arxiv: v1 [quant-ph] 10 Feb 2013

Size: px
Start display at page:

Download "arxiv: v1 [quant-ph] 10 Feb 2013"

Transcription

1 Provable Advantage for Quantum Strategies in Random Symmetric XOR Games Andris Ambainis, Jānis Iraids arxiv: v [quant-ph] Feb 23 Faculty of Computing, University of Latvia, Raiņa bulvāris 9, Riga, LV-586, Latvia Abstract. Non-local games are widely studied as a model to investigate the properties of quantum mechanics as opposed to classical mechanics. In this paper, we consider a subset of non-local games: symmetric XOR games of n players with - valued questions. For this class of games, each player receives an input bit and responds with an output bit without communicating to the other players. The winning condition only depends on XOR of output bits and is constant w.r.t. permutation of players. We prove that for almost any n-player symmetric XOR game the entangled value of the game is Θ lnn n /4 adapting an old result by Salem and Zygmund on the asymptotics of random trigonometric polynomials. Consequently, we show that the classical-quantum gap is Θ lnn for almost any symmetric XOR game. Introduction Non-local games provide a simple way to test the difference between quantum mechanics and the classical world. A prototypical example of a non-local game is the CHSH game [6] based on the CHSH inequality of [5]. In the CHSH game, we have two players who cannot communicate between themselves but may share common random bits or a bipartite quantum state which has been exchanged before the beginning of the game. A referee sends one uniformly random bit a {,} to the st player and another bit to the 2 nd player. Players respond by sending one-bit answers x,y {,}. They win in the following 2 cases: a If at least one of a,b is equal to, players win if they produce x,y such that x = y; b If a = b =, players win if they produce x,y such that x y; Classically, CHSH game can be won with probability at most.75. In contrast, if players use an entangled quantum state, they can win the game with probability = Other non-local games can be defined by changing the number of players, the number of possible questions and answers and the winning condition. Many non-local games have been studied and, in many cases, strategies that use an entangled quantum state outperform any classical strategy.

2 Recently [], it has been shown that, for a large class of non-local games, quantum strategies are better than any classical strategy for almost all games in this class. Namely, [] considered 2-player games in which the questions a, b are taken from the set {,2,...,n} and the winning condition is either x = y or x y, depending on a,b. Games with a winning condition of such form are called XOR games. [] showed that, for o fraction of all such games, the entangled value of the game is at least.2... times its classical value. Then [2], it was discovered that a similar effect might hold for another class of games: n-player symmetric XOR games with binary questions. Namely, [2] showed a gap between entangled and classical values of order Ω logn - assuming that a non-rigorous argument about the entangled value is correct. In this paper, we make this gap rigorous, by proving upper and lower bounds on the entangled value of a randomgame in this class. We show that, with a high probability, the entangled value is equal to Θ logn. The quantum-vs-classical n /4 gap of Θ logn follows by combining this with the fact that the classical value is of the order Θ shown in [2]. n /4 To prove this result, we use an expression for the entangled value of a symmetric n-player XOR game with entangled answers from [3]. This expression reduces finding the entangled value to maximizing the absolute value of a polynomial in one complex variable. If conditions for the XOR game are chosen at random, this expression reduces to random trigonometric polynomials studied in [7]. Although maxima of random trigonometric polynomials have been studied in [7], they have been studied under different conditions. For this reason, we cannot apply the results from [7] directly. Instead, we adapt the ideas from [7] to prove a bound on maxima of random trigonometric polynomials that would be applicable in our setting. 2 Definitions A non-local game with n players proceeds as follows: Players are separated so that they cannot communicate hence the name non-local, 2 The players receive inputs x,x 2,...,x n I where I is the set of possible inputs. i-th player receives x i, 3 The players respond with outputs y,y 2,...,y n O where O is the set of possible outputs. 4 The winning condition Px,...,x n,y,...,y n is consulted to determine whether the players win or lose. The condition is known to everyone at the start of the game. The players are informed of the rules of the game and they can agree upon a strategy and exchange other information. In the classical case players may only use shared randomness. In the quantum case they can use an entangled quantum state which is distributed to the players before the start of the game.

3 We will restrict ourselves to the case when I = O = {,} and the vector of inputs x,...,x n ischosenuniformlyatrandom.in anxor game,the winning condition Px,...,x n,y,...,y n depends only on x,...,x n and the parity of the output bits n j= y j. A game is symmetric if the winning condition does not change if x,...,x n are permuted. The winning conditions of a symmetric XOR game can be described by a list of n + bits: G = G,G,...,G n, where the players win if and only if G i = n j= y j when n j= x j = i. The entangled value of the game Val Q G is the probability of winning minus the probability of losing in the conditions that the players can use a shared quantum-physical system. In this paper, we study the value of symmetric XOR games when the winning condition G is chosen randomly from the uniform distribution of all n+-bit lists. We use the following lemma which follows from a more general result by Werner and Wolf for non-symmetric XOR games [8]: Lemma See [3]. The entangled value of a symmetric XOR game [3] is Val Q G = max λ = Gj p j λ j where p j is the probability that players are given an input vector x,...,x n with j variables x i =. In our case, since x,...,x n is uniformly random, we have p j = j n 2. n In the following sections we introduce additional notation to keep the proofs more concise as well as to keep in line with the original proofs in [7]: The Rademacher system is a set of functions {ϕ m t} for m =,...,n over t such that ϕ m t = k, where k is the m-th digit after the binary point in the binary expansion of t. Rademacher system will turn out to be a convenient way to state that {G j } are random variables that follow a uniform distribution: if t is chosen randomly from a uniform distribution on t, then {ϕ m t} n+ m= generates a uniformly random element from {+, }n+. That in turn correspondsto coefficients Gj in eq. being picked randomly. Furthermore, we define n r m = n will be clear from context, m R n = rm, 2 P n x,t = T n = j= m= rm 4, m= r m ϕ m+ tcosmx, m= M n t = max x< P nx,t.

