arxiv: v1 [quant-ph] 18 Nov 2014

Size: px
Start display at page:

Download "arxiv: v1 [quant-ph] 18 Nov 2014"

Transcription

1 Overcoming efficiency constraints on bind quantum computation Caros A Pérez-Degado 1 and oseph F Fitzsimons1, 2, 1 Singapore University of Technoogy and Design, 20 Dover Drive, Singapore Centre for Quantum Technoogies, Nationa University of Singapore, 3 Science Drive 2, Singapore ing of gates independenty chosen from a set of cardinaity G requires an exchange of at east ogg ogbd qudits Whie for any fixed choice of d and B this approach yieds a bound simiar to the no-programming theorem, it is more widey appicabe As such, it is tempting to conjecture that the no-programming bound of Ω og 2 G) on the number of bits/qubits exchanged appies to any approach to bind quantum computation In this paper, however, we show that such an efficiency constraint can be overcome if the cient is aowed to prepare arbitrary singe or muti-qubit states The protocos we construct are not ony more efficient than previous bind computation protocos, but require ess communication than is required to cassicay describe the deegated computation Before presenting the main protoco, we first present a precursor protoco which forms the main buiding boc of our fina protoco Our approach is based on gate teeportation [14], but differs from standard usages in that instead of directy correcting errors induced by teeportation byproducts, we mae use of additiona gate teeportation steps to correct the state of the system This avoids the need to provide a cassica description of the correction operator, eading to a saving in the tota communication cost of the protoco, in turn aowing our protoco to avoid the ower bound on communication of og 2 G which resuts from a naive appication of the noprogramming theorem Consider the set D m, of a diagona operators acting on m qubits of the form expi j {0,1} m θ j Z j 1 Z j 2 Z j m ), with θ j { rπ r {0,1,2,3,,2 1}} Our approach a- 2 arxiv: v1 [quant-ph] 18 Nov 2014 Bind quantum computation aows a user to deegate a computation to an untrusted server whie eeping the computation hidden A number of recent wors have sought to estabish bounds on the communication requirements necessary to impement bind computation, and a bound based on the no-programming theorem of Niesen and Chuang has emerged as a natura imiting factor Here we show that this constraints ony hod in imited scenarios and show how to overcome it using a method based on iterated gate-teeportations We present our resuts as a famiy of protocos, with varying degrees of computationa-abiity requirements on the cient Certain protocos in this famiy exponentiay outperform previousy nown schemes in terms of tota communication The approach presented here can be adapted to other distributed computing protocos to reduce communication requirements Bind quantum computation is a cryptographic tas whereby a cient sees to hide a deegated computation from the server impementing the computation A number of protocos for bind computation have been discovered exhibiting either information theoretic security [1 10], for which it can be proven that a cheating server cannot earn anything about the computation being performed based on purey information theoretic grounds, or cheat-sensitivity [11], whereby a cheating server can be detected even though the computation cannot be ept hidden from it A range of capabiities for the cient have aso been considered, from the abiity to prepare or measure individua singe qubit states [1, 5, 6], to the abiity to perform universa computation on fixed size systems [2] Recenty wor has sought to unify this disparate famiy of protocos in terms of security definitions [12] and in terms of resource accounting [9, 11] Recenty, Giovannetti, Maccone, Morimae and Rudoph proposed a nove cheat-sensitive protoco for bind quantum computation, for which the tota communication required scaes optimay for their specific setting [11] However, their optimaity argument appies ony to the case where the cient is restricted to preparing and performing projective measurements on singe qubits in two bases In this case, they argued based on the no-programming theorem of Niesen and Chuang [13] that Ω og 2 G) qubits must be exchanged between cient and server, where is the tota number of gates performed, and G is the cardinaity of the gate set A sighty weaer bound than that provided by the no-programming theorem can be shown for any protoco where the cient is restricted to preparing or measuring qudits of dimension D in one of B bases, by counting the number of possibe branches of the protoco: the cient s actions amount to a series of s preparations and measurements, since any cassica communication can aso be viewed in this way As the cient has no memory, preparations correspond to the transmission of a qudit to the server, and measurements correspond to the transmission of a qudit from the server As such, s qudits in tota are exchanged In order for the cient s actions to determine which of N C possibe computations is performed, it is necessary to have s ogn C ogbd by the pigeon-hoe principe Hence, in this setting, bind computation of a circuit of depth consist- FIG 1: Gate teeportation procedure The top set of wires corresponds to register R, whie the bottom set correspond to R

