf, ps, other

    cs.LG cs.AI eess.SY stat.ML

    Automatic Exploration Process Adjustment for Safe Reinforcement Learning with Joint Chance Constraint Satisfaction

    Authors: Yoshihiro Okawa, Tomotake Sasaki, Hidenao Iwane

    Abstract: In reinforcement learning (RL) algorithms, exploratory control inputs are used during learning to acquire knowledge for decision making and control, while the true dynamics of a controlled object is unknown. However, this exploring property sometimes causes undesired situations by violating constraints regarding the state of the controlled object. In this paper, we propose an automatic exploration… ▽ More

    Submitted 5 March, 2021; originally announced March 2021.

    Comments: Accepted to the 21st IFAC World Congress (IFAC-V 2020)

  25. Where to Map? Iterative Rover-Copter Path Planning for Mars Exploration

    Authors: Takahiro Sasaki, Kyohei Otsu, Rohan Thakker, Sofie Haesaert, Ali-akbar Agha-mohammadi

    Abstract: In addition to conventional ground rovers, the Mars 2020 mission will send a helicopter to Mars. The copter's high-resolution data helps the rover to identify small hazards such as steps and pointy rocks, as well as providing rich textual information useful to predict perception performance. In this paper, we consider a three-agent system composed of a Mars rover, copter, and orbiter. The objectiv… ▽ More

    Submitted 17 August, 2020; originally announced August 2020.

    Comments: 8 pages, 7 figures

    Journal ref: IEEE Robotics and Automation Letters, Volume: 5 , Issue: 2 , April 2020

  26. arXiv:2007.14756  [pdf, ps, other

    cs.CR

    Security Architecture for Trustworthy Systems in 5G Era

    Authors: Takayuki Sasaki, Shuichi Karino, Mikiya Tani, Kazuaki Nakajima, Koki Tomita, Norio Yamagaki

    Abstract: Systems using 5G are expected to be used in various cases of Society 5.0 and Industrie 4.0 such as smart cities, smart factories, and also critical infrastructures. These systems are essential for our life, thus cyberattacks against the system must be prevented. In this paper, we tackle two problems posed by 5G features: system construction using multi-vendor devices and softwarized functions. Spe… ▽ More

    Submitted 29 July, 2020; originally announced July 2020.

  27. arXiv:2007.14748  [pdf, ps, other

    cs.CR

    Towards a Backdoorless Network Architecture Based on Remote Attestation and Backdoor Inspection

    Authors: Takayuki Sasaki, Yusuke Shimada

    Abstract: To keep a system secure, all devices in the system need to be benign. To avoid malicious and/or compromised devices, network access control such as authentication using a credential and remote attestation based on trusted hardware has been used. These techniques ensure the authenticity and integrity of the devices, but do not mitigate risks of a backdoor embedded in the devices by the developer. T… ▽ More

    Submitted 20 August, 2020; v1 submitted 29 July, 2020; originally announced July 2020.

  28. arXiv:2007.08032  [pdf, other

    cs.CV cs.LG

    When and how CNNs generalize to out-of-distribution category-viewpoint combinations

    Authors: Spandan Madan, Timothy Henry, Jamell Dozier, Helen Ho, Nishchal Bhandari, Tomotake Sasaki, Frédo Durand, Hanspeter Pfister, Xavier Boix

    Abstract: Object recognition and viewpoint estimation lie at the heart of visual understanding. Recent works suggest that convolutional neural networks (CNNs) fail to generalize to out-of-distribution (OOD) category-viewpoint combinations, ie. combinations not seen during training. In this paper, we investigate when and how such OOD generalization may be possible by evaluating CNNs trained to classify both… ▽ More

    Submitted 17 November, 2021; v1 submitted 15 July, 2020; originally announced July 2020.

  29. arXiv:2004.05964  [pdf, other

    cs.CL stat.AP stat.ME

    Keyword Assisted Topic Models

    Authors: Shusei Eshima, Kosuke Imai, Tomoya Sasaki

    Abstract: In recent years, fully automated content analysis based on probabilistic topic models has become popular among social scientists because of their scalability. The unsupervised nature of the models makes them suitable for exploring topics in a corpus without prior knowledge. However, researchers find that these models often fail to measure specific concepts of substantive interest by inadvertently… ▽ More

    Submitted 2 February, 2023; v1 submitted 13 April, 2020; originally announced April 2020.

