研究者業績

照山 順一

テルヤマ ジュンイチ  (Junichi Teruyama)

基本情報

所属
兵庫県立大学 大学院情報科学研究科 / 社会情報科学部 准教授
学位
博士(情報学)(京都大学)

J-GLOBAL ID
201501012835216114
researchmap会員ID
B000249401

論文

 35
  • Takehiro Ito, Jun Kawahara, Yu Nakahata, Takehide Soh, Akira Suzuki, Junichi Teruyama, Takahisa Toda
    CPAIOR 2023年5月  査読有り
  • Yuya Higashikawa, Naoki Katoh, Guohui Lin, Eiji Miyano, Suguru Tamaki, Junichi Teruyama, Binhai Zhu
    FCT 262-275 2023年  
  • Sergey Bereg, Yuya Higashikawa, Naoki Katoh, Junichi Teruyama, Yuki Tokuni, Binhai Zhu
    COCOON (1) 220-231 2023年  
  • Yuya Higashikawa, Ayano Nishii, Junichi Teruyama, Yuki Tokuni
    COCOON (1) 155-167 2023年  
  • Yuya Higashikawa, Naoki Katoh, Junichi Teruyama, Yuki Tokuni
    COCOA (1) 29-42 2023年  
  • Takehiro Ito, Jun Kawahara, Yu Nakahata, Takehide Soh, Akira Suzuki, Junichi Teruyama, Takahisa Toda
    CPAIOR 167-183 2023年  査読有り
  • MAKITA Tomu, NAGAO Atsuki, OKADA Tatsuki, SETO Kazuhisa, TERUYAMA Junichi
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E105.A(9) 1298-1308 2022年9月1日  査読有り
    A branching program is a well-studied model of computation and a representation for Boolean functions. It is a directed acyclic graph with a unique root node, some accepting nodes, and some rejecting nodes. Except for the accepting and rejecting nodes, each node has a label with a variable and each outgoing edge of the node has a label with a 0/1 assignment of the variable. The satisfiability problem for branching programs is, given a branching program with n variables and m nodes, to determine if there exists some assignment that activates a consistent path from the root to an accepting node. The width of a branching program is the maximum number of nodes at any level. The satisfiability problem for width-2 branching programs is known to be NP-complete. In this paper, we present a satisfiability algorithm for width-2 branching programs with n variables and cn nodes, and show that its running time is poly(n)·2(1-µ(c))n, where µ(c)=1/2O(c log c). Our algorithm consists of two phases. First, we transform a given width-2 branching program to a set of some structured formulas that consist of AND and Exclusive-OR gates. Then, we check the satisfiability of these formulas by a greedy restriction method depending on the frequency of the occurrence of variables.
  • Robert Benkoczi, Binay Bhattacharya, Yuya Higashikawa, Tsunehiko Kameda, Naoki Katoh, Junichi Teruyama
    21st Symposium on Algorithmic Approaches for Transportation Modelling, Optimization, and Systems(ATMOS) 13-19 2021年  査読有り
  • Yuya Higashikawa, Naoki Katoh, Junichi Teruyama, Koji Watase
    Theoretical Computer Science 873 87-113 2021年  査読有り
  • Tetsuya Fujie, Yuya Higashikawa, Naoki Katoh, Junichi Teruyama, Yuki Tokuni
    WALCOM: Algorithms and Computation - 15th International Conference and Workshops(WALCOM) 52-64 2021年  査読有り
  • Tetsuya Fujie, Yuya Higashikawa, Naoki Katoh, Junichi Teruyama, Yuki Tokuni
    CoRR abs/2011.13569 2020年  
  • Yuya Higashikawa, Naoki Katoh, Junichi Teruyama, Koji Watase
    CoRR abs/2010.05729 2020年  
  • Yuya Higashikawa, Naoki Katoh, Junichi Teruyama, Koji Watase
    Combinatorial Optimization and Applications - 14th International Conference(COCOA) 198-213 2020年  査読有り
  • Kazuo Iwama, Junichi Teruyama
    Theor. Comput. Sci. 807 201-219 2020年  査読有り
  • Atsuki Nagao, Kazuhisa Seto, Junichi Teruyama
    Theory Comput. Syst. 64(8) 1392-1407 2020年  査読有り
  • Yutaro Honda, Yoshitaka Inoue, Hiro Ito, Munehiko Sasajima, Junichi Teruyama, Yushi Uno
    The Review of Socionetwork Strategies 13(2) 123-141 2019年10月  査読有り
  • Yuya Higashikawa, Naoki Katoh, Guohui Lin, Eiji Miyano, Suguru Tamaki, Junichi Teruyama, Binhai Zhu
    CoRR abs/1910.01753 2019年  
  • Takayuki Sakai, Kazuhisa Seto, Suguru Tamaki, Junichi Teruyama
    J. Comput. Syst. Sci. 105 87-103 2019年  査読有り
  • Shogo Ehara, Kazuo Iwama, Junichi Teruyama
    Adventures Between Lower Bounds and Higher Altitudes - Essays Dedicated to Juraj Hromkovič on the Occasion of His 60th Birthday 280-296 2018年  査読有り
  • Atsuki Nagao, Kazuhisa Seto, Junichi Teruyama
    Algorithmica 80(10) 2725-2741 2018年  査読有り
  • Takayuki Sakai, Kazuhisa Seto, Suguru Tamaki, Junichi Teruyama
    THEORETICAL COMPUTER SCIENCE 697 58-68 2017年10月  査読有り
