-
Angle-Aware Coverage with Camera Rotational Motion Control
Authors:
Zhiyuan Lu,
Muhammad Hanif,
Takumi Shimizu,
Takeshi Hatanaka
Abstract:
This paper presents a novel control strategy for drone networks to improve the quality of 3D structures reconstructed from aerial images by drones. Unlike the existing coverage control strategies for this purpose, our proposed approach simultaneously controls both the camera orientation and drone translational motion, enabling more comprehensive perspectives and enhancing the map's overall quality…
▽ More
This paper presents a novel control strategy for drone networks to improve the quality of 3D structures reconstructed from aerial images by drones. Unlike the existing coverage control strategies for this purpose, our proposed approach simultaneously controls both the camera orientation and drone translational motion, enabling more comprehensive perspectives and enhancing the map's overall quality. Subsequently, we present a novel problem formulation, including a new performance function to evaluate the drone positions and camera orientations. We then design a QP-based controller with a control barrier-like function for a constraint on the decay rate of the objective function. The present problem formulation poses a new challenge, requiring significantly greater computational efforts than the case involving only translational motion control. We approach this issue technologically, namely by introducing JAX, utilizing just-in-time (JIT) compilation and Graphical Processing Unit (GPU) acceleration. We finally conduct extensive verifications through simulation in ROS (Robot Operating System) and show the real-time feasibility of the controller and the superiority of the present controller to the conventional method.
△ Less
Submitted 22 April, 2024;
originally announced April 2024.
-
OOSTraj: Out-of-Sight Trajectory Prediction With Vision-Positioning Denoising
Authors:
Haichao Zhang,
Yi Xu,
Hongsheng Lu,
Takayuki Shimizu,
Yun Fu
Abstract:
Trajectory prediction is fundamental in computer vision and autonomous driving, particularly for understanding pedestrian behavior and enabling proactive decision-making. Existing approaches in this field often assume precise and complete observational data, neglecting the challenges associated with out-of-view objects and the noise inherent in sensor data due to limited camera range, physical obs…
▽ More
Trajectory prediction is fundamental in computer vision and autonomous driving, particularly for understanding pedestrian behavior and enabling proactive decision-making. Existing approaches in this field often assume precise and complete observational data, neglecting the challenges associated with out-of-view objects and the noise inherent in sensor data due to limited camera range, physical obstructions, and the absence of ground truth for denoised sensor data. Such oversights are critical safety concerns, as they can result in missing essential, non-visible objects. To bridge this gap, we present a novel method for out-of-sight trajectory prediction that leverages a vision-positioning technique. Our approach denoises noisy sensor observations in an unsupervised manner and precisely maps sensor-based trajectories of out-of-sight objects into visual trajectories. This method has demonstrated state-of-the-art performance in out-of-sight noisy sensor trajectory denoising and prediction on the Vi-Fi and JRDB datasets. By enhancing trajectory prediction accuracy and addressing the challenges of out-of-sight objects, our work significantly contributes to improving the safety and reliability of autonomous driving in complex environments. Our work represents the first initiative towards Out-Of-Sight Trajectory prediction (OOSTraj), setting a new benchmark for future research. The code is available at \url{https://github.com/Hai-chao-Zhang/OOSTraj}.
△ Less
Submitted 2 April, 2024;
originally announced April 2024.
-
A Fast Control Plane for a Large-Scale and High-Speed Optical Circuit Switch System
Authors:
Ryousei Takano,
Kiyo Ishii,
Toshiyuki Shimizu,
Fumihiro Okazaki,
Shu Namiki,
Ken-ichi Sato
Abstract:
We experimentally verify a fast control plane with 100 microseconds of configuration time that can support more than 1000 racks, leveraged by a software-defined network controller and an industrial real-time Ethernet standard EtherCAT.
We experimentally verify a fast control plane with 100 microseconds of configuration time that can support more than 1000 racks, leveraged by a software-defined network controller and an industrial real-time Ethernet standard EtherCAT.
△ Less
Submitted 17 January, 2024;
originally announced January 2024.
-
Layout Sequence Prediction From Noisy Mobile Modality
Authors:
Haichao Zhang,
Yi Xu,
Hongsheng Lu,
Takayuki Shimizu,
Yun Fu
Abstract:
Trajectory prediction plays a vital role in understanding pedestrian movement for applications such as autonomous driving and robotics. Current trajectory prediction models depend on long, complete, and accurately observed sequences from visual modalities. Nevertheless, real-world situations often involve obstructed cameras, missed objects, or objects out of sight due to environmental factors, lea…
▽ More
Trajectory prediction plays a vital role in understanding pedestrian movement for applications such as autonomous driving and robotics. Current trajectory prediction models depend on long, complete, and accurately observed sequences from visual modalities. Nevertheless, real-world situations often involve obstructed cameras, missed objects, or objects out of sight due to environmental factors, leading to incomplete or noisy trajectories. To overcome these limitations, we propose LTrajDiff, a novel approach that treats objects obstructed or out of sight as equally important as those with fully visible trajectories. LTrajDiff utilizes sensor data from mobile phones to surmount out-of-sight constraints, albeit introducing new challenges such as modality fusion, noisy data, and the absence of spatial layout and object size information. We employ a denoising diffusion model to predict precise layout sequences from noisy mobile data using a coarse-to-fine diffusion strategy, incorporating the RMS, Siamese Masked Encoding Module, and MFM. Our model predicts layout sequences by implicitly inferring object size and projection status from a single reference timestamp or significantly obstructed sequences. Achieving SOTA results in randomly obstructed experiments and extremely short input experiments, our model illustrates the effectiveness of leveraging noisy mobile data. In summary, our approach offers a promising solution to the challenges faced by layout sequence and trajectory prediction models in real-world settings, paving the way for utilizing sensor data from mobile phones to accurately predict pedestrian bounding box trajectories. To the best of our knowledge, this is the first work that addresses severely obstructed and extremely short layout sequences by combining vision with noisy mobile modality, making it the pioneering work in the field of layout sequence trajectory prediction.
△ Less
Submitted 9 October, 2023;
originally announced October 2023.
-
Diffusion Model in Causal Inference with Unmeasured Confounders
Authors:
Tatsuhiro Shimizu
Abstract:
We study how to extend the use of the diffusion model to answer the causal question from the observational data under the existence of unmeasured confounders. In Pearl's framework of using a Directed Acyclic Graph (DAG) to capture the causal intervention, a Diffusion-based Causal Model (DCM) was proposed incorporating the diffusion model to answer the causal questions more accurately, assuming tha…
▽ More
We study how to extend the use of the diffusion model to answer the causal question from the observational data under the existence of unmeasured confounders. In Pearl's framework of using a Directed Acyclic Graph (DAG) to capture the causal intervention, a Diffusion-based Causal Model (DCM) was proposed incorporating the diffusion model to answer the causal questions more accurately, assuming that all of the confounders are observed. However, unmeasured confounders in practice exist, which hinders DCM from being applicable. To alleviate this limitation of DCM, we propose an extended model called Backdoor Criterion based DCM (BDCM), whose idea is rooted in the Backdoor criterion to find the variables in DAG to be included in the decoding process of the diffusion model so that we can extend DCM to the case with unmeasured confounders. Synthetic data experiment demonstrates that our proposed model captures the counterfactual distribution more precisely than DCM under the unmeasured confounders.
