Quantum Network Coding
|
|
|
- Scarlett Roxanne Beasley
- 9 years ago
- Views:
Transcription
1 Salah A. Aly Department of Computer Science Texas A& M University Quantum Computing Seminar April 26, 2006
2 Network coding example In this butterfly network, there is a source S 1 and two receivers R 1 and R 2. The goal is to send X and Y from S 1 to both R 1 and R 2 simultaneously. The idea of network coding is that instead of routing the messages X and Y at node N 3, we rather encode and send them in one message.
3 Network coding example The receiver R 1 is able to decode the message X Y. There is a bottleneck edge (N 3, N 4 ). With traditional routing, we cannot achieve max capacity because of that edge, but with network coding, we can achieve the max capacity.
4 Why network coding Network coding rate (NCR) can be much larger than flow rate (FR) in some networks: i.e Butterfly and Wheatstone networks: NCR is 1 and FR is 1/2. Even we can do better in some networks 1/n FR to n NCR. With network coding, the max capacity can be achieved as the field size is bounded by certain value. Network coding offers robustness and adaptability for the network.
5 From classical to quantum networks Can we increase the throughput of a quantum network using network coding? Consider the butterfly quantum network. The goal is to send ψ 1 from s 1 to both t 1 and t 2, (similarly, send ψ 2 from s 2 to both t 1 and t 2 ). Exact transmission is impossible because Qubits are continuous information.
6 Quantum network coding So, we can not do quantum network coding without errors. The problem can not be the same as classical network due to nature of quantum information: No cloning principle Quantum information is continuous
7 Quantum network coding The main result in this paper is that quantum network coding is possible if approximation is allowed. It is natural to study approximate or probabilistic methods to deal with qubits. We will find a way to deal with no cloning principle, so we can copy the information locally. Theorem (Main Result) There exists a quantum protocol whose fidelities at nodes t 1 and t 2 are 1/ /19863 and 1/ /19863, respectively.
8 Definition ( Trace Distance ) Given two quantum states ρ and σ, the trace distance is defined as D(ρ, σ) = 1 2 i ρ i σ i. The trace distance can also be computed between density operators. If ρ = i r i i i and σ = i s i i i, Then D(ρ, σ) = 1 2 Tr i (r i s i ) i i. Example: ρ = and σ = D(ρ, σ) = 1 Tr (3/4 2/3) (1/4 1/3) = 1/2(1/12 + 1/12) = 1/12
9 Definition ( Fidelity ) Given two quantum states ρ and σ, the fidelity is defined as F(ρ, σ) = Tr( ρ 1/2 σρ 1/2 ). For mixed states, the trace distance is a function of the fidelity as D(ρ, σ) 1 F( ρ, σ ) 2 and the inequality holds for pure quantum states.
10 We measure the quality of data at node t 1 by the fidelity between the original state ψ 1 at s 1 and the output state ρ at t 1, (similarly between t 2 and s 2 ). Our goal is to achieve a fidelity strictly > 1/2. For coherent states, the classical teleportation limit is F = 0.5, light polarization states F = If we consider a mixed state, then the fidelity is 1/2. Quantum Teleportation has fidelity F = 1 theoretically perfect.
11 In order to show this Theorem, we can not directly copy qubits at s 1 and s 2, also we can not directly encode at s 0. Rather, we need some building blocks to deal with qubits (i.e XQQ protocol) (UC), 3D Measurement (MM 3 ), Approximated Group Operation (AG), 3D Bell Measurement (BM)
12 XQQ protocol
13 XQQ protocol description So, the goal is to send quantum information (states) via quantum channel and achieve a fidelity greater than 1/2. Universal cloning at node s 1 to get (Q 1, Q 2 ) = UC( ψ 1 ), also UC at s 2 to get (Q 3, Q 4 ) = UC( ψ 2 ). then make teleportation to Q 1, Q 2, Q 3, Q 4. At node s 0, apply 3DMM to Q 3 to obtain 3 classical bits r 1 r 2 r 3. Then choose one value of the group AG that has 8 elements (i.e. I,X,Y,Z, Inv, Inv X, Inv Y, Inv Z). At node t 1, apply the reverse operations of these 8 operation to decode the received q. state. At node t 2, recover the 3 bits r 1 r 2 r 3 as a key by comparing Q 1 and Q 6.
