arxiv: v4 [quant-ph] 4 Jan 2019

Size: px
Start display at page:

Download "arxiv: v4 [quant-ph] 4 Jan 2019"

Transcription

1 Device inepenent witness of arbitrary imensional quantum systems employing binary outcome measurements Mikołaj Czechlewski, 1, Debashis Saha, 2, 3, Armin Tavakoli, 4, an Marcin Pawłowski 2, 1 Institute of Informatics, National Quantum Information Centre, Faculty of Mathematics, Physics an Informatics, University of Gańsk, Wita Stwosza 57, Gańsk, Polan 2 Institute of Theoretical Physics an Astrophysics, National Quantum Information Centre, Faculty of Mathematics, Physics an Informatics, University of Gańsk, Wita Stwosza 57, Gańsk, Polan 3 Center for Theoretical Physics, Polish Acaemy of Sciences, Al. Lotników 32/46, Warsaw, Polan 4 Département e Physique Appliquée, Université e Genève, CH-1211 Genève, Switzerlan arxiv: v4 [quant-ph] 4 Jan 2019 Device inepenent imension witnesses DW are a remarkable way to test the imension of a quantum system in a prepare-an-measure scenario imposing minimal assumptions on the internal features of the evices. However, as the imension increases, the major obstacle in the realization of DW arises ue to the requirement of many outcome quantum measurements. In this article, we propose a new variant of a wiely stuie communication task ranom access coe an take its average payoff as the DW. The presente DW applies to arbitrarily large quantum systems employing only binary outcome measurements. I. INTRODUCTION Realizing higher-imensional quantum systems with full control is one of the crucial barriers towars implementing many quantum information processing protocols an testing the founations of physics. While the process of quantum tomography allows us to reconstruct a quantum system, however, it requires the assumption of fully characterize measurement evices. The evice inepenent framework [1, 2] in a prepare-an-measure experiment provies a methoology to obtain a lower boun on the imension without assuming the internal features of the evices. Moreover, quantum avantages in information processing, for example, quantum communication complexity [3, 4] are linke to this approach. Despite its merits, implementing evice inepenent imension witnesses DWs for higher imensional quantum systems [5 9] faces several complications. One of the problems in many existing protocols is the requirement of outcome measurements. As the imension increases, performing many outcome measurements [10] becomes practically ifficult ue to the facts that, a measurement outcomes turn coarse-graine, b the system becomes more prone to ecoherence. In some cases, one may impose aitional assumptions, for instance simulating outcome measurements by many binary outcome measurements. However, this approach fails to fulfill the requirements of DWs in the strict sense. Another ifficulty arises from the fact that the number of ifferent preparations an measurements i.e. the total number of inputs in the evices also increases as one seeks to certify higher imensional system. As a result, the experimental errors grow large ue to the finite number of trials an imperfections in the experiment. Furthermore, the applicability of a esire figure of merit, mczechlewski@inf.ug.eu.pl saha@cft.eu.pl armin.tavakoli@unige.ch okmpa@univ.ga.pl use as DW, shoul not be limite by a particular imension. Rather, it shoul be applicable to test systems of an arbitrarily high imension. In this article, we overcome these challenges by proposing a class of DWs base on ranom access coes [11] for quantum systems of an arbitrary imension. In the simplest scenario, a DW can be interprete as a task carrie out by two parties. In each run of the task, the sener Alice obtains an input in the form of a classical variable a an communicates a system to the receiver Bob. Apart from the communicate message, Bob also receives an input y an prouces an output b. The figure of merit, enote by T, of the task coul be an arbitrary linear function of the statistics T = a,y,b pa, yt a, y, bpb a, y, where pb a, y[12] refers to the probability of obtaining the output b given the inputs a, y, an T a, y, b enotes the payoff to that event. Assuming the imension of the communicate system is, one can obtain the optimal value of the figure of merit, enote by T c, for a classical implementation. Obtaining a value greater than T c from the observe statistics certifies the communicate quantum system to be of at least imension. Quantum ranom access coes QRACs, a primitive quantum communication protocol [13 15], can be use for this purpose. The original stuy of QRACs was restricte to two-imensional systems [11] an was later generalize to higher imensions [16 18] yieling several interesting results in quantum communication [19 22]. There are avantages of using RAC as DWs. The upper boun on T c can be obtaine for any. Besies, the number of inputs in the evices increases polynomially with. Note that one can exploit the quantum communication complexity tasks [4], which involve binary outcome measurement for imension witnessing, but in that case, the input size grows exponentially with. However, the generalize RAC requires outcome measurements. To tackle this issue we have introuce a version of RAC, namely, binary RAC. This involves only binary outcome measurements an provies a metho to obtain the upper boun of T c applicable to arbitrary. The paper is organize as follows: first, we escribe the generalization of -imensional RAC, along with the proof

2 2 of optimal classical protocols an bouns. Next, we propose the binary version i.e., the outcome b is binary of - imensional RAC taking into account a wier class of payoff function. Then, we erive a conition on the payoff function such that the optimal classical protocol is the same as in a stanar RAC. Further, we provie the classical boun an a quantum protocol that violates the propose DW for arbitrary. II. Alice STANDARD -DIMENSIONAL RANDOM ACCESS CODE a 0 a 1...a n 1 {0, 1,..., 1} n y {0, 1,..., n 1} m {0, 1,..., 1} Bob b = a y FIG. 1. Scheme of RAC. Alice gets the input a 0,... a n 1 an sens a message m to Bob. Besies the message, Bob also receives the input y {0,..., n 1}. His task is to give the output b, which obeys the relation b = a y. Stanar -imensional ranom access coes RAC are a natural generalization of two-imensional ranom access coe [11, 18]. Alice receives n numbers a 0,... a n 1, where a i {0,..., 1}. Then she sens a -value one it[23] message m {0,... 1} to Bob. Bob gets an input y {0,..., n 1}. He nees to give the output b, which obeys the relation b = a y figure 1. Specifically, we are intereste in the average success probability in the case of the inputs a, y being uniformly istribute an T a, y, b = δ b,ay, T S = 1 n n pb = a y a, y. 1 a,y Since the communicate message m is constraine to be - value, it is evient that achieving average success probability equals to 1 is impossible. The aim is to fin an optimal strategy for the parties, which gives the largest average success probability. Following the result in [11] for = 2, it has been mentione in [18] an shown later in [24] that coing by majority an ientity ecoing is an optimal strategy for RAC. In the next two subsections, we emonstrate an alternative shorter proof of this fact an subsequently provie an expression of the optimal average success probability. A. Optimal classical strategy Due to the linearity of the of figure of merit, it is sufficient to consier only eterministic encoing an ecoing strategies to maximize the average success probability. Let us enote the it-string a 0... a n 1 by a. Any encoing strategy can be escribe by a function E : {a} {0,..., 1} n {m} {0, 1,..., 1} an the probability of sening m for input a is δ m,ea. While any ecoing for Bob s input y is escribe as a function D y : {m} {0, 1,..., 1} {b} {0, 1,..., 1} an δ b,dym is the probability of outputting b when message m is receive. Thus, the classical average success probability in the stanar RAC is T c S = 1 n n pb = a y a, y 2 a,y = 1 n n δ m,ea δ ay,d ym m a,y = 1 n n δ m,ea m,a y 1 n n max m a y δ ay,d ym δ ay,d ym From the above expression, one can observe that for given ecoing strategy D y m the optimal encoing will be the following δ m,ea = 1 if 3 m {0,..., 1} y δ ay,d ym y. δ ay,d ym. We can reuce the possibility of all ecoing functions into two ways: a ientity ecoing i.e. y, m, D y m = m, b not ientity ecoing, y, m such that Dm m. Here the mapping D y coul be one-to-many in general. Lemma 1. There exists an optimal classical strategy with ientity ecoing a. Proof. We will show that for the case escribe in b, there exists a strategy obtaining the same average success probability like for the ientity ecoing a. Let Dy b be the omain of b, i.e., the set of m such that D y m = b. If b oes not exist in the range of D y, we efine Dy b = b. We enote Dy a is the set of it string a a 0... a n 1 such that D y a y = a y. Thus, Dy a acts on the y-th it of the it string. If there is a classical strategy, having an encoing function E an ecoing functions D y where D y m m for some y, m, we can construct new encoing an ecoing functions as follows E D 0 D 1... D n 1a = Ea 4 y, m, D ym = m. Now, if the strategy E, D y gives the correct answer for the input a, y then the moifie strategy E, D y gives the correct answer for at least one of the inputs D 0... D n 1a, y. Thus, the average success probability for the moifie strategy E, D is equal or greater than the strategy E, D.

