-
SAFE: Multitask Failure Detection for Vision-Language-Action Models
Authors:
Qiao Gu,
Yuanliang Ju,
Shengxiang Sun,
Igor Gilitschenski,
Haruki Nishimura,
Masha Itkina,
Florian Shkurti
Abstract:
While vision-language-action models (VLAs) have shown promising robotic behaviors across a diverse set of manipulation tasks, they achieve limited success rates when deployed on novel tasks out-of-the-box. To allow these policies to safely interact with their environments, we need a failure detector that gives a timely alert such that the robot can stop, backtrack, or ask for help. However, existi…
▽ More
While vision-language-action models (VLAs) have shown promising robotic behaviors across a diverse set of manipulation tasks, they achieve limited success rates when deployed on novel tasks out-of-the-box. To allow these policies to safely interact with their environments, we need a failure detector that gives a timely alert such that the robot can stop, backtrack, or ask for help. However, existing failure detectors are trained and tested only on one or a few specific tasks, while VLAs require the detector to generalize and detect failures also in unseen tasks and novel environments. In this paper, we introduce the multitask failure detection problem and propose SAFE, a failure detector for generalist robot policies such as VLAs. We analyze the VLA feature space and find that VLAs have sufficient high-level knowledge about task success and failure, which is generic across different tasks. Based on this insight, we design SAFE to learn from VLA internal features and predict a single scalar indicating the likelihood of task failure. SAFE is trained on both successful and failed rollouts, and is evaluated on unseen tasks. SAFE is compatible with different policy architectures. We test it on OpenVLA, $π_0$, and $π_0$-FAST in both simulated and real-world environments extensively. We compare SAFE with diverse baselines and show that SAFE achieves state-of-the-art failure detection performance and the best trade-off between accuracy and detection time using conformal prediction. More qualitative results can be found at https://vla-safe.github.io/.
△ Less
Submitted 11 June, 2025;
originally announced June 2025.
-
STITCH-OPE: Trajectory Stitching with Guided Diffusion for Off-Policy Evaluation
Authors:
Hossein Goli,
Michael Gimelfarb,
Nathan Samuel de Lara,
Haruki Nishimura,
Masha Itkina,
Florian Shkurti
Abstract:
Off-policy evaluation (OPE) estimates the performance of a target policy using offline data collected from a behavior policy, and is crucial in domains such as robotics or healthcare where direct interaction with the environment is costly or unsafe. Existing OPE methods are ineffective for high-dimensional, long-horizon problems, due to exponential blow-ups in variance from importance weighting or…
▽ More
Off-policy evaluation (OPE) estimates the performance of a target policy using offline data collected from a behavior policy, and is crucial in domains such as robotics or healthcare where direct interaction with the environment is costly or unsafe. Existing OPE methods are ineffective for high-dimensional, long-horizon problems, due to exponential blow-ups in variance from importance weighting or compounding errors from learned dynamics models. To address these challenges, we propose STITCH-OPE, a model-based generative framework that leverages denoising diffusion for long-horizon OPE in high-dimensional state and action spaces. Starting with a diffusion model pre-trained on the behavior data, STITCH-OPE generates synthetic trajectories from the target policy by guiding the denoising process using the score function of the target policy. STITCH-OPE proposes two technical innovations that make it advantageous for OPE: (1) prevents over-regularization by subtracting the score of the behavior policy during guidance, and (2) generates long-horizon trajectories by stitching partial trajectories together end-to-end. We provide a theoretical guarantee that under mild assumptions, these modifications result in an exponential reduction in variance versus long-horizon trajectory diffusion. Experiments on the D4RL and OpenAI Gym benchmarks show substantial improvement in mean squared error, correlation, and regret metrics compared to state-of-the-art OPE methods.
△ Less
Submitted 27 May, 2025;
originally announced May 2025.
-
Group Order is in QCMA
Authors:
François Le Gall,
Harumichi Nishimura,
Dhara Thakkar
Abstract:
In this work, we show that verifying the order of a finite group given as a black-box is in the complexity class QCMA. This solves an open problem asked by Watrous in 2000 in his seminal paper on quantum proofs and directly implies that the Group Non-Membership problem is also in the class QCMA, which further proves a conjecture proposed by Aaronson and Kuperberg in 2006. Our techniques also give…
▽ More
In this work, we show that verifying the order of a finite group given as a black-box is in the complexity class QCMA. This solves an open problem asked by Watrous in 2000 in his seminal paper on quantum proofs and directly implies that the Group Non-Membership problem is also in the class QCMA, which further proves a conjecture proposed by Aaronson and Kuperberg in 2006. Our techniques also give improved quantum upper bounds on the complexity of many other group-theoretical problems, such as group isomorphism in black-box groups.
△ Less
Submitted 7 April, 2025;
originally announced April 2025.
-
Is Your Imitation Learning Policy Better than Mine? Policy Comparison with Near-Optimal Stopping
Authors:
David Snyder,
Asher James Hancock,
Apurva Badithela,
Emma Dixon,
Patrick Miller,
Rares Andrei Ambrus,
Anirudha Majumdar,
Masha Itkina,
Haruki Nishimura
Abstract:
Imitation learning has enabled robots to perform complex, long-horizon tasks in challenging dexterous manipulation settings. As new methods are developed, they must be rigorously evaluated and compared against corresponding baselines through repeated evaluation trials. However, policy comparison is fundamentally constrained by a small feasible sample size (e.g., 10 or 50) due to significant human…
▽ More
Imitation learning has enabled robots to perform complex, long-horizon tasks in challenging dexterous manipulation settings. As new methods are developed, they must be rigorously evaluated and compared against corresponding baselines through repeated evaluation trials. However, policy comparison is fundamentally constrained by a small feasible sample size (e.g., 10 or 50) due to significant human effort and limited inference throughput of policies. This paper proposes a novel statistical framework for rigorously comparing two policies in the small sample size regime. Prior work in statistical policy comparison relies on batch testing, which requires a fixed, pre-determined number of trials and lacks flexibility in adapting the sample size to the observed evaluation data. Furthermore, extending the test with additional trials risks inducing inadvertent p-hacking, undermining statistical assurances. In contrast, our proposed statistical test is sequential, allowing researchers to decide whether or not to run more trials based on intermediate results. This adaptively tailors the number of trials to the difficulty of the underlying comparison, saving significant time and effort without sacrificing probabilistic correctness. Extensive numerical simulation and real-world robot manipulation experiments show that our test achieves near-optimal stopping, letting researchers stop evaluation and make a decision in a near-minimal number of trials. Specifically, it reduces the number of evaluation trials by up to 32% as compared to state-of-the-art baselines, while preserving the probabilistic correctness and statistical power of the comparison. Moreover, our method is strongest in the most challenging comparison instances (requiring the most evaluation trials); in a multi-task comparison scenario, we save the evaluator more than 160 simulation rollouts.
△ Less
Submitted 6 June, 2025; v1 submitted 13 March, 2025;
originally announced March 2025.
-
Can We Detect Failures Without Failure Data? Uncertainty-Aware Runtime Failure Detection for Imitation Learning Policies
Authors:
Chen Xu,
Tony Khuong Nguyen,
Emma Dixon,
Christopher Rodriguez,
Patrick Miller,
Robert Lee,
Paarth Shah,
Rares Ambrus,
Haruki Nishimura,
Masha Itkina
Abstract:
Recent years have witnessed impressive robotic manipulation systems driven by advances in imitation learning and generative modeling, such as diffusion- and flow-based approaches. As robot policy performance increases, so does the complexity and time horizon of achievable tasks, inducing unexpected and diverse failure modes that are difficult to predict a priori. To enable trustworthy policy deplo…
▽ More
Recent years have witnessed impressive robotic manipulation systems driven by advances in imitation learning and generative modeling, such as diffusion- and flow-based approaches. As robot policy performance increases, so does the complexity and time horizon of achievable tasks, inducing unexpected and diverse failure modes that are difficult to predict a priori. To enable trustworthy policy deployment in safety-critical human environments, reliable runtime failure detection becomes important during policy inference. However, most existing failure detection approaches rely on prior knowledge of failure modes and require failure data during training, which imposes a significant challenge in practicality and scalability. In response to these limitations, we present FAIL-Detect, a modular two-stage approach for failure detection in imitation learning-based robotic manipulation. To accurately identify failures from successful training data alone, we frame the problem as sequential out-of-distribution (OOD) detection. We first distill policy inputs and outputs into scalar signals that correlate with policy failures and capture epistemic uncertainty. FAIL-Detect then employs conformal prediction (CP) as a versatile framework for uncertainty quantification with statistical guarantees. Empirically, we thoroughly investigate both learned and post-hoc scalar signal candidates on diverse robotic manipulation tasks. Our experiments show learned signals to be mostly consistently effective, particularly when using our novel flow-based density estimator. Furthermore, our method detects failures more accurately and faster than state-of-the-art (SOTA) failure detection baselines. These results highlight the potential of FAIL-Detect to enhance the safety and reliability of imitation learning-based robotic systems as they progress toward real-world deployment.
△ Less
Submitted 20 June, 2025; v1 submitted 11 March, 2025;
originally announced March 2025.
-
Does there exist a quantum fingerprinting protocol without coherent measurements?
Authors:
Atsuya Hasegawa,
Srijita Kundu,
François Le Gall,
Harumichi Nishimura,
Qisheng Wang
Abstract:
Buhrman, Cleve, Watrous, and de Wolf (PRL 2001) discovered the quantum fingerprinting protocol, which is the quantum SMP protocol with $O(\log n)$ qubits communication for the equality problem. In the protocol, Alice and Bob create some quantum fingerprints of their inputs, and the referee conducts the SWAP tests for the quantum fingerprints. Since $Ω(\sqrt{n})$ bits communication is required with…
▽ More
Buhrman, Cleve, Watrous, and de Wolf (PRL 2001) discovered the quantum fingerprinting protocol, which is the quantum SMP protocol with $O(\log n)$ qubits communication for the equality problem. In the protocol, Alice and Bob create some quantum fingerprints of their inputs, and the referee conducts the SWAP tests for the quantum fingerprints. Since $Ω(\sqrt{n})$ bits communication is required with the classical SMP scheme for the equality problem first shown by Newman and Szegedy (STOC 1996), there exists an exponential quantum advantage in the amount of communication.
