Updated on 2024/10/02

写真a

 
MORI Ryuhei
 
Organization
Graduate School of Mathematics Division of Mathematics Advanced Topology Associate professor
Graduate School
Graduate School of Mathematics
Undergraduate School
School of Science Department of Mathematics
Title
Associate professor
External link

Degree 3

  1. Doctor of Informatics ( 2013.3   Kyoto University ) 

  2. Master of Informatics ( 2010.3   Kyoto University ) 

  3. Bachelor(Technology) ( 2008.3   Tokyo Institute of Technology ) 

Research History 6

  1. Nagoya University   Graduate School of Mathematics   Associate professor

    2023.4

      More details

  2. 科学技術振興機構   さきがけ研究者 (兼任)

    2018.10 - 2022.3

      More details

  3. Tokyo Institute of Technology   School of Computing   Assistant Professor

    2016.4 - 2023.3

      More details

  4. Tokyo Institute of Technology   Graduate Schoolf of Information Sciencd and Engineering   Assistant Professor

    2015.1 - 2016.3

      More details

  5. Tokyo Institute of Technology   Graduate Schoolf of Information Sciencd and Engineering   Research Fellow

    2013.4 - 2014.12

      More details

  6. Kyoto University   Graduate School of Informatics   JSPS Research Fellowship for Young Scientists

    2010.4 - 2013.3

      More details

▼display all

Education 3

  1. Kyoto University   Graduate School of Informatics   Department of Systems Science, Doctoral course

    2010.4 - 2013.3

      More details

  2. Kyoto University   Graduate School of Informatics   Department of Systems Science, Master course

    2008.4 - 2010.3

      More details

  3. Tokyo Institute of Technology   School of Engineering   Department of Computer Science

    2000.4 - 2008.3

      More details

Awards 2

  1. Ericsson Best Student Award

    2012.11   Ericsson Japan  

    Ryuhei Mori

     More details

  2. Society of Information Theory and its Applications Encouragement Award

    2010.12   Society of Information Theory and its Applications  

    Ryuhei Mori

     More details

 

Papers 29

  1. Parameterized Quantum Query Algorithms for Graph Problems Reviewed

    Tatsuya Terao, Ryuhei Mori

    Proceedings of 32nd Annual European Symposium on Algorithms (ESA 2024). Leibniz International Proceedings in Informatics (LIPIcs)   Vol. 308   page: 99:1 - 99:16   2024.9

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.4230/LIPIcs.ESA.2024.99

    researchmap

  2. Quantum Algorithm for Higher-Order Unconstrained Binary Optimization and MIMO Maximum Likelihood Detection Reviewed

    Masaya Norimoto, Ryuhei Mori, Naoki Ishikawa

    IEEE Transactions on Communications   Vol. 71 ( 4 ) page: 1926 - 1939   2023.4

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/TCOMM.2023.3244924

    researchmap

  3. Exponential-Time Quantum Algorithms for Graph Coloring Problems Invited Reviewed

    Kazuya Shimizu, Ryuhei Mori

    Algorithmica   Vol. 84 ( 12 ) page: 3603 - 3621   2022.12

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Springer Science and Business Media LLC  

    Abstract

    The fastest known classical algorithm deciding the k-colorability of n-vertex graph requires running time $$\varOmega (2^n)$$ for $$k\ge 5$$. In this work, we present an exponential-space quantum algorithm computing the chromatic number with running time $$O(1.9140^n)$$ using quantum random access memory (QRAM). Our approach is based on Ambainis et al’s quantum dynamic programming with applications of Grover’s search to branching algorithms. We also present a polynomial-space quantum algorithm not using QRAM for the graph 20-coloring problem with running time $$O(1.9575^n)$$. For the polynomial-space quantum algorithm, we essentially develop $$(4-\epsilon )^n$$-time classical algorithms that can be improved quadratically by Grover’s search.

    DOI: 10.1007/s00453-022-00976-2

    researchmap

    Other Link: https://link.springer.com/article/10.1007/s00453-022-00976-2/fulltext.html

  4. Quantum supremacy and hardness of estimating output probabilities of quantum circuits Reviewed International coauthorship

    Yasuhiro Kondo, Ryuhei Mori, Ramis Movassagh

    2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS)     page: 1296 - 1307   2022.2

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/focs52979.2021.00126

    researchmap

  5. Quantum Speedups for Dynamic Programming on n-Dimensional Lattice Graphs Reviewed International coauthorship

    Adam Glos, Martins Kokainis, Ryuhei Mori, Jevgēnijs Vihrovs

    Proceedings of 46th International Symposium on Mathematical Foundations of Computer Science (MFCS 2021), LIPIcs   Vol. 202   page: 50:1 - 50:23   2021.8