3 3 From 3 we conclue that optimal encoing is as follows a 0 a 1...a n 1 y, k δ m,ea = 1 such that 5 m {0,..., 1} y δ ay,m y δ ay,m. In other wors, the optimal strategy for Alice is to communicate the majority it of the input string an b = m. Alice m {0, 1,..., 1} Bob G {0, 1} B. Average success probability Now we calculate the classical average success probability for an n it string. The total number of possible inputs is n n. In the n it string, which is given to Alice, the i-th it i {0, 1, 2,..., n 1} appears n i times in the string a. The number of ways it may occur is the same as the number of solutions in non-negative integers of the equation n 0 + n 1 + n n 1 = n. 6 The above equation 6 is a special case of the equation c 0 n 0 + c 1 n 1 + c 2 n c 1 n 1 = n, 7 with all coefficients {c 0, c 1, c 2,..., c 1 } equal 1. The equation 7 is known in number theory as the Diophantine equation of Frobenius an it is connecte with the Frobenius coin problem an Frobenius number [25, 26]. The total number of possible solutions of 6 is n+ 1 1 [27]. For each solution Alice will communicate max{n 0, n 1,..., n 1 } to Bob. So the number of successful inputs is given by n! n 0!n 1!...n 1! max{n n! 0, n 1,..., n 1 }, as n 0!n 1!...n 1! is the number of possible combinations for an n it string with a given set of n i s, an max{n 0, n 1,..., n 1 } is the number of times where Bob will guess the correct it. Therefore, the average success probability is given by T c S = 1 n n n! n 0!n 1!... n 1! max{n 0, n 1,..., n 1 }, where the summation is over all n+ 1 1 possible solutions of 6. III. BINARY RANDOM ACCESS CODE A binary ranom access coe figure 2 is a communication complexity problem base on the stanar RAC. Two parties, Alice an Bob, are given the following task: Alice receives n its a = a 0,... a n 1 same as in the stanar RAC. She sens a -value message to Bob. However, Bob gets two inputs y {0, 1,..., n 1} an k {0, 1,..., 1}. He nees to answer the question: is a y = k? Bob encoes his answer in a variable G which is 0 when his guess is YES an 1 for NO. 8 FIG. 2. Scheme of binary RAC BRAC. Alice gets the input a 0,... a n 1 an sens the message m to Bob. Besies the message Bob receives two inputs y {0, 1,..., n 1} an k {0, 1,..., 1}. His task is to guess whether a y = k or not. His answer is encoe in G, which is 0 when his guess is YES an 1, when it is NO. A. Defining average payoff function We are free to rewar the parties with any number of points, specifie by a payoff function T a, y, k, G. Therefore, for simplicity we assume that this function oes not epen on the values of numbers a i in the input a with inices ifferent than y. Hence, we assign T only two values { TY T a y, k, G = ES when G = 0 an a y = k 9 1 when G = 1 an a y k. We are intereste in the average payoff function, which is a linear combination of payoffs for all possible uniformly istribute inputs. Without loss of generality, we can normalize average payoff such that it takes the value within [0, 1]. Thus, for binary RAC with payoffs efine in 9 we have T B = 1 [ n n T a,y,k + pg = 1 a, y, k, a y k ], pg = 0 a, y, k, a y = kt Y ES + where T = T Y ES + 1 such that T B is normalize. B. Optimal classical strategy for Bob 10 For fining the optimal classical strategy for Bob, first we split him into two parts B I initial Bob an B F final Bob. B I gets the message m from Alice, receives input y an forwars long bit string b = b 0,..., b 1 to B F. Each of the bits in the string represents the given answer of B F for a ifferent question rule by k. Thus, when B F gets k an the bit string b he returns G = b k figure 3. This splitting in no way reuces the generality of Bob s behavior since the whole information processing part is one locally by B I. B F only returns one of the values from a table provie by B I. Notice that before receiving Alice s message Bob knows nothing about the string a, so his entropy Ha = n log

4 4 a 0 a 1...a n 1 Alice m y Bob I b 0...b 1 k Bob F FIG. 3. Scheme of binary RAC. Bob is split into two parts B Iinitial Bob an B F final Bob. we assume Alice s inputs are uniformly istribute. After receiving the message, Bob s entropy for each a i is reuce to Hi m = Ha i m. These two entropies are relate by information causality principle [28] n 1 Ha H i C, 11 i=0 where H i = 1 m=0 pmhm i is the average conitional Shannon entropy an C is a capacity of a classical channel. Hence, from 11 one obtains the lower boun for H i, which is etermine by two establishe quantities: entropy Ha an the channel capacity C. Besies the message m, B I receives the input y, which makes him intereste in the particular it a y from the string a. Let us introuce the following probability istribution p j = pa y = j m, y, where j {0,..., 1}, which represents B I s knowlege about it y. Firstly, one sees that the entropy Hi=y m can be presente in terms of this probability istribution 1 Hi=y m = p j log p j. 12 Seconly, one notices that epening on the payoff function, there exists a critical value of probability p crit such that if p j > p crit then sening b j = 0 leas to larger average payoff than b j = 1. We erive a formula for p crit in the following way. One knows that sening b j = 0 leas to the answer G = 0 for j = k. This gives T Y ES points with probability p j. For b j = 1 one gets 1 point with 1 p j. The first option is better if T Y ES p j 1 p j, so p j 1 T Y ES + 1 = p crit. 13 Furthermore, let us analyze the average payoff T = T m, y for a message set m, given encoing strategy E, the input y an T efine in 10 T = 1 1 T Y ES pb j = 0 m, ypa y = j m, y 14 T + pb j = 1 m, ypa y j m, y. G We introuce a variable x as the number of bits in the string b for which the optimal strategy sets to 0 for the probability istribution pb j m, y. In other wors x is the number of p j s, which are greater than p crit. Using x one can rewrite the entropy Hi=y m 12 in the following way x 1 1 Hi=y m = p j log p j p j log p j. 15 j=x Aitionally, without loss of generality, we may assume that p j are orere in such way that p j p j+1. Then the average payoff becomes [ T = 1 x 1 ] 1 T Y ES p j + 1 p j. 16 T j=x Because the value of T 16 epens only on the sums x 1 p j an 1 j=x p j an not on the iniviual elements of the sums, we can choose that all the elements in each sum are equal because this makes the entropy Hi=y m 15 largest without changing T. In other wors the probability istribution p j becomes a step function: the values of all p j for j = {0,..., x 1} are uniform enote by p an the values of the remaining p j for j = {x,..., 1} are uniform as well an, accoring to the normalization conition j p j = 1, they must be equal to 1 xp x. Obviously, we assume that the encoing strategy E reaches p > 1. Due to above assumptions one can express T as a function of x an p ] T = 1 T [x[t Y ES p 1 p] The entropy 15 from now note by H x can also be expresse by these parameters H x = xp log p 1 xp log 1 xp x. 18 Imposing 13 we substitute T Y ES in 17 an fin p = T + p crit[t 1 2T + x + 1]. 19 x One can further plug the above expression into 18 to get the entropy H x as a function of, T, x an p crit. C. Optimal x for our case It has been shown in the section II A that the majority encoing is optimal in the stanar RAC scenario, where Alice is allowe to sen only one it of information to Bob. To employ this result in the binary RAC protocol in this case B I sens to B F a bit string b 0... b 1 with exactly one 0 in the establishe position an 1s in the others one must put the restriction that for any T, probability p for x = 1 is always greater than any p for x To make it, one must fin a lower boun of p crit such that the entropy H x=1 is always

