1,046 research outputs found

    False Valor: Amending the Stolen Valor Act to Conform with the First Amendment\u27s Fraudulent Speech Exception

    Get PDF
    The Stolen Valor Act (SVA or “the Act”) was enacted to protect against “fraudulent claims” of receipt of military honors or decorations. It does so by criminalizing false verbal or written claims regarding such awards. However, the Act failed to include all of the elements of an anti-fraud measure required by the First Amendment. Most critically, the SVA fails to require actual reliance on the part of the defrauded. Although fraud is generally not protected by the First Amendment, courts cannot construe the SVA as an anti-fraud measure if the statute does not require actual reliance. Therefore, the SVA as written has been subject to the higher strict scrutiny standard when challenged on First Amendment grounds. However, this oversight is easily remedied. Congress should amend the SVA to require that targets of the fraudulent claim alter their behavior based upon the false representation of military honors without necessarily suffering an economic injury. By modifying the SVA in this limited fashion, Congress will enable courts to construe the SVA as an anti-fraud measure while protecting against harm caused by false claims of military honors

    Generalization of entanglement to convex operational theories: Entanglement relative to a subspace of observables

    Full text link
    We define what it means for a state in a convex cone of states on a space of observables to be generalized-entangled relative to a subspace of the observables, in a general ordered linear spaces framework for operational theories. This extends the notion of ordinary entanglement in quantum information theory to a much more general framework. Some important special cases are described, in which the distinguished observables are subspaces of the observables of a quantum system, leading to results like the identification of generalized unentangled states with Lie-group-theoretic coherent states when the special observables form an irreducibly represented Lie algebra. Some open problems, including that of generalizing the semigroup of local operations with classical communication to the convex cones setting, are discussed.Comment: 19 pages, to appear in proceedings of Quantum Structures VII, Int. J. Theor. Phy

    Bringing Demonstrative Evidence in from the Cold: The Academy\u27s Role in Developing Model Rules

    Get PDF
    To this day, judges and advocates struggle with the definition and use of demonstrative evidence. The ambiguity of this term (or its close cousins illustrative evidence and evidence offered for illustrative purposes only ) infects the judicial process with uncertainty, hindering advocates when preparing for trial and, in some cases, producing erroneous verdicts. For example, the Seventh Circuit recently reversed a case for improper use of a demonstrative exhibit, and on retrial the result swung from a defense verdict to an $11 million plaintiffs victory. Uncertainty about the admission and use of demonstrative evidence has festered for decades. Lawyers innovate in presenting their cases, forcing judges to make case-by-case rulings. This is increasingly significant as technology becomes commonly used throughout trial practice. Law professors in turn solidify this unpredictable practice by teaching subsequent generations that the admission of demonstrative evidence is subject only to the unbounded discretion of the trial court. While this confusion has been long acknowledged and ably documented, it has not galvanized reform. Trial advocacy and evidence professors should meet at this intersection of their respective areas of scholarship and teaching; they should capitalize on their collective knowledge and influence and propose to the Advisory Committee on the Federal Rules of Evidence a set of uniform, analytically sound Model Rules for Demonstrative Evidence. Until evidence rules are amended to address the problem, professors should teach the Model Rules alongside the current unpredictable, ad hoc practice. Exposure to such standardized criteria during law school will influence a generation of future lawyers and judges, promoting consistency in the handling of demonstrative evidence in the courtroom

    Hamiltonian Oracles

    Full text link
    Hamiltonian oracles are the continuum limit of the standard unitary quantum oracles. In this limit, the problem of finding the optimal query algorithm can be mapped into the problem of finding shortest paths on a manifold. The study of these shortest paths leads to lower bounds of the original unitary oracle problem. A number of example Hamiltonian oracles are studied in this paper, including oracle interrogation and the problem of computing the XOR of the hidden bits. Both of these problems are related to the study of geodesics on spheres with non-round metrics. For the case of two hidden bits a complete description of the geodesics is given. For n hidden bits a simple lower bound is proven that shows the problems require a query time proportional to n, even in the continuum limit. Finally, the problem of continuous Grover search is reexamined leading to a modest improvement to the protocol of Farhi and Gutmann.Comment: 16 pages, REVTeX 4 (minor corrections in v2