2 2 Protoco 1 Iterated Teeportation Aice s input: Gate D D m, to be teeported Bob s input: Initia state ψ, in register R Output: The state XD ψ in Bob s register R, where X is a tensor product of the Paui-X operator and the identity, nown both to Bob and Aice Steps: 1 Set D 1 = D 2 For 1 a) Aice prepares the state D + m, and sends it to Bob, who stores it in register R b) Bob appies the teeportation procedure depicted in Fig 1 obtaining measurement resuts s ) 1,,s) m He sends the measurement resuts to Aice c) Bob swaps the contents of register R and R d) Set D +1 = X D X D, where X = m i X s) i 3 Set X = X ) Bob now has the desired state XD ψ in register R ows Aice to successfuy teeport any given operator D D m, to Bob in at most steps, each invoving the transmission of m qubits This gives a tota cost of Om) Compare this to any setting where the no-programming theorem appies, which sets a minimum of Ω2 m ) qubits to be transmitted We wi assume that Bob s system contains two registers R and R The muti-qubit gate teeportation circuit we use is depicted in Fig 1 This procedure is formaised in Prot 1 Note that at the end of Prot 1, Bob is in possession of the desired output state, up to a series of Paui-X corrections, which he can perform himsef in this non-bind version Before discussing a bind version of Prot 1 we show that this protoco, if foowed by both Aice and Bob, does indeed yied the correct output [16] We wi begin by examining the effect of an iteration of the main oop Steps 2a through 2d) on an arbitrary input state ψ in register R Each iteration serves to impement a gate teeportation so that an input state ψ is transformed to ψ +1 = D X ψ Thus, ψ = D X ) ψ, 1) where the product operator is used to denote that the eft to right ordering is from highest to owest vaue of Note that if an operator D D m,t then n =1 X a )D n =1 X a )D D m,t 1 for any choice of variabes a {0,1} Thus, for any, we have D D m, +1 Since D m,1 corresponds to the set of tensor products of Z and the identity, D X = ±X D Thus, up to a goba phase, we have 1 ψ = X D D X ) ψ j, 2) Protoco 2 Bind Iterated Teeportation Aice s input: Gate D D m, to be teeported Bob s input: Initia state ψ, in register R Output: The state ZXD ψ in Bob s register R, where Z X) is a tensor product of the Paui-Z Paui-X) operator and the identity, and Z is Aice s encryption ey, nown ony to her Steps: 1 Set D 1 = D 2 For 1 a) Aice prepares the state Z Z 1 D + m, where Z = m=1 Z r), where r ), 1 x are uniformy random bits, and Z 0 = I She transmits it to Bob, who stores it in register R b) Bob appies the teeportation procedure depicted in Fig 1 obtaining measurement resuts s ) 1,,s) m He sends the measurement resuts to Aice c) Bob swaps the contents of register R and R d) Set D +1 = X D X D, where X = m i X s) i 3 Set X = X ), and Z = Z Bob now has the desired state ZXD ψ in register R which coapses teescopicay, substituting in the definition of D, to yied ψ = X )D 1 ψ j 3) Setting X = X ) competes the proof Note that, at this stage, Bob can correct his state by appying Paui-X to his qubits as appropriate, without nowing the teeported gate, and without any further assistance or communication from Aice Next we present a bind version of Prot 1 This procedure aows for the same functionaity as the previous protoco, enabing Aice and Bob to perform gate teeportation of a gate encoded by Aice, whie additionay ensuring that the gate remains unnown to Bob The procedure for accompishing this is presented in Prot 2 The proof of correctness of Prot 2 is simiar to that of Prot 1 The ony difference is that now each iteration adds a series of random Paui-Z operators With each iteration an input state ψ is transformed to ψ +1 = Z Z 1 D X ψ Thus, ψ = Z Z 1 D X ) ψ, 4) where, again, the product operator is used to denote that the eft to right ordering is from highest to owest vaue of As before, we use the property of D m,1, and the definition of D to teescopicay coapse the ast equation to ψ = Z X )D 1 ψ j 5)

3 3 0i H H H H 0i H H H H 0i H D 1 H D 2 H D 1 H D 0i H H H H y o i FIG 2: Bind Quantum Computation with Teeportation Protoco The dotted-ine square shows the repeating pattern of operations Now we turn to the bindness of the protoco The ony information transmitted from Aice to Bob are the set of quantum states φ = Z Z 1 D 0 m Note that ony φ is a function of r ) for 1 m, and that as these vaues are unnown to Bob, this state is necessariy the maximay mixed state of m qubits, and hence independent of the vaues of a other r ) when Hence φ 1 is the ony quantum state dependent on r 1) for 1 m, and must simiary be in a maximay mixed state We can appy this argument recursivey, impying that every state sent from Aice to Bob is in the maximay mixed state due to the unnown vaues of {r 1 m,1 }, which serve as Aice s ey As the joint state of a these messages are fixed to the maximay mixed state and hence independent of the computation, the ony parameters eaed to Bob are and m We are now in a position to present a compete protoco for universa bind quantum computation Rather than present a singe protoco, we introduce a famiy of protocos which are parameterised by an integer m, corresponding to the size of the cient s system During intermediate steps Aice wi instruct Bob to perform m-qubit gates via gate-teeportation, using Prot 2 The purpose of studying protocos with varying parameter m is the foowing When m = 1, we obtain a protoco with the most modest computationa requirements 1 on Aice she need ony be abe to prepare and send singe qubits in a finite set of states whie sti outperforming previous protocos On the other hand, when m is proportiona to the number of qubits used in the computation, n, the protoco achieves an exponentia in n) separation in tota communication from the naive imit impied by the no-programming theorem The protoco proceeds in phases During the jth teeportation phase, Aice wi use gate teeportation to send the desired gates to Bob Without oss of generaity we assume that m divides n [17], such that n = Pm, for some integer P Then for each contiguous set of m qubits Aice wi teeport an operator D j,p, to Bob, for 1 p P, who wi then appy it to the qubits abeed p 1)m + 1 through pm of his current state in memory Thus, if at the beginning of the jth phase Bob s register is in the state ψ j, by the end of the phase it wi be in state D j ψ j, where D j = P p=1 D j,p As the set of gates which may be impemented by gate teeportation do not form a universa gate set, the scheme we present here everages fixed gates impemented by Bob to bring about universaity in a competey bind manner, as foows Interspersed with the operations that Aice teeports, Bob wi aso appy the operation CZ = n 1 i=1 CZi,i + 1), where CZi, i+1) is the controed-z operator acting on qubits i and i + 1; as we as the operator H = H n, where H is the usua Hadamard operator The order of phases of the protoco is as foows The first step consists of controed-z operators, foowed by a Hadamard step, then a teeportation phase, then another Hadamard phase, foowed by a second teeportation phase Then, the pattern repeats itsef unti teeportation phases have been achieved To simpify the anaysis, and without oss of generaity, we assume is even This set of operations forms a universa set of gates for quantum computation for any m, and any x 2 see for exampe [15]) See Fig 2 for a schematic diagram and Prot 3 for forma presentation of the protoco The correct operation of the protoco depends on the proper definition of the function f j used in Step 3c This function is meant to correct and remove the X errors and the Z obfuscation operators introduced in previous steps Before giving a genera definition of f j, ets first consider a simpified version of the protoco where m = n and the phases of controed-z operators have been subsumed into the diagona operator teeportation phases Hence, the protoco simpifies into a series teeported gate phases foowed by a ayer of Hadamard gates The output of the protoco is then given by ψ o = Z j X j f j D j )H ) 0 n, 7) where the product operator is used to denote that the eft to right ordering is from highest to owest vaue of j Because there is a ayer of Hadamard gates in between every teeportation stage, the Z operator byproducts are turned into X operators, and vice versa, before the the next teeportation Since Aice can ony impement diagona gates using Prot 2, she can ony correct the X byproducts of the previous stage She can, however, conjugate her current gate with the previous Z operators, so as to commute that operator forward, so that it can be corrected in the foowing teeportation stage In this case, f j is given by: f j D) = HZ j 1 HDZ j 2 HX j 1 Z j 1 H, 8) where Z j = X j = I for a j < 1 It is straightforward to verify from the definition above that f j maps D m, onto itsef Now, substituting into Eq 7 we get ψ o = Z X D j H ) 0 n 9) From this state, Aice can get the correct output for computation by having Bob measure in the X basis, and sending her the output After this, she uses her decryption ey

