-
Evolution of Natural Language Processing Technology: Not Just Language Processing Towards General Purpose AI
Authors:
Masahiro Yamamoto
Abstract:
Since the invention of computers, communication through natural language (actual human language) has been a dream technology. However, natural language is extremely difficult to mathematically formulate, making it difficult to realize as an algorithm without considering programming. While there have been numerous technological developments, one cannot say that any results allowing free utilization…
▽ More
Since the invention of computers, communication through natural language (actual human language) has been a dream technology. However, natural language is extremely difficult to mathematically formulate, making it difficult to realize as an algorithm without considering programming. While there have been numerous technological developments, one cannot say that any results allowing free utilization have been achieved thus far. In the case of language learning in humans, for instance when learning one's mother tongue or foreign language, one must admit that this process is similar to the adage "practice makes perfect" in principle, even though the learning method is significant up to a point. Deep learning has played a central role in contemporary AI technology in recent years. When applied to natural language processing (NLP), this produced unprecedented results. Achievements exceeding the initial predictions have been reported from the results of learning vast amounts of textual data using deep learning. For instance, four arithmetic operations could be performed without explicit learning, thereby enabling the explanation of complex images and the generation of images from corresponding explanatory texts. It is an accurate example of the learner embodying the concept of "practice makes perfect" by using vast amounts of textual data. This report provides a technological explanation of how cutting-edge NLP has made it possible to realize the "practice makes perfect" principle. Additionally, examples of how this can be applied to business are provided. We reported in June 2022 in Japanese on the NLP movement from late 2021 to early 2022. We would like to summarize this as a memorandum since this is just the initial movement leading to the current large language models (LLMs).
△ Less
Submitted 9 October, 2023;
originally announced October 2023.
-
Description and Discussion on DCASE 2022 Challenge Task 2: Unsupervised Anomalous Sound Detection for Machine Condition Monitoring Applying Domain Generalization Techniques
Authors:
Kota Dohi,
Keisuke Imoto,
Noboru Harada,
Daisuke Niizumi,
Yuma Koizumi,
Tomoya Nishida,
Harsh Purohit,
Takashi Endo,
Masaaki Yamamoto,
Yohei Kawaguchi
Abstract:
We present the task description and discussion on the results of the DCASE 2022 Challenge Task 2: ``Unsupervised anomalous sound detection (ASD) for machine condition monitoring applying domain generalization techniques''. Domain shifts are a critical problem for the application of ASD systems. Because domain shifts can change the acoustic characteristics of data, a model trained in a source domai…
▽ More
We present the task description and discussion on the results of the DCASE 2022 Challenge Task 2: ``Unsupervised anomalous sound detection (ASD) for machine condition monitoring applying domain generalization techniques''. Domain shifts are a critical problem for the application of ASD systems. Because domain shifts can change the acoustic characteristics of data, a model trained in a source domain performs poorly for a target domain. In DCASE 2021 Challenge Task 2, we organized an ASD task for handling domain shifts. In this task, it was assumed that the occurrences of domain shifts are known. However, in practice, the domain of each sample may not be given, and the domain shifts can occur implicitly. In 2022 Task 2, we focus on domain generalization techniques that detects anomalies regardless of the domain shifts. Specifically, the domain of each sample is not given in the test data and only one threshold is allowed for all domains. Analysis of 81 submissions from 31 teams revealed two remarkable types of domain generalization techniques: 1) domain-mixing-based approach that obtains generalized representations and 2) domain-classification-based approach that explicitly or implicitly classifies different domains to improve detection performance for each domain.
△ Less
Submitted 21 November, 2022; v1 submitted 12 June, 2022;
originally announced June 2022.