    We present improved exponential time exact algorithms for Max SAT. Our algorithms run in time of the form 0 (2((1-mu(c))n)) for instances with n variables and m = cn clauses. In this setting, there are three incomparable currently best algorithms: a deterministic exponential space algorithm with mu(c) = 1/o(clog c) due to Dantsin and Wolpert (2006) [9], a randomized l3c) polynomial space algorithm with mu(c) =1/o(clog(3) c) and a deterministic polynomial space algorithm with it mu(c) = 1/(c(2) log(2) c) due to Sakai, Seto and Tamaki (2015) [30]. Our first result is a deterministic polynomial space algorithm with mu(c) = 1/o(clog c) that achieves the previous best time complexity without exponential space or randomization. Furthermore, this algorithm can handle instances with exponentially large weights and hard constraints. The previous algorithms and our deterministic polynomial space algorithm run super-polynomially faster than 2(n) only if m = O(n(2)). Our second results are deterministic exponential space algorithms for Max SAT with mu(c) =1/o((c log c)(2/3)) and for Max 3-SAT with mu(c) = 1/o(c(1/2)) that run super-polynomially faster than 2n when m = o(n(5/2)/log(5/2) n) and m = o(n(3)/ log(2) n) respectively. Our third result is a randomized exponential space algorithm for Max SAT with mu(c) = 1/o(c(1/2) log(3/2) c) that run super-polynomially faster than 2n when m = o(n(3)/ log(5) n). (C) 2017 Elsevier B.V. All rights reserved.
  • Kazuo Iwama, Junichi Teruyama
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10389 485-496 2017年  査読有り
    This paper studies the average complexity on the number of comparisons for sorting algorithms. Its information-theoretic lower bound is n lg n − 1.4427n + O(log n). For many efficient algorithms, the first n lg n term is easy to achieve and our focus is on the (negative) constant factor of the linear term. The current best value is −1.3999 for the MergeInsertion sort. Our new value is −1.4106, narrowing the gap by some 25%. An important building block of our algorithm is “twoelement insertion,” which inserts two numbers A and B, A &lt B, into a sorted sequence T. This insertion algorithm is still sufficiently simple for rigorous mathematical analysis and works well for a certain range of the length of T for which the simple binary insertion does not, thus allowing us to take a complementary approach with the binary insertion.
  • Atsuki Nagao, Kazuhisa Seto, Junichi Teruyama
    28th International Symposium on Algorithms and Computation, ISAAC 2017, December 9-12, 2017, Phuket, Thailand 58-10 2017年  査読有り
  • Kazuhisa Seto, Junichi Teruyama
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES E99A(6) 1019-1024 2016年6月  査読有り
    We propose an exact algorithm to determine the satisfiability of oblivious read-twice branching programs. Our algorithm runs in 2(1-Omega(1/log c))n time for instances with n variables and cn nodes.
  • Takayuki Sakai, Kazuhisa Seto, Suguru Tamaki, Junichi Teruyama
    41st International Symposium on Mathematical Foundations of Computer Science, MFCS 2016, August 22-26, 2016 - Kraków, Poland 82-16 2016年  査読有り
  • Atsuki Nagao, Kazuhisa Seto, Junichi Teruyama
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS E98D(10) 1736-1743 2015年10月  査読有り
    We propose efficient algorithms for Sorting k-Sets in Bins. The Sorting k-Sets in Bins problem can be described as follows. We are given numbered n bins with k balls in each bin. Balls in the i-th bin are numbered n-i+1. We can only swap balls between adjacent bins. Our task is to move all of the balls to the same numbered bins. For this problem, we give an efficient greedy algorithm with k+1/4 n(2) + O(k + n) swaps and provide a detailed analysis for k = 3. In addition, we give a more efficient recursive algorithm using 15/16 n(2) + O(n) swaps for k = 3.
  • Takayuki Sakai, Kazuhisa Seto, Suguru Tamaki, Junichi Teruyama
    Electronic Colloquium on Computational Complexity (ECCC) 22 136-136 2015年  査読有り
  • Takayuki Sakai, Kazuhisa Seto, Suguru Tamaki, Junichi Teruyama
    10th International Symposium on Parameterized and Exact Computation, IPEC 2015, September 16-18, 2015, Patras, Greece 90-101 2015年  査読有り
  • Atsuki Nagao, Kazuhisa Seto, Junichi Teruyama
    Algorithms and Data Structures - 14th International Symposium, WADS 2015, Victoria, BC, Canada, August 5-7, 2015. Proceedings 554-565 2015年  査読有り
  • Atsuki Nagao, Kazuhisa Seto, Junichi Teruyama
    ALGORITHMS AND COMPUTATION, WALCOM 2014 8344 225-236 2014年  査読有り