In this paper, we consider a setting in which the referee can do only incoherent measurements rather than coherent measurements including the SWAP tests. We first show that, in the case of one-way LOCC measurements, $Ω(\sqrt{n})$ qubits communication is required. To prove the result, we derive a new method to replace quantum messages by classical messages and consider a reduction to the optimal lower bound in the hybrid SMP model where one message is quantum and the other is classical, which was first shown by Klauck and Podder (MFCS 2014). Our method uses the result of Oszmaniec, Guerini, Wittek, and Acín (PRL 2017), who showed that general POVM measurements can be simulated by randomized projective measurements with small ancilla qubits, and Newman's theorem.
We further investigate the setting of quantum SMP protocols with two-way LOCC measurements, and derive a lower bound against some restricted two-way LOCC measurements. To prove it, we revisit the technique to replace quantum messages by classical deterministic messages introduced by Aaronson (ToC 2005) and generalized by Gavinsky, Regev, and de Wolf (CJTCS 2008), and show that, using the deterministic message, the referee can simulate the two-way LOCC measurements.
△ Less
Submitted 18 February, 2025;
originally announced February 2025.
-
Quantum Simultaneous Protocols without Public Coins using Modified Equality Queries
Authors:
François Le Gall,
Oran Nadler,
Harumichi Nishimura,
Rotem Oshman
Abstract:
In this paper we study a quantum version of the multiparty simultaneous message-passing (SMP) model, and we show that in some cases, quantum communication can replace public randomness, even with no entanglement between the parties. This was already known for two players, but not for more than two players, and indeed, so far all that was known was a negative result. Our main technical contribution…
▽ More
In this paper we study a quantum version of the multiparty simultaneous message-passing (SMP) model, and we show that in some cases, quantum communication can replace public randomness, even with no entanglement between the parties. This was already known for two players, but not for more than two players, and indeed, so far all that was known was a negative result. Our main technical contribution is a compiler that takes any classical public-coin simultaneous protocol based on "modified equality queries," and converts it into a quantum simultaneous protocol without public coins with roughly the same communication complexity. We then use our compiler to derive protocols for several problems, including frequency moments, neighborhood diversity, enumeration of isolated cliques, and more.
△ Less
Submitted 10 December, 2024;
originally announced December 2024.
-
Space-bounded quantum interactive proof systems
Authors:
François Le Gall,
Yupan Liu,
Harumichi Nishimura,
Qisheng Wang
Abstract:
We introduce two models of space-bounded quantum interactive proof systems, ${\sf QIPL}$ and ${\sf QIP_{\rm U}L}$. The ${\sf QIP_{\rm U}L}$ model, a space-bounded variant of quantum interactive proofs (${\sf QIP}$) introduced by Watrous (CC 2003) and Kitaev and Watrous (STOC 2000), restricts verifier actions to unitary circuits. In contrast, ${\sf QIPL}$ allows logarithmically many pinching interm…
▽ More
We introduce two models of space-bounded quantum interactive proof systems, ${\sf QIPL}$ and ${\sf QIP_{\rm U}L}$. The ${\sf QIP_{\rm U}L}$ model, a space-bounded variant of quantum interactive proofs (${\sf QIP}$) introduced by Watrous (CC 2003) and Kitaev and Watrous (STOC 2000), restricts verifier actions to unitary circuits. In contrast, ${\sf QIPL}$ allows logarithmically many pinching intermediate measurements per verifier action, making it the weakest model that encompasses the classical model of Condon and Ladner (JCSS 1995).
We characterize the computational power of ${\sf QIPL}$ and ${\sf QIP_{\rm U}L}$. When the message number $m$ is polynomially bounded, ${\sf QIP_{\rm U}L} \subsetneq {\sf QIPL}$ unless ${\sf P} = {\sf NP}$:
- ${\sf QIPL}^{\rm HC}$, a subclass of ${\sf QIPL}$ defined by a high-concentration condition on yes instances, exactly characterizes ${\sf NP}$.
- ${\sf QIP_{\rm U}L}$ is contained in ${\sf P}$ and contains ${\sf SAC}^1 \cup {\sf BQL}$, where ${\sf SAC}^1$ denotes problems solvable by classical logarithmic-depth, semi-unbounded fan-in circuits.
However, this distinction vanishes when $m$ is constant. Our results further indicate that (pinching) intermediate measurements uniquely impact space-bounded quantum interactive proofs, unlike in space-bounded quantum computation, where ${\sf BQL}={\sf BQ_{\rm U}L}$.
We also introduce space-bounded unitary quantum statistical zero-knowledge (${\sf QSZK_{\rm U}L}$), a specific form of ${\sf QIP_{\rm U}L}$ proof systems with statistical zero-knowledge against any verifier. This class is a space-bounded variant of quantum statistical zero-knowledge (${\sf QSZK}$) defined by Watrous (SICOMP 2009). We prove that ${\sf QSZK_{\rm U}L} = {\sf BQL}$, implying that the statistical zero-knowledge property negates the computational advantage typically gained from the interaction.
△ Less
Submitted 28 May, 2025; v1 submitted 31 October, 2024;
originally announced October 2024.
-
Edge-based Denoising Image Compression
Authors:
Ryugo Morita,
Hitoshi Nishimura,
Ko Watanabe,
Andreas Dengel,
Jinjia Zhou
Abstract:
In recent years, deep learning-based image compression, particularly through generative models, has emerged as a pivotal area of research. Despite significant advancements, challenges such as diminished sharpness and quality in reconstructed images, learning inefficiencies due to mode collapse, and data loss during transmission persist. To address these issues, we propose a novel compression model…
▽ More
In recent years, deep learning-based image compression, particularly through generative models, has emerged as a pivotal area of research. Despite significant advancements, challenges such as diminished sharpness and quality in reconstructed images, learning inefficiencies due to mode collapse, and data loss during transmission persist. To address these issues, we propose a novel compression model that incorporates a denoising step with diffusion models, significantly enhancing image reconstruction fidelity by sub-information(e.g., edge and depth) from leveraging latent space. Empirical experiments demonstrate that our model achieves superior or comparable results in terms of image quality and compression efficiency when measured against the existing models. Notably, our model excels in scenarios of partial image loss or excessive noise by introducing an edge estimation network to preserve the integrity of reconstructed images, offering a robust solution to the current limitations of image compression.
△ Less
Submitted 17 September, 2024;
originally announced September 2024.
-
How Generalizable Is My Behavior Cloning Policy? A Statistical Approach to Trustworthy Performance Evaluation
Authors:
Joseph A. Vincent,
Haruki Nishimura,
Masha Itkina,
Paarth Shah,
Mac Schwager,
Thomas Kollar
Abstract:
With the rise of stochastic generative models in robot policy learning, end-to-end visuomotor policies are increasingly successful at solving complex tasks by learning from human demonstrations. Nevertheless, since real-world evaluation costs afford users only a small number of policy rollouts, it remains a challenge to accurately gauge the performance of such policies. This is exacerbated by dist…
▽ More
With the rise of stochastic generative models in robot policy learning, end-to-end visuomotor policies are increasingly successful at solving complex tasks by learning from human demonstrations. Nevertheless, since real-world evaluation costs afford users only a small number of policy rollouts, it remains a challenge to accurately gauge the performance of such policies. This is exacerbated by distribution shifts causing unpredictable changes in performance during deployment. To rigorously evaluate behavior cloning policies, we present a framework that provides a tight lower-bound on robot performance in an arbitrary environment, using a minimal number of experimental policy rollouts. Notably, by applying the standard stochastic ordering to robot performance distributions, we provide a worst-case bound on the entire distribution of performance (via bounds on the cumulative distribution function) for a given task. We build upon established statistical results to ensure that the bounds hold with a user-specified confidence level and tightness, and are constructed from as few policy rollouts as possible. In experiments we evaluate policies for visuomotor manipulation in both simulation and hardware. Specifically, we (i) empirically validate the guarantees of the bounds in simulated manipulation settings, (ii) find the degree to which a learned policy deployed on hardware generalizes to new real-world environments, and (iii) rigorously compare two policies tested in out-of-distribution settings. Our experimental data, code, and implementation of confidence bounds are open-source.
△ Less
Submitted 18 July, 2024; v1 submitted 8 May, 2024;
originally announced May 2024.
-
On the Power of Quantum Distributed Proofs
Authors:
Atsuya Hasegawa,
Srijita Kundu,
Harumichi Nishimura
Abstract:
Quantum nondeterministic distributed computing was recently introduced as dQMA (distributed quantum Merlin-Arthur) protocols by Fraigniaud, Le Gall, Nishimura and Paz (ITCS 2021). In dQMA protocols, with the help of quantum proofs and local communication, nodes on a network verify a global property of the network. Fraigniaud et al. showed that, when the network size is small, there exists an expon…
▽ More
Quantum nondeterministic distributed computing was recently introduced as dQMA (distributed quantum Merlin-Arthur) protocols by Fraigniaud, Le Gall, Nishimura and Paz (ITCS 2021). In dQMA protocols, with the help of quantum proofs and local communication, nodes on a network verify a global property of the network. Fraigniaud et al. showed that, when the network size is small, there exists an exponential separation in proof size between distributed classical and quantum verification protocols, for the equality problem, where the verifiers check if all the data owned by a subset of them are identical. In this paper, we further investigate and characterize the power of the dQMA protocols for various decision problems.
First, we give a more efficient dQMA protocol for the equality problem with a simpler analysis. This is done by adding a symmetrization step on each node and exploiting properties of the permutation test, which is a generalization of the SWAP test. We also show a quantum advantage for the equality problem on path networks still persists even when the network size is large, by considering ``relay points'' between extreme nodes.
Second, we show that even in a general network, there exist efficient dQMA protocols for the ranking verification problem, the Hamming distance problem, and more problems that derive from efficient quantum one-way communication protocols. Third, in a line network, we construct an efficient dQMA protocol for a problem that has an efficient two-party QMA communication protocol.