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.4230/LIPIcs.MFCS.2021.50

    researchmap

  6. A simple and fast algorithm for computing the N-th term of a linearly recurrent sequence Reviewed

    Alin Bostan, Ryuhei Mori

    Proceedings of SIAM Symposium on Simplicity in Algorithms (SOSA21)     page: 118 - 132   2021.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  7. Exponential-time quantum algorithms for graph coloring problems Reviewed

    Kazuya Shimizu, Ryuhei Mori

    Proceedings of the Latin American Theoretical Informatics (LATIN'20)   Vol. 12118   page: 387 - 398   2020.5

     More details

  8. Periodic Fourier representation of Boolean functions Reviewed

    Ryuhei Mori

    Quantum Information & Computation   Vol. 19 ( 5-6 ) page: 0392 - 0412   2019.5

     More details

    Publisher:Rinton Press, Incorporated  

    DOI: 10.26421/QIC19.5-6

    researchmap

  9. Better protocol for XOR game using communication protocol and nonlocal boxes Reviewed

    Ryuhei Mori

    Quantum Information and Computation   Vol. 17 ( 15&16 ) page: 1261 - 1276   2017.12

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Rinton Press  

    Buhrman showed that an efficient communication protocol implies a reliable XOR game protocol. This idea rederives Linial and Shraibman’s lower bound of randomized and quantum communication complexities, which was derived by using factorization norms, with worse constant factor in much more intuitive way. In this work, we improve and generalize Buhrman’s idea, and obtain a class of lower bounds for randomized communication complexity including an exact Linial and Shraibman’s lower bound as a special case. In the proof, we explicitly construct a protocol for XOR game from a randomized communication protocol by using a concept of nonlocal boxes and Paw lowski et al.’s elegant protocol, which was used for showing the violation of information causality in superquantum theories.

    DOI: 10.26421/qic17.15-16-1

    researchmap

  10. Sum of squares lower bounds for refuting any CSP Reviewed

    Pravesh K. Kothari, Ryuhei Mori, Ryan O'Donnell, David Witmer

    Proceedings of the Annual ACM Symposium on Theory of Computing   Vol. 128415   page: 132 - 145   2017.6

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Association for Computing Machinery  

    Let P: {0, 1}k → {0,1} be a nontrivial k-ary predicate. Consider a random instance of the constraint satisfaction problem CSP(P) on n variables with An constraints, each being P applied to k randomly chosen literals. Provided the constraint density satisfes Δ ≥≥ 1, such an instance is unsatisfable with high probability. The refutation problem is to efficiently find a proof of unsatisfability. We show that whenever the predicate P supports a t-wise uniform probability distribution on its satisfying assignments, the sum of squares (SOS) algorithm of degree d = Θ(n/Δ2/(t-1)longΔ) (which runs in time nO(d)) cannot refute a random instance of CSP(P). In particular, the polynomial-time SOS algorithm requires Ω(n(t+1)/2) constraints to refute random instances of CSP(P) when P supports a t-wise uniform distribution on its satisfying assignments. Together with recent work of Lee, Raghavendra, Steurer (2015), our result also implies that any polynomial-size semidefinite programming relaxation for refutation requires at least Ω(n(t+1)/2) constraints. More generally, we consider the δ-refutation problem, in which the goal is to certify that at most a (1 - δ)-fraction of constraints can be simultaneously satisfed. We show that if P is δ-close to supporting a t-wise uniform distribution on satisfying assignments, then the degree-Ω(n/Δ2/(t-1)logΔ) SOS algorithm cannot (δ + o(1))- refute a random instance of CSP(P). This is the first result to show a distinction between the degree SOS needs to solve the refutation problem and the degree it needs to solve the harder δ-refutation problem. Our results (which also extend with no change to CSPs over larger alphabets) subsume all previously known lower bounds for semialgebraic refutation of random CSPs. For every constraint predicate P, they give a three-way hardness tradeof between the density of constraints, the SOS degree (hence running time), and the strength of the refutation. By recent algorithmic results of Allen, O'Donnell, Witmer (2015) and Raghavendra, Rao, Schramm (2016), this full three-way tradeof is tight, up to lower-order factors.

    DOI: 10.1145/3055399.3055485

    Scopus

    researchmap

    Other Link: http://orcid.org/0000-0001-5474-5145

  11. Three-input majority function as the unique optimal function for the bias amplification using nonlocal boxes Reviewed

    Ryuhei Mori

    PHYSICAL REVIEW A   Vol. 94 ( 5 ) page: 052130   2016.11

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:AMER PHYSICAL SOC  

    Brassard et al. [Phys. Rev. Lett. 96, 250401 (2006)] showed that shared nonlocal boxes with a CHSH (Clauser, Horne, Shimony, and Holt) probability greater than 3+root 6/6 yield trivial communication complexity. There still exists a gap with the maximum CHSH probability 2+root 2/4 achievable by quantum mechanics. It is an interesting open question to determine the exact threshold for the trivial communication complexity. Brassard et al.'s idea is based on recursive bias amplification by the three-input majority function. It was not obvious if another choice of function exhibits stronger bias amplification. We show that the three-input majority function is the unique optimal function, so that one cannot improve the threshold 3+root 6/6 by Brassard et al.'s bias amplification. In this work, protocols for computing the function used for the bias amplification are restricted to be nonadaptive protocols or a particular adaptive protocol inspired by Pawlowski et al.'s protocol for information causality [Nature (London) 461, 1101 (2009)]. We first show an adaptive protocol inspired by Pawlowski et al.'s protocol, and then show that the adaptive protocol improves upon nonadaptive protocols. Finally, we show that the three-input majority function is the unique optimal function for the bias amplification if we apply the adaptive protocol to each step of the bias amplification.