4 3 Main Result By adapting the work of Salem and Zygmund [7] on the asymptotics of random trigonometric polynomials, we show Theorem. Theorem 2. lim n Pr[M nt C Rn lnn] = lim n Pr[M nt C 2 Rn lnn] = Our proof yields C = 4 3 and C 2 = 2. We will now show how these two theorems lead to an asymptotic bound for the entangled value of a random game. Corollary. For almost all n-player symmetric quantum XOR games the value of the game is asymptotically lnn n /4. Proof. From Lemma, Val Q G max λ = Re Gj n j λ j 2 n = max j= α [;] Gj n j cosjα 2 n, and Val Q G max λ = Re Gj n j λ j 2 n j= + max λ = Im Gj n j λ j 2 n j= = = max Gj n j cosjα α [;] 2 n + max Gj n j sinjα α [;] 2 n j= For a random game { Gj } follow the same distribution as {ϕ j+ t} for t uniformly distributed from interval [; ]. Therefore Theorem and Theorem 2 apply. Note that Theorem 2 is true for cosines as well as sines since we only use that cos 2 x, and so [ ] lim Pr Rn lnn Rn lnn C n 2 n Val Q G 2C 2 2 n = 2 j= j= Finally, Rn lnn 2 n = 2n n lnn 2 n 4 n πn lnn 2 n = lnn πn

5 4 Proof of Upper and Lower Bounds We now proceed to prove theorems and 2. Our proof is based on an old result by Salem and Zygmund [7], in which they prove bounds on the asymptotics of random trigonometric polynomials in a different setting in which the coefficients r m are not allowed to depend on n. Due to the difference in the two settings, we cannot immediately apply the results from [7]. Instead, we prove corresponding theorems for our setting, reusing the parts of proof from [7] which also work in our case and replacing other parts with different arguments. Lemma 2 From [7]. Let f n t = n m= c mϕ m+ t, where {ϕ m+ t} is the Rademacher system and c m are real constants. Let C n = n m= c2 m,d n = and let λ be any real number. Then n m= c4 m e 2 λ2 C n λ 4 D n e λfnt dt e 2 λ2 C n. Lemma 3 From [7]. Let gx,y, a x b, c y d, be a bounded real function. Suppose that d b c a gx, y A, g2 x,ydxdy = B. b ad c Then, for any positive number µ, d b c a eµgx,y dxdy +µ B + B b ad c A 2eµA. Furthermore, when d b gx,ydxdy =, c a d b c a eµgx,y dxdy + B b ad c A 2eµA. 3 Lemma 4 From [7]. Let x be real and Px = n m= α mcosmx+β m sinmx be a trigonometric polynomial of order n, with real or imaginary coefficients. Let M denote the maximum of Px and let θ be a positive number less than. Then there exists an interval of length not less than θ n in which Px θm. Lemma 5 From [7]. Let ϕx, and suppose that ϕxdx A >, clearly, A 2 B. Let < δ <. Then ϕ 2 xdx B Pr[ϕx δa x ] δa2 B.

6 Lemma 6. n i= n i 4 n n i= n 2 i Proof. If n is even: n i 4 n i= n n i= i 2 n 3 n n 4n n i n n i= n/2 n n i= i = 4n 3 n n 2 n n/2 2n n If n is odd: n i= n n i= i n i 4 2 n+ 2 3 n n 4n n i n n i= n/2 n n i= i = 4n 3 n n 2 n+ n n n Proof of Theorem. Set I n t = e λpnx,t dx. We proceed to give an upper bound for for I ntdt and lower bound for I2 ntdt using Lemma 2. Then we will plug in these bounds in Lemma 5 for ϕ = I n.

7 First, the lower bound clause of Lemma 2 applied to I n t gives for any real λ we will assign its value later, at our convenience, I n tdt = = = > e λpnx,t dx dt = e 2 λ2 n m= rm cosmx2 λ 4 n m= rm cosmx4 dx e 2 λ2 n m= rm cosmx2 λ 4 T n dx = e 4 λ2 R n λ 4 T n e 4 λ2 R n λ 4 T n e 4 λ2 R n λ 4 T n e 4 λ2 R n λ 4 T n e 2 λ2 n m= rm cosmx2 r2 m 2 dx = e 4 λ2 n m= r2 m cos2mx dx > + n 4 λ2 rm 2 cos2mx m= e λpnx,t dtdx dx The second step is to establish an upper bound for a similar fashion, by applying Lemma 2: I2 n tdt. We start out in Intdt 2 = = e 2 λ2 R n+r 2 e λpnx,t+pny,t dtdxdy e 2 λ2 n m= r2 m cosmx+cosmy2 dxdy = e 2 λ2 S nx,y dxdy where S n x,y = m= One can verify that 2 r2 m cos2mx+ 2 r2 m cos2my+2r2 m cosmxcosmy. a S n x,ydxdy =,

8 b c = + m= m= + = 5 4 T n S n x,y dxdy = 2 r2 mcos2mx dx+ 2 r2 mcos2my dy+ m= 2r 2 m cosmxcosmy dxdy = S n x,y 3R n We apply eq. 3 from Lemma 3 with function g = S n, µ = 2 λ2, A = 3R n and B = 5 4 T n. We get And by Lemma 6, 2 e 2 λ2 S nx,y dxdy T n 9Rn 2 e 3 2 λ2 R n + T n Rn 2 e 3 2 λ2 R n + T n Rn 2 e 3 2 λ2 R n n 2 e 2 λ2 R n So far we have established the two prerequisites for Lemma 5: I n tdt > e 4 λ2 R n λ 4 T n, I 2 n tdt e 2 λ2 R n+r n 2 e 3 2 λ2 R n. The third step is to apply Lemma 5 with ϕ = I n, A = e 4 λ2 R n λ 4 T n, B = e 2 λ2 R n+r e 3 n 2 λ2 R n and δ = n η. This results in Pr[I n t n η e 4 λ2 R n λ 4 T n ] n η e 2 λ2 R n 2λ 4 T n e 2 λ2 R n+r n 2e 3 2 λ2 R n n η e 2λ4 T n 2 λ2 r n 2 e 3 2 λ2 R n

9 Finally we show that for suitably chosen λ, θ and η the claim follows. Set lnn λ = θ R n having θ such that 2 η < θ < 3. We deal with the two claims separately: Claim. I n t n η e 4 λ2 R n λ 4 T n = M n t C Rn lnn Proof. Note that e λmnt I n t e 4 λ2 R n λ 4 T n ηlnn Thus M n t 4 λr n λ 3 T n η λ lnn = = θ Rn lnn θ 3 R n lnnlnn T n 4 Rn 2 η Rn lnn = θ = θ R n lnn 4 θ34lnn 3 n η θ R n lnn θ 4 η θ But θ 4 η θ = constant >. We can choose θ arbitrarily close to 3 and η arbitrarily close to to obtain C = 4 3. Claim. lim n n η e 2λ4 T n 2 λ2 r n 2 e 2 λ2 R n = Proof. Since η is positive, n η. e 2λ4 T n 2 λ2 r 2 2θ = e 4 lnn Tn R 2 2 θ2 r 2 lnn n Rn e 8 3 n θ4 lnn 2 θ2 r 2 lnn Rn e = 4 3 n 2 e 3 2 λ2 R n = 4 3 n 2 e 3 2 θ2 lnn = 4 3 n3θ2 2 Proof of Theorem 2. We will examine exists < θ < such that: e λ Pnx,t dxdt. By Lemma 4 there e λ Pnx,t dxdt θ n eθλmnt dt

