849 research outputs found
Quantum matchgate computations and linear threshold gates
The theory of matchgates is of interest in various areas in physics and
computer science. Matchgates occur in e.g. the study of fermions and spin
chains, in the theory of holographic algorithms and in several recent works in
quantum computation. In this paper we completely characterize the class of
boolean functions computable by unitary two-qubit matchgate circuits with some
probability of success. We show that this class precisely coincides with that
of the linear threshold gates. The latter is a fundamental family which appears
in several fields, such as the study of neural networks. Using the above
characterization, we further show that the power of matchgate circuits is
surprisingly trivial in those cases where the computation is to succeed with
high probability. In particular, the only functions that are
matchgate-computable with success probability greater than 3/4 are functions
depending on only a single bit of the input
On Byzantine Broadcast in Loosely Connected Networks
We consider the problem of reliably broadcasting information in a multihop
asynchronous network that is subject to Byzantine failures. Most existing
approaches give conditions for perfect reliable broadcast (all correct nodes
deliver the authentic message and nothing else), but they require a highly
connected network. An approach giving only probabilistic guarantees (correct
nodes deliver the authentic message with high probability) was recently
proposed for loosely connected networks, such as grids and tori. Yet, the
proposed solution requires a specific initialization (that includes global
knowledge) of each node, which may be difficult or impossible to guarantee in
self-organizing networks - for instance, a wireless sensor network, especially
if they are prone to Byzantine failures. In this paper, we propose a new
protocol offering guarantees for loosely connected networks that does not
require such global knowledge dependent initialization. In more details, we
give a methodology to determine whether a set of nodes will always deliver the
authentic message, in any execution. Then, we give conditions for perfect
reliable broadcast in a torus network. Finally, we provide experimental
evaluation for our solution, and determine the number of randomly distributed
Byzantine failures than can be tolerated, for a given correct broadcast
probability.Comment: 1
A Scalable Byzantine Grid
Modern networks assemble an ever growing number of nodes. However, it remains
difficult to increase the number of channels per node, thus the maximal degree
of the network may be bounded. This is typically the case in grid topology
networks, where each node has at most four neighbors. In this paper, we address
the following issue: if each node is likely to fail in an unpredictable manner,
how can we preserve some global reliability guarantees when the number of nodes
keeps increasing unboundedly ? To be more specific, we consider the problem or
reliably broadcasting information on an asynchronous grid in the presence of
Byzantine failures -- that is, some nodes may have an arbitrary and potentially
malicious behavior. Our requirement is that a constant fraction of correct
nodes remain able to achieve reliable communication. Existing solutions can
only tolerate a fixed number of Byzantine failures if they adopt a worst-case
placement scheme. Besides, if we assume a constant Byzantine ratio (each node
has the same probability to be Byzantine), the probability to have a fatal
placement approaches 1 when the number of nodes increases, and reliability
guarantees collapse. In this paper, we propose the first broadcast protocol
that overcomes these difficulties. First, the number of Byzantine failures that
can be tolerated (if they adopt the worst-case placement) now increases with
the number of nodes. Second, we are able to tolerate a constant Byzantine
ratio, however large the grid may be. In other words, the grid becomes
scalable. This result has important security applications in ultra-large
networks, where each node has a given probability to misbehave.Comment: 17 page
Small Universal Accepting Networks of Evolutionary Processors with Filtered Connections
In this paper, we present some results regarding the size complexity of
Accepting Networks of Evolutionary Processors with Filtered Connections
(ANEPFCs). We show that there are universal ANEPFCs of size 10, by devising a
method for simulating 2-Tag Systems. This result significantly improves the
known upper bound for the size of universal ANEPFCs which is 18.
