- arXiv.org
- Popular Physics
- Space Physics
- Data Analysis, Statistics and Probability
- General Physics
- Optics
- Physics and Society
- Atomic and Molecular Clusters
- Fluid Dynamics
- Biological Physics
- History and Philosophy of Physics
- Geophysics
- Atomic Physics
- Plasma Physics
- Medical Physics
- Atmospheric and Oceanic Physics
- Instrumentation and Detectors
- Computational Physics
- Chemical Physics
- Classical Physics
- Accelerator Physics
- Physics Education

- Analysis of PDEs
- Statistics Theory
- Number Theory
- Information Theory
- History and Overview
- Algebraic Geometry
- Mathematical Physics
- Complex Variables
- Representation Theory
- Probability
- Group Theory
- Combinatorics
- Operator Algebras
- Metric Geometry
- Symplectic Geometry
- Quantum Algebra
- Differential Geometry
- Optimization and Control
- Dynamical Systems
- Numerical Analysis
- Geometric Topology
- General Topology
- Logic
- General Mathematics
- Spectral Theory
- Classical Analysis and ODEs
- Algebraic Topology
- Functional Analysis
- Rings and Algebras
- Commutative Algebra
- Category Theory
- K-Theory and Homology

- General Literature
- Symbolic Computation
- Information Retrieval
- Computational Complexity
- Information Theory
- Multiagent Systems
- Formal Languages and Automata Theory
- Other Computer Science
- Sound
- Social and Information Networks
- Databases
- Computer Vision and Pattern Recognition
- Learning
- Numerical Analysis
- Neural and Evolutionary Computing
- Programming Languages
- Operating Systems
- Software Engineering
- Emerging Technologies
- Computational Engineering, Finance, and Science
- Discrete Mathematics
- Distributed, Parallel, and Cluster Computing
- Systems and Control
- Hardware Architecture
- Computer Science and Game Theory
- Digital Libraries
- Artificial Intelligence
- Cryptography and Security
- Human-Computer Interaction
- Performance
- Mathematical Software
- Data Structures and Algorithms
- Robotics
- Multimedia
- Computation and Language
- Computational Geometry
- Networking and Internet Architecture
- Computers and Society
- Logic in Computer Science
- Graphics