14 XQQ Protocol Overview XQQ Protocol steps. Input Q.States ψ 1 at s 1 and ψ 2 > at s 2 ; Output Q. States ρ 1 out at t 1 and ρ 2 out at t 2. Step 1. Apply universal cloning at the sources, (Q 1, Q 2 ) = UC( ψ 1 ) at S 1, and (Q 3, Q 4 ) = UC( ψ 2 >) at s 2. Step 2. Q 5 = AG(Q 2, MM 3 (Q 3 )) at s 0. Step 3. (Q 6, Q 7 ) = UC(Q 5 ) at t 0. Step 4. Finally decoding at nodes t 1 and t 2. ρ 1 out = AG(Q 7, MM 3 (Q 4 )), and ρ 2 out = BM(Q 1, Q 6 ).
15 (UC) Recall the approximated cloning by Buzek and Hillery known as universal (1,2) cloning (C (2) ). Let ψ = 1 2 ( 01 > + 10 >), Using trace-preserving completely positive map (TP-CP), C 2 ( 0 0 ) = ψ ψ, 2 C 2 ( 0 1 ) = 3 ψ ψ, C 2 ( 1 0 ) = ψ ψ 00, C 2 ( 1 1 ) = ψ ψ Now, let ρ 1 = Tr 2 C (2) ( ψ ) and ρ 2 = Tr 1 C (2) ( ψ ), then ρ 1 = ρ 2 = 2 3 ψ ψ I/2 that gives us F( ψ, ρ 1 ) = F( ψ, ρ 2 ) = 5/6 (UC) can be used instead of Universal (1,2) cloning.
16 Encoding and Decoding Operations Approximated ( ) Group Operation ( (AG):) Given a mixed state u1 v ρ = 1 v2 v, Invρ = 1 Now, we form the u 2 v 2 u 2 u 1 abelian group AG, as {I,X,Y,Z,Inv,Inv X, Inv Y, Inv Z}. The approximated group AG is a transformation to encode the quantum state ρ given by T 000 (ρ) = ρ, T 011 (ρ) = Zρ, T 101 (ρ) = Xρ, T 110 (ρ) = Yρ, T 111 (ρ) = Invρ, T 001 (ρ) = InvT 110 (ρ), T 010 (ρ) = InvT 101 (ρ), T 100 (ρ) = InvT 011 (ρ). At node t 1, apply the reverse operations of these 8 operations to decode the received quantum state. At node t 2, recover the 3 bits r 1 r 2 r 3 as a key by comparing Q 1 and Q 6.
17 XQQ protocol
18 Computing Fidelity F( ψ 1, ρ 1 out) 1 1 Let ρ be a quantum state, a map C is called p-shrinking, if C transforms ρ to p.ρ + (1 p) I 2 for some probability p. 2 The idea is to discretize one of the two quantum states into one classical bits, then encode the other quantum state. 3 Let ρ 2 = ψ 2 ψ 2, then compute the maps. C 1 : ψ 1 Q 2, C 2 [ρ 2 ] : Q 2 Q 5 C 3 : Q 5 Q 7, C 4 [ρ 2 ] : Q 7 ρ 1 out. 4 The universal copy is 2/3-shrinking. 5 If C is a p-shrinking and C is a p -shrinking, then C C is a pp -shrinking. 6 C 4 [ρ 2 ] C 2 [ρ 2 ] is a shrinking.
19 Computing Fidelity F( ψ 1, ρ 1 out) (cont.) 7 If C is a p-shrinking, F(ρ, C(ρ)) 1/2 + p/2 for any state ρ. 8 The final result is given by C s1 t 1 = C 4 [ρ 2 ] C 3 C 2 [ρ 2 ] C 1, and its Fidelity shown in this Lemma. 9 The total probability of C s1 t 1 is (2/3)(2/3)(100/2187) = Lemma (F( ψ 1, ρ 1 out)) There exists a quantum protocol whose fidelity between s 1 and t 1 is 1/ / For any ψ 1, F( ψ 1, C s1 t 1 ( ψ 1 )) 1/ /19683.