4 4 Protoco 3 Genera Iterated Teeportation Bind Quantum Computation 1 Aice chooses a depth and a set of diagona operations D j = P p=1 D j,p, D j,p D m,x, where P = and n is the number of qubits used in the computation, such that her target computation is given by the measurement of HD HD 1 HCZCZD 2 HD 1 + n in the computationa basis 2 Aice produces the state Z 1 D 1 + n, where Z 1 = m =1 Z r1), where each r 1) is chosen uniformy at random from the set {0,1}, and transmits and this state to Bob, who stores the quantum state in register R 3 For 2 j a) If j 1 mod 2, then Bob appies CZ to register R b) Bob appies H to register R c) For 1 p P i Aice cacuates the operator f j,p D j,p ), where the function f j,p is defined in the main text in Eq 11 ii Aice and Bob engage in Prot 2 using f j,p D j,p ) as Aice s target gate, and Bob s qubits p 1)m through pm as the target register iii Aice eeps a record of the operator X j,p, the teeportation byproduct resuting from Prot 2, and Z j,p her encryption ey d) Aice cacuates the operators X j = X j,p, Z j = Z j,p, 6) p p and eeps a record of them 4 Finay, Bob measures his resuting state in the X basis, and sends the measurement outcomes m 1 m n to Aice Aice computes each output bit for the computation as o = m r, where Z = Z r The anaysis of the fu protoco is sighty more invoved due to the re-)introduction of the CZ gates, since these affect the propagation of X byproducts Fortunatey, errors propagate ony once, to the nearest neighbours before they can be corrected To see this, note that in between every two CZ gate stages, there are two sequences of Hadamard operators foowed by gate teeportations Hence, any error that cannot be fixed in the gate-teeportation phase immediatey preceding the CZ stage, can be corrected in the subsequent phase In order to define the genera correction function f j,p, et x j, and y j, be such that X j = n X x j,, and Z j = =1 n Z z j, 10) =1 For even j we tae χ j, = z j 1, and ζ j, = z j 2, +x j 1, + t { 1,1} z j 3,+t + x j 2,+t ), and for odd j we tae χ j, = z j 1, + t { 1,1} z j 2,+t + x j 1,+t ) and ζ j, = z j 2, + x j 1, Then, finay, for a j and p we define ) ) f j,p D) = X χ j, D Z ζ j, X χ j,, 11) where the tensor products are taen over vaues of ranging from p 1)m + 1 to pm The correctness of the genera protoco foows from a simiar argument to that of the specia case previousy considered The output of the genera protoco is given by ψ o = Z j X j f j,p D j,p ) HCZ j 0 n, 12) p=1 where the product operator is used to denote that the eft to right ordering is from highest to owest vaue of j Substituting Eq 11 into Eq 12, with some eementary agebra, gives ψ o = Z X D j HCZ j) 0 n, 13) as required The proof of bindness of the main protoco foows directy from the proof of bindness of Prot 2 Setting the parameter m equa to n, the above protoco requires that Aice transmit exacty x different n qubit states to Bob, and hence requires ony a tota of nx qubits to be sent from Aice to Bob, and nx cassica bits to be sent from Bob to Aice However, this protoco impements unnown operations, each of which can be drawn arbitrariy from the set D which has cardinaity 2 ) 2n 1) Any scheme to which the no-programming theorem appies, such as that in [11], woud require that at east 2 n 1) qubits or bits be communicated, and hence the protoco presented here is exponentiay more efficient than than previous schemes Setting m equa to n requires Aice to prepare arge entanged states, which may be undesirabe in reaistic settings Setting m to a sma constant, gives a protoco that is at east as easiy impementabe as previous ones in terms of resources needed on Aice s side, whie sti being universa for quantum computation, and offering a communication advantage The approach of iterated teeportation introduced in this comment can be appied to other measurement-based bind computation protocos such as [1], [5] and [9]) to achieve smaer advantages over the no-programming theorem bound It can be used outside of the bind computation setting, to reduce communication requirements in other deegated computation scenarios via Prot 1The notion of bindness used here is compatibe with requirements for composabe security in the abstract cryptography framewor [12], meaning that there is no compromise in security This materia is based on research funded by the Singapore Nationa Research Foundation under NRF Award NRF- NRFF We than Lorenzo Maccone, Tomoyui Morimae and Terry Rudoph for hepfu comments on the manuscript

5 5 Eectronic address: joseph [1] A Broadbent, Fitzsimons, and E Kashefi, Proceedings of the 50th Annua IEEE Symposium on Foundations of Computer Science FOCS 2009) pp ) [2] D Aharonov, M Ben-Or, and E Eban, in Proceedings of Innovations in Computer Science ), p 453 [3] S Barz, E Kashefi, A Broadbent, F Fitzsimons, A Zeiinger, and P Wather, Science 335, ) [4] T Morimae and K Fujii, Nature Communications 3, ) [5] F Fitzsimons and E Kashefi, arxiv preprint arxiv: ) [6] T Morimae, Phys Rev Lett ) [7] T Morimae and K Fujii, Physica Review A 87, ) [8] S Barz, F Fitzsimons, E Kashefi, and P Wather, Nature Physics 2013) [9] A Mantri, C A Pérez-Degado, and F Fitzsimons, Phys Rev Lett 111, ) [10] T Suei, T Koshiba, and T Morimae, Physica Review A ) [11] V Giovannetti, L Maccone, T Morimae, and T G Rudoph, Phys Rev Lett 111, ) [12] V Dunjo, F Fitzsimons, C Portmann, and R Renner, arxiv preprint arxiv: ) [13] M A Niesen and I L Chuang, Phys Rev Lett 79, ) [14] D Gottesman and I L Chuang, Nature 402, ) [15] Fitzsimons, L Xiao, S C Benjamin, and A ones, Phys Rev Lett 99, ) [16] A minor modification of Prot 1 invoves Aice and Bob hating the protoco as soon as Bob measures a zeroes In this case, no further corrections are necessary, and the protoco can concude with the correct output state In the case where 2 m < this eads to an average-case communication cost which is independent of [17] This may aways be done, since Aice can pad her input with unused ancia qubits

Unconditional security of differential phase shift quantum key distribution

Unconditional security of differential phase shift quantum key distribution Unconditiona security of differentia phase shift quantum key distribution Kai Wen, Yoshihisa Yamamoto Ginzton Lab and Dept of Eectrica Engineering Stanford University Basic idea of DPS-QKD Protoco. Aice

