total 26657took 0.11s

Quantum-Proof Extractors: Optimal up to Constant FactorsMay 13 2016Aug 01 2016We give the first construction of a family of quantum-proof extractors that has optimal seed length dependence $O(\log(n/\varepsilon))$ on the input length $n$ and error $\varepsilon$. Our extractors support any min-entropy $k=\Omega(\log{n} + \log^{1+\alpha}(1/\varepsilon))$ ... More

A multiprover interactive proof system for the local Hamiltonian problemAug 31 2014We give a quantum interactive proof system for the local Hamiltonian problem on n qubits in which (i) the verifier has a single round of interaction with five entangled provers, (ii) the verifier sends a classical message on O(log n) bits to each prover, ... More

Entanglement of approximate quantum strategies in XOR gamesSep 06 2016We show that for any $\varepsilon>0$ there is an XOR game $G=G(\varepsilon)$ with $\Theta(\varepsilon^{-1/5})$ inputs for one player and $\Theta(\varepsilon^{-2/5})$ inputs for the other player such that $\Omega(\varepsilon^{-1/5})$ ebits are required ... More

On the Power of Entangled Quantum ProversDec 08 2006We show that the value of a general two-prover quantum game cannot be computed by a semi-definite program ofvpolynomial size (unless P=NP), a method that has been successful in more restricted quantum games. More precisely, we show that proof of membership ... More

Parallel Repetition of Entangled GamesDec 21 2010May 11 2011We consider one-round games between a classical referee and two players. One of the main questions in this area is the parallel repetition question: Is there a way to decrease the maximum winning probability of a game without increasing the number of ... More

Robust self-testing of many-qubit statesOct 12 2016We introduce a simple two-player test which certifies that the players apply tensor products of Pauli $\sigma_X$ and $\sigma_Z$ observables on the tensor product of $n$ EPR pairs. The test has constant robustness: any strategy achieving success probability ... More

Interactive proofs with approximately commuting proversOct 01 2015The class $\MIP^*$ of promise problems that can be decided through an interactive proof system with multiple entangled provers provides a complexity-theoretic framework for the exploration of the nonlocal properties of entanglement. Little is known about ... More

Constant-Soundness Interactive Proofs for Local HamiltoniansDec 07 2015$ \newcommand{\Xlin}{\mathcal{X}} \newcommand{\Zlin}{\mathcal{Z}} \newcommand{\C}{\mathbb{C}} $We give a quantum multiprover interactive proof system for the local Hamiltonian problem in which there is a constant number of provers, questions are classical ... More

A simple proof of Renner's exponential de Finetti theoremAug 17 2016Aug 20 2016We give a simple proof of the exponential de Finetti theorem due to Renner. Like Renner's proof, ours combines the post-selection de Finetti theorem, the Gentle Measurement lemma, and the Chernoff bound, but avoids virtually all calculations, including ... More

A multi-prover interactive proof for NEXP sound against entangled proversJul 03 2012Sep 26 2012We prove a strong limitation on the ability of entangled provers to collude in a multiplayer game. Our main result is the first nontrivial lower bound on the class MIP* of languages having multi-prover interactive proofs with entangled provers; namely ... More

Bounds on Dimension Reduction in the Nuclear NormJan 28 2019$ \newcommand{\schs}{\scriptstyle{\mathsf{S}}_1} $For all $n \ge 1$, we give an explicit construction of $m \times m$ matrices $A_1,\ldots,A_n$ with $m = 2^{\lfloor n/2 \rfloor}$ such that for any $d$ and $d \times d$ matrices $A'_1,\ldots,A'_n$ that ... More

Privacy Amplification Against Active Quantum AdversariesAug 22 2016Privacy amplification is the task by which two cooperating parties transform a shared weak secret, about which an eavesdropper may have side information, into a uniformly random string uncorrelated from the eavesdropper. Privacy amplification against ... More

Does ignorance of the whole imply ignorance of the parts? - Large violations of non-contextuality in quantum theoryNov 30 2010May 04 2011A central question in our understanding of the physical world is how our knowledge of the whole relates to our knowledge of the individual parts. One aspect of this question is the following: to what extent does ignorance about a whole preclude knowledge ... More