△ Less
Submitted 14 December, 2023; v1 submitted 7 August, 2023;
originally announced August 2023.
-
Doubly Robust Estimator for Off-Policy Evaluation with Large Action Spaces
Authors:
Tatsuhiro Shimizu,
Laura Forastiere
Abstract:
We study Off-Policy Evaluation (OPE) in contextual bandit settings with large action spaces. The benchmark estimators suffer from severe bias and variance tradeoffs. Parametric approaches suffer from bias due to difficulty specifying the correct model, whereas ones with importance weight suffer from variance. To overcome these limitations, Marginalized Inverse Propensity Scoring (MIPS) was propose…
▽ More
We study Off-Policy Evaluation (OPE) in contextual bandit settings with large action spaces. The benchmark estimators suffer from severe bias and variance tradeoffs. Parametric approaches suffer from bias due to difficulty specifying the correct model, whereas ones with importance weight suffer from variance. To overcome these limitations, Marginalized Inverse Propensity Scoring (MIPS) was proposed to mitigate the estimator's variance via embeddings of an action. Nevertheless, MIPS is unbiased under the no direct effect, which assumes that the action embedding completely mediates the effect of an action on a reward. To overcome the dependency on these unrealistic assumptions, we propose a Marginalized Doubly Robust (MDR) estimator. Theoretical analysis shows that the proposed estimator is unbiased under weaker assumptions than MIPS while reducing the variance against MIPS. The empirical experiment verifies the supremacy of MDR against existing estimators with large action spaces.
△ Less
Submitted 14 December, 2023; v1 submitted 7 August, 2023;
originally announced August 2023.
-
Metropolitan Scale and Longitudinal Dataset of Anonymized Human Mobility Trajectories
Authors:
Takahiro Yabe,
Kota Tsubouchi,
Toru Shimizu,
Yoshihide Sekimoto,
Kaoru Sezaki,
Esteban Moro,
Alex Pentland
Abstract:
Modeling and predicting human mobility trajectories in urban areas is an essential task for various applications. The recent availability of large-scale human movement data collected from mobile devices have enabled the development of complex human mobility prediction models. However, human mobility prediction methods are often trained and tested on different datasets, due to the lack of open-sour…
▽ More
Modeling and predicting human mobility trajectories in urban areas is an essential task for various applications. The recent availability of large-scale human movement data collected from mobile devices have enabled the development of complex human mobility prediction models. However, human mobility prediction methods are often trained and tested on different datasets, due to the lack of open-source large-scale human mobility datasets amid privacy concerns, posing a challenge towards conducting fair performance comparisons between methods. To this end, we created an open-source, anonymized, metropolitan scale, and longitudinal (90 days) dataset of 100,000 individuals' human mobility trajectories, using mobile phone location data. The location pings are spatially and temporally discretized, and the metropolitan area is undisclosed to protect users' privacy. The 90-day period is composed of 75 days of business-as-usual and 15 days during an emergency. To promote the use of the dataset, we will host a human mobility prediction data challenge (`HuMob Challenge 2023') using the human mobility dataset, which will be held in conjunction with ACM SIGSPATIAL 2023.
△ Less
Submitted 7 July, 2023;
originally announced July 2023.
-
X-Detect: Explainable Adversarial Patch Detection for Object Detectors in Retail
Authors:
Omer Hofman,
Amit Giloni,
Yarin Hayun,
Ikuya Morikawa,
Toshiya Shimizu,
Yuval Elovici,
Asaf Shabtai
Abstract:
Object detection models, which are widely used in various domains (such as retail), have been shown to be vulnerable to adversarial attacks. Existing methods for detecting adversarial attacks on object detectors have had difficulty detecting new real-life attacks. We present X-Detect, a novel adversarial patch detector that can: i) detect adversarial samples in real time, allowing the defender to…
▽ More
Object detection models, which are widely used in various domains (such as retail), have been shown to be vulnerable to adversarial attacks. Existing methods for detecting adversarial attacks on object detectors have had difficulty detecting new real-life attacks. We present X-Detect, a novel adversarial patch detector that can: i) detect adversarial samples in real time, allowing the defender to take preventive action; ii) provide explanations for the alerts raised to support the defender's decision-making process, and iii) handle unfamiliar threats in the form of new attacks. Given a new scene, X-Detect uses an ensemble of explainable-by-design detectors that utilize object extraction, scene manipulation, and feature transformation techniques to determine whether an alert needs to be raised. X-Detect was evaluated in both the physical and digital space using five different attack scenarios (including adaptive attacks) and the COCO dataset and our new Superstore dataset. The physical evaluation was performed using a smart shopping cart setup in real-world settings and included 17 adversarial patch attacks recorded in 1,700 adversarial videos. The results showed that X-Detect outperforms the state-of-the-art methods in distinguishing between benign and adversarial scenes for all attack scenarios while maintaining a 0% FPR (no false alarms) and providing actionable explanations for the alerts raised. A demo is available.
△ Less
Submitted 2 July, 2023; v1 submitted 14 June, 2023;
originally announced June 2023.
-
Deep Selection: A Fully Supervised Camera Selection Network for Surgery Recordings
Authors:
Ryo Hachiuma,
Tomohiro Shimizu,
Hideo Saito,
Hiroki Kajita,
Yoshifumi Takatsume
Abstract:
Recording surgery in operating rooms is an essential task for education and evaluation of medical treatment. However, recording the desired targets, such as the surgery field, surgical tools, or doctor's hands, is difficult because the targets are heavily occluded during surgery. We use a recording system in which multiple cameras are embedded in the surgical lamp, and we assume that at least one…
▽ More
Recording surgery in operating rooms is an essential task for education and evaluation of medical treatment. However, recording the desired targets, such as the surgery field, surgical tools, or doctor's hands, is difficult because the targets are heavily occluded during surgery. We use a recording system in which multiple cameras are embedded in the surgical lamp, and we assume that at least one camera is recording the target without occlusion at any given time. As the embedded cameras obtain multiple video sequences, we address the task of selecting the camera with the best view of the surgery. Unlike the conventional method, which selects the camera based on the area size of the surgery field, we propose a deep neural network that predicts the camera selection probability from multiple video sequences by learning the supervision of the expert annotation. We created a dataset in which six different types of plastic surgery are recorded, and we provided the annotation of camera switching. Our experiments show that our approach successfully switched between cameras and outperformed three baseline methods.
△ Less
Submitted 28 March, 2023;
originally announced March 2023.