- Phase retrieval refers to recovering a signal from its Fourier magnitude. This problem arises naturally in many scientific applications, such as ultra-short laser pulse characterization and diffraction imaging. Unfortunately, phase retrieval is ill-posed for almost all one-dimensional signals. In order to characterize a laser pulse and overcome the ill-posedness, it is common to use a technique called Frequency-Resolved Optical Gating (FROG). In FROG, the measured data, referred to as FROG trace, is the Fourier magnitude of the product of the underlying signal with several translated versions of itself. The FROG trace results in a system of phaseless quartic Fourier measurements. In this paper, we prove that it suffices to consider only three translations of the signal to determine almost all bandlimited signals, up to trivial ambiguities. In practice, one usually also has access to the signal's Fourier magnitude. We show that in this case only two translations suffice. Our results significantly improve upon earlier work.
- This letter considers two groups of source nodes. Each group transmits packets to its own designated destination node over single-hop links and via a cluster of relay nodes shared by both groups. In an effort to boost reliability without sacrificing throughput, a scheme is proposed, whereby packets at the relay nodes are combined using two methods; packets delivered by different groups are mixed using non-orthogonal multiple access principles, while packets originating from the same group are mixed using random linear network coding. An analytical framework that characterizes the performance of the proposed scheme is developed, compared to simulation results and benchmarked against a counterpart scheme that is based on orthogonal multiple access.
- Distributed compression is the task of compressing correlated data by several parties, each one possessing one piece of data and acting separately. The classical Slepian-Wolf theorem (D. Slepian, J. K. Wolf, IEEE Transactions on Inf. Theory, 1973) shows that if data is generated by independent draws from a joint distribution, that is by a memoryless stochastic process, then distributed compression can achieve the same compression rates as centralized compression when the parties act together. Recently, the author (M. Zimand, STOC 2017) has obtained an analogue version of the Slepian-Wolf theorem in the framework of Algorithmic Information Theory (also known as Kolmogorov complexity). The advantage over the classical theorem, is that the AIT version works for individual strings, without any assumption regarding the generative process. The only requirement is that the parties know the complexity profile of the input strings, which is a simple quantitative measure of the data correlation. The goal of this paper is to present in an accessible form that omits some technical details the main ideas from the reference (M. Zimand, STOC 2017).
- This is the first paper of a two-long series in which we study linear generalized inverses that minimize matrix norms. Such generalized inverses are famously represented by the Moore-Penrose pseudoinverse (MPP) which happens to minimize the Frobenius norm. Freeing up the degrees of freedom associated with Frobenius optimality enables us to promote other interesting properties. In this Part I, we look at the basic properties of norm-minimizing generalized inverses, especially in terms of uniqueness and relation to the MPP. We first show that the MPP minimizes many norms beyond those unitarily invariant, thus further bolstering its role as a robust choice in many situations. We then concentrate on some norms which are generally not minimized by the MPP, but whose minimization is relevant for linear inverse problems and sparse representations. In particular, we look at mixed norms and the induced $\ell^p \rightarrow \ell^q$ norms. An interesting representative is the sparse pseudoinverse which we study in much more detail in Part II. Next, we shift attention from norms to matrices with interesting behaviors. We exhibit a class whose generalized inverse is always the MPP-even for norms that normally result in different inverses-and a class for which many generalized inverses coincide, but not with the MPP. Finally, we discuss efficient computation of norm-minimizing generalized inverses.
- We study the problem of communication over compound quantum channel in the presence of entanglement. Classically such channels are modeled as a collection of conditional probability distributions wherein neither the sender nor the receiver is aware of the channel being used for transmission, except for the fact that it belongs to this collection. We provide achievability and converse bounds for this problem in the one shot quantum setting in terms of quantum hypothesis testing divergence. Our achievability proof is similar in spirit to its classical counterpart. To arrive at our result, we use the technique of position based decoding along with a new approach for constructing a union of two projectors, which can be of independent interest.
- This paper presents a method to reduce the complexity of the deterministic maximum likelihood (DML) estimator in the wideband direction-of-arrival (WDOA) problem, which is based on interpolating the array projection matrix in the temporal frequency variable. It is shown that an accurate interpolator like Chebyshev's is able to produce DML cost functions comprising just a few narrowband-like summands. Actually, the number of such summands is far smaller (roughly by factor ten in the numerical examples) than the corresponding number in the ML cost function that is derived by dividing the spectrum into separate bins. The paper also presents two spin-offs of the interpolation method. The first is a fast procedure to compute one-dimensional search estimators like Multiple Signal Classification (MUSIC), that exploits the close relation between Chebyshev interpolation and the Discrete Cosine Transform (DCT). And the second is a detection-estimation procedure for the DML estimator. The methods in the paper are assessed in several numerical examples.
- This article provides an overview of power-domain non-orthogonal multiple access for 5G systems. The basic concepts and benefits are briefly presented, along with current solutions and standardization activities. In addition, limitations and research challenges are discussed.
- It was recently conjectured by Vivo, Pato, and Oshanin [Phys. Rev. E 93, 052106 (2016)] that for a quantum system of Hilbert dimension $mn$ in a pure state, the variance of the von Neumann entropy of a subsystem of dimension $m\leq n$ is given by \beginequation* -\psi_1\left(mn+1\right)+\fracm+nmn+1\psi_1\left(n\right)-\frac(m+1)(m+2n+1)4n^2(mn+1), \endequation* where $\psi_{1}(\cdot)$ is the trigamma function. We give a proof of this formula.