More non-locality with less entanglementNov 23 2010Dec 08 2010We provide an explicit example of a Bell inequality with 3 settings and 2 outcomes per site for which the largest violation is not obtained by the maximally entangled state, even if its dimension is allowed to be arbitrarily large. This complements recent ... More

Quantum ProofsOct 05 2016Quantum information and computation provide a fascinating twist on the notion of proofs in computational complexity theory. For instance, one may consider a quantum computational analogue of the complexity class \class{NP}, known as QMA, in which a quantum ... More

Classical zero-knowledge arguments for quantum computationsFeb 14 2019Apr 09 2019We show that every language in BQP admits a classical-verifier, quantum-prover zero-knowledge argument system which is sound against quantum polynomial-time provers and zero-knowledge for classical (and quantum) polynomial-time verifiers. The protocol ... More

Privacy Amplification Against Active Quantum AdversariesAug 22 2016Sep 03 2017Privacy amplification is the task by which two cooperating parties transform a shared weak secret, about which an eavesdropper may have side information, into a uniformly random string uncorrelated from the eavesdropper. Privacy amplification against ... More

Fully device independent quantum key distributionOct 05 2012Nov 25 2012The laws of quantum mechanics allow unconditionally secure key distribution protocols. Nevertheless, security proofs of traditional quantum key distribution (QKD) protocols rely on a crucial assumption, the trustworthiness of the quantum devices used ... More

Unbounded entanglement in nonlocal gamesFeb 17 2014Aug 23 2015Quantum entanglement is known to provide a strong advantage in many two-party distributed tasks. We investigate the question of how much entanglement is needed to reach optimal performance. For the first time we show that there exists a purely classical ... More

A Moment Majorization principle for random matrix ensembles with applications to hardness of the noncommutative Grothendieck problemMar 17 2016We prove a moment majorization principle for matrix-valued functions with domain $\{-1,1\}^{m}$, $m\in\mathbb{N}$. The principle is an inequality between higher-order moments of a non-commutative multilinear polynomial with different random matrix ensemble ... More

Survey on Nonlocal Games and Operator Space TheoryDec 01 2015This review article is concerned with a recently uncovered connection between operator spaces, a noncommutative extension of Banach spaces, and quantum nonlocality, a striking phenomenon which underlies many of the applications of quantum mechanics to ... More

Classical zero-knowledge arguments for quantum computationsFeb 14 2019We show that every language in BQP admits a classical-verifier, quantum-prover zero-knowledge argument system which is sound against quantum polynomial-time provers and zero-knowledge for classical (and quantum) polynomial-time verifiers. The protocol ... More

Near-optimal extractors against quantum storageNov 24 2009Mar 30 2010We show that Trevisan's extractor and its variants \cite{T99,RRV99} are secure against bounded quantum storage adversaries. One instantiation gives the first such extractor to achieve an output length $\Theta(K-b)$, where $K$ is the source's entropy and ... More

Computationally-secure and composable remote state preparationApr 12 2019We introduce a protocol between a classical polynomial-time verifier and a quantum polynomial-time prover that allows the verifier to securely delegate to the prover the preparation of certain single-qubit quantum states. The protocol realizes the following ... More

Low-degree testing for quantum states, and a quantum entangled games PCP for QMAJan 11 2018Apr 09 2018We show that given an explicit description of a multiplayer game, with a classical verifier and a constant number of players, it is QMA-hard, under randomized reductions, to distinguish between the cases when the players have a strategy using entanglement ... More

Certifiable Quantum Dice - Or, testable exponential randomness expansionNov 25 2011We introduce a protocol through which a pair of quantum mechanical devices may be used to generate n bits of true randomness from a seed of O(log n) uniform bits. The bits generated are certifiably random based only on a simple statistical test that can ... More

Simple and tight device-independent security proofsJul 06 2016Mar 26 2019Device-independent security is the gold standard for quantum cryptography: not only is security based entirely on the laws of quantum mechanics, but it holds irrespective of any a priori assumptions on the quantum devices used in a protocol, making it ... More

Optimal counterfeiting attacks and generalizations for Wiesner's quantum moneyFeb 17 2012We present an analysis of Wiesner's quantum money scheme, as well as some natural generalizations of it, based on semidefinite programming. For Wiesner's original scheme, it is determined that the optimal probability for a counterfeiter to create two ... More