Finally, we obtain the first lower bounds on the proof and communication cost of dQMA protocols. To prove a lower bound on the equality problem, we show any dQMA protocol with an entangled proof between nodes can be simulated with a dQMA protocol with a separable proof between nodes by using a QMA communication-complete problem introduced by Raz and Shpilka (CCC 2004).
△ Less
Submitted 20 March, 2024;
originally announced March 2024.
-
Best Complete Approximations of Preference Relations
Authors:
Hiroki Nishimura,
Efe A. Ok
Abstract:
We investigate the problem of approximating an incomplete preference relation $\succsim$ on a finite set by a complete preference relation. We aim to obtain this approximation in such a way that the choices on the basis of two preferences, one incomplete, the other complete, have the smallest possible discrepancy in the aggregate. To this end, we use the top-difference metric on preferences, and d…
▽ More
We investigate the problem of approximating an incomplete preference relation $\succsim$ on a finite set by a complete preference relation. We aim to obtain this approximation in such a way that the choices on the basis of two preferences, one incomplete, the other complete, have the smallest possible discrepancy in the aggregate. To this end, we use the top-difference metric on preferences, and define a best complete approximation of $\succsim$ as a complete preference relation nearest to $\succsim$ relative to this metric. We prove that such an approximation must be a maximal completion of $\succsim$, and that it is, in fact, any one completion of $\succsim$ with the largest index. Finally, we use these results to provide a sufficient condition for the best complete approximation of a preference to be its canonical completion. This leads to closed-form solutions to the best approximation problem in the case of several incomplete preference relations of interest.
△ Less
Submitted 11 November, 2023;
originally announced November 2023.
-
Residual Q-Learning: Offline and Online Policy Customization without Value
Authors:
Chenran Li,
Chen Tang,
Haruki Nishimura,
Jean Mercat,
Masayoshi Tomizuka,
Wei Zhan
Abstract:
Imitation Learning (IL) is a widely used framework for learning imitative behavior from demonstrations. It is especially appealing for solving complex real-world tasks where handcrafting reward function is difficult, or when the goal is to mimic human expert behavior. However, the learned imitative policy can only follow the behavior in the demonstration. When applying the imitative policy, we may…
▽ More
Imitation Learning (IL) is a widely used framework for learning imitative behavior from demonstrations. It is especially appealing for solving complex real-world tasks where handcrafting reward function is difficult, or when the goal is to mimic human expert behavior. However, the learned imitative policy can only follow the behavior in the demonstration. When applying the imitative policy, we may need to customize the policy behavior to meet different requirements coming from diverse downstream tasks. Meanwhile, we still want the customized policy to maintain its imitative nature. To this end, we formulate a new problem setting called policy customization. It defines the learning task as training a policy that inherits the characteristics of the prior policy while satisfying some additional requirements imposed by a target downstream task. We propose a novel and principled approach to interpret and determine the trade-off between the two task objectives. Specifically, we formulate the customization problem as a Markov Decision Process (MDP) with a reward function that combines 1) the inherent reward of the demonstration; and 2) the add-on reward specified by the downstream task. We propose a novel framework, Residual Q-learning, which can solve the formulated MDP by leveraging the prior policy without knowing the inherent reward or value function of the prior policy. We derive a family of residual Q-learning algorithms that can realize offline and online policy customization, and show that the proposed algorithms can effectively accomplish policy customization tasks in various environments. Demo videos and code are available on our website: https://sites.google.com/view/residualq-learning.
△ Less
Submitted 14 January, 2024; v1 submitted 15 June, 2023;
originally announced June 2023.
-
In-Distribution Barrier Functions: Self-Supervised Policy Filters that Avoid Out-of-Distribution States
Authors:
Fernando Castañeda,
Haruki Nishimura,
Rowan McAllister,
Koushil Sreenath,
Adrien Gaidon
Abstract:
Learning-based control approaches have shown great promise in performing complex tasks directly from high-dimensional perception data for real robotic systems. Nonetheless, the learned controllers can behave unexpectedly if the trajectories of the system divert from the training data distribution, which can compromise safety. In this work, we propose a control filter that wraps any reference polic…
▽ More
Learning-based control approaches have shown great promise in performing complex tasks directly from high-dimensional perception data for real robotic systems. Nonetheless, the learned controllers can behave unexpectedly if the trajectories of the system divert from the training data distribution, which can compromise safety. In this work, we propose a control filter that wraps any reference policy and effectively encourages the system to stay in-distribution with respect to offline-collected safe demonstrations. Our methodology is inspired by Control Barrier Functions (CBFs), which are model-based tools from the nonlinear control literature that can be used to construct minimally invasive safe policy filters. While existing methods based on CBFs require a known low-dimensional state representation, our proposed approach is directly applicable to systems that rely solely on high-dimensional visual observations by learning in a latent state-space. We demonstrate that our method is effective for two different visuomotor control tasks in simulation environments, including both top-down and egocentric view settings.
△ Less
Submitted 27 January, 2023;
originally announced January 2023.
-
Distributed Quantum Interactive Proofs
Authors:
François Le Gall,
Masayuki Miyamoto,
Harumichi Nishimura
Abstract:
The study of distributed interactive proofs was initiated by Kol, Oshman, and Saxena [PODC 2018] as a generalization of distributed decision mechanisms (proof-labeling schemes, etc.), and has received a lot of attention in recent years. In distributed interactive proofs, the nodes of an $n$-node network $G$ can exchange short messages (called certificates) with a powerful prover. The goal is to de…
▽ More
The study of distributed interactive proofs was initiated by Kol, Oshman, and Saxena [PODC 2018] as a generalization of distributed decision mechanisms (proof-labeling schemes, etc.), and has received a lot of attention in recent years. In distributed interactive proofs, the nodes of an $n$-node network $G$ can exchange short messages (called certificates) with a powerful prover. The goal is to decide if the input (including $G$ itself) belongs to some language, with as few turns of interaction and as few bits exchanged between nodes and the prover as possible. There are several results showing that the size of certificates can be reduced drastically with a constant number of interactions compared to non-interactive distributed proofs. In this paper, we introduce the quantum counterpart of distributed interactive proofs: certificates can now be quantum bits, and the nodes of the network can perform quantum computation. The first result of this paper shows that by using quantum distributed interactive proofs, the number of interactions can be significantly reduced. More precisely, our result shows that for any constant~$k$, the class of languages that can be decided by a $k$-turn classical (i.e., non-quantum) distributed interactive protocol with $f(n)$-bit certificate size is contained in the class of languages that can be decided by a $5$-turn distributed quantum interactive protocol with $O(f(n))$-bit certificate size. We also show that if we allow to use shared randomness, the number of turns can be reduced to 3-turn. Since no similar turn-reduction \emph{classical} technique is currently known, our result gives evidence of the power of quantum computation in the setting of distributed interactive proofs as well.
△ Less
Submitted 4 October, 2022;
originally announced October 2022.
-
Distributed Merlin-Arthur Synthesis of Quantum States and Its Applications
Authors:
François Le Gall,
Masayuki Miyamoto,
Harumichi Nishimura
Abstract:
The generation and verification of quantum states are fundamental tasks for quantum information processing that have recently been investigated by Irani, Natarajan, Nirkhe, Rao and Yuen [CCC 2022], Rosenthal and Yuen [ITCS 2022], Metger and Yuen [FOCS 2023] under the term \emph{state synthesis}. This paper studies this concept from the viewpoint of quantum distributed computing, and especially dis…
▽ More
The generation and verification of quantum states are fundamental tasks for quantum information processing that have recently been investigated by Irani, Natarajan, Nirkhe, Rao and Yuen [CCC 2022], Rosenthal and Yuen [ITCS 2022], Metger and Yuen [FOCS 2023] under the term \emph{state synthesis}. This paper studies this concept from the viewpoint of quantum distributed computing, and especially distributed quantum Merlin-Arthur (dQMA) protocols. We first introduce a novel task, on a line, called state generation with distributed inputs (SGDI). In this task, the goal is to generate the quantum state $U\ketψ$ at the rightmost node of the line, where $\ketψ$ is a quantum state given at the leftmost node and $U$ is a unitary matrix whose description is distributed over the nodes of the line. We give a dQMA protocol for SGDI and utilize this protocol to construct a dQMA protocol for the Set Equality problem studied by Naor, Parter and Yogev [SODA 2020], and complement our protocol by showing classical lower bounds for this problem. Our second contribution is a dQMA protocol, based on a recent work by Zhu and Hayashi [Physical Review A, 2019], to create EPR-pairs between adjacent nodes of a network without quantum communication. As an application of this dQMA protocol, we prove a general result showing how to convert any dQMA protocol on an arbitrary network into another dQMA protocol where the verification stage does not require any quantum communication.
△ Less
Submitted 10 August, 2023; v1 submitted 4 October, 2022;
originally announced October 2022.
-
RAP: Risk-Aware Prediction for Robust Planning
Authors:
Haruki Nishimura,
Jean Mercat,
Blake Wulfe,
Rowan McAllister,
Adrien Gaidon
Abstract:
Robust planning in interactive scenarios requires predicting the uncertain future to make risk-aware decisions. Unfortunately, due to long-tail safety-critical events, the risk is often under-estimated by finite-sampling approximations of probabilistic motion forecasts. This can lead to overconfident and unsafe robot behavior, even with robust planners. Instead of assuming full prediction coverage…
▽ More
Robust planning in interactive scenarios requires predicting the uncertain future to make risk-aware decisions. Unfortunately, due to long-tail safety-critical events, the risk is often under-estimated by finite-sampling approximations of probabilistic motion forecasts. This can lead to overconfident and unsafe robot behavior, even with robust planners. Instead of assuming full prediction coverage that robust planners require, we propose to make prediction itself risk-aware. We introduce a new prediction objective to learn a risk-biased distribution over trajectories, so that risk evaluation simplifies to an expected cost estimation under this biased distribution. This reduces the sample complexity of the risk estimation during online planning, which is needed for safe real-time performance. Evaluation results in a didactic simulation environment and on a real-world dataset demonstrate the effectiveness of our approach. The code and a demo are available.
