-
Optimal entanglement witness of multipartite systems using support vector machine approach
Authors:
Mahmoud Mahdian,
Zahra Mousavi
Abstract:
An entanglement witness (EW) is a Hermitian operator that can distinguish an entangled state from all separable states. We drive and implement a numerical method based on machine learning to create a multipartite EW. Using support vector machine (SVM) algorithm, we construct EW's based on local orthogonal observables in the form of a hyperplane that separates the separable region from the entangle…
▽ More
An entanglement witness (EW) is a Hermitian operator that can distinguish an entangled state from all separable states. We drive and implement a numerical method based on machine learning to create a multipartite EW. Using support vector machine (SVM) algorithm, we construct EW's based on local orthogonal observables in the form of a hyperplane that separates the separable region from the entangled state for two, three and four qubits in Bell-diagonal mixed states, which can be generalized to multipartite mixed states as GHZ states in systems where all modes have equal size. One of the important features of this method is that, when the algorithm succeeds, the EWs are optimal and are completely tangent to the separable region. Also, we generate non-decomposable EWs that can detect positive partial transpose entangled states (PPTES).
△ Less
Submitted 25 April, 2025;
originally announced April 2025.
-
Entanglement detection with quantum support vector machine(QSVM) on near-term quantum devices
Authors:
M. Mahdian,
Z. Mousavi
Abstract:
Detecting and quantifying quantum entanglement remain significant challenges in the noisy intermediate-scale quantum (NISQ) era. This study presents the implementation of quantum support vector machines (QSVMs) on IBM quantum devices to identify and classify entangled states. By employing quantum variational circuits, the proposed framework achieves a runtime complexity of $O(\frac{N t}{ε^2})$, wh…
▽ More
Detecting and quantifying quantum entanglement remain significant challenges in the noisy intermediate-scale quantum (NISQ) era. This study presents the implementation of quantum support vector machines (QSVMs) on IBM quantum devices to identify and classify entangled states. By employing quantum variational circuits, the proposed framework achieves a runtime complexity of $O(\frac{N t}{ε^2})$, where $N$ is the number of qubits, $t$ is the number of iterations, and $ε$ is the acceptable error margin. We investigate various quantum circuits with multiple blocks and obtain the accuracy of QSVM as measures of expressibility and entangling capability. Our results demonstrate that the QSVM framework achieves over 90\% accuracy in distinguishing entangled states, despite hardware noise such as decoherence and gate errors. Benchmarks across superconducting qubit platforms (e.g., IBM Perth, Lagos, and Nairobi) highlight the robustness of the model. Furthermore, the QSVM framework effectively classifies two-qubit states and extends its predictive capabilities to three-qubit entangled states. This work marks a significant advancement in quantum machine learning for entanglement detection.
△ Less
Submitted 9 April, 2025; v1 submitted 30 March, 2025;
originally announced March 2025.
-
Auto-bidding and Auctions in Online Advertising: A Survey
Authors:
Gagan Aggarwal,
Ashwinkumar Badanidiyuru,
Santiago R. Balseiro,
Kshipra Bhawalkar,
Yuan Deng,
Zhe Feng,
Gagan Goel,
Christopher Liaw,
Haihao Lu,
Mohammad Mahdian,
Jieming Mao,
Aranyak Mehta,
Vahab Mirrokni,
Renato Paes Leme,
Andres Perlroth,
Georgios Piliouras,
Jon Schneider,
Ariel Schvartzman,
Balasubramanian Sivan,
Kelly Spendlove,
Yifeng Teng,
Di Wang,
Hanrui Zhang,
Mingfei Zhao,
Wennan Zhu
, et al. (1 additional authors not shown)
Abstract:
In this survey, we summarize recent developments in research fueled by the growing adoption of automated bidding strategies in online advertising. We explore the challenges and opportunities that have arisen as markets embrace this autobidding and cover a range of topics in this area, including bidding algorithms, equilibrium analysis and efficiency of common auction formats, and optimal auction d…
▽ More
In this survey, we summarize recent developments in research fueled by the growing adoption of automated bidding strategies in online advertising. We explore the challenges and opportunities that have arisen as markets embrace this autobidding and cover a range of topics in this area, including bidding algorithms, equilibrium analysis and efficiency of common auction formats, and optimal auction design.
△ Less
Submitted 14 August, 2024;
originally announced August 2024.
-
Efficiency of the Generalized Second-Price Auction for Value Maximizers
Authors:
Yuan Deng,
Mohammad Mahdian,
Jieming Mao,
Vahab Mirrokni,
Hanrui Zhang,
Song Zuo
Abstract:
We study the price of anarchy of the generalized second-price auction where bidders are value maximizers (i.e., autobidders). We show that in general the price of anarchy can be as bad as $0$. For comparison, the price of anarchy of running VCG is $1/2$ in the autobidding world. We further show a fined-grained price of anarchy with respect to the discount factors (i.e., the ratios of click probabi…
▽ More
We study the price of anarchy of the generalized second-price auction where bidders are value maximizers (i.e., autobidders). We show that in general the price of anarchy can be as bad as $0$. For comparison, the price of anarchy of running VCG is $1/2$ in the autobidding world. We further show a fined-grained price of anarchy with respect to the discount factors (i.e., the ratios of click probabilities between lower slots and the highest slot in each auction) in the generalized second-price auction, which highlights the qualitative relation between the smoothness of the discount factors and the efficiency of the generalized second-price auction.
△ Less
Submitted 4 October, 2023;
originally announced October 2023.
-
Learning across Data Owners with Joint Differential Privacy
Authors:
Yangsibo Huang,
Haotian Jiang,
Daogao Liu,
Mohammad Mahdian,
Jieming Mao,
Vahab Mirrokni
Abstract:
In this paper, we study the setting in which data owners train machine learning models collaboratively under a privacy notion called joint differential privacy [Kearns et al., 2018]. In this setting, the model trained for each data owner $j$ uses $j$'s data without privacy consideration and other owners' data with differential privacy guarantees. This setting was initiated in [Jain et al., 2021] w…
▽ More
In this paper, we study the setting in which data owners train machine learning models collaboratively under a privacy notion called joint differential privacy [Kearns et al., 2018]. In this setting, the model trained for each data owner $j$ uses $j$'s data without privacy consideration and other owners' data with differential privacy guarantees. This setting was initiated in [Jain et al., 2021] with a focus on linear regressions. In this paper, we study this setting for stochastic convex optimization (SCO). We present an algorithm that is a variant of DP-SGD [Song et al., 2013; Abadi et al., 2016] and provides theoretical bounds on its population loss. We compare our algorithm to several baselines and discuss for what parameter setups our algorithm is more preferred. We also empirically study joint differential privacy in the multi-class classification problem over two public datasets. Our empirical findings are well-connected to the insights from our theoretical results.
△ Less
Submitted 25 May, 2023;
originally announced May 2023.
-
Differentially-Private Hierarchical Clustering with Provable Approximation Guarantees
Authors:
Jacob Imola,
Alessandro Epasto,
Mohammad Mahdian,
Vincent Cohen-Addad,
Vahab Mirrokni
Abstract:
Hierarchical Clustering is a popular unsupervised machine learning method with decades of history and numerous applications. We initiate the study of differentially private approximation algorithms for hierarchical clustering under the rigorous framework introduced by (Dasgupta, 2016). We show strong lower bounds for the problem: that any $ε$-DP algorithm must exhibit $O(|V|^2/ ε)$-additive error…
▽ More
Hierarchical Clustering is a popular unsupervised machine learning method with decades of history and numerous applications. We initiate the study of differentially private approximation algorithms for hierarchical clustering under the rigorous framework introduced by (Dasgupta, 2016). We show strong lower bounds for the problem: that any $ε$-DP algorithm must exhibit $O(|V|^2/ ε)$-additive error for an input dataset $V$. Then, we exhibit a polynomial-time approximation algorithm with $O(|V|^{2.5}/ ε)$-additive error, and an exponential-time algorithm that meets the lower bound. To overcome the lower bound, we focus on the stochastic block model, a popular model of graphs, and, with a separation assumption on the blocks, propose a private $1+o(1)$ approximation algorithm which also recovers the blocks exactly. Finally, we perform an empirical study of our algorithms and validate their performance.
