178,777 research outputs found

    Quantum Communications Based on Quantum Hashing

    Get PDF
    In this paper we consider an application of the recently proposed quantum hashing technique for computing Boolean functions in the quantum communication model. The combination of binary functions on non-binary quantum hash function is done via polynomial presentation, which we have called a characteristic of a Boolean function. Based on the characteristic polynomial presentation of Boolean functions and quantum hashing technique we present a method for computing Boolean functions in the quantum one-way communication model, where one of the parties performs his computations and sends a message to the other party, who must output the result after his part of computations. Some of the results are also true in a more restricted Simultaneous Message Passing model with no shared resources, in which communicating parties can interact only via the referee. We give several examples of Boolean functions whose polynomial presentations have specific properties allowing for construction of quantum communication protocols that are provably exponentially better than classical ones in the simultaneous message passing setting

    A Completeness Theorem for "Total Boolean Functions"

    Get PDF
    Christine Tasson introduced an algebraic notion of totality for a denotational model of linear logic in the category of vector spaces. The notion of total boolean function is, in a way, quite intuitive. This note provides a positive answer to the question of completeness of the "boolean centroidal calculus" w.r.t. total boolean functions.Comment: short not

    Width Hierarchy for k-OBDD of Small Width

    Get PDF
    In this paper was explored well known model k-OBDD. There are proven width based hierarchy of classes of boolean functions which computed by k-OBDD. The proof of hierarchy is based on sufficient condition of Boolean function's non representation as k-OBDD and complexity properties of Boolean function SAF. This function is modification of known Pointer Jumping (PJ) and Indirect Storage Access (ISA) functions.Comment: 8 page
    corecore