5 5 greater than any entropy H x 1 for any given value of T from the relevant range. Hence, in the beginning, we efine a function i in the following way i 1 i = H x=1 H x=i. 20 Notice that the symmetry of the entropy H x = H x for x {1,..., 1} causes that it is sufficient to check the conition 20 only for i, i {2, 3,..., 2 }. Let us outline the methoology of obtaining the minimum value of p crit for which i > 0. Clearly, i is a function of, T, p crit. We first fin the range of T in terms of an p crit within which i is well-efine. After that, we fix the value of an p crit, an obtain the minimum value of i within the relevant range of T for all i. If the minimum value of i is non-positive for some i {2,..., 2 }, we know such value of p crit is not suitable. We repeat the evaluation of i for another value of p crit increase by a small interval than before. Once we fin that i is positive for all i {2,..., 2 }, we conclue that the taken value of p crit is approximately same as the esire value. Firstly, for every i we must etermine the range of T. The lower limit of the range is the value of T for which H x=1 is maximal. Accoring to 18 H x=1 takes maximum for p = 1. Putting it in 19 gives an analytical expression for the lower limit T 0 = 1 + 2p crit + 2p crit. 21 On the other han, the upper limit of the range is the value of T > T 0 for which H x takes the boun. The boun is establishe by putting xp = 1 in 18, so it strictly epens on x. Hence, setting p = 1 x in 19 gives T x=i 1 = 1 + p crit i p crit. 22 Thus, for every i there is a ifferent range [T 0, T x=i 1 ]. We have foun p crit numerically using a metho escribe by the following algorithm: 1. For a chosen imension, fix p crit = 1 an ε p crit which is its numerical increase. 2. Substitute p crit := p crit + ε pcrit. 3. Calculate T 0 from Fix variable i := Calculate T x=i 1 from Calculate i for T 0, T1 x=i an fin the minimal value of i in the range [T 0, T1 x=i ] if the minimal value oes not exist o not take it into account. If i 0 for at least one of these three or two points then go to the point 2. Otherwise, i := i Check if i 2. If it is fulfille then go to the point 5. Otherwise return p crit. Obviously, the accuracy of our metho epens strictly on ε pcrit.the smaller it is the more precise is the result. Aitionally, it is noteworthy that the criteria for optimal encoing is erive from Hi=y m 12 which is vali for all y {0,..., n 1} an thus it is inepenent on n. To illustrate the proceure escribe above we plot the epenence of H on T for some small p crit an ifferent values of x in figures 4 an 5. Obtaine values of p crit along with H x=4 x=3 x=2 T 0 T 1 T 1 T T FIG. 4. Depenence of H on T for = 8, x = 1, 2, 3, 4 an p crit = We note that the entropy for the strategy with x = 1 is not always the largest in the establishe ranges of T. Accoring to the numerical proceure, this is an example in which at the point 6 i 0 an our algorithm skips from the point 6 to the point 2. Vertical lines inicate limits of the ranges [T 0, T1 x=i ] H x=4 x=3 x=2 T 0 T 1 T 1 T T FIG. 5. Depenence of H on T for = 8, x = 1, 2, 3, 4 an p crit = Largest entropy is obtaine with exactly one strategy for which x = 1. Accoring to our proceure, this is an example in which at the point 6 i > 0 for every i {2, 3,..., } an our 2 algorithm returns p crit. Vertical lines inicate the limits of ranges [T 0, T1 x=i ]. their corresponing T Y ES are shown in figure 6 an the values for some particular imensions are mentione in table I. D. The average classical an quantum payoff function for n = 2 an arbitrary imension Now we calculate the average classical an quantum payoff 10 for binary RAC. Firstly, for a given imension, we must x=1 x=2 x=3 x=4 x=1 x=2 x=3 x=4

6 P crit T yes FIG. 6. Numerical calculation of values of minimal p crit an correspoing to it maximal T Y ES as a function of imension with accuracy ε pcrit = p crit T Y ES TABLE I. Values of minimal p crit an corresponing to it maximal T Y ES for chosen imensions. etermine the value of T Y ES corresponing to x = 1 as it was presente in the previous section. It follows that the optimal encoing strategy is sening the majority it same as for the stanar RAC 5. Further, it can be reaily seen that given an encoing E the optimal ecoing is 0 if δ m,ea δ m,ea G = a a y=k a a y k 23 1 otherwise. Therefore, in the case of majority encoing, Bob returns G = 0 if the receive message m = k, otherwise 1. Given an input a the total payoff over all possible y, k is T ñ + 2n ñ, 24 where we enote ñ = max{n 0, n 1,..., n 1 }. This is ue to the fact that if y is such that n y is the maximum, i.e. a y is the majority it, then Bob gives the correct answer for all k, obtaining the maximum payoff T. Such event occurs ñ times. In the other n ñ cases Bob returns the correct answer only if k a y an k Ea, obtaining 2 payoff. Subsequently, the average payoff is given by T c B = 1 n n T n! n 0!n 1!... n 1! 25 [ñt Y ES n 2], where the summation is over all n+ 1 1 possible solutions of 6. Imposing the expression of the average payoff of RAC 8, T c B simplifies to T c B = T Y ES + 1T c S T Y ES + 1 For n = 2, one can fin T c S = , an substituting this in 26 leas to T c B = 1 [ ] TY ES T Y ES T 2 Let us consier a quantum strategy base on the quantum RAC presente in [18]. Alice coes her input a 0 a 1 in - imensional quantum state as follows ψ a0a 1 = 1 N 2, a ω ja1 a 1 + j, 28 where N 2, = is the normalization factor an ω = e 2πi is quantum Fourier transform factor. For the ecoing Bob uses the following projective measurements M y k, epening on input y, k, M 0 k = {P 0 k, I P 0 k }, M 1 k = {P 1 k, I P 1 k }. 29 Here, Pk 0 = k k an Pk 1 = k k taking k = 1 1 k=0 ωk k k correspon to the outcome G = 0. Simple calculations lea to the quantum average payoff T q B = 1 [ TY ES ] 2 + T Y ES 3 T The ifference between 30 an 27 is given by T q B T c B = 1 T [ TY ES ], 31 which is always greater than zero for 2. Thus, the binary version of RAC provies a evice inepenent way to test arbitrary imensional quantum system employing only binary outcome measurements. IV. SUMMARY The primary feature of this article is to present a DW applicable to test arbitrarily large quantum systems implementing only binary outcome measurements. We propose a new variant of RAC an take the average payoff of this communication task as the inicator of the imension. We have provie the optimal classical boun for the binary version of the generalize RAC. In contrast to the other quantum communication complexity problems in which the number of prepare states grows exponentially with imension, the propose DW requires 2 ifferent preparations an 2 measurements. In the future, it woul be interesting to prove the optimality of the quantum strategy for binary RAC an look for more robust DWs retaining the aforementione significant features.

