arxiv: v1 [quant-ph] 18 Nov 2014
|
|
- Louisa Edwards
- 6 years ago
- Views:
Transcription
1 Overcoming efficiency constraints on bind quantum computation Caros A Pérez-Degado 1 and oseph F Fitzsimons1, 2, 1 Singapore University of Technoogy and Design, 20 Dover Drive, Singapore Centre for Quantum Technoogies, Nationa University of Singapore, 3 Science Drive 2, Singapore ing of gates independenty chosen from a set of cardinaity G requires an exchange of at east ogg ogbd qudits Whie for any fixed choice of d and B this approach yieds a bound simiar to the no-programming theorem, it is more widey appicabe As such, it is tempting to conjecture that the no-programming bound of Ω og 2 G) on the number of bits/qubits exchanged appies to any approach to bind quantum computation In this paper, however, we show that such an efficiency constraint can be overcome if the cient is aowed to prepare arbitrary singe or muti-qubit states The protocos we construct are not ony more efficient than previous bind computation protocos, but require ess communication than is required to cassicay describe the deegated computation Before presenting the main protoco, we first present a precursor protoco which forms the main buiding boc of our fina protoco Our approach is based on gate teeportation [14], but differs from standard usages in that instead of directy correcting errors induced by teeportation byproducts, we mae use of additiona gate teeportation steps to correct the state of the system This avoids the need to provide a cassica description of the correction operator, eading to a saving in the tota communication cost of the protoco, in turn aowing our protoco to avoid the ower bound on communication of og 2 G which resuts from a naive appication of the noprogramming theorem Consider the set D m, of a diagona operators acting on m qubits of the form expi j {0,1} m θ j Z j 1 Z j 2 Z j m ), with θ j { rπ r {0,1,2,3,,2 1}} Our approach a- 2 arxiv: v1 [quant-ph] 18 Nov 2014 Bind quantum computation aows a user to deegate a computation to an untrusted server whie eeping the computation hidden A number of recent wors have sought to estabish bounds on the communication requirements necessary to impement bind computation, and a bound based on the no-programming theorem of Niesen and Chuang has emerged as a natura imiting factor Here we show that this constraints ony hod in imited scenarios and show how to overcome it using a method based on iterated gate-teeportations We present our resuts as a famiy of protocos, with varying degrees of computationa-abiity requirements on the cient Certain protocos in this famiy exponentiay outperform previousy nown schemes in terms of tota communication The approach presented here can be adapted to other distributed computing protocos to reduce communication requirements Bind quantum computation is a cryptographic tas whereby a cient sees to hide a deegated computation from the server impementing the computation A number of protocos for bind computation have been discovered exhibiting either information theoretic security [1 10], for which it can be proven that a cheating server cannot earn anything about the computation being performed based on purey information theoretic grounds, or cheat-sensitivity [11], whereby a cheating server can be detected even though the computation cannot be ept hidden from it A range of capabiities for the cient have aso been considered, from the abiity to prepare or measure individua singe qubit states [1, 5, 6], to the abiity to perform universa computation on fixed size systems [2] Recenty wor has sought to unify this disparate famiy of protocos in terms of security definitions [12] and in terms of resource accounting [9, 11] Recenty, Giovannetti, Maccone, Morimae and Rudoph proposed a nove cheat-sensitive protoco for bind quantum computation, for which the tota communication required scaes optimay for their specific setting [11] However, their optimaity argument appies ony to the case where the cient is restricted to preparing and performing projective measurements on singe qubits in two bases In this case, they argued based on the no-programming theorem of Niesen and Chuang [13] that Ω og 2 G) qubits must be exchanged between cient and server, where is the tota number of gates performed, and G is the cardinaity of the gate set A sighty weaer bound than that provided by the no-programming theorem can be shown for any protoco where the cient is restricted to preparing or measuring qudits of dimension D in one of B bases, by counting the number of possibe branches of the protoco: the cient s actions amount to a series of s preparations and measurements, since any cassica communication can aso be viewed in this way As the cient has no memory, preparations correspond to the transmission of a qudit to the server, and measurements correspond to the transmission of a qudit from the server As such, s qudits in tota are exchanged In order for the cient s actions to determine which of N C possibe computations is performed, it is necessary to have s ogn C ogbd by the pigeon-hoe principe Hence, in this setting, bind computation of a circuit of depth consist- FIG 1: Gate teeportation procedure The top set of wires corresponds to register R, whie the bottom set correspond to R