-
Hierarchical Conditional Variational Autoencoder Based Acoustic Anomaly Detection
Authors:
Harsh Purohit,
Takashi Endo,
Masaaki Yamamoto,
Yohei Kawaguchi
Abstract:
This paper aims to develop an acoustic signal-based unsupervised anomaly detection method for automatic machine monitoring. Existing approaches such as deep autoencoder (DAE), variational autoencoder (VAE), conditional variational autoencoder (CVAE) etc. have limited representation capabilities in the latent space and, hence, poor anomaly detection performance. Different models have to be trained…
▽ More
This paper aims to develop an acoustic signal-based unsupervised anomaly detection method for automatic machine monitoring. Existing approaches such as deep autoencoder (DAE), variational autoencoder (VAE), conditional variational autoencoder (CVAE) etc. have limited representation capabilities in the latent space and, hence, poor anomaly detection performance. Different models have to be trained for each different kind of machines to accurately perform the anomaly detection task. To solve this issue, we propose a new method named as hierarchical conditional variational autoencoder (HCVAE). This method utilizes available taxonomic hierarchical knowledge about industrial facility to refine the latent space representation. This knowledge helps model to improve the anomaly detection performance as well. We demonstrated the generalization capability of a single HCVAE model for different types of machines by using appropriate conditions. Additionally, to show the practicability of the proposed approach, (i) we evaluated HCVAE model on different domain and (ii) we checked the effect of partial hierarchical knowledge. Our results show that HCVAE method validates both of these points, and it outperforms the baseline system on anomaly detection task by utmost 15 % on the AUC score metric.
△ Less
Submitted 11 June, 2022;
originally announced June 2022.
-
MIMII DG: Sound Dataset for Malfunctioning Industrial Machine Investigation and Inspection for Domain Generalization Task
Authors:
Kota Dohi,
Tomoya Nishida,
Harsh Purohit,
Ryo Tanabe,
Takashi Endo,
Masaaki Yamamoto,
Yuki Nikaido,
Yohei Kawaguchi
Abstract:
We present a machine sound dataset to benchmark domain generalization techniques for anomalous sound detection (ASD). Domain shifts are differences in data distributions that can degrade the detection performance, and handling them is a major issue for the application of ASD systems. While currently available datasets for ASD tasks assume that occurrences of domain shifts are known, in practice, t…
▽ More
We present a machine sound dataset to benchmark domain generalization techniques for anomalous sound detection (ASD). Domain shifts are differences in data distributions that can degrade the detection performance, and handling them is a major issue for the application of ASD systems. While currently available datasets for ASD tasks assume that occurrences of domain shifts are known, in practice, they can be difficult to detect. To handle such domain shifts, domain generalization techniques that perform well regardless of the domains should be investigated. In this paper, we present the first ASD dataset for the domain generalization techniques, called MIMII DG. The dataset consists of five machine types and three domain shift scenarios for each machine type. The dataset is dedicated to the domain generalization task with features such as multiple different values for parameters that cause domain shifts and introduction of domain shifts that can be difficult to detect, such as shifts in the background noise. Experimental results using two baseline systems indicate that the dataset reproduces domain shift scenarios and is useful for benchmarking domain generalization techniques.
△ Less
Submitted 21 November, 2022; v1 submitted 27 May, 2022;
originally announced May 2022.
-
Anomalous Sound Detection Based on Machine Activity Detection
Authors:
Tomoya Nishida,
Kota Dohi,
Takashi Endo,
Masaaki Yamamoto,
Yohei Kawaguchi
Abstract:
We have developed an unsupervised anomalous sound detection method for machine condition monitoring that utilizes an auxiliary task -- detecting when the target machine is active. First, we train a model that detects machine activity by using normal data with machine activity labels and then use the activity-detection error as the anomaly score for a given sound clip if we have access to the groun…
▽ More
We have developed an unsupervised anomalous sound detection method for machine condition monitoring that utilizes an auxiliary task -- detecting when the target machine is active. First, we train a model that detects machine activity by using normal data with machine activity labels and then use the activity-detection error as the anomaly score for a given sound clip if we have access to the ground-truth activity labels in the inference phase. If these labels are not available, the anomaly score is calculated through outlier detection on the embedding vectors obtained by the activity-detection model. Solving this auxiliary task enables the model to learn the difference between the target machine sounds and similar background noise, which makes it possible to identify small deviations in the target sounds. Experimental results showed that the proposed method improves the anomaly-detection performance of the conventional method complementarily by means of an ensemble.
△ Less
Submitted 15 April, 2022;
originally announced April 2022.
