26,292 research outputs found
Hadwiger's conjecture for 3-arc graphs
The 3-arc graph of a digraph is defined to have vertices the arcs of
such that two arcs are adjacent if and only if and are
distinct arcs of with , and adjacent.
We prove that Hadwiger's conjecture holds for 3-arc graphs
Superposition as memory: unlocking quantum automatic complexity
Imagine a lock with two states, "locked" and "unlocked", which may be
manipulated using two operations, called 0 and 1. Moreover, the only way to
(with certainty) unlock using four operations is to do them in the sequence
0011, i.e., where . In this scenario one might think that the
lock needs to be in certain further states after each operation, so that there
is some memory of what has been done so far. Here we show that this memory can
be entirely encoded in superpositions of the two basic states "locked" and
"unlocked", where, as dictated by quantum mechanics, the operations are given
by unitary matrices. Moreover, we show using the Jordan--Schur lemma that a
similar lock is not possible for .
We define the semi-classical quantum automatic complexity of a
word as the infimum in lexicographic order of those pairs of nonnegative
integers such that there is a subgroup of the projective unitary
group PU with and with such that, in terms of a
standard basis and with , we have
and for all with . We show that is
unbounded and not constant for strings of a given length. In particular, and
.Comment: Lecture Notes in Computer Science, UCNC (Unconventional Computation
and Natural Computation) 201
Cooperation with an Untrusted Relay: A Secrecy Perspective
We consider the communication scenario where a source-destination pair wishes
to keep the information secret from a relay node despite wanting to enlist its
help. For this scenario, an interesting question is whether the relay node
should be deployed at all. That is, whether cooperation with an untrusted relay
node can ever be beneficial. We first provide an achievable secrecy rate for
the general untrusted relay channel, and proceed to investigate this question
for two types of relay networks with orthogonal components. For the first
model, there is an orthogonal link from the source to the relay. For the second
model, there is an orthogonal link from the relay to the destination. For the
first model, we find the equivocation capacity region and show that answer is
negative. In contrast, for the second model, we find that the answer is
positive. Specifically, we show by means of the achievable secrecy rate based
on compress-and-forward, that, by asking the untrusted relay node to relay
information, we can achieve a higher secrecy rate than just treating the relay
as an eavesdropper. For a special class of the second model, where the relay is
not interfering itself, we derive an upper bound for the secrecy rate using an
argument whose net effect is to separate the eavesdropper from the relay. The
merit of the new upper bound is demonstrated on two channels that belong to
this special class. The Gaussian case of the second model mentioned above
benefits from this approach in that the new upper bound improves the previously
known bounds. For the Cover-Kim deterministic relay channel, the new upper
bound finds the secrecy capacity when the source-destination link is not worse
than the source-relay link, by matching with the achievable rate we present.Comment: IEEE Transactions on Information Theory, submitted October 2008,
revised October 2009. This is the revised versio
- …