△ Less
Submitted 23 May, 2023; v1 submitted 31 January, 2023;
originally announced February 2023.
-
Regret Minimization with Noisy Observations
Authors:
Mohammad Mahdian,
Jieming Mao,
Kangning Wang
Abstract:
In a typical optimization problem, the task is to pick one of a number of options with the lowest cost or the highest value. In practice, these cost/value quantities often come through processes such as measurement or machine learning, which are noisy, with quantifiable noise distributions. To take these noise distributions into account, one approach is to assume a prior for the values, use it to…
▽ More
In a typical optimization problem, the task is to pick one of a number of options with the lowest cost or the highest value. In practice, these cost/value quantities often come through processes such as measurement or machine learning, which are noisy, with quantifiable noise distributions. To take these noise distributions into account, one approach is to assume a prior for the values, use it to build a posterior, and then apply standard stochastic optimization to pick a solution. However, in many practical applications, such prior distributions may not be available. In this paper, we study such scenarios using a regret minimization model.
In our model, the task is to pick the highest one out of $n$ values. The values are unknown and chosen by an adversary, but can be observed through noisy channels, where additive noises are stochastically drawn from known distributions. The goal is to minimize the regret of our selection, defined as the expected difference between the highest and the selected value on the worst-case choices of values. We show that the naïve algorithm of picking the highest observed value has regret arbitrarily worse than the optimum, even when $n = 2$ and the noises are unbiased in expectation. On the other hand, we propose an algorithm which gives a constant-approximation to the optimal regret for any $n$. Our algorithm is conceptually simple, computationally efficient, and requires only minimal knowledge of the noise distributions.
△ Less
Submitted 19 July, 2022;
originally announced July 2022.
-
Toward a quantum computing algorithm to quantify classical and quantum correlation of system states
Authors:
M. Mahdian,
H. Davoodi Yeganeh
Abstract:
Optimal measurement is required to obtain the quantum and classical correlations of a quantum state, and the crucial difficulty is how to acquire the maximal information about one system by measuring the other part; in other words, getting the maximum information corresponds to preparing the best measurement operators. Within a general setup, we designed a variational hybrid quantum-classical (VHQ…
▽ More
Optimal measurement is required to obtain the quantum and classical correlations of a quantum state, and the crucial difficulty is how to acquire the maximal information about one system by measuring the other part; in other words, getting the maximum information corresponds to preparing the best measurement operators. Within a general setup, we designed a variational hybrid quantum-classical (VHQC) algorithm to achieve classical and quantum correlations for system states under the Noisy-Intermediate Scale Quantum (NISQ) technology. To employ, first, we map the density matrix to the vector representation, which displays it in a doubled Hilbert space, and it's converted to a pure state. Then we apply the measurement operators to a part of the subsystem and use variational principle and a classical optimization for the determination of the amount of correlation. We numerically test the performance of our algorithm at finding a correlation of some density matrices, and the output of our algorithm is compatible with the exact calculation.
△ Less
Submitted 17 November, 2021;
originally announced November 2021.
-
Improved Sliding Window Algorithms for Clustering and Coverage via Bucketing-Based Sketches
Authors:
Alessandro Epasto,
Mohammad Mahdian,
Vahab Mirrokni,
Peilin Zhong
Abstract:
Streaming computation plays an important role in large-scale data analysis. The sliding window model is a model of streaming computation which also captures the recency of the data. In this model, data arrives one item at a time, but only the latest $W$ data items are considered for a particular problem. The goal is to output a good solution at the end of the stream by maintaining a small summary…
▽ More
Streaming computation plays an important role in large-scale data analysis. The sliding window model is a model of streaming computation which also captures the recency of the data. In this model, data arrives one item at a time, but only the latest $W$ data items are considered for a particular problem. The goal is to output a good solution at the end of the stream by maintaining a small summary during the stream.
In this work, we propose a new algorithmic framework for designing efficient sliding window algorithms via bucketing-based sketches. Based on this new framework, we develop space-efficient sliding window algorithms for $k$-cover, $k$-clustering and diversity maximization problems. For each of the above problems, our algorithm achieves $(1\pm \varepsilon)$-approximation. Compared with the previous work, it improves both the approximation ratio and the space.
△ Less
Submitted 29 October, 2021;
originally announced October 2021.
-
Massively Parallel and Dynamic Algorithms for Minimum Size Clustering
Authors:
Alessandro Epasto,
Mohammad Mahdian,
Vahab Mirrokni,
Peilin Zhong
Abstract:
In this paper, we study the $r$-gather problem, a natural formulation of minimum-size clustering in metric spaces. The goal of $r$-gather is to partition $n$ points into clusters such that each cluster has size at least $r$, and the maximum radius of the clusters is minimized. This additional constraint completely changes the algorithmic nature of the problem, and many clustering techniques fail.…
▽ More
In this paper, we study the $r$-gather problem, a natural formulation of minimum-size clustering in metric spaces. The goal of $r$-gather is to partition $n$ points into clusters such that each cluster has size at least $r$, and the maximum radius of the clusters is minimized. This additional constraint completely changes the algorithmic nature of the problem, and many clustering techniques fail. Also previous dynamic and parallel algorithms do not achieve desirable complexity. We propose algorithms both in the Massively Parallel Computation (MPC) model and in the dynamic setting. Our MPC algorithm handles input points from the Euclidean space $\mathbb{R}^d$. It computes an $O(1)$-approximate solution of $r$-gather in $O(\log^{\varepsilon} n)$ rounds using total space $O(n^{1+γ}\cdot d)$ for arbitrarily small constants $\varepsilon,γ> 0$. In addition our algorithm is fully scalable, i.e., there is no lower bound on the memory per machine. Our dynamic algorithm maintains an $O(1)$-approximate $r$-gather solution under insertions/deletions of points in a metric space with doubling dimension $d$. The update time is $r \cdot 2^{O(d)}\cdot \log^{O(1)}Δ$ and the query time is $2^{O(d)}\cdot \log^{O(1)}Δ$, where $Δ$ is the ratio between the largest and the smallest distance.
△ Less
Submitted 4 June, 2021;
originally announced June 2021.
-
Maximizing Agreements for Ranking, Clustering and Hierarchical Clustering via MAX-CUT
Authors:
Vaggos Chatziafratis,
Mohammad Mahdian,
Sara Ahmadian
Abstract:
In this paper, we study a number of well-known combinatorial optimization problems that fit in the following paradigm: the input is a collection of (potentially inconsistent) local relationships between the elements of a ground set (e.g., pairwise comparisons, similar/dissimilar pairs, or ancestry structure of triples of points), and the goal is to aggregate this information into a global structur…
▽ More
In this paper, we study a number of well-known combinatorial optimization problems that fit in the following paradigm: the input is a collection of (potentially inconsistent) local relationships between the elements of a ground set (e.g., pairwise comparisons, similar/dissimilar pairs, or ancestry structure of triples of points), and the goal is to aggregate this information into a global structure (e.g., a ranking, a clustering, or a hierarchical clustering) in a way that maximizes agreement with the input. Well-studied problems such as rank aggregation, correlation clustering, and hierarchical clustering with triplet constraints fall in this class of problems.
We study these problems on stochastic instances with a hidden embedded ground truth solution. Our main algorithmic contribution is a unified technique that uses the maximum cut problem in graphs to approximately solve these problems. Using this technique, we can often get approximation guarantees in the stochastic setting that are better than the known worst case inapproximability bounds for the corresponding problem. On the negative side, we improve the worst case inapproximability bound on several hierarchical clustering formulations through a reduction to related ranking problems.