Simple and tight device-independent security proofsJul 06 2016Proving security of device-independent (DI) cryptographic protocols has been regarded to be a complex and tedious task. In this work we show that a newly developed tool, the "entropy accumulation theorem" of Dupuis et al., can be effectively applied to ... More

A parallel repetition theorem for entangled projection gamesOct 15 2013Mar 02 2015We study the behavior of the entangled value of two-player one-round projection games under parallel repetition. We show that for any projection game $G$ of entangled value 1-eps < 1, the value of the $k$-fold repetition of G goes to zero as O((1-eps^c)^k), ... More

A simple proof of the detectability lemma and spectral gap amplificationFeb 03 2016May 23 2016The detectability lemma is a useful tool for probing the structure of gapped ground states of frustration-free Hamiltonians of lattice spin models. The lemma provides an estimate on the error incurred by approximating the ground space projector with a ... More

Trading locality for time: certifiable randomness from low-depth circuitsOct 09 2018Jan 11 2019The generation of certifiable randomness is the most fundamental information-theoretic task that meaningfully separates quantum devices from their classical counterparts. We propose a protocol for exponential certified randomness expansion using a single ... More

Robust Randomness Amplifiers: Upper and Lower BoundsMay 28 2013Jun 23 2013A recent sequence of works, initially motivated by the study of the nonlocal properties of entanglement, demonstrate that a source of information-theoretically certified randomness can be constructed based only on two simple assumptions: the prior existence ... More

A three-player coherent state embezzlement gameFeb 14 2018We introduce a three-player nonlocal game, with a finite number of classical questions and answers, such that the optimal success probability of $1$ in the game can only be achieved in the limit of strategies using arbitrarily high-dimensional entangled ... More

Efficient rounding for the noncommutative Grothendieck inequalityOct 29 2012The classical Grothendieck inequality has applications to the design of approximation algorithms for NP-hard optimization problems. We show that an algorithmic interpretation may also be given for a noncommutative generalization of the Grothendieck inequality ... More

Parallel repetition via fortification: analytic view and the quantum caseMar 17 2016In a recent work, Moshkovitz [FOCS '14] presented a transformation on two-player games called "fortification", and gave an elementary proof of an (exponential decay) parallel repetition theorem for fortified two-player projection games. In this paper, ... More

Anchoring games for parallel repetitionSep 24 2015Two major open problems regarding the parallel repetition of games are whether an analogue of Raz's parallel-repetition theorem holds for (a) games with more than two players, and (b) games with quantum players using entanglement. We make progress on ... More

The Quantum PCP ConjectureSep 28 2013The classical PCP theorem is arguably the most important achievement of classical complexity theory in the past quarter century. In recent years, researchers in quantum computational complexity have tried to identify approaches and develop tools that ... More

QCMA hardness of ground space connectivity for commuting HamiltoniansOct 12 2016In this work we consider the ground space connectivity problem for commuting local Hamiltonians. The ground space connectivity problem asks whether it is possible to go from one (efficiently preparable) state to another by applying a polynomial length ... More

Implementation of rigorous renormalization group method for ground space and low-energy states of local HamiltoniansMar 06 2017Feb 13 2018The practical success of polynomial-time tensor network methods for computing ground states of certain quantum local Hamiltonians has recently been given a sound theoretical basis by Arad, Landau, Vazirani, and Vidick. The convergence proof, however, ... More

A polynomial-time algorithm for the ground state of 1D gapped local HamiltoniansJul 19 2013Computing ground states of local Hamiltonians is a fundamental problem in condensed matter physics. We give the first randomized polynomial-time algorithm for finding ground states of gapped one-dimensional Hamiltonians: it outputs an (inverse-polynomial) ... More

Non-signalling parallel repetition using de Finetti reductionsNov 06 2014In the context of multiplayer games, the parallel repetition problem can be phrased as follows: given a game $G$ with optimal winning probability $1-\alpha$ and its repeated version $G^n$ (in which $n$ games are played together, in parallel), can the ... More

Using Entanglement in Quantum Multi-Prover Interactive ProofsNov 23 2007The central question in quantum multi-prover interactive proof systems is whether or not entanglement shared between provers affects the verification power of the proof system. We study for the first time positive aspects of prior entanglement and show ... More