7 7 ACKNOWLEDGMENTS We thank Máté Farkas an Egar A. Aguilar for helpful iscussions an comments. We are also grateful to Egar A. Aguilar for the revision of the manuscript. This work was supporte by FNP programme First TEAM Grant No. First TEAM/2016-1/5, First TEAM/2017-4/31, NCN grants 2014/14/E/ST2/00020 an 2016/23/N/ST2/ [1] S. Wehner, M. Christanl, an A. C. Doherty, Phys. Rev. A 78, [2] R. Gallego, N. Brunner, C. Haley, an A. Acín, Physical Review Letters 105, [3] G. Brassar, Founations of Physics 33, [4] H. Buhrman, R. Cleve, S. Massar, an R. e Wolf, Rev. Mo. Phys. 82, [5] J. Ahrens, P. Baziag, A. Cabello, an M. Bourennane, Nature Physics 8, [6] M. Henrych, R. Gallego, M. Mičua, N. Brunner, A. Acín, an J. P. Torres, Nature Physics 8, [7] V. D Ambrosio, F. Bisesto, F. Sciarrino, J. F. Barra, G. Lima, an A. Cabello, Phys. Rev. Lett. 112, [8] J. Ahrens, P. Baziag, M. Pawłowski, M. Żukowski, an M. Bourennane, Phys. Rev. Lett. 112, [9] E. A. Aguilar, M. Farkas, D. Martínez, M. Alvarao, J. Cariñe, G. B. Xavier, J. F. Barra, G. Cañas, M. Pawłowski, an G. Lima, Phys. Rev. Lett. 120, [10] A. Tavakoli, M. Pawłowski, M. Żukowski, an M. Bourennane, Phys. Rev. A 95, R [11] A. Ambainis, D. Leung, L. Mančinska, an M. Ozols 2008, arxiv [12] Note1, pa, y coul be absorbe into T a, y, b. Nevertheless, the state form provies a simple intuition. [13] S. Wiesner, SIGACT News 15, [14] A. Ambainis, A. Nayak, A. Ta-Shma, an U. Vazirani, Proceeings of the 31st Annual ACM Symposium on Theory of Computing STOC 99 p [15] A. Nayak, Proceeings of the 40th IEEE Symposium on Founations of Computer Science FOCS 99 p [16] E. Galvão, PhD thesis [17] A. Casaccino, E. F. Galvão, an S. Severini, Physical Review A 78, [18] A. Tavakoli, A. Hameei, B. Marques, an M. Bourennane, Phys. Rev. Lett. 114, [19] A. Hameei, D. Saha, P. Mironowicz, M. Pawłowski, an M. Bourennane, Phys. Rev. A 95, [20] A. Hameei, B. Marques, P. Mironowicz, D. Saha, M. Pawłowski, an M. Bourennane 2015, arxiv v2. [21] E. A. Aguilar, J. J. Borkała, P. Mironowicz, an M. Pawłowski, Phys. Rev. Lett. 121, [22] M. Farkas an J. Kaniewski 2018, arxiv v2. [23] Note2, by it we mean -imensional classical system. [24] A. Ambainis, D. Kravchenko, an A. Rai 2015, arxiv [25] P. Erős an L. R. Graham, Acta Arithmetica 21, [26] J. Dixmier, Journal of Number Theory 34, [27] J. H. van Lint an R. M. Wilson, A course in combinatorics. Secon eition Cambrige University Press, [28] M. Pawłowski, T. Paterek, D. Kaszlikowski, V. Scarani, A. Winter, an M. Żukowski, Nature 461,

Lower Bounds for the Smoothed Number of Pareto optimal Solutions

Lower Bounds for the Smoothed Number of Pareto optimal Solutions Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.

More information

Lower bounds on Locality Sensitive Hashing

Lower bounds on Locality Sensitive Hashing Lower bouns on Locality Sensitive Hashing Rajeev Motwani Assaf Naor Rina Panigrahy Abstract Given a metric space (X, X ), c 1, r > 0, an p, q [0, 1], a istribution over mappings H : X N is calle a (r,

More information

arxiv: v1 [quant-ph] 30 Nov 2018

arxiv: v1 [quant-ph] 30 Nov 2018 Experimentally feasible semi-device-independent certification of 4 outcome POVMs arxiv:8.2872v [quant-ph 30 Nov 208 Piotr Mironowicz, 2, and Marcin Pawłowski 2, 3 Department of Algorithms and System Modeling,

More information

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013 Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing

More information

Least-Squares Regression on Sparse Spaces

Least-Squares Regression on Sparse Spaces Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction

More information

Implicit Differentiation

Implicit Differentiation Implicit Differentiation Thus far, the functions we have been concerne with have been efine explicitly. A function is efine explicitly if the output is given irectly in terms of the input. For instance,

More information

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION The Annals of Statistics 1997, Vol. 25, No. 6, 2313 2327 LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION By Eva Riccomagno, 1 Rainer Schwabe 2 an Henry P. Wynn 1 University of Warwick, Technische

More information

ASYMMETRIC TWO-OUTPUT QUANTUM PROCESSOR IN ANY DIMENSION

ASYMMETRIC TWO-OUTPUT QUANTUM PROCESSOR IN ANY DIMENSION ASYMMETRIC TWO-OUTPUT QUANTUM PROCESSOR IN ANY IMENSION IULIA GHIU,, GUNNAR BJÖRK Centre for Avance Quantum Physics, University of Bucharest, P.O. Box MG-, R-0775, Bucharest Mgurele, Romania School of

More information

This module is part of the. Memobust Handbook. on Methodology of Modern Business Statistics

This module is part of the. Memobust Handbook. on Methodology of Modern Business Statistics This moule is part of the Memobust Hanbook on Methoology of Moern Business Statistics 26 March 2014 Metho: Balance Sampling for Multi-Way Stratification Contents General section... 3 1. Summary... 3 2.

More information

Chapter 6: Energy-Momentum Tensors

Chapter 6: Energy-Momentum Tensors 49 Chapter 6: Energy-Momentum Tensors This chapter outlines the general theory of energy an momentum conservation in terms of energy-momentum tensors, then applies these ieas to the case of Bohm's moel.