-
Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models
Authors:
Jacob Shams,
Ben Nassi,
Ikuya Morikawa,
Toshiya Shimizu,
Asaf Shabtai,
Yuval Elovici
Abstract:
In recent years, various watermarking methods were suggested to detect computer vision models obtained illegitimately from their owners, however they fail to demonstrate satisfactory robustness against model extraction attacks. In this paper, we present an adaptive framework to watermark a protected model, leveraging the unique behavior present in the model due to a unique random seed initialized…
▽ More
In recent years, various watermarking methods were suggested to detect computer vision models obtained illegitimately from their owners, however they fail to demonstrate satisfactory robustness against model extraction attacks. In this paper, we present an adaptive framework to watermark a protected model, leveraging the unique behavior present in the model due to a unique random seed initialized during the model training. This watermark is used to detect extracted models, which have the same unique behavior, indicating an unauthorized usage of the protected model's intellectual property (IP). First, we show how an initial seed for random number generation as part of model training produces distinct characteristics in the model's decision boundaries, which are inherited by extracted models and present in their decision boundaries, but aren't present in non-extracted models trained on the same data-set with a different seed. Based on our findings, we suggest the Robust Adaptive Watermarking (RAW) Framework, which utilizes the unique behavior present in the protected and extracted models to generate a watermark key-set and verification model. We show that the framework is robust to (1) unseen model extraction attacks, and (2) extracted models which undergo a blurring method (e.g., weight pruning). We evaluate the framework's robustness against a naive attacker (unaware that the model is watermarked), and an informed attacker (who employs blurring strategies to remove watermarked behavior from an extracted model), and achieve outstanding (i.e., >0.9) AUC values. Finally, we show that the framework is robust to model extraction attacks with different structure and/or architecture than the protected model.
△ Less
Submitted 24 November, 2022;
originally announced November 2022.
-
Adaptive Neural Network-based OFDM Receivers
Authors:
Moritz Benedikt Fischer,
Sebastian Dörner,
Sebastian Cammerer,
Takayuki Shimizu,
Hongsheng Lu,
Stephan ten Brink
Abstract:
We propose and examine the idea of continuously adapting state-of-the-art neural network (NN)-based orthogonal frequency division multiplex (OFDM) receivers to current channel conditions. This online adaptation via retraining is mainly motivated by two reasons: First, receiver design typically focuses on the universal optimal performance for a wide range of possible channel realizations. However,…
▽ More
We propose and examine the idea of continuously adapting state-of-the-art neural network (NN)-based orthogonal frequency division multiplex (OFDM) receivers to current channel conditions. This online adaptation via retraining is mainly motivated by two reasons: First, receiver design typically focuses on the universal optimal performance for a wide range of possible channel realizations. However, in actual applications and within short time intervals, only a subset of these channel parameters is likely to occur, as macro parameters, e.g., the maximum channel delay, can assumed to be static. Second, in-the-field alterations like temporal interferences or other conditions out of the originally intended specifications can occur on a practical (real-world) transmission. While conventional (filter-based) systems would require reconfiguration or additional signal processing to cope with these unforeseen conditions, NN-based receivers can learn to mitigate previously unseen effects even after their deployment. For this, we showcase on-the-fly adaption to current channel conditions and temporal alterations solely based on recovered labels from an outer forward error correction (FEC) code without any additional piloting overhead. To underline the flexibility of the proposed adaptive training, we showcase substantial gains for scenarios with static channel macro parameters, for out-of-specification usage and for interference compensation.
△ Less
Submitted 21 July, 2022; v1 submitted 25 March, 2022;
originally announced March 2022.
-
Attention-based Contextual Multi-View Graph Convolutional Networks for Short-term Population Prediction
Authors:
Yuki Kubota,
Yuki Ohira,
Tetsuo Shimizu
Abstract:
Short-term future population prediction is a crucial problem in urban computing. Accurate future population prediction can provide rich insights for urban planners or developers. However, predicting the future population is a challenging task due to its complex spatiotemporal dependencies. Many existing works have attempted to capture spatial correlations by partitioning a city into grids and usin…
▽ More
Short-term future population prediction is a crucial problem in urban computing. Accurate future population prediction can provide rich insights for urban planners or developers. However, predicting the future population is a challenging task due to its complex spatiotemporal dependencies. Many existing works have attempted to capture spatial correlations by partitioning a city into grids and using Convolutional Neural Networks (CNN). However, CNN merely captures spatial correlations by using a rectangle filter; it ignores urban environmental information such as distribution of railroads and location of POI. Moreover, the importance of those kinds of information for population prediction differs in each region and is affected by contextual situations such as weather conditions and day of the week. To tackle this problem, we propose a novel deep learning model called Attention-based Contextual Multi-View Graph Convolutional Networks (ACMV-GCNs). We first construct multiple graphs based on urban environmental information, and then ACMV-GCNs captures spatial correlations from various views with graph convolutional networks. Further, we add an attention module to consider the contextual situations when leveraging urban environmental information for future population prediction. Using statistics population count data collected through mobile phones, we demonstrate that our proposed model outperforms baseline methods. In addition, by visualizing weights calculated by an attention module, we show that our model learns an efficient way to utilize urban environment information without any prior knowledge.
△ Less
Submitted 1 March, 2022;
originally announced March 2022.
-
3D Map Reconstruction of an Orchard using an Angle-Aware Covering Control Strategy
Authors:
Martina Mammarella,
Cesare Donati,
Takumi Shimizu,
Masaya Suenaga,
Lorenzo Comba,
Alessandro Biglia,
Kuniaki Uto,
Takeshi Hatanaka,
Paolo Gay,
Fabrizio Dabbene
Abstract:
In the last years, unmanned aerial vehicles are becoming a reality in the context of precision agriculture, mainly for monitoring, patrolling and remote sensing tasks, but also for 3D map reconstruction. In this paper, we present an innovative approach where a fleet of unmanned aerial vehicles is exploited to perform remote sensing tasks over an apple orchard for reconstructing a 3D map of the fie…
▽ More
In the last years, unmanned aerial vehicles are becoming a reality in the context of precision agriculture, mainly for monitoring, patrolling and remote sensing tasks, but also for 3D map reconstruction. In this paper, we present an innovative approach where a fleet of unmanned aerial vehicles is exploited to perform remote sensing tasks over an apple orchard for reconstructing a 3D map of the field, formulating the covering control problem to combine the position of a monitoring target and the viewing angle. Moreover, the objective function of the controller is defined by an importance index, which has been computed from a multi-spectral map of the field, obtained by a preliminary flight, using a semantic interpretation scheme based on a convolutional neural network. This objective function is then updated according to the history of the past coverage states, thus allowing the drones to take situation-adaptive actions. The effectiveness of the proposed covering control strategy has been validated through simulations on a Robot Operating System.
△ Less
Submitted 6 February, 2022;
originally announced February 2022.