△ Less
Submitted 23 February, 2021;
originally announced February 2021.
-
Hierarchical Clustering via Sketches and Hierarchical Correlation Clustering
Authors:
Danny Vainstein,
Vaggos Chatziafratis,
Gui Citovsky,
Anand Rajagopalan,
Mohammad Mahdian,
Yossi Azar
Abstract:
Recently, Hierarchical Clustering (HC) has been considered through the lens of optimization. In particular, two maximization objectives have been defined. Moseley and Wang defined the \emph{Revenue} objective to handle similarity information given by a weighted graph on the data points (w.l.o.g., $[0,1]$ weights), while Cohen-Addad et al. defined the \emph{Dissimilarity} objective to handle dissim…
▽ More
Recently, Hierarchical Clustering (HC) has been considered through the lens of optimization. In particular, two maximization objectives have been defined. Moseley and Wang defined the \emph{Revenue} objective to handle similarity information given by a weighted graph on the data points (w.l.o.g., $[0,1]$ weights), while Cohen-Addad et al. defined the \emph{Dissimilarity} objective to handle dissimilarity information. In this paper, we prove structural lemmas for both objectives allowing us to convert any HC tree to a tree with constant number of internal nodes while incurring an arbitrarily small loss in each objective. Although the best-known approximations are 0.585 and 0.667 respectively, using our lemmas we obtain approximations arbitrarily close to 1, if not all weights are small (i.e., there exist constants $ε, δ$ such that the fraction of weights smaller than $δ$, is at most $1 - ε$); such instances encompass many metric-based similarity instances, thereby improving upon prior work. Finally, we introduce Hierarchical Correlation Clustering (HCC) to handle instances that contain similarity and dissimilarity information simultaneously. For HCC, we provide an approximation of 0.4767 and for complementary similarity/dissimilarity weights (analogous to $+/-$ correlation clustering), we again present nearly-optimal approximations.
△ Less
Submitted 26 January, 2021;
originally announced January 2021.
-
Optimal Approximation -- Smoothness Tradeoffs for Soft-Max Functions
Authors:
Alessandro Epasto,
Mohammad Mahdian,
Vahab Mirrokni,
Manolis Zampetakis
Abstract:
A soft-max function has two main efficiency measures: (1) approximation - which corresponds to how well it approximates the maximum function, (2) smoothness - which shows how sensitive it is to changes of its input. Our goal is to identify the optimal approximation-smoothness tradeoffs for different measures of approximation and smoothness. This leads to novel soft-max functions, each of which is…
▽ More
A soft-max function has two main efficiency measures: (1) approximation - which corresponds to how well it approximates the maximum function, (2) smoothness - which shows how sensitive it is to changes of its input. Our goal is to identify the optimal approximation-smoothness tradeoffs for different measures of approximation and smoothness. This leads to novel soft-max functions, each of which is optimal for a different application. The most commonly used soft-max function, called exponential mechanism, has optimal tradeoff between approximation measured in terms of expected additive approximation and smoothness measured with respect to Rényi Divergence. We introduce a soft-max function, called "piecewise linear soft-max", with optimal tradeoff between approximation, measured in terms of worst-case additive approximation and smoothness, measured with respect to $\ell_q$-norm. The worst-case approximation guarantee of the piecewise linear mechanism enforces sparsity in the output of our soft-max function, a property that is known to be important in Machine Learning applications [Martins et al. '16, Laha et al. '18] and is not satisfied by the exponential mechanism. Moreover, the $\ell_q$-smoothness is suitable for applications in Mechanism Design and Game Theory where the piecewise linear mechanism outperforms the exponential mechanism. Finally, we investigate another soft-max function, called power mechanism, with optimal tradeoff between expected \textit{multiplicative} approximation and smoothness with respect to the Rényi Divergence, which provides improved theoretical and practical results in differentially private submodular optimization.
△ Less
Submitted 22 October, 2020;
originally announced October 2020.
-
Incoherent quantum algorithm dynamics of an open system with near-term devices
Authors:
Mahmoud Mahdian,
H. Davoodi Yeganeh
Abstract:
Hybrid quantum-classical algorithms are among the most promising systems to implement quantum computing under the Noisy-Intermediate Scale Quantum (NISQ) technology. In this paper, at first, we investigate a quantum dynamics algorithm for the density matrix obeying the von Neumann equation using an efficient Lagrangian-based approach. And then, we consider the dynamics of the ensemble-averaged of…
▽ More
Hybrid quantum-classical algorithms are among the most promising systems to implement quantum computing under the Noisy-Intermediate Scale Quantum (NISQ) technology. In this paper, at first, we investigate a quantum dynamics algorithm for the density matrix obeying the von Neumann equation using an efficient Lagrangian-based approach. And then, we consider the dynamics of the ensemble-averaged of disordered quantum systems which is described by Hamiltonian ensemble with a hybrid quantum-classical algorithm. In a recent work [Phys. Rev. Lett. 120, 030403], the authors concluded that the dynamics of an open system could be simulated by a Hamiltonian ensemble because of nature of the disorder average. We investigate our algorithm to simulating incoherent dynamics (decoherence) of open system using an efficient variational quantum circuit in the form of master equations. Despite the non-unitary evolution of open systems, our method is applicable to a wide range of problems for incoherent dynamics with the unitary quantum operation.
△ Less
Submitted 12 August, 2020;
originally announced August 2020.
-
Hybrid quantum variational algorithm for simulating open quantum systems with near-term devices
Authors:
Mahmoud Mahdian,
H. Davoodi Yeganeh
Abstract:
Hybrid quantum-classical (HQC) algorithms make it possible to use near-term quantum devices supported by classical computational resources by useful control schemes. In this paper, we develop an HQC algorithm using an efficient variational optimization approach to simulate open system dynamics under the Noisy-Intermediate Scale Quantum(NISQ) computer. Using the time-dependent variational principle…
▽ More
Hybrid quantum-classical (HQC) algorithms make it possible to use near-term quantum devices supported by classical computational resources by useful control schemes. In this paper, we develop an HQC algorithm using an efficient variational optimization approach to simulate open system dynamics under the Noisy-Intermediate Scale Quantum(NISQ) computer. Using the time-dependent variational principle (TDVP) method and extending it to McLachlan TDVP for density matrix which involves minimization of Frobenius norm of the error, we apply the unitary quantum circuit to obtain the time evolution of the open quantum system in the Lindblad formalism. Finally, we illustrate the use of our methods with detailed examples which are in good agreement with analytical calculations.
△ Less
Submitted 12 August, 2020;
originally announced August 2020.
-
Fair Hierarchical Clustering
Authors:
Sara Ahmadian,
Alessandro Epasto,
Marina Knittel,
Ravi Kumar,
Mohammad Mahdian,
Benjamin Moseley,
Philip Pham,
Sergei Vassilvitskii,
Yuyan Wang
Abstract:
As machine learning has become more prevalent, researchers have begun to recognize the necessity of ensuring machine learning systems are fair. Recently, there has been an interest in defining a notion of fairness that mitigates over-representation in traditional clustering.
In this paper we extend this notion to hierarchical clustering, where the goal is to recursively partition the data to opt…
▽ More
As machine learning has become more prevalent, researchers have begun to recognize the necessity of ensuring machine learning systems are fair. Recently, there has been an interest in defining a notion of fairness that mitigates over-representation in traditional clustering.
In this paper we extend this notion to hierarchical clustering, where the goal is to recursively partition the data to optimize a specific objective. For various natural objectives, we obtain simple, efficient algorithms to find a provably good fair hierarchical clustering. Empirically, we show that our algorithms can find a fair hierarchical clustering, with only a negligible loss in the objective.
△ Less
Submitted 18 June, 2020; v1 submitted 17 June, 2020;
originally announced June 2020.