-
Environmental Sound Extraction Using Onomatopoeic Words
Authors:
Yuki Okamoto,
Shota Horiguchi,
Masaaki Yamamoto,
Keisuke Imoto,
Yohei Kawaguchi
Abstract:
An onomatopoeic word, which is a character sequence that phonetically imitates a sound, is effective in expressing characteristics of sound such as duration, pitch, and timbre. We propose an environmental-sound-extraction method using onomatopoeic words to specify the target sound to be extracted. By this method, we estimate a time-frequency mask from an input mixture spectrogram and an onomatopoe…
▽ More
An onomatopoeic word, which is a character sequence that phonetically imitates a sound, is effective in expressing characteristics of sound such as duration, pitch, and timbre. We propose an environmental-sound-extraction method using onomatopoeic words to specify the target sound to be extracted. By this method, we estimate a time-frequency mask from an input mixture spectrogram and an onomatopoeic word using a U-Net architecture, then extract the corresponding target sound by masking the spectrogram. Experimental results indicate that the proposed method can extract only the target sound corresponding to the onomatopoeic word and performs better than conventional methods that use sound-event classes to specify the target sound.
△ Less
Submitted 16 February, 2022; v1 submitted 30 November, 2021;
originally announced December 2021.
-
Motion Planning of a Spin-Rolling Sphere on a Plane
Authors:
Seyed Amir Tafrishi,
Mikhail Svinin,
Motoji Yamamoto,
Yasuhisa Hirata
Abstract:
The paper deals with motion planning for a spin-rolling sphere when the sphere follows a straight path on a plane. Since the motion of the sphere is constrained by the straight line, the control of the sphere's spin motion is essential to converge to a desired configuration of the sphere. In this paper, we show a new geometric-based planning approach that is based on a full-state description of th…
▽ More
The paper deals with motion planning for a spin-rolling sphere when the sphere follows a straight path on a plane. Since the motion of the sphere is constrained by the straight line, the control of the sphere's spin motion is essential to converge to a desired configuration of the sphere. In this paper, we show a new geometric-based planning approach that is based on a full-state description of this nonlinear system. First, the problem statement of the motion planning is posed. Next, we develop a geometric controller implemented as a virtual surface by using the Darboux frame kinematics. This virtual surface generates arc-length-based inputs for controlling the trajectories of the sphere. Then, an iterative algorithm is designed to tune these inputs for the desired configurations. The feasibility of the proposed approach is verified by simulations.
△ Less
Submitted 16 November, 2021; v1 submitted 24 October, 2021;
originally announced October 2021.
-
Darboux-Frame-Based Parametrization for a Spin-Rolling Sphere on a Plane: A Nonlinear Transformation of Underactuated System to Fully-Actuated Model
Authors:
Seyed Amir Tafrishi,
Mikhail Svinin,
Motoji Yamamoto
Abstract:
This paper presents a new kinematic model based on the Darboux frame for motion control and planning. In this work, we show that an underactuated model of a spin-rolling sphere on a plane with five states and three inputs can be transformed into a fully-actuated one by a given Darboux frame transformation. This nonlinear state transformation establishes a geometric model that is different from con…
▽ More
This paper presents a new kinematic model based on the Darboux frame for motion control and planning. In this work, we show that an underactuated model of a spin-rolling sphere on a plane with five states and three inputs can be transformed into a fully-actuated one by a given Darboux frame transformation. This nonlinear state transformation establishes a geometric model that is different from conventional state-space ones. First, a kinematic model of the Darboux frame at the contact point of the rolling sphere is established. Next, we propose a virtual surface that is trapped between the sphere and the contact plane. This virtual surface is used for generating arc-length-based inputs for controlling the contact trajectories on the sphere and the plane. Finally, we discuss the controllability of this new model. In the future, we will design a geometric path planning method for the proposed kinematic model.
△ Less
Submitted 12 June, 2021; v1 submitted 15 February, 2021;
originally announced February 2021.
-
Causal Discovery with Multi-Domain LiNGAM for Latent Factors
Authors:
Yan Zeng,
Shohei Shimizu,
Ruichu Cai,
Feng Xie,
Michio Yamamoto,
Zhifeng Hao
Abstract:
Discovering causal structures among latent factors from observed data is a particularly challenging problem. Despite some efforts for this problem, existing methods focus on the single-domain data only. In this paper, we propose Multi-Domain Linear Non-Gaussian Acyclic Models for Latent Factors (MD-LiNA), where the causal structure among latent factors of interest is shared for all domains, and we…
▽ More
Discovering causal structures among latent factors from observed data is a particularly challenging problem. Despite some efforts for this problem, existing methods focus on the single-domain data only. In this paper, we propose Multi-Domain Linear Non-Gaussian Acyclic Models for Latent Factors (MD-LiNA), where the causal structure among latent factors of interest is shared for all domains, and we provide its identification results. The model enriches the causal representation for multi-domain data. We propose an integrated two-phase algorithm to estimate the model. In particular, we first locate the latent factors and estimate the factor loading matrix. Then to uncover the causal structure among shared latent factors of interest, we derive a score function based on the characterization of independence relations between external influences and the dependence relations between multi-domain latent factors and latent factors of interest. We show that the proposed method provides locally consistent estimators. Experimental results on both synthetic and real-world data demonstrate the efficacy and robustness of our approach.
