1,672 research outputs found

    On the Black-Hole/Qubit Correspondence

    Full text link
    The entanglement classification of four qubits is related to the extremal black holes of the 4-dimensional STU model via a time-like reduction to three dimensions. This correspondence is generalised to the entanglement classification of a very special four-way entanglement of eight qubits and the black holes of the maximally supersymmetric N = 8 and exceptional magic N = 2 supergravity theories.Comment: 32 pages, very minor changes at the start of Sec. 4.1. Version to appear in The European Physical Journal - Plu

    Clifford group dipoles and the enactment of Weyl/Coxeter group W(E8) by entangling gates

    Full text link
    Peres/Mermin arguments about no-hidden variables in quantum mechanics are used for displaying a pair (R, S) of entangling Clifford quantum gates, acting on two qubits. From them, a natural unitary representation of Coxeter/Weyl groups W(D5) and W(F4) emerges, which is also reflected into the splitting of the n-qubit Clifford group Cn into dipoles C±\pmn . The union of the three-qubit real Clifford group C+ 3 and the Toffoli gate ensures a orthogonal representation of the Weyl/Coxeter group W(E8), and of its relatives. Other concepts involved are complex reflection groups, BN pairs, unitary group designs and entangled states of the GHZ family.Comment: version revised according the recommendations of a refere

    Spatial mixing and approximation algorithms for graphs with bounded connective constant

    Full text link
    The hard core model in statistical physics is a probability distribution on independent sets in a graph in which the weight of any independent set I is proportional to lambda^(|I|), where lambda > 0 is the vertex activity. We show that there is an intimate connection between the connective constant of a graph and the phenomenon of strong spatial mixing (decay of correlations) for the hard core model; specifically, we prove that the hard core model with vertex activity lambda < lambda_c(Delta + 1) exhibits strong spatial mixing on any graph of connective constant Delta, irrespective of its maximum degree, and hence derive an FPTAS for the partition function of the hard core model on such graphs. Here lambda_c(d) := d^d/(d-1)^(d+1) is the critical activity for the uniqueness of the Gibbs measure of the hard core model on the infinite d-ary tree. As an application, we show that the partition function can be efficiently approximated with high probability on graphs drawn from the random graph model G(n,d/n) for all lambda < e/d, even though the maximum degree of such graphs is unbounded with high probability. We also improve upon Weitz's bounds for strong spatial mixing on bounded degree graphs (Weitz, 2006) by providing a computationally simple method which uses known estimates of the connective constant of a lattice to obtain bounds on the vertex activities lambda for which the hard core model on the lattice exhibits strong spatial mixing. Using this framework, we improve upon these bounds for several lattices including the Cartesian lattice in dimensions 3 and higher. Our techniques also allow us to relate the threshold for the uniqueness of the Gibbs measure on a general tree to its branching factor (Lyons, 1989).Comment: 26 pages. In October 2014, this paper was superseded by arxiv:1410.2595. Before that, an extended abstract of this paper appeared in Proc. IEEE Symposium on the Foundations of Computer Science (FOCS), 2013, pp. 300-30

    A survey on modular Hadamard matrices

    Get PDF
    AbstractWe provide constructions of 32-modular Hadamard matrices for every size n divisible by 4. They are based on the description of several families of modular Golay pairs and quadruples. Higher moduli are also considered, such as 48,64,128 and 192. Finally, we exhibit infinite families of circulant modular Hadamard matrices of various types for suitable moduli and sizes

    Pseudo Random Coins Show More Heads Than Tails

    Full text link
    Tossing a coin is the most elementary Monte Carlo experiment. In a computer the coin is replaced by a pseudo random number generator. It can be shown analytically and by exact enumerations that popular random number generators are not capable of imitating a fair coin: pseudo random coins show more heads than tails. This bias explains the empirically observed failure of some random number generators in random walk experiments. It can be traced down to the special role of the value zero in the algebra of finite fields.Comment: 10 pages, 12 figure

    Higher analogues of the discrete-time Toda equation and the quotient-difference algorithm

    Full text link
    The discrete-time Toda equation arises as a universal equation for the relevant Hankel determinants associated with one-variable orthogonal polynomials through the mechanism of adjacency, which amounts to the inclusion of shifted weight functions in the orthogonality condition. In this paper we extend this mechanism to a new class of two-variable orthogonal polynomials where the variables are related via an elliptic curve. This leads to a `Higher order Analogue of the Discrete-time Toda' (HADT) equation for the associated Hankel determinants, together with its Lax pair, which is derived from the relevant recurrence relations for the orthogonal polynomials. In a similar way as the quotient-difference (QD) algorithm is related to the discrete-time Toda equation, a novel quotient-quotient-difference (QQD) scheme is presented for the HADT equation. We show that for both the HADT equation and the QQD scheme, there exists well-posed ss-periodic initial value problems, for almost all \s\in\Z^2. From the Lax-pairs we furthermore derive invariants for corresponding reductions to dynamical mappings for some explicit examples.Comment: 38 page

    Thom series of contact singularities

    Full text link
    Thom polynomials measure how global topology forces singularities. The power of Thom polynomials predestine them to be a useful tool not only in differential topology, but also in algebraic geometry (enumerative geometry, moduli spaces) and algebraic combinatorics. The main obstacle of their widespread application is that only a few, sporadic Thom polynomials have been known explicitly. In this paper we develop a general method for calculating Thom polynomials of contact singularities. Along the way, relations with the equivariant geometry of (punctual, local) Hilbert schemes, and with iterated residue identities are revealed
    • …
    corecore