Recent work has extended Bell’s theorem by quantifying the amount of communication required to simulate entangled quantum systems with classical information. The general scenario is that a bipartite measurement is gi...
详细信息
Recent work has extended Bell’s theorem by quantifying the amount of communication required to simulate entangled quantum systems with classical information. The general scenario is that a bipartite measurement is given from a set of possibilities and the goal is to find a classical scheme that reproduces exactly the correlations that arise when an actual quantum system is measured. Previous results have shown that, using local hidden variables, a finite amount of communication suffices to simulate the correlations for a Bell state. We extend this in a number of ways. First, we show that, when the communication is merely required to be finite on average, Bell states can be simulated without any local hidden variables. More generally, we show that arbitrary positive operator valued measurements on systems of n Bell states can be simulated with O(n2n) bits of communication on average (again, without local hidden variables). On the other hand, when the communication is required to be absolutely bounded, we show that a finite number of bits of local hidden variables is insufficient to simulate a Bell state. This latter result is based on an analysis of the nondeterministic communication complexity of the NOT-EQUAL function, which is constant in the quantum model and logarithmic in the classical model.
Many distributed applications executed on networks of workstations (NOWs) require the interconnection network to provide some quality of service (QoS) support. These networks must be able to support topology changes (...
详细信息
Networks of Workstations (NOWs) are usually arranged as a set of interconnected switches with hosts connected to switch ports through interface cards. Several commercial interconnects for high-speed NOWs use up✶/down✶...
详细信息
Previous studies have shown that correct identification of the conduit border is a crucial factor for an accurate stroke volume measurement. This paper describes a method that automatically defines conduit boundaries ...
详细信息
Previous studies have shown that correct identification of the conduit border is a crucial factor for an accurate stroke volume measurement. This paper describes a method that automatically defines conduit boundaries from a synthetically generated M-Mode image of the left ventricular outflow tract (LVOT). Unlike the existing methods that define conduit boundaries based solely on single-frame analysis, this method uses LVOT boundaries of adjacent frames to measure the conduit diameter. By using spline curves that are generated from the neighboring conduit boundaries, this technique estimates the LVOT diameter even in a noisy image where conduit boundaries are not clear. The conduit diameter calculated by this method shows close agreement with manual measurements by two independent observers.
Software visualization is an area of computerscience devoted to supporting the understanding and effective use of algorithms. The application of software visualization to Evolutionary Computation has been receiving i...
详细信息
computer architects increasingly depend on the use of software tools to evaluate and investigate the design of computer systems. It is therefore very important that educators in this field promote extensive tool-based...
详细信息
ISBN:
(纸本)9781450347303
computer architects increasingly depend on the use of software tools to evaluate and investigate the design of computer systems. It is therefore very important that educators in this field promote extensive tool-based student experimentation in architecture classes. However, the integration of today's complex architecture tools into curricula poses several challenges to an instructor, including management of powerful computing resources, software installation and maintenance, and development of tool-specific educational material. This paper describes how these challenges are addressed by a universally accessible network-computing infrastructure - NETCARE - that provides educators with a Web portal to access computing resources, executable tools and educational material. Copyright held by author.
This paper describes the results of testing 50 single inline memory modules (SIMMs) each containing 16 16 Mbit DRAM chips (DUTs); 39 SIMMs failed, and of the 800 DUTs, 116 failed. In total 54 different test algorithms...
详细信息
This paper describes the results of testing 50 single inline memory modules (SIMMs) each containing 16 16 Mbit DRAM chips (DUTs); 39 SIMMs failed, and of the 800 DUTs, 116 failed. In total 54 different test algorithms have been applied, using up to 168 different stress combinations for each test. The results show that GAL9R is the best test. Furthermore, it is shown that burst mode tests detect a completely different class of faults as compared with traditional word mode tests, and that tests with address scrambling enabled the detection of more faults.
Previous studies have shown that correct identification of the conduit border is a crucial factor for an accurate stroke volume measurement. This paper describes a method that automatically defines conduit boundaries ...
详细信息
Previous studies have shown that correct identification of the conduit border is a crucial factor for an accurate stroke volume measurement. This paper describes a method that automatically defines conduit boundaries from a synthetically generated M-mode image of the left ventricular outflow tract (LVOT). Unlike the existing methods that define conduit boundaries based solely on single-frame analysis, this method uses LVOT boundaries of adjacent frames to measure the conduit diameter. By using spline curves that are generated from the neighboring conduit boundaries, this technique estimates the LVOT diameter even in a noisy image where conduit boundaries are not clear. The conduit diameter calculated by this method shows close agreement with manual measurement by two independent observers.
Distributed robotics uses multiple robots through coordination of task to solve problems. Developing a distributed robotic system introduces a number of challenges, one of which is the intra-robot communication and ne...
详细信息
Distributed robotics uses multiple robots through coordination of task to solve problems. Developing a distributed robotic system introduces a number of challenges, one of which is the intra-robot communication and networking of data and commands. Due to the characteristics of the targeted robotic missions and environments, the wireless networking requirements impose stringent constraints in terms of available memory, processing, and power consumption. Designing under these constraints and still providing support for such functions as synchronous commands and proxy processing is the true challenge. This paper discusses research in providing a lightweight wireless routing/networking solution that can dynamically tune the intra-robotic networking to adapt to the robotic team's mission needs and the environment situation encountered.
暂无评论