A Quantum-Proof Non-Malleable Extractor, With Application to Privacy Amplification against Active Quantum AdversariesOct 02 2017Feb 14 2018In privacy amplification, two mutually trusted parties aim to amplify the secrecy of an initial shared secret $X$ in order to establish a shared private key $K$ by exchanging messages over an insecure communication channel. If the channel is authenticated ... More

Rigorous RG algorithms and area laws for low energy eigenstates in 1DFeb 29 2016One of the central challenges in the study of quantum many-body systems is the complexity of simulating them on a classical computer. A recent advance of Landau et al. gave a polynomial time algorithm to actually compute a succinct classical description ... More

Test for a large amount of entanglement, using few measurementsOct 03 2016Bell-inequality violations establish that two systems share some quantum entanglement. We give a simple test to certify that two systems share an asymptotically large amount of entanglement, n EPR states. The test is efficient: unlike earlier tests that ... More

Entangled games are hard to approximateApr 23 2007Nov 21 2007We establish the first hardness results for the problem of computing the value of one-round games played by a verifier and a team of provers who can share quantum entanglement. In particular, we show that it is NP-hard to approximate within an inverse ... More

Trevisan's extractor in the presence of quantum side informationDec 30 2009Jun 18 2012Randomness extraction involves the processing of purely classical information and is therefore usually studied in the framework of classical probability theory. However, such a classical treatment is generally too restrictive for applications, where side ... More

Test for a large amount of entanglement, using few measurementsOct 03 2016Aug 30 2018Bell-inequality violations establish that two systems share some quantum entanglement. We give a simple test to certify that two systems share an asymptotically large amount of entanglement, n EPR states. The test is efficient: unlike earlier tests that ... More

Multiplayer XOR games and quantum communication complexity with clique-wise entanglementNov 20 2009XOR games are a simple computational model with connections to many areas of complexity theory. Perhaps the earliest use of XOR games was in the study of quantum correlations. XOR games also have an interesting connection to Grothendieck's inequality, ... More

Quantum proof systems for iterated exponential time, and beyondMay 30 2018We show that any language in nondeterministic time $\exp(\exp(\cdots \exp(n)))$, where the number of iterated exponentials is an arbitrary function $R(n)$, can be decided by a multiprover interactive proof system with a classical polynomial-time verifier ... More

Better Gap-Hamming Lower Bounds via Better Round EliminationDec 30 2009Gap Hamming Distance is a well-studied problem in communication complexity, in which Alice and Bob have to decide whether the Hamming distance between their respective n-bit inputs is less than n/2-sqrt(n) or greater than n/2+sqrt(n). We show that every ... More

Hauteur asymptotique des points de HeegnerNov 17 2005The asymptotic behaviour of the Neron-Tate height of Heegner points on a rational elliptic curve attached to an arithmetically normalized new cusp form f of weight 2, level N and trivial character is studied in this paper. By Gross-Zagier formula, this ... More

On the quantifier-free dynamic complexity of ReachabilityJun 13 2013Jan 28 2015The dynamic complexity of the reachability query is studied in the dynamic complexity framework of Patnaik and Immerman, restricted to quantifier-free update formulas. It is shown that, with this restriction, the reachability query cannot be dynamically ... More

Sélection de la structure d'un perceptron multicouches pour la réduction dun modèle de simulation d'une scierieDec 05 2008Simulation is often used to evaluate the relevance of a Directing Program of Production (PDP) or to evaluate its impact on detailed sc\'enarii of scheduling. Within this framework, we propose to reduce the complexity of a model of simulation by exploiting ... More

Infinite reduced words and the Tits boundary of a Coxeter groupJan 05 2013Sep 18 2014Let (W,S) be a finite rank Coxeter system with W infinite. We prove that the limit weak order on the blocks of infinite reduced words of W is encoded by the topology of the Tits boundary of the Davis complex X of W. We consider many special cases, including ... More

An optimization principle for the computation of MHD equilibria in the solar coronaDec 21 2006AIMS: We develop an optimization principle for computing stationary MHD equilibria. METHODS: Our code for the self-consistent computation of the coronal magnetic fields and the coronal plasma uses non-force-free MHD equilibria. Previous versions of the ... More

