5,306 research outputs found
Hidden-Markov Program Algebra with iteration
We use Hidden Markov Models to motivate a quantitative compositional
semantics for noninterference-based security with iteration, including a
refinement- or "implements" relation that compares two programs with respect to
their information leakage; and we propose a program algebra for source-level
reasoning about such programs, in particular as a means of establishing that an
"implementation" program leaks no more than its "specification" program.
This joins two themes: we extend our earlier work, having iteration but only
qualitative, by making it quantitative; and we extend our earlier quantitative
work by including iteration. We advocate stepwise refinement and
source-level program algebra, both as conceptual reasoning tools and as targets
for automated assistance. A selection of algebraic laws is given to support
this view in the case of quantitative noninterference; and it is demonstrated
on a simple iterated password-guessing attack
Reductions of Hidden Information Sources
In all but special circumstances, measurements of time-dependent processes
reflect internal structures and correlations only indirectly. Building
predictive models of such hidden information sources requires discovering, in
some way, the internal states and mechanisms. Unfortunately, there are often
many possible models that are observationally equivalent. Here we show that the
situation is not as arbitrary as one would think. We show that generators of
hidden stochastic processes can be reduced to a minimal form and compare this
reduced representation to that provided by computational mechanics--the
epsilon-machine. On the way to developing deeper, measure-theoretic foundations
for the latter, we introduce a new two-step reduction process. The first step
(internal-event reduction) produces the smallest observationally equivalent
sigma-algebra and the second (internal-state reduction) removes sigma-algebra
components that are redundant for optimal prediction. For several classes of
stochastic dynamical systems these reductions produce representations that are
equivalent to epsilon-machines.Comment: 12 pages, 4 figures; 30 citations; Updates at
http://www.santafe.edu/~cm
Topological Quantum Computing and the Jones Polynomial
In this paper, we give a description of a recent quantum algorithm created by
Aharonov, Jones, and Landau for approximating the values of the Jones
polynomial at roots of unity of the form exp(2i/k). This description is
given with two objectives in mind. The first is to describe the algorithm in
such a way as to make explicit the underlying and inherent control structure.
The second is to make this algorithm accessible to a larger audience.Comment: 19 pages, 27 figure
Learning Deep Structured Models
Many problems in real-world applications involve predicting several random
variables which are statistically related. Markov random fields (MRFs) are a
great mathematical tool to encode such relationships. The goal of this paper is
to combine MRFs with deep learning algorithms to estimate complex
representations while taking into account the dependencies between the output
random variables. Towards this goal, we propose a training algorithm that is
able to learn structured models jointly with deep features that form the MRF
potentials. Our approach is efficient as it blends learning and inference and
makes use of GPU acceleration. We demonstrate the effectiveness of our
algorithm in the tasks of predicting words from noisy images, as well as
multi-class classification of Flickr photographs. We show that joint learning
of the deep features and the MRF parameters results in significant performance
gains.Comment: 11 pages including referenc
Abstract Hidden Markov Models: a monadic account of quantitative information flow
Hidden Markov Models, HMM's, are mathematical models of Markov processes with
state that is hidden, but from which information can leak. They are typically
represented as 3-way joint-probability distributions.
We use HMM's as denotations of probabilistic hidden-state sequential
programs: for that, we recast them as `abstract' HMM's, computations in the
Giry monad , and we equip them with a partial order of increasing
security. However to encode the monadic type with hiding over some state
we use rather
than the conventional that suffices for
Markov models whose state is not hidden. We illustrate the
construction with a small
Haskell prototype.
We then present uncertainty measures as a generalisation of the extant
diversity of probabilistic entropies, with characteristic analytic properties
for them, and show how the new entropies interact with the order of increasing
security. Furthermore, we give a `backwards' uncertainty-transformer semantics
for HMM's that is dual to the `forwards' abstract HMM's - it is an analogue of
the duality between forwards, relational semantics and backwards,
predicate-transformer semantics for imperative programs with demonic choice.
Finally, we argue that, from this new denotational-semantic viewpoint, one
can see that the Dalenius desideratum for statistical databases is actually an
issue in compositionality. We propose a means for taking it into account
Analyticity of Entropy Rate of Hidden Markov Chains
We prove that under mild positivity assumptions the entropy rate of a hidden
Markov chain varies analytically as a function of the underlying Markov chain
parameters. A general principle to determine the domain of analyticity is
stated. An example is given to estimate the radius of convergence for the
entropy rate. We then show that the positivity assumptions can be relaxed, and
examples are given for the relaxed conditions. We study a special class of
hidden Markov chains in more detail: binary hidden Markov chains with an
unambiguous symbol, and we give necessary and sufficient conditions for
analyticity of the entropy rate for this case. Finally, we show that under the
positivity assumptions the hidden Markov chain {\em itself} varies
analytically, in a strong sense, as a function of the underlying Markov chain
parameters.Comment: The title has been changed. The new main theorem now combines the old
main theorem and the remark following the old main theorem. A new section is
added as an introduction to complex analysis. General principle and an
example to determine the domain of analyticity of entropy rate have been
added. Relaxed conditions for analyticity of entropy rate and the
corresponding examples are added. The section about binary markov chain
corrupted by binary symmetric noise is taken out (to be part of another
paper
How Events Come Into Being: EEQT, Particle Tracks, Quantum Chaos, and Tunneling Time
In sections 1 and 2 we review Event Enhanced Quantum Theory (EEQT). In
section 3 we discuss applications of EEQT to tunneling time, and compare its
quantitative predictions with other approaches, in particular with
B\"uttiker-Larmor and Bohm trajectory approach. In section 4 we discuss quantum
chaos and quantum fractals resulting from simultaneous continuous monitoring of
several non-commuting observables. In particular we show self-similar,
non-linear, iterated function system-type, patterns arising from quantum jumps
and from the associated Markov operator. Concluding remarks pointing to
possible future development of EEQT are given in section 5.Comment: latex, 27 pages, 7 postscript figures. Paper submitted to Proc.
Conference "Mysteries, Puzzles And Paradoxes In Quantum Mechanics, Workshop
on Entanglement And Decoherence, Palazzo Feltrinelli, Gargnano, Garda Lake,
Italy, 20-25 September, 199
- …