-
Fair Correlation Clustering
Authors:
Sara Ahmadian,
Alessandro Epasto,
Ravi Kumar,
Mohammad Mahdian
Abstract:
In this paper, we study correlation clustering under fairness constraints. Fair variants of $k$-median and $k$-center clustering have been studied recently, and approximation algorithms using a notion called fairlet decomposition have been proposed. We obtain approximation algorithms for fair correlation clustering under several important types of fairness constraints.
Our results hinge on obtai…
▽ More
In this paper, we study correlation clustering under fairness constraints. Fair variants of $k$-median and $k$-center clustering have been studied recently, and approximation algorithms using a notion called fairlet decomposition have been proposed. We obtain approximation algorithms for fair correlation clustering under several important types of fairness constraints.
Our results hinge on obtaining a fairlet decomposition for correlation clustering by introducing a novel combinatorial optimization problem. We define a fairlet decomposition with cost similar to the $k$-median cost and this allows us to obtain approximation algorithms for a wide range of fairness constraints.
We complement our theoretical results with an in-depth analysis of our algorithms on real graphs where we show that fair solutions to correlation clustering can be obtained with limited increase in cost compared to the state-of-the-art (unfair) algorithms.
△ Less
Submitted 2 March, 2020; v1 submitted 6 February, 2020;
originally announced February 2020.
-
Bisect and Conquer: Hierarchical Clustering via Max-Uncut Bisection
Authors:
Sara Ahmadian,
Vaggos Chatziafratis,
Alessandro Epasto,
Euiwoong Lee,
Mohammad Mahdian,
Konstantin Makarychev,
Grigory Yaroslavtsev
Abstract:
Hierarchical Clustering is an unsupervised data analysis method which has been widely used for decades. Despite its popularity, it had an underdeveloped analytical foundation and to address this, Dasgupta recently introduced an optimization viewpoint of hierarchical clustering with pairwise similarity information that spurred a line of work shedding light on old algorithms (e.g., Average-Linkage),…
▽ More
Hierarchical Clustering is an unsupervised data analysis method which has been widely used for decades. Despite its popularity, it had an underdeveloped analytical foundation and to address this, Dasgupta recently introduced an optimization viewpoint of hierarchical clustering with pairwise similarity information that spurred a line of work shedding light on old algorithms (e.g., Average-Linkage), but also designing new algorithms. Here, for the maximization dual of Dasgupta's objective (introduced by Moseley-Wang), we present polynomial-time .4246 approximation algorithms that use Max-Uncut Bisection as a subroutine. The previous best worst-case approximation factor in polynomial time was .336, improving only slightly over Average-Linkage which achieves 1/3. Finally, we complement our positive results by providing APX-hardness (even for 0-1 similarities), under the Small Set Expansion hypothesis.
△ Less
Submitted 15 December, 2019;
originally announced December 2019.
-
Response Prediction for Low-Regret Agents
Authors:
Saeed Alaei,
Ashwinkumar Badanidiyuru,
Mohammad Mahdian,
Sadra Yazdanbod
Abstract:
Companies like Google and Microsoft run billions of auctions every day to sell advertising opportunities. Any change to the rules of these auctions can have a tremendous effect on the revenue of the company and the welfare of the advertisers and the users. Therefore, any change requires careful evaluation of its potential impacts. Currently, such impacts are often evaluated by running simulations…
▽ More
Companies like Google and Microsoft run billions of auctions every day to sell advertising opportunities. Any change to the rules of these auctions can have a tremendous effect on the revenue of the company and the welfare of the advertisers and the users. Therefore, any change requires careful evaluation of its potential impacts. Currently, such impacts are often evaluated by running simulations or small controlled experiments. This, however, misses the important factor that the advertisers respond to changes. Our goal is to build a theoretical framework for predicting the actions of an agent (the advertiser) that is optimizing her actions in an uncertain environment. We model this problem using a variant of the multi-armed bandit setting where playing an arm is costly. The cost of each arm changes over time and is publicly observable. The value of playing an arm is drawn stochastically from a static distribution and is observed by the agent and not by us. We, however, observe the actions of the agent. Our main result is that assuming the agent is playing a strategy with a regret of at most $f(T)$ within the first $T$ rounds, we can learn to play the multi-armed bandits game (without observing the rewards) in such a way that the regret of our selected actions is at most $O(k^4(f(T)+1)\log(T))$, where $k$ is the number of arms.
△ Less
Submitted 5 November, 2019;
originally announced November 2019.
-
Clustering without Over-Representation
Authors:
Sara Ahmadian,
Alessandro Epasto,
Ravi Kumar,
Mohammad Mahdian
Abstract:
In this paper we consider clustering problems in which each point is endowed with a color. The goal is to cluster the points to minimize the classical clustering cost but with the additional constraint that no color is over-represented in any cluster. This problem is motivated by practical clustering settings, e.g., in clustering news articles where the color of an article is its source, it is pre…
▽ More
In this paper we consider clustering problems in which each point is endowed with a color. The goal is to cluster the points to minimize the classical clustering cost but with the additional constraint that no color is over-represented in any cluster. This problem is motivated by practical clustering settings, e.g., in clustering news articles where the color of an article is its source, it is preferable that no single news source dominates any cluster.
For the most general version of this problem, we obtain an algorithm that has provable guarantees of performance; our algorithm is based on finding a fractional solution using a linear program and rounding the solution subsequently. For the special case of the problem where no color has an absolute majority in any cluster, we obtain a simpler combinatorial algorithm also with provable guarantees. Experiments on real-world data shows that our algorithms are effective in finding good clustering without over-representation.
△ Less
Submitted 29 May, 2019;
originally announced May 2019.
-
Kelly Cache Networks
Authors:
Milad Mahdian,
Armin Moharrer,
Stratis Ioannidis,
Edmund Yeh
Abstract:
We study networks of M/M/1 queues in which nodes act as caches that store objects. Exogenous requests for objects are routed towards nodes that store them; as a result, object traffic in the network is determined not only by demand but, crucially, by where objects are cached. We determine how to place objects in caches to attain a certain design objective, such as, e.g., minimizing network congest…
▽ More
We study networks of M/M/1 queues in which nodes act as caches that store objects. Exogenous requests for objects are routed towards nodes that store them; as a result, object traffic in the network is determined not only by demand but, crucially, by where objects are cached. We determine how to place objects in caches to attain a certain design objective, such as, e.g., minimizing network congestion or retrieval delays. We show that for a broad class of objectives, including minimizing both the expected network delay and the sum of network queue lengths, this optimization problem can be cast as an NP- hard submodular maximization problem. We show that so-called continuous greedy algorithm attains a ratio arbitrarily close to $1 - 1/e \approx 0.63$ using a deterministic estimation via a power series; this drastically reduces execution time over prior art, which resorts to sampling. Finally, we show that our results generalize, beyond M/M/1 queues, to networks of M/M/k and symmetric M/D/1 queues.
△ Less
Submitted 28 January, 2019; v1 submitted 13 January, 2019;
originally announced January 2019.
-
Quantum simulation dynamics and circuit synthesis of FMO complex on an NMR quantum computer
Authors:
M. Mahdian,
H. Davoodi Yeganeh,
A. Dehghani
Abstract:
Recently, the dynamics simulation of light-harvesting complexes as an open quantum system, in the weak and strong coupling regimes, has received much attention. In this paper, we investigate a digital quantum simulation approach of the Fenna-Matthews-Olson (FMO) photosynthetic pigment-protein complex surrounded with a Markovian bath, i.e., memoryless, based on a nuclear magnetic resonance (NMR) qu…
▽ More
Recently, the dynamics simulation of light-harvesting complexes as an open quantum system, in the weak and strong coupling regimes, has received much attention. In this paper, we investigate a digital quantum simulation approach of the Fenna-Matthews-Olson (FMO) photosynthetic pigment-protein complex surrounded with a Markovian bath, i.e., memoryless, based on a nuclear magnetic resonance (NMR) quantum computer. For this purpose, we apply the decoupling(recoupling) method, which is turn off(on) the couplings and also Solovay-Kitaev techniques to decompose Hamiltonian and Lindbladians into efficient elementary gates on an NMR simulator. Finally, we design the quantum circuits for the unitary and non-unitary part due to the system-environment interactions of the open system dynamics.
