22,664 research outputs found

    Breakdown of Stokes-Einstein relation in supercooled water

    Full text link
    Water displays breakdown of the Stokes-Einstein relation at low temperatures. We hypothesize that the breakdown is a result of the structural changes and a sharp rise in dynamic heterogeneities that occurs low T upon crossing the Widom line.Comment: 5 Pages, 2 Figure

    Decentralization of a Machine: Some Definitions

    Full text link
    We define some notions of the decentralization of a deterministic input-output machine. This opens the possibility for introducing game-theoretic elements -- such as strategic players -- inside the machine, as part of its design.Comment: 8 page

    Bounds on the Information Rate of Quantum Secret Sharing Schemes

    Full text link
    An important metric of the performance of a quantum secret sharing scheme is its information rate. Beyond the fact that the information rate is upper bounded by one, very little is known in terms of bounds on the information rate of quantum secret sharing schemes. Further, not every scheme can be realized with rate one. In this paper we derive new upper bounds for the information rates of quantum secret sharing schemes. We show that there exist quantum access structures on nn players for which the information rate cannot be better than O((log2n)/n)O((\log_2 n)/n). These results are the quantum analogues of the bounds for classical secret sharing schemes proved by Csirmaz.Comment: 5 pages, LaTe

    On the Relationship Between Dual Photography and Classical Ghost Imaging

    Full text link
    Classical ghost imaging has received considerable attention in recent years because of its remarkable ability to image a scene without direct observation by a light-detecting imaging device. In this article, we show that this imaging process is actually a realization of a paradigm known as dual photography, which has been shown to produce full-color dual (ghost) images of 3D objects with complex materials without using a traditional imaging device. Specifically, we demonstrate mathematically that the cross-correlation based methods used to recover ghost images are equivalent to the light transport measurement process of dual photography. Because of this, we are able to provide a new explanation for ghost imaging using only classical optics by leveraging the principle of reciprocity in classical electromagnetics. This observation also shows how to leverage previous work on light transport acquisition and dual photography to improve ghost imaging systems in the future.Comment: 6 page

    Properness of moment maps for representations of quivers

    Full text link
    In this note, we give a necessary and sufficient condition for the properness of moment maps for representations of quivers. We show that the moment map for the representations of a quiver is proper if and only if the quiver is acyclic, that is, it does not contain any oriented cycle.Comment: Section 1 of this article recalls the definitions and notations from arxiv:1711.04108, of which the author is a joint author. Therefore, there is some text overlap between this article and arxiv:1711.0410

    Relation Between Surface Codes and Hypermap-Homology Quantum Codes

    Full text link
    Recently, a new class of quantum codes based on hypermaps were proposed. These codes are obtained from embeddings of hypergraphs as opposed to surface codes which are obtained from the embeddings of graphs. It is natural to compare these two classes of codes and their relation to each other. In this context two related questions are addressed in this paper: Can the parameters of hypermap-homology codes be superior to those of surface codes and what is precisely the relation between these two classes of quantum codes? We show that a canonical hypermap code is identical to a surface code while a noncanonical hypermap code can be transformed to a surface code by CNOT gates alone. Our approach is constructive; we construct the related surface code and the transformation involving CNOT gates.Comment: 9 pages, LaTeX. Revised title, abstract and introduction. Minor changes in presentatio

    A new protocol implementing authentication transformations for multi-located parties

    Full text link
    This paper discusses a new protocol implementing authentication in a multi-located environment that avoids man-in-the-middle (MIM) attack, replay attack and provides privacy, integrity of a message for multi-located parties. The protocol uses the concept that each party is associated with a subsidiary agent.Comment: 10 page

    Methylammonium Lead Trihalide Perovskite Solar Cell Semiconductors Are Not Organometallic

    Full text link
    Methylammonium lead trihalide perovskite solar cells (CH3NH3PbY3, where Y = I(3-x)Brx=1-3, I(3-x)Clx=1-3, Br(3-x)Cl x=1-3, and IBrCl) are photonic semiconductors. Researches on various fundamental and technological aspects of these materials are extensively on-going to make them stable environmentally and for commercialization. Research studies addressing these materials as organometallic are massively and repeatedly appearing in very reputable, highly cited and high impact peer-reviewed research publications, including, for example, Energy and Environmental Science, Nature Chemistry, Nature Communication, Advanced Materials, Science, ACS Nano, and many other chemistry and materials based journals of the Wiley, Elsevier, Springer and Macmillan Publishers, and the Royal and American Society Sciences. Herein, we candidly addresses the question: whether should scientists in the perovskite and nanomaterials science communities refer CH3NH3PbY3 and their mixed halogen derivatives as organometallic

    Multipartite Monotones for Secure Sampling by Public Discussion From Noisy Correlations

    Full text link
    We address the problem of quantifying the cryptographic content of probability distributions, in relation to an application to secure multi-party sampling against a passive t-adversary. We generalize a recently introduced notion of assisted common information of a pair of correlated sources to that of K sources and define a family of monotone rate regions indexed by K. This allows for a simple characterization of all t-private distributions that can be statistically securely sampled without any auxiliary setup of pre-shared noisy correlations. We also give a new monotone called the residual total correlation that admits a simple operational interpretation. Interestingly, for sampling with non-trivial setups (K > 2) in the public discussion model, our definition of a monotone region differs from the one by Prabhakaran and Prabhakaran (ITW 2012).Comment: 6 pages, 2 figures, v2: Improved readabilit

    A Secret Common Information Duality for Tripartite Noisy Correlations

    Full text link
    We explore the duality between the simulation and extraction of secret correlations in light of a similar well-known operational duality between the two notions of common information due to Wyner, and G\'acs and K\"orner. For the inverse problem of simulating a tripartite noisy correlation from noiseless secret key and unlimited public communication, we show that Winter's (2005) result for the key cost in terms of a conditional version of Wyner's common information can be simply reexpressed in terms of the existence of a bipartite protocol monotone. For the forward problem of key distillation from noisy correlations, we construct simple distributions for which the conditional G\'acs and K\"orner common information achieves a tight bound on the secret key rate. We conjecture that this holds in general for non-communicative key agreement models. We also comment on the interconvertibility of secret correlations under local operations and public communication.Comment: 12 pages, 1 figure, v3: Improved readabilit
    corecore