Quantum mechanics has greatly impacted our understanding of microscopic nature. One of the key concepts of this theory is generalized measurements, which have proven useful in various quantum information processing ta...
详细信息
Quantum mechanics has greatly impacted our understanding of microscopic nature. One of the key concepts of this theory is generalized measurements, which have proven useful in various quantum information processing tasks. However, despite their significance, they have not yet been shown empirically to provide an advantage in quantum randomness certification and expansion protocols. This investigation explores scenarios where generalized measurements can yield more than 1 bit of certified randomness with a single-qubit system measurement on untrusted devices and against a quantum adversary. We compare the robustness of several protocols to exhibit the advantage of exploiting generalized measurements. In our analysis of experimental data, we were able to obtain 1.21 bits of min-entropy from a measurement taken on one qubit of an entangled state. We also obtained 1.07 bits of min-entropy from an experiment with quantum state preparation and generalized measurement on a single qubit. We also provide finite data analysis for a protocol using generalized measurements and the Entropy Accumulation Theorem. Our exploration demonstrates the potential of generalized measurements to improve the certification of quantum sources of randomness and enhance the security of quantum cryptographic protocols and other areas of quantum information.
Graph searching is a common approach to solving a problem of capturing a hostile intruder by a group of mobile agents. We assume that this task is performed in an environment which we are able to model as a graph G. T...
详细信息
ISBN:
(纸本)9788360779026
Graph searching is a common approach to solving a problem of capturing a hostile intruder by a group of mobile agents. We assume that this task is performed in an environment which we are able to model as a graph G. The question asked is how many agents are needed to capture an arbitrary fast, invisible and smart intruder. This number is called the (edge) search number of G. The strategy which must be performed by agents is called the (edge) search strategy. Unfortunately calculating both the optimal search strategy and the search number is NP-hard for general graphs. Furthermore, due to the complexity of the pursuit rules, the application of heuristic solutions is not straight forward. In this paper we suggest a method of applying genetic algorithms to solve graph searching problem. The idea is based on LaPaugh's result on graph searching monotonicity and utilizes representation of a search strategy as a permutation of edges.
We consider a list cost coloring of vertices and edges in the model of vertex, edge, total and pseudototal coloring of graphs. We use a dynamic programming approach to derive polynomial‐time algorithms for solving th...
We consider a list cost coloring of vertices and edges in the model of vertex, edge, total and pseudototal coloring of graphs. We use a dynamic programming approach to derive polynomial‐time algorithms for solving the above problems for trees. Then we generalize this approach to arbitrary graphs with bounded cyclomatic numbers.
This paper considers parallel machine scheduling with incompatibilities between jobs. The jobs form a graph equivalent to a collection of disjoint cliques. No two jobs in a clique are allowed to be assigned to the sam...
详细信息
A lot of research has been done in the field of graph coloring, yet there are no publicly released libraries available. This paper introduces such a library. This library is designed to meet several important criteria...
详细信息
A lot of research has been done in the field of graph coloring, yet there are no publicly released libraries available. This paper introduces such a library. This library is designed to meet several important criteria for industrial applications. Most importantly, it is designed with performance in mind. Several heuristic algorithms are implemented to deal with the NP-completeness. Further optimizations are done at the code level. The library is written in C++ with components that can be used independently. Upon completion, Koala will be released as open source, and free for educational use.
In this paper we consider a problem of job scheduling on parallel machines with a presence of incompatibilities between jobs. The incompatibility relation can be modeled as a complete multipartite graph in which each ...
详细信息
When performing an algorithm in the self-stabilizing model, a distributed system must achieve a desirable global state regardless of the initial state, whereas each node has only local information about the system. De...
详细信息
When performing an algorithm in the self-stabilizing model, a distributed system must achieve a desirable global state regardless of the initial state, whereas each node has only local information about the system. Depending on adopted assumptions concerning the model of simultaneous execution and scheduler fairness, some algorithms may differ in stabilization time or possibly not stabilize at all. Surprisingly, we show that the class of polynomially-solvable self-stabilizing problems is invariant with respect to the assumption of weak scheduler fairness. Furthermore, for systems with a single distinguished vertex we prove a much stronger equivalence, stating that synchronisation, the existence of a central scheduler and its fairness have no influence on polynomial stabilization time
In the paper, we describe a method for comparing arbitrary, not necessary fully resolved, unrooted phylogenetic trees. The proposed method is based on finding a minimum weight matching in bipartite graphs and can be r...
详细信息
In the paper, we describe a method for comparing arbitrary, not necessary fully resolved, unrooted phylogenetic trees. The proposed method is based on finding a minimum weight matching in bipartite graphs and can be regarded as a generalization of well-known Robinson-Foulds distance. We present some properties and advantages of the new distance. We also investigate some properties of the presented distance in a common biological problem of finding a single phylogenetic tree (consensus tree) that reliably represents a set of various phylogenetic trees. Finding a consensus tree (or a small set of such trees) is an important phase in the phylogenetic research, especially if a method that is chosen for the construction process returns a set of trees (for example the very popular Bayesian approach).
We examine the zero-visibility cops and robber graph searching model, which differs from the classical cops & robber game in one way: the robber is invisible. We show that this model is not monotonic. We also prov...
详细信息
One of the important problems in evolutionary biology is inferring phylogenetic trees for sets of related species. We introduce a new model for inferring phylogenies which is a generalization of the widely studied per...
详细信息
One of the important problems in evolutionary biology is inferring phylogenetic trees for sets of related species. We introduce a new model for inferring phylogenies which is a generalization of the widely studied perfect phylogeny model. The perfect phylogeny model assumes that a feature shared by a set of species cannot have evolved independently in any two of the species in the set, i.e. the species with this feature form a subtree in the correct phylogenetic tree. We briefly review earlier similar results on this subject and describe the difference between our model and the ones previously investigated. It turns out that the problem of finding a perfect phylogeny with restrictions is NP-complete even if the number of characters is 2. This contrasts with the complexity of finding unrestricted perfect phylogenies. On the other hand, the new model shows similar properties to the classical perfect phylogeny model in case where the number of cycles in each state transition graph is bounded by a small constant.
暂无评论