    DOI: 10.1103/PhysRevA.94.052130

    Web of Science

    researchmap

    Other Link: http://orcid.org/0000-0001-5474-5145

  12. Lower bounds for CSP refutation by SDP hierarchies Reviewed

    Ryuhei Mori, David Witmer

    Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2016)   Vol. 60   page: 41:1 - 41:30   2016.9

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing  

    For a k-Ary predicate P, a random instance of CSP(P) with n variables and m constraints is unsatisfiable with high probability when m ≥ O(n). The natural algorithmic task in this regime is refutation: finding a proof that a given random instance is unsatisfiable. Recent work of Allen et al. suggests that the difficulty of refuting CSP(P) using an SDP is determined by a parameter cmplx(P), the smallest t for which there does not exist a t-wise uniform distribution over satisfying assignments to P. In particular they show that random instances of CSP(P) with m ≥ ncmplx(P)/2 can be refuted efficiently using an SDP. In this work, we give evidence that ncmplx(P)/2 constraints are also necessary for refutation using SDPs. Specifically, we show that if P supports a (t-1)-wise uniform distribution over satisfying assignments, then the Sherali-Adams+ and Lovász-Schrijver+ SDP hierarchies cannot refute a random instance of CSP(P) in polynomial time for any m ≤ nt/2-ϵ.

    DOI: 10.4230/LIPIcs.APPROX-RANDOM.2016.41

    Scopus

    researchmap

  13. Average Shortest Path Length of Graphs of Diameter 3 Reviewed

    Nobutaka Shimizu, Ryuhei Mori

    2016 TENTH IEEE/ACM INTERNATIONAL SYMPOSIUM ON NETWORKS-ON-CHIP (NOCS)     page: 1 - 6   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    A network topology with low average shortest path length (ASPL) provides efficient data transmission while the number of nodes and the number of links incident to each node are often limited due to physical constraints. In this paper, we consider the construction of low ASPL graphs under these constraints by using stochastic local search (SLS) algorithms. Since the ASPL cannot be calculated efficiently, the ASPL is not suitable for the evaluation function of SLS algorithms. We first derive an equality and bounds for the ASPL of graphs of diameter 3. On the basis of the simplest upper bound of the ASPL, we propose to use 3 Delta + 2 square as the evaluation function for graphs of diameter 3 where Delta and square denote the number of triangles and squares in a graph, respectively. We show that the proposed evaluation function can be evaluated in O(1) time as the number of nodes and the maximum degree tend to infinity by using some data tables. By using the simulated annealing with the proposed evaluation function, we construct low ASPL regular graphs of diameter 3 with 10 000 nodes.

    DOI: 10.1109/NOCS.2016.7579335

    Web of Science

    researchmap

  14. Loop Calculus For Nonbinary Alphabets Using Concepts From Information Geometry Reviewed

    Ryuhei Mori

    IEEE TRANSACTIONS ON INFORMATION THEORY   Vol. 61 ( 4 ) page: 1887 - 1904   2015.4

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC  

    The Bethe approximation is a well-known approximation of the partition function used in statistical physics. Recently, an equality relating the partition function and its Bethe approximation was obtained for graphical models with binary variables by Chertkov and Chernyak. In this equality, the multiplicative error in the Bethe approximation is represented as a weighted sum over all generalized loops in the graphical model. In this paper, the equality is generalized to graphical models with nonbinary alphabet using concepts from information geometry.

    DOI: 10.1109/TIT.2015.2403239

    Web of Science

    researchmap

  15. Holographic Transformation, Belief Propagation and Loop Calculus for Generalized Probabilistic Theories Reviewed

    Ryuhei Mori

    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT)     page: 1099 - 1103   2015

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    The holographic transformation, belief propagation and loop calculus are generalized to problems in generalized probabilistic theories including quantum mechanics. In this work, the partition function of classical factor graph is represented by an inner product of two high-dimensional vectors both of which can be decomposed to tensor products of low-dimensional vectors. On the representation, the holographic transformation is clearly understood by using adjoint linear maps. Furthermore, on the formulation using inner product, the belief propagation is naturally defined from the derivation of the loop calculus formula. As a consequence, the holographic transformation, the belief propagation and the loop calculus are generalized to measurement problems in quantum mechanics and generalized probabilistic theories.