-
An Analytical Latency Model and Evaluation of the Capacity of 5G NR to Support V2X Services using V2N2V Communications
Authors:
M. C. Lucas-Estañ,
B. Coll-Perales,
T. Shimizu,
J. Gozalvez,
T. Higuchi,
S. Avedisov,
O. Altintas,
M. Sepulcre
Abstract:
5G has been designed to support applications such as connected and automated driving. To this aim, 5G includes a highly flexible New Radio (NR) interface that can be configured to utilize different subcarrier spacings (SCS), slot durations, scheduling, and retransmissions mechanisms. This flexibility can be exploited to support advanced V2X services with strict latency and reliability requirements…
▽ More
5G has been designed to support applications such as connected and automated driving. To this aim, 5G includes a highly flexible New Radio (NR) interface that can be configured to utilize different subcarrier spacings (SCS), slot durations, scheduling, and retransmissions mechanisms. This flexibility can be exploited to support advanced V2X services with strict latency and reliability requirements using V2N2V (Vehicle-to-Network-to-Vehicles) communications instead of direct or sidelink V2V (Vehicle-to-Vehicle). To analyze this possibility, this paper presents a novel analytical model that estimates the latency of 5G at the radio network level. The model accounts for the use of different numerologies (SCS, slot durations and Cyclic Prefixes), modulation and coding schemes, full-slots or mini-slots, semi-static and dynamic scheduling, different retransmission mechanisms, and broadcast/multicast or unicast transmissions. The model has been used to first analyze the impact of different 5G NR radio configurations on the latency. We then identify which radio configurations and scenarios can 5G NR satisfy the latency and reliability requirements of V2X services using V2N2V communications. This paper considers cooperative lane changes as a case study. The results show that 5G can support advanced V2X services at the radio network level using V2N2V communications under certain conditions that depend on the radio configuration, bandwidth, service requirements and cell traffic load.
△ Less
Submitted 1 September, 2022; v1 submitted 16 January, 2022;
originally announced January 2022.
-
End-to-End V2X Latency Modeling and Analysis in 5G Networks
Authors:
B. Coll-Perales,
M. C. Lucas-Estañ,
T. Shimizu,
J. Gozalvez,
T. Higuchi,
S. Avedisov,
O. Altintas,
M. Sepulcre
Abstract:
5G networks provide higher flexibility and improved performance compared to previous cellular technologies. This has raised expectations on the possibility to support advanced V2X services using the cellular network via Vehicle-to-Network (V2N) and V2N2V connections. Replacing direct V2V connections by V2N/V2N2V communications to support critical V2X services requires low V2N/V2N2V latencies. It i…
▽ More
5G networks provide higher flexibility and improved performance compared to previous cellular technologies. This has raised expectations on the possibility to support advanced V2X services using the cellular network via Vehicle-to-Network (V2N) and V2N2V connections. Replacing direct V2V connections by V2N/V2N2V communications to support critical V2X services requires low V2N/V2N2V latencies. It is then necessary to quantify the latency values that V2N and V2N2V connections can achieve over 5G end-to-end (E2E) connections, but these depend on the particular 5G network deployments and configurations and to date the number of related studies is limited. This paper progresses the state-of-the-art by introducing a novel E2E latency model to quantify the latency of 5G V2N/V2N2V communications. The model includes the latency introduced at the radio, transport, core, Internet, peering points and application server (AS) for single MNO and multi-MNO scenarios. This paper estimates the E2E latency for a large variety of possible 5G network deployments that are being discussed or envisioned to support V2X services. This includes the possibility to deploy the V2X AS from the edge of the network to the cloud. The model is utilized to analyze the impact of different 5G network deployments and configurations on the E2E latency. The analysis helps identify which 5G network deployments and configurations are more suitable to meet V2X latency requirements. The conducted analysis highlights the challenge for centralized network deployments that locate the V2X AS at the cloud to meet the latency requirements of advanced V2X services. Locating the V2X AS closer to the cell edge reduces the latency. However, it requires a higher number of ASs and also a careful dimensioning of the network and its configuration to ensure sufficient network and AS resources are dedicated to serve the V2X traffic.
△ Less
Submitted 4 October, 2022; v1 submitted 16 January, 2022;
originally announced January 2022.
-
GEO-BLEU: Similarity Measure for Geospatial Sequences
Authors:
Toru Shimizu,
Kota Tsubouchi,
Takahiro Yabe
Abstract:
In recent geospatial research, the importance of modeling large-scale human mobility data and predicting trajectories is rising, in parallel with progress in text generation using large-scale corpora in natural language processing. Whereas there are already plenty of feasible approaches applicable to geospatial sequence modeling itself, there seems to be room to improve with regard to evaluation,…
▽ More
In recent geospatial research, the importance of modeling large-scale human mobility data and predicting trajectories is rising, in parallel with progress in text generation using large-scale corpora in natural language processing. Whereas there are already plenty of feasible approaches applicable to geospatial sequence modeling itself, there seems to be room to improve with regard to evaluation, specifically about measuring the similarity between generated and reference trajectories. In this work, we propose a novel similarity measure, GEO-BLEU, which can be especially useful in the context of geospatial sequence modeling and generation. As the name suggests, this work is based on BLEU, one of the most popular measures used in machine translation research, while introducing spatial proximity to the idea of n-gram. We compare this measure with an established baseline, dynamic time warping, applying it to actual generated geospatial sequences. Using crowdsourced annotated data on the similarity between geospatial sequences collected from over 12,000 cases, we quantitatively and qualitatively show the proposed method's superiority.
△ Less
Submitted 31 October, 2022; v1 submitted 13 December, 2021;
originally announced December 2021.
-
First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data
Authors:
Masataka Tasumi,
Kazuki Iwahana,
Naoto Yanai,
Katsunari Shishido,
Toshiya Shimizu,
Yuji Higuchi,
Ikuya Morikawa,
Jun Yajima
Abstract:
Model extraction attacks are a kind of attacks where an adversary obtains a machine learning model whose performance is comparable with one of the victim model through queries and their results. This paper presents a novel model extraction attack, named TEMPEST, applicable on tabular data under a practical data-free setting. Whereas model extraction is more challenging on tabular data due to norma…
▽ More
Model extraction attacks are a kind of attacks where an adversary obtains a machine learning model whose performance is comparable with one of the victim model through queries and their results. This paper presents a novel model extraction attack, named TEMPEST, applicable on tabular data under a practical data-free setting. Whereas model extraction is more challenging on tabular data due to normalization, TEMPEST no longer needs initial samples that previous attacks require; instead, it makes use of publicly available statistics to generate query samples. Experiments show that our attack can achieve the same level of performance as the previous attacks. Moreover, we identify that the use of mean and variance as statistics for query generation and the use of the same normalization process as the victim model can improve the performance of our attack. We also discuss a possibility whereby TEMPEST is executed in the real world through an experiment with a medical diagnosis dataset. We plan to release the source code for reproducibility and a reference to subsequent works.
△ Less
Submitted 30 September, 2021;
originally announced September 2021.
-
Collaborative Problem Solving on a Data Platform Kaggle
Authors:
Teruaki Hayashi,
Takumi Shimizu,
Yoshiaki Fukami
Abstract:
Data exchange across different domains has gained much attention as a way of creating new businesses and improving the value of existing services. Data exchange ecosystem is developed by platform services that facilitate data and knowledge exchange and offer co-creation environments for organizations to promote their problem-solving. In this study, we investigate Kaggle, a data analysis competitio…
▽ More
Data exchange across different domains has gained much attention as a way of creating new businesses and improving the value of existing services. Data exchange ecosystem is developed by platform services that facilitate data and knowledge exchange and offer co-creation environments for organizations to promote their problem-solving. In this study, we investigate Kaggle, a data analysis competition platform, and discuss the characteristics of data and the ecosystem that contributes to collaborative problem-solving by analyzing the datasets, users, and their relationships.