△ Less
Submitted 1 October, 2020; v1 submitted 10 January, 2019;
originally announced January 2019.
-
Quantum simulation of FMO complex using one-parameter semigroup of generators
Authors:
M. Mahdian,
H. Davoodi Yeganeh
Abstract:
The application of open quantum systems in biological processes such as photosynthetic complexes has recently received renewed attention. In this paper, we introduce a quantum algorithm for simulation of Markovian dynamics of the Fenna-Matthew-Olson (FMO) complex that exists in photosynthesis using a "universal set" of a one-parameter semigroup of generators. We investigate the details of each gen…
▽ More
The application of open quantum systems in biological processes such as photosynthetic complexes has recently received renewed attention. In this paper, we introduce a quantum algorithm for simulation of Markovian dynamics of the Fenna-Matthew-Olson (FMO) complex that exists in photosynthesis using a "universal set" of a one-parameter semigroup of generators. We investigate the details of each generator that has been obtained from spectral decomposition of the Gorini-Kossakowski-Sudarshan (GKS) matrix by using linear combination and unitary conjugation. Also, we present a simple quantum circuit for the implementation of these generators.
△ Less
Submitted 28 September, 2020; v1 submitted 10 January, 2019;
originally announced January 2019.
-
Contextual Bandits with Cross-learning
Authors:
Santiago Balseiro,
Negin Golrezaei,
Mohammad Mahdian,
Vahab Mirrokni,
Jon Schneider
Abstract:
In the classical contextual bandits problem, in each round $t$, a learner observes some context $c$, chooses some action $i$ to perform, and receives some reward $r_{i,t}(c)$. We consider the variant of this problem where in addition to receiving the reward $r_{i,t}(c)$, the learner also learns the values of $r_{i,t}(c')$ for some other contexts $c'$ in set $\mathcal{O}_i(c)$; i.e., the rewards th…
▽ More
In the classical contextual bandits problem, in each round $t$, a learner observes some context $c$, chooses some action $i$ to perform, and receives some reward $r_{i,t}(c)$. We consider the variant of this problem where in addition to receiving the reward $r_{i,t}(c)$, the learner also learns the values of $r_{i,t}(c')$ for some other contexts $c'$ in set $\mathcal{O}_i(c)$; i.e., the rewards that would have been achieved by performing that action under different contexts $c'\in \mathcal{O}_i(c)$. This variant arises in several strategic settings, such as learning how to bid in non-truthful repeated auctions, which has gained a lot of attention lately as many platforms have switched to running first-price auctions. We call this problem the contextual bandits problem with cross-learning. The best algorithms for the classical contextual bandits problem achieve $\tilde{O}(\sqrt{CKT})$ regret against all stationary policies, where $C$ is the number of contexts, $K$ the number of actions, and $T$ the number of rounds. We design and analyze new algorithms for the contextual bandits problem with cross-learning and show that their regret has better dependence on the number of contexts. Under complete cross-learning where the rewards for all contexts are learned when choosing an action, i.e., set $\mathcal{O}_i(c)$ contains all contexts, we show that our algorithms achieve regret $\tilde{O}(\sqrt{KT})$, removing the dependence on $C$. For any other cases, i.e., under partial cross-learning where $|\mathcal{O}_i(c)|< C$ for some context-action pair of $(i,c)$, the regret bounds depend on how the sets $\mathcal O_i(c)$ impact the degree to which cross-learning between contexts is possible. We simulate our algorithms on real auction data from an ad exchange running first-price auctions and show that they outperform traditional contextual bandit algorithms.
△ Less
Submitted 15 November, 2021; v1 submitted 25 September, 2018;
originally announced September 2018.
-
Updating Content in Cache-Aided Coded Multicast
Authors:
Milad Mahdian,
N. Prakash,
Muriel Médard,
Edmund Yeh
Abstract:
Motivated by applications to delivery of dynamically updated, but correlated data in settings such as content distribution networks, and distributed file sharing systems, we study a single source multiple destination network coded multicast problem in a cache-aided network. We focus on models where the caches are primarily located near the destinations, and where the source has no cache. The sourc…
▽ More
Motivated by applications to delivery of dynamically updated, but correlated data in settings such as content distribution networks, and distributed file sharing systems, we study a single source multiple destination network coded multicast problem in a cache-aided network. We focus on models where the caches are primarily located near the destinations, and where the source has no cache. The source observes a sequence of correlated frames, and is expected to do frame-by-frame encoding with no access to prior frames. We present a novel scheme that shows how the caches can be advantageously used to decrease the overall cost of multicast, even though the source encodes without access to past data. Our cache design and update scheme works with any choice of network code designed for a corresponding cache-less network, is largely decentralized, and works for an arbitrary network. We study a convex relation of the optimization problem that results form the overall cost function. The results of the optimization problem determines the rate allocation and caching strategies. Numerous simulation results are presented to substantiate the theory developed.
△ Less
Submitted 1 May, 2018;
originally announced May 2018.
-
SCRank: Spammer and Celebrity Ranking in Directed Social Networks
Authors:
Alex Fabrikant,
Mohammad Mahdian,
Andrew Tomkins
Abstract:
Many online social networks allow directed edges: Alice can unilaterally add an "edge" to Bob, typically indicating interest in Bob or Bob's content, without Bob's permission or reciprocation. In directed social networks we observe the rise of two distinctive classes of users: celebrities who accrue unreciprocated incoming links, and follow spammers, who generate unreciprocated outgoing links. Ide…
▽ More
Many online social networks allow directed edges: Alice can unilaterally add an "edge" to Bob, typically indicating interest in Bob or Bob's content, without Bob's permission or reciprocation. In directed social networks we observe the rise of two distinctive classes of users: celebrities who accrue unreciprocated incoming links, and follow spammers, who generate unreciprocated outgoing links. Identifying users in these two classes is important for abuse detection, user and content ranking, privacy choices, and other social network features.
In this paper we develop SCRank, an iterative algorithm to identify such users. We analyze SCRank both theoretically and experimentally. The spammer-celebrity definition is not amenable to analysis using standard power iteration, so we develop a novel potential function argument to show convergence to an approximate equilibrium point for a class of algorithms including SCRank. We then use experimental evaluation on a real global-scale social network and on synthetically generated graphs to observe that the algorithm converges quickly and consistently. Using synthetic data with built-in ground truth, we also experimentally show that the algorithm provides a good approximation to planted celebrities and spammers.
△ Less
Submitted 22 February, 2018;
originally announced February 2018.
-
MinDelay: Low-latency Forwarding and Caching Algorithms for Information-Centric Networks
Authors:
Milad Mahdian,
Edmund Yeh
Abstract:
We present a new unified framework for minimizing congestion-dependent network cost in information-centric networks by jointly optimizing forwarding and caching strategies. As caching variables are integer-constrained, the resulting optimization problem is NP-hard. To make progress, we focus on a relaxed version of the optimization problem, where caching variables are allowed to be real-valued. We…
▽ More
We present a new unified framework for minimizing congestion-dependent network cost in information-centric networks by jointly optimizing forwarding and caching strategies. As caching variables are integer-constrained, the resulting optimization problem is NP-hard. To make progress, we focus on a relaxed version of the optimization problem, where caching variables are allowed to be real-valued. We develop necessary optimality conditions for the relaxed problem, and leverage this result to design MinDelay, an adaptive and distributed joint forwarding and caching algorithm, based on the conditional gradient algorithm. The MinDelay algorithm elegantly yields feasible routing variables and integer caching variables at each iteration, and can be implemented in a distributed manner with low complexity and overhead. Over a wide range of network topologies, simulation results show that MinDelay typically has significantly better delay performance in the low to moderate request rate regions. Furthermore, the MinDelay and VIP algorithms complement each other in delivering superior delay performance across the entire range of request arrival rates.