    DOI: 10.1109/ISIT.2015.7282625

    Web of Science

    researchmap

  16. Source and Channel Polarization Over Finite Fields and Reed-Solomon Matrices Reviewed

    Ryuhei Mori, Toshiyuki Tanaka

    IEEE TRANSACTIONS ON INFORMATION THEORY   Vol. 60 ( 5 ) page: 2720 - 2736   2014.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC  

    Polarization phenomenon over any finite field F-q with size q being a power of a prime is considered. This problem is a generalization of the original proposal of channel polarization by Arikan for the binary field, as well as its extension to a prime field by, Sasoglu, Telatar, and Arikan. In this paper, a necessary and sufficient condition of a matrix over a finite field F-q is shown under which any source and channel are polarized. Furthermore, the result of the speed of polarization for the binary alphabet obtained by Arikan and Telatar is generalized to arbitrary finite field. It is also shown that the asymptotic error probability of polar codes is improved by using the Reed-Solomon matrices, which can be regarded as a natural generalization of the 2 x 2 binary matrix used in the original proposal by Arikan.

    DOI: 10.1109/TIT.2014.2312181

    Web of Science

    researchmap

  17. Rate-Dependent Analysis of the Asymptotic Behavior of Channel Polarization Reviewed

    S. Hamed Hassani, Ryuhei Mori, Toshiyuki Tanaka, Ruediger L. Urbanke

    IEEE TRANSACTIONS ON INFORMATION THEORY   Vol. 59 ( 4 ) page: 2267 - 2276   2013.4

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC  

    We consider the asymptotic behavior of the polarization process in the large block-length regime when transmission takes place over a binary-input memoryless symmetric channel W. In particular, we study the asymptotics of the cumulative distribution, P(Z(n) <= z), where {Z(n)} is the Bhattacharyya process associated with W, and its dependence on the rate of transmission. On the basis of this result, we characterize the asymptotic behavior, as well as its dependence on the rate, of the block error probability of polar codes using the successive cancellation decoder. This refines the original asymptotic bounds by Arikan and Telatar. Our results apply to general polar codes based on l x l kernel matrices. We also provide asymptotic lower bounds on the block error probability of polar codes using the maximum a posteriori (MAP) decoder. The MAP lower bound and the successive cancellation upper bound coincide when l = 2, but there is a gap for l > 2.

    DOI: 10.1109/TIT.2012.2228295

    Web of Science

    researchmap

  18. Effects of Single-Cycle Structure on Iterative Decoding of Low-Density Parity-Check Codes Reviewed

    Ryuhei Mori, Toshiyuki Tanaka, Kenta Kasai, Kohichi Sakaniwa

    IEEE TRANSACTIONS ON INFORMATION THEORY   Vol. 59 ( 1 ) page: 238 - 253   2013.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC  

    We consider communication over the binary erasure channel (BEC) using low-density parity-check (LDPC) codes and belief propagation (BP) decoding. For fixed numbers of BP iterations, the bit error probability approaches a limit as the blockength tends to infinity, and the limit is obtained via density evolution. The finite-blocklength correction behaves like alpha(epsilon, t)/n + Theta (n(-2)) as the blocklength tends to infinity where alpha(epsilon, t) denotes a specific constant determined by the code ensemble considered, the number of iterations, and the erasure probability of the BEC. In this paper, we derive a set of recursive formulas which allows the evaluation of the constant alpha(epsilon, t) for standard irregular ensembles. The dominant difference alpha(epsilon, t)/n can be considered as effects of cycle-free and single-cycle structures of local graphs. Furthermore, it is confirmed via numerical simulations that estimation of the bit error probability using alpha(epsilon, t) is accurate even for small blocklengths.

    DOI: 10.1109/TIT.2012.2216252

    Web of Science

    researchmap

  19. Central Approximation in Statistical Physics and Information Theory Reviewed

    Ryuhei Mori, Toshiyuki Tanaka

    2012 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT)     page: 1652 - 1656   2012

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    In statistical physics and information theory, while asymptotic behavior of the partition function is often of our primary interest, the most of works are dedicated to analysis of the exponent of the partition function. In our previous paper on sparse random factor graph ensembles, we show that the exponent of the expectation of the partition function is represented as the minimum of the Bethe free energy of the small averaged graph by using the method of types. In this paper, we present a general framework to study more precise asymptotic behaviors of the partition function, using the central approximation in conjunction with the method of types.