We also propose a new, computationally and descriptionally efficient
simulation of nondeterministic Turing machines by ANEPFCs. More precisely, we
describe (informally, due to space limitations) how ANEPFCs with 16 nodes can
simulate in O(f(n)) time any nondeterministic Turing machine of time complexity
f(n). Thus the known upper bound for the number of nodes in a network
simulating an arbitrary Turing machine is decreased from 26 to 16
Self-Stabilizing Byzantine Resilient Topology Discovery and Message Delivery
Traditional Byzantine resilient algorithms use vertex disjoint paths to ensure message delivery in the presence of up to f Byzantine nodes. The question of how these paths are identified is related to the fundamental problem of topology discovery. Distributed algorithms for topology discovery cope with a never ending task, dealing with frequent changes in the network topology and unpredictable transient faults. Therefore, algorithms for topology discovery should be self-stabilizing to ensure convergence of the topology information following any such unpredictable sequence of events. We present the first such algorithm that can cope with Byzantine nodes. Starting in an arbitrary global state, and in the presence of f Byzantine nodes, each node is eventually aware of all the other non-Byzantine nodes and their connecting communication links. Using the topology information, nodes can, for example, route messages across the network and deliver messages from one end user to another. We present the first deterministic, cryptographic-assumptions-free, self-stabilizing, Byzantine-resilient algorithms for network topology discovery and end-to-end message delivery. We also consider the task of r-neighborhood discovery for the case in which and the degree of nodes are bounded by constants. The use of r-neighborhood discovery facilitates polynomial time, communication and space solutions for the above tasks. The obtained algorithms can be used to authenticate parties, in particular during the establishment of private secrets, thus forming public key schemes that are resistant to man-in-the-middle attacks of the compromised Byzantine nodes. A polynomial and efficient end-to-end algorithm that is based on the established private secrets can be employed in between periodical re-establishments of the secrets
Perceptron capacity revisited: classification ability for correlated patterns
In this paper, we address the problem of how many randomly labeled patterns
can be correctly classified by a single-layer perceptron when the patterns are
correlated with each other. In order to solve this problem, two analytical
schemes are developed based on the replica method and Thouless-Anderson-Palmer
(TAP) approach by utilizing an integral formula concerning random rectangular
matrices. The validity and relevance of the developed methodologies are shown
for one known result and two example problems. A message-passing algorithm to
perform the TAP scheme is also presented
Helical Chirality: a Link between Local Interactions and Global Topology in DNA
DNA supercoiling plays a major role in many cellular functions. The global DNA conformation is however intimately linked to local DNA-DNA interactions influencing both the physical properties and the biological functions of the supercoiled molecule. Juxtaposition of DNA double helices in ubiquitous crossover arrangements participates in multiple functions such as recombination, gene regulation and DNA packaging. However, little is currently known about how the structure and stability of direct DNA-DNA interactions influence the topological state of DNA. Here, a crystallographic analysis shows that due to the intrinsic helical chirality of DNA, crossovers of opposite handedness exhibit markedly different geometries. While right-handed crossovers are self-fitted by sequence-specific groove-backbone interaction and bridging Mg2+ sites, left-handed crossovers are juxtaposed by groove-groove interaction. Our previous calculations have shown that the different geometries result in differential stabilisation in solution, in the presence of divalent cations. The present study reveals that the various topological states of the cell are associated with different inter-segmental interactions. While the unstable left-handed crossovers are exclusively formed in negatively supercoiled DNA, stable right-handed crossovers constitute the local signature of an unusual topological state in the cell, such as the positively supercoiled or relaxed DNA. These findings not only provide a simple mechanism for locally sensing the DNA topology but also lead to the prediction that, due to their different tertiary intra-molecular interactions, supercoiled molecules of opposite signs must display markedly different physical properties. Sticky inter-segmental interactions in positively supercoiled or relaxed DNA are expected to greatly slow down the slithering dynamics of DNA. We therefore suggest that the intrinsic helical chirality of DNA may have oriented the early evolutionary choices for DNA topology
Complex dynamics of elementary cellular automata emerging from chaotic rules
We show techniques of analyzing complex dynamics of cellular automata (CA)
with chaotic behaviour. CA are well known computational substrates for studying
emergent collective behaviour, complexity, randomness and interaction between
order and chaotic systems. A number of attempts have been made to classify CA
functions on their space-time dynamics and to predict behaviour of any given
function. Examples include mechanical computation, \lambda{} and Z-parameters,
mean field theory, differential equations and number conserving features. We
aim to classify CA based on their behaviour when they act in a historical mode,
i.e. as CA with memory. We demonstrate that cell-state transition rules
enriched with memory quickly transform a chaotic system converging to a complex
global behaviour from almost any initial condition. Thus just in few steps we
can select chaotic rules without exhaustive computational experiments or
recurring to additional parameters. We provide analysis of well-known chaotic
functions in one-dimensional CA, and decompose dynamics of the automata using
majority memory exploring glider dynamics and reactions
- …