20 Computing Fidelity F( ψ 2, ρ 2 out) Similar to the previous computations. Lemma (F( ψ 2, ρ 2 out)) There exists a quantum protocol whose fidelity between s 2 and t 2 is 1/ /19683.
21 and Discussion of the Results on this paper: We can send any quantum state ψ 1 from s 1 to t 1. and ψ 2 from s 2 to t 2 with fidelity strictly greater than 1/2. If one of ψ 1 and ψ 2 is classical then the fidelity can be improved to 2/3. Similarly, improvements is also possible if ψ 1 and ψ 2 are restricted to only a finite number of states. Theorem (Main Result) There exists a quantum protocol whose fidelities at nodes t 1 and t 2 are 1/ /19863 and 1/ /19863, respectively.
22 and Discussion Is that the right approach to do quantum network coding? In this protocol, one of the two quantum states has to be measured, i.e. destroying value of the state. Which one to measure and which one to send exactly? What kind of application to use approximated quantum network coding?
23 and Discussion Open questions and discussion: Finding upper bounds on the Fidelity rather than 1. Comparing classical and quantum network coding. i.e sending classical and quantum information in the same network and measure the performance. Applying quantum network coding to different network topology. These are just natural questions arising from the paper of Hayashi, et. al. Some other questions arise: We can do Quantum-assisted network coding by sending classical information over quantum channels. We can study if this gives us a better results than we can do classically.
24 and Discussion Questions...
Techniques algébriques en calcul quantique
Techniques algébriques en calcul quantique E. Jeandel Laboratoire de l Informatique du Parallélisme LIP, ENS Lyon, CNRS, INRIA, UCB Lyon 8 Avril 25 E. Jeandel, LIP, ENS Lyon Techniques algébriques en calcul
0.1 Phase Estimation Technique
Phase Estimation In this lecture we will describe Kitaev s phase estimation algorithm, and use it to obtain an alternate derivation of a quantum factoring algorithm We will also use this technique to design
arxiv:quant-ph/9607009v1 11 Jul 1996
Distillability of Inseparable Quantum Systems Micha l Horodecki Department of Mathematics and Physics University of Gdańsk, 80 952 Gdańsk, Poland arxiv:quant-ph/9607009v1 11 Jul 1996 Pawe l Horodecki Faculty
A Probabilistic Quantum Key Transfer Protocol
A Probabilistic Quantum Key Transfer Protocol Abhishek Parakh Nebraska University Center for Information Assurance University of Nebraska at Omaha Omaha, NE 6818 Email: [email protected] August 9, 01
Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)
Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...
