Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IBISML |
2015-11-27 14:00 |
Ibaraki |
Epochal Tsukuba |
[Poster Presentation]
Secure Approximation Guarantee for Private Empirical Risk Minimization with Homomorphic Encryption Toshiyuki Takada, Hiroyuki Hanada (NIT), Jun Sakuma (Univ.Tsukuba), Ichiro takeuchi (NIT) IBISML2015-86 |
Privacy concern has been increasingly important in many machine learning problems. In this paper, we study empirical ris... [more] |
IBISML2015-86 pp.249-256 |
SIS |
2015-06-08 15:55 |
Nagasaki |
Arkas SASEBO |
Weight Optimization for Image Integration and Restoration Ryo Matsuoka (Univ of Kitakyushu), Tomohiro Yamauchi (QBS), Tatsuya Baba, Masahiro Okuda (Univ of Kitakyushu) SIS2015-7 |
To restore an image degraded by sensor noise or quantization error, multiple image integration is an effective and power... [more] |
SIS2015-7 pp.35-38 |
IBISML |
2015-03-06 15:45 |
Kyoto |
Kyoto University |
Model selection with approximate validation error guarantee for (L^2_2) regularized convex loss minimization problems Atsushi Shibagaki, Yoshiki Suzuki, Ichiro Takeuchi (NIT) IBISML2014-96 |
In this paper we propose a new algorithm that can select an approximately optimal regularization parameter in a class of... [more] |
IBISML2014-96 pp.79-86 |
IBISML |
2014-11-17 17:00 |
Aichi |
Nagoya Univ. |
[Poster Presentation]
Efficient leave-one-out cross-validation for L2-regularized classifier Shota Okumura, Yoshiki Suzuki, Kohei Ogawa, Yuki Shinmura, Ichiro Takeuchi (NIT) IBISML2014-44 |
Leave-one-out cross-validation (LOOCV) is a useful tool
for estimating generalization performances of
various machine ... [more] |
IBISML2014-44 pp.73-80 |
RCC, ASN, NS, RCS, SR (Joint) |
2014-07-30 17:00 |
Kyoto |
Kyoto Terrsa |
On numerical computation of sparse optimal control Takuya Ikeda, Masaaki Nagahara (Kyoto Univ.) RCC2014-25 |
In this article, we consider sparse optimal control with L2 regularization for the states. Under the normality assumptio... [more] |
RCC2014-25 pp.19-22 |
PRMU, CNR |
2014-02-14 10:40 |
Fukuoka |
|
[Special Talk]
Convex Optimization for Applications to Image Analysis and Processing
-- With a focus on effective utilization of the nuclear norm -- Shunsuke Ono, Masao Yamagishi, Isao Yamada (Tokyo Inst. of Tech.) PRMU2013-158 CNR2013-66 |
Remarkable advances in convex optimization have enabled us to handle large-scale (constrained) convex optimization probl... [more] |
PRMU2013-158 CNR2013-66 p.147 |
IBISML |
2013-11-12 15:45 |
Tokyo |
Tokyo Institute of Technology, Kuramae-Kaikan |
[Poster Presentation]
Non-Convex Optimization of Robust Support Vector Regression by Utilizing Parametric Programming Shinya Suzumura, Ichiro Takeuchi (Nagoya Inst. of Tech.), Masashi Sugiyama (Tokyo Inst. of Tech.) IBISML2013-45 |
In this paper, we propose a novel optimization method for robust support vector regression(SVR) that has robustness to o... [more] |
IBISML2013-45 pp.69-75 |
PRMU, IBISML, IPSJ-CVIM [detail] |
2013-09-02 09:30 |
Tottori |
|
Optimization for Robust Support Vector Machine Utilizing Homotopy Approach Shinya Suzumura, Kohei Ogawa, Ichiro Takeuchi (Nagoya Inst. of Tech.), Masashi Sugiyama (Tokyo Inst. of Tech.) PRMU2013-36 IBISML2013-16 |
In this paper, we propose a novel optimization method for robust SVM that has robustness to outliers. In robust SVM, it ... [more] |
PRMU2013-36 IBISML2013-16 pp.19-24 |
SP, EA, SIP |
2013-05-17 16:50 |
Okayama |
|
Blockwise Low-Rank Prior for Cartoon-Texture Image Decomposition Shunsuke Ono, Isao Yamada (Tokyo Inst. of Tech.) EA2013-28 SIP2013-28 SP2013-28 |
We develop a cartoon-texture decomposition model with a novel texture characterization for image analysis and restoratio... [more] |
EA2013-28 SIP2013-28 SP2013-28 pp.163-168 |
SP, EA, SIP |
2013-05-17 17:15 |
Okayama |
|
Detecting Reflection from Single Image Based on Nuclear Norm Minimization Katsuhiro Toyokawa, Shunsuke Ono, Masao Yamagishi, Isao Yamada (Tokyo Inst. of Tech.) EA2013-29 SIP2013-29 SP2013-29 |
We propose a reflection detection method, namely, a method to extract edges of reflection, from a single image using a c... [more] |
EA2013-29 SIP2013-29 SP2013-29 pp.169-173 |
RCS |
2013-04-19 09:55 |
Okinawa |
Ishigaki City Hall |