    Lossless quantum data compression and variable-length coding

    Full text link
    In order to compress quantum messages without loss of information it is necessary to allow the length of the encoded messages to vary. We develop a general framework for variable-length quantum messages in close analogy to the classical case and show that lossless compression is only possible if the message to be compressed is known to the sender. The lossless compression of an ensemble of messages is bounded from below by its von-Neumann entropy. We show that it is possible to reduce the number of qbits passing through a quantum channel even below the von-Neumann entropy by adding a classical side-channel. We give an explicit communication protocol that realizes lossless and instantaneous quantum data compression and apply it to a simple example. This protocol can be used for both online quantum communication and storage of quantum data.Comment: 16 pages, 5 figure

    Report of Cost Committee of American Boiler Manufacturers Association

    Get PDF
    It is safe to say that boiler manufacturers as a whole have been more backward in the development of their financial accounting and cost accounting than they have in the development of greater efficiency in their plants; they have looked upon cost accounting as something to do with red tape or something that may be all right for the other fellow. It is our conclusion that the interests of the Association can best be served and the work of our Committee productive of most good, through the distribution of this booklet which we might consider as a primer on cost accounting for our industry, and to this end we present it with the hope that it will be given your careful consideration. In this booklet we will endeavor to outline in a simple manner, a procedure that if followed will make it possible for any manufacturer, large or small, to compute his cost of production with a reasonable degree of accuracy

    Indeterminate-length quantum coding

    Get PDF
    The quantum analogues of classical variable-length codes are indeterminate-length quantum codes, in which codewords may exist in superpositions of different lengths. This paper explores some of their properties. The length observable for such codes is governed by a quantum version of the Kraft-McMillan inequality. Indeterminate-length quantum codes also provide an alternate approach to quantum data compression.Comment: 32 page

    Generalized remote state preparation: Trading cbits, qubits and ebits in quantum communication

    Get PDF
    We consider the problem of communicating quantum states by simultaneously making use of a noiseless classical channel, a noiseless quantum channel and shared entanglement. We specifically study the version of the problem in which the sender is given knowledge of the state to be communicated. In this setting, a trade-off arises between the three resources, some portions of which have been investigated previously in the contexts of the quantum-classical trade-off in data compression, remote state preparation and superdense coding of quantum states, each of which amounts to allowing just two out of these three resources. We present a formula for the triple resource trade-off that reduces its calculation to evaluating the data compression trade-off formula. In the process, we also construct protocols achieving all the optimal points. These turn out to be achievable by trade-off coding and suitable time-sharing between optimal protocols for cases involving two resources out of the three mentioned above.Comment: 15 pages, 2 figures, 1 tabl

    No Signalling and Quantum Key Distribution

    Full text link
    Standard quantum key distribution protocols are provably secure against eavesdropping attacks, if quantum theory is correct. It is theoretically interesting to know if we need to assume the validity of quantum theory to prove the security of quantum key distribution, or whether its security can be based on other physical principles. The question would also be of practical interest if quantum mechanics were ever to fail in some regime, because a scientifically and technologically advanced eavesdropper could perhaps use post-quantum physics to extract information from quantum communications without necessarily causing the quantum state disturbances on which existing security proofs rely. Here we describe a key distribution scheme provably secure against general attacks by a post-quantum eavesdropper who is limited only by the impossibility of superluminal signalling. The security of the scheme stems from violation of a Bell inequality.Comment: Clarifications and minor revisions in response to comments. Final version; to appear in Phys. Rev. Let
    • …
    corecore