Probabilistic Reasoning about Actions in Nonmonotonic Causal TheoriesOct 19 2012We present the language {m P}{cal C}+ for probabilistic reasoning about actions, which is a generalization of the action language {cal C}+ that allows to deal with probabilistic as well as nondeterministic effects of actions. We define a formal semantics ... More

Elagage d'un perceptron multicouches : utilisation de l'analyse de la variance de la sensibilité des paramètresDec 04 2008The stucture determination of a neural network for the modelisation of a system remain the core of the problem. Within this framework, we propose a pruning algorithm of the network based on the use of the analysis of the sensitivity of the variance of ... More

Two-Variable Logic with Two Order RelationsOct 07 2011Mar 03 2012It is shown that the finite satisfiability problem for two-variable logic over structures with one total preorder relation, its induced successor relation, one linear order relation and some further unary relations is EXPSPACE-complete. Actually, EXPSPACE-completeness ... More

Spectral Correlations in the Crossover Transition from a Superposition of Harmonic Oscillators to the Gaussian Unitary EnsembleJul 20 1998We compute the spectral correlation functions for the transition from a harmonic oscillator towards the Gaussian Unitary Ensemble (GUE). We use a variant of the supersymmetry method to obtain analytical results in a fast and elegant way. In contrast to ... More

Thermodynamic formalism for transport coefficients with an application to the shear modulus and shear viscosityDec 07 2016We discuss Onsager's thermodynamic formalism for transport coefficients and apply it to the calculation of the shear modulus and shear viscosity of a monodisperse system of repulsive particles. We focus on the concept of extensive "distance" and intensive ... More

How deals with discrete data for the reduction of simulation models using neural networkJun 10 2009Simulation is useful for the evaluation of a Master Production/distribution Schedule (MPS). Also, the goal of this paper is the study of the design of a simulation model by reducing its complexity. According to theory of constraints, we want to build ... More

On the boundedness of an iteration involving points on the hypersphereJan 11 2010Oct 05 2010For a finite set of points $X$ on the unit hypersphere in $\mathbb{R}^d$ we consider the iteration $u_{i+1}=u_i+\chi_i$, where $\chi_i$ is the point of $X$ farthest from $u_i$. Restricting to the case where the origin is contained in the convex hull of ... More

Causes and Explanations in the Structural-Model Approach: Tractable CasesDec 12 2012In this paper, we continue our research on the algorithmic aspects of Halpern and Pearl's causes and explanations in the structural-model approach. To this end, we present new characterizations of weak causes for certain classes of causal models, which ... More

Nef reduction and anticanonical bundlesOct 31 2003We investigate the structure of smooth projective 3-folds X with -K_X nef and K_X^3=0.

Dynamic Conjunctive QueriesApr 05 2017The article investigates classes of queries maintainable by conjunctive queries (CQs) and their extensions and restrictions in the dynamic complexity framework of Patnaik and Immerman. Starting from the basic language of quantifier-free conjunctions of ... More

GAVO Tools for the Analysis of Stars and NebulaeJun 15 2007Within the framework of the German Astrophysical Virtual Observatory (GAVO), we provide synthetic spectra, simulation software for the calculation of NLTE model atmospheres, as well as necessary atomic data. This will enable a VO user to directly compare ... More

Finite group extensions and the Baum-Connes conjectureSep 13 2002Jul 29 2007In this note, we exhibit a method to prove the Baum-Connes conjecture (with coefficients) for extensions with finite quotients of certain groups which already satisfy the Baum-Connes conjecture. Interesting examples to which this method applies are torsion-free ... More

Quantization and the Issue of Time for Various Two-Dimensional Models of GravityAug 31 1993It is shown that the models of 2D Liouville Gravity, 2D Black Hole- and $R^2$-Gravity are {\em embedded} in the Katanaev-Volovich model of 2D NonEinsteinian Gravity. Different approaches to the formulation of a quantum theory for the above systems are ... More

Measuring the Accuracy of Linked Data IndicesMar 19 2016Being based on Web technologies, Linked Data is distributed and decentralised in its nature. Hence, for the purpose of finding relevant Linked Data on the Web, search indices play an important role. Also for avoiding network communication overhead and ... More

Modelling Epidemics on NetworksNov 21 2011Dec 15 2011Infectious disease remains, despite centuries of work to control and mitigate its effects, a major problem facing humanity. This paper reviews the mathematical modelling of infectious disease epidemics on networks, starting from the simplest Erdos-Renyi ... More