    We give efficient algorithms for Sorting k-Sets in Bins. The Sorting k-Sets in Bins problem can be described as follows: We are given numbered n bins with k balls in each bin. Balls in the i-th bin are numbered n - i + 1. We can only swap balls between adjacent bins. How many swaps are needed to move all balls to the same numbered bins. For this problem, we design an efficient greedy algorithm with k+1/4n(2) + O(kn) swaps. As k and n increase, this approaches the lower bound of inverted right perpendicular((kn)(2))/(2k-1)inverted left perpendicular. In addition, we design a more efficient recursive algorithm using 15/16n(2) + O(n) swaps for the k = 3 case.
  • Kazuo Iwama, Harumichi Nishimura, Rudy Raymond, Junichi Teruyama
    THEORETICAL COMPUTER SCIENCE 456 51-64 2012年10月  査読有り
    The counterfeit coin problem requires us to find all false coins from a given bunch of coins using a balance scale. We assume that the balance scale gives us only "balanced" or "tilted" information and that we know the number k of false coins in advance. The balance scale can be modeled by a certain type of oracle and its query complexity is a measure for the cost of weighing algorithms (the number of weighings). In this paper, we study the quantum query complexity for this problem. Let Q(k, N) be the quantum query complexity of finding all k false coins from the N given coins. We show that for any k and N such that k < N/2, Q(k, N) = O(k(1/4)), contrasting with the classical query complexity, Omega (k log(N/k)), that depends on N. So our quantum algorithm achieves a quartic speed-up for this problem. We do not have a matching lower bound, but we show some evidence that the upper bound is tight: any algorithm, including our algorithm, that satisfies certain properties needs Omega(k(1/4)) queries. (C) 2012 Elsevier B.V. All rights reserved.
  • Hiro Ito, Junichi Teruyama, Yuichi Yoshida
    Progress in Informatics (9) 3-7 2012年3月  査読有り
  • Richard Cleve, Kazuo Iwama, François Le Gall, Harumichi Nishimura, Seiichiro Tani, Junichi Teruyama, Shigeru Yamashita
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 7357 388-397 2012年  査読有り
    This paper investigates the number of quantum queries made to solve the problem of reconstructing an unknown string from its substrings in a certain query model. More concretely, the goal of the problem is to identify an unknown string S by making queries of the following form: "Is s a substring of S?", where s is a query string over the given alphabet. The number of queries required to identify the string S is the query complexity of this problem. First we show a quantum algorithm that exactly identifies the string S with at most queries, where N is the length of S. This contrasts sharply with the classical query complexity N. Our algorithm uses Skiena and Sundaram's classical algorithm and the Grover search as subroutines. To make them effectively work, we develop another subroutine that finds a string appearing only once in S, which may have an independent interest. We also prove two lower bounds. The first one is a general lower bound of , which means we cannot achieve a query complexity of O(N 1∈-∈ε ) for any constant ε. The other one claims that if we cannot use queries of length roughly between logN and 3 logN, then we cannot achieve a query complexity of any sublinear function in N. © 2012 Springer-Verlag.
  • Kazuo Iwama, Harumichi Nishimura, Rudy Raymond, Junichi Teruyama
    CoRR abs/1009.0416 2010年  査読有り
  • Kazuo Iwama, Harumichi Nishimura, Rudy Raymond, Junichi Teruyama
    ALGORITHMS AND COMPUTATION, PT I 6506 85-+ 2010年  査読有り
    The counterfeit coin problem requires us to find all false coins from a given bunch of coins using a balance scale. We assume that the balance scale gives us only "balanced" or "tilted" information and that we know the number k of false coins in advance. The balance scale can be modeled by a certain type of oracle and its query complexity is a measure for the cost of weighing algorithms (the number of weighings). In this paper, we study the quantum query complexity for this problem. Let Q(k, N) be the quantum query complexity of finding all k false coins from the N given coins. We show that for any k and N such that k < N/2, Q(k, N) = O(k(1/4)), contrasting with the classical query complexity, Omega(k log(N/k)), that depends on N. So our quantum algorithm achieves a quartic speed-up for this problem. We do not have a matching lower bound, but we show some evidence that the upper bound is tight: any algorithm, including our algorithm, that satisfies certain properties needs Omega(k(1/4)) queries.

MISC

 19

担当経験のある科目(授業)

 7

共同研究・競争的資金等の研究課題

 7