2 2 Protoco 1 Iterated Teeportation Aice s input: Gate D D m, to be teeported Bob s input: Initia state ψ, in register R Output: The state XD ψ in Bob s register R, where X is a tensor product of the Paui-X operator and the identity, nown both to Bob and Aice Steps: 1 Set D 1 = D 2 For 1 a) Aice prepares the state D + m, and sends it to Bob, who stores it in register R b) Bob appies the teeportation procedure depicted in Fig 1 obtaining measurement resuts s ) 1,,s) m He sends the measurement resuts to Aice c) Bob swaps the contents of register R and R d) Set D +1 = X D X D, where X = m i X s) i 3 Set X = X ) Bob now has the desired state XD ψ in register R ows Aice to successfuy teeport any given operator D D m, to Bob in at most steps, each invoving the transmission of m qubits This gives a tota cost of Om) Compare this to any setting where the no-programming theorem appies, which sets a minimum of Ω2 m ) qubits to be transmitted We wi assume that Bob s system contains two registers R and R The muti-qubit gate teeportation circuit we use is depicted in Fig 1 This procedure is formaised in Prot 1 Note that at the end of Prot 1, Bob is in possession of the desired output state, up to a series of Paui-X corrections, which he can perform himsef in this non-bind version Before discussing a bind version of Prot 1 we show that this protoco, if foowed by both Aice and Bob, does indeed yied the correct output [16] We wi begin by examining the effect of an iteration of the main oop Steps 2a through 2d) on an arbitrary input state ψ in register R Each iteration serves to impement a gate teeportation so that an input state ψ is transformed to ψ +1 = D X ψ Thus, ψ = D X ) ψ, 1) where the product operator is used to denote that the eft to right ordering is from highest to owest vaue of Note that if an operator D D m,t then n =1 X a )D n =1 X a )D D m,t 1 for any choice of variabes a {0,1} Thus, for any, we have D D m, +1 Since D m,1 corresponds to the set of tensor products of Z and the identity, D X = ±X D Thus, up to a goba phase, we have 1 ψ = X D D X ) ψ j, 2) Protoco 2 Bind Iterated Teeportation Aice s input: Gate D D m, to be teeported Bob s input: Initia state ψ, in register R Output: The state ZXD ψ in Bob s register R, where Z X) is a tensor product of the Paui-Z Paui-X) operator and the identity, and Z is Aice s encryption ey, nown ony to her Steps: 1 Set D 1 = D 2 For 1 a) Aice prepares the state Z Z 1 D + m, where Z = m=1 Z r), where r ), 1 x are uniformy random bits, and Z 0 = I She transmits it to Bob, who stores it in register R b) Bob appies the teeportation procedure depicted in Fig 1 obtaining measurement resuts s ) 1,,s) m He sends the measurement resuts to Aice c) Bob swaps the contents of register R and R d) Set D +1 = X D X D, where X = m i X s) i 3 Set X = X ), and Z = Z Bob now has the desired state ZXD ψ in register R which coapses teescopicay, substituting in the definition of D, to yied ψ = X )D 1 ψ j 3) Setting X = X ) competes the proof Note that, at this stage, Bob can correct his state by appying Paui-X to his qubits as appropriate, without nowing the teeported gate, and without any further assistance or communication from Aice Next we present a bind version of Prot 1 This procedure aows for the same functionaity as the previous protoco, enabing Aice and Bob to perform gate teeportation of a gate encoded by Aice, whie additionay ensuring that the gate remains unnown to Bob The procedure for accompishing this is presented in Prot 2 The proof of correctness of Prot 2 is simiar to that of Prot 1 The ony difference is that now each iteration adds a series of random Paui-Z operators With each iteration an input state ψ is transformed to ψ +1 = Z Z 1 D X ψ Thus, ψ = Z Z 1 D X ) ψ, 4) where, again, the product operator is used to denote that the eft to right ordering is from highest to owest vaue of As before, we use the property of D m,1, and the definition of D to teescopicay coapse the ast equation to ψ = Z X )D 1 ψ j 5)
3 3 0i H H H H 0i H H H H 0i H D 1 H D 2 H D 1 H D 0i H H H H y o i FIG 2: Bind Quantum Computation with Teeportation Protoco The dotted-ine square shows the repeating pattern of operations Now we turn to the bindness of the protoco The ony information transmitted from Aice to Bob are the set of quantum states φ = Z Z 1 D 0 m Note that ony φ is a function of r ) for 1 m, and that as these vaues are unnown to Bob, this state is necessariy the maximay mixed state of m qubits, and hence independent of the vaues of a other r ) when Hence φ 1 is the ony quantum state dependent on r 1) for 1 m, and must simiary be in a maximay mixed state We can appy this argument recursivey, impying that every state sent from Aice to Bob is in the maximay mixed state due to the unnown vaues of {r 1 m,1 }, which serve as Aice s ey As the joint state of a these messages are fixed to the maximay mixed state and hence independent of the computation, the ony parameters eaed to Bob are and m We are now in a position to present a compete protoco for universa bind quantum computation Rather than present a singe protoco, we introduce a famiy of protocos which are parameterised by an integer m, corresponding to the size of the cient s system During intermediate steps Aice wi instruct Bob to perform m-qubit gates via gate-teeportation, using Prot 2 The purpose of studying protocos with varying parameter m is the foowing When m = 1, we obtain a protoco with the most modest computationa requirements 1 on Aice she need ony be abe to prepare and send singe qubits in a finite set of states whie sti outperforming previous protocos On the other hand, when m is proportiona to the number of qubits used in the computation, n, the protoco achieves an exponentia in n) separation in tota communication from the naive imit impied by the no-programming theorem The protoco proceeds in phases During the jth teeportation phase, Aice wi use gate teeportation to send the desired gates to Bob Without oss of generaity we assume that m divides n [17], such that n = Pm, for some integer P Then for each contiguous set of m qubits Aice wi teeport an operator D j,p, to Bob, for 1 p P, who wi then appy it to the qubits abeed p 1)m + 1 through pm of his current state in memory Thus, if at the beginning of the jth phase Bob s register is in the state ψ j, by the end of the phase it wi be in state D j ψ j, where D j = P p=1 D j,p As the set of gates which may be impemented by gate teeportation do not form a universa gate set, the scheme we present here everages fixed gates impemented by Bob to bring about universaity in a competey bind manner, as foows Interspersed with the operations that Aice teeports, Bob wi aso appy the operation CZ = n 1 i=1 CZi,i + 1), where CZi, i+1) is