A Distributed Cooperative MIMO Secondary Transceivers Design for Overlay Cognitive Radio Systems Bassant Abdelhamid, Osamu Muta (Kyushu Univ.), Maha Elsabrouty (EJUST Univ.), Masoud Alghoniemy (Alexandria Univ.), Salwa Elramly (Ain Shams Univ.), Hiroshi Furukawa (Kyushu Univ.) RCS2013-14 |
Overlay cognitive radio system permits an unlicensed, secondary, user (SU) to transmit own data simultaneously with the ... [more] |
RCS2013-14 pp.75-80 |
SIP, CAS, CS |
2013-03-14 12:00 |
Yamagata |
Keio Univ. Tsuruoka Campus (Yamagata) |
SUPERVISED NMF AS A SPARSE OPTIMIZATION PROBLEM Yu Morikawa, Masahiro Yukawa (Niigata Univ.) CAS2012-114 SIP2012-145 CS2012-120 |
In this paper, we propose a novel scheme to supervised nonnegative
matrix factorization (NMF). We formulate the supervi... [more] |
CAS2012-114 SIP2012-145 CS2012-120 pp.105-109 |
SIP, CAS, CS |
2013-03-15 11:35 |
Yamagata |
Keio Univ. Tsuruoka Campus (Yamagata) |
Joint Optimization Design for Multiple Underlay MIMO CognitiveTransceiver with Channel Uncertainty Bassant Abdelhamid (Kyushu Univ.), Maha Elsabrouty (EJUST Univ.), Masoud Alghoniemy (Univ. of Alexandria), Salwa Elramly (Ain Shams Univ.), Osamu Muta, Hiroshi Furukawa (Kyushu Univ.) CAS2012-137 SIP2012-168 CS2012-143 |
Underlay cognitive Radio (CR) permits an unlicensed secondary users to transmit over the licensed spectrum unless the in... [more] |
CAS2012-137 SIP2012-168 CS2012-143 pp.235-240 |
SIP, RCS |
2013-02-01 15:40 |
Hiroshima |
Viewport-Kure-Hotel (Kure) |
Joint Optimization Design for Underlay Cognitive Transceiver with Channel Uncertainty Bassant Abdelhamid (Kyushu Univ.), Maha Elsabrouty (EJUST Univ.), Masoud Alghoniemy (Univ. of Alexandria/EJUST Univ.), Salwa Elramly (Ain Shams Univ.), Osamu Muta, Hiroshi Furukawa (Kyushu Univ.) SIP2012-111 RCS2012-268 |
Underlay cognitive radio allows simultaneous primary and secondary
transmissions over the same band given that the sec... [more] |
SIP2012-111 RCS2012-268 pp.177-182 |
IBISML |
2012-11-08 15:00 |
Tokyo |
Bunkyo School Building, Tokyo Campus, Tsukuba Univ. |
Multi-Instance SVM using Parametric Programming Naoki Ishihara, Saori Kurumi, Ichiro Takeuchi (NIT) IBISML2012-72 |
In this paper, we propose a new optimization algorithm for multiple instance learning (MIL). MIL is a supervised learnin... [more] |
IBISML2012-72 pp.271-276 |
CAS, CS, SIP |
2012-03-08 10:05 |
Niigata |
The University of Niigata |
A Visually Better Recovered Image Selection for Imaging Inverse Problems Shunsuke Ono, Takamichi Miyata, Isao Yamada (Tokyo Inst. of Tech.) CAS2011-108 SIP2011-128 CS2011-100 |
In the last decade, many image recovery problems have been formulated as a certain nonsmooth convex minimization problem... [more] |
CAS2011-108 SIP2011-128 CS2011-100 pp.7-12 |
CAS, CS, SIP |
2012-03-08 14:10 |
Niigata |
The University of Niigata |
Three variants of alternating direction method of multipliers without certain inner iterations and their application to image super-resolution via sparse representation Masao Yamagishi, Shunsuke Ono, Isao Yamada (Tokyo Inst. of Tech.) CAS2011-115 SIP2011-135 CS2011-107 |
We propose three variants of Alternating Direction Method of Multipliers (ADMM) employing simplified updates under addit... [more] |
CAS2011-115 SIP2011-135 CS2011-107 pp.49-54 |
NS |
2012-01-27 13:40 |
Okinawa |
Ryukyu University |
Resource Allocation based on Robustness for Physical Networks with Virtualization Technology Mika Mori (NAIST), Takuji Tachibana (Univ. of Fukui), Kentaro Hirata, Kenji Sugimoto (NAIST) NS2011-169 |
In this paper, we propose a resource allocation method for virtualization technology so that robustness of physical netw... [more] |
NS2011-169 pp.139-144 |
RCS, SIP |
2012-01-27 13:55 |
Fukuoka |
Fukuoka Univ. |
OPTIMIZATION OF INTERFERENCE SIGNALS TO AN EAVESDROPPER WITH MULTIPLE ANTENNAS Shuiqiang Yan, Shuichi Ohno (Hiroshima Univ.), Yuji Wakasa (Yamaguchi Univ.) SIP2011-110 RCS2011-299 |
Wireless communications are susceptible to eavesdropping. To interfere the eavesdropper having multiple antennas,secret ... [more] |
SIP2011-110 RCS2011-299 pp.183-186 |
IBISML |
2011-11-10 15:45 |
Nara |
Nara Womens Univ. |
A convex formulations of learning from crowds Hiroshi Kajino, Hisashi Kashima (UT) IBISML2011-76 |
It has attracted considerable attention to use crowdsourcing services
to collect a large amount of labeled data for ma... [more] |
IBISML2011-76 pp.231-236 |