△ Less
Submitted 11 January, 2023; v1 submitted 4 October, 2022;
originally announced October 2022.
-
A class of dissimilarity semimetrics for preference relations
Authors:
Hiroki Nishimura,
Efe A. Ok
Abstract:
We propose a class of semimetrics for preference relations any one of which is an alternative to the classical Kemeny-Snell-Bogart metric. (We take a fairly general viewpoint about what constitutes a preference relation, allowing for any acyclic order to act as one.) These semimetrics are based solely on the implications of preferences for choice behavior, and thus appear more suitable in economic…
▽ More
We propose a class of semimetrics for preference relations any one of which is an alternative to the classical Kemeny-Snell-Bogart metric. (We take a fairly general viewpoint about what constitutes a preference relation, allowing for any acyclic order to act as one.) These semimetrics are based solely on the implications of preferences for choice behavior, and thus appear more suitable in economic contexts and choice experiments. In our main result, we obtain a fairly simple axiomatic characterization for the class we propose. The apparently most important member of this class (at least in the case of finite alternative spaces), which we dub the top-difference semimetric, is characterized separately. We also obtain alternative formulae for it, and relative to this metric, compute the diameter of the space of complete preferences, as well as the best transitive extension of a given acyclic preference relation. Finally, we prove that our preference metric spaces cannot be isometically embedded in a Euclidean space.
△ Less
Submitted 8 March, 2022;
originally announced March 2022.
-
Resurgence and semiclassical expansion in two-dimensional large-$N$ sigma models
Authors:
Hiromichi Nishimura,
Toshiaki Fujimori,
Tatsuhiro Misumi,
Muneto Nitta,
Norisuke Sakai
Abstract:
The resurgence structure of the 2d $O(N)$ sigma model at large $N$ is studied with a focus on an IR momentum cutoff scale $a$ that regularizes IR singularities in the semiclassical expansion. Transseries expressions for condensates and correlators are derived as series of the dynamical scale $Λ$ (nonperturbative exponential) and coupling $λ_μ$ renormalized at the momentum scale $μ$. While there is…
▽ More
The resurgence structure of the 2d $O(N)$ sigma model at large $N$ is studied with a focus on an IR momentum cutoff scale $a$ that regularizes IR singularities in the semiclassical expansion. Transseries expressions for condensates and correlators are derived as series of the dynamical scale $Λ$ (nonperturbative exponential) and coupling $λ_μ$ renormalized at the momentum scale $μ$. While there is no ambiguity when $a > Λ$, we find for $a < Λ$ that the nonperturbative sectors have new imaginary ambiguities besides the well-known renormalon ambiguity in the perturbative sector. These ambiguities arise as a result of an analytic continuation of transseries coefficients to small values of the IR cutoff $a$ below the dynamical scale $Λ$. We find that the imaginary ambiguities are cancelled each other when we take all of them into account. By comparing the semiclassical expansion with the transseries for the exact large-$N$ result, we find that some ambiguities vanish in the $a \rightarrow 0$ limit and hence the resurgence structure changes when going from the semiclassical expansion to the exact result with no IR cutoff. An application of our approach to the ${\mathbb C}P^{N-1}$ sigma model is also discussed. We find in the compactified model with the ${\mathbb Z}_N$ twisted boundary condition that the resurgence structure changes discontinuously as the compactification radius is varied.
△ Less
Submitted 28 December, 2021;
originally announced December 2021.
-
SDOF-Tracker: Fast and Accurate Multiple Human Tracking by Skipped-Detection and Optical-Flow
Authors:
Hitoshi Nishimura,
Satoshi Komorita,
Yasutomo Kawanishi,
Hiroshi Murase
Abstract:
Multiple human tracking is a fundamental problem for scene understanding. Although both accuracy and speed are required in real-world applications, recent tracking methods based on deep learning have focused on accuracy and require substantial running time. This study aims to improve running speed by performing human detection at a certain frame interval because it accounts for most of the running…
▽ More
Multiple human tracking is a fundamental problem for scene understanding. Although both accuracy and speed are required in real-world applications, recent tracking methods based on deep learning have focused on accuracy and require substantial running time. This study aims to improve running speed by performing human detection at a certain frame interval because it accounts for most of the running time. The question is how to maintain accuracy while skipping human detection. In this paper, we propose a method that complements the detection results with optical flow, based on the fact that someone's appearance does not change much between adjacent frames. To maintain the tracking accuracy, we introduce robust interest point selection within human regions and a tracking termination metric calculated by the distribution of the interest points. On the MOT20 dataset in the MOTChallenge, the proposed SDOF-Tracker achieved the best performance in terms of the total running speed while maintaining the MOTA metric. Our code is available at https://github.com/hitottiez/sdof-tracker.
△ Less
Submitted 30 April, 2022; v1 submitted 27 June, 2021;
originally announced June 2021.
-
Communication Complexity of Private Simultaneous Quantum Messages Protocols
Authors:
Akinori Kawachi,
Harumichi Nishimura
Abstract:
The private simultaneous messages model is a non-interactive version of the multiparty secure computation, which has been intensively studied to examine the communication cost of the secure computation. We consider its quantum counterpart, the private simultaneous quantum messages (PSQM) model, and examine the advantages of quantum communication and prior entanglement of this model. In the PSQM mo…
▽ More
The private simultaneous messages model is a non-interactive version of the multiparty secure computation, which has been intensively studied to examine the communication cost of the secure computation. We consider its quantum counterpart, the private simultaneous quantum messages (PSQM) model, and examine the advantages of quantum communication and prior entanglement of this model. In the PSQM model, $k$ parties $P_1,\ldots,P_k$ initially share a common random string (or entangled states in a stronger setting), and they have private classical inputs $x_1,\ldots, x_k$. Every $P_i$ generates a quantum message from the private input $x_i$ and the shared random string (entangled states), and then sends it to the referee $R$. Receiving the messages, $R$ computes $F(x_1,\ldots,x_k)$. Then, $R$ learns nothing except for $F(x_1,\ldots,x_k)$ as the privacy condition. We obtain the following results for this PSQM model. (1) We demonstrate that the privacy condition inevitably increases the communication cost in the two-party PSQM model as well as in the classical case presented by Applebaum, Holenstein, Mishra, and Shayevitz. In particular, we prove a lower bound $(3-o(1))n$ of the communication complexity in PSQM protocols with a shared random string for random Boolean functions of $2n$-bit input, which is larger than the trivial upper bound $2n$ of the communication complexity without the privacy condition. (2) We demonstrate a factor two gap between the communication complexity of PSQM protocols with shared entangled states and with shared random strings by designing a multiparty PSQM protocol with shared entangled states for a total function that extends the two-party equality function. (3) We demonstrate an exponential gap between the communication complexity of PSQM protocols with shared entangled states and with shared random strings for a two-party partial function.
△ Less
Submitted 14 May, 2021;
originally announced May 2021.
-
Quantum Logarithmic Space and Post-selection
Authors:
François Le Gall,
Harumichi Nishimura,
Abuzer Yakaryılmaz
Abstract:
Post-selection, the power of discarding all runs of a computation in which an undesirable event occurs, is an influential concept introduced to the field of quantum complexity theory by Aaronson (Proceedings of the Royal Society A, 2005). In the present paper, we initiate the study of post-selection for space-bounded quantum complexity classes. Our main result shows the identity $\sf PostBQL=PL$,…
▽ More
Post-selection, the power of discarding all runs of a computation in which an undesirable event occurs, is an influential concept introduced to the field of quantum complexity theory by Aaronson (Proceedings of the Royal Society A, 2005). In the present paper, we initiate the study of post-selection for space-bounded quantum complexity classes. Our main result shows the identity $\sf PostBQL=PL$, i.e., the class of problems that can be solved by a bounded-error (polynomial-time) logarithmic-space quantum algorithm with post-selection ($\sf PostBQL$) is equal to the class of problems that can be solved by unbounded-error logarithmic-space classical algorithms ($\sf PL$). This result gives a space-bounded version of the well-known result $\sf PostBQP=PP$ proved by Aaronson for polynomial-time quantum computation. As a by-product, we also show that $\sf PL$ coincides with the class of problems that can be solved by bounded-error logarithmic-space quantum algorithms that have no time bound.
△ Less
Submitted 6 May, 2021;
originally announced May 2021.
-
RAT iLQR: A Risk Auto-Tuning Controller to Optimally Account for Stochastic Model Mismatch
Authors:
Haruki Nishimura,
Negar Mehr,
Adrien Gaidon,
Mac Schwager
Abstract:
Successful robotic operation in stochastic environments relies on accurate characterization of the underlying probability distributions, yet this is often imperfect due to limited knowledge. This work presents a control algorithm that is capable of handling such distributional mismatches. Specifically, we propose a novel nonlinear MPC for distributionally robust control, which plans locally optima…
▽ More
Successful robotic operation in stochastic environments relies on accurate characterization of the underlying probability distributions, yet this is often imperfect due to limited knowledge. This work presents a control algorithm that is capable of handling such distributional mismatches. Specifically, we propose a novel nonlinear MPC for distributionally robust control, which plans locally optimal feedback policies against a worst-case distribution within a given KL divergence bound from a Gaussian distribution. Leveraging mathematical equivalence between distributionally robust control and risk-sensitive optimal control, our framework also provides an algorithm to dynamically adjust the risk-sensitivity level online for risk-sensitive control. The benefits of the distributional robustness as well as the automatic risk-sensitivity adjustment are demonstrated in a dynamic collision avoidance scenario where the predictive distribution of human motion is erroneous.
△ Less
Submitted 18 January, 2021; v1 submitted 16 October, 2020;
originally announced October 2020.