Anomalies and large N limits in matrix string theoryJun 20 1998May 13 1999We study the loop expansion for the low energy effective action for matrix string theory. For long string configurations we find the result depends on the ordering of limits. Taking $g_s\to 0$ before $N\to\infty$ we find free strings. Reversing the order ... More

Generalised network clustering and its dynamical implicationsJun 23 2010A parameterisation of generalised network clustering, in the form of four-motif prevalences, is presented. This involves three real parameters that are conditional on one- two- and three-motif prevalences. Interpretations of these real parameters are ... More

Non-Markovian stochastic epidemics in extremely heterogeneous populationsMar 12 2014A feature often observed in epidemiological networks is significant heterogeneity in degree. A popular modelling approach to this has been to consider large populations with highly heterogeneous discrete contact rates. This paper defines an individual-level ... More

Exact epidemic dynamics for generally clustered, complex networksJun 17 2010Oct 02 2012The last few years have seen remarkably fast progress in the understanding of statistics and epidemic dynamics of various clustered networks. This paper considers a class of networks based around a concept (the locale) that allows asymptotically exact ... More

Forbidden Induced SubgraphsOct 15 2016In descending generality I survey: five partial orderings of graphs, the induced-subgraph ordering, and examples like perfect, threshold, and mock threshold graphs. The emphasis is on how the induced subgraph ordering differs from other popular orderings ... More

Tutorial Note on Merging Matrix Elements with Parton ShowersMar 26 2015In this short note, I introduce to essential conceptual features and main building blocks of matrix element merging algorithms, operating on fixed order calculations both at leading order and next-to-leading order. The intention is purely pedagogical, ... More

Measured geodesic laminations in FlatlandJan 16 2015Since their introduction by Thurston, measured geodesic laminations on hyperbolic surfaces occur in many contexts. In this survey, we give a generalization of geodesic laminations on surfaces endowed with a half-translation structure, called flat laminations, ... More

Decompositions of Binomial Ideals in Macaulay 2Jun 29 2011The package Binomials contains implementations of specialized algorithms for binomial ideals, including primary decomposition into binomial ideals. The current implementation works in characteristic zero. Primary decomposition is restricted to binomial ... More

A new formula for $ζ$(2n + 1) (and how not to prove that $ζ$(5) is irrational)Aug 09 2016Using a new polylogarithmic identity, we express the values of $\zeta$ at odd integers 2n + 1 as integrals over unit n--dimensional hypercubes of simple functions involving products of logarithms. We then make several conjectures, based on numerical evidence, ... More

The Cornstarch FlamethrowerJun 06 2016Igniting cornstarch powder is a classic physics demonstration that showcases the rapid conduction of heat for a material in which the surface area is greater than the volume of its constituent particles. Including such a demonstration in a physics "magic ... More

Strong solidity of group factors from lattices in SO(n,1) and SU(n,1)Sep 12 2010We show that the group factors of ICC lattices in either SO(n,1) or SU(n,1), n \geq 2, are strongly solid in the sense of Ozawa and Popa. This strengthens a result of Ozawa and Popa showing that these factors do not have Cartan subalgebras.

Genealogy of Nonperturbative Quantum-Invariants of 3-Manifolds: The Surgical FamilyJan 21 1996Mar 22 1996We study the relations between the invariants $\tau_{RT}$, $\tau_{HKR}$, and $\tau_L$ of Reshetikhin-Turaev, Hennings-Kauffman-Radford, and Lyubashenko, respectively. In particular, we discuss explicitly how $\tau_L$ specializes to $\tau_{RT}$ for semisimple ... More

Mapping Class Group Actions on Quantum DoublesFeb 03 1994We study representations of the mapping class group of the punctured torus on the double of a finite dimensional possibly non-semisimple Hopf algebra that arise in the construction of universal, extended topological field theories. We discuss how for ... More

An introduction to Differential Linear Logic: proof-nets, models and antiderivativesJun 06 2016Differential Linear Logic enriches Linear Logic with additional logical rules for the exponential connectives, dual to the usual rules of dereliction, weakening and contraction. We present a proof-net syntax for Differential Linear Logic and a categorical ... More