the controed-z operator acting on qubits i and i + 1; as we as the operator H = H n, where H is the usua Hadamard operator The order of phases of the protoco is as foows The first step consists of controed-z operators, foowed by a Hadamard step, then a teeportation phase, then another Hadamard phase, foowed by a second teeportation phase Then, the pattern repeats itsef unti teeportation phases have been achieved To simpify the anaysis, and without oss of generaity, we assume is even This set of operations forms a universa set of gates for quantum computation for any m, and any x 2 see for exampe [15]) See Fig 2 for a schematic diagram and Prot 3 for forma presentation of the protoco The correct operation of the protoco depends on the proper definition of the function f j used in Step 3c This function is meant to correct and remove the X errors and the Z obfuscation operators introduced in previous steps Before giving a genera definition of f j, ets first consider a simpified version of the protoco where m = n and the phases of controed-z operators have been subsumed into the diagona operator teeportation phases Hence, the protoco simpifies into a series teeported gate phases foowed by a ayer of Hadamard gates The output of the protoco is then given by ψ o = Z j X j f j D j )H ) 0 n, 7) where the product operator is used to denote that the eft to right ordering is from highest to owest vaue of j Because there is a ayer of Hadamard gates in between every teeportation stage, the Z operator byproducts are turned into X operators, and vice versa, before the the next teeportation Since Aice can ony impement diagona gates using Prot 2, she can ony correct the X byproducts of the previous stage She can, however, conjugate her current gate with the previous Z operators, so as to commute that operator forward, so that it can be corrected in the foowing teeportation stage In this case, f j is given by: f j D) = HZ j 1 HDZ j 2 HX j 1 Z j 1 H, 8) where Z j = X j = I for a j < 1 It is straightforward to verify from the definition above that f j maps D m, onto itsef Now, substituting into Eq 7 we get ψ o = Z X D j H ) 0 n 9) From this state, Aice can get the correct output for computation by having Bob measure in the X basis, and sending her the output After this, she uses her decryption ey
4 4 Protoco 3 Genera Iterated Teeportation Bind Quantum Computation 1 Aice chooses a depth and a set of diagona operations D j = P p=1 D j,p, D j,p D m,x, where P = and n is the number of qubits used in the computation, such that her target computation is given by the measurement of HD HD 1 HCZCZD 2 HD 1 + n in the computationa basis 2 Aice produces the state Z 1 D 1 + n, where Z 1 = m =1 Z r1), where each r 1) is chosen uniformy at random from the set {0,1}, and transmits and this state to Bob, who stores the quantum state in register R 3 For 2 j a) If j 1 mod 2, then Bob appies CZ to register R b) Bob appies H to register R c) For 1 p P i Aice cacuates the operator f j,p D j,p ), where the function f j,p is defined in the main text in Eq 11 ii Aice and Bob engage in Prot 2 using f j,p D j,p ) as Aice s target gate, and Bob s qubits p 1)m through pm as the target register iii Aice eeps a record of the operator X j,p, the teeportation byproduct resuting from Prot 2, and Z j,p her encryption ey d) Aice cacuates the operators X j = X j,p, Z j = Z j,p, 6) p p and eeps a record of them 4 Finay, Bob measures his resuting state in the X basis, and sends the measurement outcomes m 1 m n to Aice Aice computes each output bit for the computation as o = m r, where Z = Z r The anaysis of the fu protoco is sighty more invoved due to the re-)introduction of the CZ gates, since these affect the propagation of X byproducts Fortunatey, errors propagate ony once, to the nearest neighbours before they can be corrected To see this, note that in between every two CZ gate stages, there are two sequences of Hadamard operators foowed by gate teeportations Hence, any error that cannot be fixed in the gate-teeportation phase immediatey preceding the CZ stage, can be corrected in the subsequent phase In order to define the genera correction function f j,p, et x j, and y j, be such that X j = n X x j,, and Z j = =1 n Z z j, 10) =1 For even j we tae χ j, = z j 1, and ζ j, = z j 2, +x j 1, + t { 1,1} z j 3,+t + x j 2,+t ), and for odd j we tae χ j, = z j 1, + t { 1,1} z j 2,+t + x j 1,+t ) and ζ j, = z j 2, + x j 1, Then, finay, for a j and p we define ) ) f j,p D) = X χ j, D Z ζ j, X χ j,, 11) where the tensor products are taen over vaues of ranging from p 1)m + 1 to pm The correctness of the genera protoco foows from a simiar argument to that of the specia case previousy considered The output of the genera protoco is given by ψ o = Z j X j f j,p D j,p ) HCZ j 0 n, 12) p=1 where the product operator is used to denote that the eft to right ordering is from highest to owest vaue of j Substituting Eq 11 into Eq 12, with some eementary agebra, gives ψ o = Z X D j HCZ j) 0 n, 13) as required The proof of bindness of the main protoco foows directy from the proof of bindness of Prot 2 Setting the parameter m equa to n, the above protoco requires that Aice transmit exacty x different n qubit states to Bob, and hence requires ony a tota of nx qubits to be sent from Aice to Bob, and nx cassica bits to be sent from Bob to Aice However, this protoco impements unnown operations, each of which can be drawn arbitrariy from the set D which has cardinaity 2 ) 2n 1) Any scheme to which the no-programming theorem appies, such as that in [11], woud require that at east 2 n 1) qubits or bits be communicated, and hence the protoco presented here is exponentiay more efficient than than previous schemes Setting m equa to n requires Aice to prepare arge entanged states, which may be undesirabe in reaistic settings Setting m to a sma constant, gives a protoco that is at east as easiy impementabe as previous ones in terms of resources needed on Aice s side, whie sti being universa for quantum computation, and offering a communication advantage The approach of iterated teeportation introduced in this comment can be appied to other measurement-based bind computation protocos such as [1], [5] and [9]) to achieve smaer advantages over the no-programming theorem bound It can be used outside of the bind computation setting, to reduce communication requirements in other deegated computation scenarios via Prot 1The notion of bindness used here is compatibe with requirements for composabe security in the abstract cryptography framewor [12], meaning that there is no compromise in security This materia is based on research funded by the Singapore Nationa Research Foundation under NRF Award NRF- NRFF We than Lorenzo Maccone, Tomoyui Morimae and Terry Rudoph for hepfu comments on the manuscript
