382 research outputs found
Lower bounds on the size of semidefinite programming relaxations
We introduce a method for proving lower bounds on the efficacy of
semidefinite programming (SDP) relaxations for combinatorial problems. In
particular, we show that the cut, TSP, and stable set polytopes on -vertex
graphs are not the linear image of the feasible region of any SDP (i.e., any
spectrahedron) of dimension less than , for some constant .
This result yields the first super-polynomial lower bounds on the semidefinite
extension complexity of any explicit family of polytopes.
Our results follow from a general technique for proving lower bounds on the
positive semidefinite rank of a matrix. To this end, we establish a close
connection between arbitrary SDPs and those arising from the sum-of-squares SDP
hierarchy. For approximating maximum constraint satisfaction problems, we prove
that SDPs of polynomial-size are equivalent in power to those arising from
degree- sum-of-squares relaxations. This result implies, for instance,
that no family of polynomial-size SDP relaxations can achieve better than a
7/8-approximation for MAX-3-SAT
Perfect initialization of a quantum computer of neutral atoms in an optical lattice of large lattice constant
We propose a scheme for the initialization of a quantum computer based on
neutral atoms trapped in an optical lattice with large lattice constant. Our
focus is the development of a compacting scheme to prepare a perfect optical
lattice of simple orthorhombic structure with unit occupancy. Compacting is
accomplished by sequential application of two types of operations: a flip
operator that changes the internal state of the atoms, and a shift operator
that moves them along the lattice principal axis. We propose physical
mechanisms for realization of these operations and we study the effects of
motional heating of the atoms. We carry out an analysis of the complexity of
the compacting scheme and show that it scales linearly with the number of
lattice sites per row of the lattice, thus showing good scaling behavior with
the size of the quantum computer.Comment: 18 page
Adiabatic Quantum Computing with Phase Modulated Laser Pulses
Implementation of quantum logical gates for multilevel system is demonstrated
through decoherence control under the quantum adiabatic method using simple
phase modulated laser pulses. We make use of selective population inversion and
Hamiltonian evolution with time to achieve such goals robustly instead of the
standard unitary transformation language.Comment: 19 pages, 6 figures, submitted to JOP
The Complexity of Fixed-Height Patterned Tile Self-Assembly
We characterize the complexity of the PATS problem for patterns of fixed
height and color count in variants of the model where seed glues are either
chosen or fixed and identical (so-called non-uniform and uniform variants). We
prove that both variants are NP-complete for patterns of height 2 or more and
admit O(n)-time algorithms for patterns of height 1. We also prove that if the
height and number of colors in the pattern is fixed, the non-uniform variant
admits a O(n)-time algorithm while the uniform variant remains NP-complete. The
NP-completeness results use a new reduction from a constrained version of a
problem on finite state transducers.Comment: An abstract version appears in the proceedings of CIAA 201
On formal verification of arithmetic-based cryptographic primitives
Cryptographic primitives are fundamental for information security: they are
used as basic components for cryptographic protocols or public-key
cryptosystems. In many cases, their security proofs consist in showing that
they are reducible to computationally hard problems. Those reductions can be
subtle and tedious, and thus not easily checkable. On top of the proof
assistant Coq, we had implemented in previous work a toolbox for writing and
checking game-based security proofs of cryptographic primitives. In this paper
we describe its extension with number-theoretic capabilities so that it is now
possible to write and check arithmetic-based cryptographic primitives in our
toolbox. We illustrate our work by machine checking the game-based proofs of
unpredictability of the pseudo-random bit generator of Blum, Blum and Shub, and
semantic security of the public-key cryptographic scheme of Goldwasser and
Micali.Comment: 13 page
Security of practical private randomness generation
Measurements on entangled quantum systems necessarily yield outcomes that are
intrinsically unpredictable if they violate a Bell inequality. This property
can be used to generate certified randomness in a device-independent way, i.e.,
without making detailed assumptions about the internal working of the quantum
devices used to generate the random numbers. Furthermore these numbers are also
private, i.e., they appear random not only to the user, but also to any
adversary that might possess a perfect description of the devices. Since this
process requires a small initial random seed, one usually speaks of
device-independent randomness expansion.
The purpose of this paper is twofold. First, we point out that in most real,
practical situations, where the concept of device-independence is used as a
protection against unintentional flaws or failures of the quantum apparatuses,
it is sufficient to show that the generated string is random with respect to an
adversary that holds only classical-side information, i.e., proving randomness
against quantum-side information is not necessary. Furthermore, the initial
random seed does not need to be private with respect to the adversary, provided
that it is generated in a way that is independent from the measured systems.
The devices, though, will generate cryptographically-secure randomness that
cannot be predicted by the adversary and thus one can, given access to free
public randomness, talk about private randomness generation.