- This paper explores the relationship between two ideas in network information theory: edge removal and strong converses. Edge removal properties state that if an edge of small capacity is removed from a network, the capacity region does not change too much. Strong converses state that, for rates outside the capacity region, the probability of error converges to 1. Various notions of edge removal and strong converse are defined, depending on how edge capacity and residual error probability scale with blocklength, and relations between them are proved. In particular, each class of strong converse implies a specific class of edge removal. The opposite directions are proved for deterministic networks. Furthermore, a technique based on a novel causal version of the blowing-up lemma is used to prove that for discrete memoryless stationary networks, the weak edge removal property---that the capacity region changes continuously as the capacity of an edge vanishes---is equivalent to the exponentially strong converse---that outside the capacity region, the probability of error goes to 1 exponentially fast. This result is used to prove exponentially strong converses for several examples---including the cut-set bound and the discrete 2-user interference channel with strong interference---with only a small variation from traditional weak converse proofs.
- The existence of an extremal self-dual binary linear code of length 120 is a long-standing open problem. We continue the investigation of its automorphism group, proving that automorphisms of order 8, 30 and 57 cannot occur. Supposing the involutions acting fixed point freely, we show that the automorphism group is of order at most 120, with further restrictions. Finally, we present some necessary conditions for the existence of the code, based on its shadow and on design theory.
- The $p$-set, which is in a simple analytic form, is well distributed in unit cubes. The well-known Weil's exponential sum theorem presents an upper bound of the exponential sum over the $p$-set. Based on the result, one shows that the $p$-set performs well in numerical integration, in compressed sensing as well as in UQ. However, $p$-set is somewhat rigid since the cardinality of the $p$-set is a prime $p$ and the set only depends on the prime number $p$. The purpose of this paper is to present generalizations of $p$-sets, say $\mathcal{P}_{d,p}^{{\mathbf a},\epsilon}$, which is more flexible. Particularly, when a prime number $p$ is given, we have many different choices of the new $p$-sets. Under the assumption that Goldbach conjecture holds, for any even number $m$, we present a point set, say ${\mathcal L}_{p,q}$, with cardinality $m-1$ by combining two different new $p$-sets, which overcomes a major bottleneck of the $p$-set. We also present the upper bounds of the exponential sums over $\mathcal{P}_{d,p}^{{\mathbf a},\epsilon}$ and ${\mathcal L}_{p,q}$, which imply these sets have many potential applications.
- We study the problem of online power control for energy harvesting communication nodes with random energy arrivals and a finite battery. We assume a block i.i.d. stochastic model for the energy arrivals, in which the energy arrivals are constant for a fixed duration $T$, but are independent across different blocks, drawn from an arbitrary distribution. This model serves as a simple approximation to a random process with coherence time $T$. We propose a simple online power control policy, and prove that its performance gap to the optimal throughput is bounded by a constant which is independent of the parameters of the problem. This also yields a simple formula for the approximately optimal long-term average throughput, which sheds some light on the qualitative behavior of the throughput and how it depends on the coherence time of the energy arrival process. Our results show that, perhaps counter-intuitively, for a fixed mean energy arrival rate the throughput decreases with increasing coherence time $T$ of the energy arrival process. In particular, the battery size needed to approach the AWGN capacity of the channel increases linearly with the coherence time of the process. Finally, we show that our results can provide an approximation to the information-theoretic capacity of the same channel.
- It is very difficult to solve the Maximum Mutual Information (MMI) or Maximum Likelihood (ML) for all possible Shannon Channels or uncertain rules of choosing hypotheses, so that we have to use iterative methods. According to the Semantic Mutual Information (SMI) and R(G) function proposed by Chenguang Lu (1993) (where R(G) is an extension of information rate distortion function R(D), and G is the lower limit of the SMI), we can obtain a new iterative algorithm of solving the MMI and ML for tests, estimations, and mixture models. The SMI is defined by the average log normalized likelihood. The likelihood function is produced from the truth function and the prior by semantic Bayesian inference. A group of truth functions constitute a semantic channel. Letting the semantic channel and Shannon channel mutually match and iterate, we can obtain the Shannon channel that maximizes the Shannon mutual information and the average log likelihood. This iterative algorithm is called Channels' Matching algorithm or the CM algorithm. The convergence can be intuitively explained and proved by the R(G) function. Several iterative examples for tests, estimations, and mixture models show that the computation of the CM algorithm is simple (which can be demonstrated in excel files). For most random examples, the numbers of iterations for convergence are close to 5. For mixture models, the CM algorithm is similar to the EM algorithm; however, the CM algorithm has better convergence and more potential applications in comparison with the standard EM algorithm.
- Caching and multicasting are two promising methods to support massive content delivery in multi-tier wireless networks. In this paper, we consider a random caching and multicasting scheme with caching distributions in the two tiers as design parameters, to achieve efficient content dissemination in a two-tier large-scale cache-enabled wireless multicasting network. First, we derive tractable expressions for the successful transmission probabilities in the general region as well as the high SNR and high user density region, respectively, utilizing tools from stochastic geometry. Then, for the case of a single operator for the two tiers, we formulate the optimal joint caching design problem to maximize the successful transmission probability in the asymptotic region, which is nonconvex in general. By using the block successive approximate optimization technique, we develop an iterative algorithm, which is shown to converge to a stationary point. Next, for the case of two different operators, one for each tier, we formulate the competitive caching design game where each tier maximizes its successful transmission probability in the asymptotic region. We show that the game has a unique Nash equilibrium (NE) and develop an iterative algorithm, which is shown to converge to the NE under a mild condition. Finally, by numerical simulations, we show that the proposed designs achieve significant gains over existing schemes.
- We develop a method for generating pseudorandom binary sequences using the Bernoulli map on cubic algebraic integers. The distinguishing characteristic of our generator is that it generates chaotic true orbits of the Bernoulli map by exact computation. In particular, we clarify a way to properly prepare a set of initial points (i.e., seeds), which is needed when generating multiple pseudorandom sequences. With this seed selection method, we can distribute the initial points almost uniformly in the unit interval and can also guarantee that the orbits starting from them do not merge. We also report results of a large variety of tests indicating that the generated pseudorandom sequences have good statistical properties as well as an advantage over what is probably the most popular generator, the Mersenne Twister MT19937.