△ Less
Submitted 25 July, 2021;
originally announced July 2021.
-
Wiener Filter versus Recurrent Neural Network-based 2D-Channel Estimation for V2X Communications
Authors:
Moritz Benedikt Fischer,
Sebastian Dörner,
Sebastian Cammerer,
Takayuki Shimizu,
Bin Cheng,
Hongsheng Lu,
Stephan ten Brink
Abstract:
We compare the potential of neural network (NN)-based channel estimation with classical linear minimum mean square error (LMMSE)-based estimators, also known as Wiener filtering. For this, we propose a low-complexity recurrent neural network (RNN)-based estimator that allows channel equalization of a sequence of channel observations based on independent time- and frequency-domain long short-term m…
▽ More
We compare the potential of neural network (NN)-based channel estimation with classical linear minimum mean square error (LMMSE)-based estimators, also known as Wiener filtering. For this, we propose a low-complexity recurrent neural network (RNN)-based estimator that allows channel equalization of a sequence of channel observations based on independent time- and frequency-domain long short-term memory (LSTM) cells. Motivated by Vehicle-to-Everything (V2X) applications, we simulate time- and frequency-selective channels with orthogonal frequency division multiplex (OFDM) and extend our channel models in such a way that a continuous degradation from line-of-sight (LoS) to non-line-of-sight (NLoS) conditions can be emulated. It turns out that the NN-based system cannot just compete with the LMMSE equalizer, but it also can be trained w.r.t. resilience against system parameter mismatch. We thereby showcase the conceptual simplicity of such a data-driven system design, as this not only enables more robustness against, e.g., signal-to-noise-ratio (SNR) or Doppler spread estimation mismatches, but also allows to use the same equalizer over a wider range of input parameters without the need of re-building (or re-estimating) the filter coefficients. Particular attention has been paid to ensure compatibility with the existing IEEE 802.11p piloting scheme for V2X communications. Finally, feeding the payload data symbols as additional equalizer input unleashes further performance gains. We show significant gains over the conventional LMMSE equalization for highly dynamic channel conditions if such a data-augmented equalization scheme is used.
△ Less
Submitted 21 May, 2021; v1 submitted 5 February, 2021;
originally announced February 2021.
-
Data Combination for Problem-solving: A Case of an Open Data Exchange Platform
Authors:
Teruaki Hayashi,
Hiroki Sakaji,
Hiroyasu Matsushima,
Yoshiaki Fukami,
Takumi Shimizu,
Yukio Ohsawa
Abstract:
In recent years, rather than enclosing data within a single organization, exchanging and combining data from different domains has become an emerging practice. Many studies have discussed the economic and utility value of data and data exchange, but the characteristics of data that contribute to problem solving through data combination have not been fully understood. In big data and interdisciplin…
▽ More
In recent years, rather than enclosing data within a single organization, exchanging and combining data from different domains has become an emerging practice. Many studies have discussed the economic and utility value of data and data exchange, but the characteristics of data that contribute to problem solving through data combination have not been fully understood. In big data and interdisciplinary data combinations, large-scale data with many variables are expected to be used, and value is expected to be created by combining data as much as possible. In this study, we conduct three experiments to investigate the characteristics of data, focusing on the relationships between data combinations and variables in each dataset, using empirical data shared by the local government. The results indicate that even datasets that have a few variables are frequently used to propose solutions for problem solving. Moreover, we found that even if the datasets in the solution do not have common variables, there are some well-established solutions to the problems. The findings of this study shed light on mechanisms behind data combination for problem-solving involving multiple datasets and variables.
△ Less
Submitted 21 December, 2020;
originally announced December 2020.
-
Towards mmWave V2X in 5G and Beyond to Support Automated Driving
Authors:
Kei Sakaguchi,
Ryuichi Fukatsu,
Tao Yu,
Eisuke Fukuda,
Kim Mahler,
Robert Heath,
Takeo Fujii,
Kazuaki Takahashi,
Alexey Khoryaev,
Satoshi Nagata,
Takayuki Shimizu
Abstract:
Millimeter wave provides high data rates for Vehicle-to-Everything (V2X) communications. This paper motivates millimeter wave to support automated driving and begins by explaining V2X use cases that support automated driving with references to several standardi-zation bodies. The paper gives a classification of existing V2X stand-ards: IEEE802.11p and LTE V2X, along with the status of their com-me…
▽ More
Millimeter wave provides high data rates for Vehicle-to-Everything (V2X) communications. This paper motivates millimeter wave to support automated driving and begins by explaining V2X use cases that support automated driving with references to several standardi-zation bodies. The paper gives a classification of existing V2X stand-ards: IEEE802.11p and LTE V2X, along with the status of their com-mercial deployment. Then, the paper provides a detailed assessment on how millimeter wave V2X enables the use case of cooperative perception. The explanations provide detailed rate calculations for this use case and show that millimeter wave is the only technology able to achieve the requirements. Furthermore, specific challenges related to millimeter wave for V2X are described, including cover-age enhancement and beam alignment. The paper concludes with some results from three studies, i.e. IEEE802.11ad (WiGig) based V2X, extension of 5G NR (New Radio) toward mmWave V2X, and prototypes of intelligent street with mmWave V2X.
△ Less
Submitted 18 November, 2020;
originally announced November 2020.
-
Securing Vehicle-to-Everything (V2X) Communication Platforms
Authors:
Monowar Hasan,
Sibin Mohan,
Takayuki Shimizu,
Hongsheng Lu
Abstract:
Modern vehicular wireless technology enables vehicles to exchange information at any time, from any place, to any network -- forms the vehicle-to-everything (V2X) communication platforms. Despite benefits, V2X applications also face great challenges to security and privacy -- a very valid concern since breaches are not uncommon in automotive communication networks and applications. In this survey,…
▽ More
Modern vehicular wireless technology enables vehicles to exchange information at any time, from any place, to any network -- forms the vehicle-to-everything (V2X) communication platforms. Despite benefits, V2X applications also face great challenges to security and privacy -- a very valid concern since breaches are not uncommon in automotive communication networks and applications. In this survey, we provide an extensive overview of V2X ecosystem. We also review main security/privacy issues, current standardization activities and existing defense mechanisms proposed within the V2X domain. We then identified semantic gaps of existing security solutions and outline possible open issues.
△ Less
Submitted 12 March, 2020;
originally announced March 2020.
-
Learning Fine Grained Place Embeddings with Spatial Hierarchy from Human Mobility Trajectories
Authors:
Toru Shimizu,
Takahiro Yabe,
Kota Tsubouchi
Abstract:
Place embeddings generated from human mobility trajectories have become a popular method to understand the functionality of places. Place embeddings with high spatial resolution are desirable for many applications, however, downscaling the spatial resolution deteriorates the quality of embeddings due to data sparsity, especially in less populated areas. We address this issue by proposing a method…
▽ More
Place embeddings generated from human mobility trajectories have become a popular method to understand the functionality of places. Place embeddings with high spatial resolution are desirable for many applications, however, downscaling the spatial resolution deteriorates the quality of embeddings due to data sparsity, especially in less populated areas. We address this issue by proposing a method that generates fine grained place embeddings, which leverages spatial hierarchical information according to the local density of observed data points. The effectiveness of our fine grained place embeddings are compared to baseline methods via next place prediction tasks using real world trajectory data from 3 cities in Japan. In addition, we demonstrate the value of our fine grained place embeddings for land use classification applications. We believe that our technique of incorporating spatial hierarchical information can complement and reinforce various place embedding generating methods.