A statistical physics perspective on criticality in financial marketsOct 09 2013Jan 27 2014Stock markets are complex systems exhibiting collective phenomena and particular features such as synchronization, fluctuations distributed as power-laws, non-random structures and similarity to neural networks. Such specific properties suggest that markets ... More

Statistical pairwise interaction model of stock marketJun 20 2012Jan 27 2014Financial markets are a classical example of complex systems as they comprise many interacting stocks. As such, we can obtain a surprisingly good description of their structure by making the rough simplification of binary daily returns. Spin glass models ... More

Invasion-wave induced first-order phase transition in systems of active particlesMar 31 2013An Enskog-like kinetic equation for self-propelled particles is solved numerically. I study a density instability near the transition to collective motion and find that while hydrodynamics breaks down, the kinetic approach leads to soliton-like supersonic ... More

Continuum Study of Heavy Quark DiffusionApr 28 2015We report on a lattice investigation of heavy quark momentum diffusion within the pure SU(3) plasma above the deconfinement transition with the quarks treated to leading order in the heavy mass expansion. We measure the relevant "colour-electric" Euclidean ... More

Sources of false positives and false negatives in the STATCHECK algorithm: Reply to Nuijten et al. (2015)Oct 04 2016Oct 10 2016STATCHECK is an R algorithm designed to scan papers automatically for inconsistencies between test statistics and their associated p values (Nuijten et al., 2015). The goal of this comment is to point out an important and well-documented flaw in this ... More

Telling Breaking News Stories from Wikipedia with Social Multimedia: A Case Study of the 2014 Winter OlympicsMar 17 2014With the ability to watch Wikipedia and Wikidata edits in realtime, the online encyclopedia and the knowledge base have become increasingly used targets of research for the detection of breaking news events. In this paper, we present a case study of the ... More

Guaranteed successful strategies for a square achievement game on an n by n gridSep 11 2011May 20 2012At some places (see the references) Martin Erickson describes a certain game: "Two players alternately write O's (first player) and X's (second player) in the unoccupied cells of an n x n grid. The first player (if any) to occupy four cells at the vertices ... More

Finite-size scaling tests for SU(3) lattice gauge theory with color sextet fermionsOct 16 2009The observed slow running of the gauge coupling in SU(3) lattice gauge theory with two flavors of color sextet fermions naturally suggests it is a theory with one relevant coupling, the fermion mass, and that at zero mass correlation functions decay algebraically. ... More

Volume scaling of Dirac eigenvalues in SU(3) lattice gauge theory with color sextet fermionsJun 24 2009I observe a rough volume-dependent scaling of the low eigenvalues of a chiral Dirac operator in lattice studies of SU(3) lattice gauge theory with two flavors of color sextet fermions, in its weak-coupling phase. The mean value of the ith eigenvalue scales ... More

Reweighting QCD simulations with dynamical overlap fermionsOct 03 2008I apply a recently developed algorithm for reweighting simulations of lattice QCD from one quark mass to another to simulations performed with overlap fermions in the epsilon regime. I test it by computing the condensate from distributions of the low ... More

Eigenvalue Decomposition of Meson CorrelatorsOct 27 2003Euclidean space hadronic correlators are computed in quenched QCD at small quark mass using truncations of quark propagators which include or exclude low eigenvalue eigenmodes of the Dirac operator. High modes provide the dominant contribution to parity ... More

Kaon B Parameter in Quenched QCDSep 08 2003I calculate the kaon B-parameter with a lattice simulation in quenched approximation. The lattice simulation uses an action possessing exact lattice chiral symmetry, an overlap action. Computations are performed at two lattice spacings, about 0.13 and ... More

Short distance current correlators: Comparing lattice simulations to the instanton liquidJun 01 2001Aug 01 2001Point to point correlators of currents are computed in quenched QCD using a chiral lattice fermion action, the overlap action. I compare correlators made of exact quark propagators with correlators restricted to low (less than 500 MeV) eigenvalue eigenmodes ... More

Oblique correction in a walking lattice theoryJun 18 2010I compute the difference of vector and axial vector current correlators in the weak coupling phase of (lattice-regulated) SU(3) gauge theory with two flavors of symmetric-representation dynamical fermions. This is a walking theory at the bare parameter ... More