    DOI: 10.1109/ISIT.2012.6283556

    Web of Science

    researchmap

  20. Connection between Annealed Free Energy and Belief Propagation on Random Factor Graph Ensembles Reviewed

    Ryuhei Mori

    2011 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT)     page: 2010 - 2014   2011

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Recently, Vontobel showed the relationship between Bethe free energy and annealed free energy for protograph factor graph ensembles. In this paper, annealed free energy of any random regular factor graph ensembles are connected to Bethe free energy. The annealed free energy is expressed as the solution of maximization problem whose stationary condition coincides with equations of belief propagation since the contribution to partition function of particular type of variable and factor nodes has similar form of minus Bethe free energy. It gives simple derivation of quenched free energy by using the replica method. It implies equivalence of the replica and cavity methods for any random irregular factor graph ensembles. As consequence, it is shown that the replica symmetric solution and annealed free energy are equal for regular ensemble.

    DOI: 10.1109/ISIT.2011.6033907

    Web of Science

    researchmap

  21. Near concavity of the growth rate for coupled LDPC chains Reviewed

    S. Hamed Hassani, N. Macris, R. Mori

    2011 IEEE International Symposium on Information Theory Proceedings     page: 356 - 360   2011

  22. Channel Polarization on q-ary Discrete Memoryless Channels by Arbitrary Kernels Reviewed

    Ryuhei Mori, Toshiyuki Tanaka

    2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY     page: 894 - 898   2010

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    A method of channel polarization, proposed by Arikan, allows us to construct efficient capacity-achieving channel codes. In the original work, binary input discrete memoryless channels are considered. A special case of q-ary channel polarization is considered by Sasoglu, Telatar, and Arikan. In this paper, we consider more general channel polarization on q-ary channels. We further show explicit constructions using Reed-Solomon codes, on which asymptotically fast channel polarization is induced.

    DOI: 10.1109/ISIT.2010.5513568

    Web of Science

    researchmap

  23. Non-Binary Polar Codes using Reed-Solomon Codes and Algebraic Geometry Codes Reviewed

    Ryuhei Mori, Toshiyuki Tanaka

    2010 IEEE INFORMATION THEORY WORKSHOP (ITW)     page: 1 - 5   2010

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Polar codes, introduced by Arikan, achieve symmetric capacity of any discrete memoryless channels under low encoding and decoding complexity. Recently, non-binary polar codes have been investigated. In this paper, we calculate error probability of non-binary polar codes constructed on the basis of Reed-Solomon matrices by numerical simulations. It is confirmed that 4-ary polar codes have significantly better performance than binary polar codes on binary-input AWGN channel. We also discuss an interpretation of polar codes in terms of algebraic geometry codes, and further show that polar codes using Hermitian codes have asymptotically good performance.

    DOI: 10.1109/CIG.2010.5592755

    Web of Science

    researchmap

  24. Refined Rate of Channel Polarization Reviewed

    Toshiyuki Tanaka, Ryuhei Mori

    2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY     page: 889 - 893   2010

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    A rate-dependent upper bound of the best achievable block error probability of polar codes with successive-cancellation decoding is derived.

    DOI: 10.1109/ISIT.2010.5513574

    Web of Science

    researchmap

  25. Performance of Polar Codes with the Construction using Density Evolution Reviewed

    Ryuhei Mori, Toshiyuki Tanaka

    IEEE COMMUNICATIONS LETTERS   Vol. 13 ( 7 ) page: 519 - 521   2009.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC  

    Polar coding, proposed by Arikan, makes it possible to construct capacity-achieving codes for symmetric binary-input discrete memoryless channels, with low encoding and decoding complexity. Complexity of the originally proposed code construction method, however, grows exponentially in the blocklength unless a channel is the binary erasure channel. Recently, the authors have proposed a new capacity-achieving code construction method with linear complexity in the blocklength for arbitrary symmetric binary-input memoryless channels. In this letter, we evaluate performance of polar codes designed with the new construction method, and compare it with that of the codes constructed with another heuristic method with linear complexity proposed by Arikan.

    DOI: 10.1109/LCOMM.2009.090428

    Web of Science

    researchmap

  26. Finite-Length Analysis of Irregular Expurgated LDPC Codes under Finite Number of Iterations Reviewed

    Ryuhei Mori, Toshiyuki Tanaka, Kenta Kasai, Kohichi Sakaniwa

    2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4     page: 2497 - +   2009

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Communication over the binary erasure channel (BEC) using low-density parity-check (LDPC) codes and belief propagation (BP) decoding is considered. The average bit error probability of an irregular LDPC code ensemble after a fixed number of iterations converges to a limit, which is calculated via density evolution, as the blocklength n tends to infinity. The difference between the bit error probability with blocklength ii and the large-blocklength limit behaves asymptotically like alpha/n, where the coefficient alpha depends on the ensemble, the number of iterations and the erasure probability of the BEC. In [1], alpha is calculated for regular ensembles. In this paper, alpha for irregular expurgated ensembles is derived. It is demonstrated that convergence of numerical estimates of alpha to the analytic result is significantly fast for irregular unexpurgated ensembles.

