6,491 research outputs found

    Entanglement Detection in the Stabilizer Formalism

    Full text link
    We investigate how stabilizer theory can be used for constructing sufficient conditions for entanglement. First, we show how entanglement witnesses can be derived for a given state, provided some stabilizing operators of the state are known. These witnesses require only a small effort for an experimental implementation and are robust against noise. Second, we demonstrate that also nonlinear criteria based on uncertainty relations can be derived from stabilizing operators. These criteria can sometimes improve the witnesses by adding nonlinear correction terms. All our criteria detect states close to Greenberger-Horne-Zeilinger states, cluster and graph states. We show that similar ideas can be used to derive entanglement conditions for states which do not fit the stabilizer formalism, such as the three-qubit W state. We also discuss connections between the witnesses and some Bell inequalities.Comment: 15 pages including 2 figures, revtex4; typos corrected, presentation improved; to appear in PR

    The production of Tsallis entropy in the limit of weak chaos and a new indicator of chaoticity

    Full text link
    We study the connection between the appearance of a `metastable' behavior of weakly chaotic orbits, characterized by a constant rate of increase of the Tsallis q-entropy (Tsallis 1988), and the solutions of the variational equations of motion for the same orbits. We demonstrate that the variational equations yield transient solutions, lasting for long time intervals, during which the length of deviation vectors of nearby orbits grows in time almost as a power-law. The associated power exponent can be simply related to the entropic exponent for which the q-entropy exhibits a constant rate of increase. This analysis leads to the definition of a new sensitive indicator distinguishing regular from weakly chaotic orbits, that we call `Average Power Law Exponent' (APLE). We compare the APLE with other established indicators of the literature. In particular, we give examples of application of the APLE in a) a thin separatrix layer of the standard map, b) the stickiness region around an island of stability in the same map, and c) the web of resonances of a 4D symplectic map. In all these cases we identify weakly chaotic orbits exhibiting the `metastable' behavior associated with the Tsallis q-entropy.Comment: 19 pages, 12 figures, accepted for publication by Physica

    F-formation Detection: Individuating Free-standing Conversational Groups in Images

    Full text link
    Detection of groups of interacting people is a very interesting and useful task in many modern technologies, with application fields spanning from video-surveillance to social robotics. In this paper we first furnish a rigorous definition of group considering the background of the social sciences: this allows us to specify many kinds of group, so far neglected in the Computer Vision literature. On top of this taxonomy, we present a detailed state of the art on the group detection algorithms. Then, as a main contribution, we present a brand new method for the automatic detection of groups in still images, which is based on a graph-cuts framework for clustering individuals; in particular we are able to codify in a computational sense the sociological definition of F-formation, that is very useful to encode a group having only proxemic information: position and orientation of people. We call the proposed method Graph-Cuts for F-formation (GCFF). We show how GCFF definitely outperforms all the state of the art methods in terms of different accuracy measures (some of them are brand new), demonstrating also a strong robustness to noise and versatility in recognizing groups of various cardinality.Comment: 32 pages, submitted to PLOS On

    Concise Security Bounds for Practical Decoy-State Quantum Key Distribution

    Full text link
    Due to its ability to tolerate high channel loss, decoy-state quantum key distribution (QKD) has been one of the main focuses within the QKD community. Notably, several experimental groups have demonstrated that it is secure and feasible under real-world conditions. Crucially, however, the security and feasibility claims made by most of these experiments were obtained under the assumption that the eavesdropper is restricted to particular types of attacks or that the finite-key effects are neglected. Unfortunately, such assumptions are not possible to guarantee in practice. In this work, we provide concise and tight finite-key security bounds for practical decoy-state QKD that are valid against general attacks.Comment: 5+3 pages and 2 figure
    corecore