△ Less
Submitted 14 October, 2017;
originally announced October 2017.
-
Sudoku Rectangle Completion
Authors:
Mohammad Mahdian,
Ebadollah S. Mahmoodian
Abstract:
Over the last decade, Sudoku, a combinatorial number-placement puzzle, has become a favorite pastimes of many all around the world. In this puzzle, the task is to complete a partially filled $9 \times 9$ square with numbers 1 through 9, subject to the constraint that each number must appear once in each row, each column, and each of the nine $3 \times 3$ blocks. Sudoku squares can be considered a…
▽ More
Over the last decade, Sudoku, a combinatorial number-placement puzzle, has become a favorite pastimes of many all around the world. In this puzzle, the task is to complete a partially filled $9 \times 9$ square with numbers 1 through 9, subject to the constraint that each number must appear once in each row, each column, and each of the nine $3 \times 3$ blocks. Sudoku squares can be considered a subclass of the well-studied class of Latin squares. In this paper, we study natural extensions of a classical result on Latin square completion to Sudoku squares. Furthermore, we use the procedure developed in the proof to obtain asymptotic bounds on the number of Sudoku squares of order $n$.
△ Less
Submitted 26 April, 2017;
originally announced April 2017.
-
Throughput and Delay Scaling of Content-Centric Ad Hoc and Heterogeneous Wireless Networks
Authors:
Milad Mahdian,
Edmund Yeh
Abstract:
We study the throughput and delay characteristics of wireless caching networks, where users are mainly interested in retrieving content stored in the network, rather than in maintaining source-destination communication. Nodes are assumed to be uniformly distributed in the network area. Each node has a limited-capacity content store, which it uses to cache contents. We propose an achievable caching…
▽ More
We study the throughput and delay characteristics of wireless caching networks, where users are mainly interested in retrieving content stored in the network, rather than in maintaining source-destination communication. Nodes are assumed to be uniformly distributed in the network area. Each node has a limited-capacity content store, which it uses to cache contents. We propose an achievable caching and transmission scheme whereby requesters retrieve content from the caching point which is closest in Euclidean distance. We establish the throughput and delay scaling of the achievable scheme, and show that the throughput and delay performance are order-optimal within a class of schemes. We then solve the caching optimization problem, and evaluate the network performance for a Zipf content popularity distribution, letting the number of content types and the network size both go to infinity. Finally, we extend our analysis to heterogeneous wireless networks where, in addition to wireless nodes, there are a number of base stations uniformly distributed at random in the network area. We show that in order to achieve a better performance in a heterogeneous network in the order sense, the number of base stations needs to be greater than the ratio of the number of nodes to the number of content types. Furthermore, we show that the heterogeneous network does not yield performance advantages in the order sense if the Zipf content popularity distribution exponent exceeds 3/2.
△ Less
Submitted 22 April, 2017; v1 submitted 14 April, 2015;
originally announced April 2015.
-
Designing Markets for Daily Deals
Authors:
Yang Cai,
Mohammad Mahdian,
Aranyak Mehta,
Bo Waggoner
Abstract:
Daily deals platforms such as Amazon Local, Google Offers, GroupOn, and LivingSocial have provided a new channel for merchants to directly market to consumers. In order to maximize consumer acquisition and retention, these platforms would like to offer deals that give good value to users. Currently, selecting such deals is done manually; however, the large number of submarkets and localities neces…
▽ More
Daily deals platforms such as Amazon Local, Google Offers, GroupOn, and LivingSocial have provided a new channel for merchants to directly market to consumers. In order to maximize consumer acquisition and retention, these platforms would like to offer deals that give good value to users. Currently, selecting such deals is done manually; however, the large number of submarkets and localities necessitates an automatic approach to selecting good deals and determining merchant payments.
We approach this challenge as a market design problem. We postulate that merchants already have a good idea of the attractiveness of their deal to consumers as well as the amount they are willing to pay to offer their deal. The goal is to design an auction that maximizes a combination of the revenue of the auctioneer (platform), welfare of the bidders (merchants), and the positive externality on a third party (the consumer), despite the asymmetry of information about this consumer benefit. We design auctions that truthfully elicit this information from the merchants and maximize the social welfare objective, and we characterize the consumer welfare functions for which this objective is truthfully implementable. We generalize this characterization to a very broad mechanism-design setting and give examples of other applications.
△ Less
Submitted 1 October, 2013;
originally announced October 2013.
-
Comparison of quantum discord and relative entropy in some bipartite quantum systems
Authors:
M. Mahdian,
M. B. Arjmandi
Abstract:
The study of quantum correlations in High-dimensional bipartite systems is crucial for the development of quantum computing. We propose relative entropy as a distance measure of correlations may be measured by means of the distance from the quantum state to the closest classical-classical state. In particular, We establish relations between relative entropy and quantum discord quantifiers obtained…
▽ More
The study of quantum correlations in High-dimensional bipartite systems is crucial for the development of quantum computing. We propose relative entropy as a distance measure of correlations may be measured by means of the distance from the quantum state to the closest classical-classical state. In particular, We establish relations between relative entropy and quantum discord quantifiers obtained by means of orthogonal projective measurements. We show that for symmetrical X-states density matrices the quantum discord is equal to relative entropy. At the end of paper, various examples of X-states such as two-qubit and qubit-qutrit have been demonstrated .
△ Less
Submitted 10 April, 2016; v1 submitted 5 August, 2013;
originally announced August 2013.
-
Effect of Quantum correlation on Perfect K pair Quantum Network Coding
Authors:
Mahmoud Mahdian,
Roghayeh Bayramzadeh
Abstract:
We find a protocol transmitting K quantum states crossly in the quantum networks with K pair sender-receiver and one bottleneck channels only with sharing quantum correlations between senders. In these networks senders want to multi cast perfect quantum states to receivers. Perfect send on the quantum networks is impossible just using some additional resources like quantum correlation. This protoc…
▽ More
We find a protocol transmitting K quantum states crossly in the quantum networks with K pair sender-receiver and one bottleneck channels only with sharing quantum correlations between senders. In these networks senders want to multi cast perfect quantum states to receivers. Perfect send on the quantum networks is impossible just using some additional resources like quantum correlation. This protocol has been used maximum entangled states and Quantum Discord which is best indicator of the quantum nature of the correlation to sharing between senders. At first, to send perfect K states in quantum network applied some maximum entanglement states to teleport quantum states, Enistein - Podolsky - Rosen (EPR) states as simple and two qubit states and Grrenberger- Horne - Zeilinger (GHZ) states and W states as kinds of three qubit states. Then reached that there is no difference between sharing these maximum entanglement states and must send same amount of classical bits in bottleneck channel. In the second part of this paper of sharing Quantum Correlation (quantum discord) perfect send of two quantum states is possible in the Butterfly network with fidelity equal one.
△ Less
Submitted 8 July, 2013;
originally announced July 2013.
-
Kraus representation for maps and master equation in spin star model with layered environment
Authors:
Mahmoud Mahdian,
Hadi Mehrabpour
Abstract:
Quantum operations are usually defined as completely positive (CP), trace preserving (TP) maps on quantum states, and can be represented by operator-sum or Kraus representations. In this paper, we calculate operator-sum representation and master equation of an exactly solvable dynamic of one-qubit open system in layered environment . On the other hand, we obtain exact Nakajima-Zwanzig (NZ) and tim…
▽ More
Quantum operations are usually defined as completely positive (CP), trace preserving (TP) maps on quantum states, and can be represented by operator-sum or Kraus representations. In this paper, we calculate operator-sum representation and master equation of an exactly solvable dynamic of one-qubit open system in layered environment . On the other hand, we obtain exact Nakajima-Zwanzig (NZ) and time-convolutionless (TCL) master equation from the maps. Finally, we study a simple example to consider the relation between CP maps and initial quantum correlation and show that vanishing initial quantum correlation is not necessary for CP maps.