Quantum reading capacity: General definition and bounds

Stefano Pirandola May 05 2017 05:45 UTCgae spedalieri Mar 13 2017 14:13 UTC

...(continued)1) Sorry but this is false.

1a) That analysis is specifically for reducing QECC protocol to an entanglement distillation protocol over certain class of discrete variable channels. Exactly as in BDSW96. Task of the protocol is changed in the reduction.

1b) The simulation is not via a general LOCC b

Siddhartha Das Mar 13 2017 13:22 UTC

...(continued)We feel that we have cited and credited previous works appropriately in our paper. To clarify:

1) The LOCC simulation of a channel and the corresponding adaptive reduction can be found worked out in full generality in the 2012 Master's thesis of Muller-Hermes. We have cited the original paper BD

gae spedalieri Mar 13 2017 08:56 UTC

...(continued)This is one of those papers where the contribution of previous literature is omitted and not fairly represented.

1- the LOCC simulation of quantum channels (not necessarily teleportation based) and the corresponding general reduction of adaptive protocols was developed in PLOB15 (https://arxiv.org/

Samad Khabbazi Oskouei Sep 05 2016 11:34 UTC

...(continued)I think that we have missed the "semi-" at the conclusion. Because, the proof of the theorem 4.3 is based on the using universal semi-density matrix concept which is not computable. The semi-computability concept used here is like the Kolmogorov complexity which is not computable and so the Cubic co

Toby Cubitt Sep 01 2016 11:14 UTC

...(continued)I could well be missing something. But as far as I could tell from a rather quick read through the paper, all they show is that the quantum capacity of a channel with computable matrix elements is given by the regularised coherent information optimised over input ensembles with computable matrix ele

Māris Ozols Aug 30 2016 17:52 UTC

Do I understand correctly that this paper claims to show that quantum capacity is computable?

> After defining the algorithmic quantum capacity we have proved that it

> equals the standard one. Furthermore we have shown that it is

> computable.

Frédéric Grosshans Apr 29 2016 10:49 UTC

Who ordered that ??

Richard Kueng Jul 28 2015 07:01 UTC

fyi: our quantum implications are presented in Subsection 2.2 (pp 7-9).

Marco Tomamichel May 31 2015 22:07 UTC

Thanks for the comment! This is a good idea, I will do that in the next arXiv version.