4. Continuous Random Variables, the Pareto and Normal Distributions
4. Continuous Random Variables, the Pareto and Normal Distributions A continuous random variable X can take any value in a given range (e.g. height, weight, age). The distribution of a continuous random
COMBINATIONAL CIRCUITS
COMBINATIONAL CIRCUITS http://www.tutorialspoint.com/computer_logical_organization/combinational_circuits.htm Copyright tutorialspoint.com Combinational circuit is a circuit in which we combine the different
Using Adversary Structures to Analyze Network Models,
MTAT.07.007 Graduate seminar in cryptography Using Adversary Structures to Analyze Network Models University of Tartu [email protected] 1 Outline of the talk Problems in distributed systems Adversary Structure
Digital Modulation. David Tipper. Department of Information Science and Telecommunications University of Pittsburgh. Typical Communication System
Digital Modulation David Tipper Associate Professor Department of Information Science and Telecommunications University of Pittsburgh http://www.tele.pitt.edu/tipper.html Typical Communication System Source
Introduction to Quantum Computing
Introduction to Quantum Computing Javier Enciso [email protected] Joint Advanced Student School 009 Technische Universität München April, 009 Abstract In this paper, a gentle introduction to Quantum Computing
Triangle deletion. Ernie Croot. February 3, 2010
Triangle deletion Ernie Croot February 3, 2010 1 Introduction The purpose of this note is to give an intuitive outline of the triangle deletion theorem of Ruzsa and Szemerédi, which says that if G = (V,
Codes for Network Switches
Codes for Network Switches Zhiying Wang, Omer Shaked, Yuval Cassuto, and Jehoshua Bruck Electrical Engineering Department, California Institute of Technology, Pasadena, CA 91125, USA Electrical Engineering
On Quantum Hamming Bound
On Quantum Hamming Bound Salah A. Aly Department of Computer Science, Texas A&M University, College Station, TX 77843-3112, USA Email: [email protected] We prove quantum Hamming bound for stabilizer codes
LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
Quantum Computing Architectures
Quantum Computing Architectures 1:-2: Fred Chong (UCD) - Intro, quantum algorithms, and error correction 2:-2:3 Break and discussion 2:3-3:3 Ike Chuang (MIT) - Device technology and implementation issues
Markov random fields and Gibbs measures
Chapter Markov random fields and Gibbs measures 1. Conditional independence Suppose X i is a random element of (X i, B i ), for i = 1, 2, 3, with all X i defined on the same probability space (.F, P).
PEER TO PEER FILE SHARING USING NETWORK CODING
PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering
Section 1.3 P 1 = 1 2. = 1 4 2 8. P n = 1 P 3 = Continuing in this fashion, it should seem reasonable that, for any n = 1, 2, 3,..., = 1 2 4.
Difference Equations to Differential Equations Section. The Sum of a Sequence This section considers the problem of adding together the terms of a sequence. Of course, this is a problem only if more than
Impedance Matching and Matching Networks. Valentin Todorow, December, 2009
Impedance Matching and Matching Networks Valentin Todorow, December, 2009 RF for Plasma Processing - Definition of RF What is RF? The IEEE Standard Dictionary of Electrical and Electronics Terms defines
Lecture 2: August 29. Linear Programming (part I)
10-725: Convex Optimization Fall 2013 Lecture 2: August 29 Lecturer: Barnabás Póczos Scribes: Samrachana Adhikari, Mattia Ciollaro, Fabrizio Lecci Note: LaTeX template courtesy of UC Berkeley EECS dept.
Secure Network Coding via Filtered Secret Sharing
Secure Network Coding via Filtered Secret Sharing Jon Feldman, Tal Malkin, Rocco Servedio, Cliff Stein (Columbia University) jonfeld@ieor, tal@cs, rocco@cs, cliff@ieor columbiaedu Feldman, Malkin, Servedio,
A Practical Scheme for Wireless Network Operation
A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Amir F. Dana, Babak Hassibi, Michelle Effros June 21, 2004 Abstract In many problems in wireline networks, it is known that achieving
Chapter 4. Probability and Probability Distributions
Chapter 4. robability and robability Distributions Importance of Knowing robability To know whether a sample is not identical to the population from which it was selected, it is necessary to assess the
3-9 EPR and Bell s theorem. EPR Bohm s version. S x S y S z V H 45
1 3-9 EPR and Bell s theorem EPR Bohm s version S x S y S z n P(n) n n P(0) 0 0 V H 45 P(45) D S D P(0) H V 2 ( ) Neumann EPR n P(n) EPR PP(n) n EPR ( ) 2 5 2 3 But even at this stage there is essentially
A REMARK ON ALMOST MOORE DIGRAPHS OF DEGREE THREE. 1. Introduction and Preliminaries
Acta Math. Univ. Comenianae Vol. LXVI, 2(1997), pp. 285 291 285 A REMARK ON ALMOST MOORE DIGRAPHS OF DEGREE THREE E. T. BASKORO, M. MILLER and J. ŠIRÁŇ Abstract. It is well known that Moore digraphs do
Reading.. IMAGE COMPRESSION- I IMAGE COMPRESSION. Image compression. Data Redundancy. Lossy vs Lossless Compression. Chapter 8.
