41,771 research outputs found
Triggered qutrits for Quantum Communication protocols
A general protocol in Quantum Information and Communication relies in the
ability of producing, transmitting and reconstructing, in general, qunits. In
this letter we show for the first time the experimental implementation of these
three basic steps on a pure state in a three dimensional space, by means of the
orbital angular momentum of the photons. The reconstruction of the qutrit is
performed with tomographic techniques and a Maximum-Likelihood estimation
method. In this way we also demonstrate that we can perform any transformation
in the three dimensional space
Collaborative communication protocols for wireless sensor networks
In this document, the design of communication within a wireless sensor network is discussed. The resource limitations of such a network, especially in terms of energy, require an integrated approach for all (traditional) layers of communication. We present such an integrated, collaborative approach which is part of current research in the European research project EYES on energy-efficient sensor networks. In particular, energy-efficient solutions for medium access control, clusterbased routing and multipath routing are discussed. As part of the ongoing project, these approaches work together and are designed to support each other
On Communication Protocols that Compute Almost Privately
A traditionally desired goal when designing auction mechanisms is incentive
compatibility, i.e., ensuring that bidders fare best by truthfully reporting
their preferences. A complementary goal, which has, thus far, received
significantly less attention, is to preserve privacy, i.e., to ensure that
bidders reveal no more information than necessary. We further investigate and
generalize the approximate privacy model for two-party communication recently
introduced by Feigenbaum et al.[8]. We explore the privacy properties of a
natural class of communication protocols that we refer to as "dissection
protocols". Dissection protocols include, among others, the bisection auction
in [9,10] and the bisection protocol for the millionaires problem in [8].
Informally, in a dissection protocol the communicating parties are restricted
to answering simple questions of the form "Is your input between the values
\alpha and \beta (under a predefined order over the possible inputs)?".
We prove that for a large class of functions, called tiling functions, which
include the 2nd-price Vickrey auction, there always exists a dissection
protocol that provides a constant average-case privacy approximation ratio for
uniform or "almost uniform" probability distributions over inputs. To establish
this result we present an interesting connection between the approximate
privacy framework and basic concepts in computational geometry. We show that
such a good privacy approximation ratio for tiling functions does not, in
general, exist in the worst case. We also discuss extensions of the basic setup
to more than two parties and to non-tiling functions, and provide calculations
of privacy approximation ratios for two functions of interest.Comment: to appear in Theoretical Computer Science (series A
Streaming Communication Protocols
We define the Streaming Communication model that combines the main aspects of communication complexity and streaming. Input arrives as a stream, spread between several agents across a network. Each agent has a bounded memory, which can be updated upon receiving a new bit, or a message from another agent. We provide tight tradeoffs between the necessary resources, i.e. communication between agents and memory, for some of the canonical problems from communication complexity by proving a strong general lower bound technique. Second, we analyze the Approximate Matching problem and show that the complexity of this problem (i.e. the achievable approximation ratio) in the one-way variant of our model is strictly different both from the streaming complexity and the one-way communication complexity thereof
- …