△ Less
Submitted 22 April, 2013;
originally announced April 2013.
-
Exact dynamics of one-qubit system in layered environment
Authors:
Mahmoud Mahdian,
Hadi Mehrabpour
Abstract:
We investigate the exact evolution of the reduced dynamics of a one qubit system as central spin coupled to a femionic layered environment with unlimited number of layers. Also, we study the decoherence induced on central spin by analysis solution is obtained in the limit $N\rightarrow\infty$ of an infinite number of bath spins. Finally, the Nakajima-Zwanzig (NZ) and the time-convolutionless (TCL)…
▽ More
We investigate the exact evolution of the reduced dynamics of a one qubit system as central spin coupled to a femionic layered environment with unlimited number of layers. Also, we study the decoherence induced on central spin by analysis solution is obtained in the limit $N\rightarrow\infty$ of an infinite number of bath spins. Finally, the Nakajima-Zwanzig (NZ) and the time-convolutionless (TCL) projection operator techniques to second order are derived.
△ Less
Submitted 22 April, 2013;
originally announced April 2013.
-
Noisy channel effect on quantum correlations of two relativistic particles
Authors:
M. Mahdian,
T. Makaremi,
Sh. Salimi
Abstract:
We study the quantum correlation dynamics of two relativistic particles which is transmitted through one of the Pauli channels $ σ_{x}, σ_{y},$ and $σ_{z}$.
We compare sudden death and robustness of entanglement and geometric discord and quantum discord of two relativistic particles under noisy Pauli channels. we find out geometric discord and quantum discord may be more robust than entanglement…
▽ More
We study the quantum correlation dynamics of two relativistic particles which is transmitted through one of the Pauli channels $ σ_{x}, σ_{y},$ and $σ_{z}$.
We compare sudden death and robustness of entanglement and geometric discord and quantum discord of two relativistic particles under noisy Pauli channels. we find out geometric discord and quantum discord may be more robust than entanglement against decoherence.
△ Less
Submitted 9 June, 2012;
originally announced June 2012.
-
Quantum correlations of Two-Qubit XXZ Heisenberg Chain with Dzyaloshinsky-Moriya interaction coupled to bath spin as non-Markovian environment
Authors:
M. Mahdian,
M. Bagherpour Jeddi
Abstract:
We consider the quantum correlations (entanglement and quantum discord) dynamics of two coupled spin qubits with Dzyaloshinsky-Moriya interaction influenced by a locally external magnetic field along $z$-direction and coupled to bath spin-1/2 particles as independent non-Markovian environment. We find that with increasing $D_{z}$ and decreasing $J_{z}$, the value of entanglement and quantum discor…
▽ More
We consider the quantum correlations (entanglement and quantum discord) dynamics of two coupled spin qubits with Dzyaloshinsky-Moriya interaction influenced by a locally external magnetic field along $z$-direction and coupled to bath spin-1/2 particles as independent non-Markovian environment. We find that with increasing $D_{z}$ and decreasing $J_{z}$, the value of entanglement and quantum discord increase for both antiferromagnetic and ferromagnetic materials. Not that, this growth is more for the ferromagnetic materials. In addition, we perceive that entanglement and quantum discord decrease with increased temperature and increased coupling constants between reduced system and bath. But, strong quantum correlations within the spins of bath reduce decoherence effects. We discuss about type of the constituent material of the central spins that it can speedup the quantum information processing and as a result, we perceive that one can improve and control the quantum information processing with correct selection of the properties of the reduced system ($J$, $J_{z}$, $D_{z}$).
△ Less
Submitted 1 May, 2012; v1 submitted 27 April, 2012;
originally announced April 2012.
-
Relativistic entanglement in single-particle quantum states using Non-Linear entanglement witnesses
Authors:
M. A. Jafarizadeh,
M. Mahdian
Abstract:
In this study, the spin-momentum correlation of one massive spin-1/2 and spin-1 particle states, which are made based on projection of a relativistic spin operator into timelike direction is investigated. It is shown that by using Non-Linear entanglement witnesses (NLEWs), the effect of Lorentz transformation would decrease both the amount and the region of entanglement.
In this study, the spin-momentum correlation of one massive spin-1/2 and spin-1 particle states, which are made based on projection of a relativistic spin operator into timelike direction is investigated. It is shown that by using Non-Linear entanglement witnesses (NLEWs), the effect of Lorentz transformation would decrease both the amount and the region of entanglement.
△ Less
Submitted 1 May, 2012; v1 submitted 18 April, 2012;
originally announced April 2012.
-
Correlation dynamics of three spin under a classical dephasing environment
Authors:
M. Mahdian,
R. Yousefjani,
S. Salimi
Abstract:
By starting from the stochastic Hamiltonian of the three correlated spins and modeling their frequency fluctuations as caused by dephasing noisy environments described by Ornstein-Uhlenbeck processes, we study the dynamics of quantum correlations, including entanglement and quantum discord. We prepared initially our open system with Greenberger-Horne-Zeilinger or W state and present the exact solu…
▽ More
By starting from the stochastic Hamiltonian of the three correlated spins and modeling their frequency fluctuations as caused by dephasing noisy environments described by Ornstein-Uhlenbeck processes, we study the dynamics of quantum correlations, including entanglement and quantum discord. We prepared initially our open system with Greenberger-Horne-Zeilinger or W state and present the exact solutions for evolution dynamics of entanglement and quantum discord between three spins under both Markovian and non-Markovian regime of this classical noise. By comparison the dynamics of entanglement with that of quantum discord we find that entanglement can be more robust than quantum discord against this noise. It is shown that by considering non-Markovian extensions the survival time of correlations prolong.
△ Less
Submitted 18 April, 2012;
originally announced April 2012.
-
Electric Field effects on quantum correlations in semiconductor quantum dots
Authors:
S. Shojaei,
M. Mahdian,
R. Yousefjani
Abstract:
We study the effect of external electric bias on the quantum correlations in the array of optically excited coupled semiconductor quantum dots. The correlations are characterized by the quantum discord and concurrence and are observed using excitonic qubits. We employ the lower bound of concurrence for thermal density matrix at different temperatures. The effect of the Förster interaction on corre…
▽ More
We study the effect of external electric bias on the quantum correlations in the array of optically excited coupled semiconductor quantum dots. The correlations are characterized by the quantum discord and concurrence and are observed using excitonic qubits. We employ the lower bound of concurrence for thermal density matrix at different temperatures. The effect of the Förster interaction on correlations will be studied. Our theoretical model detects nonvanishing quantum discord when the electric field is on while concurrence dies, ensuring the existence of nonclassical correlations as measured by the quantum discord.
△ Less
Submitted 1 May, 2012; v1 submitted 18 April, 2012;
originally announced April 2012.
-
Quantum discord evolution of three-qubit states under noisy channels
Authors:
M. Mahdian,
R. Yousefjani,
S. Salimi
Abstract:
We investigated the dissipative dynamics of quantum discord for correlated qubits under Markovian environments.
The basic idea in the present scheme is that quantum discord is more general, and possibly more robust and fundamental, than entanglement. We provide three initially correlated qubits in pure Greenberger-Horne-Zeilinger (GHZ) or W state and analyse the time evolution of the quantum dis…
▽ More
We investigated the dissipative dynamics of quantum discord for correlated qubits under Markovian environments.
The basic idea in the present scheme is that quantum discord is more general, and possibly more robust and fundamental, than entanglement. We provide three initially correlated qubits in pure Greenberger-Horne-Zeilinger (GHZ) or W state and analyse the time evolution of the quantum discord under various dissipative channels such as:
Pauli channels $σ_{x}$, $σ_{y}$, and $σ_{z}$, as well as depolarising channels. Surprisingly, we find that under the action of Pauli channel $σ_{x}$, the quantum discord of GHZ state is not affected by decoherence. For the remaining dissipative channels, the W state is more robust than the GHZ state against decoherence. Moreover, we compare the dynamics of entanglement with that of the quantum discord under the conditions in which disentanglement occurs and show that quantum discord is more robust than entanglement except for phase flip coupling of the three qubits system to the environment.