△ Less
Submitted 22 April, 2022; v1 submitted 19 September, 2020;
originally announced September 2020.
-
Singularity-Free Inverse Dynamics for Underactuated Systems with a Rotating Mass
Authors:
Seyed Amir Tafrishi,
Mikhail Svinin,
Motoji Yamamoto
Abstract:
Motion control of underactuated systems through the inverse dynamics contains configuration singularities. These limitations in configuration space mainly stem from the inertial coupling that passive joints/bodies create. In this study, we present a model that is free from singularity while the trajectory of the rotating mass has a small-amplitude sine wave around its circle. First, we derive the…
▽ More
Motion control of underactuated systems through the inverse dynamics contains configuration singularities. These limitations in configuration space mainly stem from the inertial coupling that passive joints/bodies create. In this study, we present a model that is free from singularity while the trajectory of the rotating mass has a small-amplitude sine wave around its circle. First, we derive the modified non-linear dynamics for a rolling system. Also, the singularity regions for this underactuated system is demonstrated. Then, the wave parameters are designed under certain conditions to remove the coupling singularities. We obtain these conditions from the positive definiteness of the inertia matrix in the inverse dynamics. Finally, the simulation results are confirmed by using a prescribed Beta function on the specified states of the rolling carrier. Because our algebraic method is integrated into the non-linear dynamics, the proposed solution has a great potential to be extended to the Lagrangian mechanics with multiple degrees-of-freedom.
△ Less
Submitted 15 May, 2020; v1 submitted 24 January, 2020;
originally announced January 2020.
-
Translation of Patent Sentences with a Large Vocabulary of Technical Terms Using Neural Machine Translation
Authors:
Zi Long,
Takehito Utsuro,
Tomoharu Mitsuhashi,
Mikio Yamamoto
Abstract:
Neural machine translation (NMT), a new approach to machine translation, has achieved promising results comparable to those of traditional approaches such as statistical machine translation (SMT). Despite its recent success, NMT cannot handle a larger vocabulary because training complexity and decoding complexity proportionally increase with the number of target words. This problem becomes even mo…
▽ More
Neural machine translation (NMT), a new approach to machine translation, has achieved promising results comparable to those of traditional approaches such as statistical machine translation (SMT). Despite its recent success, NMT cannot handle a larger vocabulary because training complexity and decoding complexity proportionally increase with the number of target words. This problem becomes even more serious when translating patent documents, which contain many technical terms that are observed infrequently. In NMTs, words that are out of vocabulary are represented by a single unknown token. In this paper, we propose a method that enables NMT to translate patent sentences comprising a large vocabulary of technical terms. We train an NMT system on bilingual data wherein technical terms are replaced with technical term tokens; this allows it to translate most of the source sentences except technical terms. Further, we use it as a decoder to translate source sentences with technical term tokens and replace the tokens with technical term translations using SMT. We also use it to rerank the 1,000-best SMT translations on the basis of the average of the SMT score and that of the NMT rescoring of the translated sentences with technical term tokens. Our experiments on Japanese-Chinese patent sentences show that the proposed NMT system achieves a substantial improvement of up to 3.1 BLEU points and 2.3 RIBES points over traditional SMT systems and an improvement of approximately 0.6 BLEU points and 0.8 RIBES points over an equivalent NMT system without our proposed technique.
△ Less
Submitted 14 April, 2017;
originally announced April 2017.