10 On the other hand, by Lemma 2 we obtain: Therefore, = e λ Pnx,t dxdt = = 4πe 2 λ2 R n e λ Pnx,t dtdx e λpnx,t +e λpnx,t dtdx 2e 2 λ2 n m= r2 m cos2 mx dtdx 2e 2 λ2 R n dtdx = e θλmnt dt 4π θ e 2 λ 2 R n+lnn. lnn Have λ = 2 R n and multiply both sides by n 4 η, where η >. Then The sum over all n converges: n= e θλmnt 4+ηlnn dt 4π θ n +η. e θλmnt 4+ηlnn dt n= 4π θ n +η <. Since the exponent function is non-negative and the whole sum converges, it is safe to interchange sum and integral: Therefore, for almost all t e θλmnt 4+ηlnn dt <. n= e θλmnt 4+ηlnn <. n= Hence, for almost all t there exists n such that for all n n θλm n t 4+ηlnn <. It follows that [ lim Pr n M n t < 4+η 2θ ] Rn lnn =.

11 5 Conclusion We have proven that lnn the entangled value of almost any n-player symmetric XOR game is Θ and therefore by a factor of lnn greater than its n /4 classical value. However, our numerical experiments indicate that neither of the coefficients C and 2C 2 in eq. 2 are tight. In Fig. there is plotted the mean.7.6 V aln Rn lnn 2 n n Fig.. V aln Rn lnn 2 n for a random sample of n player games value of the coefficient over a sample of 5 games for each n up to. We speculate that the actual constant is approaching In this paper we have dealt with a small portion of non-local games. In particular, the case of random non-symmetric games is still open and there has been little progress in multiplayer XOR games with m ary input. The primary hurdle in the n-player m-input setting is at the moment it lacks a description in terms of algebraic and analytic expressions. Recently an approach using the theory of operator norms has been successful in proving the entangled value of 3-player, m-input XOR game [4]. References. Ambainis, A., Bačkurs, A., Balodis, K., Kravčenko, D., Ozols, R., Smotrovs, J., Virza, M.: Quantum strategies are better than classical in almost

12 any xor game. In: Czumaj, A., Mehlhorn, K., Pitts, A., Wattenhofer, R. eds. Automata, Languages, and Programming, Lecture Notes in Computer Science, vol. 739, pp Springer Berlin Heidelberg 22, 2. Ambainis, A., Iraids, J., Kravchenko, D., Virza, M.: Advantage of quantum strategies in random symmetric xor games. In: Kučera, A., Henzinger, T., Nešetřil, J., Vojnar, T., Antoš, D. eds. Mathematical and Engineering Methods in Computer Science, Lecture Notes in Computer Science, vol. 772, pp Springer Berlin Heidelberg 23, 3. Ambainis, A., Kravchenko, D., Nahimovs, N., Rivosh, A.: Nonlocal quantum xor games for large number of players. In: Kratochvíl, J., Li, A., Fiala, J., Kolman, P. eds. Theory and Applications of Models of Computation, Lecture Notes in Computer Science, vol. 68, pp Springer Berlin Heidelberg 2, 4. Briët, J., Vidick, T.: Explicit lower and upper bounds on the entangled value of multiplayer xor games. Communications in Mathematical Physics pp , 5. Clauser, J.F., Horne, M.A., Shimony, A., Holt, R.A.: Proposed experiment to test local hidden-variable theories. Phys. Rev. Lett. 23, Oct 969, 6. Cleve, R., Hoyer, P., Toner, B., Watrous, J.: Consequences and limits of nonlocal strategies. In: Proc. 9th IEEE Annual Conf. Computational Complexity. pp , 7. Salem, R., Zygmund, A.: Some properties of trigonometric series whose terms have random signs. Acta Mathematica 9, , 8. Werner, R.F., Wolf, M.M.: All-multipartite bell-correlation inequalities for two dichotomic observables per site. Phys. Rev. A 64, 322 Aug 2,

Nonlocal Quantum XOR Games for Large Number of Players

Nonlocal Quantum XOR Games for Large Number of Players onlocal Quantum XOR Games for Large umber of Players Andris Ambainis, Dmitry Kravchenko, ikolajs ahimovs, Alexander Rivosh Faculty of Computing, University of Latvia Abstract onlocal games are used to

More information

Worst case analysis of non-local games

Worst case analysis of non-local games Worst case analysis of non-local games Andris Ambainis 1, Artūrs Bačkurs 2, Kaspars Balodis 1, Agnis Škuškovniks1, Juris Smotrovs 1, and Madars Virza 2 1 Faculty of Computing, University of Latvia, Raina

More information

Lecture 6 Sept. 14, 2015

Lecture 6 Sept. 14, 2015 PHYS 7895: Quantum Information Theory Fall 205 Prof. Mark M. Wilde Lecture 6 Sept., 205 Scribe: Mark M. Wilde This document is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0

More information

Explicit bounds on the entangled value of multiplayer XOR games. Joint work with Thomas Vidick (MIT)

Explicit bounds on the entangled value of multiplayer XOR games. Joint work with Thomas Vidick (MIT) Explicit bounds on the entangled value of multiplayer XOR games Jop Briët Joint work with Thomas Vidick (MIT) Waterloo, 2012 Entanglement and nonlocal correlations [Bell64] Measurements on entangled quantum

More information

Provable Advantage for Quantum Strategies in Random Symmetric XOR Games

Provable Advantage for Quantum Strategies in Random Symmetric XOR Games Provable Advatage for Quatum Strategies i Radom Symmetric XOR Games Adris Ambaiis ad Jāis Iraids Faculty of Computig, Uiversity of Latvia Raiņa bulvāris 9, Riga, LV-586, Latvia adrisambaiis@lulv, jaisiraids@gmailcom

More information

Quantum Correlations: From Bell inequalities to Tsirelson s theorem

Quantum Correlations: From Bell inequalities to Tsirelson s theorem Quantum Correlations: From Bell inequalities to Tsirelson s theorem David Avis April, 7 Abstract The cut polytope and its relatives are good models of the correlations that can be obtained between events

More information

The CHSH game as a Bell test thought experiment

The CHSH game as a Bell test thought experiment The CHSH game as a Bell test thought experiment Logan Meredith December 10, 2017 1 Introduction The CHSH inequality, named after John Clauser, Michael Horne, Abner Shimony, and Richard Holt, provides an

More information

Lecture 20: Bell inequalities and nonlocality

Lecture 20: Bell inequalities and nonlocality CPSC 59/69: Quantum Computation John Watrous, University of Calgary Lecture 0: Bell inequalities and nonlocality April 4, 006 So far in the course we have considered uses for quantum information in the