5 5 Eectronic address: joseph [1] A Broadbent, Fitzsimons, and E Kashefi, Proceedings of the 50th Annua IEEE Symposium on Foundations of Computer Science FOCS 2009) pp ) [2] D Aharonov, M Ben-Or, and E Eban, in Proceedings of Innovations in Computer Science ), p 453 [3] S Barz, E Kashefi, A Broadbent, F Fitzsimons, A Zeiinger, and P Wather, Science 335, ) [4] T Morimae and K Fujii, Nature Communications 3, ) [5] F Fitzsimons and E Kashefi, arxiv preprint arxiv: ) [6] T Morimae, Phys Rev Lett ) [7] T Morimae and K Fujii, Physica Review A 87, ) [8] S Barz, F Fitzsimons, E Kashefi, and P Wather, Nature Physics 2013) [9] A Mantri, C A Pérez-Degado, and F Fitzsimons, Phys Rev Lett 111, ) [10] T Suei, T Koshiba, and T Morimae, Physica Review A ) [11] V Giovannetti, L Maccone, T Morimae, and T G Rudoph, Phys Rev Lett 111, ) [12] V Dunjo, F Fitzsimons, C Portmann, and R Renner, arxiv preprint arxiv: ) [13] M A Niesen and I L Chuang, Phys Rev Lett 79, ) [14] D Gottesman and I L Chuang, Nature 402, ) [15] Fitzsimons, L Xiao, S C Benjamin, and A ones, Phys Rev Lett 99, ) [16] A minor modification of Prot 1 invoves Aice and Bob hating the protoco as soon as Bob measures a zeroes In this case, no further corrections are necessary, and the protoco can concude with the correct output state In the case where 2 m < this eads to an average-case communication cost which is independent of [17] This may aways be done, since Aice can pad her input with unused ancia qubits
Unconditional security of differential phase shift quantum key distribution
Unconditiona security of differentia phase shift quantum key distribution Kai Wen, Yoshihisa Yamamoto Ginzton Lab and Dept of Eectrica Engineering Stanford University Basic idea of DPS-QKD Protoco. Aice
More informationLecture Note 3: Stationary Iterative Methods
MATH 5330: Computationa Methods of Linear Agebra Lecture Note 3: Stationary Iterative Methods Xianyi Zeng Department of Mathematica Sciences, UTEP Stationary Iterative Methods The Gaussian eimination (or
More informationarxiv:quant-ph/ v3 6 Jan 1995
arxiv:quant-ph/9501001v3 6 Jan 1995 Critique of proposed imit to space time measurement, based on Wigner s cocks and mirrors L. Diósi and B. Lukács KFKI Research Institute for Partice and Nucear Physics
More information4 1-D Boundary Value Problems Heat Equation
4 -D Boundary Vaue Probems Heat Equation The main purpose of this chapter is to study boundary vaue probems for the heat equation on a finite rod a x b. u t (x, t = ku xx (x, t, a < x < b, t > u(x, = ϕ(x
More informationSrednicki Chapter 51
Srednici Chapter 51 QFT Probems & Soutions A. George September 7, 13 Srednici 51.1. Derive the fermion-oop correction to the scaar proagator by woring through equation 5., and show that it has an extra
More informationCryptanalysis of PKP: A New Approach
Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in
More informationXSAT of linear CNF formulas
XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open
More informationChemical Kinetics Part 2
Integrated Rate Laws Chemica Kinetics Part 2 The rate aw we have discussed thus far is the differentia rate aw. Let us consider the very simpe reaction: a A à products The differentia rate reates the rate
More informationReliability: Theory & Applications No.3, September 2006
REDUNDANCY AND RENEWAL OF SERVERS IN OPENED QUEUING NETWORKS G. Sh. Tsitsiashvii M.A. Osipova Vadivosto, Russia 1 An opened queuing networ with a redundancy and a renewa of servers is considered. To cacuate
More informationStat 155 Game theory, Yuval Peres Fall Lectures 4,5,6
Stat 155 Game theory, Yuva Peres Fa 2004 Lectures 4,5,6 In the ast ecture, we defined N and P positions for a combinatoria game. We wi now show more formay that each starting position in a combinatoria
More informationA Brief Introduction to Markov Chains and Hidden Markov Models
A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,
More informationSUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS
ISEE 1 SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS By Yingying Fan and Jinchi Lv University of Southern Caifornia This Suppementary Materia
More informationCS229 Lecture notes. Andrew Ng
CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view
More informationChemical Kinetics Part 2. Chapter 16
Chemica Kinetics Part 2 Chapter 16 Integrated Rate Laws The rate aw we have discussed thus far is the differentia rate aw. Let us consider the very simpe reaction: a A à products The differentia rate reates
More informationAsynchronous Control for Coupled Markov Decision Systems
INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of
More information4 Separation of Variables
4 Separation of Variabes In this chapter we describe a cassica technique for constructing forma soutions to inear boundary vaue probems. The soution of three cassica (paraboic, hyperboic and eiptic) PDE
More informationRecursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines
Recursive Constructions of Parae FIFO and LIFO Queues with Switched Deay Lines Po-Kai Huang, Cheng-Shang Chang, Feow, IEEE, Jay Cheng, Member, IEEE, and Duan-Shin Lee, Senior Member, IEEE Abstract One
More informationBayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with?
