3,263 research outputs found
Computation in Finitary Stochastic and Quantum Processes
We introduce stochastic and quantum finite-state transducers as
computation-theoretic models of classical stochastic and quantum finitary
processes. Formal process languages, representing the distribution over a
process's behaviors, are recognized and generated by suitable specializations.
We characterize and compare deterministic and nondeterministic versions,
summarizing their relative computational power in a hierarchy of finitary
process languages. Quantum finite-state transducers and generators are a first
step toward a computation-theoretic analysis of individual, repeatedly measured
quantum dynamical systems. They are explored via several physical systems,
including an iterated beam splitter, an atom in a magnetic field, and atoms in
an ion trap--a special case of which implements the Deutsch quantum algorithm.
We show that these systems' behaviors, and so their information processing
capacity, depends sensitively on the measurement protocol.Comment: 25 pages, 16 figures, 1 table; http://cse.ucdavis.edu/~cmg; numerous
corrections and update
Quantum counter automata
The question of whether quantum real-time one-counter automata (rtQ1CAs) can
outperform their probabilistic counterparts has been open for more than a
decade. We provide an affirmative answer to this question, by demonstrating a
non-context-free language that can be recognized with perfect soundness by a
rtQ1CA. This is the first demonstration of the superiority of a quantum model
to the corresponding classical one in the real-time case with an error bound
less than 1. We also introduce a generalization of the rtQ1CA, the quantum
one-way one-counter automaton (1Q1CA), and show that they too are superior to
the corresponding family of probabilistic machines. For this purpose, we
provide general definitions of these models that reflect the modern approach to
the definition of quantum finite automata, and point out some problems with
previous results. We identify several remaining open problems.Comment: A revised version. 16 pages. A preliminary version of this paper
appeared as A. C. Cem Say, Abuzer Yakary{\i}lmaz, and \c{S}efika
Y\"{u}zsever. Quantum one-way one-counter automata. In R\={u}si\c{n}\v{s}
Freivalds, editor, Randomized and quantum computation, pages 25--34, 2010
(Satellite workshop of MFCS and CSL 2010
New results on classical and quantum counter automata
We show that one-way quantum one-counter automaton with zero-error is more
powerful than its probabilistic counterpart on promise problems. Then, we
obtain a similar separation result between Las Vegas one-way probabilistic
one-counter automaton and one-way deterministic one-counter automaton.
We also obtain new results on classical counter automata regarding language
recognition. It was conjectured that one-way probabilistic one blind-counter
automata cannot recognize Kleene closure of equality language [A. Yakaryilmaz:
Superiority of one-way and realtime quantum machines. RAIRO - Theor. Inf. and
Applic. 46(4): 615-641 (2012)]. We show that this conjecture is false, and also
show several separation results for blind/non-blind counter automata.Comment: 21 page
Attack-Resilient Supervisory Control of Discrete-Event Systems
In this work, we study the problem of supervisory control of discrete-event
systems (DES) in the presence of attacks that tamper with inputs and outputs of
the plant. We consider a very general system setup as we focus on both
deterministic and nondeterministic plants that we model as finite state
transducers (FSTs); this also covers the conventional approach to modeling DES
as deterministic finite automata. Furthermore, we cover a wide class of attacks
that can nondeterministically add, remove, or rewrite a sensing and/or
actuation word to any word from predefined regular languages, and show how such
attacks can be modeled by nondeterministic FSTs; we also present how the use of
FSTs facilitates modeling realistic (and very complex) attacks, as well as
provides the foundation for design of attack-resilient supervisory controllers.
Specifically, we first consider the supervisory control problem for
deterministic plants with attacks (i) only on their sensors, (ii) only on their
actuators, and (iii) both on their sensors and actuators. For each case, we
develop new conditions for controllability in the presence of attacks, as well
as synthesizing algorithms to obtain FST-based description of such
attack-resilient supervisors. A derived resilient controller provides a set of
all safe control words that can keep the plant work desirably even in the
presence of corrupted observation and/or if the control words are subjected to
actuation attacks. Then, we extend the controllability theorems and the
supervisor synthesizing algorithms to nondeterministic plants that satisfy a
nonblocking condition. Finally, we illustrate applicability of our methodology
on several examples and numerical case-studies
Classical and quantum Merlin-Arthur automata
We introduce Merlin-Arthur (MA) automata as Merlin provides a single
certificate and it is scanned by Arthur before reading the input. We define
Merlin-Arthur deterministic, probabilistic, and quantum finite state automata
(resp., MA-DFAs, MA-PFAs, MA-QFAs) and postselecting MA-PFAs and MA-QFAs
(resp., MA-PostPFA and MA-PostQFA). We obtain several results using different
certificate lengths.
We show that MA-DFAs use constant length certificates, and they are
equivalent to multi-entry DFAs. Thus, they recognize all and only regular
languages but can be exponential and polynomial state efficient over binary and
unary languages, respectively. With sublinear length certificates, MA-PFAs can
recognize several nonstochastic unary languages with cutpoint 1/2. With linear
length certificates, MA-PostPFAs recognize the same nonstochastic unary
languages with bounded error. With arbitrarily long certificates, bounded-error
MA-PostPFAs verify every unary decidable language. With sublinear length
certificates, bounded-error MA-PostQFAs verify several nonstochastic unary
languages. With linear length certificates, they can verify every unary
language and some NP-complete binary languages. With exponential length
certificates, they can verify every binary language.Comment: 14 page
- ā¦