    DOI: 10.1109/ISIT.2009.5206063

    Web of Science

    researchmap

  27. Performance and Construction of Polar Codes on Symmetric Binary-Input Memory less Channels Reviewed

    Ryuhei Mori, Toshiyuki Tanaka

    2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4     page: 1496 - 1500   2009

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Channel polarization is a method of constructing capacity achieving codes for symmetric binary-input discrete memoryless channels (B-DMCs) [1]. In the original paper, the construction complexity is exponential in the blocklength. In this paper, a new construction method for arbitrary symmetric binary memoryless channel (B-MC) with linear complexity in the blocklength is proposed. Furthermore, new upper bound and lower bound of the block error probability of polar codes are derived for the BEC and arbitrary symmetric B-MC, respectively.

    DOI: 10.1109/ISIT.2009.5205857

    Web of Science

    researchmap

  28. Asymptotic Bit Error Probability of LDPC Codes for the Binary Erasure Channel with Finite Number of Iterations Reviewed

    Ryuhei Mori, Kenta Kasai, Tomoharu Shibuya, Kohichi Sakaniwa

    2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6     page: 449 - +   2008

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    We consider communication over the binary erasure channel (BEC) using low-density parity-check (LDPC) code and belief propagation (BP) decoding. Furthermore, a gap between the bit error probability after finite number of iterations for finite block length n and that for infinite block length is asymptotically alpha/n, where alpha denotes a specific constant determined by a degree distribution, a number of iterations and erasure probability. Our main result is to derive an efficient algorithm for calculating alpha for regular ensembles.

    DOI: 10.1109/ISIT.2008.4595026

    Web of Science

    researchmap

  29. Asymptotic Gaps Between BP Decoding and Local-MAP Decoding For Low-Density Parity-Check Codes Reviewed

    Ryuhei Mori, Kenta Kasai, Tomoharu Shibuya, Kohichi Sakaniwa

    2008 5TH INTERNATIONAL SYMPOSIUM ON TURBO CODES AND RELATED TOPICS     page: 162 - +   2008

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    In this paper, we consider communication over the binary erasure channel (BEC) using low-density parity-check (LDPC) codes. We consider MAP decoding not using a whole Wanner graph but only a neighborhood graph of fixed depth preferred to as local-MAP decoding for deriving lower bounds of the error probability under message-passing decoding and bit-flipping decoding.
    The main result of this paper is to derive an asymptotic performance for regular ensembles under local-MAP decoding and to derive an asymptotic gap of the bit error probability between belief propagation (BP) and local-MAP decoding for irregular ensembles. Finally, we show the limit of the scaling parameter of these decodings when number of iterations tends to infinity.

    DOI: 10.1109/TURBOCODING.2008.4658691

    Web of Science

    researchmap

▼display all

Presentations 9

  1. Improved robustness of quantum supremacy for random circuit sampling Invited

    森 立平

    コンピュテーション研究会  2021.12.3 

     More details

    Event date: 2021.12

    Presentation type:Oral presentation (invited, special)  

    researchmap

  2. 半正定値緩和手法によるランダム制約充足問題の反駁の限界 Invited

    森 立平

    コンピュテーション研究会  2017.12.22 

     More details

    Event date: 2017.12

    Presentation type:Oral presentation (invited, special)  

    researchmap

  3. 線形計画緩和と半正定値計画緩和の階層の統一的な理解 Invited

    森 立平

    最適化の基盤とフロンティア研究部会 (WOO)  2017.11.4 

     More details

    Event date: 2017.11

    Presentation type:Oral presentation (invited, special)  

    researchmap

  4. ホログラフィック変換とループ計算 Invited

    森 立平

    第4回 誤り訂正符号のワークショップ  2015.9.3 

     More details

    Event date: 2015.9

    Presentation type:Oral presentation (invited, special)  

    researchmap

  5. Introduction to Polar Codes Invited

    Ryuhei Mori

    Workshop on Modern Error Correcting Codes  2013.8.30 

     More details

    Event date: 2013.8

    Presentation type:Oral presentation (invited, special)  

    researchmap

  6. Polar符号とその研究動向 Invited

    森 立平

    第34回情報理論とその応用シンポジウム  2011.11.30 

     More details

    Event date: 2011.11 - 2011.12

    Presentation type:Oral presentation (invited, special)  

    researchmap

  7. Polar符号と通信路分極現象について Invited

    森 立平

    電子情報通信学会 総合大会 COMP 学生シンポジウム  2011.3.15 

     More details

    Event date: 2011.3

    Presentation type:Oral presentation (invited, special)  

    researchmap

  8. 空間結合 LDPC符号の growth rateについて Invited

    森 立平

    空間結合符号とその周辺ワークショップ  2011.2.19 

     More details

    Event date: 2011.2

    Presentation type:Oral presentation (invited, special)  

    researchmap

  9. Polar符号について Invited

    森 立平

    情報理論研究会  2010.9.22 

     More details

    Event date: 2010.9

    Presentation type:Oral presentation (invited, special)  

    researchmap

▼display all

KAKENHI (Grants-in-Aid for Scientific Research) 10

  1. グラフ状態の効率的な生成及び活用

    2022.4 - 2029.3

    科学技術振興機構  創発的研究支援事業 

    森 立平

      More details

    Authorship:Principal investigator 

    researchmap

  2. Theoretical Foundations of Resource-Bounded Quantum Computation

    Grant number:22H00522  2022.4 - 2027.3

    Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (A)