-
Risk-Sensitive Sequential Action Control with Multi-Modal Human Trajectory Forecasting for Safe Crowd-Robot Interaction
Authors:
Haruki Nishimura,
Boris Ivanovic,
Adrien Gaidon,
Marco Pavone,
Mac Schwager
Abstract:
This paper presents a novel online framework for safe crowd-robot interaction based on risk-sensitive stochastic optimal control, wherein the risk is modeled by the entropic risk measure. The sampling-based model predictive control relies on mode insertion gradient optimization for this risk measure as well as Trajectron++, a state-of-the-art generative model that produces multimodal probabilistic…
▽ More
This paper presents a novel online framework for safe crowd-robot interaction based on risk-sensitive stochastic optimal control, wherein the risk is modeled by the entropic risk measure. The sampling-based model predictive control relies on mode insertion gradient optimization for this risk measure as well as Trajectron++, a state-of-the-art generative model that produces multimodal probabilistic trajectory forecasts for multiple interacting agents. Our modular approach decouples the crowd-robot interaction into learning-based prediction and model-based control, which is advantageous compared to end-to-end policy learning methods in that it allows the robot's desired behavior to be specified at run time. In particular, we show that the robot exhibits diverse interaction behavior by varying the risk sensitivity parameter. A simulation study and a real-world experiment show that the proposed online framework can accomplish safe and efficient navigation while avoiding collisions with more than 50 humans in the scene.
△ Less
Submitted 11 September, 2020;
originally announced September 2020.
-
Deconfinement and CP-breaking at $θ=π$ in Yang-Mills theories and a novel phase for SU(2)
Authors:
Shi Chen,
Kenji Fukushima,
Hiromichi Nishimura,
Yuya Tanizaki
Abstract:
We discuss the deconfinement and the CP-breaking phase transitions at $θ=π$ in Yang-Mills theories. The 't Hooft anomaly matching prohibits the confined phase with CP symmetry and requires $T_{dec}(θ=π) \le T_{CP}$, where $T_{dec}(θ=π)$ and $T_{CP}$ denote the deconfinement and the CP-restoration temperatures, respectively, at $θ=π$. We analytically study these two phase transitions in softly-brok…
▽ More
We discuss the deconfinement and the CP-breaking phase transitions at $θ=π$ in Yang-Mills theories. The 't Hooft anomaly matching prohibits the confined phase with CP symmetry and requires $T_{dec}(θ=π) \le T_{CP}$, where $T_{dec}(θ=π)$ and $T_{CP}$ denote the deconfinement and the CP-restoration temperatures, respectively, at $θ=π$. We analytically study these two phase transitions in softly-broken $\mathcal{N}=1$ supersymmetric Yang-Mills theories on small $\mathbb{R}^3\times S^1$ with the periodic boundary condition for gluinos. For most gauge groups except SU(2) in this model, we find that the inequality is saturated, so deconfinement and CP restoration occur simultaneously. We demonstrate special features of the SU(2) gauge theory: There is a finite window of two temperatures, $T_{dec}(π)<T_{CP}$, which indicates the existence of a novel CP-broken deconfined phase. We also discuss an implication of the novel phase for domain walls and their junctions.
△ Less
Submitted 2 June, 2020;
originally announced June 2020.
-
SACBP: Belief Space Planning for Continuous-Time Dynamical Systems via Stochastic Sequential Action Control
Authors:
Haruki Nishimura,
Mac Schwager
Abstract:
We propose a novel belief space planning technique for continuous dynamics by viewing the belief system as a hybrid dynamical system with time-driven switching. Our approach is based on the perturbation theory of differential equations and extends Sequential Action Control to stochastic dynamics. The resulting algorithm, which we name SACBP, does not require discretization of spaces or time and sy…
▽ More
We propose a novel belief space planning technique for continuous dynamics by viewing the belief system as a hybrid dynamical system with time-driven switching. Our approach is based on the perturbation theory of differential equations and extends Sequential Action Control to stochastic dynamics. The resulting algorithm, which we name SACBP, does not require discretization of spaces or time and synthesizes control signals in near real-time. SACBP is an anytime algorithm that can handle general parametric Bayesian filters under certain assumptions. We demonstrate the effectiveness of our approach in an active sensing scenario and a model-based Bayesian reinforcement learning problem. In these challenging problems, we show that the algorithm significantly outperforms other existing solution techniques including approximate dynamic programming and local trajectory optimization.
△ Less
Submitted 12 July, 2021; v1 submitted 26 February, 2020;
originally announced February 2020.
-
Distributed Quantum Proofs for Replicated Data
Authors:
Pierre Fraigniaud,
François Le Gall,
Harumichi Nishimura,
Ami Paz
Abstract:
The paper tackles the issue of $\textit{checking}$ that all copies of a large data set replicated at several nodes of a network are identical. The fact that the replicas may be located at distant nodes prevents the system from verifying their equality locally, i.e., by having each node consult only nodes in its vicinity. On the other hand, it remains possible to assign $\textit{certificates}$ to t…
▽ More
The paper tackles the issue of $\textit{checking}$ that all copies of a large data set replicated at several nodes of a network are identical. The fact that the replicas may be located at distant nodes prevents the system from verifying their equality locally, i.e., by having each node consult only nodes in its vicinity. On the other hand, it remains possible to assign $\textit{certificates}$ to the nodes, so that verifying the consistency of the replicas can be achieved locally. However, we show that, as the data set is large, classical certification mechanisms, including distributed Merlin-Arthur protocols, cannot guarantee good completeness and soundness simultaneously, unless they use very large certificates. The main result of this paper is a distributed $\textit{quantum}$ Merlin-Arthur protocol enabling the nodes to collectively check the consistency of the replicas, based on small certificates, and in a single round of message exchange between neighbors, with short messages. In particular, the certificate-size is logarithmic in the size of the data set, which gives an exponential advantage over classical certification mechanisms.
△ Less
Submitted 17 November, 2020; v1 submitted 23 February, 2020;
originally announced February 2020.
-
Free energy of a Holonomous Plasma
Authors:
Chris P. Korthals Altes,
Hiromichi Nishimura,
Robert D. Pisarski,
Vladimir V. Skokov
Abstract:
At a nonzero temperature T, a constant field $\overline{A}_0 \sim T/g$ generates nontrivial eigenvalues of the thermal Wilson line. We discuss contributions to the free energy of such a holonomous plasma when the coupling constant, $g$, is weak. We review the computation to $\sim g^2$ by several alternate methods, and show that gauge invariant sources, which are nonlinear in the gauge potential…
▽ More
At a nonzero temperature T, a constant field $\overline{A}_0 \sim T/g$ generates nontrivial eigenvalues of the thermal Wilson line. We discuss contributions to the free energy of such a holonomous plasma when the coupling constant, $g$, is weak. We review the computation to $\sim g^2$ by several alternate methods, and show that gauge invariant sources, which are nonlinear in the gauge potential $A_0$, generate novel contributions to the gluon self energy at $\sim g^2$. These ensure the gluon self energy remains transverse to $\sim g^2$, and are essential in computing contributions to the free energy at $\sim g^3$ for small holonomy, $\overline{A}_0 \sim T$. We show that the contribution $\sim g^3$ from off-diagonal gluons is discontinuous as the holonomy vanishes. The contribution from diagonal gluons is continuous as the holonomy vanishes, but sharply constrains the possible sources which generate nonzero holonomy, and must involve an infinite number of Polyakov loops.
△ Less
Submitted 3 February, 2020;
originally announced February 2020.
-
Conundrum for the free energy of a holonomous gluonic plasma at cubic order
Authors:
Christiaan P. Korthals Altes,
Hiromichi Nishimura,
Robert D. Pisarski,
Vladimir V. Skokov
Abstract:
We compute the term $\sim g^3$ in the free energy for a $SU(N)$ gauge theory with nonzero holonomy at nonzero temperature. If the holonomy is generated kinematically by the introduction of gauge invariant sources coupled to Polyakov loops, the contribution of charged (off-diagonal) gluons to the free energy at order $g^3$, ${\cal F}^{\left( 3\rm{:c.g.} \right)}$, is singular:…
▽ More
We compute the term $\sim g^3$ in the free energy for a $SU(N)$ gauge theory with nonzero holonomy at nonzero temperature. If the holonomy is generated kinematically by the introduction of gauge invariant sources coupled to Polyakov loops, the contribution of charged (off-diagonal) gluons to the free energy at order $g^3$, ${\cal F}^{\left( 3\rm{:c.g.} \right)}$, is singular: ${\cal F}^{\left( 3\rm{:c.g.} \right)} \neq 0 $ without holonomy, but ${\cal F}^{\left( 3 \rm{:c.g.} \right)}= 0$ when the holonomy is nonzero, even infinitesimally. We show that the absence of the charged gluon contribution is required by gauge invariance alone and is therefore a universal feature.
△ Less
Submitted 5 March, 2020; v1 submitted 22 November, 2019;
originally announced November 2019.
-
Survey of Period Variations of Superhumps in SU UMa-Type Dwarf Novae. X: The Tenth Year (2017)
Authors:
Taichi Kato,
Keisuke Isogai,
Yasuyuki Wakamatsu,
Franz-Josef Hambsch,
Hiroshi Itoh,
Tamas Tordai,
Tonny Vanmunster,
Pavol A. Dubovsky,
Igor Kudzej,
Tomas Medulka,
Mariko Kimura,
Ryuhei Ohnishi,
Berto Monard,
Elena P. Pavlenko,
Kirill A. Antonyuk,
Nikolaj V. Pit,
Oksana I. Antonyuk,
Julia V. Babina,
Aleksei V. Baklanov,
Aleksei A. Sosnovskij,
Roger D. Pickard,
Ian Miller,
Yutaka Maeda,
Enrique de Miguel,
Stephen M. Brincat
, et al. (45 additional authors not shown)
Abstract:
Continuing the project described by Kato et al. (2009, PASJ, 61, S395, arXiv/0905.1757), we collected times of superhump maxima for 102 SU UMa-type dwarf novae observed mainly during the 2017 season and characterized these objects. WZ Sge-type stars identified in this study are PT And, ASASSN-17ei, ASASSN-17el, ASASSN-17es, ASASSN-17fn, ASASSN-17fz, ASASSN-17hw, ASASSN-17kd, ASASSN-17la, PNV J2020…
▽ More
Continuing the project described by Kato et al. (2009, PASJ, 61, S395, arXiv/0905.1757), we collected times of superhump maxima for 102 SU UMa-type dwarf novae observed mainly during the 2017 season and characterized these objects. WZ Sge-type stars identified in this study are PT And, ASASSN-17ei, ASASSN-17el, ASASSN-17es, ASASSN-17fn, ASASSN-17fz, ASASSN-17hw, ASASSN-17kd, ASASSN-17la, PNV J20205397+2508145 and TCP J00332502-3518565. We obtained new mass ratios for 7 objects using growing superhumps (stage A). ASASSN-17gf is an EI Psc-type object below the period minimum. CRTS J080941.3+171528 and DDE 51 are objects in the period gap and both showed long-lasting phase of stage A superhumps. We also summarized the recent advances in understanding of SU UMa-type and WZ Sge-type dwarf novae.
