220 research outputs found

    Entangling gates in even Euclidean lattices such as the Leech lattice

    Full text link
    The group of automorphisms of Euclidean (embedded in Rn\mathbb{R}^n) dense lattices such as the root lattices D4D_4 and E8E_8, the Barnes-Wall lattice BW16BW_{16}, the unimodular lattice D12+D_{12}^+ and the Leech lattice Λ24\Lambda_{24} may be generated by entangled quantum gates of the corresponding dimension. These (real) gates/lattices are useful for quantum error correction: for instance, the two and four-qubit real Clifford groups are the automorphism groups of the lattices D4D_4 and BW16BW_{16}, respectively, and the three-qubit real Clifford group is maximal in the Weyl group W(E8)W(E_8). Technically, the automorphism group Aut(Λ)Aut(\Lambda) of the lattice Λ\Lambda is the set of orthogonal matrices BB such that, following the conjugation action by the generating matrix of the lattice, the output matrix is unimodular (of determinant ±1\pm 1, with integer entries). When the degree nn is equal to the number of basis elements of Λ\Lambda, then Aut(Λ)Aut(\Lambda) also acts on basis vectors and is generated with matrices BB such that the sum of squared entries in a row is one, i.e. BB may be seen as a quantum gate. For the dense lattices listed above, maximal multipartite entanglement arises. In particular, one finds a balanced tripartite entanglement in E8E_8 (the two- and three- tangles have equal magnitude 1/4) and a GHZ type entanglement in BW16_{16}. In this paper, we also investigate the entangled gates from D12+D_{12}^+ and Λ24\Lambda_{24}, by seeing them as systems coupling a qutrit to two- and three-qubits, respectively. Apart from quantum computing, the work may be related to particle physics in the spirit of \cite{PLS2010}.Comment: 11 pages, second updated versio

    Finite reflection groups and graph norms

    Get PDF
    Given a graph HH on vertex set {1,2,⋯ ,n}\{1,2,\cdots, n\} and a function f:[0,1]2→Rf:[0,1]^2 \rightarrow \mathbb{R}, define \begin{align*} \|f\|_{H}:=\left\vert\int \prod_{ij\in E(H)}f(x_i,x_j)d\mu^{|V(H)|}\right\vert^{1/|E(H)|}, \end{align*} where μ\mu is the Lebesgue measure on [0,1][0,1]. We say that HH is norming if ∥⋅∥H\|\cdot\|_H is a semi-norm. A similar notion ∥⋅∥r(H)\|\cdot\|_{r(H)} is defined by ∥f∥r(H):=∥∣f∣∥H\|f\|_{r(H)}:=\||f|\|_{H} and HH is said to be weakly norming if ∥⋅∥r(H)\|\cdot\|_{r(H)} is a norm. Classical results show that weakly norming graphs are necessarily bipartite. In the other direction, Hatami showed that even cycles, complete bipartite graphs, and hypercubes are all weakly norming. We demonstrate that any graph whose edges percolate in an appropriate way under the action of a certain natural family of automorphisms is weakly norming. This result includes all previously known examples of weakly norming graphs, but also allows us to identify a much broader class arising from finite reflection groups. We include several applications of our results. In particular, we define and compare a number of generalisations of Gowers' octahedral norms and we prove some new instances of Sidorenko's conjecture.Comment: 29 page

    Efficient Bayesian Learning in Social Networks with Gaussian Estimators

    Get PDF
    We consider a group of Bayesian agents who try to estimate a state of the world θ\theta through interaction on a social network. Each agent vv initially receives a private measurement of θ\theta: a number SvS_v picked from a Gaussian distribution with mean θ\theta and standard deviation one. Then, in each discrete time iteration, each reveals its estimate of θ\theta to its neighbors, and, observing its neighbors' actions, updates its belief using Bayes' Law. This process aggregates information efficiently, in the sense that all the agents converge to the belief that they would have, had they access to all the private measurements. We show that this process is computationally efficient, so that each agent's calculation can be easily carried out. We also show that on any graph the process converges after at most 2N⋅D2N \cdot D steps, where NN is the number of agents and DD is the diameter of the network. Finally, we show that on trees and on distance transitive-graphs the process converges after DD steps, and that it preserves privacy, so that agents learn very little about the private signal of most other agents, despite the efficient aggregation of information. Our results extend those in an unpublished manuscript of the first and last authors.Comment: Added coauthor. Added proofs for fast convergence on trees and distance transitive graphs. Also, now analyzing a notion of privac
    • …
    corecore