More information

The derivative of a function f(x) is another function, defined in terms of a limiting expression: f(x + δx) f(x)

The derivative of a function f(x) is another function, defined in terms of a limiting expression: f(x + δx) f(x) Y. D. Chong (2016) MH2801: Complex Methos for the Sciences 1. Derivatives The erivative of a function f(x) is another function, efine in terms of a limiting expression: f (x) f (x) lim x δx 0 f(x + δx)

More information

Acute sets in Euclidean spaces

Acute sets in Euclidean spaces Acute sets in Eucliean spaces Viktor Harangi April, 011 Abstract A finite set H in R is calle an acute set if any angle etermine by three points of H is acute. We examine the maximal carinality α() of

More information

Agmon Kolmogorov Inequalities on l 2 (Z d )

Agmon Kolmogorov Inequalities on l 2 (Z d ) Journal of Mathematics Research; Vol. 6, No. ; 04 ISSN 96-9795 E-ISSN 96-9809 Publishe by Canaian Center of Science an Eucation Agmon Kolmogorov Inequalities on l (Z ) Arman Sahovic Mathematics Department,

More information

arxiv: v1 [physics.flu-dyn] 8 May 2014

arxiv: v1 [physics.flu-dyn] 8 May 2014 Energetics of a flui uner the Boussinesq approximation arxiv:1405.1921v1 [physics.flu-yn] 8 May 2014 Kiyoshi Maruyama Department of Earth an Ocean Sciences, National Defense Acaemy, Yokosuka, Kanagawa

More information

The Principle of Least Action

The Principle of Least Action Chapter 7. The Principle of Least Action 7.1 Force Methos vs. Energy Methos We have so far stuie two istinct ways of analyzing physics problems: force methos, basically consisting of the application of

More information

d dx But have you ever seen a derivation of these results? We ll prove the first result below. cos h 1

d dx But have you ever seen a derivation of these results? We ll prove the first result below. cos h 1 Lecture 5 Some ifferentiation rules Trigonometric functions (Relevant section from Stewart, Seventh Eition: Section 3.3) You all know that sin = cos cos = sin. () But have you ever seen a erivation of

More information

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012 CS-6 Theory Gems November 8, 0 Lecture Lecturer: Alesaner Mąry Scribes: Alhussein Fawzi, Dorina Thanou Introuction Toay, we will briefly iscuss an important technique in probability theory measure concentration

More information

A Note on Exact Solutions to Linear Differential Equations by the Matrix Exponential

A Note on Exact Solutions to Linear Differential Equations by the Matrix Exponential Avances in Applie Mathematics an Mechanics Av. Appl. Math. Mech. Vol. 1 No. 4 pp. 573-580 DOI: 10.4208/aamm.09-m0946 August 2009 A Note on Exact Solutions to Linear Differential Equations by the Matrix

More information

Qubit channels that achieve capacity with two states

Qubit channels that achieve capacity with two states Qubit channels that achieve capacity with two states Dominic W. Berry Department of Physics, The University of Queenslan, Brisbane, Queenslan 4072, Australia Receive 22 December 2004; publishe 22 March

More information

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments 2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor

More information

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs Lectures - Week 10 Introuction to Orinary Differential Equations (ODES) First Orer Linear ODEs When stuying ODEs we are consiering functions of one inepenent variable, e.g., f(x), where x is the inepenent

More information

Remote Preparation of Multipartite Equatorial Entangled States in High Dimensions with Three Parties

Remote Preparation of Multipartite Equatorial Entangled States in High Dimensions with Three Parties Commun. Theor. Phys. (Beiing, China) 51 (2009) pp. 641 647 c Chinese Physical Society an IOP Publishing Lt Vol. 51, No. 4, April 15, 2009 Remote Preparation of Multipartite Equatorial Entangle States in

More information

Schrödinger s equation.

Schrödinger s equation. Physics 342 Lecture 5 Schröinger s Equation Lecture 5 Physics 342 Quantum Mechanics I Wenesay, February 3r, 2010 Toay we iscuss Schröinger s equation an show that it supports the basic interpretation of

More information

Table of Common Derivatives By David Abraham

Table of Common Derivatives By David Abraham Prouct an Quotient Rules: Table of Common Derivatives By Davi Abraham [ f ( g( ] = [ f ( ] g( + f ( [ g( ] f ( = g( [ f ( ] g( g( f ( [ g( ] Trigonometric Functions: sin( = cos( cos( = sin( tan( = sec

More information

arxiv:quant-ph/ v1 10 Jan 2007

arxiv:quant-ph/ v1 10 Jan 2007 Blin encoing into quits J. S. Shaari a, M. R. B. Wahiin a,b, an S. Mancini c a Faculty of Science, International Islamic University of Malaysia IIUM), Jalan Gombak, 5300 Kuala Lumpur, Malaysia b Cyberspace

More information

19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control

19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control 19 Eigenvalues, Eigenvectors, Orinary Differential Equations, an Control This section introuces eigenvalues an eigenvectors of a matrix, an iscusses the role of the eigenvalues in etermining the behavior

More information

SYNCHRONOUS SEQUENTIAL CIRCUITS

SYNCHRONOUS SEQUENTIAL CIRCUITS CHAPTER SYNCHRONOUS SEUENTIAL CIRCUITS Registers an counters, two very common synchronous sequential circuits, are introuce in this chapter. Register is a igital circuit for storing information. Contents

More information

Topic 7: Convergence of Random Variables

Topic 7: Convergence of Random Variables Topic 7: Convergence of Ranom Variables Course 003, 2016 Page 0 The Inference Problem So far, our starting point has been a given probability space (S, F, P). We now look at how to generate information

More information

PDE Notes, Lecture #11

PDE Notes, Lecture #11 PDE Notes, Lecture # from Professor Jalal Shatah s Lectures Febuary 9th, 2009 Sobolev Spaces Recall that for u L loc we can efine the weak erivative Du by Du, φ := udφ φ C0 If v L loc such that Du, φ =

More information

Entanglement is not very useful for estimating multiple phases

Entanglement is not very useful for estimating multiple phases PHYSICAL REVIEW A 70, 032310 (2004) Entanglement is not very useful for estimating multiple phases Manuel A. Ballester* Department of Mathematics, University of Utrecht, Box 80010, 3508 TA Utrecht, The

More information

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions Working Paper 2013:5 Department of Statistics Computing Exact Confience Coefficients of Simultaneous Confience Intervals for Multinomial Proportions an their Functions Shaobo Jin Working Paper 2013:5

More information

u!i = a T u = 0. Then S satisfies

u!i = a T u = 0. Then S satisfies Deterministic Conitions for Subspace Ientifiability from Incomplete Sampling Daniel L Pimentel-Alarcón, Nigel Boston, Robert D Nowak University of Wisconsin-Maison Abstract Consier an r-imensional subspace

More information

Linear First-Order Equations

Linear First-Order Equations 5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)

More information

FLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS. 1. Introduction

FLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS. 1. Introduction FLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS ALINA BUCUR, CHANTAL DAVID, BROOKE FEIGON, MATILDE LALÍN 1 Introuction In this note, we stuy the fluctuations in the number