Reading.. IMAGE COMPRESSION- I Week VIII Feb 25 Chapter 8 Sections 8.1, 8.2 8.3 (selected topics) 8.4 (Huffman, run-length, loss-less predictive) 8.5 (lossy predictive, transform coding basics) 8.6 Image
Network Design Performance Evaluation, and Simulation #6
Network Design Performance Evaluation, and Simulation #6 1 Network Design Problem Goal Given QoS metric, e.g., Average delay Loss probability Characterization of the traffic, e.g., Average interarrival
Mathematical finance and linear programming (optimization)
Mathematical finance and linear programming (optimization) Geir Dahl September 15, 2009 1 Introduction The purpose of this short note is to explain how linear programming (LP) (=linear optimization) may
The Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
Brewer s Conjecture and the Feasibility of Consistent, Available, Partition-Tolerant Web Services
Brewer s Conjecture and the Feasibility of Consistent, Available, Partition-Tolerant Web Services Seth Gilbert Nancy Lynch Abstract When designing distributed web services, there are three properties that
Econometrics Simple Linear Regression
Econometrics Simple Linear Regression Burcu Eke UC3M Linear equations with one variable Recall what a linear equation is: y = b 0 + b 1 x is a linear equation with one variable, or equivalently, a straight
BOX. The density operator or density matrix for the ensemble or mixture of states with probabilities is given by
2.4 Density operator/matrix Ensemble of pure states gives a mixed state BOX The density operator or density matrix for the ensemble or mixture of states with probabilities is given by Note: Once mixed,
10.2 Series and Convergence
10.2 Series and Convergence Write sums using sigma notation Find the partial sums of series and determine convergence or divergence of infinite series Find the N th partial sums of geometric series and
Understanding the Impact of Weights Constraints in Portfolio Theory
Understanding the Impact of Weights Constraints in Portfolio Theory Thierry Roncalli Research & Development Lyxor Asset Management, Paris [email protected] January 2010 Abstract In this article,
No: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics
No: 10 04 Bilkent University Monotonic Extension Farhad Husseinov Discussion Papers Department of Economics The Discussion Papers of the Department of Economics are intended to make the initial results
A NOTE ON OFF-DIAGONAL SMALL ON-LINE RAMSEY NUMBERS FOR PATHS
A NOTE ON OFF-DIAGONAL SMALL ON-LINE RAMSEY NUMBERS FOR PATHS PAWE L PRA LAT Abstract. In this note we consider the on-line Ramsey numbers R(P n, P m ) for paths. Using a high performance computing clusters,
THE BANACH CONTRACTION PRINCIPLE. Contents
THE BANACH CONTRACTION PRINCIPLE ALEX PONIECKI Abstract. This paper will study contractions of metric spaces. To do this, we will mainly use tools from topology. We will give some examples of contractions,
PART III. OPS-based wide area networks
PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity
Midterm Practice Problems
6.042/8.062J Mathematics for Computer Science October 2, 200 Tom Leighton, Marten van Dijk, and Brooke Cowan Midterm Practice Problems Problem. [0 points] In problem set you showed that the nand operator
Chapter 4: Chemical and Solution Stoichiometry
Chapter 4: Chemical and Solution Stoichiometry (Sections 4.1-4.4) 1 Reaction Stoichiometry The coefficients in a balanced chemical equation specify the relative amounts in moles of each of the substances
Weakly Secure Network Coding
Weakly Secure Network Coding Kapil Bhattad, Student Member, IEEE and Krishna R. Narayanan, Member, IEEE Department of Electrical Engineering, Texas A&M University, College Station, USA Abstract In this
6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation
6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation Daron Acemoglu and Asu Ozdaglar MIT November 2, 2009 1 Introduction Outline The problem of cooperation Finitely-repeated prisoner s dilemma
Lecture 3. Linear Programming. 3B1B Optimization Michaelmas 2015 A. Zisserman. Extreme solutions. Simplex method. Interior point method