Bayesian Learning A powerfu and growing approach in machine earning We use it in our own decision making a the time You hear a which which coud equay be Thanks or Tanks, which woud you go with? Combine
More informationSeparation of Variables and a Spherical Shell with Surface Charge
Separation of Variabes and a Spherica She with Surface Charge In cass we worked out the eectrostatic potentia due to a spherica she of radius R with a surface charge density σθ = σ cos θ. This cacuation
More informationHow the backpropagation algorithm works Srikumar Ramalingam School of Computing University of Utah
How the backpropagation agorithm works Srikumar Ramaingam Schoo of Computing University of Utah Reference Most of the sides are taken from the second chapter of the onine book by Michae Nieson: neuranetworksanddeepearning.com
More informationVI.G Exact free energy of the Square Lattice Ising model
VI.G Exact free energy of the Square Lattice Ising mode As indicated in eq.(vi.35), the Ising partition function is reated to a sum S, over coections of paths on the attice. The aowed graphs for a square
More informationLimited magnitude error detecting codes over Z q
Limited magnitude error detecting codes over Z q Noha Earief choo of Eectrica Engineering and Computer cience Oregon tate University Corvais, OR 97331, UA Emai: earief@eecsorstedu Bea Bose choo of Eectrica
More information(1 ) = 1 for some 2 (0; 1); (1 + ) = 0 for some > 0:
Answers, na. Economics 4 Fa, 2009. Christiano.. The typica househod can engage in two types of activities producing current output and studying at home. Athough time spent on studying at home sacrices
More informationA UNIVERSAL METRIC FOR THE CANONICAL BUNDLE OF A HOLOMORPHIC FAMILY OF PROJECTIVE ALGEBRAIC MANIFOLDS
A UNIERSAL METRIC FOR THE CANONICAL BUNDLE OF A HOLOMORPHIC FAMILY OF PROJECTIE ALGEBRAIC MANIFOLDS DROR AROLIN Dedicated to M Saah Baouendi on the occasion of his 60th birthday 1 Introduction In his ceebrated
More informationProblem set 6 The Perron Frobenius theorem.
Probem set 6 The Perron Frobenius theorem. Math 22a4 Oct 2 204, Due Oct.28 In a future probem set I want to discuss some criteria which aow us to concude that that the ground state of a sef-adjoint operator
More informationRate-Distortion Theory of Finite Point Processes
Rate-Distortion Theory of Finite Point Processes Günther Koiander, Dominic Schuhmacher, and Franz Hawatsch, Feow, IEEE Abstract We study the compression of data in the case where the usefu information
More informationPhysics 127c: Statistical Mechanics. Fermi Liquid Theory: Collective Modes. Boltzmann Equation. The quasiparticle energy including interactions
Physics 27c: Statistica Mechanics Fermi Liquid Theory: Coective Modes Botzmann Equation The quasipartice energy incuding interactions ε p,σ = ε p + f(p, p ; σ, σ )δn p,σ, () p,σ with ε p ε F + v F (p p
More informationGeneralized Bell polynomials and the combinatorics of Poisson central moments
Generaized Be poynomias and the combinatorics of Poisson centra moments Nicoas Privaut Division of Mathematica Sciences Schoo of Physica and Mathematica Sciences Nanyang Technoogica University SPMS-MAS-05-43,
More informationMath 1600 Lecture 5, Section 2, 15 Sep 2014
1 of 6 Math 1600 Lecture 5, Section 2, 15 Sep 2014 Announcements: Continue reading Section 1.3 and aso the Exporation on cross products for next cass. Work through recommended homework questions. Quiz
More informationGauss Law. 2. Gauss s Law: connects charge and field 3. Applications of Gauss s Law
Gauss Law 1. Review on 1) Couomb s Law (charge and force) 2) Eectric Fied (fied and force) 2. Gauss s Law: connects charge and fied 3. Appications of Gauss s Law Couomb s Law and Eectric Fied Couomb s
More informationStochastic Variational Inference with Gradient Linearization
Stochastic Variationa Inference with Gradient Linearization Suppementa Materia Tobias Pötz * Anne S Wannenwetsch Stefan Roth Department of Computer Science, TU Darmstadt Preface In this suppementa materia,
More informationOn generalized quantum Turing machine and its language classes
Proceedings of the 11th WSEAS Internationa onference on APPLIED MATHEMATIS, Daas, Texas, USA, March -4, 007 51 On generaized quantum Turing machine and its anguage casses SATOSHI IRIYAMA Toyo University
More informationA Solution to the 4-bit Parity Problem with a Single Quaternary Neuron
Neura Information Processing - Letters and Reviews Vo. 5, No. 2, November 2004 LETTER A Soution to the 4-bit Parity Probem with a Singe Quaternary Neuron Tohru Nitta Nationa Institute of Advanced Industria
More informationSEMINAR 2. PENDULUMS. V = mgl cos θ. (2) L = T V = 1 2 ml2 θ2 + mgl cos θ, (3) d dt ml2 θ2 + mgl sin θ = 0, (4) θ + g l
Probem 7. Simpe Penduum SEMINAR. PENDULUMS A simpe penduum means a mass m suspended by a string weightess rigid rod of ength so that it can swing in a pane. The y-axis is directed down, x-axis is directed
More informationFOURIER SERIES ON ANY INTERVAL
FOURIER SERIES ON ANY INTERVAL Overview We have spent considerabe time earning how to compute Fourier series for functions that have a period of 2p on the interva (-p,p). We have aso seen how Fourier series
More informationMODELING OF A THREE-PHASE APPLICATION OF A MAGNETIC AMPLIFIER
TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES MODELING OF A THREE-PHASE APPLICATION OF A MAGNETIC AMPLIFIER L. Austrin*, G. Engdah** * Saab AB, Aerosystems, S-81 88 Linköping, Sweden, ** Roya
More informationMATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES
MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES Separation of variabes is a method to sove certain PDEs which have a warped product structure. First, on R n, a inear PDE of order m is
More informationA Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes
A Fundamenta Storage-Communication Tradeoff in Distributed Computing with Stragging odes ifa Yan, Michèe Wigger LTCI, Téécom ParisTech 75013 Paris, France Emai: {qifa.yan, michee.wigger} @teecom-paristech.fr
More informationWidth of Percolation Transition in Complex Networks
APS/23-QED Width of Percoation Transition in Compex Networs Tomer Kaisy, and Reuven Cohen 2 Minerva Center and Department of Physics, Bar-Ian University, 52900 Ramat-Gan, Israe 2 Department of Computer
More informationarxiv:math/ v2 [math.pr] 6 Mar 2005
ASYMPTOTIC BEHAVIOR OF RANDOM HEAPS arxiv:math/0407286v2 [math.pr] 6 Mar 2005 J. BEN HOUGH Abstract. We consider a random wa W n on the ocay free group or equivaenty a signed random heap) with m generators
More informationTHE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE
THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE KATIE L. MAY AND MELISSA A. MITCHELL Abstract. We show how to identify the minima path network connecting three fixed points on
More informationExpectation-Maximization for Estimating Parameters for a Mixture of Poissons
Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Brandon Maone Department of Computer Science University of Hesini February 18, 2014 Abstract This document derives, in excrutiating
More informationSydU STAT3014 (2015) Second semester Dr. J. Chan 18
STAT3014/3914 Appied Stat.-Samping C-Stratified rand. sampe Stratified Random Samping.1 Introduction Description The popuation of size N is divided into mutuay excusive and exhaustive subpopuations caed
More informationCombining reaction kinetics to the multi-phase Gibbs energy calculation
7 th European Symposium on Computer Aided Process Engineering ESCAPE7 V. Pesu and P.S. Agachi (Editors) 2007 Esevier B.V. A rights reserved. Combining reaction inetics to the muti-phase Gibbs energy cacuation
More information8 Digifl'.11 Cth:uits and devices
8 Digif'. Cth:uits and devices 8. Introduction In anaog eectronics, votage is a continuous variabe. This is usefu because most physica quantities we encounter are continuous: sound eves, ight intensity,
More informationSection 6: Magnetostatics
agnetic fieds in matter Section 6: agnetostatics In the previous sections we assumed that the current density J is a known function of coordinates. In the presence of matter this is not aways true. The
More informationCoupling of LWR and phase transition models at boundary
Couping of LW and phase transition modes at boundary Mauro Garaveo Dipartimento di Matematica e Appicazioni, Università di Miano Bicocca, via. Cozzi 53, 20125 Miano Itay. Benedetto Piccoi Department of
More informationUniversal Blind Quantum Computing
Universal Blind Quantum Computing Elham Kashefi Laboratoire d Informatique de Grenoble Joint work with Anne Broadbent Montreal Joe Fitzsimons Oxford Classical Blind Computing Fundamentally asymmetric unlike
More informationIterative Decoding Performance Bounds for LDPC Codes on Noisy Channels
Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University
More informationNOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS
NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS TONY ALLEN, EMILY GEBHARDT, AND ADAM KLUBALL 3 ADVISOR: DR. TIFFANY KOLBA 4 Abstract. The phenomenon of noise-induced stabiization occurs
More informationAlgorithms to solve massively under-defined systems of multivariate quadratic equations
Agorithms to sove massivey under-defined systems of mutivariate quadratic equations Yasufumi Hashimoto Abstract It is we known that the probem to sove a set of randomy chosen mutivariate quadratic equations
More informationTHINKING IN PYRAMIDS
ECS 178 Course Notes THINKING IN PYRAMIDS Kenneth I. Joy Institute for Data Anaysis and Visuaization Department of Computer Science University of Caifornia, Davis Overview It is frequenty usefu to think
More informationLearning Fully Observed Undirected Graphical Models
Learning Fuy Observed Undirected Graphica Modes Sides Credit: Matt Gormey (2016) Kayhan Batmangheich 1 Machine Learning The data inspires the structures we want to predict Inference finds {best structure,
More informationTheory and implementation behind: Universal surface creation - smallest unitcell
Teory and impementation beind: Universa surface creation - smaest unitce Bjare Brin Buus, Jaob Howat & Tomas Bigaard September 15, 218 1 Construction of surface sabs Te aim for tis part of te project is
More informationPartial permutation decoding for MacDonald codes
Partia permutation decoding for MacDonad codes J.D. Key Department of Mathematics and Appied Mathematics University of the Western Cape 7535 Bevie, South Africa P. Seneviratne Department of Mathematics
More informationFFTs in Graphics and Vision. Spherical Convolution and Axial Symmetry Detection
FFTs in Graphics and Vision Spherica Convoution and Axia Symmetry Detection Outine Math Review Symmetry Genera Convoution Spherica Convoution Axia Symmetry Detection Math Review Symmetry: Given a unitary
More informationReichenbachian Common Cause Systems
Reichenbachian Common Cause Systems G. Hofer-Szabó Department of Phiosophy Technica University of Budapest e-mai: gszabo@hps.ete.hu Mikós Rédei Department of History and Phiosophy of Science Eötvös University,
More informationThe Group Structure on a Smooth Tropical Cubic
The Group Structure on a Smooth Tropica Cubic Ethan Lake Apri 20, 2015 Abstract Just as in in cassica agebraic geometry, it is possibe to define a group aw on a smooth tropica cubic curve. In this note,
More informationarxiv: v1 [quant-ph] 23 Mar 2012
Unconditionally verifiable blind computation Joseph F. Fitzsimons 1 and Elham Kashefi 2 arxiv:1203.5217v1 [quant-ph] 23 Mar 2012 1 Centre for Quantum Technologies, National University of Singapore, 3 Science
