Entity

Time filter

Source Type

Japan

Takahashi H.,Osaka University | Takahashi H.,Tamagawa University | Terada K.,Gifu University | Morita T.,Osaka University | And 10 more authors.
Cortex | Year: 2014

Internal (neuronal) representations in the brain are modified by our experiences, and this phenomenon is not unique to sensory and motor systems. Here, we show that different impressions obtained through social interaction with a variety of agents uniquely modulate activity of dorsal and ventral pathways of the brain network that mediates human social behavior. We scanned brain activity with functional magnetic resonance imaging (fMRI) in 16 healthy volunteers when they performed a simple matching-pennies game with a human, human-like android, mechanical robot, interactive robot, and a computer. Before playing this game in the scanner, participants experienced social interactions with each opponent separately and scored their initial impressions using two questionnaires. We found that the participants perceived opponents in two mental dimensions: one represented "mind-holderness" in which participants attributed anthropomorphic impressions to some of the opponents that had mental functions, while the other dimension represented "mind-readerness" in which participants characterized opponents as intelligent. Interestingly, this "mind-readerness" dimension correlated to participants frequently changing their game tactic to prevent opponents from envisioning their strategy, and this was corroborated by increased entropy during the game. We also found that the two factors separately modulated activity in distinct social brain regions. Specifically, mind-holderness modulated activity in the dorsal aspect of the temporoparietal junction (TPJ) and medial prefrontal and posterior paracingulate cortices, while mind-readerness modulated activity in the ventral aspect of TPJ and the temporal pole. These results clearly demonstrate that activity in social brain networks is modulated through pre-scanning experiences of social interaction with a variety of agents. Furthermore, our findings elucidated the existence of two distinct functional networks in the social human brain. Social interaction with anthropomorphic or intelligent-looking agents may distinctly shape the internal representation of our social brain, which may in turn determine how we behave for various agents that we encounter in our society. © 2014 The Authors.


Yamamoto S.-I.,Ryukoku University | Uraoka Y.,NAIST | Taguchi N.,Image Technology Inc. | Nonaka T.,Ryukoku University
Methods and Applications in Fluorescence | Year: 2013

We deposited comb electrodes with narrow gaps between the teeth on a glass substrate, thus realizing a high electric field intensity that cannot be achieved with conventional structures. Au electrodes are deposited to form a comb shape and then spin-coated with a phosphor layer obtained by mixing ZnS phosphor particles with resins in a certain ratio. An AC voltage was applied to the gaps between the teeth of the comb electrode to emit light, from which the luminance was measured for different electric field intensities. The luminance was not affected by the transmittance of the electrodes themselves when measured from the phosphor layer side. Therefore, it may be possible to produce a display that does not require transparent electrodes by using the phosphor layer side of a device with comb electrodes made of metals, such as Au, for the display. © 2013 IOP Publishing Ltd.


Zheng B.,IIS Inc | Sun Y.,Brother Industries | Takamatsu J.,NAIST | Ikeuchi K.,IIS Inc
IPSJ Transactions on Computer Vision and Applications | Year: 2013

In this paper, we propose a novel local image descriptor DoP which is termed as the difference of images represented by polynomials in different degrees. Once an interest point/region is extracted by a common image detector such as Harris corner, our DoP descriptor is able to characterize the interest point/region with high distinctiveness, compactness, and robustness to viewpoint change, image blur, and illumination variation. To efficiently build DoP descriptor, we propose to numerically reduce the computational cost by jumping over the repeatedly calculating polynomial representation. Our experimental results demonstrate a better performance compared to several state-of-art candidates. © 2013 Information Processing Society of Japan.


Wang S.,Xidian University | Zhang Z.,Telecom Lille 1 | Kadobayashi Y.,NAIST
Computers and Security | Year: 2013

The increasing complexity of today's computer systems, together with the rapid emergence of novel vulnerabilities, make security hardening a formidable challenge for security administrators. Although a large variety of tools and techniques are available for vulnerability analysis, the majority work at system or network level without explicit association with human and organizational factors. This article presents a middleware approach to bridge the gap between system-level vulnerabilities and organization-level security metrics, ultimately contributing to cost-benefit security hardening. In particular, our approach systematically integrates attack graph, a commonly used effective approach to representing and analyzing network vulnerabilities, and Hidden Markov Model (HMM) together, for exploring the probabilistic relation between system observations and states. More specifically, we modify and apply dependency attack graph to represent network assets and vulnerabilities (observations), which are then fed to HMM for estimating attack states, whereas their transitions are driven by a set of predefined cost factors associated with potential attacks and countermeasures. A heuristic searching algorithm is employed to automatically infer the optimal security hardening through cost-benefit analysis. We use a synthetic network scenario to illustrate our approach and evaluate its performance through a set of simulations. © 2012 Elsevier Ltd. All rights reserved.


Yang X.,NAIST | Kula R.G.,Osaka University | Yoshida N.,Nagoya University | Iida H.,NAIST
Proceedings - 13th Working Conference on Mining Software Repositories, MSR 2016 | Year: 2016

In this paper, we present a collection of Modern Code Review data for five open source projects. The data showcases mined data from both an integrated peer review system and source code repositories. We present an easy-to-use and richer data structure to retrieve the (a) People, (b) Process, and (c) Product aspects of the peer review. This paper presents the extraction methodology, the dataset structure, and a collection of database dumps1. © 2016 ACM.

Discover hidden collaborations