More information

Lecture Note 3: Stationary Iterative Methods

Lecture Note 3: Stationary Iterative Methods MATH 5330: Computationa Methods of Linear Agebra Lecture Note 3: Stationary Iterative Methods Xianyi Zeng Department of Mathematica Sciences, UTEP Stationary Iterative Methods The Gaussian eimination (or

More information

arxiv:quant-ph/ v3 6 Jan 1995

arxiv:quant-ph/ v3 6 Jan 1995 arxiv:quant-ph/9501001v3 6 Jan 1995 Critique of proposed imit to space time measurement, based on Wigner s cocks and mirrors L. Diósi and B. Lukács KFKI Research Institute for Partice and Nucear Physics

More information

4 1-D Boundary Value Problems Heat Equation

4 1-D Boundary Value Problems Heat Equation 4 -D Boundary Vaue Probems Heat Equation The main purpose of this chapter is to study boundary vaue probems for the heat equation on a finite rod a x b. u t (x, t = ku xx (x, t, a < x < b, t > u(x, = ϕ(x

More information

Srednicki Chapter 51

Srednicki Chapter 51 Srednici Chapter 51 QFT Probems & Soutions A. George September 7, 13 Srednici 51.1. Derive the fermion-oop correction to the scaar proagator by woring through equation 5., and show that it has an extra

More information

Cryptanalysis of PKP: A New Approach

Cryptanalysis of PKP: A New Approach Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in

More information

XSAT of linear CNF formulas

XSAT of linear CNF formulas XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open

More information

Chemical Kinetics Part 2

Chemical Kinetics Part 2 Integrated Rate Laws Chemica Kinetics Part 2 The rate aw we have discussed thus far is the differentia rate aw. Let us consider the very simpe reaction: a A à products The differentia rate reates the rate

More information

Reliability: Theory & Applications No.3, September 2006

Reliability: Theory & Applications No.3, September 2006 REDUNDANCY AND RENEWAL OF SERVERS IN OPENED QUEUING NETWORKS G. Sh. Tsitsiashvii M.A. Osipova Vadivosto, Russia 1 An opened queuing networ with a redundancy and a renewa of servers is considered. To cacuate

More information

Stat 155 Game theory, Yuval Peres Fall Lectures 4,5,6

Stat 155 Game theory, Yuval Peres Fall Lectures 4,5,6 Stat 155 Game theory, Yuva Peres Fa 2004 Lectures 4,5,6 In the ast ecture, we defined N and P positions for a combinatoria game. We wi now show more formay that each starting position in a combinatoria

More information

A Brief Introduction to Markov Chains and Hidden Markov Models

A Brief Introduction to Markov Chains and Hidden Markov Models A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,

More information

SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS

SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS ISEE 1 SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS By Yingying Fan and Jinchi Lv University of Southern Caifornia This Suppementary Materia

More information

CS229 Lecture notes. Andrew Ng

CS229 Lecture notes. Andrew Ng CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view

More information

Chemical Kinetics Part 2. Chapter 16

Chemical Kinetics Part 2. Chapter 16 Chemica Kinetics Part 2 Chapter 16 Integrated Rate Laws The rate aw we have discussed thus far is the differentia rate aw. Let us consider the very simpe reaction: a A à products The differentia rate reates

More information

Asynchronous Control for Coupled Markov Decision Systems

Asynchronous Control for Coupled Markov Decision Systems INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of

More information

4 Separation of Variables

4 Separation of Variables 4 Separation of Variabes In this chapter we describe a cassica technique for constructing forma soutions to inear boundary vaue probems. The soution of three cassica (paraboic, hyperboic and eiptic) PDE

More information

Recursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines

Recursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines Recursive Constructions of Parae FIFO and LIFO Queues with Switched Deay Lines Po-Kai Huang, Cheng-Shang Chang, Feow, IEEE, Jay Cheng, Member, IEEE, and Duan-Shin Lee, Senior Member, IEEE Abstract One

More information

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with?

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with? Bayesian Learning A powerfu and growing approach in machine earning We use it in our own decision making a the time You hear a which which coud equay be Thanks or Tanks, which woud you go with? Combine

More information

Separation of Variables and a Spherical Shell with Surface Charge

Separation of Variables and a Spherical Shell with Surface Charge Separation of Variabes and a Spherica She with Surface Charge In cass we worked out the eectrostatic potentia due to a spherica she of radius R with a surface charge density σθ = σ cos θ. This cacuation

More information

How the backpropagation algorithm works Srikumar Ramalingam School of Computing University of Utah

How the backpropagation algorithm works Srikumar Ramalingam School of Computing University of Utah How the backpropagation agorithm works Srikumar Ramaingam Schoo of Computing University of Utah Reference Most of the sides are taken from the second chapter of the onine book by Michae Nieson: neuranetworksanddeepearning.com

More information

VI.G Exact free energy of the Square Lattice Ising model

VI.G Exact free energy of the Square Lattice Ising model VI.G Exact free energy of the Square Lattice Ising mode As indicated in eq.(vi.35), the Ising partition function is reated to a sum S, over coections of paths on the attice. The aowed graphs for a square

More information

Limited magnitude error detecting codes over Z q

Limited magnitude error detecting codes over Z q Limited magnitude error detecting codes over Z q Noha Earief choo of Eectrica Engineering and Computer cience Oregon tate University Corvais, OR 97331, UA Emai: earief@eecsorstedu Bea Bose choo of Eectrica

More information

(1 ) = 1 for some 2 (0; 1); (1 + ) = 0 for some > 0:

(1 ) = 1 for some 2 (0; 1); (1 + ) = 0 for some > 0: Answers, na. Economics 4 Fa, 2009. Christiano.. The typica househod can engage in two types of activities producing current output and studying at home. Athough time spent on studying at home sacrices

More information

A UNIVERSAL METRIC FOR THE CANONICAL BUNDLE OF A HOLOMORPHIC FAMILY OF PROJECTIVE ALGEBRAIC MANIFOLDS

A UNIVERSAL METRIC FOR THE CANONICAL BUNDLE OF A HOLOMORPHIC FAMILY OF PROJECTIVE ALGEBRAIC MANIFOLDS A UNIERSAL METRIC FOR THE CANONICAL BUNDLE OF A HOLOMORPHIC FAMILY OF PROJECTIE ALGEBRAIC MANIFOLDS DROR AROLIN Dedicated to M Saah Baouendi on the occasion of his 60th birthday 1 Introduction In his ceebrated

More information

Problem set 6 The Perron Frobenius theorem.