△ Less
Submitted 25 December, 2019; v1 submitted 11 November, 2019;
originally announced November 2019.
-
Multiple Human Tracking using Multi-Cues including Primitive Action Features
Authors:
Hitoshi Nishimura,
Kazuyuki Tasaka,
Yasutomo Kawanishi,
Hiroshi Murase
Abstract:
In this paper, we propose a Multiple Human Tracking method using multi-cues including Primitive Action Features (MHT-PAF). MHT-PAF can perform the accurate human tracking in dynamic aerial videos captured by a drone. PAF employs a global context, rich information by multi-label actions, and a middle level feature. The accurate human tracking result using PAF helps multi-frame-based action recognit…
▽ More
In this paper, we propose a Multiple Human Tracking method using multi-cues including Primitive Action Features (MHT-PAF). MHT-PAF can perform the accurate human tracking in dynamic aerial videos captured by a drone. PAF employs a global context, rich information by multi-label actions, and a middle level feature. The accurate human tracking result using PAF helps multi-frame-based action recognition. In the experiments, we verified the effectiveness of the proposed method using the Okutama-Action dataset. Our code is available online.
△ Less
Submitted 17 September, 2019;
originally announced September 2019.
-
High-temperature domain walls of QCD with imaginary chemical potentials
Authors:
Hiromichi Nishimura,
Yuya Tanizaki
Abstract:
We study QCD with massless quarks on $\mathbb{R}^3\times S^1$ under symmetry-twisted boundary conditions with small compactification radius, i.e. at high temperatures. Under suitable boundary conditions, the theory acquires a part of the center symmetry and it is spontaneously broken at high temperatures. We show that these vacua at high temperatures can be regarded as different symmetry-protected…
▽ More
We study QCD with massless quarks on $\mathbb{R}^3\times S^1$ under symmetry-twisted boundary conditions with small compactification radius, i.e. at high temperatures. Under suitable boundary conditions, the theory acquires a part of the center symmetry and it is spontaneously broken at high temperatures. We show that these vacua at high temperatures can be regarded as different symmetry-protected topological orders, and the domain walls between them support nontrivial massless gauge theories as a consequence of anomaly-inflow mechanism. At sufficiently high temperatures, we can perform the semiclassical analysis to obtain the domain-wall theory, and $2$d $U(N_\mathrm{c}-1)$ gauge theories with massless fermions match the 't~Hooft anomaly. We perform these analysis for the high-temperature domain wall of $\mathbb{Z}_{N_\mathrm{c}}$-QCD and also of Roberge-Weiss phase transitions.
△ Less
Submitted 10 June, 2019; v1 submitted 10 March, 2019;
originally announced March 2019.
-
Impossibility of blind quantum sampling for classical client
Authors:
Tomoyuki Morimae,
Harumichi Nishimura,
Yuki Takeuchi,
Seiichiro Tani
Abstract:
Blind quantum computing enables a client, who can only generate or measure single-qubit states, to delegate quantum computing to a remote quantum server in such a way that the input, output, and program are hidden from the server. It is an open problem whether a completely classical client can delegate quantum computing blindly. In this paper, we show that if a completely classical client can blin…
▽ More
Blind quantum computing enables a client, who can only generate or measure single-qubit states, to delegate quantum computing to a remote quantum server in such a way that the input, output, and program are hidden from the server. It is an open problem whether a completely classical client can delegate quantum computing blindly. In this paper, we show that if a completely classical client can blindly delegate sampling of subuniversal models, such as the DQC1 model and the IQP model, then the polynomial-time hierarchy collapses to the third level. Our delegation protocol is the one where the client first sends a polynomial-length bit string to the server and then the server returns a single bit to the client. Generalizing the no-go result to more general setups is an open problem.
△ Less
Submitted 10 December, 2018;
originally announced December 2018.
-
Thermal effective potential for the Polyakov loop to higher loop order
Authors:
Hiromichi Nishimura,
Chris Korthals-Altes,
Robert D. Pisarski,
Vladimir Skokov
Abstract:
This is a progress report on the calculation of the effective potential for the Polyakov loop in $SU(N)$ pure gauge theory beyond two-loop order. We introduce a new approach using the Poisson resummation formula to compute sum-integrals with the holonomy. We show partial results for the free energy at order $g^3$ and $g^4$.
This is a progress report on the calculation of the effective potential for the Polyakov loop in $SU(N)$ pure gauge theory beyond two-loop order. We introduce a new approach using the Poisson resummation formula to compute sum-integrals with the holonomy. We show partial results for the free energy at order $g^3$ and $g^4$.
△ Less
Submitted 28 November, 2018;
originally announced November 2018.
-
Third Nearest WZ Sge-Type Dwarf Nova candidate ASASSN-14dx Classified on the Basis of Gaia Data Release 2
Authors:
Keisuke Isogai,
Taichi Kato,
Akira Imada,
Tomohito Ohshima,
Naoto Kojiguchi,
Ryuhei Ohnishi,
Franz-Josef Hambsch,
Berto Monard,
Seiichiro Kiyota,
Hideo Nishimura,
Daisaku Nogami
Abstract:
ASASSN-14dx showed an extraordinary outburst whose features are the small outburst amplitude (~ 2.3 mag) and long duration (> 4 years). Because we found a long observational gap of 123 d before the outburst detection, we propose that the main outburst plateau was missed and that this outburst is just a "fading tail" often seen after the WZ Sge-type superoutbursts. In order to distinguish between W…
▽ More
ASASSN-14dx showed an extraordinary outburst whose features are the small outburst amplitude (~ 2.3 mag) and long duration (> 4 years). Because we found a long observational gap of 123 d before the outburst detection, we propose that the main outburst plateau was missed and that this outburst is just a "fading tail" often seen after the WZ Sge-type superoutbursts. In order to distinguish between WZ Sge and SU UMa-type dwarf novae (DNe), we investigated Gaia DR2 statistically. We applied a logistic regression model and succeeded in classifying by using absolute Gaia magnitudes $M_{G}$ and Gaia colors $G_{\rm BP}-G_{\rm RP}$. Our new classifier also suggests that ASASSN-14dx is the best candidate of a WZ Sge-type DN. We estimated distances from the earth of known WZ Sge stars by using Gaia DR2 parallaxes. The result indicates that ASASSN-14dx is the third nearest WZ Sge star (next to WZ Sge and V455 And), and hence the object can show the third brightest WZ Sge-type superoutburst whose maximum is $V$ = 8-9 mag.
△ Less
Submitted 23 January, 2019; v1 submitted 25 November, 2018;
originally announced November 2018.
-
Quantum Advantage for the LOCAL Model in Distributed Computing
Authors:
François Le Gall,
Harumichi Nishimura,
Ansis Rosmanis
Abstract:
There are two central models considered in (fault-free synchronous) distributed computing: the CONGEST model, in which communication channels have limited bandwidth, and the LOCAL model, in which communication channels have unlimited bandwidth. Very recently, Le Gall and Magniez (PODC 2018) showed the superiority of quantum distributed computing over classical distributed computing in the CONGEST…
▽ More
There are two central models considered in (fault-free synchronous) distributed computing: the CONGEST model, in which communication channels have limited bandwidth, and the LOCAL model, in which communication channels have unlimited bandwidth. Very recently, Le Gall and Magniez (PODC 2018) showed the superiority of quantum distributed computing over classical distributed computing in the CONGEST model. In this work we show the superiority of quantum distributed computing in the LOCAL model: we exhibit a computational task that can be solved in a constant number of rounds in the quantum setting but requires $Ω(n)$ rounds in the classical setting, where $n$ denotes the size of the network.
△ Less
Submitted 25 October, 2018;
originally announced October 2018.
-
Interactive Proofs with Polynomial-Time Quantum Prover for Computing the Order of Solvable Groups
Authors:
François Le Gall,
Tomoyuki Morimae,
Harumichi Nishimura,
Yuki Takeuchi
Abstract:
In this paper we consider what can be computed by a user interacting with a potentially malicious server, when the server performs polynomial-time quantum computation but the user can only perform polynomial-time classical (i.e., non-quantum) computation. Understanding the computational power of this model, which corresponds to polynomial-time quantum computation that can be efficiently verified c…
▽ More
In this paper we consider what can be computed by a user interacting with a potentially malicious server, when the server performs polynomial-time quantum computation but the user can only perform polynomial-time classical (i.e., non-quantum) computation. Understanding the computational power of this model, which corresponds to polynomial-time quantum computation that can be efficiently verified classically, is a well-known open problem in quantum computing. Our result shows that computing the order of a solvable group, which is one of the most general problems for which quantum computing exhibits an exponential speed-up with respect to classical computing, can be realized in this model.
△ Less
Submitted 9 May, 2018;
originally announced May 2018.
