1,586 research outputs found

    GENDER'S ROLE IN MANUSCRIPT ACCEPTANCE: SEX IN THE JOURNAL

    Get PDF
    Women authors fare poorly at the hands of referees in some economics journals, especially when the review process is not blind. Using data on the 155 manuscripts submitted to the NJARE for publication during the period 1984-88, we found no evidence of differential referee acceptance rates for manuscripts with female and male lead authors.Teaching/Communication/Extension/Profession,

    Multi-Party Pseudo-Telepathy

    Full text link
    Quantum entanglement, perhaps the most non-classical manifestation of quantum information theory, cannot be used to transmit information between remote parties. Yet, it can be used to reduce the amount of communication required to process a variety of distributed computational tasks. We speak of pseudo-telepathy when quantum entanglement serves to eliminate the classical need to communicate. In earlier examples of pseudo-telepathy, classical protocols could succeed with high probability unless the inputs were very large. Here we present a simple multi-party distributed problem for which the inputs and outputs consist of a single bit per player, and we present a perfect quantum protocol for it. We prove that no classical protocol can succeed with a probability that differs from 1/2 by more than a fraction that is exponentially small in the number of players. This could be used to circumvent the detection loophole in experimental tests of nonlocality.Comment: 11 pages. To be appear in WADS 2003 proceeding

    Improved Quantum Communication Complexity Bounds for Disjointness and Equality

    Get PDF
    We prove new bounds on the quantum communication complexity of the disjointness and equality problems. For the case of exact and non-deterministic protocols we show that these complexities are all equal to n+1, the previous best lower bound being n/2. We show this by improving a general bound for non-deterministic protocols of de Wolf. We also give an O(sqrt{n}c^{log^* n})-qubit bounded-error protocol for disjointness, modifying and improving the earlier O(sqrt{n}log n) protocol of Buhrman, Cleve, and Wigderson, and prove an Omega(sqrt{n}) lower bound for a large class of protocols that includes the BCW-protocol as well as our new protocol.Comment: 11 pages LaTe

    CHOOSING ALTERNATIVES TO CONTAMINATED GROUND WATER SUPPLIES: A SEQUENTIAL DECISION FRAMEWORK UNDER UNCERTAINTY

    Get PDF
    In increasing numbers, communities that rely on groundwater for drinking supplies have discovered contamination from agricultural pesticides and herbicides, road salt, underground fuel storage, and septic systems. A variety of short- and long-run remedies are available with highly uncertain outcomes. An appropriate technique for solving a benefit-cost problem of this type is a sequential decision framework using stochastic dynamic programming procedures for solution. The approach is illustrated here by means of an application to the problem of the recent contamination of the groundwater of Whately, Massachusetts by the agricultural fumigant EDB and the pesticide aldicarb.Environmental Economics and Policy,

    Efficient discrete-time simulations of continuous-time quantum query algorithms

    Full text link
    The continuous-time query model is a variant of the discrete query model in which queries can be interleaved with known operations (called "driving operations") continuously in time. Interesting algorithms have been discovered in this model, such as an algorithm for evaluating nand trees more efficiently than any classical algorithm. Subsequent work has shown that there also exists an efficient algorithm for nand trees in the discrete query model; however, there is no efficient conversion known for continuous-time query algorithms for arbitrary problems. We show that any quantum algorithm in the continuous-time query model whose total query time is T can be simulated by a quantum algorithm in the discrete query model that makes O[T log(T) / log(log(T))] queries. This is the first upper bound that is independent of the driving operations (i.e., it holds even if the norm of the driving Hamiltonian is very large). A corollary is that any lower bound of T queries for a problem in the discrete-time query model immediately carries over to a lower bound of \Omega[T log(log(T))/log (T)] in the continuous-time query model.Comment: 12 pages, 6 fig

    Adiabatic Quantum Computation and Deutsch's Algorithm

    Get PDF
    We show that by a suitable choice of a time dependent Hamiltonian, Deutsch's algorithm can be implemented by an adiabatic quantum computer. We extend our analysis to the Deutsch-Jozsa problem and estimate the required running time for both global and local adiabatic evolutions.Comment: 6 Pages, Revtex. Typos corrected, references added. Published versio

    Fast quantum algorithm for numerical gradient estimation

    Full text link
    Given a blackbox for f, a smooth real scalar function of d real variables, one wants to estimate the gradient of f at a given point with n bits of precision. On a classical computer this requires a minimum of d+1 blackbox queries, whereas on a quantum computer it requires only one query regardless of d. The number of bits of precision to which f must be evaluated matches the classical requirement in the limit of large n.Comment: additional references and minor clarifications and corrections to version

    Singlet states and the estimation of eigenstates and eigenvalues of an unknown Controlled-U gate

    Get PDF
    We consider several problems that involve finding the eigenvalues and generating the eigenstates of unknown unitary gates. We first examine Controlled-U gates that act on qubits, and assume that we know the eigenvalues. It is then shown how to use singlet states to produce qubits in the eigenstates of the gate. We then remove the assumption that we know the eigenvalues and show how to both find the eigenvalues and produce qubits in the eigenstates. Finally, we look at the case where the unitary operator acts on qutrits and has eigenvalues of 1 and -1, where the eigenvalue 1 is doubly degenerate. The eigenstates are unknown. We are able to use a singlet state to produce a qutrit in the eigenstate corresponding to the -1 eigenvalue.Comment: Latex, 10 pages, no figure

    Depth-Independent Lower bounds on the Communication Complexity of Read-Once Boolean Formulas

    Full text link
    We show lower bounds of Ω(n)\Omega(\sqrt{n}) and Ω(n1/4)\Omega(n^{1/4}) on the randomized and quantum communication complexity, respectively, of all nn-variable read-once Boolean formulas. Our results complement the recent lower bound of Ω(n/8d)\Omega(n/8^d) by Leonardos and Saks and Ω(n/2Ω(dlogd))\Omega(n/2^{\Omega(d\log d)}) by Jayram, Kopparty and Raghavendra for randomized communication complexity of read-once Boolean formulas with depth dd. We obtain our result by "embedding" either the Disjointness problem or its complement in any given read-once Boolean formula.Comment: 5 page
    corecore