16,062 research outputs found

    Quantum key distribution without the wavefunction

    Get PDF
    A well-known feature of quantum mechanics is the secure exchange of secret bit strings which can then be used as keys to encrypt messages transmitted over any classical communication channel. It is demonstrated that this quantum key distribution allows a much more general and abstract access than commonly thought. The results include some generalizations for the Hilbert space version of quantum key distribution,but base upon a general non-classical extension of conditional probability. A special state-independent conditional probability is identified as origin of the superior security of quantum key distribution and may have more profound implications for the foundations and interpretation of quantum mechanics,quantum information theory, and the philosophical question what actually constitutes physical reality.Comment: 16 pages. arXiv admin note: text overlap with arXiv:1502.0215

    The benefit of a 1-bit jump-start, and the necessity of stochastic encoding, in jamming channels

    Full text link
    We consider the problem of communicating a message mm in the presence of a malicious jamming adversary (Calvin), who can erase an arbitrary set of up to pnpn bits, out of nn transmitted bits (x1,…,xn)(x_1,\ldots,x_n). The capacity of such a channel when Calvin is exactly causal, i.e. Calvin's decision of whether or not to erase bit xix_i depends on his observations (x1,…,xi)(x_1,\ldots,x_i) was recently characterized to be 1−2p1-2p. In this work we show two (perhaps) surprising phenomena. Firstly, we demonstrate via a novel code construction that if Calvin is delayed by even a single bit, i.e. Calvin's decision of whether or not to erase bit xix_i depends only on (x1,…,xi−1)(x_1,\ldots,x_{i-1}) (and is independent of the "current bit" xix_i) then the capacity increases to 1−p1-p when the encoder is allowed to be stochastic. Secondly, we show via a novel jamming strategy for Calvin that, in the single-bit-delay setting, if the encoding is deterministic (i.e. the transmitted codeword is a deterministic function of the message mm) then no rate asymptotically larger than 1−2p1-2p is possible with vanishing probability of error, hence stochastic encoding (using private randomness at the encoder) is essential to achieve the capacity of 1−p1-p against a one-bit-delayed Calvin.Comment: 21 pages, 4 figures, extended draft of submission to ISIT 201

    Masking of errors in transmission of VAPC-coded speech

    Get PDF
    A subjective evaluation is provided of the bit error sensitivity of the message elements of a Vector Adaptive Predictive (VAPC) speech coder, along with an indication of the amenability of these elements to a popular error masking strategy (cross frame hold over). As expected, a wide range of bit error sensitivity was observed. The most sensitive message components were the short term spectral information and the most significant bits of the pitch and gain indices. The cross frame hold over strategy was found to be useful for pitch and gain information, but it was not beneficial for the spectral information unless severe corruption had occurred

    Taming Numbers and Durations in the Model Checking Integrated Planning System

    Full text link
    The Model Checking Integrated Planning System (MIPS) is a temporal least commitment heuristic search planner based on a flexible object-oriented workbench architecture. Its design clearly separates explicit and symbolic directed exploration algorithms from the set of on-line and off-line computed estimates and associated data structures. MIPS has shown distinguished performance in the last two international planning competitions. In the last event the description language was extended from pure propositional planning to include numerical state variables, action durations, and plan quality objective functions. Plans were no longer sequences of actions but time-stamped schedules. As a participant of the fully automated track of the competition, MIPS has proven to be a general system; in each track and every benchmark domain it efficiently computed plans of remarkable quality. This article introduces and analyzes the most important algorithmic novelties that were necessary to tackle the new layers of expressiveness in the benchmark problems and to achieve a high level of performance. The extensions include critical path analysis of sequentially generated plans to generate corresponding optimal parallel plans. The linear time algorithm to compute the parallel plan bypasses known NP hardness results for partial ordering by scheduling plans with respect to the set of actions and the imposed precedence relations. The efficiency of this algorithm also allows us to improve the exploration guidance: for each encountered planning state the corresponding approximate sequential plan is scheduled. One major strength of MIPS is its static analysis phase that grounds and simplifies parameterized predicates, functions and operators, that infers knowledge to minimize the state description length, and that detects domain object symmetries. The latter aspect is analyzed in detail. MIPS has been developed to serve as a complete and optimal state space planner, with admissible estimates, exploration engines and branching cuts. In the competition version, however, certain performance compromises had to be made, including floating point arithmetic, weighted heuristic search exploration according to an inadmissible estimate and parameterized optimization
    • …
    corecore