More information

Diagonalization of Matrices Dr. E. Jacobs

Diagonalization of Matrices Dr. E. Jacobs Diagonalization of Matrices Dr. E. Jacobs One of the very interesting lessons in this course is how certain algebraic techniques can be use to solve ifferential equations. The purpose of these notes is

More information

Lecture 5. Symmetric Shearer s Lemma

Lecture 5. Symmetric Shearer s Lemma Stanfor University Spring 208 Math 233: Non-constructive methos in combinatorics Instructor: Jan Vonrák Lecture ate: January 23, 208 Original scribe: Erik Bates Lecture 5 Symmetric Shearer s Lemma Here

More information

Situation awareness of power system based on static voltage security region

Situation awareness of power system based on static voltage security region The 6th International Conference on Renewable Power Generation (RPG) 19 20 October 2017 Situation awareness of power system base on static voltage security region Fei Xiao, Zi-Qing Jiang, Qian Ai, Ran

More information

The Exact Form and General Integrating Factors

The Exact Form and General Integrating Factors 7 The Exact Form an General Integrating Factors In the previous chapters, we ve seen how separable an linear ifferential equations can be solve using methos for converting them to forms that can be easily

More information

Generalized Tractability for Multivariate Problems

Generalized Tractability for Multivariate Problems Generalize Tractability for Multivariate Problems Part II: Linear Tensor Prouct Problems, Linear Information, an Unrestricte Tractability Michael Gnewuch Department of Computer Science, University of Kiel,

More information

Generalizing Kronecker Graphs in order to Model Searchable Networks

Generalizing Kronecker Graphs in order to Model Searchable Networks Generalizing Kronecker Graphs in orer to Moel Searchable Networks Elizabeth Boine, Babak Hassibi, Aam Wierman California Institute of Technology Pasaena, CA 925 Email: {eaboine, hassibi, aamw}@caltecheu

More information

Quantum Mechanics in Three Dimensions

Quantum Mechanics in Three Dimensions Physics 342 Lecture 20 Quantum Mechanics in Three Dimensions Lecture 20 Physics 342 Quantum Mechanics I Monay, March 24th, 2008 We begin our spherical solutions with the simplest possible case zero potential.

More information

Influence of weight initialization on multilayer perceptron performance

Influence of weight initialization on multilayer perceptron performance Influence of weight initialization on multilayer perceptron performance M. Karouia (1,2) T. Denœux (1) R. Lengellé (1) (1) Université e Compiègne U.R.A. CNRS 817 Heuiasyc BP 649 - F-66 Compiègne ceex -

More information

Linear and quadratic approximation

Linear and quadratic approximation Linear an quaratic approximation November 11, 2013 Definition: Suppose f is a function that is ifferentiable on an interval I containing the point a. The linear approximation to f at a is the linear function

More information

arxiv:quant-ph/ May 2002

arxiv:quant-ph/ May 2002 Multiparty -imensional quantum information splitting Anrze Gruka* an Antoni Wócik** Faculty of Physics, Aam Mickiewicz University, arxiv:quant-ph/5 7 May 8PXOWRZVND3R]QD3RODQG Abstract Generalization of

More information

θ x = f ( x,t) could be written as

θ x = f ( x,t) could be written as 9. Higher orer PDEs as systems of first-orer PDEs. Hyperbolic systems. For PDEs, as for ODEs, we may reuce the orer by efining new epenent variables. For example, in the case of the wave equation, (1)

More information

EE 418: Network Security and Cryptography

EE 418: Network Security and Cryptography Problem 1 EE 418: Network Security an Cryptography Homework 5 Assigne: Wenesay, November 23, 2016, Due: Tuesay, December 6, 2016 Instructor: Tamara Bonaci Department of Electrical Engineering University

More information

Introduction to the Vlasov-Poisson system

Introduction to the Vlasov-Poisson system Introuction to the Vlasov-Poisson system Simone Calogero 1 The Vlasov equation Consier a particle with mass m > 0. Let x(t) R 3 enote the position of the particle at time t R an v(t) = ẋ(t) = x(t)/t its

More information

Survey-weighted Unit-Level Small Area Estimation

Survey-weighted Unit-Level Small Area Estimation Survey-weighte Unit-Level Small Area Estimation Jan Pablo Burgar an Patricia Dörr Abstract For evience-base regional policy making, geographically ifferentiate estimates of socio-economic inicators are

More information

Separation of Variables

Separation of Variables Physics 342 Lecture 1 Separation of Variables Lecture 1 Physics 342 Quantum Mechanics I Monay, January 25th, 2010 There are three basic mathematical tools we nee, an then we can begin working on the physical

More information

Robust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k

Robust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k A Proof of Lemma 2 B Proof of Lemma 3 Proof: Since the support of LL istributions is R, two such istributions are equivalent absolutely continuous with respect to each other an the ivergence is well-efine

More information

Math 342 Partial Differential Equations «Viktor Grigoryan

Math 342 Partial Differential Equations «Viktor Grigoryan Math 342 Partial Differential Equations «Viktor Grigoryan 6 Wave equation: solution In this lecture we will solve the wave equation on the entire real line x R. This correspons to a string of infinite

More information

TELEBROADCASTING OF ENTANGLED TWO-SPIN-1/2 STATES

TELEBROADCASTING OF ENTANGLED TWO-SPIN-1/2 STATES TELEBRODCSTING OF ENTNGLED TWO-SPIN-/ STTES IULI GHIU Department of Physics, University of Bucharest, P.O. Box MG-, R-775, Bucharest-Mãgurele, Romania Receive December, 4 quantum telebroacasting process

More information

Lagrangian and Hamiltonian Mechanics

Lagrangian and Hamiltonian Mechanics Lagrangian an Hamiltonian Mechanics.G. Simpson, Ph.. epartment of Physical Sciences an Engineering Prince George s Community College ecember 5, 007 Introuction In this course we have been stuying classical

More information

Applications of First Order Equations

Applications of First Order Equations Applications of First Orer Equations Viscous Friction Consier a small mass that has been roppe into a thin vertical tube of viscous flui lie oil. The mass falls, ue to the force of gravity, but falls more

More information

Tractability results for weighted Banach spaces of smooth functions

Tractability results for weighted Banach spaces of smooth functions Tractability results for weighte Banach spaces of smooth functions Markus Weimar Mathematisches Institut, Universität Jena Ernst-Abbe-Platz 2, 07740 Jena, Germany email: markus.weimar@uni-jena.e March

More information

Lecture 2 Lagrangian formulation of classical mechanics Mechanics

Lecture 2 Lagrangian formulation of classical mechanics Mechanics Lecture Lagrangian formulation of classical mechanics 70.00 Mechanics Principle of stationary action MATH-GA To specify a motion uniquely in classical mechanics, it suffices to give, at some time t 0,

More information

Error Correction of Quantum Reference Frame Information

Error Correction of Quantum Reference Frame Information Error Correction of Quantum Reference Frame Information Patrick Hayen, 1 Sepehr Nezami, 1 Sanu Popescu, an Grant Salton 1 1 Stanfor Institute for Theoretical Physics, Stanfor University, Stanfor, California

More information

Necessary and Sufficient Conditions for Sketched Subspace Clustering

Necessary and Sufficient Conditions for Sketched Subspace Clustering Necessary an Sufficient Conitions for Sketche Subspace Clustering Daniel Pimentel-Alarcón, Laura Balzano 2, Robert Nowak University of Wisconsin-Maison, 2 University of Michigan-Ann Arbor Abstract This