△ Less
Submitted 5 February, 2020;
originally announced February 2020.
-
Fire Resistance Deformable Soft Gripper Based on Wire Jamming Mechanism
Authors:
Kenjiro Tadakuma,
Toshiaki Fujimoto,
Masahiro Watanabe,
Tori Shimizu
Abstract:
Able to grasp objects of any shape and size, universal grippers using variable stiffness phenomenon such as granular jamming have been developed for disaster robotics application. However, as their contact interface is mainly composed of unrigid and burnable silicone rubber, conventional soft grippers are not applicable to objects with sharp sections such as broken valves and glass fragments, espe…
▽ More
Able to grasp objects of any shape and size, universal grippers using variable stiffness phenomenon such as granular jamming have been developed for disaster robotics application. However, as their contact interface is mainly composed of unrigid and burnable silicone rubber, conventional soft grippers are not applicable to objects with sharp sections such as broken valves and glass fragments, especially on fire. In this research, the authors proposed a new method of variable stiffness mechanism using a string of beads that can be composed of cut-resistant and incombustible metals, arrange the mechanism to form a torus gripper, and conducted experiments to show its effectiveness.
△ Less
Submitted 3 December, 2019;
originally announced December 2019.
-
Internally-Balanced Magnetic Mechanisms Using Magnetic Spring for Producing Large Amplified Clamping Force
Authors:
Tori Shimizu,
Kenjiro Tadakuma,
Masahiro Watanabe,
Eri Takane,
Masashi Konyo,
Satoshi Tadokoro
Abstract:
To detach a permanent magnet with a controlled force much smaller than its original attractive force, the Internally-Balanced Magnetic Unit (IB Magnet) was invented and has been applied to magnetic devices such as wall-climbing robots, ceil-dangling drones, and modular swarm robots. In contrast to its drastic reduction rate on the control force, the IB Magnet has two major problems on its nonlinea…
▽ More
To detach a permanent magnet with a controlled force much smaller than its original attractive force, the Internally-Balanced Magnetic Unit (IB Magnet) was invented and has been applied to magnetic devices such as wall-climbing robots, ceil-dangling drones, and modular swarm robots. In contrast to its drastic reduction rate on the control force, the IB Magnet has two major problems on its nonlinear spring which cancels out the internal force on the magnet: complicated design procedure and trade-off relationship between balancing precision and mechanism volume. This paper proposes a principle of a new balancing method for the IB Magnet which uses a like-pole pair of magnets as a magnetic spring, whose repulsive force ideally equals the attractive force of an unlike-pole pair exactly. To verify the proposed principle, the authors realized a prototype model of the IB Magnet using magnetic spring and verified through experiments its reduction rate is comparable to those of conventional IB Magnets. Moreover, the authors discussed and realized a robotic clamp as an application example containing proposed IB Magnets as its internal mechanism.
△ Less
Submitted 3 December, 2019;
originally announced December 2019.
-
City2City: Translating Place Representations across Cities
Authors:
Takahiro Yabe,
Kota Tsubouchi,
Toru Shimizu,
Yoshihide Sekimoto,
Satish V. Ukkusuri
Abstract:
Large mobility datasets collected from various sources have allowed us to observe, analyze, predict and solve a wide range of important urban challenges. In particular, studies have generated place representations (or embeddings) from mobility patterns in a similar manner to word embeddings to better understand the functionality of different places within a city. However, studies have been limited…
▽ More
Large mobility datasets collected from various sources have allowed us to observe, analyze, predict and solve a wide range of important urban challenges. In particular, studies have generated place representations (or embeddings) from mobility patterns in a similar manner to word embeddings to better understand the functionality of different places within a city. However, studies have been limited to generating such representations of cities in an individual manner and has lacked an inter-city perspective, which has made it difficult to transfer the insights gained from the place representations across different cities. In this study, we attempt to bridge this research gap by treating \textit{cities} and \textit{languages} analogously. We apply methods developed for unsupervised machine language translation tasks to translate place representations across different cities. Real world mobility data collected from mobile phone users in 2 cities in Japan are used to test our place representation translation methods. Translated place representations are validated using landuse data, and results show that our methods were able to accurately translate place representations from one city to another.
△ Less
Submitted 26 November, 2019;
originally announced November 2019.
-
Toward a view-based data cleaning architecture
Authors:
Toshiyuki Shimizu,
Hiroki Omori,
Masatoshi Yoshikawa
Abstract:
Big data analysis has become an active area of study with the growth of machine learning techniques. To properly analyze data, it is important to maintain high-quality data. Thus, research on data cleaning is also important. It is difficult to automatically detect and correct inconsistent values for data requiring expert knowledge or data created by many contributors, such as integrated data from…
▽ More
Big data analysis has become an active area of study with the growth of machine learning techniques. To properly analyze data, it is important to maintain high-quality data. Thus, research on data cleaning is also important. It is difficult to automatically detect and correct inconsistent values for data requiring expert knowledge or data created by many contributors, such as integrated data from heterogeneous data sources. An example of such data is metadata for scientific datasets, which should be confirmed by data managers while handling the data. To support the efficient cleaning of data by data managers, we propose a data cleaning architecture in which data managers interactively browse and correct portions of data through views. In this paper, we explain our view-based data cleaning architecture and discuss some remaining issues.
△ Less
Submitted 24 October, 2019;
originally announced October 2019.
-
Flexible distribution-free conditional predictive bands using density estimators
Authors:
Rafael Izbicki,
Gilson T. Shimizu,
Rafael B. Stern
Abstract:
Conformal methods create prediction bands that control average coverage under no assumptions besides i.i.d. data. Besides average coverage, one might also desire to control conditional coverage, that is, coverage for every new testing point. However, without strong assumptions, conditional coverage is unachievable. Given this limitation, the literature has focused on methods with asymptotical cond…
▽ More
Conformal methods create prediction bands that control average coverage under no assumptions besides i.i.d. data. Besides average coverage, one might also desire to control conditional coverage, that is, coverage for every new testing point. However, without strong assumptions, conditional coverage is unachievable. Given this limitation, the literature has focused on methods with asymptotical conditional coverage. In order to obtain this property, these methods require strong conditions on the dependence between the target variable and the features. We introduce two conformal methods based on conditional density estimators that do not depend on this type of assumption to obtain asymptotic conditional coverage: Dist-split and CD-split. While Dist-split asymptotically obtains optimal intervals, which are easier to interpret than general regions, CD-split obtains optimal size regions, which are smaller than intervals. CD-split also obtains local coverage by creating a data-driven partition of the feature space that scales to high-dimensional settings and by generating prediction bands locally on the partition elements. In a wide variety of simulated scenarios, our methods have a better control of conditional coverage and have smaller length than previously proposed methods.
△ Less
Submitted 9 December, 2019; v1 submitted 12 October, 2019;
originally announced October 2019.