More information

arxiv:quant-ph/ v2 5 May 2003

arxiv:quant-ph/ v2 5 May 2003 Bell Inequalities with Auxiliary Communication D. Bacon and B. F. Toner Institute for Quantum Information, California Institute of Technology, Pasadena, CA 91125 and Department of Physics, California Institute

More information

arxiv: v1 [quant-ph] 6 Feb 2013

arxiv: v1 [quant-ph] 6 Feb 2013 Exact quantum query complexity of EXACT and THRESHOLD arxiv:302.235v [quant-ph] 6 Feb 203 Andris Ambainis Jānis Iraids Juris Smotrovs University of Latvia, Raiņa bulvāris 9, Riga, LV-586, Latvia February

More information

Nonlocal games and XOR games

Nonlocal games and XOR games Nonlocal games and XOR games In previous lectures, we discussed a few fairly direct connections between quantum information theoretic notions and semidefinite programs. For instance, the semidefinite program

More information

Part 3.3 Differentiation Taylor Polynomials

Part 3.3 Differentiation Taylor Polynomials Part 3.3 Differentiation 3..3.1 Taylor Polynomials Definition 3.3.1 Taylor 1715 and Maclaurin 1742) If a is a fixed number, and f is a function whose first n derivatives exist at a then the Taylor polynomial

More information

arxiv: v1 [quant-ph] 7 Jun 2016

arxiv: v1 [quant-ph] 7 Jun 2016 PERFECT COMMUTING-OPERATOR STRATEGIES FOR LINEAR SYSTEM GAMES arxiv:1606.02278v1 [quant-ph] 7 Jun 2016 RICHARD CLEVE, LI LIU, AND WILLIAM SLOFSTRA Abstract. Linear system games are a generalization of

More information

arxiv: v3 [quant-ph] 20 Jan 2016

arxiv: v3 [quant-ph] 20 Jan 2016 arxiv:1508.01601v3 [quant-ph] 0 Jan 016 Two-player conflicting interest Bayesian games and Bell nonlocality Haozhen Situ April 14, 018 Abstract Nonlocality, one of the most remarkable aspects of quantum

More information

Extended Nonlocal Games from Quantum-Classical Games

Extended Nonlocal Games from Quantum-Classical Games CHICAGO JOURNAL OF THEORETICAL COMPUTER SCIENCE 2018, Article 04, pages 1 12 http://cjtcs.cs.uchicago.edu/ Extended Nonlocal Games from Quantum-Classical Games Vincent Russo John Watrous Received October

More information

arxiv:quant-ph/ v2 11 Jan 2010

arxiv:quant-ph/ v2 11 Jan 2010 Consequences and Limits of Nonlocal Strategies Richard Cleve Peter Høyer Ben Toner John Watrous January 11, 2010 arxiv:quant-ph/0404076v2 11 Jan 2010 Abstract This paper investigates the powers and limitations

More information

CS286.2 Lecture 15: Tsirelson s characterization of XOR games

CS286.2 Lecture 15: Tsirelson s characterization of XOR games CS86. Lecture 5: Tsirelson s characterization of XOR games Scribe: Zeyu Guo We first recall the notion of quantum multi-player games: a quantum k-player game involves a verifier V and k players P,...,

More information

Substituting a qubit for an arbitrarily large amount of classical communication

Substituting a qubit for an arbitrarily large amount of classical communication Substituting a qubit for an arbitrarily large amount of classical communication Ernesto F. Galvão and Lucien Hardy Centre for Quantum Computation, Clarendon Laboratory, University of Oxford, Parks Road,

More information

arxiv: v2 [quant-ph] 21 Oct 2013

arxiv: v2 [quant-ph] 21 Oct 2013 Genuine hidden quantum nonlocality Flavien Hirsch, 1 Marco Túlio Quintino, 1 Joseph Bowles, 1 and Nicolas Brunner 1, 1 Département de Physique Théorique, Université de Genève, 111 Genève, Switzerland H.H.

More information

arxiv: v1 [quant-ph] 5 Sep 2017

arxiv: v1 [quant-ph] 5 Sep 2017 Extended Nonlocal Games from Quantum-Classical Games Vincent Russo 1 John Watrous 1,2 arxiv:1709.01837v1 [quant-ph] 5 Sep 2017 1 Institute for Quantum Computing and School of Computer Science University

More information

CS286.2 Lecture 8: A variant of QPCP for multiplayer entangled games

CS286.2 Lecture 8: A variant of QPCP for multiplayer entangled games CS286.2 Lecture 8: A variant of QPCP for multiplayer entangled games Scribe: Zeyu Guo In the first lecture, we saw three equivalent variants of the classical PCP theorems in terms of CSP, proof checking,

More information

arxiv: v1 [cs.cc] 31 May 2014

arxiv: v1 [cs.cc] 31 May 2014 Size of Sets with Small Sensitivity: a Generalization of Simon s Lemma Andris Ambainis and Jevgēnijs Vihrovs arxiv:1406.0073v1 [cs.cc] 31 May 2014 Faculty of Computing, University of Latvia, Raiņa bulv.

More information

Randomness in nonlocal games between mistrustful players

Randomness in nonlocal games between mistrustful players Randomness in nonlocal games between mistrustful players Carl A. Miller and Yaoyun Shi* Source paper: Forcing classical behavior for quantum players by C. Miller and Y. Shi (2016), attached. One of the

More information

Non-local Boxes. Philippe Lamontagne. July 31, 2014

Non-local Boxes. Philippe Lamontagne. July 31, 2014 Non-local Boxes Philippe Lamontagne July 31, 2014 1 Contents 1 Introduction 3 1.1 Preliminaries........................... 3 2 The Non-signaling Polytope 6 2.1 Deporalization...........................

