6,423 research outputs found

    Vector valued logarithmic residues and the extraction of elementary factors

    Get PDF
    An analysis is presented of the circumstances under which, by the extraction of elementary factors, an analytic Banach algebra valued function can be transformed into one taking invertible values only. Elementary factors are generalizations of the simple scalar expressions λ – α, the building blocks of scalar polynomials. In the Banach algebra situation they have the form e – p + (λ – α)p with p an idempotent. The analysis elucidates old results (such as on Fredholm operator valued functions) and yields new insights which are brought to bear on the study of vector-valued logarithmic residues. These are contour integrals of logarithmic derivatives of analytic Banach algebra valued functions. Examples illustrate the subject matter and show that new ground is covered. Also a long standing open problem is discussed from a fresh angle.analytic vector-valued function;annihilating family of idempotents;elementary factor;generalizations of analytic functions;idempotent;integer combination of idempotents;logarithmic residue;plain function;resolving family of traces;topological algebras

    Asymptotic adaptive bipartite entanglement distillation protocol

    Full text link
    We present a new asymptotic bipartite entanglement distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states.Comment: 11 pages, 5 figures, RevTeX

    Hashing protocol for distilling multipartite CSS states

    Full text link
    We present a hashing protocol for distilling multipartite CSS states by means of local Clifford operations, Pauli measurements and classical communication. It is shown that this hashing protocol outperforms previous versions by exploiting information theory to a full extent an not only applying CNOTs as local Clifford operations. Using the information-theoretical notion of a strongly typical set, we calculate the asymptotic yield of the protocol as the solution of a linear programming problem.Comment: 13 pages, 3 figures, RevTeX

    Exploring requisites and antecedents of continuous innovation.

    Get PDF
    When innovating, an organization needs to be capable of (1) exploring problem definition spaces and (2) exploiting them. The processes in which both activities unfold, display paradoxical characteristics which can be addressed by adopting ambidextrous organizational forms. Analyzing underlying value dynamics indicate that such forms will only be sustainable to the extent that cross-fertilization between both types of activity is achieved. These findings underscore the relevancy of interface management practices directed towards enacting synergies.

    Correlation and current anomalies in helical quantum dots

    Full text link
    We theoretically investigate the ground-state properties of a quantum dot defined on the surface of a strong three-dimensional time-reversal invariant topological insulator. Confinement is realized by ferromagnetic barriers and Coulomb interaction is treated numerically for up to seven electrons in the dot. Experimentally relevant intermediate interaction strengths are considered. The topological nature of the dot has interesting consequences: i) spin polarization increases and the ground state exhibits quantum phase transitions at specific angular momenta as a function of interaction strength ii) the onset of Wigner correlations takes place mainly in one spin channel, iii) the ground state is characterized by a persistent current which changes sign as a function of the radius of the dot.Comment: 5 pages, 4 figure

    Moral Anxiety, Mortal Terror: Considering Spielberg, Post-9/11

    Get PDF
    In the wake of 9/11, a defining moment in the young 21st century, Spielberg’s thematic concerns undergo a marked evolution. As film historian Joseph McBride noted, “(n)o other American artist confronted the key events of the first decade of the century with such sustained and ambitious treatment” (450). Together, Spielberg’s War of the Worlds (2005), Munich (2005), and Minority Report (2002) create an informal trilogy, each exploring a different facet of American shock and anxiety in the War on Terror era

    Stabilizer state breeding

    Get PDF
    We present a breeding protocol that distills pure copies of any stabilizer state from noisy copies and a pool of predistilled pure copies of the same state, by means of local Clifford operations, Pauli measurements and classical communication.Comment: RevTeX4, 9 pages, 1 figur

    Quantitative Validation: An Overview and Framework for PD Backtesting and Benchmarking.

    Get PDF
    The aim of credit risk models is to identify and quantify future outcomes of a set of risk measurements. In other words, the model's purpose is to provide as good an approximation as possible of what constitutes the true underlying risk relationship between a set of inputs and a target variable. These parameters are used for regulatory capital calculations to determine the capital needed that serves a buffer to protect depositors in adverse economic conditions. In order to manage model risk, financial institutions need to set up validation processes so as to monitor the quality of the models on an ongoing basis. Validation is important to inform all stakeholders (e.g. board of directors, senior management, regulators, investors, borrowers, …) and as such allow them to make better decisions. Validation can be considered from both a quantitative and qualitative point of view. Backtesting and benchmarking are key quantitative validation tools. In backtesting, the predicted risk measurements (PD, LGD, CCF) will be contrasted with observed measurements using a workbench of available test statistics to evaluate the calibration, discrimination and stability of the model. A timely detection of reduced performance is crucial since it directly impacts profitability and risk management strategies. The aim of benchmarking is to compare internal risk measurements with external risk measurements so to allow to better gauge the quality of the internal rating system. This paper will focus on the quantitative PD validation process within a Basel II context. We will set forth a traffic light indicator approach that employs all relevant statistical tests to quantitatively validate the used PD model, and document this complete approach with a reallife case-study.Framework; Benchmarking; Credit; Credit scoring; Control;
    corecore