
Deep CNN Denoiser and Multilayer Neighbor Component Embedding for Face Hallucination
Most of the current face hallucination methods, whether they are shallow...
read it

Stochastic variance reduced multiplicative update for nonnegative matrix factorization
Nonnegative matrix factorization (NMF), a dimensionality reduction and f...
read it

SGDLibrary: A MATLAB library for stochastic gradient descent algorithms
We consider the problem of finding the minimizer of a function f: R^d →R...
read it

Fast online lowrank tensor subspace tracking by CP decomposition using recursive least squares from incomplete observations
We consider the problem of online subspace tracking of a partially obser...
read it

Scene Text Eraser
The character information in natural scene images contains various perso...
read it

Riemannian stochastic quasiNewton algorithm with variance reduction and its convergence analysis
Stochastic variance reduction algorithms have recently become popular fo...
read it

Riemannian stochastic variance reduced gradient
Stochastic variance reduction algorithms have recently become popular fo...
read it

Sparse principal component regression for generalized linear models
Principal component regression (PCR) is a widely used twostage procedur...
read it

Implementing Efficient All Solutions SAT Solvers
All solutions SAT (AllSAT for short) is a variant of propositional satis...
read it

Network Volume Anomaly Detection and Identification in Largescale Networks based on Online Timestructured Traffic Tensor Tracking
This paper addresses network anomography, that is, the problem of inferr...
read it

Duration and Interval Hidden Markov Model for Sequential Data Analysis
Analysis of sequential event data has been recognized as one of the esse...
read it

Lowrank tensor completion: a Riemannian manifold preconditioning approach
We propose a novel Riemannian manifold preconditioning approach for the ...
read it

Bayesian Image Restoration for Poisson Corrupted Image using a Latent Variational Method with Gaussian MRF
We treat an image restoration problem with a Poisson noise chan nel usi...
read it

Approximately Stable Matchings with Budget Constraints
This paper considers twosided matching with budget constraints where on...
read it

SpaceEfficient Algorithms for Longest Increasing Subsequence
Given a sequence of integers, we want to find a longest increasing subse...
read it

Rectilinear Link Diameter and Radius in a Rectilinear Polygonal Domain
We study the computation of the diameter and radius under the rectilinea...
read it

On the optimality and sharpness of Laguerre's lower bound on the smallest eigenvalue of a symmetric positive definite matrix
Lower bounds on the smallest eigenvalue of a symmetric positive definite...
read it

Information Theoretic Security for SideChannel Attacks to the Shannon Cipher System
We study sidechannel attacks for the Shannon cipher system. To pose sid...
read it

Parameterized (Approximate) Defective Coloring
In Defective Coloring we are given a graph G = (V, E) and two integers χ...
read it

VariableLength Resolvability for Mixed Sources and its Application to VariableLength Source Coding
In the problem of variablelength δchannel resolvability, the channel o...
read it

A Neurobiologically Motivated Analysis of Distributional Semantic Models
The pervasive use of distributional semantic models or word embeddings i...
read it

How Bad is the Freedom to FloodIt?
FixedFloodIt and FreeFloodIt are combinatorial problems on graphs th...
read it

ContextPatch Face Hallucination Based on Thresholding Localityconstrained Representation and Reproducing Learning
Face hallucination is a technique that reconstruct highresolution (HR) ...
read it

McTorch, a manifold optimization library for deep learning
In this paper, we introduce McTorch, a manifold optimization library for...
read it

A Generative Model of Textures Using Hierarchical Probabilistic Principal Component Analysis
Modeling of textures in natural images is an important task to make a mi...
read it

DNNbased Source Enhancement to Increase Objective Sound Quality Assessment Score
We propose a training method for deep neural network (DNN)based source ...
read it

Divergence radii and the strong converse exponent of classicalquantum channel coding with constant compositions
There are different inequivalent ways to define the Rényi mutual informa...
read it

SideChannel Attacks to Broadcasting of Encrypted Sources Using Correlated Keys
We consider the secure communication problem for broadcasting of two enc...
read it

Adaptive stochastic gradient algorithms on Riemannian manifolds
Adaptive stochastic gradient algorithms in the Euclidean space have attr...
read it

Identification, Secrecy, Template, and PrivacyLeakage of Biometric Identification System under Noisy Enrollment
In this study, we investigate fundamental tradeoff among identification...
read it

Riemannian joint dimensionality reduction and dictionary learning on symmetric positive definite manifold
Dictionary leaning (DL) and dimensionality reduction (DR) are powerful t...
read it

Modulating Fine Roughness Perception of Vibrotactile Textured Surface using Pseudohaptic Effect
Playing back vibrotactile signals through actuators is commonly used to ...
read it

Fast Bayesian Restoration of Poisson Corrupted Images with INLA
Photonlimited images are often seen in fields such as medical imaging. ...
read it

New Converse Bounds for Discrete Memoryless Channels in the Finite Blocklength Regime
We study the determination problem of the channel capacity for the discr...
read it

Presenting Static Friction Sensation at Stickslip Transition using Pseudohaptic Effect
Previous studies have aimed at creating a simple hardware implementation...
read it

Independent Set Reconfiguration Parameterized by ModularWidth
Independent Set Reconfiguration is one of the most wellstudied problems...
read it

Fundamental Limits of Identification System With Secret Binding Under Noisy Enrollment
We investigate fundamental limits among identification, secrecy, templat...
read it

Ensemble SuperResolution with A Reference Dataset
By developing sophisticated image priors or designing deep(er) architect...
read it

Subgraph Isomorphism on Graph Classes that Exclude a Substructure
We study Subgraph Isomorphism on graph classes defined by a fixed forbid...
read it

Riemannian optimization on the simplex of positive definite matrices
We discuss optimizationrelated ingredients for the Riemannian manifold ...
read it

Shortest Reconfiguration of Perfect Matchings via Alternating Cycles
Motivated by adjacency in perfect matching polytopes, we study the short...
read it

Approximately Stable Matchings with General Constraints
This paper focuses on twosided matching where one side (a hospital or f...
read it

An analog of the Sinc approximation for periodic functions
In this paper, we propose an interpolation formula for periodic function...
read it

A numerical method of computing oscillatory integral related to hyperfunction theory
In this paper, we propose a numerical method of computing an integral wh...
read it

A numerical method for Hadamard finitepart integrals with an integral power singularity at an endpoint
In this paper, we propose a numerical method for computing Hadamard fini...
read it

Numerical method for computing Hadamard finitepart integrals with a nonintegral power singularity at an endpoint
In this paper, we propose a numerical method of computing a Hadamard fin...
read it

A numerical method of computing Hadamard finitepart integrals with an integral power singularity at the endpoint on a half infinite interval
In this paper, we propose a numerical method of computing Hadamard finit...
read it

Numerical method of computing Hadamard finitepart integrals with a nonintegral power singularity at the endpoint over a half infinite interval
In this paper, we propose a numerical method of computing an Hadamard fi...
read it

Wiretap channels with causal state information: revisited
The coding problem for wiretap channels with causal channel state inform...
read it

Fundamental Limits of Biometric Identification Systems with Strong Secrecy
The fundamental limits of biometric identification systems under a stron...
read it
University of ElectroCommunications
The University of ElectroCommunications is a national university in the city of Chōfu, Tokyo, Japan.