More informationCoded Caching for Files with Distinct File Sizes
Coded Caching for Fies with Distinct Fie Sizes Jinbei Zhang iaojun Lin Chih-Chun Wang inbing Wang Department of Eectronic Engineering Shanghai Jiao ong University China Schoo of Eectrica and Computer Engineering
More informationT.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA
ON THE SYMMETRY OF THE POWER INE CHANNE T.C. Banwe, S. Gai {bct, sgai}@research.tecordia.com Tecordia Technoogies, Inc., 445 South Street, Morristown, NJ 07960, USA Abstract The indoor power ine network
More informationMat 1501 lecture notes, penultimate installment
Mat 1501 ecture notes, penutimate instament 1. bounded variation: functions of a singe variabe optiona) I beieve that we wi not actuay use the materia in this section the point is mainy to motivate the
More informationSTA 216 Project: Spline Approach to Discrete Survival Analysis
: Spine Approach to Discrete Surviva Anaysis November 4, 005 1 Introduction Athough continuous surviva anaysis differs much from the discrete surviva anaysis, there is certain ink between the two modeing
More informationDetermining The Degree of Generalization Using An Incremental Learning Algorithm
Determining The Degree of Generaization Using An Incrementa Learning Agorithm Pabo Zegers Facutad de Ingeniería, Universidad de os Andes San Caros de Apoquindo 22, Las Condes, Santiago, Chie pzegers@uandes.c
More informationOn colorings of the Boolean lattice avoiding a rainbow copy of a poset arxiv: v1 [math.co] 21 Dec 2018
On coorings of the Booean attice avoiding a rainbow copy of a poset arxiv:1812.09058v1 [math.co] 21 Dec 2018 Baázs Patkós Afréd Rényi Institute of Mathematics, Hungarian Academy of Scinces H-1053, Budapest,
More information12.2. Maxima and Minima. Introduction. Prerequisites. Learning Outcomes
Maima and Minima 1. Introduction In this Section we anayse curves in the oca neighbourhood of a stationary point and, from this anaysis, deduce necessary conditions satisfied by oca maima and oca minima.
More informationHaar Decomposition and Reconstruction Algorithms
Jim Lambers MAT 773 Fa Semester 018-19 Lecture 15 and 16 Notes These notes correspond to Sections 4.3 and 4.4 in the text. Haar Decomposition and Reconstruction Agorithms Decomposition Suppose we approximate
More informationMONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES
MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES ANDRZEJ DUDEK AND ANDRZEJ RUCIŃSKI Abstract. For positive integers k and, a k-uniform hypergraph is caed a oose path of ength, and denoted by
More informationEfficient Generation of Random Bits from Finite State Markov Chains
Efficient Generation of Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown
More informationJoel Broida UCSD Fall 2009 Phys 130B QM II. Homework Set 2 DO ALL WORK BY HAND IN OTHER WORDS, DON T USE MATHEMAT- ICA OR ANY CALCULATORS.
Joe Broida UCSD Fa 009 Phys 30B QM II Homework Set DO ALL WORK BY HAND IN OTHER WORDS, DON T USE MATHEMAT- ICA OR ANY CALCULATORS. You may need to use one or more of these: Y 0 0 = 4π Y 0 = 3 4π cos Y
More informationSome Measures for Asymmetry of Distributions
Some Measures for Asymmetry of Distributions Georgi N. Boshnakov First version: 31 January 2006 Research Report No. 5, 2006, Probabiity and Statistics Group Schoo of Mathematics, The University of Manchester
More informationAsymptotic Properties of a Generalized Cross Entropy Optimization Algorithm
1 Asymptotic Properties of a Generaized Cross Entropy Optimization Agorithm Zijun Wu, Michae Koonko, Institute for Appied Stochastics and Operations Research, Caustha Technica University Abstract The discrete
More informationarxiv: v1 [math.co] 17 Dec 2018
On the Extrema Maximum Agreement Subtree Probem arxiv:1812.06951v1 [math.o] 17 Dec 2018 Aexey Markin Department of omputer Science, Iowa State University, USA amarkin@iastate.edu Abstract Given two phyogenetic
More informationIntegrating Factor Methods as Exponential Integrators
Integrating Factor Methods as Exponentia Integrators Borisav V. Minchev Department of Mathematica Science, NTNU, 7491 Trondheim, Norway Borko.Minchev@ii.uib.no Abstract. Recenty a ot of effort has been
More informationSmoothness equivalence properties of univariate subdivision schemes and their projection analogues
Numerische Mathematik manuscript No. (wi be inserted by the editor) Smoothness equivaence properties of univariate subdivision schemes and their projection anaogues Phiipp Grohs TU Graz Institute of Geometry
More informationDo Schools Matter for High Math Achievement? Evidence from the American Mathematics Competitions Glenn Ellison and Ashley Swanson Online Appendix
VOL. NO. DO SCHOOLS MATTER FOR HIGH MATH ACHIEVEMENT? 43 Do Schoos Matter for High Math Achievement? Evidence from the American Mathematics Competitions Genn Eison and Ashey Swanson Onine Appendix Appendix
More informationOn Integrals Involving Universal Associated Legendre Polynomials and Powers of the Factor (1 x 2 ) and Their Byproducts
Commun. Theor. Phys. 66 (216) 369 373 Vo. 66, No. 4, October 1, 216 On Integras Invoving Universa Associated Legendre Poynomias and Powers of the Factor (1 x 2 ) and Their Byproducts Dong-Sheng Sun ( 孙东升
More informationSequential Decoding of Polar Codes with Arbitrary Binary Kernel
Sequentia Decoding of Poar Codes with Arbitrary Binary Kerne Vera Miosavskaya, Peter Trifonov Saint-Petersburg State Poytechnic University Emai: veram,petert}@dcn.icc.spbstu.ru Abstract The probem of efficient
More informationNotes on Backpropagation with Cross Entropy
Notes on Backpropagation with Cross Entropy I-Ta ee, Dan Gowasser, Bruno Ribeiro Purue University October 3, 07. Overview This note introuces backpropagation for a common neura network muti-cass cassifier.