Lecture 3 3B1B Optimization Michaelmas 2015 A. Zisserman Linear Programming Extreme solutions Simplex method Interior point method Integer programming and relaxation The Optimization Tree Linear Programming
1 Sufficient statistics
1 Sufficient statistics A statistic is a function T = rx 1, X 2,, X n of the random sample X 1, X 2,, X n. Examples are X n = 1 n s 2 = = X i, 1 n 1 the sample mean X i X n 2, the sample variance T 1 =
FUNDAMENTALS of INFORMATION THEORY and CODING DESIGN
DISCRETE "ICS AND ITS APPLICATIONS Series Editor KENNETH H. ROSEN FUNDAMENTALS of INFORMATION THEORY and CODING DESIGN Roberto Togneri Christopher J.S. desilva CHAPMAN & HALL/CRC A CRC Press Company Boca
Secure Network Coding on a Wiretap Network
IEEE TRANSACTIONS ON INFORMATION THEORY 1 Secure Network Coding on a Wiretap Network Ning Cai, Senior Member, IEEE, and Raymond W. Yeung, Fellow, IEEE Abstract In the paradigm of network coding, the nodes
Galois representations with open image
Galois representations with open image Ralph Greenberg University of Washington Seattle, Washington, USA May 7th, 2011 Introduction This talk will be about representations of the absolute Galois group
Conductance, the Normalized Laplacian, and Cheeger s Inequality
Spectral Graph Theory Lecture 6 Conductance, the Normalized Laplacian, and Cheeger s Inequality Daniel A. Spielman September 21, 2015 Disclaimer These notes are not necessarily an accurate representation
Lecture 13: Factoring Integers
CS 880: Quantum Information Processing 0/4/0 Lecture 3: Factoring Integers Instructor: Dieter van Melkebeek Scribe: Mark Wellons In this lecture, we review order finding and use this to develop a method
Jitter Measurements in Serial Data Signals
Jitter Measurements in Serial Data Signals Michael Schnecker, Product Manager LeCroy Corporation Introduction The increasing speed of serial data transmission systems places greater importance on measuring
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,
Numerical methods for American options
Lecture 9 Numerical methods for American options Lecture Notes by Andrzej Palczewski Computational Finance p. 1 American options The holder of an American option has the right to exercise it at any moment
Network File Storage with Graceful Performance Degradation
Network File Storage with Graceful Performance Degradation ANXIAO (ANDREW) JIANG California Institute of Technology and JEHOSHUA BRUCK California Institute of Technology A file storage scheme is proposed
A Labeling Algorithm for the Maximum-Flow Network Problem
A Labeling Algorithm for the Maximum-Flow Network Problem Appendix C Network-flow problems can be solved by several methods. In Chapter 8 we introduced this topic by exploring the special structure of
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
IN THIS PAPER, we study the delay and capacity trade-offs
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness
MATH 10: Elementary Statistics and Probability Chapter 5: Continuous Random Variables
MATH 10: Elementary Statistics and Probability Chapter 5: Continuous Random Variables Tony Pourmohamad Department of Mathematics De Anza College Spring 2015 Objectives By the end of this set of slides,
MA 408 Computer Lab Two The Poincaré Disk Model of Hyperbolic Geometry. Figure 1: Lines in the Poincaré Disk Model
MA 408 Computer Lab Two The Poincaré Disk Model of Hyperbolic Geometry Put your name here: Score: Instructions: For this lab you will be using the applet, NonEuclid, created by Castellanos, Austin, Darnell,
1 Norms and Vector Spaces
008.10.07.01 1 Norms and Vector Spaces Suppose we have a complex vector space V. A norm is a function f : V R which satisfies (i) f(x) 0 for all x V (ii) f(x + y) f(x) + f(y) for all x,y V (iii) f(λx)
A Modest View of Bell s Theorem. Steve Boughn, Princeton University and Haverford College
A Modest View of Bell s Theorem Steve Boughn, Princeton University and Haverford College Talk given at the 2016 Princeton-TAMU Symposium on Quantum Noise Effects in Thermodynamics, Biology and Information
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
Lecture 4 Online and streaming algorithms for clustering