More information

Thermal conductivity of graded composites: Numerical simulations and an effective medium approximation

Thermal conductivity of graded composites: Numerical simulations and an effective medium approximation JOURNAL OF MATERIALS SCIENCE 34 (999)5497 5503 Thermal conuctivity of grae composites: Numerical simulations an an effective meium approximation P. M. HUI Department of Physics, The Chinese University

More information

Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes

Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes Leaving Ranomness to Nature: -Dimensional Prouct Coes through the lens of Generalize-LDPC coes Tavor Baharav, Kannan Ramchanran Dept. of Electrical Engineering an Computer Sciences, U.C. Berkeley {tavorb,

More information

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Ashish Goel Michael Kapralov Sanjeev Khanna Abstract We consier the well-stuie problem of fining a perfect matching in -regular bipartite

More information

CHAPTER 1 : DIFFERENTIABLE MANIFOLDS. 1.1 The definition of a differentiable manifold

CHAPTER 1 : DIFFERENTIABLE MANIFOLDS. 1.1 The definition of a differentiable manifold CHAPTER 1 : DIFFERENTIABLE MANIFOLDS 1.1 The efinition of a ifferentiable manifol Let M be a topological space. This means that we have a family Ω of open sets efine on M. These satisfy (1), M Ω (2) the

More information

arxiv: v4 [math.pr] 27 Jul 2016

arxiv: v4 [math.pr] 27 Jul 2016 The Asymptotic Distribution of the Determinant of a Ranom Correlation Matrix arxiv:309768v4 mathpr] 7 Jul 06 AM Hanea a, & GF Nane b a Centre of xcellence for Biosecurity Risk Analysis, University of Melbourne,

More information

Introduction to variational calculus: Lecture notes 1

Introduction to variational calculus: Lecture notes 1 October 10, 2006 Introuction to variational calculus: Lecture notes 1 Ewin Langmann Mathematical Physics, KTH Physics, AlbaNova, SE-106 91 Stockholm, Sween Abstract I give an informal summary of variational

More information

Spatial versus Sequential Correlations for Random Access Coding

Spatial versus Sequential Correlations for Random Access Coding Spatial versus Sequential Correlations for Random Access Coding Armin Tavakoli 1,2, Breno Marques 1,, Marcin Paw lowski 2, Mohamed Bourennane 1 1 Department of Physics, Stockholm University, S-1061 Stockholm,

More information

Tutorial on Maximum Likelyhood Estimation: Parametric Density Estimation

Tutorial on Maximum Likelyhood Estimation: Parametric Density Estimation Tutorial on Maximum Likelyhoo Estimation: Parametric Density Estimation Suhir B Kylasa 03/13/2014 1 Motivation Suppose one wishes to etermine just how biase an unfair coin is. Call the probability of tossing

More information

Discrete Mathematics

Discrete Mathematics Discrete Mathematics 309 (009) 86 869 Contents lists available at ScienceDirect Discrete Mathematics journal homepage: wwwelseviercom/locate/isc Profile vectors in the lattice of subspaces Dániel Gerbner

More information

arxiv: v1 [hep-lat] 19 Nov 2013

arxiv: v1 [hep-lat] 19 Nov 2013 HU-EP-13/69 SFB/CPP-13-98 DESY 13-225 Applicability of Quasi-Monte Carlo for lattice systems arxiv:1311.4726v1 [hep-lat] 19 ov 2013, a,b Tobias Hartung, c Karl Jansen, b Hernan Leovey, Anreas Griewank

More information

Some Examples. Uniform motion. Poisson processes on the real line

Some Examples. Uniform motion. Poisson processes on the real line Some Examples Our immeiate goal is to see some examples of Lévy processes, an/or infinitely-ivisible laws on. Uniform motion Choose an fix a nonranom an efine X := for all (1) Then, {X } is a [nonranom]

More information

Chapter 9 Method of Weighted Residuals

Chapter 9 Method of Weighted Residuals Chapter 9 Metho of Weighte Resiuals 9- Introuction Metho of Weighte Resiuals (MWR) is an approimate technique for solving bounary value problems. It utilizes a trial functions satisfying the prescribe

More information

Balancing Expected and Worst-Case Utility in Contracting Models with Asymmetric Information and Pooling

Balancing Expected and Worst-Case Utility in Contracting Models with Asymmetric Information and Pooling Balancing Expecte an Worst-Case Utility in Contracting Moels with Asymmetric Information an Pooling R.B.O. erkkamp & W. van en Heuvel & A.P.M. Wagelmans Econometric Institute Report EI2018-01 9th January

More information

Quantum mechanical approaches to the virial

Quantum mechanical approaches to the virial Quantum mechanical approaches to the virial S.LeBohec Department of Physics an Astronomy, University of Utah, Salt Lae City, UT 84112, USA Date: June 30 th 2015 In this note, we approach the virial from

More information

Delocalization of boundary states in disordered topological insulators

Delocalization of boundary states in disordered topological insulators Journal of Physics A: Mathematical an Theoretical J. Phys. A: Math. Theor. 48 (05) FT0 (pp) oi:0.088/75-83/48//ft0 Fast Track Communication Delocalization of bounary states in isorere topological insulators

More information

Homework 3 - Solutions

Homework 3 - Solutions Homework 3 - Solutions The Transpose an Partial Transpose. 1 Let { 1, 2,, } be an orthonormal basis for C. The transpose map efine with respect to this basis is a superoperator Γ that acts on an operator

More information

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS MARK SCHACHNER Abstract. When consiere as an algebraic space, the set of arithmetic functions equippe with the operations of pointwise aition an

More information

Introduction to Markov Processes

Introduction to Markov Processes Introuction to Markov Processes Connexions moule m44014 Zzis law Gustav) Meglicki, Jr Office of the VP for Information Technology Iniana University RCS: Section-2.tex,v 1.24 2012/12/21 18:03:08 gustav

More information

Global Solutions to the Coupled Chemotaxis-Fluid Equations

Global Solutions to the Coupled Chemotaxis-Fluid Equations Global Solutions to the Couple Chemotaxis-Flui Equations Renjun Duan Johann Raon Institute for Computational an Applie Mathematics Austrian Acaemy of Sciences Altenbergerstrasse 69, A-44 Linz, Austria

More information

A new proof of the sharpness of the phase transition for Bernoulli percolation on Z d

A new proof of the sharpness of the phase transition for Bernoulli percolation on Z d A new proof of the sharpness of the phase transition for Bernoulli percolation on Z Hugo Duminil-Copin an Vincent Tassion October 8, 205 Abstract We provie a new proof of the sharpness of the phase transition

More information

Parameter estimation: A new approach to weighting a priori information

Parameter estimation: A new approach to weighting a priori information Parameter estimation: A new approach to weighting a priori information J.L. Mea Department of Mathematics, Boise State University, Boise, ID 83725-555 E-mail: jmea@boisestate.eu Abstract. We propose a

More information

Space-time Linear Dispersion Using Coordinate Interleaving

Space-time Linear Dispersion Using Coordinate Interleaving Space-time Linear Dispersion Using Coorinate Interleaving Jinsong Wu an Steven D Blostein Department of Electrical an Computer Engineering Queen s University, Kingston, Ontario, Canaa, K7L3N6 Email: wujs@ieeeorg

More information

Monotonicity of facet numbers of random convex hulls

Monotonicity of facet numbers of random convex hulls Monotonicity of facet numbers of ranom convex hulls Gilles Bonnet, Julian Grote, Daniel Temesvari, Christoph Thäle, Nicola Turchi an Florian Wespi arxiv:173.31v1 [math.mg] 7 Mar 17 Abstract Let X 1,...,

More information

arxiv:hep-th/ v1 3 Feb 1993

arxiv:hep-th/ v1 3 Feb 1993 NBI-HE-9-89 PAR LPTHE 9-49 FTUAM 9-44 November 99 Matrix moel calculations beyon the spherical limit arxiv:hep-th/93004v 3 Feb 993 J. Ambjørn The Niels Bohr Institute Blegamsvej 7, DK-00 Copenhagen Ø,

More information

Technion - Computer Science Department - M.Sc. Thesis MSC Constrained Codes for Two-Dimensional Channels.

