23,890 research outputs found

    Universal Source Polarization and an Application to a Multi-User Problem

    Full text link
    We propose a scheme that universally achieves the smallest possible compression rate for a class of sources with side information, and develop an application of this result for a joint source channel coding problem over a broadcast channel.Comment: to be presented at Allerton 201

    Quantum cryptography: key distribution and beyond

    Full text link
    Uniquely among the sciences, quantum cryptography has driven both foundational research as well as practical real-life applications. We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other applications.Comment: It's a review on quantum cryptography and it is not restricted to QK

    Towards 'smart lasers': self-optimisation of an ultrafast pulse source using a genetic algorithm

    Full text link
    Short-pulse fibre lasers are a complex dynamical system possessing a broad space of operating states that can be accessed through control of cavity parameters. Determination of target regimes is a multi-parameter global optimisation problem. Here, we report the implementation of a genetic algorithm to intelligently locate optimum parameters for stable single-pulse mode-locking in a Figure-8 fibre laser, and fully automate the system turn-on procedure. Stable ultrashort pulses are repeatably achieved by employing a compound fitness function that monitors both temporal and spectral output properties of the laser. Our method of encoding photonics expertise into an algorithm and applying machine-learning principles paves the way to self-optimising `smart' optical technologies

    Ninja: Automated Integrand Reduction via Laurent Expansion for One-Loop Amplitudes

    Full text link
    We present the public C++ library Ninja, which implements the Integrand Reduction via Laurent Expansion method for the computation of one-loop integrals. The algorithm is suited for applications to complex one-loop processes.Comment: Published versio

    Automatic Computation of Feynman Diagrams

    Full text link
    Quantum corrections significantly influence the quantities observed in modern particle physics. The corresponding theoretical computations are usually quite lengthy which makes their automation mandatory. This review reports on the current status of automatic calculation of Feynman diagrams in particle physics. The most important theoretical techniques are introduced and their usefulness is demonstrated with the help of simple examples. A survey over frequently used programs and packages is provided, discussing their abilities and fields of applications. Subsequently, some powerful packages which have already been applied to important physical problems are described in more detail. The review closes with the discussion of a few typical applications for the automated computation of Feynman diagrams, addressing current physical questions like properties of the ZZ and Higgs boson, four-loop corrections to renormalization group functions and two-loop electroweak corrections.Comment: Latex, 62 pages. Typos corrected, references updated and some comments added. Vertical offset changed. The complete paper is also available via anonymous ftp at ftp://ttpux2.physik.uni-karlsruhe.de/ttp98/ttp98-41/ or via www at http://www-ttp.physik.uni-karlsruhe.de/Preprints

    Field test of a practical secure communication network with decoy-state quantum cryptography

    Full text link
    We present a secure network communication system that operated with decoy-state quantum cryptography in a real-world application scenario. The full key exchange and application protocols were performed in real time among three nodes, in which two adjacent nodes were connected by approximate 20 km of commercial telecom optical fiber. The generated quantum keys were immediately employed and demonstrated for communication applications, including unbreakable real-time voice telephone between any two of the three communication nodes, or a broadcast from one node to the other two nodes by using one-time pad encryption.Comment: 10 pages, 2 figures, 2 tables, typos correcte
    • 

    corecore