Problem set 6 The Perron Frobenius theorem. Probem set 6 The Perron Frobenius theorem. Math 22a4 Oct 2 204, Due Oct.28 In a future probem set I want to discuss some criteria which aow us to concude that that the ground state of a sef-adjoint operator

More information

Rate-Distortion Theory of Finite Point Processes

Rate-Distortion Theory of Finite Point Processes Rate-Distortion Theory of Finite Point Processes Günther Koiander, Dominic Schuhmacher, and Franz Hawatsch, Feow, IEEE Abstract We study the compression of data in the case where the usefu information

More information

Physics 127c: Statistical Mechanics. Fermi Liquid Theory: Collective Modes. Boltzmann Equation. The quasiparticle energy including interactions

Physics 127c: Statistical Mechanics. Fermi Liquid Theory: Collective Modes. Boltzmann Equation. The quasiparticle energy including interactions Physics 27c: Statistica Mechanics Fermi Liquid Theory: Coective Modes Botzmann Equation The quasipartice energy incuding interactions ε p,σ = ε p + f(p, p ; σ, σ )δn p,σ, () p,σ with ε p ε F + v F (p p

More information

Generalized Bell polynomials and the combinatorics of Poisson central moments

Generalized Bell polynomials and the combinatorics of Poisson central moments Generaized Be poynomias and the combinatorics of Poisson centra moments Nicoas Privaut Division of Mathematica Sciences Schoo of Physica and Mathematica Sciences Nanyang Technoogica University SPMS-MAS-05-43,

More information

Math 1600 Lecture 5, Section 2, 15 Sep 2014

Math 1600 Lecture 5, Section 2, 15 Sep 2014 1 of 6 Math 1600 Lecture 5, Section 2, 15 Sep 2014 Announcements: Continue reading Section 1.3 and aso the Exporation on cross products for next cass. Work through recommended homework questions. Quiz

More information

Gauss Law. 2. Gauss s Law: connects charge and field 3. Applications of Gauss s Law

Gauss Law. 2. Gauss s Law: connects charge and field 3. Applications of Gauss s Law Gauss Law 1. Review on 1) Couomb s Law (charge and force) 2) Eectric Fied (fied and force) 2. Gauss s Law: connects charge and fied 3. Appications of Gauss s Law Couomb s Law and Eectric Fied Couomb s

More information

Stochastic Variational Inference with Gradient Linearization

Stochastic Variational Inference with Gradient Linearization Stochastic Variationa Inference with Gradient Linearization Suppementa Materia Tobias Pötz * Anne S Wannenwetsch Stefan Roth Department of Computer Science, TU Darmstadt Preface In this suppementa materia,

More information

On generalized quantum Turing machine and its language classes

On generalized quantum Turing machine and its language classes Proceedings of the 11th WSEAS Internationa onference on APPLIED MATHEMATIS, Daas, Texas, USA, March -4, 007 51 On generaized quantum Turing machine and its anguage casses SATOSHI IRIYAMA Toyo University

More information

A Solution to the 4-bit Parity Problem with a Single Quaternary Neuron

A Solution to the 4-bit Parity Problem with a Single Quaternary Neuron Neura Information Processing - Letters and Reviews Vo. 5, No. 2, November 2004 LETTER A Soution to the 4-bit Parity Probem with a Singe Quaternary Neuron Tohru Nitta Nationa Institute of Advanced Industria

More information

SEMINAR 2. PENDULUMS. V = mgl cos θ. (2) L = T V = 1 2 ml2 θ2 + mgl cos θ, (3) d dt ml2 θ2 + mgl sin θ = 0, (4) θ + g l

SEMINAR 2. PENDULUMS. V = mgl cos θ. (2) L = T V = 1 2 ml2 θ2 + mgl cos θ, (3) d dt ml2 θ2 + mgl sin θ = 0, (4) θ + g l Probem 7. Simpe Penduum SEMINAR. PENDULUMS A simpe penduum means a mass m suspended by a string weightess rigid rod of ength so that it can swing in a pane. The y-axis is directed down, x-axis is directed

More information

FOURIER SERIES ON ANY INTERVAL

FOURIER SERIES ON ANY INTERVAL FOURIER SERIES ON ANY INTERVAL Overview We have spent considerabe time earning how to compute Fourier series for functions that have a period of 2p on the interva (-p,p). We have aso seen how Fourier series

More information

MODELING OF A THREE-PHASE APPLICATION OF A MAGNETIC AMPLIFIER

MODELING OF A THREE-PHASE APPLICATION OF A MAGNETIC AMPLIFIER TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES MODELING OF A THREE-PHASE APPLICATION OF A MAGNETIC AMPLIFIER L. Austrin*, G. Engdah** * Saab AB, Aerosystems, S-81 88 Linköping, Sweden, ** Roya

More information

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES Separation of variabes is a method to sove certain PDEs which have a warped product structure. First, on R n, a inear PDE of order m is

More information

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes A Fundamenta Storage-Communication Tradeoff in Distributed Computing with Stragging odes ifa Yan, Michèe Wigger LTCI, Téécom ParisTech 75013 Paris, France Emai: {qifa.yan, michee.wigger} @teecom-paristech.fr

More information

Width of Percolation Transition in Complex Networks

Width of Percolation Transition in Complex Networks APS/23-QED Width of Percoation Transition in Compex Networs Tomer Kaisy, and Reuven Cohen 2 Minerva Center and Department of Physics, Bar-Ian University, 52900 Ramat-Gan, Israe 2 Department of Computer

More information

arxiv:math/ v2 [math.pr] 6 Mar 2005

arxiv:math/ v2 [math.pr] 6 Mar 2005 ASYMPTOTIC BEHAVIOR OF RANDOM HEAPS arxiv:math/0407286v2 [math.pr] 6 Mar 2005 J. BEN HOUGH Abstract. We consider a random wa W n on the ocay free group or equivaenty a signed random heap) with m generators

More information

THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE

THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE KATIE L. MAY AND MELISSA A. MITCHELL Abstract. We show how to identify the minima path network connecting three fixed points on

More information

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Brandon Maone Department of Computer Science University of Hesini February 18, 2014 Abstract This document derives, in excrutiating