      More details

    Authorship:Coinvestigator(s) 

  3. 量子アルゴリズムの理論と実装を接続する革新的基盤の創出

    Grant number:20H05966  2020.11 - 2025.3

    科学研究費助成事業  学術変革領域研究(A)

    山下 茂, 山本 直樹, ルガル フランソワ, 森 立平, 谷 誠一郎, 西村 治道

      More details

    Authorship:Coinvestigator(s) 

    量子計算各種モデルにおける計算能力の解析を行う理論的なアプローチと、実際に量子計算機を利用する実践的なアプローチの両面から以下の4項目の研究を行う。
    (A) 既存の量子計算モデルの結果を量子・古典協調の観点から、あるいは「弱い」量子計算モデルの観点から再検討・再構築する。
    (B) 量子計算に起こりうる現実的なエラーを考慮に入れた計算モデルの検討を進める。
    (C) 量子計算の方式に応じて異なる量子回路のモデルを量子・古典協調利用の枠組みの中で検討・評価する。
    (D) 量子計算と古典計算を協調して利用する計算アルゴリズムの能力を解析するための計算モデルを検討・評価する。
    万能量子計算モデルに関する研究として、マルチパーティ計算のモデルにおいて必要な通信量の限界を解析するための簡素なモデルである秘密同時メッセージプロトコルの量子版を導入し、その量子優位性と量子通信計算量の下界を探究し、等価性判定問題やAND関数において、パーティ間のエンタングルメントが通信量を削減することを示した。
    能力が限定された量子計算モデルに関する研究として、量子超越性を持つ量子回路を含む量子回路クラスに対して、出力時に典型的なノイズが発生する条件下では、古典模倣可能である場合があることを示した。
    量子分散計算モデルに関する研究として、様々なグラフ問題に対して、古典のアルゴリズムより高速な量子分散アルゴリズムの構築に成功した。また、通信計算量理論の枠組みにおいて、与えられた二つの確率分布の距離を求める問題をはじめ、いくつかの重要な問題に対して、優位性のある量子プロトコルを開発した。
    量子回路モデルに関する研究として、ランダムな量子回路による計算を古典計算でシミュレートすることの困難性を示唆する結果として、計算量的な仮定のもとで「量子回路の出力確率を加法的誤差 exp(-Ω(m log m)) で近似することができない」ことを示した。ここで、m は量子回路のゲート数である。また、Relative Phase Toffoli Gateのゲートの厳密最小化を線形計画問題で求める定式化を考案し、それを用いることで現在知られているTゲート数が4の実現方法が最適であることを示した。
    実践的な量子計算の利用に関する研究として、変分量子アルゴリズムにおいて、測定回数をあえて少なく取り、測定ゆらぎが明らかに効いてくる状況で、変分量子回路がどれほど効率良く訓練できるかを調べ、局所最適解を効率的に脱出する効果があることを確認した。
    予定している各研究項目でそれぞれ検討が順調に進んでいるため。
    引き続き量子計算の各種のモデルにおける計算能力の解析を行う理論的なアプローチと、実際に量子計算機を利用する実践的なアプローチの両面から様々な項目の研究を進め、将来実現する量子計算機を有効に利用するための計算基盤の構築を目指す。そのために、①万能量子計算モデルに関する研究、 ②能力が限定され た量子計算モデルに関する研究、③測定ベース量子計算モデルに関する研究、④量子分散計算モデルに関する研究、⑤量子回路モデルに関する研究、⑥実践的な 量子計算の利用に関する研究 などの項目に関して新たな知見を得る研究を推進する。

  4. Design of exponential-time quantum algorithms

    Grant number:20H04138  2020.4 - 2024.3

    Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (B)

      More details

    Authorship:Principal investigator 

    Grant amount:\17680000 ( Direct Cost: \13600000 、 Indirect Cost:\4080000 )

  5. Design of constant-time quantum algorithms

    2018.10 - 2022.3

    Japan Science and Technology Agency  Presto 

    Ryuhei Mori

      More details

    Authorship:Principal investigator  Grant type:Competitive

    researchmap

  6. Computational Complexity of Minimum Description Size Problems

    Grant number:18H04090  2018.4 - 2022.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (A)

    Watanabe Osamu

      More details

    Authorship:Coinvestigator(s) 