More information

arxiv: v2 [quant-ph] 22 Sep 2008

arxiv: v2 [quant-ph] 22 Sep 2008 Distilling Non-Locality Manuel Forster Severin Winkler Stefan Wolf Computer Science Department, ETH Zürich, ETH Zentrum, CH-8092 Zürich, Switzerland. E-mail: {forstema,swinkler,wolfst}@ethz.ch arxiv:0809.3173v2

More information

A Note on the Geometric Interpretation of Bell s Inequalities

A Note on the Geometric Interpretation of Bell s Inequalities Lett Math Phys DOI 10.1007/s11005-013-0631-8 A Note on the Geometric Interpretation of Bell s Inequalities PAOLO DAI PRA, MICHELE PAVON and NEERAJA SAHASRABUDHE Dipartimento di Matematica, Università di

More information

arxiv: v1 [quant-ph] 23 May 2015

arxiv: v1 [quant-ph] 23 May 2015 Bell inequalities from group actions: Three parties and non-abelian groups V. Uğur Güney and Mar Hillery Department of Physics, Hunter College of the City University of New Yor, 695 Par Avenue, New Yor,

More information

Polynomials, quantum query complexity, and Grothendieck s inequality

Polynomials, quantum query complexity, and Grothendieck s inequality Polynomials, quantum query complexity, and Grothendieck s inequality Scott Aaronson 1, Andris Ambainis 2, Jānis Iraids 2, Martins Kokainis 2, Juris Smotrovs 2 1 Computer Science and Artificial Intelligence

More information

Spatial versus Sequential Correlations for Random Access Coding

Spatial versus Sequential Correlations for Random Access Coding Spatial versus Sequential Correlations for Random Access Coding Armin Tavakoli 1,2, Breno Marques 1,, Marcin Paw lowski 2, Mohamed Bourennane 1 1 Department of Physics, Stockholm University, S-1061 Stockholm,

More information

The Quantum Query Complexity of Algebraic Properties

The Quantum Query Complexity of Algebraic Properties The Quantum Query Complexity of Algebraic Properties Sebastian Dörn Institut für Theoretische Informatik Universität Ulm 89069 Ulm, Germany Thomas Thierauf Fak. Elektronik und Informatik HTW Aalen 73430

More information

Grothendieck Inequalities, XOR games, and Communication Complexity

Grothendieck Inequalities, XOR games, and Communication Complexity Grothendieck Inequalities, XOR games, and Communication Complexity Troy Lee Rutgers University Joint work with: Jop Briët, Harry Buhrman, and Thomas Vidick Overview Introduce XOR games, Grothendieck s

More information

Super-Quantum, Non-Signaling Correlations Cannot Exist

Super-Quantum, Non-Signaling Correlations Cannot Exist Super-Quantum, Non-Signaling Correlations Cannot Exist Pierre Uzan University Paris-Diderot laboratory SPHERE, History and Philosophy of Science Abstract It seems that non-local correlations stronger than

More information

Math 416 Lecture 3. The average or mean or expected value of x 1, x 2, x 3,..., x n is

Math 416 Lecture 3. The average or mean or expected value of x 1, x 2, x 3,..., x n is Math 416 Lecture 3 Expected values The average or mean or expected value of x 1, x 2, x 3,..., x n is x 1 x 2... x n n x 1 1 n x 2 1 n... x n 1 n 1 n x i p x i where p x i 1 n is the probability of x i

More information

CPSC 536N: Randomized Algorithms Term 2. Lecture 9

CPSC 536N: Randomized Algorithms Term 2. Lecture 9 CPSC 536N: Randomized Algorithms 2011-12 Term 2 Prof. Nick Harvey Lecture 9 University of British Columbia 1 Polynomial Identity Testing In the first lecture we discussed the problem of testing equality

More information

Some limits on non-local randomness expansion

Some limits on non-local randomness expansion Some limits on non-local randomness expansion Matt Coudron and Henry Yuen December 12, 2012 1 Introduction God does not play dice. Albert Einstein Einstein, stop telling God what to do. Niels Bohr One

More information

4.1 Analysis of functions I: Increase, decrease and concavity

4.1 Analysis of functions I: Increase, decrease and concavity 4.1 Analysis of functions I: Increase, decrease and concavity Definition Let f be defined on an interval and let x 1 and x 2 denote points in that interval. a) f is said to be increasing on the interval

More information

arxiv: v1 [quant-ph] 15 Feb 2016

arxiv: v1 [quant-ph] 15 Feb 2016 arxiv:1602.04645v1 [quant-ph] 15 Feb 2016 On the existence of a local quasi hidden variable (LqHV) model for each N-qudit state and the maximal quantum violation of Bell inequalities Elena R. Loubenets

More information

Rank-one and Quantum XOR Games

Rank-one and Quantum XOR Games Rank-one and Quantum XOR Games T. Cooney 1 M. Junge 2 C. Palazuelos 3 D. Pérez García 1 and O. Regev 4 T. Vidick 5 1 Universidad Complutense de Madrid 2 University of Illinois at Urbana Champaign 3 Instituto

More information

Math 4263 Homework Set 1

Math 4263 Homework Set 1 Homework Set 1 1. Solve the following PDE/BVP 2. Solve the following PDE/BVP 2u t + 3u x = 0 u (x, 0) = sin (x) u x + e x u y = 0 u (0, y) = y 2 3. (a) Find the curves γ : t (x (t), y (t)) such that that

More information

Simultaneous Communication Protocols with Quantum and Classical Messages

Simultaneous Communication Protocols with Quantum and Classical Messages Simultaneous Communication Protocols with Quantum and Classical Messages Oded Regev Ronald de Wolf July 17, 2008 Abstract We study the simultaneous message passing model of communication complexity, for

More information

State Complexity Advantages of Ultrametric Automata

State Complexity Advantages of Ultrametric Automata State Complexity Advantages of Ultrametric Automata Maksims Dimitrijevs University of Latvia Faculty of Computing, Raiņa bulvāris 19, Riga, LV-1586, Latvia Abstract. Ultrametric automata have properties

More information

Rademacher functions

Rademacher functions Rademacher functions Jordan Bell jordan.bell@gmail.com Department of Mathematics, University of Toronto July 6, 4 Binary expansions Define S : {, } N [, ] by Sσ σ k k, σ {, }N. For example, for σ and σ,

More information

Generalized Tsirelson Inequalities, Commuting-Operator Provers, and Multi-Prover Interactive Proof Systems

Generalized Tsirelson Inequalities, Commuting-Operator Provers, and Multi-Prover Interactive Proof Systems 23rd Annual IEEE Conference on Computational Complexity Generalized Tsirelson Ineualities, Commuting-Operator Provers, and Multi-Prover Interactive Proof Systems Tsuyoshi Ito School of Computer Science

More information

Super-Quantum, Non-Signaling Correlations Cannot Exist

Super-Quantum, Non-Signaling Correlations Cannot Exist Super-Quantum, Non-Signaling Correlations Cannot Exist Pierre Uzan University Paris-Diderot, laboratory SPHERE, History and Philosophy of Science pierre.uzan@paris7.jussieu.fr Abstract Non-local correlations

More information

QUANTUM FINITE AUTOMATA. Andris Ambainis 1 1 Faculty of Computing, University of Latvia,

QUANTUM FINITE AUTOMATA. Andris Ambainis 1 1 Faculty of Computing, University of Latvia, QUANTUM FINITE AUTOMATA Andris Ambainis 1 1 Faculty of Computing, University of Latvia, Raiņa bulv. 19, Rīga, LV-1586, Latvia. Email: ambainis@lu.lv Abstract Quantum finite automata (QFAs) are quantum

More information

QUANTUM COMMUNICATIONS BASED ON QUANTUM HASHING. Alexander Vasiliev. Kazan Federal University

QUANTUM COMMUNICATIONS BASED ON QUANTUM HASHING. Alexander Vasiliev. Kazan Federal University QUANTUM COMMUNICATIONS BASED ON QUANTUM HASHING Alexander Vasiliev Kazan Federal University Abstract: In this paper we consider an application of the recently proposed quantum hashing technique for computing

More information

11 a 12 a 21 a 11 a 22 a 12 a 21. (C.11) A = The determinant of a product of two matrices is given by AB = A B 1 1 = (C.13) and similarly.