-
Rational proofs for quantum computing
Authors:
Tomoyuki Morimae,
Harumichi Nishimura
Abstract:
It is an open problem whether a classical client can delegate quantum computing to an efficient remote quantum server in such a way that the correctness of quantum computing is somehow guaranteed. Several protocols for verifiable delegated quantum computing have been proposed, but the client is not completely free from any quantum technology: the client has to generate or measure single-qubit stat…
▽ More
It is an open problem whether a classical client can delegate quantum computing to an efficient remote quantum server in such a way that the correctness of quantum computing is somehow guaranteed. Several protocols for verifiable delegated quantum computing have been proposed, but the client is not completely free from any quantum technology: the client has to generate or measure single-qubit states. In this paper, we show that the client can be completely classical if the server is rational (i.e., economically motivated), following the "rational proofs" framework of Azar and Micali. More precisely, we consider the following protocol. The server first sends the client a message allegedly equal to the solution of the problem that the client wants to solve. The client then gives the server a monetary reward whose amount is calculated in classical probabilistic polynomial-time by using the server's message as an input. The reward function is constructed in such a way that the expectation value of the reward (the expectation over the client's probabilistic computing) is maximum when the server's message is the correct solution to the problem. The rational server who wants to maximize his/her profit therefore has to send the correct solution to the client.
△ Less
Submitted 11 March, 2020; v1 submitted 24 April, 2018;
originally announced April 2018.
-
Super-ponderomotive electron acceleration in blowout plasma heated by multi-picosecond relativistic intensity laser pulse
Authors:
Sadaoki Kojima,
Masayasu Hata,
Natsumi Iwata,
Yasunobu Arikawa,
Alessio Morace,
Shouhei Sakata,
Seungho Lee,
Kazuki Matsuo,
King Fai Farley Law,
Hiroki Morita,
Yugo Ochiai,
Akifumi Yogo,
Hideo Nagatomo,
Tetsuo Ozaki,
Tomoyuki Johzaki,
Atsushi Sunahara,
Hitoshi Sakagami,
Zhe Zhang,
Shota Tosaki,
Yuki Abe,
Junji Kawanaka,
Shigeki Tokita,
Mitsuo Nakai,
Hiroaki Nishimura,
Hiroyuki Shiraga
, et al. (3 additional authors not shown)
Abstract:
The dependence of the mean kinetic energy of laser-accelerated electrons on the laser intensity, so-called ponderomotive scaling, was derived theoretically with consideration of the motion of a single electron in oscillating laser fields. This scaling explains well the experimental results obtained with high-intensity pulses and durations shorter than a picosecond; however, this scaling is no long…
▽ More
The dependence of the mean kinetic energy of laser-accelerated electrons on the laser intensity, so-called ponderomotive scaling, was derived theoretically with consideration of the motion of a single electron in oscillating laser fields. This scaling explains well the experimental results obtained with high-intensity pulses and durations shorter than a picosecond; however, this scaling is no longer applicable to the multi-picosecond (multi-ps) facility experiments. Here, we experimentally clarified the generation of the super-ponderomotive-relativistic electrons (SP-REs) through multi-ps relativistic laser-plasma interactions using prepulse-free LFEX laser pulses that were realized using a plasma mirror (PM). The SP-REs are produced with direct laser acceleration assisted by the self-generated quasi-static electric field and with loop-injected direct acceleration by the self- generated quasi-static magnetic field, which grow in a blowout plasma heated by a multi-ps laser pulse. Finally, we theoretically derive the threshold pulse duration to boost the acceleration of REs, which provides an important insight into the determination of laser pulse duration at kilojoule- petawatt laser facilities.
△ Less
Submitted 6 March, 2018;
originally announced March 2018.
-
Possible higher order phase transition in large-$N$ gauge theory at finite temperature
Authors:
Hiromichi Nishimura,
Robert D. Pisarski,
Vladimir V. Skokov
Abstract:
We analyze the phase structure of $SU(\infty)$ gauge theory at finite temperature using matrix models. Our basic assumption is that the effective potential is dominated by double-trace terms for the Polyakov loops. As a function of the temperature, a background field for the Polyakov loop, and a quartic coupling, it exhibits a universal structure: in the large portion of the parameter space, there…
▽ More
We analyze the phase structure of $SU(\infty)$ gauge theory at finite temperature using matrix models. Our basic assumption is that the effective potential is dominated by double-trace terms for the Polyakov loops. As a function of the temperature, a background field for the Polyakov loop, and a quartic coupling, it exhibits a universal structure: in the large portion of the parameter space, there is a continuous phase transition analogous to the third-order phase transition of Gross, Witten and Wadia, but the order of phase transition can be higher than third. We show that different confining potentials give rise to drastically different behavior of the eigenvalue density and the free energy. Therefore lattice simulations at large $N$ could probe the order of phase transition and test our results.
△ Less
Submitted 21 December, 2017;
originally announced December 2017.
-
Magnetized Fast Isochoric Laser Heating for Efficient Creation of Ultra-High-Energy-Density States
Authors:
Shohei Sakata,
Seungho Lee,
Tomoyuki Johzaki,
Hiroshi Sawada,
Yuki Iwasa,
Hiroki Morita,
Kazuki Matsuo,
King Fai Farley Law,
Akira Yao,
Masayasu Hata,
Atsushi Sunahara,
Sadaoki Kojima,
Yuki Abe,
Hidetaka Kishimoto,
Aneez Syuhada,
Takashi Shiroto,
Alessio Morace,
Akifumi Yogo,
Natsumi Iwata,
Mitsuo Nakai,
Hitoshi Sakagami,
Tetsuo Ozaki,
Kohei Yamanoi,
Takayoshi Norimatsu,
Yoshiki Nakata
, et al. (14 additional authors not shown)
Abstract:
The quest for the inertial confinement fusion (ICF) ignition is a grand challenge, as exemplified by extraordinary large laser facilities. Fast isochoric heating of a pre-compressed plasma core with a high-intensity short-pulse laser is an attractive and alternative approach to create ultra-high-energy-density states like those found in ICF ignition sparks. This avoids the ignition quench caused b…
▽ More
The quest for the inertial confinement fusion (ICF) ignition is a grand challenge, as exemplified by extraordinary large laser facilities. Fast isochoric heating of a pre-compressed plasma core with a high-intensity short-pulse laser is an attractive and alternative approach to create ultra-high-energy-density states like those found in ICF ignition sparks. This avoids the ignition quench caused by the hot spark mixing with the surrounding cold fuel, which is the crucial problem of the currently pursued ignition scheme. High-intensity lasers efficiently produce relativistic electron beams (REB). A part of the REB kinetic energy is deposited in the core, and then the heated region becomes the hot spark to trigger the ignition. However, only a small portion of the REB collides with the core because of its large divergence. Here we have demonstrated enhanced laser-to-core energy coupling with the magnetized fast isochoric heating. The method employs a kilo-tesla-level magnetic field that is applied to the transport region from the REB generation point to the core which results in guiding the REB along the magnetic field lines to the core. 7.7 $\pm$ 1.3 % of the maximum coupling was achieved even with a relatively small radial area density core ($ρR$ $\sim$ 0.1 g/cm$^2$). The guided REB transport was clearly visualized in a pre-compressed core by using Cu-$K_α$ imaging technique. A simplified model coupled with the comprehensive diagnostics yields 6.2\% of the coupling that agrees fairly with the measured coupling. This model also reveals that an ignition-scale areal density core ($ρR$ $\sim$ 0.4 g/cm$^2$) leads to much higher laser-to-core coupling ($>$ 15%), this is much higher than that achieved by the current scheme.
△ Less
Submitted 16 December, 2017;
originally announced December 2017.
-
Finite-temperature phase transitions of third and higher order in gauge theories at large $N$
Authors:
Hiromichi Nishimura,
Robert D. Pisarski,
Vladimir V. Skokov
Abstract:
We study phase transitions in $SU(\infty)$ gauge theories at nonzero temperature using matrix models. Our basic assumption is that the effective potential is dominated by double trace terms for the Polyakov loops. As a function of the various parameters, related to terms linear, quadratic, and quartic in the Polyakov loop, the phase diagram exhibits a universal structure. In a large region of this…
▽ More
We study phase transitions in $SU(\infty)$ gauge theories at nonzero temperature using matrix models. Our basic assumption is that the effective potential is dominated by double trace terms for the Polyakov loops. As a function of the various parameters, related to terms linear, quadratic, and quartic in the Polyakov loop, the phase diagram exhibits a universal structure. In a large region of this parameter space, there is a continuous phase transition whose order is larger than second. This is a generalization of the phase transition of Gross, Witten, and Wadia (GWW). Depending upon the detailed form of the matrix model, the eigenvalue density and the behavior of the specific heat near the transition differ drastically. We speculate that in the pure gauge theory, that although the deconfining transition is thermodynamically of first order, it can be nevertheless conformally symmetric at infinite $N$.
△ Less
Submitted 12 December, 2017;
originally announced December 2017.
-
Merlin-Arthur with efficient quantum Merlin and quantum supremacy for the second level of the Fourier hierarchy
Authors:
Tomoyuki Morimae,
Yuki Takeuchi,
Harumichi Nishimura
Abstract:
We introduce a simple sub-universal quantum computing model, which we call the Hadamard-classical circuit with one-qubit (HC1Q) model. It consists of a classical reversible circuit sandwiched by two layers of Hadamard gates, and therefore it is in the second level of the Fourier hierarchy. We show that output probability distributions of the HC1Q model cannot be classically efficiently sampled wit…
▽ More
We introduce a simple sub-universal quantum computing model, which we call the Hadamard-classical circuit with one-qubit (HC1Q) model. It consists of a classical reversible circuit sandwiched by two layers of Hadamard gates, and therefore it is in the second level of the Fourier hierarchy. We show that output probability distributions of the HC1Q model cannot be classically efficiently sampled within a multiplicative error unless the polynomial-time hierarchy collapses to the second level. The proof technique is different from those used for previous sub-universal models, such as IQP, Boson Sampling, and DQC1, and therefore the technique itself might be useful for finding other sub-universal models that are hard to classically simulate. We also study the classical verification of quantum computing in the second level of the Fourier hierarchy. To this end, we define a promise problem, which we call the probability distribution distinguishability with maximum norm (PDD-Max). It is a promise problem to decide whether output probability distributions of two quantum circuits are far apart or close. We show that PDD-Max is BQP-complete, but if the two circuits are restricted to some types in the second level of the Fourier hierarchy, such as the HC1Q model or the IQP model, PDD-Max has a Merlin-Arthur system with quantum polynomial-time Merlin and classical probabilistic polynomial-time Arthur.