More information

SydU STAT3014 (2015) Second semester Dr. J. Chan 18

SydU STAT3014 (2015) Second semester Dr. J. Chan 18 STAT3014/3914 Appied Stat.-Samping C-Stratified rand. sampe Stratified Random Samping.1 Introduction Description The popuation of size N is divided into mutuay excusive and exhaustive subpopuations caed

More information

Combining reaction kinetics to the multi-phase Gibbs energy calculation

Combining reaction kinetics to the multi-phase Gibbs energy calculation 7 th European Symposium on Computer Aided Process Engineering ESCAPE7 V. Pesu and P.S. Agachi (Editors) 2007 Esevier B.V. A rights reserved. Combining reaction inetics to the muti-phase Gibbs energy cacuation

More information

8 Digifl'.11 Cth:uits and devices

8 Digifl'.11 Cth:uits and devices 8 Digif'. Cth:uits and devices 8. Introduction In anaog eectronics, votage is a continuous variabe. This is usefu because most physica quantities we encounter are continuous: sound eves, ight intensity,

More information

Section 6: Magnetostatics

Section 6: Magnetostatics agnetic fieds in matter Section 6: agnetostatics In the previous sections we assumed that the current density J is a known function of coordinates. In the presence of matter this is not aways true. The

More information

Coupling of LWR and phase transition models at boundary

Coupling of LWR and phase transition models at boundary Couping of LW and phase transition modes at boundary Mauro Garaveo Dipartimento di Matematica e Appicazioni, Università di Miano Bicocca, via. Cozzi 53, 20125 Miano Itay. Benedetto Piccoi Department of

More information

Universal Blind Quantum Computing

Universal Blind Quantum Computing Universal Blind Quantum Computing Elham Kashefi Laboratoire d Informatique de Grenoble Joint work with Anne Broadbent Montreal Joe Fitzsimons Oxford Classical Blind Computing Fundamentally asymmetric unlike

More information

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University

More information

NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS

NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS TONY ALLEN, EMILY GEBHARDT, AND ADAM KLUBALL 3 ADVISOR: DR. TIFFANY KOLBA 4 Abstract. The phenomenon of noise-induced stabiization occurs

More information

Algorithms to solve massively under-defined systems of multivariate quadratic equations

Algorithms to solve massively under-defined systems of multivariate quadratic equations Agorithms to sove massivey under-defined systems of mutivariate quadratic equations Yasufumi Hashimoto Abstract It is we known that the probem to sove a set of randomy chosen mutivariate quadratic equations

More information

THINKING IN PYRAMIDS

THINKING IN PYRAMIDS ECS 178 Course Notes THINKING IN PYRAMIDS Kenneth I. Joy Institute for Data Anaysis and Visuaization Department of Computer Science University of Caifornia, Davis Overview It is frequenty usefu to think

More information

Learning Fully Observed Undirected Graphical Models

Learning Fully Observed Undirected Graphical Models Learning Fuy Observed Undirected Graphica Modes Sides Credit: Matt Gormey (2016) Kayhan Batmangheich 1 Machine Learning The data inspires the structures we want to predict Inference finds {best structure,

More information

Theory and implementation behind: Universal surface creation - smallest unitcell

Theory and implementation behind: Universal surface creation - smallest unitcell Teory and impementation beind: Universa surface creation - smaest unitce Bjare Brin Buus, Jaob Howat & Tomas Bigaard September 15, 218 1 Construction of surface sabs Te aim for tis part of te project is

More information

Partial permutation decoding for MacDonald codes

Partial permutation decoding for MacDonald codes Partia permutation decoding for MacDonad codes J.D. Key Department of Mathematics and Appied Mathematics University of the Western Cape 7535 Bevie, South Africa P. Seneviratne Department of Mathematics

More information

FFTs in Graphics and Vision. Spherical Convolution and Axial Symmetry Detection

FFTs in Graphics and Vision. Spherical Convolution and Axial Symmetry Detection FFTs in Graphics and Vision Spherica Convoution and Axia Symmetry Detection Outine Math Review Symmetry Genera Convoution Spherica Convoution Axia Symmetry Detection Math Review Symmetry: Given a unitary

More information

Reichenbachian Common Cause Systems

Reichenbachian Common Cause Systems Reichenbachian Common Cause Systems G. Hofer-Szabó Department of Phiosophy Technica University of Budapest e-mai: gszabo@hps.ete.hu Mikós Rédei Department of History and Phiosophy of Science Eötvös University,

More information

The Group Structure on a Smooth Tropical Cubic

The Group Structure on a Smooth Tropical Cubic The Group Structure on a Smooth Tropica Cubic Ethan Lake Apri 20, 2015 Abstract Just as in in cassica agebraic geometry, it is possibe to define a group aw on a smooth tropica cubic curve. In this note,

More information

arxiv: v1 [quant-ph] 23 Mar 2012

arxiv: v1 [quant-ph] 23 Mar 2012 Unconditionally verifiable blind computation Joseph F. Fitzsimons 1 and Elham Kashefi 2 arxiv:1203.5217v1 [quant-ph] 23 Mar 2012 1 Centre for Quantum Technologies, National University of Singapore, 3 Science

More information

Coded Caching for Files with Distinct File Sizes

Coded Caching for Files with Distinct File Sizes Coded Caching for Fies with Distinct Fie Sizes Jinbei Zhang iaojun Lin Chih-Chun Wang inbing Wang Department of Eectronic Engineering Shanghai Jiao ong University China Schoo of Eectrica and Computer Engineering

More information

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA ON THE SYMMETRY OF THE POWER INE CHANNE T.C. Banwe, S. Gai {bct, sgai}@research.tecordia.com Tecordia Technoogies, Inc., 445 South Street, Morristown, NJ 07960, USA Abstract The indoor power ine network

More information

Mat 1501 lecture notes, penultimate installment

Mat 1501 lecture notes, penultimate installment Mat 1501 ecture notes, penutimate instament 1. bounded variation: functions of a singe variabe optiona) I beieve that we wi not actuay use the materia in this section the point is mainy to motivate the

More information

STA 216 Project: Spline Approach to Discrete Survival Analysis

STA 216 Project: Spline Approach to Discrete Survival Analysis : Spine Approach to Discrete Surviva Anaysis November 4, 005 1 Introduction Athough continuous surviva anaysis differs much from the discrete surviva anaysis, there is certain ink between the two modeing