  30. arXiv:1910.04329  [pdf, other

    cs.LG stat.ML

    Rate-Distortion Optimization Guided Autoencoder for Isometric Embedding in Euclidean Latent Space

    Authors: Keizo Kato, **g Zhou, Tomotake Sasaki, Akira Nakagawa

    Abstract: To analyze high-dimensional and complex data in the real world, deep generative models, such as variational autoencoder (VAE) embed data in a low-dimensional space (latent space) and learn a probabilistic model in the latent space. However, they struggle to accurately reproduce the probability distribution function (PDF) in the input space from that in the latent space. If the embedding were isome… ▽ More

    Submitted 30 August, 2020; v1 submitted 9 October, 2019; originally announced October 2019.

    Comments: Accepted to the International Conference on Machine Learning (ICML) 2020

    MSC Class: 68T01

  31. arXiv:1812.05501  [pdf, other

    eess.SP cs.LG physics.data-an stat.ML

    Bayesian Spectral Deconvolution Based on Poisson Distribution: Bayesian Measurement and Virtual Measurement Analytics (VMA)

    Authors: Kenji Nagata, Yoh-ichi Mototake, Rei Muraoka, Takehiko Sasaki, Masato Okada

    Abstract: In this paper, we propose a new method of Bayesian measurement for spectral deconvolution, which regresses spectral data into the sum of unimodal basis function such as Gaussian or Lorentzian functions. Bayesian measurement is a framework for considering not only the target physical model but also the measurement model as a probabilistic model, and enables us to estimate the parameter of a physica… ▽ More

    Submitted 11 December, 2018; originally announced December 2018.

    Comments: 8 pages, 8 figures

  32. arXiv:1706.10040  [pdf, ps, other

    cs.CR

    A solution for secure use of Kibana and Elasticsearch in multi-user environment

    Authors: Wataru Takase, Tomoaki Nakamura, Yoshiyuki Watase, Takashi Sasaki

    Abstract: Monitoring is indispensable to check status, activities, or resource usage of IT services. A combination of Kibana and Elasticsearch is used for monitoring in many places such as KEK, CC-IN2P3, CERN, and also non-HEP communities. Kibana provides a web interface for rich visualization, and Elasticsearch is a scalable distributed search engine. However, these tools do not support authentication and… ▽ More

    Submitted 30 June, 2017; originally announced June 2017.

    Comments: International Symposium on Grids and Clouds 2017 (ISGC 2017)

  33. arXiv:1703.03943  [pdf, ps, other

    physics.soc-ph cs.MA cs.NE q-bio.PE

    A norm knockout method on indirect reciprocity to reveal indispensable norms

    Authors: Hitoshi Yamamoto, Isamu Okada, Satoshi Uchida, Tatsuya Sasaki

    Abstract: Although various norms for reciprocity-based cooperation have been suggested that are evolutionarily stable against invasion from free riders, the process of alternation of norms and the role of diversified norms remain unclear in the evolution of cooperation. We clarify the co-evolutionary dynamics of norms and cooperation in indirect reciprocity and also identify the indispensable norms for the… ▽ More

    Submitted 11 March, 2017; originally announced March 2017.

    Comments: 15 pages (incl. supplementary materials), 6 figures, 7 table

    Journal ref: Scientific Reports 7, 44146 (2017)

  34. arXiv:1701.06153  [pdf

    physics.soc-ph cs.SI q-bio.PE

    The Evolution of Reputation-Based Cooperation in Regular Networks

    Authors: Tatsuya Sasaki, Hitoshi Yamamoto, Isamu Okada, Satoshi Uchida

    Abstract: Despite recent advances in reputation technologies, it is not clear how reputation systems can affect human cooperation in social networks. Although it is known that two of the major mechanisms in the evolution of cooperation are spatial selection and reputation-based reciprocity, theoretical study of the interplay between both mechanisms remains almost uncharted. Here, we present a new individual… ▽ More

    Submitted 22 January, 2017; originally announced January 2017.

