692,156 research outputs found
On the Performance and Optimization for MEC Networks Using Uplink NOMA
In this paper, we investigate a non-orthogonal multiple access (NOMA) based
mobile edge computing (MEC) network, in which two users may partially offload
their respective tasks to a single MEC server through uplink NOMA. We propose a
new offloading scheme that can operate in three different modes, namely the
partial computation offloading, the complete local computation, and the
complete offloading. We further derive a closed-form expression of the
successful computation probability for the proposed scheme. As part of the
proposed offloading scheme, we formulate a problem to maximize the successful
computation probability by jointly optimizing the time for offloading, the
power allocation of the two users and the offloading ratios which decide how
many tasks should be offloaded to the MEC server. We obtain the optimal
solutions in the closed forms. Simulation results show that our proposed scheme
can achieve the highest successful computation probability than the existing
schemes.Comment: This paper has been accepted by IEEE ICC Workshop 201
Efficient Quantum Computation with Probabilistic Quantum Gates
With a combination of the quantum repeater and the cluster state approaches, we show that efficient quantum computation can be constructed even if all the entangling quantum gates only succeed with an arbitrarily small probability p. The required computational overhead scales efficiently both with 1/p and n, where n is the number of qubits in the computation. This approach provides an efficient way to combat noise in a class of quantum computation implementation schemes, where the dominant noise leads to probabilistic signaled errors with an error probability 1-p far beyond any threshold requirement
An Analytical Solution for Probabilistic Guarantees of Reservation Based Soft Real-Time Systems
We show a methodology for the computation of the probability of deadline miss
for a periodic real-time task scheduled by a resource reservation algorithm. We
propose a modelling technique for the system that reduces the computation of
such a probability to that of the steady state probability of an infinite state
Discrete Time Markov Chain with a periodic structure. This structure is
exploited to develop an efficient numeric solution where different
accuracy/computation time trade-offs can be obtained by operating on the
granularity of the model. More importantly we offer a closed form conservative
bound for the probability of a deadline miss. Our experiments reveal that the
bound remains reasonably close to the experimental probability in one real-time
application of practical interest. When this bound is used for the optimisation
of the overall Quality of Service for a set of tasks sharing the CPU, it
produces a good sub-optimal solution in a small amount of time.Comment: IEEE Transactions on Parallel and Distributed Systems, Volume:27,
Issue: 3, March 201
Counterfactual Computation
Suppose that we are given a quantum computer programmed ready to perform a
computation if it is switched on. Counterfactual computation is a process by
which the result of the computation may be learnt without actually running the
computer. Such processes are possible within quantum physics and to achieve
this effect, a computer embodying the possibility of running the computation
must be available, even though the computation is, in fact, not run. We study
the possibilities and limitations of general protocols for the counterfactual
computation of decision problems (where the result r is either 0 or 1). If p(r)
denotes the probability of learning the result r ``for free'' in a protocol
then one might hope to design a protocol which simultaneously has large p(0)
and p(1). However we prove that p(0)+p(1) never exceeds 1 in any protocol and
we derive further constraints on p(0) and p(1) in terms of N, the number of
times that the computer is not run. In particular we show that any protocol
with p(0)+p(1)=1-epsilon must have N tending to infinity as epsilon tends to 0.
These general results are illustrated with some explicit protocols for
counterfactual computation. We show that "interaction-free" measurements can be
regarded as counterfactual computations, and our results then imply that N must
be large if the probability of interaction is to be close to zero. Finally, we
consider some ways in which our formulation of counterfactual computation can
be generalised.Comment: 19 pages. LaTex, 2 figures. Revised version has some new sections and
expanded explanation
Quantum matchgate computations and linear threshold gates
The theory of matchgates is of interest in various areas in physics and
computer science. Matchgates occur in e.g. the study of fermions and spin
chains, in the theory of holographic algorithms and in several recent works in
quantum computation. In this paper we completely characterize the class of
boolean functions computable by unitary two-qubit matchgate circuits with some
probability of success. We show that this class precisely coincides with that
of the linear threshold gates. The latter is a fundamental family which appears
in several fields, such as the study of neural networks. Using the above
characterization, we further show that the power of matchgate circuits is
surprisingly trivial in those cases where the computation is to succeed with
high probability. In particular, the only functions that are
matchgate-computable with success probability greater than 3/4 are functions
depending on only a single bit of the input
- …