-
Path Loss Models for V2V mmWave Communication: Performance Evaluation and Open Challenges
Authors:
Marco Giordani,
Takayuki Shimizu,
Andrea Zanella,
Takamasa Higuchi,
Onur Altintas,
Michele Zorzi
Abstract:
Recently, millimeter wave (mmWave) bands have been investigated as a means to enhance automated driving and address the challenging data rate and latency demands of emerging automotive applications. For the development of those systems to operate in bands above 6 GHz, there is a need to have accurate channel models able to predict the peculiarities of the vehicular propagation at these bands, espe…
▽ More
Recently, millimeter wave (mmWave) bands have been investigated as a means to enhance automated driving and address the challenging data rate and latency demands of emerging automotive applications. For the development of those systems to operate in bands above 6 GHz, there is a need to have accurate channel models able to predict the peculiarities of the vehicular propagation at these bands, especially as far as Vehicle-to-Vehicle (V2V) communications are concerned. In this paper, we validate the channel model that the 3GPP has proposed for NR-V2X systems, which (i) supports deployment scenarios for urban/highway propagation, and (ii) incorporates the effects of path loss, shadowing, line of sight probability, and static/dynamic blockage attenuation. We also exemplify the impact of several automotive-specific parameters on the overall network performance considering realistic system-level simulation assumptions for typical scenarios. Finally, we highlight potential inconsistencies of the model and provide recommendations for future measurement campaigns in vehicular environments.
△ Less
Submitted 23 July, 2019;
originally announced July 2019.
-
Floating Displacement-Force Conversion Mechanism as a Robotic Mechanism
Authors:
Kenjiro Tadakuma,
Tori Shimizu,
Sosuke Hayashi,
Eri Takane,
Masahiro Watanabe,
Masashi Konyo,
Satoshi Tadokoro
Abstract:
To attach and detach permanent magnets with an operation force smaller than their attractive force, Internally-Balanced Magnetic Unit (IB Magnet) has been developed. The unit utilizes a nonlinear spring with an inverse characteristic of magnetic attraction to produce a balancing force for canceling the internal force applied on the magnet. This paper extends the concept of shifting the equilibrium…
▽ More
To attach and detach permanent magnets with an operation force smaller than their attractive force, Internally-Balanced Magnetic Unit (IB Magnet) has been developed. The unit utilizes a nonlinear spring with an inverse characteristic of magnetic attraction to produce a balancing force for canceling the internal force applied on the magnet. This paper extends the concept of shifting the equilibrium point of a system with a small operation force to linear systems such as conventional springs. Aligning a linear system and its inverse characteristic spring in series enables a mechanism to convert displacement into force generated by a spring with theoretically zero operation force. To verify the proposed principle, the authors realized a prototype model of inverse characteristic linear spring with an uncircular pulley. Experiments showed that the generating force of a linear spring can be controlled by a small and steady operation force.
△ Less
Submitted 21 July, 2019;
originally announced July 2019.
-
Predicting Evacuation Decisions using Representations of Individuals' Pre-Disaster Web Search Behavior
Authors:
Takahiro Yabe,
Kota Tsubouchi,
Toru Shimizu,
Yoshihide Sekimoto,
Satish V. Ukkusuri
Abstract:
Predicting the evacuation decisions of individuals before the disaster strikes is crucial for planning first response strategies. In addition to the studies on post-disaster analysis of evacuation behavior, there are various works that attempt to predict the evacuation decisions beforehand. Most of these predictive methods, however, require real time location data for calibration, which are becomi…
▽ More
Predicting the evacuation decisions of individuals before the disaster strikes is crucial for planning first response strategies. In addition to the studies on post-disaster analysis of evacuation behavior, there are various works that attempt to predict the evacuation decisions beforehand. Most of these predictive methods, however, require real time location data for calibration, which are becoming much harder to obtain due to the rising privacy concerns. Meanwhile, web search queries of anonymous users have been collected by web companies. Although such data raise less privacy concerns, they have been under-utilized for various applications. In this study, we investigate whether web search data observed prior to the disaster can be used to predict the evacuation decisions. More specifically, we utilize a "session-based query encoder" that learns the representations of each user's web search behavior prior to evacuation. Our proposed approach is empirically tested using web search data collected from users affected by a major flood in Japan. Results are validated using location data collected from mobile phones of the same set of users as ground truth. We show that evacuation decisions can be accurately predicted (84%) using only the users' pre-disaster web search data as input. This study proposes an alternative method for evacuation prediction that does not require highly sensitive location data, which can assist local governments to prepare effective first response strategies.
△ Less
Submitted 18 June, 2019;
originally announced June 2019.
-
Making View Update Strategies Programmable - Toward Controlling and Sharing Distributed Data -
Authors:
Yasuhito Asano,
Soichiro Hidaka,
Zhenjiang Hu,
Yasunori Ishihara,
Hiroyuki Kato,
Hsiang-Shang Ko,
Keisuke Nakano,
Makoto Onizuka,
Yuya Sasaki,
Toshiyuki Shimizu,
Van-Dang Tran,
Kanae Tsushima,
Masatoshi Yoshikawa
Abstract:
Views are known mechanisms for controlling access of data and for sharing data of different schemas. Despite long and intensive research on views in both the database community and the programming language community, we are facing difficulties to use views in practice. The main reason is that we lack ways to directly describe view update strategies to deal with the inherent ambiguity of view updat…
▽ More
Views are known mechanisms for controlling access of data and for sharing data of different schemas. Despite long and intensive research on views in both the database community and the programming language community, we are facing difficulties to use views in practice. The main reason is that we lack ways to directly describe view update strategies to deal with the inherent ambiguity of view updating. This paper aims to provide a new language-based approach to controlling and sharing distributed data based on views, and establish a software foundation for systematic construction of such data management systems. Our key observation is that a view should be defined through a view update strategy rather than a view definition. We show that Datalog can be used for specifying view update strategies whose unique view definition can be automatically derived, present a novel P2P-based programmable architecture for distributed data management where updatable views are fully utilized for controlling and sharing distributed data, and demonstrate its usefulness through the development of a privacy-preserving ride-sharing alliance system.
△ Less
Submitted 27 September, 2018;
originally announced September 2018.
-
Online Learning for Position-Aided Millimeter Wave Beam Training
Authors:
Vutha Va,
Takayuki Shimizu,
Gaurav Bansal,
Robert W. Heath Jr
Abstract:
Accurate beam alignment is essential for beam-based millimeter wave communications. Conventional beam sweeping solutions often have large overhead, which is unacceptable for mobile applications like vehicle-to-everything. Learning-based solutions that leverage sensor data like position to identify good beam directions are one approach to reduce the overhead. Most existing solutions, though, are su…
▽ More
Accurate beam alignment is essential for beam-based millimeter wave communications. Conventional beam sweeping solutions often have large overhead, which is unacceptable for mobile applications like vehicle-to-everything. Learning-based solutions that leverage sensor data like position to identify good beam directions are one approach to reduce the overhead. Most existing solutions, though, are supervised-learning where the training data is collected beforehand. In this paper, we use a multi-armed bandit framework to develop online learning algorithms for beam pair selection and refinement. The beam pair selection algorithm learns coarse beam directions in some predefined beam codebook, e.g., in discrete angles separated by the 3dB beamwidths. The beam refinement fine-tunes the identified directions to match the peak of the power angular spectrum at that position. The beam pair selection uses the upper confidence bound (UCB) with a newly proposed risk-aware feature, while the beam refinement uses a modified optimistic optimization algorithm. The proposed algorithms learn to recommend good beam pairs quickly. When using 16x16 arrays at both the transmitter and receiver, it can achieve on average 1dB gain over the exhaustive search (over 271x271 beam pairs) on the unrefined codebook within 100 time-steps with a training budget of only 30 beam pairs.