△ Less
Submitted 12 November, 2018; v1 submitted 28 November, 2017;
originally announced November 2017.
-
Gradient flows without blow-up for Lefschetz thimbles
Authors:
Yuya Tanizaki,
Hiromichi Nishimura,
Jacobus J. M. Verbaarschot
Abstract:
We propose new gradient flows that define Lefschetz thimbles and do not blow up in a finite flow time. We study analytic properties of these gradient flows, and confirm them by numerical tests in simple examples.
We propose new gradient flows that define Lefschetz thimbles and do not blow up in a finite flow time. We study analytic properties of these gradient flows, and confirm them by numerical tests in simple examples.
△ Less
Submitted 27 September, 2017; v1 submitted 12 June, 2017;
originally announced June 2017.
-
Merlinization of complexity classes above BQP
Authors:
Tomoyuki Morimae,
Harumichi Nishimura
Abstract:
We study how complexity classes above BQP, such as postBQP, ${\rm postBQP}_{\rm FP}$, and SBQP, change if we "Merlinize" them, i.e., if we allow an extra input quantum state (or classical bit string) given by Merlin as witness. Main results are the following three: First, the Merlinized version of postBQP is equal to PSPACE. Second, if the Merlinized postBQP is restricted in such a way that the po…
▽ More
We study how complexity classes above BQP, such as postBQP, ${\rm postBQP}_{\rm FP}$, and SBQP, change if we "Merlinize" them, i.e., if we allow an extra input quantum state (or classical bit string) given by Merlin as witness. Main results are the following three: First, the Merlinized version of postBQP is equal to PSPACE. Second, if the Merlinized postBQP is restricted in such a way that the postselection probability is equal to all witness states, then the class is equal to PP. Finally, the Merlinization does not change the class SBQP.
△ Less
Submitted 5 April, 2017;
originally announced April 2017.
-
Weil Diffeology I: Classical Differential Geometry
Authors:
Hirokazu Nishimura
Abstract:
Topos theory is a category-theoretic axiomatization of set theory. Model categories are a category-theoretical framework for abstract homotopy theory. They are complete and cocomplete categories endowed with three classes of morphisms (called fibrations, cofibrations and equivalences) satisfying certain axioms. Functors from the category of Weil algebras to the category of sets are called Weil spa…
▽ More
Topos theory is a category-theoretic axiomatization of set theory. Model categories are a category-theoretical framework for abstract homotopy theory. They are complete and cocomplete categories endowed with three classes of morphisms (called fibrations, cofibrations and equivalences) satisfying certain axioms. Functors from the category of Weil algebras to the category of sets are called Weil spaces by Wolfgang Bertram and form the Weil topos} after Eduardo J. Dubuc. The Weil topos is endowed intrinsically with the Dubuc functor, a functor from a larger category containing Weil algebras to the Weil topos standing for the incarnation of each algebraic entity of the category in the Weil topos. The Weil functor and the canonical ring object are to be defined in terms of the Dubuc functor. The principal object in this paper is to present a category-theoretical axiomatization of the Weil topos with the Dubuc functor intended to be an adequate framework for axiomatic classical differential geometry and hopefully comparable with model categories. We will give an appropriate formulation and a rather complete proof of a generalization of the familiar and desired fact that the tangent space of a microlinear Weil space is a module over the canonical ring object.
△ Less
Submitted 10 December, 2017; v1 submitted 19 February, 2017;
originally announced February 2017.
-
Liquid-Gas Phase Transitions and $\mathcal{CK}$ Symmetry in Quantum Field Theories
Authors:
Hiromichi Nishimura,
Michael C. Ogilvie,
Kamal Pangeni
Abstract:
A general field-theoretic framework for the treatment of liquid-gas phase transitions is developed. Starting from a fundamental four-dimensional field theory at nonzero temperature and density, an effective three-dimensional field theory with a sign problem is derived. Although charge conjugation $\mathcal{C}$ is broken at finite density, there remains a symmetry under $\mathcal{CK}$, where…
▽ More
A general field-theoretic framework for the treatment of liquid-gas phase transitions is developed. Starting from a fundamental four-dimensional field theory at nonzero temperature and density, an effective three-dimensional field theory with a sign problem is derived. Although charge conjugation $\mathcal{C}$ is broken at finite density, there remains a symmetry under $\mathcal{CK}$, where $\mathcal{K}$ is complex conjugation. We consider four models: relativistic fermions, nonrelativistic fermions, static fermions and classical particles. The thermodynamic behavior is extracted from $\mathcal{CK}$-symmetric complex saddle points of the effective field theory at tree level. The relativistic and static fermions show a liquid-gas transition, manifesting as a first-order line at low temperature and high density, terminated by a critical end point. In the cases of nonrelativistic fermions and classical particles, we find no first-order liquid-gas transitions at tree level. The mass matrix controlling the behavior of correlation functions is obtained from fluctuations around the saddle points. Due to the $\mathcal{CK}$ symmetry of the models, the eigenvalues of the mass matrix can be complex. This leads to the existence of disorder lines, which mark the boundaries where the eigenvalues go from purely real to complex. The regions where the mass matrix eigenvalues are complex are associated with the critical line. In the case of static fermions, a powerful duality between particles and holes allows for the analytic determination of both the critical line and the disorder lines. Depending on the values of the parameters, either zero, one or two disorder lines are found. Numerical results for relativistic fermions give a very similar picture.
△ Less
Submitted 30 December, 2016;
originally announced December 2016.
-
Complex spectrum of spin models for finite-density QCD
Authors:
Hiromichi Nishimura,
Michael Ogilvie,
Kamal Pangeni
Abstract:
We consider the spectrum of transfer matrix eigenvalues associated with Polyakov loops in lattice QCD at strong coupling. The transfer matrix at finite density is non-Hermitian, and its eigenvalues become complex as a manifestation of the sign problem. We show that the symmetry under charge conjugation and complex conjugation ensures that the eigenvalues are either real or part of a complex conjug…
▽ More
We consider the spectrum of transfer matrix eigenvalues associated with Polyakov loops in lattice QCD at strong coupling. The transfer matrix at finite density is non-Hermitian, and its eigenvalues become complex as a manifestation of the sign problem. We show that the symmetry under charge conjugation and complex conjugation ensures that the eigenvalues are either real or part of a complex conjugate pair, and the complex pairs lead to damped oscillatory behavior in Polyakov loop correlation functions, which also appeared in our previous phenomenological models using complex saddle points. We argue that this effect should be observable in lattice simulations of QCD at finite density.
△ Less
Submitted 3 November, 2016;
originally announced November 2016.
-
Power of one non-clean qubit
Authors:
Tomoyuki Morimae,
Keisuke Fujii,
Harumichi Nishimura
Abstract:
The one-clean qubit model (or the DQC1 model) is a restricted model of quantum computing where only a single qubit of the initial state is pure and others are maximally mixed. Although the model is not universal, it can efficiently solve several problems whose classical efficient solutions are not known. Furthermore, it was recently shown that if the one-clean qubit model is classically efficientl…
▽ More
The one-clean qubit model (or the DQC1 model) is a restricted model of quantum computing where only a single qubit of the initial state is pure and others are maximally mixed. Although the model is not universal, it can efficiently solve several problems whose classical efficient solutions are not known. Furthermore, it was recently shown that if the one-clean qubit model is classically efficiently simulated, the polynomial hierarchy collapses to the second level. A disadvantage of the one-clean qubit model is, however, that the clean qubit is too clean: for example, in realistic NMR experiments, polarizations are not enough high to have the perfectly pure qubit. In this paper, we consider a more realistic one-clean qubit model, where the clean qubit is not clean, but depolarized. We first show that, for any polarization, a multiplicative-error calculation of the output probability distribution of the model is possible in a classical polynomial time if we take an appropriately large multiplicative error. The result is in a strong contrast to that of the ideal one-clean qubit model where the classical efficient multiplicative-error calculation (or even the sampling) with the same amount of error causes the collapse of the polynomial hierarchy. We next show that, for any polarization lower-bounded by an inverse polynomial, a classical efficient sampling (in terms of a sufficiently small multiplicative error or an exponentially-small additive error) of the output probability distribution of the model is impossible unless BQP is contained in the second level of the polynomial hierarchy, which suggests the hardness of the classical efficient simulation of the one non-clean qubit model.
△ Less
Submitted 23 October, 2016;
originally announced October 2016.
-
Readout technologies for directional WIMP Dark Matter detection
Authors:
J. B. R. Battat,
I. G. Irastorza,
A. Aleksandrov,
M. Ali Guler,
T. Asada,
E. Baracchini,
J. Billard,
G. Bosson,
O. Bourrion,
J. Bouvier,
A. Buonaura,
K. Burdge,
S. Cebrian,
P. Colas,
L. Consiglio,
T. Dafni,
N. D'Ambrosio,
C. Deaconu,
G. De Lellis,
T. Descombes,
A. Di Crescenzo,
N. Di Marco,
G. Druitt,
R. Eggleston,
E. Ferrer-Ribas
, et al. (68 additional authors not shown)
Abstract:
The measurement of the direction of WIMP-induced nuclear recoils is a compelling but technologically challenging strategy to provide an unambiguous signature of the detection of Galactic dark matter. Most directional detectors aim to reconstruct the dark-matter-induced nuclear recoil tracks, either in gas or solid targets. The main challenge with directional detection is the need for high spatial…
▽ More
The measurement of the direction of WIMP-induced nuclear recoils is a compelling but technologically challenging strategy to provide an unambiguous signature of the detection of Galactic dark matter. Most directional detectors aim to reconstruct the dark-matter-induced nuclear recoil tracks, either in gas or solid targets. The main challenge with directional detection is the need for high spatial resolution over large volumes, which puts strong requirements on the readout technologies. In this paper we review the various detector readout technologies used by directional detectors. In particular, we summarize the challenges, advantages and drawbacks of each approach, and discuss future prospects for these technologies.
△ Less
Submitted 6 October, 2016;
originally announced October 2016.