More informationSteepest Descent Adaptation of Min-Max Fuzzy If-Then Rules 1
Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rues 1 R.J. Marks II, S. Oh, P. Arabshahi Λ, T.P. Caude, J.J. Choi, B.G. Song Λ Λ Dept. of Eectrica Engineering Boeing Computer Services University
More information(f) is called a nearly holomorphic modular form of weight k + 2r as in [5].
PRODUCTS OF NEARLY HOLOMORPHIC EIGENFORMS JEFFREY BEYERL, KEVIN JAMES, CATHERINE TRENTACOSTE, AND HUI XUE Abstract. We prove that the product of two neary hoomorphic Hece eigenforms is again a Hece eigenform
More informationA unified framework for design and analysis of networked and quantized control systems
1 A unified framework for design and anaysis of networked and quantized contro systems Dragan ešić and Danie Liberzon Abstract We generaize and unify a range of recent resuts in quantized contro systems
More informationNuclear Size and Density
Nucear Size and Density How does the imited range of the nucear force affect the size and density of the nucei? Assume a Vecro ba mode, each having radius r, voume V = 4/3π r 3. Then the voume of the entire
More information17 Lecture 17: Recombination and Dark Matter Production
PYS 652: Astrophysics 88 17 Lecture 17: Recombination and Dark Matter Production New ideas pass through three periods: It can t be done. It probaby can be done, but it s not worth doing. I knew it was
More informationAALBORG UNIVERSITY. The distribution of communication cost for a mobile service scenario. Jesper Møller and Man Lung Yiu. R June 2009
AALBORG UNIVERSITY The distribution of communication cost for a mobie service scenario by Jesper Møer and Man Lung Yiu R-29-11 June 29 Department of Mathematica Sciences Aaborg University Fredrik Bajers
More informationMARKOV CHAINS AND MARKOV DECISION THEORY. Contents
MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After
More informationA. Distribution of the test statistic
A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch
More informationA proposed nonparametric mixture density estimation using B-spline functions
A proposed nonparametric mixture density estimation using B-spine functions Atizez Hadrich a,b, Mourad Zribi a, Afif Masmoudi b a Laboratoire d Informatique Signa et Image de a Côte d Opae (LISIC-EA 4491),
More informationCentralized Coded Caching of Correlated Contents
Centraized Coded Caching of Correated Contents Qianqian Yang and Deniz Gündüz Information Processing and Communications Lab Department of Eectrica and Eectronic Engineering Imperia Coege London arxiv:1711.03798v1
More informationPattern Frequency Sequences and Internal Zeros
Advances in Appied Mathematics 28, 395 420 (2002 doi:10.1006/aama.2001.0789, avaiabe onine at http://www.ideaibrary.com on Pattern Frequency Sequences and Interna Zeros Mikós Bóna Department of Mathematics,
More informationExplicit overall risk minimization transductive bound
1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,
More informationPHYS 110B - HW #1 Fall 2005, Solutions by David Pace Equations referenced as Eq. # are from Griffiths Problem statements are paraphrased
PHYS 110B - HW #1 Fa 2005, Soutions by David Pace Equations referenced as Eq. # are from Griffiths Probem statements are paraphrased [1.] Probem 6.8 from Griffiths A ong cyinder has radius R and a magnetization
More informationNIKOS FRANTZIKINAKIS. N n N where (Φ N) N N is any Følner sequence
SOME OPE PROBLEMS O MULTIPLE ERGODIC AVERAGES IKOS FRATZIKIAKIS. Probems reated to poynomia sequences In this section we give a ist of probems reated to the study of mutipe ergodic averages invoving iterates
More informationEfficiently Generating Random Bits from Finite State Markov Chains
1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown
More information$, (2.1) n="# #. (2.2)
Chapter. Eectrostatic II Notes: Most of the materia presented in this chapter is taken from Jackson, Chap.,, and 4, and Di Bartoo, Chap... Mathematica Considerations.. The Fourier series and the Fourier
More informationOptimal Control of Assembly Systems with Multiple Stages and Multiple Demand Classes 1
Optima Contro of Assemby Systems with Mutipe Stages and Mutipe Demand Casses Saif Benjaafar Mohsen EHafsi 2 Chung-Yee Lee 3 Weihua Zhou 3 Industria & Systems Engineering, Department of Mechanica Engineering,
More informationAutomobile Prices in Market Equilibrium. Berry, Pakes and Levinsohn
Automobie Prices in Market Equiibrium Berry, Pakes and Levinsohn Empirica Anaysis of demand and suppy in a differentiated products market: equiibrium in the U.S. automobie market. Oigopoistic Differentiated
More information14 Separation of Variables Method
14 Separation of Variabes Method Consider, for exampe, the Dirichet probem u t = Du xx < x u(x, ) = f(x) < x < u(, t) = = u(, t) t > Let u(x, t) = T (t)φ(x); now substitute into the equation: dt
More informationHeavy-traffic Delay Optimality in Pull-based Load Balancing Systems: Necessary and Sufficient Conditions
Heavy-traffic Deay Optimaity in Pu-based Load Baancing Systems: Necessary and Sufficient Conditions XINGYU ZHOU, The Ohio State University JIAN TAN, The Ohio State University NSS SHROFF, The Ohio State
More informationarxiv: v1 [math.fa] 23 Aug 2018
An Exact Upper Bound on the L p Lebesgue Constant and The -Rényi Entropy Power Inequaity for Integer Vaued Random Variabes arxiv:808.0773v [math.fa] 3 Aug 08 Peng Xu, Mokshay Madiman, James Mebourne Abstract
More information