△ Less
Submitted 5 April, 2012;
originally announced April 2012.
-
Spin-momentum correlation in relativistic single particle quantum states
Authors:
M. A. Jafarizadeha,
M. Mahdian
Abstract:
This paper was concerned with the spin-momentum correlation in single-particle quantum states, which is described by the mixed states under Lorentz transformations. For convenience, instead of using the superposition of momenta we use only two momentum eigen states (p1 and p2) that are perpendicular to the Lorentz boost direction. Consequently, in 2D momentum subspace we show that the entanglement…
▽ More
This paper was concerned with the spin-momentum correlation in single-particle quantum states, which is described by the mixed states under Lorentz transformations. For convenience, instead of using the superposition of momenta we use only two momentum eigen states (p1 and p2) that are perpendicular to the Lorentz boost direction. Consequently, in 2D momentum subspace we show that the entanglement of spin-momentum in the moving frame depends on the angle between them. Therefore, when spin and momentum are perpendicular the measure of entanglement is not observer-dependent quantity in inertial frame. Likewise, we have calculated the measure of entanglement (by using the concurrence) and has shown that entanglement decreases with respect to the increasing of observer velocity. Finally, we argue that, Wigner rotation is induced by Lorentz transformations can be realized as controlling operator.
△ Less
Submitted 4 August, 2010;
originally announced August 2010.
-
Quantifying entanglement of two relativistic particles via decomposable optimal entanglement witnesses
Authors:
M. A. Jafarizadeh,
M. Mahdian
Abstract:
The study of Entanglement of Formation of a mixed state of a bipartite system in high-dimensional Hilbert space is not easy in general. So, we focus on determining the amount of entanglement for a bipartite mixed state based on the concept of decomposable optimal entanglement witness (DOEW), that can be calculated as a minimum distance of an entangled state from the edge of positive partial tran…
▽ More
The study of Entanglement of Formation of a mixed state of a bipartite system in high-dimensional Hilbert space is not easy in general. So, we focus on determining the amount of entanglement for a bipartite mixed state based on the concept of decomposable optimal entanglement witness (DOEW), that can be calculated as a minimum distance of an entangled state from the edge of positive partial transpose (PPT) states which has the most negative (positive) expectation value for non-PPT (bound) entangled states. We have constructed DOEWs based on the convex optimization method, then by using of it we quantify the degree of entanglement for two spin half particles under the Lorentz transformations. For convenience, we restrict ourselves to 2D momentum subspace and under this constraint when the momentum and the Lorentz boost are parallel, we have shown that the entanglement is not relativistic invariant. Keywords : Relativistic entanglement, Measure of entanglement, Optimal entanglement witnesses, Convex optimization PACS numbers: 03.67.Hk, 03.65.Ta
△ Less
Submitted 12 November, 2009;
originally announced November 2009.
-
A linear algebraic approach to orthogonal arrays and Latin squares
Authors:
A. A. Khanban,
M. Mahdian,
E. S. Mahmoodian
Abstract:
To study orthogonal arrays and signed orthogonal arrays, Ray-Chaudhuri and Singhi (1988 and 1994) considered some module spaces. Here, using a linear algebraic approach we define an inclusion matrix and find its rank. In the special case of Latin squares we show that there is a straightforward algorithm for generating a basis for this matrix using the so-called intercalates. We also extend this…
▽ More
To study orthogonal arrays and signed orthogonal arrays, Ray-Chaudhuri and Singhi (1988 and 1994) considered some module spaces. Here, using a linear algebraic approach we define an inclusion matrix and find its rank. In the special case of Latin squares we show that there is a straightforward algorithm for generating a basis for this matrix using the so-called intercalates. We also extend this last idea.
△ Less
Submitted 2 May, 2009;
originally announced May 2009.
-
Investigating a Class of $2\otimes2\otimes d$ Chessboard Density Matrices via Linear and Non-linear Entanglement Witnesses Constructed by Exact Convex Optimization
Authors:
M. A. Jafarizadeh,
Y. Akbari,
K. Aghayar,
A. Heshmati,
M. Mahdian
Abstract:
Here we consider a class of $2\otimes2\otimes d$ chessboard density matrices starting with three-qubit ones which have positive partial transposes with respect to all subsystems. To investigate the entanglement of these density matrices, we use the entanglement witness approach. For constructing entanglement witnesses (EWs) detecting these density matrices, we attempt to convert the problem to a…
▽ More
Here we consider a class of $2\otimes2\otimes d$ chessboard density matrices starting with three-qubit ones which have positive partial transposes with respect to all subsystems. To investigate the entanglement of these density matrices, we use the entanglement witness approach. For constructing entanglement witnesses (EWs) detecting these density matrices, we attempt to convert the problem to an exact convex optimization problem. To this aim, we map the convex set of separable states into a convex region, named feasible region, and consider cases that the exact geometrical shape of feasible region can be obtained. In this way, various linear and non-linear EWs are constructed. The optimality and decomposability of some of introduced EWs are also considered. Furthermore, the detection of the density matrices by introduced EWs are discussed analytically and numerically.
{\bf Keywords: chessboard density matrices, optimal non-linear entanglement witnesses, convex optimization}
{\bf PACs Index: 03.65.Ud}
△ Less
Submitted 31 January, 2008;
originally announced January 2008.
-
Detecting three-qubit bound MUB diagonal entangled states via Nonlinear optimal entanglement witnesses
Authors:
M. A. Jafarizadeh,
M. Mahdian,
A. Heshmati,
K. Aghayari
Abstract:
One of the important approaches to detect quantum entanglement is using linear entanglement witnesses EWs. In this paper, by determining the envelope of the boundary hyper-planes defined by a family of linear EWs, a set of powerful nonlinear optimal EWs is manipulated. These EWs enable us to detect some three qubits bound MUB (mutually unbiased bases) diagonal entangled states, i.e., the PPT (po…
▽ More
One of the important approaches to detect quantum entanglement is using linear entanglement witnesses EWs. In this paper, by determining the envelope of the boundary hyper-planes defined by a family of linear EWs, a set of powerful nonlinear optimal EWs is manipulated. These EWs enable us to detect some three qubits bound MUB (mutually unbiased bases) diagonal entangled states, i.e., the PPT (positive partial transpose) entangled states. Also, in some particular cases, the introduced nonlinear optimal EWs are powerful enough to separate the bound entangled regions from the separable ones. Finally, we present numerical examples to demonstrate the practical accessibility of this approach.
Keywords :nonlinear optimal entanglement witnesses, mutually unbiased bases, MUB diagonal states
△ Less
Submitted 20 January, 2008;
originally announced January 2008.
-
Greedy Facility Location Algorithms Analyzed using Dual Fitting with Factor-Revealing LP
Authors:
Kamal Jain,
Mohammad Mahdian,
Evangelos Markakis,
Amin Saberi,
Vijay V. Vazirani
Abstract:
In this paper, we will formalize the method of dual fitting and the idea of factor-revealing LP. This combination is used to design and analyze two greedy algorithms for the metric uncapacitated facility location problem. Their approximation factors are 1.861 and 1.61, with running times of O(mlog m) and O(n^3), respectively, where n is the total number of vertices and m is the number of edges i…
▽ More
In this paper, we will formalize the method of dual fitting and the idea of factor-revealing LP. This combination is used to design and analyze two greedy algorithms for the metric uncapacitated facility location problem. Their approximation factors are 1.861 and 1.61, with running times of O(mlog m) and O(n^3), respectively, where n is the total number of vertices and m is the number of edges in the underlying complete bipartite graph between cities and facilities. The algorithms are used to improve recent results for several variants of the problem.
△ Less
Submitted 8 July, 2002;
originally announced July 2002.