The theoretical tools to quantify the generated randomness according to these
criteria were already introduced in [S. Pironio et al, Nature 464, 1021
(2010)], but the final results were improperly formulated. The second aim of
this paper is to correct this inaccurate formulation and therefore lay out a
precise theoretical framework for practical device-independent randomness
expansion.Comment: 18 pages. v3: important changes: the present version focuses on
security against classical side-information and a discussion about the
significance of these results has been added. v4: minor changes. v5: small
typos correcte
Systemic Immunosuppression for Limbal Allograft and Allogenic Limbal Epithelial Cell Transplantation
Bilateral limbal stem cell deficiency (LSCD) treatment requires the need to obtain allogenic limbal tissue for transplantation. Outcomes of different surgical techniques depend on multiple factors, including the underlying etiology, ocular surface, eyelid status and used surgical intervention. Some of the management options for bilateral LSCD include cadaveric, living related or living non-related conjunctival limbal allograft (CLAL), keratolimbal allograft (KLAL), allogenic cultured limbal epithelial transplantation (CLET) and allogenic simple limbal epithelial transplantation (SLET). Systemic immunosuppressive therapy plays a pivotal role in survival of transplanted tissue. The present review focuses on different systemic immunosuppression protocols for limbal allograft and allogenic limbal epithelial cell transplantation, with specific emphasis on different surgical techniques and their outcomes. We included all reports with details of different systemic immunosuppression protocols for limbal allograft and allogenic limbal epithelial cell transplantation. Oral cyclosporine A at different doses is the most commonly used immunosuppressive agent in limbal allograft and allogenic limbal epithelial cell transplantation. However, different studies using oral mycophenolate mofetil and tacrolimus also reported good results. In conclusion, systemic immunosuppression protocols for limbal allograft and allogenic limbal epithelial cell transplantation are not standardized. Further studies regarding different surgical techniques should assess outcomes and adverse effects of such protocols
RIDA: Robust Intrusion Detection in Ad Hoc Networks
We focus on detecting intrusions in wireless ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also generate false positives. Combining theories of hypothesis testing and approximation algorithms, we develop a framework to counter different threats while minimizing the resource consumption. We obtain computationally simple optimal rules for aggregating and thereby minimizing the errors in the decisions of the nodes executing the intrusion detection software (IDS) modules. But, we show that the selection of the optimal set of nodes for executing the IDS is an NP-hard problem. We present a polynomial complexity selection algorithm that attains a guaranteeable approximation bound. We also modify this algorithm to allow for seamless operation in time varying topologies, and evaluate the efficacy of the approximation algorithm and its modifications using simulation. We identify a selection algorithm that attains a good balance between performance and complexity for attaining robust intrusion detection in ad hoc networks
Improved Error-Scaling for Adiabatic Quantum State Transfer
We present a technique that dramatically improves the accuracy of adiabatic
state transfer for a broad class of realistic Hamiltonians. For some systems,
the total error scaling can be quadratically reduced at a fixed maximum
transfer rate. These improvements rely only on the judicious choice of the
total evolution time. Our technique is error-robust, and hence applicable to
existing experiments utilizing adiabatic passage. We give two examples as
proofs-of-principle, showing quadratic error reductions for an adiabatic search
algorithm and a tunable two-qubit quantum logic gate.Comment: 10 Pages, 4 figures. Comments are welcome. Version substantially
revised to generalize results to cases where several derivatives of the
Hamiltonian are zero on the boundar
Hypergraphic LP Relaxations for Steiner Trees
We investigate hypergraphic LP relaxations for the Steiner tree problem,
primarily the partition LP relaxation introduced by Koenemann et al. [Math.
Programming, 2009]. Specifically, we are interested in proving upper bounds on
the integrality gap of this LP, and studying its relation to other linear
relaxations. Our results are the following. Structural results: We extend the
technique of uncrossing, usually applied to families of sets, to families of
partitions. As a consequence we show that any basic feasible solution to the
partition LP formulation has sparse support. Although the number of variables
could be exponential, the number of positive variables is at most the number of
terminals. Relations with other relaxations: We show the equivalence of the
partition LP relaxation with other known hypergraphic relaxations. We also show
that these hypergraphic relaxations are equivalent to the well studied
bidirected cut relaxation, if the instance is quasibipartite. Integrality gap
upper bounds: We show an upper bound of sqrt(3) ~ 1.729 on the integrality gap
of these hypergraph relaxations in general graphs. In the special case of
uniformly quasibipartite instances, we show an improved upper bound of 73/60 ~
1.216. By our equivalence theorem, the latter result implies an improved upper
bound for the bidirected cut relaxation as well.Comment: Revised full version; a shorter version will appear at IPCO 2010
- …