-
Neural Machine Translation Model with a Large Vocabulary Selected by Branching Entropy
Authors:
Zi Long,
Ryuichiro Kimura,
Takehito Utsuro,
Tomoharu Mitsuhashi,
Mikio Yamamoto
Abstract:
Neural machine translation (NMT), a new approach to machine translation, has achieved promising results comparable to those of traditional approaches such as statistical machine translation (SMT). Despite its recent success, NMT cannot handle a larger vocabulary because the training complexity and decoding complexity proportionally increase with the number of target words. This problem becomes eve…
▽ More
Neural machine translation (NMT), a new approach to machine translation, has achieved promising results comparable to those of traditional approaches such as statistical machine translation (SMT). Despite its recent success, NMT cannot handle a larger vocabulary because the training complexity and decoding complexity proportionally increase with the number of target words. This problem becomes even more serious when translating patent documents, which contain many technical terms that are observed infrequently. In this paper, we propose to select phrases that contain out-of-vocabulary words using the statistical approach of branching entropy. This allows the proposed NMT system to be applied to a translation task of any language pair without any language-specific knowledge about technical term identification. The selected phrases are then replaced with tokens during training and post-translated by the phrase translation table of SMT. Evaluation on Japanese-to-Chinese, Chinese-to-Japanese, Japanese-to-English and English-to-Japanese patent sentence translation proved the effectiveness of phrases selected with branching entropy, where the proposed NMT model achieves a substantial improvement over a baseline NMT model without our proposed technique. Moreover, the number of translation errors of under-translation by the baseline NMT model without our proposed technique reduces to around half by the proposed NMT model.
△ Less
Submitted 6 September, 2017; v1 submitted 14 April, 2017;
originally announced April 2017.
-
Compositional Synthesis of Leakage Resilient Programs
Authors:
Arthur Blot,
Masaki Yamamoto,
Tachio Terauchi
Abstract:
A promising approach to defend against side channel attacks is to build programs that are leakage resilient, in a formal sense. One such formal notion of leakage resilience is the n-threshold-probing model proposed in the seminal work by Ishai et al. In a recent work, Eldib and Wang have proposed a method for automatically synthesizing programs that are leakage resilient according to this model, f…
▽ More
A promising approach to defend against side channel attacks is to build programs that are leakage resilient, in a formal sense. One such formal notion of leakage resilience is the n-threshold-probing model proposed in the seminal work by Ishai et al. In a recent work, Eldib and Wang have proposed a method for automatically synthesizing programs that are leakage resilient according to this model, for the case n=1. In this paper, we show that the n-threshold-probing model of leakage resilience enjoys a certain compositionality property that can be exploited for synthesis. We use the property to design a synthesis method that efficiently synthesizes leakage-resilient programs in a compositional manner, for the general case of n > 1. We have implemented a prototype of the synthesis algorithm, and we demonstrate its effectiveness by synthesizing leakage-resilient versions of benchmarks taken from the literature.
△ Less
Submitted 28 October, 2016; v1 submitted 18 October, 2016;
originally announced October 2016.
-
Wikipedia Page View Reflects Web Search Trend
Authors:
Mitsuo Yoshida,
Yuki Arase,
Takaaki Tsunoda,
Mikio Yamamoto
Abstract:
The frequency of a web search keyword generally reflects the degree of public interest in a particular subject matter. Search logs are therefore useful resources for trend analysis. However, access to search logs is typically restricted to search engine providers. In this paper, we investigate whether search frequency can be estimated from a different resource such as Wikipedia page views of open…
▽ More
The frequency of a web search keyword generally reflects the degree of public interest in a particular subject matter. Search logs are therefore useful resources for trend analysis. However, access to search logs is typically restricted to search engine providers. In this paper, we investigate whether search frequency can be estimated from a different resource such as Wikipedia page views of open data. We found frequently searched keywords to have remarkably high correlations with Wikipedia page views. This suggests that Wikipedia page views can be an effective tool for determining popular global web search trends.
△ Less
Submitted 7 September, 2015;
originally announced September 2015.