11 a 12 a 21 a 11 a 22 a 12 a 21. (C.11) A = The determinant of a product of two matrices is given by AB = A B 1 1 = (C.13) and similarly. C PROPERTIES OF MATRICES 697 to whether the permutation i 1 i 2 i N is even or odd, respectively Note that I =1 Thus, for a 2 2 matrix, the determinant takes the form A = a 11 a 12 = a a 21 a 11 a 22 a

More information

Math 489AB A Very Brief Intro to Fourier Series Fall 2008

Math 489AB A Very Brief Intro to Fourier Series Fall 2008 Math 489AB A Very Brief Intro to Fourier Series Fall 8 Contents Fourier Series. The coefficients........................................ Convergence......................................... 4.3 Convergence

More information

On the Gap Between ess(f) and cnf size(f) (Extended Abstract)

On the Gap Between ess(f) and cnf size(f) (Extended Abstract) On the Gap Between and (Extended Abstract) Lisa Hellerstein and Devorah Kletenik Polytechnic Institute of NYU, 6 Metrotech Center, Brooklyn, N.Y., 11201 Abstract Given a Boolean function f, denotes the

More information

Abstract. 2. We construct several transcendental numbers.

Abstract. 2. We construct several transcendental numbers. Abstract. We prove Liouville s Theorem for the order of approximation by rationals of real algebraic numbers. 2. We construct several transcendental numbers. 3. We define Poissonian Behaviour, and study

More information

Fourier Sin and Cos Series and Least Squares Convergence

Fourier Sin and Cos Series and Least Squares Convergence Fourier and east Squares Convergence James K. Peterson Department of Biological Sciences and Department of Mathematical Sciences Clemson University May 7, 28 Outline et s look at the original Fourier sin

More information

A Tight Lower Bound on Certificate Complexity in Terms of Block Sensitivity and Sensitivity

A Tight Lower Bound on Certificate Complexity in Terms of Block Sensitivity and Sensitivity Electronic Colloquium on Computational Complexity, Report No. 27 (2014) A Tight Lower Bound on Certificate Complexity in Terms of Block Sensitivity and Sensitivity Krišjānis Prūsis and Andris Ambainis

More information

arxiv: v1 [quant-ph] 8 Feb 2016

arxiv: v1 [quant-ph] 8 Feb 2016 An analytical condition for the violation of Mer s inequality by any three qubit state Satyabrata Adhikari 1, and A. S. Majumdar 2, 1 Birla Institute of Technology Mesra, Ranchi-835215, India 2 S. N. Bose

More information

How Low Can Approximate Degree and Quantum Query Complexity be for Total Boolean Functions?

How Low Can Approximate Degree and Quantum Query Complexity be for Total Boolean Functions? How Low Can Approximate Degree and Quantum Query Complexity be for Total Boolean Functions? Andris Ambainis Ronald de Wolf Abstract It has long been known that any Boolean function that depends on n input

More information

Quantum Hashing for Finite Abelian Groups arxiv: v1 [quant-ph] 7 Mar 2016

Quantum Hashing for Finite Abelian Groups arxiv: v1 [quant-ph] 7 Mar 2016 Quantum Hashing for Finite Abelian Groups arxiv:1603.02209v1 [quant-ph] 7 Mar 2016 Alexander Vasiliev Abstract We propose a generalization of the quantum hashing technique based on the notion of the small-bias

More information

arxiv: v2 [quant-ph] 13 Jan 2011

arxiv: v2 [quant-ph] 13 Jan 2011 Quantum Bell Inequalities from Macroscopic Locality arxiv:1011.0246v2 [quant-ph] 13 Jan 2011 Tzyh Haur Yang, 1 Miguel Navascués, 2 Lana Sheridan, 1 and Valerio Scarani 1,3 1 Centre for Quantum Technologies,

More information

The one-way communication complexity of the Boolean Hidden Matching Problem

The one-way communication complexity of the Boolean Hidden Matching Problem The one-way communication complexity of the Boolean Hidden Matching Problem Iordanis Kerenidis CRS - LRI Université Paris-Sud jkeren@lri.fr Ran Raz Faculty of Mathematics Weizmann Institute ran.raz@weizmann.ac.il

More information

Lecture 13: Lower Bounds using the Adversary Method. 2 The Super-Basic Adversary Method [Amb02]

Lecture 13: Lower Bounds using the Adversary Method. 2 The Super-Basic Adversary Method [Amb02] Quantum Computation (CMU 18-859BB, Fall 015) Lecture 13: Lower Bounds using the Adversary Method October 1, 015 Lecturer: Ryan O Donnell Scribe: Kumail Jaffer 1 Introduction There are a number of known

More information

The relation between Hardy s non-locality and violation of Bell inequality

The relation between Hardy s non-locality and violation of Bell inequality The relation between Hardy s non-locality and violation of Bell inequality Xiang Yang( ) School of Physics and Electronics, Henan University, Kaifeng 475001, China (Received 20 September 2010; revised

More information

Limitations of Non-deterministic Finite Automata Imposed by One Letter Input Alphabet

Limitations of Non-deterministic Finite Automata Imposed by One Letter Input Alphabet Limitations of Non-deterministic Finite Automata Imposed by One Letter Input Alphabet Laura Mančinska, Māris Ozols, Renāte Praude and Agnese Zalcmane violeta@navigator.lv, marozols@yahoo.com, renka@inbox.lv,

More information

The length-ω 1 open game quantifier propagates scales

The length-ω 1 open game quantifier propagates scales The length-ω 1 open game quantifier propagates scales John R. Steel June 5, 2006 0 Introduction We shall call a set T an ω 1 -tree if only if T α

More information

Quantum algorithms for testing Boolean functions

Quantum algorithms for testing Boolean functions Quantum algorithms for testing Boolean functions Dominik F. Floess Erika Andersson SUPA, School of Engineering and Physical Sciences Heriot-Watt University, Edinburgh EH4 4AS, United Kingdom dominikfloess@gmx.de

More information

Lecture Hardness of Set Cover

Lecture Hardness of Set Cover PCPs and Inapproxiability CIS 6930 October 5, 2009 Lecture Hardness of Set Cover Lecturer: Dr. My T. Thai Scribe: Ying Xuan 1 Preliminaries 1.1 Two-Prover-One-Round Proof System A new PCP model 2P1R Think

More information

On the power of quantum, one round, two prover interactive proof systems

On the power of quantum, one round, two prover interactive proof systems On the power of quantum, one round, two prover interactive proof systems Alex Rapaport and Amnon Ta-Shma Department of Computer Science Tel-Aviv University Israel 69978. email: rapapo,amnon@post.tau.ac.il.