△ Less
Submitted 12 January, 2019; v1 submitted 9 September, 2018;
originally announced September 2018.
-
A View-based Programmable Architecture for Controlling and Integrating Decentralized Data
Authors:
Yasuhito Asano,
Soichiro Hidaka,
Zhenjiang Hu,
Yasunori Ishihara,
Hiroyuki Kato,
Hsiang-Shang Ko,
Keisuke Nakano,
Makoto Onizuka,
Yuya Sasaki,
Toshiyuki Shimizu,
Kanae Tsushima,
Masatoshi Yoshikawa
Abstract:
The view and the view update are known mechanism for controlling access of data and for integrating data of different schemas. Despite intensive and long research on them in both the database community and the programming language community, we are facing difficulties to use them in practice. The main reason is that we are lacking of control over the view update strategy to deal with inherited amb…
▽ More
The view and the view update are known mechanism for controlling access of data and for integrating data of different schemas. Despite intensive and long research on them in both the database community and the programming language community, we are facing difficulties to use them in practice. The main reason is that we are lacking of control over the view update strategy to deal with inherited ambiguity of view update for a given view.
This vision paper aims to provide a new language-based approach to controlling and integrating decentralized data based on the view, and establish a software foundation for systematic construction of such data management systems. Our key observation is that a view should be defined through a view update strategy rather than a query. In other words, the view definition should be extracted from the view update strategy, which is in sharp contrast to the traditional approaches where the view update strategy is derived from the view definition.
In this paper, we present the first programmable architecture with a declarative language for specifying update strategies over views, whose unique view definition can be automatically derived, and show how it can be effectively used to control data access, integrate data generally allowing coexistence of GAV (global as view) and LAV (local as view), and perform both analysis and updates on the integrated data. We demonstrate its usefulness through development of a privacy-preserving ride-sharing alliance system, discuss its application scope, and highlight future challenges.
△ Less
Submitted 18 March, 2018;
originally announced March 2018.
-
Inverse Multipath Fingerprinting for Millimeter Wave V2I Beam Alignment
Authors:
Vutha Va,
Junil Choi,
Takayuki Shimizu,
Gaurav Bansal,
Robert W. Heath Jr
Abstract:
Efficient beam alignment is a crucial component in millimeter wave systems with analog beamforming, especially in fast-changing vehicular settings. This paper proposes a position-aided approach where the vehicle's position (e.g., available via GPS) is used to query the multipath fingerprint database, which provides prior knowledge of potential pointing directions for reliable beam alignment. The a…
▽ More
Efficient beam alignment is a crucial component in millimeter wave systems with analog beamforming, especially in fast-changing vehicular settings. This paper proposes a position-aided approach where the vehicle's position (e.g., available via GPS) is used to query the multipath fingerprint database, which provides prior knowledge of potential pointing directions for reliable beam alignment. The approach is the inverse of fingerprinting localization, where the measured multipath signature is compared to the fingerprint database to retrieve the most likely position. The power loss probability is introduced as a metric to quantify misalignment accuracy and is used for optimizing candidate beam selection. Two candidate beam selection methods are developed, where one is a heuristic while the other minimizes the misalignment probability. The proposed beam alignment is evaluated using realistic channels generated from a commercial ray-tracing simulator. Using the generated channels, an extensive investigation is provided, which includes the required measurement sample size to build an effective fingerprint, the impact of measurement noise, the sensitivity to changes in traffic density, and beam alignment overhead comparison with IEEE 802.11ad as the baseline. Using the concept of beam coherence time, which is the duration between two consecutive beam alignments, and parameters of IEEE 802.11ad, the overhead is compared in the mobility context. The results show that while the proposed approach provides increasing rates with larger antenna arrays, IEEE 802.11ad has decreasing rates due to the larger beam training overhead that eats up a large portion of the beam coherence time, which becomes shorter with increasing mobility.
△ Less
Submitted 17 September, 2017; v1 submitted 16 May, 2017;
originally announced May 2017.
-
On the distance preserving trees in graphs
Authors:
Toru Araki,
Shingo Osawa,
Takashi Shimizu
Abstract:
For a vertex $v$ of a graph $G$, a spanning tree $T$ of $G$ is distance-preserving from $v$ if, for any vertex $w$, the distance from $v$ to $w$ on $T$ is the same as the distance from $v$ to $w$ on $G$. If two vertices $u$ and $v$ are distinct, then two distance-preserving spanning trees $T_{u}$ from $u$ and $T_{v}$ from $v$ are distinct in general. A purpose of this paper is to give a characteri…
▽ More
For a vertex $v$ of a graph $G$, a spanning tree $T$ of $G$ is distance-preserving from $v$ if, for any vertex $w$, the distance from $v$ to $w$ on $T$ is the same as the distance from $v$ to $w$ on $G$. If two vertices $u$ and $v$ are distinct, then two distance-preserving spanning trees $T_{u}$ from $u$ and $T_{v}$ from $v$ are distinct in general. A purpose of this paper is to give a characterization for a given weighted graph $G$ to have a spanning tree $T$ such that $T$ is a distance-preserving spanning tree from distinct two vertices.
△ Less
Submitted 23 July, 2014;
originally announced July 2014.
-
A Formal Verification Methodology for Checking Data Integrity
Authors:
Yasushi Umezawa,
Takeshi Shimizu
Abstract:
Formal verification techniques have been playing an important role in pre-silicon validation processes. One of the most important points considered in performing formal verification is to define good verification scopes; we should define clearly what to be verified formally upon designs under tests. We considered the following three practical requirements when we defined the scope of formal veri…
▽ More
Formal verification techniques have been playing an important role in pre-silicon validation processes. One of the most important points considered in performing formal verification is to define good verification scopes; we should define clearly what to be verified formally upon designs under tests. We considered the following three practical requirements when we defined the scope of formal verification. They are (a) hard to verify (b) small to handle, and (c) easy to understand. Our novel approach is to break down generic properties for system into stereotype properties in block level and to define requirements for Verifiable RTL. Consequently, each designer instead of verification experts can describe properties of the design easily, and formal model checking can be applied systematically and thoroughly to all the leaf modules. During the development of a component chip for server platforms, we focused on RAS (Reliability, Availability, and Serviceability) features and described more than 2000 properties in PSL. As a result of the formal verification, we found several critical logic bugs in a short time with limited resources, and successfully verified all of them. This paper presents a study of the functional verification methodology.
△ Less
Submitted 25 October, 2007;
originally announced October 2007.