Technion - Computer Science Department - M.Sc. Thesis MSC Constrained Codes for Two-Dimensional Channels. Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Constraine Coes for Two-Dimensional Channels Keren Censor Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Technion

More information

Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets

Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets Proceeings of the 4th East-European Conference on Avances in Databases an Information Systems ADBIS) 200 Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets Eleftherios Tiakas, Apostolos.

More information

EVALUATING HIGHER DERIVATIVE TENSORS BY FORWARD PROPAGATION OF UNIVARIATE TAYLOR SERIES

EVALUATING HIGHER DERIVATIVE TENSORS BY FORWARD PROPAGATION OF UNIVARIATE TAYLOR SERIES MATHEMATICS OF COMPUTATION Volume 69, Number 231, Pages 1117 1130 S 0025-5718(00)01120-0 Article electronically publishe on February 17, 2000 EVALUATING HIGHER DERIVATIVE TENSORS BY FORWARD PROPAGATION

More information

A Simulative Comparison of BB84 Protocol with its Improved Version

A Simulative Comparison of BB84 Protocol with its Improved Version JCS&T Vol. 7 No. 3 October 007 A Simulative Comparison of BB84 Protocol with its Improve Version Mohsen Sharifi an Hooshang Azizi Computer Engineering Department Iran University of Science an Technology,

More information

Sturm-Liouville Theory

Sturm-Liouville Theory LECTURE 5 Sturm-Liouville Theory In the three preceing lectures I emonstrate the utility of Fourier series in solving PDE/BVPs. As we ll now see, Fourier series are just the tip of the iceberg of the theory

More information

Entanglement, Einstein-Podolsky-Rosen correlations, Bell nonlocality, and steering

Entanglement, Einstein-Podolsky-Rosen correlations, Bell nonlocality, and steering PHYSICAL REVIEW A 76, 0526 2007 Entanglement, Einstein-Poolsky-Rosen correlations, Bell nonlocality, an steering S. J. Jones, H. M. Wiseman, an A. C. Doherty 2 Centre for Quantum Computer Technology, Centre

More information

Polynomial Inclusion Functions

Polynomial Inclusion Functions Polynomial Inclusion Functions E. e Weert, E. van Kampen, Q. P. Chu, an J. A. Muler Delft University of Technology, Faculty of Aerospace Engineering, Control an Simulation Division E.eWeert@TUDelft.nl

More information

Energy behaviour of the Boris method for charged-particle dynamics

Energy behaviour of the Boris method for charged-particle dynamics Version of 25 April 218 Energy behaviour of the Boris metho for charge-particle ynamics Ernst Hairer 1, Christian Lubich 2 Abstract The Boris algorithm is a wiely use numerical integrator for the motion

More information

6 General properties of an autonomous system of two first order ODE

6 General properties of an autonomous system of two first order ODE 6 General properties of an autonomous system of two first orer ODE Here we embark on stuying the autonomous system of two first orer ifferential equations of the form ẋ 1 = f 1 (, x 2 ), ẋ 2 = f 2 (, x

More information

How the potentials in different gauges yield the same retarded electric and magnetic fields

How the potentials in different gauges yield the same retarded electric and magnetic fields How the potentials in ifferent gauges yiel the same retare electric an magnetic fiels José A. Heras a Departamento e Física, E. S. F. M., Instituto Politécnico Nacional, México D. F. México an Department

More information

CONTROL CHARTS FOR VARIABLES

CONTROL CHARTS FOR VARIABLES UNIT CONTOL CHATS FO VAIABLES Structure.1 Introuction Objectives. Control Chart Technique.3 Control Charts for Variables.4 Control Chart for Mean(-Chart).5 ange Chart (-Chart).6 Stanar Deviation Chart

More information

On the Conservation of Information in Quantum Physics

On the Conservation of Information in Quantum Physics On the Conservation of Information in Quantum Physics Marco Roncaglia Physics Department an Research Center OPTIMAS, University of Kaiserslautern, Germany (Date: September 11, 2017 escribe the full informational

More information

Quantum Stochastic Walks: A Generalization of Classical Random Walks and Quantum Walks

Quantum Stochastic Walks: A Generalization of Classical Random Walks and Quantum Walks Quantum Stochastic Walks: A Generalization of Classical Ranom Walks an Quantum Walks The Harvar community has mae this article openly available. Please share how this access benefits you. Your story matters

More information

1 Math 285 Homework Problem List for S2016

1 Math 285 Homework Problem List for S2016 1 Math 85 Homework Problem List for S016 Note: solutions to Lawler Problems will appear after all of the Lecture Note Solutions. 1.1 Homework 1. Due Friay, April 8, 016 Look at from lecture note exercises:

More information

inflow outflow Part I. Regular tasks for MAE598/494 Task 1

inflow outflow Part I. Regular tasks for MAE598/494 Task 1 MAE 494/598, Fall 2016 Project #1 (Regular tasks = 20 points) Har copy of report is ue at the start of class on the ue ate. The rules on collaboration will be release separately. Please always follow the

More information

COUNTING VALUE SETS: ALGORITHM AND COMPLEXITY

COUNTING VALUE SETS: ALGORITHM AND COMPLEXITY COUNTING VALUE SETS: ALGORITHM AND COMPLEXITY QI CHENG, JOSHUA E. HILL, AND DAQING WAN Abstract. Let p be a prime. Given a polynomial in F p m[x] of egree over the finite fiel F p m, one can view it as

More information

A PAC-Bayesian Approach to Spectrally-Normalized Margin Bounds for Neural Networks

A PAC-Bayesian Approach to Spectrally-Normalized Margin Bounds for Neural Networks A PAC-Bayesian Approach to Spectrally-Normalize Margin Bouns for Neural Networks Behnam Neyshabur, Srinah Bhojanapalli, Davi McAllester, Nathan Srebro Toyota Technological Institute at Chicago {bneyshabur,

More information

arxiv:quant-ph/ v1 20 Jul 2006

arxiv:quant-ph/ v1 20 Jul 2006 Finite key analysis for symmetric attacks in quantum key istribution Tim Meyer, Hermann Kampermann, Matthias Kleinmann, an Dagmar Bruß Institut für Theoretische Physik III, Heinrich-Heine-Universität Düsselorf,

More information