CSE 291: Geometric algorithms Spring 2013 Lecture 4 Online and streaming algorithms for clustering 4.1 On-line k-clustering To the extent that clustering takes place in the brain, it happens in an on-line
Polarization codes and the rate of polarization
Polarization codes and the rate of polarization Erdal Arıkan, Emre Telatar Bilkent U., EPFL Sept 10, 2008 Channel Polarization Given a binary input DMC W, i.i.d. uniformly distributed inputs (X 1,...,
Lecture 22: November 10
CS271 Randomness & Computation Fall 2011 Lecture 22: November 10 Lecturer: Alistair Sinclair Based on scribe notes by Rafael Frongillo Disclaimer: These notes have not been subjected to the usual scrutiny
Statistical Machine Translation: IBM Models 1 and 2
Statistical Machine Translation: IBM Models 1 and 2 Michael Collins 1 Introduction The next few lectures of the course will be focused on machine translation, and in particular on statistical machine translation
System Interconnect Architectures. Goals and Analysis. Network Properties and Routing. Terminology - 2. Terminology - 1
System Interconnect Architectures CSCI 8150 Advanced Computer Architecture Hwang, Chapter 2 Program and Network Properties 2.4 System Interconnect Architectures Direct networks for static connections Indirect
1 Solving LPs: The Simplex Algorithm of George Dantzig
Solving LPs: The Simplex Algorithm of George Dantzig. Simplex Pivoting: Dictionary Format We illustrate a general solution procedure, called the simplex algorithm, by implementing it on a very simple example.
Linear Static Analysis of a Cantilever Beam Using Beam Library (SI Units)
APPENDIX A Linear Static Analysis of a Cantilever Beam Using Beam Library (SI Units) Objectives: Create a geometric representation of a cantilever beam. Use the geometry model to define an MSC.Nastran
Is quantum mechanics compatible with a deterministic universe? Two interpretations of quantum probabilities *
Is quantum mechanics compatible with a deterministic universe? Two interpretations of quantum probabilities * László E. Szabó Center for Philosophy of Science University of Pittsburgh and Institute for
Topology-based network security
Topology-based network security Tiit Pikma Supervised by Vitaly Skachek Research Seminar in Cryptography University of Tartu, Spring 2013 1 Introduction In both wired and wireless networks, there is the
24 th IEEE Annual Computer Communications Workshop (CCW)
24 th IEEE Annual Computer Communications Workshop (CCW) Exploration of Quantum Cryptography in Network Security Presented by Mehrdad S. Sharbaf Sharbaf & Associates Loyola Marymount University California
Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding
Mathematical Modelling of Computer Networks: Part II Module 1: Network Coding Lecture 3: Network coding and TCP 12th November 2013 Laila Daniel and Krishnan Narayanan Dept. of Computer Science, University
9. Force Measurement with a Strain gage Bridge
9. Force Measurement with a Strain gage Bridge Task 1. Measure the transfer characteristics of strain-gage based force sensor in a range 0 10 kg 1. 2. Determine the mass of an unknown weight. 3. Check
WHERE DOES THE 10% CONDITION COME FROM?
1 WHERE DOES THE 10% CONDITION COME FROM? The text has mentioned The 10% Condition (at least) twice so far: p. 407 Bernoulli trials must be independent. If that assumption is violated, it is still okay
Network Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
Online Adwords Allocation
Online Adwords Allocation Shoshana Neuburger May 6, 2009 1 Overview Many search engines auction the advertising space alongside search results. When Google interviewed Amin Saberi in 2004, their advertisement
Guessing Game: NP-Complete?
Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple
3. Mathematical Induction
3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
Computational Geometry Lab: FEM BASIS FUNCTIONS FOR A TETRAHEDRON
Computational Geometry Lab: FEM BASIS FUNCTIONS FOR A TETRAHEDRON John Burkardt Information Technology Department Virginia Tech http://people.sc.fsu.edu/ jburkardt/presentations/cg lab fem basis tetrahedron.pdf