More information

THE INVERSE FUNCTION THEOREM

THE INVERSE FUNCTION THEOREM THE INVERSE FUNCTION THEOREM W. PATRICK HOOPER The implicit function theorem is the following result: Theorem 1. Let f be a C 1 function from a neighborhood of a point a R n into R n. Suppose A = Df(a)

More information

arxiv:quant-ph/ v1 29 May 2003

arxiv:quant-ph/ v1 29 May 2003 Quantum Lower Bounds for Collision and Element Distinctness with Small Range arxiv:quant-ph/0305179v1 29 May 2003 Andris Ambainis Abstract We give a general method for proving quantum lower bounds for

More information

ON A WEIGHTED INTERPOLATION OF FUNCTIONS WITH CIRCULAR MAJORANT

ON A WEIGHTED INTERPOLATION OF FUNCTIONS WITH CIRCULAR MAJORANT ON A WEIGHTED INTERPOLATION OF FUNCTIONS WITH CIRCULAR MAJORANT Received: 31 July, 2008 Accepted: 06 February, 2009 Communicated by: SIMON J SMITH Department of Mathematics and Statistics La Trobe University,

More information

Algebra II Mathematics N-CN The Complex Number System

Algebra II Mathematics N-CN The Complex Number System GRADE HS Algebra II Mathematics N-CN The Complex Number System K-2 3-5 6-8 9-12 Perform arithmetic operations with complex numbers. N.CN.1 N.CN.2 There is a complex number i such that i 2 = -1, and every

More information

Math 2Z03 - Tutorial # 6. Oct. 26th, 27th, 28th, 2015

Math 2Z03 - Tutorial # 6. Oct. 26th, 27th, 28th, 2015 Math 2Z03 - Tutorial # 6 Oct. 26th, 27th, 28th, 2015 Tutorial Info: Tutorial Website: http://ms.mcmaster.ca/ dedieula/2z03.html Office Hours: Mondays 3pm - 5pm (in the Math Help Centre) Tutorial #6: 3.4

More information

Determine whether the formula determines y as a function of x. If not, explain. Is there a way to look at a graph and determine if it's a function?

Determine whether the formula determines y as a function of x. If not, explain. Is there a way to look at a graph and determine if it's a function? 1.2 Functions and Their Properties Name: Objectives: Students will be able to represent functions numerically, algebraically, and graphically, determine the domain and range for functions, and analyze

More information

Lecture 10 + additional notes

Lecture 10 + additional notes CSE533: Information Theorn Computer Science November 1, 2010 Lecturer: Anup Rao Lecture 10 + additional notes Scribe: Mohammad Moharrami 1 Constraint satisfaction problems We start by defining bivariate

More information

Eigenvalues, random walks and Ramanujan graphs

Eigenvalues, random walks and Ramanujan graphs Eigenvalues, random walks and Ramanujan graphs David Ellis 1 The Expander Mixing lemma We have seen that a bounded-degree graph is a good edge-expander if and only if if has large spectral gap If G = (V,

More information

Measure and Integration: Solutions of CW2

Measure and Integration: Solutions of CW2 Measure and Integration: s of CW2 Fall 206 [G. Holzegel] December 9, 206 Problem of Sheet 5 a) Left (f n ) and (g n ) be sequences of integrable functions with f n (x) f (x) and g n (x) g (x) for almost

More information

Max-Planck-Institut für Mathematik in den Naturwissenschaften Leipzig

Max-Planck-Institut für Mathematik in den Naturwissenschaften Leipzig Max-Planck-Institut für Mathematik in den aturwissenschaften Leipzig Bell inequality for multipartite qubit quantum system and the maximal violation by Ming Li and Shao-Ming Fei Preprint no.: 27 2013 Bell

More information

Qualification Exam: Mathematical Methods

Qualification Exam: Mathematical Methods Qualification Exam: Mathematical Methods Name:, QEID#41534189: August, 218 Qualification Exam QEID#41534189 2 1 Mathematical Methods I Problem 1. ID:MM-1-2 Solve the differential equation dy + y = sin

More information

Maxima and Minima. (a, b) of R if

Maxima and Minima. (a, b) of R if Maxima and Minima Definition Let R be any region on the xy-plane, a function f (x, y) attains its absolute or global, maximum value M on R at the point (a, b) of R if (i) f (x, y) M for all points (x,

More information

Efficient Conversion of Secret-shared Values Between Different Fields

Efficient Conversion of Secret-shared Values Between Different Fields Efficient Conversion of Secret-shared Values Between Different Fields Ivan Damgård and Rune Thorbek BRICS, Dept. of Computer Science, University of Aarhus Abstract. We show how to effectively convert a

More information

Avoider-Enforcer games played on edge disjoint hypergraphs

Avoider-Enforcer games played on edge disjoint hypergraphs Avoider-Enforcer games played on edge disjoint hypergraphs Asaf Ferber Michael Krivelevich Alon Naor July 8, 2013 Abstract We analyze Avoider-Enforcer games played on edge disjoint hypergraphs, providing

More information

(Non-)Contextuality of Physical Theories as an Axiom

(Non-)Contextuality of Physical Theories as an Axiom (Non-)Contextuality of Physical Theories as an Axiom Simone Severini Department of Computer Science QIP 2011 Plan 1. Introduction: non-contextuality 2. Results: a general framework to study non-contextuality;

More information

Solution Set for Homework #1

Solution Set for Homework #1 CS 683 Spring 07 Learning, Games, and Electronic Markets Solution Set for Homework #1 1. Suppose x and y are real numbers and x > y. Prove that e x > ex e y x y > e y. Solution: Let f(s = e s. By the mean

More information

HMMT February 2018 February 10, 2018

HMMT February 2018 February 10, 2018 HMMT February 018 February 10, 018 Algebra and Number Theory 1. For some real number c, the graphs of the equation y = x 0 + x + 18 and the line y = x + c intersect at exactly one point. What is c? 18

More information

Handout 5. α a1 a n. }, where. xi if a i = 1 1 if a i = 0.

