Search Results - "Iwashita, Hiroaki"

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Graphillion: software library for very large sets of labeled graphs by Inoue, Takeru, Iwashita, Hiroaki, Kawahara, Jun, Minato, Shin-ichi

    “…Several graph libraries have been developed in the past few decades, and they were basically designed to work with a few graphs. However, there are many…”
    Get full text
    Journal Article
  2. 2

    Finding All Solutions and Instances of Numberlink and Slitherlink by ZDDs by Yoshinaka, Ryo, Saitoh, Toshiki, Kawahara, Jun, Tsuruma, Koji, Iwashita, Hiroaki, Minato, Shin-ichi

    Published in Algorithms (01-06-2012)
    “…Link puzzles involve finding paths or a cycle in a grid that satisfy given local and global properties. This paper proposes algorithms that enumerate solutions…”
    Get full text
    Journal Article
  3. 3

    Continuous Tensor Relaxation for Finding Diverse Solutions in Combinatorial Optimization Problems by Ichikawa, Yuma, Iwashita, Hiroaki

    Published 03-02-2024
    “…Finding the best solution is a common objective in combinatorial optimization (CO). In practice, directly handling constraints is often challenging,…”
    Get full text
    Journal Article
  4. 4

    Agent-based simulation analysis for security planning based on structures of urban road networks by Goto, Akinobu, Takahashi, Shingo, Ohori, Kotaro, Yamane, Shohei, Iwashita, Hiroaki, Anai, Hirokazu

    Published in 2016 Winter Simulation Conference (WSC) (01-12-2016)
    “…This paper proposes an agent-based simulation to analyze the effective resource allocation strategies for patrolling and inspection in consideration of urban…”
    Get full text
    Conference Proceeding
  5. 5

    Rule Mining for Correcting Classification Models by Suzuki, Hirofumi, Iwashita, Hiroaki, Takagi, Takuya, Fujishige, Yuta, Hara, Satoshi

    “…Machine learning models need to be continually updated or corrected to ensure that the prediction accuracy remains consistently high. In this study, we…”
    Get full text
    Conference Proceeding
  6. 6

    Rule Mining for Correcting Classification Models by Suzuki, Hirofumi, Iwashita, Hiroaki, Takagi, Takuya, Fujishige, Yuta, Hara, Satoshi

    Published 10-10-2023
    “…Machine learning models need to be continually updated or corrected to ensure that the prediction accuracy remains consistently high. In this study, we…”
    Get full text
    Journal Article
  7. 7

    Efficient Constrained Pattern Mining Using Dynamic Item Ordering for Explainable Classification by Iwashita, Hiroaki, Takagi, Takuya, Suzuki, Hirofumi, Goto, Keisuke, Ohori, Kotaro, Arimura, Hiroki

    Published 16-04-2020
    “…Learning of interpretable classification models has been attracting much attention for the last few years. Discovery of succinct and contrasting patterns that…”
    Get full text
    Journal Article
  8. 8

    Effect of human body shadowing on UWB radio channel by Sasaki, Eriko, Hanaki, Hidenobu, Iwashita, Hiroaki, Naiki, Kazuki, Kajiwara, Akihiro

    “…A body area network has recently attracted attentions which is a UWB based wireless network of wearable devices. The device may be surface-mounted on the body…”
    Get full text
    Conference Proceeding
  9. 9

    Forward model checking techniques oriented to buggy designs by Iwashita, Hiroaki, Nakata, Tsuneo

    “…Forward model checking is an efficient symbolic model checking method for verifying realistic properties of sequential circuits and protocols. We present the…”
    Get full text
    Conference Proceeding Journal Article
  10. 10

    Forward model checking techniques oriented to buggy designs by Iwashita, Hiroaki, Nakata, Tsuneo

    “…Forward model checking is an efficient symbolic model checking method for verifying realistic properties of sequential circuits and protocols. In this paper,…”
    Get full text
    Conference Proceeding
  11. 11

    CTL model checking based on forward state traversal by Iwashita, Hiroaki, Nakata, Tsuneo, Hirose, Fumiyasu

    “…We present a CTL model checking algorithm based mainly on forward state traversal, which can check many realistic CTL properties without doing backward state…”
    Get full text
    Conference Proceeding
  12. 12