    Comments: 15 pages, 6 figures, and 1 table

    Journal ref: Games 2017, 8(1), 8 (published 21 January 2017)

  35. arXiv:1605.02166  [pdf

    q-bio.PE cs.SI nlin.AO physics.soc-ph

    The evolution of conditional moral assessment in indirect reciprocity

    Authors: Tatsuya Sasaki, Isamu Okada, Yutaka Nakai

    Abstract: Indirect reciprocity is a major mechanism in the maintenance of cooperation among unrelated individuals. Indirect reciprocity leads to conditional cooperation according to social norms that discriminate the good (those who deserve to be rewarded with help) and the bad (those who should be punished by refusal of help). Despite intensive research, however, there is no definitive consensus on what so… ▽ More

    Submitted 4 February, 2017; v1 submitted 7 May, 2016; originally announced May 2016.

    Comments: 27 pages, 2 figures and 2 tables

    Journal ref: Scientific Reports 7, 41870 (2017)

  36. arXiv:1605.01944  [pdf, ps, other

    cs.NI

    SDNsec: Forwarding Accountability for the SDN Data Plane

    Authors: Takayuki Sasaki, Christos Pappas, Taeho Lee, Torsten Hoefler, Adrian Perrig

    Abstract: SDN promises to make networks more flexible, programmable, and easier to manage. Inherent security problems in SDN today, however, pose a threat to the promised benefits. First, the network operator lacks tools to proactively ensure that policies will be followed or to reactively inspect the behavior of the network. Second, the distributed nature of state updates at the data plane leads to inconsi… ▽ More

    Submitted 15 May, 2016; v1 submitted 6 May, 2016; originally announced May 2016.

    Comments: 14 pages

  37. arXiv:1511.06353  [pdf, ps, other

    q-bio.PE cs.GT physics.soc-ph

    Evolution of public cooperation in a monitored society with implicated punishment and within-group enforcement

    Authors: Xiaojie Chen, Tatsuya Sasaki, Matjaz Perc

    Abstract: Monitoring with implicated punishment is common in human societies to avert freeriding on common goods. But is it effective in promoting public cooperation? We show that the introduction of monitoring and implicated punishment is indeed effective, as it transforms the public goods game to a coordination game, thus rendering cooperation viable in infinite and finite well-mixed populations. We also… ▽ More

    Submitted 19 November, 2015; originally announced November 2015.

    Comments: 9 two-column pages, 5 figures; accepted for publication in Scientific Reports

    Journal ref: Sci. Rep. 5 (2015) 17050

  38. arXiv:1503.02905  [pdf

    physics.soc-ph cs.GT nlin.AO q-bio.PE

    Voluntary rewards mediate the evolution of pool punishment for maintaining public goods in large populations

    Authors: Tatsuya Sasaki, Satoshi Uchida, Xiaojie Chen

    Abstract: Punishment is a popular tool when governing commons in situations where free riders would otherwise take over. It is well known that sanctioning systems, such as the police and courts, are costly and thus can suffer from those who free ride on other's efforts to maintain the sanctioning systems (second-order free riders). Previous game-theory studies showed that if populations are very large, pool… ▽ More

    Submitted 10 March, 2015; originally announced March 2015.

    Comments: 20 pages, 4 figures, supplementary information (10 pages, 8 figures)

    Journal ref: Scientific Reports 5, Article number: 8917 (published 10 March 2015)

  39. arXiv:1502.03779  [pdf, ps, other

    physics.soc-ph cs.GT math.DS nlin.AO q-bio.PE

    Unchecked strategy diversification and collapse in continuous voluntary public good games

    Authors: Tatsuya Sasaki, Åke Brännström, Isamu Okada, Tatsuo Unemi

    Abstract: Cooperation or defection and participation or withdrawal are well-known options of behavior in game-like activities in free societies, yet the co-evolutionary dynamics of these behavioral traits in the individual level are not well understood. Here we investigate the continuous voluntary public good game, in which individuals have two types of continuous-valued options: a probability of joining th… ▽ More

    Submitted 12 February, 2015; originally announced February 2015.

    Comments: 30 pages and 7 figures

  40. arXiv:1310.5520  [pdf

    physics.soc-ph cs.GT nlin.AO q-bio.PE

    Rewards and the evolution of cooperation in public good games

    Authors: Tatsuya Sasaki, Satoshi Uchida

    Abstract: Properly coordinating cooperation is relevant for resolving public good problems such as clean energy and environmental protection. However, little is known about how individuals can coordinate themselves for a certain level of cooperation in large populations of strangers. In a typical situation, a consensus-building process hardly succeeds due to lack of face and standing. The evolution of coope… ▽ More

    Submitted 23 April, 2016; v1 submitted 21 October, 2013; originally announced October 2013.