Handout 5. α a1 a n. }, where. xi if a i = 1 1 if a i = 0. Notes on Complexity Theory Last updated: October, 2005 Jonathan Katz Handout 5 1 An Improved Upper-Bound on Circuit Size Here we show the result promised in the previous lecture regarding an upper-bound

More information

Bit-Commitment and Coin Flipping in a Device-Independent Setting

Bit-Commitment and Coin Flipping in a Device-Independent Setting Bit-Commitment and Coin Flipping in a Device-Independent Setting J. Silman Université Libre de Bruxelles Joint work with: A. Chailloux & I. Kerenidis (LIAFA), N. Aharon (TAU), S. Pironio & S. Massar (ULB).

More information

Maximum subsets of (0, 1] with no solutions to x + y = kz

Maximum subsets of (0, 1] with no solutions to x + y = kz Maximum subsets of 0, 1] with no solutions to x + y = z Fan R. K. Chung Department of Mathematics University of Pennsylvania Philadelphia, PA 19104 John L. Goldwasser West Virginia University Morgantown,

More information

ECE 4400:693 - Information Theory

ECE 4400:693 - Information Theory ECE 4400:693 - Information Theory Dr. Nghi Tran Lecture 8: Differential Entropy Dr. Nghi Tran (ECE-University of Akron) ECE 4400:693 Lecture 1 / 43 Outline 1 Review: Entropy of discrete RVs 2 Differential

More information

Functional Analysis HW #3

Functional Analysis HW #3 Functional Analysis HW #3 Sangchul Lee October 26, 2015 1 Solutions Exercise 2.1. Let D = { f C([0, 1]) : f C([0, 1])} and define f d = f + f. Show that D is a Banach algebra and that the Gelfand transform

More information

PUTNAM TRAINING POLYNOMIALS. Exercises 1. Find a polynomial with integral coefficients whose zeros include

PUTNAM TRAINING POLYNOMIALS. Exercises 1. Find a polynomial with integral coefficients whose zeros include PUTNAM TRAINING POLYNOMIALS (Last updated: December 11, 2017) Remark. This is a list of exercises on polynomials. Miguel A. Lerma Exercises 1. Find a polynomial with integral coefficients whose zeros include

More information

A better lower bound for quantum algorithms searching an ordered list

A better lower bound for quantum algorithms searching an ordered list A better lower bound for quantum algorithms searching an ordered list Andris Ambainis Computer Science Division University of California Berkeley, CA 94720, e-mail: ambainis@cs.berkeley.edu Abstract We

More information

FIBONACCI NUMBERS AND DECIMATION OF BINARY SEQUENCES

FIBONACCI NUMBERS AND DECIMATION OF BINARY SEQUENCES FIBONACCI NUMBERS AND DECIMATION OF BINARY SEQUENCES Jovan Dj. Golić Security Innovation, Telecom Italia Via Reiss Romoli 274, 10148 Turin, Italy (Submitted August 2004-Final Revision April 200) ABSTRACT

More information

Local Maxima and Improved Exact Algorithm for MAX-2-SAT

Local Maxima and Improved Exact Algorithm for MAX-2-SAT CHICAGO JOURNAL OF THEORETICAL COMPUTER SCIENCE 2018, Article 02, pages 1 22 http://cjtcs.cs.uchicago.edu/ Local Maxima and Improved Exact Algorithm for MAX-2-SAT Matthew B. Hastings Received March 8,

More information

Asymptotic Behavior of Infinity Harmonic Functions Near an Isolated Singularity

Asymptotic Behavior of Infinity Harmonic Functions Near an Isolated Singularity Savin, O., and C. Wang. (2008) Asymptotic Behavior of Infinity Harmonic Functions, International Mathematics Research Notices, Vol. 2008, Article ID rnm163, 23 pages. doi:10.1093/imrn/rnm163 Asymptotic

More information

On the Concentration of the Crest Factor for OFDM Signals

On the Concentration of the Crest Factor for OFDM Signals On the Concentration of the Crest Factor for OFDM Signals Igal Sason Department of Electrical Engineering Technion - Israel Institute of Technology, Haifa 3, Israel E-mail: sason@eetechnionacil Abstract

More information

f (r) (a) r! (x a) r, r=0

f (r) (a) r! (x a) r, r=0 Part 3.3 Differentiation v1 2018 Taylor Polynomials Definition 3.3.1 Taylor 1715 and Maclaurin 1742) If a is a fixed number, and f is a function whose first n derivatives exist at a then the Taylor polynomial

More information

TEST CODE: MMA (Objective type) 2015 SYLLABUS

TEST CODE: MMA (Objective type) 2015 SYLLABUS TEST CODE: MMA (Objective type) 2015 SYLLABUS Analytical Reasoning Algebra Arithmetic, geometric and harmonic progression. Continued fractions. Elementary combinatorics: Permutations and combinations,

More information

Fourier Series. 1. Review of Linear Algebra

Fourier Series. 1. Review of Linear Algebra Fourier Series In this section we give a short introduction to Fourier Analysis. If you are interested in Fourier analysis and would like to know more detail, I highly recommend the following book: Fourier

More information

arxiv: v4 [math-ph] 28 Aug 2013

arxiv: v4 [math-ph] 28 Aug 2013 On selective influences, marginal selectivity, arxiv:1211.2342v4 [math-ph] 28 Aug 2013 and Bell/CHSH inequalities Ehtibar N. Dzhafarov 1 and Janne V. Kujala 2 1 Purdue University, Department of Psychological

More information

Second-Order Homogeneous Linear Equations with Constant Coefficients

Second-Order Homogeneous Linear Equations with Constant Coefficients 15 Second-Order Homogeneous Linear Equations with Constant Coefficients A very important class of second-order homogeneous linear equations consists of those with constant coefficients; that is, those

More information

A subexponential lower bound for the Random Facet algorithm for Parity Games

A subexponential lower bound for the Random Facet algorithm for Parity Games A subexponential lower bound for the Random Facet algorithm for Parity Games Oliver Friedmann 1 Thomas Dueholm Hansen 2 Uri Zwick 3 1 Department of Computer Science, University of Munich, Germany. 2 Center

More information

Math 172 Problem Set 5 Solutions

Math 172 Problem Set 5 Solutions Math 172 Problem Set 5 Solutions 2.4 Let E = {(t, x : < x b, x t b}. To prove integrability of g, first observe that b b b f(t b b g(x dx = dt t dx f(t t dtdx. x Next note that f(t/t χ E is a measurable

More information

Partial Differential Equations Separation of Variables. 1 Partial Differential Equations and Operators

Partial Differential Equations Separation of Variables. 1 Partial Differential Equations and Operators PDE-SEP-HEAT-1 Partial Differential Equations Separation of Variables 1 Partial Differential Equations and Operators et C = C(R 2 ) be the collection of infinitely differentiable functions from the plane

More information