More information

Determining The Degree of Generalization Using An Incremental Learning Algorithm

Determining The Degree of Generalization Using An Incremental Learning Algorithm Determining The Degree of Generaization Using An Incrementa Learning Agorithm Pabo Zegers Facutad de Ingeniería, Universidad de os Andes San Caros de Apoquindo 22, Las Condes, Santiago, Chie pzegers@uandes.c

More information

On colorings of the Boolean lattice avoiding a rainbow copy of a poset arxiv: v1 [math.co] 21 Dec 2018

On colorings of the Boolean lattice avoiding a rainbow copy of a poset arxiv: v1 [math.co] 21 Dec 2018 On coorings of the Booean attice avoiding a rainbow copy of a poset arxiv:1812.09058v1 [math.co] 21 Dec 2018 Baázs Patkós Afréd Rényi Institute of Mathematics, Hungarian Academy of Scinces H-1053, Budapest,

More information

12.2. Maxima and Minima. Introduction. Prerequisites. Learning Outcomes

12.2. Maxima and Minima. Introduction. Prerequisites. Learning Outcomes Maima and Minima 1. Introduction In this Section we anayse curves in the oca neighbourhood of a stationary point and, from this anaysis, deduce necessary conditions satisfied by oca maima and oca minima.

More information

Haar Decomposition and Reconstruction Algorithms

Haar Decomposition and Reconstruction Algorithms Jim Lambers MAT 773 Fa Semester 018-19 Lecture 15 and 16 Notes These notes correspond to Sections 4.3 and 4.4 in the text. Haar Decomposition and Reconstruction Agorithms Decomposition Suppose we approximate

More information

MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES

MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES ANDRZEJ DUDEK AND ANDRZEJ RUCIŃSKI Abstract. For positive integers k and, a k-uniform hypergraph is caed a oose path of ength, and denoted by

More information

Efficient Generation of Random Bits from Finite State Markov Chains

Efficient Generation of Random Bits from Finite State Markov Chains Efficient Generation of Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

Joel Broida UCSD Fall 2009 Phys 130B QM II. Homework Set 2 DO ALL WORK BY HAND IN OTHER WORDS, DON T USE MATHEMAT- ICA OR ANY CALCULATORS.

Joel Broida UCSD Fall 2009 Phys 130B QM II. Homework Set 2 DO ALL WORK BY HAND IN OTHER WORDS, DON T USE MATHEMAT- ICA OR ANY CALCULATORS. Joe Broida UCSD Fa 009 Phys 30B QM II Homework Set DO ALL WORK BY HAND IN OTHER WORDS, DON T USE MATHEMAT- ICA OR ANY CALCULATORS. You may need to use one or more of these: Y 0 0 = 4π Y 0 = 3 4π cos Y

More information

Some Measures for Asymmetry of Distributions

Some Measures for Asymmetry of Distributions Some Measures for Asymmetry of Distributions Georgi N. Boshnakov First version: 31 January 2006 Research Report No. 5, 2006, Probabiity and Statistics Group Schoo of Mathematics, The University of Manchester

More information

Asymptotic Properties of a Generalized Cross Entropy Optimization Algorithm

Asymptotic Properties of a Generalized Cross Entropy Optimization Algorithm 1 Asymptotic Properties of a Generaized Cross Entropy Optimization Agorithm Zijun Wu, Michae Koonko, Institute for Appied Stochastics and Operations Research, Caustha Technica University Abstract The discrete

More information

arxiv: v1 [math.co] 17 Dec 2018

arxiv: v1 [math.co] 17 Dec 2018 On the Extrema Maximum Agreement Subtree Probem arxiv:1812.06951v1 [math.o] 17 Dec 2018 Aexey Markin Department of omputer Science, Iowa State University, USA amarkin@iastate.edu Abstract Given two phyogenetic

More information

Integrating Factor Methods as Exponential Integrators

Integrating Factor Methods as Exponential Integrators Integrating Factor Methods as Exponentia Integrators Borisav V. Minchev Department of Mathematica Science, NTNU, 7491 Trondheim, Norway Borko.Minchev@ii.uib.no Abstract. Recenty a ot of effort has been

More information

Smoothness equivalence properties of univariate subdivision schemes and their projection analogues

Smoothness equivalence properties of univariate subdivision schemes and their projection analogues Numerische Mathematik manuscript No. (wi be inserted by the editor) Smoothness equivaence properties of univariate subdivision schemes and their projection anaogues Phiipp Grohs TU Graz Institute of Geometry

More information

Do Schools Matter for High Math Achievement? Evidence from the American Mathematics Competitions Glenn Ellison and Ashley Swanson Online Appendix

Do Schools Matter for High Math Achievement? Evidence from the American Mathematics Competitions Glenn Ellison and Ashley Swanson Online Appendix VOL. NO. DO SCHOOLS MATTER FOR HIGH MATH ACHIEVEMENT? 43 Do Schoos Matter for High Math Achievement? Evidence from the American Mathematics Competitions Genn Eison and Ashey Swanson Onine Appendix Appendix

More information

On Integrals Involving Universal Associated Legendre Polynomials and Powers of the Factor (1 x 2 ) and Their Byproducts

On Integrals Involving Universal Associated Legendre Polynomials and Powers of the Factor (1 x 2 ) and Their Byproducts Commun. Theor. Phys. 66 (216) 369 373 Vo. 66, No. 4, October 1, 216 On Integras Invoving Universa Associated Legendre Poynomias and Powers of the Factor (1 x 2 ) and Their Byproducts Dong-Sheng Sun ( 孙东升

More information

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel Sequentia Decoding of Poar Codes with Arbitrary Binary Kerne Vera Miosavskaya, Peter Trifonov Saint-Petersburg State Poytechnic University Emai: veram,petert}@dcn.icc.spbstu.ru Abstract The probem of efficient

More information

Notes on Backpropagation with Cross Entropy

Notes on Backpropagation with Cross Entropy Notes on Backpropagation with Cross Entropy I-Ta ee, Dan Gowasser, Bruno Ribeiro Purue University October 3, 07. Overview This note introuces backpropagation for a common neura network muti-cass cassifier.

More information

Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rules 1

Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rules 1 Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rues 1 R.J. Marks II, S. Oh, P. Arabshahi Λ, T.P. Caude, J.J. Choi, B.G. Song Λ Λ Dept. of Eectrica Engineering Boeing Computer Services University

More information

(f) is called a nearly holomorphic modular form of weight k + 2r as in [5].