    Comments: 9 pages, 2 figures

    Journal ref: Biology Letters, 2014, 10(1), 20130903

  41. arXiv:1308.3025  [pdf, ps, other

    physics.soc-ph cs.SI q-bio.PE

    Effect of assessment error and private information on stern-judging in indirect reciprocity

    Authors: Satoshi Uchida, Tatsuya Sasaki

    Abstract: Stern-judging is one of the best-known assessment rules in indirect reciprocity. Indirect reciprocity is a fundamental mechanism for the evolution of cooperation. It relies on mutual monitoring and assessments, i.e., individuals judge, following their own assessment rules, whether other individuals are "good" or "bad" according to information on their past behaviors. Among many assessment rules, s… ▽ More

    Submitted 14 August, 2013; originally announced August 2013.

    Comments: 18 pages and 2 figures

    Journal ref: Chaos, Solitons & Fractals, 56,175-180 (2013)

  42. arXiv:1211.2838  [pdf

    physics.soc-ph cs.SI nlin.AO q-bio.PE

    The evolution of cooperation by social exclusion

    Authors: Tatsuya Sasaki, Satoshi Uchida

    Abstract: The exclusion of freeriders from common privileges or public acceptance is widely found in the real world. Current models on the evolution of cooperation with incentives mostly assume peer sanctioning, whereby a punisher imposes penalties on freeriders at a cost to itself. It is well known that such costly punishment has two substantial difficulties. First, a rare punishing cooperator barely subve… ▽ More

    Submitted 6 December, 2012; v1 submitted 12 November, 2012; originally announced November 2012.

    Comments: 28 pages, 3 figures, supplementary material (materials and methods, and 6 supplementary figures)

    Journal ref: Proc. R. Soc. B. 2013 280 20122498

  43. arXiv:1205.4667  [pdf

    hep-ex cs.DL

    Status Report of the DPHEP Study Group: Towards a Global Effort for Sustainable Data Preservation in High Energy Physics

    Authors: Z. Akopov, Silvia Amerio, David Asner, Eduard Avetisyan, Olof Barring, James Beacham, Matthew Bellis, Gregorio Bernardi, Siegfried Bethke, Amber Boehnlein, Travis Brooks, Thomas Browder, Rene Brun, Concetta Cartaro, Marco Cattaneo, Gang Chen, David Corney, Kyle Cranmer, Ray Culbertson, Sunje Dallmeier-Tiessen, Dmitri Denisov, Cristinel Diaconu, Vitaliy Dodonov, Tony Doyle, Gregory Dubois-Felsmann , et al. (65 additional authors not shown)

    Abstract: Data from high-energy physics (HEP) experiments are collected with significant financial and human effort and are mostly unique. An inter-experimental study group on HEP data preservation and long-term analysis was convened as a panel of the International Committee for Future Accelerators (ICFA). The group was formed by large collider-based experiments and investigated the technical and organisati… ▽ More

    Submitted 21 May, 2012; originally announced May 2012.

    Report number: DPHEP-2012-001

  44. arXiv:cs/0306051  [pdf, ps, other

    cs.DC

    A data Grid testbed environment in Gigabit WAN with HPSS

    Authors: Atsushi Manabe, Kohki Ishikawa, Yoshihiko Itoh, Setsuya Kawabata, Tetsuro Mashimo, Youhei Morita, Hiroshi Sakamoto, Takashi Sasaki, Hiroyuki Sato, Junichi Tanaka, Ikuo Ueda, Yoshiyuki Watase, Satomi Yamamoto, Shigeo Yashiro

    Abstract: For data analysis of large-scale experiments such as LHC Atlas and other Japanese high energy and nuclear physics projects, we have constructed a Grid test bed at ICEPP and KEK. These institutes are connected to national scientific gigabit network backbone called SuperSINET. In our test bed, we have installed NorduGrid middleware based on Globus, and connected 120TB HPSS at KEK as a large scale… ▽ More

    Submitted 3 September, 2003; v1 submitted 12 June, 2003; originally announced June 2003.

    Comments: Talk from the 2003 Computing in High Energy and Nuclear Physics (CHEP03), La Jolla, Ca, USA, March 2003, 5 pages, LaTeX, 9 figures, PSN THCT002

    ACM Class: C.2.4; J.2; H.3.4