    Size of the smallest description of a given target data is called in general Minimal Description Size (MDS), and the problem of computing MDS is called Minimal Description Size Problem (in short, MDSP). MDS is a key concept in various fields of theory of computing, such as machine learning and computational cryptography, and MDSP itself is important in Computational Complexity Theory. Unfortunately, the hardness of MDSP has been left open from early stage of discussing P≠NP conjecture. In this project, we attacked this research topic and we have obtained several breakthrough results, some of which indeed have overcome the limit of conventional hardness analyses.

    researchmap

  7. Operational characterization of quantum nonlocality by Boolean Fourier analysis

    Grant number:17K17711  2017.4 - 2023.3

    Grants-in-Aid for Scientific Research  Grant-in-Aid for Young Scientists (B)

    Mori Ryuhei

      More details

    Authorship:Principal investigator 

    Grant amount:\3510000 ( Direct Cost: \2700000 、 Indirect Cost:\810000 )

    The aim of the research is to characterize the nonlocality of quantum theory in terms of communication and computation. The main results of this research are
    (1) The relationship between the winning probability of XOR games and communication complexity: The relationship between the winning probability of XOR games and communication complexity is considered. Specifically, we showed how to construct strategies for XOR games from communication protocols and proved an inequality between communication complexity and the winning probability of XOR games.
    (2) Computational capability of non-adaptive measurement-based quantum computation based on XOR games: We studied the computational capability to compute arbitrarily given Boolean functions by considering the protocols of XOR games, like the CHSH game, as computations, and show the computational power of the model of quantum computation.

  8. A Multifaced Approach Toward Understanding the Limitations of Compuation

    Grant number:24106001  2012.6 - 2017.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research on Innovative Areas (Research in a proposed research area)

    Watanabe Osamu, ASANO Takao, IBARAKI Toshihide, IMAI Hiroshi, TODA Seinosuke, MARUOKA Akira, MINATO Shinichi, MAKINO Kazuhisa, KAWARABAYASHI Kazuhisa, ASANO Tetsuo, KATOH Naoki, AVIS David, TOKUYAMA Takeshi, YAMASHITA Shigeru, TAKIMOTO Eiji, HORIYAMA Takashi, MORI Ryuhei, ASANO Takao, IBARAKI Toshihide, IMAI Hiroshi, TODA Seinosuke, MARUOKA Akira, MINATO Shinichi, MAKINO Kazuhisa, KAWARABAYASHI Kazuhisa, ASANO Tetsuo, KATOH Naoki, AVIS David, TOKUYAMA Takeshi, YAMASHITA Shigeru, TAKIMOTO Eiji, HORIYAMA Takashi, MORI Ryuhei

      More details

    Authorship:Collaborating Investigator(s) (not designated on Grant-in-Aid) 

    The purpose of this project is to manage, as a headquarter, the whole research project for exploring the limits of computation (in short, the ELC project). Deepening the understanding of computation is a key for developing yet stronger and new methods of using computation, and for this purpose, the ELC project investigates the limits of computation from various view points from a wide area of mathematical science. For obtaining significant advancements by such a multi-disciplinary approach, the collaboration of researchers in the world is necessary. The main task of this project is to prepare an appropriate environment for promoting such collaborations. For this, we invited many researchers, organized a good number of research workshops, and organized several international symposiums from small to large. We also organized tutorial seminars, fall schools, and group study sessions for promoting our research and fostering young researchers.

    researchmap

  9. Exploring the Limits of Computation from the Statistical Physics

    Grant number:24106008  2012.6 - 2017.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research on Innovative Areas (Research in a proposed research area)

    Watanabe Osamu, KABASHIMA Yoshiyuki, HUKUSHIMA Koji, Krzakala Florent, Zdeborova Lenka, Zhou Haijun, KABASHIMA Yoshiyuki, HUKUSHIMA Koji, Krzakala Florent, Zdeborova Lenka, Zhou Haijun

      More details

    Authorship:Coinvestigator(s) 

    We investigated computational problems studied in the statistical physics for developing a new approach in computational complexity theory. We examined a framework proposed in the statistical physics for understanding the computational hardness transition phenomena, and we discovered and mathematically proved a new type of hardness transition, which lead us to propose a new and robust framework for investigating the computational hardness transitions. This framework can be used as a new basis of discussing the security of cryptographic primitives. We also studied the structure of solutions and the number of solutions of various computational problems that have been discussed in the statistical physics, and found several fundamental properties for developing efficient algorithms for solving these problems.

    researchmap

  10. 通信路分極現象に基づいた誤り訂正符号とその復号法

    2010.4 - 2013.3

    日本学術振興会  特別研究員奨励費 

    森 立平

      More details

    Authorship:Principal investigator  Grant type:Competitive

    researchmap

▼display all

 

Teaching Experience (Off-campus) 2

  1. Quantum Computation and Quantum Information

    2019 - 2022 Tokyo Institute of Technology)

     More details

  2. Algorithms and Data Structures

    2018 - 2022 Tokyo Institute of Technology)

     More details