(f) is called a nearly holomorphic modular form of weight k + 2r as in [5]. PRODUCTS OF NEARLY HOLOMORPHIC EIGENFORMS JEFFREY BEYERL, KEVIN JAMES, CATHERINE TRENTACOSTE, AND HUI XUE Abstract. We prove that the product of two neary hoomorphic Hece eigenforms is again a Hece eigenform

More information

A unified framework for design and analysis of networked and quantized control systems

A unified framework for design and analysis of networked and quantized control systems 1 A unified framework for design and anaysis of networked and quantized contro systems Dragan ešić and Danie Liberzon Abstract We generaize and unify a range of recent resuts in quantized contro systems

More information

Nuclear Size and Density

Nuclear Size and Density Nucear Size and Density How does the imited range of the nucear force affect the size and density of the nucei? Assume a Vecro ba mode, each having radius r, voume V = 4/3π r 3. Then the voume of the entire

More information

17 Lecture 17: Recombination and Dark Matter Production

17 Lecture 17: Recombination and Dark Matter Production PYS 652: Astrophysics 88 17 Lecture 17: Recombination and Dark Matter Production New ideas pass through three periods: It can t be done. It probaby can be done, but it s not worth doing. I knew it was

More information

AALBORG UNIVERSITY. The distribution of communication cost for a mobile service scenario. Jesper Møller and Man Lung Yiu. R June 2009

AALBORG UNIVERSITY. The distribution of communication cost for a mobile service scenario. Jesper Møller and Man Lung Yiu. R June 2009 AALBORG UNIVERSITY The distribution of communication cost for a mobie service scenario by Jesper Møer and Man Lung Yiu R-29-11 June 29 Department of Mathematica Sciences Aaborg University Fredrik Bajers

More information

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After

More information

A. Distribution of the test statistic

A. Distribution of the test statistic A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch

More information

A proposed nonparametric mixture density estimation using B-spline functions

A proposed nonparametric mixture density estimation using B-spline functions A proposed nonparametric mixture density estimation using B-spine functions Atizez Hadrich a,b, Mourad Zribi a, Afif Masmoudi b a Laboratoire d Informatique Signa et Image de a Côte d Opae (LISIC-EA 4491),

More information

Centralized Coded Caching of Correlated Contents

Centralized Coded Caching of Correlated Contents Centraized Coded Caching of Correated Contents Qianqian Yang and Deniz Gündüz Information Processing and Communications Lab Department of Eectrica and Eectronic Engineering Imperia Coege London arxiv:1711.03798v1

More information

Pattern Frequency Sequences and Internal Zeros

Pattern Frequency Sequences and Internal Zeros Advances in Appied Mathematics 28, 395 420 (2002 doi:10.1006/aama.2001.0789, avaiabe onine at http://www.ideaibrary.com on Pattern Frequency Sequences and Interna Zeros Mikós Bóna Department of Mathematics,

More information

Explicit overall risk minimization transductive bound

Explicit overall risk minimization transductive bound 1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,

More information

PHYS 110B - HW #1 Fall 2005, Solutions by David Pace Equations referenced as Eq. # are from Griffiths Problem statements are paraphrased

PHYS 110B - HW #1 Fall 2005, Solutions by David Pace Equations referenced as Eq. # are from Griffiths Problem statements are paraphrased PHYS 110B - HW #1 Fa 2005, Soutions by David Pace Equations referenced as Eq. # are from Griffiths Probem statements are paraphrased [1.] Probem 6.8 from Griffiths A ong cyinder has radius R and a magnetization

More information

NIKOS FRANTZIKINAKIS. N n N where (Φ N) N N is any Følner sequence

NIKOS FRANTZIKINAKIS. N n N where (Φ N) N N is any Følner sequence SOME OPE PROBLEMS O MULTIPLE ERGODIC AVERAGES IKOS FRATZIKIAKIS. Probems reated to poynomia sequences In this section we give a ist of probems reated to the study of mutipe ergodic averages invoving iterates

More information

Efficiently Generating Random Bits from Finite State Markov Chains

Efficiently Generating Random Bits from Finite State Markov Chains 1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

$, (2.1) n="# #. (2.2)

$, (2.1) n=# #. (2.2) Chapter. Eectrostatic II Notes: Most of the materia presented in this chapter is taken from Jackson, Chap.,, and 4, and Di Bartoo, Chap... Mathematica Considerations.. The Fourier series and the Fourier

More information

Optimal Control of Assembly Systems with Multiple Stages and Multiple Demand Classes 1

Optimal Control of Assembly Systems with Multiple Stages and Multiple Demand Classes 1 Optima Contro of Assemby Systems with Mutipe Stages and Mutipe Demand Casses Saif Benjaafar Mohsen EHafsi 2 Chung-Yee Lee 3 Weihua Zhou 3 Industria & Systems Engineering, Department of Mechanica Engineering,

More information

Automobile Prices in Market Equilibrium. Berry, Pakes and Levinsohn

Automobile Prices in Market Equilibrium. Berry, Pakes and Levinsohn Automobie Prices in Market Equiibrium Berry, Pakes and Levinsohn Empirica Anaysis of demand and suppy in a differentiated products market: equiibrium in the U.S. automobie market. Oigopoistic Differentiated

More information

14 Separation of Variables Method

14 Separation of Variables Method 14 Separation of Variabes Method Consider, for exampe, the Dirichet probem u t = Du xx < x u(x, ) = f(x) < x < u(, t) = = u(, t) t > Let u(x, t) = T (t)φ(x); now substitute into the equation: dt

More information

Heavy-traffic Delay Optimality in Pull-based Load Balancing Systems: Necessary and Sufficient Conditions

Heavy-traffic Delay Optimality in Pull-based Load Balancing Systems: Necessary and Sufficient Conditions Heavy-traffic Deay Optimaity in Pu-based Load Baancing Systems: Necessary and Sufficient Conditions XINGYU ZHOU, The Ohio State University JIAN TAN, The Ohio State University NSS SHROFF, The Ohio State

More information

arxiv: v1 [math.fa] 23 Aug 2018

arxiv: v1 [math.fa] 23 Aug 2018 An Exact Upper Bound on the L p Lebesgue Constant and The -Rényi Entropy Power Inequaity for Integer Vaued Random Variabes arxiv:808.0773v [math.fa] 3 Aug 08 Peng Xu, Mokshay Madiman, James Mebourne Abstract

More information