-
Linear Programming Relaxations for Goldreich's Generators over Non-Binary Alphabets
Authors:
Ryuhei Mori,
Takeshi Koshiba,
Osamu Watanabe,
Masaki Yamamoto
Abstract:
Goldreich suggested candidates of one-way functions and pseudorandom generators included in $\mathsf{NC}^0$. It is known that randomly generated Goldreich's generator using $(r-1)$-wise independent predicates with $n$ input variables and $m=C n^{r/2}$ output variables is not pseudorandom generator with high probability for sufficiently large constant $C$. Most of the previous works assume that the…
▽ More
Goldreich suggested candidates of one-way functions and pseudorandom generators included in $\mathsf{NC}^0$. It is known that randomly generated Goldreich's generator using $(r-1)$-wise independent predicates with $n$ input variables and $m=C n^{r/2}$ output variables is not pseudorandom generator with high probability for sufficiently large constant $C$. Most of the previous works assume that the alphabet is binary and use techniques available only for the binary alphabet. In this paper, we deal with non-binary generalization of Goldreich's generator and derives the tight threshold for linear programming relaxation attack using local marginal polytope for randomly generated Goldreich's generators. We assume that $u(n)\in ω(1)\cap o(n)$ input variables are known. In that case, we show that when $r\ge 3$, there is an exact threshold $μ_\mathrm{c}(k,r):=\binom{k}{r}^{-1}\frac{(r-2)^{r-2}}{r(r-1)^{r-1}}$ such that for $m=μ\frac{n^{r-1}}{u(n)^{r-2}}$, the LP relaxation can determine linearly many input variables of Goldreich's generator if $μ>μ_\mathrm{c}(k,r)$, and that the LP relaxation cannot determine $\frac1{r-2} u(n)$ input variables of Goldreich's generator if $μ<μ_\mathrm{c}(k,r)$. This paper uses characterization of LP solutions by combinatorial structures called stop** sets on a bipartite graph, which is related to a simple algorithm called peeling algorithm.
△ Less
Submitted 2 June, 2014;
originally announced June 2014.
-
A Face-like Structure Detection on Planet and Satellite Surfaces using Image Processing
Authors:
Kazutaka Kurihara,
Masakazu Takasu,
Kazuhiro Sasao,
Hal Seki,
Takayuki Narabu,
Mitsuo Yamamoto,
Satoshi Iida,
Hiroyuki Yamamoto
Abstract:
This paper demonstrates that face-like structures are everywhere, and can be de-tected automatically even with computers. Huge amount of satellite images of the Earth, the Moon, the Mars are explored and many interesting face-like structure are detected. Throughout this fact, we believe that science and technologies can alert people not to easily become an occultist.
This paper demonstrates that face-like structures are everywhere, and can be de-tected automatically even with computers. Huge amount of satellite images of the Earth, the Moon, the Mars are explored and many interesting face-like structure are detected. Throughout this fact, we believe that science and technologies can alert people not to easily become an occultist.
△ Less
Submitted 13 June, 2013;
originally announced June 2013.
-
Derandomizing HSSW Algorithm for 3-SAT
Authors:
Kazuhisa Makino,
Suguru Tamaki,
Masaki Yamamoto
Abstract:
We present a (full) derandomization of HSSW algorithm for 3-SAT, proposed by Hofmeister, Schöning, Schuler, and Watanabe in [STACS'02]. Thereby, we obtain an O(1.3303^n)-time deterministic algorithm for 3-SAT, which is currently fastest.
We present a (full) derandomization of HSSW algorithm for 3-SAT, proposed by Hofmeister, Schöning, Schuler, and Watanabe in [STACS'02]. Thereby, we obtain an O(1.3303^n)-time deterministic algorithm for 3-SAT, which is currently fastest.
△ Less
Submitted 18 February, 2011;
originally announced February 2011.
-
An Improved Exact Algorithm for the Domatic Number Problem
Authors:
Tobias Riege,
Jörg Rothe,
Holger Spakowski,
Masaki Yamamoto
Abstract:
The 3-domatic number problem asks whether a given graph can be partitioned intothree dominating sets. We prove that this problem can be solved by a deterministic algorithm in time 2.695^n (up to polynomial factors). This result improves the previous bound of 2.8805^n, which is due to Fomin, Grandoni, Pyatkin, and Stepanov. To prove our result, we combine an algorithm by Fomin et al. with Yamamot…
▽ More
The 3-domatic number problem asks whether a given graph can be partitioned intothree dominating sets. We prove that this problem can be solved by a deterministic algorithm in time 2.695^n (up to polynomial factors). This result improves the previous bound of 2.8805^n, which is due to Fomin, Grandoni, Pyatkin, and Stepanov. To prove our result, we combine an algorithm by Fomin et al. with Yamamoto's algorithm for the satisfiability problem. In addition, we show that the 3-domatic number problem can be solved for graphs G with bounded maximum degree Delta(G) by a randomized algorithm, whose running time is better than the previous bound due to Riege and Rothe whenever Delta(G) >= 5. Our new randomized algorithm employs Schoening's approach to constraint satisfaction problems.
△ Less
Submitted 16 March, 2006;
originally announced March 2006.